期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
司马光《潜虚·名图》对“中和”价值的彰显
1
作者 陈睿超 《中国哲学史》 CSSCI 北大核心 2019年第5期56-62,共7页
《潜虚》是司马光独创的宏大易学宇宙观体系,其《名图》兼具天道气运与人事之名的象征义,在整个《潜虚》体系中处于沟通天人的核心地位。司马光在创制《名图》时,做了三方面巧妙的象数设计:其一,将《齐名》符号××置于图周图... 《潜虚》是司马光独创的宏大易学宇宙观体系,其《名图》兼具天道气运与人事之名的象征义,在整个《潜虚》体系中处于沟通天人的核心地位。司马光在创制《名图》时,做了三方面巧妙的象数设计:其一,将《齐名》符号××置于图周图的中央;其二,象征四时之中每一时节气运的符号皆按始于五行生数相配、中于生成数调和、终于五行成数相配的原则排布;其三,将五十五组符号依右数之序必为木、金、土、水、火,冲和之土必居正中的方式分为十一门类,以此确定象征人事的五十五名。通过如是的精妙安排,《名图》在其象数结构之中彰显出"中和"这一重要的儒家价值观念,体现了"推天道以名人事"的易学宗旨。 展开更多
关键词 司马光 《潜虚》 《名图》 中和
原文传递
An MAC Layer Aware Pseudonym (MAP) Scheme for the Software Defined Internet of Vehicles 被引量:1
2
作者 Zishan Liu Li Zhu +2 位作者 Jianwu Li Guiyang Luo Lin Zhang 《China Communications》 SCIE CSCD 2018年第9期200-214,共15页
This paper proposes a cross-layer design to enhance the location privacy under a coordinated medium access control(MAC) protocol for the Internet of Vehicles(Io V). The channel and pseudonym resources are both essenti... This paper proposes a cross-layer design to enhance the location privacy under a coordinated medium access control(MAC) protocol for the Internet of Vehicles(Io V). The channel and pseudonym resources are both essential for transmission efficiency and privacy preservation in the Io V. Nevertheless, the MAC protocol and pseudonym scheme are usually studied separately, in which a new MAC layer semantic linking attack could be carried out by analyzing the vehicles' transmission patterns even if they change pseudonyms simultaneously. This paper presents a hierarchical architecture named as the software defined Internet of Vehicles(SDIV). Facilitated by the architecture, a MAC layer aware pseudonym(MAP) scheme is proposed to resist the new attack. In the MAP, RSU clouds coordinate vehicles to change their transmission slots and pseudonyms simultaneously in the mix-zones by measuring the privacy level quantitatively. Security analysis and extensive simulations are conducted to show that the scheme provides reliable safety message broadcasting, improves the location privacy and network throughput in the Io V. 展开更多
关键词 IoV software defined network(SDN) location privacy MAC protocol cross-layer design
下载PDF
A DIGITAL SIGNATURE-BASED VISUAL CRYPTOGRAPHY SCHEME FOR IMAGE DISCRIMINATION AND MANAGEMENT 被引量:1
3
作者 Han Yanyan Hu Yupu He Wencai 《Journal of Electronics(China)》 2009年第5期631-636,共6页
Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no informat... Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no information on the original key. But a mass of sub-keys have to be saved actually, which faces the problem of inconvenient discrimination and management. This paper presents a visual cryptography scheme based on the digital signature for image discrimination and management, applying the digital signature and the time-stamp technology to the visual cryptography scheme. The scheme both solves the problem on the storage and management of the sharing sub-keys, increases the verification of image contents, thus enhances the validity of storage and management without security effect. 展开更多
关键词 Visual cryptography Digital signature Time-stamp
下载PDF
A SECURE THRESHOLD GROUP SIGNATURE SCHEME
4
作者 WangXiaoming FuFangwei 《Journal of Electronics(China)》 2003年第4期274-278,共5页
The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a sec... The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a secure threshold group signature scheme is proposed. It can not only satisfy the properties of the threshold group signature, but also withstand the conspiracy attack. 展开更多
关键词 CRYPTOGRAPHY Digital signature Threshold signature Conspiracy attack
下载PDF
Traffic sign recognition algorithm based on shape signature and dual-tree complex wavelet transform 被引量:8
5
作者 蔡自兴 谷明琴 《Journal of Central South University》 SCIE EI CAS 2013年第2期433-439,共7页
A novel traffic sign recognition system is presented in this work. Firstly, the color segmentation and shape classifier based on signature feature of region are used to detect traffic signs in input video sequences. S... A novel traffic sign recognition system is presented in this work. Firstly, the color segmentation and shape classifier based on signature feature of region are used to detect traffic signs in input video sequences. Secondly, traffic sign color-image is preprocessed with gray scaling, and normalized to 64×64 size. Then, image features could be obtained by four levels DT-CWT images. Thirdly, 2DICA and nearest neighbor classifier are united to recognize traffic signs. The whole recognition algorithm is implemented for classification of 50 categories of traffic signs and its recognition accuracy reaches 90%. Comparing image representation DT-CWT with the well-established image representation like template, Gabor, and 2DICA with feature selection techniques such as PCA, LPP, 2DPCA at the same time, the results show that combination method of DT-CWT and 2DICA is useful in traffic signs recognition. Experimental results indicate that the proposed algorithm is robust, effective and accurate. 展开更多
关键词 traffic sign recognition SIGNATURE DT-CWT 2DICA nearest neighbor classifier
下载PDF
BFMT: A Simple Biometric Facial Recognition System
6
作者 Gene R. Brown Murray E. Jennex Theophilus B.A. Addo 《Computer Technology and Application》 2011年第8期579-590,共12页
This study describes the development of a simple biometric facial recognition system, BFMT, which is designed for use in identifying individuals within a given population. The system is based on digital signatures der... This study describes the development of a simple biometric facial recognition system, BFMT, which is designed for use in identifying individuals within a given population. The system is based on digital signatures derived from facial images of human subjects. The results of the study demonstrate that a particular set of facial features from a simple two-dimensional image can yield a unique digital signature which can be used to identify a subject from a limited population within a controlled environment. The simplicity of the model upon which the system is based can result in commercial facial recognition systems that are more cost-effective to develop than those currently on the market. 展开更多
关键词 BIOMETRICS facial recognition facial recognition systems digital signature security microsoft access visual basic for applications.
