期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
希麟音系的声纽对音及其语音系统 被引量:6
1
作者 黄仁瑄 《华中科技大学学报(社会科学版)》 CSSCI 2007年第1期33-37,共5页
梵汉对音材料证明希麟音系声纽的语音特征是:1)全浊声母不送气,而且带有同部位的鼻音音色; 2)舌音分立,而泥、娘纽合流;3)唇音分立;4)精、章组同时对译梵音c组辅音。希麟反切注音材料反映的是带有长安口音的通语系统,该系统有一定的保守... 梵汉对音材料证明希麟音系声纽的语音特征是:1)全浊声母不送气,而且带有同部位的鼻音音色; 2)舌音分立,而泥、娘纽合流;3)唇音分立;4)精、章组同时对译梵音c组辅音。希麟反切注音材料反映的是带有长安口音的通语系统,该系统有一定的保守性;希麟梵汉对音材料反映的是记录时音的长安方音系统。 展开更多
关键词 续一切经音义 梵汉对音 长安方音
在线阅读 下载PDF
利用“希沃易+”智慧校园整体解决方案打造智能教育服务平台 被引量:3
2
作者 殷华平 《中国电化教育》 CSSCI 北大核心 2016年第S1期69-71,共3页
交互式电子白板是硬件电子感应白板和软件白板操作系统的有机整合,它由电子感应白板、感应笔、计算机和投影仪组成.而在新近推出的整套“希沃易+”智慧校园整体解决方案里,更是包括了备授课一体化解决方案、个性化互动课堂解决方案、多... 交互式电子白板是硬件电子感应白板和软件白板操作系统的有机整合,它由电子感应白板、感应笔、计算机和投影仪组成.而在新近推出的整套“希沃易+”智慧校园整体解决方案里,更是包括了备授课一体化解决方案、个性化互动课堂解决方案、多媒体教室解决方案、校园集控中心解决方案四部分,重点解决了校园内的几大核心需求.它的出现,使得教育在信息化、智能化方向实现了一次质的飞跃. 展开更多
关键词 交互式电子白板 “希沃易+”智慧校园整体解决方案 信息化 智能化
在线阅读 下载PDF
超高产黄瓜新品种“希努尔”的引种与栽培技术
3
作者 秦鲲鹏 《现代农业科技》 2007年第9期37-38,共2页
黄瓜新品种“希努尔”经过在山东的示范种植,表现为耐低温、耐弱光、抗病虫害、坐果能力强、不易化瓜、果质优良等特点,商品价值高,宜结合本地气候条件进行推广。
关键词 黄瓜 “希努尔” 引种 栽培技术
在线阅读 下载PDF
On capped Higgs positivity cone
4
作者 Dong-Yu Hong Zhuo-Hui Wang Shuang-Yong Zhou 《中国科学技术大学学报》 CAS CSCD 北大核心 2024年第7期44-54,43,I0003,共13页
The Wilson coefficients of the standard model effective field theory are subject to a series of positivity bounds.It has been shown that while the positivity part of the ultraviolet(UV)partial wave unitarity leads to ... The Wilson coefficients of the standard model effective field theory are subject to a series of positivity bounds.It has been shown that while the positivity part of the ultraviolet(UV)partial wave unitarity leads to the Wilson coefficients living in a convex cone,further including the nonpositivity part caps the cone from above.For Higgs scattering,a capped positivity cone was obtained using a simplified,linear unitarity condition without utilizing the full internal symmetries of Higgs scattering.Here,we further implement stronger nonlinear unitarity conditions from the UV,which generically gives rise to better bounds.We show that,for the Higgs case in particular,while the nonlinear unitarity conditions per se do not enhance the bounds,the fuller use of the internal symmetries do shrink the capped positivity cone significantly. 展开更多
关键词 positivity bounds standard model effective field theory(SMEFT) HIGGS
在线阅读 下载PDF
Second-Order Side-Channel Attacks on Kyber: Targeting the Masked Hash Function
5
作者 WANG Ya-Qi HUANG Fan +1 位作者 DUAN Xiao-Lin HU Hong-Gang 《密码学报(中英文)》 CSCD 北大核心 2024年第6期1415-1436,共22页
Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend P... Recently,several PC oracle based side-channel attacks have been proposed against Kyber.However,most of them focus on unprotected implementations and masking is considered as a counter-measure.In this study,we extend PC oracle based side-channel attacks to the second-order scenario and successfully conduct key-recovery attacks on the first-order masked Kyber.Firstly,we analyze the potential joint information leakage.Inspired by the binary PC oracle based attack proposed by Qin et al.at Asiacrypt 2021,we identify the 1-bit leakage scenario in the masked Keccak implementation.Moreover,we modify the ciphertexts construction described by Tanaka et al.at CHES 2023,extending the leakage scenario from 1-bit to 32-bit.With the assistance of TVLA,we validate these leakages through experiments.Secondly,for these two scenarios,we construct a binary PC oracle based on t-test and a multiple-valued PC oracle based on neural networks.Furthermore,we conduct practical side-channel attacks on masked Kyber by utilizing our oracles,with the implementation running on an ARM Cortex-M4 microcontroller.The demonstrated attacks require a minimum of 15788 and 648 traces to fully recover the key of Kyber768 in the 1-bit leakage scenario and the 32-bit leakage scenario,respectively.Our analysis may also be extended to attack other post-quantum schemes that use the same masked hash function.Finally,we apply the shuffling strategy to the first-order masked imple-mentation of the Kyber and perform leakage tests.Experimental results show that the combination strategy of shuffling and masking can effectively resist our proposed attacks. 展开更多
