期刊文献+
共找到136篇文章
< 1 2 7 >
每页显示 20 50 100
The Mythological Battles Around the World The Images and Meanings of International Dragon-Slayers
1
作者 QiguangZhao 《天津外国语大学学报》 1996年第2期17-26,共10页
Dragons and dragon slayers belong to a system ofsemiology.They are images with messages.Differentcultures in the world have assigned to these imageshistorical limits,conditions of use,and introducedmultiple meanings i... Dragons and dragon slayers belong to a system ofsemiology.They are images with messages.Differentcultures in the world have assigned to these imageshistorical limits,conditions of use,and introducedmultiple meanings into them.Dragons do not exist,therefore dragon slayers do not either.However,they have become an artificial existence in most cul-tures,and this existence have passed from a closed,silent existence to an oral state,open to appropria-tion by society,for there is no regulation,either nat-ural or not,which forbids imagination.Few symbols saturate human civilization sobroadly and thoroughly as those of the dragon:proudly flicking its tail across the tapestries 展开更多
关键词 St The Mythological battles Around the World The Images and Meanings of International Dragon-Slayers
下载PDF
WeChat Battles Potential Charge
2
《ChinAfrica》 2013年第6期12-13,共2页
Whether or not Chinese over-the-top (OTT) content service WeChat, in Chinese, Weixin, should start charging users for its services has recently been the subject of heated debate.
关键词 WeChat battles Potential Charge
下载PDF
Fantastic Histories: The Battles of Coxinga and the Preservation of Ming in Japan
3
作者 Satoko SHIMAZAKI 《Frontiers of Literary Studies in China-Selected Publications from Chinese Universities》 2015年第1期17-53,共37页
People in Japan reacted to the bewilderment they felt at the fall of Ming by creating a bifurcated view of China, evident in encyclopedias and gazeteers: On the one hand, there was the traditional China represented b... People in Japan reacted to the bewilderment they felt at the fall of Ming by creating a bifurcated view of China, evident in encyclopedias and gazeteers: On the one hand, there was the traditional China represented by the Ming; on the other, there was the new China ruled by the Dattan or the Tatars. Such was the power of the Ming as an image that it endured in Japanese literature and theater for centuries after its fall. This article explores the preservation in popular discourse of the Ming as the most natural representation of China, focusing on Chikamatsu Monzaemon's hit jrruri play The Battles of Coxinga (Kokusen'ya kassen), first staged in 1715 and produced many times after that, showing how the political turmoil was filtered through both misunderstandings and creative fabrications. It shows that The Battles of Coxinga creates a fantastic image of China, as opposed to the barbaric Dattan, by drawing on historical memories internal to Japan and readily available images of foreignness. I argue that the preservation of the Ming in popular theater offered audiences a means of rethinking Japan's position as the inheritor of a "universal" Chinese essence in an age when knowledge of the world was being dramatically expanded by imported European cartography, complicating earlier views of a world centered on the Three Realms or the Sinocentric world order. 展开更多
关键词 fall of the Ming Chikamatsu Monzaemon The battles of Coxinga(Kokusen 'ya kassen) Nishikawa Joken Japanese views of China
原文传递
Egypt Battles to Save Its Endangered Tortoise
4
作者 Reim Bashir 陆小丫 《当代外语研究》 2000年第10期19-21,共3页
本文让我们认识了一种Egyptian Tortoise,其学名是Testudo Kleinmanni,是世界上最小的龟种之一。其生活环境险恶,并有“保护色”: It is found in both sandy and fairly rocky habitats(生活环境)and its lightbrown color blends(混和... 本文让我们认识了一种Egyptian Tortoise,其学名是Testudo Kleinmanni,是世界上最小的龟种之一。其生活环境险恶,并有“保护色”: It is found in both sandy and fairly rocky habitats(生活环境)and its lightbrown color blends(混和)in with the local soil color. 但是,这种保护色也许能帮助它们对付其他动物,然而,“保护色”却对付不了本应是它们朋友的人类!现在,Testudo Kleinmanni已被列为most endangeredtortoises。 本文透露的信息让我们略感欣慰:拯救Testudo Kleinmanni已经成了一个国际行动。 世界野生动物横遭“灭顶之灾”的原因似乎有其共同之处,值得我们深思: Overgrazing(过度放牧)and the expansion of agriculture and tourism threatentheir existence… 展开更多
关键词 过度放牧 Egypt battles to Save Its Endangered Tortoise
原文传递
Optimal Cyber Attack Strategy Using Reinforcement Learning Based onCommon Vulnerability Scoring System
5
作者 Bum-Sok Kim Hye-Won Suk +2 位作者 Yong-Hoon Choi Dae-Sung Moon Min-Suk Kim 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1551-1574,共24页
