文档价格: | 1000金币立即充值 | 包含内容: | 完整论文 | 文章下载流程 | |||||
文章字数: | 7330 字 (由Word统计) | 文章格式: | Doc.docx (Word) | 本站文章可以通过查重吗? |
从象征主义角度探究《达·芬奇密码》_英语论文
Exploring The Da Vinci Code from the Perspective of Symbolism
摘要
丹·布朗堪称美国最著名畅销书作家之一。在他的代表作《达·芬奇密码》中,卢浮宫博物馆馆长索尼埃被害前留下了一串匪夷所思的线索,密码学教授兰登和密码破译天才索菲围绕着一系列达·芬奇的艺术作品和有关联的神秘符号进行分析和调查,而分析调查的过程同时又是悬念丛生的过程。随着他们对诸多奇形怪状的符号及密码进行整理,最终发现在这些艺术作品当中隐藏着郇山隐修会苦心掩盖的惊天大秘密以及令人震惊的古老真相。
密码学、密钥和密码一直都是这部小说的主题,人物的名字里含有双关语、变位字,内容也暗藏线索。本文立足于象征主义,从各个表层意象对《达·芬奇密码》里的密码学行话、科技用语、暗喻进行探究,通过解开这些环环相扣的密码暗喻,发现宗教颠覆的含义和信仰的力量,旨在打破传统牢笼思维的禁锢,同时使读者欣赏这些符号、数字背后的美。
关键词:《达·芬奇密码》;象征手法;线索
Abstract
Dan Brown is one of the most famous American best-selling writers. In his representative work The Da Vinci Code, the Louvre Museum curator Saunière had left a bunch of mysterious clues before he died. The cryptography professor Landon and Sophie who was a genius of password interpretation analyzed and investigated a series of artworks of Da Vinci. The process of solving puzzles is filled with all kinds of suspense. When they sorted out a lot of strange symbols and passwords, they found that there was a secret hidden by the Priory of Sion and a shocking ancient truth among these artworks.
Cryptography, key and code have been the theme in this novel, so it causes widespread concern and critics always explore the cryptography jargon and technical terms in it. This thesis explores The Da Vinci Code from the perspective of symbolism. It aims at helping the reader to understand the power of faith and find the beauty of codes.
Key words: The Da Vinci Code; symbolism; clue
Contents
Acknowledgements i
Abstract & Key words in English ii
Abstract & Key words in Chinese iii
Introduction .1
1. Overview of symbolism .2
1.1 Definition of symbolism 3
1.2 Development of symbolism . 3
2. Symbolic reading of The Da Vinci Code 4
2.1 Backgrounds . 4
2.1.1 Religion . .5
2.1.2 Society 5
2.1.3 Faith 6
2.2 Symbolic images .. 7
2.2.1 Pictures 7
2.2.2 Characters 9
2.2.3 Codes 11
3. Evaluation on symbolism in The Da Vinci Code 12
3.1 Theme exposition 12
3.2 Appreciation of application . 13
Conclusion 14
References 17