期刊文献+
共找到351篇文章
< 1 2 18 >
每页显示 20 50 100
The Impersonal Theory of Poetry in “Tradition and the Individual Talent” by TS Eliot
1
作者 Dan Liu 《Journal of Contemporary Educational Research》 2024年第6期104-109,共6页
Eliot,an important poet,playwright,and literary critic of the nineteenth century in the United States,was the founder of Western modernism.He pioneered the modern poetic criticism.His practice of modernist poetry is t... Eliot,an important poet,playwright,and literary critic of the nineteenth century in the United States,was the founder of Western modernism.He pioneered the modern poetic criticism.His practice of modernist poetry is the transition from traditionalist poetics to modernist poetics in the 20th century.His famous poetics theory declaration“Tradition and the Individual Talent”is an immortal classic in the field of poetics theory,in which he proposed the concept of“Traditional,”the theory of“Impersonal”poetry,“Objective Correlative,”and so on.All had a profound influence on the 20th-century poetry creation.This paper aims to analyze and discuss the important“Impersonal”theory from the three aspects of its connotation,the relationship between“Personality”and its intertextuality with New Criticism,so as to further understand Eliot’s poetic concepts. 展开更多
关键词 ELIOT “Tradition and the Individual Talent” impersonal theory POETICS
下载PDF
Impersonality in Elizabeth Bishop's The Fish
2
作者 彭月姮 《海外英语》 2015年第24期175-176,共2页
Elizabeth Bishop(1911-1979), one of the most important and distinguished poets in the twentieth-century American literary world, is recognized as unique mainly for her objective and the imaginative images and the deta... Elizabeth Bishop(1911-1979), one of the most important and distinguished poets in the twentieth-century American literary world, is recognized as unique mainly for her objective and the imaginative images and the detachment in her poetry. Her poetry emphasizes the emotional self-control and avoids the description of individual life. This style is just coincided with T. S.Eliot's theory of impersonality. The article attempts to analyze the specific use of impersonality in Bishop's poem The Fish from two aspects: the objective description of the fish and the revelation of the universal truth. 展开更多
关键词 Elizabeth Bishop The FISH impersonalITY
下载PDF
Improved Mechanism for Detecting Examinations Impersonations in Public Higher Learning Institutions: Case of the Mwalimu Nyerere Memorial Academy (MNMA)
3
作者 Jasson Lwangisa Domition Rogers Philip Bhalalusesa Selemani Ismail 《Journal of Computer and Communications》 2024年第9期160-187,共28页
