期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
以“随缘”论《林兰香》对儒家理想的坚持
1
作者 杨玉英 《安阳工学院学报》 2017年第3期58-60,共3页
小说《林兰香》中的"随缘"思想并不能简单地将之等同于通常意义上佛道之"随缘"。一方面,作者不甘心燕梦卿儒家理想的破灭,"随缘"是作者实现儒家理想所采取的"改良"之道;另一方面,理想与现实的... 小说《林兰香》中的"随缘"思想并不能简单地将之等同于通常意义上佛道之"随缘"。一方面,作者不甘心燕梦卿儒家理想的破灭,"随缘"是作者实现儒家理想所采取的"改良"之道;另一方面,理想与现实的矛盾使得作者不得不发出了"耘我良亩,任岁丰歉"的感叹,将入世的耕耘与出世的收获融为一体,在本质上仍是对儒家理想的坚持。 展开更多
关键词 “随缘” 儒家理想 出世思想
下载PDF
相亲:成家通途还是两性区隔——基于对“剩女”的访谈 被引量:6
2
作者 方旭东 《社会科学论坛》 CSSCI 2016年第6期184-193,共10页
中国传统语境中,相亲是成家这一事件得以实现的起点;现代社会中,恋爱是走向婚姻的自由之路。围绕"剩女"这一话语,凸显出从恋爱到婚姻开始出现地方性困难,相亲作为古老的两性交往的仪轨开始回归,成为大龄单身男女启动恋爱"... 中国传统语境中,相亲是成家这一事件得以实现的起点;现代社会中,恋爱是走向婚姻的自由之路。围绕"剩女"这一话语,凸显出从恋爱到婚姻开始出现地方性困难,相亲作为古老的两性交往的仪轨开始回归,成为大龄单身男女启动恋爱"必要的冗余"。经过访谈与话语分析,发现"剩女"在相亲中有着稳定的话语结构:"人要好""找适合的""随缘"。这三位一体的自洽性话语结构,成为"剩女"在无奈而又认为必要的相亲中的支援性话语;这种支援意识抑或是觉醒的女性主体策略式对男性统治话语的反向支配——作为对抗男权的一种抗争形式,同样背离了自由恋爱主体间性的商谈伦理原则,最终可能结果是:虚假的女性主体与"男权统治"越发紧张与区隔化,相亲就是这种区隔化的表征与起点。 展开更多
关键词 “剩女” 相亲 “人要好” “找适合的” “随缘”
下载PDF
Estimation in Nonlinear Models with Random Effects
3
作者 宗序平 朱仲义 《Journal of Southeast University(English Edition)》 EI CAS 1998年第2期124-129,共6页
A necessary condition for existence of any weakly consistent estimator is presented in nonlinear models with random effects. Under mild regularity conditions, the strong consistency and the asymptotic normality of the... A necessary condition for existence of any weakly consistent estimator is presented in nonlinear models with random effects. Under mild regularity conditions, the strong consistency and the asymptotic normality of the estimator are proved. The results of Breslow and Calyton(1993), Lee and Nelder(1996) are improved. 展开更多
关键词 fixed effects random effects marginal likelihood
下载PDF
Identity-based threshold key-insulated signature 被引量:3
4
作者 Chen Jianhong Chen Kefei Long Yu 《High Technology Letters》 EI CAS 2012年第3期275-280,共6页
Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect ... Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect private keys. To deal with the private (signing) key exposure problem in identity-based signature systems, we propose an identity-based threshold key-insulated signature (IBTKIS) scheme. It strengthens the security and flexibility of existing identity-based key-insulated signature schemes. Our scheme' s security is proven in the random oracle model and rests on the hardness of the computational Diffie-Helhnan problem in groups equipped with a pairing. To the best of our knowledge, it is the first IBTKIS scheme up to now. 展开更多
关键词 threshold key-insulated SIGNATURE random oracle model
下载PDF
IDENTITY-BASED KEY-INSULATED PROXY SIGNATURE 被引量:4
5
作者 Wan Zhongmei Lai Xuejia +2 位作者 Weng Jian Liu Shengli Hong Xuan 《Journal of Electronics(China)》 2009年第6期853-858,共6页
In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature sche... In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature scheme since any adversary can sign messages on behalf of the proxy signer. In this paper,we applied Dodis,et al.’s key-insulation mechanism and proposed an Identity-Based (ID-based) Key-Insulated Proxy Signature (IBKIPS) scheme with secure key-updates. The proposed scheme is strong key-insulated and perfectly key-insulated. Our scheme also supports unbounded period numbers and random-access key-updates. 展开更多
关键词 KEY-INSULATED Proxy signature Identity-based signature Key-exposure Bilinear pairings
下载PDF
Extraction of line and rounded objects from underwater images
6
作者 王猛 杨杰 刘维 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第5期613-620,共8页
