期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
耐人寻味的隐字联
1
作者 蔡强 《语文知识》 2006年第7期7-7,共1页
隐宇联,亦称缺如联、藏字联,即在联语中故意略去一些需要突出的字,含蓄地传达言外之意。隐字联手法奇特,语言生动,读之往往令人拍案叫绝。
关键词 耐人寻味 隐字 言外之意 语言生动 中学 语文 文学知识
下载PDF
妙趣横生隐字联
2
《财会月刊》 北大核心 2007年第12期81-81,共1页
章太炎与康有为政见不合,章太炎曾作嵌字联骂康有为:国之将亡必有,老而不死是为。上句是《中庸》“国之将亡,必有妖孽”隐去“妖孽”二字;下句是《论语》“老而不死是为贼”隐去“喊”字。
关键词 隐字 《中庸》 《论语》 康有为 章太炎
下载PDF
妙品集句隐字联
3
作者 张宇 《语文知识》 2004年第7期13-13,共1页
对联中有一种既集古人名句,又隐去关键字词的.即所谓集句隐字联。这种对联具有双重技巧,制作难度比一般集句联要大.但它饶有兴趣,备受人们青睐。
关键词 隐字 对联 中学 语文 备课参考
下载PDF
隐字佳联
4
作者 夏俊山 《阅读与写作》 2003年第8期48-48,共1页
中国的对联数量很多,隐字联是较为特殊的一种。所谓隐字,就是在语句中隐去关键性的字词,其真实的含义须从语句之外得之。旧民主主义革命时期,康有为堕落成保皇派。
关键词 中国 对联 康有为 冯梦龙 《古今谭概》 《礼记·中康》 隐字
下载PDF
耐人寻味的隐字联
5
作者 曹铁光 《小学生导读》 2009年第1期33-33,共1页
所谓“隐字联”,就是隐去联中的关键字,而把成语典故、古人名句融入联中,既含而不露,又使人一目了然。
关键词 隐字 耐人寻味 成语典故 关键
原文传递
人文专题小故事
6
作者 孙苑 《考试(高考文科版)》 2013年第2期55-57,共3页
耐人寻味的隐字联 隐字联,亦称缺如联、藏字联,即在联中故意略掉需要突出的一些字,含蓄巧妙地传达言外之意、弦外之音。隐字联含而不露,曲径通幽,读之令人拍案叫绝,回味无穷。相传北宋名相吕蒙正少年时家境贫寒,某年除夕,见家... 耐人寻味的隐字联 隐字联,亦称缺如联、藏字联,即在联中故意略掉需要突出的一些字,含蓄巧妙地传达言外之意、弦外之音。隐字联含而不露,曲径通幽,读之令人拍案叫绝,回味无穷。相传北宋名相吕蒙正少年时家境贫寒,某年除夕,见家中一贫如洗,便写这样一副对联贴于大门两旁: 展开更多
关键词 故事 专题 人文 隐字 耐人寻味 言外之意 吕蒙正 含蓄
下载PDF
On the priority of salient meanings in English idioms understanding
7
作者 冯丽颖 《Sino-US English Teaching》 2009年第4期45-51,共7页
Giora proposed that general principle of salience: salient comprehension of figurative and meanings are processed first and literal language be governed by a more meaning salience determines the type of processing in... Giora proposed that general principle of salience: salient comprehension of figurative and meanings are processed first and literal language be governed by a more meaning salience determines the type of processing invoked. According to the Graded Salience Hypothesis, processing familiar metaphors should involve the activation of both their metaphoric and literal meanings, regardless of the type of context in which they are embedded. Processing less familiar metaphors should activate the literal meaning in both types of contexts; however, in the literally biased context, it should be the only one activated. Processing familiar idioms in context biased towards the idiomatic meaning should evoke their figurative meaning almost exclusively, because their figurative meaning is much more salient than their literal meaning. However, processing less familiar idioms in an idiomatic context should activate both their literal and idiomatic meanings because both meanings enjoy similar salience status. 展开更多
关键词 the Graded Salient Hypothesis salience status idiomatic meaning literal meaning
下载PDF
Improved Prefix Based Format-Preserving Encryption for Chinese Names 被引量:2
8
作者 Junwei Zou Peng Wang Hong Luo 《China Communications》 SCIE CSCD 2018年第3期78-90,共13页
In the era of big data, government, business and personal digital information will be possible for data mining. Data mining requires massive data as a support. However, the direct release of the original mass data, wh... In the era of big data, government, business and personal digital information will be possible for data mining. Data mining requires massive data as a support. However, the direct release of the original mass data, which usually contain some sensitive information of personal or analysis, will result in leakage of user privacy. Therefore, it is becoming increasingly important to protect privacy information in data publishing. In this paper, we focus on the multi-type self-identified format-preserving encryption. First, we introduce a multi-type self-identified format-preserving encryption system and discuss the encryption of various types of data in this system. Then, for the format preserving encryption(FPE) about Chinese name, we study from the encryption model construction and basic encryption scheme. The format-preserving encryption model about Chinese name is constructed and the concept of the name library is presented. Based on this, it is used to not only limit the message space to reduce complexity, but also ensure the cipher in accordance with the Chinese naming habits. In addition, according to the encryption and decryption model, format-preserving encryption process of Chinese name is designed. In order to add new names, the algorithm of name space expansion is proposed. Based on the Prefix, this paper put forward an algorithm named Cycle-Prefix, which enhances the security and dynamics of FPE by using two adjustment factors and the circular encryption. Compared with the traditional Prefix algorithm, experiments show that Cycle-Prefix can not only complete the task of FPE for Chinese name, but also encrypt same plain text into different ciphers under the premise of similar efficiency with Prefix. 展开更多
关键词 Chinese name format-preservingencryption name library encryption model
下载PDF
The Effect of Verbal Anchoring on the Processing of Advertising Pictorial Metaphors 被引量:1
9
