期刊文献+
共找到1,581篇文章
< 1 2 80 >
每页显示 20 50 100
主动性人格的研究现状与展望 被引量:66
1
作者 刘密 龙立荣 祖伟 《心理科学进展》 CSSCI CSCD 北大核心 2007年第2期333-337,共5页
近年来,越来越多的研究者与管理者开始关注员工的主动行为,主动行为能够改善组织的效率和提高竞争力。主动行为受到许多因素的影响,其中一个因素即主动性人格。主动性人格是一种稳定的主动行为倾向。许多研究表明:主动性人格与许多行为... 近年来,越来越多的研究者与管理者开始关注员工的主动行为,主动行为能够改善组织的效率和提高竞争力。主动行为受到许多因素的影响,其中一个因素即主动性人格。主动性人格是一种稳定的主动行为倾向。许多研究表明:主动性人格与许多行为结果都有密切联系,包括工作绩效、职业生涯成功、领导能力、团队绩效、创业等。今后的研究需要探讨一些问题,如主动性人格与关系绩效、职业生涯成功新标准的关系。 展开更多
关键词 主动性 主动行为 主动性人格
下载PDF
主动性人格:机制与未来走向 被引量:31
2
作者 张颖 杨付 《心理科学进展》 CSSCI CSCD 北大核心 2017年第9期1544-1551,共8页
主动性人格(proactive personality)作为一种独特的人格特质,指采取积极行动去影响所处环境的一种个体倾向。主动性高的个体善于发现机会,抓住机会,并且不断地坚持目标。研究者梳理了主动性人格的起源和概念、测量方法,阐述了主动性人... 主动性人格(proactive personality)作为一种独特的人格特质,指采取积极行动去影响所处环境的一种个体倾向。主动性高的个体善于发现机会,抓住机会,并且不断地坚持目标。研究者梳理了主动性人格的起源和概念、测量方法,阐述了主动性人格的实施效果、中介机制和调节机制,强化了中国本土文化的权变作用。未来研究应继续完善主动性人格的概念、开发符合时代特征的测量工具、拓展其研究层次与实施效果。 展开更多
关键词 主动性 主动性人格 中介机制 调节机制 中国组织情境
下载PDF
员工越轨创新行为研究综述及其展望 被引量:32
3
作者 江依 《科技管理研究》 CSSCI 北大核心 2018年第10期131-139,共9页
自1996年以来员工越轨创新行为备受学术界关注,而国内关于越轨创新行为的研究仍处于起步阶段。通过梳理国内外权威学者关于员工越轨创新行为研究成果,辨析越轨创新行为的内涵,总结越轨创新行为测量方法,探讨影响越轨创新行为产生的因素... 自1996年以来员工越轨创新行为备受学术界关注,而国内关于越轨创新行为的研究仍处于起步阶段。通过梳理国内外权威学者关于员工越轨创新行为研究成果,辨析越轨创新行为的内涵,总结越轨创新行为测量方法,探讨影响越轨创新行为产生的因素以及越轨创新行为作用结果,构建越轨创新行为过程模型,为企业实践者提供越轨创新行为的管理启示,并展望该领域未来研究方向。 展开更多
关键词 越轨创新 结构紧张 前瞻性 激进型创新
下载PDF
Proactive Health: An Imperative to Achieve the Goal of Healthy China 被引量:18
4
作者 Jue Liu Weidong Li +1 位作者 Hongyan Yao Jianjun Liu 《China CDC weekly》 2022年第36期799-801,共3页
Proactive Health has become a new service model to improve human health.Although the concept of Proactive Health has been proposed by the Outline of the Healthy China 2030 Plan and the Healthy China Initiative,the lac... Proactive Health has become a new service model to improve human health.Although the concept of Proactive Health has been proposed by the Outline of the Healthy China 2030 Plan and the Healthy China Initiative,the lack of a unified definition of Proactive Health in China’s academic community is still the most fundamental and critical deficiency.Therefore,based on the concepts of Proactive Health,this study analyzed and described the natural characteristics and implications of Proactive Health to establish an exact definition. 展开更多
关键词 UNIFIED HEALTH proactive
原文传递
前摄性及反应性项目调度方法研究综述 被引量:17
5
作者 何正文 宁敏静 徐渝 《运筹与管理》 CSSCI CSCD 北大核心 2016年第5期278-287,共10页
随着项目管理实践的不断发展,不确定性项目调度越来越常见。相应地,关于它的研究也越来越多,目前已经成为项目调度管理的一个重要研究领域。前摄性及反应性项目调度方法作为这个研究领域内的最新分支,近些年来已经产生不少研究成果。本... 随着项目管理实践的不断发展,不确定性项目调度越来越常见。相应地,关于它的研究也越来越多,目前已经成为项目调度管理的一个重要研究领域。前摄性及反应性项目调度方法作为这个研究领域内的最新分支,近些年来已经产生不少研究成果。本文依据对于扰动的不同处理方法对这些研究成果进行梳理,首先介绍了前摄性项目调度方法的研究进展;其次,归纳了反应性项目调度方法的已有研究成果;再次,对关键链项目调度方法进行了讨论。最后,对前摄性、反应性项目调度方法的研究现状进行总结并指出进一步的研究方向。 展开更多
关键词 项目调度 前摄性 反应性 关键链
下载PDF
基于氢储能的主动型永磁直驱风电机组建模与并网控制 被引量:17
6
作者 孔令国 蔡国伟 +1 位作者 陈冲 邢亮 《电工技术学报》 EI CSCD 北大核心 2017年第18期276-285,共10页
针对风电并网功率波动性及高渗透弃风现象,采用共直流母线主动型永磁直驱风电机组结构,建立基于氢储能的永磁直驱风电机组模型,并提出变流器与功率管理协调控制策略。永磁同步发电机与电解槽、燃料电池、蓄电池组汇集直流母线,考虑电解... 针对风电并网功率波动性及高渗透弃风现象,采用共直流母线主动型永磁直驱风电机组结构,建立基于氢储能的永磁直驱风电机组模型,并提出变流器与功率管理协调控制策略。永磁同步发电机与电解槽、燃料电池、蓄电池组汇集直流母线,考虑电解槽需电制氢、燃料电池需氢发电等特性,利用变流器协调控制及功率管理策略,实现风电功率波动抑制、降低风电弃风比例、风电绿色并网。通过PMCAD/EMTDC仿真平台,证明了模型及其控制策略的有效性,有利于风电高渗透并网运行。 展开更多
关键词 氢储能 主动型 风电机组 模型 并网控制
下载PDF
一种基于RSA的群签名方案 被引量:11
