期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
理想的维护与失落——析儒家的隐处思想 被引量:2
1
作者 白艳玲 《天津科技大学学报》 CAS 2005年第1期68-70,共3页
积极入仕与博施济众是儒家的主体精神,儒家士人从来就是政治舞台上的活跃分子。然而,君主心意的莫测,政治风云的不定,又常常令儒家知识分子心寒胆战、无所适从。于是,“用行舍藏”:在无力救世时,他们选择了自救,希望通过在困境中退守,... 积极入仕与博施济众是儒家的主体精神,儒家士人从来就是政治舞台上的活跃分子。然而,君主心意的莫测,政治风云的不定,又常常令儒家知识分子心寒胆战、无所适从。于是,“用行舍藏”:在无力救世时,他们选择了自救,希望通过在困境中退守,以实现其理想与人格的维护,这不能不说是在苦难的现实中所体现出的一种生存与发展的智慧,但我们也不能忽视其所导致的消极影响。 展开更多
关键词 儒家 士人 仕进 隐处
下载PDF
论白居易前期的“隐处”意识 被引量:1
2
作者 李敬一 《淮阴师范学院学报(哲学社会科学版)》 2001年第1期111-114,共4页
中唐著名诗人白居易 ,可以说一生都在出处矛盾中度过 ,他一生未离仕途 ,但又一直未间断对“隐处”生活的肯定和向往 ,从而呈现出十分复杂的思想矛盾现象。我们认真研读白居易前期的诗歌创作 ,就会发现 ,早在他入仕之初就已萌生了对隐处... 中唐著名诗人白居易 ,可以说一生都在出处矛盾中度过 ,他一生未离仕途 ,但又一直未间断对“隐处”生活的肯定和向往 ,从而呈现出十分复杂的思想矛盾现象。我们认真研读白居易前期的诗歌创作 ,就会发现 ,早在他入仕之初就已萌生了对隐处的思考和向往 ,并逐渐形成了“志在兼济 ,行在独善”的“中隐”思想。 展开更多
关键词 白居易 隐处意识
下载PDF
课堂提问中的点石成金
3
作者 任婷 《西北成人教育学院学报》 2009年第6期80-80,共1页
在课堂提问中运用含蓄的语言给学生透露解决问题的信息,以启发他们思考,使之心领神会,举一反三,触类旁通,是一种适合中学生心理的提问艺术,称之为课堂提问中的点石成金。
关键词 课堂提问 正面引导 反向否定 隐处点拨
下载PDF
A lexicalized second-order-HMM for ambiguity resolution in Chinese segmentation and POS tagging 被引量:1
4
作者 陈鄞 Yang Muyun Zhao Tiejun Yu Hao Li Sheng 《High Technology Letters》 EI CAS 2005年第4期346-350,共5页
Hidden Markov Model(HMM) is a main solution to ambiguities in Chinese segmentation anti POS (part-of-speech) tagging. While most previous works tot HMM-based Chinese segmentation anti POS tagging eonsult POS infor... Hidden Markov Model(HMM) is a main solution to ambiguities in Chinese segmentation anti POS (part-of-speech) tagging. While most previous works tot HMM-based Chinese segmentation anti POS tagging eonsult POS informatiou in contexts, they do not utilize lexieal information which is crucial for resoMng certain morphologieal ambiguity. This paper proposes a method which incorporates lexieal information and wider context information into HMM. Model induction anti related smoothing technique are presented in detail. Experiments indicate that this technique improves the segmentation and tagging accuracy by nearly 1%. 展开更多
关键词 hidden Markov model chinese segmentation part-of-speech tagging
下载PDF
Using multi-threads to hide deduplication I/O latency with low synchronization overhead 被引量:1
5
作者 朱锐 秦磊华 +1 位作者 周敬利 郑寰 《Journal of Central South University》 SCIE EI CAS 2013年第6期1582-1591,共10页
Data deduplication, as a compression method, has been widely used in most backup systems to improve bandwidth and space efficiency. As data exploded to be backed up, two main challenges in data deduplication are the C... Data deduplication, as a compression method, has been widely used in most backup systems to improve bandwidth and space efficiency. As data exploded to be backed up, two main challenges in data deduplication are the CPU-intensive chunking and hashing works and the I/0 intensive disk-index access latency. However, CPU-intensive works have been vastly parallelized and speeded up by multi-core and many-core processors; the I/0 latency is likely becoming the bottleneck in data deduplication. To alleviate the challenge of I/0 latency in multi-core systems, multi-threaded deduplication (Multi-Dedup) architecture was proposed. The main idea of Multi-Dedup was using parallel deduplication threads to hide the I/0 latency. A prefix based concurrent index was designed to maintain the internal consistency of the deduplication index with low synchronization overhead. On the other hand, a collisionless cache array was also designed to preserve locality and similarity within the parallel threads. In various real-world datasets experiments, Multi-Dedup achieves 3-5 times performance improvements incorporating with locality-based ChunkStash and local-similarity based SiLo methods. In addition, Multi-Dedup has dramatically decreased the synchronization overhead and achieves 1.5-2 times performance improvements comparing to traditional lock-based synchronization methods. 展开更多
关键词 MULTI-THREAD MULTI-CORE parallel data deduplication
下载PDF
Differentially Private Multidimensional Data Publication 被引量:1
6
作者 ZHANG Ji DONG Xin +3 位作者 YU Jiadi LUO Yuan LI Minglu WU Bin 《China Communications》 SCIE CSCD 2014年第A01期79-85,共7页
