期刊文献+
共找到1,014篇文章
< 1 2 51 >
每页显示 20 50 100
SOME NEW IDENTITIES OF ROGERS-RAMANUJAN TYPE
1
作者 谷晶 张之正 《Acta Mathematica Scientia》 SCIE CSCD 2024年第1期129-142,共14页
In this paper,we establish two transformation formulas for nonterminating basic hypergeometric series by using Carlitz's inversions formulas and Jackson s transformation formula.In terms of application,by speciali... In this paper,we establish two transformation formulas for nonterminating basic hypergeometric series by using Carlitz's inversions formulas and Jackson s transformation formula.In terms of application,by specializing certain parameters in the two transformations,four Rogers-Ramanujan type identities associated with moduli 20 are obtained. 展开更多
关键词 Carlitz's inversion Q-SERIES Rogers-Ramanujan type identities
下载PDF
Enhancing Identity Protection in Metaverse-Based Psychological Counseling System
2
作者 Jun Lee Hanna Lee +1 位作者 Seong Chan Lee Hyun Kwon 《Computers, Materials & Continua》 SCIE EI 2024年第1期617-632,共16页
Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regard-ing client identity.However,these systems often face challenges concerning voice data leaks and the subopt... Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regard-ing client identity.However,these systems often face challenges concerning voice data leaks and the suboptimal communication of the client’s non-verbal expressions,such as facial cues,to the counselor.This study proposes a metaverse-based psychological counseling system designed to enhance client identity protection while ensuring efficient information delivery to counselors during non-face-to-face counseling.The proposed systemincorporates a voicemodulation function that instantlymodifies/masks the client’s voice to safeguard their identity.Additionally,it employs real-time client facial expression recognition using an ensemble of decision trees to mirror the client’s non-verbal expressions through their avatar in the metaverse environment.The system is adaptable for use on personal computers and smartphones,offering users the flexibility to access metaverse-based psychological counseling across diverse environments.The performance evaluation of the proposed system confirmed that the voice modulation and real-time facial expression replication consistently achieve an average speed of 48.32 frames per second or higher,even when tested on the least powerful smartphone configurations.Moreover,a total of 550 actual psychological counseling sessions were conducted,and the average satisfaction rating reached 4.46 on a 5-point scale.This indicates that clients experienced improved identity protection compared to conventional non-face-to-face metaverse counseling approaches.Additionally,the counselor successfully addressed the challenge of conveying non-verbal cues from clients who typically struggled with non-face-to-face psychological counseling.The proposed systemholds significant potential for applications in interactive discussions and educational activities in the metaverse. 展开更多
关键词 Metaverse counseling system face tracking identity protection
下载PDF
Designing a Secure and Scalable Data Sharing Mechanism Using Decentralized Identifiers(DID)
3
作者 Iuon-Chang Lin I-Ling Yeh +2 位作者 Ching-Chun Chang Jui-Chuan Liu Chin-Chen Chang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期809-822,共14页
Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperabi... Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperability issues and rely on a single identity provider,leaving users without control over their identities.Therefore,this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers.The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity.Data is stored on InterPlanetary File System(IPFS)to avoid the risk of single points of failure and to enhance data persistence and availability.At the same time,compliance with World Wide Web Consortium(W3C)standards for decentralized identifiers and verifiable credentials increases the mechanism’s scalability and interoperability. 展开更多
关键词 Self-sovereign identity decentralized identifier blockchain
下载PDF
THE SPARSE REPRESENTATION RELATED WITH FRACTIONAL HEAT EQUATIONS
4
作者 曲伟 钱涛 +1 位作者 梁应德 李澎涛 《Acta Mathematica Scientia》 SCIE CSCD 2024年第2期567-582,共16页
This study introduces a pre-orthogonal adaptive Fourier decomposition(POAFD)to obtain approximations and numerical solutions to the fractional Laplacian initial value problem and the extension problem of Caffarelli an... This study introduces a pre-orthogonal adaptive Fourier decomposition(POAFD)to obtain approximations and numerical solutions to the fractional Laplacian initial value problem and the extension problem of Caffarelli and Silvestre(generalized Poisson equation).As a first step,the method expands the initial data function into a sparse series of the fundamental solutions with fast convergence,and,as a second step,makes use of the semigroup or the reproducing kernel property of each of the expanding entries.Experiments show the effectiveness and efficiency of the proposed series solutions. 展开更多
