期刊文献+
共找到846篇文章
< 1 2 43 >
每页显示 20 50 100
Relevance theory: the Cognitive Pragmatic Foundation of Code-switching
1
作者 令狐曼 《科教导刊》 2015年第9期153-154,共2页
The paper will discuss the process of code-switching and its cognitive pragmatic motivation from the point of relevance.And code-switching is also regarded as a kind of communicative strategy.The process of the produc... The paper will discuss the process of code-switching and its cognitive pragmatic motivation from the point of relevance.And code-switching is also regarded as a kind of communicative strategy.The process of the production of code-switching is also the cooperation and mutual constrain of communicator’s cognitive environment and ability.Cognitive effect can be obtained through communicator’s processing cognitive environment with their cognitive ability.In this process,the cooperation of cognitive ability and cognitive environment gives a guarantee to successful communication with code-switching. 展开更多
关键词 RELEVANCE theory COGNITIVE CONTEXT CODE-SWITCHING
下载PDF
Regular Quasi Cyclic Low Density Parity Check Codes with Girth 8 from Elementary Number Theory 被引量:1
2
作者 He Guofeng Li Xiangxue +2 位作者 Li Qiang Zhou Zhiheng Zheng Dong 《China Communications》 SCIE CSCD 2012年第4期80-88,共9页
This paper is concerned with (3,n) and (4,n) regular quasi-cyclic Low Density Parity Check (LDPC) code constructions from elementary number theory.Given the column weight,we determine the shift values of the circulant... This paper is concerned with (3,n) and (4,n) regular quasi-cyclic Low Density Parity Check (LDPC) code constructions from elementary number theory.Given the column weight,we determine the shift values of the circulant permutation matrices via arithmetic analysis.The proposed constructions of quasi-cyclic LDPC codes achieve the following main advantages simultaneously:1) our methods are constructive in the sense that we avoid any searching process;2) our methods ensure no four or six cycles in the bipartite graphs corresponding to the LDPC codes;3) our methods are direct constructions of quasi-cyclic LDPC codes which do not use any other quasi-cyclic LDPC codes of small length like component codes or any other algorithms/cyclic codes like building block;4)the computations of the parameters involved are based on elementary number theory,thus very simple and fast.Simulation results show that the constructed regular codes of high rates perform almost 1.25 dB above Shannon limit and have no error floor down to the bit-error rate of 10-6. 展开更多
关键词 quasi-cyclic LDPC code error floor Shannon limit number theory
下载PDF
Full Diversity Reception Based on Dempster-Shafer Theory for Network Coding with Multiple-Antennas Relay 被引量:1
3
作者 SUN Yanhua YANG Yi +1 位作者 LI Yonghua ZHANG Yanhua 《China Communications》 SCIE CSCD 2015年第10期76-90,共15页
In this paper,a two-way relay system which achieves bi-directional communication via a multiple-antenna relay in two time slots is studied.In the multiple access(MA) phase,the novel receive schemes based on Dempster-S... In this paper,a two-way relay system which achieves bi-directional communication via a multiple-antenna relay in two time slots is studied.In the multiple access(MA) phase,the novel receive schemes based on Dempster-Shafer(D-S) evidence theory are proposed at the relay node.Instead of traditional linear detection,the first proposed MIMO-DS NC scheme adopts D-S evidence theory to detect the signals of each source node before mapping them into network-coded signal.Moreover,different from traditional physical-layer network coding(PNC) based on virtual MIMO model,the further proposed MIMO-DS PNC comes from the vector space perspective and combines PNC mapping with D-S theory to obtain network-coded signal without estimating each source node