期刊文献+
共找到314篇文章
< 1 2 16 >
每页显示 20 50 100
The Meanings of Addresses and Their Proper Translations
1
作者 贾睿 《海外英语》 2011年第3X期126-127,共2页
This thesis aims at exploring meanings of different addresses and their correct and suitable translations in both Chinese and English. After the introduction to the definition and meaning of addresses, the whole thesi... This thesis aims at exploring meanings of different addresses and their correct and suitable translations in both Chinese and English. After the introduction to the definition and meaning of addresses, the whole thesis probes into this problem from two aspects: the reasons which lead to the differences in addresses among relatives in both Chinese and English, and the ways how to translate addresses properly according to the situations. With the exploration, the writer hopes to introduce the cultural differences from the perspective of translations of addresses. 展开更多
关键词 addresses MEANING CULTURAL DIFFERENCE transiation
在线阅读 下载PDF
New LNK302 Addresses Lower Power Home Appliance and Industrial Applications
2
《电源技术应用》 2004年第10期621-621,共1页
SAN JOSE,Calif.-September 9,2004-Power Integrations,Inc.(NASDAQ:POWI),the leading supplier of high-voltageanalog integrated circuits used in power conversion, todayintroduced LNK302,a new member of the company'sLi... SAN JOSE,Calif.-September 9,2004-Power Integrations,Inc.(NASDAQ:POWI),the leading supplier of high-voltageanalog integrated circuits used in power conversion, todayintroduced LNK302,a new member of the company'sLinkSwitch-TN family of AC- DC power conversion ICs.Designed as a cost-effective replacement for bulky,energy-wasting capacitive droppers and linear transformers,the LinkSwitch-TN family is ideal for use in home applianceand industrial control applications.The addition of 展开更多
关键词 HOME NASDAQ New LNK302 addresses Lower Power Home Appliance and Industrial Applications TN AC high
在线阅读 下载PDF
China-ROK Forum Addresses Monetary Issues
3
作者 陈伟 《China Economist》 2008年第4期13-24,共12页
On June 12th,2008,the China-Korea Forum was held in Shanghai to address hot issues in China's nancial sector such as banking reform,securities market and RMB appreciation,Vice Mayor of Shanghai,o cials from Shangh... On June 12th,2008,the China-Korea Forum was held in Shanghai to address hot issues in China's nancial sector such as banking reform,securities market and RMB appreciation,Vice Mayor of Shanghai,o cials from Shanghai Securities Exchange Research Center and the Korea Financial Service Commission were invited to share their wisdom on these issues. 展开更多
关键词 China-ROK Forum addresses Monetary Issues ROK
在线阅读 下载PDF
Notification China Today's new e-mall addresses for each edition are now in operation! So writel Share your views and comments with us,and with fellow subscribers
4
《China Today》 2002年第7期23-23,共1页
Dear Readers,Our email address, chinatoday@263.net, is defunct. We now have separateaddresses for each of our editions. They are:
关键词 Notification China Today’s new e-mall addresses for each edition are now in operation
在线阅读 下载PDF
Chinese-Spanish Translation of International Conference Addresses from the Perspective of Skopos Theory
5
作者 赵雨菡 《海外英语》 2019年第24期128-129,共2页
This paper chooses the Spanish translation of the address to the China-CELAC Forum opening ceremony as a research corpus and adopts Skopos theory and its three basic rules as a theoretical guide to discuss the princip... This paper chooses the Spanish translation of the address to the China-CELAC Forum opening ceremony as a research corpus and adopts Skopos theory and its three basic rules as a theoretical guide to discuss the principles of Spanish translation of the conference address,the features of translation of words and sentences with Chinese characteristics,and the applicability of three rules of Skopos theory to Chinese-Spanish translation of international conference addresses.In Chinese-Spanish translation,the translator should convey the meaning of the source text while meeting the desired needs of the target audience under the guidance of Skopos theory to avert conflict between output content and reader ideology and fulfill cross-cultural communication. 展开更多
关键词 Skopos theory conference addresses Chinese-Spanish translation
在线阅读 下载PDF
PREMIER LI PENG ADDRESSES CAS CONGRESS
6
作者 (CAS-Xinhua) 《Bulletin of the Chinese Academy of Sciences》 1996年第3期191-191,共1页
Meeting jointly for the first time,the country’s 800 academicians from both the Chinese Academy of Sciences (CAS) and the Chinese Academy of Engineering (CAE), as well as five foreign members of CAS,opened a five-day... Meeting jointly for the first time,the country’s 800 academicians from both the Chinese Academy of Sciences (CAS) and the Chinese Academy of Engineering (CAE), as well as five foreign members of CAS,opened a five-day conference in Beijing on June 3, 1996. The event combined the 8th Academic Congress of CAS and the 3rd Academic Congress of CAE. At the opening ceremony in the same day, Premier 展开更多
