期刊文献+
共找到735篇文章
< 1 2 37 >
每页显示 20 50 100
Some Implications of the Gessel Identity
1
作者 Claire Levaillant 《Applied Mathematics》 2023年第9期545-579,共35页
We generalize the congruences of Friedmann-Tamarkine (1909), Lehmer (1938), and Ernvall-Metsänkyla (1991) on the sums of powers of integers weighted by powers of the Fermat quotients to the next Fermat quotient p... We generalize the congruences of Friedmann-Tamarkine (1909), Lehmer (1938), and Ernvall-Metsänkyla (1991) on the sums of powers of integers weighted by powers of the Fermat quotients to the next Fermat quotient power, namely to the third power of the Fermat quotient. Using this result and the Gessel identity (2005) combined with our past work (2021), we are able to relate residues of some truncated convolutions of Bernoulli numbers with some Ernvall-Metsänkyla residues to residues of some full convolutions of the same kind. We also establish some congruences concerning other related weighted sums of powers of integers when these sums are weighted by some analogs of the Teichmüller characters. 展开更多
关键词 Convolutions Involving Bernoulli Numbers Truncated Convolutions Involving Bernoulli Numbers CONGRUENCEs Binomial and Multinomial Convolutions of Divided Bernoulli Numbers Multiple Harmonic sums Generalized Harmonic Numbers Miki identity Gessel identity sums of Powers of Integers Weighted by Powers of the Fermat Quotients Generalization of Kummer’s Congruences Generalizations of Friedmann-Tamarkine Lehmer Ernvall-Metsänkyla’s Congruences p-Adic Numbers Weighted sums of Powers of Integers
下载PDF
Preserving Privacy of User Identity Based on Pseudonym Variable in 5G 被引量:1
2
作者 Mamoon M.Saeed Mohammad Kamrul Hasan +4 位作者 Rosilah Hassan Rania Mokhtar Rashid A.Saeed Elsadig Saeid Manoj Gupta 《Computers, Materials & Continua》 SCIE EI 2022年第3期5551-5568,共18页
The fifth generation(5G)system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate,more capacity,and low latency.However,these ... The fifth generation(5G)system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate,more capacity,and low latency.However,these features and applications have many problems and issues in terms of security,which has become a great challenge in the telecommunication industry.This paper aimed to propose a solution to preserve the user identity privacy in the 5G system that can identify permanent identity by using Variable Mobile Subscriber Identity,which randomly changes and does not use the permanent identity between the user equipment and home network.Through this mechanism,the user identity privacy would be secured and hidden.Moreover,it improves the synchronization between mobile users and home networks.Additionally,its compliance with the Authentication and Key Agreement(AKA)structure was adopted in the previous generations.It can be deployed efficiently in the preceding generations because the current architecture imposes minimal modifications on the network parties without changes in the authentication vector’s message size.Moreover,the addition of any hardware to the AKA carries minor adjustments on the network parties.In this paper,the ProVerif is used to verify the proposed scheme. 展开更多
关键词 5G privacy and security user identity IMsI authentication and key agreement(AKA)
下载PDF
Pseudonym Mutable Based Privacy for 5G User Identity
3
作者 Rashid A.Saeed Mamoon M.Saeed +2 位作者 Rania A.Mokhtar Hesham Alhumyani S.Abdel-Khalek 《Computer Systems Science & Engineering》 SCIE EI 2021年第10期1-14,共14页
Privacy,identity preserving and integrity have become key problems for telecommunication standards.Significant privacy threats are expected in 5G networks considering the large number of devices that will be deployed.... Privacy,identity preserving and integrity have become key problems for telecommunication standards.Significant privacy threats are expected in 5G networks considering the large number of devices that will be deployed.As Internet of Things(IoT)and long-term evolution for machine type(LTE-m)are growing very fast with massive data traffic the risk of privacy attacks will be greatly increase.For all the above issues standards’bodies should ensure users’identity and privacy in order to gain the trust of service providers and industries.Against such threats,5G specifications require a rigid and robust privacy procedure.Many research studies have addressed user privacy in 5G networks.This paper proposes a method to enhance user identity privacy in 5G systems through a scheme to protect the international mobile subscriber identity(IMSI)using a mutable mobile subscriber identity(MMSI)that changes randomly and avoids the exchange of IMSIs.It maintains authentication and key agreement(AKA)structure compatibility with previous mobile generations and improves user equipment(UE)synchronization with home networks.The proposed algorithm adds no computation overhead to UE or the network except a small amount in the home subscriber server(HSS).The proposed pseudonym mutable uses the XOR function to send the MMSI from the HSS to the UE which is reducing the encryption overhead significantly.The proposed solution was verified by ProVerif. 