signal.D-S theory can appropriately characterize uncertainty and make full use of multiple evidence source information by Dempster's combination rule to obtain reliable decisions.In the broadcast(BC) phase,the space-time coding(STC) and antenna selection(AS) schemes are adopted to achieve transmit diversity.Simulation results reveal that the STC and AS schemes both achieve full transmit diversity in the BC phase and the proposed MIMO-DS NC/PNC schemes obtain better end-to-end BER performance and throughputs compared with traditional schemes with a little complexity increasing and no matter which scheme is adopted in the BC phase,MIMO-DS PNC always achieves full end-to-end diversity gain as MIMO-ML NC but with a lower complexity and its throughput approaches the throughput of MIMO-ML NC in high SNR regime. 展开更多
关键词 network coding MIMO-DS NC/PNC Dempster-Shafer evidence theory twoway multiple antennas relay system
下载PDF
An Audio-taped Study of Code-switching in College EFL Learners:with Special Reference to the Theory of Adaptation
4
作者 耿文婕 《海外英语》 2012年第4X期229-232,共4页
The present study examines the phenomenon of code-switching in college EFL learners with special reference to the theory of adaptation.Through the audio-taped observation,it identifies four major categories of code-sw... The present study examines the phenomenon of code-switching in college EFL learners with special reference to the theory of adaptation.Through the audio-taped observation,it identifies four major categories of code-switching and discusses the salient levels of certain cases. 展开更多
关键词 CODE-SWITCHING theory of ADAPTATION EFL LEARNERS
下载PDF
On Code-switching in Chinese Popular Songs from the Perspective of Adaptation Theory
5
作者 李萱 《科技信息》 2014年第10期220-221,226,共3页
With the advancing of Globalization,the language contact among people all over the world has become increasingly frequently.As the direct outcome of the language contact,code-switching has deeply rooted in people’s d... With the advancing of Globalization,the language contact among people all over the world has become increasingly frequently.As the direct outcome of the language contact,code-switching has deeply rooted in people’s daily life as a common phenomenon which has drew great concerns.This paper aims at doing the research based on Chinese popular songs as the corpuses which are collected from the Internet with the method of empirical studies.First the corpuses are classified according to different criteria and then with the theory of Adaptation,code switching has been studied through the adaptation to social conventions,linguistic realities and the psychology motivations.As a normal linguistic as well as social phenomenon,code-switching should be treated with strict and respect. 展开更多
关键词 POPULAR SONGS LINGUISTICS CODE-SWITCHING Adaptatio
下载PDF
Analysis on Chinese/English Code-Switching in Computer-Mediated Communication Based on Meme Theory
6
作者 张淳 石娟丽 《海外英语》 2011年第7X期11-14,共4页
Nowadays,computer-mediated communication(CMC) becomes one of the most convenient ways for people to connect with each other in which Chinese/English code-switching has been frequently used and widely spread.The articl... Nowadays,computer-mediated communication(CMC) becomes one of the most convenient ways for people to connect with each other in which Chinese/English code-switching has been frequently used and widely spread.The article will memeticly interpret this language phenomenon based on the authentic examples collected from various kinds of CMC,and point out that the Chinese/English code-switching in CMC is a kind of strong memeplex which includes many different strong memes,resulting in the popularity of Chinese/English code-switching in CMC. 展开更多
关键词 Chinese/English CODE-SWITCHING computer mediated communication(CMC) MEME theory strong MEMES
