期刊文献+
共找到5,352篇文章
< 1 2 250 >
每页显示 20 50 100
A fast-running engineering tool for assessing structural vulnerability to blast loading
1
作者 Carlo Crispino Salvatore Annunziata +2 位作者 Alberto Contini Luca Lomazzi Andrea Manes 《Defence Technology(防务技术)》 2025年第4期244-254,共11页
Assessing the vulnerability of a platform is crucial in its design.In fact,the results obtained from vulnerability analyses provide valuable information,leading to precise design choices or corrective solutions that e... Assessing the vulnerability of a platform is crucial in its design.In fact,the results obtained from vulnerability analyses provide valuable information,leading to precise design choices or corrective solutions that enhance the platform's chances of surviving different scenarios.Such scenarios can involve various types of threats that can affect the platform's survivability.Among such,blast waves impacting the platform's structure represent critical conditions that have not yet been studied in detail.That is,frameworks for vulnerability assessment that can deal with blast loading have not been presented yet.In this context,this work presents a fast-running engineering tool that can quantify the risk that a structure fails when it is subjected to blast loading from the detonation of high explosive-driven threats detonating at various distances from the structure itself.The tool has been implemented in an in-house software that calculates vulnerability to various impacting objects,and its capabilities have been shown through a simplified,yet realistic,case study.The novelty of this research lies in the development of an integrated computational environment capable of calculating the platform's vulnerability to blast waves,without the need for running expensive finite element simulations.In fact,the proposed tool is fully based on analytical models integrated with a probabilistic approach for vulnerability calculation. 展开更多
关键词 vulnerability Blast loading Probabilistic assessment Analytical models Fast-running engineering tool
在线阅读 下载PDF
Topological optimization of ballistic protective structures through genetic algorithms in a vulnerability-driven environment
2
作者 Salvatore Annunziata Luca Lomazzi +1 位作者 Marco Giglio Andrea Manes 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第10期125-137,共13页
Reducing the vulnerability of a platform,i.e.,the risk of being affected by hostile objects,is of paramount importance in the design process of vehicles,especially aircraft.A simple and effective way to decrease vulne... Reducing the vulnerability of a platform,i.e.,the risk of being affected by hostile objects,is of paramount importance in the design process of vehicles,especially aircraft.A simple and effective way to decrease vulnerability is to introduce protective structures to intercept and possibly stop threats.However,this type of solution can lead to a significant increase in weight,affecting the performance of the aircraft.For this reason,it is crucial to study possible solutions that allow reducing the vulnerability of the aircraft while containing the increase in structural weight.One possible strategy is to optimize the topology of protective solutions to find the optimal balance between vulnerability and the weight of the added structures.Among the