关键词 CAS PREMIER LI PENG addresses CAS CONGRESS
在线阅读 下载PDF
A Covert Communication Method Using Special Bitcoin Addresses Generated by Vanitygen 被引量:9
7
作者 Lejun Zhang Zhijie Zhang +4 位作者 Weizheng Wang Rasheed Waqas Chunhui Zhao Seokhoon Kim Huiling Chen 《Computers, Materials & Continua》 SCIE EI 2020年第10期597-616,共20页
As an extension of the traditional encryption technology,information hiding has been increasingly used in the fields of communication and network media,and the covert communication technology has gradually developed.T... As an extension of the traditional encryption technology,information hiding has been increasingly used in the fields of communication and network media,and the covert communication technology has gradually developed.The blockchain technology that has emerged in recent years has the characteristics of decentralization and tamper resistance,which can effectively alleviate the disadvantages and problems of traditional covert communication.However,its combination with covert communication thus far has been mostly at the theoretical level.The BLOCCE method,as an early result of the combination of blockchain and covert communication technology,has the problems of low information embedding efficiency,the use of too many Bitcoin addresses,low communication efficiency,and high costs.The present research improved on this method,designed the V-BLOCCE which uses base58 to encrypt the plaintext and reuses the addresses generated by Vanitygen multiple times to embed information.This greatly improves the efficiency of information embedding and decreases the number of Bitcoin addresses used.Under the premise of ensuring the order,the Bitcoin transaction OP_RETURN field is used to store the information required to restore the plaintext and the transactions are issued at the same time to improve the information transmission efficiency.Thus,a more efficient and feasible method for the application of covert communication on the blockchain is proposed.In addition,this paper also provides a more feasible scheme and theoretical support for covert communication in blockchain. 展开更多
关键词 Covert communication blockchain Bitcoin address
在线阅读 下载PDF
Cluster Analysis of New Year's Addresses Released by the Queen and Prime Minister of the United Kingdom
8
作者 江磊磊 《海外英语》 2017年第14期229-230,共2页
The United Kingdom are still facing great challenges in all aspects after about half a year's struggle since they had made the decision to Brexit. The authorities are also trying to convince the public of its auth... The United Kingdom are still facing great challenges in all aspects after about half a year's struggle since they had made the decision to Brexit. The authorities are also trying to convince the public of its authorities by all means, especially by public speeches. This paper is going to analyze how the Queen and the Prime Minster try to convince their public of a better future in their New Year Addresses through the method of cluster analysis. 展开更多
关键词 Brexit New Year Address Cluster Criticism
在线阅读 下载PDF
Method for Automated Georeferencing and Integrating Printed Maps in GIS for Collecting Addresses
9
作者 Mohamed El Imame Malaainine Hassane Rhinane +1 位作者 Lahcen Baidder Omar Bachir Alami 《Journal of Geographic Information System》 2013年第1期33-39,共7页
Addresses are important data for urban applications. About 80% of the information local authorities use have a geographic component that is generally related to addresses. Addressing systems efficiency depend on the q... Addresses are important data for urban applications. About 80% of the information local authorities use have a geographic component that is generally related to addresses. Addressing systems efficiency depend on the quality of addresses locators. There are several methods to collect data. Surveys from the field are essential: GPS and pre-printed maps can be used to achieve this goal. GPS surveys from the field may be a solution, but it remains practical only for limited areas. To insure an accepted accuracy, GPS methods need special considerations that are time and money consuming. For Casablanca’s addressing locators, an alternative approach was adopted to collect 400 000 points. It took two months, 200 operators and 3500 printed maps to cover a study area of1,226 km2. This paper is to develop an optimized approach based on automated procedure for reintegrating printed maps in a geographic information system (GIS). It saves georeferencing time from 5min to just seconds per document. It insures, more importantly, an accuracy that is between20 cmto1 mfor scales that are between 1/500 and 1/2500. It ensures maps’ integration, independently of base map and coordinates system by introducing the notion of Georeferencing Code (GC). 展开更多
