Realization of Correlation Attack Against the Fuzzy Vault Scheme

合集下载

分析三联、四联药物方案治疗胃溃疡的临床效果

分析三联、四联药物方案治疗胃溃疡的临床效果

系统医学 2023 年 12 月第 8 卷第 24期分析三联、四联药物方案治疗胃溃疡的临床效果王昌盛1,陈兰2,廖小红21.广东药科大学附属第一医院药学部,广东广州510062;2.广东三九脑科医院药剂科,广东广州510510[摘要]目的探讨胃溃疡患者选择四联药物治疗后的临床效果。

方法选取2022年1月—2023年8月广东药科大学附属第一医院收治的76例胃溃疡患者为研究对象,依据投掷硬币法分组,参照组(38例)选择三联药物治疗,研究组(38例)选择四联药物治疗,比较两组治疗总有效率、胃灼痛评分、胃溃疡面积、上腹疼痛评分、临床症状改善时间。

结果研究组治疗总有效率为97.37%,明显高于参照组,差异有统计学意义(χ2= 6.176,P<0.05)。

治疗后,研究组胃灼痛评分、胃溃疡面积、上腹疼痛评分、临床症状改善时间均低于参照组,差异有统计学意义(P均<0.05)。

结论同三联药物比较,胃溃疡患者接受四联药物治疗,可显著提升临床效果,有效改善疾病症状,可促进胃溃疡患者的良好预后。

[关键词]胃溃疡;三联药物;四联药物;疗效[中图分类号]R573 [文献标识码]A [文章编号]2096-1782(2023)12(b)-0175-03 Clinical Effect of Triple and Quadruple Drug Regimens in the Treatment of Gastric UlcerWANG Changsheng1, CHEN Lan2, LIAO Xiaohong21.Department of Pharmacy, the First Affiliated Hospital of Guangdong Pharmaceutical University, Guangzhou, Guang⁃dong Province, 510062 China;2.Department of Pharmacy, Guangdong Sanjiu Brain Hospital, Guangzhou, Guangdong Province, 510510 China[Abstract] Objective To investigate the clinical effect of quadruple drug therapy in patients with gastric ulcer. Methods Seventy-six patients with gastric ulcer admitted to the First Affiliated Hospital of Guangdong Pharmaceuti⁃cal University from January 2022 to August 2023 were selected as the research object and divided into groups ac⁃cording to coin tossing method. The reference group (38 cases) received triple drug therapy, and the study group (38 cases) received quadruple drug therapy. The total effective rate, the score of heartburn pain, the area of gastric ulcer, the score of upper abdominal pain and the improvement time of clinical symptoms were compared between the two groups. Results The total effective rate of the study group was 97.37%, which was significantly higher than that of the reference group, and the difference was statistically significant (χ2=6.176, P<0.05). After treatment, the score of heartburn pain, the area of gastric ulcer, the score of upper abdominal pain and the improvement time of clinical symptoms in the study group were lower than those in the reference group, and the differences were statistically sig⁃nificant (all P<0.05). Conclusion Compared with triple drug, quadruple drug treatment for gastric ulcer patients can significantly improve the clinical effect, effectively improve the disease symptoms, and promote the good prognosis of patients with gastric ulcer.[Key words] Gastric ulcer; Triple drug; Quadruple drugs; Curative effect对于胃溃疡疾病而言,其属于一种胃肠道高发病[1-2]。

第二类皮奥拉-基尔霍夫应力

第二类皮奥拉-基尔霍夫应力

第二类皮奥拉-基尔霍夫应力
《高级宏观经济学》是一本关于新凯恩斯主义理论的经济学著作,作者是美国哥伦比亚大学的经济学家保罗·罗默。

该书在宏观经济学领域有很高的声誉,是一份详细阐述新凯恩斯主义宏观经济学的全面指南。

新凯恩斯主义是一种对凯恩斯主义的进一步发展,认为在短期内宏观经济政策才有可能影响经济增长和就业。

新凯恩斯主义主张采取积极的货币和财政政策,以控制失业率和通货膨胀。

它的理论关注市场失灵和信息不对称的影响,认为政府可以通过干预市场来促进贸易,而这也体现了罗默等学者对政府干预市场的积极支持。

总之,通过学习《高级宏观经济学》可以更好地了解新凯恩斯主义宏观经济学的理论和实践,以及政府在促进经济增长和就业方面的作用。

克拉申i+1输入假说的褒贬

克拉申i+1输入假说的褒贬
学生 的兴趣或与他们 的需求 有关 ,越有兴趣越能促进 习得 。
顺序的 ‘ 下一 条 ’规则 ,是 通过理解 含有其规则 的语言输 入 实现 的”( rse ,18 : 0 Kahn 9 5 1 3 o由定 义知 ,输入假说 的 核 心是输 入语言规 则 ,语言成 为了它 的媒 体。因此 ,输入 假说并非语 言输入假说 ,而是语 言规则输入假说 ,并且克 氏心 目中的语 法规则 是按 自然顺序 排列 的含普遍 语法性质 的语法 。这种语法大家还不清楚 ,怎么让学 习者输入呢?
H p tei)是 克拉 申的第 二语 言习得理论 的重要组成部 分 yo s h s
之一 。输入假 说是 怎样习得 第二语 言的假说 。它认 为 ,语 言 习得产 生于对 输入 的吸入 。输 入指 以听或读 (nu )去 ip t 理解 稍高 于它现在语 言能力 水平 的话 语材料 。如现有 的语 言水平是i ,可理解 的输入应该 是il 插注 : + ( 不是无休 止的 大量输入 ) o可理解 指可理解 输入语 的意义 而并 非形式 ,理 解信 息之后 才习得语 言结 构。故可理解 的输人 材料应像 母 亲 向孩子提供 的输入 ,学生才易于理解 。 克 氏认为 ,人 们 习得 语言 ,是 因为 理解 了听和读 的 内 容 。理解 是由于注意听和读 的内容 ,而不是注意语言形式 , 理解 后能 不用教就 自然产 生说话 能力。为此 ,教师提供 的 输入语应 该发音清 晰,放慢 速度 ,多用常用语 、简单句法 、 较短 的句 子 ,少用俚 语 、习语 等。故在 教学过 程 中,教 师 应集 中精 力于理解和交 流上 ,设 法让 学生听懂所说 的内容 。 同时应尽 量使用 直观手段 ,以助理 解。学 习初 期 ,在无 监 察语 言作 为工具 时 ,错误难 免 ,其对策 是提供 更多 的可理 解输入 ,使之成为成功会话 的工具① 。并且 ,输 入应能引起

