﻿{"id":6634,"date":"2019-01-14T15:08:32","date_gmt":"2019-01-14T07:08:32","guid":{"rendered":"http:\/\/www.nlpir.org\/wordpress\/?p=6634"},"modified":"2019-01-15T10:22:28","modified_gmt":"2019-01-15T02:22:28","slug":"%e8%b5%b5%e7%87%95%e5%b9%b3%e6%95%99%e6%8e%88","status":"publish","type":"post","link":"http:\/\/www.nlpir.org\/wordpress\/2019\/01\/14\/%e8%b5%b5%e7%87%95%e5%b9%b3%e6%95%99%e6%8e%88\/","title":{"rendered":"Prof. Yanping Zhao \u8d75\u71d5\u5e73\u6559\u6388"},"content":{"rendered":"\n<p>\u8d75\u71d5\u5e73\uff0c\u5317\u4eac\u7406\u5de5\u5927\u5b66\u7ba1\u7406\u4e0e\u7ecf\u6d4e\u5b66\u9662\uff0c\u6559\u6388<\/p>\n\n\n\n<p><strong>\u6559\u80b2\u7ecf\u5386\uff08\u4ece\u5927\u5b66\u672c\u79d1\u5f00\u59cb\uff0c\u6309\u65f6\u95f4\u5012\u5e8f\u6392\u5e8f\uff1b\u8bf7\u5217\u51fa\u653b\u8bfb\u7814\u7a76\u751f\u5b66\u4f4d\u9636\u6bb5\u5bfc\u5e08\u59d3\u540d\uff09\uff1a<\/strong><\/p>\n\n\n\n<p>1995\/09 \u2013 1998\/03\uff0c\u5317\u4eac\u7406\u5de5\u5927\u5b66\uff0c\u7edf\u8ba1\u4e13\u4e1a\uff0c\u7406\u5b66\u7855\u58eb\uff0c\u5bfc\u5e08\uff1a\u738b\u58eb\u5b89<\/p>\n\n\n\n<p>1977\/12 \u2013 1982\/01\uff0c\u5317\u4eac\u7406\u5de5\u5927\u5b66\uff0c\u6570\u5b66\u7cfb\uff0c\u7406\u5b66\u5b66\u58eb\uff0c\u5bfc\u5e08\uff1a\u5218\u5b9d\u5149<\/p>\n\n\n\n<p><strong>\u79d1\u7814\u4e0e\u5b66\u672f\u5de5\u4f5c\u7ecf\u5386\uff08\u6309\u65f6\u95f4\u5012\u5e8f\u6392\u5e8f\uff1b\u5982\u4e3a\u5728\u7ad9\u535a\u58eb\u540e\u7814\u7a76\u4eba\u5458\u6216\u66fe\u8fdb\u5165\u535a\u58eb\u540e\u6d41\u52a8\u7ad9\uff08\u6216\u5de5\u4f5c\u7ad9\uff09\u4ece\u4e8b\u7814\u7a76\uff0c\u8bf7\u5217\u51fa\u5408\u4f5c\u5bfc\u5e08\u59d3\u540d\uff09\uff1a<\/strong><strong><\/strong><\/p>\n\n\n\n<p>1998\/07 &#8211; \u81f3\u4eca\uff0c\u5317\u4eac\u7406\u5de5\u5927\u5b66\uff0c\u7ba1\u7406\u4e0e\u7ecf\u6d4e\u5b66\u9662\uff0c\u6559\u6388<\/p>\n\n\n\n<p>1982\/01 &#8211; 1998\/07\uff0c\u5317\u4eac\u7406\u5de5\u5927\u5b66\uff0c\u6570\u5b66\u7cfb\uff0c\u526f\u6559\u6388<\/p>\n\n\n\n<p><strong>\u66fe\u4f7f\u7528\u5176\u4ed6\u8bc1\u4ef6\u4fe1\u606f\uff08\u7533\u8bf7\u4eba\u5e94\u4f7f\u7528\u552f\u4e00\u8eab\u4efd\u8bc1\u4ef6\u7533\u8bf7\u9879\u76ee\uff0c\u66fe\u7ecf\u4f7f\u7528\u5176\u4ed6\u8eab\u4efd\u8bc1\u4ef6\u4f5c\u4e3a\u7533\u8bf7\u4eba\u6216\u4e3b\u8981\u53c2\u4e0e\u8005\u83b7\u5f97\u8fc7\u9879\u76ee\u8d44\u52a9\u7684\uff0c\u5e94\u5f53\u5728\u6b64\u5217\u660e\uff09<\/strong><strong><\/strong><\/p>\n\n\n\n<p><strong>\u4e3b\u6301\u6216\u53c2\u52a0\u79d1\u7814\u9879\u76ee