Yue Fei
Yue Fei (; March 24, 1103 – January 28, 1142), courtesy name Pengju (), was a Chinese military general of the Song dynasty and is remembered as a patriotic national hero, known for leading its forces in the wars in the 12th century between Southern Song and the Jurchen-led Jin dynasty in northern China. Because of his warlike stance, he was put to death by the Southern Song government in 1142 under a frameup, after a negotiated peace was achieved with the Jin dynasty. Yue Fei is depicted in the ''Wu Shuang Pu'' by Jin Guliang.Yue Fei's ancestral home was in Xiaoti, Yonghe Village, Tangyin, Xiangzhou, Henan (in present-day Tangyin County, Anyang, Henan). He was granted the posthumous name Wumu () by Emperor Xiaozong in 1169, and later granted the noble title King of E () posthumously by the Emperor Ningzong in 1211. Since his death and after the fall of the Song dynasty in 1279, Yue Fei is widely seen as a culture hero in China; he has evolved into a paragon of loyalty in Chinese culture. Provided by Wikipedia
Showing 1 - 9 results of 9 for search 'Yue Fei', query time: 0.02s
Refine Results
-
1
Subtractive pixel adjacency matrix based features for steganalysis of spatial color images by Tao HAN, Xi CHEN, Yue-fei ZHU
Published 2016-02-01
Article -
2
Automatic Segmentation and Enhancement of Pavement Cracks Based on 3D Pavement Images by Baoxian Li, Kelvin C. P. Wang, Allen Zhang, Yue Fei
Published 2019-01-01
Article -
3
DESIGN AND ANALYSIS OF SABOT STRUCTURE OF THE COORDINATOR by WANG ZhenRong, GAO YueFei, LIU HaiTao, LIU Song
Published 2019-01-01
Article -
4
Cryptographic secrecy of steganographic matrix encoding by Jia-yong CHEN, Jiu-fen LIU, Yue-fei ZHU, Wei-ming ZHANG
Published 2012-06-01
Article -
5
Efficient identity-based fully homomorphic encryption over NTRU by Ran DUAN, Chun-xiang GU, Yue-fei ZHU, Yong-hui ZHENG, Li CHEN
Published 2017-01-01
Article -
6
Risk assessment model based on fuzzy Petri nets by Xiang GAO, Yue-fei ZHU, Sheng-li LIU, Jin-long FEI, Long LIU
Published 2013-08-01
Article -
7
RLWE-based key-policy ABE scheme by Ze-dong SUN, Yue-fei ZHU, Chun-xiang GU, Yong-hui1 ZHENG
Published 2016-10-01
Article -
8
Identity-based fully homomorphic encryption from learning with error problem by Yan GUANG, Yue-fei ZHU, Jin-long FEI, Chun-xiang GU, Yong-hui ZHENG
Published 2014-02-01
Article -
9
Chosen-key extracting attack to random LSB steganography by CHEN Jia-yong1, ZHU Yue-fei1, ZHANG Wei-ming2, LIU Jiu-fen2
Published 2010-01-01
Article