• 回答数

    3

  • 浏览数

    168

中暑山庄产橘子
首页 > 学术期刊 > 罗永龙的博士毕业论文

3个回答 默认排序
  • 默认排序
  • 按时间排序

fengzhenpeng

已采纳

1、有一次,周恩来总理去会见某外国元首。那个国家的元首,很看不起中国和中国人民。就在和周总理礼节性的握过手之后,他从衣服兜里掏出一块手帕擦了擦手,然后把手帕放回了兜里。

这时,周总理不慌不忙的也掏出一块手帕,擦了擦手,然后把洁白的手帕扔进了垃圾箱!一生节俭的周总理,用一块洁白的手帕,又一次捍卫了祖国的尊严。

2、古代饥荒年头,一户富人设了施舍粥饭的摊子,看见踉跄踽踽而来的一个男子,就叫喊道:“喂!过来,来吃这个吧!”那男子确是一位饥寒之士;他走过来,却硬撑着,昂然坚决地说:“我就是由于不吃这个‘喂,过来吃’,才落到如此地步;现在,已经如此了,我还会吃这个吗?!”说着,他就决然地又踽踽走了。

3、一位西方记者问周总理:“请问总理先生,现在的中国有没有?”不少人纳闷:怎么提这种问题?大家都关注周总理怎样回答。周总理肯定地说:“有!” 全场哗然,议论纷纷。周总理看出了大家的疑惑,补充说了一句:“中国的在我国台湾省。”顿时掌声雷动。

4、俄罗斯文豪屠格列夫曾遇见一个乞丐,他很想有所施舍,但他翻遍所有的口袋却没找到一分钱。见乞丐高高地举着脏兮兮的手,他上前一步紧紧的握着乞丐的手说:“兄弟,实在对不起,我什么也没带。”乞丐流着泪说:“谢谢,这已经够了!”。

5、皖南事变,新四军军长叶挺将军被俘;他昂首挺胸,决不屈服,写下了著名的《囚歌》:“为人进出的门紧锁着,为狗爬出的洞敞开着。一个声音高叫着:——爬出来吧,给你自由!我渴望自由,但我深深地知道——人的身躯怎能从狗洞子里爬出!”。

125 评论

ddungmickey

很久很久以前,在一个辽阔富饶的国度里,有一位美丽而又高傲的公主,很多青年都向她求婚。于是公主就说:“如果谁能在我的窗前站一百个晚上,我就答应嫁给他。”人们欣喜若狂,争先恐后的来到了公主的窗前,然而他们只经过十几个晚上便都放弃了,当人们认为再也没有人会站在公主的窗前时,一位青年独自站在那儿。人们嘲笑他,讽刺他,青年没有理睬,他仍然直直的站在那里。十天,二十天,三十天过去了,那位青年还是站在那里,风雨无阻。人们开始用卑劣的手段戏弄他,青年仍然没有理睬,依然如故。四十天,五十天,六十天过去了,一天晚上,大雨把他淋湿了,青年咬咬牙,摸摸青肿的脸,挺住了。七十天,八十天过去了。人们被青年感动了,原先嘲笑和戏弄他的人请求他的原谅。九十天,九十一天,九十二天,九十三天……九十九天过去了,公主正从窗帘的缝隙中注视着这位青年,心里想:坚持吧,再过一天我就会嫁给你了。正当人们向这位青年祝贺时,这位青年却一步一步向城外走去,人们都不明白,于是有人追上去问他:“你九十九天都坚持下来了,为什么现在要走?”青年说:“前面的九十九天,我把它献给了爱情,但这第一百天——只属于我的尊严!”