Currently, most public higher learning institutions in Tanzania rely on traditional in-class examinations, requiring students to register and present identification documents for examinations eligibility verification.... Currently, most public higher learning institutions in Tanzania rely on traditional in-class examinations, requiring students to register and present identification documents for examinations eligibility verification. This system, however, is prone to impersonations due to security vulnerabilities in current students’ verification system. These vulnerabilities include weak authentication, lack of encryption, and inadequate anti-counterfeiting measures. Additionally, advanced printing technologies and online marketplaces which claim to produce convincing fake identification documents make it easy to create convincing fake identity documents. The Improved Mechanism for Detecting Impersonations (IMDIs) system detects impersonations in in-class exams by integrating QR codes and dynamic question generation based on student profiles. It consists of a mobile verification app, built with Flutter and communicating via RESTful APIs, and a web system, developed with Laravel using HTML, CSS, and JavaScript. The two components communicate through APIs, with MySQL managing the database. The mobile app and web server interact to ensure efficient verification and security during examinations. The implemented IMDIs system was validated by a mobile application which is integrated with a QR codes scanner for capturing codes embedded in student Identity Cards and linking them to a dynamic question generation model. The QG model uses natural language processing (NLP) algorithm and Question Generation (QG) techniques to create dynamic profile questions. Results show that the IMDIs system could generate four challenging profile-based questions within two seconds, allowing the verification of 200 students in 33 minutes by one operator. The IMDIs system also tracks exam-eligible students, aiding in exam attendance and integrates with a Short Message Service (SMS) to report impersonation incidents to a dedicated security officer in real-time. The IMDIs system was tested and found to be 98% secure, 100% convenient, with a 0% false rejection rate and a 2% false acceptance rate, demonstrating its security, reliability, and high performance. 展开更多
关键词 Natural Language Processing (NLP) Model impersonations Detection Dynamic Challenging Questions Traditional-in-Class Examination and impersonation Detection
下载PDF
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation 被引量:3
4
作者 Inam ul haq Jian Wang +1 位作者 Youwen Zhu Saad Maqbool 《Digital Communications and Networks》 SCIE CSCD 2021年第1期140-150,共11页
During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure ... During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure seamless online services to end-users.To ensure the security of this online communication,researchers have proposed several multi-server authentication schemes incorporating various cryptographic primitives.Due to the low power and computational capacities of mobile devices,the hash-based multi-server authenticated key