7
作者 李凤银 禹继国 鞠宏伟 《计算机工程与设计》 CSCD 北大核心 2006年第16期2955-2957,共3页
现存的群签名方案要么不考虑群成员的废除问题[1,2,4,5,7,10],要么存在计算量与被废除成员线性相关的缺点[3],是低效的,要么是不安全的[5]。考虑到RSA是应用最广泛的公钥密码体制之一,首次基于RSA设计出一种群签名方案。新方案在不改变... 现存的群签名方案要么不考虑群成员的废除问题[1,2,4,5,7,10],要么存在计算量与被废除成员线性相关的缺点[3],是低效的,要么是不安全的[5]。考虑到RSA是应用最广泛的公钥密码体制之一,首次基于RSA设计出一种群签名方案。新方案在不改变其他有效群成员的密钥的情况下,可以安全地增加或撤消群成员;可以高效地实现成员的增加或撤消;可以适合大的群体使用;具有基于大数分解困难性的安全性。 展开更多
关键词 RSA 群签名 成员撤消 公钥状态列表 前向安全
下载PDF
Windows下基于ProActive并行计算的关键技术 被引量:8
8
作者 董明刚 梁正友 《计算机工程》 EI CAS CSCD 北大核心 2006年第19期105-107,共3页
针对现有并行计算技术的不足,提出了基于ProActive的Windows平台下的并行计算方法,对Windows平台下并行计算的结构、节点的动态部署、并行程序设计方法、并行任务调度等关键技术进行了研究,并初步实现了一个系统原型。实验证明该方案是... 针对现有并行计算技术的不足,提出了基于ProActive的Windows平台下的并行计算方法,对Windows平台下并行计算的结构、节点的动态部署、并行程序设计方法、并行任务调度等关键技术进行了研究,并初步实现了一个系统原型。实验证明该方案是可行的和有效的。 展开更多
关键词 proactive 并行程序设计 SSH 动态部署
下载PDF
软件恢复技术研究 被引量:5
9
作者 李正 万群丽 许满武 《计算机科学》 CSCD 北大核心 2003年第8期150-155,共6页
Recently, the phenomenon of "software aging", one in which the state of a software system gradually de-grades with time and eventually leads to performance degradation or crash/hang failure, has been reporte... Recently, the phenomenon of "software aging", one in which the state of a software system gradually de-grades with time and eventually leads to performance degradation or crash/hang failure, has been reported. The agingphenomenon is ubiquitous in all kinds of software systems and hard to eliminate thoroughly. A proactive techniquecalled "software rejuvenation" has been proposed[13] to counter the aging problem and increase the software availabili-ty. In this paper, we systematically investigate the basic motivation, concept and development of software rejuvena-tion, and then, detailedly analyze the main research work on it. At last, a prospect about the future research direc-tions is outlined. 展开更多
关键词 软件恢复 软件可靠性 软件系统 软件开发
下载PDF
移动Ad hoc网络路由协议研究综述 被引量:11
10
作者 朱军 《信息通信》 2018年第11期218-220,共3页
移动Ad hoc网络(MANET)具有很强的容错性和鲁棒性,可以随时建立和拆除。Ad Hoc网络的应用范围很广,它可以用于以下场合:没有有线通信设施的地方;需要临时快速建立一个通信网络的环境;作为生存性较强的后备网络。目前,研究人员提出许多MA... 移动Ad hoc网络(MANET)具有很强的容错性和鲁棒性,可以随时建立和拆除。Ad Hoc网络的应用范围很广,它可以用于以下场合:没有有线通信设施的地方;需要临时快速建立一个通信网络的环境;作为生存性较强的后备网络。目前,研究人员提出许多MANET路由协议,适用于不同的网络和场景,文章对典型的路由协议进行了分析,进而找出适合不同网络的路由协议。 展开更多
关键词 移动AD HOC网络 主动式 反应式 基于位置 路由
下载PDF
多Agent系统中基于认知的信任框架研究 被引量:10
11
作者 王家昉 冯志勇 +1 位作者 徐超 许光全 《计算机学报》 EI CSCD 北大核心 2010年第1期139-151,共13页
基于认知角度提出了一种Agent间以预动(proactive)的方式建立信任的形式化框架.在框架中首先区分了代理与非代理情形下的信任并分别给出定义.从信任的定义出发,施信方(the trustor)针对信任建立基于认知的推理过程,并根据推理需要主动... 基于认知角度提出了一种Agent间以预动(proactive)的方式建立信任的形式化框架.在框架中首先区分了代理与非代理情形下的信任并分别给出定义.从信任的定义出发,施信方(the trustor)针对信任建立基于认知的推理过程,并根据推理需要主动向受信方请求信息.在获得所需信息后,考虑到交互信息的可靠性问题,施信方在认知推理的基础上进行关于可靠性的模糊推理,并决定是否建立信任.通过这个框架,Agent间可以在缺乏直接交互经验或者第三方证言的情况下,以预动的方式动态地建立信任,并且在信任建立的过程中,可以纳入复杂的上下文约束.同时,通过认知推理与模糊推理的结合,可以根据场景的需要采用不同的规则,给信任的建立带来更大的灵活性. 展开更多
关键词 信任 多AGENT系统 预动
下载PDF
Proactive optimization of transmission power and 3D trajectory in UAV-assisted relay systems with mobile ground users 被引量:9
12
作者 Jiangchun GU Guoru DING +2 位作者 Yitao XU Haichao WANG Qihui WU 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2021年第3期129-144,共16页
