China National Knowledge Infrastructure China Conference Proceedings
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Inventing Chinese Buddhas: Identity, Authority, and Liberation in Song-Dynasty Chan Buddhism
Inventing Chinese Buddhas: Identity, Authority, and Liberation in Song-Dynasty Chan Buddhism Kevin Buckelew Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2018 © 2018 Kevin Buckelew All rights reserved Abstract Inventing Chinese Buddhas: Identity, Authority, and Liberation in Song-Dynasty Chan Buddhism Kevin Buckelew This dissertation explores how Chan Buddhists made the unprecedented claim to a level of religious authority on par with the historical Buddha Śākyamuni and, in the process, invented what it means to be a buddha in China. This claim helped propel the Chan tradition to dominance of elite monastic Buddhism during the Song dynasty (960–1279), licensed an outpouring of Chan literature treated as equivalent to scripture, and changed the way Chinese Buddhists understood their own capacity for religious authority in relation to the historical Buddha and the Indian homeland of Buddhism. But the claim itself was fraught with complication. After all, according to canonical Buddhist scriptures, the Buddha was easily recognizable by the “marks of the great man” that adorned his body, while the same could not be said for Chan masters in the Song. What, then, distinguished Chan masters from everyone else? What authorized their elite status and granted them the authority of buddhas? According to what normative ideals did Chan aspirants pursue liberation, and by what standards did Chan masters evaluate their students to determine who was worthy of admission into an elite Chan lineage? How, in short, could one recognize a buddha in Song-dynasty China? The Chan tradition never answered this question once and for all; instead, the question broadly animated Chan rituals, institutional norms, literary practices, and visual cultures. -
Use Style: Paper Title
International Forum on Management, Education and Information Technology Application 2016 (IFMEITA 2016) Advances in Social Science, Education and Humanities Research Volume 47 Guangzhou, China 30 – 31 January 2016 Part 1 of 2 Editor: Y. H. Kim ISBN: 978-1-5108-2198-9 Printed from e-media with permission by: Curran Associates, Inc. 57 Morehouse Lane Red Hook, NY 12571 Some format issues inherent in the e-media version may also appear in this print version. Copyright© (2016) by Atlantis Press All rights reserved. http://www.atlantis-press.com/php/pub.php?publication=ifmeita-16 Printed by Curran Associates, Inc. (2016) For permission requests, please contact the publisher: Atlantis Press Amsterdam / Paris Email: [email protected] Additional copies of this publication are available from: Curran Associates, Inc. 57 Morehouse Lane Red Hook, NY 12571 USA Phone: 845-758-0400 Fax: 845-758-2633 Email: [email protected] Web: www.proceedings.com TABLE OF CONTENTS PART 1 COMPUTER AND INFORMATION TECHNOLOGY SOC ESTIMATION BASED ON LPV-KALMAN CONSIDERING COULOMETRIC CONVERSION ......................................................................................................................................................................1 Weiming Sun, Yanping Zheng, Xincan Wang TRAFFIC SIMULATION OF HONGQI ELEVATED ROAD IN YANTAI ...................................................................8 Feng Zhu, Chengxuan Cao A MICROSCOPIC SIMULATION METHOD TO CALCULATE THE CAPACITY OF RAILWAY STATION ............................................................................................................................................................................ -
On Computer Distributed Control and Intelligent Enviromental Monitoring CDCIEM 2012 Table of Contents
2012 International Conference on Computer Distributed Control and Intelligent Enviromental Monitoring CDCIEM 2012 Table of Contents Preface......................................................................................................................................................................xviii Conference Committees.........................................................................................................................................xix Reviewers....................................................................................................................................................................xx 2012 International Conference on Computer Distributed Control and Intelligent Enviromental Monitoring 1-Wire Search Algorithm and its Application ................................................................................................................1 Yu Gui A Novel Cost-Effective Portable Electronic Nose for Indoor-/In-Car Air Quality Monitoring ......................................................................................................................................................................4 F.C. Tian, C. Kadri, L. Zhang, J.W. Feng, L.H. Juan, and P.L. Na A Clustering Routing Algorithm Based on Energy and Distance in WSN ....................................................................9 Jia Yunjie, Liu Ming, Zhu Song, and Dong Pengtao A Distributed Video Monitoring Terminal Based on DaVinci DSP ............................................................................13 -