\uff08\u8bfe\u9898\uff09\u53ca\u4eba\u624d\u8ba1\u5212\u9879\u76ee\u60c5\u51b5\uff08\u6309\u65f6\u95f4\u5012\u5e8f\u6392\u5e8f\uff09\uff1a<\/strong><strong><\/strong><\/p>\n\n\n\n<ol><li>\u56fd\u5bb6\u81ea\u7136\u79d1\u5b66\u57fa\u91d1\u9762\u4e0a\u9879\u76ee\uff0c70471064\u3001\u7f51\u7edc\u6587\u672c\u5185\u5bb9\u5b89\u5168\u667a\u80fd\u5173\u8054\u5206\u6790\u4e0e\u76d1\u6d4b\u65b9\u6cd5\u7814\u7a76\u30012004\/01-2007\/12\u300116\u4e07\u5143\u3001\u5df2\u7ed3\u9898\u3001\u4e3b\u6301\u3002<\/li><li>\u56fd\u5bb6\u81ea\u7136\u79d1\u5b66\u57fa\u91d1\u9762\u4e0a\u9879\u76ee\uff0c 61272362\u3001\u57fa\u4e8e\u4e3b\u4f53\u4e2a\u6027\u5316\u7684\u5fae\u535a\u60c5\u611f\u5206\u6790\u5173\u952e\u6280\u672f\u7814\u7a76, 2013\/01-2016\/12\u300186\u4e07\u5143\u3001\u5728\u7814\u3001\u53c2\u52a0\u3002<\/li><li>\u5b89\u5168\u90e8\u9879\u76ee\uff0cCNITSEC-KY-2011-013\/5\u3001\u5178\u578b\u5e94\u7528\u7cfb\u7edf\u6a21\u62df\u4eff\u771f\u4e0e\u9690\u60a3\u5206\u6790\u7814\u7a76\u2014\u2014\u4e91\u8ba1\u7b97\u30012012\/05-2013\/05\u300145\u4e07\u3001\u5df2\u7ed3\u9898\u3001\u526f\u7ec4\u957f\u3002<\/li><li>\u5b89\u5168\u90e8\u9879\u76ee\uff0cCNITSEC-KY-2011-012\/3\u3001\u65b0\u6280\u672f\u65b0\u5e94\u7528\u53ca\u6218\u7565\u8ddf\u8e2a\u7814\u7a76\u2014\u4e91\u8ba1\u7b97\uff0c2011\/03-2012\/03\u300125\u4e07\u3001\u5df2\u7ed3\u9898\u3001\u53c2\u52a0\u3002<\/li><li>\u4e2d\u56fd\u4eba\u6c11\u94f6\u884c\u56fd\u5bb6\u5f81\u4fe1\u4e2d\u5fc3\u9879\u76ee, 2015-2016\uff0c\u8bfe\u9898\u7814\u7a76\u62a5\u544a\u63d0\u4ea4\u5230APEC\u4f1a\u8bae\u7531\u56fd\u5bb6\u4ee3\u8868\u53c2\u4f1a\u62a5\u544a\u3002<\/li><\/ol>\n\n\n\n<p><strong>\u4ee3\u8868\u6027\u7814\u7a76\u6210\u679c\u548c\u5b66\u672f\u5956\u52b1\u60c5\u51b5\uff08\u6bcf\u9879\u5747\u6309\u65f6\u95f4\u5012\u5e8f\u6392\u5e8f\uff09<\/strong><strong><\/strong><\/p>\n\n\n\n<p><strong>\uff08\u8bf7\u6ce8\u610f\uff1a\u2460\u6295\u7a3f\u9636\u6bb5\u7684\u8bba\u6587\u4e0d\u8981\u5217\u51fa\uff1b\u2461\u5bf9\u671f\u520a\u8bba\u6587\uff1a\u5e94\u6309\u7167\u8bba\u6587\u53d1\u8868\u65f6\u4f5c\u8005\u987a\u5e8f\u5217\u51fa\u5168\u90e8\u4f5c\u8005\u59d3\u540d\u3001\u8bba\u6587\u9898\u76ee\u3001\u671f\u520a\u540d\u79f0\u3001\u53d1\u8868\u5e74\u4ee3\u3001\u5377\uff08\u671f\uff09\u53ca\u8d77\u6b62\u9875\u7801\uff08\u6458\u8981\u8bba\u6587\u8bf7\u52a0\u4ee5\u8bf4\u660e\uff09\uff1b\u2462\u5bf9\u4f1a\u8bae\u8bba\u6587\uff1a\u5e94\u6309\u7167\u8bba\u6587\u53d1\u8868\u65f6\u4f5c\u8005\u987a\u5e8f\u5217\u51fa\u5168\u90e8\