期刊文献+
共找到323,327篇文章
< 1 2 250 >
每页显示 20 50 100
Review of Techniques for Integrating Security in Software Development Lifecycle
1
作者 Hassan Saeed Imran Shafi +3 位作者 Jamil Ahmad Adnan Ahmed Khan Tahir Khurshaid Imran Ashraf 《Computers, Materials & Continua》 SCIE EI 2025年第1期139-172,共34页
Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniq... Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniques coming up rapidly.The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way forward.This review follows Kitchenham’s review protocol.The review has been divided into three main stages including planning,execution,and analysis.From the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation techniques.Quantifying risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation efforts.Through a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat landscape.The review reveals that threat analysis and security testing are needed to develop automated tools for the future.Accurate estimation of effort required to prioritize potential security risks is a big challenge in software security.The accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep learning.It is also imperative to validate these effort estimation methods to ensure all potential security threats are addressed.Another challenge is selecting the right model for each specific security threat.To achieve a comprehensive evaluation,researchers should use well-known benchmark checklists. 展开更多
关键词 Software development lifecycle systematic literature review critical software security risks national institute of standards and technology DevSecOps open web application security project McGraw’s touch points
在线阅读 下载PDF
The Influence of Psychological Security on Quality of Life in Patients Undergoing Hysteroscopic Surgery-The Mediating Effect of Social Support
2
作者 Surong Xu Xiuyun Li 《Journal of Clinical and Nursing Research》 2025年第10期289-294,共6页
With the development of minimally invasive gynecological technology,hysteroscopic surgery has been widely used in the treatment of gynecological diseases due to its advantages of rapid recovery and minimal trauma.From... With the development of minimally invasive gynecological technology,hysteroscopic surgery has been widely used in the treatment of gynecological diseases due to its advantages of rapid recovery and minimal trauma.From the perspective of patients undergoing hysteroscopic surgery,this paper explores the influence of their psychological security on quality of life,analyzes the mediating effect of social support,and puts forward specific countermeasures and suggestions.The purpose is to improve the psychological security and quality of life of patients undergoing hysteroscopic surgery,and provide reference for the subsequent development of hysteroscopic surgery. 展开更多
关键词 Patients undergoing hysteroscopic surgery Psychological security Mediating effect
暂未订购
Stochastic Modelling of Vulnerability Life Cycle and Security Risk Evaluation 被引量:4
3
作者 Sasith M. Rajasooriya Chris P. Tsokos Pubudu Kalpani Kaluarachchi 《Journal of Information Security》 2016年第4期269-279,共11页
The objective of the present study is to propose a risk evaluation statistical model for a given vulnerability by examining the Vulnerability Life Cycle and the CVSS score. Having a better understanding of the behavio... The objective of the present study is to propose a risk evaluation statistical model for a given vulnerability by examining the Vulnerability Life Cycle and the CVSS score. Having a better understanding of the behavior of vulnerability with respect to time will give us a great advantage. Such understanding will help us to avoid exploitations and introduce patches for a particular vulnerability before the attacker takes the advantage. Utilizing the proposed model one can identify the risk factor of a specific vulnerability being exploited as a function of time. Measuring of the risk factor of a given vulnerability will also help to improve the security level of software and to make appropriate decisions to patch the vulnerability before an exploitation takes place. 展开更多
关键词 Stochastic Modelling security Risk Evaluation Vulnerability life Cycle Risk Factor
在线阅读 下载PDF
Contribution of attachment insecurity to health-related quality of life in depressed patients 被引量:1
4
作者 Alexander M Ponizovsky Angela Drannikov 《World Journal of Psychiatry》 SCIE 2013年第2期41-49,共9页