下载PDF
The Review of Chinese Literary Anthropology Theory's Construction Since 21 st Century
7
作者 GONG Wei-jun SUN Feng-juan 《Journal of Literature and Art Studies》 2017年第4期410-420,共11页
Important changes have taken place in the study of Chinese literary anthropology since 21st century. Chinese literary anthropologists make every effort to explore and construct one theoretical system which is suitable... Important changes have taken place in the study of Chinese literary anthropology since 21st century. Chinese literary anthropologists make every effort to explore and construct one theoretical system which is suitable for China's local culture consciousness. Its development context is clear: from literary text to culture text, and from the mythological outlook of literary standard to the mythological outlook driven by faith. We need rely on quadruple-evidence approaches which are integrated with multidisciplinary knowledge to reconstruct Chinese culture of the great tradition and little tradition theory from the new perspective of mythistory, to elaborate N-level coding theory, and to explore the faith in jade myth as the potential driving force of the beginning of civilization. By combing the complete symbolic process from the faith in jade myth to Chinese civilization core values, we wish to seek out the deep cultural genes among Chinese civilization identities ultimately. 展开更多
关键词 quadruple-evidence approach mythistory great tradition and little tradition faith in jade myth n-level coding theory white jade worship
下载PDF
A Study of Code-Switching in Students' Talk in College English Class
8
作者 席红梅 赵快 《海外英语》 2015年第4期133-134,共2页
Code-switching between English and Chinese usually occurs in students' talk when they are involved in taking communicative language activities in college English class. This paper studies the situations in which s... Code-switching between English and Chinese usually occurs in students' talk when they are involved in taking communicative language activities in college English class. This paper studies the situations in which students are likely to use codeswitching and analyzes it from the perspective of the mental world in Verscheren's Adaptation Theory. It shows that inadequate mastery of English language, cultural differences and the improper adjustment to context may lead to students' using of codeswitching. It also shows that the use of code-switching in students' talk adapts to students' cognitive elements and emotive elements as well. 展开更多
关键词 STUDENTS TALK CODE-SWITCHING ADAPTATION theory
下载PDF
The Application of Communication Accommodation Theory to Identity Construction:A Case Study of My Fair Lady
9
作者 罗敏 《海外英语》 2012年第17期182-184,共3页
My Fair Lady is a movie about how a lower class flower girl turns to an upper class lady by simply changing her language at the help of a linguist.It demonstrates the importance of communication accommodation,especial... My Fair Lady is a movie about how a lower class flower girl turns to an upper class lady by simply changing her language at the help of a linguist.It demonstrates the importance of communication accommodation,especially convergent accommodation,in using language as code and behavior to construct identity in the target community. 展开更多
关键词 SOCIOLINGUISTICS Communication ACCOMMODATION Theor
下载PDF
A Study of EFL Teachers' code-switching in Vocational College Intensive Reading Classroom
10
作者 程亚玲 《海外英语》 2013年第24期264-265,267,共3页
