首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 359 毫秒
1.
目的研究成年人,成年黄牛、马、家猪、山羊、绵羊、狗、猫、长毛兔、鹅、鸭、鸡共11种动物股骨组织形态学结构,建立有效的种属鉴别方法。方法取进行尸体检验的成人(20周岁以上)右股骨中段约4 cm,同时取11种常见动物右腿股骨中段约4 cm,脱钙后制作成骨组织切片,在光学显微镜下观察,选取25个指标按人与哺乳动物、人与家禽、人与11种动物进行逐步判别分析。结果股骨中段骨密质的组织学结构具有明显的种属特征,且骨单位形态和数量呈现明显的生物进化趋势。选出11项指标建立人与11种动物的种属判别方程,人与哺乳动物的正确判别率可达96.3%,人与家禽的正确判别率可达100%,人与11种动物的正确判别率可达89.4%。结论本研究建立的人与其他种属动物的判别方程具有较高的正确判别率,可以用于实际检案中的种属鉴别。  相似文献   

2.
目的研究成年人,成年黄牛、马、家猪、山羊、绵羊、狗、猫、长毛兔、鹅、鸭、鸡共11种动物股骨组织形态学结构,建立有效的种属鉴别方法。方法取进行尸体检验的成人(20周岁以上)右股骨中段约4 cm,同时取11种常见动物右腿股骨中段约4 cm,脱钙后制作成骨组织切片,在光学显微镜下观察,选取25个指标按人与哺乳动物、人与家禽、人与11种动物进行逐步判别分析。结果股骨中段骨密质的组织学结构具有明显的种属特征,且骨单位形态和数量呈现明显的生物进化趋势。选出11项指标建立人与11种动物的种属判别方程,人与哺乳动物的正确判别率可达96.3%,人与家禽的正确判别率可达100%,人与11种动物的正确判别率可达89.4%。结论本研究建立的人与其他种属动物的判别方程具有较高的正确判别率,可以用于实际检案中的种属鉴别。  相似文献   

3.
目的观察不同种属肌组织形态的特征指标,建立种属鉴别的判别方程,尝试建立一种种属鉴别新方法。方法分别提取20名成年死者三个部位(肱三头肌、股二头肌和竖脊肌)的肌组织和达到出栏年龄的猪、羊、牛各20头三个部位(臂三头肌、股二头肌和背最长肌)的肌组织,制成石蜡切片。测量人及猪、羊、牛肌组织的11项观察指标,并应用统计学方法进行分析,建立种属判别方程。结果筛选出4项观察指标建立人与猪、羊、牛之间种属鉴别的判别方程,对人肌组织的判别准确率可达90%,对猪、羊、牛肌组织的判别准确率分别可达80%、100%和80%。结论形态学方法为人与猪、羊、牛之间肌组织的种属鉴别提供了一种新的方法,可为动物种属鉴别提供参考依据。  相似文献   

4.
微博是一个基于用户关系的信息分享、传播以及获取平台。作为一种新兴的交流工具,微博在教育领域也开始被关注。微博信息分享的便利性使得让微博应用于教育教学上成为一种可能。本研究通过微博在下沙大学生群体的使用现状的调查,及学生对微博应用于学习的态度倾向,微博的功能和特点分析,来探究微博与大学生教育模式创新之间的联系。  相似文献   

5.
作为广告商与消费者之间一种特殊的言语交际活动,广告业已成为现代生活不可或缺的元素。广告语篇,尤其是主体语言中文中嵌入英文的广告语篇越来越普遍。研究以都市类报纸上的中英文语码混合广告语篇为语料,以标记模式为理论框架,调研都市类报纸中英文广告语码混合现象。英语语码句法范畴主要为短语、小句和英文字母;其中短语主要为名词短语和动词短语。e、spa、PK为使用频率较高的英语语码;它们既传递和告知受众特定产品或服务的信息,又使语篇平添了时尚、高雅、创新、更易吸引眼球等社会语用功能。  相似文献   