In the field of underwater image processing, the line and rounded objects, like mines and torpedoes, are the most common targets for rec, ognition. Before further analysis, these two image patterns need to be detected... In the field of underwater image processing, the line and rounded objects, like mines and torpedoes, are the most common targets for rec, ognition. Before further analysis, these two image patterns need to be detected and extracted from the underwater images in real-time. Using the subpixel position, direction and curvature information of an edge provided by Zernike Orthogonal Moment (ZOM) edge detection operators, an enhanced Randomized Hough Transform (RHT) to extract straight-lines is developed. This line extraction method consists of two steps : the rough parameters of a line are obtained robustly at first using RHT with large quantization in the Hough space and then the parameters are refined with line fitting techniques. Therefore both the robustness and high precision can be achieved simultaneously. Particularly, the problem of ellipse extraction is often computationally demanding using traditional Hough Transform, since an ellipse is characterized by five parameters. Based on the generalized K-RASAC algorithm, we develop a new ellipse extraction algorithm using the concept of quadratic curve cluster and random sampling technique. We first develop a new representation of quadratic curves, which facilitates quantization and voting for the parameter A that represents a candidate ellipse among the quadratic curves. Then, after selecting two tangent points and calculating the quadratic parameter equation, we vote for the parameter A to determine an ellipse. Thus the problem of ellipse extraction is reduced into finding the local minimum in the A accumulator array. The methods presented have been applied successfully to the extraction of lines and ellipses from synthetic and real underwater images, serving as a basic computer vision module of the underwater objects recognition system. Compared to the standard RHT line extraction method and K-RANSAC ellipse extraction method, our methods have the attractive advantages of obtaining robustness and high precision simultaneously while preserving the merits of high computation speed and small storage requirement. 展开更多
关键词 computer vision geometric primitive extraction subpixel edge extractlon ellipse extraction randomized hough transformation (RHT) K-RANSAC
下载PDF
随缘风顺素汤
7
《中外食品工业(贝太厨房)》 2010年第8期54-54,共1页
这个季节的菌菇非常的鲜美,用各种菌菇炖出的菌汤更是鲜美的无法比拟,这本来就是一个喝汤的季节,快把鲜美带回家吧。
关键词 “随缘风顺素汤” 烹饪法 美食 菌菇
原文传递
Certificateless key-insulated signature without random oracles 被引量:6
8
作者 Zhong-mei WAN Xue-jia LAI +3 位作者 Jian WENG Sheng-li LIU Yu LONG Xuan HONG 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第12期1790-1800,共11页
Leakage of the private key has become a serious problem of menacing the cryptosystem security. To reduce the underlying danger induced by private key leakage, Dodis et al.(2003) proposed the first key-insulated signat... Leakage of the private key has become a serious problem of menacing the cryptosystem security. To reduce the underlying danger induced by private key leakage, Dodis et al.(2003) proposed the first key-insulated signature scheme. To handle issues concerning the private key leakage in certificateless signature schemes, we devise the first certificateless key-insulated signature scheme. Our scheme applies the key-insulated mechanism to certificateless cryptography, one with neither certificate nor key escrow. We incorporate Waters (2005)’s signature scheme, Paterson and Schuldt (2006)’s identity-based signature scheme, and Liu et al.(2007)’s certificateless signature scheme to obtain a certificateless key-insulated signature scheme. Our scheme has two desirable properties. First, its security can be proved under the non-pairing-based generalized bilinear Diffie-Hellman (NGBDH) conjecture, without utilizing the random oracle model; second, it solves the key escrow problem in identity-based key-insulated signatures. 展开更多
关键词 KEY-INSULATED Key leakage CERTIFICATELESS Bilinear map
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部