In the past 30 years, code-switching has been a focus in the field of linguistics in western countries. Researchers stud?ied it from different angles and have made a lot of findings.However, the researchers in China b... In the past 30 years, code-switching has been a focus in the field of linguistics in western countries. Researchers stud?ied it from different angles and have made a lot of findings.However, the researchers in China begin their studies on this issue un?til the last decade. Thus,the relevent empirical studies were less and most of them only use students from the classrooms in the sec?ondary schools or the undergraduates in the universities as the subjects.They paid little attention to the EFL classrooms in the vo?cational colleges. Vocational college students are poor in English foundation. English teachers can not finish their teaching mission in English classroom, so the use of code-switching becomes a very common phenomenon in EFL class of vocational college. In order to make teaching and learning promote and enhance each other, according to previous research findings, this paper do a fur?ther study about the teachers' use of code switching in the vocational college English intensive reading classes in China. 展开更多
关键词 CODE-SWITCHING Jef Verschueren’s theory Yu Guodong
下载PDF
SP3-coupled global variance reduction method based on RMC code 被引量:2
11
作者 Qing-Quan Pan Teng-Fei Zhang +2 位作者 Xiao-Jing Liu Hui He Kan Wang 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2021年第11期42-51,共10页
A global variance reduction(GVR)method based on the SPN method is proposed.First,the global multi-group cross-sections are obtained by Monte Carlo(MC)global homogenization.Then,the SP3 equation is solved to obtain the... A global variance reduction(GVR)method based on the SPN method is proposed.First,the global multi-group cross-sections are obtained by Monte Carlo(MC)global homogenization.Then,the SP3 equation is solved to obtain the global flux distribution.Finally,the global weight windows are approximated by the global flux distribution,and the GVR simulation is performed.This GVR method is implemented as an automatic process in the RMC code.The SP3-coupled GVR method was tested on a modified version of C5 G7 benchmark with a thickened water shield.The results show that the SP3-coupled GVR method can improve the efficiency of MC criticality calculation. 展开更多
关键词 RMC code Global homogenization Variance reduction SPN theory
下载PDF
Beyond a Quartic Polynomial Modeling of the DNA Double-Helix Genetic Code 被引量:3
12
作者 Hans Hermann Otto 《Journal of Applied Mathematics and Physics》 2021年第10期2558-2577,共20页
By combination of finite number theory and quantum information, the complete quantum information in the <em>DNA</em> genetic code has been made likely by <em>Planat et al</em>. (2020). In the p... By combination of finite number theory and quantum information, the complete quantum information in the <em>DNA</em> genetic code has been made likely by <em>Planat et al</em>. (2020). In the present contribution a varied quartic polynomial contrasting the polynomial used by <em>Planat et al</em>. is proposed that considered apart from the golden mean also the fifth power of this dominant number of nature to adapt the code information. The suggested polynomial is denoted as <em>g</em>(<em>x</em>) = <em>x</em><sup>4</sup> - <em>x</em><sup>3</sup> - (4 - <em><i style="white-space:normal;">&#981;</i></em><sup>2</sup> )<em>x</em><sup>2</sup> + (4 – <i>&#981;</i><sup>2</sup>)x + 1, where <img src="Edit_40efe764-d690-499f-8424-129f9ca46f78.bmp" alt="" /> is the golden mean. Its roots are changed to more golden mean based ones in comparison to the <em>Planat</em> polynomial. The new coefficients 4 – <em>&#981;</em><sup>2</sup> instead of 4 would implement the fifth power of the golden mean indirectly applying <img src="Edit_5b44b644-3f59-4fad-a586-ec5345ba6be4.bmp" alt="" />. As an outlook, it should be emphesized that the connection between genetic code and resonance code of the <em>DNA</em> may lead us to a full understanding of how nature stores and processes compacted information and what indeed is consciousness linking everything with each other suggestedly mediated by all-pervasive dark constituents of matter respectively energy. The number-theoretical approach to <em>DNA</em> coding leads to the question about the helical structure of the electron. 展开更多
