28 results on '"Mingji Yu"'
Search Results
2. A Comprehensive Analysis Method for Reversible Data Hiding in Stream-Cipher-Encrypted Images.
- Author
-
Mingji Yu, Heng Yao, Chuan Qin 0001, and Xinpeng Zhang 0001
- Published
- 2022
- Full Text
- View/download PDF
3. Adaptive and separable multiary reversible data hiding in encryption domain
- Author
-
Mingji Yu, Yuchen Liu, Hu Sun, Heng Yao, and Tong Qiao
- Subjects
Reversible data hiding ,encryption domain ,stream cipher ,prediction error histogram ,Electronics ,TK7800-8360 - Abstract
Abstract To ensure the security of digital information, information needs to be stored and processed in the encryption domain during the cloud storage process, during which the user does not allow the cloud provider (CP) to access the image contents, and the CP must embed additional information in the image. Therefore, reversible data hiding in an encryption domain (RDHEI) has emerged. This paper presents an adaptive and separable multiary RDHEI method. First, the image is divided into two parts that consist of reference pixels and non-reference pixels. Next, we compute the prediction errors of the non-reference pixels, followed by a replacement of the original non-reference values with the computed prediction errors. Then, the entire image is encrypted with a specially designed stream cipher strategy so that the CP can embed additional information by modifying the prediction errors without knowing the original image. In addition, although our method vacates space before encryption, the CP can adaptively control the reserved space, unlike traditional RDHEI schemes which also vacate space before encryption. Because our method is separable, the embedded message can be extracted from both encryption and plaintext domains accurately. The experimental results demonstrate the efficacy of the proposed method.
- Published
- 2020
- Full Text
- View/download PDF
4. Reversible data hiding in encrypted images without additional information transmission.
- Author
-
Mingji Yu, Heng Yao, and Chuan Qin 0001
- Published
- 2022
- Full Text
- View/download PDF
5. Evaluation of Maturity and Odor Emissions in the Process of Combined Composting of Kitchen Waste and Garden Waste
- Author
-
Bangxi Zhang, Feifei Fan, Chao Guo, Mingji Yu, Mingcan Zhao, Yuan Song, and Yun Li
- Subjects
composting ,kitchen waste ,garden waste ,maturity ,odor emissions ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
With the development of urbanization, kitchen waste and garden waste have become an important part of municipal solid waste (MSW), which is in urgent need of resource treatment. This study investigated the impacts of garden waste as auxiliary materials on maturity and odor emissions (NH3 and H2S) during kitchen waste composting. The result showed that the combined composting product of kitchen waste and garden waste achieved the maturity effect, and the co-composting effect was better than that of separate composting of kitchen waste. Meanwhile, compared with the separate composting treatment of kitchen waste, the co-composting treatment of kitchen waste and garden waste can effectively reduce the cumulative emissions of H2S by more than 85%, and effectively reduce the cumulative emissions of NH3 by more than 75%. This study provides a technical reference for the green fertilizer utilization of kitchen waste and garden waste.
- Published
- 2021
- Full Text
- View/download PDF
6. Can Spectral CT Imaging Improve the Differentiation between Malignant and Benign Solitary Pulmonary Nodules?
- Author
-
Ying Zhang, Jiejun Cheng, Xiaolan Hua, Mingji Yu, Chengdong Xu, Feng Zhang, Jianrong Xu, and Huawei Wu
- Subjects
Medicine ,Science - Abstract
To quantitatively assess the value of dual-energy CT (DECT) in differentiating malignancy and benignity of solitary pulmonary nodules.Sixty-three patients with solitary pulmonary nodules detected by CT plain scan underwent contrast enhanced CT scans in arterial phase (AP) and venous phase (VP) with spectral imaging mode for tumor type differentiation. The Gemstone Spectral Imaging (GSI) viewer was used for image display and data analysis. Region of interest was placed on the relatively homogeneous area of the nodule to measure iodine concentration (IC) on iodine-based material decomposition images and CT numbers on monochromatic image sets to generate spectral HU curve. Normalized IC (NIC), slope of the spectral HU curve (λHU) and net CT number enhancement on 70keV images were calculated. The two-sample t-test was used to compare quantitative parameters. Receiver operating characteristic curves were generated to calculate sensitivity and specificity.There were 63 nodules, with 37 malignant nodules (59%) and 26 benign nodules (41%). NIC, λHU and net CT number enhancement on 70keV images for malignant nodules were all greater than those of benign nodules. NIC and λHU had intermediate to high performances to differentiate malignant nodules from benign ones with the areas under curve of 0.89 and 0.86 respectively in AP, 0.96 and 0.89 respectively in VP. Using 0.30 as a threshold value for NIC in VP, one could obtain sensitivity of 93.8% and specificity of 85.7% for differentiating malignant from benign solitary pulmonary nodules. These values were statistically higher than the corresponding values of 74.2% and 53.8% obtained with the conventional CT number enhancement.DECT imaging with GSI mode provides more promising value in quantitative way for distinguishing malignant nodules from benign ones than CT enhancement numbers.
