期刊文献+
共找到28篇文章
< 1 2 >
每页显示 20 50 100
《广雅疏证》之合声证义与倒言证义 被引量:1
1
作者 张其昀 《绵阳师范学院学报》 2010年第4期40-43,共4页
合声证义与倒言证义是《广雅疏证》中所运用的众多证义方法中的两种。"合声"指将二字之音合成一字之音,其一字与二字同义,合声证义即指以其二字之义证明其一字之为训,属以声证义手段。"倒言"指将原双音节词语之单... 合声证义与倒言证义是《广雅疏证》中所运用的众多证义方法中的两种。"合声"指将二字之音合成一字之音,其一字与二字同义,合声证义即指以其二字之义证明其一字之为训,属以声证义手段。"倒言"指将原双音节词语之单字次序颠倒,其单字逆序形式与原形式同义,倒言证义即指以其单字逆序词语之义证明其原序词语之为训,属一般证义手段。 展开更多
关键词 《广雅疏 合声 言证
下载PDF
言证的限度:教育哲学对杜威道德教育思想若干争议的处理 被引量:3
2
作者 丁道勇 《教育研究》 CSSCI 北大核心 2021年第12期44-54,共11页
在教育哲学领域,决定教育陈述效力的主要是其中包含的论证,而不是作者使用的言证。言证有一些合理的应用方式,但是其限度也极其明显。耐心追踪作品包含的论证,决心接受优质论证的结论、拒绝低劣的论证,对于言证所提供的结论保持谨慎,这... 在教育哲学领域,决定教育陈述效力的主要是其中包含的论证,而不是作者使用的言证。言证有一些合理的应用方式,但是其限度也极其明显。耐心追踪作品包含的论证,决心接受优质论证的结论、拒绝低劣的论证,对于言证所提供的结论保持谨慎,这是教育哲学在面对各种争议时可能采取的一个处理方案。论证是甄别意见洪流中各种胡言乱语的一个标尺,也是对教育讨论中各种非学理因素的抵抗。在呈现了杜威哲学的核心论证以后,他在直接道德教学上的立场开始变得清晰起来。国内德育学者近两年来的相关争议自然消弭于无形。 展开更多
关键词 杜威 教育哲学 直接道德教学 间接道德教育 言证
原文传递
临证微言
3
作者 朱晓华 《中国中医药信息杂志》 CAS CSCD 2002年第9期39-39,共1页
关键词 慢性肝炎 清热解毒片 肝硬变 咳嗽 痹症 中医药疗法
下载PDF
《通俗常言疏证》同义词研究
4
作者 袁耀辉 《现代语文》 2020年第5期16-20,共5页
清末民初孙锦标辑录的《通俗常言疏证》收录了许多同义词,这些同义词主要来源于释义、文献、通俗用法以及不同词目等。此书同义词的辑录体现出两个特点:一是以词条内部为主体;二是名词性同义词占绝大多数。同时,由于同义词内部的词义表... 清末民初孙锦标辑录的《通俗常言疏证》收录了许多同义词,这些同义词主要来源于释义、文献、通俗用法以及不同词目等。此书同义词的辑录体现出两个特点:一是以词条内部为主体;二是名词性同义词占绝大多数。同时,由于同义词内部的词义表现形式不同,这些同义词在类型上也存在一定差异。 展开更多
关键词 《通俗常 同义词 俗语词
下载PDF
新安未刊本《证治要言》节赏
5
《中医药临床杂志》 2014年第10期1069-1069,1063+1069+1071,共1页
痢疾 推荡法非良,噤口多因此,勿认暑来侵,浊邪中下是,解毒却为先,救土真秘旨。 脉象有实虚,阴阳审真似,胃火授香连,肾亏两仪美,犀角休息宜,热除痢方止。
关键词 治要 痢疾 治疗方法 中医
下载PDF
新安未刊本《证治要言》节赏
6
《中医药临床杂志》 2014年第10期1058-1058,共1页
厥症 厥气有阴阳,伤寒脉里详,热厥须滋水,寒投理中方。病逢血汗后,急用大补汤。 外邪症脉实,推荡或清凉,冷怕过肘膝,参归附桂姜,脉沉细不数,虚寒在此商。
关键词 治要 医学研究 中医 治疗方法
下载PDF
新安未刊本《证治要言》节赏
7
《中医药临床杂志》 2014年第8期837-837,共1页
燥症 血枯内火生,药宜润带清,外邪由天受,内发须养营,喻君有清燥,深晓外因情,便难筋又挛,及早补元精,脾弱莫能运,辛金令不行,津液内枯结,壮水服之平。
关键词 刊本 治要 中医 临床研究
下载PDF
新安未刊本《证治要言》节赏
8
《中医药临床杂志》 2014年第9期919-919,共1页
呕吐此病缘何生,须知寒与火,若求分实虚①,知脉药方妥,热吐喜栀连,治寒便有祸,幽门食不消,温药庶乎可,恶阻火常冲,吐安孕免堕,久吐扶中州,救肾亦晓么。注①实火宜泻,虚火宜补。
关键词 刊本 治要 中医药
下载PDF
新安未刊本《证治要言》节赏
9
《中医药临床杂志》 2014年第11期1136-1136,共1页
痉强分刚柔,实虚原有由,刚痉须表汗,身热脉数浮,有汗为柔痉,阴阳虚里求,血燥失荣养,反强筋脉抽,大补真气血.,参归第一筹,痉多汗下误,风痰治不瘳。癫病最难痊,痴呆夜不眠.或歌又或泣,如醉如梦然,病由志愿大,未得称心田... 痉强分刚柔,实虚原有由,刚痉须表汗,身热脉数浮,有汗为柔痉,阴阳虚里求,血燥失荣养,反强筋脉抽,大补真气血.,参归第一筹,痉多汗下误,风痰治不瘳。癫病最难痊,痴呆夜不眠.或歌又或泣,如醉如梦然,病由志愿大,未得称心田,神气多昏昧,情性竟偏邪,火发救肾心,述学坐安禅,返观灵机动,方晓欲情牵。 展开更多
关键词 刊本 治要 伤寒论 中医学
下载PDF
民国时期法定证据规则的分类考察——以作为主要生成机制的司法解释为对象
10
作者 李凤鸣 《法律史评论》 2022年第1期166-184,共19页
民国政府顺应其时法治国家的趋势,在立法上否弃了法定证据制度,但是,立法舍弃并不意味着规则消亡。为限制法官在证据裁判中的恣意,其时又不得不经由司法解释发布大量的法定证据规则,包括书证、言证、物证、鉴定、勘验等各种类型。这些... 民国政府顺应其时法治国家的趋势,在立法上否弃了法定证据制度,但是,立法舍弃并不意味着规则消亡。为限制法官在证据裁判中的恣意,其时又不得不经由司法解释发布大量的法定证据规则,包括书证、言证、物证、鉴定、勘验等各种类型。这些规则通过对证据的证明力或形式要件的限定,对证据裁判进行规制和导引,在司法转型时期具有替代证据立法的作用。虽然此类规则呈碎片化分布,缺乏法典式的体系化,但是,如对其摭拾整理,进行整体性建构,则会形成重要的司法经验,以助益我国当下的证据法制建设。 展开更多
关键词 司法解释 法定 言证
下载PDF
论中国古代侦查制度的演变 被引量:2
11
作者 陆新淮 《郑州经济管理干部学院学报》 2005年第2期42-44,共3页
中国古代封建专制社会制度的中央集权和至高无上的神权、王权统治,形成集侦查、起诉、审判三大司法职能三位一体的侦查制度。在权大于法的人治制度下充分体现皇权威望的审判和刑讯受到历代统治阶级的重视,其功能被人为地极度扩张,与之... 中国古代封建专制社会制度的中央集权和至高无上的神权、王权统治,形成集侦查、起诉、审判三大司法职能三位一体的侦查制度。在权大于法的人治制度下充分体现皇权威望的审判和刑讯受到历代统治阶级的重视,其功能被人为地极度扩张,与之适应的讯问、拘留、逮捕等强制性侦查措施和唯心的"言证"制度得到高度的发展,野蛮的刑讯逼供取代科学的侦查方法,严重束缚中国古代侦查揭露、证实犯罪功能的形成和发展。 展开更多
关键词 中国 古代 侦查制度 三位一体 官纠举 言证制度
下载PDF
Combining ODM and OCL in ontology verification 被引量:1
12
作者 钱鹏飞 王英林 张申生 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2009年第5期723-729,共7页