In this paper,an Unmanned Aerial Vehicle(UAV)-assisted relay communication system is studied,where a UAV is served as a flying relay to maintain a communication link between a mobile source node and a remote destinati... In this paper,an Unmanned Aerial Vehicle(UAV)-assisted relay communication system is studied,where a UAV is served as a flying relay to maintain a communication link between a mobile source node and a remote destination node.Specifically,an average outage probability minimization problem is formulated firstly,with the constraints on the transmission power of the source node,the maximum energy consumption budget,the transmission power,the speed and acceleration of the flying UAV relay.Next,the closed-form of outage probability is derived,under the hybrid line-of-sight and non-line-of-sight probability channel model.To deal with the formulated nonconvex optimization,a long-term proactive optimization mechanism is developed.In particular,firstly,an approximation for line-of-sight probability and a reformulation of the primal problem are given,respectively.Then,the reformulated problem is transformed into two subproblems:one is the transmission power optimization with given UAV’s trajectory and the other is the trajectory optimization with given transmission power allocation.Next,two subproblems are tackled via tailoring primal–dual subgradient method and successive convex approximation,respectively.Furthermore,a proactive optimization algorithm is proposed to jointly optimize the transmission power allocation and the three-dimensional trajectory.Finally,simulation results demonstrate the performance of the proposed algorithm under various parameter configurations. 展开更多
关键词 Outage probability Primal-dual subgradient proactive optimization Successive convex approximation Unmanned Aerial Vehicle(UAV)relay
原文传递
Certis: Cloud Asset Management & Threat Evaluation Using Behavioral Fingerprinting at Application Layer
13
作者 Kumardwij Bhatnagar Vijay K. Madisetti 《Journal of Software Engineering and Applications》 2024年第6期474-486,共13页
This paper introduces Certis, a powerful framework that addresses the challenges of cloud asset tracking, management, and threat detection in modern cybersecurity landscapes. It enhances asset identification and anoma... This paper introduces Certis, a powerful framework that addresses the challenges of cloud asset tracking, management, and threat detection in modern cybersecurity landscapes. It enhances asset identification and anomaly detection through SSL certificate parsing, cloud service provider integration, and advanced fingerprinting techniques like JARM at the application layer. Current work will focus on cross-layer malicious behavior identification to further enhance its capabilities, including minimizing false positives through AI-based learning techniques. Certis promises to offer a powerful solution for organizations seeking proactive cybersecurity defenses in the face of evolving threats. 展开更多
关键词 Certis SSL Certificate Parsing JARM Fingerprinting Anomaly Detection proactive Defense
下载PDF
基于ProActive的网格应用程序开发方法 被引量:5
14
作者 梁正友 张凌 董守斌 《计算机应用》 CSCD 北大核心 2005年第6期1414-1416,共3页
介绍了基于Java的并行分布中间件工具ProActive,结合网格任务调度器,讨论和给出了用ProActive开发网格和网络应用的方法和过程。实践表明使用ProActive可以方便的开发网格网络应用程序。
关键词 网格 网络 proactive 应用程序开发
下载PDF