MCM Problem a Contest Results
2021 Mathematical Contest in Modeling® Press Release—April 23, 2021 COMAP is pleased to announce the results of the 37th annual advantages and disadvantages for fungi species and combinations of Mathematical Contest in Modeling (MCM). This year, 10,053 teams species like to persist is various environments. representing institutions from fifteen countries/regions participated in the contest. Seventeen teams from the following institutions were The B problem used the scenario of the 2019-2020 fire season in designated as OUTSTANDING WINNERS: Australia, which saw devastating wildfires in every state, to consider the use of drones in firefighting. Teams learned of the capabilities of Shanghai Jiao Tong University, China (3) two types of drones, surveillance and situational awareness drones and (2100454 SIAM Award & COMAP Scholarship Award) hovering drones that can carry repeaters (to extend radio range), and Beijing Institute of Technology, China (Ben Fusaro Award) then created a model to determine the optimal numbers and mix of Nanjing University of Posts & Telecommunications, China these two types of drones. Teams addressed adaptation of their model (Frank Giordano Award & SIAM Award) to the changing likelihood of extreme fire events over the next decade, Jiangnan University, China as well as to equipment cost increases. Teams also developed a model Xi'an Jiaotong University, China (AMS Award) to optimize locations of hovering drones for fires of differing sizes on Xidian University, Shannxi, China differing terrain. Beijing Jiaotong University, China (ASA Award) University of Colorado Boulder, CO, USA The C problem investigated the discovery and sightings of Vespa (MAA Award, SIAM Award & COMAP Scholarship Award) mandarina (also known as the Asian giant hornet) in the State of University of Oxford, United Kingdom Washington. -
The Genesis of Youth Services in Public Libraries in China, 1912-1937
THE GENESIS OF YOUTH SERVICES IN PUBLIC LIBRARIES IN CHINA, 1912-1937 BY YANG LUO DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Library and Information Science in the Graduate College of the University of Illinois at Urbana-Champaign, 2015 Urbana, Illinois Doctoral Committee: Professor Carol Tilley, Chair Professor Christine Jenkins Professor Kathryn La Barre Professor Dan Shao Abstract For thousands of years, libraries in China were treated as book repositories and remained closed to the public. It was not until the end of Imperial China and the establishment of a Republican China (1911) that the first public libraries became available. The Republic of China Era (1912-1949) witnessed various changes, including: an increased literacy level among the general public, the advent of modern school systems, the development of modern public libraries, the discovery of childhood, the growth of child welfare, and the flourishing of children’s literature. Youth services at public libraries in China emerged in this environment. Since 1909, pioneering librarians began to address the needs of children in professional settings by introducing Western youth service models and discussing how to establish, organize, and operate a children’s library in China. The first children’s reading rooms were founded in public libraries in the late 1910s, which predated the other elements of youth services librarianship. In response to the publication peak of children’s reading materials since the 1920s, librarians set standards for book selection and built library collections to meet children’s reading interests and needs. Moreover, children’s libraries gradually developed group methods to connect children with texts. -
Dbet PDF Version © 2020 All Rights Reserved
A FOREST OF PEARLS FROM THE DHARMA GARDEN VOLUME III dBET PDF Version © 2020 All Rights Reserved BDK English Tripiṭaka Series A FOREST OF PEARLS FROM THE DHARMA GARDEN VOLUME III (Taishō Volume 53, Number 2122) Translated by Koichi Shinohara BDK America, Inc. 2020 Copyright © 2020 by Bukkyō Dendō Kyōkai and BDK America, Inc. All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transcribed in any form or by any means —electronic, mechanical, photocopying, recording, or otherwise— without the prior written permission of the publisher. First Printing, 2020 ISBN: 978-1-886439-74-0 Library of Congress Catalog Card Number: 2019935629 Published by BDK America, Inc. 1675 School Street Moraga, California 94556 Printed in the United States of America A Message on the Publication of the English Tripiṭaka The Buddhist canon is said to contain eighty-four thousand different teachings. I believe that this is because the Buddha’s basic approach was to prescribe a different treatment for every spiritual ailment, much as a doctor prescribes a different medicine for every medical ailment. Thus his teachings were always appropriate for the particular suffering individual and for the time at which the teaching was given, and over the ages not one of his prescriptions has failed to relieve the suffering to which it was addressed. Ever since the Buddha’s Great Demise over twenty-five hundred years ago, his message of wisdom and compassion has spread throughout the world. Yet no one has ever attempted to translate the entire Buddhist canon into English throughout the history of Japan. -
