期刊文献+
共找到31篇文章
< 1 2 >
每页显示 20 50 100
“一量(名)+否定”格式的语法化 被引量:5
1
作者 胡清国 《江西财经大学学报》 2004年第1期106-109,共4页
“一量(名)+否定”是一个后起的、正处于语法化过程中的格式,本文描写了该格式语法化的共时表征与历时轨迹,分析了其语法化的机制与方式。
关键词 “一()+否定”格式 语法化 近代 现代 口语化 语法
下载PDF
“一量名”和“X量名”的差异 被引量:10
2
作者 宗守云 《阜阳师范学院学报(社会科学版)》 2008年第1期10-13,30,共5页
"一量名"和"X量名"(X表示二和二以上的数目)在句法、语义和语用等方面都有一定的差异。在句法上,做主语,"一量名"和"X量名"表现为有标记与无标记的差异;做宾语,表现为有省略与无省略的差异;做... "一量名"和"X量名"(X表示二和二以上的数目)在句法、语义和语用等方面都有一定的差异。在句法上,做主语,"一量名"和"X量名"表现为有标记与无标记的差异;做宾语,表现为有省略与无省略的差异;做谓语,表现为有泛化与无泛化的差异。在语义上,"一量名"和"X量名"存在着单量与多量、本用与转用、指实与指虚的差异。在语用上,"一量名"和"X量名"存在着焦点位置的差异和话题功能的差异。"一量名"和"X量名"的差异主要是由于"一"的虚化造成的,但同时也和二或二以上数词的集合性有关。 展开更多
关键词 “一 “X 标记 焦点 话题
下载PDF
“一量名”固化的形式和语义条件 被引量:2
3
作者 周安 《阜阳师范学院学报(社会科学版)》 2018年第6期64-69,共6页
"一量名"结构的固化是比较特殊的语言现象。基于构式语法相关理论,从众多构式样本中,探究在结构形式和语义方面"一量名"之所以固化的共性条件。在结构形式上,"一量名"是不可拆分、替换的典型三音节构式,... "一量名"结构的固化是比较特殊的语言现象。基于构式语法相关理论,从众多构式样本中,探究在结构形式和语义方面"一量名"之所以固化的共性条件。在结构形式上,"一量名"是不可拆分、替换的典型三音节构式,特别具有重大意义的是数位"一"的性质确认。与同构式"一量名"比较,固化"一量名"在语义上显现出特异性,主要表现为抽象义、凹隐义、固化义、理据义等特征。 展开更多
关键词 固化 形式条件 语义条件
下载PDF
Knowledge Graph Based Method for Tracing Quality of Aerospace Products
4
作者 WANG Ning CAO Lijun +5 位作者 DING Siyi MENG Yan LIU Huan ZHENG Xiaohu HUANG Wenbin LIU Xiaojia 《Journal of Donghua University(English Edition)》 CAS 2024年第5期513-524,共12页
Nowadays,the internal structure of spacecraft has been increasingly complex.As its“lifeline”,cables require extensive manpower and resources for manual testing,and it is challenging to quickly and accurately locate ... Nowadays,the internal structure of spacecraft has been increasingly complex.As its“lifeline”,cables require extensive manpower and resources for manual testing,and it is challenging to quickly and accurately locate quality problems and find solutions.To address this problem,a knowledge graph based method is employed to extract multi-source heterogeneous cable knowledge entities.The method utilizes the bidirectional encoder representations from transformers(BERT)network to embed word vectors into the input text,then extracts the contextual features of the input sequence through the bidirectional long short-term memory(BiLSTM)network,and finally inputs them into the conditional random field(CRF)network to predict entity categories.Simultaneously,by using the entities extracted by this model as the data layer,a knowledge graph based method has been constructed.Compared to other traditional extraction methods,the entity extraction method used in this study demonstrates significant improvements in metrics such as precision,recall and an F1 score.Ultimately,employing cable test data from a particular aerospace precision machining company,the study has constructed the knowledge graph based method in the field to achieve visualized queries and the traceability and localization of quality problems. 展开更多
关键词 knowledge graph named entity recognition quality control aerospace product
下载PDF
“哪(一)量(名)+X?”构式的认知语义分析
5
作者 胡德明 马洪海 李婉莹 《语文研究》 CSSCI 北大核心 2019年第1期17-21,共5页
文章认为,"哪(一)量(名)+X?"的构式义是:在某类事物的集合中,不存在一个元素符合属性X,即全部否定,相当于"哪一个都不……"。该构式来源于三个意象图式:容器图式、存在图式、识别图式,它们决定了该构式结构具有三... 文章认为,"哪(一)量(名)+X?"的构式义是:在某类事物的集合中,不存在一个元素符合属性X,即全部否定,相当于"哪一个都不……"。该构式来源于三个意象图式:容器图式、存在图式、识别图式,它们决定了该构式结构具有三个特点:中心名词前移、动词"有"频繁使用、疑问代词"哪"的运用。该构式义的产生是次第扫描的结果:集合A中不存在符合属性X的元素n→说听双方达成对集合A的全量否定→全量否定的构式义产生。 展开更多
关键词 “哪(一)()+X?”构式 意象图式 结构特点 次第扫描
原文传递
Study on the Characteristics of Ecological Water Requirement in Maijishan Scenic Spot
6
作者 蒲金涌 李晓薇 《Agricultural Science & Technology》 CAS 2012年第9期1971-1976,1996,共7页
[Objective] This study aimed to explore the characteristics of ecological water requirement in Maijishan Scenic Spot. [Methed] The characteristics of ecologi- cal water requirement in Maijishan Scenic Spot were analyz... [Objective] This study aimed to explore the characteristics of ecological water requirement in Maijishan Scenic Spot. [Methed] The characteristics of ecologi- cal water requirement in Maijishan Scenic Spot were analyzed based on,the data of soil humidity and meteorology of the spot. [Result] The result showed that the actual annual ecological water requirement in the spot was 678×10^6 m^3, and the proportion of soil water and evapotranspiration were 21% and 79%, respectively; the minimum annual ecological water requirement quota in the spot was 480.27×10^6 m^3, and the proportion of soil water and evapotranspiration were 16% and 84%, respectively; the minimum annual suitable ecological water requirement quota in the spot was 624.22×10^6 m^3, and the proportion of soil water and evapotranspiration were 18% and 82%, respectively. The precipitation was 