关键词 reproducing kernel Hilbert space DICTIONARY sparse representation approximation to the identity fractional heat equations
下载PDF
A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture
5
作者 Yi-Bo Cao Xiu-Bo Chen +6 位作者 Yun-Feng He Lu-Xi Liu Yin-Mei Che Xiao Wang Ke Xiao Gang Xu Si-Yi Chen 《Computers, Materials & Continua》 SCIE EI 2024年第2期2813-2827,共15页
Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in differ... Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in different trust domains,which has resulted in the extensive development of cross-domain authentication techniques.However,the emergence of many attackers equipped with quantum computers has the potential to launch quantum computing attacks against cross-domain authentication schemes based on traditional cryptography,posing a significant security threat.In response to the aforementioned challenges,our paper demonstrates a post-quantum cross-domain identity authentication scheme to negotiate the session key used in the cross-chain asset exchange process.Firstly,our paper designs the hiding and recovery process of user identity index based on lattice cryptography and introduces the identity-based signature from lattice to construct a post-quantum cross-domain authentication scheme.Secondly,our paper utilizes the hashed time-locked contract to achieves the cross-chain asset exchange of blockchain nodes in different trust domains.Furthermore,the security analysis reduces the security of the identity index and signature to Learning With Errors(LWE)and Short Integer Solution(SIS)assumption,respectively,indicating that our scheme has post-quantum security.Last but not least,through comparison analysis,we display that our scheme is efficient compared with the cross-domain authentication scheme based on traditional cryptography. 展开更多
关键词 Cross-domain identity authentication lattice-based cryptography blockchain hashed time-locked contract
下载PDF
SUPER WOMAN 2(SPW2)maintains organ identity in spikelets by inhibiting the expression of floral homeotic genes OsMADS3,OsMADS58,OsMADS13,and DROOPING LEAF
6
作者 Hui Zhuang Jinsong Lan +6 位作者 Qiuni Yang Xiaoyu Zhao Yuhuan Li Jingya Zhi Yalin Shen GuanghuaHe Yunfeng Li 《Journal of Integrative Agriculture》 SCIE CSCD 2024年第1期59-76,共18页
Flower organ identity in rice is mainly determined by the A-,B-,C-and E-class genes,with the majority encoding MADS-box transcription factors.However,few studies have investigated how the expression of these floral or... Flower organ identity in rice is mainly determined by the A-,B-,C-and E-class genes,with the majority encoding MADS-box transcription factors.However,few studies have investigated how the expression of these floral organ identity genes is regulated during flower development.In this study,we identified a gene named SUPER WOMAN 2(SPW2),which is necessary for spikelet/floret development in rice by participating in the regulation of the expression of pistil identity genes such as OsMADS3,OsMADS13,OsMADS58 and DL.In the spw2 mutant,ectopic stigma/ovary-like tissues were observed in the non-pistil organs,including sterile lemma,lemma,palea,lodicule,and stamen,suggesting that the identities of these organs were severely affected by mutations in SPW2.SPW2 was shown to encode a plant-specific EMF1-like protein that is involved in H3K27me3 modification as an important component of the PRC2 complex.Expression analysis showed that the SPW2 mutation led to the ectopic expression of OsMADS3,OsMADS13,OsMADS58,and DL in non-pistil organs of the spikelet.The ChIP-qPCR results showed significant reductions in the levels of H3K27me3 modification on the chromatin of these genes.Thus,we demonstrated that SPW2 can mediate the process of H3K27me3 modification of pistil-related genes to regulate their expression in non-pistil organs of spikelets in rice.The results of this study expand our understanding of the molecular mechanism by which SPW2 regulates floral organ identity genes through epigenetic regulation. 展开更多
关键词 rice(Oryza sativa) SPIKELET organ identity H3K27me3
下载PDF
Survey and clinical considerations of gender identity in lower primary school children
7
作者 Ya-Lin Zhang Hong-Mei Zhang +3 位作者 Jing-Xia Xu Qi-Ying Zhou He Wang Xiao-Cheng Pan 《World Journal of Psychiatry》 SCIE 2024年第1期36-43,共8页
