期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
延异与救赎——1990年代乡土诗歌回眸 被引量:2
1
作者 冷满冰 《社会科学研究》 CSSCI 北大核心 2007年第4期185-189,共5页
20世纪90年代乡土诗歌是在80年代先锋艺术“去政治化”、“去意象化”的背景下涌现出的,其自身也经历一个由陌生化逐渐到亲切化的言说过程。90年代乡土诗歌有几个明晰的特点:从90年代初的家园回望血亲指认,90年代中期逐渐形成了地域性... 20世纪90年代乡土诗歌是在80年代先锋艺术“去政治化”、“去意象化”的背景下涌现出的,其自身也经历一个由陌生化逐渐到亲切化的言说过程。90年代乡土诗歌有几个明晰的特点:从90年代初的家园回望血亲指认,90年代中期逐渐形成了地域性抒情史诗的谱系和意象体系的建构,由此拉开了地域特色、异域情调的序幕;90年代乡土诗歌还有一种致力于风景画、风俗画、风情画的审美追求,以“隐现”的艺术方法加入隐含寄寓,体现了深厚的人文情怀;最后,从90年代中期到后期,乡土真实时弊的一面浮现出来,乡土不再缄默,乡土诗人终于找到了自我的角色定位,以愤怒和挣扎抒写乡土的真实境遇,完成了乡土诗歌厚重悲凉的美学风格,也完成了乡土诗歌的自我救赎。 展开更多
关键词 乡土诗歌 血亲指认 地域特色 “隐现” 悲凉 延异 救赎
下载PDF
Animal Idioms' Teaching in Cognitive Perspective——from the Contrastive Analysis on Chinese "Hu" Idioms and English "Lion" Idioms
2
作者 周红 《Sino-US English Teaching》 2007年第1期18-23,共6页
In the actual idioms teaching, most students feel that idioms are difficult to comprehend, memorize and make actual application just because the overall meanings of idioms are unpredictable. Since cognitive linguistic... In the actual idioms teaching, most students feel that idioms are difficult to comprehend, memorize and make actual application just because the overall meanings of idioms are unpredictable. Since cognitive linguistics is based on embodiment, it can change the abstract things into comparatively concrete things, which provides a shortest way to grasp these idioms. Actually, most idioms are based on conceptual metaphor and metonymy composed of conceptual mappings between the source domain and the target one. Therefore, this paper is trying to probe into the role of cognitive principles in idioms teaching, especially animal idioms from the contrastive analysis on Chinese "hu" idioms and English "lion" idioms. 展开更多
关键词 METAPHOR METONYMY metonymic mapping frame and profile conceptual integration cognitive culture
下载PDF
Privacy Protection for Big Data Linking using the Identity Correlation Approach 被引量:1
3
作者 Kevin McCormack Mary Smyth 《Journal of Statistical Science and Application》 2017年第3期81-90,共10页
Privacy protection for big data linking is discussed here in relation to the Central Statistics Office (CSO), Ireland's, big data linking project titled the 'Structure of Earnings Survey - Administrative Data Proj... Privacy protection for big data linking is discussed here in relation to the Central Statistics Office (CSO), Ireland's, big data linking project titled the 'Structure of Earnings Survey - Administrative Data Project' (SESADP). The result of the project was the creation of datasets and statistical outputs for the years 2011 to 2014 to meet Eurostat's annual earnings statistics requirements and the Structure of Earnings Survey (SES) Regulation. Record linking across the Census and various public sector datasets enabled the necessary information to be acquired to meet the Eurostat earnings requirements. However, the risk of statistical disclosure (i.e. identifying an individual on the dataset) is high unless privacy and confidentiality safe-guards are built into the data matching process. This paper looks at the three methods of linking records on big datasets employed on the SESADP, and how to anonymise the data to protect the identity of the individuals, where potentially disclosive variables exist. 展开更多
关键词 Big Data Linking Data Matching Data Privacy Data Confidentiality Identity Correlation Approach Data Disclosure Data Mining
下载PDF
Metaphor in English Newspaper: Taking China Daily of 2010 as a Corpus
4
作者 CAI Yuan-zhen ZHOU Xiao-liang 《Sino-US English Teaching》 2014年第2期129-135,共7页
This paper identifies metaphors in newspaper English, specifically the articles in China Daily, as the research object. Many linguists have studies metaphors in newspaper English, but research perspective is only limi... This paper identifies metaphors in newspaper English, specifically the articles in China Daily, as the research object. Many linguists have studies metaphors in newspaper English, but research perspective is only limited to the classification of metaphor, and not analyses the trends for each type of metaphor from the diachronic approach, therefore, this paper aims to make up for this deficiency. Thirty-six articles are randomly sampled from China Daily in the year of 2010, to make up a small corpus. Then the occurrence frequency of every kind of metaphor of recent years in this corpus is analyzed. Finally, it is found that the occurrence frequency of orientational metaphors shows a decreasing tendency, while those of the ontological and structural metaphors are relatively stable. We have found two reasons for this trend appears. Firstly, orientational metaphors are used less frequently, because they often appear when it comes to the description of numbers, and digital change itself has a lot of direct expression Secondly, structural metaphor and ontological metaphor are relatively stable, because the former helps the readers to understand the new things; the latter can expressed lively 展开更多