关键词 GIS Addressing Reference GEOREFERENCING GEODATABASE RASTER Data NAC GC
暂未订购
~evelopment of the Political Discourse in Recent Decades in the United States Through the Inaugural Addresses
10
作者 Conchi Hernandez-Guerra 《Sociology Study》 2011年第6期407-414,共8页
The aim of this paper is twofold: firstly, to make an analysis of what have been considered as the most important global problems faced in recent decades as seen by American Presidents through their inaugural address... The aim of this paper is twofold: firstly, to make an analysis of what have been considered as the most important global problems faced in recent decades as seen by American Presidents through their inaugural addresses; and secondly, to consider how both parties have faced these problems. To do this, this paper will cover the period from the inaugural address by President Kennedy to that of President Obama. Although a president has repeated a term of government, only the first speech will be taken into consideration. 展开更多
关键词 Political discourse inaugural address RHETORIC
在线阅读 下载PDF
A Contrastive Analysis of the Theme and Thematic Progerssion Patterns in the Addresses Made by Xi Jinping and Obama in the APEC CEO Summit
11
作者 魏露飞 《海外英语》 2015年第8期229-232,共4页
The thematic progression Patterns help to clarify the semantic relationships between the sentences and the method of the development in the texts,and they have been one of the important methods to analyze the discours... The thematic progression Patterns help to clarify the semantic relationships between the sentences and the method of the development in the texts,and they have been one of the important methods to analyze the discourse sequences in the text linguistics and discourse analysis(Qi Yucun,1993).With the theoretical framework of Halliday’s theme-rheme theory and the thematic progression patterns coined by Danes and other major scholars,selecting the two addresses made by Xi Jinping and Obama in the APEC CEO Summit in November 9,2014 as the data resource,this article aims to find out the similarities and differences in the choice of Themes and Thematic Progression Patterns and dig out the possible reasons.Since the two addresses are of the same genre but with different languages,new ideas may be provided in the contrastive discourse studies and the theory of contrastive study on Chinese and American addresses will be enriched through this kind of research. 展开更多
关键词 THEME THEMATIC progression pattern leaders’ address CONTRASTIVE study
在线阅读 下载PDF
A Study of Conceptual Metaphors in Obama's Weekly Addresses
12
作者 刘春迪 《海外英语》 2017年第1期211-215,共5页
Conceptual metaphor plays an important role in delivering political speeches for it can make abstract and complicated political concepts into clear and vivid statements. Therefore, it is often used by politicians. The... Conceptual metaphor plays an important role in delivering political speeches for it can make abstract and complicated political concepts into clear and vivid statements. Therefore, it is often used by politicians. The American President Barack Obama often utilizes metaphors in his speeches and good at utilizing them. The weekly address is a typical representative of political discourse. This article is intended to analyze the conceptual metaphors used in Obama's weekly addresses on the basis of the conceptual metaphor theory proposed by Lakoff and Johnson.The analysis shows that there are three categories of conceptual metaphors used frequently in Obama's weekly addresses, which can be learned that how Obama uses conceptual metaphors to make speeches more vivid. 展开更多
关键词 weekly address conceptual metaphor LAKOFF OBAMA
在线阅读 下载PDF
Evicting and filling attack for linking multiple network addresses of Bitcoin nodes
13
作者 Huashuang Yang Jinqiao Shi +4 位作者 Yue Gao Xuebin Wang Yanwei Sun Ruisheng Shi Dongbin Wang 《Cybersecurity》 EI CSCD 2024年第3期49-68,共20页
Bitcoin is a decentralized P2P cryptocurrency.It supports users to use pseudonyms instead of network addresses to send and receive transactions at the data layer,hiding users'real network identities.Traditional tr... Bitcoin is a decentralized P2P cryptocurrency.It supports users to use pseudonyms instead of network addresses to send and receive transactions at the data layer,hiding users'real network identities.Traditional transaction tracing attack cuts through the network layer to directly associate each transaction with the network address that issued it,thus revealing the sender's network identity.But this attack can be mitigated by Bitcoin's network layer privacy protections.Since Bitcoin protects the unlinkability of Bitcoin addresses and there may be a many-to-one relation-ship between addresses and nodes,transactions sent from the same node via different addresses are seen as com-ing from different nodes because attackers can only use addresses