期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
从社会幸福感到积极心理健康模型—Keyes介评 被引量:19
1
作者 苗元江 赵姗 《心理研究》 2009年第5期13-16,25,共5页
继主观幸福感、心理幸福感后,Keyes提出了社会幸福感理论,构成幸福感理论第三阵营。其主要贡献涉及社会幸福感理论与测量、心理健康双因素理念,倡导积极心理健康模型,深化了幸福感的理解,拓展了幸福感的应用,架构了从幸福感到积极心理... 继主观幸福感、心理幸福感后,Keyes提出了社会幸福感理论,构成幸福感理论第三阵营。其主要贡献涉及社会幸福感理论与测量、心理健康双因素理念,倡导积极心理健康模型,深化了幸福感的理解,拓展了幸福感的应用,架构了从幸福感到积极心理健康的桥梁。 展开更多
关键词 keyes 社会幸福感 双因素理论 积极心理健康模型
下载PDF
Research on the positioning problem in HIFU surgery platform application
2
作者 项林清 高雪官 +1 位作者 许剑波 马培荪 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第3期272-279,共8页
For describing the positioning process of High Intensity Focused Ultrasound (HIFU) Surgery Platform in the application in tumor treatment, a simplified representation of the shape and location of the positioning targe... For describing the positioning process of High Intensity Focused Ultrasound (HIFU) Surgery Platform in the application in tumor treatment, a simplified representation of the shape and location of the positioning target tumor in the workspace of the platform by the Positioning Volume Ellipsoid is designed; and the Nearest Neighbor Search method is used to find the closest center point of the simplified ellipsoid tumor model in a selected patient body surface point set determined by the motion parameter of the platform. By the query result the goal positioning path configuration and an intermediate positioning path configuration for the positioning motion are determined for the positioning motion planning. Three new criterions using distance change between Positioning Volume Ellipsoid and the Ultrasound Focus Ellipsoid are proposed to evaluate the result of the whole positioning procedure. 展开更多
关键词 focused ultrasound key configuration positioning volume ellipsoid nearest neighbor
下载PDF
中国野生动物邮票
3
作者 杨道德 李去惑 张阳春 《野生动物》 1997年第5期20-22,共3页
中国野生动物邮票杨道德,李去惑,张阳春1949年以来,中国共发行了600多套邮票,分为特种、纪念、普通三类。特种邮票是为宣传介绍某些有重要意义的事物而特别发行的邮票。野生动物邮票属特种邮票,它的发行对野生动物保护只有... 中国野生动物邮票杨道德,李去惑,张阳春1949年以来,中国共发行了600多套邮票,分为特种、纪念、普通三类。特种邮票是为宣传介绍某些有重要意义的事物而特别发行的邮票。野生动物邮票属特种邮票,它的发行对野生动物保护只有重要的宣传作用。作者通过系统收集和... 展开更多
关键词 PROBLEM RULES PROBLEM representation key structure CHANGING positION CHESS
下载PDF
津巴布韦为濒危物种公约第十届缔约国大会发行纪念邮票
4
作者 解焱 汪松 《野生动物》 1997年第5期44-44,共1页
津巴布韦为濒危物种公约第十届缔约国大会发行纪念邮票解焱,汪松编译买国庆摄影濒危野生动植物种国际贸易公约(CITES)第十届缔约国大会于1997年6月9~20日在津巴布韦美丽的首都哈拉雷举行。为此津巴布韦于1997年4... 津巴布韦为濒危物种公约第十届缔约国大会发行纪念邮票解焱,汪松编译买国庆摄影濒危野生动植物种国际贸易公约(CITES)第十届缔约国大会于1997年6月9~20日在津巴布韦美丽的首都哈拉雷举行。为此津巴布韦于1997年4月15日发行了一套6张纪念邮票。该... 展开更多
关键词 PROBLEM rules PROBLEM representation key structure CHANGING position CHESS
下载PDF
南京的战略地位和功能定位与中心城市作用 被引量:1
5
作者 张锋 《现代城市研究》 1998年第1期4-6,62,共4页
By her strategic postition,Nanjing is number one key city of Jiangsu Province,important key city atlower reaches of Yangtze River,signficant industrial Zone with strategic importance,she is also the would be center of... By her strategic postition,Nanjing is number one key city of Jiangsu Province,important key city atlower reaches of Yangtze River,signficant industrial Zone with strategic importance,she is also the would be center ofinternational cultural exchange. By means of the specific-oriented function,Nanjing possesses four essential factors:manufacture,circulation,service,and innovation.In order to develop the affect of a key city,we have to strengthen the planning and constructionof Nanjing urban ring,upgrade main city's comprehensive services,give play of the special affect of connect the East andenlighten the west,carry out the crosswise economical alliance. 展开更多
关键词 STRATEGIC positION of key city NANJING FUNCTIONS
下载PDF
Methods for Increasing Creditability of Anomaly Detection System
6
作者 YANQiao 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期79-82,共4页
Based on Bayes' theorem we point out that the false positive rate must be lower than the intrusion base rate in order to make the Alarm Credibility Probability of the intrusion detection system exceed 50%. We pres... Based on Bayes' theorem we point out that the false positive rate must be lower than the intrusion base rate in order to make the Alarm Credibility Probability of the intrusion detection system exceed 50%. We present the methods that have been used in our developing intrusion detection system AIIDS (artificial immune intrusion detection systems) to increase the creditability of anomaly detection system. These methods include increasing the regularities of the system call trace by use of Hidden Markov Model (HMM), making every antibody or detector has finite lifetime, offering the detector a co-stimulate signal to illustrate whether there is damage in the system according to the integrity, confidentiality, or availability of the system resource. 展开更多