关键词 DNA Genetic Code DNA Resonance Code Qartic Polymial Golden Mean Silver Mean Fifth Power of the Golden Mean Fiboacci Number 13 α-Helix Icosahedron Equation Number theory Quantum Computation Consciousness Dark Energy Electron’s Structure
下载PDF
ERROR-DETECTING CODES AND UNDETECTED ERROR PROBABILITIES
13
作者 徐大专 《Journal of Electronics(China)》 1994年第1期37-43,共7页
The definition of good codes for error-detection is given. It is proved that a (n, k) linear block code in GF(q) are the good code for error-detection, if and only if its dual code is also. A series of new results abo... The definition of good codes for error-detection is given. It is proved that a (n, k) linear block code in GF(q) are the good code for error-detection, if and only if its dual code is also. A series of new results about the good codes for error-detection are derived. New lower bounds for undetected error probabilities are obtained, which are relative to n and k only, and not the weight structure of the codes. 展开更多
关键词 Information theory Linear BLOCK CODE Dual CODE Undetected ERROR PROBABILITY GOOD CODE for error-detection
下载PDF
ON THE MEAN VALUE AND VARIANCE OF DISTANCE DISTRIBUTION OF NON-LINEAR CODES IN GF(q)
14
作者 Fu Fangwei Shen Shiyi(Department of Mathematics, Nankai University, Tianjin 300071) 《Journal of Electronics(China)》 1998年第1期58-62,共5页
This paper presents the lower bounds and upper bounds for the mean value and variance of distance distribution of non-linear codes in GF(q). By presenting several examples, it is shown that these bounds could be achie... This paper presents the lower bounds and upper bounds for the mean value and variance of distance distribution of non-linear codes in GF(q). By presenting several examples, it is shown that these bounds could be achieved. 展开更多
关键词 coding theory DISTANCE distribution Althofer-Sillke INEQUALITY MacWilliams-Delsarte IDENTITY
下载PDF
Code-Based Preservation Mechanism of Electronic Record in Electronic Record Center of Cloud Storage
15
作者 Yan Leng Yongjun Ren +1 位作者 Chengshan Qian Jinyue Xia 《Journal on Big Data》 2019年第1期39-45,共7页
With the rapid development of E-commerce and E-government,there are so many electronic records have been produced.The increasing number of electronic records brings about storage difficulties,the traditional electroni... With the rapid development of E-commerce and E-government,there are so many electronic records have been produced.The increasing number of electronic records brings about storage difficulties,the traditional electronic records center is difficult to cope with the current fast growth requirements of electronic records storage and management.Therefore,it is imperative to use cloud storage technology to build electronic record centers.However,electronic records also have weaknesses in the cloud storage environment,and one of them is that once electronic record owners or managers lose physical control of them,the electronic records are more likely to be tampered with and destroyed.So,the paper builds a reliable electronic records preservation system based on coding theory.It can effectively guarantee the reliability of record storage when the electronic record is damaged,and the original electronic record can be restored by redundant coding,thus ensuring the reliable storage of electronic records. 展开更多
关键词 ELECTRONIC RECORD CLOUD storage PRESERVATION mechanism coding theory
下载PDF