- Published
- 2016
- Full Text
- View/download PDF
7. Application Value of Spectral CT Imaging in Quantitative Analysis of Early Lung Adenocarcinoma
- Author
-
Wang Du, Mingji Yu, Xiaojie Luo, and Min Chen
- Subjects
Oncology ,Article Subject - Abstract
Objective. To investigate the clinical value of gemstone energy spectral CT imaging for the quantitative analysis of early lung adenocarcinoma. Methods. 76 cases of pulmonary ground-glass nodules pathologically confirmed as precancerous lesion and early lung cancer (including pure ground-glass nodules in 46 cases and mixed ground-glass nodules in 30 cases) underwent chest CT scan first and then underwent contrast-enhanced gemstone energy spectral CT to get arterial phase images, venous phase images, and delayed phase images. All the lesions were set the region of interest (ROI). Cases of the pure ground-glass nodule (pGGN) were measured at the maximum level of lesions, cases of the mixed ground-glass nodule (mGGN) were measured in two areas of ground-glass and solid components, CT value and iodine concentrations of lesions in three-phase scanning were separately measured, and at the same time, iodine concentrations of the thoracic aorta were also measured. The normalized iodine concentrations (NICs) were calculated, that is, the ratio of iodine concentrations of lesions and the thoracic aorta. CT values of lesions were also measured at each stage of 70 keV. All the quantitative data were expressed by the mean ± standard deviation, and paired t-test was used for pairwise comparison. Results. In 76 cases, in the spectral CT imaging mode, the NIC value of solid components of the GGN was 0.33 ± 0.16 in the arterial phase (AP), 0.52 ± 0.25 in the venous phase (VP), and 0.58 ± 0.34 in the delayed phase (DP). There were significant differences of P values of NICs between each two phases in both solid component cases and the ground-glass component cases in AP/VP, VP/DP, and AP/DP ( P < 0.05 ); there were no statistically significant P values of CT values between each two phases in three-period enhanced CT in both the solid component cases and the ground-glass component cases in AP/VP, VP/DP, and AP/DP ( P > 0.05 ). Conclusion. Gemstone energy spectral CT with quantitative imaging can dynamically reflect the enhancement features of the pulmonary GGN.
- Published
- 2021
8. Evaluation of Maturity and Odor Emissions in the Process of Combined Composting of Kitchen Waste and Garden Waste
- Author
-
Yun Li, Feifei Fan, Chao Guo, Yuan Song, Mingji Yu, Bangxi Zhang, and Mingcan Zhao
- Subjects
Technology ,Municipal solid waste ,Process (engineering) ,QH301-705.5 ,QC1-999 ,garden waste ,0211 other engineering and technologies ,02 engineering and technology ,010501 environmental sciences ,01 natural sciences ,General Materials Science ,021108 energy ,Biology (General) ,Instrumentation ,QD1-999 ,0105 earth and related environmental sciences ,Fluid Flow and Transfer Processes ,Waste management ,Process Chemistry and Technology ,Physics ,odor emissions ,General Engineering ,Engineering (General). Civil engineering (General) ,Maturity (finance) ,Computer Science Applications ,Chemistry ,Odor ,composting ,Environmental science ,kitchen waste ,TA1-2040 ,maturity - Abstract
With the development of urbanization, kitchen waste and garden waste have become an important part of municipal solid waste (MSW), which is in urgent need of resource treatment. This study investigated the impacts of garden waste as auxiliary materials on maturity and odor emissions (NH3 and H2S) during kitchen waste composting. The result showed that the combined composting product of kitchen waste and garden waste achieved the maturity effect, and the co-composting effect was better than that of separate composting of kitchen waste. Meanwhile, compared with the separate composting treatment of kitchen waste, the co-composting treatment of kitchen waste and garden waste can effectively reduce the cumulative emissions of H2S by more than 85%, and effectively reduce the cumulative emissions of NH3 by more than 75%. This study provides a technical reference for the green fertilizer utilization of kitchen waste and garden waste.
