期刊文献+
共找到1,324篇文章
< 1 2 67 >
每页显示 20 50 100
Blind channel identication of nonlinear folding mixing model 被引量:1
1
作者 Su Yong Xu Shangzhi Ye Zhongfu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第3期509-512,共4页
Signals from multi-sensor systems are often mixtures of (statistically) independent sources by unknown mixing method. Blind source separation(BSS) and independent component analysis(ICA) are the methods to ident... Signals from multi-sensor systems are often mixtures of (statistically) independent sources by unknown mixing method. Blind source separation(BSS) and independent component analysis(ICA) are the methods to identify/recover the channels and the sources. BSS/ICA of nonlinear mixing models are difficult problems. For instance, the post-nonlinear model has been studied by several authors. It is noticed that in most cases, the proposed models are always with an invertible mixing. According to this fact there is an interesting question, how about the situation of the non-invertible non-linear mixing in BSS or ICA? A new simple non-linear mixing model is proposed with a kind of non-invertible mixing, the folding mixing, and method to identify its channel, blindly. 展开更多
关键词 BLIND channel identication non-linear mixing non-invertible.
下载PDF
A Continuous Time Domain Direct Identication Method for Unsteady Fluid Dynamic Model in Incompressible Flow 被引量:1
2
作者 Xianwu Lin Tao Li +1 位作者 Lixun Xiong Delin Luo 《Guidance, Navigation and Control》 2023年第1期85-116,共32页
To identify the unsteady°uid dynamic model for a solid moving in the°uid,a new identication method that operates in the continuous time domain is proposed.It is illustrated that this new identication method ... To identify the unsteady°uid dynamic model for a solid moving in the°uid,a new identication method that operates in the continuous time domain is proposed.It is illustrated that this new identication method is more accurate and appropriate for identifying unsteady°uid dynamic model in incompressible°ow in comparison with the classical frequency domain or discrete domain method.This new method is applied to identify the unsteady°uid dynamic models of a NACA0012 airfoil and the e®ect of the°uid viscosity on the model parameter is analyzed.The result shows that the added mass in viscous°ow is dependent on the input signal frequency and is exactly the added mass in inviscid°ow when the frequency approaches innity.Based on this discovery,the long controversy on the relationship of added mass between viscous and inviscid°ow is solved.Then,the enlightenment of this discovery on the identication of both linear and nonlinear unsteady aerodynamic model in incompressible°ow is illustrated.At last,the advantage of the new acquired unsteady°uid dynamic model is discussed in comparison with the classical quasi-steady aerodynamic model. 展开更多
关键词 Model identication unsteady fluid dynamics added mass non-causal system.
原文传递
Enhancing Identity Protection in Metaverse-Based Psychological Counseling System
3
作者 Jun Lee Hanna Lee +1 位作者 Seong Chan Lee Hyun Kwon 《Computers, Materials & Continua》 SCIE EI 2024年第1期617-632,共16页
Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regard-ing client identity.However,these systems often face challenges concerning voice data leaks and the subopt... Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regard-ing client identity.However,these systems often face challenges concerning voice data leaks and the suboptimal communication of the client’s non-verbal expressions,such as facial cues,to the counselor.This study proposes a metaverse-based psychological counseling system designed to enhance client identity protection while ensuring efficient information delivery to counselors during non-face-to-face counseling.The proposed systemincorporates a voicemodulation function that instantlymodifies/masks the client’s voice to safeguard their identity.Additionally,it employs real-time client facial expression recognition using an ensemble of decision trees to mirror the client’s non-verbal expressions through their avatar in the metaverse environment.The system is adaptable for use on personal computers and smartphones,offering users the flexibility to access metaverse-based psychological counseling across diverse environments.The performance evaluation of the proposed system confirmed that the voice modulation and real-time facial expression replication consistently achieve an average speed of 48.32 frames per second or higher,even when tested on the least powerful smartphone configurations.Moreover,a total of 550 actual psychological counseling sessions were conducted,and the average satisfaction rating reached 4.46 on a 5-point scale.This indicates that clients experienced improved identity protection compared to conventional non-face-to-face metaverse counseling approaches.Additionally,the counselor successfully addressed the challenge of conveying non-verbal cues from clients who typically struggled with non-face-to-face psychological counseling.The proposed systemholds significant potential for applications in interactive discussions and educational activities in the metaverse. 展开更多