296 评论

DP某某某

(1)面向车联网的数据中心关键技术研究及产业化(2013.01-2014.12),国家发改委物联网专项,1220万(已通过评审);(2)物联网系统优化机理研究(2011.01-2013.08),国家973一级子课题,148万;(3)基于Web的无线泛在业务环境体系架构、关键技术研究与演示验证(2012.01-2014.12) ,国家科技重大专项,363万;(4)泛在网络下多终端协同的网络控制平台及关键技术,国家科技重大专项(2011.01-2013.12),522万;(5)信息汇聚传感器网络综合测试与验证评估环境(2011.01-2012.12),国家科技重大专项, 375万;(6)基于协作通信的能量有效无线网络多信息流路由问题研究(2012.1-2015.12),国家自然科学基金,58万(7)无线传感网络应用示范系统(2006-2010),国家973一级子课题,260万(8)可信的安全多方计算环境构建方法及其关键技术研究(2009-2011),国家自然科学基金,50万(9)安全多方量子计算基础协议的研究与应用(2008-2010),国家自然科学基金,29万;(10)无线传感网络节点定位及目标跟踪(2007-2009),中科院知识创新工程重要方向项目, 50万;(11)基于IPv6无线传感器网络的环境监测系统(2005-2006),国家发改委下一代互联网(CNGI)示范项目,1100万;(12)基于CNGI和WSN的矿山井下定位与应急联动系统(2006-2008),国家发改委下一代互联网(CNGI)示范项目,1870万;(13)具有高可靠信息收集能力的WSN体系结构研究,863项目,(2006-2008),50万;(14)XXXXXXX(2010-2014),200万;(15)XXXXXXX(2006-2010),110万;(16)XXXXXXX(2005-2006,2007-2008),60万;(17)安全多方计算技术中的若干关键问题及其应用研究(2007-2009),国家教育部博士点基金,6万; (18)无线协作网络的多资源联合分配问题研究(2010-2012),国家教育部博士点基金,6万。(1)国家973计划项目子课题:Web服务计算的理论、方法和应用的研究,120万。(2)国家973计划项目子课题:无线传感网络应用示范系统,260万。(3)国家发改委下一代互联网(CNGI)示范项目:基于IPv6无线传感器网络的环境监测系统,1100万(其中国拨200万)(4)军工项目2项(5)国家自然科学基金项目:保护私有信息的若干计算几何问题及其应用研究(1)“安徽省防灾减灾智能信息与决策支持系统”2001年获国家科技进步二等奖(排名第2)(2)“并行算法类教学基地建设”2001年获国家教学成果二等奖(排名第5)(3)“新型容错平滑技术研究及其应用”,2004年获中国人民解放军科技进步三等奖(排名第2)(4)“宝钢优秀教师奖”,2004年。(5)Hongli Xu, Liusheng Huang, et al. “Localized Algorithm for Coverage in Wireless Sensor Networks”,获国际会议PDCAT’05 “杰出论文奖”,2005。[1] Liusheng Huang, Hongli Xu, et al. “An Efficient Synchronization Protocol for Wireless Sensor Network”, Accepted by International Journal of Sensor Networks[2] Hongli Xu, Liusheng Huang, et al. “Localized Algorithm for Coverage in Wireless Sensor Networks”, PDCAT’05,Dec. 2005. p 750-754(Outstanding Paper Award).[3] Hongli Xu, Liusheng Huang, et al, “Accurate Time Synchronization for Wireless Sensor Networks”, MSN 2005,LNCS 3794:153-163,Dec. 2005.[4] Kezhong Lu, Liusheng Huang, et al, “Energy-Efficient Data Gathering in Large Wireless Sensor Networks”, ICESS2005, Dec. 2005.[5] Liusheng Huang , Hongli Xu, et al. “Coverage and Exposure Paths in Wireless Sensor Networks”,JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 21 (4): 490-495 JUL 2006[6] Kun Wang, Yinlong Xu, Liusheng Huang, Guoliang Chen,“GPS based Location Oriented Routing Protocol for MANET”, Chinese J. of Electronics, 2006, 15(1):173-178.[7] Zhong H, Huang LS, Xiong YA weighted E-voting scheme with secret weightsCHINESE JOURNAL OF ELECTRONICS 15 (3): 413-416 JUL 2006[8] Luo YL, Huang LS, Chen GL, et al.Privacy-preserving distance measurement and its applicationsCHINESE JOURNAL OF ELECTRONICS 15 (2): 237-241 APR 2006[9] Li KQ, Shen H, Tajima K, Huang LS .An effective cache replacement algorithm in transcoding-enabled proxiesJOURNAL OF SUPERCOMPUTING 35 (2): 165-184 FEB 2006[10] Tian HT, Huang LS, Shan JL, et al.Automated vulnerability management through web servicesLECTURE NOTES IN COMPUTER SCIENCE 3032: [11] Tian HT, Huang LS, Zhou Z, et al.Common vulnerability markup languageLECTURE NOTES IN COMPUTER SCIENCE 2846: [12] Huang L, He XH, Huang LS, et al.Computer simulation on the self-assembly of associating polymersPOLYMER 44 (6): 1967-1972 MAR 2003[13] Gu XD, Chen GL, Gu J, Huang LS, et al.Performance analysis and improvement for some linear on-line bin-packing algorithmsJOURNAL OF COMBINATORIAL OPTIMIZATION 6 (4): 455-471 DEC 2002[14] Xu YL, Chen GL, Huang LS, et al.Optimal bandwidth utilization of all-optical ring with a converter of degree 4JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 17 (4): 411-419 JUL 2002[15] Liu NA, Fan WC, Dobashi R, Huang LS .Kinetic modeling of thermal decomposition of natural cellulosic materials in air atmosphereJOURNAL OF ANALYTICAL AND APPLIED PYROLYSIS 63 (2): 303-325 JUN 2002[16] Huang LS, Chen HP, Wang X, et al.A fast algorithm for mining association rulesJOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 15 (6): 619-624 NOV 2000[17] Liu NL, Sun ZH, Huang LSIntelligent states of the quantized radiation field associated with the Holstein-Primakoff realization of su(2)JOURNAL OF PHYSICS A-MATHEMATICAL