In order to automatically find and conveniently rectify the structural conflicts appearing in a new ontology model version after a series of ontology evolution,we propose an ontology model verification approach,in whi... In order to automatically find and conveniently rectify the structural conflicts appearing in a new ontology model version after a series of ontology evolution,we propose an ontology model verification approach,in which the object constraint language (OCL) and an ontology definition meta-model (ODM) are used to complete the ontology verification.The ODM is composed of the ontology related elements and the definition rule related elements.The OCL is employed to describe the elements in the ontology definition meta-model:OCL extension for the ontology related elements,and OCL extension for the ontological design patterns.All of the above OCL rules will describe the constraint relationships between ontology elements.Associated with an example,the application of the ontology model verification approach based on OCL and ODM is introduced.Consequently,the conflicts happened in the ontology changing and evolution can be easily verified and rectified through this approach. 展开更多
关键词 ontology verification OCL: ODM ontological desian oattern
下载PDF
Provably Secure General Aggregate Signcryption Scheme in the Random Oracle Model 被引量:13
13
作者 Qi Zhenghua Ren Xunyi Yang Geng 《China Communications》 SCIE CSCD 2012年第11期107-116,共10页
To reduce the size of certificate chains and the ciphertext size in secure routing protocols, a General Aggregate Signcryption Scheme (GASC) is presented. In GASC, an identity-based signcryption algorithm and an aggre... To reduce the size of certificate chains and the ciphertext size in secure routing protocols, a General Aggregate Signcryption Scheme (GASC) is presented. In GASC, an identity-based signcryption algorithm and an aggregate signature algorithm are combined in a practical and secure manner to form the general aggregate signcryption scheme's schema and concept, and a new secure, efficiently general aggregate signcryption scheme, which allows the aggregation of n distinct signcryptions by n distinct users on n distinct messages, is proposed. First, the correction of the GASC scheme is analyzed. Then, we formally prove the security of GASC in the random oracle models IND-CCA2 and EUF-CMA under the DBDHP assumption and the DLP assumption, respectively. The results show that the GASC scheme is not only secure against any probabilistic polynomial-time IND-GASC-CCA2 and EUF-GASC-CMA adversary in the random oracle models but also efficient in pairing ê computations. In addition, the GASC scheme gives an effective remedy to the key escrow problem, which is an inherent issue in IBC by splitting the private key into two parts, and reduces the communication complexity by eliminating the interaction among the senders (signers) before the signcryption generation. 展开更多
关键词 identity-based cryptography SIGNCRYPTION aggregate signature bilinear pairing
下载PDF
Domain-specific modeling and verification for C4ISR capability requirements 被引量:4
14
作者 董庆超 王智学 +2 位作者 陈国友 蒋鑫 张婷婷 《Journal of Central South University》 SCIE EI CAS 2012年第5期1334-1340,共7页
