期刊文献+
共找到1,046篇文章
< 1 2 53 >
每页显示 20 50 100
Bringing the China Association of Insurance Industry Into Play, Perfecting the Control System of China's Insurance Industry
1
《China's Foreign Trade》 2001年第9期23-23,共1页
关键词 Bringing the China Association of Insurance Industry Into Play perfecting the Control system of China’s Insurance Industry
在线阅读 下载PDF
Suggestions on Perfecting Index Systems of Building a Well-Off Society in an All-Round Way
2
作者 lian LV Yi Li 《Sociology Study》 2014年第6期481-487,共7页
The index systems are not only the tools to evaluate existing practice results, but also the guides to the future development direction and development way of practical activities. "Well-off society" is a relatively... The index systems are not only the tools to evaluate existing practice results, but also the guides to the future development direction and development way of practical activities. "Well-off society" is a relatively vague concept, and the contents of it ceaselessly change with the advancement of society and the development of productivity. Now the construction of a well-off society in an all-round way enters a critical stage, so the original evaluation standards must change with gradual advancement of the construction goal of a well-off society. So it is very necessary for us to build a comprehensive evaluation index system and make it better and better to provide effective statistical consultation and statistical supervision for constructing a well-off society in an all-round way. This paper attempts to analyze the current evaluation index system, then puts forward the general thinking and flame work of the index system of building a well-off society in an all-round way. 展开更多
关键词 Comprehensive construction of a well-off society index systems PERFECTION
在线阅读 下载PDF
Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy
3
作者 Yu-Ang Wang Zidong Wang +2 位作者 Lei Zou Bo Shen Hongli Dong 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期114-125,共12页
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu... In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks. 展开更多
关键词 Attack detection cyber-physical systems(CPSs) perfect stealthy attacks watermark-based strategy
在线阅读 下载PDF
Perfect Transfer of Many-Particle Quantum State via High-Dimensional Systems with Spectrum-Matched Symmetry 被引量:3
4
作者 LI Ying SONG Zhi SUN Chang-Pu 《Communications in Theoretical Physics》 SCIE CAS CSCD 2007年第3X期445-448,共4页
The quantum state transmission through the medium of high-dimensional many-particle system (boson or spinless fermion) is generally studied with a symmetry analysis. We discover that, if the spectrum of a Hamiltonia... The quantum state transmission through the medium of high-dimensional many-particle system (boson or spinless fermion) is generally studied with a symmetry analysis. We discover that, if the spectrum of a Hamiltonian matches the symmetry of a fermion or boson system in a certain fashion, a perfect quantum state transfer can be implemented without any operation on the medium with pre-engineered nearest neighbor (NN). We also study a simple but realistic near half-filled tight-bindlng fermion system wlth uniform NN hopping integral. We show that an arbitrary many-particle state near the fermi surface can be perfectly transferred to its translational counterpart. 展开更多
关键词 high-dimensional many-particle system perfect quantum state transfer
在线阅读 下载PDF
Secure and Anonymous Three-Factor Authentication Scheme for Remote Healthcare Systems 被引量:1
5
作者 Munayfah Alanazi Shadi Nashwan 《Computer Systems Science & Engineering》 SCIE EI 2022年第8期703-725,共23页
Wireless medical sensor networks(WMSNs)play a significant role in increasing the availability of remote healthcare systems.The vital and physiological data of the patient can be collected using the WMSN via sensor nod... Wireless medical sensor networks(WMSNs)play a significant role in increasing the availability of remote healthcare systems.The vital and physiological data of the patient can be collected using the WMSN via sensor nodes that are placed on his/her body and then transmitted remotely to a healthcare professional for proper diagnosis.The protection of the patient’s privacy and their data from unauthorized access is a major concern in such systems.Therefore,an authentication scheme with a high level of security is one of the most effective mechanisms by which to address these security concerns.Many authentication schemes for remote patient monitoring have been proposed recently.However,the majority of these schemes are extremely vulnerable to attacks and are unsuitable for practical use.This paper proposes a secure three-factor authentication scheme for a patient-monitoring healthcare system that operates remotely using a WMSN.The proposed authentication scheme is formally verified using the Burrows,Abadi and Needham’s(BAN)logic model and an automatic cryptographic protocol verifier(ProVerif)tool.We show that our authentication scheme can prevent relevant types of security breaches in a practical context according to the discussed possible attack scenarios.Comparisons of the security and performance are carried out with recently proposed authentication schemes.The results of the analysis show that the proposed authentication scheme is secure and practical for use,with reasonable storage space,computation,and communication efficiency. 展开更多