- Published
- 2021
- Full Text
- View/download PDF
9. Adaptive and separable multiary reversible data hiding in encryption domain
- Author
-
Heng Yao, Yuchen Liu, Tong Qiao, Mingji Yu, and Hu Sun
- Subjects
Pixel ,business.industry ,Computer science ,lcsh:Electronics ,lcsh:TK7800-8360 ,020206 networking & telecommunications ,Plaintext ,Reversible data hiding ,02 engineering and technology ,Encryption ,stream cipher ,Image (mathematics) ,Domain (software engineering) ,prediction error histogram ,Information hiding ,encryption domain ,Signal Processing ,Pattern recognition (psychology) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,business ,Algorithm ,Stream cipher ,Information Systems - Abstract
To ensure the security of digital information, information needs to be stored and processed in the encryption domain during the cloud storage process, during which the user does not allow the cloud provider (CP) to access the image contents, and the CP must embed additional information in the image. Therefore, reversible data hiding in an encryption domain (RDHEI) has emerged. This paper presents an adaptive and separable multiary RDHEI method. First, the image is divided into two parts that consist of reference pixels and non-reference pixels. Next, we compute the prediction errors of the non-reference pixels, followed by a replacement of the original non-reference values with the computed prediction errors. Then, the entire image is encrypted with a specially designed stream cipher strategy so that the CP can embed additional information by modifying the prediction errors without knowing the original image. In addition, although our method vacates space before encryption, the CP can adaptively control the reserved space, unlike traditional RDHEI schemes which also vacate space before encryption. Because our method is separable, the embedded message can be extracted from both encryption and plaintext domains accurately. The experimental results demonstrate the efficacy of the proposed method.
- Published
- 2020
- Full Text
- View/download PDF
10. Can Spectral CT Imaging Improve the Differentiation between Malignant and Benign Solitary Pulmonary Nodules?
- Author
-
Mingji Yu, Feng Zhang, Jianrong Xu, Chengdong Xu, Huawei Wu, Xiao-Lan Hua, Ying Zhang, and Jiejun Cheng
- Subjects
Male ,Biopsy ,lcsh:Medicine ,Lung and Intrathoracic Tumors ,Diagnostic Radiology ,030218 nuclear medicine & medical imaging ,0302 clinical medicine ,Medicine and Health Sciences ,lcsh:Science ,Tomography ,Aged, 80 and over ,X ray radiography ,Multidisciplinary ,medicine.diagnostic_test ,Radiology and Imaging ,Physics ,Benignity ,Middle Aged ,Pulmonary Imaging ,Bone Imaging ,Radiographic Image Enhancement ,Chemistry ,Oncology ,030220 oncology & carcinogenesis ,Physical Sciences ,Female ,Radiology ,Elementary Particles ,Research Article ,Chemical Elements ,Iodine ,Adult ,medicine.medical_specialty ,Imaging Techniques ,Neuroimaging ,Radiation Dosage ,Research and Analysis Methods ,Malignancy ,Diagnosis, Differential ,03 medical and health sciences ,Diagnostic Medicine ,Cancer Detection and Diagnosis ,medicine ,Humans ,Particle Physics ,Differentiated Tumors ,Aged ,Photons ,Solitary pulmonary nodule ,business.industry ,lcsh:R ,Reproducibility of Results ,Solitary Pulmonary Nodule ,Biology and Life Sciences ,Cancers and Neoplasms ,medicine.disease ,Computed Axial Tomography ,X-Ray Radiography ,ROC Curve ,lcsh:Q ,Differential diagnosis ,Ct imaging ,Tomography, X-Ray Computed ,business ,Neuroscience - Abstract
