期刊文献+
共找到65,560篇文章
< 1 2 250 >
每页显示 20 50 100
针刺临床试验中假针刺对照报告指南ACURATE与SHARE比较分析
1
作者 刘川杨 李斌艳 +4 位作者 段炎珊 周航 王宇 屠建锋 王丽琼 《中国循证医学杂志》 北大核心 2025年第4期485-490,共6页
为了给研究者未来选用和优化针刺临床试验中假针刺报告指南提供建议,本研究通过定性分析对中韩两国研究人员分别制订的针刺临床试验中假针刺对照报告指南与清单(SHARE)和临床试验与实验针刺对照报告指南(ACURATE)的基本信息及具体内容... 为了给研究者未来选用和优化针刺临床试验中假针刺报告指南提供建议,本研究通过定性分析对中韩两国研究人员分别制订的针刺临床试验中假针刺对照报告指南与清单(SHARE)和临床试验与实验针刺对照报告指南(ACURATE)的基本信息及具体内容进行比较,并结合具体案例阐明两者的异同点。本研究发现与既往针刺临床试验干预措施报告规范(STRICTA)和安慰剂和假干预对照的报告指南和清单(TIDieR-Placebo)相比,ACURATE指南与SHARE指南均强调假针刺对照细节与背景因素的报告,但在内容上各有特点与侧重。条目划分方面,ACURATE通过将主题内容拆分以强调单个条目的重要性;SHARE通过将多个条目合并以强调报告内容的全面性。具体内容方面,ACURATE强调合并治疗、向受试者提供的假针刺信息及真/假针刺在治疗设置等方面的任何差异,对于假针刺对照设置具有借鉴价值;SHARE侧重于对假针刺细节、操作者及方案调整等内容的报告。通过案例发现对两项指南均有条目存在未报告或部分报告的情况,建议未来研究者在进行假针刺对照的报告时可以结合使用两项指南,并对以上两项指南的可操作性与实用性进行验证,为两者的持续优化与更新提供建议。 展开更多
关键词 针刺 报告指南 针刺临床试验 ACURATE指南 SHARE指南
原文传递
Pursuing a Global Community of Shared Future and Advancing Toward a Brighter Future
2
作者 《Qiu Shi》 2025年第1期61-72,共12页
The vision of building a global community of shared future is a core tenet of Xi Jinping thought on diplomacy.Since it was first proposed in 2013,this concept has exhibited tremendous vitality,evolving from a conceptu... The vision of building a global community of shared future is a core tenet of Xi Jinping thought on diplomacy.Since it was first proposed in 2013,this concept has exhibited tremendous vitality,evolving from a conceptual proposition to a well-conceived system,from a promising vision to practical outcomes. 展开更多
关键词 building global community shared future practical outcomes Xi Jinping thought diplomacy global community shared future conceptual proposition
原文传递
IncEFL:a sharing incentive mechanism for edge-assisted federated learning in industrial IoT
3
作者 Jiewei Chen Shaoyong Guo +3 位作者 Tao Shen Yan Feng Jian Gao Xuesong Qiu 《Digital Communications and Networks》 2025年第1期106-115,共10页
As the information sensing and processing capabilities of IoT devices increase,a large amount of data is being generated at the edge of Industrial IoT(IIoT),which has become a strong foundation for distributed Artific... As the information sensing and processing capabilities of IoT devices increase,a large amount of data is being generated at the edge of Industrial IoT(IIoT),which has become a strong foundation for distributed Artificial Intelligence(AI)applications.However,most users are reluctant to disclose their data due to network bandwidth limitations,device energy consumption,and privacy requirements.To address this issue,this paper introduces an Edge-assisted Federated Learning(EFL)framework,along with an incentive mechanism for lightweight industrial data sharing.In order to reduce the information asymmetry between data owners and users,an EFL model-sharing incentive mechanism based on contract theory is designed.In addition,a weight dispersion evaluation scheme based on Wasserstein distance is proposed.This study models an optimization problem of node selection and sharing incentives to maximize the EFL model consumers'profit and ensure the quality of training services.An incentive-based EFL algorithm with individual rationality and incentive compatibility constraints is proposed.Finally,the experimental results verify the effectiveness of the proposed scheme in terms of positive incentives for contract design and performance analysis of EFL systems. 展开更多
关键词 Federated learning Data sharing Edge intelligence INCENTIVES Contract theory
在线阅读 下载PDF
A Trusted Distributed Oracle Scheme Based on Share Recovery Threshold Signature
4
作者 Shihao Wang Xuehui Du +4 位作者 Xiangyu Wu Qiantao Yang Wenjuan Wang Yu Cao Aodi Liu 《Computers, Materials & Continua》 2025年第2期3355-3379,共25页