作者 Shuo CAO Xuanyi ZHAO Ziya XU 《Chinese Journal of Applied Linguistics》 2021年第1期68-89,127,共23页
Although investigating metaphors in advertising is gaining in popularity, there are still certain unresolved arguments, such as the interaction between elements of different modalities. This study,composed of three be... Although investigating metaphors in advertising is gaining in popularity, there are still certain unresolved arguments, such as the interaction between elements of different modalities. This study,composed of three behavioral experiments, aims to identify how verbal anchoring(literal anchoring, metaphor anchoring and unrelated anchoring) influences the processing of pictorial metaphors in advertising, by observing the cognitive and affective indicators, advertising comprehension and advertising likeability. The results showed 1) that metaphors in pictorial modality were recognized more quickly than those in verbal modality, 2) that verbal anchoring facilitated participants ’ comprehending and appreciating of pictorial metaphors and 3) that literally-anchored metaphors with a moderate level of novelty yielded the most favorable cognitive responses. The study not only enriches the existing theoretical framework of multimodal metaphors in advertising, but also proposes an optimal match between pictorial metaphors and verbal elements, for advertisers and manufacturers to design effective multimodal advertisements. 展开更多
关键词 pictorial metaphor verbal anchoring MULTIMODALITY advertisement comprehension advertisement likeability
下载PDF
A lexicalized second-order-HMM for ambiguity resolution in Chinese segmentation and POS tagging 被引量:1
10
作者 陈鄞 Yang Muyun Zhao Tiejun Yu Hao Li Sheng 《High Technology Letters》 EI CAS 2005年第4期346-350,共5页
Hidden Markov Model(HMM) is a main solution to ambiguities in Chinese segmentation anti POS (part-of-speech) tagging. While most previous works tot HMM-based Chinese segmentation anti POS tagging eonsult POS infor... Hidden Markov Model(HMM) is a main solution to ambiguities in Chinese segmentation anti POS (part-of-speech) tagging. While most previous works tot HMM-based Chinese segmentation anti POS tagging eonsult POS informatiou in contexts, they do not utilize lexieal information which is crucial for resoMng certain morphologieal ambiguity. This paper proposes a method which incorporates lexieal information and wider context information into HMM. Model induction anti related smoothing technique are presented in detail. Experiments indicate that this technique improves the segmentation and tagging accuracy by nearly 1%. 展开更多
关键词 hidden Markov model chinese segmentation part-of-speech tagging
下载PDF
Wavelet neural network based watermarking technology of 2D vector maps 被引量:4
11
作者 Sun Jianguo Men Chaoguang 《High Technology Letters》 EI CAS 2011年第3期259-262,共4页
A novel lossless information hiding algorithm based on wavelet neural network for digital vector maps is introduced. Wavelet coefficients being manipulated are embedded into a vector map, which could be restored by ad... A novel lossless information hiding algorithm based on wavelet neural network for digital vector maps is introduced. Wavelet coefficients being manipulated are embedded into a vector map, which could be restored by adjusting the weights of neurons in the designed neural network. When extracting the watermark extraction, those coefficients would be extracted by wavelet decomposition. With the trained multilayer feed forward neural network, the watermark would be obtained finally by measuring the weights of neurons. Experimental results show that the average error coding rate is only 6% for the proposed scheme and compared with other classical algorithms on the same tests, it is indicated that the proposed algorithm hashigher robustness, better invisibility and less loss on precision. 展开更多
关键词 information hiding digital watermarking vector map neural network
下载PDF
Privacy-Preserving Top-k Keyword Similarity Search over Outsourced Cloud Data 被引量:1
12
作者 TENG Yiping CHENG Xiang +2 位作者 SU Sen WANG Yulong SHUANG Kai 《China Communications》 SCIE CSCD 2015年第12期109-121,共13页
In this paper,we study the problem of privacy-preserving top-k keyword similarity search over outsourced cloud data.Taking edit distance as a measure of similarity,we first build up the similarity keyword sets for all... In this paper,we study the problem of privacy-preserving top-k keyword similarity search over outsourced cloud data.Taking edit distance as a measure of similarity,we first build up the similarity keyword sets for all the keywords in the data collection.We then calculate the relevance scores of the elements in the similarity keyword sets by the widely used tf-idf theory.Leveraging both the similarity keyword sets and the relevance scores,we present a new secure and efficient treebased index structure for privacy-preserving top-k keyword similarity search.To prevent potential statistical attacks,we also introduce a two-server model to separate the association between the index structure and the data collection in cloud servers.Thorough analysis is given on the validity of search functionality and formal security proofs are presented for the privacy guarantee of our solution.Experimental results on real-world data sets further demonstrate the availability and efficiency of our solution. 展开更多