2024年同等学力申硕英语考试真题

2024年同等学力申硕英语考试真题

2024年同等学力申硕英语考试真题2024 National Postgraduate Entrance Examination (English)Part I Listening Comprehension (20 points)Section ADirections: In this section, you will hear 10 short conversations. At the end of each conversation, a question will be asked about what was said. Both the conversation and the question will be spoken only once. After each question, there will be a pause. During the pause, you must read the four choices marked A), B), C) and D), and decide which is the best answer. Then mark the corresponding letter on Answer Sheet 1 with a single line through the center.1. A) At a news conference. B) In a classroom. C) At a restaurant. D) In a library.2. A) She is sick. B) She is busy. C) She is on vacation. D) She is changing jobs.3. A) The man should have told her. B) She is surprised at the price. C) The man should discuss it with her. D) She agrees with the man.4. A) He will ask his friend for help. B) He will fix it himself. C) He knows nothing about it. D) He will hire someone to do it.5. A) She wants to be excused from going. B) She plans to go.C) She has an important event that night. D) She doesn't know if she'll be able to make it.6. A) They should have partied more. B) She should eat more fruit. C) They should hurry to get to the beach on time. D) She should get ready faster.7. A) The man is almost out of gas. B) The woman is out of gas. C) The man is almost at a gas station. D) The man needs to buy gas before he leaves.8. A) Purple. B) White. C) Black. D) Green.9. A) Guitar lessons. B) Drawing lessons. C) Piano lessons. D) Dance lessons.10. A) Go to a concert. B) Prepare for a test. C) Play chess. D) Attend a play.Section BDirections: In this section, you will hear 3 short passages. At the end of each passage, you will hear some questions. Both thepassage and the questions will be spoken only once. After you hear a question, you must choose the best answer from the four choices marked A), B), C), and D). Then mark the corresponding letter on Answer Sheet 1 with a single line through the center.Passage One11.What induces people to give more strength to their satisfaction when writing an online journal entry than they do in their oral communication?A) The fact that in written communication mistakes can be corrected easily.B) The fact that journal writing is an individual activity.C) The fact that the written record can be later reviewed.D) The fact that journal writing is less time-consuming than oral communication.12. What shows advantages of blog as a form of communication?A) It makes interpersonal relationships easier to maintain.B) It attracts more readers than traditional diary writing.C) It allows readers to make anonymous comments.D) It provides more space for longer messages.Passage TwoQuestions 13 to 15 are based on the passage you have just heard.13.What does the speaker think of online learning?A) It lacks practical experiences. B) It is suitable for everyone.C) It provides more chances for interaction. D) It is more suitable for working professionals.14. Who are more likely to choose online learning?A) Unemployed people. B) Those with limited access to traditional education.C) College students. D) Working professionals.15. What is the advantage of an online classroom?A) It allows students to learn at their own pace.B) It provides more opportunity for face-to-face interaction.C) It offers students the experience of living on campus.D) It helps students develop lifelong friendships.Passage ThreeQuestions 16 to 20 are based on the passage you have just heard.16. Why is it difficult for researchers to study sleep's impact on health?A) Research subjects often fake their sleep patterns.B) Sleep patterns vary greatly from person to person.C) Technologies are not advanced enough to record sleep patterns.D) It is difficult to recruit sufficient volunteers.17. What is proved by the findings of the study?A) Inconsistent sleep patterns lead to health problems.B) Poor sleep quality causes mental disorders.C) High-quality sleep helps reduce obesity.D) A relaxing bedtime routine is essential for good sleep.18. What is the speaker's advice for a restful night's sleep?A) Keep irregular sleep habits. B) Drink coffee before going to bed.C) Establish a calming bedtime routine. D) Avoid relaxing activities before bedtime.19. Why do some people refuse to take the study results to heart?A) They are too busy to follow the advice. B) They are skeptical about the researchers.C) They think too much sleep is a waste of time. D) They doubt the accuracy of the study results.20. Why is it important for people to monitor their sleep habits?A) To ensure a healthy lifestyle. B) To please the researchers.C) To participate in a follow-up study. D) To relax their minds.Part II Reading Comprehension (40 points)Section ADirections: In this section, there are four passages followed by questions or incomplete statements. For each of them, there are four choices marked A), B), C), and D). Choose the one that best completes the statement or answers the question. Thenmark the corresponding letter on Answer Sheet 1 with a single line through the center.Passage OneQuestions 21 to 25 are based on the following passage.Noam Chomsky, the grandson of Jewish immigrants from Eastern Europe, was born in Philadelphia on December 7, 1928. He publicly opposed the Vietnam War in the 1960s and was arrested in 1967 for trying to disrupt military research at the Pentagon. Chomsky is well known for his profound impact on the philosophical and scientific understanding of human language.His major work Syntactic Structures and later The Chomsky Hierarchy have had a profound impact on linguistics, cognitive psychology, and the philosophy of mind. Chomsky's views on language acquisition revolutionized the field of linguistics. He argued that children are born with an innate ability to learn language and that the process of language acquisition ishard-wired into the human brain.21. What was Noam Chomsky's impact on the field of linguistics?A) He developed a new language. B) He published Syntactic Structures.C) He revolutionized language acquisition. D) He founded the Chomsky Hierarchy.22. Why was Chomsky arrested in 1967?A) For disrupting military research. B) For opposing the Vietnam War.C) For advocating human language. D) For his views on cognitive psychology.23. According to Chomsky, how does language acquisition occur?A) Through hard work. B) Through environmental exposure.C) Through cultural immersion. D) Through innate ability.24. What did Chomsky argue about children and language acquisition?A) They need formal education. B) They are hard-wired to learn language.C) They learn language from their parents. D) They need to be exposed to multiple languages.25. What are the subjects of Chomsky's major works?A) Cognitive psychology. B) Philosophy of mind.C) Military research. D) Language and linguistics.Passage TwoQuestions 26 to 30 are based on the following passage.Creating a positive classroom environment is crucial for student success and engagement. An environment that promotes trust, safety, and respect can enhance student motivation and learning outcomes. Here are some key factors that contribute to a positive classroom atmosphere:Clear expectations and guidelines that are consistently enforced; A supportive and inclusive classroom culture that values diversity; Opportunities for student participation and collaboration; Effective communication between teachers and students; Encouragement of critical thinking skills and creativity.26. Why is a positive classroom environment important?A) It enhances student motivation. B) It enforces clear guidelines.C) It creates a competitive atmosphere. D) It limits student participation.27. What contributes to a positive classroom atmosphere?A) Consistent enforcement of rules. B) A competitive culture.C) A lack of diversity. D) A strict teacher-student relationship.28. What kind of classroom culture values diversity?A) A conservative culture. B) An inclusive culture.C) A hierarchical culture. D) A singular culture.29. How can teachers promote a positive classroom atmosphere?A) Through limited communication. B) By discouraging critical thinking.C) By encouraging creativity. D) Through strict enforcement of guidelines.30. What does a positive classroom environment promote?A) Student engagement. B) Student competition.C) Teacher control. D) Limited participation.Passage ThreeQuestions 31 to 35 are based on the following passage.The concept of emotional intelligence (EI) has gained significant attention in recent years. Research shows that individuals with high EI are more likely to succeed in various aspects of life, including personal relationships, academic achievement, and career success. Developing emotional intelligence is essential for effective communication, conflict resolution, empathy, and self-awareness.EI consists of five key components: self-awareness,self-regulation, motivation, empathy, and social skills. By understanding and enhancing these components, individuals can improve their emotional intelligence and overall well-being.31. What is emotional intelligence (EI)?A) An academic achievement. B) A career success factor.C) An aspect of personal relationships. D) A concept of recent attention.32. What does research show about individuals with high EI?A) They are less likely to succeed in life. B) They lackself-awareness.C) They are more likely to succeed in various aspects of life.D) They are not motivated.33. Why is developing EI essential?A) For academic achievement. B) For conflict resolution.C) For career success. D) For self-improvement.34. What are the five key components of EI?A) Self-regulation only. B) Self-awareness, self-regulation, and empathy.C) Self-awareness, self-regulation, motivation, empathy, and social skills. D) Self-awareness and self-regulation only.35. How can individuals improve their emotional intelligence?A) By avoiding social interactions. B) By understanding and enhancing key components.C) By focusing solely on career success. D) By ignoringself-awareness.Passage FourQuestions 36 to 40 are based on the following passage.Nature plays a significant role in human health andwell-being. Research shows that spending time in nature can reduce stress, improve mood, and enhance overall mental health.Nature therapy, also known as ecotherapy, has gained popularity as a form of treatment for various mental health conditions.There are many ways to incorporate nature therapy into daily life, such as spending time in natural settings like parks, forests, or gardens; engaging in outdoor activities like hiking, gardening, or bird-watching; practicing mindfulness and meditation in nature; and disconnecting from technology and reconnecting with the natural world.36. What role does nature play in human health andwell-being?A) A minor role. B) No role. C) A significant role. D) An insignificant role.37. What does research show about spending time in nature?A) It increases stress. B) It decreases mood.C) It enhances overall mental health. D) It limits mental health.38. What has gained popularity as a form of treatment for mental health conditions?A) Meditation. B) Yoga. C) Nature therapy. D) Ecotherapy.39. How can nature therapy be incorporated into daily life?A) By spending time indoors. B) By avoiding outdoor activities.C) By practicing mindfulness indoors. D) By engaging in outdoor activities.40. How can individuals reconnect with nature?A) By spending more time with technology. B) By avoiding natural settings.C) By disconnecting from technology. D) By practicing mindfulness indoors.Section BDirections: In this section, you will read 2 passages and answer some questions or complete statements. Use the passage to answer the questions or complete the statements. Then mark the corresponding letter on Answer Sheet 1 with a single line through the center.Passage OneQuestions 41 to 45 are based on the following passage.The importance of multicultural education in today's diverse world cannot be overstated. Multicultural education aims to promote diversity, equity, and inclusion in the classroom and beyond. It acknowledges and celebrates different cultural backgrounds, languages, traditions, and perspectives, fostering a sense of belonging and respect among students.By incorporating multicultural education into the curriculum, teachers can provide students with a more holistic and inclusive learning experience. This approach helps students develop a deeper understanding and appreciation of diverse cultures, strengthening their empathy, communication skills, and critical thinking abilities.41. What is the aim of multicultural education?A) To limit diversity. B) To promote diversity, equity, and inclusion.C) To restrict cultural backgrounds. D) To isolate students.42. What does multicultural education acknowledge and celebrate?A) Different languages only. B) Different cultural backgrounds, languages, traditions, and perspectives.C) Tradition only. D) Perspectives only.43. How does multicultural education benefit students?A) By limiting their understanding. B) By limiting their perspective.C) By providing a holistic and inclusive learning experience.D) By isolating them from diverse cultures.44. How does multicultural education strengthen students' empathy?A) By limiting their cultural experiences. B) By limiting their communication skills.C) By providing a deeper understanding and appreciation of diverse cultures. D) By isolating them from diversity.45. What are the outcomes of incorporating multicultural education into the curriculum?A) Strengthening students' limitations. B) Strengthening students' empathy.C) Limiting students' critical thinking abilities. D) Limiting students' communication skills.Passage TwoQuestions 46 to 50 are based on the following passage.Climate change is one of the most pressing global challenges of our time. It poses significant threats to the environment, human health, and the economy. To address these challenges, individuals, communities, governments, and businesses must take action to reduce greenhouse gas emissions, transition to renewable energy sources, and promote sustainable practices.Climate change impacts various aspects of life, including weather patterns, sea levels, biodiversity, and food security. By taking proactive measures to mitigate the effects of climate change, we can create a more sustainable and resilient future for generations to come.46. What is one of the most pressing global challenges of our time?A) Climate change. B) Water crisis. C) Pollution. D) Overpopulation.47. How does climate change impact the environment?A) Positively. B) Negatively. C) Minimally.48. What must individuals, communities, governments, and businesses do to address climate change?A) Nothing. B) Take action to reduce greenhouse gas emissions. C) Continue current practices.49. What aspects of life does climate change impact?A) Weather patterns. B) Financial markets. C) Biodiversity.50. How can proactive measures mitigate the effects of climate change?A) By increasing greenhouse gas emissions. B) By transitioning to non-renewable energy sources. C) By creating a sustainable and resilient future.Part III Vocabulary and Structure (20 points)Directions: There are 30 incomplete sentences in this part. For each sentence, there are four choices marked A), B), C), and D). Choose the one that best completes the sentence. Then mark the corresponding letter on Answer Sheet 1 with a single line through the center.51. Relying solely on social media for news updates could lead to _____ misinformation.A) an increase in B) a surge of C) an influx of D) a proliferation of52. The new company policy requires employees to _____ their work before submitting it to their supervisor.A) edit B) revised C) subvert D) concoct53. The conference committee ____ to hold the event outdoors due to favorable weather conditions.A) determined B) highlighted C) faltered D) limited54. The management team decided to ____ the proposal after considering the potential risks.A) scour B) override C) align D) endorse55. The construction of the new subway line has been ____ delayed due to unexpected funding issues.A) harshly B) promptly C) visibly D) significantly56. The students were _____ for their hard work and dedication to the project.A) criticized B) invalidated C) recognized D) overlooked57. The _____ of plastic bags has been banned in many countries to reduce pollution.A) discretion B) proliferation C) confiscation D) utilization58. The team must _____ their strategies to adapt to the changing market conditions.A) appeal B) dedicate C) modify D) fluctuate59. The home renovation project was _____ due to the contractor's failure to secure the necessary permits.A) compromised B) endorsed C) validated D) optimized60. The new software program allows users to _____ their files securely on the cloud.A) endorse B) retrieve C) utilize D) redeemPart IV Reading Comprehension (20 points)Section ADirections: In this section, there is a passage with ten blanks. You are required to select one word for each blank from a list of choices given in a word bank following the passage. Read the passage through carefully before making your choices. Each choice in the word bank is identified by a letter. Please mark the corresponding letter for each item on Answer Sheet 2 with a single line through the center.PassageThe global economy is facing unprecedented challenges due to the ongoing COVID-19 pandemic. The (61) ____ of the virus has disrupted supply chains, halted international trade, and caused widespread economic uncertainty. As countries (62) ____ with the impact of the pandemic, policymakers are (63) ____ to implement measures to mitigate the economic fallout and support struggling industries. The resilience and adaptability of the global economy will be tested as nations work together to (64) ____ from the crisis and build a more sustainable future. It is essential for governments, businesses, and individuals to collaborate and (65) ____ innovative solutions to navigate the challenges ahead.Word Bank:A) outbreakB) recoverC) collaborateD) grappleE) implementSection BDirections: In this section, you are going to read a passage with ten statements attached to it. Each statement contains information given in one of the paragraphs. Identify the paragraph from which the information is derived. You may choose a paragraph more than once. Each paragraph is marked with a letter. Answer the questions by marking the corresponding letter on Answer Sheet 2 with a single line through the center.Passage(66) ____A) Multicultural education aims to promote diversity, equity, and inclusion in the classroom and beyond. It acknowledges and celebrates different cultural backgrounds, languages, traditions, and perspectives, fostering a sense of belonging and respect among students. By incorporating multicultural education into the curriculum, teachers can provide students with a more holistic and inclusive learning experience.B) Climate change is one of the most pressing global challenges of our time. It poses significant threats to the environment, human health, and the economy. To address these challenges, individuals, communities, governments, andbusinesses must take action to reduce greenhouse gas emissions, transition to renewable energy sources, and promote。

