期刊文献+
共找到4,974篇文章
< 1 2 249 >
每页显示 20 50 100
汉英“杀/kill”隐喻投射异同及成因分析
1
作者 张秋霞 《今古文创》 2024年第22期128-130,共3页
对于汉英民族而言“,杀/kill”是一个普遍古老的用词,但通过与社会的互动,人们的认知不断深入,“杀/kill”的词义不再拘于本义。本文基于认知隐喻跨域投射理论对比分析了“杀/kill”认知隐喻的异同。比较结果发现:汉英“杀”都可以投射... 对于汉英民族而言“,杀/kill”是一个普遍古老的用词,但通过与社会的互动,人们的认知不断深入,“杀/kill”的词义不再拘于本义。本文基于认知隐喻跨域投射理论对比分析了“杀/kill”认知隐喻的异同。比较结果发现:汉英“杀”都可以投射至结果域、数量域、程度域和感知域;“杀”还可以投射至战争域、心理域、空间域等目标域,而“kill”在这些投射领域出现了空白,出现这种情形的主要原因在于民族思维的特异性、民族文化的特异性以及语言类型的制约性。 展开更多
关键词 杀/kill 认知隐喻 对比分析
下载PDF
Vulnerability assessment of UAV engine to laser based on improved shotline method
2
作者 Le Liu Chengyang Xu +3 位作者 Changbin Zheng Sheng Cai Chunrui Wang Jin Guo 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期588-600,共13页
Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a v... Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a variety of analysis programs for battlefield targets to traditional weapons have been developed,but a comprehensive assessment methodology for targets'vulnerability to laser is still missing.Based on the shotline method,this paper proposes a method that equates laser beam to shotline array,an efficient vulnerability analysis program of target to laser is established by this method,and the program includes the circuit board and the wire into the vulnerability analysis category,which improves the precision of the vulnerability analysis.Taking the UAV engine part as the target of vulnerability analysis,combine with the"life-death unit method"to calculate the laser penetration rate of various materials of the UAV,and the influence of laser weapon system parameters and striking orientation on the killing probability is quantified after introducing the penetration rate into the vulnerability analysis program.The quantitative analysis method proposed in this paper has certain general expansibility,which can provide a fresh idea for the vulnerability analysis of other targets to laser. 展开更多
关键词 Laser weapon Laser damage VULNERABiLiTY UAV ENGiNE killing probability
下载PDF
From Control Theory to Gravitational Waves
3
作者 Jean-Francois Pommaret 《Advances in Pure Mathematics》 2024年第2期49-100,共52页
When D:ξ→η is a linear ordinary differential (OD) or partial differential (PD) operator, a “direct problem” is to find the generating compatibility conditions (CC) in the form of an operator D<sub>1:</su... When D:ξ→η is a linear ordinary differential (OD) or partial differential (PD) operator, a “direct problem” is to find the generating compatibility conditions (CC) in the form of an operator D<sub>1:</sub>η→ξ such that Dξ = η implies D<sub>1</sub>η = 0. When D is involutive, the procedure provides successive first-order involutive operators D<sub>1</sub>,...,D<sub>n </sub>when the ground manifold has dimension n. Conversely, when D<sub>1</sub> is given, a much more difficult “inverse problem” is to look for an operator D:ξ→η having the generating CC D<sub>1</sub>η = 0. If this is possible, that is when the differential module defined by D<sub>1</sub> is “torsion-free”, that is when there does not exist any observable quantity which is a sum of derivatives of η that could be a solution of an autonomous OD or PD equation for itself, one shall say that the operator D<sub>1</sub> is parametrized by D. The parametrization is said to be “minimum” if the differential module defined by D does not contain a free differential submodule. The systematic use of the adjoint of a differential operator provides a constructive test with five steps using double differential duality. We prove and illustrate through many explicit examples the fact that a control system is controllable if and only if it can be parametrized. Accordingly, the controllability