展开更多
关键词 5G MMsI IMsI AKA PRIVACY user identity
下载PDF
Cultural Identity and Translator's Style: Case Study of Translation of Tea Relevant Acts in Hong Lou Meng
4
作者 王冰 姜欣 《海外英语》 2011年第2X期148-149,共2页
From the methodological perspective, the thesis summarized leisure tea act, judging-time tea act to map translator's style. Through investigations on all these, the thesis succeeded in confirming the translator... From the methodological perspective, the thesis summarized leisure tea act, judging-time tea act to map translator's style. Through investigations on all these, the thesis succeeded in confirming the translator's styles and pinpointing cultural identity as essential factors influencing their styles. Hopefully, this could help to provide a new angle of view to make research on translator's style. Moreover, the thesis wishes that with analysis of tea culture in Hong Lou Meng the translation of tea relevant acts receive greater priority in the Chinese Classics Translation. 展开更多
关键词 cultural identity translator’s style Hong Lou MENG version
下载PDF
The quadratic-form identity for constructing Hamiltonian structures of the Guo hierarchy 被引量:3
5
作者 董焕河 张宁 《Chinese Physics B》 SCIE EI CAS CSCD 2006年第9期1919-1926,共8页
The trace identity is extended to the quadratic-form identity. The Hamiltonian structures of the multi-component Guo hierarchy, integrable coupling of Guo hierarchy and (2+l)-dimensional Guo hierarchy are obtained ... The trace identity is extended to the quadratic-form identity. The Hamiltonian structures of the multi-component Guo hierarchy, integrable coupling of Guo hierarchy and (2+l)-dimensional Guo hierarchy are obtained by the quadraticform identity. The method can be used to produce the Hamiltonian structures of the other integrable couplings or multi-component hierarchies. 展开更多
关键词 Hamiltonian structure Guo's hierarchy quadratic-form identity
下载PDF
Identity Issue and Mysterious Images in the Bonesetter's Daughter
6
作者 张砚 《海外英语》 2013年第11X期226-227,共2页
This paper is going to do a research on the book The Bonesetter's Daughter and will make an analysis of mysterious images appear in the novel which can be considered as symbols that reflect the culture of orient. ... This paper is going to do a research on the book The Bonesetter's Daughter and will make an analysis of mysterious images appear in the novel which can be considered as symbols that reflect the culture of orient. And it also looks into the identity issue of Chinese American women from postcolonial perspective. 展开更多
关键词 identity IssUE Amy TAN IMAGE Bonesetter ’s Daughte
下载PDF
GIS用户中台的设计与实现
7
作者 倪文礼 吴永军 王燕午 《测绘标准化》 2024年第1期74-78,共5页
为了解决每一个与地理信息相关的应用系统,均需建立一套用户管理、部门管理、地图服务管理、权限认证机制的问题,本文借鉴“大中台、小前台”的理念,基于微服务架构设计,开发了一个可自由伸缩的地理信息系统(GIS)用户中台。该中台采用... 为了解决每一个与地理信息相关的应用系统,均需建立一套用户管理、部门管理、地图服务管理、权限认证机制的问题,本文借鉴“大中台、小前台”的理念,基于微服务架构设计,开发了一个可自由伸缩的地理信息系统(GIS)用户中台。该中台采用服务生产者、消费者的模式构建,基于SpringBoot2.0框架整合Dubbo,实现地理信息应用系统的统一权限管理和应用授权。用户中台具有用户信息统一管理系统、角色权限统一管理系统、统一认证系统、统一授权系统、日志管理系统和监控分析系统等功能。 展开更多
关键词 地理信息系统 用户中台 地图服务管理 身份认证 应用授权 微服务
下载PDF
基于IDaaS的云计算多域用户身份一致性供应管理
8
作者 王亚涛 郭银章 《太原科技大学学报》 2024年第2期143-148,共6页
在云计算环境下,存在着大量的跨域访问控制问题。同时在多域云计算环境下,如何实现用户身份信息的一致性管理,实现跨域身份融合,已经成为云安全领域的重要研究内容。针对云计算多域环境下用户身份信息的一致性供应管理问题,给出了一种... 在云计算环境下,存在着大量的跨域访问控制问题。同时在多域云计算环境下,如何实现用户身份信息的一致性管理,实现跨域身份融合,已经成为云安全领域的重要研究内容。针对云计算多域环境下用户身份信息的一致性供应管理问题,给出了一种基于身份服务管理IDaaS的云用户身份一致性供应管理的方法。首先对SCIM协议和OAuth身份授权协议进行分析,通过将两个协议结合,实现企业域与IDaaS之间的身份信息同步;通过创建身份转换规则实现第三方租户与IDaaS之间的身份信息同步,进而实现用户身份信息的一致性供应。同时基于LDAP协议实现了跨域环境下多IDaaS用户身份信息一致性同步。 展开更多
关键词 云计算 跨域环境 IDaas 用户身份信息 一致性同步
下载PDF
IAM Excellence: Exploring Saviynt’s Role in Modern Information Technology
9
作者 Sampath Talluri 《Journal of Information Security》 2024年第1期40-52,共13页
Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution... Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path. 展开更多