Currently,cybersecurity threats such as data breaches and phishing have been on the rise due to the many differentattack strategies of cyber attackers,significantly increasing risks to individuals and organizations.Tr... Currently,cybersecurity threats such as data breaches and phishing have been on the rise due to the many differentattack strategies of cyber attackers,significantly increasing risks to individuals and organizations.Traditionalsecurity technologies such as intrusion detection have been developed to respond to these cyber threats.Recently,advanced integrated cybersecurity that incorporates Artificial Intelligence has been the focus.In this paper,wepropose a response strategy using a reinforcement-learning-based cyber-attack-defense simulation tool to addresscontinuously evolving cyber threats.Additionally,we have implemented an effective reinforcement-learning-basedcyber-attack scenario using Cyber Battle Simulation,which is a cyber-attack-defense simulator.This scenarioinvolves important security components such as node value,cost,firewalls,and services.Furthermore,we applieda new vulnerability assessment method based on the Common Vulnerability Scoring System.This approach candesign an optimal attack strategy by considering the importance of attack goals,which helps in developing moreeffective response strategies.These attack strategies are evaluated by comparing their performance using a variety ofReinforcement Learning methods.The experimental results show that RL models demonstrate improved learningperformance with the proposed attack strategy compared to the original strategies.In particular,the success rateof the Advantage Actor-Critic-based attack strategy improved by 5.04 percentage points,reaching 10.17%,whichrepresents an impressive 98.24%increase over the original scenario.Consequently,the proposed method canenhance security and risk management capabilities in cyber environments,improving the efficiency of securitymanagement and significantly contributing to the development of security systems. 展开更多
关键词 Reinforcement learning common vulnerability scoring system cyber attack cyber battle simulation
下载PDF
Tactical reward shaping for large-scale combat by multi-agent reinforcement learning
6
作者 DUO Nanxun WANG Qinzhao +1 位作者 LYU Qiang WANG Wei 《Journal of Systems Engineering and Electronics》 CSCD 2024年第6期1516-1529,共14页
Future unmanned battles desperately require intelli-gent combat policies,and multi-agent reinforcement learning offers a promising solution.However,due to the complexity of combat operations and large size of the comb... Future unmanned battles desperately require intelli-gent combat policies,and multi-agent reinforcement learning offers a promising solution.However,due to the complexity of combat operations and large size of the combat group,this task suffers from credit assignment problem more than other rein-forcement learning tasks.This study uses reward shaping to relieve the credit assignment problem and improve policy train-ing for the new generation of large-scale unmanned combat operations.We first prove that multiple reward shaping func-tions would not change the Nash Equilibrium in stochastic games,providing theoretical support for their use.According to the characteristics of combat operations,we propose tactical reward shaping(TRS)that comprises maneuver shaping advice and threat assessment-based attack shaping advice.Then,we investigate the effects of different types and combinations of shaping advice on combat policies through experiments.The results show that TRS improves both the efficiency and attack accuracy of combat policies,with the combination of maneuver reward shaping advice and ally-focused attack shaping advice achieving the best performance compared with that of the base-line strategy. 展开更多
关键词 deep reinforcement learning multi-agent reinforce-ment learning multi-agent combat unmanned battle reward shaping
下载PDF
高分辨一维距离像的雷达目标识别方法 被引量:1
7
作者 樊萍 景占荣 《火力与指挥控制》 CSCD 北大核心 2008年第11期112-115,共4页
提出了一种基于高分辨一维距离像的宽带雷达目标识别方法。首先使用零相位描述对雷达回波进行预处理,实现距离像的绝对对准,解决了平移敏感性问题。然后根据多分辨分析构造出3次Battle-Lemarie小波函数和尺度函数,对预处理后的一维距离... 提出了一种基于高分辨一维距离像的宽带雷达目标识别方法。首先使用零相位描述对雷达回波进行预处理,实现距离像的绝对对准,解决了平移敏感性问题。然后根据多分辨分析构造出3次Battle-Lemarie小波函数和尺度函数,对预处理后的一维距离像进行小波变换提取目标特征矢量,在显著降低特征存储空间的同时保留了主要散射点。最后对3类不同目标的雷达实测数据进行识别试验,结果表明本算法不但具有较高的正确识别率,而且能够有效降低加性高斯白噪声对识别率的影响。 展开更多
关键词 目标识别 一维距离像 零相位描述 特征提取 Battle—Lemarie小波
下载PDF
Enterovirus B Sneaks into Victim Cells through Accomplice Receptors
8
作者 YAN Fusheng 《Bulletin of the Chinese Academy of Sciences》 2019年第2期96-100,共5页
“If you know both the enemy and yourself well, you need not to fear for the results of a hundred battles,” wrote Sun Tzu, a Chinese philosopher, in his famous the Art of War about 2,500 years ago. This is particular... “If you know both the enemy and yourself well, you need not to fear for the results of a hundred battles,” wrote Sun Tzu, a Chinese philosopher, in his famous the Art of War about 2,500 years ago. This is particularly true in the ever-lasting war against human viruses. Recently, a vital piece of information has been acquired concerning enteroviruses, which could cause many severe brain infections and even death in children. A recent study published in Cell unravels how these viruses sneak into cells with the help of accomplices from the host, opening a new window on developing drugs to specifically fight against them. 展开更多