as node identifiers.In this paper,we proposed the evicting and flling attack to expose the correlations between addresses and cluster transactions sent from different addresses of the same node.The attack exploited the unisolation of Bitcoin's incoming connection processing mecha-nism.In particular,an attacker can utilize the shared connection pool and deterministic connection eviction strategy to infer the correlation between incoming and evicting connections,as well as the correlation between releasing and flling connections.Based on inferred results,different addresses of the same node with these connections can be linked together,whether they are of the same or different network types.We designed a multi-step attack procedure,and set reasonable attack parameters through analyzing the factors that affect the attack effciency and accuracy.We mounted this attack on both our self-run nodes and multi-address nodes in real Bitcoin network,achieving an aver-age accuracy of 96.9% and 82%,respectively.Furthermore,we found that the attack is also applicable to Zcash,Litecoin,Dogecoin,Bitcoin Cash,and Dash.We analyzed the cost of network-wide attacks,the application scenario,and proposed countermeasures of this attack. 展开更多
关键词 Security and privacy Bitcoin Address linking
原文传递
A Study of Variations in Address Forms in the Tinghu Dialect of Yancheng City
14
作者 Xingcheng Pan Zhenjun Song 《Journal of Contemporary Educational Research》 2025年第1期227-233,共7页
This study explores the variations in address forms within the Tinghu dialect of Yancheng city.The findings reveal that the ways individuals address one another in this region deviate from the established principles o... This study explores the variations in address forms within the Tinghu dialect of Yancheng city.The findings reveal that the ways individuals address one another in this region deviate from the established principles of tone sandhi theory.In Chinese phonology,it is generally assumed that individual characters serve as fundamental forms based on their standard pronunciations,with real-time pronunciations adapting to phonetic conditions.However,the study of address forms has not traditionally been integrated into this framework.Observations indicate that a wide range of addressing methods is employed in social interactions,reflecting the complexity of regional cultural traits and social dynamics.This research highlights the distinctive features of address forms in the Tinghu dialect,particularly in terms of tone sandhi,vocative expressions,and indirect address.By examining these unique characteristics,the study enhances our understanding of the principles governing tonal changes in Chinese.Furthermore,it offers valuable insights into the preservation and inheritance of regional dialects. 展开更多
关键词 Tone sandhi Address form Vocative Indirect address
在线阅读 下载PDF
Blue Economy For a Sustainable And Inclusive Future China and ASEAN are fostering sustainable maritime trade,fisheries,and tourism
15
作者 Wang Da 《China Report ASEAN》 2025年第11期36-37,共2页
The blue economy encompasses all economic activities related to oceans,seas,and coastal resources,emphasizing sustainable development that balances ecological health with economic growth.It includes sectors such as fi... The blue economy encompasses all economic activities related to oceans,seas,and coastal resources,emphasizing sustainable development that balances ecological health with economic growth.It includes sectors such as fisheries,maritime trade,coastal tourism,renewable energy,and marine biotechnology.For China and ASEAN,the blue economy represents not only a source of substantial economic potential but also a crucial domain for addressing shared challenges such as resource sustainability,ecological conservation,and climate resilience. 展开更多
关键词 sustainable development coastal tourism FISHERIES maritime trade marine biotechnologyfor addressing shared challenges blue economy
在线阅读 下载PDF
A Dynamic SDN-Based Address Hopping Model for IoT Anonymization
16
作者 Zesheng Xi Chuan He +1 位作者 Yunfan Wang Bo Zhang 《Computer Modeling in Engineering & Sciences》 2025年第8期2545-2565,共21页
The increasing reliance on interconnected Internet of Things(IoT)devices has amplified the demand for robust anonymization strategies to protect device identities and ensure secure communication.However,traditional an... The increasing reliance on interconnected Internet of Things(IoT)devices has amplified the demand for robust anonymization strategies to protect device identities and ensure secure communication.However,traditional anonymization methods for IoT networks often rely on static identity models,making them vulnerable to inference attacks through long-term observation.Moreover,these methods tend to sacrifice data availability to protect privacy,limiting their practicality in real-world applications.To overcome these