u4f5c\u8005\u59d3\u540d\u3001\u8bba\u6587\u9898\u76ee\u3001\u4f1a\u8bae\u540d\u79f0(\u6216\u4f1a\u8bae\u8bba\u6587\u96c6\u540d\u79f0\u53ca\u8d77\u6b62\u9875\u7801)\u3001\u4f1a\u8bae\u5730\u5740\u3001\u4f1a\u8bae\u65f6\u95f4\uff1b\u2463\u5e94\u5728\u8bba\u6587\u4f5c\u8005\u59d3\u540d\u540e\u6ce8\u660e\u7b2c\u4e00<\/strong><strong>\/<\/strong><strong>\u901a\u8baf\u4f5c\u8005\u60c5\u51b5\uff1a\u6240\u6709\u5171\u540c\u7b2c\u4e00\u4f5c\u8005\u5747\u52a0\u6ce8\u4e0a\u6807\u201c<\/strong><strong>#<\/strong><strong>\u201d\u5b57\u6837\uff0c\u901a\u8baf\u4f5c\u8005\u53ca\u5171\u540c\u901a\u8baf\u4f5c\u8005\u5747\u52a0\u6ce8\u4e0a\u6807\u201c<\/strong><strong>*<\/strong><strong>\u201d\u5b57\u6837\uff0c\u552f\u4e00\u7b2c\u4e00\u4f5c\u8005\u4e14\u975e\u901a\u8baf\u4f5c\u8005\u65e0\u9700\u52a0\u6ce8\uff1b\u2464\u6240\u6709\u4ee3\u8868\u6027\u7814\u7a76\u6210\u679c\u548c\u5b66\u672f\u5956\u52b1\u4e2d\u672c\u4eba\u59d3\u540d\u52a0\u7c97\u663e\u793a\u3002\uff09<\/strong><strong><\/strong><\/p>\n\n\n\n<p><strong>\u4e00\u3001\u671f\u520a\u8bba\u6587\uff08\u4ec5\u4e0d\u5217\u6b64\u9879\u65f6\u53ef\u5220\u9664\u8be5\u6807\u9898\uff09<\/strong><strong><\/strong><\/p>\n\n\n\n<ol><li><strong>\u7b2c\u4e00\u4f5c\u8005\u8bba\u6587\uff08\u4ec5\u4e0d\u5217\u6b64\u9879\u65f6\u53ef\u5220\u9664\u8be5\u6807\u9898\uff09<\/strong><strong><\/strong><\/li><\/ol>\n\n\n\n<ul><li><strong>\u901a\u8baf\u4f5c\u8005\u8bba\u6587\uff08\u52ff\u4e0e\u7b2c\u4e00\u4f5c\u8005\u8bba\u6587\u91cd\u590d\uff09\uff08\u4ec5\u4e0d\u5217\u6b64\u9879\u65f6\u53ef\u5220\u9664\u8be5\u6807\u9898\uff0c\u5e8f\u53f7\u6309\u5b9e\u9645\u60c5\u51b5\u7f16\u6392\uff09<\/strong><strong><\/strong><\/li><\/ul>\n\n\n\n<ul><li><strong>\u65e2\u975e\u7b2c\u4e00\u4f5c\u8005\u53c8\u975e\u901a\u8baf\u4f5c\u8005\u8bba\u6587\uff08\u4ec5\u4e0d\u5217\u6b64\u9879\u65f6\u53ef\u5220\u9664\u8be5\u6807\u9898\uff0c\u5e8f\u53f7\u6309\u5b9e\u9645\u60c5\u51b5\u7f16\u6392\uff09<\/strong><strong><\/strong><\/li><\/ul>\n\n\n\n<p><strong>\u4e8c\u3001\u4f1a\u8bae\u8bba\u6587\uff08\u4ec5\u4e0d\u5217\u6b64\u9879\u65f6\u53ef\u5220\u9664\u8be5\u6807\u9898\uff0c\u6807\u9898\u5e8f\u53f7\u6309\u5b9e\u9645\u60c5\u51b5\u7f16\u6392\uff09<\/strong><strong><\/strong><\/p>\n\n\n\n<p><strong>\u8bf7\u6309\u5982\u4e0b\u987a\u5e8f\u5217\u51fa\uff1a<\/strong><strong><\/strong><\/p>\n\n\n\n<p><strong>1. \u7b2c\u4e00\u4f5c\u8005\u8bba\u6587\uff08\u4ec5\u4e0d\u5217\u6b64\u9879\u65f6\u53ef\u5220\u9664\u8be5\u6807\u9898\uff09<\/strong><strong><\/strong><\/p>\n\n\n\n<ul><li>Yanping