AIM: To examine the individual contributions of insecure attachment styles and depression symptom severity to health-related quality of life(HRQo L) in patients diagnosed with adjustment disorder(AJD) with depressed m... AIM: To examine the individual contributions of insecure attachment styles and depression symptom severity to health-related quality of life(HRQo L) in patients diagnosed with adjustment disorder(AJD) with depressed mood. METHODS: Participants were 67 patients diagnosed with International Classification of Diseases, Tenth edition AJD with depressed mood, who completed standardised self-report questionnaires measuring study variables. Mean scores and SDs were computed for the outcome and predictor measures. Pearson correlations among the measures were computed. The study hypotheses were tested using analysis of variance(ANOVA) and multiple regression analyses. All analyses were performed using the SPSS-17 software package(SPSS Inc., Chicago, IL, United States).RESULTS: ANOVA showed a significant main effect of the insecure attachment styles on depression symptom severity and life satisfaction scores. The results suggestthat depressive symptoms were more severe(F = 4.13, df = 2.67, P < 0.05) and life satisfaction was poorer(F = 5.69, df = 2.67, P < 0.01) in both anxious-ambivalently and avoidantly attached patients compared with their securely attached counterparts, whereas the two insecure groups did not significantly differ by these variables. The anxious/ambivalent attachment style and depression symptom severity significantly contributed to HRQo L, accounting for 21.4% and 29.7% of the total variance, respectively [R2 = 0.79; Adjusted R2 = 0.77; F(5, 67) = 33.68, P < 0.0001], even after controlling for gender, marital and employment status confounders.CONCLUSION: The results show that the anxious/ambivalent attachment style together with depression symptom severity substantially and independently predict the HRQo L outcome in AJD with depressed mood. 展开更多
关键词 ATTACHMENT INsecurity ADULT ATTACHMENT style HEALTH-RELATED quality of life Depression Adjustment DISORDER
暂未订购
Practice and Research on Construction of Basic Life Security Program for Land-Expropriated Farmers in China
5
作者 Cuiying Yang Yonghui Zhang Zuhui Huang 《Chinese Business Review》 2003年第4期60-66,共7页
To set up basic life security program (BLSP) for land-expropriated farmers in the process of urbanization is an effective measure to solve existing issues in China. Theprogram, which Zhejiang Province initiated in t... To set up basic life security program (BLSP) for land-expropriated farmers in the process of urbanization is an effective measure to solve existing issues in China. Theprogram, which Zhejiang Province initiated in the world, has great significance. Through deep investigation in ten cities, the thesis has normatively evaluated current situations, characteristics, advantages and disadvantages of basic life security program for land-expropriated farmers in Zhejiang. Furthermore, it put forward some academic suggestions to further perfect and improve the system. 展开更多
关键词 Land-expropriated Farmer life security Program Social Insurance Urbanization Zhejiang
在线阅读 下载PDF
Theoretical Application to Understand Food Insecurity Among College Students: A Multi-Systems Life Course Perspective
6
作者 Tracey Marie Barnett Reina Olivo +1 位作者 Valandra Kameri Christy 《Sociology Study》 2019年第2期75-83,共9页
Empirical studies have shown a distinct relationship between academic performance and food insecurity in college students. Specifically, food-insecure students are more likely to report a lower grade point average tha... Empirical studies have shown a distinct relationship between academic performance and food insecurity in college students. Specifically, food-insecure students are more likely to report a lower grade point average than their food secure counterparts. Since the Great Recession, more attention has been given to the topic of hunger and food insecurity among college students;however, the literature still lacks a comprehensive examination of various issues facing today’s college students. Using a multi-systems life course (MSLC) perspective, this paper provides a conceptual explanation of the lived experience of college students by offering a better understanding of the unique challenges faced by this population. Findings from this study will assist researchers, practitioners, and university administrators in their efforts to address hunger among this population. 展开更多
关键词 multi-systems life course perspective HUNGER FOOD INsecurity COLLEGE students university
在线阅读 下载PDF
