期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
猜谜十法
1
《湖南农机》 2005年第6期34-34,共1页
故事法:即用有故事情节的词句作谜面,谜底可以猜字、词、物等。例如“九横六直”一个字。谜底为“晶”字。
关键词 谜底 故事 运典 换字法 排比 排除 拆台 加减 会面
下载PDF
习语的翻译原则
2
作者 谢辉 《苏州大学学报(工科版)》 CAS 2002年第6期156-157,共2页
习语是语言中的精华,也是语言中最难翻译的部分。由于中西文化存在着各方面的差异,这些差异给翻译造成了很大的障碍,因此在翻译的过程中,除了采用直译、意译外,还要采用更词换字法,这样才能使译出的习语有浓厚的民族特色。
关键词 文化差异 习语 翻译 更词换字法 民族特色 英语
下载PDF
陌生化·仿拟·审美——论仿拟格的美学基础 被引量:1
3
作者 徐国珍 《宁夏师范学院学报》 1993年第1期61-64,共4页
本文阐述仿拟是建立在陌生化美学基础上的一种修辞方式。它可以使所表现的对象在读者心目中发生变异,从而对读者形成一种强烈的刺激,有效地增强了作品的可感性和吸引力,产生积极的审美效应。文章也指出仿拟实现陌生化的途径、方式及运... 本文阐述仿拟是建立在陌生化美学基础上的一种修辞方式。它可以使所表现的对象在读者心目中发生变异,从而对读者形成一种强烈的刺激,有效地增强了作品的可感性和吸引力,产生积极的审美效应。文章也指出仿拟实现陌生化的途径、方式及运用这一辞格应注意的两个方面。 展开更多
关键词 仿拟格 修辞方式 美学基础 审美效应 期待视野 换字法 修辞效果 审美客体 咏柳 可感性
下载PDF
高中语文古诗词教学策略探究——以《蜀相》一文为例
4
作者 李慧芬 《中学生作文指导》 2021年第3期0129-0129,共1页
本文立足于高中语文教学的实际情况,从“重点诗词事物与诗词的意境”“换字方法与诗词韵律的关联”“诗词的创作背景与内涵再现”三个方面出发,对如何提高教学质量,塑造学生养成完善的学习思路进行分析与探究。
关键词 诗词 《蜀相》 诗词意境 换字法 诗词内涵
下载PDF
多元鉴赏策略在古诗词教学中的运用
5
作者 陈翠娥 《语文天地(初中版)》 2014年第7期30-31,共2页
千百年来,中国古典诗词以其精美凝练的语言、密聚叠加的意象、悠远深邃的意境、丰富美丽的情感等,熏陶着中华民族一代又一代优秀儿女的美丽灵魂,哺育着中华民族一代又一代优秀儿女健康成长。而今,古典诗词以其自身蕴涵的丰富多彩的形式... 千百年来,中国古典诗词以其精美凝练的语言、密聚叠加的意象、悠远深邃的意境、丰富美丽的情感等,熏陶着中华民族一代又一代优秀儿女的美丽灵魂,哺育着中华民族一代又一代优秀儿女健康成长。而今,古典诗词以其自身蕴涵的丰富多彩的形式、内容、风格、情感、意境、意象、语言等多维元素,又成为初中语文教材中的一道亮丽的风景,引发无数学生对之孜孜不倦的吟咏、探究、品鉴。 展开更多
关键词 古典诗词 古诗词教学 初中语文教材 情感美 语言美 品鉴 首联 文言文教学 换字法 古乐府
下载PDF
Comparison of fast discrete wavelet transform algorithms
6
作者 孟书苹 《Journal of Chongqing University》 CAS 2005年第2期84-89,共6页
This paper presents an analysis on and experimental comparison of several typical fast algorithms for discrete wavelet transform (DWT) and their implementation in image compression, particularly the Mallat algorithm, ... This paper presents an analysis on and experimental comparison of several typical fast algorithms for discrete wavelet transform (DWT) and their implementation in image compression, particularly the Mallat algorithm, FFT-based algorithm, Short- length based algorithm and Lifting algorithm. The principles, structures and computational complexity of these algorithms are explored in details respectively. The results of the experiments for comparison are consistent to those simulated by MATLAB. It is found that there are limitations in the implementation of DWT. Some algorithms are workable only for special wavelet transform, lacking in generality. Above all, the speed of wavelet transform, as the governing element to the speed of image processing, is in fact the retarding factor for real-time image processing. 展开更多
关键词 discrete wavelet transforms (DWT) fast algorithms computational complexity
下载PDF
汉语的人称代词复数表示法 被引量:31
7
作者 李蓝 《方言》 CSSCI 北大核心 2008年第3期224-243,共20页
本文首先确定人称代词复数表示法的类型参项。然后对443个汉语方言的人称代词复数表示法进行归纳整理。现代汉语方言中使用的人称代词复数表示法共有4类24种复数表示法。用同样的方法来归纳44个少数民族语言,这些少数民族语言有3类9种... 本文首先确定人称代词复数表示法的类型参项。然后对443个汉语方言的人称代词复数表示法进行归纳整理。现代汉语方言中使用的人称代词复数表示法共有4类24种复数表示法。用同样的方法来归纳44个少数民族语言,这些少数民族语言有3类9种复数表示法,没有汉语方言复杂。接下来本文讨论了汉语人称代词复数表示法中的一些问题。首先讨论的是人称代词复数表示法的出现顺序与山东方言中的"回头演变"现象。然后本文从认知-功能语言学的角度来讨论四种人称代词复数表示法的优劣,认为信息结构和信息编码的优势是增标法成为汉语人称代词复数表示法优势类型的主要原因。最后的"余论"简略地讨论了语言类型学应如何处理汉语这种方言复杂的方言,语言类型学的发展趋势及其与方言学、历史语言学的关系等问题。 展开更多
关键词 现代汉语方言 人称代词复数表示 同用型 用型 标型 复用型 换字法 增标
原文传递
Study of Software Radio Receiver Development Platform
8
作者 仇润鹤 刘锦高 叶建芳 《Journal of Donghua University(English Edition)》 EI CAS 2005年第2期126-129,共4页
The Paper introduces an IF software radio receiver development Platform based on high-speed monolithic A/D Converter AD6640, Progranunable Digital Down-converter AD6620 and high-speed DSP chip TMSC320C6701. The implem... The Paper introduces an IF software radio receiver development Platform based on high-speed monolithic A/D Converter AD6640, Progranunable Digital Down-converter AD6620 and high-speed DSP chip TMSC320C6701. The implementation method is described as well as AD6620 parameter setting analysis. It also presents a flow chart of the on-line programming with the help of PC. The algorithm for demodulation AM signal is discussed. 展开更多
关键词 software Radio development platform Digital Down-converter demodulation algorithm
下载PDF
A new image watermarking framework based on levels-directions decomposition in contourlet representation
9
作者 M.F.Kazemi M.A.Pourmina A.H.Mazinan 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第3期521-532,共12页