An approach was proposed to specify the C4ISR capability of domain-specific modeling language.To confine the domain modeling within a standard architecture framework,formally a C4ISR capability meta-ontology was defin... An approach was proposed to specify the C4ISR capability of domain-specific modeling language.To confine the domain modeling within a standard architecture framework,formally a C4ISR capability meta-ontology was defined according to the meta-model of DoD Architecture Framework.The meta-ontology is used for extending UML Profile so that the domain experts can model the C4ISR domains using the C4ISR capability meta-concepts to define a domain-specific modeling language.The domain models can be then checked to guarantee the consistency and completeness through converting the UML models into the Description Logic ontology and making use of inference engine Pellet to verify the ontology. 展开更多
关键词 C4ISR capability meta-ontology domain-specific modeling description logic
下载PDF
Research on Text Mining of Syndrome Element Syndrome Differentiation by Natural Language Processing 被引量:5
15
作者 DENG Wen-Xiang ZHU Jian-Ping +6 位作者 LI Jing YUAN Zhi-Ying WU Hua-Ying YAO Zhong-Hua ZHANG Yi-Ge ZHANG Wen-An HUANG Hui-Yong 《Digital Chinese Medicine》 2019年第2期61-71,共11页
Objective Natural language processing (NLP) was used to excavate and visualize the core content of syndrome element syndrome differentiation (SESD). Methods The first step was to build a text mining and analysis envir... Objective Natural language processing (NLP) was used to excavate and visualize the core content of syndrome element syndrome differentiation (SESD). Methods The first step was to build a text mining and analysis environment based on Python language, and built a corpus based on the core chapters of SESD. The second step was to digitalize the corpus. The main steps included word segmentation, information cleaning and merging, document-entry matrix, dictionary compilation and information conversion. The third step was to mine and display the internal information of SESD corpus by means of word cloud, keyword extraction and visualization. Results NLP played a positive role in computer recognition and comprehension of SESD. Different chapters had different keywords and weights. Deficiency syndrome elements were an important component of SESD, such as "Qi deficiency""Yang deficiency" and "Yin deficiency". The important syndrome elements of substantiality included "Blood stasis""Qi stagnation", etc. Core syndrome elements were closely related. Conclusions Syndrome differentiation and treatment was the core of SESD. Using NLP to excavate syndromes differentiation could help reveal the internal relationship between syndromes differentiation and provide basis for artificial intelligence to learn syndromes differentiation. 展开更多
关键词 Syndrome element syndrome differentiation (SESD) Natural language processing (NLP) Diagnostics of TCM Artificial intelligence Text mining
下载PDF
The fable paradigm of the gender pay gap: Evidence from Portuguese private firms
16
作者 Carlos Duarte Maria Carapeto Ivo Pereira 《Chinese Business Review》 2010年第3期1-12,共12页