Food and Nutritional Security in the Refugee Women’s Life Narratives
7
作者 Juliana Vidal Vieira Guerra Valdecyr Herdy Alves +5 位作者 Brenda Caroline Martins da Silva Tatiana do Socorro dos Santos Calandrini Giovanna Rosario Soanno Marchiori Ediane de Andrade Ferreira Maria Bertilla Lutterbach Riker Branco Diego Pereira Rodrigues 《Food and Nutrition Sciences》 2023年第11期1031-1042,共12页
Objective: To understand, based on the life narratives of refugee women, food and nutritional security. Method: Qualitative, descriptive, exploratory study, Narratives of life method, by Daniel Bertaux. Conducted with... Objective: To understand, based on the life narratives of refugee women, food and nutritional security. Method: Qualitative, descriptive, exploratory study, Narratives of life method, by Daniel Bertaux. Conducted with 11 participants, refugee women residing in the state of Rio de Janeiro, Brazil. Results: The meanings and feelings evidenced in the life narratives of refugee women expressed the insecurities and weaknesses with food in the resettlement. Final Considerations: Given the meanings and feelings regarding food in the refuge, it is expected that the present study will contribute to the elaboration of new action plans and intersectoral public policies of agile action to meet the demands of the refugee population, in the attempt to mitigate starvation, poverty, social differences and the compromised health status of the refugee population. 展开更多
关键词 Food security Feeding Behavior Refugees Human Migration Human Right to Adequate Food
在线阅读 下载PDF
Advancing 5G Network Applications Lifecycle Security:An ML-Driven Approach
8
作者 Ana Hermosilla Jorge Gallego-Madrid +3 位作者 Pedro Martinez-Julia Jordi Ortiz Ved P.Kafle Antonio Skarmeta 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1447-1471,共25页
As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof pa... As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security. 展开更多
关键词 Network application network function virtualization machine learning security 5G
在线阅读 下载PDF
Design and implementation of a computer endpoint security baseline verification system based on MLPS 2.0
9
作者 Fan Miao YaQiong Xu +3 位作者 ZiYang Wan YingJie Zhuang Yang Li JiaPeng Ren 《Railway Sciences》 2026年第1期136-152,共17页
Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a cr... Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a critical objective,aiming for comprehensive indigenous replacement through rapid technological iteration.Consequently,Xinchuang systems and Windows platforms are expected to coexist over an extended period.This study seeks to establish an automated verification framework for multi-version operating systems and validate the efficacy of baseline hardening in mitigating security risks.Design/methodology/approach-Based on the Classified Protection 2.0 framework and relevant national standards for endpoint security,this study proposes an endpoint security baseline verification scheme applicable to multiple operating systems.The scheme addresses divergent security policies and implementation methodologies across heterogeneous environments.It automates the inspection of core baselines,including account password complexity,default shared service status and patch installation status.Furthermore,a comprehensive scoring model is established by incorporating differentiated weights for account security,patch management and log auditing,ultimately generating visualized risk reports to facilitate remediation prioritization.Findings-This study reveals that baseline configuration serves as the fundamental prerequisite in endpoint security practices.Through a scalable detection engine and quantitative scoring model,the system can promptly identify and remediate potential risks,thereby reducing the attack surface and mitigating intrusion risks.However,on certain domestic chip architectures,compatibility issues persist in detecting specific configuration items.Further improvement in hardware-software co-adaptation for domestic platforms is required to advance the development of localized security protection systems.Originality/value-Through in-depth research on security baseline configurations across multiple operating systems,this study implements an automated and visualized baseline verification methodology.This approach significantly strengthens the security posture of domestic operating systems and supports the establishment of a more robust,national-level cybersecurity defense framework. 展开更多
关键词 Windows security baseline Endpoint security Baseline inspection Xinchuang system security baseline