关键词 side-channel attack plaintext-checking oracle post-quantum cryptography masked Kyber masked hash function
在线阅读 下载PDF
“谷”字探源——兼释“谷”之相关字 被引量:3
6
作者 程燕 《语言科学》 CSSCI 北大核心 2018年第3期255-259,共5页
"■""希"本是由描摹布线交织的象形字所衍生的分化字,"■"表示粗葛之义,"希"则表示细葛之义。二字古音亦近,安大简"络"之异文作"■"可以为证。之后二字又赘加"纟&qu... "■""希"本是由描摹布线交织的象形字所衍生的分化字,"■"表示粗葛之义,"希"则表示细葛之义。二字古音亦近,安大简"络"之异文作"■"可以为证。之后二字又赘加"纟"旁产生后起字"■""絺"。但因"■"在文字发展进程中或写作"■"形,或讹作"去"形,或讹作"谷"形,增加了辨识的困难。据此,《玺汇》2602"絺"用如姓氏,读为"郤"。另外,九店简"■"应分析为从"色""■"声,疑"■"之异体,简文"绤表",指粗葛布做的外衣。 展开更多
关键词 “谷” “希” 安大简 古玺 九店简
在线阅读 下载PDF
藏传佛教对藏族民间习惯法的影响 被引量:6
7
作者 索南才让 《西北民族大学学报(哲学社会科学版)》 2004年第2期57-61,共5页
通过对我国藏族民间习惯法中"希董"法所受藏传佛教思想的影响以及与他国宗教有关命价的法律关系的比较研究可以发现,藏族民间习惯法在我国藏区当前的双文明建设中,对社会的稳定与发展具有积极的补充作用,我们可以用"扬弃... 通过对我国藏族民间习惯法中"希董"法所受藏传佛教思想的影响以及与他国宗教有关命价的法律关系的比较研究可以发现,藏族民间习惯法在我国藏区当前的双文明建设中,对社会的稳定与发展具有积极的补充作用,我们可以用"扬弃"的思想方法对其加以继承和弘扬。 展开更多
关键词 藏传佛教 藏族 民间习惯法 “希董”法 民族文化
在线阅读 下载PDF
新发现《宋拱卫大夫康州刺史田公墓碑》及其相关问题考释 被引量:2
8
作者 崔峰 蔡副全 《史学集刊》 CSSCI 北大核心 2013年第2期59-64,共6页
甘肃省成县抛沙镇新发现《宋拱卫大夫康州刺史田公墓碑》,与此地几年前出土的《宋太宜人刘氏墓碑》是夫妻墓葬。两墓志均属于新发现的碑刻资料,也未见有关文献资料的记载。墓主人康州刺史田希圣,正史中没有任何相关记载,墓志铭中有关详... 甘肃省成县抛沙镇新发现《宋拱卫大夫康州刺史田公墓碑》,与此地几年前出土的《宋太宜人刘氏墓碑》是夫妻墓葬。两墓志均属于新发现的碑刻资料,也未见有关文献资料的记载。墓主人康州刺史田希圣,正史中没有任何相关记载,墓志铭中有关详细记载,给我们增添了历史人物的同时,也为了解当时的几次战争事实,提供了原始文献资料。碑志中另一人物田世雄,历史资料中多有引用,但一直身份不明,通过两碑志的考证,让我们厘清他所涉及的相关历史问题。 展开更多
关键词 康州刺史 墓碑 田世雄 考释
在线阅读 下载PDF
“鬼魅”的权力斗争——当代美国作家诺曼·梅勒作品主题思想再思考
9
作者 谷红丽 《华南师范大学学报(社会科学版)》 CSSCI 北大核心 2013年第3期85-90,163,共6页
当代美国作家诺曼·梅勒小说中最为显著的主题是权力斗争。在梅勒的早期作品中,权力一方在斗争中占有优势地位,反抗者往往以失败而告终。而在他的后期作品中,反抗者往往以侥幸或暂时的胜利而结束。《白皮肤的黑人》一文的发表是这... 当代美国作家诺曼·梅勒小说中最为显著的主题是权力斗争。在梅勒的早期作品中,权力一方在斗争中占有优势地位,反抗者往往以失败而告终。而在他的后期作品中,反抗者往往以侥幸或暂时的胜利而结束。《白皮肤的黑人》一文的发表是这个转变的开始。从理论渊源上看,梅勒作品中主题思想的改变体现了美国20世纪60年代反文化运动和欧洲存在主义哲学思想对他的影响。同时,也在一定程度上体现了梅勒对后现代主义文学思潮中新历史主义和文化唯物主义批评理论的呼应。 展开更多
关键词 诺曼·梅勒 权力斗争 “希波斯特”思想 新历史主义和文化唯物主义
在线阅读 下载PDF
OMHT method for weak signal processing of GPR and its application in identification of concrete micro-crack 被引量:5
10
作者 LING Tong-hua ZHANG Liang +3 位作者 HUANG Fu GU Dan-ping YU Bin ZHANG Sheng 《Journal of Central South University》 SCIE EI CAS CSCD 2019年第11期3057-3065,共9页
In the light of the problem of weak reflection signals shielded by strong reflections from the concrete surface,the detection and the recognition of hidden micro-cracks in the shield tunnel lining were studied using t... In the light of the problem of weak reflection signals shielded by strong reflections from the concrete surface,the detection and the recognition of hidden micro-cracks in the shield tunnel lining were studied using the orthogonal matching pursuit and the Hilbert transform(OMHT method).First,according to the matching pursuit algorithm and the strong reflection-forming mechanism,and based on the sparse representation theory,a sparse dictionary,adapted to the characteristics of the strong reflection signal,was selected,and a matching decomposition of each signal was performed so that the weak target signal submerged in the strong reflection was displayed more strongly.Second,the Hilbert transform was used to extract multiple parameters,such as the instantaneous amplitude,the instantaneous frequency,and the instantaneous phase,from the processed signal,and the ground penetrating radar(GPR)image was comprehensively analyzed and determined from multiple angles.The results show that the OMHT method can accurately weaken the effect of the strong impedance interface and effectively enhance the weak reflected signal energy of hidden micro-crack in the shield tunnel segment.The resolution of the processed GPR image is greatly improved,and the reflected signal of the hidden micro-crack is easily visible,which proves the validity and accuracy of the analysis method. 展开更多