BACKGROUND Gender consciousness directly affects the development of gender identity,which is a continuous and lifelong process.Meanwhile,hospitalization is a part of many children's lives and has an impact on thei... BACKGROUND Gender consciousness directly affects the development of gender identity,which is a continuous and lifelong process.Meanwhile,hospitalization is a part of many children's lives and has an impact on their gender development.AIM To investigate the current situation of gender identity in lower primary school children by conducting a survey of 202 hospitalized children in the lower grades and to provide a theoretical basis and foundation for the cultivation of gender identity and medical treatment of children based on the results.This study aims to inspire clinical medical staff to scientifically and reasonably arrange hospital wards for lower primary school children and pay attention to gender protection during the medical treatment process and to help children shape a unified and clear gender identity,which will enable them to better integrate into society and promote their personality development.METHODS The gender consciousness scale for elementary and middle school students was RESULTS Gender identity was already present in lower primary school children.The children's gender roles and gender equality consciousness were strong,exceeding the critical value,but their gender characteristics,gender identity,and gender ideal consciousness were weak.Children aged 6 had the weakest gender identity,and girls had significantly stronger gender identity than boys.CONCLUSION Gender identity is already present in lower primary school children,providing a basis and inspiration for the cultivation of gender identity and medical treatment of lower primary school children.Clinical medical staff should be aware of and understand these results and should scientifically and reasonably arrange hospital wards for lower primary school children. 展开更多
关键词 School-age children Gender consciousness Gender identity HOSPITALIZATION Gender weakening
下载PDF
Impact of Exercise Atmosphere on Adolescents’Exercise Behavior:Chain Mediating Effect of Exercise Identity and Exercise Habit
8
作者 Zhen Su Ziqiang Zhang Yonghao Zhou 《International Journal of Mental Health Promotion》 2024年第7期579-588,共10页
Appropriate physical exercise has a positive impact on adolescents’physical and mental health,but there is a serious lack of physical exercise among Chinese adolescents.How to shape their exercise behavior(EB)has bec... Appropriate physical exercise has a positive impact on adolescents’physical and mental health,but there is a serious lack of physical exercise among Chinese adolescents.How to shape their exercise behavior(EB)has become an important task in promoting their development.A questionnaire survey was conducted using stratified cluster random sampling on three middle schools by class in Zhejiang Province,China to investigate the impact of exercise atmosphere(EA)on adolescents’exercise behavior and the mediating role of exercise identity(EI)and exercise habit(EH).806 adolescents were investigated by the Exercise Atmosphere Scale(EAS),Exercise-Identity Scale(EIS),Self-Report Habit Index(SRHI),and Physical Activity Rating Scale(PARS-3).The results show that:There is a significant positive correlation between each two of exercise atmosphere,exercise identity,exercise habit,and exercise behavior(p<0.05).Exercise atmosphere could not only directly affect adolescents’physical exercise behavior but can also indirectly affect their physical exercise behavior through the mediating effect of exercise identity and exercise habit,involving three mediating pathways,namely,the mediating path through exercise identity,the mediating pathway through exercise habit and the chain mediating pathway through exercise identity and exercise habit.The direct effect of exercise atmosphere on exercise behavior was 0.459(p<0.01),accounting for 62.62% of the total effect of 0.733,and its indirect effect was 0.274,accounting for 37.28% of the total effect.To a certain extent,the mediating effect model reveals the mechanism of exercise atmosphere affecting exercise behavior and has a certain reference value for promoting adolescents’exercise behavior.We should start by creating an exercise atmosphere,cultivating exercise identity,and enhancing exercise habits to help teenagers form active physical exercise behaviors. 展开更多
关键词 Exercise atmosphere exercise identity exercise habit exercise behavior
下载PDF
Experimental investigation on shear strength deterioration at the interface between different rock types under cyclic loading
9
作者 Qiong Wu Zhiqi Liu +6 位作者 Huiming Tang Liangqing Wang Xiaoxue Huo Zhen Cui Shiyu Li Bo Zhang Zhiwei Lin 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2024年第8期3063-3079,共17页