With the development of digital information technologies,robust watermarking framework is taken into real consideration as a challenging issue in the area of image processing,due to the large applicabilities and its u... With the development of digital information technologies,robust watermarking framework is taken into real consideration as a challenging issue in the area of image processing,due to the large applicabilities and its utilities in a number of academic and real environments.There are a wide range of solutions to provide image watermarking frameworks,while each one of them is attempted to address an efficient and applicable idea.In reality,the traditional techniques do not have sufficient merit to realize an accurate application.Due to the fact that the main idea behind the approach is organized based on contourlet representation,the only state-of-the-art materials that are investigated along with an integration of the aforementioned contourlet representation in line with watermarking framework are concentrated to be able to propose the novel and skilled technique.In a word,the main process of the proposed robust watermarking framework is organized to deal with both new embedding and de-embedding processes in the area of contourlet transform to generate watermarked image and the corresponding extracted logo image with high accuracy.In fact,the motivation of the approach is that the suggested complexity can be of novelty,which consists of the contourlet representation,the embedding and the corresponding de-embedding modules and the performance monitoring including an analysis of the watermarked image as well as the extracted logo image.There is also a scrambling module that is working in association with levels-directions decomposition in contourlet embedding mechanism,while a decision maker system is designed to deal with the appropriate number of sub-bands to be embedded in the presence of a series of simulated attacks.The required performance is tangibly considered through an integration of the peak signal-to-noise ratio and the structural similarity indices that are related to watermarked image.And the bit error rate and the normal correlation are considered that are related to the extracted logo analysis,as well.Subsequently,the outcomes are fully analyzed to be competitive with respect to the potential techniques in the image colour models including hue or tint in terms of their shade,saturation or amount of gray and their brightness via value or luminance and also hue,saturation and intensity representations,as long as the performance of the whole of channels are concentrated to be presented.The performance monitoring outcomes indicate that the proposed framework is of significance to be verified. 展开更多
关键词 contourlet based watermarking framework levels-directions decomposition embedding process de-embedding process peak signal-to-noise ratio structural similarity indices normal correlation bit error rate
下载PDF
Multi-Level Cryptographic Functions for the Functionalities of Open Database System
10
作者 Akinwale Taofiki Adio Adekoya Felix Adebayo Ooju Emmanuel Oluwafemi 《Computer Technology and Application》 2011年第9期730-735,共6页
The purpose of this paper is to design and implement a secure open database system for organizations that are increasingly opened up their information for easy access by different users. The work proposed some functio... The purpose of this paper is to design and implement a secure open database system for organizations that are increasingly opened up their information for easy access by different users. The work proposed some functionalities such as open password entry with active boxes, combined encryption methods and agent that can be incorporated into an open database system. It designed and implemented an algorithm that would not allow users to have free access into open database system. A user entering his password only needs to carefully study the sequence of codes and active boxes that describe his password and then enter these codes in place of his active boxes. The approach does not require the input code to be hidden from anyone or converted to place holder characters for security reasons. Integrating this scheme into an open database system is viable in practice in term of easy use and will improve security level of information. 展开更多
关键词 Database system CRYPTOGRAPHY agent random number PEER-TO-PEER algorithm
下载PDF
A Parametric Autoregressive Model for the Extraction of Electric Network Frequency Fluctuations in Audio Forensic Authentication
11
作者 Tarek E. Gemayel Martin Bouchard 《Journal of Energy and Power Engineering》 2016年第8期504-512,共9页
This paper proposes a new method for extracting ENF (electric network frequency) fluctuations from digital audio recordings for the purpose of forensic authentication. It is shown that the extraction of ENF componen... This paper proposes a new method for extracting ENF (electric network frequency) fluctuations from digital audio recordings for the purpose of forensic authentication. It is shown that the extraction of ENF components from audio recordings is realizable by applying a parametric approach based on an AR (autoregressive) model. The proposed method is compared to the existing STFT (short-time Fourier transform) based ENF extraction method. Experimental results from recorded electrical grid signals and recorded audio signals show that the proposed approach can improve the time resolution in the extracted ENF fluctuations and improve the detection of tampering with short alterations in longer audio recordings. 展开更多
关键词 Audio forensic authentication electric network frequency fluctuations autoregressive modeling tampering anddiscontinuity detection.