many optimization techniques available in the literature for this purpose,multiobjective genetic algorithms stand out as promising tools.In this context,this work proposes the use of a in-house software for vulnerability calculation to guide the process of topology optimization through multi-objective genetic algorithms,aiming to simultaneously minimize the weight of protective structures and vulnerability.In addition to the use of the in-house software,which itself represents a novelty in the field of topology optimization of structures,the method incorporates a custom mutation function within the genetic algorithm,specifically developed using a graph-based approach to ensure the continuity of the generated structures.The tool developed for this work is capable of generating protections with optimized layouts considering two different types of impacting objects,namely bullets and fragments from detonating objects.The software outputs a set of non-dominated solutions describing different topologies that the user can choose from. 展开更多
关键词 Topological optimization Protective structure Genetic algorithm SURVIVABILITY vulnerability
在线阅读 下载PDF
Vulnerability assessment of UAV engine to laser based on improved shotline method
3
作者 Le Liu Chengyang Xu +3 位作者 Changbin Zheng Sheng Cai Chunrui Wang Jin Guo 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期588-600,共13页
Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a v... Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a variety of analysis programs for battlefield targets to traditional weapons have been developed,but a comprehensive assessment methodology for targets'vulnerability to laser is still missing.Based on the shotline method,this paper proposes a method that equates laser beam to shotline array,an efficient vulnerability analysis program of target to laser is established by this method,and the program includes the circuit board and the wire into the vulnerability analysis category,which improves the precision of the vulnerability analysis.Taking the UAV engine part as the target of vulnerability analysis,combine with the"life-death unit method"to calculate the laser penetration rate of various materials of the UAV,and the influence of laser weapon system parameters and striking orientation on the killing probability is quantified after introducing the penetration rate into the vulnerability analysis program.The quantitative analysis method proposed in this paper has certain general expansibility,which can provide a fresh idea for the vulnerability analysis of other targets to laser. 展开更多
关键词 Laser weapon Laser damage vulnerability UAV ENGINE Killing probability
在线阅读 下载PDF
Entropy weight coefficient model and its application in evaluation of groundwater vulnerability of the Sanjiang Plain 被引量:4
4
作者 LIU Rentao FU Qiang GAI Zhaomei 《Journal of Northeast Agricultural University(English Edition)》 CAS 2007年第4期368-373,共6页