6.
翻译教学必须有语言理论作为其背景。理解过程中的语义、语境、语用是分析的理论依据。表达过程中的动态对等,特别是英、汉两种语言的核心句型,以及语篇概念和象似性理论是翻译的重要语言理论背景。  相似文献   

7.
目的通过对成年人、成体黄牛、马、家猪、山羊、绵羊、狗、猫、长毛兔、鹅、鸭、鸡共12个种属动物股骨组织形态学结构特征的研究,建立一个有效的各类动物间种属鉴别的方法。方法在征得家属同意后,在尸检中取成人(20岁以上)右股骨中段约4cm,同时,收集黄牛、马、家猪、山羊、绵羊、狗、猫、长毛兔、鹅、鸭、鸡共11种常见动物右腿股骨,取中段约4cm,脱钙后制作成骨组织切片,在光学显微镜下观察,将显微镜下的图像录入电脑,选取24个指标进行分析。结果人与其他动物、以及各被检动物之间在骨单位数量等13个指标上具有显著差异,用这些指标建立种属判别数学模型,结果这些动物之间的判别率也可达89.4%。结论股骨中段骨密质的组织学结构具有明显的种属特征,且骨单位形态和数量呈现明显的生物进化趋势。根据这些特征可以有效地进行种属鉴别。  相似文献   

8.
目的建立中国人高度残碎下颌骨的性别判定方法。方法测量了国内 8个省市的已知性别的 16 0具尸骨的下颌骨 (其中男性 10 8例 ,女性 5 2例 ,年龄范围 18~ 75岁 ) ,选择了下颌骨左侧的下颌角、下颌支两部位的 15项指标的测量值 ,利用SPSS软件进行统计分析 ,筛选出性别差异显著的指标 ,使用判别分析方法 ,建立高度残碎下颌骨判定性别的判别方程。结果得到高度残碎下颌骨性别判别方程共计 4 4组 ,下颌角 3组 ,下颌支2 5组 ,下颌角和下颌支联合判定 16组。下颌角性别判别方程的最高性别判别率男性 6 9 4 % ,女性 75 % ,综合70 6 % ,下颌支最高性别判别率男性 77 8% ,女性 80 8% ,综合 75 6 % ;下颌角与下颌支联合判定的最高性别判别率男性 75 0 % ,女性 84 6 % ,综合 75 6 %。结论本研究可适用于刑事案件以及火灾、飞机失事等自然灾害事件以及考古工作中的高度残碎下颌骨的性别判定。  相似文献   

9.
听力测试组合在听觉障碍鉴定中的应用   总被引:7,自引:6,他引:1  
范利华  杨小萍 《法医学杂志》2005,21(4):255-258,261
目的分析不同听力测试方法对听阈评估的作用,探讨组合听力测试在听觉障碍法医学鉴定中的应用。方法对87例外伤后听力损伤者进行听力测试,将纯音听阈测试(PTA)、声导抗、40HzAERP、ABR、ASSR、DPOAEs进行组合。听阈评估采用PTA+ABR+40HzAERP/ASSR,损伤定位采用PTA+声导抗+ABR/40HzAERP+DPOAEs。根据致伤方式的不同,分为头部损伤组和耳损伤组。比较组间DPOAEs阳性率,比较纯音听阈、40HzAERP、ABR及ASSR对听阈评估的作用。结果头部外伤组DPOAEs阳性率明显高于耳损伤组(P<0.05);纯音语频听阈异常耳与40HzAERP语频阈值及ABR比较,纯音语频阈值异常率较40HzAERP及ABR明显高,主、客观听阈明显不符。26耳40HzAERP与ASSR比较,两者在0.5kHz、1kHz、2kHz反应阈均值数相关性较好(r=0.862),ASSR语频均值较40HzAERP低,平均差17dB。结论纯音听阈与ABR、40HzAERP或ASSR组合测试对听阈的评估有互补作用。40HzAERP与ASSR均可以用于语音频率的听阈评估。声导抗、ABR、40HzAERP与DPOAEs多项检查组合,有助于确定损伤部位。  相似文献   