Zhao*\uff08\u8d75\u71d5\u5e73\uff09, Sanxing Cao, Jianyun Shang\uff0cBowen Liu \uff0cFang Liu. A Service-oriented Architecture for New Media Services with Semantic Analysis[C]. Proceedings of The 2009 International Conference on Engineering Management and Service Sciences (MASS 2009\u670d\u52a1\u79d1\u5b66\u4e0e\u670d\u52a1\u5de5\u7a0b),:49-54.September 20~22, 2009 in Friendship Hotel, Beijing, China. 2009: \uff08EI\u68c0\u7d22\uff1aAccession number: &nbsp;10954945\uff09.<\/li><li>ZHAO, Yanping*\uff08\u8d75\u71d5\u5e73\uff09, Feng, Lei and Chen Lei\uff082007\uff09\uff0cDetection of Multi-Relations Based on Semantic Communities Behaviors\uff0cProceedings of International Conference on Service Systems and Service Management. Chengdu, China. June 9 &#8211; 11, &nbsp;1-7 &nbsp;(2007 IEEE\u670d\u52a1\u7cfb\u7edf\u4e0e\u670d\u52a1\u7ba1\u7406\u56fd\u9645\u4f1a\u8bae)\uff0c\u4e3b\u529e\u65b9\uff1aIEEE Systems, Man and Cybernetics Society\uff0cTsinghua University\uff0cUniversity of Electronic Science and Technology of China\uff1b(EI\u68c0\u7d22Accession number\uff1a 081211151905).<\/li><li>Yanping Zhao*\uff08\u8d75\u71d5\u5e73\uff09\uff0cYidan Wang. Competitive Intelligence Analysis Based on Genetic Neural Network System. Wseas Transactions On: Infromation Science And Applications. 2005, 2(10): 1679-1688. &nbsp;&nbsp;&nbsp;(EI\u68c0\u7d22Accession number: &nbsp;05379358185).<\/li><li>ZHAO Yanping*\uff08\u8d75\u71d5\u5e73\uff09, LU Wei. An Efficient Algorithm for Content Security Filtering Based on Double-Byte. 2007 IEEE Intelligence and Security and Infomatics. IEEE International Conference on Intelligence and Security Informatics(IEEE ISI 2007). New Brunswick, NJ, USA. 2007.5: 300\u2013307. &nbsp;&nbsp;(EI\u68c0\u7d22Accession number\uff1a074010840540).<\/li><li>Yangping ZHAO*(\u8d75\u71d5\u5e73), Jizhuang ZHAO, Rongsheng Xu\uff08\u8bb8\u6995\u751f\uff09. Network Information Content Security: A Framework For Intelligent Analysis And Monitoring. in Proceedings of the Second IEEE International Conference on Services Systems and Services Management (ICSSSM05) China, on June 13 to 15, Co-sponsored by: IEEE Systems, Man and Cybernetics Society and Chongqing University. 2005: 841-843. (EI\u68c0\u7d2206269961826).