期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
六朝隐逸诗的风行及流变 被引量:1
1
作者 郭仁昭 《广播电视大学学报(哲学社会科学版)》 2007年第4期8-10,共3页
思想界的"儒、道、佛"融会,特别是"玄学"思想的影响是六朝隐逸诗流行的社会文化背景。动荡现实中,文人士子仕进无门,受道家"退避无为"的隐逸思想感染,逃避社会现实,隐遁山林,隐逸诗风行。隐逸有三种类型:... 思想界的"儒、道、佛"融会,特别是"玄学"思想的影响是六朝隐逸诗流行的社会文化背景。动荡现实中,文人士子仕进无门,受道家"退避无为"的隐逸思想感染,逃避社会现实,隐遁山林,隐逸诗风行。隐逸有三种类型:"身隐"、"朝隐"(仕隐)、"心隐",这三类隐逸的境界和精神旨向各有不同。陶渊明为"古今隐逸诗人之宗"。 展开更多
关键词 六朝 逸诗 “身隐” “朝隐” “心隐” 陶渊明
下载PDF
Effects of Sb content on structure and laser reflection performance of ATO nanomaterials 被引量:2
2
作者 张晶 王丽熙 +1 位作者 梁敏鹏 张其土 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2014年第1期131-135,共5页
Antimony tin oxide (ATO) nano-particles doped with different Sb contents were prepared by co-precipitation method, using SnCl4·5H2O and SbCl3 as main raw materials. Microstructure, morphology and reflectivity c... Antimony tin oxide (ATO) nano-particles doped with different Sb contents were prepared by co-precipitation method, using SnCl4·5H2O and SbCl3 as main raw materials. Microstructure, morphology and reflectivity curves were characterized by XRD, FESEM, UV-visible spectroscopy and laser, and the effects of Sb content on crystalline microstructure, crystal size and reflectivity curves of the ATO nano-particles were investigated systematically. The results show that the ATO nano-particles prepared by co-precipitation method have tetragonal rutile structure, with particle size distribution range of several decade nanometer. With the increase of Sb content, the grain size of ATO decreases, and the unit cell volume increases. Compared with the SnO2 particles without Sb, the 1.06 μm laser reflection of ATO nano-particles doped with Sb is obviously lower. With the increase of Sb content, the reflection increases first, then decreases;when the Sb content is 20%, 1.06μm laser reflection of ATO nano-particles is below 0.02%, and the laser reflection performance is the best. 展开更多
关键词 Sb content co-precipitation method laser reflection
下载PDF
Reframing narratives and translators' invisibility: On translators' position
3
作者 刘伟 《Sino-US English Teaching》 2009年第1期50-54,共5页
This paper takes refraining narratives and translators' invisibility as the theoretical base for discussing the translators' position. Translating is to reconstruct the original text, which leads to information chan... This paper takes refraining narratives and translators' invisibility as the theoretical base for discussing the translators' position. Translating is to reconstruct the original text, which leads to information changes. This change is attributed to translator's idiolect and thinking pattern as well as different languages. The translator's role is obvious in the text translation. How to be invisible? Even if invisibility is possible, the invisibility is like a moon in water, flower in fog. That is vague but invisible. 展开更多
关键词 reframing narratives translators' invisibility LANGUAGE information change
下载PDF
Cryptanalysis on an organization-friendly blockchain system
4
作者 Zhang Ying Jiang Rui 《Journal of Southeast University(English Edition)》 EI CAS 2022年第1期36-41,共6页
To verify that an organization-friendly blockchain system may suffer from forgery and collusion attacks,forgery and collusion attacks were theoretically carried out according to the phase sequence of an organization-f... To verify that an organization-friendly blockchain system may suffer from forgery and collusion attacks,forgery and collusion attacks were theoretically carried out according to the phase sequence of an organization-friendly blockchain system.Then,the organization-friendly blockchain system was improved and based on the phase sequence forgery and collusion attacks were conducted.The results show that the attacker can obtain illegal transaction data from forgery and collusion attacks on the organization-friendly blockchain system.However,for the improved organization-friendly blockchain,the attacker s forgery and collusion attacks cannot be completed.Therefore,the organization-friendly blockchain system may be subject to forgery and collusion attacks,but the improved organization-friendly blockchain system can prevent such attacks. 展开更多
关键词 blockchain identity privacy transaction supervision forgery attack collusion attack
下载PDF
Self-adapting RF Stealth Signal Design Method in RATR
5
作者 XIAO Yongsheng HUANG Lizhen +1 位作者 HE Fengshou ZHOU Jianjiang 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2021年第6期1020-1027,共8页
Combining the mutual information theory and the sequential hypothesis testing(SHT)method,a selfadapting radio frequency(RF)stealth signal design method is proposed. The channel information is gained through the radar ... Combining the mutual information theory and the sequential hypothesis testing(SHT)method,a selfadapting radio frequency(RF)stealth signal design method is proposed. The channel information is gained through the radar echo and feeds back to the radar system,and then the radar system adaptively designs the transmission waveform. So the close-loop system is formed. The correlations between these transmission waveforms are decreased because of the adaptive change of these transmission waveforms,and the number of illuminations is reduced for adopting the SHT,which lowers the transmission power of the radar system. The radar system using the new method possesses the RF stealth performance. Aiming at the application of radar automatic target recognition(RATR),experimental simulations show the effectiveness and feasibility of the proposed method. 展开更多
关键词 radio frequency stealth sequential hypothesis testing mutual information close-loop system
下载PDF
A stealthy method to determine the relative position and velocity for satellite formation flying
6
作者 田继超 崔乃刚 +1 位作者 姚劼 郭继峰 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2010年第1期137-140,共4页
