期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
对古代作家并称名序排列问题的探讨——兼对元白并称先后一种解释的质疑
1
作者 娄彦刚 《宁波职业技术学院学报》 2004年第1期54-55,共2页
在中国古代作家群中,有许多两位以上作家姓氏并称的现象。文章认为:作家并称名序排列的基本原则是——出于声韵学的考虑,顺口好读,凡符合这一原则的,就按成就和年龄为序排列,一旦违反这一前提,不论其成就多高,时间多早,名序往往逆排。
关键词 古代作家 名序 排列
下载PDF
从宜茶之水到名泉胜迹--《煎茶水记》影响下的名泉景观形成背景及特色 被引量:1
2
作者 姚舒然 《建筑与文化》 2020年第11期266-267,共2页
唐代古文《煎茶水记》对中国名泉景观的形成和发展有着重要的影响。该文中关于各地宜茶之水的讨论是唐代茶文化兴起的表现。由《煎茶水记》源起的宜茶名泉以题名碑刻溯源其场所历史文脉,营造出特色景观空间,并广泛影响了其他泉水景观;... 唐代古文《煎茶水记》对中国名泉景观的形成和发展有着重要的影响。该文中关于各地宜茶之水的讨论是唐代茶文化兴起的表现。由《煎茶水记》源起的宜茶名泉以题名碑刻溯源其场所历史文脉,营造出特色景观空间,并广泛影响了其他泉水景观;在宜茶名泉景观中所表现出的对于陆羽等名士的比拟和纪念则凸显出名泉景观的空间内涵,并由此而形成了一系列有关名泉的文化遗产。 展开更多
关键词 煎茶水记 泉景观 名序碑刻 泉月意象
下载PDF
结核杆菌Ag85B-DNA与H37Ra序贯免疫小鼠后细胞免疫的探讨 被引量:1
3
作者 王锦彤 冉柏林 卢贤瑜 《现代预防医学》 CAS 北大核心 2007年第11期2015-2017,共3页
[目的]探讨用结核分枝杆菌Ag85B-DNA(pTB30m)和结核菌H37Ra序贯免疫小鼠后产生的特异性细胞免疫。[方法]用碱裂解法制备Ag85B成熟蛋白的真核表达质粒(pTB30m),初次免疫小鼠2周后,用H37Ra皮内加强免疫(DNA-85B/H37Ra组),同时设定Ag85B-DN... [目的]探讨用结核分枝杆菌Ag85B-DNA(pTB30m)和结核菌H37Ra序贯免疫小鼠后产生的特异性细胞免疫。[方法]用碱裂解法制备Ag85B成熟蛋白的真核表达质粒(pTB30m),初次免疫小鼠2周后,用H37Ra皮内加强免疫(DNA-85B/H37Ra组),同时设定Ag85B-DNA/BCG组、H37Ra组、BCG组及未免疫组。加强免疫4w和8w后,检测小鼠脾淋巴细胞被PPD刺激指数(SI)及其IFN-γ、IL-2的表达水平。[结果](1)酶切鉴定pTB30m所含外源基因片段大小正确,纯度较高。(2)DNA-85B/H37Ra组小鼠脾淋巴细胞的SI均显著高于H37Ra组、BCG组和DNA-85B/BCG组(P﹤0.05);(3)所有免疫组IFN-γ及IL-2表达与未免疫组比较,差异有统计学意义(P﹤0.05),DNA-85B/H37Ra组与DNA-85B/BCG组均高于H37Ra组和BCG组(P﹤0.05),DNA-85B/H37Ra略高于DNA-85B/H37Ra,但差异无统计学意义(P﹥0.05)。[结论]DNA-85B/H37Ra序贯免疫效果略优于DNA-85B/BCG组,明显优于H37Ra组和BCG组。 展开更多
关键词 结核分枝杆菌 疫策略 抗原Ag85B H37RA BCG
下载PDF
《文心雕龙·序志》释义辨疑三题
4
作者 殷守艳 《语文学刊》 2019年第1期1-6,共6页
关于《文心雕龙·序志》篇"位理定名""虽复轻采毛发,……亦不胜数矣""茫茫往代,既沉予闻"的释义和理解,可谓歧见叠出,纷纭纠葛,颇令人无所适从。结合诸家所释,从词义训释及文意理解两方面对之详加辨... 关于《文心雕龙·序志》篇"位理定名""虽复轻采毛发,……亦不胜数矣""茫茫往代,既沉予闻"的释义和理解,可谓歧见叠出,纷纭纠葛,颇令人无所适从。结合诸家所释,从词义训释及文意理解两方面对之详加辨析,从而判别其是非,或订正其失误,以确立其最终甚解。 展开更多
关键词 文心雕龙 位理定 轻采 曲意密源 既沉予闻
下载PDF
Secure Network Coding Against Intra/Inter-Generation Pollution Attacks 被引量:4
5
作者 刘光军 王斌 《China Communications》 SCIE CSCD 2013年第8期100-110,共11页
By allowing routers to combine the received packets before forwarding them,network coding-based applications are susceptible to possible malicious pollution attacks.Existing solutions for counteracting this issue eith... By allowing routers to combine the received packets before forwarding them,network coding-based applications are susceptible to possible malicious pollution attacks.Existing solutions for counteracting this issue either incur inter-generation pollution attacks(among multiple generations)or suffer high computation/bandwidth overhead.Using a dynamic public key technique,we propose a novel homomorphic signature scheme for network coding for each generation authentication without updating the initial secret key used.As per this idea,the secret key is scrambled for each generation by using the generation identifier,and each packet can be fast signed using the scrambled secret key for the generation to which the packet belongs.The scheme not only can resist intra-generation pollution attacks effectively but also can efficiently prevent inter-generation pollution attacks.Further,the communication overhead of the scheme is small and independent of the size of the transmitting files. 展开更多
关键词 network coding pollution attacks homomorphic signature authentication homomorphic cryptography
下载PDF
Automatically Mining Application Signatures for Lightweight Deep Packet Inspection
6
作者 鲁刚 张宏莉 +3 位作者 张宇 Mahmoud T. Qassrawi 余翔湛 彭立志 《China Communications》 SCIE CSCD 2013年第6期86-99,共14页