ICICTA 2014 Table of Contents
2014 7th International Conference on Intelligent Computation Technology and Automation ICICTA 2014 Table of Contents Preface.......................................................................................................................................................xxii Organizing Committee............................................................................................................................xxiii Reviewers.................................................................................................................................................xxiv Regular Paper Session: Intelligent Computation and Automation 6M25 Compressor Online State Monitoring System Design ........................................................................1 Yu Wei, Yan Hong-Zhi, and Huang Zhonghua A Genetic Algorithm Using Priority-Based Encoding for Routing and Spectrum Assignment in Elastic Optical Network .........................................................................................................5 Iantian Huang and Bin Li A Kind of Identity Authentication under Cloud Computing Environment ....................................................12 Miao Yingkai and Chen Jia A Kind of Improved AdaBoost Algorithm ....................................................................................................16 Liao Shaowen and Chen Yong A Kind of Malicious Code Detection Scheme Based on Fuzzy Reasoning ................................................19 Guo Gang and Chen Zhongquan A Load Balance Based Routing and -
An Analysis of Chinese Talent Management Strategy: Emphasis on Cao Cao’S Competencies from the Records of the Three Kingdoms
AN ANALYSIS OF CHINESE TALENT MANAGEMENT STRATEGY: EMPHASIS ON CAO CAO’S COMPETENCIES FROM THE RECORDS OF THE THREE KINGDOMS LU KUICHENG A DISSERTATION SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN HUMAN RESOURCE DEVELOPMENT DEPARTMENT OF INTERNATIONAL GRADUATE STUDIES IN HUMAN RESOURCE DEVELOPMENT FACULTY OF EDUCATION BURAPHA UNIVERSITY MAY 2018 COPYRIGHT OF BURAPHA UNIVERSITY ACKNOWLEDGEMENTS I wish to express my sincere gratitude to the many people who supported and helped me in the completion of this study. For my worthily principle advisor Associate Professor Dr.Chalong Tubsree, I send my heartfelt thanks for his patience and guidance in helping me. In the process of composing this paper, he gave me much academic and constructive advice, and helped me to correct my paper. Without his enlightening instruction, impressive kindness and patience, I could not have completed my thesis. His keen and vigorous academic observation enlightened me not only in this thesis but also in my future study. At the same time, I would like to express my appreciation to my Co-advisor, who gave me useful literature knowledge and information in this paper. She is Assist. Prof. Dr. Wilai Limthawaranun. I am very grateful for her patient guidance in the course of my thesis writing. Finally, I would like to thank the teachers who helped me during my entire study process in the International Graduate Studies Human Resource Development Center of Burapha University. Dr. Watunyoo Suwannaset, Dr. Chalermsri Chantarathong and Rattanasiri Khemraj in the IG-HRD office, thank you for taking care of me meticulously for the last three years. -
The Romance of the Three Kingdoms Podcast. This Is Episode 35
Welcome to the Romance of the Three Kingdoms Podcast. This is episode 35. Previously, we left off with Guan Yu having reunited with Zhang Fei, as well as three of Liu Bei’s former advisers, Sun (1) Qian (2) and the brothers Mi (2) Zhu (2) and Mi (2) Fang (1). After a night of teary celebration in the hamlet of Gucheng (3,2), Guan Yu prepared to set out the next day for Runan (3,2), where he was told that Liu Bei had gone off to. Zhang Fei wanted to come along, but Guan Yu told him, “Stay here and protect your sisters-in-law while Sun Qian and I go find our brother.” Zhang Fei complied, and Guan Yu and Sun Qian set off with a few riders in tow. When they arrived at Runan, they were greeted by the two men currently in control of the region, Liu (2) Pi (4) and Gong (1) Dou (1). But they had some bad news. “The imperial uncle stayed here for a few days,” they told Guan Yu, “but when he saw that we had insufficient troops, he returned to Hebei to consult with Yuan Shao.” Well, that’s a downer. And c’mon, Liu Bei! What the heck are you doing? How’s your brother supposed to track you down if you won’t stay in one place? Guan Yu was disappointed by this news, but Sun Qian consoled him. “There’s no need for consternation,” Sun Qian said. “We will just have to travel a little farther and go to Hebei to send word to the imperial uncle and tell him to meet us at Gucheng (3,2).” Guan Yu agreed, and they returned to Gucheng. -