614×10^6 m^3, and consumptive water surplus reached up to 78×10^6 m^3. The years when the precipitation was higher than the evapotranspiration accounted for 76%. Since 1980s, the evapotranspiration showed a linearly increasing trend. The precipitation was higher than the evapotranspiration from Jun. to Oct. and less than the evapotranspiration from Nov. to Dec. and Jan. to May. Evapotranspiration water requirement was regulated by soil water. The dis- parity between precipitation and evapotranspiration was huge in spring, thus having certain influence on waterfalls and streams in the spot. [Conclusion] The results of this study provided a basis for the rational use and long-term planning of the water sources in Maijishan Scenic Spot. 展开更多
关键词 Maijishan Scenic Spot Ecological Water Requirement CHARACTERISTICS
下载PDF
Analysis of Mineral Elements in 13 Famous Tea Varieties in Sichuan Province 被引量:7
7
作者 李春华 王云 《Agricultural Science & Technology》 CAS 2009年第2期130-133,共4页
This study was to analyze the mineral elements in famous tea varieties in Sichuan Province. Eighteen mineral elements in the samples of 13 famous tea varieties in Sichuan Province were measured via related instruments... This study was to analyze the mineral elements in famous tea varieties in Sichuan Province. Eighteen mineral elements in the samples of 13 famous tea varieties in Sichuan Province were measured via related instruments. The results showed, of all the 18 measured samples, that the contents of K, P, S, Ca and Mg were relatively higher( 〉1 500 mg/kg) in famous tea varieties in Sichuan Province, while those of Ba, Cr, V, Co and Se were relatively lower( 〈 10 mg/kg) ; compared to common green tea, the famous tea varieties in Sichuan Province contained higher contents of K, Zn, P, Na, Ni, Cu, S, Se and Co(0.38% -115.65% higher than that in common green tea), and lower contents of Mg, Mn, AI, Ca, V, Rb, Fe and Cr(7.20% -46.67% lower than that in common green tea); of the 13 tested tea varieties, Hongyanyingchun, Yongchuanxiuya and Qingchengxueya were rich in mineral elements, while Yuchengyunwu and Yuqiancha lacked in mineral elements. The re- suits show that Hongyanyingchun, Yongchuanxiuya and Qingchengxueya are the elites in the famous tea varieties in Sichuan Province. 展开更多
关键词 Famous tea variety Mineral element Sichuan Province
下载PDF
Determination of Trace Elements in Famous Teas from Huangshan Area by ICP-AES
8
作者 赵宗明 《Agricultural Science & Technology》 CAS 2016年第5期1046-1047,1054,共3页
With an Iris Intrepid II XSP ICP full spectrum ICP emission spectrometer,trace elements including Se,Fe,Mn,Cd,Cr,Co,Ni,Cu,Pb and Zn in Huangshan teas were determined.The best analysis conditions were selected by exper... With an Iris Intrepid II XSP ICP full spectrum ICP emission spectrometer,trace elements including Se,Fe,Mn,Cd,Cr,Co,Ni,Cu,Pb and Zn in Huangshan teas were determined.The best analysis conditions were selected by experiments.The method is simple and rapid,and the precision and accuracy are all in line with the requirements.This method was used to analyze actual tea samples with satisfactory results. 展开更多
关键词 Microwave digestion ICP-AES Famous teas in Huangshan area Trace elements
下载PDF
Study on Influencing Factors of Capital Structure of Energy Listed Companies
9
作者 HUANGGuo-liang LIQiang 《Journal of China University of Mining and Technology》 EI 2005年第1期56-59,76,共5页
Based on the determinative factors school of capital structure theory, this paper uses the data of 35 Chinese energy listed companies from 2000 to 2003, and adopts multi-variable regression method to make an empirical... Based on the determinative factors school of capital structure theory, this paper uses the data of 35 Chinese energy listed companies from 2000 to 2003, and adopts multi-variable regression method to make an empirical study of the influencing factors of their capital structure. The results indicate that the factors of size, income volatility, and the concentration of owner’s equity have positive relation with the capital structure, while the relation between profit- ability and capital structure is negative. It is also found that the influencing of growth and secured asset on the capital structure are relatively insignificant. 展开更多
关键词 energy listed companies capitcal structure influencing factors concentration of owner’s equity multi-variable regression
下载PDF
Commercial Application of Properly Treated Wastewater Discharged from Ethylene Plant
10