关键词 Information Technology (IT) identity and Access Management (IAM) saviynt user identities Access Privileges Authentication Processes Risk Management
下载PDF
Saviynt Meets GCP: A Deep Dive into Integrated IAM for Modern Cloud Security
10
作者 Sampath Talluri 《Journal of Information Security》 2024年第1期1-14,共14页
The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machi... The Google Cloud Platform (GCP) is a popular choice for companies seeking a comprehensive cloud computing solution because it provides everything from essential computing resources to powerful data analytics and machine learning capabilities. Saviynt is a cloud-based Identity and Access Management (IAM) system that integrates with Google Cloud Platform (GCP) and other services for additional functionality. However, other problems are associated with the transition, such as the requirement to correctly integrate IAM Saviynt into current IT infrastructures and provide comprehensive training to users on the new system. The paper will give a detailed review of the advantages, disadvantages, and best practices related to this transition. 展开更多
关键词 Google Cloud Platform (GCP) identity and Access Management (IAM) saviynt user identities Access Privileges Authentication Processes
下载PDF
The Three Principles of Institutional Safeguards for Women's Participation in Legislation in China
11
作者 刘睿 JIANG Yu(Translated) 《The Journal of Human Rights》 2024年第2期325-346,共22页
The participation of women in legislation is an important aspect and means of safeguarding women’s rights.Feminist theory,based on criticism of both the“citizenship identity theory as rights”and the“citizenship id... The participation of women in legislation is an important aspect and means of safeguarding women’s rights.Feminist theory,based on criticism of both the“citizenship identity theory as rights”and the“citizenship identity theory as responsibilities,”proposes the“citizenship identity theory as subjectivity.”Observing the current practice of women’s participation in legislation in China,two institutional safeguard principles can be summarized:the“minimum proportion”and the“influence evaluation.”However,each of these principles has its inherent limitations.Therefore,it is necessary to supplement them with the principle of“subjective participation”in a reflective manner.This principle requires women to participate substantively in the legislative process as subjects,express women’s needs and demands,input women’s perspectives and experiences,and reconstruct the distribution of rights and responsibilities in the existing legislation.The three principles complement each other and work together to comprehensively constitute the institutional structure of women’s participation in legislation,thereby promoting the reproduction of corresponding action structures. 展开更多
关键词 citizenship identity theory FEMINIsM women’s rights participation in legislation sUBJECTIVITY
下载PDF
Translator's Identity in the English Translation of Wenxin Diaolong
12
作者 Su Lingyun Hu Zuoyou 《学术界》 CSSCI 北大核心 2017年第2期282-290,共9页
In the article Owen’s and Yang Guobin’s English versions of Wenxin Diaolong are compared from the perspective of a translator’s identity.Owen is a translator of A-merican origin while Yang Guobin is of Chinese orig... In the article Owen’s and Yang Guobin’s English versions of Wenxin Diaolong are compared from the perspective of a translator’s identity.Owen is a translator of A-merican origin while Yang Guobin is of Chinese origin.Their multiple identity as a reader,author,creator and cultural communicator differs much from each other,which produces important influences upon the selection of the strategy of translation.Owen prefers foreignizing translation while Yang favors domesticating translation.The English translation of Wenxin Diaolong provides much value for the research on the translation of Chinese classic literature. 展开更多
关键词 英语翻译 传播者 创造者 起源 中国 读者 归化
下载PDF
The Enclosed Personal Space and Female Identity Construction in A. S. Byatt's Possession
13
作者 叶柳影 《海外英语》 2018年第18期206-209,共4页
From the perspective of feminism, by analyzing single intellectual women's living states in enclosed personal spaces, andcomparing their different spatial changes triggered by external intrusions, this essay inten... From the perspective of feminism, by analyzing single intellectual women's living states in enclosed personal spaces, andcomparing their different spatial changes triggered by external intrusions, this essay intends to explore Byatt's ambivalent attitudestowards the feminists' pursuit for a room of one's own, and point out the significance of harmonious co-existence between men andwomen to female identity construction. 展开更多