关键词 similarity keyword preserving cloud collection privacy validity files ranking separate
下载PDF
Reading, Text, and the Metaphors of Perception
13
作者 Amechi Nicholas Akwanya 《Journal of Philosophy Study》 2013年第1期76-84,共9页
Literature continues to generate controversies as to what it is and what it is for. That is one of the reasons for the proliferation of "literary theories." The notion is here placed between quotation marks because ... Literature continues to generate controversies as to what it is and what it is for. That is one of the reasons for the proliferation of "literary theories." The notion is here placed between quotation marks because it does not mean the same thing to all the scholars in the field. Some regard it in the same way that theory functions in the sciences, where it focuses on the object it is associated with. For example, the atomic theory of matter is concerned with the internal constitution or the characterizing properties of matter. Others, however, are looking beyond the object towards the reader and the extra-textual environment. The approaches to literary studies which look beyond the individual work to outside phenomena are many and increasing all the time as new issues and concerns arrive on the social scene. Issues of climate change are fairly topical now; and criticism is already responding with such ideas as eco-criticism. The question of the identity of the literary object has to be kept in the front burner, so that it is not swamped by the many different interests which attach to literature from time to time. Bringing attention back to the literary work is the central concern of this paper; and we are doing this by way of the metaphors of perception often used with respect to the literary work as these suggest that the work is something to focus on, rather than to see through to something else. Finally, I elaborate the concept of integrity as an appurtenance of the literary text that attracts and holds the gaze. 展开更多
关键词 CRITICISM INTEGRITY interpretation parergon representation structure
下载PDF
紫竹斋艺话(十二)
14
作者 林岫 《书法》 2007年第8期74-75,共2页
隐字,又称阙如(缺如),藏匿巧当,曲婉含蓄,确实奇趣非常。
关键词 阙如 斋艺话 巧当 曲婉 隐字
原文传递
Human-imitation Recognition Algorithm Based on Multi-character
15
作者 周鑫 杨霓清 +2 位作者 吴晓娟 张小燕 王孝刚 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第5期526-530,共5页
A multi-character recognition method based on hidden Markov model (HMM) was presented. The method can reduce the calculation load of correlation and improve recognition accuracy compared with singlecharacter recogni... A multi-character recognition method based on hidden Markov model (HMM) was presented. The method can reduce the calculation load of correlation and improve recognition accuracy compared with singlecharacter recognition in video. The characteristics used for recognizing include the shape character, the color character, the texture character and so on. Even our human being generally uses these characteristics to recognize objects in practice..4, recognition experiment of 17 fishes was carried out in the paper. The experimental results demonstrate the high veracity of the multi-character recognition algorithm. Together with the tracking process, it can handle dynamic objects, so the multi-character recognition is more like the human recognition, and has great application value. 展开更多
关键词 co-occurrence matrix hidden Markov model (HMM) recognizing optimization-coefficient TRACKING
原文传递
Watermarking Data Cubes
16
作者 郭捷 邱卫东 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期117-121,共5页
We propose a robust watermarking scheme and several extensions for digital right management of data cubes.The ownership information is hidden into a data cube by modifying a set of selected cell values.Its owner can u... We propose a robust watermarking scheme and several extensions for digital right management of data cubes.The ownership information is hidden into a data cube by modifying a set of selected cell values.Its owner can use his private key to control all the watermarking parameters freely.Neither original data cube nor the watermark is required in watermark detection.Detailed analysis and extensive experiments are conducted for the proposed schemes in terms of watermark detectability,robustness and efficiency.Our results show that the scheme performs well in actual applications. 展开更多
关键词 data cube WATERMARKING digital right management ROBUSTNESS
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部