期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
实用电声小乐队编配法(六)
1
作者 龚耀年 《音乐教育与创作》 2010年第6期40-43,共4页
踩钹是用左脚来控制钹片的“开合”,右手用鼓槌击奏。左脚抬起的时候钹片合上,这时击钹则发出“塔塔”的清脆声;左脚踩下的时候钹片打开,这时击钹发出“嚓嚓”声,柔和细腻并有余音。如果需要开钹,应在符干上方标一个“。”记号。... 踩钹是用左脚来控制钹片的“开合”,右手用鼓槌击奏。左脚抬起的时候钹片合上,这时击钹则发出“塔塔”的清脆声;左脚踩下的时候钹片打开,这时击钹发出“嚓嚓”声,柔和细腻并有余音。如果需要开钹,应在符干上方标一个“。”记号。踩钹在编配上的特点是持续演奏,很少有长的间断,作为一种贯穿全曲的节奏乐器, 展开更多
关键词 音乐教育 音乐创作 电声小乐队编配法 演奏技巧
下载PDF
论广西本土歌曲的钢琴伴奏编配
2
作者 李晓曲 《歌海》 2013年第2期60-61,共2页
钢琴伴奏编配是一门新兴学科,它综合了众多演奏技法与和声理论。广西本土歌曲具有源远流长的文化底蕴,所以对广西本土歌曲进行钢琴伴奏编配,既要有合理的演奏方法,又要能体现浓郁的广西本土音乐特征。通过对既有的伴奏编配手法进行归纳... 钢琴伴奏编配是一门新兴学科,它综合了众多演奏技法与和声理论。广西本土歌曲具有源远流长的文化底蕴,所以对广西本土歌曲进行钢琴伴奏编配,既要有合理的演奏方法,又要能体现浓郁的广西本土音乐特征。通过对既有的伴奏编配手法进行归纳比较,可以总结出一些专门针对广西本土歌曲的钢琴伴奏编配方法。 展开更多
关键词 本土歌曲 钢琴 伴奏 编配法
下载PDF
新职业教育理念下高职院校学前教育专业儿歌弹唱课程的现实困境与教学创新
3
作者 梅芳 《丽水学院学报》 2024年第4期122-128,共7页
新时代的发展理念对职业教育提出了“产教融合、知行合一”的新要求。学前教育属于职业教育中的师范教育,具有综合性、人文性的职教特点,因此既要强调职业能力,重视技能的培养,也要根据幼教岗位属性,注重教法与学法的创新,强调学生综合... 新时代的发展理念对职业教育提出了“产教融合、知行合一”的新要求。学前教育属于职业教育中的师范教育,具有综合性、人文性的职教特点,因此既要强调职业能力,重视技能的培养,也要根据幼教岗位属性,注重教法与学法的创新,强调学生综合素质的提高。文章立足于高职院校学前教育专业儿歌弹唱这一综合性技能课程,通过对幼儿园岗位与高职院校学前教育专业的调查研究,分别分析幼儿园教育场景与高职院校学前教育专业儿歌弹唱的现实困境,探讨学前教育专业儿歌弹唱教学的创新。在艺术性与技巧性并重的弹唱目标确立的前提下,可通过强强联合编配法、联符活字和弦标记以及创新歌谱设计等教学策略提升教学效果。 展开更多
关键词 新职业教育理念 儿歌弹唱 强强联合编配法 联符活字和弦标记
下载PDF
宋朝新设刑罚制度及其特点 被引量:1
4
作者 邝璐 《池州师专学报》 2005年第6期80-83,共4页
宋朝作为中国封建发展史上承前启后的朝代,在特定的历史条件,出现了许多新的刑罚制度,表现出很多自己的个性,在刑罚上自立新的体糸。本文从折杖法、刺配法,编配法,这些宋朝别具特色的刑罚制度入手,介绍其具体内容,并从中归纳总结出宋朝... 宋朝作为中国封建发展史上承前启后的朝代,在特定的历史条件,出现了许多新的刑罚制度,表现出很多自己的个性,在刑罚上自立新的体糸。本文从折杖法、刺配法,编配法,这些宋朝别具特色的刑罚制度入手,介绍其具体内容,并从中归纳总结出宋朝刑罚体糸的特点。 展开更多
关键词 宋朝 折杖法 配法 编配法
下载PDF
Improvement of publicly verifiable authenticated encryption scheme
5
作者 雷飞宇 陈雯 +1 位作者 马昌社 陈克非 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2007年第1期26-28,共3页
A weakness of unforgeability is found in Ma and Chen scheme, and the root cause is the susceptive linear design in the scheme. In order to avoid the weakness and susceptive linear design, an improvement by means of tw... A weakness of unforgeability is found in Ma and Chen scheme, and the root cause is the susceptive linear design in the scheme. In order to avoid the weakness and susceptive linear design, an improvement by means of two mechanisms including quadratic residue and composite discrete logarithm is proposed, which can defeat the forgery attacks in Ma and Chen scheme. The new scheme remains good confidentiality, public verifiability and efficiency. 展开更多
关键词 CRYPTOGRAPHY SIGNCRYPTION public verifiability
下载PDF
AN EFFICIENT BIT RATE ALLOCATION ALGORITHM FOR MOTION JPEG2000 TRANSPORT IN TILE ENCODING
6
作者 Liu Jieyu Zhang Deyun Wang Yue Li Zhe 《Journal of Electronics(China)》 2008年第2期200-203,共4页
An efficient bit rate allocation algorithm for video sequence transmission in motion JPEG2000 is presented. In many cases,the moving portions of video are often the interested regions. Based on tile encoding of JPEG20... An efficient bit rate allocation algorithm for video sequence transmission in motion JPEG2000 is presented. In many cases,the moving portions of video are often the interested regions. Based on tile encoding of JPEG2000,the important regions are discerned by two parameters. One is the complexity of a tile;the other is the motion activity of a tile. Thus an adaptive rate-allocation is re-alized in a lower complexity and the perceptive quality of a frame is improved. Experimental results show the effectiveness of this algorithm. 展开更多
关键词 Motion JPEG2000 TILE Regions-Of-Interest (ROI) Bit rate allocation
下载PDF
Information hiding scheme for vector maps based on fingerprint certification
7
作者 门朝光 孙建国 曹刘娟 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2009年第6期766-770,共5页
An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some key application areas. In this scheme, the fingerprint image of the map owner can be converted in... An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some key application areas. In this scheme, the fingerprint image of the map owner can be converted into a character string as the watermark, and then the watermark will be embedded into the coordinate descriptions of the attribute file by the "0-bit value" programming method. This programming algorithm ensures that the accuracy is lossless and the graphics is unchanged for any vector map. Experiments show that the presented hiding scheme has stable robustness, the average similarity rate is 97.2% for fingerprints matching and the false non-match rate is 1.38% in the blocking test. In the opening test, the former reaches 84.46% and the latter reaches 5.56%. 展开更多
关键词 information hiding digital watermarking vector map FINGERPRINT AUTHENTICATION
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部