关键词 results battles CHILDREN
下载PDF
Knowledge-oriented modeling for influencing factors of battle damage in military industrial logistics:An integrated method 被引量:2
9
作者 Xiong Li Xiao-dong Zhao Wei Pu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2020年第3期571-587,共17页
Modeling influencing factors of battle damage is one of essential works in implementing military industrial logistics simulation to explore battle damage laws knowledge.However,one of key challenges in designing the s... Modeling influencing factors of battle damage is one of essential works in implementing military industrial logistics simulation to explore battle damage laws knowledge.However,one of key challenges in designing the simulation system could be how to reasonably determine simulation model input and build a bridge to link battle damage model and battle damage laws knowledge.In this paper,we propose a novel knowledge-oriented modeling method for influencing factors of battle damage in military industrial logistics,integrating conceptual analysis,conceptual modeling,quantitative modeling and simulation implementation.We conceptualize influencing factors of battle damage by using the principle of hierarchical decomposition,thus classifying the related battle damage knowledge logically.Then,we construct the conceptual model of influencing factors of battle damage by using Entity-Relations hip approach,thus describing their interactions reasonably.Subsequently,we extract the important influencing factors by using social network analysis,thus evaluating their importance quantitatively and further clarifying the elements of simulation.Finally,we develop an agent-based military industry logistics simulation system by taking the modeling results on influencing factors of battle damage as simulation model input,and obtain simulation model output,i.e.,new battle damage laws knowledge,thus verifying feasibility and effectiveness of the proposed method.The results show that this method can be used to support human decision-making and action. 展开更多
关键词 Battle damage Industrial logistics Entity-relationship approach Social network analysis Agent-based simulation
下载PDF
Further Recognition of Interventional Medicine 被引量:3
10
作者 Lin-sun Li 《Journal of Interventional Medicine》 2018年第2期121-123,共3页
Subtle changes have occurred in China, and interventional radiology has gradually become an independent specialty, separated from diagnostic radiology. This has been called "Interventionalogy", "interve... Subtle changes have occurred in China, and interventional radiology has gradually become an independent specialty, separated from diagnostic radiology. This has been called "Interventionalogy", "interventional medicine(IM)", or simply Intervention by our team,and "Interventional Radiology" is used no more. It has even been given the name "Third clinical Medicine" by us. Chinese intervention has established an independent association for interventional doctors, as well as independent interventional societies in many provinces. The national interventional society will likely be set up at some point in time. Chinese interve ntion has set up their own clinical wards, with much attention paid to a clinical, professional, and normalized direction for development, and established special nursing units. According to us, turf battle is meaningless. "The Third clinical Medicine" belongs to all human beings. It could also be predicted that interventional history will follow the same evolutionary rule as other disciplines, i.e., "long divided, must unite; long united, must divide". 展开更多
关键词 INTERVENTIONAL RADIOLOGY INTERVENTIONAL MEDICINE third clinical MEDICINE independent DEPARTMENT of INTERVENTIONAL MEDICINE TURF BATTLE
下载PDF
Packet Drop Battling Mechanism for Energy Aware Detection in Wireless Networks 被引量:5
11
作者 Ahmad F.Subahi Youseef Alotaibi +1 位作者 Osamah Ibrahim Khalaf F.Ajesh 《Computers, Materials & Continua》 SCIE EI 2021年第2期2077-2086,共10页
Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks(WMANets).There are various routing attacks which harm Ad Hoc networks.This is because of the uns... Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks(WMANets).There are various routing attacks which harm Ad Hoc networks.This is because of the unsecure wireless communication,resource constrained capabilities and dynamic topology.In order to cope with these issues,Ad Hoc On-Demand Distance Vector(AODV)routing protocol can be used to remain the normal networks functionality and to adjust data transmission by defending the networks against black hole attacks.The proposed system,in this work,identifies the optimal route from sender to collector,prioritizing the number of jumps,the battery life,and security,which are fundamental prerequisites.Researches have proposed various plans for detecting the shortest route,as well as ensuring energy conversions and defense against threats and attacks.In this regard,the packet drop attack is one of the most destructive attack against WMANet communication and hence merits special attention.This type of attack may allow the attacker to take control of the attacked hubs,which may lost packets or transmitted information via a wrong route during the packets journey from a source hub to a target one.Hence,a new routing protocol method has been proposed in this study.It applies the concept of energy saving systems to conserve energy that is not required by the system.The proposed method for energy aware detection and prevention of packet drop attacks in mobile ad hoc networks is termed the Ad Hoc On-Demand and Distance Vector–Packet Drop Battling Mechanism(AODV–PDBM). 展开更多
关键词 Wireless and mobile ad hoc networks(WMANet) packet drop attack(PDA) ad hoc on-demand distance vector(AODV) dynamic source routing(DSR) packet drop battling mechanism(PDBM)
下载PDF
BUILDING A MODERATELY PROSPEROUS SOCIETY IN ALL RESPECTS——Poverty Reduction: Xi Jinping’s Statements and Chinese Path 被引量:5
12
作者 Huang Chengwei Yuan Quan 《China Economist》 2020年第1期2-23,共22页
After the founding of the People’s Republic of China, the Chinese people have been struggling against poverty amid national development under the leadership of the Communist Party of China(CPC). Since reform and open... After the founding of the People’s Republic of China, the Chinese people have been struggling against poverty amid national development under the leadership of the Communist Party of China(CPC). Since reform and opening up, in particular, China has planned for and organized development-oriented poverty reduction practices on a broad scale with remarkable achievements and blazed a new path of development-oriented poverty reduction with Chinese characteristics. This path is both an essential component of Chinese socialism and a result of the CPC’s ideological improvement on poverty reduction. Since the 18 th CPC National Congress in 2012, the whole Party, country, and society have been called upon to fight the battle against poverty on a full-scale under the guidance of General Secretary Xi Jinping’s important statements on poverty reduction, unveiling a new stage for China’s development-oriented poverty reduction in the new era. China’s unprecedented poverty reduction achievements have enriched the path of poverty reduction with Chinese characteristics. Xi Jinping’s insightful and coherent statements on poverty reduction represent the latest results of Marxist anti-poverty theories and comprise an essential part of Xi Jinping Thought on Socialism with Chinese Characteristics for the New Era. His guidelines are the basis for the brilliant achievements of China’s poverty reduction endeavors, and will contribute Chinese experience and wisdom to global poverty governance. 展开更多
关键词 poverty reduction path with Chinese characteristics Xi Jinping’s statements on poverty reduction poverty reduction ideas battle against poverty
下载PDF
Design and Implementation of Distributed Self-Election Dynamic Array Honeypot System 被引量:1
13
作者 石乐义 李婕 +1 位作者 韩煦 贾春福 《China Communications》 SCIE CSCD 2011年第4期109-115,共7页
Traditional honeypot is in fact a "passive proactive" defense mechanism because it may lose the value entirely once the adversary has detected the existence of the static trap and bypassed it.Our work focuse... Traditional honeypot is in fact a "passive proactive" defense mechanism because it may lose the value entirely once the adversary has detected the existence of the static trap and bypassed it.Our work focuses on a Self-Election dynamic honeypot framework which aims to bewilder attackers by coordinating and switching roles periodically to form a huge dynamic puzzle.In this paper,we discuss the UDP Spokesman synchronization scheme and the Self-Election coordination method,perform the framework simulation of the dynamic array honeypot with NS2,carry out the prototype implementation by Java,and then validate the effectiveness and feasibility on the simulation and prototype system.The promising results of applying this framework to mitigate the effects of attacks are shown and analyzed.Our work demonstrates that the Self-Election dynamic array honeypot system is feasible and effective for proactive network confrontation. 展开更多
关键词 HONEYPOT network confrontation self-election battle diagram network simulation
下载PDF
Winning Probability Estimation Based on Improved Bradley-Terry Model and Bayesian Network for Aircraft Carrier Battle 被引量:1
14
作者 Yuhui Wang Wei Wang Qingxian Wu 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2017年第2期39-44,共6页