The research of groundwater vulnerability is the basic work to protect the groundwater. For utilizing groundwater resource continuably, groundwater vulnerability evaluation is necessary. Useful reference to protect, e... The research of groundwater vulnerability is the basic work to protect the groundwater. For utilizing groundwater resource continuably, groundwater vulnerability evaluation is necessary. Useful reference to protect, exploit and utilize on groundwater resource are provided rationally. According to the real condition of Sanjiang Plain, the indexes system is established based on the traditional DRASTIC model. The new system includes the following seven indexes: Depth of Water, Net Recharge, Aquifer Media, Soil Media, Conductivity of the Aquifer, Land Utilizing Ratio and Populace Density. The related analysis appears that the system is rather reasonable. Because traditional methods, such as analytic hierarchy process and fuzzy mathematics theory, can't be avoided human interference in selection of weights, they could lead to an imprecise result. In order to evaluate the groundwater vulnerability reasonably, entropy weight coefficient method is applied for the first time, which provides a new way to groundwater vulnerability evaluation. The method is a model whose weights are insured by the calculation process, so the artificial disturb can be avoided. It has been used to evaluate the groundwater vulnerability in Sanjiang Plain. The satisfied result is acquired. Comparably, the same result is acquired by the other method named projection pursuit evaluation based on real-coded accelerating genetic algorithm. It shows that entropy weight coefficient method is applicable on groundwater vulnerability evaluation. The evaluation result can provide reference on the decision-making departments. 展开更多
关键词 groundwater vulnerability entropy weight coefficient model indexes system EVALUATION
在线阅读 下载PDF
Assessment of grid inherent vulnerability considering open circuit fault under potential energy framework 被引量:3
5
作者 刘群英 刘起方 +1 位作者 黄琦 刘俊勇 《Journal of Central South University》 SCIE EI CAS 2010年第6期1300-1309,共10页
A potential energy framework for assessment of grid vulnerability was presented.In the framework,the branch potential energy function model was constructed.Two indexes,current vulnerability and forecasting vulnerabili... A potential energy framework for assessment of grid vulnerability was presented.In the framework,the branch potential energy function model was constructed.Two indexes,current vulnerability and forecasting vulnerability,were calculated.The current vulnerability was used to identify the current vulnerable area through calculating the distance between the current transmitted power and initial transmitted power;and the forecast vulnerability under variation of power injection was used to predict the vulnerable area of next step and verify the current vulnerable area.Numerical simulation was performed under variant operating conditions with IEEE-30 bus system,which shows that almost area of 90% overlaps between current vulnerable area and forecasting vulnerable area,the overlapped area is termed as inherent vulnerable area of grid.When considering N-1 contingency,the assessment results of this method proposed agree with those of optimal power flow.When considering N-2 contingency,optimal power flow fails to obtain correct results,while the method based on energy framework gives reliable results. 展开更多
关键词 inherent vulnerability branch potential energy (BPE) current vulnerability forecasting vulnerability phase angledifference
在线阅读 下载PDF