With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become ... With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become a research hotspot, and the security of the oracle responsible for providing reliable data has attracted much attention. The most widely used centralized oracles in blockchain, such as Provable and Town Crier, all rely on a single oracle to obtain data, which suffers from a single point of failure and limits the large-scale development of blockchain. To this end, the distributed oracle scheme is put forward, but the existing distributed oracle schemes such as Chainlink and Augur generally have low execution efficiency and high communication overhead, which leads to their poor applicability. To solve the above problems, this paper proposes a trusted distributed oracle scheme based on a share recovery threshold signature. First, a data verification method of distributed oracles is designed based on threshold signature. By aggregating the signatures of oracles, data from different data sources can be mutually verified, leading to a more efficient data verification and aggregation process. Then, a credibility-based cluster head election algorithm is designed, which reduces the communication overhead by clarifying the function distribution and building a hierarchical structure. Considering the good performance of the BLS threshold signature in large-scale applications, this paper combines it with distributed oracle technology and proposes a BLS threshold signature algorithm that supports share recovery in distributed oracles. The share recovery mechanism enables the proposed scheme to solve the key loss issue, and the setting of the threshold value enables the proposed scheme to complete signature aggregation with only a threshold number of oracles, making the scheme more robust. Finally, experimental results indicate that, by using the threshold signature technology and the cluster head election algorithm, our scheme effectively improves the execution efficiency of oracles and solves the problem of a single point of failure, leading to higher scalability and robustness. 展开更多
关键词 Blockchain threshold signature distributed oracle data submission share recovery
在线阅读 下载PDF
A pure quantum secret sharing scheme based on GHZ basis measurement and quantum entanglement exchange
5
作者 Bai Liu Jun Zhang +1 位作者 Shupin Qiu Mingwu Zhang 《Chinese Physics B》 2025年第3期95-102,共8页
At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing schemes.With the increasing maturity of quantum technology,QSS protocols based on pure ... At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing schemes.With the increasing maturity of quantum technology,QSS protocols based on pure quantum mechanics are becoming more important.Classical secret sharing schemes cannot achieve absolute security,and their involvement can compromise the security of QSS protocols.This paper proposes a QSS scheme based on Greenberger-Horn-Zeilinger(GHZ)basis measurement and quantum entanglement exchange.In this protocol,the secret sender stores the secret information using Pauli operations.Participants obtain their shares by measuring the product state sequentially.Finally,participants complete the secret reconstruction through quantum entanglement exchange and other related quantum operations.In addition,the particles held by participants in the protocol do not contain any secret information.Each participant's particles are in a state of maximum entanglement,and no participant can deduce the particle information of other participants through their own particles.At the same time,the protocol is based on pure quantum mechanics and does not involve classical schemes,which avoids the problem of reduced security of the protocol.Security analysis indicates that the protocol is not vulnerable to retransmission interception and collusion attacks.Moreover,it is capable of detecting and terminating the protocol promptly when facing with attacks from dishonest participants. 展开更多
