期刊文献+
共找到49篇文章
< 1 2 3 >
每页显示 20 50 100
“骗”的文人书写与民间讲述——从李渔《归正楼》和耿村民间故事比较分析说起 被引量:2
1
作者 张琼洁 《河北大学学报(哲学社会科学版)》 CSSCI 北大核心 2015年第5期63-67,共5页
"骗"本身是与"信"相悖的人类所公认的伦理道德底线之下的行为。若搁置道德评价,"骗"可以说是非典型性智慧的一种。这种智慧无论是在文人笔下还是民间讲述都得到大量的关注与叙述。二者在情节编织与意义... "骗"本身是与"信"相悖的人类所公认的伦理道德底线之下的行为。若搁置道德评价,"骗"可以说是非典型性智慧的一种。这种智慧无论是在文人笔下还是民间讲述都得到大量的关注与叙述。二者在情节编织与意义书写上有较大差异。文人笔下的行骗故事注重叙述策略、顾及意义阐释。民间讲述中的行骗故事则更注重故事的趣味性与串联性。李渔笔下的《归正楼》和耿村民间故事中的《张糊弄》分别为其典型代表。据比较发现,在叙事形态上,行骗故事所采用的系列故事讲法是介于书面文学和口头文学之间的叙述形式,勾连起文人与民间的分壑。在意义阐释上,文人书写与民间讲述反映出的是大小传统观念上的差异,从更深意义上讲,无论是骗行为还是骗故事本质特征是"游戏"。文人以自省的文学观念将文字游戏运用到了文学创作之中。民众在娱心娱乐的同时体现了一种人性的觉醒和抵抗。 展开更多
关键词 “骗” 书面文学 口头故事 智慧 游戏
下载PDF
“盗”“骗”手段交织案件的实行行为研究
2
作者 许光 《江南大学学报(人文社会科学版)》 2008年第4期39-42,共4页
"盗""骗"手段交织案件要准确定罪,亟需考究犯罪实行行为。实行行为是刑法理论中基本概念之一,规范意义上的实行行为就是刑法分则所规定的各种具体犯罪的行为模型。实行行为的实质与构成特征以及实行着手与终了是判... "盗""骗"手段交织案件要准确定罪,亟需考究犯罪实行行为。实行行为是刑法理论中基本概念之一,规范意义上的实行行为就是刑法分则所规定的各种具体犯罪的行为模型。实行行为的实质与构成特征以及实行着手与终了是判断具体事实是否符合犯罪行为模型的重要标准。"盗""骗"手段交织案件貌似复杂,实则简单:其"盗""骗"手段交织这种特殊的事实仅符合一个盗窃罪或者诈骗罪的行为模型,即其仅具有盗窃或者诈骗一个实行行为,所以,该类案件只能认定为一个盗窃罪或者诈骗罪。 展开更多
关键词 “盗” “骗” 手段交织 盗窃罪 实行行为
下载PDF
识“骗”
3
作者 胡巧萍 《审计与理财》 2004年第7期53-54,共2页
关键词 “骗” 通讯 报告文学 胡巧萍
下载PDF
“诓骗”“诳骗”探源及辨析
4
作者 陈晨 《汉字汉语研究》 2024年第2期92-101,127,共11页
本文主要考察“诓骗”和“诳骗”的使用情况,探究其来源,分析其差异。这两个词出现在元明时期,“诳骗”产生稍早于“诓骗”,但使用频率不如后者高。“诓骗”分布的句法位置更多样,能用于更多的句式。语义上,两者均有“欺骗”之义,但“... 本文主要考察“诓骗”和“诳骗”的使用情况,探究其来源,分析其差异。这两个词出现在元明时期,“诳骗”产生稍早于“诓骗”,但使用频率不如后者高。“诓骗”分布的句法位置更多样,能用于更多的句式。语义上,两者均有“欺骗”之义,但“诓骗”还可以作“骗取”讲。现代汉语中“诳”可以作为名词使用,“诓”则主要作动词,而且在方言中有特殊义项。“诳”的构词能力强于“诓”,与言说义语素和欺骗义语素组合构成的双音词更多,就发展使用情况而言,以“诓骗”为常。 展开更多
关键词 异体字
下载PDF
“密骗”、“觅骗”、“蔑骗”、“篾客”考
5
作者 贺卫国 《河池学院学报》 2015年第3期34-36,42,共4页
"密骗"、"觅骗"、"蔑骗"与"篾客"四词均指清客、门客、跟班之类帮闲凑趣之人,上述四词《汉语大词典》皆失收,部分学者对"密骗"、"觅骗"诠释不确。
关键词 篾客 篾片 音近义通
下载PDF
“骗”母记
6
作者 吉建平 《中国农村金融》 2013年第10期93-94,共2页
每次回家,总要给母亲带一些她爱吃的东西。当我盘腿坐在热乎乎的炕头上,与母亲一起吃饭的时候,总要一次次挡住她往我碗里夹菜的手,以不想吃、不爱吃等理由"骗"她,免得她把好吃的都留给我。这个"骗"还是从母亲那里学来的。
关键词 散文 文学作品 现代文学 “骗”母记》
原文传递
消除“骗官”现象
7
作者 黄学民 《领导科学论坛》 2007年第4期55-55,共1页
骗官与跑官、耍官、买官相比,手段较为隐蔽,不易觉察,也更为卑鄙。因此,其危害尤烈于前者。但是,无论骗术如何高明,终归还是能够识破的。归纳起来,“骗象”大致有以下几种。
关键词 “骗官”现象 危害 社会病态
下载PDF
A Preliminary Study on Pollination Biology of an Endangered Orchid, Changnienia amoena, in Shennongjia 被引量:9
8
作者 孙海芹 罗毅波 葛颂 《Acta Botanica Sinica》 CSCD 2003年第9期1019-1023,共5页
Changnienia amoena Chien is a monotypic species and endemic to China, and was listed on the Chinese Red Book in 1992. The species was once abundant but has become rare and endangered in recent years because of the hab... Changnienia amoena Chien is a monotypic species and endemic to China, and was listed on the Chinese Red Book in 1992. The species was once abundant but has become rare and endangered in recent years because of the habitat fragmentation and unduly commercial collections. Previous observation showed that this species has very low and even no fruit set, and the pollinators are not observed before this report. The present observation was conducted at the Shennongjia, Hubei Province during the spring of 2002. The results showed that Bombus (Diversobombus) trifasciatus Smith, B. imitator Pittion and one species of Apis visited the flowers of the orchid, but only B. tritasciatus could carry pollinaria on its body and was the legitimate pollinators of C amoena. During 113 h of observation, only