211108943_A_Talk_About_ChatGPT

211108943_A_Talk_About_ChatGPT

Text by Liu Chang A Talk About ChatGPTWontons, dumplings, fried rice… Chinese people are always thinking about food, so it should come with no surprise that a poetic ode to Chinese favorites made the rounds online recently. But the speed at which the rhymes were authored was particularly impressive.“Oh, how I miss my favorite treat/The aroma of Chinese food can’t be beat/Wontons, dumplings, and fried rice/Each bite brings me such delight/Egg rolls with sauce, so crisp and so hot/I long for them, whether in a pot or a knot/And don’t forget the noodles so long…”The poet was none other than ChatGPT (Generative Pre-trained Transformer), an AI-powered chatbot developed and launched by San Francisco-based startup OpenAI in November 2022. It uses deepAI governance requires concerted global efforts including the creation of a comprehensive legal and ethical framework to regulate AI development and research.22 V O L U M E 893Copyright ©博看网. All Rights Reserved.learning techniques to generate human-like responses to text inputs in a conversational manner. It can instantly compose poetry in William Shakespeare’s style or offer sound advice on planning a child’s birthday party for example.“ChatGPT is an application example of the artificial general intelligence (AGI) technology, which enables an AI model to be competent for multiple tasks,” said Yu Yang, assistant professor of the Institute for Interdisciplinary Information Sciences at Tsinghua University. “It demonstrates a new type of AI-based digital infrastructure that contrasts traditional software-like AI models that perform one task only.”“Scary Good”What makes ChatGPT so impressive is its ability to produce human-like responses, thanks in no small part to the large language model (LLM) that powers it by scouring a large corpora of data. Also, ChatGPT can log context from users’ earlier messages in a thread and use it to form responses later in the conversation. The dialogue format empowers ChatGPT to answer follow-up questions, admit its mistakes, challenge incorrect premises, and reject inappropriate requests. It should be noted that ChatGPT’s LLM also has limitations. It cannot provide explanations or reasoning for responses and may not always generate responses that are completely coherent ormake sense in the context of a The WiseDemo Campaign 2022 Proposal Presentation, a central piece of the Global Young Leaders Dialogue program, kicks off online via an AI format, July 15, 2022. (Photo courtesy of the Academy of Contemporary China and World Studies)C H I N A P I C TO R I A L 23Copyright ©博看网. All Rights Reserved.conversation. It can only provide information that it has been trained on and may not be able to answer questionsranging outsidetraining data.Also, sometimesit can generateresponses thatcontain offensiveor inappropriate language.China’s Ministerof Science andTechnologyWang Zhigangfigurativelyquipped about ChatGPT onthe sidelines of this year’s “two sessions” on March 5: “Just like playing football, it’s just dribbling and shooting, but it isn’t easy to get as good as Lionel Messi.”According to a CNBC technology commentator, LLM is the underlying technology that powers chatbots. If a chatbot were a car, LLM would be its engine. “The language model itself is a sort of complex machine-learning software. It’s the thing that seeks through data and finds patterns,” said the commentator. “The chat interface is where people interact with each other and where they receive answers from.”OpenAI released GPT-4,the latest version of ChatGPT, on March 14 this year. The new multimodal LLM can even respond to images in ways like providing recipe suggestions from photos of ingredients and writing captions and descriptions. It can also process up to 25,000 words, about eight times as manyas the first ChatGPT.Elon Musk, one of theco-founders ofOpenAI, oncedescribed ChatGPTas “scary good.”“We are not farfrom dangerouslystrong AI,”he tweeted inDecember 2022.Yu, however,doesn’t perceiveChatGPT asa threateningtechnology. “Itshows that other similar AGI andAI-generated content (AIGC)technologies have the potential toreshuffle human civilization justlike what steam engines did.”“Whether the reshuffle willbe achieved in a positive way ornot depends on which criteria areadopted,” he added.A Boon or Bane?Considering that ChatGPTcan write emails, computer codes,academic papers, and poemsand has passed numerous testswithin seconds, including theU.S. Bar Exam as well as actuarialand medical exams, many haveargued that it represents apotentially disruptive innovationfor different sectors withdownside risks due to AI-driventransformation.Is ChatGPT a boon or a bane?According to Yu, one of the mostimportant economic impacts ofChatGPT could be significanteconomic restructuring andrealization in the next decades.“For example, before theemergence of ChatGPT-likeAIGC technologies, every artistwas a producer,” Yu explained.“Now, artists actually work withcomputer science engineers:artists generate the data for AItraining processes and train AI togenerate a figure quickly.”“Additionally, governmentsaround the world are nowthinking that AI-based digitalinfrastructure could be the cruxof future development,” hecontinued.In China, tech companiesare scrambling to roll outAI-powered chatbots or productssimilar to ChatGPT. For example,Chinese tech giant Baidu, bestknown for its search engineand nationwide map services,introduced its AI chatboton March 16 this year. In aprerecorded video presentation,Robin Li, founder of Baidu,showcased ERNIE Bot, whichhe said could comprehend humanintentions and deliver responsesapproaching human level, withfunctions such as understandingChinese language, writing,and performing mathematicalcalculations.Alongside the benefitsof ChatGPT-like AIGCtechnologies, challenges havealso emerged related to legalcompliance, copyright protection,and information managementon the internet. The prestigioussci-fi magazine Clarkesworld,for example, was forced to closesubmissions in February thisyear after receiving numerousChallenges havealso emerged relatedto legal compliance,copyright protection,and informationmanagement on theinternet.24 V O L U M E893Copyright©博看网. All Rights Reserved.stories written or improved by ChatGPT-like programs. “There’s something ironic about AI impacting a sci-fi magazine,” said the magazine’s chief editor Neil Clarke.In December 2022, Yu led a research team to comprehensively assess AI’s machinery gender stereotypes, and the results supported his theory that AIis not technically neutral but harbors its own values and ideology. Nearly all tested AI models were found to reinforce gender stereotypes towards males regardless of the occupations involved. GPT-2, for example, was more likely to link male pronouns to professionals like teachers and doctors, with possibility reaching 70.59 percent and 64.03 percent, respectively. Some AI models even associate male pronouns with the word “actress.” According to Yu, data imbalance shoulders a lot of the blame for the biased nature of AI models, and prioritization over prediction accuracy in the LLM development also matters.“Accuracy-driven predictionencourages AI models to figure out the laziest way—labeling tasks by adopting correlation between gender and occupation,” Yu explained. “But correlation is not causality.”“These incidents highlight the dangers of biased data and algorithms in chatbots, and the potential for these technologies to aggravate gender discrimination and gender inequality in society when AI is deployed in the economy,” he added.China was the first country topropose an eight-item principleon AI governance, which wasissued in 2019 to encourage thesafe, fair, and responsible useof AI. Yu called for concertedglobal efforts on AI governance.Specifically, he recommendscreating a comprehensive legaland ethical framework to regulateAI research and commercialapplication, increasingtransparency and providing clearand accessible information aboutchatbots and their monitoringvia education, and drafting AIESG (Environment, Social andGovernance) reports as part ofcompanies’ AI self-governance.Immanuel Kant said,“Enlightenment is man’semergence from his self-imposednonage.” The time to actwith sound AI governance isnow while the risks are stillmanageable.Yu Yang explains AI’s machinery gender stereotypes in his office at TsinghuaUniversity, March 16, 2023. (Photo by Qiao Zhenqi/China Pictorial)A screenshot demonstrating that AI’s machinery gender stereotypes arecontingent to sentences. (Photo courtesy of Yu Yang)C H I N A P I C TO R I A L25 Copyright©博看网. All Rights Reserved.。

青少年自我伤害行为影响因素与情绪管理对策-社会心理学论文-社会学论文

青少年自我伤害行为影响因素与情绪管理对策-社会心理学论文-社会学论文

青少年自我伤害行为影响因素与情绪管理对策-社会心理学论文-社会学论文——文章均为WORD文档,下载后可直接编辑使用亦可打印——心理学情绪管理论文第五篇:青少年自我伤害行为影响因素与情绪管理对策摘要:自我伤害行为是应对负性情绪的常用策略, 普遍存在于冲动型、情绪管理薄弱的青少年群体中, 严重影响其身心健康和发展, 是重要的疾病负担之一, 应引起广大学者和学校卫生工作者的关注和重视。

作者对自我伤害行为的概念和界定、流行病学和危害、影响因素进行了文献研究和分析, 并提出以培养青少年情绪管理能力为重点的预防和干预策略。

关键词:情绪; 自我伤害行为; 精神卫生; 青少年;Emotional regulation and self-injury behavior among adolescentsTANG JieDepartment of Preventive Medicine, School of Public Health, Guangzhou Medical UniversityAbstract:Self-injury behavior, a common strategy for coping with negative emotions, is widespread among adolescents with impulsive and emotional dysregulation. Self-injury behavior severely impacts an adolescents mental and physical well-being, and has become one of the important disease burdens, which deserves much attention from both scholars and school health care providers. Based on literature review, the definition, epidemiology and influencing factors of self-injury,as well as proposed prevention and intervention strategies for self-injury focusing on emotional regulation, were provided.自我伤害行为(self-harm behavior, SB) 是一个宽泛的概念, 其核心内涵指个体故意伤害自己的身体组织。

7.故障诊断专家系统解析

7.故障诊断专家系统解析
我国故障诊断工作者也积极探索专家系统的应用研究, 国家在“七·五”和“八.五”期间也列有这方面的攻关课 题,取得了—些进展,但目前总的情况是实验室研究较多, 现场条件下的实际应用、特别是成功的应用实例并不多见。
故障诊断专家系统
人工神经网络
一、概述
1.定义及特点 2.目前的应用情况
x1 w1
i
二、基本原理
3)产生式表示(或规则表示)
其一般形式为
P
Q(即IF … THEN…)
左部分表示前提(条件或状态),右部分表示若干 结论
故障诊断专家系统
如:出现异常振动则振幅大。对于复杂的故障用树
枝状表示。
振动峰值大
基频振动
低频振动 二倍频振动 广谐振动
不平衡 热弯曲 油膜涡动 支承问题 轴裂纹 不对中 摩擦
油膜震荡
故障诊断专家系统
故障诊断专家系统
四、推理机制 1.推理分类 2.推理控制策略 3.推理搜索策略 4.似然推理
故障诊断专家系统
五、应用
美国西屋公司从开发汽轮发电机专家系统GenAID开始, 现已在佛罗里达州的奥兰多发电设备本部建立了一个自动 诊断中心,对各地西屋公司制造的汽轮发电机进行远距离 自动诊断。诊断对象从汽轮发电机逐步扩大到汽轮机、锅 炉和辅机。西屋公司和卡内基·梅隆大学合作研制了一台汽 轮发电机监控用专家系统,用来监视德州三家主要发电厂 的七台汽轮发电机组的全天工作状况。此专家系统能快速、 精确地分析仪表送来的信号,然后立即告诉操作人员应采 取什么措施。
故障诊断专家系统
二、知识库
1. 定义:专家知识、经验及书本知识的存储器
2. 知识表示
1)对知识表示的基本要求(三个基本要求) ①表示方案应便于知识的修改和扩充; ②表示方案应尽量简单易懂; ③ 表示方法应清晰明确。因为专家系统的建造过程是一

Empirical Determination of Bang-Bang Operations

Empirical Determination of Bang-Bang Operations
E-Bang Operations
Mark S. Byrd∗† and Daniel A. Lidar‡
Chemical Physics Theory Group, University of Toronto, 80 St. George Street, Toronto, Ontario M5S 3H6, Canada (Dated: February 9, 2008) Strong and fast ”bang-bang” (BB) pulses have been recently proposed as a means for reducing decoherence in a quantum system. So far theoretical analysis of the BB technique relied on model Hamiltonians. Here we introduce a method for empirically determining the set of required BB pulses, that relies on quantum process tomography. In this manner an experimenter may tailor his or her BB pulses to the quantum system at hand, without having to assume a model Hamiltonian.
one particular model. It is often very difficult to identify and isolate the various sources. The result is that the model-dependent approach for overcoming decoherence breaks down when applied to realistic systems, since it inevitably fails to capture all sources. In addition, current methods tend to ignore the experimental constraints imposed by the finiteness of resources, such as the scarcity of qubits in present-day implementations of quantum computers (presently, fewer than 10 qubits). Of course, this criticism in no way diminishes the importance of the model-specific approach: it is through that approach that ground-breaking new results have been obtained which establish the in-principle possibility of overcoming decoherence. In particular, this work has led to the observation that fault tolerant quantum computation is possible in the independent errors model provided the fidelity of gate operations is above a certain threshold [30, 31, 32, 33, 34]. We focus here on the BB method and consider a paradigm that is the reverse of the model-dependent approach to decoherence-reduction: Instead of assuming a specific model of decoherence, designing a corresponding QECC, and then looking for a system that might be described to a good approximation by that model, we propose to tailor a set of BB pulses to a system, from experimentally measured decoherence data. We call this approach, which we introduced first in [26], “Empirical Bang-Bang”. Empirical BB is a phenomenological approach which forsakes a microscopic understanding of the underlying decoherence processes in favor of a direct attack on the combined effect of all sources of decoherence at once. The procedure can be iteratively optimized using a closed-loop learning algorithm [35, 36, 37, 38, 39, 40, 41]. In this manner one may take into account practical constraints imposed by the specific physical and experimental realization. That empirical BB is feasible in principle follows from two key facts: (i) It is possible to experimentally measure the superoperator (i.e., the map that propagates the density matrix) characterizing the noise in a particular system by using Quantum Process Tomography (QPT); (ii) As we show here, given knowledge of the superoperator it is possible to design a BB procedure. Thus an experiment can, in principle, provide all the information

双语词汇识别中的联结主义模型

双语词汇识别中的联结主义模型

收稿日期:2008-05-31作者简介:敖 锋(1980-),男,四川泸州人,国防科技大学人文与社科学院外语系讲师,博士,研究方向为心理语言学及自然语言处理;胡卫星(1975-),女,湖南益阳人,国防科技大学人文与社科学院外语系副教授,博士研究生,研究方向为心理语言学及二语习得。

双语词汇识别中的联结主义模型敖 锋,胡卫星(国防科技大学人文与社科学院,湖南长沙410073)摘 要:本文探讨了计算模型在双语词汇识别研究中的作用并介绍了两种得到应用的联结主义模型:局域式网络模型和分布式网络模型。

这两种模型在结构和功能上既有相同之处,又存在差异。

尽管这两种模型对双语研究的理论发展有积极作用,但目前研究者们仍倾向于利用不同的模型来研究不同的语言现象,因此该领域还存在很大的研究空间尚待开发。

关键词:双语词汇识别;联结主义;计算模型中图分类号:H 087 文献标识码:A 文章编号:10022722X (2010)04200122050.引言从上世纪80年代开始,联结主义(Connecti o n 2is m)¹(即人工神经网络)模型被广泛用于研究母语的理解与产出,其机制在于模拟成年人的语言系统以及该系统的发展过程。