Purpose To quantitatively assess the value of dual-energy CT (DECT) in differentiating malignancy and benignity of solitary pulmonary nodules. Materials and Methods Sixty-three patients with solitary pulmonary nodules detected by CT plain scan underwent contrast enhanced CT scans in arterial phase (AP) and venous phase (VP) with spectral imaging mode for tumor type differentiation. The Gemstone Spectral Imaging (GSI) viewer was used for image display and data analysis. Region of interest was placed on the relatively homogeneous area of the nodule to measure iodine concentration (IC) on iodine-based material decomposition images and CT numbers on monochromatic image sets to generate spectral HU curve. Normalized IC (NIC), slope of the spectral HU curve (λHU) and net CT number enhancement on 70keV images were calculated. The two-sample t-test was used to compare quantitative parameters. Receiver operating characteristic curves were generated to calculate sensitivity and specificity. Results There were 63 nodules, with 37 malignant nodules (59%) and 26 benign nodules (41%). NIC, λHU and net CT number enhancement on 70keV images for malignant nodules were all greater than those of benign nodules. NIC and λHU had intermediate to high performances to differentiate malignant nodules from benign ones with the areas under curve of 0.89 and 0.86 respectively in AP, 0.96 and 0.89 respectively in VP. Using 0.30 as a threshold value for NIC in VP, one could obtain sensitivity of 93.8% and specificity of 85.7% for differentiating malignant from benign solitary pulmonary nodules. These values were statistically higher than the corresponding values of 74.2% and 53.8% obtained with the conventional CT number enhancement. Conclusions DECT imaging with GSI mode provides more promising value in quantitative way for distinguishing malignant nodules from benign ones than CT enhancement numbers.
- Published
- 2016
- Full Text
- View/download PDF
11. Texture driven adaptive multi-level block selection based reversible data hiding in encrypted image.
- Author
-
Cao, Fang, Chen, Jing, and Li, Fengyong
- Subjects
REVERSIBLE data hiding (Computer science) ,STREAM ciphers ,IMAGE compression ,BLOCK codes - Abstract
For reversible data hiding in encrypted image (RDHEI), it is an important problem to resolve the contradiction between embedding capacity and image visual quality. However, existing schemes do not maintain a good balance between them. Accordingly, we propose a multi-level block selection embedding mechanism to solve this problem. Our scheme firstly divides original image into muliple non-overlapping blocks with identical size. The most significant bit (MSB) planes of all pixels in the block are predicted from their neighboring pixels to generate a corresponding prediction error map for each block. Subsequently, the pixels are divided into eight bit planes, and the adjacent bit planes are implemented XOR operation to vacate room. Furthermore, by simulating data embedding in each block, PSNR values of each image block are sequentially generated. After encrypting the image using stream ciphers, the optimal blocks with maximum PSNR value can be selected to embed data according to the secret data capacity. Since our proposed scheme usually selects the image block with maximum PSNR value to embed secret data, it can naturally improve the image visual quality. Extensive experiments demonstrate that our scheme is effective and efficient, and outperforms existing state-of-the art methods with better visual quality and higher security performance under the given embedding capacity. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. A Comprehensive Analysis Method for Reversible Data Hiding in Stream-Cipher-Encrypted Images.