关键词 Mutual authentication biometric feature perfect forward secrecy user anonymity proVerif tool BAN logic model
暂未订购
CALL FOR PAPERS Special Section on Cloud Control Systems
6
《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第1期F0002-F0002,共1页
With the emergence of Internet of Things,modern control systems have to deal with the big data from the ubiquitous information sensing mobile devices,cameras,microphones,radio-frequency identification devices,wireless... With the emergence of Internet of Things,modern control systems have to deal with the big data from the ubiquitous information sensing mobile devices,cameras,microphones,radio-frequency identification devices,wireless sensor networks,etc.,which is often beyond the capacity of traditional control technologies.To deal with this issue,the rapidly developing cloud computing may provide a perfect platform for big data storage and processing,controller design,and performance optimization.Thereby,with the extension and application of the basic theory and method of cloud computing defined by software in the field of automatic control,cloud control systems have recently attracted much attention from both researchers and engineers. 展开更多
关键词 COMPUTING NETWORKS PERFECT
在线阅读 下载PDF
Special Section on Cloud Control Systems
7
《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2021年第5期F0003-F0003,共1页
With the emergence of Internet of Things,modern control systems have to deal with the big data from the ubiquitous information sensing mobile devices,cameras,microphones,radio-frequency identification devices,wireless... With the emergence of Internet of Things,modern control systems have to deal with the big data from the ubiquitous information sensing mobile devices,cameras,microphones,radio-frequency identification devices,wireless sensor networks,etc.,which is often beyond the capacity of traditional control technologies.To deal with this issue,the rapidly developing cloud computing may provide a perfect platform for big data storage and processing,controller design,and performance optimization. 展开更多
关键词 optimization. NETWORKS PERFECT
在线阅读 下载PDF
Nonlinear coherent perfect photon absorber in asymmetrical atom–nanowires coupling system
8
作者 Xiuwen Xia Xinqin Zhang +2 位作者 Jingping Xu Mutian Cheng Yaping Yang 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第11期494-497,共4页
Coherent perfect absorption provides a method of light-controlling-light and has practical applications in optical communications. Recently, a cavity-based nonlinear perfect photon absorption extends the coherent perf... Coherent perfect absorption provides a method of light-controlling-light and has practical applications in optical communications. Recently, a cavity-based nonlinear perfect photon absorption extends the coherent perfect absorber(CPA)beyond the linear regime. As nanowire-based system is a more competitive candidate for full-optical device, we introduce a nonlinear CPA in the single two-level atom–nanowires coupling system in this work. Nonlinear input–output relations are derived analytically, and three contributions of atomic saturation nonlinearity are explicit. The consociation of optical nonlinearity and destructive interference makes it feasible to fabricate a nonlinear monoatomic CPA. Our results also indicate that a nonlinear system may work linearly even when the incoming lights are not weak any more. Our findings show promising applications in full-optical devices. 展开更多
关键词 single-atom system atom-nanowires coupling nonlinear coherent perfect absorber
原文传递
An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN
9
作者 Shadi Nashwan 《Computers, Materials & Continua》 SCIE EI 2021年第7期607-642,共36页
