期刊文献+
共找到363篇文章
< 1 2 19 >
每页显示 20 50 100
现代汉语介词“按”的形成和发展
1
作者 石微 《北华大学学报(社会科学版)》 2015年第5期21-24,共4页
现代汉语介词"按"来源于先秦动词"按"。"按"在先秦时期用在连动结构中,东汉时期,一些连动结构中的"按"可以重新分析为介词,介词"按"萌芽显现,魏晋南北朝至隋,"按"的介词... 现代汉语介词"按"来源于先秦动词"按"。"按"在先秦时期用在连动结构中,东汉时期,一些连动结构中的"按"可以重新分析为介词,介词"按"萌芽显现,魏晋南北朝至隋,"按"的介词用法逐渐成熟,宋代以后介词"按"进入沉寂期,直到清代,介词"按"的使用频率才大幅提高。连动结构是引发动词"按"语法化的句法环境,"按"由本义"用手向下压"经由"查验、考核"义演变为"依据"义。"按"的句法功能变化的机制是重新分析,"按"发生语义演变导致语法意义产生的机制是语用推理。 展开更多
关键词 “按” 动词 介词
下载PDF
“按/照/依……看/说”格式考察及其教学
2
作者 王瑞烽 《华文教学与研究》 CSSCI 2014年第2期69-74,共6页
本文对"按""照""依"在"介词+人称代词+看/说""介词+人称代词+这么看/说""介词+(理)+看/说"等三个格式中的使用进行了语料考察与分析,发现:这三个介词在这些格式中的使用... 本文对"按""照""依"在"介词+人称代词+看/说""介词+人称代词+这么看/说""介词+(理)+看/说"等三个格式中的使用进行了语料考察与分析,发现:这三个介词在这些格式中的使用频率存在差异,它们的使用频率之间存在着三种关系;"照""按""依"进入这些格式和短语有着由高到低的自由度;"看"和"说"在这些格式中的使用频率存在差异。在此基础上,还提出了这三个介词在对外汉语教学中的教学建议。 展开更多
关键词 凭据性介词 “按” “照” “依” 介词教学
下载PDF
《盐铁论》按断复句研究 被引量:3
3
作者 白兆麟 时兵 《古汉语研究》 CSSCI 北大核心 2004年第2期57-61,共5页
《盐铁论》是西汉桓宽编撰的一部政论性著作 ,它的言语基本上反映了当时口语的特点 ,因此在汉语史研究上具有较高的语料价值。本文就其中按断复句进行了全面而细致的分类研究 ,并且描写了各种类型衔接手段的使用情况 。
关键词 《盐铁论》 西汉 桓宽 政论性著作 按断复句 松散型 半松散型 紧密型 古汉语
下载PDF
表层结构简化与“按说”的词汇化 被引量:7
4
作者 刘红妮 《汉语学习》 CSSCI 北大核心 2014年第2期40-47,共8页
"按X说,VP"中的X最初是有定名词,后泛化为表常理常规性的"理"。"按理说"句分化为:"按理说,VP"和"按理说,VP,-VP",后者体现语义的逆转和言者的主观意图,其中的"按理说"形... "按X说,VP"中的X最初是有定名词,后泛化为表常理常规性的"理"。"按理说"句分化为:"按理说,VP"和"按理说,VP,-VP",后者体现语义的逆转和言者的主观意图,其中的"按理说"形成固化习语,省缩"理"成为固化缩略形式"按说",进而发生词汇化和副词化,由短语词、语法词演变为词汇词、评注性副词。"按说"演变最主要的动因是语用因素,主要涉及到语言的经济性所诱发的成分序列本身的表层结构简化,还有韵律和双音化;演变的机制则主要有"按理说"的固化、习语化及实词性介词宾语的省缩。 展开更多
关键词 “按说” “按理说” 表层结构简化 词汇化 副词化
下载PDF
Ordered successive noise projection cancellation algorithm for dual lattice-reduction-aided MIMO detection 被引量:2
5
作者 刘金铸 邢松 沈连丰 《Journal of Southeast University(English Edition)》 EI CAS 2013年第3期229-234,共6页
A novel nonlinear multi-input multi-output MIMO detection algorithm is proposed which is referred to as an ordered successive noise projection cancellation OSNPC algorithm. It is capable of improving the computation p... A novel nonlinear multi-input multi-output MIMO detection algorithm is proposed which is referred to as an ordered successive noise projection cancellation OSNPC algorithm. It is capable of improving the computation performance of the MIMO detector with the conventional ordered successive interference cancellation OSIC algorithm. In contrast to the OSIC in which the known interferences in the input signal vector are successively