AND GENERAL 33 (16): 3347-3360 APR 28 2000[18] Li Q, Huang LSA dynamic data model for a video database management systemACM COMPUTING SURVEYS 27 (4): 602-606 DEC 1995[19] Zhong, Hong; Huang, Liusheng; Luo, YonglongA Multi-Candidate Electronic Voting Scheme Based on Sum Protocol计算机研究与发展, v 43, n 8, August, 2006, p 1405-1410 (中文)[20] Liu, An; Huang, Liusheng; Li, QingQoS-aware web services composition using transactional composition operatorLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 4016 LNCS, Advances in Web-Age Information Management - 7th International Conference, WAIM 2006, Proceedings, 2006, p 217-228[21] Luo, Yonglong ; Huang, Liusheng; Jing, Weiwei; Xu, WeijiangPrivacy protection in the relative position determination for two spatial geometric objects计算机研究与发展, v 43, n 3, March, 2006, p 410-416 (中文)[22] Wei, Yang; Huang, Liusheng; Wang, QiyanProvably secure 1-out-of-n Oblivious Transfer schemeWSEAS Transactions on Computers, v 5, n 9, September, 2006, p 1823-1830[23] Huang, Liusheng; Luo, Yonglong; Zhong, Hong; Shen, HongAn efficient multiple-precision division algorithmParallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings, v 2005, Proceedings - Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2005, 2005, p 971-974[24] Xiao, Mingjun; Huang, Liusheng; Shen, Hong; Luo, YonglongPrivacy preserving ID3 algorithm over horizontally partitioned dataParallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings, v 2005, Proceedings - Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2005, 2005, p 239-243[25] Hu, Shaolin; Huang, LiushengDynamic-measurement system models of the centroid motion of spacecraft with applicationsProceedings of Asian Simulation Conference; System Simulation and Scientific Computing (Shanghai), 2002, p 129-134[26] Huang, Liusheng; Lee, John C.; Li, Qing; Xiong, WeiExperimental video database management system based on advanced object-oriented techniquesProceedings of SPIE - The International Society for Optical Engineering, v 2670, 1996, p 158-169[27] Luo, Yong-Long; Huang, Liu-Sheng; Jing, Wei-Wei; Yao, Yi-Fei; Chen, Guo-LiangAlgorithm for privacy-preserving Boolean association rule mining电子学报, v 33, n 5, May, 2005, p 900-903 (中文)[28] Li, Yan-Jiang; Ma, Chuan-Gui; Huang, Liu-ShengElectronic voting scheme软件学报, v 16, n 10, October, 2005, p 1805-1810(中文)[29] Miao, Hao; Huang, Liu-Sheng; Zhang, Guo-Yi; Chen, Guo-LiangSending and receiving order of total-exchange in message passing parallel system电子学报, v 32, n 12, December, 2004, p 2109-2112(中文)[30] Zhang, Guo-Yi; Fang, Ming-Hui; Huang, Liu-Sheng; Chen, Guo-LiangParallel direct numerical method for solving unsteady flow issue of tree-type river networks系统仿真学报, v 16, n 12, December, 2004, p 2673-2676+2679 (中文)[31] Lei, Yun-Fei; Huang, Liu-Sheng; Chen, Guo-LiangPrinciple of converting RDF query language to SQL and its implementation计算机研究与发展, v 41, n 7, July, 2004, p 1251-1257(中文)[32] Tian, Hai-Tao Huang, Liu-Sheng; Lei, Yun-Fei; Chen, Guo-LiangA New Scheme for IP Traceback under DoS AttackParallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings, Parallel and Distributed Computing, Applications and Technologies, PDCAT 2003 Proceedings, 2003, p 189-193[33] Huang, Liu-Sheng; Chen, Hua-Ping; Zheng, Qi-Long; Chen, Guo-LiangNew dynamic data model for object-oriented database system软件学报, v 12, n 5, May, 2001, p 735-741(中文)[34] Gu, Xiao-Dong; Xu, Yin-Long; Chen, Guo-Liang; Huang, Liu-ShengConstrained bin packing problem with start-up space软件学报, v 13, n 3, March, 2002, p 390-397(中文)[35] Hu, Feng; Sun, Guo-Ji; Huang, Liu-ShengDetection and identification of abrupt faults in input components of dynamic system自动化学报, v 28, n 6, November, 2002, p 881-887(中文)[36] Luo Yonglong, Huang Liusheng, et al.Secure Two-Party Point-Circle Inclusion Problem.Journal of Computer Science and Technology.已录用.[37] Luo Yonglong, Huang Liusheng, et al.A Secure Protocol for Determining Whether a Point is Inside a Convex Polygon. Chinese Journal of Electronics.已录用.[38] 罗永龙, 黄刘生等.保护私有信息的叉积协议及其应用.计算机学报.