关键词 orthogonal matching pursuit Hilbert transform shield tunnel lining structure hidden micro-crack
在线阅读 下载PDF
Application of time–frequency entropy from wake oscillation to gas–liquid flow pattern identification 被引量:6
11
作者 HUANG Si-shi SUN Zhi-qiang +1 位作者 ZHOU Tian ZHOU Jie-min 《Journal of Central South University》 SCIE EI CAS CSCD 2018年第7期1690-1700,共11页
Gas–liquid two-phase flow abounds in industrial processes and facilities. Identification of its flow pattern plays an essential role in the field of multiphase flow measurement. A bluff body was introduced in this s... Gas–liquid two-phase flow abounds in industrial processes and facilities. Identification of its flow pattern plays an essential role in the field of multiphase flow measurement. A bluff body was introduced in this study to recognize gas–liquid flow patterns by inducing fluid oscillation that enlarged differences between each flow pattern. Experiments with air–water mixtures were carried out in horizontal pipelines at ambient temperature and atmospheric pressure. Differential pressure signals from the bluff-body wake were obtained in bubble, bubble/plug transitional, plug, slug, and annular flows. Utilizing the adaptive ensemble empirical mode decomposition method and the Hilbert transform, the time–frequency entropy S of the differential pressure signals was obtained. By combining S and other flow parameters, such as the volumetric void fraction β, the dryness x, the ratio of density φ and the modified fluid coefficient ψ, a new flow pattern map was constructed which adopted S(1–x)φ and (1–β)ψ as the vertical and horizontal coordinates, respectively. The overall rate of classification of the map was verified to be 92.9% by the experimental data. It provides an effective and simple solution to the gas–liquid flow pattern identification problems. 展开更多
关键词 gas–liquid two-phase flow wake oscillation flow pattern map time–frequency entropy ensemble empirical mode decomposition Hilbert transform
在线阅读 下载PDF
A method for improving graph queries processing using positional inverted index (P.I.I) idea in search engines and parallelization techniques 被引量:2
12
作者 Hamed Dinari Hassan Naderi 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第1期150-159,共10页
The idea of positional inverted index is exploited for indexing of graph database. The main idea is the use of hashing tables in order to prune a considerable portion of graph database that cannot contain the answer s... The idea of positional inverted index is exploited for indexing of graph database. The main idea is the use of hashing tables in order to prune a considerable portion of graph database that cannot contain the answer set. These tables are implemented using column-based techniques and are used to store graphs of database, frequent sub-graphs and the neighborhood of nodes. In order to exact checking of remaining graphs, the vertex invariant is used for isomorphism test which can be parallel implemented. The results of evaluation indicate that proposed method outperforms existing methods. 展开更多
关键词 graph query processing frequent subgraph graph mining data mining positional inverted index
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部