limitations,we propose a dynamic device identity anonymization framework using Moving Target Defense(MTD)principles implemented via Software-Defined Networking(SDN).In our model,the SDN controller periodically reconfigures the network addresses and routes of IoT devices using a constraint-aware backtracking algorithmthat constructs new virtual topologies under connectivity and performance constraints.This address-hopping scheme introduces continuous unpredictability at the network layer dynamically changing device identifiers,routing paths,and even network topology which thwarts attacker reconnaissance while preserving normal communication.Experimental results demonstrate that our approach significantly reduces device identity exposure and scan success rates for attackers compared to static networks.Moreover,the dynamic schememaintains high data availability and network performance.Under attack conditions it reduced average communication delay by approximately 60% vs.an unprotected network,with minimal overhead on system resources. 展开更多
关键词 Device anonymization address hopping moving target defense software defined networking cyber resilience
在线阅读 下载PDF
43 robot teams from all over the world gathered in Shanghai
17
作者 陈福金 《疯狂英语(新读写)》 2025年第8期44-46,78,共4页
1 The 2025 FIRST Robotics Competition(FRC)Shanghai Regional has returned to the city,inspiring youth in science and technology.The three⁃day event,starting from March 14,has brought together nearly 1,000 young competi... 1 The 2025 FIRST Robotics Competition(FRC)Shanghai Regional has returned to the city,inspiring youth in science and technology.The three⁃day event,starting from March 14,has brought together nearly 1,000 young competitors from 43 teams—including three international teams.Held at East China Normal University,the event centered on this year's theme“Reefscape”,challenging participants to address environmental issues through robotics.Teams have to design and program robots to transplant artificial coral and collect simulated algae(模拟藻类),simulating marine ecosystems'restoration processes. 展开更多
关键词 design program robots SHANGHAI FRC environmental issues address environmental issues simulated algae transplant artificial coral robotics competition
在线阅读 下载PDF
Visiting Danish Prime Minister Addresses at Tsinghua
18
《Tsinghua Science and Technology》 SCIE EI CAS 2004年第3期316-316,共1页
关键词 Visiting Danish Prime Minister addresses at Tsinghua
原文传递
Ultrafast Ternary Content-Addressable Nonvolatile Floating-Gate Memory Based on van der Waals Heterostructures
19
作者 Peng Song Xuanye Liu +8 位作者 Jiequn Sun Nuertai Jiazila Chijun Wei Hui Gao Chengze Du Hui Guo Haitao Yang Lihong Bao Hong-Jun Gao 《Chinese Physics Letters》 2025年第6期297-304,I0001-I0006,共14页
As a typical in-memory computing hardware design, nonvolatile ternary content-addressable memories(TCAMs) enable the logic operation and data storage for high throughout in parallel big data processing. However,TCAM c... As a typical in-memory computing hardware design, nonvolatile ternary content-addressable memories(TCAMs) enable the logic operation and data storage for high throughout in parallel big data processing. However,TCAM cells based on conventional silicon-based devices suffer from structural complexity and large footprintlimitations. Here, we demonstrate an ultrafast nonvolatile TCAM cell based on the MoTe2/hBN/multilayergraphene (MLG) van der Waals heterostructure using a top-gated partial floating-gate field-effect transistor(PFGFET) architecture. Based on its ambipolar transport properties, the carrier type in the source/drain andcentral channel regions of the MoTe2 channel can be efficiently tuned by the control gate and top gate, respectively,enabling the reconfigurable operation of the device in either memory or FET mode. When working inthe memory mode, it achieves an ultrafast 60 ns programming/erase speed with a current on-off ratio of ∼105,excellent retention capability, and robust endurance. When serving as a reconfigurable transistor, unipolar p-typeand n-type FETs are obtained by adopting ultrafast 60 ns control-gate voltage pulses with different polarities.The monolithic integration of memory and logic within a single device enables the content-addressable memory(CAM) functionality. Finally, by integrating two PFGFETs in parallel, a TCAM cell with a high current ratioof ∼10^(5) between the match and mismatch states is achieved without requiring additional peripheral circuitry.These results provide a promising route for the design of high-performance TCAM devices for future in-memorycomputing applications. 展开更多
关键词 van der waals heterostructures floating gate memory memory computing parallel big data processing nonvolatile memory van der waals heterostructure ternary content addressable memory top gated partial floating gate field effect transistor
原文传递
上一页 1 2 16 下一页 到第
使用帮助 返回顶部