To provide a decision-making aid for aircraft carrier battle,the winning probability estimation based on Bradley-Terry model and Bayesian network is presented. Firstly,the armed forces units of aircraft carrier are cl... To provide a decision-making aid for aircraft carrier battle,the winning probability estimation based on Bradley-Terry model and Bayesian network is presented. Firstly,the armed forces units of aircraft carrier are classified into three types,which are aircraft,ship and submarine. Then,the attack ability value and defense ability value for each type of armed forces are estimated by using BP neural network,whose training results of sample data are consistent with the estimation results. Next,compared the assessment values through an improved Bradley-Terry model and constructed a Bayesian network to do the global assessment,the winning probabilities of both combat sides are obtained. Finally,the winning probability estimation for a navy battle is given to illustrate the validity of the proposed scheme. 展开更多
关键词 aircraft carrier battle BP neural network Bradley-Terry model Bayesian networks
下载PDF
Coordination, Compromise, and Change: A Case of US-Japan Conflict Over Commercial Whaling 被引量:2
15
作者 Takashi Sekiyama 《International Relations and Diplomacy》 2014年第5期310-322,共13页
This paper, for the goal of revealing the mechanism of compromise and change in coordination, will focus on US-Japan conflict over commercial whaling. The regime like the international whaling regulation, where countr... This paper, for the goal of revealing the mechanism of compromise and change in coordination, will focus on US-Japan conflict over commercial whaling. The regime like the international whaling regulation, where countries agree in general but disagree on coordination methods, is known as the Battle of the Sexes in game theory. It has been believed that in regimes presented as the Battle of the Sexes (BoS) situation, once the countries could somehow coordinate their interests and reach an agreement on the specific method of coordination, neither country would have the incentive to withdraw from that agreement. This case study, however, shows that this belief is not always true. From the analysis of this study, it will be concluded that coordination methods change over time even in regimes where the countries agree in general and disagree on coordination methods. In this case, "power," "institution" and "consensus" are pointed out as incentives to make the two countries accept a specific coordination method. 展开更多
关键词 the Battle of the Sexes (BoS) International Whaling Commission (IWC) The United States JAPAN COORDINATION COMPROMISE
下载PDF
Long-Term Poverty Reduction Strategies in China Post-2020 被引量:1
16
作者 Huang Zhengxue Gao Guoli +3 位作者 Teng Fei Pan Biao Song Jianjun Li Aimin 《China Economist》 2020年第3期50-60,共11页
Poverty reduction is an eternal theme in the modernization drive of countries.After 2020,China’s poverty reduction endeavors will face new challenges and shift towards:(i)elevating poverty standards,(ii)placing equal... Poverty reduction is an eternal theme in the modernization drive of countries.After 2020,China’s poverty reduction endeavors will face new challenges and shift towards:(i)elevating poverty standards,(ii)placing equal emphasis on rural and urban poverty,(iii)preventing people in the deeply poor regions from slipping back to poverty,(iv)combining external assistance with endogenous development,and(v)enhancing social protection and targeted fiscal support for aiding the poor.Following the new trends of poverty reduction,policymakers should update their strategic approach,adopt new poverty reduction standards,target at a broader group of poor groups,promote pro-poor development,and improve poverty governance.Lastly,this paper puts forward the following policy recommendations for reducing poverty in China post-2020:(i)maintaining policy continuity and stability during the transition period;(ii)creating regular poverty relief mechanisms for urban and rural residents;(iii)improving the targeted identification and dynamic adjustment of target groups for poverty reduction;and(iv)reducing poverty through social protection and development. 展开更多
关键词 post-2020 POVERTY REDUCTION BATTLE against ABSOLUTE POVERTY POVERTY REDUCTION STRATEGIES urban and rural integration
下载PDF
Energy Consumption Patterns for Different Mobility Conditions in WSN 被引量:1
17
作者 Manjusha Pandey Shekhar Verma 《Wireless Sensor Network》 2011年第12期378-383,共6页
