期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
专利情报检索语言的层次结构模式
1
作者 郑奋 《情报学报》 CSSCI 北大核心 1989年第1期35-43,共9页
关键词 专利 检索语言 层次结构模式
在线阅读 下载PDF
基于Intranet的B/S结构高校办公系统的研究与设计 被引量:2
2
作者 师云秋 王锡钢 刘丹 《鞍山师范学院学报》 2004年第4期67-68,共2页
采用信息交换平台和数据库的组合作为开发后台 ,以数据处理及分析程序作为中间层 。
关键词 办公自动化 INTRANET 层次结构(B/S)开发模式
在线阅读 下载PDF
论实验教学中常用的教学模式 被引量:4
3
作者 文军 《廊坊师范学院学报》 2002年第4期39-40,共2页
分析了实验教学中几种模式的结构与特点 ,应用教学模式要实现实验教学的高效。
关键词 实验教学 教学模式 物理教学 层次结构化教学模式 交互式教学模式 协同合作式教学模式
在线阅读 下载PDF
办公自动化系统软件的开发技术 被引量:9
4
作者 李平 张伟 王丹平 《北京联合大学学报》 CAS 2001年第2期67-71,共5页
随着通讯技术和计算机技术的发展 ,办公系统软件的开发技术也日趋于符合现代办公自动化的需求。采用信息交换平台和数据库的组合作为开发后台 ,以数据处理及分析程序作为中间层 ,以WEB作为前台的三层次结构开发模式 ,来开发一个通用的... 随着通讯技术和计算机技术的发展 ,办公系统软件的开发技术也日趋于符合现代办公自动化的需求。采用信息交换平台和数据库的组合作为开发后台 ,以数据处理及分析程序作为中间层 ,以WEB作为前台的三层次结构开发模式 ,来开发一个通用的现代办公系统 ,是当前办公系统软件开发较流行的先进技术。 展开更多
关键词 办公自动化 层次结构开发模式 接口 数据库 动态服务的网页 软件开发
在线阅读 下载PDF
An MAC Layer Aware Pseudonym (MAP) Scheme for the Software Defined Internet of Vehicles 被引量:1
5
作者 Zishan Liu Li Zhu +2 位作者 Jianwu Li Guiyang Luo Lin Zhang 《China Communications》 SCIE CSCD 2018年第9期200-214,共15页
This paper proposes a cross-layer design to enhance the location privacy under a coordinated medium access control(MAC) protocol for the Internet of Vehicles(Io V). The channel and pseudonym resources are both essenti... This paper proposes a cross-layer design to enhance the location privacy under a coordinated medium access control(MAC) protocol for the Internet of Vehicles(Io V). The channel and pseudonym resources are both essential for transmission efficiency and privacy preservation in the Io V. Nevertheless, the MAC protocol and pseudonym scheme are usually studied separately, in which a new MAC layer semantic linking attack could be carried out by analyzing the vehicles' transmission patterns even if they change pseudonyms simultaneously. This paper presents a hierarchical architecture named as the software defined Internet of Vehicles(SDIV). Facilitated by the architecture, a MAC layer aware pseudonym(MAP) scheme is proposed to resist the new attack. In the MAP, RSU clouds coordinate vehicles to change their transmission slots and pseudonyms simultaneously in the mix-zones by measuring the privacy level quantitatively. Security analysis and extensive simulations are conducted to show that the scheme provides reliable safety message broadcasting, improves the location privacy and network throughput in the Io V. 展开更多
关键词 IoV software defined network(SDN) location privacy MAC protocol cross-layer design
在线阅读 下载PDF
Application of TOPSIS Method in Support of Decisions Made in Staff Management Issues 被引量:2
6
作者 Masuma Guseyn Mammadova Zarifa Gasim Jabrailova 《Computer Technology and Application》 2013年第6期307-316,共10页
Evaluation model was proposed which refers to fuzzy formalism of the personnel management issues taking account their specific characteristics. Application of TOPSIS (technique for order Performance by similarity to ... Evaluation model was proposed which refers to fuzzy formalism of the personnel management issues taking account their specific characteristics. Application of TOPSIS (technique for order Performance by similarity to ideal solution) method for evaluation and regulation of alternatives based on hierarchically structured criteria of qualitative character by multiple experts to intellectually support decisions made in staff management issues is reviewed in the article. Candidate selection experiment based on criteria system formed using TOPSIS method for evaluation of candidates during solution of hiring problems reviewed and obtained results were compared with results obtained using Matlab program package. 展开更多
关键词 Personnel management multi-criteria evaluation criteria coefficients decision making fuzzy number TOPSIS method.
在线阅读 下载PDF
Research on failure scenarios of domes based on form vulnerability 被引量:15
7
作者 YE JiHong LIU WenZheng PAN Rui 《Science China(Technological Sciences)》 SCIE EI CAS 2011年第11期2834-2853,共20页
In this paper, form vulnerability theory was applied to the analysis of the failure mechanisms of single-layer latticed spherical shells subjected to seismic excitations. Three 1/10 scale testing models were designed ... In this paper, form vulnerability theory was applied to the analysis of the failure mechanisms of single-layer latticed spherical shells subjected to seismic excitations. Three 1/10 scale testing models were designed with characteristics as follows: Model 1 possesses overall uniform stiffness and is expected to collapse in the strength failure mode as some members become plastic; Model 2 possesses six man-made weak parts located on six radial main rib zones and is expected to collapse in the dynamic in- stability mode with all members still in the elastic stage; Model 3 strengthens the six weak zones of Model 2, and therefore, its stiffness is uniform. Model 3 is proposed to collapse in the strength failure mode when the members are still in the elastic stage By increasing the peak ground accelerations of seismic waves gradually, the shaking table tests were carried out until all three models collapsed (or locally collapsed). On the basis of form vulnerability theory, topological hierarchy models of the test models were established through a clustering process, and various failure scenarios, including overall collapse scenarios and partial collapse scenarios, were identified by unzipping corresponding hierarchical models. By comparison of the failure scenarios based on theoretical analysis and experiments, it was found that vulnerability theory could effectively reflect the weak- ness zones in topological relations of the structures from the perspective of internal causes. The intemal mechanisms of the distinct failure characteristics of reticulated shells subjected to seismic excitations were also revealed in this process. The well-formedness of structural clusters, Q, is closely related to the collapse modes, i.e., uniform changes of Q indicate a uniform distribution of overall structural stiffness, which indicates that strength failure is likely to happen; conversely, non-uniform changes of Q indicate that weak zones exist in the structure, and dynamic instability is likely to occur. 展开更多
关键词 single-layer latticed spherical shell form vulnerabifity collapse mode failure mechanism shaking table test
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部