agreement schemes with offline Registration Server(RS)are the most efficient choice.Recently,Kumar-Om presented such a scheme and proved its security against all renowned attacks.However,we find that their scheme bears an incorrect login phase,and is unsafe to the trace attack,the Session-Specific Temporary Information Attack(SSTIA),and the Key Compromise Impersonation Attack(KCIA).In fact,all of the existing multi-server authentication schemes(hash-based with offline RS)do not withstand KCLA.To deal with this situation,we propose an improved hash-based multi-server authentication scheme(with offline RS).We analyze the security of the proposed scheme under the random oracle model and use the t4Automated Validation of Internet Security Protocols and Applications''(AVISPA)tool.The comparative analysis of communication overhead and computational complexity metrics shows the efficiency of the proposed scheme. 展开更多
关键词 Multi-server architecture Authenticated key agreement Registration server One-way hash function Key compromise impersonation
下载PDF
Novel Homomorphic Encryption for Mitigating Impersonation Attack in Fog Computing
5
作者 V.Balaji P.Selvaraj 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2015-2027,共13页
Fog computing is a rapidly growing technology that aids in pipelining the possibility of mitigating breaches between the cloud and edge servers.It facil-itates the benefits of the network edge with the maximized probab... Fog computing is a rapidly growing technology that aids in pipelining the possibility of mitigating breaches between the cloud and edge servers.It facil-itates the benefits of the network edge with the maximized probability of offering interaction with the cloud.However,the fog computing characteristics are suscep-tible to counteract the challenges of security.The issues present with the Physical Layer Security(PLS)aspect in fog computing which included authentication,integrity,and confidentiality has been considered as a reason for the potential issues leading to the security breaches.In this work,the Octonion Algebra-inspired Non-Commutative Ring-based Fully Homomorphic Encryption Scheme(NCR-FHE)was proposed as a secrecy improvement technique to overcome the impersonation attack in cloud computing.The proposed approach was derived through the benefits of Octonion algebra to facilitate the maximum security for big data-based applications.The major issues in the physical layer security which may potentially lead to the possible security issues were identified.The potential issues causing the impersonation attack in the Fog computing environment were identified.The proposed approach was compared with the existing encryption approaches and claimed as a robust approach to identify the impersonation attack for the fog and edge network.The computation cost of the proposed NCR-FHE is identified to be significantly reduced by 7.18%,8.64%,9.42%,and 10.36%in terms of communication overhead for varying packet sizes,when compared to the benchmarked ECDH-DH,LHPPS,BF-PHE and SHE-PABF schemes. 展开更多