关键词 quantum secret sharing projection measurement quantum entanglement exchange THRESHOLD
在线阅读 下载PDF
Blockchain-Based Framework for Secure Sharing of Cross-Border Trade Data
6
作者 Shenjian Xiao Xiaoli Qin +1 位作者 Yanzhao Tian Zhongkai Dang 《Computers, Materials & Continua》 2025年第5期2351-2373,共23页
The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,inclu... The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,including enterprises,agents,and government departments.However,the urgent issue that requires immediate attention is how to achieve secure and efficient cross-border data sharing among these government departments and enterprises in complex trade processes.In addressing this need,this paper proposes a data exchange architecture employing Multi-Authority Attribute-Based Encryption(MA-ABE)in combination with blockchain technology.This scheme supports proxy decryption,attribute revocation,and policy update,while allowing each participating entity to manage their keys autonomously,ensuring system security and enhancing trust among participants.In order to enhance system decentralization,a mechanism has been designed in the architecture where multiple institutions interact with smart contracts and jointly participate in the generation of public parameters.Integration with the multi-party process execution engine Caterpillar has been shown to boost the transparency of cross-border information flow and cooperation between different organizations.The scheme ensures the auditability of data access control information and the visualization of on-chain data sharing.The MA-ABE scheme is statically secure under the q-Decisional Parallel Bilinear Diffie-Hellman Exponent(q-DPBDHE2)assumption in the random oracle model,and can resist ciphertext rollback attacks to achieve true backward and forward security.Theoretical analysis and experimental results demonstrate the appropriateness of the scheme for cross-border data collaboration between different institutions. 展开更多
关键词 Multi-authority attribute based encryption blockchain data sharing access control
在线阅读 下载PDF
FORGING TIGHTER BONDS Building an even closer China-Indonesia community with a shared future
7
作者 Luo Yongkun 《China Report ASEAN》 2025年第4期18-19,共2页
Since the establishment of diplomatic relations between China and Indonesia in April 1950,the relations between the two countries have undergone rapid development and withstood numerous tests.Since the resumption of d... Since the establishment of diplomatic relations between China and Indonesia in April 1950,the relations between the two countries have undergone rapid development and withstood numerous tests.Since the resumption of diplomatic relations in 1990,the two countries have deepened cooperation in all fields and continuously upgraded political relations. 展开更多
关键词 establishment diplomatic relations diplomatic relations Indonesia shared future political relations
在线阅读 下载PDF
Joint Watermarking and Encryption for Social Image Sharing
8
作者 Conghuan Ye Shenglong Tan +3 位作者 Shi Li Jun Wang Qiankun Zuo Bing Xiong 《Computers, Materials & Continua》 2025年第5期2927-2946,共20页
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social... With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social images.However,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial domain.In this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and encryption.First,the fingerprint code with a hierarchical community structure is designed based on social network analysis.Then,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is employed.After that,all codeword segments are embedded into the LL,LH,and HL subbands,respectively.The selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our method.Further,the superiority of the technique is elaborated through comparison with some related image security algorithms.The solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social platforms.With the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured. 展开更多