- Author
-
Yu, Mingji, Yao, Heng, Qin, Chuan, and Zhang, Xinpeng
- Subjects
REVERSIBLE data hiding (Computer science) - Abstract
Reversible data hiding in encrypted images (RDHEI), an essential branch of reversible data hiding (RDH), has been in development for more than a decade. For most existing stream-cipher-based RDHEI algorithms, encryption schemes are often not the same; thus, these schemes have different effects on the encrypted images. As a result, it is not reasonable to compare the embedding rates (ERs) of RDHEI algorithms directly as we do for plaintext RDH algorithms. However, to our knowledge, many studies focus on the performance of embedding but neglect the influence of the encryption. To compare the performance of stream-cipher-based RDHEI algorithms more reasonably, this paper proposes a novel comprehensive measure to evaluate state-of-the-art RDHEI algorithms. First, the characteristics of the stream-cipher-based RDHEI algorithms are divided into two categories according to the encryption and embedding processes. Next, we use correlation and redundancy to evaluate the influence of encryption schemes and also use ER, computation complexity, visual quality, and algorithm stability to evaluate the embedding schemes. In the end, in order to combine all six indexes into the final evaluation measure, we standardize each index before applying the radar chart. The experimental results show the evaluation results of the recent RDHEI algorithms via a comprehensive analysis and demonstrate the guiding significance of the proposed method for the current RDHEI algorithm selection. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
13. Evaluation of Maturity and Odor Emissions in the Process of Combined Composting of Kitchen Waste and Garden Waste.
- Author
-
Zhang, Bangxi, Fan, Feifei, Guo, Chao, Yu, Mingji, Zhao, Mingcan, Song, Yuan, and Li, Yun
- Subjects
KITCHEN gardens ,COMPOSTING ,WASTE treatment ,WASTE recycling ,WASTE products ,ODORS ,REFUSE containers - Abstract
With the development of urbanization, kitchen waste and garden waste have become an important part of municipal solid waste (MSW), which is in urgent need of resource treatment. This study investigated the impacts of garden waste as auxiliary materials on maturity and odor emissions (NH
3 and H2 S) during kitchen waste composting. The result showed that the combined composting product of kitchen waste and garden waste achieved the maturity effect, and the co-composting effect was better than that of separate composting of kitchen waste. Meanwhile, compared with the separate composting treatment of kitchen waste, the co-composting treatment of kitchen waste and garden waste can effectively reduce the cumulative emissions of H2 S by more than 85%, and effectively reduce the cumulative emissions of NH3 by more than 75%. This study provides a technical reference for the green fertilizer utilization of kitchen waste and garden waste. [ABSTRACT FROM AUTHOR]- Published
- 2021
- Full Text
- View/download PDF
14. Research on information steganography based on network data stream.
- Author
-
Lu, Jiazhong, Zhang, Weisha, Deng, Ziye, Zhang, Shibin, Chang, Yan, and Liu, Xiaolei
- Subjects
CRYPTOGRAPHY ,DATA packeting ,DATABASES ,COMPUTER network protocols ,TELECOMMUNICATION systems ,RIVERS - Abstract
To protect the information from being intercepted by third parties during the network communication process, this paper proposes a new type of data steganography technology based on network data flow. Using the network protocol itself and the relationship between data packets in the entire network data stream to perform network data steganography, transfer hidden data, and perform secondary identity authentication. Different from the traditional steganography method, this method can encode the hidden data and send the interval value by embedding the data packet, thereby hiding and transmitting the hidden data. In this technology, the operation of hidden data does not affect the user's access request for real network data, and it can perform processes such as hidden data transfer and secondary authentication without the user being able to detect it. Through experimental verification and evaluation, our method improves the concealment of the steganographic channel, is not easy to attract attention and has no obvious statistical characteristics of the traffic, and can improve the concealment and robustness of the steganography technology based on network data streams. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
15. Cool, warm, soft and sharp: paradigms of cultural exchange in Japan–China relations.
- Author
-
Vyas, Utpal
- Subjects
IDEOLOGY ,SOFT power (Social sciences) ,CULTURAL relations ,INTERNATIONAL relations ,RECIPROCITY (Commerce) - Abstract
In the post-war period, relations between Japan and China have veered between cold and warm. For most of this period, due to historical and ideological issues, there has been an underlying tension which has prevented genuinely friendly relations and open cultural exchange between the two states. However, there have been periods of time when more open cultural exchanges and free information flows have occurred, and when genuinely friendly and cooperative relations have seemed possible. This article first proposes a model of cultural exchange based on types of information flow between countries. It then reviews zero-sum and non-zero sum theoretical perspectives on cultural exchange. Using these ideas, the article then uses several paradigms to characterise cultural exchange in Japan–China relations, namely people to people, partnership, reciprocity, soft power and sharp power paradigms, from the post-war era up to current times. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