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
15
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期106-133,共28页
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo... As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm. 展开更多
关键词 Advanced Persistent Threats (APT) Attack Phases Attack Surface DEFENSE-IN-DEPTH Disaster Recovery (DR) Incident Response Plan (IRP) Intrusion Detection Systems (IDS) Intrusion Prevention System (IPS) Key Risk Indicator (KRI) Layered Defense Lockheed Martin Kill Chain proactive Defense Redundancy Risk Management Threat Intelligence
下载PDF
海量空间信息隐形搜索的研究 被引量:4
16
作者 张建兵 杨崇俊 《计算机工程》 EI CAS CSCD 北大核心 2006年第22期58-60,共3页
提出了利用网格技术实现分布式海量空间信息搜索的方法,基于网格开发工具ProActive开发了海量空间信息网格调度服务。利用鼠标屏幕取词、中文地名识别和基于网格的海量空间信息搜索技术,设计并实现了一个海量空间信息隐形搜索引擎,实现... 提出了利用网格技术实现分布式海量空间信息搜索的方法,基于网格开发工具ProActive开发了海量空间信息网格调度服务。利用鼠标屏幕取词、中文地名识别和基于网格的海量空间信息搜索技术,设计并实现了一个海量空间信息隐形搜索引擎,实现了即时、隐性、动态获取中国300个城市的空间信息。为海量空间信息服务提供了一种全新的技术。 展开更多
关键词 空间信息搜索 地名识别 网格 proactive
下载PDF
The computerized LASSI-BC Test versus the Standard LASSI-L Paper-and-Pencil Version in Community-Based-Samples
17
作者 Rosie E. Curiel Cid Alexandra Ortega +13 位作者 Ubbo Visser Marcela Kitaigorodsky D. Diane Zheng Diana Hincapie Kirsten Horne Crenshaw Ashleigh Beaulieu Brooke Bosworth Liz Gallardo Emory Neer Sofia Ramirez Elizabeth A. Crocco Mike Georgiou Efrosyni Sfakianaki David A. Loewenstein 《Advances in Alzheimer's Disease》 CAS 2024年第1期11-25,共15页
Proactive Semantic Interference (PSI) and failure to recover from PSI (frPSI), are novel constructs assessed by the LASSI-L. These measures are sensitive to cognitive changes in early Mild Cognitive Impairment (MCI) a... Proactive Semantic Interference (PSI) and failure to recover from PSI (frPSI), are novel constructs assessed by the LASSI-L. These measures are sensitive to cognitive changes in early Mild Cognitive Impairment (MCI) and preclinical AD determined by Aβ load using PET. The goal of this study was to compare a new computerized version of the LASSI-L (LASSI-Brief Computerized) to the standard paper-and-pencil version of the test. In this study, we examined 110 cognitively unimpaired (CU) older adults and 79 with amnestic MCI (aMCI) who were administered the paper-and-pencil form of the LASSI-L. Their performance was compared with 62 CU older adults and 52 aMCI participants examined using the LASSI-BC. After adjustment for covariates (degree of initial learning, sex, education, and language of evaluation) both the standard and computerized versions distinguished between aMCI and CU participants. The performance of CU and aMCI groups using either form was relatively commensurate. Importantly, an optimal combination of Cued B2 recall and Cued B1 intrusions on the LASSI-BC yielded an area under the ROC curve of .927, a sensitivity of 92.3% and specificity of 88.1%, relative to an area under the ROC curve of .815, a sensitivity of 72.5%, and a specificity of 79.1% obtained for the paper-and-pencil LASSI-L. Overall, the LASSI-BC was comparable, and in some ways, superior to the paper-and-pencil LASSI-L. Advantages of the LASSI-BC include a more standardized administration, suitability for remote assessment, and an automated scoring mechanism that can be verified by a built-in audio recording of responses. 展开更多