10.
超文本结构与意义连贯性   总被引:2,自引:0,他引:2  
阅读中的文本意义连贯和认知意义连贯是相互作用的。超文本语篇的结点内意义连贯、结点间意义连贯以及超结构意义连贯的分类,有助于厘清超文本意义连贯性概念,并可能反映超文本语篇表征超文本层次语言意义的显著特征。同样,范代克的宏观结构与超结构的概念区分,也可用来解释轴向结构与网状结构的超文本各自是如何实现不同文本的意义连贯性的。  相似文献   

11.
12.
There is an alarming increase in the number of cybercrime incidents through anonymous e-mails. The problem of e-mail authorship attribution is to identify the most plausible author of an anonymous e-mail from a group of potential suspects. Most previous contributions employed a traditional classification approach, such as decision tree and Support Vector Machine (SVM), to identify the author and studied the effects of different writing style features on the classification accuracy. However, little attention has been given on ensuring the quality of the evidence. In this paper, we introduce an innovative data mining method to capture the write-print of every suspect and model it as combinations of features that occurred frequently in the suspect's e-mails. This notion is called frequent pattern, which has proven to be effective in many data mining applications, but it is the first time to be applied to the problem of authorship attribution. Unlike the traditional approach, the extracted write-print by our method is unique among the suspects and, therefore, provides convincing and credible evidence for presenting it in a court of law. Experiments on real-life e-mails suggest that the proposed method can effectively identify the author and the results are supported by a strong evidence.  相似文献   

13.
There is an alarming increase in the number of cybercrime incidents through anonymous e-mails. The problem of e-mail authorship attribution is to identify the most plausible author of an anonymous e-mail from a group of potential suspects. Most previous contributions employed a traditional classification approach, such as decision tree and Support Vector Machine (SVM), to identify the author and studied the effects of different writing style features on the classification accuracy. However, little attention has been given on ensuring the quality of the evidence. In this paper, we introduce an innovative data mining method to capture the write-print of every suspect and model it as combinations of features that occurred frequently in the suspect's e-mails. This notion is called frequent pattern, which has proven to be effective in many data mining applications, but it is the first time to be applied to the problem of authorship attribution. Unlike the traditional approach, the extracted write-print by our method is unique among the suspects and, therefore, provides convincing and credible evidence for presenting it in a court of law. Experiments on real-life e-mails suggest that the proposed method can effectively identify the author and the results are supported by a strong evidence.  相似文献   

14.
Carl Schmitt, an increasingly influential German law professor, developed a provocative and historically oriented model of “political theology” with specific relevance to legal scholarship and the authorship of constitutional texts. His “political theology” is best understood neither as an expressly theological discourse within constitutional law, nor as a uniquely legal discourse shaped by a hidden theological agenda. Instead, it addresses the possibility of the continual resurfacing of theological ideas and beliefs within legal discourses of, for instance, sovereignty, the force of law and states of emergency (or “exception”) that present themselves as relentlessly secular, even—in the case of Kelsenian jurisprudence—”scientific”. This article illustrates and then critically evaluates Schmitt’s theory in terms of the authorship of constitutional texts in particular. It includes two case studies—genocidal colonial land appropriation and Kelsenian positivism in order to illustrate aspects of his political theology. Whilst Schmitt is defended against reductionist interpretations, I show that there remains considerable unfinished business before a Schmittian approach to legal theory merits full acceptance.  相似文献   

15.
A critical aspect of malware forensics is authorship analysis. The successful outcome of such analysis is usually determined by the reverse engineer's skills and by the volume and complexity of the code under analysis. To assist reverse engineers in such a tedious and error-prone task, it is desirable to develop reliable and automated tools for supporting the practice of malware authorship attribution. In a recent work, machine learning was used to rank and select syntax-based features such as n-grams and flow graphs. The experimental results showed that the top ranked features were unique for each author, which was regarded as an evidence that those features capture the author's programming styles. In this paper, however, we show that the uniqueness of features does not necessarily correspond to authorship. Specifically, our analysis demonstrates that many “unique” features selected using this method are clearly unrelated to the authors' programming styles, for example, unique IDs or random but unique function names generated by the compiler; furthermore, the overall accuracy is generally unsatisfactory. Motivated by this discovery, we propose a layered Onion Approach for Binary Authorship Attribution called OBA2. The novelty of our approach lies in the three complementary layers: preprocessing, syntax-based attribution, and semantic-based attribution. Experiments show that our method produces results that not only are more accurate but have a meaningful connection to the authors' styles.  相似文献   

