期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
意隐与身隐——从《归田赋》和《归园田居》看古代文人的归隐境界 被引量:2
1
作者 王锐 《重庆社会科学》 2006年第10期49-51,共3页
归隐是我国古代文人倾心向往或亲身体验过的生存状态。张衡的《归田赋》和陶渊明的《归园田居》就是集中反映古代文人归隐情结的典范之作。由于二人不同的人生际遇,两篇作品又呈现出不同的归隐境界———意隐与身隐。意隐是理想化的精... 归隐是我国古代文人倾心向往或亲身体验过的生存状态。张衡的《归田赋》和陶渊明的《归园田居》就是集中反映古代文人归隐情结的典范之作。由于二人不同的人生际遇,两篇作品又呈现出不同的归隐境界———意隐与身隐。意隐是理想化的精神向往,身隐是现实性的人格追求。意隐之后的身隐,是一种更彻底的放弃和坚守,是古代文士一种更难得的做人境界。 展开更多
关键词 《归田赋》 《归园田居》 身隐
下载PDF
从白鹿洞书院的教育环境看儒生的身隐与心隐 被引量:1
2
作者 李宁宁 《江西教育学院学报》 2014年第1期178-181,共4页
儒家对教育环境的强调,一方面是要给读书人营造一个远离尘世和感官纷扰的清净世界,提供可以暂时"隐身"的书斋或书院,另一方面则是努力促成读书人放下各种欲望和杂念,专注领悟圣贤教诲,以期获得能够彻照心灵和"隐心"... 儒家对教育环境的强调,一方面是要给读书人营造一个远离尘世和感官纷扰的清净世界,提供可以暂时"隐身"的书斋或书院,另一方面则是努力促成读书人放下各种欲望和杂念,专注领悟圣贤教诲,以期获得能够彻照心灵和"隐心"的精神道场。白鹿洞书院就是这样一个典型的道场。 展开更多
关键词 白鹿洞书院 教育环境 身隐与心
下载PDF
身隐心仕——《诗经·考槃》主旨辨析
3
作者 王浩洁 《常州工学院学报(社会科学版)》 2018年第5期34-37,共4页
《考槃》是十五国风中卫地的诗歌,其主旨向来众说纷纭。然而,细析《考槃》"永矢弗谖"一语,可知这位独居的隐士实有不忘君德、仍念朝廷的出仕之愿。现实隐居和内心想要出仕的矛盾才是诗中隐士连发"永矢"愤激之语的... 《考槃》是十五国风中卫地的诗歌,其主旨向来众说纷纭。然而,细析《考槃》"永矢弗谖"一语,可知这位独居的隐士实有不忘君德、仍念朝廷的出仕之愿。现实隐居和内心想要出仕的矛盾才是诗中隐士连发"永矢"愤激之语的根源。因此,隐士身隐心仕才是此诗原旨。 展开更多
关键词 《考槃》 主旨 身隐心仕 出仕
下载PDF
略论古代隐逸诗人的嬗变
4
作者 侯艳 《广西社会科学》 2007年第1期104-106,共3页
古代隐逸诗人随着时代和社会的发展经历了由“身隐”到“心隐”的嬗变过程,隐逸也由一种生活方式嬗变为一种平夷淡泊、性情冲和的人生修养,这种嬗变对诗人们的诗歌创作影响重大。
关键词 身隐 嬗变
下载PDF
六朝隐逸诗的风行及流变 被引量:1
5
作者 郭仁昭 《广播电视大学学报(哲学社会科学版)》 2007年第4期8-10,共3页
思想界的"儒、道、佛"融会,特别是"玄学"思想的影响是六朝隐逸诗流行的社会文化背景。动荡现实中,文人士子仕进无门,受道家"退避无为"的隐逸思想感染,逃避社会现实,隐遁山林,隐逸诗风行。隐逸有三种类型:... 思想界的"儒、道、佛"融会,特别是"玄学"思想的影响是六朝隐逸诗流行的社会文化背景。动荡现实中,文人士子仕进无门,受道家"退避无为"的隐逸思想感染,逃避社会现实,隐遁山林,隐逸诗风行。隐逸有三种类型:"身隐"、"朝隐"(仕隐)、"心隐",这三类隐逸的境界和精神旨向各有不同。陶渊明为"古今隐逸诗人之宗"。 展开更多
关键词 六朝 逸诗 身隐 “朝 “心 陶渊明
下载PDF
Effects of Sb content on structure and laser reflection performance of ATO nanomaterials 被引量:2
6
作者 张晶 王丽熙 +1 位作者 梁敏鹏 张其土 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2014年第1期131-135,共5页
Antimony tin oxide (ATO) nano-particles doped with different Sb contents were prepared by co-precipitation method, using SnCl4·5H2O and SbCl3 as main raw materials. Microstructure, morphology and reflectivity c... Antimony tin oxide (ATO) nano-particles doped with different Sb contents were prepared by co-precipitation method, using SnCl4·5H2O and SbCl3 as main raw materials. Microstructure, morphology and reflectivity curves were characterized by XRD, FESEM, UV-visible spectroscopy and laser, and the effects of Sb content on crystalline microstructure, crystal size and reflectivity curves of the ATO nano-particles were investigated systematically. The results show that the ATO nano-particles prepared by co-precipitation method have tetragonal rutile structure, with particle size distribution range of several decade nanometer. With the increase of Sb content, the grain size of ATO decreases, and the unit cell volume increases. Compared with the SnO2 particles without Sb, the 1.06 μm laser reflection of ATO nano-particles doped with Sb is obviously lower. With the increase of Sb content, the reflection increases first, then decreases;when the Sb content is 20%, 1.06μm laser reflection of ATO nano-particles is below 0.02%, and the laser reflection performance is the best. 展开更多
关键词 Sb content co-precipitation method laser reflection
下载PDF
Reframing narratives and translators' invisibility: On translators' position
7
作者 刘伟 《Sino-US English Teaching》 2009年第1期50-54,共5页
This paper takes refraining narratives and translators' invisibility as the theoretical base for discussing the translators' position. Translating is to reconstruct the original text, which leads to information chan... This paper takes refraining narratives and translators' invisibility as the theoretical base for discussing the translators' position. Translating is to reconstruct the original text, which leads to information changes. This change is attributed to translator's idiolect and thinking pattern as well as different languages. The translator's role is obvious in the text translation. How to be invisible? Even if invisibility is possible, the invisibility is like a moon in water, flower in fog. That is vague but invisible. 展开更多
关键词 reframing narratives translators' invisibility LANGUAGE information change
下载PDF
Cryptanalysis on an organization-friendly blockchain system
8
作者 Zhang Ying Jiang Rui 《Journal of Southeast University(English Edition)》 EI CAS 2022年第1期36-41,共6页