在双语词汇识别领域也有一部分研究采用了联结主义模型的方法。

本文主要介绍其中的两种模型,即局域式网络模型和分布式网络模型。

1.双语词汇识别中的计算模型计算模型在双语词汇识别研究中具有一定优势。

首先,建立计算模型必须使理论本身足够清晰以满足计算机应用的需要;其次,当某种理论的预测结果很难确定时(比如理论中各因素之间的相互影响非常复杂时),计算模型通过训练后能够生成可检验的结果,将模型的计算结果和实验数据进行对比即可分析理论的解释力水平;最后,计算模型可以模拟一些语言研究中的特殊情况,比如脑损伤造成的语言缺失,而这很难通过实验的方法来研究。

但是,在双语词汇识别研究中应用计算模型仍有一些值得考虑的问题。

系统集成英文版

系统集成英文版

System integrationFirst, the system integration system integration, says from the wording is various functions partial syntheses, the conformity for the unified system. However the system integration application meaning far continues this. Below the system integration contains five big essential factors:1.Customers professions knowledge request to the customer in the profession service, theorganizational structure, the present situation, the development, has the good understanding and grasps.2. 2. Application systems pattern and the technology solution provides the application highlytake the system as the customer demand the system pattern, as well as realizes this system pattern concrete technology solution and the operation plan, namely provides a comprehensive system solution for the user.3.Product technology l the product technology that provides to the primitive merchant graspsthe l system integration business innate research and development product, including application system software development.4.Projects management to project sale, pre-sale, project, post-sale service process unifiedadvancement and quality management.5.Services along with the profession healthy development and the standardization, the systemservice quality have become the important reference point gradually.Below second, the system integration business development along with the system integration market standardization, the special-purpose development, and system integration business will tend to tripartite to the development:1. Products technical service take the primitive merchant product as a center, partially provides the technical realization plan and the service to project concrete technology realization plan some function, namely product system integration.2. Systems consultation provides the consultation to the customer system project (project feasibility appraisal, project investment appraisal, application system pattern, concrete technology solution). Like has the possibility to continue this project, then is responsible to the product technical service and carries on the project realization tender using the product development system integration business, and is responsible for the project management (to contract and to sublet).3. In plans the design application system model together using the product development performance with the user cooperation, completes the application software system together with the user the design development, has the massive accumulations to the profession knowledge and the essential technology, has amphibious specialist which one batch of knowing the business industry knowledge understands the computer system. Provides the comprehensive system solution for the user, completes the final system integration. Looked by the current system integration market result that, the user settles on the application product development system integration business. Can provide the organization reasonably, the management is effective, the technology has the safeguard the system integration is the successful key.Third, the system integration strategy discusses 1, retails with the system integration difference(Distribution & System Integrating)No doubt, the sales product and the system solution process is similar, but its strategy and the stress point relative have the differencerespectively. Retails the product technology application request is low, the application level is not high, popular market product. System integration product then otherwise. Sub-underwriting take the product as a center, whips in the product marketing populace propaganda, the market retails the channel again the establishment. The system integration then take the system solution as a center, emphasizes the technology, has the obvious profession market characteristic. Sub-underwriting may profit from mutually with the system integration concrete sales method, but the strategy has the obvious difference.2nd, the management systematization and the standardization from the natural economy to the socialized big division of labor, the industry pattern, the economic type, the business management pattern, the human and human's cooperation relations, all unceasingly is having the transformation. The factory production assembly line must maintain the highly effective operation to be decided by two big essential factors: Each constituent to partial productive skill specially but fine. L reasonable division of labor division and each part of coordinated management. If compares with the system integration operation the industry assembly line, it is facing three main points similarly: Especially but essence, division of labor division, coordinated management. Its management key lies in the responsibility, authority and benefits.(1) The system integration organization function divides l to depend on the function division: The sale, the market, the technology, contain following essential factor: Market: The system sells the market the analysis, plans, the management, and gives Market the instruction comment to the new product research and development. Sale: Is always responsible with the concrete customer commercial personnel's contact, the track, and the relations. ? Pre-sale: Is responsible for the sales personnel, provides the product technology introduction, the concrete system solution for the concrete customer technical personnel. Project: Is responsible for the project group, to complete the project the project implementation. Post-sale service: Is responsible for the project group, to complete the project the post-sale long-enduring servicing and the service. Product development: Is responsible for the software and hardware product the concrete development implementation. Expert organization:The research tracks the new product, the new technology, proposes the system pattern and the concrete system technology solution. To pre-sale the system plan, which provides for the customer carries on the appraisal. Provides the system pattern to the product development, develops the platform the appraisal and the instruction. According to professional market division basis profession division, request all levels of personnel except to official duty work specially but fine, but also must have to the profession relations, the profession professional knowledge thorough understanding. May unify above two, by profession, union special details division system integration various functions department. (2) Coordinates the management tower system management system to form the tower system management system, each various departments responsibility, the power are clear about, by level on line of coordinated management, decision-making by level under line of issue implementation. The project group system integration external behavior performance is a project, concrete customer project, product research and development project and so on. The project group should appoint the corresponding personnel by this project correlation each parallel department to be composed, plenary powers is responsible for this project by project manager the management. Professional sale project manager wants to be responsible for this profession sale branch, and is responsible directly for each parallel department's higher authority control section. Should unify by the tower system managementsystem and the project work team. The low efficiency possibly which division of labor management Level might fully adapt the enterprise future Scale development, the project group's flexible Plane management may avoid which the multi-level management bringing the ossification and the parallel department coordinates.3rd, the system integration professional characteristic and market localization at present, in domestic has some relations national economy and the people's livelihood and so on the profession like finance, telecommunication, postal service, tax affairs, insurance, manufacture, are the national key investment profession; The trade is invests the cycle short effective to be quick also the fund quite abundant profession; The government work is may cause the country to consummate the management system, enhances the office efficiency the profession. Enters these professions the system integration domain, some may acquire fame, some may profit, some may achieve both fame and fortune. Center small company in system integration domain start late, in the finance, the posts and telecommunications, the insurance, the tax affairs and so on the prominent profession, from profession aspect and large-scale system integration business and so on market share, product technology, fund investment, profession relations, profession experience compares the disparity to be big. The system integration market is broad, however the market opportunity also is fleeting. We should analyze the profession market, concentrates the limited manpower, the physical resource, the fund, holds and has a thorough understanding several professions, such will play to the role which will be twice the result with half the effort, achieves both fame and fortune. If did not consider the actual strength, comprehensively launches an attack, is we really is out of reach at present, will disperse the limited investment strength, the wasted effort, will not favor us in this domain long-term development.4th, the system integration needs to continue for a long time investment at present, we are weak in the system integration domain strength, the management and the operation level wait for the enhancement, the profession market and the technical force waits for the investment and the raise. We the reason that can obtain short-term in this domain the high speed growth, its source the broad market which in the all levels of staffs' professional spirit, the struggle rest enterprise culture, profession becoming an information based society does not bring. If only pays great attention to the short-term behavior rapidly the benefit, does not pay great attention to raises and invests, we not only can lose the market opportunity which loses possibly holds, moreover very difficultly will obtain the benefit growth in this domain which long-term will continue, will be unable to achieve from the quantitative change to the qualitative change. A system integration business responsibility is creates the demand and the guidance demand. Completes the advisory service in the system integration earlier period, causes the customer understanding trust company the ability, the technology; Should have the profession knowledge and the technical background to the concrete personnel's request. Has the long-term investment to the system integration business request, achieves must control the market, guides the market, but has some project. We are facing the short-term benefit rapidly growth and the long-term development benefit continue question and so on market opportunity which grows, the broad market and is fleeting, "fish and bear's paws" whether can result in concurrently, will be the question which a Shan Dai discussed.5th, several suggestions(1) Strengthens the headquarters and various subsidiary companies' professional market unitize, the standardized management and the market plans, leads various subsidiary companies the system sale, and enhances the subsidiary company through the system project implementationin the practice the technical strength, forms the nation professional system integration market.(2) Adjusts the consummation internal management mechanism division of labor, the coordination, and the project management, in management benefit.(3) Strengthens the professional market the long-term investment and the customer establishment long-term cooperation relations, ceases the short-term behavior and only pays great attention to at present the benefit. Improves the grade of service, sets up, the maintenance good enterprise image. Takes the project to have three essential conditions: The outstanding customer relations, the fine system solution, set up the good technology and the service image in the customer, the constitution sufficiency.First article is the latter two foundations. If with the customer long-term relational investment, has not been able thoroughly to understand the customer the demand, also is unable to provide conforms to the customer demand system solution truly. If with the customer long-term cooperation, without knowing where to begin has not established the good technology and the service image in the customer mind. Through cooperates we with the sales personnel to meet such question frequently: Provide the system plan first several talents in the customer project deadline for bids or the request to know the news, and understood in a hurry the customer demand, lets us make the plan or go with the customer to discuss, such result are many for has done also is does without charge, creates the nonessential manpower and the physical resource waste. General, the big project must pass through half year even longer time fermentation. In this period, other ahead of time tracked the merchant are many has established the good relations with the customer, has a fuller understanding to the customer demand. We then do not occupy the weather; the human and, such project is often inadequate. Certainly, is not said the bill has not hit, through blackmails also is establishes the customer relations, promotes the customer to one of our understanding ways, key here emphasizes is the customer relations long-term characteristic.From take calculates the ability as the central large-scale machinery time, to take information sharing as the central network time, experienced from the hardware platform decision software to the application software decision hardware platform transformation, the software has already become the system integration "the soul". Along with the market development, each integrated business level also is enhancing. The primitive merchant product technology, the macroscopic system solution, are many system integrations business may provide, basically does not have the characteristic to be possible to say. The technical strength and the service are and post-sale manifests only then truly in selling. But provides the high grade profession application software product, is our solution characteristic which other merchants is unable to provide, is in pre-sale most attracts the customer the flashing temperature.In the system integration market marketing, who has to be clear is extremely the competitor, the system integration market marketing function not only is must satisfy the market the need, moreover must satisfy well compared to the competitor. Therefore the time closely pays attention to competitor's tendency, expected needs to take the action to them, and copes with it by the suitable measure is the company market marketing work essential function. To competitor understanding mainly in below aspect: Which do 1. Competitors have in the correlation domain achievement. In 2. Solutions essential equipment, network, * makes the system, database provision. 3. And customer relational familiar degree. 6th, blackmails under the notice is when strives for the project, needs to understand situation.(1) The project name, the customer must make any, customer demand.(2) Project action program, time, and place, investment cost.(3) The project decision-making relations, this project policy-making organ composition and the relations, who make the system technology decision-making, who makes the merchant choice decision-making.(4) Customer to system construction technical platform whether there is Trend. Who(5) Is the match, the match customer relations, how does the technical plan tend to. Above we then obtain the information, can appraise the project succeeds the probability, decided whether further invests, and formulation corresponding project work plan.。

最大熵方法在英语名词短语识别中的应用研究

最大熵方法在英语名词短语识别中的应用研究
meh d u e n l h p rs t c u e c aa trs c a d t e c n e to e p st n t sa l h fau e s t h n u e t o s sE gi h a e s u t r h rc eit n h o tx f h o i o o e tb i e tr e ,t e s s s r i t i s  ̄ q e c d a e a e muu l ifr t n t xrc f cie f au e ,whc s e p e s d a h x mu e t p e u n y a v rg t a no ma i o e ta tef t e tr s n o e v ih i x r s e s t e ma i m n r y o mo e ,a d f al e o n t n i c  ̄ e u a e i h xmu e t p r cpe i lt n e p r n sc rid d l n n l r c g i o a id o t s d O ema i m nr y p i i l .S mu ai x e me t ar i y i s b l o n o i i e
W‘ ANG X a — u n .Z io ja HA0 C u hn
( .H a gui nvri ,Fch f o p t , h m da ea 6 00 h a 1 unh a U ie t au yo C m ue Z u ainH nn4 30 ,C i ; sy r n 2 C lg f ix n , i i gH nn43 0 , h a . oeeo Xni g Xn a ea 5 03 C i ) l a xn n
ABS RACT : s t eb sso h y tx a  ̄y i ,B s NP r c g i o sa ot n t p i n l h ma h n a s T A h a i f e s n a n s t s a e e o nt n i n i ra t e E gi c i e t n — i mp s n s r