在线阅读 下载PDF
Extending Healthy Life Expectancy:The Promise of Addressing Preventable Chronic Disease through Healthy Lifestyle Intervention
10
作者 Wei Bao 《Biomedical and Environmental Sciences》 2026年第2期129-130,共2页
Healthy life expectancy is a pivotal measure of population health by integrating both life expectancy and the quality of years lived.A significant increase in life expectancy was evident in most populations during the... Healthy life expectancy is a pivotal measure of population health by integrating both life expectancy and the quality of years lived.A significant increase in life expectancy was evident in most populations during the past decades worldwide[1],but the growth in healthy life expectancy has generally lagged behind[2].China has made substantial strides in enhancing both life expectancy and healthy life expectancy. 展开更多
关键词 life expectancy quality years population health healthy lifestyle intervention preventable chronic disease quality years lived healthy life expectancy
暂未订购
Pathways to improved food and nutrition security:The role of farm production diversity in household dietary outcomes in rural areas of Pakistan
11
作者 Muhammad Waseem Erbao Cao +2 位作者 Ihsan Jamil Bushra Mughal Mi Yu 《Journal of Integrative Agriculture》 2026年第1期377-389,共13页
Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD)... Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD).While research indicates that FPD correlates positively with reduced malnutrition,other studies emphasize the importance of market access for improved nutritional outcomes.However,this evidence varies by region and remains inconsistent.To address this knowledge gap,this study analyzed survey data from 450 smallholder farmers in Punjab,Pakistan,using regression models to examine the relationship between FPD and dietary diversity,as well as the underlying impact pathways.The findings demonstrate that FPD significantly correlates with increased household dietary diversity score(HDDS).FPD influences dietary diversification through both own-farm production and market food consumption pathways,with the ownfarm production pathway showing greater impact.The increase in food expenditure through own-farm production yielded a marginal return of 8% in household dietary diversity compared to 5.3% through marketing.Gender differences emerged as significant,with male-headed households showing relatively lower dietary diversity.These findings have substantial implications for countries with smallholder farming systems,providing valuable insights for the formation of agricultural policies,resource optimization,and rural development initiatives. 展开更多
关键词 food security nutrition security FPD HHDS smallholder farmers
在线阅读 下载PDF
Incorporating multiple scenarios and landscape ecological risk to optimize ecological security patterns: A Wei River Basin case study
12
作者 Xueting Wu Jinghu Pan 《Chinese Journal of Population,Resources and Environment》 2026年第1期94-109,共16页
Under the influence of human activities,landscape fragmentation in the Wei River Basin(WRB)has become increasingly severe.Upstream development has intensified soil erosion,and industrial and agricultural pollution in ... Under the influence of human activities,landscape fragmentation in the Wei River Basin(WRB)has become increasingly severe.Upstream development has intensified soil erosion,and industrial and agricultural pollution in the middle reaches has degraded water quality.Rapid urbanization has further caused habitat fragmentation and biodiversity loss.Collectively,these challenges threaten human well-being and hinder sustainable development,making the construction and optimization of an ecological security pattern(ESP)urgently necessary.However,existing studies often fail to systematically integrate future landscape ecological risk(LER)assessment with ESP optimization.This study evaluated regional LER using the“ecological patches-ecological resistance surface(ERS)-ecological corridor”framework,combined with land-use predictions under three development scenarios,and optimized the ESP by adjusting the ERS and extracting ecological corridors.The results indicate that the LER in the WRB follows an“inverted N”distribution,with low-risk areas concentrated in forested mountain regions and high-risk areas mainly in cultivated land subject to intensive human activity.Across future scenarios,ESPs showed fewer ecological breakpoints and improved landscape connectivity than the 2020 baseline.Scenario-based differences emerged in the spatial configuration of ERS adjustments,with the ecological protection scenario yielding the lowest LER and most favorable ESP.This study demonstrates the deep integration of multi-scenario simulation with LER assessment,providing a new framework for ESP optimization.The findings have guiding significance for ecological protection and coordinated development in the WRB and offer a novel paradigm for sustainable development in ecologically fragile basins worldwide. 展开更多