关键词 newspaper English METAPHOR structural metaphor ontological metaphor orientational metaphor
下载PDF
An Economical Scheme for Cloning an Unknown M-Qudit Equatorial-Like State with Assistance
5
作者 陈秀波 马松雅 +2 位作者 庞博 杨义先 温巧燕 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第6期1067-1071,共5页
We propose a scheme to realize quantum cloning of an unknown M-qudit equatorial-like entangled state. The first stage of the protocol requires teleportation. After the teleportation is accomplished, the receiver can r... We propose a scheme to realize quantum cloning of an unknown M-qudit equatorial-like entangled state. The first stage of the protocol requires teleportation. After the teleportation is accomplished, the receiver can reestablish the original state. In the second stage of the protocol, with the assistance (through a single-particle projective measurement) of the preparer, the perfect copy of an original state can be produced at the site of the sender. Our scheme requires a single maximally entangled qudit pair as the quantum channel and three dits classical communication. The scheme is feasible at the expense of consuming local resources which include M - 1 ancillary qudits introduced by the receiver and additional bi-qudit operations. Moreover, we construct a sort of unitary transformations which ensure ancillary qudits are not necessarily introduced by the sender. Comparing to the previous protocols, the proposed protocol is economical due to that the cost of both quantum nonlocal resources and classical communication is lowest. 展开更多
关键词 quantum assisted cloning maximal entanglement projective measurement local unitary operation
下载PDF
A novel memristive neural network with hidden attractors and its circuitry implementation 被引量:12
6
作者 PHAM Viet Thanh JAFARI Sajad +2 位作者 VAIDYANATHAN sundarapandian VOLOS Christos WANG Xiong 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2016年第3期358-363,共6页
Neural networks have been applied in various fields from signal processing, pattern recognition, associative memory to artifi- cial intelligence. Recently, nanoscale memristor has renewed interest in experimental real... Neural networks have been applied in various fields from signal processing, pattern recognition, associative memory to artifi- cial intelligence. Recently, nanoscale memristor has renewed interest in experimental realization of neural network. A neural network with a memristive synaptic weight is studied in this work. Dynamical properties of the proposed neural network are investigated through phase portraits, Poincar6 map, and Lyapunov exponents. Interestingly, the memristive neural network can generate hyperchaotic attractors without the presence of equilibrium points. Moreover, circuital implementation of such memristive neural network is presented to show its feasibility. 展开更多
关键词 neural network MEMRISTOR HYPERCHAOS hidden attractor equilibrium
原文传递
A surface-based hiding function linking flume and field data 被引量:1
7
作者 ZHANG LiGuo FU XuDong DUAN Jennifer G 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2017年第10期1560-1569,共10页
The quantification of the sheltering and exposure effects of non-uniform sediments has been widely achieved through hiding function models. Big challenge exists so far in the model parameter that is highly variable an... The quantification of the sheltering and exposure effects of non-uniform sediments has been widely achieved through hiding function models. Big challenge exists so far in the model parameter that is highly variable and differs greatly between laboratory flumes and field streams. This paper presents an improved surface-based hiding fimction. The force balance for particle inception was formulated and the allocation of the overall bed shear stress into each group of sediments was mimicked. The new hiding function was examined against and agrees well with the documented field and flume data. It was shown that the hiding fimction is closely related to the relative flow depth and the reference elevation in the velocity profile in addition to the bed material gradation. The power law of velocity profile that applies to both flume flows and natural streams can link the flume and field data together. The hiding function with b = 1/6 and b = 1/2 is applicable to natural streams and laboratory flumes, respectively. The value orb = 0.263 also works well for gravel bed rivers. The range of the reference elevation, namely z0 = 0.4Dm-1.4Dm, is recommended for either the flume or field data. The new hiding function contributes to addressing clearer physical meanings and a useful perspective for further improvement. 展开更多
关键词 hiding function relative flow depth flume and field data reference elevation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部