The shear strength deterioration of bedding planes between different rock types induced by cyclic loading is vital to reasonably evaluate the stability of soft and hard interbedded bedding rock slopes under earthquake... The shear strength deterioration of bedding planes between different rock types induced by cyclic loading is vital to reasonably evaluate the stability of soft and hard interbedded bedding rock slopes under earthquake;however,rare work has been devoted to this subject due to lack of attention.In this study,experimental investigations on shear strength weakening of discontinuities with different joint wall material(DDJM)under cyclic loading were conducted by taking the interface between siltstone and mudstone in the Shaba slope of Yunnan Province,China as research objects.A total of 99 pairs of similar material samples of DDJM(81 pairs)and discontinuities with identical joint wall material(DIJM)(18 pairs)were fabricated by inserting plates,engraved with typical surface morphology obtained by performing three-dimensional laser scanning on natural DDJMs sampled from field,into mold boxes.Cyclic shear tests were conducted on these samples to study their shear strength changes with the cyclic number considering the effects of normal stress,joint surface morphology,shear displacement amplitude and shear rate.The results indicate that the shear stress vs.shear displacement curves under each shear cycle and the peak shear strength vs.cyclic number curves of the studied DDJMs are between those of DIJMs with siltstone and mudstone,while closer to those of DIJMs with mudstone.The peak shear strengths of DDJMs exhibit an initial rapid decline followed by a gradual decrease with the cyclic number and the decrease rate varies from 6%to 55.9%for samples with varied surface morphology under different testing conditions.The normal stress,joint surface morphology,shear displacement amplitude and shear rate collectively influence the shear strength deterioration of DDJM under cyclic shear loading,with the degree of influence being greater for larger normal stress,rougher surface morphology,larger shear displacement amplitude and faster shear rate. 展开更多
关键词 Discontinuities with different joint wall material(DDJM) Discontinuities with identical joint wall material(DIJM) Cyclic shear test Shear strength deterioration Joint surface morphology Shear displacement amplitude Shear rate Normal stress
下载PDF
Age Identity and Elderly Job Participation in China
10
作者 Yu Xiao Wang Qihui 《China Economist》 2024年第3期104-127,共24页
In the context of rising life expectancy,there is a significant discrepancy between Chinese seniors’self-perceptions of the start of old age and the expectations of society around this age.The traditional paradigm,wh... In the context of rising life expectancy,there is a significant discrepancy between Chinese seniors’self-perceptions of the start of old age and the expectations of society around this age.The traditional paradigm,which forecasts individual economic behavior and formulates economic policies based on societal standards of age,is put to the test by this disparity.This study,which draws from the China Longitudinal Aging Society Survey(CLASS),examines the factors,processes,and improvement strategies that affect how older people choose to work.The following are our conclusions:(i)Chinese elderly believe their old age starts from 70 years on average;delaying perceived old age is a denial of aging and raises the likelihood of finding work.Elders who are youthful at heart have a 2.4%higher chance of remaining employed than elders who are old at heart.(ii)In contrast to old-at-heart elders,young-at-heart elders are more likely to maintain their middle-age lifestyles,continue working,become motivated to engage in social activities,and gain the confidence to face challenges and continue in their career.(iii)If the perceived old age is above 70 years,the milestone event of aging is retirement from work,and there are external pressures,particularly pressures from family intergenerational support,the perception of old age will have a more proactive impact on older workers.(iv)Despite rising pension benefits,older people’s decision to remain in the workforce is still heavily influenced by their perception of their age.However,this effect is notably gender-specific,as older women’s decision to remain in the workforce is not greatly influenced by their own perception of their age. 展开更多
关键词 Old age identity age values employment choice social recognition subjective age
下载PDF
土耳其国家安全战略:演变、特征与实践
11
作者 李亚男 《Contemporary International Relations》 2024年第3期52-78,共27页