cancelled the OSNPC successively cancels the known noise projections from the decision statistic vector. Analysis indicates that the OSNPC is equivalent to the OSIC in error performance but it has significantly less complexity in computation.Furthermore when the OSNPC is applied to the MIMO detection with the preprocessing of dual lattice reduction DLR the computational complexity of the proposed OSNPC-based DLR-aided detector is further reduced due to the avoidance of the inverse of the reduced basis of the dual lattice in computation compared to that of the OSIC-based one. Simulation results validate the theoretical conclusions with regard to both the performance and complexity of the proposed MIMO detection scheme. 展开更多
关键词 ordered successive noise projection cancellation(OSNPC) dual lattice reduction (DLR) multi-input multi-output (MIMO) detection ordered successive interferencecancellation (OSIC)
下载PDF
A distributed on-demand bandwidth-constrained multicast routing protocol for wireless ad hoc networks 被引量:1
6
作者 余燕平 倪玲玲 郑元琰 《Journal of Southeast University(English Edition)》 EI CAS 2015年第1期5-11,共7页
To meet the bandwidth requirement for the multicasting data flow in ad hoc networks, a distributed on- demand bandwidth-constrained multicast routing (BCMR) protocol for wireless ad hoc networks is proposed. With th... To meet the bandwidth requirement for the multicasting data flow in ad hoc networks, a distributed on- demand bandwidth-constrained multicast routing (BCMR) protocol for wireless ad hoc networks is proposed. With this protocol, the resource reservation table of each node will record the bandwidth requirements of data flows, which access itself, its neighbor nodes and hidden nodes, and every node calculates the remaining available bandwidth by deducting the bandwidth reserved in the resource reservation table from the total available bandwidth of the node. Moreover, the BCMR searches in a distributed manner for the paths with the shortest delay conditioned by the bandwidth constraint. Simulation results demonstrate the good performance of BCMR in terms of packet delivery reliability and the delay. BCMR can meet the requirements of real time communication and can be used in the multicast applications with low mobility in wireless ad hoc networks. 展开更多