This study investigates gender income disparity in Portuguese firms using separate Tobit models for men and women. While job segregation seems to be one of the major sources of gender disparity, women do not appear to... This study investigates gender income disparity in Portuguese firms using separate Tobit models for men and women. While job segregation seems to be one of the major sources of gender disparity, women do not appear to be systematically underpaid in predominantly female occupations, regardless of the industry. The authors found that gender pay gap is larger in domestic firms, and it increases with employees' accumulated tenure and decreases with advanced education for women and on labor market entry. Despite showing some encouraging cracks, the glass ceiling still continues to prevent women from reaching top management positions. Finally, despite it appears wage disparity does exist, and it will probably continue to exist, the results point towards a window of opportunity for women. 展开更多
关键词 SEGREGATION gender pay gap compensation policy Tobit model
下载PDF
Predictors of long-term outcome in patients with biopsy proven inflammatory cardiomyopathy
17
作者 Ohlow Marc-Alexander Michel Christoph +4 位作者 Ting-Hui Chen Schmidt Andreas Saenger Joerg Lauer Bernward Brunelli Michele 《Journal of Geriatric Cardiology》 SCIE CAS CSCD 2018年第5期363-371,共9页
Background The objective of this study was to identify prognostic indicators in patients with inflammatory cardiomyopathy (iCM) on endomyocardial biopsy (EMB). Methods and results Between 2007 and 2011 all consecu... Background The objective of this study was to identify prognostic indicators in patients with inflammatory cardiomyopathy (iCM) on endomyocardial biopsy (EMB). Methods and results Between 2007 and 2011 all consecutive patients with diagnosed with iCM at EMB were retrospectively analyzed. The combined primary endpoint (EP) (1E°P) was cardiac death, aborted sudden cardiac death/appropriate implantable cardioverter defibrillator (ICD) shock, progressive heart failure requiring left venWicular assist device (LVAD) implantation and heart transplantation. 503 patients (mean age 58 ° 12 years, 73% male) were available for analysis. Genomes of cardiotrophic viruses were detected in 396 patients (79%) and immuno-histochemical signs of inflammation were present in 223 individuals (44%). After 3.6 ° 2.4 years of follow-up, cardiac mortality was 3.0% (n = 14) and a total of 8.6% (n = 40) reached the primary endpoint. Independent predictors for the 1 °EP were: age 〉 50 years, presence and duration (〈 28 days) of symptomatic heart failure. A risk stratification approach based on the results of the multivariate analysis demonstrated that absence of signs and/or symptoms of congestive heart failure in younger (〈 50 years) patients with longer (〉 28 days) duration of disease appear to have an excellent prognosis with 100% survival and no events during follow-up The presence of all above mentioned independent risk factors results in an 1°EP occurrence of 35.9%. Conclusions Symptoms of heart fail- ure, short duration of disease, and older age are indicators of poor outcome in patients with iCM. 展开更多
关键词 Endomyocardial biopsy Inflammatory cardiomyopathy OUTCOME
下载PDF
A Public Verifiable Identity Based Signcryption in the Random Oracle Model
18
作者 陈雯 潘峰 +1 位作者 郭放 雷飞宇 《Journal of Donghua University(English Edition)》 EI CAS 2009年第4期368-373,共6页