关键词 Metaverse counseling system face tracking identity protection
下载PDF
SOME NEW IDENTITIES OF ROGERS-RAMANUJAN TYPE
4
作者 谷晶 张之正 《Acta Mathematica Scientia》 SCIE CSCD 2024年第1期129-142,共14页
In this paper,we establish two transformation formulas for nonterminating basic hypergeometric series by using Carlitz's inversions formulas and Jackson s transformation formula.In terms of application,by speciali... In this paper,we establish two transformation formulas for nonterminating basic hypergeometric series by using Carlitz's inversions formulas and Jackson s transformation formula.In terms of application,by specializing certain parameters in the two transformations,four Rogers-Ramanujan type identities associated with moduli 20 are obtained. 展开更多
关键词 Carlitz's inversion Q-SERIES Rogers-Ramanujan type identities
下载PDF
Designing a Secure and Scalable Data Sharing Mechanism Using Decentralized Identifiers(DID)
5
作者 Iuon-Chang Lin I-Ling Yeh +2 位作者 Ching-Chun Chang Jui-Chuan Liu Chin-Chen Chang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期809-822,共14页
Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperabi... Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperability issues and rely on a single identity provider,leaving users without control over their identities.Therefore,this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers.The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity.Data is stored on InterPlanetary File System(IPFS)to avoid the risk of single points of failure and to enhance data persistence and availability.At the same time,compliance with World Wide Web Consortium(W3C)standards for decentralized identifiers and verifiable credentials increases the mechanism’s scalability and interoperability. 展开更多
关键词 Self-sovereign identity decentralized identifier blockchain
下载PDF
THE SPARSE REPRESENTATION RELATED WITH FRACTIONAL HEAT EQUATIONS
6
作者 曲伟 钱涛 +1 位作者 梁应德 李澎涛 《Acta Mathematica Scientia》 SCIE CSCD 2024年第2期567-582,共16页
This study introduces a pre-orthogonal adaptive Fourier decomposition(POAFD)to obtain approximations and numerical solutions to the fractional Laplacian initial value problem and the extension problem of Caffarelli an... This study introduces a pre-orthogonal adaptive Fourier decomposition(POAFD)to obtain approximations and numerical solutions to the fractional Laplacian initial value problem and the extension problem of Caffarelli and Silvestre(generalized Poisson equation).As a first step,the method expands the initial data function into a sparse series of the fundamental solutions with fast convergence,and,as a second step,makes use of the semigroup or the reproducing kernel property of each of the expanding entries.Experiments show the effectiveness and efficiency of the proposed series solutions. 展开更多
关键词 reproducing kernel Hilbert space DICTIONARY sparse representation approximation to the identity fractional heat equations
下载PDF
A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture
7
作者 Yi-Bo Cao Xiu-Bo Chen +6 位作者 Yun-Feng He Lu-Xi Liu Yin-Mei Che Xiao Wang Ke Xiao Gang Xu Si-Yi Chen 《Computers, Materials & Continua》 SCIE EI 2024年第2期2813-2827,共15页
Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in differ... Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in different trust domains,which has resulted in the extensive development of cross-domain authentication techniques.However,the emergence of many attackers equipped with quantum computers has the potential to launch quantum computing attacks against cross-domain authentication schemes based on traditional cryptography,posing a significant security threat.In response to the aforementioned challenges,our paper demonstrates a post-quantum cross-domain identity authentication scheme to negotiate the session key used in the cross-chain asset exchange process.Firstly,our paper designs the hiding and recovery process of user identity index based on lattice cryptography and introduces the identity-based signature from lattice to construct a post-quantum cross-domain authentication scheme.Secondly,our paper utilizes the hashed time-locked contract to achieves the cross-chain asset exchange of blockchain nodes in different trust domains.Furthermore,the security analysis reduces the security of the identity index and signature to Learning With Errors(LWE)and Short Integer Solution(SIS)assumption,respectively,indicating that our scheme has post-quantum security.Last but not least,through comparison analysis,we display that our scheme is efficient compared with the cross-domain authentication scheme based on traditional cryptography. 展开更多
