期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
INSTRUCTIONS FOR AUTHORS
1
《Applied Mathematics and Mechanics(English Edition)》 2025年第6期I0001-I0002,共2页
1Legal requirements The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and t... 1Legal requirements The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and that the publisher will not be held legally responsible should there be any claims for compensation. 展开更多
关键词 COPYRIGHT third parties publisher liability legal requirements
在线阅读 下载PDF
INSTRUCTIONS FOR AUTHORS
2
《Applied Mathematics and Mechanics(English Edition)》 2025年第4期I0001-I0002,共2页
1 Legal requirements The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and ... 1 Legal requirements The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and that the publisher will not be held legally responsible should there be any claims for compensation. 展开更多
关键词 third parties publisher liability legal requirements
在线阅读 下载PDF
An Efficient Security Solution for Industrial Internet of Things Applications 被引量:1
3
作者 Alaa Omran Almagrabi 《Computers, Materials & Continua》 SCIE EI 2022年第8期3961-3983,共23页
The Industrial Internet of Things(IIoT)has been growing for presentations in industry in recent years.Security for the IIoT has unavoidably become a problem in terms of creating safe applications.Due to continual need... The Industrial Internet of Things(IIoT)has been growing for presentations in industry in recent years.Security for the IIoT has unavoidably become a problem in terms of creating safe applications.Due to continual needs for new functionality,such as foresight,the number of linked devices in the industrial environment increases.Certification of fewer signatories gives strong authentication solutions and prevents trustworthy third parties from being publicly certified among available encryption instruments.Hence this blockchain-based endpoint protection platform(BCEPP)has been proposed to validate the network policies and reduce overall latency in isolation or hold endpoints.A resolver supports the encoded model as an input;network functions can be optimized as an output in an infrastructure network.The configuration of the virtual network functions(VNFs)involved fulfills network characteristics.The output ensures that the final service is supplied at the least cost,including processing time and network latency.According to the findings of this comparison,our design is better suited to simplified trust management in IIoT devices.Thus,the experimental results show the adaptability and resilience of our suggested confidence model against behavioral changes in hostile settings in IIoT networks.The experimental results show that our proposed method,BCEPP,has the following,when compared to other methods:high computational cost of 95.3%,low latency ratio of 28.5%,increased data transmitting rate up to 94.1%,enhanced security rate of 98.6%,packet reception ratio of 96.1%,user satisfaction index of 94.5%,and probability ratio of 33.8%. 展开更多
关键词 Industrial internet of things(IIoT) blockchain trusted third parties endpoint verification
在线阅读 下载PDF
Referring to Third-Persons in English Interaction: A Single Case Analysis
4
作者 Clare Jackson 《外国语》 CSSCI 北大核心 2018年第4期12-29,共18页
Talking about and referring to others is a fundamentally human activity that relies on the meaningful use of referring expressions for interlocuters to be able to identify the specific individual( s) being spoken of. ... Talking about and referring to others is a fundamentally human activity that relies on the meaningful use of referring expressions for interlocuters to be able to identify the specific individual( s) being spoken of. With a primary focus on practices for referring to third parties,the broad aim of this paper is to show that whilst the selection of referring expression is based on complex,deeply social and cultural conventions,it is also a highly systematic and orderly activity. More specifically,this paper explores an interactional 'puzzle' contained in a single piece of data,in which a daughter — in conversation with her mother — refers to her father( her mother's ex-husband) in three different ways in quick succession. In doing so,we illustrate the potential interactional import of referring expressions for accomplishing social action beyond indexing an individual. In analysing this single case,one procedure for doing conversation analytic work is also illustrated. That is,in contrast to building and analysing collections,this paper draws on and applies what is already known from previous conversation analytic literature about practices for referring to persons. In analysing one fragment in which reference to a third party is made,we will review the fundamentals of the organisation of person reference in English. 展开更多
关键词 conversation analysis person reference referring to third parties analysing single cases
在线阅读 下载PDF
INSTRUCTIONS FOR AUTHORS
5
《Applied Mathematics and Mechanics(English Edition)》 2025年第12期I0011-I0012,共2页
1Legal requirements The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and t... 1Legal requirements The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and that the publisher will not be held legally responsible should there be any claims for compensation.Authors wishing to include figures or text passages that have already been published elsewhere are required to obtain permission from the copyright holder(s)and to include evidence that such permission has been granted when submitting their papers.Any material received without such evidence will be assumed to originate from the authors. 展开更多
关键词 permissions copyright third parties manuscript submission figures text passages publisher liability legal requirements
在线阅读 下载PDF
INSTRUCTIONS FOR AUTHORS
6
《Applied Mathematics and Mechanics(English Edition)》 2025年第11期I0001-I0002,共2页
1Legal requirements.The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and t... 1Legal requirements.The author(s)guarantee(s)that the manuscript will not be published elsewhere in any language without the consent of the copyright holders,that the rights of third parties will not be violated,and that the publisher will not be held legally responsible should there be any claims for compensation.Authors wishing to include figures or text passages that have already been published elsewhere are required to obtain permission from the copyright holder(s)and to include evidence that such permission has been granted when submitting their papers.Any material received without such evidence will be assumed to originate from the authors. 展开更多
关键词 permissions copyright third parties manuscript submission figures text passages publisher liability legal requirements
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部