<\/li><li>Zhao YP*(\u8d75\u71d5\u5e73), Zhang B\uff08\u5f20\u658c\uff09, Su Y\uff08\u82cf\u9896\uff09. Ontology and Rule based Information Sharing and Relevant Multiple Relation Model for E-government Decision Services[C]. &nbsp;PROCEEDINGS of the 5th International Conference on Cooperation and Promotion of Information Resources in Science and Technology(COINFO 10), NOV 27-29, 2010 Beijing, CHINA. 2010: 353-357.(\u6570\u636e\u5e93=SCI-EXPANDED, SSCI, CPCI-S, CPCI-SSH)<\/li><li>Zhao, Yanping*\uff08\u8d75\u71d5\u5e73\uff09, Luo, Senlin\uff08\u7f57\u68ee\u6797\uff09, Bu, Baoshan\uff08\u535c\u5b9d\u5c71\uff09. &nbsp;Impact Evaluation and Prediction Model for Clustering Social Groups[C]. In proceedings of The 11th International Conference on Security and Management (SAM&#8217;12), July 16-19, 2012, Las Vegas, USA, 2012:278-284.<\/li><li>\u8d75\u71d5\u5e73*\uff0c\u5f20\u534e\u5e73*\uff0c\u9a6c\u5b9d\u541b\uff0c\u8d75\u8f89. \u57fa\u4e8e\u52a8\u6001\u77e5\u8bc6\u5173\u8054\u7684\u79d1\u6280\u9879\u76ee\u5e93\u7ba1\u7406[C]. \u4fe1\u606f\u7cfb\u7edf\u534f\u4f1a\u4e2d\u56fd\u5206\u4f1a\u7b2c\u4e94\u5c4a\u5168\u56fd\u5927\u4f1a\uff08CNAIS2013\uff09\u201c\u5927\u6570\u636e\u80cc\u666f\u4e0b\u7684\u4fe1\u606f\u7cfb\u7edf\u7814\u7a76\u4e0e\u5b9e\u8df5\u201d\uff0c\u4e2d\u56fd\uff0c\u8d35\u9633\uff0c2013,10,17-19 \uff1a454\uff0d458.<\/li><\/ul>\n\n\n\n<p><strong>2. \u901a\u8baf\u4f5c\u8005\u8bba\u6587\uff08\u52ff\u4e0e\u7b2c\u4e00\u4f5c\u8005\u8bba\u6587\u91cd\u590d\uff09\uff08\u4ec5\u4e0d\u5217\u6b64\u9879\u65f6\u53ef\u5220\u9664\u8be5\u6807\u9898\uff0c\u5e8f\u53f7\u6309\u5b9e\u9645\u60c5\u51b5\u7f16\u6392\uff09<\/strong><strong><\/strong><\/p>\n\n\n\n<p><strong>3. \u65e2\u975e\u7b2c\u4e00\u4f5c\u8005\u53c8\u975e\u901a\u8baf\u4f5c\u8005\u8bba\u6587\uff08\u4ec5\u4e0d\u5217\u6b64\u9879\u65f6\u53ef\u5220\u9664\u8be5\u6807\u9898\uff0c\u5e8f\u53f7\u6309\u5b9e\u9645\u60c5\u51b5\u7f16\u6392\uff09<\/strong><strong><\/strong><\/p>\n\n\n\n<ul><li>Baojun Ma\uff08\u9a6c\u5b9d\u541b\uff09, Huaping Zhang*\uff08\u5f20\u534e\u5e73\uff09, Yanping Zhao\uff08\u8d75\u71d5\u5e73\uff09. Investigating Associative Classification for Software Fault Prediction: An Experimental Perspective[J]. Int&#8217;l Journal of Software Engineering and Knowledge Engineering, 2013,4:465-469.\uff08SCI\u68c0\u7d22\uff09.<\/li><li>Jiandong Zhou(\u5468\u5efa\u680b\uff09, Yanping Zhao\uff08\u8d75\u71d5\u5e73\uff09, Huaping Zhang*\uff08\u5f20\u534e\u5e73\uff09. Measuring Emotion Bifurcation Points for Individuals in Social Media[C].the Hawaii International Conference on System Science(\u56fd\u9645\u7cfb\u7edf\u79d1\u5b66\u5e74\u4f1a HICSS&#8217;49\uff0c\u7ba1\u7406A\u7c7b\u4f1a\u8bae, EI\u68c0\u7d22), Jan.5-8, 2016, Honolulu, KAUAI, Hawaii USA.2016:1949-1958.