Automatic signature generation approaches have been widely applied in recent traffic classification.However,they are not suitable for LightWeight Deep Packet Inspection(LW_DPI) since their generated signatures are mat... Automatic signature generation approaches have been widely applied in recent traffic classification.However,they are not suitable for LightWeight Deep Packet Inspection(LW_DPI) since their generated signatures are matched through a search of the entire application data.On the basis of LW_DPI schemes,we present two Hierarchical Clustering(HC) algorithms:HC_TCP and HC_UDP,which can generate byte signatures from TCP and UDP packet payloads respectively.In particular,HC_TCP and HC_ UDP can extract the positions of byte signatures in packet payloads.Further,in order to deal with the case in which byte signatures cannot be derived,we develop an algorithm for generating bit signatures.Compared with the LASER algorithm and Suffix Tree(ST)-based algorithm,the proposed algorithms are better in terms of both classification accuracy and speed.Moreover,the experimental results indicate that,as long as the application-protocol header exists,it is possible to automatically derive reliable and accurate signatures combined with their positions in packet payloads. 展开更多
关键词 traffic classification automatic signature generation association mining hierarchical clustering LW_ DPI
下载PDF
What's in a Name? Multiculturalism by the Name of Transculturalism May Smell as Bitter
7
作者 Weiguo Qu 《Fudan Journal of the Humanities and Social Sciences》 2014年第4期537-550,共14页
The paper argues that a change of the name from multiculturalism to transculturalism will not work magic if the thinking paradigm that dictates trans- culturalism is still the same mindset that dictates multiculturali... The paper argues that a change of the name from multiculturalism to transculturalism will not work magic if the thinking paradigm that dictates trans- culturalism is still the same mindset that dictates multiculturalism, which is basi- cally swayed by postcolonialism, a victim mentality, or what Fanon termed as a colonized mind that conceives the world ahistorically in terms of a false binarism of the West and the non-West, ignoring entirely the complexities of power relations in intercultural and intracultural interactions, and disregarding the simple facts that, as the West is not a colonizing whole, the non-West is not a colonized monolith and that, as there are diversities between cultures in the West and the non-West, there are differences within the Western cultures, within the non-Western cultures, and within each culture. I discuss the failures of multiculturalism, critique the indiscriminate application of postcolonialism, and look into the problems and risks of conceiving power relations in cross-cultural interactions along the postcolonialist binary line, which has reduced the diversified world into the West and the non-West. The transculturalist hypothesis of World Englishes is used as a case in point. My conclusion is that transculturalism can only be meaningful if it adopts "a disposition of openness, liberated from the colonized mind or the postcolonialist identity politics. 展开更多
关键词 MULTICULTURALISM Transculturalism Colonized mind OPENNESS
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部