关键词 Fog computing physical layer security non-commutative ring-based fully homomorphic encryption impersonation attack
下载PDF
Design of an Efficient and Provable Secure Key Exchange Protocol for HTTP Cookies
6
作者 Waseem Akram Khalid Mahmood +3 位作者 Hafiz Burhan ul Haq Muhammad Asif Shehzad Ashraf Chaudhry Taeshik Shon 《Computers, Materials & Continua》 SCIE EI 2024年第7期263-280,共18页
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the Internet.HTTP cookie... Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the Internet.HTTP cookies are exploited to carry client patterns observed by a website.These client patterns facilitate the particular client’s future visit to the corresponding website.However,security and privacy are the primary concerns owing to the value of information over public channels and the storage of client information on the browser.Several protocols have been introduced that maintain HTTP cookies,but many of those fail to achieve the required security,or require a lot of resource overheads.In this article,we have introduced a lightweight Elliptic Curve Cryptographic(ECC)based protocol for authenticating client and server transactions to maintain the privacy and security of HTTP cookies.Our proposed protocol uses a secret key embedded within a cookie.The proposed protocol ismore efficient and lightweight than related protocols because of its reduced computation,storage,and communication costs.Moreover,the analysis presented in this paper confirms that proposed protocol resists various known attacks. 展开更多
关键词 COOKIES authentication protocol impersonation attack ECC
下载PDF
“非政治”“免疫”和“非人格”——罗伯托·埃斯波西托的政治哲学术语变革
7
作者 刘薇 王庆丰 《当代国外马克思主义评论》 2024年第1期369-387,共19页
为了解决20世纪政治哲学面临的“绝对性”危机,埃斯波西托从改造其术语系统出发,通过“非”的方式对既有术语进行重释,同时又注入医学上、哲学上和法律上的概念,对其进行了一场政治哲学的术语变革。具体说来,埃斯波西托对通过“非政治... 为了解决20世纪政治哲学面临的“绝对性”危机,埃斯波西托从改造其术语系统出发,通过“非”的方式对既有术语进行重释,同时又注入医学上、哲学上和法律上的概念,对其进行了一场政治哲学的术语变革。具体说来,埃斯波西托对通过“非政治”“免疫”“非人格”这三重范畴进行的“术语变革”来建构其理论范式,形成了其独特的理论自觉。通过掀起这样一场“术语变革”,埃斯波西托摆脱了原有政治哲学分析范式的束缚,消解了政治哲学的绝对地位,以“非”为研究视角对政治哲学中的政治、共同体和人格概念赋予了全新内涵,从而构建出能够解释当代西方生命政治现实的全新政治哲学。这一术语范式的转化,无疑为我们把握当代社会提供了新的视角,为推进重新考察社会内部秩序结构关系提供了新的思考方式,从而实现了对现代社会的政治哲学进行理论范式的更新。 展开更多
关键词 非政治 免疫 非人格 政治哲学
下载PDF
世界文学语境中漫谈木心和情诗
8
作者 童明 《广东外语外贸大学学报》 CSSCI 2024年第4期25-38,共14页
在世界文学的语境中,作者间插和木心以往对话的片断,探索木心与不同文明中情诗传统的关联,以寻找某些美学规律和特点。木心的情诗属于非主观诗学,其中的“我”并非诗人本人,实为根据情景虚构的各种他者“我”,情欲融汇于灵智;木心的诗艺... 在世界文学的语境中,作者间插和木心以往对话的片断,探索木心与不同文明中情诗传统的关联,以寻找某些美学规律和特点。木心的情诗属于非主观诗学,其中的“我”并非诗人本人,实为根据情景虚构的各种他者“我”,情欲融汇于灵智;木心的诗艺,将口语方言、文言文、典故、翻译有机混合,吸收希伯来、希腊、古波斯的不同风格,采纳如植物学等现代科学的语汇,所以与世界性情诗传统之间有多维度的奇妙关联。更重要的是,这种诗艺是表达广阔深邃的生命观、宇宙观和历史观的载体。 展开更多
关键词 世界文学的情诗传统 非主观诗学 情欲和灵智 古波斯情诗 希伯来情诗 现代诗
下载PDF
Enhanced DDoS Detection Using Advanced Machine Learning and Ensemble Techniques in Software Defined Networking