16. Adaptive and separable multiary reversible data hiding in encryption domain.
- Author
-
Yu, Mingji, Liu, Yuchen, Sun, Hu, Yao, Heng, and Qiao, Tong
- Subjects
IMAGE encryption ,DATA encryption ,CLOUD storage ,STREAM ciphers ,FORECASTING ,INFORMATION technology security ,INFORMATION needs - Abstract
To ensure the security of digital information, information needs to be stored and processed in the encryption domain during the cloud storage process, during which the user does not allow the cloud provider (CP) to access the image contents, and the CP must embed additional information in the image. Therefore, reversible data hiding in an encryption domain (RDHEI) has emerged. This paper presents an adaptive and separable multiary RDHEI method. First, the image is divided into two parts that consist of reference pixels and non-reference pixels. Next, we compute the prediction errors of the non-reference pixels, followed by a replacement of the original non-reference values with the computed prediction errors. Then, the entire image is encrypted with a specially designed stream cipher strategy so that the CP can embed additional information by modifying the prediction errors without knowing the original image. In addition, although our method vacates space before encryption, the CP can adaptively control the reserved space, unlike traditional RDHEI schemes which also vacate space before encryption. Because our method is separable, the embedded message can be extracted from both encryption and plaintext domains accurately. The experimental results demonstrate the efficacy of the proposed method. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
17. Can Spectral CT Imaging Improve the Differentiation between Malignant and Benign Solitary Pulmonary Nodules?
- Author
-
Zhang, Ying, Cheng, Jiejun, Hua, Xiaolan, Yu, Mingji, Xu, Chengdong, Zhang, Feng, Xu, Jianrong, and Wu, Huawei
- Subjects
SOLITARY pulmonary nodule ,DUAL energy CT (Tomography) ,LUNG diseases ,LUNG cancer diagnosis ,IMAGING of cancer ,DATA analysis ,PATIENTS ,DIAGNOSIS - Abstract
Purpose: To quantitatively assess the value of dual-energy CT (DECT) in differentiating malignancy and benignity of solitary pulmonary nodules. Materials and Methods: Sixty-three patients with solitary pulmonary nodules detected by CT plain scan underwent contrast enhanced CT scans in arterial phase (AP) and venous phase (VP) with spectral imaging mode for tumor type differentiation. The Gemstone Spectral Imaging (GSI) viewer was used for image display and data analysis. Region of interest was placed on the relatively homogeneous area of the nodule to measure iodine concentration (IC) on iodine-based material decomposition images and CT numbers on monochromatic image sets to generate spectral HU curve. Normalized IC (NIC), slope of the spectral HU curve (λ
HU ) and net CT number enhancement on 70keV images were calculated. The two-sample t-test was used to compare quantitative parameters. Receiver operating characteristic curves were generated to calculate sensitivity and specificity. Results: There were 63 nodules, with 37 malignant nodules (59%) and 26 benign nodules (41%). NIC, λHU and net CT number enhancement on 70keV images for malignant nodules were all greater than those of benign nodules. NIC and λHU had intermediate to high performances to differentiate malignant nodules from benign ones with the areas under curve of 0.89 and 0.86 respectively in AP, 0.96 and 0.89 respectively in VP. Using 0.30 as a threshold value for NIC in VP, one could obtain sensitivity of 93.8% and specificity of 85.7% for differentiating malignant from benign solitary pulmonary nodules. These values were statistically higher than the corresponding values of 74.2% and 53.8% obtained with the conventional CT number enhancement. Conclusions: DECT imaging with GSI mode provides more promising value in quantitative way for distinguishing malignant nodules from benign ones than CT enhancement numbers. [ABSTRACT FROM AUTHOR]- Published
- 2016
- Full Text
- View/download PDF
18. Comparative study on two field orientation control methods for the excitation field in the hybrid excitation synchronous generator.
- Author
-
Mingji, Liu, Xiaoyan, Zhang, and Jianxin, Hu
- Published
- 2014
- Full Text
- View/download PDF
19. Song Maocheng's Matrixes of Mourning and Regret.
- Author
-
Struve, Lynn A.