作者 Zhong Xianghong Lai Ximin (Chemical Division,SINOPEC Maoming Branch Company,Maoming 525021) 《China Petroleum Processing & Petrochemical Technology》 SCIE CAS 2009年第3期25-28,共4页
The wastewater discharged from the 1.0 Mt/a ethylene unit at Maoming Petrochemical Company was separated according to its quality, and a major part ofwastewater with better quality was properly treated via the process... The wastewater discharged from the 1.0 Mt/a ethylene unit at Maoming Petrochemical Company was separated according to its quality, and a major part ofwastewater with better quality was properly treated via the process of"IRABF + high-efficiency fiber filtering + disinfection" to make the wastewater quality comply with the quality of recycled cooling water, so that the technique for reused petrochemical wastewater was more reliable technically and more reasonable economically, 展开更多
关键词 ethylene unit WASTEWATER proper treatment commercial application
下载PDF
On Measuring the Privacy of Anonymized Data in Multiparty Network Data Sharing 被引量:1
11
作者 陈晓云 苏玉洁 +2 位作者 唐晓晟 黄小红 马严 《China Communications》 SCIE CSCD 2013年第5期120-127,共8页
This paper aims to find a practical way of quantitatively representing the privacy of network data. A method of quantifying the privacy of network data anonymization based on similarity distance and entropy in the sce... This paper aims to find a practical way of quantitatively representing the privacy of network data. A method of quantifying the privacy of network data anonymization based on similarity distance and entropy in the scenario involving multiparty network data sharing with Trusted Third Party (TTP) is proposed. Simulations are then conducted using network data from different sources, and show that the measurement indicators defined in this paper can adequately quantify the privacy of the network. In particular, it can indicate the effect of the auxiliary information of the adversary on privacy. 展开更多
关键词 privacy network data anonymization multiparty network data sharing
下载PDF
A Study on the Word Formation of Noun-Classifier Compound Words
12
作者 CUI Yan-ji ZHAO Lei AN Feng-cun 《Journal of Literature and Art Studies》 2018年第9期1349-1356,共8页
Chinese noun-classifier compound words show different properties in lexical meaning and syntactic collocation. The complexity of these compounds lies in the grammaticalization of classifiers’ system. Some nouns used... Chinese noun-classifier compound words show different properties in lexical meaning and syntactic collocation. The complexity of these compounds lies in the grammaticalization of classifiers’ system. Some nouns used as classifiers in the position of classifier are not grammaticalized into real classifiers which are temporary classifiers. So some of them are real noun-classifier compounds and some belong to noun-noun compounds. This paper attempts to analyze the structural relation between noun morpheme and classifier morpheme within the word. It also explains that the noun and the classifier compound in the position of light noun in the nP structure. 展开更多
关键词 word formation noun-classifier compound words light noun
下载PDF
A chaos-based quantum group signature scheme in quantum cryptosystem
13
作者 娄小平 陈志刚 Moon Ho Lee 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第7期2604-2611,共8页
A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum comp... A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum computation network in three phases, i.e. initializing phase, signing phase and verifying phase. In the scheme, a member of the group signs the message on behalf of the group while the receiver verifies the signature's validity with the aid of the trusty group manager who plays a crucial role when a possible dispute arises. Analysis result shows that the signature can neither be forged nor disavowed by any malicious attackers. 展开更多
关键词 group signature chaotic encryption quantum entanglement quantum cryptography
下载PDF
Hybrid Detection and Tracking of Fast-Flux Botnet on Domain Name System Traffic 被引量:2
14
作者 邹福泰 章思宇 饶卫雄 《China Communications》 SCIE CSCD 2013年第11期81-94,共14页