关键词 Ecological security pattern Multiple scenarios Landscape ecological risk Ecological security pattern optimization
在线阅读 下载PDF
A Nexus for East Africa--China-supported projects help East Africans to boost energy, water and food security
13
作者 RICHARD WETAYA 《ChinAfrica》 2026年第1期44-45,共2页
Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,B... Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,Bukyiende Subcounty in Uganda where he has been cultivating plantain,coffee and Irish potatoes for the past 16 years. 展开更多
关键词 water security solar technology NEXUS irish potatoes East Africa energy security China supported projects agrivoltaics technologya
原文传递
Quantum Secure Multiparty Computation:Bridging Privacy,Security,and Scalability in the Post-Quantum Era
14
作者 Sghaier Guizani Tehseen Mazhar Habib Hamam 《Computers, Materials & Continua》 2026年第4期1-25,共25页
The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreser... The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation. 展开更多
关键词 Quantum computing secure multiparty computation(MPC) post-quantum cryptography(PQC) quantum key distribution(QKD) privacy-preserving computation quantum homomorphic encryption quantum network security federated learning blockchain security quantum cryptography
在线阅读 下载PDF
Addressing the Security Governance Deficit Amid Intensifying Global Turmoil:A 2025 Retrospective on International Security
15
作者 Tang Yongsheng 《Contemporary World》 2026年第1期8-15,共8页
In 2025,the global landscape has undergone profound transformations,with the international architecture continuing to adjust.The fragility and uncertainty of international security have become increasingly pronounced.... In 2025,the global landscape has undergone profound transformations,with the international architecture continuing to adjust.The fragility and uncertainty of international security have become increasingly pronounced.Frequent regional conflicts and political instability have triggered a deep sense of insecurity,while latent risks have emerged one after another,exacerbating turbulence and disorder.Some countries still cling to a zero-sum mindset,selectively applying or discarding international rules based on their interests.Hegemonism and unilateralism have severely undermined the UN-centered international system,leading to a resurgence of geopolitical rivalry and intensified bloc confrontation.The provision of global public goods remains severely inadequate,security risks continue to accumulate,and the journey toward effective global security governance remains long and challenging. 展开更多
关键词 international architecture regional conflicts applying discarding international rules global turmoil profound transformations latent risks security governance deficit international security
在线阅读 下载PDF
Global patterns and trends in cancer-related premature death and their impact on life expectancy across 185 countries:a population-based analysis
16
作者 Ke-Xin Sun Xin Liang +7 位作者 Qian Zhu Hong-Liang Wu Gong-Yi Zhang Yi-Fei Yao Xiang Li Rong-Shou Zheng Jing Zuo Wen-Qiang Wei 《Military Medical Research》 2026年第2期222-238,共17页
Background:The level of premature deaths(deaths among those aged 30-69 years)caused by cancer is an important indicator of evaluating the level of cancer prevention and control.However,the current burden and temporal ... Background:The level of premature deaths(deaths among those aged 30-69 years)caused by cancer is an important indicator of evaluating the level of cancer prevention and control.However,the current burden and temporal trends in cancer-related premature deaths,and their impact on life expectancy at the global,regional,and national levels are not clear.Methods:Cancer mortality data for 185 countries were obtained from the GLOBOCAN 2022 database.High-quality cancer mortality data and national population statistics for 47 countries were extracted from the United Nations and national cancer registry databases,covering the period 2003-2022.Countries were classified based on the human development index(HDI).The death probability,the