关键词 Multimedia security digital watermarking image encryption image sharing privacy protection
在线阅读 下载PDF
Unveiling the hidden connection:Investigating the relationship between shared leadership and missed nursing care
9
作者 Amal Diab Ghanem Atalla Naglaa Abdelaziz Mahmoud Elseesy +5 位作者 Ayman Mohamed El-Ashry Samia Mohamed Sobhi Mohamed Ebaa Marwan Felemban Abdulhafith Alharbi Nervana Abdelrahman Saied Gheith Sabrein Mahmoud khalifa khattab 《International Journal of Nursing Sciences》 2025年第1期12-18,I0001,共8页
Objectives:This study examined the levels of shared leadership and missed nursing care and their relationship among nurses in Egypt.Methods:A cross-sectional survey was conducted.From February to April 2024,340 nurses... Objectives:This study examined the levels of shared leadership and missed nursing care and their relationship among nurses in Egypt.Methods:A cross-sectional survey was conducted.From February to April 2024,340 nurses worked in all inpatient care units at Alexandria Main University Hospital.The Shared Leadership and Missed Nursing Care Survey was used for evaluation.Results:The overall score of shared leadership was(72.62±4.30),which imitates a high perception of shared leadership among nurses;the dimension of delegation achieved the highest average mean score(3.66±0.26),followed by collaboration(3.64±0.31),the vision dimension scored the lowest mean score(3.59±0.33).The elements of missed nursing care had a total score of(46.72±5.69),and the dimension of secondary care achieved the highest average mean score(3.74±0.31).The reasons for missed nursing care had a total mean score of(22.40±1.59),and the dimension of labor resources achieved the highest average mean score(3.20±0.22).Male nurses,less than 30 years old,married,held a bachelor’s degree in nursing sciences,less than five years of experience in the nursing profession,and less than five years of experience in the current working unit had higher total scores of the shared leadership and lower total scores of missed nursing care(P<0.001).A negative correlation existed between shared leadership and two dimentisons(the elements of nursing care[r=-0.383],the reasons for missing nursing care[r=-0.047])(P<0.001).Conclusions:The study’s findings can help as a theoretical underpinning for nursing leaders to stand in an environment that reduces the incidence of missed nursing care by encouraging teamwork,responsibility,workload management,and empowerment among nurses. 展开更多
关键词 Missed nursing care Nurses Nursing administration research Shared leadership
在线阅读 下载PDF
Interpretation of SHARE:SHam Acupuncture REporting guidelines and a checklist in clinical trials
10
作者 Xiao-yu LIU Pei-hong MA +1 位作者 Bao-yan LIU Shi-yan YAN 《World Journal of Acupuncture-Moxibustion》 2025年第1期27-31,共5页
Sham acupuncture,as a control intervention in acupuncture studies,has been widely conducted to eval-uate the specific effect of acupuncture.However,there was no relevant particular reporting guideline,so the reporting... Sham acupuncture,as a control intervention in acupuncture studies,has been widely conducted to eval-uate the specific effect of acupuncture.However,there was no relevant particular reporting guideline,so the reporting quality of sham acupuncture was low,which could hinder the precise understanding and interpretation of details and implementation background of sham acupuncture by researchers.In order to standardize the reporting of sham acupuncture and improve its quality,SHam Acupuncture REporting guidelines and a checklist in clinical trials(SHARE)was developed by a research team from Beijing Univer-sity of Chinese Medicine.The SAHRE standardizes the reporting of sham acupuncture from 10 categories,including brief name,rationales,details of sham acupuncture,treatment regimen of sham acupuncture,the information informed or explained to patients,practitioner information,modifications of protocol,communication between practitioner and patient,practitioner adherence and blinding.This article elab-orates the development process and key content of SHARE in order to facilitate its application by re-searchers. 展开更多