Construction of New Codes from Given Ones in an Additive Channel
16
作者 Garib Movsisyan 《Journal of Information Security》 2016年第3期165-171,共7页
In the present work, a construction making possible creation of an additive channel  of cardinality s and rank r for arbitrary integers s, r, n (r≤min (n,s-1)), as well as creation of a code  correcting err... In the present work, a construction making possible creation of an additive channel  of cardinality s and rank r for arbitrary integers s, r, n (r≤min (n,s-1)), as well as creation of a code  correcting errors of the channel A is presented. 展开更多
关键词 Additive Channel Golay Code Classical coding theory T-Order Neighborhood Correcting Code Binary Alphabet CARDINALITY
下载PDF
基于混沌理论与DNA动态编码的卫星图像加密算法 被引量:3
17
作者 肖嵩 陈哲 +2 位作者 杨亚涛 马英杰 杨腾 《电子与信息学报》 EI CAS CSCD 北大核心 2024年第3期1128-1137,共10页
针对卫星图像在传输、存储过程中涉及的信息安全问题,该文提出一种新型的基于混沌理论与DNA动态编码的卫星图像加密算法。首先,提出一种改进型无限折叠混沌映射,拓宽了原有无限折叠混沌映射的混沌区间。之后,结合改进型Chebyshev混沌映... 针对卫星图像在传输、存储过程中涉及的信息安全问题,该文提出一种新型的基于混沌理论与DNA动态编码的卫星图像加密算法。首先,提出一种改进型无限折叠混沌映射,拓宽了原有无限折叠混沌映射的混沌区间。之后,结合改进型Chebyshev混沌映射与SHA-256哈希算法,生成加密算法的密钥流,提升算法的明文敏感性。然后,利用混沌系统的状态值对Hilbert局部置乱后的像素进行DNA编码,实现DNA动态编码,解决了DNA编码规则较少所带来的容易受到暴力攻击的弱点。最后,使用混沌序列完成进一步混沌加密,从而彻底混淆原始像素信息,增加加密算法的随机性与复杂性,得到密文图像。实验结果表明,该算法具有较好的加密效果和应对各种攻击的能力。 展开更多
关键词 卫星图像加密 混沌理论 DNA动态编码 哈希算法
下载PDF
Pragmatic Adaptability of Teacher's Codeswitching in English Classes
18
作者 王伊阳 《海外英语》 2016年第15期228-231,共4页
In this paper,the author applies Jef Verschueren's Pragmatics as a Theory of Linguistic Adaptation as the theoretical basement.And the generation of code- switching is discussed under the guidance of Yu Guodong... In this paper,the author applies Jef Verschueren's Pragmatics as a Theory of Linguistic Adaptation as the theoretical basement.And the generation of code- switching is discussed under the guidance of Yu Guodong's Adaptation Model as well.Conclusions can be drawn as: teacher's English/Chinese codeswitching is an adaptation to linguistic reality,social conventions and teacher's psychological intentions,the first two being considered as passive switching and the last being active switching.Teacher's codeswitching as understanding-facilitating strategy forms the most important factor that triggers teacher's English/Chinese codeswitching. 展开更多
关键词 CODE-SWITCHING language teaching Pragmatics as a theory of Linguistic Adaptation
下载PDF
安全知识模态改善网络钓鱼敏感性认知机理研究
19
作者 王志英 李桂云 +1 位作者 王念新 葛世伦 《管理工程学报》 CSSCI CSCD 北大核心 2024年第6期246-260,共15页
网络钓鱼敏感性的缺乏导致人因成为网络钓鱼中最薄弱的环节。网络安全管理部门给网民灌输安全知识对提高其敏感性以主动防御网络钓鱼具有重要意义。本文基于双重编码理论,借助功能性近红外光谱技术,采用2(前测、后测)×2(言语知识... 网络钓鱼敏感性的缺乏导致人因成为网络钓鱼中最薄弱的环节。网络安全管理部门给网民灌输安全知识对提高其敏感性以主动防御网络钓鱼具有重要意义。本文基于双重编码理论,借助功能性近红外光谱技术,采用2(前测、后测)×2(言语知识、视觉知识)×2(难识别、易识别)的混合实验设计,探究两种安全知识模态改善网络钓鱼敏感性认知机理的差异。研究结果表明,两种模态安全知识干预均显著提高网络钓鱼敏感性,相比言语知识,视觉知识对网络钓鱼敏感性的影响更积极;两种模态安全知识干预对执行功能的增强效果存在差异,执行功能增强越高时网络钓鱼敏感性效果提升越好;执行功能在安全知识模态改善网络钓鱼敏感性过程中起中介作用;网络钓鱼识别难度存在调节作用,识别高难度的网络钓鱼时,视觉知识干预效果更显著。研究结论揭示了安全知识模态改善网络钓鱼敏感性的认知神经机理,对从模态着手进行安全知识灌输以提高网民的网络钓鱼敏感性具有一定的实践指导作用。 展开更多
关键词 网络钓鱼敏感性 安全知识模态 功能性近红外光谱技术 双重编码理论
下载PDF
企业创新生态系统演化影响因素识别——基于扎根理论编码的探索性研究
20
作者 顾桂芳 李文元 《科技管理研究》 CSSCI 2024年第12期1-9,共9页
企业创新生态系统在中国尚属新生事物,目前许多企业创新生态系统的演化正以惊人的速度失败,不仅影响了企业创新创造活力的发挥,而且还严重阻碍了中国科技创新能力的提升及经济社会的发展。针对学界关于企业创新生态系统演化影响因素研... 企业创新生态系统在中国尚属新生事物,目前许多企业创新生态系统的演化正以惊人的速度失败,不仅影响了企业创新创造活力的发挥,而且还严重阻碍了中国科技创新能力的提升及经济社会的发展。针对学界关于企业创新生态系统演化影响因素研究较少的现状,遵循扎根理论的编码方法步骤,对中国10家创新生态系统核心企业的董事长、总经理、研发部长、事业部首席执行官进行半结构化访谈,结合有关公开披露信息、新闻报道、期刊文献等二手资料收集,构建企业创新生态系统演化影响因素模型,包括4个主范畴以及对应的10个子范畴。结果发现:吸收能力(获取与消化外部知识、转化与应用外部知识、研发投入)、组织间信任、网络嵌入性(关系嵌入、网络中心性)和环境冗余度(基础设施支撑性、配套商可得性、人才支撑、政策支持)这4个主范畴对企业创新生态系统演化均存在显著影响,但对系统影响的作用方式和路径不同,其中吸收能力是内驱因素,组织间信任是微观情境因素,网络嵌入性是中观情境因素,环境冗余度是宏观情境因素。最后基于研究结论,分别得出对政府和创新生态系统核心企业在提高环境冗余度、营造信任文化环境、搭建信息资源共享战略平台和充分重视外部知识对现有知识的有用性、坚持创新生态系统思维等方面的启示。 展开更多
关键词 企业创新生态系统 系统演化 核心企业主导 影响因素识别 扎根理论编码 企业创新创造
下载PDF
上一页 1 2 43 下一页 到第
使用帮助 返回顶部