The healthcare internet of things(IoT)system has dramatically reshaped this important industry sector.This system employs the latest technology of IoT and wireless medical sensor networks to support the reliable conne... The healthcare internet of things(IoT)system has dramatically reshaped this important industry sector.This system employs the latest technology of IoT and wireless medical sensor networks to support the reliable connection of patients and healthcare providers.The goal is the remote monitoring of a patient’s physiological data by physicians.Moreover,this system can reduce the number and expenses of healthcare centers,make up for the shortage of healthcare centers in remote areas,enable consultation with expert physicians around the world,and increase the health awareness of communities.The major challenges that affect the rapid deployment and widespread acceptance of such a system are the weaknesses in the authentication process,which should maintain the privacy of patients,and the integrity of remote medical instructions.Current research results indicate the need of a flexible authentication scheme.This study proposes a scheme with enhanced security for healthcare IoT systems,called an end-to-end authentication scheme for healthcare IoT systems,that is,an E2EA.The proposed scheme supports security services such as a strong and flexible authentication process,simultaneous anonymity of the patient and physician,and perfect forward secrecy services.A security analysis based on formal and informal methods demonstrates that the proposed scheme can resist numerous security-related attacks.A comparison with related authentication schemes shows that the proposed scheme is efficient in terms of communication,computation,and storage,and therefore cannot only offer attractive security services but can reasonably be applied to healthcare IoT systems. 展开更多
关键词 Healthcare IoT systems wireless medical sensor networks mutual authentication service anonymity service perfect forward secrecy service COVID-19
在线阅读 下载PDF
A NEW SYNCHRONIZATION SCHEME USING PERFECT PUNCTURED BINARY SEQUENCE PAIRS IN DS-UWB SYSTEM
10
作者 Liang Zhaohui Jiang Ting Zhou Zheng 《Journal of Electronics(China)》 2006年第2期231-235,共5页
Ultra WideBand (UWB) radio is a new wireless technology that transmits extremely short duration radio impulses. In this paper, a new synchronization scheme is proposed in Direct Sequence (DS) UWB system using Perfect ... Ultra WideBand (UWB) radio is a new wireless technology that transmits extremely short duration radio impulses. In this paper, a new synchronization scheme is proposed in Direct Sequence (DS) UWB system using Perfect Punctured Binary Sequence Pairs (PPBSP) as the preamble. It can acquire both Pseudo-Noise (PN) sequence and frame synchronization at the same time. The properties and the combinatorial admis sibility conditions of PPBSP are presented. The simulation results show that PPBSP is good for synchronization by their good cross-correlation properties both under Additive White Gaussian Noise (AWGN) channel and modified Saleh-Valenzuela channel. 展开更多
关键词 Ultra WideBand (UWB) Information theory Perfect sequences SYNCHRONIZATION
在线阅读 下载PDF
Cross-layer design of combining AMC with HARQ in cooperative relay system with perfect and imperfect CSI
11
作者 唐伦 张荣荣 陈前斌 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2012年第4期118-128,共11页
A cross-layer design which combines adaptive modulation and coding (AMC) at the physical layer with a hybrid automatic repeat request (HARQ) protocol at the data link layer (LL) is presented, in cooperative relay syst... A cross-layer design which combines adaptive modulation and coding (AMC) at the physical layer with a hybrid automatic repeat request (HARQ) protocol at the data link layer (LL) is presented, in cooperative relay system over Nakagami-m fading channels with perfect and imperfect channel state information (CSI). In order to maximize spectral efficiency (SE) under delay and packet error rate (PER) performance constraints, a state transition model and an optimization framework with perfect CSI are presented. Then the framework is extended to cooperative relay system with imperfect CSI. The numerical results show that the scheme can achieve maximum SE while satisfying transmitting delay requirements. Compared with the imperfect CSI, the average PER with perfect CSI is much lower and the spectral efficiency is much higher. 展开更多
关键词 COOPERATIVE relay system cross-layer design and optimization adaptive modulation and coding (AMC) hybrid automatic REPEAT request (HARQ) PERFECT channel state information(CSI) imperfect CSI
在线阅读 下载PDF
Calculation of 3D Sensitivity Matrix for Electromagnetic Tomography System Using Boundary Elements and the Perturbative Approach
12
作者 何敏 赵倩 尹武良 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第3期302-307,共6页
Electromagnetic tomography(EMT) is a non-invasive imaging technique capable of mapping the conductivity and permeability of an object. In EMT, eddy currents are induced in the object by the activation coils,and the re... Electromagnetic tomography(EMT) is a non-invasive imaging technique capable of mapping the conductivity and permeability of an object. In EMT, eddy currents are induced in the object by the activation coils,and the receiving coils can measure the EMT voltages. When the activation frequency is significantly large, we can treat the metallic targets as electrically perfect conductors(EPCs). In this situation, a thin skin approximation is reasonable and this type of scattering problem can be effectively treated by the boundary element method(BEM)formulated through integration equations. In this study, we compute three-dimensional(3D) sensitivity matrix between the sensors due to an EPC perturbation. Efficiency improvement is achieved through the utility of scalar magnetic potential. Two EPC objects, one sphere and one cube shaped, are simulated. The results agree well with the H dot H formula. Overall, we conclude that BEM can be used to calculate the 3D sensitivity matrix of an EMT system efficiently. This method is a general one for any shaped objects while the H dot H solution is only capable of producing the response for a small ball. 展开更多