关键词 Sham acupuncture Reporting guidelines Reporting checklist SHARE Acupuncture clinical trials
原文传递
Stronger Ties and a Shared Future Indonesian Ambassador Djauhari Oratmangun reflects on 75 years of Indonesia-China relations and prospects for deeper collaboration
11
作者 Huang Jiangqin 《China Report ASEAN》 2025年第4期22-23,共2页
The year 2025 marks the 75th anniversary of the establishment of diplomatic relations between China and Indonesia.Over the past 75 years,the bilateral relationship has made significant progress across various fields,l... The year 2025 marks the 75th anniversary of the establishment of diplomatic relations between China and Indonesia.Over the past 75 years,the bilateral relationship has made significant progress across various fields,laying a solid foundation for regional stability.China Report ASEAN interviewed Indonesian Ambassador to China Djauhari Oratmangun to reflect on the remarkable journey of Indonesia-China relations over the past 75 years. 展开更多
关键词 Indonesia China relations regional stability djauhari oratmangun diplomatic relations th anniversary bilateral relationship shared future
在线阅读 下载PDF
Analysis of health insurance reform strategies from a risk-sharing perspective based on the Markov model
12
作者 XU Pengyu ZHAO Lindu 《Journal of Southeast University(English Edition)》 2025年第1期118-126,共9页
China’s healthcare system faces increasing challenges,including surging medical costs,resource allocation imbalances favoring large hospitals,and ineffective referral mechanisms.The lack of a unified strategy integra... China’s healthcare system faces increasing challenges,including surging medical costs,resource allocation imbalances favoring large hospitals,and ineffective referral mechanisms.The lack of a unified strategy integrating standardized coverage with personalized payment compounds these issues.To this end,this study proposes a risk-sharing reform strategy that combines equal coverage for the same disease(ECSD)with an individualized out-of-pocket(I-OOP)model.Specifically,the study employs a Markov model to capture patient transitions across health states and care levels.The findings show that ECSD and I-OOP enhance equity by standardizing disease coverage while tailoring costs to patient income and facility type.This approach alleviates demand on high-tier hospitals,promoting primary care utilization and enabling balanced resource distribution.The study’s findings provide a reference for policymakers and healthcare administrators by presenting a scalable framework that is aligned with China’s development goals with the aim of fostering an efficient,sustainable healthcare system that is adaptable to regional needs. 展开更多
关键词 equal coverage for the same disease(ECSD) individualized out-of-pocket(I-OOP) health insurance reform risk sharing Markov model
在线阅读 下载PDF
WSN Lifetime Maximization:Effects of Energy-Sharing and UGV Mobility
13
作者 Xia Minghua Wu Peiran +2 位作者 Chen Erhu Zhao Junhui Wu Yik-Chung 《China Communications》 2025年第4期236-253,共18页
