首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 437 毫秒
1.
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications. Project (No. 45.6.1-017) supported by the National Defense Pre-Research Fund of China  相似文献   

2.
主动性人格指个体采取主动行为影响周围环境的一种稳定倾向。主动性人格的测量工具有完整版与简缩版。在简缩版上有文化及被试群体的差异。作为一种独特的人格特质,主动性人格对个体具有积极的心理功能,能提升人的工作绩效,促进职业适应与职业生涯发展。主动性人格与工作绩效、职业生涯的关系成为当前研究的主题。未来研究应该进一步清晰主动性人格的结构,重视青少年主动性人格与学习的关系、主动性人格的发展与教育的研究。  相似文献   

3.
In the delayed matching of key location procedure, pigeons must remember the location of the sample key in order to choose correctly between two comparison keys. The deleterious effect of short intertrial intervals on key location matching found in previous studies suggested that pigeons’ short-term spatial memory is affected by proactive interference. However, because a reward expectancy mechanism may account for the intertriai interval effect, additional research aimed at demonstrating proactive interference was warranted. In Experiment 1, matching accuracy did not decline from early to late trials within a session, a finding inconsistent with a proactive interference effect. In Experiment 2, evidence suggestive of proactive interference was found: Matching was more accurate when the locations that served as distractors and as samples were chosen from different sets. However, this effect could have been due to differences in task difficulty, and the results of the two subsequent experiments provided no evidence of proactive interference. In Experiment 3, the distractor on Trialn was either the location that had served as the sample on Trialn ? 1 or one that had been a sample on earlier trials. Matching accuracy was not inferior on the former type of trial. In Experiment 4, the stimuli that served as samples and distractors were taken from sets containing 2, 3, 5, or 9 locations. Matching accuracy was no worse, actually slightly better, with smaller memory set sizes. Overall, these findings suggested that pigeons’ memory for spatial location may be immune to proactive interference. However, when, in Experiment 5, an intratrial manipulation was used, clear evidence of proactive interference was found: Matching accuracy was considerably lower when the sample was preceded by the distractor for that trial than when it was preceded by the sample or by nothing. Possible reasons why interference was produced by intratrial but not intertrial manipulations are discussed, as are implications of these data for models of pigeons’ short-term spatial memory.  相似文献   

4.
New demands and high attrition levels of special education teachers have created a crisis for education and extensive additional stress for special education directors and principals. The critical shortage of highly qualified special education teachers has significantly increased the pressure to hire and retain them. This article discusses factors that affect teacher attrition and proactive recommendations to address the shortage. In addition, the authors make suggestions for systemic reform and improvement of the level of job satisfaction for special education teachers.  相似文献   

5.
Teacher performance evaluation plays a key role in educational personnel reform, so it has been an important yet difficult issue in educational reform. Previous evaluations on teachers failed to make strict distinction among the three dominant types of evaluation, namely, capability, achievement, and effectiveness. Moreover, teacher performance evaluation was usually restricted to task performance, neglecting contextual performance. Most researches done in teachers’ evaluation were only about college teachers. This paper suggests that teacher performance evaluation should find its theoretical foundation in teacher performance constructs. After making literature review, critical case study, critical interview, and qualitative research, the authors propose a new construct of teacher performance and make necessary analysis for the construct of reliability and validity in empirical approaches. Translated from Teacher Education Research, 2005, 1  相似文献   

6.
When pigeons are trained on a delayed conditional discrimination with presence versus absence samples and tested with delays, a bias to choose the comparison associated with the absence sample is observed with increasing delay. Additionally, when the samples consist of food versus no food, this trial-type performance difference is reversed on short-delay trials: a bias to choose the comparison associated with the presence sample develops with delay testing. This reversal in comparison bias at short delays has been attributed to a preference produced by backward associations between the hedonic samples and the nonhedonic choice stimuli. In the present experiment, we tested an alternative hypothesis, that the short-delay comparison bias is produced by proactive interference—in particular, from reinforcement obtained on the previous trial—by including a group trained with reinforcement on only half of the trials with a correct response. According to the proactive interference account, this group should have shown a smaller short-delay comparison bias than would the typical 100% reinforcement group. Instead, consistent with a backward-association interpretation, the magnitude of the short-delay comparison bias shown by the 50% group was significantly greater than that shown by the 100% group.  相似文献   