关键词 Cross-domain identity authentication lattice-based cryptography blockchain hashed time-locked contract
下载PDF
SUPER WOMAN 2(SPW2)maintains organ identity in spikelets by inhibiting the expression of floral homeotic genes OsMADS3,OsMADS58,OsMADS13,and DROOPING LEAF
8
作者 Hui Zhuang Jinsong Lan +6 位作者 Qiuni Yang Xiaoyu Zhao Yuhuan Li Jingya Zhi Yalin Shen GuanghuaHe Yunfeng Li 《Journal of Integrative Agriculture》 SCIE CSCD 2024年第1期59-76,共18页
Flower organ identity in rice is mainly determined by the A-,B-,C-and E-class genes,with the majority encoding MADS-box transcription factors.However,few studies have investigated how the expression of these floral or... Flower organ identity in rice is mainly determined by the A-,B-,C-and E-class genes,with the majority encoding MADS-box transcription factors.However,few studies have investigated how the expression of these floral organ identity genes is regulated during flower development.In this study,we identified a gene named SUPER WOMAN 2(SPW2),which is necessary for spikelet/floret development in rice by participating in the regulation of the expression of pistil identity genes such as OsMADS3,OsMADS13,OsMADS58 and DL.In the spw2 mutant,ectopic stigma/ovary-like tissues were observed in the non-pistil organs,including sterile lemma,lemma,palea,lodicule,and stamen,suggesting that the identities of these organs were severely affected by mutations in SPW2.SPW2 was shown to encode a plant-specific EMF1-like protein that is involved in H3K27me3 modification as an important component of the PRC2 complex.Expression analysis showed that the SPW2 mutation led to the ectopic expression of OsMADS3,OsMADS13,OsMADS58,and DL in non-pistil organs of the spikelet.The ChIP-qPCR results showed significant reductions in the levels of H3K27me3 modification on the chromatin of these genes.Thus,we demonstrated that SPW2 can mediate the process of H3K27me3 modification of pistil-related genes to regulate their expression in non-pistil organs of spikelets in rice.The results of this study expand our understanding of the molecular mechanism by which SPW2 regulates floral organ identity genes through epigenetic regulation. 展开更多
关键词 rice(Oryza sativa) SPIKELET organ identity H3K27me3
下载PDF
Survey and clinical considerations of gender identity in lower primary school children
9
作者 Ya-Lin Zhang Hong-Mei Zhang +3 位作者 Jing-Xia Xu Qi-Ying Zhou He Wang Xiao-Cheng Pan 《World Journal of Psychiatry》 SCIE 2024年第1期36-43,共8页
BACKGROUND Gender consciousness directly affects the development of gender identity,which is a continuous and lifelong process.Meanwhile,hospitalization is a part of many children's lives and has an impact on thei... BACKGROUND Gender consciousness directly affects the development of gender identity,which is a continuous and lifelong process.Meanwhile,hospitalization is a part of many children's lives and has an impact on their gender development.AIM To investigate the current situation of gender identity in lower primary school children by conducting a survey of 202 hospitalized children in the lower grades and to provide a theoretical basis and foundation for the cultivation of gender identity and medical treatment of children based on the results.This study aims to inspire clinical medical staff to scientifically and reasonably arrange hospital wards for lower primary school children and pay attention to gender protection during the medical treatment process and to help children shape a unified and clear gender identity,which will enable them to better integrate into society and promote their personality development.METHODS The gender consciousness scale for elementary and middle school students was RESULTS Gender identity was already present in lower primary school children.The children's gender roles and gender equality consciousness were strong,exceeding the critical value,but their gender characteristics,gender identity,and gender ideal consciousness were weak.Children aged 6 had the weakest gender identity,and girls had significantly stronger gender identity than boys.CONCLUSION Gender identity is already present in lower primary school children,providing a basis and inspiration for the cultivation of gender identity and medical treatment of lower primary school children.Clinical medical staff should be aware of and understand these results and should scientifically and reasonably arrange hospital wards for lower primary school children. 展开更多
