期刊文献+
共找到30篇文章
< 1 2 >
每页显示 20 50 100
Do Victims Defend Victims?The Mediating Role of Empathy between Victimization Experience and Public-Defending Tendency in School Bullying Situations
1
作者 Han Xie Yizhe Jiang Kunjie Cui 《International Journal of Mental Health Promotion》 2024年第12期1033-1043,共11页
Objectives:This study investigates the association between victimization experience and the tendency to defend on behalf of victims during school bullying incidents in public settings,with a focus on the mediating eff... Objectives:This study investigates the association between victimization experience and the tendency to defend on behalf of victims during school bullying incidents in public settings,with a focus on the mediating effect of empathy and the moderating role of school level among Chinese children and adolescents.Methods:Data were collected by a cross-sectional survey.A total of 1491 students in Grades 4–11 participated(Boys=52.8%;Mean_(age)=13.00 years,Standard Deviation_(age)=2.31).Structural equation modeling is employed to test the hypotheses.Results:The results indicate that empathy measures partially mediate the relationship between victimization experience and defending tendency in public in-school bullying situations.In particular,individuals with a history of victimization typically demonstrate lower levels of empathy.They are less likely to protect victims in school bullying situations in the presence of others,which suggests that empathy plays a significant mediating role in this relationship.Group differences were found between primary and secondary school students,which indicates that the hypothesized model should be considered through a developmental perspective.Conclusions:The findings of this study emphasize the importance of children’s benign peer relationships,and practitioners are encouraged to prevent victimization in schools and care for students who have been victimized;specific measures include cultivating empathy,teaching defending skills that have been found to help reduce the adverse effects of victimization,and encouraging prosocial behavior during children's socialization development. 展开更多
关键词 VICTIMIZATION EMPATHY defending tendency prosocial behavior school bullying left-behind children
在线阅读 下载PDF
AN APPROACH OF DEFENDING AGAINST DDOS ATTACK 被引量:1
2
作者 Wu Zhijun Duan Haixin Li Xing 《Journal of Electronics(China)》 2006年第1期148-153,共6页
An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to pro... An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%, drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP1200. 展开更多
关键词 Distributed Denial of Service (DDoS) defending Flow model Flow detection IXP1200 Dfighter
在线阅读 下载PDF
Defending the Frontier
3
作者 Hou Weili 《ChinAfrica》 2017年第12期14-16,共3页
LIU Jie still remembers the challenges she faced in the fight against the AIDS epidemic during her stint as a medical volunteer in Nigeria six years ago. Ironically, it was not the lack of medicine or funding that was... LIU Jie still remembers the challenges she faced in the fight against the AIDS epidemic during her stint as a medical volunteer in Nigeria six years ago. Ironically, it was not the lack of medicine or funding that was the biggest hurdle, but the difficulty in effectively delivering the treatment drugs and services. 展开更多
关键词 HIV defending the Frontier
原文传递
东南大学白如帆在《Artificial Intelligence》上发表最新研究成果
4
《信息网络安全》 北大核心 2025年第3期402-402,共1页
近日,东南大学计算机与科学工程学院白如帆在人工智能领域国际期刊《Artificial Intelligence》(AIJ,CCF A)上发表题为“On the Computation of Mixed Strategies for Security Games with General Defending Requirements”的论文,介... 近日,东南大学计算机与科学工程学院白如帆在人工智能领域国际期刊《Artificial Intelligence》(AIJ,CCF A)上发表题为“On the Computation of Mixed Strategies for Security Games with General Defending Requirements”的论文,介绍该团队在智能体安全博弈领域内的最新研究成果,白如帆老师为论文唯一第一作者,这也是东南大学第二次以第一、通信单位身份在该期刊发表论文。 展开更多