of any OD or PD control system is a “built in” property not depending on the choice of the input and output variables among the system variables. In the OD case and when D<sub>1</sub> is formally surjective, controllability just amounts to the formal injectivity of ad(D<sub>1</sub>), even in the variable coefficients case, a result still not acknowledged by the control community. Among other applications, the parametrization of the Cauchy stress operator in arbitrary dimension n has attracted many famous scientists (G. B. Airy in 1863 for n = 2, J. C. Maxwell in 1870, E. Beltrami in 1892 for n = 3, and A. Einstein in 1915 for n = 4). We prove that all these works are already explicitly using the self-adjoint Einstein operator, which cannot be parametrized and the comparison needs no comment. As a byproduct, they are all based on a confusion between the so-called div operator D<sub>2</sub> induced from the Bianchi operator and the Cauchy operator, adjoint of the Killing operator D which is parametrizing the Riemann operator D<sub>1</sub> for an arbitrary n. This purely mathematical result deeply questions the origin and existence of gravitational waves, both with the mathematical foundations of general relativity. As a matter of fact, this new framework provides a totally open domain of applications for computer algebra as the quoted test can be studied by means of Pommaret bases and related recent packages. 展开更多
关键词 Differential Operator Differential Sequence killing Operator Riemann Operator Bianchi Operator Cauchy Operator Control Theory Controllability Elasticity General Relativity
下载PDF
A framework of force of information influence and application for C4KISR system
4
作者 MAO Shaojie DIAO Lianwang +6 位作者 SUN Yu WANG Heng YI Kan XU Xin MAO Xiaobin ZHANG Kecheng SHENG Long 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期430-443,共14页
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e... The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture. 展开更多
关键词 information warfare command control communications computer kill intelligence surveillance reconnaissance(C4KiSR)system information circulation force of information influence information entropy
下载PDF
Therapeutic Administration of <i>Mycobacterium bovis</i>BCG Killed by Extended Freeze-Drying Modulates Airway Inflammation in a Chronic Murine Model of Asthma
5
作者 Micheline Lagranderie Jeroen Alfons Juliette Vanoirbeek +3 位作者 Bernardo Boris Vargaftig Pierre-Marie Guyonvarc’h Gilles Marchal Xavier Roux 《Open Journal of Respiratory Diseases》 2013年第2期79-88,共10页
Background: We previously showed that treatment with Mycobacterium bovis BCG killed by extended freeze-drying (EFD BCG) modulates inflammation through regulatory T cells (Tregs) in an acute asthma model. In this study... Background: We previously showed that treatment with Mycobacterium bovis BCG killed by extended freeze-drying (EFD BCG) modulates inflammation through regulatory T cells (Tregs) in an acute asthma model. In this study, we investigated the kinetics of Treg induction as well as their long-term homing in spleen and lungs correlating with reduced airway hyperresponsiveness (AHR) in a murine model of acute allergic asthma. We then evaluated the therapeutic implication of EFD BCG in a chronic asthma model. Methods: Tregs expressing Foxp3 were analyzed in various organs shortly and long-term after EFD BCG, live- and Heat Killed-(HK-) BCG treatments in an acute model of asthma. We further studied EFD BCG treatment on airway inflammation using a chronic model of asthma in mice. Results: Foxp3 expression peaked in the inguinal draining lymph-nodes (iDLNs) 2-4 days after EFD BCG treatment whereas