- Subjects
CHINESE poetry ,WIVES ,MARRIED people ,BEREAVEMENT ,REGRET ,EULOGIES ,MING dynasty, China, 1368-1644 ,ELEGIAC poetry - Abstract
Through the many poems of loss and commemorative essays in the collected works of Song Maocheng (1569-1620), we can discern three matrixes of association among the author and his deceased loved ones: (1) a patrilineal matrix in which the salient theme is the rupture or felt-failure of paternal and avuncular care and guidance of male children in the patriline; (2) a female-domestic matrix in which losses engendered feelings of guilt, either for partial responsibility in the deaths or for inability to properly recompense female care and self-sacrifice within the household; and (3) a female-sensual matrix in which the loss of feminine sympathy, comfort, and beauty—whether to death or to parting—dominate the aesthetic. These three matrixes overlap in the wife's roles as maternal perpetuator of the patriline, preserver of household harmony and resources, and loving, devoted spouse. The centrality of the wife's role is reflected most strikingly in the long, moving "Elegy, with Preface" that Song wrote for his first wife, née Yang, who died in Song's absence shortly after giving birth to his first son in the third year of their marriage. Despite remarriage and the acquisition of multiple concubines, Song also wrote several sets of poems in memory of his first wife, who entered his dreams for many years after her death. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
20. Plum Shadows and Plank Bridge : Two Memoirs About Courtesans
- Author
-
Mao Xiang, Yu Huai, Mao Xiang, and Yu Huai
- Subjects
- Courtesans--China--History--17th century, Courtesans in literature
- Abstract
Amid the turmoil of the Ming-Qing dynastic transition in seventeenth-century China, some intellectuals sought refuge in romantic memories from what they perceived as cataclysmic events. This volume presents two memoirs by famous men of letters, Reminiscences of the Plum Shadows Convent by Mao Xiang (1611–93) and Miscellaneous Records of Plank Bridge by Yu Huai (1616–96), that recall times spent with courtesans. They evoke the courtesan world in the final decades of the Ming dynasty and the aftermath of its collapse.Mao Xiang chronicles his relationship with the courtesan Dong Bai, who became his concubine two years before the Ming dynasty fell. His mournful remembrance of their life together, written shortly after her early death, includes harrowing descriptions of their wartime sufferings as well as idyllic depictions of romantic bliss. Yu Huai offers a group portrait of Nanjing courtesans, mixing personal memories with reported anecdotes. Writing fifty years after the fall of the Ming, he expresses a deep nostalgia for courtesan culture that bears the toll of individual loss and national calamity. Together, they shed light on the sensibilities of late Ming intellectuals: their recollections of refined pleasures and ruminations on the vagaries of memory coexist with political engagement and a belief in bearing witness. With an introduction and extensive annotations, Plum Shadows and Plank Bridge is a valuable source for the literature of remembrance, the representation of women, and the social role of intellectuals during a tumultuous period in Chinese history.
- Published
- 2020
21. Confucian Image Politics : Masculine Morality in Seventeenth-Century China
- Author
-
Ying Zhang and Ying Zhang
- Subjects
- Confucian ethics--China--History--17th century, Political ethics--China--History--17th century
- Abstract
During the Ming-Qing transition (roughly from the 1570s to the 1680s), literati-officials in China employed public forms of writing, art, and social spectacle to present positive moral images of themselves and negative images of their rivals. The rise of print culture, the dynastic change, and the proliferating approaches to Confucian moral cultivation together gave shape to this new political culture. Confucian Image Politics considers the moral images of officials—as fathers, sons, husbands, and friends—circulated in a variety of media inside and outside the court. It shows how power negotiations took place through participants'invocations of Confucian ethical ideals in political attacks, self-expression, self-defense, discussion of politically sensitive issues, and literati community rebuilding after the dynastic change. This first book-length study of early modern Chinese politics from the perspective of critical men's history shows how images—the Donglin official, the Fushe scholar, the turncoat figure—were created, circulated, and contested to serve political purposes.The open access publication of this book was made possible by a grant from the James P. Geiss and Margaret Y. Hsu Foundation.