nine visitations were recorded. The bumblebees mainly appeared during 12:00-15:00 during the day. Bumblebees stayed in a flower only a few seconds and never more than ten seconds. The flowers would persist in fresh for about three weeks when they were not pollinated, but 3 or 4 d after pollinated, the pollinated flowers underwent a series of color and morphological changes including stalk elongation and ovary swelling. Therefore, stalk elongation can be considered an index of fruits set. Artificial pollination indicated that C amoena is a highly self-compatible and outcrossing species, but dependent on pollinators for fruit set. Based on the field observations, we concluded that pollination system of C amoena is deceptive. The fruit set in nature is not very low (26.98% on average) compared to other deceptive orchids, which may be related to small population sizes. The number of pollinia removal is much higher than that of fruit set, indicating that there are some degrees of pollinia wasting in C amoena. 展开更多
关键词 Changnienia amoena Bombus (Diversobombus) trifasciatus deceptive pollination stalk elongation
下载PDF
GNSS spoofing detection based on uncultivated wolf pack algorithm 被引量:3
9
作者 孙闽红 邵章义 +1 位作者 包建荣 余旭涛 《Journal of Southeast University(English Edition)》 EI CAS 2017年第1期1-4,共4页
In order to solve the problem that the global navigation satellite system(GNSS) receivers can hardly detect the GNSS spoofing when they are deceived by a spoofer,a model-based approach for the identification of the ... In order to solve the problem that the global navigation satellite system(GNSS) receivers can hardly detect the GNSS spoofing when they are deceived by a spoofer,a model-based approach for the identification of the GNSS spoofing is proposed.First,a Hammerstein model is applied to model the spoofer/GNSS transmitter and the wireless channel.Then,a novel method based on the uncultivated wolf pack algorithm(UWPA) is proposed to estimate the model parameters.Taking the estimated model parameters as a feature vector,the identification of the spoofing is realized by comparing the Euclidean distance between the feature vectors.Simulations verify the effectiveness and the robustness of the proposed method.The results show that,compared with the other identification algorithms,such as least square(LS),the iterative method and the bat-inspired algorithm(BA),although the UWPA has a little more time-eomplexity than the LS and the BA algorithm,it has better estimation precision of the model parameters and higher identification rate of the GNSS spoofing,even for relative low signal-to-noise ratios. 展开更多
关键词 global navigation satellite system(GNSS) spoofing detection system identification uncultivated wolf pack algorithm
下载PDF
Revised quantum direct communication scheme with mutual authentication 被引量:2
10
作者 刘文杰 陈汉武 +1 位作者 许娟 刘志昊 《Journal of Southeast University(English Edition)》 EI CAS 2010年第4期532-536,共5页
Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communicati... Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communication process.The purpose of the former is to authenticate Trent and users to each other,and let the two legitimate users(Alice and Bob)safely share the Bell states.While the latter aims to make direct communication to transmit a secret message between Alice and Bob.In order to prevent from Eve's eavesdropping as well as to authenticate each other simultaneously,a decoy photon checking technique is applied.Compared with other analogous protocols,the quantum state distribution process is more simple and feasible and the proposed scheme is more efficient;i.e.,the total efficiency is almost 100%.Security analysis shows that the proposed scheme is secure against the eavesdropping attacks,the impersonation attacks,and some special Trent's attacks,including the attacks by using different initial states. 展开更多
关键词 quantum direct communication mutual authentica-tion decoy-photon checking impersonation attack special Trent's attack
下载PDF
《欢喜冤家》词语拾零 被引量:2
11
作者 化振红 《古籍整理研究学刊》 CSSCI 2008年第1期57-58,共2页
对《欢喜冤家》中未见于各种大型工具书和断代词典的若干词语进行解释。
关键词 《欢喜冤家》 酷炭
下载PDF
自媒体时代微公益的发展现状及优化路径分析——以“罗尔事件”为例 被引量:1
12
作者 杨桃莲 解晓玉 《今传媒》 2019年第8期8-14,共7页
Web2.0时代,依托互联网而产生的自媒体正在蓬勃发展,“人人都可以发声”“点对点”互联得以实现,人人都可参与的“微公益”日益发展壮大。然而,微公益在发展过程中也出现了“骗捐”问题,只有妥善解决这一问题才能使微公益获得更好的发... Web2.0时代,依托互联网而产生的自媒体正在蓬勃发展,“人人都可以发声”“点对点”互联得以实现,人人都可参与的“微公益”日益发展壮大。然而,微公益在发展过程中也出现了“骗捐”问题,只有妥善解决这一问题才能使微公益获得更好的发展。文章选取典型案例——“罗尔事件”,对其加以具体剖析,并试图从政府、媒体、大众、技术以及社会五个层面提出一些建议。 展开更多
关键词 自媒体 微公益 “罗尔事件” “骗捐”
下载PDF
测量设备无关量子密钥分配的综合参数估计
13
作者 王洪 马智 +1 位作者 江浩东 高明 《信息安全研究》 2015年第2期105-111,共7页
参数估计(单光子计数率与误码率)是影响诱骗态MDI-QKD(measurement device-independent quantum key distdbution)成码率的重要因素.利用综合估计的方法,研究采用自发参量下转换(spontaneous parametric down conversion,SPDC)源的MDI-... 参数估计(单光子计数率与误码率)是影响诱骗态MDI-QKD(measurement device-independent quantum key distdbution)成码率的重要因素.利用综合估计的方法,研究采用自发参量下转换(spontaneous parametric down conversion,SPDC)源的MDI-QKD参数估计问题.区别于已有的独立估计方法,从平均计数率和误码率方程组中得到参数解析式,然后充分考虑参数之间的关联性,将其作为一个整体函数进行分析.通过在闭区间内求函数最小值,给出了更紧的安全码率估计.该方法为进一步提升此类MDI-QKD协议的性能提供了思路. 展开更多
关键词 量子密钥分配 测量设备无关 自发参量下转换源 统计涨落
下载PDF
Similarity measure design for high dimensional data 被引量:3
14
作者 LEE Sang-hyuk YAN Sun +1 位作者 JEONG Yoon-su SHIN Seung-soo 《Journal of Central South University》 SCIE EI CAS 2014年第9期3534-3540,共7页
Information analysis of high dimensional data was carried out through similarity measure application. High dimensional data were considered as the a typical structure. Additionally, overlapped and non-overlapped data ... Information analysis of high dimensional data was carried out through similarity measure application. High dimensional data were considered as the a typical structure. Additionally, overlapped and non-overlapped data were introduced, and similarity measure analysis was also illustrated and compared with conventional similarity measure. As a result, overlapped data comparison was possible to present similarity with conventional similarity measure. Non-overlapped data similarity analysis provided the clue to solve the similarity of high dimensional data. Considering high dimensional data analysis was designed with consideration of neighborhoods information. Conservative and strict solutions were proposed. Proposed similarity measure was applied to express financial fraud among multi dimensional datasets. In illustrative example, financial fraud similarity with respect to age, gender, qualification and job was presented. And with the proposed similarity measure, high dimensional personal data were calculated to evaluate how similar to the financial fraud. Calculation results show that the actual fraud has rather high similarity measure compared to the average, from minimal 0.0609 to maximal 0.1667. 展开更多