关键词 School-age children Gender consciousness Gender identity HOSPITALIZATION Gender weakening
下载PDF
Impact of Exercise Atmosphere on Adolescents’Exercise Behavior:Chain Mediating Effect of Exercise Identity and Exercise Habit
10
作者 Zhen Su Ziqiang Zhang Yonghao Zhou 《International Journal of Mental Health Promotion》 2024年第7期579-588,共10页
Appropriate physical exercise has a positive impact on adolescents’physical and mental health,but there is a serious lack of physical exercise among Chinese adolescents.How to shape their exercise behavior(EB)has bec... Appropriate physical exercise has a positive impact on adolescents’physical and mental health,but there is a serious lack of physical exercise among Chinese adolescents.How to shape their exercise behavior(EB)has become an important task in promoting their development.A questionnaire survey was conducted using stratified cluster random sampling on three middle schools by class in Zhejiang Province,China to investigate the impact of exercise atmosphere(EA)on adolescents’exercise behavior and the mediating role of exercise identity(EI)and exercise habit(EH).806 adolescents were investigated by the Exercise Atmosphere Scale(EAS),Exercise-Identity Scale(EIS),Self-Report Habit Index(SRHI),and Physical Activity Rating Scale(PARS-3).The results show that:There is a significant positive correlation between each two of exercise atmosphere,exercise identity,exercise habit,and exercise behavior(p<0.05).Exercise atmosphere could not only directly affect adolescents’physical exercise behavior but can also indirectly affect their physical exercise behavior through the mediating effect of exercise identity and exercise habit,involving three mediating pathways,namely,the mediating path through exercise identity,the mediating pathway through exercise habit and the chain mediating pathway through exercise identity and exercise habit.The direct effect of exercise atmosphere on exercise behavior was 0.459(p<0.01),accounting for 62.62% of the total effect of 0.733,and its indirect effect was 0.274,accounting for 37.28% of the total effect.To a certain extent,the mediating effect model reveals the mechanism of exercise atmosphere affecting exercise behavior and has a certain reference value for promoting adolescents’exercise behavior.We should start by creating an exercise atmosphere,cultivating exercise identity,and enhancing exercise habits to help teenagers form active physical exercise behaviors. 展开更多
关键词 Exercise atmosphere exercise identity exercise habit exercise behavior
下载PDF
Combinatorial Identities Concerning Harmonic Numbers
11
作者 CHEN Yu-lei GUO Dong-wei 《Chinese Quarterly Journal of Mathematics》 2024年第3期307-314,共8页
In this paper,we firstly establish a combinatorial identity with a free parameter x,and then by means of derivative operation,several summation formulae concerning classical and generalized harmonic numbers,as well as... In this paper,we firstly establish a combinatorial identity with a free parameter x,and then by means of derivative operation,several summation formulae concerning classical and generalized harmonic numbers,as well as binomial coefficients are derived. 展开更多
关键词 Harmonic numbers COEFFICIENTS Combinatorial identities
下载PDF
Experimental investigation on shear strength deterioration at the interface between different rock types under cyclic loading
12
作者 Qiong Wu Zhiqi Liu +6 位作者 Huiming Tang Liangqing Wang Xiaoxue Huo Zhen Cui Shiyu Li Bo Zhang Zhiwei Lin 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2024年第8期3063-3079,共17页