Wireless sensor networks are challenging networks regarding communication because of its resource constrained nature and dynamic network topology. Plenty of research has being going on throughout the world to optimize... Wireless sensor networks are challenging networks regarding communication because of its resource constrained nature and dynamic network topology. Plenty of research has being going on throughout the world to optimize communication cost and overhead due to it in the ad hoc networks, thus efforts are being made to make the communications more energy efficient. The application spectrum and use cases of wireless sensor networks includes many critical applications as environmental monitoring, to resource monitoring, to Industrial measurements, to public safety applications and last but not the least to sensitive applications as military sector applications .The erratic size of such networks and along with its exotic topology pose a magnificent set of challenges to the routing algorithms designed and implemented within such networks. The present work concentrates on the comparative analysis of some of reactive and proactive protocols used in the wireless sensor networks. The parameter for comparative analysis is the energy consumption for different simulation time and for different mobility conditions based scenario. 展开更多
关键词 Sensor Networks BATTLE Field Monitoring System AODV DYMO LANMAR OLSR
下载PDF
The Battle of The Sexes in James Thurber’s Works:Take The Unicorn in the Garden as an Example 被引量:1
18
作者 周颖 《海外英语》 2019年第14期198-199,共2页
From The Unicorn in the Garden to The Catbird Seat and two adaptations of Little Red Riding Hood,this thesis,mainly based on several famous works of Jame Thurber,by comparison and contrast,aims to analyze the battle o... From The Unicorn in the Garden to The Catbird Seat and two adaptations of Little Red Riding Hood,this thesis,mainly based on several famous works of Jame Thurber,by comparison and contrast,aims to analyze the battle of the sexes in James Thurber’s literary works. 展开更多
关键词 Thurber male female SEXES BATTLE
下载PDF
Dependability in Future Battle Network System —Transport Layer Ability to Maintain Quality of Service 被引量:1
19
作者 Veiko Dieves 《Wireless Sensor Network》 2016年第10期211-228,共18页
Modernization of armies is a constant process and is driven by intuitive fact that those who do not modernize will become extinct. In last five decades, the development of modern armies has taken place around Colonel ... Modernization of armies is a constant process and is driven by intuitive fact that those who do not modernize will become extinct. In last five decades, the development of modern armies has taken place around Colonel John Boyd’s theory of OODA loop that deals with information superiority. Building a robust, mobile and capable network that could provide for novel appliances and information superiority is the main challenge which modernizers are facing. Network, suitable for future combat operations, and able to transport a vast amount of information on a battlefield, is expensive to build. Every mistake in design and the need to correct those mistakes could halt development in an army for years. Therefore, system dependability analysis during system design phase is needed. In this report, the concept of a future Battle Network System is described. The Report evaluates operational environment of BNS and possible failure reasons of the service, and illustrates the change in BNS Quality of Service due to probable transport layer errors. This paper describes the method of testing the concept of proposed network systems on the drawing board, and emphasizes design points for a new system. Nevertheless, the proposed method is by no means conclusive. Rather, it describes an engineering approach to define the main problems while creating MANET-based networking systems. 展开更多
关键词 Combat Systems Network Battle Network System Transport Layer Quality of Service Dependability Evaluation MANET
下载PDF
The Miraculous Victory:War and Ideology in The Life of Henry The Fifth 被引量:1
20
作者 Xu Jingyin 《Journal of Linguistics and Education Research》 2020年第2期1-4,共4页
In William Shakespeare’s play The Life of Henry The Fifth,King Henry V is described as an excellent speaker whose speech becomes the key element of the Britain’s miraculous victory in the Battle of Agincourt,and he ... In William Shakespeare’s play The Life of Henry The Fifth,King Henry V is described as an excellent speaker whose speech becomes the key element of the Britain’s miraculous victory in the Battle of Agincourt,and he attributes the victory to God.It is then worth to explore the reasons why Shakespeare highlights the power of the king’s speech and why the king hands the victory to God.This essay argues that Shakespeare’s emphasis on the power of Henry V’s speech in the Battle of Agincourt exaggerates Britain’s power and stirs the British’s sense of glory,and Henry V’s handing over the victory to God makes his colonial war seemingly rationalized,which strengthens the colonial dream and unites the Britons in the age of Elizabeth I. 展开更多
关键词 The Life of Henry The Fifth IDEOLOGY The Battle of Agincourt Speech
下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部