关键词 wireless ad hoc networks multicast routing bandwidth satisfaction on-demand multicast routing distributed multicast routing QoS multicast routing
下载PDF
“按说”的话语标记性及语篇功能 被引量:7
7
作者 王世群 《南京工程学院学报(社会科学版)》 2011年第3期19-23,共5页
"按说"是一个话语标记,它通常关联三个语篇单位:A.陈述某个事实依据;B.依照常理推导出一个结论命题;C.陈述与此命题相反的另一事实。"按说"具有表示推测的传信功能,可靠性等级居中。在语篇中,有衔接AB和BC的功能,... "按说"是一个话语标记,它通常关联三个语篇单位:A.陈述某个事实依据;B.依照常理推导出一个结论命题;C.陈述与此命题相反的另一事实。"按说"具有表示推测的传信功能,可靠性等级居中。在语篇中,有衔接AB和BC的功能,常常能起到承上启下的作用。 展开更多
关键词 按说 话语标记 语篇功能 传信范畴
下载PDF
补遗漏、订舛误、清疑窦——《钦定八旗通志·旗分志》按语初探 被引量:1
8
作者 孙静 《史学集刊》 CSSCI 北大核心 2011年第6期81-85,共5页
按语是《钦定八旗通志·旗分志》中独具价值的重要组成部分。按语增补及订正了八旗佐领编立的时间、来源、历任管理者以及改旗、抬旗、分编、裁汰等佐领变化的相关信息,反映了乾隆时期八旗基层组织的发展态势,具有重要的文献价值与... 按语是《钦定八旗通志·旗分志》中独具价值的重要组成部分。按语增补及订正了八旗佐领编立的时间、来源、历任管理者以及改旗、抬旗、分编、裁汰等佐领变化的相关信息,反映了乾隆时期八旗基层组织的发展态势,具有重要的文献价值与研究价值。 展开更多
关键词 《钦定八旗通志》 按语 乾隆时期
下载PDF
说“按揭” 被引量:2
9
作者 方平权 《湛江师范学院学报》 2012年第4期128-131,共4页
"按揭"一词,或以为是外来词。从汉语文献与方言中看,"揭"的意义是举债,即借需要还本付息的钱。"按"的意义是抵押。合成词"按揭"两个语素形式上是并列的、深层的内部关系是,"揭"表行... "按揭"一词,或以为是外来词。从汉语文献与方言中看,"揭"的意义是举债,即借需要还本付息的钱。"按"的意义是抵押。合成词"按揭"两个语素形式上是并列的、深层的内部关系是,"揭"表行为,"按"表方式。 展开更多
关键词 按揭 揭、按 内部关系
下载PDF
介词“按照”的分布验证和语义提取 被引量:1
10
作者 钱坤 赵春利 《汉语学习》 CSSCI 北大核心 2021年第2期13-22,共10页
前人对"按照"语法意义的研究在句法描写和语义解释相互验证上存在不足,且忽视与"按照"介宾短语组配的主谓句存在"叙述"(narration)和"肯定"(assertion)的分野。因此,我们按照从句内组配到语义... 前人对"按照"语法意义的研究在句法描写和语义解释相互验证上存在不足,且忽视与"按照"介宾短语组配的主谓句存在"叙述"(narration)和"肯定"(assertion)的分野。因此,我们按照从句内组配到语义背景这一由内到外、从小到大的逻辑顺序,基于语料调查,分类正反验证能和介词"按照"共现的成分的语义类型,逐层精确定位"按照"的句法分布,结合使用"按照"的语义背景提取并验证其语法意义为"主动参范顺利趋定"。在此基础上,从虚词语义的特点、对构式语法及"精致还原主义"的反思两个角度对汉语介词研究做了方法论总结。 展开更多
关键词 按照 叙述和肯定 句法分布 语义特征 “主动参范顺利趋定”义
下载PDF
遗传算法优化BP神经网络在中医按摩机器人中的应用 被引量:8
11
作者 张秋云 张营 李臣 《应用科技》 CAS 2017年第2期73-77,共5页
针对中医按摩设备的临床需求,研制了一种基于多种按摩手法的中医按摩机器人系统。同时,为了提高中医按摩机器人穴位寻找行为规划的精度,提出了一种基于遗传算法优化BP神经网络的中医按摩机器人穴位坐标预测方法,利用遗传算法弥补BP神经... 针对中医按摩设备的临床需求,研制了一种基于多种按摩手法的中医按摩机器人系统。同时,为了提高中医按摩机器人穴位寻找行为规划的精度,提出了一种基于遗传算法优化BP神经网络的中医按摩机器人穴位坐标预测方法,利用遗传算法弥补BP神经网络的缺陷,提高神经网络的预测精度,求解出最优解,保证了中医按摩机器人对患者做出精确的按摩治疗行为决策。并对上述方法进行了实现与仿真,结果表明,该方法对中医按摩机器人寻找患者穴位坐标具有较好的精度和较高的预测准确性。 展开更多
关键词 中医按摩机器人 行为规划 穴位寻找 遗传算法 神经网络
下载PDF
Acupuncture and the Elevation Manipulation of Massage for Treatment of Frozen Shoulder 被引量:4
12
作者 金东席 李钟泰 毛树章 《Journal of Traditional Chinese Medicine》 SCIE CAS CSCD 2003年第3期212-213,共2页
The authors have treated 50 cases of frozen shoulder in recent years with electro-acupuncture and the elevation manipulation. The results were satisfactory and reported as follows.