新大学英语综合教程Unit4 5 7 课文原文及翻译

新大学英语综合教程Unit4 5 7 课文原文及翻译

Unit 4 When we abuse animals, we debase ourselves人类虐待动物就是在贬损自己Moving a cow by chaining it to a tractor and dragging it by its leg says a lot about how we perceive and value animals. When the Humane Society video that showed this and other brutal slaughterhouse treatment made the rounds on the Internet a few weeks ago, it caused public shock and led to a federal investigation. But there's a deeper lesson that all of us – whether or not we eat meat – need to take to heart: we degrade ourselves when we degrade animals.将一头牛锁在一辆拖拉机上然后拖动很好地表明了我们对动物的看法和感受。

当人道协会的这个展现了这样场面等其它屠宰场里残忍对待的录像片在数周前网上散布后它引起了公众的震惊,导致联邦政府开展调查。

但是对我们所有人来说这还是一个更为深刻的教训--不论我们是否吃肉--应该铭刻在心中:在贬低动物的同时我们在贬低自己。

Much as bullies demoralize themselves when they dominate or ride roughshod over those who are meek, vulnerable, or defenseless, it should be obvious that human beings are the ones demoralized by the commission of inhumane acts.正如那些欺负者们当控制那些温顺、脆弱或没有抵抗力的人们或骑在他们头上是在将自己的道德败坏一样去进行那些残忍的虐待动物的活动中人类的道德也被这种非人道的行为所败坏。

高维相依及Copula理论、建模及应用的最新科研成果

高维相依及Copula理论、建模及应用的最新科研成果
以之前四次国际知名的学术会议为缘起酝酿筹备而 成, 但研究范围更广 、 涵盖 内容更丰 富, 展示 了在高
维相依和 C o p u l a 领域的最新科研成果。 本次会议 由中央财经大学 中国精算研究 院主
办, 由加拿大滑铁卢大学统计与精算系蔡军教授、 美
汇报了他们在河 口 海岸科学研究领域所做的开拓性 研究。
次, 会议承办单位和举办地点由国际河 口海岸科
涉及学科面广 。 来自 不 萎 分会场的报告内容丰富 , 同研究 区域、 不同专业背景的人员互相学习和借鉴, 象
学学会遴选 。2 0 1 0年国际河 口海岸科学学会主席 M i k e E l l i o t t 教授访 问华东师范大学河 口海岸学国家
重点实验室时 ,注意到这里有很强的科研队伍和国 讨论热烈。 会议还为青年学者、 研究生评选 出了最佳 际先进的仪器设备 ,故将此作为承办单位候选机构 口 头报告奖 、最佳展板奖和河 口海岸学国家重点实 之一, 2 0 1 2 年正式与其签约 , 合作举办 2 0 1 3 年的大 鼓励年轻人积极参会 、 共同研讨 。 会。 举办这样的国际会议 , 为展示河 口海岸学国家重 目 验室奖等 ,
择; ②藤 C o p u l a s 的潜在变量 ; ③保险公司运营和相
依建模 ; ④S i b u y a C o p u l a s ; ⑤C o p u l a s ( 非) 相依极值 渐近线在高频财务数据 中的应用 ;⑥运用藤方法学 习贝叶斯结构 ;⑦多种业务的相关损失三角结构 ;
尼 黑召开 了相近 主题 的 国际会议 。
拿大滑铁卢大学数学学 院统计 与精算学系副教授 、 中国中央财经大学长江学者陈建成教授合作主持。 本 次 会 议 的科 学 委 员 会 成 员 有 C l a u d i a C z a d o