9
作者 Hira Akhtar Butt Khoula Said Al Harthy +3 位作者 Mumtaz Ali Shah Mudassar Hussain Rashid Amin Mujeeb Ur Rehman 《Computers, Materials & Continua》 SCIE EI 2024年第11期3003-3031,共29页
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern networks.Traditional detection systems often struggle to mitigate such atta... Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern networks.Traditional detection systems often struggle to mitigate such attacks in conventional and software-defined networking(SDN)environments.While Machine Learning(ML)models can distinguish between benign and malicious traffic,their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent retraining.In this paper,we propose a novel DDoS detection framework that combines Machine Learning(ML)and Ensemble Learning(EL)techniques to improve DDoS attack detection and mitigation in SDN environments.Our model leverages the“DDoS SDN”dataset for training and evaluation and employs a dynamic feature selection mechanism that enhances detection accuracy by focusing on the most relevant features.This adaptive approach addresses the limitations of conventional ML models and provides more accurate detection of various DDoS attack scenarios.Our proposed ensemble model introduces an additional layer of detection,increasing reliability through the innovative application of ensemble techniques.The proposed solution significantly enhances the model’s ability to identify and respond to dynamic threats in SDNs.It provides a strong foundation for proactive DDoS detection and mitigation,enhancing network defenses against evolving threats.Our comprehensive runtime analysis of Simultaneous Multi-Threading(SMT)on identical configurations shows superior accuracy and efficiency,with significantly reduced computational time,making it ideal for real-time DDoS detection in dynamic,rapidly changing SDNs.Experimental results demonstrate that our model achieves outstanding performance,outperforming traditional algorithms with 99%accuracy using Random Forest(RF)and K-Nearest Neighbors(KNN)and 98%accuracy using XGBoost. 展开更多
关键词 Table 1(continued)OSI layer Possible DDoS attack Data link MAC Address Flooding Physical Cable disconnection JaMMING physical impersonation
下载PDF
功能视角下“NV了”与“VN了”句式对比研究
10
作者 秦思 《湖北师范大学学报(哲学社会科学版)》 2024年第2期77-82,共6页
本文重点考察汉语中的“NV了”与“VN了”句式,从结构、意义和功能等方面对比两者异同。研究表明,“NV了”是话题结构,即话题-述题,动名结合松散,表现出行为性和及物性,表征行为活动。“VN了”则缺少话题,动词唯一的参与者被压制至动词... 本文重点考察汉语中的“NV了”与“VN了”句式,从结构、意义和功能等方面对比两者异同。研究表明,“NV了”是话题结构,即话题-述题,动名结合松散,表现出行为性和及物性,表征行为活动。“VN了”则缺少话题,动词唯一的参与者被压制至动词之后,动名结合紧密,甚至词汇化,表现出非人称性、事件性和作格性,表征事件与事件类存在句的特点相吻合。二者相比,“VN了”句式的成立受到更多约束。这体现并印证了汉语的类型特征,即汉语是话题突出型语言以主宾格模式为主导,及物性为主,作格性为辅。 展开更多
关键词 功能视角 话题性 事件性 非人称性 作格性
下载PDF
传统信任文化的现代性赋能组织繁荣
11
作者 王建斌 《中国文化与管理》 2024年第2期67-74,258,共9页