Vulnerability assessment to projectiles: Approach definition and application to helicopter platforms 被引量:4
6
作者 L.Lomazzi F.Cadini +1 位作者 M.Giglio A.Manes 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2022年第9期1523-1537,共15页
Survivability is defined as the capability of a platform to avoid or withstand a man-made hostile environment. Military aircraft in particular, but also other kinds of platforms subjected to external, impacting threat... Survivability is defined as the capability of a platform to avoid or withstand a man-made hostile environment. Military aircraft in particular, but also other kinds of platforms subjected to external, impacting threats, are commonly designed according to increasing survivability requirements. The concept of survivability was first formalized by R. Ball in 1985 in its seminal work on combat aircraft survivability.On the basis of the theory presented in his work, many computer programs have been developed which implement the modelling techniques and computations required by vulnerability assessments. However,a clear and general view of the operative computational procedures is still lacking. Moreover, to date only a limited number of applications to helicopter platforms have been investigated in the survivability field,even though these platforms experience numerous flight conditions exposing the system to different types of threats. In this context, this work aims at establishing a multi-purpose general framework for the vulnerability assessment of different types of platforms subjected to external threats, with a focus on helicopters. The in-house software specifically developed for this application is here described in detail and employed to present a case study on a representative military helicopter. 展开更多
关键词 vulnerability SURVIVABILITY HELICOPTER PROJECTILE THREAT
在线阅读 下载PDF
Groundwater Vulnerability Assessment in Tanghai Country
7
作者 Peng Chen,Zhen Ma,Xiaoming Sun,Peixin Shi Tianjin Geology Survey Centre,Tianjin 30070,China. 《地学前缘》 EI CAS CSCD 北大核心 2009年第S1期29-29,共1页
Groundwater vulnerability assessment is one of the critical prerequisites to achieve efficient development and management of water resources in Tanghai-Caofeidian area,which has been one of the national key constructi... Groundwater vulnerability assessment is one of the critical prerequisites to achieve efficient development and management of water resources in Tanghai-Caofeidian area,which has been one of the national key constructive districts in North China.According to the influence factors of groundwater vulnerability,this study analyzed the impact of vadose zone that includes the depth to groundwater table,unsaturated zone lithology and permeability with the data achieved from field works in recent years.The evaluation model was established for estimating groundwater vulnerability using three 展开更多
关键词 vulnerability ASSESSMENT PARAMETERS DRASTIC
在线阅读 下载PDF
Image-Based Modeling for Atherosclerotic Coronary Plaque Progression and Vulnerability Research
8
作者 Rui Lv Liang Wang Dalin Tang 《医用生物力学》 EI CAS CSCD 北大核心 2019年第A01期81-82,共2页