<\/li><li>Hua-Ping Zhang(\u5f20\u534e\u5e73), Rui-Qi Zhang(\u5f20\u745e\u742a), Yan-Ping Zhao*(\u8d75\u71d5\u5e73), Bao-Jun Ma(\u9a6c\u5b9d\u541b). Big data modeling and analysis of microblog ecosystem[J]. International Journal of Automation and Computing, April 2014, 11(2):119-127(EI\u68c0\u7d22 20141617594531)<\/li><li>Lei Yang(\u6768\u78ca), Lei Qi, Yan-Ping Zhao*\uff08\u8d75\u71d5\u5e73\uff09, Bin Gao, Tie-Yan Liu. Link Analysis using Time Series of Web Graphs [C]. ACM Sixteenth Conference on Information and Knowledge management (CIKM 2007) \uff08ACM\/IEEE \u56fd\u9645\u77e5\u8bc6\u7ba1\u7406\u4f1a\u8bae\uff09at Lisbon, Portugal. Nov 5-11, 2007: 1011-1014.(Accession number: &nbsp;20091512019835).<\/li><li>\u5f20\u534e\u5e73*\uff0c\u5546\u5efa\u4e91\uff0c\u8d75\u71d5\u5e73. \u4ee5\u4e3b\u4f53\u4e3a\u4e2d\u5fc3\u7684\u5fae\u535a\u8ba1\u7b97\u65b9\u6cd5\u2014\u2014\u5fae\u535a\u8ba1\u7b97\u5fae\u9769\u547d [J]. \u590d\u6742\u7cfb\u7edf\u4e0e\u590d\u6742\u6027\u79d1\u5b66, 2012(04):84-90.<\/li><li>Huaping Zhang*(\u5f20\u534e\u5e73), Yanping Zhao(\u8d75\u71d5\u5e73), Xiaoran Wang(\u738b\u6653\u5189), Turdy, Askar Hamdulla\u7b49. \u4e91\u8ba1\u7b97\u5b89\u5168\u98ce\u9669\u7ba1\u7406\u6846\u67b6\u4e0e\u4eff\u771f\u6a21\u62df\u65b9\u6848. Risk Management Framework for the Cloud Computing and Simulation Programs[C]. COINFO 2012\uff0cIn the Proceedings of the 7th International Conference on Cooperation and Promotion of Information Resources in Science and Technology. Nanjing University, on November 23-25, 2012: 47-67. (CPCI-SSH\u68c0\u7d22).<\/li><li>Lei Yang, Jianyun Shang, Yanping Zhao*\uff08\u8d75\u71d5\u5e73\uff09. An Efficient Dictionary Mechanism Based on Double-Byte. Proceedings on The International Conference on Asian Digital Libraries (The 10th ICADL 2007) 10-13, Dec.2007 at HaNoi, Viet Nam. &nbsp;\u4e9a\u6d32\u56fd\u9645\u6570\u5b57\u56fe\u4e66\u9986\u4f1a\u8bae(Lecture Notes in Computer Science vol. 4822), 2007: 420-423. &nbsp;(EI\u68c0\u7d22Accession number: 9751168).<\/li><\/ul>\n\n\n\n<p><strong>\u4e09\u3001\u4e13\u8457\uff08\u4ec5\u4e0d\u5217\u6b64\u9879\u65f6\u53ef\u5220\u9664\u8be5\u6807\u9898\uff0c\u6807\u9898\u5e8f\u53f7\u6309\u5b9e\u9645\u60c5\u51b5\u7f16\u6392\uff09<\/strong><strong><\/strong><\/p>\n\n\n\n<p>\u5f20\u534e\u5e73\/\u9ad8\u51ef\/\u9ec4\u6cb3\u71d5\/\u8d75\u71d5\u5e73. \u5927\u6570\u636e\u641c\u7d22\u4e0e\u6316\u6398