《爱的历史》中的文化记忆书写

《爱的历史》中的文化记忆书写

‘齐齐哈尔大学学报“(哲学社会科学版)2024年2月Journal of Qiqihar University(Phi&Soc Sci) Feb.2024  收稿日期:2023-09-26 作者简介:曹颖哲(1976-),女,副教授,硕士㊂主要从事英美文学研究㊂张铭洁(1998-),女,在读硕士㊂主要从事英美文学研究㊂□文学研究‘爱的历史“中的文化记忆书写曹颖哲,张铭洁(东北林业大学外国语学院,黑龙江哈尔滨150040)摘 要:‘爱的历史“是美国新兴犹太作家妮可㊃克劳斯的第二部作品,讲述了大屠杀影响下大屠杀亲历者和犹太移民后裔两代人的文化记忆危机㊂在象征系统㊁仪式系统和文本系统三层文化符号系统的文化记忆展演下,妮可㊃克劳斯展现了大屠杀幸存者及其犹太后裔的文化记忆的回避与缺失㊁复归与传承以及在这个过程中犹太文化的追寻与认同,引导读者重新审视并反思文化认同的重建㊂关键词:‘爱的历史“;文化记忆;大屠杀中图分类号:I106.4 文献标识码:A 文章编号:1008-2638(2024)02-0105-04Cultural Memory Writing in The History of LoveCAO Ying -zhe ,ZHANG Ming -jie(School of Foreign Languages,Northeast Forestry University,Harbin Heilongjiang 150040,China) Abstract :The History of Love is the second work of the emerging Jewish American writer Nicole Krauss,which tells the story ofthe cultural memory crisis of two generations of Holocaust witnesses and Jewish immigrant descendants under the influence of the Holo⁃caust.Under the representation of cultural memory in the symbolic system,ritual system,and textual system,Nicole Krauss presents the avoidance and loss of cultural memory,restoration and inheritance of Holocaust survivors and their Jewish descendants,as well asthe pursuit and identification of Jewish culture in this process,guiding readers to re-examine and reflect on the reconstruction of cultur⁃al identity. Key words :The History of Love ;cultural memory;Holocaust 妮可㊃克劳斯是美国当代犹太女作家,她被‘时尚先生“誉为 全美最出类拔萃的作家”㊂由于其犹太裔身份,她的作品主要关注犹太裔的大屠杀记忆与文化寻根㊂作为她的第二部小说,‘爱的历史“被‘纽约时报“评为畅销书,并入围了英国奥兰治奖短名单㊂妮可㊃克劳斯在这部作品中将焦点放在大屠杀幸存者与美国犹太后裔的记忆上,探寻他们对民族文化记忆的迷茫与追寻㊂作为第三代大屠杀文学作品,这部作品受到学者们的高度评价,约斯特评价这部作品为 无论是叙事控制㊁人物塑造还是写作风格,该小说都堪称当代美国大屠杀文学的佳作”[1]113,杰西卡㊃朗认为小说中的大屠杀是历史和想象交织在一起的未来大屠杀文学的代表[2]44㊂对于这部作品,学者们主要将研究视角放在其叙事视角㊁大屠杀主题和爱的主题上㊂卡罗琳娜㊃克拉苏斯卡探讨了克劳斯小说中代际性叙事,探究了这部小说中的代际性㊂[3]286菲利普㊃科德借用 纪念摇篮”的概念探究了阿尔玛和她的弟弟以及布鲁诺身上承担的大屠杀历史的重担㊂[4]685丽贝卡㊃纽伯格㊃戈尔茨则认为这本书不是关于古尔斯基㊁阿尔玛或书中任何角色的绝望,而是关于爱和希望㊂[5]2关于这本书的探究角度比较多元,但尚无从文化视角剖析这部作品的专论㊂大屠杀结束后,人们将热点从如何描述大屠杀的罪行转移到了如何记忆大屠杀㊂随着亲历大屠杀的人越来越少,建立长期的回忆模式以及延续民族文化身份变得尤为迫切㊂德国著名教授扬㊃阿斯曼在哈布瓦赫提出的集体记忆的基础上提出了 文化记忆”这一概念,在学术界产生了广泛的影响㊂文化记忆以过去的某些事件为立足点,使某个集体的成员们意识到他们的共同属性㊂扬㊃阿斯曼认为,文化记忆是 由特定的社会机构借助文字㊁图画㊁纪念碑㊁博物馆㊁节日㊁仪式等形式创建的记忆㊂这种记忆涉及的是对一个社会或一个时代的集体记忆,相关的人通过不同的文化形式如传阅㊁瞻仰㊁背诵重温这些记忆,并在这个过程中确认并强化自己的身份㊂”[6]270赵爱霞和左路平进一步将文化记忆总结为通过文本系统㊁意象系统㊁仪式系统㊁象征系统等文化形式或文化符号得以存储㊁传承的记忆㊂[7]80本文从扬㊃阿斯曼的文化记忆理论出发,探讨在象征系统的展演中体现的大屠杀亲历者及犹太后裔对大屠杀记忆的回避与缺失,犹太文化记忆在仪式系统中的重新涌现与追寻,以及最终在文本的传递中实现的对犹太文化的认同与寻根㊂一㊁地点 大屠杀记忆的回避与缺失在现代人类历史上,发生过多次大屠杀,其中规模较大的有二战期间纳粹对犹太人的屠杀和日本侵华期间的南京大屠杀等㊂为了铭记历史,以大屠杀为背景或主题的文学作品层出不穷,形成了 大屠杀文学”㊂美国的犹太大屠杀文学主要经历了三个阶段:第一阶段是在大屠杀发生后到20世纪60年代期间的大屠杀作品,以大屠杀亲历者的口述和证词为主;第二阶段是在60年代到80年代,主要描述犹太幸存者及其创伤㊁犹太幸存者和美国当地犹太人以及非犹太人的关系等;20世纪90年代至今的大屠杀文学则是第三代大屠杀文学,由于没有直接的大屠杀记忆,这一时期的文学作品只能是通过想象来描写大屠杀㊂[8]45第三代大屠杀作者主要是幸存者的后代及身居外国的犹太新移民,他们缺乏大屠杀的记忆与体验,并且也没有直接的身体及精神创伤,文化记忆就成为第三代大屠杀作家对于大屠杀认知的主要来源㊂因此,如何通过文化记忆来展现大屠杀对于妮可㊃克劳斯来说是极具有挑战性的㊂地点在涉及集体和文化的记忆中,扮演着极其重要的角色㊂扬㊃阿斯曼认为, 自然场景并非通过符号引起重视,而更多是作为一个整体被升华为一个符号,即是说,它被 符号化了’”㊂[6]55金寿福则进一步总结地点作为符号在文化记忆中的象征作用,他认为记忆与特定的位置紧密相连㊂房屋㊁村庄㊁斜坡㊁山峰㊁河流㊁城镇及其附属物共同构成了一个支撑和激发人们记忆的空间㊂它们具有特定的象征意义㊂在‘爱的历史“中,妮可㊃克劳斯将波兰和美国这两个国家转化两代人对于大屠杀不同记忆的象征符号㊂对于大屠杀亲历者来说,波兰是大屠杀发生的地方,更是犹太文化记忆的一个象征符号,象征着他们失落的故乡以及再也不愿意回想的民族文化记忆㊂在这部作品中,大屠杀贯穿始终,但是却没有一处是直接描述,而是通过零散的记忆形式来展现㊂‘爱的历史“将大屠杀幸存者利奥波德㊃古尔斯基的故事以第一人称叙事展现㊂古尔斯基在波兰时与阿尔玛㊃明列梅斯基相爱,并为她创作了名为‘爱的历史“的书籍㊂大屠杀发生后,两人先后都来到了美国,而阿尔玛却在生下古尔斯基的儿子艾扎克后另嫁他人㊂在美国的古尔斯基东躲西藏,怕被人遣返回国,由于没有身份,他找不到任何工作,只能以开锁为生㊂而当想到这段记忆的时候,总是抛不开一个名字 波兰 他的故乡,也是如今不属于他的地方㊂扬㊃阿斯曼认为: 回忆需要依靠物和支撑点”,[6]243曾经,波兰是古尔斯基生长的地方,那里有他心爱的女孩阿尔玛,那里承载着他们在广场上和田野里玩耍的记忆㊂随着大屠杀的爆发,波兰就变成了犹太人争先逃离的噩梦,孤身一人身处美国的古尔斯基常常自言自语道 在稻草堆里找一根针,还是在波兰寻获一个犹太人还更容易一些呢㊂”[9]23纳粹大屠杀严重影响了他们的生活环境和精神世界,迫使他们逃往美国㊂犹太和美国文化之间的激烈冲突使他们无法融入主流社会,只能在边缘化的社会中经历孤独和恐惧㊂古尔斯基逃到了美国,他每天都要担心被遣返回国, 一个从波兰来的犹太人 连上厕所忘了冲马桶都怕会被遣送出国㊂”古尔斯基为了不引人注意,连开锁㊁上锁都是低着头㊂[9]157当古尔斯基和他的表哥去拍照时,相纸上怎么也无法留下他的影像,他认为: 有些人失去的是脚或手臂,我则失去了某种特质,少了那种特质,我无法留下任何印象㊂”[9]96在大屠杀发生后,身在美国的古尔斯基陷入了对自己身份的迷茫并选择回避自己的母族文化㊂将犹太身份和记忆抛诸脑后成为了古尔斯基不得不做出的选择,波兰对于他而言,是他不愿回想起的故国㊂对于身处美国的十五岁犹太民族后裔阿尔玛㊃辛格来说,美国是大屠杀记忆缺失的象征㊂小阿尔玛的父亲是犹太人,他年轻时在书店里买到了古尔斯基写的‘爱的历史“,将其作为定情信物送给了妻子㊂后来他们就用这本书主人公的名字阿尔玛将自己女儿命名为阿尔玛㊃辛格㊂在美国成长的阿尔玛甚至都不知道自己的犹太身份,更别提对那段大屠杀有任何记忆㊂小阿尔玛和妈妈谈论家族的过去之前,她从未想过自己多元的民族身份㊂当她的妈妈指明她 是一半波兰人,四分之一匈牙利人,四分之一英国人”时,小阿尔玛大喊道: 我是美国人!”