China Cardiovascular Disease Report 2017(Summary)pointed out that at present,cardiovascular diseases(CVD)account for the highest number of deaths among urban and rural residents.In the middle or later stages of athero... China Cardiovascular Disease Report 2017(Summary)pointed out that at present,cardiovascular diseases(CVD)account for the highest number of deaths among urban and rural residents.In the middle or later stages of atherosclerosis,the plaques become increasingly unstable with high chance to rupture,which may lead acute death from coronary heart diseases.Medical imaging and image-based computational modeling have been used in recent years to quantify ather-osclerotic plaque morphological and biomechanical characteristics and predict the coronary plaque growth and rupture processes.Analyzing the vulnerability of plaques effectively could lead to better patient screening strategies and enable physicians to adopt timely and necessary intervention or conservative treatment.Earlier investigations of vulnerable plaques were mostly based on histopathological data.With the accumulation of experience in pathology and the gradual enrichment of autopsy materials,the criteria for the diagnosis of vulnerable plaques appeared in 2001,mainly manifested as the necrotic lipid nuclei,fibrous caps that are infiltrated by a large number of macrophages,and fibrous cap thickness less than 65μm.Because of the obvious importance of the thin fibrous cap in the study of plaque vulnerability,it has been a focus of attention by many investigations.Watson,M.G.et al.are concerned about the formation of early fibrous caps in recent years.The presentation of local maximum stress on plaque further confirmed the importance of thin fibrous cap.The development of medical images has greatly promoted the study of coronary atherosclerosis.Compared with autopsy ex vivo,medical image could provide plaque data under in vivo conditions and greatly promote the study of coronary atherosclerosis.Huang XY et al.used ex vivo magnetic resonance imaging(MRI)to study the relationship between plaque wall stress(PWS)and death caused by coronary artery disease.Due to technical limitations and the accessibility of the coronary artery in the body,MRI is not widely used for in vivo coronary studies.Interventional intravascular ultrasound(IVUS),with an image resolution of 150-200μm,has been used in research and clinical practice to identify plaques,quantify plaque morphology,and characterize plaque components.More recently,optical coherence tomography(OCT),with its resolution of 5-10μm,has emerged as an imaging modality which can be used to detect thin fibrous caps and improve diagnostic accuracy.It is commonly believed that mechanical forces play an important role in plaque progression and rupture.Image-based biomechanical plaque models have been developed and used to quantify plaque mechanical conditions and seek their linkage to plaque progression and vulnerability development activities.Based on recent advances in imaging and modeling,this paper attempts to provide a brief review on plaque research,including histological classification,image preparation,biomechanical modeling and analysis methods including medical imaging techniques represented by intravascular ultrasound(IVUS)and optical coherence tomography(OCT),computational modeling and their applications in plaque progression and vulnerability analyses and predictions.The clinical application and future development direction are also briefly described.We focus more on human coronary plaque modeling and mainly included results from our group for illustration purpose.We apologize in advance for our limitations. 展开更多