关键词 Acupuncture Therapy MASSAGE Shoulder Joint ADULT Aged FEMALE Humans Male Middle Aged PERIARTHRITIS
下载PDF
王友仁主任医师治疗肩周炎的思路介绍 被引量:1
13
作者 郝会功 王友仁(指导) 《中医临床研究》 2019年第10期78-79,82,共3页
目的:介绍王友仁主任医师治疗肩周炎的思路。方法:通过王老平时的讲解和临床治疗肩周炎患者时采用按摩手法的学习和观察,总结出王老治疗肩周炎的思路,并在临床治疗中得到验证。结果:王老治疗肩周炎的思路如下:治肩先治颈;先解决疼痛,后... 目的:介绍王友仁主任医师治疗肩周炎的思路。方法:通过王老平时的讲解和临床治疗肩周炎患者时采用按摩手法的学习和观察,总结出王老治疗肩周炎的思路,并在临床治疗中得到验证。结果:王老治疗肩周炎的思路如下:治肩先治颈;先解决疼痛,后解决功能障碍;在治疗肩周炎后伸摸棘困难时应欲求高,先求远;点按穴位;既注重治疗局部,又注重治疗整体。结论:在王老治疗肩周炎思路的指导下按照其方法对患者进行治疗,取得了令人满意的疗效。 展开更多
关键词 肩周炎 按动疗法 颈椎微调法 抬肩穴 王友仁
下载PDF
Measurement of biological age may help to assess the risk of colorectal adenoma in screening colonoscopy 被引量:4
14
作者 Sang-Jung Kim Beom Jin Kim Hyun Kang 《World Journal of Gastroenterology》 SCIE CAS 2017年第37期6877-6883,共7页
AIM To investigate the clinical utility of biological age(BA) measurement in screening colonoscopy for the detection of colorectal adenomas in the average-risk population.METHODS A consecutive series of asymptomatic s... AIM To investigate the clinical utility of biological age(BA) measurement in screening colonoscopy for the detection of colorectal adenomas in the average-risk population.METHODS A consecutive series of asymptomatic subjects aged ≥ 30 years who underwent colonoscopy in routine check-ups were enrolled. Colorectal adenoma was classified according to size, number, and location. BAs were calculated using the MEDIAGETM Biological Age Measurement System.RESULTS A total of 2696 subjects were investigated(1876 men and 820 women). The mean chronological age(CA) was 46.0 years and the mean BA was 44.7 years. Metabolic syndrome(MS) was diagnosed in 218 subjects(8.1%). The prevalence of overall colorectal adenoma was 23.1%(622/2,696). When the subjects were divided into four groups based on BA(≤ 39 years; 40-49 years; 50-59 years; ≥ 60 years), the prevalence of colorectal adenoma was increased as BA increased(P < 0.001). Colorectal adenoma located in the proximal colon was more prevalent in the BA-dominant group(BA-CA ≥ 5years) than the CA-dominant group(CA-BA ≥ 5 years)(P = 0.034). When the subjects were categorized into four groups according to MS and age gap between BA and CA, the incidence of colorectal adenoma increased with MS and BA-dominance(P < 0.05).CONCLUSION Measurement of BA may help to assess the risk of colorectal adenoma in screening colonoscopy. 展开更多
关键词 Chronological age Biological age Colorectal adenoma Age gap
下载PDF
Treatment by Electro-Acupuncture and Massage in 172 Cases of Cervical Spondylopathy 被引量:1
15
作者 王立峰 王东岩 +1 位作者 田有粮 毛树章 《Journal of Traditional Chinese Medicine》 SCIE CAS CSCD 2003年第2期129-130,共2页
The authors have treated 172 cases of cervical spondylopathy by electro-acupuncture and massage in recent 6 years. The results were satisfactory as reported in the following.
关键词 Cervical Vertebrae ELECTROACUPUNCTURE MASSAGE Acupuncture Therapy ADULT Aged Combined Modality Therapy FEMALE Humans MALE Middle Aged Spinal Osteophytosis
下载PDF
Model of generic project risk element transmission theory based on data mining 被引量:3
16
作者 李存斌 王建军 《Journal of Central South University of Technology》 EI 2008年第1期132-135,共4页
In order to construct the data mining frame for the generic project risk research, the basic definitions of the generic project risk element were given, and then a new model of the generic project risk element was pre... In order to construct the data mining frame for the generic project risk research, the basic definitions of the generic project risk element were given, and then a new model of the generic project risk element was presented with the definitions. From the model, data mining method was used to acquire the risk transmission matrix from the historical databases analysis. The quantitative calculation problem among the generic project risk elements was solved. This method deals with well the risk element transmission problems with limited states. And in order to get the limited states, fuzzy theory was used to discrete the historical data in historical databases. In an example, the controlling risk degree is chosen as P(Rs≥2) ≤0.1, it means that the probability of risk state which is not less than 2 in project is not more than 0.1, the risk element R3 is chosen to control the project, respectively. The result shows that three risk element transmission matrix can be acquired in 4 risk elements, and the frequency histogram and cumulative frequency histogram of each risk element are also given. 展开更多
关键词 data mining risk element risk management project management
下载PDF
Dr.Zhang's Experience in Massotherapy for Treatment of Vertebral-Artery-Type Cervical Spondylopathy 被引量:3
17
作者 谢利民 张涛 王新中 《Journal of Traditional Chinese Medicine》 SCIE CAS CSCD 2002年第1期35-37,共3页
Thirty cases of vertebral-artery-type cervical spondylopathy were treated by Dr. Zhang Tao's technique. The cure rate was 50%, and the total effective rate was 100%.
