首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12篇
  免费   0篇
教育   7篇
科学研究   2篇
各国文化   1篇
信息传播   2篇
  2020年   1篇
  2019年   2篇
  2018年   1篇
  2013年   3篇
  2012年   1篇
  2011年   2篇
  2003年   2篇
排序方式: 共有12条查询结果,搜索用时 81 毫秒
1.
INTRODUCTIONHowtoprotectthedatabase ,thekernelre sourcesofinformationwarfare,isbecomingmoreandmoreimportantsincetherapiddevelopmentofcomputerandcommunicationtechnology .TheArtificialIntelligenceInstituteofZhejiangUni versityhasprototypedaDatabaseSecuritya…  相似文献   
2.
Children continue to be subjected to high levels of violence (i.e., physical, psychological and sexual maltreatment) throughout the world. International concern about violence against children has increased significantly during the last decade. A Study on Violence Against Children, encouraged by the UN Committee on the Rights of the Child, conducted under the auspices of the United Nations Secretary General and reported in 2006, has become a rallying call to improve child protection. Child protection practices and systems have been judged to be generally inadequate and, in some cases, destructive. It is widely recognized that business as usual—more of the same—will not do. A General Comment (guide to fulfilling obligations) for Article 19, the central conceptualization of child protection of the UN Convention on the Rights of the Child, has the potential to promote a worldwide reformulation of child protection priorities, policies, and practices by virtue of the infusion of a child rights approach. It can be a mechanism for framing and promoting the transformational change needed – for a genuine paradigm shift. Here, explication is given for the historical context, rationale, centrality of child rights, process of development, holistic nature, and primary elements of General Comment 13 (GC13): The child's right to freedom from all forms of violence. GC13 embodies and champions a child rights approach to child protection entailing strong support for proactive primary prevention, promotion of good child care, and a commitment to secure the rights and well-being of all children. A child rights-based, comprehensive coordinating framework is recommended for the implementation of GC13.  相似文献   
3.
随着网络入侵技术的不断更新,作为防范网络入侵的最常见的防火墙,已经无法满足保障安全的需要,这就需要新技术——入侵检测系统(IDS)。本文详细介绍和分析了入侵检测系统的原理,分类及功能,并最后提出了一个简单的入侵检测探测改进模型。  相似文献   
4.
近年来,欧美领导学理论工作者开始关注领导者的发展问题。他们指出,领导者的发展直接影响着企业和广大员工的长远发展,因此,学术界和实业界都应重视领导者的发展问题。本文介绍欧美学者对领导者的发展的内涵、计量方法、影响因素等方面的研究概况,并提出今后的研究方向。  相似文献   
5.
The present study investigated relations between proactive and reactive functions of physical and relational aggression and functional impairment across early childhood. It was hypothesized that reactive functions of aggression would be associated with functional impairment. Hypotheses with regard to proactive functions of aggression were exploratory. Participants were 36 children (22 girls) from a longitudinal study. At Time 1 (M = 50.31 months old, SD = 10.97), observations of aggressive behavior were collected during preschool free-play. At Time 2 (M = 73.33 months old, SD = 10.88), parent-report of functional impairment was collected. Reactive physical aggression was a significant and unique predictor of future impairment when controlling for gender and all other types of aggression. Implications of these findings are discussed from a developmental perspective.  相似文献   
6.
This paper reviews some of the ways in which student success can be predicted in conventional and distance education. Predicting such success is particularly important for new students where the pre‐course start information available is sometimes slight and withdrawal often occurs very early in a course. It suggests that, in such cases, statistical methods involving logistic regression analysis are more useful than questionnaires or tutors’ opinions. Identifying students with low probability of success allows support to be targeted on them. However, there are ethical dilemmas to do with targeting support and openness with students about the results of any analysis.  相似文献   
7.
The aim of this study was to examine the interrelation between teachers' proactive strategies and perceived teacher–working environment fit that would be mediated by the socio-contextual burnout experience. Altogether 2310 Finnish teachers completed the study's survey. The results indicate that teachers can learn the kinds of strategies that allow them to reduce burnout and construct a better working environment fit. Both the learning and use of the strategies is highly embedded in a school's social interactions.  相似文献   
8.
This paper responds to two observations about current government service delivery. First, despite reasonable efforts to improve the design of forms and to establish single points of contact in one-stop shops, citizens still perceive forms as cumbersome. Second, citizens expect governments to act proactively by initiating appropriate government services themselves, instead of relying on requests for services from citizens. To address these two issues, this paper proposes a transition from a one-stop shop to a no-stop shop, where the citizen does not have to perform any action or fill in any forms to receive government services. The contribution of this paper is an e-government stage model that extends existing models. Stage models are suitable tools with which to inspire future developments, and ours extends previous models that guide progress toward the one-stop shop by describing two further stages: the limited no-stop shop and the no-stop shop. We define three dimensions along which to progress: integration of data collection, integration of data storage, and purpose of data use. We provide a first test of the model's validity through three case studies: the e-government practices in Austria, Estonia, and an Australian state government. Our work complements existing research on e-government stage models and proactive government service delivery.  相似文献   
9.
ObjectivesNeurocognitive impairments are commonly observed in adults suffering from posttraumatic stress disorder (PTSD). The picture is less clear in adolescents. Childhood sexual abuse (CSA) may have an independent influence on neuropsychological test performance and provide partial explanatory power of the inconsistent findings. We hypothesized that adolescents with PTSD who have also suffered sexual abuse would have most pronounced deficits on neurocognitive testing.MethodsIn a cross-sectional design, 105 traumatized South African adolescents, of whom 52 fulfilled criteria of PTSD and 34 reported CSA, were studied. A comprehensive neurocognitive battery including tests of memory, executive functioning, and language was used to analyze the associations of neurocognitive impairments with PTSD and CSA.ResultsAdolescents reporting CSA manifested impairments in proactive and retroactive interference tasks on the Rey Auditory Verbal Learning test and in the copy condition of the Rey Osterrieth figure test, indicating deficits in attention and working memory. Against our hypothesis, no independent effects of PTSD were found on neurocognitive performance. Results were independent of comorbid psychiatric diagnoses.ConclusionsSexual abuse seems to have an independent influence on attention and working memory. This could be an early sign of hippocampal impairment.  相似文献   
10.
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications. Project (No. 45.6.1-017) supported by the National Defense Pre-Research Fund of China  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号