关键词 A. s. BYATT POssEssION space FEMALE identity HARMONIOUs CO-EXIsTENCE
下载PDF
Negative Evaluation and Author’s Identity Construction in Chinese and English Academic Book Reviews
14
作者 钱俊峰 《海外英语》 2019年第10期275-278,共4页
Evaluation,especially negative evaluation,is an important element in academic book reviews.Unfortunately,previous studies on evaluation strategies in Chinese and English book reviews are still limited in number.Recent... Evaluation,especially negative evaluation,is an important element in academic book reviews.Unfortunately,previous studies on evaluation strategies in Chinese and English book reviews are still limited in number.Recently,identity construction has been a hot research issue in various fields of social science.However,few studies have ever been conducted on how book reviewers construct various identities with the use of evaluation strategies.As such,this thesis tries to investigate how the negative evaluation,the most direct face-threatening evaluation,are linked closely to author’ s identity construction in Chinese and English book reviews,how the Chinese and English book reviewers make salient their appropriate identities with the skillful use of discourse strategies so as to avoid possible face-threatening.The present study collects fifteen Chinese and fifteen English academic book reviews as research data.An analysis of the data indicates that while there are similarities,there are also distinctive differences in the use of negative evaluation strategies and author’ s identity construction in Chinese and English book reviews.Specifically,with the use of negative evaluation,four important identities are constructed,namely,the author’ s identities as an authoritative writer,a polite and friendly evaluator,a responsible opinion holder and a kind academic ally. 展开更多
关键词 BOOK REVIEWs NEGATIVE evaluation strategies author’s identity identity construction
下载PDF
Constructing Writer Identity in Developing Second Language Writer's Academic Writing
15
作者 杨蕴文 《海外英语》 2014年第9X期20-22,28,共4页
Writer identity in academic writing has long been ignored by developing L2 writers.Moreover,research has much focused on the reader in shaping writing,and treated the role of the writer as unproblematic.In this essay,... Writer identity in academic writing has long been ignored by developing L2 writers.Moreover,research has much focused on the reader in shaping writing,and treated the role of the writer as unproblematic.In this essay,the construction of writer identity in developing writers’academic writing practice will be explored through a review of some relevant literature research and gain insights for the development of writer apprentices and writing instruction. 展开更多
关键词 writer’s identity ACADEMIC writing CONsTRUCTING se
下载PDF
Efficient User Identity Linkage Based on Aligned Multimodal Features and Temporal Correlation
16
作者 Jiaqi Gao Kangfeng Zheng +2 位作者 Xiujuan Wang Chunhua Wu Bin Wu 《Computers, Materials & Continua》 SCIE EI 2024年第10期251-270,共20页
User identity linkage(UIL)refers to identifying user accounts belonging to the same identity across different social media platforms.Most of the current research is based on text analysis,which fails to fully explore ... User identity linkage(UIL)refers to identifying user accounts belonging to the same identity across different social media platforms.Most of the current research is based on text analysis,which fails to fully explore the rich image resources generated by users,and the existing attempts touch on the multimodal domain,but still face the challenge of semantic differences between text and images.Given this,we investigate the UIL task across different social media platforms based on multimodal user-generated contents(UGCs).We innovatively introduce the efficient user identity linkage via aligned multi-modal features and temporal correlation(EUIL)approach.The method first generates captions for user-posted images with the BLIP model,alleviating the problem of missing textual information.Subsequently,we extract aligned text and image features with the CLIP model,which closely aligns the two modalities and significantly reduces the semantic gap.Accordingly,we construct a set of adapter modules to integrate the multimodal features.Furthermore,we design a temporal weight assignment mechanism to incorporate the temporal dimension of user behavior.We evaluate the proposed scheme on the real-world social dataset TWIN,and the results show that our method reaches 86.39%accuracy,which demonstrates the excellence in handling multimodal data,and provides strong algorithmic support for UIL. 展开更多