Over the past century since the Republic of Türkiye was founded,its national security mechanisms have undergone a process of transformation from military-dominated to civilian government-dominated,and the ideolog... Over the past century since the Republic of Türkiye was founded,its national security mechanisms have undergone a process of transformation from military-dominated to civilian government-dominated,and the ideology guiding its national security strategy has gradually transitioned from Kemalism to Erdo?anism.At the present stage,Türkiye's national security strategy is prominently characterized by its geographical and cultural duality,the expansivity deep-rooted in its history and religion,and an enterprising response to its geopolitical realities.Such a strategy will comprehensively shape Türkiye's practice of preserving national security and guide the future of its security policies,prompting the country to seek a balance between its differentiated perceptions of identity and generalized national interests. 展开更多
关键词 diverse identity national security strategy TURKIYE
下载PDF
The Entanglement of Thing and Subject in Virginia Woolf’s“Street Haunting:A London Adventure”
12
作者 QIU Lin 《Journal of Literature and Art Studies》 2024年第8期669-678,共10页
Virginia Woolf’s essay“Street Haunting:A London Adventure”highlights the complex relationships between things and the subject.On the individual’s level,indoor things construct and limit the subject’s identity,whi... Virginia Woolf’s essay“Street Haunting:A London Adventure”highlights the complex relationships between things and the subject.On the individual’s level,indoor things construct and limit the subject’s identity,while outdoor things allow fluid identities;these things reveal Woolf’s dual identity as both a rebel against and a ruler of the hierarchical system.On the intersubjective level,subjects are linked through common aesthetic experience mediated by things,which enjoys a high degree of arbitrariness.With the help of things,subjects form an“imagined community”.Concerning the relationship between things and the mind,things also endow order in the fragmented reality,yet in this sense they are abstract,metaphysical and universal rather than specific in Virginia Woolf’s thoughts.They are the withdrawn things expressed by sensual qualities.These sensual aspects,however,are tools to reveal the essence and meaning of life,secondary to the mind. 展开更多
关键词 THING SUBJECT identity community MIND
下载PDF
State,Communal,and Individual Identities in Iran
13
作者 Mehran Kamrava 《International Relations and Diplomacy》 2024年第1期1-17,共17页
Cultural identity in Iran is comprised of four primary elements,each of which have proven to be highly resonant in the country political history.The vexing issue of modernity,and where individuals and collectivities a... Cultural identity in Iran is comprised of four primary elements,each of which have proven to be highly resonant in the country political history.The vexing issue of modernity,and where individuals and collectivities are placed in relation to it,has been one of the most prominent of these elements of Iranian identity.A second constitutive factor has been the role of the state as a deliberate crafter of cultural,in turn directly influencing the salience,interpretation,extent,and direction of modernity,or its antithesis,in Iran.Equally defining has been the role and significance of religion,which has emerged as a marker of individual and collective,as well as political,identities.Nationalism,and its compelling impulse across Iranian society especially from the early 1900s and continuing until today,has also emerged as an integral and inseparable feature of Iranian identity.Together,these four elements―modernity,a culturally intrusive state,religion and religiosity,and nationalism―constitute fluid yet constant,sometimes complementary and sometimes competing,dimensions of Iranian identity. 展开更多
关键词 Iranian identity NATIONALISM religiosity modernity social change
下载PDF
Utilizing Certificateless Cryptography for IoT Device Identity Authentication Protocols in Web3
14
作者 WU Zhihui HONG Yuxuan +2 位作者 ZHOU Enyuan LIU Lei PEI Qingqi 《ZTE Communications》 2024年第2期30-38,共9页