7.
As institutions of Higher Education face up to current legislation, there is a growing pressure on them to clarify and establish their processes of monitoring and enhancing standards. This paper proposes that it is of benefit to institutions when they move from being merely reactive in meeting others’ performance indicators towards taking a proactive approach and developing their own system of review. The authors draw on their experience of applying personal construct theory to present a deliberative evaluation process which involves staff and student perspectives in collaborative review. The authors’ acknowledge the interest and financial support given by the CNAA in the production of an evaluation kit of which an adaptation of this paper forms a part. Further details of the kit (video and supporting booklet) can be obtained from one of the authors at the College of S. Mark and S. John, Derriford Road, Plymouth PL6 8BH.  相似文献   

8.
As institutions of Higher Education face up to current legislation, there is a growing pressure on them to clarify and establish their processes of monitoring and enhancing standards. This paper proposes that it is of benefit to institutions when they move from being merely reactive in meeting others’ performance indicators towards taking a proactive approach and developing their own system of review. The authors draw on their experience of applying personal construct theory to present a deliberative evaluation process which involves staff and student perspectives in collaborative review. The authors’ acknowledge the interest and financial support given by the CNAA in the production of an evaluation kit of which an adaptation of this paper forms a part. Further details of the kit (video and supporting booklet) can be obtained from one of the authors at the College of S. Mark and S. John, Derriford Road, Plymouth PL6 8BH.  相似文献   

9.
针对在电网连锁跳闸场景下,提出一种对电网临界初始运行状态的搜索方法。首先,根据系统在连锁跳闸时的具体表现,结合线路电流型后备保护的动作行为,给出判断电网连锁跳闸的数学表示形式,并对支路在连锁跳闸时的临界状态进行全面分析。其次,建立寻找距离当前电网初始运行状态最近的连锁跳闸临界初始运行状态的优化模型。最后,通过聚类分析法,筛选出连锁受扰支路上的关键节点,基于关键节点用改进的粒子群算法在IEEE-14节点系统上进行仿真研究。分析结果表明,该方法可以对连锁跳闸时的临界状态进行有效搜索,从而帮助运行人员观察当前运行状态的安全情况。  相似文献   

10.
我国社会保障改革的困境与政府责任缺失的相关分析   总被引:1,自引:0,他引:1  
中国社会保障面临的突出问题是:社会保障覆盖面过窄,扩面受到现有体制和管理机制的约束;统筹层次偏低,提升统筹层次受到区域发展不均衡和地方既得利益的阻碍;几种主要社会保险制度均面临财务上不可持续问题,尤其是养老保险潜在的资金缺口巨大。突破我国社会保障困境的关键是强化政府责任。强化政府资金投入职责,承担起对"隐性社会保障债务"的清偿责任;强化政府的社会保障立法职责和管理职责,建立以中央政府为主导,采取中央政府集中管理与地方政府分级管理的、统一立法、统一政策和统一制度的社会保障治理结构;合理划分中央政府责任和地方政府责任,并在人大立法中对此予以明确。  相似文献   

11.
In this article the authors present a critical assessment of existing characterizations of resiliency and help-seeking behavior in light of their relevance to issues of minority youth socialization and schooling. In this effort, they reconceptualize the notion of resiliency within an analysis that highlights the more contextual aspects of how minority adolescent cope with structural forces that threaten healthy development. They show how key developmental transitions are thwarted by social forces that undermine the development of supportive relationships across multiple institutional sites (e.g., family, neighborhood, school). They also explain how resiliency is associated with egocentric networks that exhibit key structural characteristics. The authors conclude by discussing the implications of a critical network-analytic model of minority socialization in the development of future educational and youth mediations and reforms.  相似文献   

12.
The fastest-growing group in postsecondary education is part-time faculty. The authors examine why the number of part-time faculty has increased so rapidly and then discuss some of the problems that part-timers face. Part-timers are increasing in academe, and administrators need to treat and evaluate them effectively and fairly. The authors recommend mentoring, job security, compensation, and self-worth as ways to improve performance.  相似文献   