The lifetime of a wireless sensor network(WSN)is crucial for determining the maximum duration for data collection in Internet of Things applications.To extend the WSN's lifetime,we propose deploying an unmanned gr... The lifetime of a wireless sensor network(WSN)is crucial for determining the maximum duration for data collection in Internet of Things applications.To extend the WSN's lifetime,we propose deploying an unmanned ground vehicle(UGV)within the energy-hungry WSN.This allows nodes,including sensors and the UGV,to share their energy using wireless power transfer techniques.To optimize the UGV's trajectory,we have developed a tabu searchbased method for global optimality,followed by a clustering-based method suitable for real-world applications.When the UGV reaches a stopping point,it functions as a regular sensor with ample battery.Accordingly,we have designed optimal data and energy allocation algorithms for both centralized and distributed deployment.Simulation results demonstrate that the UGV and energy-sharing significantly extend the WSN's lifetime.This effect is especially prominent in sparsely connected WSNs compared to highly connected ones,and energy-sharing has a more pronounced impact on network lifetime extension than UGV mobility. 展开更多
关键词 data flow energy flow energy sharing unmanned ground vehicle(UGV) wireless power transfer(WPT) wireless sensor networks(WSNs)
在线阅读 下载PDF
安心卡引导的尊严照护干预联合SHARE模式在肿瘤患者安宁疗护中的应用
14
作者 申青 《黑龙江医学》 2024年第13期1633-1636,共4页
目的:探讨和分析安心卡引导的尊严照护干预联合SHARE模式在肿瘤患者安宁疗护中的应用,为临床提供参考。方法:选取2022年1—12月郑州市第三人民医院收治的68例肿瘤患者作为研究对象。对照组(34例)采取传统的照护方法和告知模式,试验组(34... 目的:探讨和分析安心卡引导的尊严照护干预联合SHARE模式在肿瘤患者安宁疗护中的应用,为临床提供参考。方法:选取2022年1—12月郑州市第三人民医院收治的68例肿瘤患者作为研究对象。对照组(34例)采取传统的照护方法和告知模式,试验组(34例)采取安心卡引导的尊严照护方法和SHARE告知模式,比较两组患者的自尊水平、死亡态度、焦虑情绪、睡眠质量状况。结果:干预后,两组患者的自尊水平测定分数均增高,试验组的自尊水平测定分数显著高于对照组,差异有统计学意义(t=4.218,P<0.05);干预后,试验组的害怕、回避死亡态度得分显著低于对照组,自然接受、接近接受死亡态度得分显著高于对照组,差异有统计学意义(t=10.119、3.222、17.142、6.278,P<0.05);干预后,两组患者的焦虑情绪得分均降低,试验组焦虑情绪得分显著低于对照组,差异有统计学意义(t=18.739,P<0.05);干预后,两组患者的睡眠质量得分均降低,试验组睡眠质量得分显著低于对照组,差异有统计学意义(t=10.746,P<0.05);干预后,两组患者的疼痛程度得分均降低,干预后试验组疼痛程度得分显著低于对照组,差异有统计学意义(t=9.685,P<0.05)。结论:安心卡引导的尊严照护干预联合SHARE模式在肿瘤患者安宁疗护中,有利于肿瘤患者疾病治疗和身心健康发展,可供临床参考。 展开更多
关键词 安心卡 尊严照护 SHARE模式 癌症告知 安宁疗护
在线阅读 下载PDF
非暴力沟通联合think-pair-share模式培训在普外科护士在职培训中的应用研究
15
作者 陈钧 潘红英 +2 位作者 肖悦 王娅娅 姚林燕 《中国高等医学教育》 2024年第7期132-133,136,共3页
目的:探讨非暴力沟通联合think-pair-share(TPS)模式培训在普外科护士在职培训中的应用效果。方法:2020年10月至2021年10月选取本院普外科的4个护理单元,通过随机抽签法分为试验组和对照组,试验组参加非暴力沟通联合TPS模式培训,对照组... 目的:探讨非暴力沟通联合think-pair-share(TPS)模式培训在普外科护士在职培训中的应用效果。方法:2020年10月至2021年10月选取本院普外科的4个护理单元,通过随机抽签法分为试验组和对照组,试验组参加非暴力沟通联合TPS模式培训,对照组参与常规非暴力沟通培训。对比两组护士临床沟通能力、患者满意度以及教学满意度的差异。结果:试验组护士临床沟通能力、患者满意度、教学满意度调查结果均优于对照组(P<0.001)。结论:非暴力沟通联合TPS模式培训在普外科护士在职培训中能提高普外科护士的护患沟通能力,提升其岗位胜任力。 展开更多
关键词 非暴力沟通 think-pair-share 外科 护士 在职培训
在线阅读 下载PDF
Improved Multipartite Quantum Secret Sharing Protocol Using Preshared Greenberger-Horne-Zeilinger States 被引量:3
16
作者 谢灯 叶明勇 李兴华 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第12期1027-1030,共4页
Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHo... Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHorne -Zeilinger(GHZ) states.This protocol is robust against eavesdropping and could be used for the circumstance of many parties. 展开更多
关键词 secret sharing Greenberger-Horne-Zeilinger state quantum cryptography
在线阅读 下载PDF
Mock Impoliteness and Co-Construction of Hudui Rituals in Chinese Online Interaction 被引量:1
17
作者 Linsen ZHAO 《Chinese Journal of Applied Linguistics》 2020年第1期45-63,126,共20页
This paper examines an under-researched phenomenon of mock impoliteness in Chinese online interaction,namely,the practice of hudui(lit.reciprocal jocular abuse)as a solidarity enhancing device among acquaintances.Draw... This paper examines an under-researched phenomenon of mock impoliteness in Chinese online interaction,namely,the practice of hudui(lit.reciprocal jocular abuse)as a solidarity enhancing device among acquaintances.Drawing on data from Qzone interaction among Chinese university students,this study focuses on ritual features,sequential patterns and interpersonal functions of hudui through the lens of Kádár’s(2013,2017)interpersonal ritual theory.The results show that hudui is co-constructed by the online participants with the symmetric pattern of mutual abuse,which distinguishes it from previous studies of jocular abuse(i.e.,the asymmetric pattern of abuser–recipient).They also reveal that hudui accomplishes various kinds of relational work,including fostering intimacy,enhancing mutual affection-based face and creating amusement. 展开更多