关键词 key words intrusion detection creditability false positive rate
下载PDF
Position based key exchange:definitions and implementations
7
作者 ZHANG Junwei DU Fangqiong +1 位作者 MA Jianfeng YANG Chao 《Journal of Communications and Information Networks》 2016年第4期33-43,共11页
Chandran,et al.introduce the direction of position based cryptography at CRYPTO 2009.In position based cryptography,the position of a party is used to be its unique“credential”in order to realize the cryptographic t... Chandran,et al.introduce the direction of position based cryptography at CRYPTO 2009.In position based cryptography,the position of a party is used to be its unique“credential”in order to realize the cryptographic tasks,such as position based encryption,position based signature,position based key exchange and so on.Position based key exchange,as a basic primitive in position based cryptography,can be used to establish a shared key based on the position of the participant.To begin with,this paper presents the notions of the prover-to-verifier mode and the prover-to-prover mode for position based key exchange.In the prover-to-verifier mode,a secret key can be shared between a prover and the verifiers according to the position of the prover.While in the prover-to-prover mode,two provers located at the valid positions can negotiate a shared key with the help of the verifiers and any other party whose position is illegal cannot obtain the shared key.At the same time,this paper formalizes two security definitions against colluding adversaries:position based prover-to-verifier key exchange and position based prover-to-prover key exchange.Then,this paper introduces the bounded retrieval model and the implementations of position based key exchange in two modes based on the bounded retrieval model.Finally,this paper discusses the position based key exchange protocols in two modes from both security and performance perspectives. 展开更多
关键词 position based key exchange position based cryptography prover-to-verifier prover-to-prover bounded retrieval model
原文传递
世界野生动物纪念币
8
作者 张景烘 《野生动物》 1997年第5期40-41,共2页
世界野生动物纪念币张景烘为了促进野生动物的保护,许多国家和地区的银行,都发行了大量含有各种动物图案的流通硬币。从1968年开始还发行了范围广、内容丰富的动物纪念币。动物纪念币包括流通纪念币和纪念币。据笔者不完全统计,... 世界野生动物纪念币张景烘为了促进野生动物的保护,许多国家和地区的银行,都发行了大量含有各种动物图案的流通硬币。从1968年开始还发行了范围广、内容丰富的动物纪念币。动物纪念币包括流通纪念币和纪念币。据笔者不完全统计,截至1995年8月份止,动物纪念币... 展开更多
关键词 PROBLEM RULES PROBLEM representation key structure CHANGING positION CHESS
下载PDF
Context-Aware Adaptive Routing for Opportunistic Network 被引量:1
9
作者 WANG Xiaomao HUANG Chuanhe +3 位作者 ZHOU Hao SHI Jiaoli HE Kai DAN Feng 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2015年第4期299-306,共8页
Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes offers a new mechanism for exploiting the mobile devices that many users already carry. However, forwardin... Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes offers a new mechanism for exploiting the mobile devices that many users already carry. However, forwarding messages in such a network is trapped by many particular challenges, and some protocols have contributed to solve them partly. In this paper, we propose a Context-Aware Adaptive opportunistic Routing algorithm(CAAR). The algorithm firstly predicts the approximate location and orientation of the destination node by using its movement key positions and historical communication records, and then calculates the best neighbor for the next hop by using location and velocity of neighbors. In the unpredictable cases, forwarding messages will be delivered to the more capable forwarding nodes or wait for another transmission while the capable node does not exist in the neighborhood. The proposed algorithm takes the movement pattern into consideration and can adapt different network topologies and movements. The experiment results show that the proposed routing algorithm outperforms the epidemic forwarding(EF) and the prophet forwarding(PF) in packet delivery ratio while ensuring low bandwidth overhead. 展开更多
关键词 routing algorithm context-aware opportunistic network movement key position
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部