13.
农村教师社会保障的缺失与完善   总被引:1,自引:0,他引:1  
农村教师社会保障既是我国社会保障体系的一个重要组成部分,也是关系农村教育发展和农村和谐稳定的重要因素。本文侧重从社会保障制度运行的物质基础角度剖析当前农村教师社会保障缺失的根源,在此基础上提出了以推进农村教师社会保障的社会化进程、健全农村教师工资保障机制、建立基本养老保险与失业保险等为主要内容的促进农村教师社会保障体系完善的基本思路。  相似文献   

14.
INTRODUCTION Wireless communications is advancing rapidly in recent years. After 2G (e.g. GSM) widely deployed in the world, 3G mobile communication systems are spreading step by step in many areas. At present, some countries have already launched investigations beyond 3G (B3G) and 4G. Along with the wireless communications’ rapid development, the secure ac-cess authentication of the users within wireless net-works is becoming very critical, and so, more and more attention is focused…  相似文献   

15.
PKI(Public Key Infrasture)是目前保障信息安全的最佳技术之一,是为用户提供信息安全服务的基础设施.认证机构是PKI中的一个实体,遵循PKI的策略,负责发布数字证书.椭圆曲线密码体制(ECC)具有密钥短、单位安全强度高、计算效率高等优势.在PKI中引入椭圆曲线密码体制更加适合网络安全的发展要求.  相似文献   

16.
17.
Strategies student-teachers employ in classroom interaction with pupils during teaching practice periods are surprisingly understudied, considering that the teaching practicum provides a central arena for student-teachers learning to become teachers. This study investigates the primary strategies student-teachers utilised in classroom interaction and the multiple qualities of these strategies. The data were collected from 31 student-teachers during their teaching practicum through stimulated recall (STR) interviews focusing on challenging and empowering critical incidents that student-teachers chose from their video-recorded lessons. The results showed that in challenging classroom incidents, student-teachers applied predominantly reactive behavioural strategies, whereas in the empowering situations, student-teachers primarily employed proactive cognitive and behavioural strategies. Use of proactive cognitive strategies was typically associated with positive meaningful experiences; hence, they setting the stage for utilising a more diverse set of proactive strategies in the classroom. Implications for teacher education programmes providing student-teachers authentic learning opportunities that promote proactive strategies are discussed.  相似文献   

18.
Research on aggression in the West has focused mainly on the dichotomy between proactive and reactive aggression, but not the co‐occurring proactive–reactive aggression subtype, despite its prevalence. The authors investigated the differences in psychological and behavioral correlates among proactive, reactive, and proactive–reactive student aggressors and nonaggressors in Hong Kong, China, based on their scores on the Reactive and Proactive Aggression Questionnaire. Participants were 1,356 secondary school students (805 males and 551 females, aged 11 to 18 years). A one‐way multivariate analysis of covariance was conducted to examine group differences in aggression, attention deficits, anxiety/depression, and delinquency. Results showed that proactive–reactive aggressors were significantly more aggressive, less attentive, more anxious/depressed, and more engaged in delinquent behaviors. Reactive and proactive aggressors did not differ in three of these four behaviors. Implications for research and practice when working with proactive–reactive aggressors are discussed.  相似文献   

19.
林东 《内江师范学院学报》2012,27(12):70-74,105
在分析国内外相关研究的基础上,提出以海岛旅游地本底刚性生态足迹、海岛旅游地旅游刚性生态足迹、海岛旅游地生态承载力为生态足迹法评价海岛旅游地旅游生态安全的三大关键要素.根据海岛旅游地特点,建立这三者的数学模型,在此基础上,设计了海岛旅游地旅游生态安全系数与海岛旅游地旅游生态效率指数这两个评价海岛旅游生态安全指标,并确定了这两个指标不同状态下的临界值.据此,从两个维度对海岛旅游地旅游生态安全与可持续发展程度进行较为准确的度量.  相似文献   

20.
随着科学技术的发展,U盘作为一种大容量存储设备,已成为人们移动存储的首选。然而在U盘发挥着越来越重要作用的同时,其数据安全问题也日益突出。为了提高U盘安全性,防止重要数据被他人窃取或篡改,设计并实现了一种双钥模式加密U盘。采用双钥模式,可以支持指纹和PIN码解锁U盘中存储的数据。使用INIC3861主控芯片对存储芯片中的数据进行硬件加密,结合指纹管理软件,可实现对用户身份的唯一认证以及数据安全性管理。同时设计了身份绑定认证机制,以保障各模块之间的通信安全,从而实现了对数据加密密钥的保护。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号