㊂[9]116出于对‘爱的历史“中和她拥有同样名字的女主人公阿尔玛㊃明列梅斯基的好奇,她去以色列大屠杀纪念馆㊁纽约市政厅查找阿尔玛㊃明列梅斯基的信息,意外地查找到来到美国犹太移民名单以及耶路撒冷大屠杀纪念馆的受害者名单㊂对于阿尔玛来说,大屠杀记忆不是切身经历的事件,而是一个只能通过上网查询才能了解的遥远事件,大屠杀事件只能是一些记录的资料以及虚构性的想象㊂身处美国的小阿尔玛缺失关于大屠杀的记忆,美国对于小阿尔玛来说,是大屠杀记忆的断层与缺失的符号㊂文化记忆是一种选择,而选择的过程会伴随一定的遗忘与缺失㊂作为美国的犹太裔作家,妮可㊃克劳斯一直致力于表现大屠杀亲历者和处于美国社会的犹太后裔的犹太性的缺失问题㊂在第三代大屠杀文学中,大屠杀一直在场,但是受制于多元文化的冲击和代际距离,大屠杀记忆成为被回避以及缺失的存在,而波兰和美国,则成为两个文化符号,分别象征着大屠杀记忆的回避与缺失㊂二㊁仪式 犹太记忆的复现与传承仪式属于文化记忆的范畴,是因为它展示的是对文化意义的传承㊂扬㊃阿斯曼将记忆分为两种,一种是交往记忆,一种是文化记忆,交往记忆 随着时间的消失而消失,更确切的讲:是随着它的承载者而产生并消失的”,[6]44它的媒介是存在于人脑记忆中的鲜活回忆;而文化记忆的媒介是被固定下来的客观外化物,以文字㊁图像㊁舞蹈等进行的传统的㊁象征性的编码及展演㊂[6]51文化意义的循环和再生产必须要借助外力,因此文化记忆要想获得意义,仪式是必不可少的工601齐齐哈尔大学学报(哲学社会科学版) 具㊂对于古尔斯基这样身处美国社会不愿再回忆起过去的人以及对于阿尔玛的弟弟鸟弟这样身处多元化的文化社会的人来说,需要通过仪式实现文化记忆的展演㊂葬礼是为悼念亡者而举行的仪式㊂对亡者的回忆可以被分为回溯性的回忆和前瞻性的回忆,而回溯性的回忆是更为普遍的形式㊂在‘爱的历史“中,古尔斯基的儿子伊扎克是他心爱的阿尔玛㊃明列梅斯基只身一人去往美国后生下的㊂对于古尔斯基而言,大屠杀带给他的更多的是直接的文化创伤㊂古尔斯基通过压抑大屠杀记忆来忘却创伤,他的大屠杀记忆从而进入了 潜伏状态”㊂在儿子葬礼上,他那潜意识中的大屠杀记忆又被激发了出来㊂在葬礼上,古尔斯基重新回忆起过去的一切,他想起意第绪语,他想起大屠杀中他失去的一切:他失去了他的妈妈,失去了朋友弗里茨,失去了弟弟萨里和妹妹汉娜,失去了笑声,失去了一生唯一爱的女人阿尔玛㊃明列梅斯基,失去了多年岁月,失去了自己的儿子㊂他将自己一直隐藏的犹太身份在葬礼上主动告诉了伊扎克同母异父的弟弟伯纳德,并向伯纳德讲述他母亲阿尔玛㊃明列梅斯基在波兰时的故事㊂在儿子伊扎克的葬礼上,古尔斯基不再对大屠杀 失忆”,他击碎了自己应对异国文化冲击的自我防御机制,主动消解自己身份困境㊂在操演中化为符号的葬礼,不仅意味着古尔斯基的唯一后代的死亡,也使其经历过的一系列死亡与丧失一一重现,从而使得古尔斯基头脑中的犹太记忆在葬礼中被激活并重新涌现㊂对于身处美国的犹太后裔来说,犹太教是除了大屠杀记忆外构建犹太文化记忆的另一块基石㊂鸟弟跟小阿尔玛一样,从小在美国成长,没有关于犹太文化的记忆,鸟弟时常会向姐姐阿尔玛询问自己的身份与血统,表达对自身文化身份的困惑㊂代际的更迭使得犹太后裔面临犹太民族记忆消亡的危机㊂对于像鸟弟这样身处美国的犹太后裔而言,他们的犹太记忆被空心化,他们对于犹太文化仅处于了解的程度,却不曾真正传承㊂他们已经完全被美国社会同化,背离了自己的犹太民族后裔身份㊂当鸟弟在九岁半时找到了一本叫做‘犹太人思想“的红色小书时,他试图通过犹太教仪式寻求民族文化确认㊂他找到这本红色书后不久就戴上了象征犹太教的黑色绒布的小圆帽, 而且到哪都戴着,即使帽子太大㊁后面突起一大块,让他看起来像个呆瓜,他也不在乎”㊂[9]41他每天早早起床,对着耶路撒冷的方向祷告㊂在重复的犹太教仪式中,鸟弟认为自己是犹太教中的 智者”,有着传播犹太宗教的重任㊂鸟弟用希伯来语记录自己的日记的日期,并且每天卖柠檬汁攒钱,目的是去耶路撒冷朝圣㊂他对于犹太教到了狂热的地步㊂鸟弟没有直接参与犹太文化的记忆,但却在宗教中实现了对犹太文化记忆的追寻与确认㊂阿斯曼说: 借助仪式加以重复,其根本目的在于意义,因为意义保存在仪式中并在此得到再现㊂”[6]89鸟弟在犹太教仪式的在场参与中坚定了自己对于犹太文化的选择,坚守犹太民族记忆,传承了犹太文化㊂意义只有通过传承才能保持其鲜活性,而仪式就是传承的形式之一㊂通过仪式,古尔斯基的大屠杀记忆和犹太文化记忆得以复现,而鸟弟在犹太教的仪式中实现了犹太文化的构建与传承㊂仪式的重复和现实化不仅是对犹太裔的文化遗忘与缺失的对抗,也是对美国犹太人记忆的空心化的解构,正是在仪式中,文化记忆得以复归与传承㊂三㊁书籍 犹太文化的认同与寻根当各种文化活动借助文字和以文字为载体的各种记忆形式确立并维护集体身份的时候,文化记忆已经发生作用㊂这部作品以大屠杀幸存者古尔斯基为曾经心爱的女孩阿尔玛㊃明列梅斯基写作的书‘爱的历史“为线索,将两代人的命运联系在一起,在实现这本书的传递的时候,逃往美国的大屠杀亲历者和犹太移民后裔也实现了自己的民族文化认同与寻根㊂回归是流散世界各地的犹太人坚持犹太性的永恒难题㊂犹太人古尔斯基在大屠杀来临前就写完了‘爱的历史“的手稿,那时的他写在书中的都是心爱的阿尔玛㊃梅列明斯基,他用这本书记录下他在波兰的美好生活与思考㊂大屠杀来临后,他失去了一切,他将手稿交给自己的好朋友立维诺夫后便只身逃往了美国㊂立维诺夫以为古尔斯基已经葬身于大屠杀中,于是将‘爱的历史“这本书翻译成西班牙语并出版㊂古尔斯基逃到美国之后,这里的信仰㊁文化使得他饱受孤立,他只能东躲西藏,不停地和外界分离㊂心理学家莱恩(ing)认为,当个体对自我的稳定性产生怀疑的时候,个体会产生吞没焦虑,因此他们会害怕与外界联系,从而置于 被理解(即被掌控㊁被了解)和被爱甚至被看见的危险之中”㊂[10]44身处美国的古尔斯基连工作时都怕被抓去遣返回国,每天都生活在极端的孤独之中,于是他幻想出了朋友 老年的布鲁诺㊂现实中的布鲁诺是犹太作家,在1942年在纳粹集中营里被杀㊂古尔斯基惧怕没有人发现自己的死亡,他每天都跟想象中的布鲁诺 打电话”㊂古尔斯基的儿子艾扎克请小阿尔玛的母亲夏洛蒂将‘爱的历史“翻译为英语,小阿尔玛根据书中的线索,寻找真正的阿尔玛㊃明列梅斯基㊂若干年后在鸟弟的牵引下,小阿尔玛带着‘爱的历史“找到古尔斯基的那一刻,古尔斯基不断与自己对话,他仿佛实现了自己一生守护的愿望 再见到阿尔玛,哪怕不是心中真正的阿尔玛㊂那一刻,古尔斯基真正得以解脱,对于大屠杀的痛苦记忆得以释怀,对于自己犹太身份的抵触得以消解㊂当他看到小阿尔玛手中拿着他的书的时候,他知道他的民族记忆得到了传承,他不停地回想他过去的经历,想到他的妈妈,想到他的儿子,想到布鲁诺,却不再像之前那样充满哀伤,他始终没有忘记自己的犹太身份㊁犹太文化,他终于在临死之时重新认同了自己的犹太文化身份㊂若干年后,他在自己的讣告中写道:他孤零零地死去,因为他害羞到没打电话给任何人㊂说不定他在思念阿尔玛之时死去㊂或在他决定不思念之时㊂”[9]305古尔斯基在文本‘爱的历史“传递中,决定不再思念心爱的阿尔玛㊃明列梅斯基,不再思念过去的人和事㊂在妮可㊃克劳斯笔下,古尔斯基冲出了在美国这个多元文化社会下犹太移民面临的文化困惑,与自己一直掩饰的犹太身份和解,深化了自己的犹太文化认同㊂在寻找阿尔玛㊃明列梅斯基的线索的同时,小阿尔玛也在探寻自己的身份㊂在日记中小阿尔玛写道: 在寻找的过程中,我也开始搜寻其他一些东西,这些跟原本的目的有关,701 第2期‘爱的历史“中的文化记忆书写但也不尽相同,因为它们也关系到我㊂”[9]208寻找书上的阿尔玛㊃梅列明斯基的过程,也是小阿尔玛追溯自身身份,还原族裔历史的过程㊂她在网上查找阿尔玛㊃明列梅斯基的消息,在档案馆去查找资料,在这个追寻的过程中,她了解到那段对她来说本遥不可及的历史,了解到大屠杀带来的伤痛,从而建立起自己的种族身份,杰西卡㊃朗认为大屠杀为小阿尔玛的身份建构提供了历史依据:古尔斯基是大屠杀幸存者,书又是大屠杀发生之前为爱人所作㊂[2]48㊂犹太文化十分强调历史的延续性,前辈与后代因为某些共同基础彼此相关,只有这样,犹太文化记忆才得以跨越时空,并且被铭记㊂小阿尔玛见证了‘爱的历史“的传递,在追溯‘爱的历史“中与自己重名的阿尔玛㊃明列梅斯基的秘密时,她探索到了自己的犹太文化身份,构建了在美国主流文化下的犹太裔的双重文化身份㊂文本系统是文化记忆的重要媒介,人们通过认知和理解特定的记忆内容来确认并强化自己的文化身份㊂通过书中书‘爱的历史“的传递,杰西卡㊃朗认为克拉斯小说最犹太的地方不在于对大屠杀幸存者性格的刻画,而是表达了直接遭遇大屠杀的老一辈,和只能间接接触大屠杀的新一辈之间,并非没有联系㊂[2](P.48)在书本的帮助下,小阿尔玛和古尔斯基最终相遇,实现了犹太人对犹太文化的认同与寻根㊂总之,相比于直接描写大屠杀,第三代大屠杀作品更注重的是探究后大屠杀时代的文化记忆和文化认同,并关注犹太文化在美国社会的传递与延伸㊂‘爱的历史“这本书中的象征符号㊁仪式㊁文本蕴含着深刻的文化意义,对于实现大屠杀后犹太文化复归与认同有着至关重要的作用㊂这本书讲述了两代人的经历,大屠杀幸存者到了美国后成为边缘群体,找不到认同感,自己的犹太记忆被压抑㊂同时,大屠杀移民的后代也因为其大屠杀记忆的缺失,对犹太文化感到迷茫㊂‘爱的历史“借助文化记忆对犹太文化记忆进行感知㊁理解㊁建构,旨在指导人们冲出文化身份的迷茫㊂ 参考文献:[1]Krijnen,Joost.Holocaust Impiety in Jewish American Literature[M].Leiden:Brill,2016.[2]Lang,Jessica.The History of Love,the Contemporary Reader,and the Transmission of Holocaust Memory[J].Journal of Modern Literature,2009.[3]Krasuska,Karolina.Narratives of Generationality in21st-century North American Jewish literature:Krauss,Bezmozgis,Kal⁃man[J].East European Jewish Affairs,2006.[4]Phillip,Codde.Keeping History at Bay:Absent Presences in Three Recent Jewish American Novels[J].MFS Modern Fiction Studies,2011.[5]Goldstein,Rebecca.Hearts Full of Sorrow[J].New York Times Book Review,2010.[6]扬㊃阿斯曼.文化记忆:早期高级文化中的文字/回忆和政治身份[M].金寿福㊁黄晓晨,译.北京:北京大学出版社, 2015.[7]赵爱霞,左路平.论文化记忆及其意识形态功能[J].思想教育研究,2022.[8]孙鲁瑶.记忆与美国犹太大屠杀小说的代际演进[J].复旦外国语言文学论丛,2022.[9]妮可㊃克劳斯.爱的历史[M].施清真,译.北京:人民文学出版社,2018.[10]Laing,R.D.The Divided Self:An Existential Study in Sanity and Madness[M].London:Penguin Books,1965.(责任编辑 吴明东)(上接第54页)[9]马克思恩格斯文集(第5卷)[M].北京:人民出版社,2009:90,722.[10]尤瓦尔㊃赫拉利.未来简史:从智人到智神[M].林俊宏,译.北京:中信出版社,2017:331.[11]马克思恩格斯文集(第8卷)[M].北京:人民出版社,2009:169.[12]尼采.上帝死了 尼采文选[M].上海:上海三联书店,1989:58[13]尼采.人性的,太人性的[M].杨恒达,译.北京:中国人民大学出版社,2005:251-252.[14]马克思恩格斯全集(第3卷)[M].北京:人民出版社,1975:938.[15]尼采.论道德的谱系.善恶之彼岸[M],谢地坤,宋祖良,程志民,译.桂林:漓江出版社,2007:56.[16]马克思恩格斯全集(第四十二卷)[M].北京:人民出版社,1979:126.(责任编辑 董翔薇) 801齐齐哈尔大学学报(哲学社会科学版) 。