16.
王迁 《法学家》2012,(1):133-144,179
作品上的自然人的姓名或组织的名称并非都是《著作权法》意义上的"署名"。"署名"必须针对特定作品表明作者的身份,因此有别于剧种名称,如"安顺地戏"等。根据英美法系国家版权法和《世界版权公约》的规定,"■"标记之后所接的姓名或名称表示的是版权归属,并非表明作者身份的"署名"。而且在版权归属于一个组织的情况下,该组织不可能对作品享有"署名权"。""标记之后所接的姓名或名称表示的则是商标注册人。即使图形商标构成作品,由于存在许可使用的情形,该姓名或名称也并非"署名"。只有作者才享有在作品上"署名"的权利,因此在作品上冒他人之名并非侵犯他人"署名权"的行为。  相似文献   

17.
This 5-year study investigated the character of Forensic Handwriting Examiners' (FHEs) authorship opinions on questioned signatures through the medium of blind validation trials. Twenty-nine thousand eight hundred and eleven authorship opinions were expressed by FHEs on trial kits comprising randomized questioned genuine signatures (written by the specimen writer), disguised signatures (written by the specimen writer) and simulated signatures (not written by the specimen writer). Results showed that, as a group, FHEs were significantly more confident at identifying writers' genuine signatures than identifying writers' disguised signatures or eliminating specimen writers from having authored simulated signatures. It is proposed that the difference in FHE confidence arises from the difficulty they have in deciding which alternative authorship explanation accounts for perceived combinations of similar and dissimilar features between specimen and questioned signatures.  相似文献   

18.
This 5-year study investigated the character of Forensic Handwriting Examiners’ (FHEs) authorship opinions on questioned signatures through the medium of blind validation trials. Twenty-nine thousand eight hundred and eleven authorship opinions were expressed by FHEs on trial kits comprising randomized questioned genuine signatures (written by the specimen writer), disguised signatures (written by the specimen writer) and simulated signatures (not written by the specimen writer). Results showed that, as a group, FHEs were significantly more confident at identifying writers’ genuine signatures than identifying writers’ disguised signatures or eliminating specimen writers from having authored simulated signatures. It is proposed that the difference in FHE confidence arises from the difficulty they have in deciding which alternative authorship explanation accounts for perceived combinations of similar and dissimilar features between specimen and questioned signatures.  相似文献   

19.
李龙 《法律科学》2012,(3):21-26
建国后,我国曾为构建法学学术话语体系进行了四次有益的尝试,但中国法学学术话语体系尚未真正建立。今后法学界应当秉持民族语言与时代精神有机结合、马克思主义法学中国化与中国法治经验马克思主义化有机结合以及合理借鉴中外优秀法律遗产与立足现实的理论创新有机结合的"三结合"原则,理性探讨、凝聚共识,着力研究中国问题,从我做起,从当下做起,从而建构中国的法学学术话语体系。  相似文献   

20.
Using a video tape and three still photographs, we analyze recorded sound to attribute authorship in a fatal shooting incident. We measure the acoustic signature of the scene with four test detonations, and we discuss two methods of processing putative echoes in the audio band of the video. They allow us to locate 11 out of 17 shots, with a precision of 0.4 x 1.0 m2. Combining the location of the shots with the known positions of the participants, we arrive at the clear attribution of eight shots; three other shots (among which is the fatal one) probably issue from the same shooter, who remains unidentified within a small group of men. Our results lead to the exculpation of the main suspect. We analyze the statistical significance of the results, use Monte Carlo simulations to set an upper bound to the probability of false positives, and discuss areas of improvement of the method.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号