下载PDF
楚默访谈——书法形式美学
12
作者 陈量 《中国书法》 CSSCI 北大核心 2016年第10期21-24,共4页
<正>书法研究从外部转向内部陈量(以下称"陈"):国人的书学研究,研究书法史,探究历史上的书法兴衰,探讨书体、书风的沿革,乃至笔法的发展,笔、墨、纸、砚等媒介材料,相对书法的形式探讨甚少,您的《书法形式美学》
关键词 形式美学 媒介材料 书学 书风 书势 陈量 换字法 书外书 陈书 形文
原文传递
记忆法在政治课中的运用
13
作者 刘志效 《思想政治课教学》 北大核心 1990年第11期5-6,共2页
随着思想政治课新教材的普遍使用,师生面临着一个共同的难题:怎样才能尽快地掌握住新教材中的基础知识。这就迫使教师在教学方法上不得不另辟蹊径:使用一些行之有效的记忆法巧妙地迅速地记住所教知识;老师上课时再自觉地将这些方法传授... 随着思想政治课新教材的普遍使用,师生面临着一个共同的难题:怎样才能尽快地掌握住新教材中的基础知识。这就迫使教师在教学方法上不得不另辟蹊径:使用一些行之有效的记忆法巧妙地迅速地记住所教知识;老师上课时再自觉地将这些方法传授给学生,使学生很快地记住所学知识。因而记忆法在思想政治课中的运用就成了必然的了。 展开更多
关键词 记忆 思想政治课 教学方 记忆方 联想 换字法 课堂气氛 聪明绝顶 暂时神经联系 组织纪律性
原文传递
巧借文本,突破文言文教学瓶颈
14
作者 吴慧红 《中华活页文选(教师)》 2016年第9期62-64,共3页
传统文言教学强调"八字宪法",即"字字落实,句句清楚",但随着课程改革不断深入,这种教学的弊端已十分明显。目前大多数语文老师文言教学多采用先从整体上把握重点字词、文言句式,再对内容分析挖掘的方法,这种方式把一篇文言文分成两... 传统文言教学强调"八字宪法",即"字字落实,句句清楚",但随着课程改革不断深入,这种教学的弊端已十分明显。目前大多数语文老师文言教学多采用先从整体上把握重点字词、文言句式,再对内容分析挖掘的方法,这种方式把一篇文言文分成两块:一块是语言材料,另一块是文学作品。这种教学模式,遏制了学生学习的主动精神,学生思维能力得不到提高。 展开更多
关键词 文言文教学 学生思维能力 内容挖掘 结构助词 文学作品 设疑 词类活用 浅易文言文 内容分析 换字法
原文传递
怎样拟好作文题
15
作者 刘翠华 《课程教材教学研究(中教研究)》 2010年第Z4期79-80,共2页
"眼睛是心灵的窗户",题目是文章的眼睛。古人写诗讲究一个"诗眼",文人写文章讲究一个"文眼",作为学生来说,拟好作文题就等于作文成功了一半。
关键词 文眼 诗眼 又一村 换字法 列锦 小荷 借代 高中生活 数学公式 横看成岭侧成峰
原文传递
Uniform Deterministic Discrete Method for Three Dimensional Systems
16
作者 Ben-Wen Li Wen-Quan Tao Yu-Hong Nie 《Journal of Thermal Science》 SCIE EI CAS CSCD 1997年第2期117-122,共6页
For radiative direct exchange areas in three dimensional system, the Uniform Deterministic Discrete Method (UDDM) was adopted. The spherical surface dividing method for sending area element and the regular icosahedron... For radiative direct exchange areas in three dimensional system, the Uniform Deterministic Discrete Method (UDDM) was adopted. The spherical surface dividing method for sending area element and the regular icosahedron for sending volume element can meet with the direct exchange area computation of any kind of zone pairs. The numerical examples of direct exchange area in three dimensional system with nonhomogeneous attenuation coefficients indicated that the UDDM can give very high numerical accuracy. 展开更多
关键词 radiative heat transfer ray tracing method direct exchange area numerical method
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部