在传统文化下,中国社会形成了一种以“亲情”为基础的人格化信任和以“同理心”为基础的非人格化信任的双重信任格局,人格化信任的影响远远大于非人格化信任。人格化信任程度高、凝聚力强,当组织规模比较小时,能够快速反应,促进组织繁... 在传统文化下,中国社会形成了一种以“亲情”为基础的人格化信任和以“同理心”为基础的非人格化信任的双重信任格局,人格化信任的影响远远大于非人格化信任。人格化信任程度高、凝聚力强,当组织规模比较小时,能够快速反应,促进组织繁荣。不过,人格化信任是一种“差序”信任,对“外人”信任程度比较低。在代际传承过程中,组织规模逐步缩小;在用人上,能力强而缺乏“亲情”的员工由于得不到信任而无法受到重用,削弱了组织的长远竞争力。由“传统”向“现代”转变过程中,传统信任文化需要实现创造性转化和创新性发展,情感为基础的“人格化信任”需要向契约为基础的“非人格化信任”转变,这样才能促进组织的长久繁荣。 展开更多
关键词 亲情 同理心 人格化信任 非人格化信任 契约
下载PDF
电子地图符号构成变量及其生成模式 被引量:23
12
作者 曹亚妮 江南 +1 位作者 张亚军 张晓楠 《测绘学报》 EI CSCD 北大核心 2012年第5期784-790,共7页
在电子地图符号化的过程中,视觉变量是关键。通过分析视觉变量在电子地图符号设计和自动生成过程中的不足,提出符号构成变量的概念;剖析符号构成变量的表现形式,探讨基于符号构成变量的多种符号生成模式;在此基础上实现了电子地图符号... 在电子地图符号化的过程中,视觉变量是关键。通过分析视觉变量在电子地图符号设计和自动生成过程中的不足,提出符号构成变量的概念;剖析符号构成变量的表现形式,探讨基于符号构成变量的多种符号生成模式;在此基础上实现了电子地图符号生成模块,试验证明能够提高电子地图符号的科学性和美观性,且便于技术实现,为电子地图符号的设计和自动生成提供了新方法。 展开更多
关键词 符号构成变量 客观形式 主观形式 符号生成模式
下载PDF
儿童假装游戏中假想角色现象初探 被引量:8
13
作者 李秀珊 李红 +2 位作者 雷怡 孙忻怡 李秀丽 《心理发展与教育》 CSSCI 北大核心 2009年第2期8-12,27,共6页
通过对145名4—5岁儿童进行结构式访谈,调查幼儿假装游戏中假想角色现象的概况,包括假想同伴和角色扮演现象。结果如下:42.7%的儿童有假想同伴,绝大多数是玩具形式,女孩更多有假想同伴;男孩倾向于选择动物类型的假想同伴,而女... 通过对145名4—5岁儿童进行结构式访谈,调查幼儿假装游戏中假想角色现象的概况,包括假想同伴和角色扮演现象。结果如下:42.7%的儿童有假想同伴,绝大多数是玩具形式,女孩更多有假想同伴;男孩倾向于选择动物类型的假想同伴,而女孩倾向于人物类型;假想同伴绝大多为同性别并且比自己年龄小。44.8%的儿童有角色扮演活动,其中男孩倾向于装扮动画中的英雄人物,女孩倾向于装扮现实人物。 展开更多
关键词 假想角色 假想同伴 角色扮演 想象力
下载PDF
信任方式的起源和中国人信任的特征 被引量:13
14
作者 周生春 杨缨 《浙江大学学报(人文社会科学版)》 CSSCI 北大核心 2011年第1期169-177,共9页
以往学者大多认为中国社会制度背后的组织通则为亲族原则,并形成了"差序格局"的社会特征,从而造成了中国低信任度文化的产生,不利于中国的发展。但通过历史分析和博弈推演可知:由于与印度、欧洲的起始博弈不同,中国人建立了... 以往学者大多认为中国社会制度背后的组织通则为亲族原则,并形成了"差序格局"的社会特征,从而造成了中国低信任度文化的产生,不利于中国的发展。但通过历史分析和博弈推演可知:由于与印度、欧洲的起始博弈不同,中国人建立了基于同情心原则的人格化信任方式——直接信任,这一信任方式虽然在真实性、范围和强度上都优于其他信任方式,但由于辅助的非人格化信任的周期性解体与重建,以及近代社会的转型和外部威胁,中国人的直接信任方式具有不稳定的特点。所以说,中国人对不同对象给予信任的不同顺序与强度是因安全原因才逐渐表现出来的,中国社会的"差序格局"特征更多的是时间顺序上的,并从时间顺序反映到空间范围上。 展开更多
关键词 人格化信任 非人格化信任 同情心 亲族
下载PDF
影响电力需求预测各因素的客观权重分配方法 被引量:14
15
作者 王茜 王雁凌 张粒子 《电网技术》 EI CSCD 北大核心 2008年第5期82-86,共5页
确定影响电力需求预测各因素的权重分配是进行电力发展规划需求预测后评价的一项重要内容。针对电力行业五年期需求预测后评价中待评价年个数较少而影响因素较多的特点,文章在一般多因素客观权重分配方法的基础上,提出了加权互信息量的... 确定影响电力需求预测各因素的权重分配是进行电力发展规划需求预测后评价的一项重要内容。针对电力行业五年期需求预测后评价中待评价年个数较少而影响因素较多的特点,文章在一般多因素客观权重分配方法的基础上,提出了加权互信息量的概念,同时引入相对强度熵,得到了一种影响电力需求预测各因素的客观权重分配方法,并通过计算实例证明了该方法的有效性和实用性。 展开更多
关键词 电力需求预测 后评价 模糊聚类分析 粗糙集 客观权重
下载PDF
Revised quantum direct communication scheme with mutual authentication 被引量:2
16
作者 刘文杰 陈汉武 +1 位作者 许娟 刘志昊 《Journal of Southeast University(English Edition)》 EI CAS 2010年第4期532-536,共5页
Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communicati... Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communication process.The purpose of the former is to authenticate Trent and users to each other,and let the two legitimate users(Alice and Bob)safely share the Bell states.While the latter aims to make direct communication to transmit a secret message between Alice and Bob.In order to prevent from Eve's eavesdropping as well as to authenticate each other simultaneously,a decoy photon checking technique is applied.Compared with other analogous protocols,the quantum state distribution process is more simple and feasible and the proposed scheme is more efficient;i.e.,the total efficiency is almost 100%.Security analysis shows that the proposed scheme is secure against the eavesdropping attacks,the impersonation attacks,and some special Trent's attacks,including the attacks by using different initial states. 展开更多