Fast-flux is a Domain Name System(DNS)technique used by botnets to organise compromised hosts into a high-availability,loadbalancing network that is similar to Content Delivery Networks(CDNs).Fast-Flux Service Network... Fast-flux is a Domain Name System(DNS)technique used by botnets to organise compromised hosts into a high-availability,loadbalancing network that is similar to Content Delivery Networks(CDNs).Fast-Flux Service Networks(FFSNs)are usually used as proxies of phishing websites and malwares,and hide upstream servers that host actual content.In this paper,by analysing recursive DNS traffic,we develop a fast-flux domain detection method which combines both real-time detection and long-term monitoring.Experimental results demonstrate that our solution can achieve significantly higher detection accuracy values than previous flux-score based algorithms,and is light-weight in terms of resource consumption.We evaluate the performance of the proposed fast-flux detection and tracking solution during a 180-day period of deployment on our university’s DNS servers.Based on the tracking results,we successfully identify the changes in the distribution of FFSN and their roles in recent Internet attacks. 展开更多
关键词 domain name system BOTNET fast-flux
下载PDF
Modeling Scenic Quality of Wetland Landscape Resources in South Dongting Lake,China 被引量:1
15
作者 WANG Baozhong HE Ping +1 位作者 AN Shuqing SHEN Shouyun 《Chinese Geographical Science》 SCIE CSCD 2012年第5期578-589,共12页
This study introduces a method to quantify the sceaic value of wetland landscapes and provides the guid- ance on the allocation of efforts for the purpose of preserving the most important environments. Dongting Lake, ... This study introduces a method to quantify the sceaic value of wetland landscapes and provides the guid- ance on the allocation of efforts for the purpose of preserving the most important environments. Dongting Lake, a tra-ditional tourist location, is one of the five largest freshwater lakes in China and a Grade 5A National Scenic Region. This study objectively analyzes the scenic resources of South Dongting Lake, and presents a model based on Quantifi- cation Theory I to assess wetland scenic landscapes. Employing a multilinear regression relationship between land-scape factors and their associated scenic value, we built up the Wetland Landscape Quantification Model (WLQM), which was used to classify 221 landscapes into five grades. Finally, some suggestions are proposed regarding quantita-tive assessment and its use for the sustainable development of wetland environments. 展开更多
关键词 wetland landscape scenic quality assessment Quantification Theory I South Dongting Lake
下载PDF
Network Traffic Signature Generation Mechanism Using Principal Component Analysis
16
作者 牟澄 黄小红 +1 位作者 吴军 马严 《China Communications》 SCIE CSCD 2013年第11期95-106,共12页
The Deep Packet Inspection(DPI)method is a popular method that can accurately identify the flow data and its corresponding application.Currently,the DPI method is widely used in common network management systems.Howev... The Deep Packet Inspection(DPI)method is a popular method that can accurately identify the flow data and its corresponding application.Currently,the DPI method is widely used in common network management systems.However,the major limitation of DPI systems is that their signature library is mainly extracted manually,which makes it hard to efficiently obtain the signature of new applications.Hence,in this paper,we propose an automatic signature extraction mechanism using Principal Component Analysis(PCA)technology,which is able to extract the signature automatically.In the proposed method,the signatures are expressed in the form of serial consistent sequences constructed by principal components instead of normally separated substrings in the original data extracted from the traditional methods.Extensive experiments based on numerous sets of data have been carried out to evaluate the performance of the proposed scheme,and the results prove that the newly proposed method can achieve good performance in terms of accuracy and efficiency. 展开更多
关键词 network traffic classification aut-omatic signature generation deep packet in-spection principal component analysis
下载PDF
Enhancement in Ad hoc on Demand Distance Vector (AODV) Routing Protocol Security 被引量:2
17
作者 王翠荣 杨孝宗 高远 《Journal of Donghua University(English Edition)》 EI CAS 2005年第3期18-22,共5页
Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Du... Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Due to the insecure nature of the wireless link and their dynamically changing topology, wireless ad-hoc networks require a careful and security-oriented approach for designing routing protocols. In this paper, an AODV-based secure routing protocol- ENAODV is presented. A speed-optimized digital signature algorithm is integrated into the routing protocol. The protocol algorithm is implemented with NS-2. The security of the protocol is analyzed. The simulating results show that the performances of ENAODV protocol, such as average node energy consumption, packet delay and packet delivery is nearly the same as standard AODV protocol. 展开更多