关键词 user identity linkage multimodal models attention mechanism temporal correlation
下载PDF
基于S-O-R理论的新型公共阅读空间用户流失行为分析——来自大众点评网用户评论 被引量:6
17
作者 戴艳清 高亮 孙英姿 《图书馆理论与实践》 2023年第4期55-62,71,共9页
文章以大众点评网站中新型公共阅读空间的评论数据为对象,以S-O-R模型为理论基础,利用Python爬取其“中评”与“差评”的评论数据,运用内容分析法归纳得出新型公共阅读空间用户流失行为的主要因素,并构建新型公共阅读空间用户流失行为... 文章以大众点评网站中新型公共阅读空间的评论数据为对象,以S-O-R模型为理论基础,利用Python爬取其“中评”与“差评”的评论数据,运用内容分析法归纳得出新型公共阅读空间用户流失行为的主要因素,并构建新型公共阅读空间用户流失行为模型。在此基础上,提出提高新型公共阅读空间服务效能的相关建议,为提高新型阅读空间的服务质量,降低用户流失率提供参考。 展开更多
关键词 新型公共阅读空间 用户流失行为 公共文化服务 s-O-R理论
下载PDF
ID-Based User Authentication Scheme for Cloud Computing 被引量:1
18
作者 Ping-Liang Chen Jen-Ho Yang Ching-I Lin 《Journal of Electronic Science and Technology》 CAS 2013年第2期221-224,共4页
In cloud computing environments, user authentication is an important security mechanism because it provides the fundamentals of authentication, authorization, and accounting (AAA). In 2009, Wang et al. proposed an i... In cloud computing environments, user authentication is an important security mechanism because it provides the fundamentals of authentication, authorization, and accounting (AAA). In 2009, Wang et al. proposed an identity-based (ID-based) authentication scheme to deal with the user login problem for cloud computing. However, Wang et aL's scheme is insecure against message alteration and impersonation attacks. Besides, their scheme has large computation costs for cloud users. Therefore, we propose a novel ID-based user authentication scheme to solve the above mentioned problems. The proposed scheme provides anonymity and security for the user who accesses different cloud servers. Compared with the related schemes, the proposed scheme has less computation cost so it is very efficient for cloud computing in practice. 展开更多
关键词 ANONYMITY cloud computing identity-based scheme user authentication user identity.
下载PDF
Customization Product Design Based on User's Emotion and Needs 被引量:3
19
作者 金纯 张春林 刘文枝 《Defence Technology(防务技术)》 SCIE EI CAS 2005年第2期245-249,共5页
The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform... The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform the user’s language needs into the product features in real-time. A rifle was taken as a research instance and soldiers were chosen as evaluation customers. The theory of fuzzy set and semantic difference are adopted to evaluate the relationship between user’s needs and product features as well as their alternatives. FAHP (fuzzy analytic hierarchy process) is utilized to judge the user’s satisfactory forms. This method can also be applied to other product form designs. 展开更多
关键词 user’s needs product form CUsTOMIZATION fuzzy number
下载PDF
Use of methotrexate in inflammatory bowel disease in 2014: A User's Guide 被引量:4
20
作者 Arun Swaminath Raja Taunk Garrett Lawlor 《World Journal of Gastrointestinal Pharmacology and Therapeutics》 CAS 2014年第3期113-121,共9页
Methotrexate has been used an immunomodulator in many autoimmune diseases,including inflammatory bowel disease. However,many physicians are unfamiliar or uncomfortable with its use in the management of inflammatory bo... Methotrexate has been used an immunomodulator in many autoimmune diseases,including inflammatory bowel disease. However,many physicians are unfamiliar or uncomfortable with its use in the management of inflammatory bowel disease. We summarize the data for use of methotrexate in common clinical scenarios:(1) steroid dependant Crohn's disease(CD);(2) maintenance of remission in steroid free CD;(3) azathioprine failures in CD;(4) in combination therapy with Anti-TNF agents in CD;(5) decreasing antibody formation to Anti-TNF therapy in CD;(6) management of fistulizing disease in CD; and(7) as well as induction and maintenance of remission in ulcerative colitis. An easy to use algorithm is provided for the busy clinician to access and safely prescribe methotrexate for their inflammatory bowel disease patients. 展开更多
关键词 METHOTREXATE Inflammatory BOWEL DIsEAsE Crohn’s DIsEAsE ULCERATIVE colitis IMMUNOMODULATORs METHOTREXATE user’s GUIDE
下载PDF
上一页 1 2 37 下一页 到第
使用帮助 返回顶部