The shear strength deterioration of bedding planes between different rock types induced by cyclic loading is vital to reasonably evaluate the stability of soft and hard interbedded bedding rock slopes under earthquake... The shear strength deterioration of bedding planes between different rock types induced by cyclic loading is vital to reasonably evaluate the stability of soft and hard interbedded bedding rock slopes under earthquake;however,rare work has been devoted to this subject due to lack of attention.In this study,experimental investigations on shear strength weakening of discontinuities with different joint wall material(DDJM)under cyclic loading were conducted by taking the interface between siltstone and mudstone in the Shaba slope of Yunnan Province,China as research objects.A total of 99 pairs of similar material samples of DDJM(81 pairs)and discontinuities with identical joint wall material(DIJM)(18 pairs)were fabricated by inserting plates,engraved with typical surface morphology obtained by performing three-dimensional laser scanning on natural DDJMs sampled from field,into mold boxes.Cyclic shear tests were conducted on these samples to study their shear strength changes with the cyclic number considering the effects of normal stress,joint surface morphology,shear displacement amplitude and shear rate.The results indicate that the shear stress vs.shear displacement curves under each shear cycle and the peak shear strength vs.cyclic number curves of the studied DDJMs are between those of DIJMs with siltstone and mudstone,while closer to those of DIJMs with mudstone.The peak shear strengths of DDJMs exhibit an initial rapid decline followed by a gradual decrease with the cyclic number and the decrease rate varies from 6%to 55.9%for samples with varied surface morphology under different testing conditions.The normal stress,joint surface morphology,shear displacement amplitude and shear rate collectively influence the shear strength deterioration of DDJM under cyclic shear loading,with the degree of influence being greater for larger normal stress,rougher surface morphology,larger shear displacement amplitude and faster shear rate. 展开更多
关键词 Discontinuities with different joint wall material(DDJM) Discontinuities with identical joint wall material(DIJM) Cyclic shear test Shear strength deterioration Joint surface morphology Shear displacement amplitude Shear rate Normal stress
下载PDF
Age Identity and Elderly Job Participation in China
13
作者 Yu Xiao Wang Qihui 《China Economist》 2024年第3期104-127,共24页
In the context of rising life expectancy,there is a significant discrepancy between Chinese seniors’self-perceptions of the start of old age and the expectations of society around this age.The traditional paradigm,wh... In the context of rising life expectancy,there is a significant discrepancy between Chinese seniors’self-perceptions of the start of old age and the expectations of society around this age.The traditional paradigm,which forecasts individual economic behavior and formulates economic policies based on societal standards of age,is put to the test by this disparity.This study,which draws from the China Longitudinal Aging Society Survey(CLASS),examines the factors,processes,and improvement strategies that affect how older people choose to work.The following are our conclusions:(i)Chinese elderly believe their old age starts from 70 years on average;delaying perceived old age is a denial of aging and raises the likelihood of finding work.Elders who are youthful at heart have a 2.4%higher chance of remaining employed than elders who are old at heart.(ii)In contrast to old-at-heart elders,young-at-heart elders are more likely to maintain their middle-age lifestyles,continue working,become motivated to engage in social activities,and gain the confidence to face challenges and continue in their career.(iii)If the perceived old age is above 70 years,the milestone event of aging is retirement from work,and there are external pressures,particularly pressures from family intergenerational support,the perception of old age will have a more proactive impact on older workers.(iv)Despite rising pension benefits,older people’s decision to remain in the workforce is still heavily influenced by their perception of their age.However,this effect is notably gender-specific,as older women’s decision to remain in the workforce is not greatly influenced by their own perception of their age. 展开更多
关键词 Old age identity age values employment choice social recognition subjective age
下载PDF
土耳其国家安全战略:演变、特征与实践
14
作者 李亚男 《Contemporary International Relations》 2024年第3期52-78,共27页
Over the past century since the Republic of Türkiye was founded,its national security mechanisms have undergone a process of transformation from military-dominated to civilian government-dominated,and the ideolog... Over the past century since the Republic of Türkiye was founded,its national security mechanisms have undergone a process of transformation from military-dominated to civilian government-dominated,and the ideology guiding its national security strategy has gradually transitioned from Kemalism to Erdo?anism.At the present stage,Türkiye's national security strategy is prominently characterized by its geographical and cultural duality,the expansivity deep-rooted in its history and religion,and an enterprising response to its geopolitical realities.Such a strategy will comprehensively shape Türkiye's practice of preserving national security and guide the future of its security policies,prompting the country to seek a balance between its differentiated perceptions of identity and generalized national interests. 展开更多