[M] \u4e13\u8457,\u79d1\u5b66\u51fa\u7248\u793e,2014,5<\/p>\n\n\n\n<p><strong>\u56db\u3001\u83b7\u5f97\u5b66\u672f\u5956\u52b1\uff08\u4ec5\u4e0d\u5217\u6b64\u9879\u65f6\u53ef\u5220\u9664\u8be5\u6807\u9898\uff0c\u6807\u9898\u5e8f\u53f7\u6309\u5b9e\u9645\u60c5\u51b5\u7f16\u6392\uff09<\/strong><strong><\/strong><\/p>\n\n\n\n<ol><li>\u5317\u4eac\u5e02\u79d1\u6280\u8fdb\u6b65\u4e09\u7b49\u5956\uff0c2000\u5e74\uff0c\u6392\u540d\u7b2c2\uff0c\u4fe1\u606f\u79d1\u5b66\u3002<\/li><li>\u5317\u4eac\u5e02\u79d1\u6280\u8fdb\u6b65\u4e09\u7b49\u5956\uff0c2001\u5e74\uff0c\u6392\u540d\u7b2c3\uff0c\u7edf\u8ba1\u5b66\u4e0e\u7ecf\u6d4e\u5b66\u3002<\/li><li>\u6cb3\u5317\u7701\u79d1\u5b66\u6280\u672f\u6210\u679c\u5956\uff0c\u6392\u540d\u7b2c5\uff0c\u6d77\u91cf\u5f02\u6784\u4fe1\u606f\u5904\u7406\u5e73\u53f0\u5173\u952e\u6280\u672f\u7684\u7814\u53d1\u4e0e\u5e94\u7528\u793a\u8303\uff0c\u6cb3\u5317\u7701\u79d1\u5b66\u6280\u672f\u5385\uff0c 2014\uff0c\u8ba1\u7b97\u673a\u79d1\u5b66\u3002<\/li><\/ol>\n","protected":false},"excerpt":{"rendered":"<p>\u8d75\u71d5\u5e73\uff0c\u5317\u4eac\u7406\u5de5\u5927\u5b66\u7ba1\u7406\u4e0e\u7ecf\u6d4e\u5b66\u9662\uff0c\u6559\u6388 \u6559\u80b2\u7ecf\u5386\uff08\u4ece\u5927\u5b66\u672c\u79d1\u5f00\u59cb\uff0c\u6309\u65f6\u95f4\u5012\u5e8f\u6392 &hellip; <a href=\"http:\/\/www.nlpir.org\/wordpress\/2019\/01\/14\/%e8%b5%b5%e7%87%95%e5%b9%b3%e6%95%99%e6%8e%88\/\">\u7ee7\u7eed\u9605\u8bfb <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":899,"featured_media":6635,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33,36],"tags":[],"_links":{"self":[{"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/posts\/6634"}],"collection":[{"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/users\/899"}],"replies":[{"embeddable":true,"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/comments?post=6634"}],"version-history":[{"count":2,"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/posts\/6634\/revisions"}],"predecessor-version":[{"id":6646,"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/posts\/6634\/revisions\/6646"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/media\/6635"}],"wp:attachment":[{"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/media?parent=6634"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/categories?post=6634"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.nlpir.org\/wordpress\/wp-json\/wp\/v2\/tags?post=6634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}