关键词 electromagnetic tomography (EMT) electrically perfect conductor (EPC) boundary element method (BEh4) sensitivity map
原文传递
Application of Perfect Difference Codes in Wireless Infrared Systems
13
作者 Fahim A. Umrani Salah Obayya 《International Journal of Communications, Network and System Sciences》 2010年第8期674-678,共5页
In this paper, we apply the perfect difference codes in wireless infrared systems considering the diffuse indoor optical wireless configuration. The bit error rate performance of the uplink wireless infrared system us... In this paper, we apply the perfect difference codes in wireless infrared systems considering the diffuse indoor optical wireless configuration. The bit error rate performance of the uplink wireless infrared system using Gaussian approximations is analyzed taking into account the effects of multiple-access interference, the ambient light noise, and the dark current. The proposed system also uses the compact encoder and decoder architecture resulting in a low cost system. 展开更多
关键词 OCDMA COMPACT ENCODER/DECODER PERFECT DIFFERENCE CODES
在线阅读 下载PDF
Perfecting the Service Network for Enterprises with Joint Efforts
14
作者 Audrey Guo 《China's Foreign Trade》 2023年第1期22-25,共4页
"The year of 2022 marked the70th anniversary of the founding of the China Council for the Promotion of International Trade(CCPIT),and it was also a milestone in the development history of trade promotion.Under th... "The year of 2022 marked the70th anniversary of the founding of the China Council for the Promotion of International Trade(CCPIT),and it was also a milestone in the development history of trade promotion.Under the strong leadership of the Central Committee of the Communist Party of China(CPC)with Comrade Xi Jinping at its core,the national trade promotion system faced up to difficulties,forged ahead. 展开更多
关键词 PROMOTION PERFECT FOUNDING
在线阅读 下载PDF
Continuing to Perfect the Quality System
15
作者 Xin Wen 《China's Foreign Trade》 1997年第10期33-34,共2页
Afirst-class forwarding agent company approved by the Ministry of Foreign Trade and Economic Cooperation,the Ministry of Communication, the General Customs and the Civil Aviation Administration of China, the Shanghai ... Afirst-class forwarding agent company approved by the Ministry of Foreign Trade and Economic Cooperation,the Ministry of Communication, the General Customs and the Civil Aviation Administration of China, the Shanghai Jinhai Jieya International Forwarding Co. Ltd comprises the Shanghai Haigang Industrial General Company,Shanghai Jin Jiang Associated Corporation (Group) and Hongkong Jieya Air Freight Forwarding Corporation, in the form of a joint venture. 展开更多
关键词 Continuing to Perfect the Quality system PROJECT THAN
在线阅读 下载PDF
Analysis on the Reform Path of the Hierarchical Treatment System for Juvenile Delinquents in China
16
作者 Lv Hongjiao 《Contemporary Social Sciences》 2021年第6期53-62,共10页
Although it has stipulated a treatment system for juvenile delinquents in the existing law of China,the related provisions are scattered throughout different legal norms and need to be integrated and perfected.The exi... Although it has stipulated a treatment system for juvenile delinquents in the existing law of China,the related provisions are scattered throughout different legal norms and need to be integrated and perfected.The existing treatment of juvenile delinquents,including administrative treatment and judicial treatment,mainly faces the following problems:(a)The treatment measures are too rough and simple to effectively combine punishment with leniency effectively;(b)The hierarchical treatment measures are not perfect enough procedurally;(c)The non-criminal treatment measures do not produce the desired effect.Based on a good understanding of the basic connotations of the hierarchical treatment system for juvenile delinquents,it is necessary to take the following steps:(a)Treat the juvenile delinquents in appropriate ways according to the subject,specific content,and severity of juvenile delinquencies;(b)Take highly-targeted and flexible treatment measures at different stages of criminal proceedings,namely,take criminal coercive measures against juvenile delinquents in a prudent manner and impose criminal punishments against them in a relatively lenient manner,to better help them return to society. 展开更多