关键词 IVUS OCT CORONARY PLAQUE vulnerABLE PLAQUE
在线阅读 下载PDF
Impairment of LTP in insular cortex is correlated to resilience and vulnerability to chronic stress for PTSD
9
作者 JIA Jing-jing SHI Tian-yao ZHOU Wen-xia 《中国药理学与毒理学杂志》 CAS CSCD 北大核心 2018年第9期727-728,共2页
OBJECTIVE Exposure to stressful events can be differently perceived by individuals depending on the level of stress resilience or vulnerability.The neural processes that underlie such clinical y and social y important... OBJECTIVE Exposure to stressful events can be differently perceived by individuals depending on the level of stress resilience or vulnerability.The neural processes that underlie such clinical y and social y important differences are largely unknown.As insula cortex is important in emotional processing,we have examined whether the changes in synaptic plasticity in the insula cortex involved in stress resilience or vulnerability.METHODS Mice were divided into two groups:control and stress group.Stress group was treated by foot electric shock twice daily(0.8 mA,2 s,ten times in 1 min) in continuous two weeks.Then we used fear conditioning test to detect re-experiencing of traumatic experience,open field test to detect avoidance,pre-pulse inhibition experiment to detect hyper arousal.The changes of synaptic plasticity in the insular cortex were recorded by the multiple channels electrophysiology and whole cell patch.RESULTS According to the behavioral scores,it was divided into resilient and vulnerable group.In the fear conditioning test,the vulnerable group showed the significant freezing time decreased than that of the resilient group(P<0.01).In the open field test,the time that enter the center zone of vulnerable group is increased than that resilient group(P<0.01);In the pre-pulse inhibition experiment,there are not significant difference of PPI value in both groups(P=0.4239).And then electrophysiological experiments are performed to detect the synaptic plasticity of the insular cortex.Compared with the resilient group,the LTP level was decreased(P<0.05) and the mEPSC was increased(P<0.01) in vulnerable group.CONCLUSION The impairment of synaptic plasticity in the insular cortex may be one of the neural mechanisms for the vulnerability to chronic stress. 展开更多
关键词 LTP insular cortex SYNAPTIC plasticity PTSD RESILIENCE vulnerability
在线阅读 下载PDF
Assessing Vulnerability of Hard Rock Granitic Aquifer Through the Application of DRASTIC Model and GIS
10
作者 R.K.Prasad V.S.Singh S.K.G.Krishnamacharyulu 《地学前缘》 EI CAS CSCD 北大核心 2009年第S1期27-27,共1页
Groundwater is a finite resource which is being overexploited due to increase in demand over the years leading to decrease in its potentiality.As it is known that ground water is the only major source of drinking wate... Groundwater is a finite resource which is being overexploited due to increase in demand over the years leading to decrease in its potentiality.As it is known that ground water is the only major source of drinking water for both urban and rural India its proper management is very essential for its sustainability. In the present study,DRASTIC model is 展开更多