201 评论

相关问答

  • 俄罗斯博士论文答辩几次

    最近打算去俄罗斯读博士的同学越来越多了,但是大家都对副博士和博士的区别感到很迷茫,常常对于俄罗斯副博士回国认证方面有疑问,今天就给大家仔细介绍一下学历制度相关问

    Magic侠女 3人参与回答 2023-12-12
  • 玉龙龙硕士研究生毕业论文

    硕士研究生论文答辩详解 研究生在答辩的过程中,要思路清晰,前后过渡自然,先讲串联词,再翻幻灯片。 5.使用伏笔 巧妙运用伏笔,使报告结构严密、紧凑,可勾起专家和

    爱多肉的milk 2人参与回答 2023-12-09
  • 罗博报告杂志

    如果以全年定价来计算,中国最贵的杂志是哪本?《钟表研究》每期200元,双月刊,每年1200元。《罗博报告》每期100元,月刊,每年1200元。《北大商业评论》每

    悠悠lvying 4人参与回答 2023-12-06
  • 大工博土毕业论文吕小龙

    很好啊,在东三省还是能拍得上得

    厦门混世小魔王 4人参与回答 2023-12-10
  • 俄罗斯硕士毕业论文字数

    发表吧小编回答:硕士毕业论文字数一般是3-5万之间,学校不一样,专业不一样,字数也就不一样,一般指导老师都会给出一个大概的字数条件,然而就会有人疑惑,这个字数怎

    枫叶e宝宝 5人参与回答 2023-12-10