Multidimensional data provides enormous opportunities in a variety of applications. Recent research has indicated the failure of existing sanitization techniques (e.g., k-anonymity) to provide rigorous privacy guara... Multidimensional data provides enormous opportunities in a variety of applications. Recent research has indicated the failure of existing sanitization techniques (e.g., k-anonymity) to provide rigorous privacy guarantees. Privacy- preserving multidimensional data publishing currently lacks a solid theoretical foundation. It is urgent to develop new techniques with provable privacy guarantees, e-Differential privacy is the only method that can provide such guarantees. In this paper, we propose a multidimensional data publishing scheme that ensures c-differential privacy while providing accurate results for query processing. The proposed solution applies nonstandard wavelet transforms on the raw multidimensional data and adds noise to guarantee c-differential privacy. Then, the scheme processes arbitrarily queries directly in the noisy wavelet- coefficient synopses of relational tables and expands the noisy wavelet coefficients back into noisy relational tuples until the end result of the query. Moreover, experimental results demonstrate the high accuracy and effectiveness of our approach. 展开更多
关键词 data publication differential privacy data utility
下载PDF
Bottom-up mining of XML query patterns to improve XML querying
7
作者 Yi-jun BEI Gang CHEN +1 位作者 Jin-xiang DONG Ke CHEN 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第6期744-757,共14页
Querying XML data is a computationally expensive process due to the complex nature of both the XML data and the XML queries. In this paper we propose an approach to expedite XML query processing by caching the results... Querying XML data is a computationally expensive process due to the complex nature of both the XML data and the XML queries. In this paper we propose an approach to expedite XML query processing by caching the results of frequent queries. We discover frequent query patterns from user-issued queries using an efficient bottom-up mining approach called VBUXMiner. VBUXMiner consists of two main steps. First, all queries are merged into a summary structure named "compressed global tree guide" (CGTG). Second, a bottom-up traversal scheme based on the CGTG is employed to generate frequent query patterns. We use the frequent query patterns in a cache mechanism to improve the XML query performance. Experimental results show that our proposed mining approach outperforms the previous mining algorithms for XML queries, such as XQPMinerTID and FastXMiner, and that by caching the results of frequent query patterns, XML query performance can be dramatically improved. 展开更多
关键词 XML querying XML mining CACHING Data mining
下载PDF
Removal of Cryptosporidium sized particle under different filtration temperature, flow rate and alum dosing
8
作者 许国仁 Fitzpatrick S. B. Caroline +1 位作者 Gregory John 邓林煜 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2007年第1期23-25,共3页
Recent Cryptosporidium outbreaks have highlighted concerns about filter efficiency and in particular particle breakthrough. It is essential to ascertain the causes of Cryptosporidium sized particle breakthrough for Cr... Recent Cryptosporidium outbreaks have highlighted concerns about filter efficiency and in particular particle breakthrough. It is essential to ascertain the causes of Cryptosporidium sized particle breakthrough for Cryptosporidium cannot be destroyed by conventional chlorine disinfection. This research tried to investigate the influence of temperature, flow rate and chemical dosing on particle breakthrough during filtration. The results showed that higher temperatures and coagulant doses could reduce particle breakthrough. The increase of filtration rate made the residual particle counts become larger. There was an optimal dose in filtration and was well correlated to ζ potential. 展开更多
关键词 CRYPTOSPORIDIUM humic acid FILTRATION PARTICLE TEMPERATURE
下载PDF
Application of CFG Pile Construction Technology for Soft Foundation Treatment
9
作者 Deng Lin 《International Journal of Technology Management》 2013年第1期7-10,共4页
CFG pile has been widely applied as one of the common ground treatment techniques. As a concealed work, the construction quality of pile foundation not only relates to the success of the project, but also concerns the... CFG pile has been widely applied as one of the common ground treatment techniques. As a concealed work, the construction quality of pile foundation not only relates to the success of the project, but also concerns the benefits of thousands of hot, seholds. Only strengthening the supervision and management during the construction and strictly designing and specifying CFG pile can ensure the construction quality of CFG pile. But most researches focus on operating mechanism and theoretical analysis, and there are fewer researches about the construction of CFG pile. The real construction of CFG pile has no specified operation and lacks of the construction guidance, which not only causes great problems and has great influence on the intensity of CFG pile, but also makes the real pile body have great difference from the design requirements. Therefore, the study on construction of CFG pile in the paper has great significance. 展开更多