关键词 high dimensional data similarity measure DIFFERENCE neighborhood information financial fraud
下载PDF
Evaluation on safety performance of a millimetre wave radar-based autonomous vehicle 被引量:4
15
作者 CHEN Ding NI Jin-ping +1 位作者 BAI Lang CHEN Da-chuan 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2020年第1期1-10,共10页
This paper presents a method using range deception jamming to evaluate the safety performance of the autonomous vehicle with millimetre wave(MMW)radar.The working principle of this method is described.Combined with a ... This paper presents a method using range deception jamming to evaluate the safety performance of the autonomous vehicle with millimetre wave(MMW)radar.The working principle of this method is described.Combined with a waveform edition software,an experimental platform is developed to generate a deceptive signal that contains false distance information.According to related theories and its principle,the configuration parameters of the experimental setup are calculated and configured.The MMW radar of evaluated vehicle should identify an objective when it receives the deceptive signal from the experimental setup.Even if no obstacle,the evaluated vehicle can immediately brake in order that its braking distance is measured.The experimental results show that the proposed method can meet the requirements of the safety performance evaluation for the autonomous vehicle with MMW radar,and it also overcomes some deficiencies of previous methods. 展开更多
关键词 vehicle safety evaluation braking distance measurement semi-physical simulation range deception jamming spurious echo generation
下载PDF
Fluctuation Analysis of Decoy State QKD with Finite Data-Set Size 被引量:1
16
作者 唐少杰 焦荣珍 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第9期443-446,共4页
Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84QKD with coherent light pulses.The number of data-set size in practical QKD protocol is always finite,which will ca... Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84QKD with coherent light pulses.The number of data-set size in practical QKD protocol is always finite,which will causestatistical fluctuations.In this paper,we apply absolutely statistical fluctuation to amend the yield and error rate of thequantum state.The relationship between exchanged number of quantum signals and key generation rate is analyzed inour simulation,which offers a useful reference for experiment. 展开更多
关键词 quantum key distribution finite data-set size statistical fluctuation
下载PDF
Constructions of Cheating Immune Secret Sharing Functions 被引量:1
17
作者 卓泽朋 Zhang Weiguo Xiao Guozhen 《High Technology Letters》 EI CAS 2011年第1期102-105,共4页