关键词 Mixed Strategies 智能体 安全博弈 defending Requirements
在线阅读 下载PDF
Defending Home 被引量:2
5
作者 LI LI 《Beijing Review》 2010年第1期24-25,共2页
A much-anticipated law protecting homeowners’ rights is on the horizon Television audiences around the country were shocked on November 21,2009,when national broadcaster China Central Television showed clips of two f... A much-anticipated law protecting homeowners’ rights is on the horizon Television audiences around the country were shocked on November 21,2009,when national broadcaster China Central Television showed clips of two families violently fighting lawenforcement officials who were evicting them from their homes. 展开更多
关键词 defending Home
原文传递
Methods and Effectiveness of the Training of "Defending the Many with the Few" in Basketball
6
作者 MA Zhenhong 《北京体育大学学报》 CSSCI 1995年第S2期82-82,共1页
Defending the many with the few" is an effectivetraining method to enhance the defensive ability of the whole team. The results of this study indicated that through the system of two-on-three, three-on-four and f... Defending the many with the few" is an effectivetraining method to enhance the defensive ability of the whole team. The results of this study indicated that through the system of two-on-three, three-on-four and four -on-five and intensified training, players could impove themselves in a short period in collective abilitys and consciousness, such as choosing position, adjusting position, coordinating defence and shifting defence. And team ability and style could thus be trained. 展开更多
关键词 TRAINING method of "defending the MANY with the few" EFFECTIVENESS coordinating DEFENCE shifting DEFENCE consciousness ability
原文传递
基于Shadow Defender的高校电子阅览室系统安全架构 被引量:1
7
作者 张曾昱 孙睿阳 《图书馆学研究》 CSSCI 北大核心 2009年第2期35-36,98,共3页
介绍了Shadow Defender在维护电子阅览室计算机系统方面的优势,以及Shadow Defender的使用方法。
关键词 SHADOW Defender高校电子阅览室 影子系统 系统维护
在线阅读 下载PDF
基于双软件层面的电子阅览室系统安全架构
8
作者 张曾昱 于秀芬 《中华医学图书情报杂志》 CAS 2009年第2期70-71,共2页
介绍了Shadow Defender与AntiArpSniffer结合在维护电子阅览室计算机系统方面的优势及各自的使用方法。
关键词 SHADOW DEFENDER AntiArpSniffer 电子阅览室 计算机安全 网络安全
在线阅读 下载PDF
服务器隐藏用户的建立与查看
9
作者 陈晨 《长江大学学报(自科版)(上旬)》 CAS 2012年第5期145-146,共2页
通过操作注册表以及工具Hacker Defender可在服务器中建立一个隐藏用户,管理员无法通过命令"net user"或计算机管理对话框中的"本地用户和组"或注册表来查看,借助工具XueTr便可查看服务器中的隐藏用户。
关键词 隐藏用户 建立 查看 HACKER DEFENDER XueTr
在线阅读 下载PDF
基于Shadow Defender的高校电子阅览室安全体系研究
10
作者 刘美珍 《职业时空》 2013年第1期121-124,共4页
论述了Shadow Defender在维护电子阅览室系统方面的优势,包括还原效果优于还原卡与还原精灵,能够防御危害比较严重的病毒;完全改变了杀毒软件维护系统的防御模式。详细介绍了Shadow Defender系统操作流程和工作原理,以及其五大应用界面&... 论述了Shadow Defender在维护电子阅览室系统方面的优势,包括还原效果优于还原卡与还原精灵,能够防御危害比较严重的病毒;完全改变了杀毒软件维护系统的防御模式。详细介绍了Shadow Defender系统操作流程和工作原理,以及其五大应用界面"系统状态"、"模式设置"、"排除列表"、"立即储存"以及"管理配置"的主要功能。 展开更多
关键词 SHADOW DEFENDER 高校电子阅览室 影子系统 系统维护
在线阅读 下载PDF
浅谈路虎Defender2020款最新品牌精神及技术亮点
11
作者 韩荧 郭紫威 《内燃机与配件》 2021年第6期38-39,共2页
路虎Defender强势回归,焕新演绎深厚的品牌基础。Defender最初称为“路虎”,自1948年首次发布以来,已经成为深受用户喜爱的标志性车型。从农村到城市,它的强劲性能足以应对任何使用环境。经过重新打造,全新路虎Defender焕然新生,同时也... 路虎Defender强势回归,焕新演绎深厚的品牌基础。Defender最初称为“路虎”,自1948年首次发布以来,已经成为深受用户喜爱的标志性车型。从农村到城市,它的强劲性能足以应对任何使用环境。经过重新打造,全新路虎Defender焕然新生,同时也彰显了路虎的品牌精神。本文将分析Defender2020款最新品牌精神和Defender2020款最新的技术亮点和创新点。 展开更多
关键词 路虎Defender 品牌精神 技术亮点
在线阅读 下载PDF
保健品Mega Defends X致急性肝损伤1例
12
作者 张毛 贾胜男 +2 位作者 张传辉 张倩 金珍婧 《中南药学》 CAS 2021年第2期367-368,共2页
1病例介绍患者,女,55岁,因“尿色加深10 d,目黄1周”于2020年3月4日就诊于本院。该患者于20 d前自行口服“Mega Defends X(MDX)”保健品,1粒/次,qd po。10 d前出现尿色加深及目黄,伴皮肤瘙痒。
关键词 Mega Defends X 保健品 黄芩 肝损伤 不良反应
原文传递
IBM硬盘的保护神——Smart Defender
13
作者 石笋 《软件》 2002年第4期53-53,共1页
蓝色巨人IBM一向给人稳重可靠,值得信赖的印象,可是前些日子它的腾龙二代和腾龙三代玻璃硬盘的质量问题确实闹得满城风雨.