Traditional methods of identity authentication often rely on centralized architectures,which poses risks of computational overload and single points of failure.We propose a protocol that offers a decentralized approac... Traditional methods of identity authentication often rely on centralized architectures,which poses risks of computational overload and single points of failure.We propose a protocol that offers a decentralized approach by distributing authentication services to edge authentication gateways and servers,facilitated by blockchain technology,thus aligning with the decentralized ethos of Web3 infrastructure.Additionally,we enhance device security against physical and cloning attacks by integrating physical unclonable functions with certificateless cryptography,bolstering the integrity of Internet of Thins(IoT)devices within the evolving landscape of the metaverse.To achieve dynamic anonymity and ensure privacy within Web3 environments,we employ fuzzy extractor technology,allowing for updates to pseudonymous identity identifiers while maintaining key consistency.The proposed protocol ensures continuous and secure identity authentication for IoT devices in practical applications,effectively addressing the pressing security concerns inherent in IoT network environments and contributing to the development of robust security infrastructure essential for the proliferation of IoT devices across diverse settings. 展开更多
关键词 blockchain certificateless cryptography identity authentication IOT
下载PDF
Auditory Narrative in Toni Morrison’s Song of Solomon
15
作者 LI Mingjiao 《Cultural and Religious Studies》 2024年第6期388-394,共7页
This article primarily explores the centrality of sound and listening in Toni Morrison’s literary text.Drawing on theories on sound cultural studies,narratology,and cultural identity,this essay analyzes Morrison’s r... This article primarily explores the centrality of sound and listening in Toni Morrison’s literary text.Drawing on theories on sound cultural studies,narratology,and cultural identity,this essay analyzes Morrison’s representation of sound and its significance on characterization,plot,and theme in Song of Solomon.Morrison’s literary sounds-voices of oral storytelling,the sound of music,and the protagonist Milkman Dead’s listening experiences are deeply rooted in African American sound culture.A close analysis of her sound writing in Song of Solomon helps to give the reader a glimpse of the soundscape of African American culture as well as the vital role listening plays in African American survival,endurance,and cultural identification. 展开更多
关键词 SOUND LISTENING black music cultural identity
下载PDF
Identity(ies)and Transnationalization of Brazilian Evangelical Churches in Portugal:Case study of World Cathedral of Hope and Victory in Christ Churches
16
作者 Jonas Pereira de Oliveira Júnior 《Cultural and Religious Studies》 2024年第3期133-145,共13页
The presence of evangelicals in Brazil is a social and religious phenomenon that has aroused interest of many scholars due to its rapid and significant expansion in recent decades and its projection beyond national bo... The presence of evangelicals in Brazil is a social and religious phenomenon that has aroused interest of many scholars due to its rapid and significant expansion in recent decades and its projection beyond national borders.Among evangelical denominations that stand out in this scenario are Pentecostal churches,which have developed intense missionary activity in several countries,including Europe.In this article,we intend to analyze features and challenges of Brazilian evangelical churches:World Cathedral of Hope(CIME)(Catedral Mundial da Esperança-ICME)and Assembly of God Victory in Christ(ADVEC)(Assembleia de Deus Vitória em Cristo-ADVEC)that operate in Portugal,seeking to understand issues of identity and belonging of these communities,their models of transnationalization,its evangelization strategies and its adaptations to Portuguese context,in the period from 2000 to 2020. 展开更多
关键词 IDENTITY transnationalization SECULARIZATION Brazilian migration
下载PDF
The Narcissistic Dilemma: Exploring NPD Traits in Hamlet from a Beauvoirian Perspective
17
作者 Nida ul Zafar 《Journal of Literature and Art Studies》 2024年第4期265-272,共8页
This research paper explores the intersection of existential philosophy and psychological disorders in William Shakespeare’s Hamlet,with a focus on Narcissistic Personality Disorder(NPD)as viewed through the existent... This research paper explores the intersection of existential philosophy and psychological disorders in William Shakespeare’s Hamlet,with a focus on Narcissistic Personality Disorder(NPD)as viewed through the existentialist lens of Simone de Beauvoir.Drawing upon Beauvoir’s existentialist framework,the study delves into the complexities of identity,agency,and societal expectations as portrayed in the characters of Gertrude and Ophelia.Through an interdisciplinary approach,the paper examines how existential crises intertwine with narcissistic behaviors,shedding light on the psychological intricacies of Shakespeare’s iconic figures.By synthesizing literary analysis with psychological insights,the study offers valuable contributions to our understanding of human psychology,societal dynamics,and the timeless themes of existential authenticity portrayed in literature. 展开更多