To verify that an organization-friendly blockchain system may suffer from forgery and collusion attacks,forgery and collusion attacks were theoretically carried out according to the phase sequence of an organization-f... To verify that an organization-friendly blockchain system may suffer from forgery and collusion attacks,forgery and collusion attacks were theoretically carried out according to the phase sequence of an organization-friendly blockchain system.Then,the organization-friendly blockchain system was improved and based on the phase sequence forgery and collusion attacks were conducted.The results show that the attacker can obtain illegal transaction data from forgery and collusion attacks on the organization-friendly blockchain system.However,for the improved organization-friendly blockchain,the attacker s forgery and collusion attacks cannot be completed.Therefore,the organization-friendly blockchain system may be subject to forgery and collusion attacks,but the improved organization-friendly blockchain system can prevent such attacks. 展开更多
关键词 blockchain identity privacy transaction supervision forgery attack collusion attack
下载PDF
Self-adapting RF Stealth Signal Design Method in RATR
9
作者 XIAO Yongsheng HUANG Lizhen +1 位作者 HE Fengshou ZHOU Jianjiang 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2021年第6期1020-1027,共8页
Combining the mutual information theory and the sequential hypothesis testing(SHT)method,a selfadapting radio frequency(RF)stealth signal design method is proposed. The channel information is gained through the radar ... Combining the mutual information theory and the sequential hypothesis testing(SHT)method,a selfadapting radio frequency(RF)stealth signal design method is proposed. The channel information is gained through the radar echo and feeds back to the radar system,and then the radar system adaptively designs the transmission waveform. So the close-loop system is formed. The correlations between these transmission waveforms are decreased because of the adaptive change of these transmission waveforms,and the number of illuminations is reduced for adopting the SHT,which lowers the transmission power of the radar system. The radar system using the new method possesses the RF stealth performance. Aiming at the application of radar automatic target recognition(RATR),experimental simulations show the effectiveness and feasibility of the proposed method. 展开更多
关键词 radio frequency stealth sequential hypothesis testing mutual information close-loop system
下载PDF
A stealthy method to determine the relative position and velocity for satellite formation flying
10
作者 田继超 崔乃刚 +1 位作者 姚劼 郭继峰 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2010年第1期137-140,共4页
To achieve the satellite formation control and the succeed formation missions, we present a new stealthy method to determine the relative states between formation satellites. In this method, the combination of a CCD c... To achieve the satellite formation control and the succeed formation missions, we present a new stealthy method to determine the relative states between formation satellites. In this method, the combination of a CCD camera and laser radar is used as the relative measure sensors. To reduce electromagnetic radiation, the laser radar works intermittently to minimize the probability of being discovered. And an unscented Kalman filter (UKF) is applied to estimate the relative states. The observability of this method is analyzed. The validity and effectiveness of the method is demonstrated in a typical application of formation relative navigation. 展开更多
关键词 formation flying unscented Kalman filter relative position and velocity
下载PDF
"Everything About You Is Vampiric": Vampirism as a Metaphor for Adolescent Maturation in M. T. Anderson's Thirsty
11
作者 Leni Marlina 《Journal of Literature and Art Studies》 2014年第3期189-196,共8页