下载PDF
The Use and Reuse of Julius Caesar's Religious Résumé on Imperatorial Coinage
7
作者 Gaius Stern 《Journal of Literature and Art Studies》 2014年第1期62-74,共13页
Soon after Roman mint masters began issuing the silver denarius (traditional date 187 B.C.), they discovered that they could employ coinage as newspapers and PR by individualizing the imagery on each side of the coi... Soon after Roman mint masters began issuing the silver denarius (traditional date 187 B.C.), they discovered that they could employ coinage as newspapers and PR by individualizing the imagery on each side of the coin with references to their ancestry, current events, and/or their religious offices to increase their name recognition in order to win votes. It should come as no surprise that the Divine Julius ordered his mint masters to issue coinage that advertised all of the above features to circulate his good reputation in what our modern political scientists would call propaganda. After Julius' enemies began to attack his reputation, some of his partisans boasted of their closeness to him on coinage by recycling specific coin images. What is surprising is how these partisans adopted the exact imagery Julius had used to advertise his own religious résumé on their coinage, even though these religious images could not and did not apply to them specifically. Apparently, Julius' religious résumé no longer demonstrated a religious portfolio, but had transformed into a badge of partisanship, however thinly it applied, so that the religious symbols themselves retained only the function of an association with Julius without their original and intrinsic meaning. 展开更多
关键词 Roman history Roman religion Roman coinage Julius Caesar Augustus lituus simpulum NUMISMATICS Second Triumvirate
下载PDF
What Preteen Girls Learn About Gender Roles From Celebrities
8
作者 Kara Chan 《Journalism and Mass Communication》 2011年第2期79-87,共9页
A face-to-face qualitative interview study was conducted to examine the perceived gender roles and gender identities among 10 to 12 years old girls in Hong Kong. Sixteen girls aged 10 to 12 were asked to take pictures... A face-to-face qualitative interview study was conducted to examine the perceived gender roles and gender identities among 10 to 12 years old girls in Hong Kong. Sixteen girls aged 10 to 12 were asked to take pictures from the media they consumed that illustrated "What girls or women should or should not be; and what girls or women should or should not do". Analysis of interviews and images captured found that celebrities and characters in popular media play a significant role in socializing preadolescent girls on gender roles and gender identity formation. Celebrities and media characters that caught the interviewees' attention were mainly female adult entertainers and media characters. Girls showed admiration of specific talents and personalities of the celebrities and media characters. They paid much attention to the private lives of the celebrities. They learned from celebrities and media characters that certain behaviors were not acceptable in the social arena. 展开更多
关键词 media images socializing agents PREADOLESCENT qualitative method
下载PDF
Knowledge Graph Based Method for Tracing Quality of Aerospace Products
9
作者 WANG Ning CAO Lijun +5 位作者 DING Siyi MENG Yan LIU Huan ZHENG Xiaohu HUANG Wenbin LIU Xiaojia 《Journal of Donghua University(English Edition)》 CAS 2024年第5期513-524,共12页
Nowadays,the internal structure of spacecraft has been increasingly complex.As its“lifeline”,cables require extensive manpower and resources for manual testing,and it is challenging to quickly and accurately locate ... Nowadays,the internal structure of spacecraft has been increasingly complex.As its“lifeline”,cables require extensive manpower and resources for manual testing,and it is challenging to quickly and accurately locate quality problems and find solutions.To address this problem,a knowledge graph based method is employed to extract multi-source heterogeneous cable knowledge entities.The method utilizes the bidirectional encoder representations from transformers(BERT)network to embed word vectors into the input text,then extracts the contextual features of the input sequence through the bidirectional long short-term memory(BiLSTM)network,and finally inputs them into the conditional random field(CRF)network to predict entity categories.Simultaneously,by using the entities extracted by this model as the data layer,a knowledge graph based method has been constructed.Compared to other traditional extraction methods,the entity extraction method used in this study demonstrates significant improvements in metrics such as precision,recall and an F1 score.Ultimately,employing cable test data from a particular aerospace precision machining company,the study has constructed the knowledge graph based method in the field to achieve visualized queries and the traceability and localization of quality problems. 展开更多
关键词 knowledge graph named entity recognition quality control aerospace product
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部