关键词 EXISTENTIALISM Simone de Beauvoir Narcissistic Personality Disorder SHAKESPEARE HAMLET identity psychological complexity
下载PDF
The Classic Shaping of Typical Female Images by Mulan Motif in Historical Times-Historical Review and Textual Sorting of the Motif
18
作者 XIAO Yuwei ZHANG Pei 《Cultural and Religious Studies》 2024年第5期320-323,共4页
The image of Mulan is well known to the public as an important symbol in the dissemination of Chinese excellent traditional culture.This paper aims to summarise the mother-title from traditional canonical texts,to exp... The image of Mulan is well known to the public as an important symbol in the dissemination of Chinese excellent traditional culture.This paper aims to summarise the mother-title from traditional canonical texts,to explore the content and value of sustainable IP development,and to study a large number of derivatives with the image of Mulan as the mother-title,based on the wide circulation of the prototype of the mother-title“The Poem of Mulan”(木兰辞)and the positive values conveyed by the content.Through the processing and imagination of scholars and writers on the mother text in the past generations,the image of Mulan has gradually formed a relatively stable cultural communication theme in the process of dissemination in China’s historical period,and many adaptations with international influence based on the mother title of Mulan have emerged in the foreign dissemination,so through the combing and summarisation of the textual works of various periods both at home and abroad,we will dig out the textual transmission of the mother title of Mulan,which is representative of the mother title of China’s excellent traditional culture,and the development of the Chinese spiritual core.The Development of the Chinese Spiritual Kernel.This paper adopts research methods such as documentary evidence method and discourse analysis to show the textual flow of Mulan’s parent theme in a more diversified form. 展开更多
关键词 Mulan motifs feminine power textual transmission literature review identity
下载PDF
Three- and Four-Dimensional Generalized Pythagorean Numbers
19
作者 Alfred Wünsche 《Advances in Pure Mathematics》 2024年第1期1-15,共15页
The Pythagorean triples (a, b | c) of planar geometry which satisfy the equation a<sup>2</sup>+b<sup>2</sup>=c<sup>2</sup> with integers (a, b, c) are generalized to 3D-Pythagorean ... The Pythagorean triples (a, b | c) of planar geometry which satisfy the equation a<sup>2</sup>+b<sup>2</sup>=c<sup>2</sup> with integers (a, b, c) are generalized to 3D-Pythagorean quadruples (a, b, c | d) of spatial geometry which satisfy the equation a<sup>2</sup>+b<sup>2</sup>+c<sup>2</sup>=d<sup>2</sup> with integers (a, b, c, d). Rules for a parametrization of the numbers (a, b, c, d) are derived and a list of all possible nonequivalent cases without common divisors up to d<sup>2</sup> is established. The 3D-Pythagorean quadruples are then generalized to 4D-Pythagorean quintuples (a, b, c, d | e) which satisfy the equation a<sup>2</sup>+b<sup>2</sup>+c<sup>2</sup>+d<sup>2</sup>=e<sup>2</sup> and a parametrization is derived. Relations to the 4-square identity are discussed which leads also to the N-dimensional case. The initial 3D- and 4D-Pythagorean numbers are explicitly calculated up to d<sup>2</sup>, respectively, e<sup>2</sup>. 展开更多
关键词 Number Theory Pythagorean Triples Tesseract 4-Square Identity Diophantine Equation
下载PDF
Lost,Exile and Return-An Analysis of Sheona’s Identity Reconstruction in“Sisters”from the Perspective of Spatial Theory
20
作者 ZHU Ling 《Journal of Literature and Art Studies》 2024年第8期679-683,共5页
“Sisters”is the first novel in Irish-American author Colum McCann’s short story collection-Fishing the Sloe-Black River,which tells the story of Sheona’s search for her identity between Ireland and the United Stat... “Sisters”is the first novel in Irish-American author Colum McCann’s short story collection-Fishing the Sloe-Black River,which tells the story of Sheona’s search for her identity between Ireland and the United States.Colum McCann is skilled in writing about the spiritual dilemmas and identity search of ethnic minorities living in a foreign land.Employing the space theory and Sheona’s perspective,this paper examines her identity loss in Ireland’s patriarchal system,her migration to the US for identity pursuit,and her subsequent transnational journey between the two nations to reconstruct her identity amidst physical and mental trauma. 展开更多
关键词 Colum McCann SISTERS identity reconstruction spatial theory
下载PDF
上一页 1 2 51 下一页 到第
使用帮助 返回顶部