关键词 quantum direct communication mutual authentica-tion decoy-photon checking impersonation attack special Trent's attack
下载PDF
基于图像识别的客观题阅卷研究 被引量:5
17
作者 郑广 秦敏 +1 位作者 付冬 吕秀鉴 《仪器仪表学报》 EI CAS CSCD 北大核心 2006年第z1期783-784,791,共3页
介绍了一种智能阅卷的新方法,该方法采用数字图像处理技术来正确提取考试信息,然后用软件处理这些信息,得出试卷的分数。文中给出了这种方法的原理。用该方法阅读客观题具有硬件价格低,无需维护等优点。实验表明,该方法能识别出正确选... 介绍了一种智能阅卷的新方法,该方法采用数字图像处理技术来正确提取考试信息,然后用软件处理这些信息,得出试卷的分数。文中给出了这种方法的原理。用该方法阅读客观题具有硬件价格低,无需维护等优点。实验表明,该方法能识别出正确选择、错误选择、重复选择和漏选,并且准确率高,阅卷速度快。 展开更多
关键词 客观题阅卷 图像识别 特征提取
下载PDF
一种面向车联网的高效条件匿名认证方案 被引量:3
18
作者 王青龙 乔瑞 +1 位作者 樊娜 段宗涛 《北京交通大学学报》 CAS CSCD 北大核心 2019年第5期80-86,共7页
针对传统基于公钥基础设施(Public Key Infrastructure,PKI)的匿名证书方案需要更新的问题,提出一种车联网匿名证书分发机制,车辆从途经的路侧单元(Road Side Unit,RSU)获得临时匿名证书,并利用该证书进行消息广播.因而不存在复杂的证... 针对传统基于公钥基础设施(Public Key Infrastructure,PKI)的匿名证书方案需要更新的问题,提出一种车联网匿名证书分发机制,车辆从途经的路侧单元(Road Side Unit,RSU)获得临时匿名证书,并利用该证书进行消息广播.因而不存在复杂的证书管理问题,并且车辆在认证消息时也不需要耗时的证书撤销列表(Certificate Revocation List,CRL)检查,显著提高了认证效率.安全分析表明本文方案满足匿名性、不可关联性、可追踪性、撤销性及消息完整性,能够抵抗伪造攻击、假冒攻击和重放攻击,特别是与已有类似方案相比较,能够抵抗RSU的关联攻击.实验结果显示本文方案具有较高的计算效率,具有实际应用价值. 展开更多
关键词 车联网 匿名证书 认证 可追踪性 假冒攻击
下载PDF
冠心病血瘀证与痰浊证辨证客观化的研究 被引量:22
19
作者 黄召谊 董慧 +1 位作者 吴汉卿 陈广 《中国中医急症》 2010年第11期1873-1875,共3页
目的观察冠心病(CHD)血瘀证与痰浊证患者血液中内皮素(ET)、一氧化氮(NO)、过氧化脂质(LPO)、丙二醛(MDA)、超氧化物歧化酶(SOD)、谷胱甘肽过氧化物酶(GSH-PX)、脂联素(ADPN)、瘦素(LPT)、游离脂肪酸(FFA)及血脂水平[TG(甘油三酯)、TC(... 目的观察冠心病(CHD)血瘀证与痰浊证患者血液中内皮素(ET)、一氧化氮(NO)、过氧化脂质(LPO)、丙二醛(MDA)、超氧化物歧化酶(SOD)、谷胱甘肽过氧化物酶(GSH-PX)、脂联素(ADPN)、瘦素(LPT)、游离脂肪酸(FFA)及血脂水平[TG(甘油三酯)、TC(总胆固醇)、LDL-C(低密度脂蛋白胆固醇)、HDL-C(高密度脂蛋白胆固醇)、apo-A(载脂蛋白A)、apo-B(载脂蛋白B)]的变化,探讨其在CHD血瘀证及痰浊证辨证分型中的作用。方法检测40例痰浊证CHD患者(T组),43例血瘀证CHD患者(X组)及20例健康志愿者(N组)血液中ET、NO、LPO、MDA、SOD、GSH-PX、ADPN、LPT、FFA及血脂(TG、TC、LDL-C、HDL-C、apo-A、apo-B)水平。结果 (1)X组及T组ET、LPO、MDA、FFA、TG、TC、LDL-C水平较N组显著增高,其中X组ET、LPO、MDA水平较T组增高明显,其余则为T组增高较明显。(2)X组及T组NO、SOD、GSH-PX、ADPN、LPT、HDL-C、apo-A/apo-B水平较N组显著降低,其中X组NO、SOD、GSH-PX水平较T组降低明显,其余为T组降低明显。结论 CHD血瘀证与痰浊证在ET、NO、LPO、MDA、SOD、GSH-PX、ADPN、LPT、FFA及血脂(TG、TC、LDL-C、HDL-C、apo-A/apo-B)变化方面有显著性差异,这些实验指标可以作为CHD痰浊证及血瘀证辨证分型的客观依据。 展开更多
关键词 冠心病 血瘀证 痰浊证 辨证 客观化
下载PDF
一种改进的跨域口令密钥交换协议 被引量:6
20
作者 刘广伟 周恩光 +1 位作者 闫虹 周福才 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2009年第1期42-45,共4页
跨域的端到端的口令认证密钥交换(C2C-PAKE)协议,可实现不同区域的两个客户通过不同的口令协商出共享的会话密钥.首先对Byun2007的C2C-PAKE协议进行了描述,并针对其安全性进行了分析,发现该协议易遭受口令泄露伪造攻击的安全漏洞,提出... 跨域的端到端的口令认证密钥交换(C2C-PAKE)协议,可实现不同区域的两个客户通过不同的口令协商出共享的会话密钥.首先对Byun2007的C2C-PAKE协议进行了描述,并针对其安全性进行了分析,发现该协议易遭受口令泄露伪造攻击的安全漏洞,提出了一种高效的改进的跨域口令认证密钥交换协议.该协议引入公钥密码体制能够有效抵抗口令泄露伪造攻击和不可检测在线字典攻击,且只需要6步通信.安全性分析表明该协议是安全有效的. 展开更多
关键词 安全协议 跨域 口令认证密钥交换 口令泄露伪造攻击 敌手
下载PDF
上一页 1 2 18 下一页 到第
使用帮助 返回顶部