Over the past few years, vampire genre has populated young adult (YA) literature. YA literature can be defined as narratives about the individual growth and maturation of adolescent protagonist. Adolescence is the b... Over the past few years, vampire genre has populated young adult (YA) literature. YA literature can be defined as narratives about the individual growth and maturation of adolescent protagonist. Adolescence is the bridging process of growing from childhood to adulthood. Furthermore, it is a turbulent time of rapid physical growth and sexual development. It also creates a critical phase in the formation of identity. In this paper, the author shall identify the ways in which representation of adolescence in an American contemporary young adult novel, Anderson's Thirsty (2008), reflects and shapes the maturation of its young protagonist. The author argues that the transformation of vampire in the novel works as a metaphor for the various changes and maturation process experienced by the protagonist in the novel. Furthermore, the author's discussion will be preceded by a short history of vampire narrative. The author's analysis is supported by psychological theories of adolescence and socio-cultural approach which focuses on the ambiguities of adolescents' identity. Moreover, this paper alludes a psychoanalytic reading of the symbolism of the vampire which refers to Freud's notions of libido and death drive The conclusion of this paper is that Anderson's Thirsty is a paranormal novel which positions the implied readers to understand the trials of an adolescent protagonist during his difficult time of transition from childhood to adulthood. 展开更多
关键词 vampirism adolescent maturation young adult literature
下载PDF
A lightweight authentication scheme with user untraceability 被引量:2
12
作者 Kuo-Hui YEH 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2015年第4期259-271,共13页
With the rapid growth of electronic commerce and associated demands on variants of Internet based applications,application systems providing network resources and business services are in high demand around the world.... With the rapid growth of electronic commerce and associated demands on variants of Internet based applications,application systems providing network resources and business services are in high demand around the world.To guarantee robust security and computational efficiency for service retrieval,a variety of authentication schemes have been proposed.However,most of these schemes have been found to be lacking when subject to a formal security analysis.Recently,Chang et al.(2014) introduced a formally provable secure authentication protocol with the property of user-untraceability.Unfortunately,based on our analysis,the proposed scheme fails to provide the property of user-untraceability as claimed,and is insecure against user impersonation attack,server counterfeit attack,and man-in-the-middle attack.In this paper,we demonstrate the details of these malicious attacks.A security enhanced authentication scheme is proposed to eliminate all identified weaknesses. 展开更多
关键词 AUTHENTICATION PRIVACY Security Smart card UNTRACEABILITY
原文传递
Embodied Cognition Processing and Representation of Power Words by Second Language Learners with Different Proficiency levels 被引量:4
13
作者 WANG Qian Northwestern Polytechnical University 《Chinese Journal of Applied Linguistics》 2016年第4期484-494,499,共12页
Conceptual Metaphor Theory believes that sensorimotor information should be an integral element in representing abstract concepts and can be activated as the way of abstract conceptual processing. Metaphor can be a br... Conceptual Metaphor Theory believes that sensorimotor information should be an integral element in representing abstract concepts and can be activated as the way of abstract conceptual processing. Metaphor can be a bridge between the abstract concept of power and the body perception experience since embodiment serves as a basis for metaphorical thinking. Using E-PRIME experimentation, the present study investigated the features in vertical space representation of English power words of second language learners with different levels of proficiency. The statistics indicated that: 1) For such learners, the representation of power words would trigger the vertically spatial metaphor, which brings about "word- space" interaction effect. 2) Chinese English learners with different levels in L2 demonstrate stronger representation abilities in L1 than that of L2, regardless of their L2 proficiency level. 3) Learners' second language proficiency exerts influence upon the representation of the English power words. 展开更多
关键词 power words embodied cognition vertically spatial metaphor mental representation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部