To achieve the satellite formation control and the succeed formation missions, we present a new stealthy method to determine the relative states between formation satellites. In this method, the combination of a CCD c... To achieve the satellite formation control and the succeed formation missions, we present a new stealthy method to determine the relative states between formation satellites. In this method, the combination of a CCD camera and laser radar is used as the relative measure sensors. To reduce electromagnetic radiation, the laser radar works intermittently to minimize the probability of being discovered. And an unscented Kalman filter (UKF) is applied to estimate the relative states. The observability of this method is analyzed. The validity and effectiveness of the method is demonstrated in a typical application of formation relative navigation. 展开更多
关键词 formation flying unscented Kalman filter relative position and velocity
下载PDF
"Everything About You Is Vampiric": Vampirism as a Metaphor for Adolescent Maturation in M. T. Anderson's Thirsty
7
作者 Leni Marlina 《Journal of Literature and Art Studies》 2014年第3期189-196,共8页
Over the past few years, vampire genre has populated young adult (YA) literature. YA literature can be defined as narratives about the individual growth and maturation of adolescent protagonist. Adolescence is the b... Over the past few years, vampire genre has populated young adult (YA) literature. YA literature can be defined as narratives about the individual growth and maturation of adolescent protagonist. Adolescence is the bridging process of growing from childhood to adulthood. Furthermore, it is a turbulent time of rapid physical growth and sexual development. It also creates a critical phase in the formation of identity. In this paper, the author shall identify the ways in which representation of adolescence in an American contemporary young adult novel, Anderson's Thirsty (2008), reflects and shapes the maturation of its young protagonist. The author argues that the transformation of vampire in the novel works as a metaphor for the various changes and maturation process experienced by the protagonist in the novel. Furthermore, the author's discussion will be preceded by a short history of vampire narrative. The author's analysis is supported by psychological theories of adolescence and socio-cultural approach which focuses on the ambiguities of adolescents' identity. Moreover, this paper alludes a psychoanalytic reading of the symbolism of the vampire which refers to Freud's notions of libido and death drive The conclusion of this paper is that Anderson's Thirsty is a paranormal novel which positions the implied readers to understand the trials of an adolescent protagonist during his difficult time of transition from childhood to adulthood. 展开更多
关键词 vampirism adolescent maturation young adult literature
下载PDF
A lightweight authentication scheme with user untraceability 被引量:2
8
作者 Kuo-Hui YEH 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2015年第4期259-271,共13页
With the rapid growth of electronic commerce and associated demands on variants of Internet based applications,application systems providing network resources and business services are in high demand around the world.... With the rapid growth of electronic commerce and associated demands on variants of Internet based applications,application systems providing network resources and business services are in high demand around the world.To guarantee robust security and computational efficiency for service retrieval,a variety of authentication schemes have been proposed.However,most of these schemes have been found to be lacking when subject to a formal security analysis.Recently,Chang et al.(2014) introduced a formally provable secure authentication protocol with the property of user-untraceability.Unfortunately,based on our analysis,the proposed scheme fails to provide the property of user-untraceability as claimed,and is insecure against user impersonation attack,server counterfeit attack,and man-in-the-middle attack.In this paper,we demonstrate the details of these malicious attacks.A security enhanced authentication scheme is proposed to eliminate all identified weaknesses. 展开更多
关键词 AUTHENTICATION PRIVACY Security Smart card UNTRACEABILITY
原文传递
Embodied Cognition Processing and Representation of Power Words by Second Language Learners with Different Proficiency levels 被引量:4
9
作者 WANG Qian Northwestern Polytechnical University 《Chinese Journal of Applied Linguistics》 2016年第4期484-494,499,共12页
Conceptual Metaphor Theory believes that sensorimotor information should be an integral element in representing abstract concepts and can be activated as the way of abstract conceptual processing. Metaphor can be a br... Conceptual Metaphor Theory believes that sensorimotor information should be an integral element in representing abstract concepts and can be activated as the way of abstract conceptual processing. Metaphor can be a bridge between the abstract concept of power and the body perception experience since embodiment serves as a basis for metaphorical thinking. Using E-PRIME experimentation, the present study investigated the features in vertical space representation of English power words of second language learners with different levels of proficiency. The statistics indicated that: 1) For such learners, the representation of power words would trigger the vertically spatial metaphor, which brings about "word- space" interaction effect. 2) Chinese English learners with different levels in L2 demonstrate stronger representation abilities in L1 than that of L2, regardless of their L2 proficiency level. 3) Learners' second language proficiency exerts influence upon the representation of the English power words. 展开更多
关键词 power words embodied cognition vertically spatial metaphor mental representation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部