it was long-term observed in spleen (days 7 to 90). This increase in Foxp3 expression was also found in lungs upon intranasal ovalbumin (OVA) challenge in OVA-sensitized mice. The loss of protection 4 months after EFD BCG treatment was correlated with the end of this phenomenon. Moreover, major lung inflammation hallmarks of severe asthma after multiple allergen challenges promoting chronic airway inflammation in OVA sensitized mice were reduced by EFD BCG treatment: AHR, eosinophils and neutrophils in bronchoalveolar lavage (BAL), mucus metaplasia, Th2 as well as Th17 cytokine levels in BAL and sera. EFD BCG treatment also enhances PPAR-γ expression and regulates NF-κBp65 translocation in lung extracts in this model of chronic asthma. Conclusions: EFD BCG treatment induced long-term protective effect associated to Foxp3 Tregs in the spleen and lungs in an acute model of asthma and inhibits AHR in a chronic model of asthma. EFD BCG could be a new and promising immuno-modulatory alternative treatment to corticoids in severe human asthma. 展开更多
关键词 ASTHMA Foxp3 killed BCG Modulation Regulatory T Cells
下载PDF
使用供体精子行IVF/ICSI-ET助孕的新生儿结局回顾性分析
6
作者 朱俞欢 李宁 +2 位作者 张云 周玲 许常龙 《生殖医学杂志》 CAS 2024年第2期155-160,共6页
目的探讨使用供体精子行体外受精/卵胞浆内单精子注射-胚胎移植(IVF/ICSI-ET)助孕,是否会给新生儿结局带来不良影响。方法回顾性分析2011年4月至2021年4月于我院生殖医疗中心行IVF/ICSI-ET治疗后获临床妊娠并活产的6926例新生儿及其母... 目的探讨使用供体精子行体外受精/卵胞浆内单精子注射-胚胎移植(IVF/ICSI-ET)助孕,是否会给新生儿结局带来不良影响。方法回顾性分析2011年4月至2021年4月于我院生殖医疗中心行IVF/ICSI-ET治疗后获临床妊娠并活产的6926例新生儿及其母亲的临床资料。根据不同精子来源分为两组:夫精组(n=6153)和供精组(n=773),比较两组不孕女性的一般资料、助孕资料、不同分娩胎数(单胎/双胎)及不同助孕方式(IVF/ICSI)的新生儿结局。结果两组间不孕女性的平均年龄比较无显著差异(P>0.05),供精组的平均不孕年限[(5.99±3.66)年vs.(4.57±3.13)年]、原发不孕女性占比(61.19%vs.40.32%)、IVF助孕受精方式占比(95.34%vs.83.16%)、移植优质胚胎率(96.63%vs.95.22%)、双胎分娩数占比(47.09%vs.42.16%)均显著高于夫精组(P<0.05);而体质量指数(BMI)显著低于夫精组[(21.15±2.69)kg/m^(2) vs.(21.57±2.82)kg/m^(2),P<0.05]。两组间平均移植胚胎数、新生儿性别比比较无显著差异(P>0.05);无论是不同分娩胎数(单胎或双胎),还是不同助孕方式(IVF/ICSI),两组间的新生儿在平均分娩孕周、平均新生儿体重、剖宫产率、胎儿早产率、巨大儿发生率、低体重儿发生率以及出生缺陷率方面比较均无显著差异(P>0.05);两组新生儿中最常见的出生缺陷类型均分布在循环系统和泌尿生殖系统。结论使用供体精子行IVF/ICSI-ET助孕并没有增加不良新生儿结局的风险,但仍需要在未来长期随访过程中密切关注子代安全并评估相关风险。 展开更多
关键词 辅助生殖技术 供精 夫精 新生儿结局 出生缺陷
下载PDF
Wildean Ambivalent Dichotomy of Women--Taking An Ideal Husband as An Example
7
作者 辛媛媛 《海外英语》 2018年第9期186-187,190,共3页
Oscar Wilde is mainly famous for being the representative figure of Aesthetic Movement and the steadfast advocate of"art for art's sake". Although being influenced by the traditional dichotomy of women, ... Oscar Wilde is mainly famous for being the representative figure of Aesthetic Movement and the steadfast advocate of"art for art's sake". Although being influenced by the traditional dichotomy of women, Wilde does try to add some personal elements during this process. In one of his social comedies, An Ideal Husband, this wildean characteristic is more obvious. This essay attempts to reveal those hidden images which are employed by Wilde to represent his female characters and tries to show the Wilde's improvement of the traditional dichotomy. 展开更多
关键词 Wilde An ideal husband DiCHOTOmy PEARL RUBY
下载PDF
Monster,Madman or Victim? The Judgment of Maycomb Society and the Mystery of Boo Radley from the Book To Kill A Mockingbird
8
作者 钟茵婷 《海外英语》 2018年第19期185-186,190,共3页
To Kill A Mockingbird is a novel written by Harper Lee. In the novel, Lee reveals the situation happened in Maycomb city and depicts Arthur(Boo) Radley, a mysterious hermit who is recognized as a madman by citizens. M... To Kill A Mockingbird is a novel written by Harper Lee. In the novel, Lee reveals the situation happened in Maycomb city and depicts Arthur(Boo) Radley, a mysterious hermit who is recognized as a madman by citizens. My paper is going to argue for Boo that he is not a madman, being locked out by his father; instead, he chooses to be a hermit due to the awfulness of the city:its prevalent gossip, its racial inequality and its lawless policies. 展开更多