关键词 spatial ANALYST GIS DRASTIC model groundwater vulnerABLE zone hard rock AQUIFER
在线阅读 下载PDF
Study on Quadratic Effect Assessment of Vulnerability of Military Aircraft Under Multiple Hits
11
作者 侯志强 孟维杰 《Defence Technology(防务技术)》 SCIE EI CAS 2008年第1期72-76,共5页
Under the conditions of multiple hits and quadratic effects,the aircraft vulnerability assessment method is proposed by means of kill-tree diagram and state transition matrix.Four instances of the quadratic effects ar... Under the conditions of multiple hits and quadratic effects,the aircraft vulnerability assessment method is proposed by means of kill-tree diagram and state transition matrix.Four instances of the quadratic effects are investigated:non-redundant components to non-redundant components,non-redundant to redundant,redundant to non-redundant and redundant to redundant.The application of the proposed method to the calculation of quadratic effects is also studied. 展开更多
关键词 航行器 概率 多重构件 攻击性评估
在线阅读 下载PDF
基于模糊测试的Java反序列化漏洞挖掘 被引量:1
12
作者 王鹃 张勃显 +3 位作者 张志杰 谢海宁 付金涛 王洋 《信息网络安全》 北大核心 2025年第1期1-12,共12页
随着反序列化技术在Java Web应用开发中的广泛应用,针对Java反序列化机制的攻击也日益增多,已严重威胁Java Web应用的安全性。当前主流的黑名单防范机制无法有效防御未知的反序列化漏洞利用,而现有的Java反序列化漏洞挖掘工具大多依赖... 随着反序列化技术在Java Web应用开发中的广泛应用,针对Java反序列化机制的攻击也日益增多,已严重威胁Java Web应用的安全性。当前主流的黑名单防范机制无法有效防御未知的反序列化漏洞利用,而现有的Java反序列化漏洞挖掘工具大多依赖静态分析方法,检测精确度较低。文章提出一种基于模糊测试的Java反序列化漏洞挖掘工具DSM-Fuzz,该工具首先通过对字节码进行双向追踪污点分析,提取所有可能与反序列化相关的函数调用链。然后,利用基于TrustRank算法的函数权值分配策略,评估函数与反序列化调用链的关联性,并根据相关性权值对模糊测试种子分配能量。为进一步优化测试用例的语法结构和语义特征,文章设计并实现了一种基于反序列化特征的种子变异算法。该算法利用反序列化的Java对象内部特征优化种子变异过程,并引导模糊测试策略对反序列化漏洞调用链进行路径突破。实验结果表明,DSM-Fuzz在漏洞相关代码覆盖量方面较其他工具提高了约90%。此外,该工具还在多个主流Java库中成功检测出50%的已知反序列化漏洞,检测精确度显著优于其他漏洞检测工具。因此,DSM-Fuzz可有效辅助Java反序列化漏洞的检测和防护。 展开更多
关键词 Java反序列化漏洞 模糊测试 污点分析 漏洞挖掘 程序调用图
在线阅读 下载PDF
Vulnerability Curve of Ice Flashover Trips in Regional Grid and Its Appfication
13
作者 SUN Yu WANG Xiuli WANG Jianxue WANG Xifan WU Xiong XIE Shaoyu 《中国电机工程学报》 EI CSCD 北大核心 2012年第22期I0008-I0008,共1页
关键词 地区电网 覆冰 跳闸 闪络 曲线 故障风险 绝缘系统 数据显示
在线阅读 下载PDF
基于回声状态网络的智能合约漏洞检测方法 被引量:1
14
作者 刘春霞 徐晗颖 +2 位作者 高改梅 党伟超 李子路 《计算机应用》 北大核心 2025年第1期153-161,共9页
区块链平台上的智能合约是为链上各方提供安全可信赖服务的去中心化应用程序,而智能合约漏洞检测能确保智能合约的安全性。然而,现有的智能合约漏洞检测方法在样本数量不均衡和语义信息挖掘不全面时,会出现特征学习不足和漏洞检测准确... 区块链平台上的智能合约是为链上各方提供安全可信赖服务的去中心化应用程序,而智能合约漏洞检测能确保智能合约的安全性。然而,现有的智能合约漏洞检测方法在样本数量不均衡和语义信息挖掘不全面时,会出现特征学习不足和漏洞检测准确率低的问题,而且,这些方法无法对新的合约漏洞进行检测。针对上述问题,提出一种基于回声状态网络(ESN)的智能合约漏洞检测方法。首先,根据合约图,对不同语义、语法边进行学习,并利用Skip-Gram模型训练得到特征向量;其次,结合ESN和迁移学习,实现对新合约漏洞的迁移扩展,以提高漏洞检测率;最后,在Etherscan平台搜集的智能合约数据集上进行实验。实验结果表明,所提方法的准确率、精确率、召回率和F1分数分别达到了94.30%、97.54%、91.68%和94.52%,与双向长短时记忆(BLSTM)网络、自注意力机制的双向长短时记忆(BLSTM-ATT)相比,所提方法的准确率分别提高了5.93和11.75个百分点,漏洞检测性能更优。消融实验也进一步验证了ESN对智能合约漏洞检测的有效性。 展开更多
关键词 漏洞检测 智能合约 回声状态网络 迁移学习 区块链
在线阅读 下载PDF
复杂网络视角下世界粮食贸易网络脆弱性研究 被引量:1
15
作者 韩建军 崔欣苗 +2 位作者 侯婧祎 程玉 张佳豪 《粮油食品科技》 北大核心 2025年第2期198-205,共8页
为探究世界粮食贸易网络的脆弱性,为国际粮食贸易市场做出合理预判提供参考,基于1990—2020年的世界粮食贸易数据,结合复杂网络理论与脆弱性理论,从模体的角度探究世界粮食贸易网络局部结构脆弱性变化情况,并模拟世界粮食贸易网络在随... 为探究世界粮食贸易网络的脆弱性,为国际粮食贸易市场做出合理预判提供参考,基于1990—2020年的世界粮食贸易数据,结合复杂网络理论与脆弱性理论,从模体的角度探究世界粮食贸易网络局部结构脆弱性变化情况,并模拟世界粮食贸易网络在随机攻击和蓄意攻击模式下的失效过程,将网络中的节点分级。结果表明:世界粮食贸易网络的局部结构中,V型结构占比较高,网络的稳定性较弱,但这种现象有减缓趋势;对比真实网络与随机网络,真实网络的结构更加稳定且贸易关系更复杂;世界粮食贸易网络在面对随机攻击时具有良好的强韧性,面对蓄意攻击时表现出较强的脆弱性,蓄意攻击对网络的破坏力远大于随机攻击;在蓄意攻击模式下,世界粮食贸易网络的节点根据失效过程可以分为三个层级,其中第一层级节点对网络稳定性影响最大。 展开更多
关键词 粮食安全 世界粮食贸易 复杂网络 脆弱性 格局与趋势