- Published
- 2016
22. Plum Shadows and Plank Bridge : Two Memoirs About Courtesans
- Author
-
XIANG, MAO, HUAI, YU, LI, WAI-YEE, Translated and edited by, XIANG, MAO, HUAI, YU, and LI, WAI-YEE
- Published
- 2020
- Full Text
- View/download PDF
23. Investigators at University of Shanghai for Science and Technology Detail Findings in Cloud Computing (Reversible Data Hiding In Encrypted Images Without Additional Information Transmission)
- Subjects
School construction -- Research -- Reports ,Cloud computing -- Reports -- Research ,Computers - Abstract
2022 JUL 5 (VerticalNews) -- By a News Reporter-Staff News Editor at Information Technology Newsweekly -- New research on Information Technology - Cloud Computing is the subject of a report. [...]
- Published
- 2022
24. New Lung Cancer Study Findings Recently Were Reported by Researchers at Beijing Hospital (application Value of Spectral Ct Imaging In Quantitative Analysis of Early Lung Adenocarcinoma)
- Subjects
Oncology, Experimental ,Adenocarcinoma ,Lung cancer ,CT imaging ,Cancer -- Research ,Diagnostic imaging ,Health - Abstract
2022 MAY 20 (NewsRx) -- By a News Reporter-Staff News Editor at Health & Medicine Week -- Investigators discuss new findings in Oncology - Lung Cancer. According to news reporting [...]
- Published
- 2022
25. Confucian Image Politics : Masculine Morality in Seventeenth-Century China
- Author
-
Zhang, Ying and Zhang, Ying
- Published
- 2016
26. Study Findings on Applied Sciences Discussed by Researchers at Qingdao Agricultural University (Evaluation of Maturity and Odor Emissions in the Process of Combined Composting of Kitchen Waste and Garden Waste)
- Subjects
Technology -- Research -- Analysis -- Reports ,Health ,Science and technology - Abstract
2021 JUL 23 (NewsRx) -- By a News Reporter-Staff News Editor at Science Letter -- Fresh data on applied sciences are presented in a new report. According to news reporting [...]
- Published
- 2021
27. Study Results from University of Shanghai for Science and Technology in the Area of Information and Data Encoding and Encryption Published (Adaptive and separable multiary reversible data hiding in encryption domain)
- Subjects
Technology ,Editors ,Computers - Abstract
2020 MAY 12 (VerticalNews) -- By a News Reporter-Staff News Editor at Information Technology Newsweekly -- Data detailed on information and data encoding and encryption have been presented. According to [...]
- Published
- 2020
28. Lord of the Three in One : The Spread of a Cult in Southeast China
- Author
-
Kenneth Dean and Kenneth Dean
- Abstract
An illuminating account of the steadfast resilience of rural popular culture in post-Mao ChinaLin Zhao'en (1517–1598) set out to popularize Confucianism by combining Confucian studies with Daoist inner alchemical techniques and Buddhist Chan philosophy into something he called the Three in One Teachings. Despite periods of clandestine activity since its inception, the Three in One cult has undergone a remarkable revival in post-Mao China. Today, in more than a thousand temples by tens of thousands of cult initiates, Lin is worshipped throughout Southeast China and Southeast Asia as Lord of the Three in One. Many of the temples have been restored since the late 1970s, when China began to experience an explosive resurgence of popular culture and religion. In this book, Kenneth Dean draws on a decade of field work to document the reemergence of this cult, which seeks to transmit a universal vision of truth yet retains a strong local appeal through its healing rituals and spirit mediumism. Although the Chinese government still tries to suppress these resurgences in the interest of modernization, the cult's locally based networks are unstoppable social forces.Dean explores the organization and transmission of the Three in One's unique cultural vision, the reception of this vision, and the construction of subjectivity within a vibrant ritual tradition. Outlining such features as inner alchemical meditation, scripture and iconography, ritual practice, and spirit mediumism, he demonstrates the cult's transformative potential as well as its contemporaneity and dynamism. Rural Chinese popular culture emerges here as resilient, highly complex, and always evolving.
- Published
- 1998
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.