关键词 To kill A Mockingbird BOO Radley Maycomb SOCiETY Gossip RACiAL inequality lawless policies
下载PDF
A Note on Classification of Spatially Homogeneous Rotating Space-Times According to Their Teleparallel Killing Vector Fields in Teleparallel Theory of Gravitation
9
作者 Ghulam Shabbir Suhail Khan Amjad Ali 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第2期268-272,共5页
In this paper we classify spatially homogeneous rotating space-times according to their teleparallel Killing vector fields using direct integration technique.It turns out that the dimension of the teleparallel Killing... In this paper we classify spatially homogeneous rotating space-times according to their teleparallel Killing vector fields using direct integration technique.It turns out that the dimension of the teleparallel Killing vector fields is 5 or 10.In the case of 10 teleparallel Killing vector fields the space-time becomes Minkowski and all the torsion components are zero.Teleparallel Killing vector fields in this case are exactly the same as in general relativity.In the cases of 5 teleparallel Killing vector fields we get two more conservation laws in the teleparallel theory of gravitation.Here we also discuss some well-known examples of spatially homogeneous rotating space-times according to their teleparallel Killing vector fields. 展开更多
关键词 时间平移 划分空间 引力理论 向量场 旋转 分类 闵可夫斯基 广义相对论
下载PDF
《日化产品驱螨、抑螨和杀螨性能的评价方法》(T/CHCIA 002—2022)解读
10
作者 湛孝东 蒋峰 +1 位作者 陈国庆 张大存 《热带病与寄生虫学》 CAS 2024年第2期65-67,96,共4页
《日化产品驱螨、抑螨和杀螨性能的评价方法》(T/CHCIA 002—2022)是我国对除螨日化产品进行驱螨、抑螨和杀螨性能评价的第一个标准。本标准于2022年10月30日发布,2022年11月30日实施。本文对标准的制定背景、编制过程与方法、主要内容... 《日化产品驱螨、抑螨和杀螨性能的评价方法》(T/CHCIA 002—2022)是我国对除螨日化产品进行驱螨、抑螨和杀螨性能评价的第一个标准。本标准于2022年10月30日发布,2022年11月30日实施。本文对标准的制定背景、编制过程与方法、主要内容、实施与宣贯重点等方面进行了解读,为相关科研院所、高等院校以及企业的专业人员开展日化产品除螨效果评价与研究提供参考。 展开更多
关键词 日化产品 粉螨 驱螨 抑螨 杀螨 评价方法 团体标准
下载PDF
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
11
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期106-133,共28页
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo... As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm. 展开更多
关键词 Advanced Persistent Threats (APT) Attack Phases Attack Surface DEFENSE-iN-DEPTH Disaster Recovery (DR) incident Response Plan (iRP) intrusion Detection Systems (iDS) intrusion Prevention System (iPS) Key Risk indicator (KRi) Layered Defense Lockheed Martin kill Chain Proactive Defense Redundancy Risk Management Threat intelligence
下载PDF
Cultural Characteristics and Value Connotation of Female Status From Husband-Wife Intimacy Perspective in China
12
作者 Helin Liu Liyou Xiong 《Cultural and Religious Studies》 2016年第10期623-632,共10页
下载PDF
具有非退化Killing型的余分裂李超代数 被引量:8
13
作者 夏利猛 沈彩霞 《东北师大学报(自然科学版)》 CAS CSCD 北大核心 2009年第4期9-12,共4页
借助于Killing型和Casimir算子的性质,证明了对于复数域上具有非退化Killing型的典型单李超代数的伴随作用.其具有李超余代数结构,从而使李超代数是余分裂的.
关键词 余分裂 李超代数 伴随表示 killiNG型
下载PDF
Hopf代数的Killing型 被引量:5
14
作者 王志华 李立斌 《扬州大学学报(自然科学版)》 CAS CSCD 2006年第3期9-12,共4页
在有限维Hop f代数上引入K illing型的定义并探讨其基本性质,指出K illing型的非退化性与Hop f代数的半单性不是等价的.对于有限维半单Hop f代数,得到Hop f代数H的伴随作用分解式H=Z(H)ker adt,并讨论了Z(H)与ker adt在K illing型框架... 在有限维Hop f代数上引入K illing型的定义并探讨其基本性质,指出K illing型的非退化性与Hop f代数的半单性不是等价的.对于有限维半单Hop f代数,得到Hop f代数H的伴随作用分解式H=Z(H)ker adt,并讨论了Z(H)与ker adt在K illing型框架下的关系.最后,给出了一些Hop f代数的K illing型的例子. 展开更多
关键词 HOPF代数 killiNG型 伴随作用
下载PDF
一类Hopf代数的Killing根 被引量:2
15
作者 唐帅 王志华 《河北师范大学学报(自然科学版)》 CAS 北大核心 2012年第1期21-23,共3页
主要考虑了一类Hopf代数的Killing根.作为特例,得到了Taft代数与广义Taft代数的Killing根.这些Killing根均为包含Jacobson根的Hopf理想,特别地Taft代数的Killing根为Jacobson根.