Since Libert and Quisquater's identity based signcryption scheme cannot provide public verifiability after research, the paper proposes a new identity based signcryption scheme. The scheme uses quadratic residue a... Since Libert and Quisquater's identity based signcryption scheme cannot provide public verifiability after research, the paper proposes a new identity based signcryption scheme. The scheme uses quadratic residue and pairings over elliptic curves to realize public verifiability. By analysis the scheme is proved to be more efficient than Libert and Quisquater's scheme. Moreover, a security proof of the original scheme is presented in the random oracle model. 展开更多
关键词 identity based signcrvption public verifiability random oracle
下载PDF
An Empirical Analysis of Learning and Teaching English as a Second Language: The Chinese Perspective
19
作者 Naqvi Naj am Abbas Rida Batool 《Sino-US English Teaching》 2014年第8期567-575,共9页
This research venture investigates the trends and motives behind the English learning as a second language. The author has used the Chinese binoculars to probe into the phenomenon of English learning and teaching. Eng... This research venture investigates the trends and motives behind the English learning as a second language. The author has used the Chinese binoculars to probe into the phenomenon of English learning and teaching. English language has become an international tool of communication and business. Professional and students at China's Mainland have been learning English since long but this trend has been increased in the recent years due to the wave of globalization and also owing to the enormous emerging economy of China. Internationalization of education and the quest of knowing the culture and civilizations have spurred the need for English learning. The authors have performed a questionnaire based research with the sample of 130 university students learning Chinese at different English learning institutes at Xi'an, Shanxi, China. The analysis of the findings in this research highlights the reasons behind the growing trends of English learning and also describes the teaching methodology for effective language teaching in the Chinese perspective. 展开更多
关键词 English as second language (ESL) TEACHING LANGUAGE teaching methodology China
下载PDF
Provably Secure Self-Certified Signature Schemes with Message Recovery
20
作者 Zhang Shengyuan Tang Fei Lin Changlu Ke Pinhui 《China Communications》 SCIE CSCD 2012年第10期112-119,共8页
To solve the key escrow problem of the identity-based cryptosystem, Girault introduced the notion of a self-certified public key, which not only eliminates the need to authenticate a public key but also solves the key... To solve the key escrow problem of the identity-based cryptosystem, Girault introduced the notion of a self-certified public key, which not only eliminates the need to authenticate a public key but also solves the key escrow problerrL This paper proposes a Self-Certified Signature (SCS) scheme with message recovery and two variants without using bilinear pairings: one is the authenticated encryption scheme in which only the designated re- ceiver can verify the signature, and the other is the authenticated encryption scheme with message linkage that deals with large messages. These three SCS schemes are provably secure in the random oracle model and are more efficient than previous schemes . 展开更多
关键词 digital signature self-certified public key message recovery random oracle model
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部