关键词 juvenile delinquent hierarchical treatment PROBLEM PERFECTION
在线阅读 下载PDF
Security Analysis Model, System Architecture and Relational Model of Enterprise Cloud Services
17
作者 Dang-Dang Niu Lei Liu +2 位作者 Xin Zhang Shuai Lu Zhuang Li 《International Journal of Automation and computing》 EI CSCD 2016年第6期574-584,共11页
Cloud computing is one of the fastest growing and popular computer technologies, and there are more and more enterprise services based on the cloud computing. In order to save costs, more and more enterprises and thei... Cloud computing is one of the fastest growing and popular computer technologies, and there are more and more enterprise services based on the cloud computing. In order to save costs, more and more enterprises and their employees have hired the enterprise cloud services, and put much important information in the cloud gradually. Cloud service systems have become the main targets of malicious attacks. However, the cloud computing technologies are still not perfect, and the management and maintenance of enterprise cloud services are more complex compared to traditional network services of cloud computing. So, enterprise cloud services are more likely to encounter some security problems, and the influenced scale of these security problems is broad. But there are few researches on the security of enterprise cloud services. In this paper, we analyze the software as a service(Saa S) enterprise cloud services and introduce the research status of security problems in cloud computing environment. Combining with the analysis of the characteristics and application architecture of Saa S enterprise cloud services, we propose the security problems analysis model, the analysis system architecture and the relational model. Our researches can support further research of the automatic generation of solutions and guide the deployment of security policies of Saa S enterprise cloud services. 展开更多
关键词 cloud deployment perfect maintenance likely users bases encounter relational costs
原文传递
Mexico:Promoting the Winter Olympics and Perfecting‘Happy Chinese New Year’
18
作者 Sun Zhengfang 《China & The World Cultural Exchange》 2022年第2期43-44,共2页
During the Spring Festival in 2022,China Cultural Center in Mexico focused on the themes of Winter Olympics with Ice and Snow,the 50th anniversary of the establishment of diplomatic relations between China and Mexico,... During the Spring Festival in 2022,China Cultural Center in Mexico focused on the themes of Winter Olympics with Ice and Snow,the 50th anniversary of the establishment of diplomatic relations between China and Mexico,friendship between the two countries,etc.,and cooperated with 20-plus Chinese and Mexican institutions to hold 11 categories of 180-plus Spring Festival celebration activities,such as Year of the Tiger Costume Contest,Happy Spring Festival Quiz Show,the 8th Children's Painting Competition:China in My Imagination in the theme of Winter Olympics and ice&snow sports. 展开更多
关键词 PERFECT Mexico WINTER
在线阅读 下载PDF
ISO publishes revised standard for ground support equipment and relevant systems
19
《China Standardization》 2023年第2期17-17,共1页
Aerospace is always a pursuit of humans,not only out of desire for knowledge,but also out of persevering ambition.Ground support equipment(GSE)and relevant systems are of vital significance,which is fundamental to spa... Aerospace is always a pursuit of humans,not only out of desire for knowledge,but also out of persevering ambition.Ground support equipment(GSE)and relevant systems are of vital significance,which is fundamental to space system programs and projects.Though there are standards for ESG,the standards for ESG inspection and maintenance are necessary to perfect the whole process. 展开更多
关键词 revised PURSUIT PERFECT
原文传递
Coherent Perfect Absorption in Higher Order Systems
20
作者 Mengjun Fan Linxue Fu +1 位作者 Yaqiong Ding Xinming Fu 《Journal of Applied Mathematics and Physics》 2023年第3期737-745,共9页
We investigate the phenomenon of coherent perfect absorption in a high-order system with three passive resonators coupled to a super-surface to form this three-state coherent perfect absorber. The effective parity tim... We investigate the phenomenon of coherent perfect absorption in a high-order system with three passive resonators coupled to a super-surface to form this three-state coherent perfect absorber. The effective parity time (PT) symmetry in the passive system has received much attention, and in this open three-state PT symmetric system, the incident wave is used as the effective gain instead of balancing the material gain and loss. We analyze the variation of coherent perfect absorption of this system with the coupling coefficient of the system by simulation. 展开更多
关键词 Exceptional Point PT Symmetry Non-Hermitian system Coherent Perfect Absorption
在线阅读 下载PDF
上一页 1 2 53 下一页 到第
使用帮助 返回顶部