在线阅读 下载PDF
论“数字弱势群体”及其权益体系 被引量:4
16
作者 宋保振 《山东师范大学学报(社会科学版)》 北大核心 2025年第1期107-120,共14页
在中国式现代化和数字中国建设双重背景下,如何有效保障“数字弱势群体”权益,日渐成为社会共识。就如何界定“数字弱势群体”及其权益,一直缺乏系统学术研究和规范法律定位,这也是制约“数字弱势群体”权益保障实效的“元问题”。“数... 在中国式现代化和数字中国建设双重背景下,如何有效保障“数字弱势群体”权益,日渐成为社会共识。就如何界定“数字弱势群体”及其权益,一直缺乏系统学术研究和规范法律定位,这也是制约“数字弱势群体”权益保障实效的“元问题”。“数字弱势群体”之产生,源于生产方式的数字化调整和生活方式的数字化重构,是人们生活所受到的数字社会变革的深层影响。“数字弱势群体”之内涵,兼具客观方面的社会分化、数字技术和主观方面的数字素养、数字融入双重要素,其外延区别于“传统弱势群体”“信息弱势群体”和“少数边缘群体”。“数字弱势群体”权益应避免与一般性的公民权益混淆,它主要指向维持公民数字化生活“最低水准”的社会权,具体包括信息平等权、信息自由权、信息安全权和特殊保护权。 展开更多
关键词 “数字弱势群体” 数字鸿沟 数字人权 共同富裕 算法
在线阅读 下载PDF
人工智能赋能教学的伦理审视 被引量:2
17
作者 胡金木 张珺 《课程.教材.教法》 北大核心 2025年第2期64-71,共8页
人工智能寄予教学未来转型的期待,为个性化学习、精准化教学、虚拟仿真教学环境等提供了可能。然而,人工智能也带来了主体性伦理隐忧,如过度依赖“思维机器”导致的认知能力退化、一味适应机器引发的反主体性危机与数字控制、沉湎于虚... 人工智能寄予教学未来转型的期待,为个性化学习、精准化教学、虚拟仿真教学环境等提供了可能。然而,人工智能也带来了主体性伦理隐忧,如过度依赖“思维机器”导致的认知能力退化、一味适应机器引发的反主体性危机与数字控制、沉湎于虚拟现实导致人与人之间情感淡漠等。面对隐忧,我们应该审视人、技术与教学之间的关系,警惕教学的技术增强对人的主体性的伤害。教学中的脆弱、不确定与风险蕴含着生命成长的美丽可能,接受风险不仅是对教育本质的承认,更意味着选择“非力量”技术,守护“弱性教育”。人工智能赋能教学过程中应当被谨慎而合理地应用,以确保其增强而非替代传统教学过程,促进师生、生生间的社会融合和情感联结,同时教师应对智能技术使用作出教育性判断,培养学生的主体性与批判性思维,确保教与学过程的教育性、安全性与公正性。 展开更多
关键词 人工智能 教学伦理 伦理隐忧 美丽风险 弱性教育
在线阅读 下载PDF
数字金融使用能缓解城乡家庭金融脆弱性吗 被引量:5
18
作者 温涛 刘亭廷 《金融经济学研究》 北大核心 2025年第1期39-59,共21页
利用中国家庭金融调查(CHFS)数据,分析数字金融使用与城乡家庭金融脆弱性之间的关系。实证结果表明,数字金融使用能缓解家庭金融脆弱性,且对农村家庭的缓解效果更强。进一步分析发现,家庭对数字金融的使用能通过优化资产配置和放松流动... 利用中国家庭金融调查(CHFS)数据,分析数字金融使用与城乡家庭金融脆弱性之间的关系。实证结果表明,数字金融使用能缓解家庭金融脆弱性,且对农村家庭的缓解效果更强。进一步分析发现,家庭对数字金融的使用能通过优化资产配置和放松流动性约束,增加家庭资产组合的多样性,加强家庭在面临意外冲击时平滑经济损失的能力,从而缓解家庭金融脆弱性。此外,数字金融使用缓解城乡家庭金融脆弱性的效果随着金融素养水平的提升逐渐减弱,且对“长尾群体”的家庭金融脆弱性的影响更大,体现了数字金融的普惠性。基于此,建议积极创新金融产品与服务,推进数字金融的深度发展,提高农村家庭等“长尾人群”的数字金融使用水平,使家庭享受“数字金融红利”,加强自身风险抵御能力,有效降低家庭金融脆弱性。 展开更多
关键词 城乡家庭金融脆弱性 数字金融使用 资产配置 流动性约束 金融素养
在线阅读 下载PDF
长江经济带城市生态环境脆弱性及驱动因素研究 被引量:1
19
作者 吴和成 王杰 李犟 《人民长江》 北大核心 2025年第4期17-24,共8页
厘清生态环境脆弱性时空分异及驱动因素,对于生态环境精准治理具有重要意义。以长江经济带沿线40个城市为样本,利用2012~2022年的统计数据,基于“暴露度-敏感性-适应力”理论框架,设计长江经济带城市生态环境脆弱性描述指标,采用“逐层... 厘清生态环境脆弱性时空分异及驱动因素,对于生态环境精准治理具有重要意义。以长江经济带沿线40个城市为样本,利用2012~2022年的统计数据,基于“暴露度-敏感性-适应力”理论框架,设计长江经济带城市生态环境脆弱性描述指标,采用“逐层纵横向”拉开档次法测度长江经济带城市生态环境脆弱性,运用莫兰指数法、Kriging插值法和地理探测器分析脆弱性时空分异特征及驱动因素。研究表明:①样本城市生态环境脆弱性总体呈明显改善态势,轻度和中度脆弱性城市数占比由45%上升至70%左右;脆弱性高度和重度城市数占比由55%左右下降至30%左右;高度和重度脆弱性城市主要在长江上、下游地区的对应城市,但以下游城市为主,这些城市脆弱性状态较为稳定且未见明显改善。②长江经济带沿江城市的生态环境脆弱性呈空间相关性,表现在城市生态环境脆弱性呈现空间聚集现象,邻近城市生态环境脆弱性具一定相似性特点。③经济发展水平、城镇化水平和科学技术投入是驱动生态环境脆弱性时空演化格局的核心因子,并且城镇化水平对生态环境脆弱性的影响力有所增强。研究成果可为长江经济带城市生态环境保护和可持续发展政策设计提供参考。 展开更多
关键词 生态环境脆弱性 空间分异 驱动因素 长江经济带
在线阅读 下载PDF
基于BP神经网络的家具供应链脆弱性评价
20
作者 屈俊林 庞燕 王忠伟 《中南林业科技大学学报》 北大核心 2025年第3期158-166,共9页
【目的】对家具供应链脆弱性进行评价研究,以期从供应链脆弱性的角度为家具供应链风险管理决策提供参考依据。【方法】结合新时代背景下家具供应链发展新特征,对家具供应链各环节脆弱性进行分解,运用德尔菲法筛选家具供应链脆弱性因素,... 【目的】对家具供应链脆弱性进行评价研究,以期从供应链脆弱性的角度为家具供应链风险管理决策提供参考依据。【方法】结合新时代背景下家具供应链发展新特征,对家具供应链各环节脆弱性进行分解,运用德尔菲法筛选家具供应链脆弱性因素,利用SPSS软件进行信度和效度分析,构建包括数字化供应链成熟度在内的家具供应链脆弱性评价指标体系。利用BP神经网络在风险评价方面的优势,结合置换特征重要性算法,运用Python进行仿真训练,构建基于BP神经网络的家具供应链脆弱性评价模型。【结果】1)构建了由3个一级指标、9个二级指标和24个三级指标构成的家具供应链脆弱性评价指标体系;2)采用置换特征重要性算法计算家具供应链脆弱性评价指标权重,根据权重对评价指标进行了排序发现,市场需求预测、供应链信息协同、供应链决策水平、产业结构调整和产品竞争力这5项指标对家具企业供应链脆弱性预测值具有较大的正向显著性;3)通过迭代和训练发现,基于BP神经网络的家具供应链脆弱性评价模型对61组训练集数据的分类预测准确率为100%,最大相对误差为0.002 256%;对20组测试样本数据的分类预测准确率为95%,最大相对误差为0.5%。【结论】基于BP神经网络的家具供应链脆弱性评价模型有良好的非线性映射和学习能力,拥有较强的分类预测功能,能全面有效地对家具供应链脆弱性进行评价。 展开更多
关键词 家具 供应链 脆弱性 BP神经网络 评价
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部