关键词 HOPF代数 killing根 Taft代数 广义Taft代数
下载PDF
具有处处非零Killing向量场的nearly Khler流形 被引量:1
16
作者 张留伟 李兴校 贾志刚 《河南师范大学学报(自然科学版)》 CAS CSCD 北大核心 2010年第4期33-35,共3页
研究了在nearly Khler流形上某种处处非零Killing向量场的存在性与流形的拓扑和几何之间的联系.并且得到了下面的主要结论及其推论:设(M2n,g,J)是一个2n维的近复流形.如果在M上存在一个处处非零的Killing向量场ξ,使得ξ*∧Jξ*是闭2... 研究了在nearly Khler流形上某种处处非零Killing向量场的存在性与流形的拓扑和几何之间的联系.并且得到了下面的主要结论及其推论:设(M2n,g,J)是一个2n维的近复流形.如果在M上存在一个处处非零的Killing向量场ξ,使得ξ*∧Jξ*是闭2次形式,则M局部微分同胚于M1×M2,其中M1和M2分别是分布V∶=span{ξ,Jξ}和分布H:=span{ξ,Jξ}⊥的极大积分子流形. 展开更多
关键词 NEARLY Khler流形 killiNG向量场 闭2次形式
下载PDF
英汉隐喻对比与一词多义研究——以“杀”和“kill”为例 被引量:3
17
作者 陈珞瑜 《中南民族大学学报(人文社会科学版)》 CSSCI 北大核心 2009年第5期168-171,共4页
通过对汉语"杀"和英语"kill"的意义领域比较,以期揭示它们众多义项的隐喻拓展轨迹和隐藏在语义转移现象背后的人类心理和认知规律。比较结果发现,这一组对应词实际上存在诸多的不对应。
关键词 “杀” kill 认知 隐喻
下载PDF
黎曼流形上共形Killing p-形式的对偶性(英文) 被引量:1
18
作者 刘继志 蔡开仁 《数学杂志》 CSCD 北大核心 1990年第2期157-160,共4页
H.Yanamoto 在[2],[3]中有一猜想:对于任何黎曼流形 M^n,共形 Killingp-形式 u 的对偶*u 还是共形 Killing 形式。当 n=3时,这一结论的正确性由[3]给出.本文证明了对任何高维流形,结论都正确.
关键词 黎曼流形 共形 killing形式 对偶
下载PDF
容有Killing向量场的Riemannian流形的超曲面 被引量:1
19
作者 张三华 《四川师范大学学报(自然科学版)》 CAS CSCD 1999年第6期691-694,共4页
-Mn 是容有Killing 向量场X的Riemannian 流形Mn+1 的超面曲.沿超曲面-Mn ,向量场X有分解式:X= B-X+ αN.本文获得了超曲面-Mn 上诱导向量场-X是-Mn 上的仿射Killing 向量场的... -Mn 是容有Killing 向量场X的Riemannian 流形Mn+1 的超面曲.沿超曲面-Mn ,向量场X有分解式:X= B-X+ αN.本文获得了超曲面-Mn 上诱导向量场-X是-Mn 上的仿射Killing 向量场的两个充分必要条件,以及-X是-Mn 上的Killing 向量场一个充分必要条件. 展开更多
关键词 killiNG向量场 全脐超曲面 黎曼流形 超曲面
下载PDF
Hopf代数的Killing型与伴随表示 被引量:1
20
作者 王志华 周晓 《扬州教育学院学报》 2008年第3期1-3,共3页
首先,得到了有限维半单Hopf代数的killing型的根的刻划;其次,考虑了Hopf代数的伴随表示与Killing型的非退化性之间的关系,证明了Hopf代数的killing型非退化当且仅当其伴随表示是半单的.
关键词 HOPF代数 killiNG型 伴随表示
下载PDF
上一页 1 2 249 下一页 到第
使用帮助 返回顶部