关键词 Mild Cognitive Impairment proactive Semantic Interference LASSI-L Computerized Cognitive Assessment
下载PDF
Update on the prevention of local recurrence and peritoneal metastases in patients with colorectal cancer 被引量:8
18
作者 Paul H Sugarbaker 《World Journal of Gastroenterology》 SCIE CAS 2014年第28期9286-9291,共6页
The prevention of a disease process has always been superior to the treatment of the same disease throughout the history of medicine and surgery. Local recurrence and peritoneal metastases occur in approximately 8% of... The prevention of a disease process has always been superior to the treatment of the same disease throughout the history of medicine and surgery. Local recurrence and peritoneal metastases occur in approximately 8% of colon cancer patients and 25% of rectal cancer patients and should be prevented. Strategies to prevent colon or rectal cancer local recurrence and peritoneal metastases include cytoreductive surgery and hyperthermic perioperative chemotherapy (HIPEC). These strategies can be used at the time of primary colon or rectal cancer resection if the HIPEC is available. At institutions where HIPEC is not available with the treatment of primary malignancy, a proactive second-look surgery is recommended. Several phase II studies strongly support the proactive approach. If peritoneal metastases were treated along with the primary colon resection, 5-year survival was seen and these results were superior to the results of treatment after peritoneal metastases had developed as recurrence. Also, prophylactic HIPEC improved survival with T3/T4 mucinous or signet ring colon cancers. A second-look has been shown to be effective in two published manuscripts. Unpublished data from MedStar Washington Cancer Institute also produced favorable date. Rectal cancer with peritoneal metastases may not be so effectively treated. There are both credits and debits of this proactive approach. Selection factors should be reviewed by the multidisciplinary team for individualized management of patients with or at high risk for peritoneal metastases. 展开更多
关键词 Peritoneal metastases CARCINOMATOSIS Local recurrence Hyperthermic perioperative chemotherapy Secondary prevention proactive treatment Mucinous colon cancer Signet ring colon cancer
下载PDF
Building a highly available and intrusion tolerant database security and protection system ( DSPS) 被引量:2
19
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 EI CSCD 2003年第3期287-293,共7页
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv... Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications. 展开更多
关键词 Information warfare proactive security Intrusion tolerant DSPS(Database Security and Protection System)
下载PDF
数字医疗在老年医学领域中的应用:技术与产业进展 被引量:3
20
作者 张迎伟 杨涵 +6 位作者 宋淑超 张琪琪 杨威文 李万 张书瑞 陈益强 吕泽平 《中国临床新医学》 2023年第12期1219-1224,共6页
数字医疗指综合利用人工智能、大数据、计算机传感等技术,建立覆盖全病程、全场景的医疗服务模式,提升医疗服务质量和医疗资源利用效率,降低医疗成本。在我国老龄化不断加剧的背景下,数字医疗技术是解决老龄化科技应对难题的可行选择。... 数字医疗指综合利用人工智能、大数据、计算机传感等技术,建立覆盖全病程、全场景的医疗服务模式,提升医疗服务质量和医疗资源利用效率,降低医疗成本。在我国老龄化不断加剧的背景下,数字医疗技术是解决老龄化科技应对难题的可行选择。该文就数字医疗在老年医学领域中的应用,从现有数字医疗技术发展格局、现存不足、未来老龄健康事业的发展等方面进行综述。 展开更多
关键词 数字医疗 老年医学 技术 产业 主动健康
下载PDF
上一页 1 2 80 下一页 到第
使用帮助 返回顶部