Coword and Cluster Analysis for the Romance of the Three Kingdoms
Hindawi Wireless Communications and Mobile Computing Volume 2021, Article ID 5553635, 8 pages https://doi.org/10.1155/2021/5553635 Research Article Coword and Cluster Analysis for the Romance of the Three Kingdoms Chao Fan 1,2 and Yu Li1,2 1The School of Artificial Intelligence and Computer Science, Jiangnan University, Wuxi 214122, China 2Jiangsu Key Laboratory of Media Design and Software Technology, Jiangnan University, Wuxi 214122, China Correspondence should be addressed to Chao Fan; [email protected] Received 1 March 2021; Revised 12 March 2021; Accepted 19 March 2021; Published 1 April 2021 Academic Editor: Shan Zhong Copyright © 2021 Chao Fan and Yu Li. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. The Romance of the Three Kingdoms (RTK) is a classical Chinese historical novel by Luo Guanzhong. This paper establishes a research framework of analyzing the novel by utilizing coword and cluster analysis technology. At the beginning, we segment the full text of the novel, extracting the names of historical figures in the RTK novel. Based on the coword analysis, a social network of historical figures is constructed. We calculate several network features and enforce the cluster analysis. In addition, a modified clustering method using edge betweenness is proposed to improve the effect of clustering. Finally, both quantified and visualized results are displayed to confirm our approach. 1. Introduction ysis, cluster analysis, experiments, and the analysis of results. Conclusions are drawn in Section 6. The Romance of the Three Kingdoms, written by Luo Guanzhong, is generally considered to be one of the four great 2. -
中国物理快报 Chinese Physics Letters
ISSN: 0256-307X 中国物理快报 Chinese Physics Letters A Series Journal of the Chinese Physical Society Distributed by IOP Publishing Online: http://www.iop.org/journals/cpl http://cpl.iphy.ac.cn CHINESE PHYSICAL SOCIETY CHIN. PHYS. LETT. Vol. 27, No. 5 (2010) 056201 Frequency Response of the Sample Vibration Mode in Scanning Probe Acoustic Microscope * ZHAO Ya-Jun(ë亚军), CHENG Qian(§0), QIAN Meng-Lu(a梦è)** Institute of Acoustics, Tongji University, Shanghai 200092 (Received 22 December 2009) Based on the interaction mechanism between tip and sample in the contact mode of a scanning probe acoustic microscope (SPAM), an active mass of the sample is introduced in the mass-spring model. The tip motion and frequency response of the sample vibration mode in the SPAM are calculated by the Lagrange equation with dissipation function. For the silicon tip and glass assemblage in the SPAM the frequency response is simulated and it is in agreement with the experimental result. The living myoblast cells on the glass slide are imaged at resonance frequencies of the SPAM system, which are 20 kHz, 30 kHz and 120 kHz. It is shown that good contrast of SPAM images could be obtained when the system is operated at the resonance frequencies of the system in high and low-frequency regions. PACS: 62. 30. +d, 68. 37. Ps, 07. 79. Lh DOI: 10.1088/0256-307X/27/5/056201 The quasi-static detection technology of scanning The sample contacting with the tip can be con- probe microscopy (SPM) has been rapidly develop- sidered as a dynamic load of the tip in the sample ing into a fully dynamic detection technology recently. -
Representations of Chinese Women Warriors in the Western Media
REPRESENTATIONS OF CHINESE WOMEN WARRIORS IN THE CINEMAS OF HONG KONG, MAINLAND CHINA AND TAIWAN SINCE 1980 A thesis submitted in partial fulfilment of the requirements for the Degree of Master of Arts in Chinese at the University of Canterbury by Yunxiang Chen University of Canterbury 2007 CONTENTS ACKNOWLEDGEMENT .................................................................................. i ABSTRACT .................................................................................................... ii Introduction................................................................................................ 1 1. HERstory of Chinese women warriors ........................................... 13 1.1 Basic Imagery ...................................................................................... 13 1.2 Thematic Continuity.......................................................................... 17 1.3 A Brief History of Women Warriors in Chinese Cinemas....... .23 2. Western Influence .................................................................................. 43 2.1 Western Women Warriors ..............................................................44 2.2 Chinese Women Warriors in Hollywood ................................... 54 3. Hong Kong .................................................................................................61 3.1 Peking Opera Blue .................................................................................... 61 3.2 Dragon Inn .............................................................................................