关键词 Cervical Vertebrae ADULT Aged FEMALE Humans Male MASSAGE Middle Aged Spinal Osteophytosis
下载PDF
Roles of Financial Innovation and Information Technology:Lessons from US Sub-prime Mortgage Crisis and Its Implications for China 被引量:2
18
作者 James H LENZER JR Simon Xiaobin ZHAO 《Chinese Geographical Science》 SCIE CSCD 2012年第3期343-355,共13页
The mortgage loan has evolved from a local lending instrument into a major global security and its role is unparallel to other financial instruments in the process of financial globalization. This paper explains how t... The mortgage loan has evolved from a local lending instrument into a major global security and its role is unparallel to other financial instruments in the process of financial globalization. This paper explains how technology and financial innovation transformed the mortgage loan from a local security into a premier global security traded worldwide. It examines the fundamental flaws of this process and why it does not work in regards to mortgage lending and the re-securitization products that were created through financial innovation. The findings show that regulation was unable to keep pace with financial innovation, which created an environment where actors in the financial service sector were able to behave geographically irresponsibly by using information asymmetries to their advantage by par- ticipating in moral hazard activities and engaging in other immoral and unethical business practices that were centered around localized geography, which ultimately contributed to the global financial crisis. It also examines the roll of financial innovation in regard to the Lehman Brothers Mini-Bond in Hung and its role as a driving force behind China's newly emerging shadow banking sector. It concludes with a policy recommendation and its implication for China's continued economic development. 展开更多
关键词 shadow banking US sub-prime mortgage crisis financial tsunami global financial crisis wealth man- agement vehicle China asset bubble
下载PDF
CRESS: A Platform of Infrastructure Resource Sharing for Educational Cloud Computing 被引量:3
19
作者 田文洪 孙夏爽 +1 位作者 蒋亚秋 王浩严 《China Communications》 SCIE CSCD 2013年第9期43-52,共10页
Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on-... Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on- demand allocation of network resources are particularly important in Cloud computing. Ho- wever, nearly all-current available cloud com- puting platforms are either proprietary or their software infrastructure is invisible to the rese- arch community except for a few open-source platforms. For universities and research insti- tutes, more open and testable experimental plat- forms are needed in a lab-level with PCs. In this paper, a platform of infrastructure resou- rce sharing system (Platform as a Service (PaaS)) is developed in virtual Cloud comput- hug environment. Its architecture, core modules, main functions, design and operational envir- onment and applications are introduced in de- tail. It has good expandability and can impr- ove resource sharing and utilization and is app- lied to regular computer science teaching and research process. 展开更多
关键词 cloud computing PAAS virtual- ized environment resource sharing
下载PDF
Improved Keystroke Authentication Accuracy Based on Statistics and Weight 被引量:2
20
作者 Li Jian Guo Xiaojing +1 位作者 Li Meiyun Li Ruifan 《China Communications》 SCIE CSCD 2012年第7期36-41,共6页
Abstract: In order to improve the recognition accuracy of key stroke authentication, a methodology based on feature extraction of keystroke sequence is presented in this paper. Firstly, the data of the users' keystr... Abstract: In order to improve the recognition accuracy of key stroke authentication, a methodology based on feature extraction of keystroke sequence is presented in this paper. Firstly, the data of the users' keystroke feature information that has too much deviation with the mean deviation is filtered out. Secondly, the probability of each input key is calculated and 10 values which do not have the best features are selected. Thirdly, they are weighed and a score evaluating the extent to which the user could be authenticated successfully is calculated. The benefit of using a third-party data set is more objective and comparable. At last, 展开更多
关键词 AUTHENTICATION BIOMETRICS keystroke dynamics
下载PDF
上一页 1 2 19 下一页 到第
使用帮助 返回顶部