year of life lost(YLL),and the potential gain in life expectancy(PGLE)attributable to premature deaths from site-specific and all-cancers combined were calculated.Results:Globally,the probability of premature cancer deaths was 6.49%(95%UI 6.49-6.50).The YLLs caused by cancer-related premature death were 163.86 million(95%UI 163.70-164.03),constituting 65.58%of the total cancer-related YLLs.The PGLEs were 1.16 years(95%UI 1.16-1.16).The premature death probability increased with higher HDI levels in men,but decreased in women.Cancer-related premature deaths as a proportion of total cancer deaths varied from 18.31%(95%UI 18.20-18.43)in Japan to 84.44%(95%UI 76.10-91.16)in São Toméand Príncipe.Lung cancer was the leading cause of cancer-related premature deaths in men,and breast cancer ranked first in women.By eradicating premature deaths attributable to lung,liver,colorectal,and stomach cancer in men,and to breast,cervical,and lung cancer in women,0.55 years(95%UI 0.55-0.55)and 0.49 years(95%UI 0.49-0.49)of PGLEs could be achieved,accounting for 48.67%and 42.24%of the total PGLEs,respectively.Cancer-related premature deaths decreased significantly in 38 countries during 2003-2022(P<0.05).The probability of premature cancer-related deaths decreased by more than 15.50%from 2015 to 2022 in 16 countries.Conclusions:Cancer-related premature deaths declined in many countries,with 16 of them having achieved the expected reduction by 2022.The current burden of cancer-related premature deaths is profound but varies around the world.Eliminating premature deaths from major cancer types could substantially increase life expectancy,underscoring the importance of prevention and treatment efforts for these cancers. 展开更多
关键词 CANCER Premature death Death probability Year of life lost(YLL) Potential gain in life expectancy(PGLE)
原文传递
Paths of China’s Participation in Middle East Security Governance:From the Perspective of the Global Security Initiative
17
作者 Yu Guoqing 《Contemporary World》 2025年第5期32-38,共7页
The Middle East has long been in turmoil,and the new round of the Palestinian-Israeli conflict has further highlighted the urgency of security governance in the region.The Global Security Initiative(GSI)proposed by Ch... The Middle East has long been in turmoil,and the new round of the Palestinian-Israeli conflict has further highlighted the urgency of security governance in the region.The Global Security Initiative(GSI)proposed by China provides theoretical guidance and practical paths for China’s participation in Middle East security governance.China’s engagement in Middle East security governance not only meets the expectations of Middle East countries but also fully demonstrates its responsibility as a major country,which is of great significance for China to explore participation in global security governance and address the global security deficit. 展开更多
关键词 Middle East security Governance middle east Palestinian Israeli Conflict Major Country Responsibility security governance Global security Deficit global security initiative gsi proposed Global security Initiative
在线阅读 下载PDF
China’s Sea Lines of Communication Security: A Perspective from a Holistic Approach to National Security
18
作者 Wang Xu 《China International Studies》 2025年第4期31-68,共38页
Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects ... Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects of its SLOCs.Since the reform and opening-up era-and especially after the end of the Cold War-China has shifted its emphasis toward economic security.China’s SLOCs security bears on multiple dimensions of a holistic approach to national security,encompassing economic security,the safety of its citizens. 展开更多
关键词 holistic approach economic securitythe citizen safety sea lines communication slocs security national security sea lines communication security economic security
在线阅读 下载PDF
赖斯翻译批评模式下A Psalm of Life三个汉译本的对比赏析
19
作者 肖皓琨 蒋萧 《现代语言学》 2026年第1期469-475,共7页
中国语际翻译的历史最早可以追溯到西汉时期,但当时翻译的主要内容都是佛经,直到清朝才出现了第一首被译成中文的英语诗歌——A Psalm of Life。而清朝至今,这首诗已有多个译本。在20世纪70年代,德国学者凯瑟琳娜·赖斯在其著作《... 中国语际翻译的历史最早可以追溯到西汉时期,但当时翻译的主要内容都是佛经,直到清朝才出现了第一首被译成中文的英语诗歌——A Psalm of Life。而清朝至今,这首诗已有多个译本。在20世纪70年代,德国学者凯瑟琳娜·赖斯在其著作《翻译批评——潜力与制约》中,提出了以文本类型为导向,结合语言内因素(语言范畴)、语言外因素(语用范畴)和功能因素(功能范畴)的翻译批评模式。因此,基于赖斯的翻译批评模式,文章从文本类型、语言范畴、语用范畴和功能范畴四方面对黄新渠、黄杲炘和黄一宁三人的译本进行对比赏析。通过分析发现,三人的译本基本都再现了原文的内容和风格,句式、节奏上也基本与原文保持一致;而在语义、词汇、语法和文体上,每一译本都有其各自的优点。此外,译本的语用和功能因素也显著影响了翻译策略的选择。 展开更多
关键词 A Psalm of life 翻译批评 赖斯 翻译赏析
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部