关键词 diverse identity national security strategy TURKIYE
下载PDF
The Entanglement of Thing and Subject in Virginia Woolf’s“Street Haunting:A London Adventure”
15
作者 QIU Lin 《Journal of Literature and Art Studies》 2024年第8期669-678,共10页
Virginia Woolf’s essay“Street Haunting:A London Adventure”highlights the complex relationships between things and the subject.On the individual’s level,indoor things construct and limit the subject’s identity,whi... Virginia Woolf’s essay“Street Haunting:A London Adventure”highlights the complex relationships between things and the subject.On the individual’s level,indoor things construct and limit the subject’s identity,while outdoor things allow fluid identities;these things reveal Woolf’s dual identity as both a rebel against and a ruler of the hierarchical system.On the intersubjective level,subjects are linked through common aesthetic experience mediated by things,which enjoys a high degree of arbitrariness.With the help of things,subjects form an“imagined community”.Concerning the relationship between things and the mind,things also endow order in the fragmented reality,yet in this sense they are abstract,metaphysical and universal rather than specific in Virginia Woolf’s thoughts.They are the withdrawn things expressed by sensual qualities.These sensual aspects,however,are tools to reveal the essence and meaning of life,secondary to the mind. 展开更多
关键词 THING SUBJECT identity community MIND
下载PDF
The Identity and Discourse in Georgian and Turkey Diplomatic Relations Between 2002-2022
16
作者 Abdulmelik Alkan 《International Relations and Diplomacy》 2024年第3期121-137,共17页
This article’s primary objective is to answer the question of what is the semantic language of identity and interests of Turkey and Georgia?In addition,it analyzes the connotative quotes that exchanged between the tw... This article’s primary objective is to answer the question of what is the semantic language of identity and interests of Turkey and Georgia?In addition,it analyzes the connotative quotes that exchanged between the two countries during diplomatic visits.Because the article concentrated on the remarks that were stressed during visits and meetings that took place between the years 2002 and 2022,it was necessary to search through 150 news on civil.ge site and filter down to 35 news before applying the content analysis.The AntConc corpus analysis was used in order to comprehend the nature of the political conversation between both countries.According to the findings,the constructivism of core theme that claim states view each other via the identity through interaction was verified.The purpose of the research is to provide a contribution to the study of the identities and interests of Georgia and Turkey who are good neighbors. 展开更多
关键词 Georgia TURKEY IDENTITY diplomatic language DISCOURSE
下载PDF
State,Communal,and Individual Identities in Iran
17
作者 Mehran Kamrava 《International Relations and Diplomacy》 2024年第1期1-17,共17页
Cultural identity in Iran is comprised of four primary elements,each of which have proven to be highly resonant in the country political history.The vexing issue of modernity,and where individuals and collectivities a... Cultural identity in Iran is comprised of four primary elements,each of which have proven to be highly resonant in the country political history.The vexing issue of modernity,and where individuals and collectivities are placed in relation to it,has been one of the most prominent of these elements of Iranian identity.A second constitutive factor has been the role of the state as a deliberate crafter of cultural,in turn directly influencing the salience,interpretation,extent,and direction of modernity,or its antithesis,in Iran.Equally defining has been the role and significance of religion,which has emerged as a marker of individual and collective,as well as political,identities.Nationalism,and its compelling impulse across Iranian society especially from the early 1900s and continuing until today,has also emerged as an integral and inseparable feature of Iranian identity.Together,these four elements―modernity,a culturally intrusive state,religion and religiosity,and nationalism―constitute fluid yet constant,sometimes complementary and sometimes competing,dimensions of Iranian identity. 展开更多