关键词 mock impoliteness hudui rituals co-construction Chinese online interaction
在线阅读 下载PDF
Mechanism for Building Child-Friendly Communities Based on Multi-Party Co-Construction:A Case Study on Community Practice in Changsha 被引量:1
18
作者 Shen Yao Jin Ranran +2 位作者 Liao Yuhui Xie Chang Li Min(Translated) 《China City Planning Review》 CSCD 2021年第4期43-54,共12页
Based on the interpretation of the Child-Friendly Cities Initiative(CFCI),this paper empirically demonstrates an effective action mechanism for building child-friendly communities in the policy context of multi-party ... Based on the interpretation of the Child-Friendly Cities Initiative(CFCI),this paper empirically demonstrates an effective action mechanism for building child-friendly communities in the policy context of multi-party co-construction by taking urban communities in Changsha as a longterm practice base.Through analyzing the characteristics of roles and action mechanisms of participants in three different types of child-friendly communities,namely Fengquan Gujing Community,Xingfuli Community,and Baziqiang Community in Changsha,it finds that social forces,such as the community Party organization,enterprises,universities,social organizations,elementary and secondary schools of the community,and mass organizations,are"participants"in building child-friendly communities and mobilizing residents(including children).In addition,the three necessary conditions for building a child-friendly community are"core guideline,""awareness consensus,"and"action coordination."All parties involved need to act together based on one platform,with one party playing a central role in connecting the top and the bottom and integrating resources.Among the three communities which have benefited from Changsha’s child-friendly city policy environment,Fengquan Gujing Community stands out in terms of the effectiveness of multi-party co-construction by giving full play to the central role of the community Party organization and the university’s role in improving awareness consensus. 展开更多
关键词 multi-party co-construction child-friendly communities building mechanism the Child-Friendly Cities Initiative
原文传递
长三角城市群经济韧性测度与分析——基于Shift-Share的经济韧性分解
19
作者 王欢芳 陈素月 《兰州财经大学学报》 2024年第2期48-61,共14页
以长三角城市群27个城市为研究对象,测度2008—2010年抵抗期和2010—2019年恢复期城市群经济韧性水平,并进一步运用Shift-Share分解方法探索长三角城市群经济韧性内在影响机制。研究显示:抵抗期和恢复期中长三角城市群经济韧性均值分别... 以长三角城市群27个城市为研究对象,测度2008—2010年抵抗期和2010—2019年恢复期城市群经济韧性水平,并进一步运用Shift-Share分解方法探索长三角城市群经济韧性内在影响机制。研究显示:抵抗期和恢复期中长三角城市群经济韧性均值分别为0.309和0.301,均强于全国层面经济韧性水平;Shift-Share分解后发现竞争力分量对各城市经济韧性水平提升起到决定性作用,抵抗期阶段主要由第二、三产业共同作用影响经济韧性水平;恢复期阶段则以第二产业竞争力为主导力量,同时以第三产业竞争力作为辅助力量。通过实证探究长三角城市群经济一体化发展的规律和特点,为增强中国经济韧性提出相关建议,助力中国经济高质量发展。 展开更多
关键词 长三角城市群 经济韧性 Shift-Share分解 产业结构 竞争力
在线阅读 下载PDF
Multi-dimensional multiplexing optical secret sharing framework with cascaded liquid crystal holograms 被引量:3
20
作者 Keyao Li Yiming Wang +6 位作者 Dapu Pi Baoli Li Haitao Luan Xinyuan Fang Peng Chen Yanqing Lu Min Gu 《Opto-Electronic Advances》 SCIE EI CAS CSCD 2024年第1期28-35,共8页
Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since... Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display. 展开更多
关键词 holographic encryption optical secret sharing cascaded liquid crystal hologram multi-dimensional multiplexing
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部