关键词 act-hoc network secure routing protocol Blowfish Cryptography digital signature
下载PDF
Object and Its Worry about Existence
18
作者 Martin Vlcek 《Journal of Philosophy Study》 2015年第7期342-348,共7页
The presented work describes principles of functioning of the object as a philosophical category on the basis of principles discovered in different, concrete objects. At the beginning, a supposition is thus made that ... The presented work describes principles of functioning of the object as a philosophical category on the basis of principles discovered in different, concrete objects. At the beginning, a supposition is thus made that principles are common and describe the fundamental mode of the organization of matter. The regeneration of its elements is the basic goal of the control of an object. The control systems try to allow elements to optimize their state depending on circumstances and occasionally in advance. The input system is the first one from these systems. It controls the input of material for the regeneration and at the same time is the source of primary information concerning its state in the environment and its development in time. The system of the control of the distribution of the energy named TOT is another element of the control. The system named EM0 controls the process of the regeneration on the basis of information about the successfulness of elements involved into the regeneration. Finally, the system named EM 1 controls the dynamics of the boundary of the object on the basis of information describing the tension on this boundary. The second goal of the control of an object, besides the regeneration, is to optimize the existence of the object as whole. New global criteria arise and are used throughout the process of the control for this sake. 展开更多
关键词 OBJECT EXISTENCE CONTROL SATISFACTION tension
下载PDF
Mexican Identity on YouTube: A Youngsters' User Approach
19
作者 Jacob Banuelos 《Journalism and Mass Communication》 2013年第3期141-153,共13页
The work at hand analyzes the visibility of cultural identity of"Mexico" on the YouTube platform (Retrieved from http://www.youtube.com). It is focused on qualitative and quantitative analyses of a sampling of 80... The work at hand analyzes the visibility of cultural identity of"Mexico" on the YouTube platform (Retrieved from http://www.youtube.com). It is focused on qualitative and quantitative analyses of a sampling of 80 videos that appear when the word "Mexico" is applied in various search formats within the site itself. User profile is also analyzed, along with video title, labels, date of upload, length, view count, thematic category, and commentaries. From this sampling of videos, an analysis is made upon the cultural identity of "Mexico" within a postmodernist framework of multicultural, fragmented, and decentralized identities (Friedman, 1994), parting from the theory of cultural hybridization (Pieterse, 2004), and under the logic of a media convergent culture (Jenkins, 2004a). 展开更多
关键词 YOUTUBE Mexico cultural identity postmodemism HYBRIDIZATION social network
下载PDF
Understanding human diseases with high-throughput quantitative measurement and analysis of molecular signatures 被引量:2
20
作者 YANG Li WEI Gang +2 位作者 TANG Kun NARDINI Christine HAN Jing-Dong J. 《Science China(Life Sciences)》 SCIE CAS 2013年第3期213-219,共7页
Microarray and deep sequencing technologies have provided unprecedented opportunities for mapping genome mutations,RNA transcripts,transcription factor binding,and histone modifications at high resolution at the genom... Microarray and deep sequencing technologies have provided unprecedented opportunities for mapping genome mutations,RNA transcripts,transcription factor binding,and histone modifications at high resolution at the genome-wide level.This has revolutionized the way in which transcriptomes,regulatory networks and epigenetic regulations have been studied and large amounts of heterogeneous data have been generated.Although efforts are being made to integrate these datasets unbiasedly and efficiently,how best to do this still remains a challenge.Here we review major impacts of high-throughput genome-wide data generation,their relevance to human diseases,and various bioinformatics approaches for data integration.Finally,we provide a case study on inflammatory diseases. 展开更多
关键词 GENOMICS EPIGENOMICS PHENOMICS integration data analysis
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部