关键词 Iranian identity NATIONALISM religiosity modernity social change
下载PDF
Auditory Narrative in Toni Morrison’s Song of Solomon
18
作者 LI Mingjiao 《Cultural and Religious Studies》 2024年第6期388-394,共7页
This article primarily explores the centrality of sound and listening in Toni Morrison’s literary text.Drawing on theories on sound cultural studies,narratology,and cultural identity,this essay analyzes Morrison’s r... This article primarily explores the centrality of sound and listening in Toni Morrison’s literary text.Drawing on theories on sound cultural studies,narratology,and cultural identity,this essay analyzes Morrison’s representation of sound and its significance on characterization,plot,and theme in Song of Solomon.Morrison’s literary sounds-voices of oral storytelling,the sound of music,and the protagonist Milkman Dead’s listening experiences are deeply rooted in African American sound culture.A close analysis of her sound writing in Song of Solomon helps to give the reader a glimpse of the soundscape of African American culture as well as the vital role listening plays in African American survival,endurance,and cultural identification. 展开更多
关键词 SOUND LISTENING black music cultural identity
下载PDF
Identity(ies)and Transnationalization of Brazilian Evangelical Churches in Portugal:Case study of World Cathedral of Hope and Victory in Christ Churches
19
作者 Jonas Pereira de Oliveira Júnior 《Cultural and Religious Studies》 2024年第3期133-145,共13页
The presence of evangelicals in Brazil is a social and religious phenomenon that has aroused interest of many scholars due to its rapid and significant expansion in recent decades and its projection beyond national bo... The presence of evangelicals in Brazil is a social and religious phenomenon that has aroused interest of many scholars due to its rapid and significant expansion in recent decades and its projection beyond national borders.Among evangelical denominations that stand out in this scenario are Pentecostal churches,which have developed intense missionary activity in several countries,including Europe.In this article,we intend to analyze features and challenges of Brazilian evangelical churches:World Cathedral of Hope(CIME)(Catedral Mundial da Esperança-ICME)and Assembly of God Victory in Christ(ADVEC)(Assembleia de Deus Vitória em Cristo-ADVEC)that operate in Portugal,seeking to understand issues of identity and belonging of these communities,their models of transnationalization,its evangelization strategies and its adaptations to Portuguese context,in the period from 2000 to 2020. 展开更多
关键词 IDENTITY transnationalization SECULARIZATION Brazilian migration
下载PDF
Utilizing Certificateless Cryptography for IoT Device Identity Authentication Protocols in Web3
20
作者 WU Zhihui HONG Yuxuan +2 位作者 ZHOU Enyuan LIU Lei PEI Qingqi 《ZTE Communications》 2024年第2期30-38,共9页
Traditional methods of identity authentication often rely on centralized architectures,which poses risks of computational overload and single points of failure.We propose a protocol that offers a decentralized approac... Traditional methods of identity authentication often rely on centralized architectures,which poses risks of computational overload and single points of failure.We propose a protocol that offers a decentralized approach by distributing authentication services to edge authentication gateways and servers,facilitated by blockchain technology,thus aligning with the decentralized ethos of Web3 infrastructure.Additionally,we enhance device security against physical and cloning attacks by integrating physical unclonable functions with certificateless cryptography,bolstering the integrity of Internet of Thins(IoT)devices within the evolving landscape of the metaverse.To achieve dynamic anonymity and ensure privacy within Web3 environments,we employ fuzzy extractor technology,allowing for updates to pseudonymous identity identifiers while maintaining key consistency.The proposed protocol ensures continuous and secure identity authentication for IoT devices in practical applications,effectively addressing the pressing security concerns inherent in IoT network environments and contributing to the development of robust security infrastructure essential for the proliferation of IoT devices across diverse settings. 展开更多
关键词 blockchain certificateless cryptography identity authentication IOT
下载PDF
上一页 1 2 67 下一页 到第
使用帮助 返回顶部