关键词 CFG pile soft foundation treatment reinforcement mechanism construction technology quality control
下载PDF
谯定所谓“见乃谓之象”考释——兼论与朱熹《易》学的分歧及其意义
10
作者 粟品孝 《宋代文化研究》 2000年第1期266-272,共7页
谯定字天授,号涪陵处士,宋代涪州乐温县(今属重庆市涪陵区)人。他是理学名儒程颐的及门弟子,学兼儒佛,长于《易》理,在《易》学思想上有着独特的造诣。由于他长期隐处未仕,不及'通顯';也由于朱熹以程颐之私淑而非门人视之,在《... 谯定字天授,号涪陵处士,宋代涪州乐温县(今属重庆市涪陵区)人。他是理学名儒程颐的及门弟子,学兼儒佛,长于《易》理,在《易》学思想上有着独特的造诣。由于他长期隐处未仕,不及'通顯';也由于朱熹以程颐之私淑而非门人视之,在《伊洛渊源録》中又不立其传,致其长期不为后人关注,其著述、思想也几至湮晦。至清儒纂修《宋元学案》,辨章学术,考镜源流,才发现谯定是不可忽视的重要理学家。 展开更多
关键词 涪陵 定字 隐处 涪陵区 涪州 意义 重庆市 考镜 天授
原文传递
FINDING THE TOPOLOGY OF IMPLICITLY DEFINED TWO ALGEBRAIC PLANE CURVES 被引量:2
11
作者 Ben GAO Yufu CHEN 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2012年第2期362-374,共13页
An algorithm is given for computing in a very efficient way the topology of two real algebraic plane curves defined implicitly.The authors preform a symbolic pre-processing that allows us later to execute all numerica... An algorithm is given for computing in a very efficient way the topology of two real algebraic plane curves defined implicitly.The authors preform a symbolic pre-processing that allows us later to execute all numerical computations in an accurate way. 展开更多
关键词 Algebraic curves cylindrical algebraic decomposition generic position subresultantssequence topology.
原文传递
Does disruptive camouflage conceal edges and features? 被引量:2
12
作者 Richard J. WEBSTER 《Current Zoology》 SCIE CAS CSCD 2015年第4期708-717,共10页
Camouflage is ubiquitous in the natural world and benefits both predators and prey. Amongst the range of conceal- ment strategies, disruptive coloration is thought to visually fragment an animal's' outline, thereby ... Camouflage is ubiquitous in the natural world and benefits both predators and prey. Amongst the range of conceal- ment strategies, disruptive coloration is thought to visually fragment an animal's' outline, thereby reducing its rate of discovery. Here, I propose two non-mutually exclusive hypotheses for how disruptive camouflage functions, and describe the visual me- chanisms that might underlie them. (1) The local edge disruption hypothesis states that camouflage is achieved by breaking up edge information. (2) The global feature disruption hypothesis states camouflage is achieved by breaking up the characteristic features of an animal (e.g., overall shape or facial features). Research clearly shows that putatively disruptive edge markings do increase concealment; however, few tests have been undertaken to determine whether this survival advantage is attributable to the distortion of features, so the global feature disruption hypothesis is under studied. In this review the evidence for global feature disruption is evaluated. Further, I address if object recognition processing provides a feasible mechanism for animals' features to influence concealment. This review concludes that additional studies are needed to test if disruptive camouflage operates through the global feature disruption and proposes future research directions [Current Zoology 61 (4): 708-717, 2015]. 展开更多
关键词 ANTIPREDATOR Background matching Contour CRYPSIS CAMOUFLAGE Disruptive coloration Edge detection OBJECTRECOGNITION
原文传递
BAYESIAN IMAGE SUPERRESOLUTION AND HIDDEN VARIABLE MODELING
13
作者 Atsunori KANEMURA Shin-ichi MAEDA +1 位作者 Wataru FUKUDA ShinI SHII 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2010年第1期116-136,共21页
Superresolution is an image processing technique that estimates an original high-resolutionimage from its low-resolution and degraded observations.In superresolution tasks,there have beenproblems regarding the computa... Superresolution is an image processing technique that estimates an original high-resolutionimage from its low-resolution and degraded observations.In superresolution tasks,there have beenproblems regarding the computational cost for the estimation of high-dimensional variables.Theseproblems are now being overcome by the recent development of fast computers and the developmentof powerful computational techniques such as variational Bayesian approximation.This paper reviewsa Bayesian treatment of the superresolution problem and presents its extensions based on hierarchicalmodeling by employing hidden variables. 展开更多
关键词 Bayesian estimation hidden variables image superresolution Markov random fields variational estimation.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部