Based on the relationship between cheating immune secret sharing and cryptographic criteria of Boolean functions, to design a cheating immune secret sharing scheme, a 1-resilient function satisfying the strict avalanc... Based on the relationship between cheating immune secret sharing and cryptographic criteria of Boolean functions, to design a cheating immune secret sharing scheme, a 1-resilient function satisfying the strict avalanche criterion (SAC) is needed. In this paper, a technique on constructing a cheating immune secret sharing function is studied. By using Maiorana-McFarland construction technique, two new methods to construct cheating immune secret sharing functions are proposed. 展开更多
关键词 secret sharing Boolean function correlation immune strict avalanche criterion SAC) resilient function
下载PDF
基于信号博弈的新能源汽车政府补贴问题研究
18
作者 刘敏建 《经济师》 2017年第3期58-59,共2页
21世纪以来,新能源汽车行业发展势头迅猛,我国政府出台一系列政策扶持该产业的发展,对新能源汽车进行补贴,一些汽车企业看到有利可图,违规"骗补",趁机不当牟利。文章通过建立信号博弈模型,研究政府与汽车企业补贴过程中的策... 21世纪以来,新能源汽车行业发展势头迅猛,我国政府出台一系列政策扶持该产业的发展,对新能源汽车进行补贴,一些汽车企业看到有利可图,违规"骗补",趁机不当牟利。文章通过建立信号博弈模型,研究政府与汽车企业补贴过程中的策略选择问题,并对其博弈均衡做出分析。分析表明:完全成功市场中政府的补贴效率最高,同时伪装成本和风险成本对市场均衡有很大的影响,伪装成本和风险成本越高,均衡效率越差。由此对政府和企业分别提出建议:政府应提高核查效率,加大惩罚力度;企业应诚实守信、合法经营,和政府共同维持新能源汽车良好市场秩序。 展开更多
关键词 新能源汽车 补贴政策 信号博弈 “骗补”
下载PDF
A NEW DYNAMIC DEFENSE MODEL BASED ON ACTIVE DECEPTION
19
作者 Gong Jing Sun Zhixin Gu Qiang 《Journal of Electronics(China)》 2009年第2期205-213,共9页
Aiming at the traditional passive deception models,this paper constructs a Decoy Platform based on Intelligent Agent(DPIA) to realize dynamic defense.The paper explores a new dynamic defense model based on active dece... Aiming at the traditional passive deception models,this paper constructs a Decoy Platform based on Intelligent Agent(DPIA) to realize dynamic defense.The paper explores a new dynamic defense model based on active deception,introduces its architecture,and expatiates on communication methods and security guarantee in information transference.Simulation results show that the DPIA can attract hacker agility and activity,lead abnormal traffic into it,distribute a large number of attack data,and ensure real network security. 展开更多
关键词 Network security Active deception Dynamic defense
下载PDF
On Honesty and Deceit: An Interpretation of Difference and Repetition
20
作者 Andrew Johnson 《Journal of Philosophy Study》 2012年第5期301-313,共13页
Foucault famously questioned the humor, and possibly the deceit, at the heart of Deleuze's philosophy by asserting its sincerity and seriousness. In this paper I address how humor and sincerity, and thereby truth and... Foucault famously questioned the humor, and possibly the deceit, at the heart of Deleuze's philosophy by asserting its sincerity and seriousness. In this paper I address how humor and sincerity, and thereby truth and falsity, are philosophical concepts at the core of Deleuze's thought. Using Deleuze's work Difference and Repetition as the focal object of my interrogation, I seek to show how truth and falsity are structured by difference and repetition. Deleuze's philosophy of pure difference does not merely try to critique traditional notions of truth, but attempts to define a new model of truth and falsity that bears both differences and repetitions from the previous models in the history of philosophy. 展开更多
关键词 DELEUZE truth FALSITY HUMOR DIFFERENCE REPETITION
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部