关键词 硬盘安全检测工具 IBM硬盘 SMART DEFENDER
在线阅读 下载PDF
Misinterpreted Figure in Hemingway’s“Indian Camp”-Doctor Adams
14
作者 HUANG Li-hua 《Journal of Literature and Art Studies》 2023年第10期780-784,共5页
Since the publication of Hemingway’s“Indian Camp”in 1924,many scholars has considered Doctor Adams to be insensitive,cold-hearted,ethically immoral.Some others labeled him as a racist and a sexist.After a scrupulou... Since the publication of Hemingway’s“Indian Camp”in 1924,many scholars has considered Doctor Adams to be insensitive,cold-hearted,ethically immoral.Some others labeled him as a racist and a sexist.After a scrupulous and strenuous close reading together with extensive reviewing and analyzing of relevant references,the author of this paper finds that Uncle George has always been misinterpreted over the time.This paper aims to point out the misunderstanding,misinterpretation or even distortion in the previous researches,in an attempt to defend for Doctor Adams and put the record straight. 展开更多
关键词 HEMINGWAY “Indian Camp” Doctor Adams misinterpreted DEFEND
在线阅读 下载PDF
原始之美 全新2007款路虎Defender
15
作者 赵迪 《车时代》 2007年第2期32-35,共4页
Defender是路虎品牌数十年来卓越越野性的结晶,它的身上凝结着无数的荣誉,几乎成为了“粗犷”与“剽悍”的代名词。尽管在路虎家族全面更新的风潮下,07款Defender依然坚定地维持着原有的风格。以现代造车眼光来看,简单的装饰和配置... Defender是路虎品牌数十年来卓越越野性的结晶,它的身上凝结着无数的荣誉,几乎成为了“粗犷”与“剽悍”的代名词。尽管在路虎家族全面更新的风潮下,07款Defender依然坚定地维持着原有的风格。以现代造车眼光来看,简单的装饰和配置似乎显得有些过时,但正是这种纯粹的机械之感使Defender散发着最为诱人的原始之美! 展开更多
关键词 越野性 2007款 路虎Defender 底盘 轴距 动力性 灵敏性
在线阅读 下载PDF
打击“流氓”软件
16
作者 孤舟 《网管员世界》 2007年第17期107-110,共4页
流氓软件肆虐,我们该如何应对?面对众多的查删软件,我们该选择谁?本期为您介绍一组简单实用的查删流氓软件工具。
关键词 流氓软件 查删软件 WINDOWS DEFENDER Upiea 超级兔子
在线阅读 下载PDF
强身健体——给Shadow Defender吃味补药
17
作者 丁小光 《电脑知识与技术(经验技巧)》 2009年第6X期26-26,共1页
Shadow Defender(影子卫士)是一款小巧却功能强大的系统防护软件,程序不仅支持自定义多分区保护,程序自身还能有效预防机器狗病毒,和Powershadow(影子系统)齐驱并驾(图1)。
关键词 注册表编辑器 安全模式 软件 Shadow Defender
在线阅读 下载PDF
IDS面临的核心问题
18
作者 林平 《中国计算机用户》 2003年第44期34-34,共1页
当前IDS和IPS存在的核心问题包括:准确率问题,大量误报和漏报;海量事件导致大量工作:孤立地看待和处理安全攻击。这些问题揭示了IDS和IPS必须面对的两个问题,一是保证准确报警的技术,二是保证入侵检测系统的可管理性。 在谈这个问题之前... 当前IDS和IPS存在的核心问题包括:准确率问题,大量误报和漏报;海量事件导致大量工作:孤立地看待和处理安全攻击。这些问题揭示了IDS和IPS必须面对的两个问题,一是保证准确报警的技术,二是保证入侵检测系统的可管理性。 在谈这个问题之前,有必要谈谈IDS和IPS之间的关系,IDS和IPS在入侵检测技术方面是一样的,因此他们面临的问题也是一样的。 展开更多
关键词 IDS 入侵检测技术 安氏互联网安全系统公司 “Linktrust NETWORK Defender”
在线阅读 下载PDF
Cracking the chitin code: how a single pair of LysM receptorsdeciphers symbiosis and immunity in Marchantia
19
作者 Karen Velandia Eloise Foo 《Science China(Life Sciences)》 2025年第5期1533-1535,共3页
To maintain health and productivity,plants must manage a complex set of relationships with both beneficial and harmful microbes.This includes hosting symbiotic microbes to gain access to limited nutrients and defendin... To maintain health and productivity,plants must manage a complex set of relationships with both beneficial and harmful microbes.This includes hosting symbiotic microbes to gain access to limited nutrients and defending against invasion by pathogenic microbes.Communication lies at the heart of these interactions via small signalling molecules(Srivastava et al.,2024). 展开更多
关键词 small signalling molecules srivastava gain access limited nutrients defending invasion hosting symbiotic microbes SYMBIOSIS lysm receptors IMMUNITY pathogenic microbescommunication
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部