应化精细核心词汇(修订版)(华理)讲解

应化精细核心词汇(修订版)(华理)讲解

科技英语核心词汇(应用化学/精细化工专业)A1,2-ethanediol n. 1,2-乙二醇abscissa n. 横坐标absorbance n. 吸收率, 吸光度absorption n. 吸收absorption coefficient n.吸收系数abstract vt. 提取abundance n. 丰富, 充裕acceptor n. 接受体,受体accumulator n. 储料器accuracy n. 精度acetamide n. 乙酰胺acetic acid n. 醋酸acetophanone n. 乙酰苯,苯乙酮acetylene n. 乙炔achiral a.非手性的acknowledge v. &n. 致谢activation n. 活化acylation n. 酰化addition n. 加成反应adhesive n. 粘合剂adipic acid n. 己二酸Adsorption n. 吸附advancement n. 进展,增长affinity n. 亲合力agent n. 试剂alcohol n. 醇aldehyde n. 醛, 乙醛aldol n. 醛醇aliphatic a. 脂肪族alkali n. 碱alkali metal碱金属alkaloid n. 生物碱alkane n. 烷烃alkene n. 烯烃alkoxy n. 烷氧基alkyl n. 烷基alkyl halide n. 烷基卤, 卤烷alkylation n. 烃化, 烷基化alkylbenzene烷基苯alkyne 炔烃alphabetic adj. 依字母顺序aluminum n. 铝ambient a. 周围的amide n. 酰胺amine n. 胺amino acid n. 氨基酸aminoethane n. 乙胺amino n. 氨基ammonia n. 氨水ammonium n. 铵,铵盐amorphous adj. 无定形amplitude n. 广大,充足,振幅analogue n. 类似物anhydride n. 酸酐aniline n. 苯胺anion n. 阴离子anti- 对位交叉,反式antibiotics n. 抗菌素antifreezing agent n. 抗冻剂antiknock n; a. 防爆(的),抗爆(的)antioxidant n. 抗氧剂apparatus n. 设备aqueous a. 水的arene n. 芳烃argon n. 氩aromatic a. 芳香烃的aromatic adj. 芳香的aromatization n. 芳构化arrangement n. 排列方式arsenic n. 砷, a. 含砷的aryl n. 芳基assimilate vt. 吸收, vi. 被吸收,同化asymmetric synthesis 不对称合成atomism n. 原子学说azeotrope n.共沸物azo dye n. 偶氮染料Bbackup n. /adj 备用设备bacterium 细菌barium n. 钡base n. 碱, 基, 底bathochromic shift红移beaker n. 烧杯benzene n. 苯benzoic acid安息香酸、苯甲酸benzoyl n.苯甲酰berkelium n. 锫bicarbonate n. 重碳酸盐,碳酸氢盐binary a. 二元的biological degradation n. 生物降解biosynthesis vt. 生物合成biphenyl n.联苯bleach vt. 漂白bond n. 键boron n. 硼branched chain n. 支链brewage n.(酒)酿造,饮料调制brine n.盐水bromine n. 溴buffer n. 缓冲,缓冲剂butadiene n. 丁二烯butane n.丁烷butene n.丁烯byproduct n. 副产物Ccalcium n. 钙caloric n. 热(量),热质a. 热(量)的,卡的capillary n. 毛细管carbanion n. 碳阴离子carbene n. 碳烯, 卡宾carbide n. 碳化物, 碳化钙carbocation n. 正碳离子, 阳碳离子carbon tetrachloride n. 四氯化碳carbonate n. 碳酸盐carbonyl group n. 羰基carboxy group n. 羧基carboxylate n. 羰化物carboxylic a. 羧酸的carboxylic acid n. 羧酸carcinogen n. 致癌的carrier n. 载体catabolism n. 分解代谢,降解代谢catalysis n. 催化(作用)catalyst n. 催化剂,刺激(或促进)因素catalyze vt. 催化category n. 种类cation n. 阳离子caustic soda 苛性钠(NaOH)caustic potash 苛性钾(KOH)cellulose n. 纤维素chain-initiating 链增长chemical shift n. 化学位移chiral a.手性的chloride n.氯化物chlorine n.氯chloroform n. 氯仿chlorohydrocarbon n. 氯代烃cholesterol n. 胆固醇chromatography n. 色谱法chromophore n. 发色团cis-trans isomer n. 顺反异构体citric acid n. 柠檬酸clarification n. 澄清,净化classic adj. 经典的, 传统的cleave v. 劈开,分裂coefficient n. 系数coexistence n. 共存,共处coherent adj. 黏附的,相干的(光学) coil n. 蛇管colorant n. 颜料,着色剂combust v. 燃烧commodity n. 日用品compensation n. 补偿competitive n. 竞争的complementary a. 补充的complex n. 络合物complication n. 复杂component n. 组分concentration n. 浓度concerted reaction n. 协同反应condensation n. 冷凝condensation n. 缩合反应condiment n. 调味品configuration n. 轮廓,构成conformation n. 构象congruent a. 和谐的,一致的,全等的conjugation n. 共轭construction n. 建设, 建筑container n. 容器contaminant n. 沾染物conversely ad. 相反地converter n. 转化器cooler n. 冷却器coordinate n.配位,配价,坐标coprous a. 亚铜的corporate adj. 共同的corrosion n.腐蚀cosmetic n. 化妆品coupling constant 偶合常数coupling reaction n. 偶合反应covalent bond n. 共价键criteria n. 标准critical adj. 临界的crucial a. 至关重要的customary adj. 通常的, 常例的cyanide n. 氰化物cyano n. 氰,氰基cycloalkane n. 环烷烃cylinder n. 圆柱体Ddeactivate vt.使不活动decentralize v. 使分散,划分decolorant n. 脱色剂decolorize v. 脱色decouple n./v. 分开,去偶合装置deflect v. 歪斜,使偏向degradation n.降解dehydration n. 脱水作用dehydrogenation n. 脱氢作用delocalization n. 离域作用demolish vt. 拆除,毁坏denominator n. 分母denote v. 指示,表示,意味着depletion n. 削减,消耗deposit vt.(使)沉淀,安置derivation n. 衍生,由来derivative a. 派生的derivative n. 衍生物desolvation n. 去溶剂化作用desorption n. 解吸作用destructive a. 破坏(的),危害的destructive distillation 分解蒸馏detectable a.能发觉的,detector n. 检测器detergent n. 洗涤剂deuterium n. 重氢developer n. 显影剂dextrorotary adj. 右旋的diastereoisomer 非对应异构体diatomic a. 二原子的,二价的,diazonium salt n. 重氮盐diazotization n. 重氮化作用dicarboxylic a.二元羧酸的diene n.二烯(烃)diffuse a.散开的,弥散的,v.扩散,散播dilute solution 稀溶液diol n.二醇,二酚dioxide n.二氧化物dipole n. 偶极director n. 定位基discipline n.学科disclose vt. 揭露, 揭发discriminate v.区别,辨别,有差别地对待disinfection n.消毒displacement n. 换置,移位,移动,取代disposal vt. 排出, 处理disrupt vt.(使)破裂,使中断dissociate vt.使分离,将…分开dissociation energy 离解能dissolve v.溶解distill vt.用蒸馏法提取,蒸馏distillate n.馏出物,馏出液distillation n. 蒸馏disubstitute a.二取代的disulfate n.硫酸氢盐,焦硫酸盐donor n. 给体downfield n.低磁场drastic n. 激烈的, 猛烈的driving force 推动力droplet n. 液滴dyestuff n. 染料dynamite n. 炸药E.ecosystem n. 生态系统electric potential 电势electrode n.电极electrolyse vt. 电解electromagnetic a. 电磁的,由电磁石产生的electron donor 电子给予体electron acceptor 电子接受体electron withdrawing group n. 吸电子基electronegativity n. 电负性electron-withdrawing a. 推电子的electrophilic reagent n. 亲电试剂electrophobic adj 疏电子的electropositive a. 电正性的electrostatic adj. 静电的elevation n. 升高elimination n. 消除反应eluent n. 洗脱液emission n. 发光emitter n. 发射器;发光体empirically ad. 经验主义地emulsion n. 乳剂enantiomer n. 对映体enantiomeric excess 对映体过量endogenous a. 内存的endothermic adj. 吸热的energetic a. 有精力的,精力旺盛的enhance vt. 提高,增加enzyme n. 酶epoxy adj. 环氧化的equation n. 等式,方程式,相等,均衡equilibrate vt. (使)平衡,(使)均衡equimolar a. 当量克分子的,克分子数相等的essential oil n. (香)精油ester n. 酯esterification n. 酯化ethane n. 乙烷ethanol n. 乙醇ethanolamine n. 乙醇胺ethanoyl n. 乙酰基ether n. 醚, 乙醚ethyl n. 乙基ethylene n. 乙烯ethylenediamine 乙二胺ethyne 乙炔ethynyl n. 乙炔基evaporation n. 蒸发excitation n. 激发态exothermic adj. 放热的exponent n. 幂,指数extraction n. 萃取,提取,摘要extrapolation n. 推断Ffabric n. 编织物facilitate v. 使容易,使便利,推进fermentation n. 发酵ferric a. 铁的ferrous a. 亚铁的fiber n. 纤维filament n. 丝状体,单纤维filter n. 过滤器,滤色片fixed-bed 固定床flammabilit n. . 可燃性flare v. & n. 闪耀, 闪烁flash distillation 闪蒸flavoring n. 香剂, 调味剂flexibility n. 柔韧性,弹性,折射性,灵活性flocculate n. 絮凝物fluorescence n. 萤光,发荧光,荧光性fluorine n. 氟fluoromethane n. 氟代甲烷fluorspar n. 萤石,氟石focus on 聚焦于,集中(注意力)于formaldehyde n. 甲醛formic a. 蚁的,蚁酸的formula n. 公式,程式,处方fossil n. 化石fraction n. 小部分,片段,馏分,级分fractional distillation n. 分馏fractionating column 分馏柱fragmentation n. 分裂,碎片free radical n. 自由基froth n. 泡沫,起泡,v. 使(啤酒)起泡fructose n.果糖,左旋糖fullerence n. 富勒烯functional group n. 官能团furan n. 呋喃Ggalactose n. 半乳糖gasifier n. 汽化器,煤气发生器gene n. 基因,遗传因子generalization n. 一般(性), 普遍(性) glacial acetic acid n. 冰醋酸glucerol n. 丙三醇,甘油glucose n. 葡萄糖glycerol n. 甘油, 丙三醇gold n. 金graphics n. 图,制图法graphite n. 石墨grease n. 动物脂ground state基态H.halide n. 卤化物halogen n. 卤素halogenating reaction卤代反应helium n. 氦heptane n. 庚烷herbicide n. 除草剂heterocyclic compound n.杂环化合物heterogeneous adj. 非均相的, 多相的,异相的hexaaqua a. 六合水的hexadiene n. 已二烯hexagon n. 六边形hexane n. 已烷hold-up n. 塔储量, 容纳量homogeneous catalysis均相催化homologue n. 同系物horizontal a. 水平的hormone n. 激素humectant n. 润湿剂hybrid n. 杂化hydration n. 水合作用hydride n. 氢化物hydrogen n. 氢hydrocarbon n.烃类hydrogen halide n. 氢卤化物hydrogenation n. 氢化作用hydrolysis n. 水解hydrophilic a. 亲水的hydrophobic adj. 疏水的hydroxide n. 氢氧化物hydroxyl group n. 羟基hydroxylation n. 羟基化hypochlorite n. 次氯酸盐I.identical a. 同一的n. 一样,相等ill-defined a. 不清楚的,不确切定义的immerse vt. 沉浸,使浸入immiscible a. 不混溶性impetus n. 推动力,动力,推动impurity n. 杂质,混杂物,不纯in vitro 在试管内in vivo 在体内inactivate vt. 钝化,使减少活性incorporate v.结合,合并indicator n. 指示剂indigestion n. 消化不良indiscriminate adj. 不加选择的indivisible a.不可分割的,不可分裂的indol n. 吲哚inductive effect n. 诱导效应ineffective adj. 无效的, 低效率的inert a.惰性的,不活泼的infectious disease 传染病infrared spectroscopy n. 红外光谱ingestion n. 吸收, 吸入inherently ad. 天生的,本质的inhibitor n. 禁止剂,抑制剂,抑制因素inhomogeneity n. 不同族,不同质inlet n. 进口, 入口inorganic a. 无机的,无生物的insecticide n. 杀虫剂insertion n. 插入,插入物insoluble a. 不溶的insulin n. 胰岛素integrate vt. 积分,使...一体化interface n. 界面,分界面,接触面intermediate n. 中间体intermittent a. 断续的,间歇的intriguing a. 吸引人的,有趣的intrinsic a. 本质的,固有的,内在的,体内的intuitive a. 直观的,直觉的iodic a. 含碘的iodide n. 碘化物iodine n. 碘ion n. 离子ion-exchange chromatography 离子交换色谱ionic a. 离子的irradiate vt. 使明亮,照耀irreversible a. 不可逆isoelectric point n. 等电点isomer n. 异构体isomeric a. 同分异构的,同质异能的isopropane n.异丙烷isopropanol n. 异丙醇isothermally ad.等温的isotope n. 同位素Jjacket n. 套, 夹套Kkerosene n. 煤油ketone n. 酮kinetics n. 动力学Llabile a. 不安定的,不稳定的lactic acid n. 乳酸ligand n. 配位lipid n.类脂(化合物)liquefy vt. 液化lithium n. 锂litmus n. 石蕊longitude n. 经线,经度lubricant n. 润滑剂,润滑的lubricating grease n. 润滑脂Mmacromolecule n. 大分子magnesium n. 镁makeup n. 组成,构造,化妆品malonic n. 丙二酸maltose n. 麦芽糖mamganese n. 锰manipulation n. 操作, 操纵mass spectroscopy n. 质谱mass-to-charge 质荷比matrix n. 基质;矩阵mechanism n. 机理, 历程medium n. 介质, 培养基mercury n. 水银,汞mesophase n. 中间相meta-间位-metabolic a.变化的,变形的,新陈代谢metabolism n.代谢作用,新陈代谢metastable a. 亚稳的methane n. 甲烷methanol n. 甲醇methnol n. 甲醇micelle n. 胶粒microbe n. 细菌,微生物microenvironment n. 小环境micron n. 微米microporous a. 多孔的microsecond n. 微秒milligram n. 毫克mingle v. 使混合,混合起来minimize v. 使减少到最小,降到最低miscible adj. 可溶混的modification n. 修饰modulation n. 调整molal a. 摩尔的molar extinction coefficient摩尔消光系数molecular a.分子的monochrome n. 单色器,单色仪monograph n. 专题论文monomer n. 单体monoxide n. 一氧化物multiplicity n. 多重性multitude n. 众多,大量,大群,大众Nnanometer n. 纳米(nm)naphthalene n. 萘naphthene n. 脂环烃neon n. 氖neopentane n. 新戊烷neutralization reaction中和反应neutron n. 中子nitrate n. 硝酸盐nitration n. 硝化作用nitric acid n. 硝酸nitric oxide n. 氮氧化物nitrile n. 腈nitrite n. 亚硝酸盐nitroglycerine n. 硝化甘油noble gas n. 稀有气体nomenclature n.命名系统nondestructive a. 非破坏性的nonvolatile a. 非挥发性的nucleophile n. 亲核试剂numerical a.数字的,用数字表示的,数值的nutrient n. 营养素, 养分nylon n. 尼龙octadecyl n. 十八(烷)基octahedral a. 八面体的octane number n. 辛烷值olefin 石蜡、烯烃optical activity n. 旋光性optical isomerisem resolution 光学异构体拆分optics n. 光学optimization n. 最优化,最佳化optimum n. 最佳条件orbital a. 轨道的organometallic compound 金属有机化合物ortho- 邻,正,原,直oscillation n. 振动,动摇,变动outermost adj. 最外层的,远离中心的oxalic a.草酸的oxidation n. 氧化作用oxidation number n. 氧化数oxide n. 氧化物oxoanion n. 含氧阴离子oxonium n. 氧鎓oxyanion n. 氧离子ozone n. 臭氧,新鲜空气Ppara- 对位paraffin n. 链烷烃, 石蜡parameter n. 参(变)数,参(变)量,因素,特征penetration n. 穿入,渗透,洞察力pentane n.戊烷pentoxide n. 五氧化物peptide n. 肽perchlorate n. 高氯酸盐perforate v. 穿孔,渗透,有孔的,穿孔的perfume n. 香料periodic a. 周期的,定期的高氯酸盐Periodic Table周期表peroxidation n. 过氧化反应peroxide n. 过氧化合物pesticide n. 杀虫剂petroleum 石油pharmaceutical a. 药学的pharmaceuticals n. 药物pharmacy n. 药房,药学,配药,制药phenol n. 苯酚phenoxide n. (苯)酚盐phenyl n. 苯基phenylsulfonic acid n. 苯磺酸phosphoric acid n. 磷酸phosphorus n. 磷,磷光体,发光物质photochemical reaction n. 光化学反应photochromism n. 光致变色photoconductivity n. 光电导性photon n. 光子pigment n. 颜料polar a. 极性的,两个相反方向的polarization n. 极化作用pollutant n.污染物,污染源polyamide n. 聚酰胺polycrystalline a. 多晶的polyene a. 多烯的polyhalogen n. 多卤素polyhedra [polyhedron的复数]形式n. 多面体polyhydric alcohol n. 多元醇polymer n. 聚合物polymerization n. 聚合作用potassium n. 钾potassium dichromate 重铬酸钾potassium permanganate 高锰酸钾precipitate vi. /n. 沉淀preservative a. 有保护力的,防腐的n. 防腐剂,防腐料primary a. 最初的,伯-probe n. 探针,探测品v. 探查,穿刺prolong vt. 延长, 拖延prominent a. 突起的,著名的,突出的promote vt. 促进,发扬,提升,发起propanal n. 丙醛propellant n. 推进剂propene n. 丙稀proportional a. 比例的,相称的propyne n. 丙炔prospective adj. 预期的, 有希望的protecting group n. 保护基proton n.质子protonation n.质子化,质子化作用purity n. 纯度putrefaction 腐败物pyridine n.吡啶pyrolysis n. 热解pyrrole n. 吡咯quadrupole n./a. 四极(的)qualitative a. 定性的quantify vt. 使量化,确定数量quantitative a. 数量的,定量的quantum n. 量子quaternary ammonium salt n. 季铵盐quench vt. 淬灭quinoline n. 喹啉Rracemic a. 消旋的racemization n. 外消旋作用radialization n. 辐射,放射radius n. 半径random a. 随机的,随意的,随机,随意reactant n. 反应物reactor n. 反应器reagent n. 反应试剂realization n. 实现rearrange vt/vi 重排recipe n. 配方,食谱,方法recover vt. 回收recrystallization n. 重结晶rectification n. 精馏,纠正rectifier n. 精馏器reduction n. 还原(作用) refabrication n. 重组,重新安排reflux n. 回流refractive a. 折射的,有折射力的,屈折的refrigerant n. 冷冻剂regenerability n. 再生能力remainder n. 剩余物, 残余部分的reoxidation n. 再氧化replica n. 复制品,拷贝repulsive a. 排斥的residual a. 残余的,剩余的resolution n. 分辨, 拆开resonance n. 共振respiration n. 呼吸作用,生物的氧化作用response n. 响应restrictive adj. 限制性的reversibility n. 可反转性,可逆性rigorous adj. 严厉(格)的rotation n. 转动rudimentary a. 根本的,初期的,发育不健ruthenium n. 钌Ssaccharin n. 糖精saponification n. 皂化(作用) schematically ad. 图解地,扼要地screen n. 筛子, 屏幕seal n. 密封(垫) segment n. 部分, 链段selectivity n. 选择性sensitivity n. 敏感性,灵敏性separation coefficient 分离系数sequester v. 隔绝settle vt. (使)沉淀, 澄清setup vt. 装置, 装配sewage n. 污水,污物,污水处理sewage n. 污水silica n. 氧化硅,硅土silica gel n. 硅胶silicon n. 硅silver n.银singlet n. 单重峰skeleton n. 骨架sodium hypochlorite 次氯酸钠solubility n. 溶解度solvant n. 溶剂化物solvent effects 溶剂效应solvent n. 溶剂, 有溶解力的spectroscopy n. 光谱spin-spin coupling n. 自旋-自旋偶合spontaneously ad. 自发地spray n. 喷雾,飞沫,v. 喷,喷射stabilization n. 稳定作用stepwise a. 逐步的stereoisomerism n. 立体异构现象steric factors n. 位阻因素, 空间因素still pot n. 蒸馏釜stoichiometric adj. 化学计算的substantial a. 物质的,坚固的,大量的substituent n. 取代基substitution reaction n. 取代反应subtract v. 减去,减掉,扣除succcinc n. 琥珀,丁二酸的,琥珀酸的sulfa drug n. 磺胺药sulfate n. 硫酸盐用硫酸处理sulfite n. 亚硫酸盐sulfonation n. 磺化作用sulfur n. 硫磺,v. 用硫磺处理sulfuric acid n. 硫酸supersaturation n. 过饱和(现象)supervisor n. 导师, 监督人, 主管人surfactant n. 表面活性剂suspension n. 悬浮液sweetener n. 增甜剂symmetry n. 对称性symposium n. 座谈会syn addition n. 顺式加成synchrotron n. 同步加速器synthesize v. 合成Ttar n. 焦油(沥青)tartaric acid n. 酒石酸tautomerism n. 互变异构现象template n. (切金属、石、木等用的)样板,模板terminology n. 术语terpene n. 萜烯tertiary adj. 叔的, 第三的tetrahedron n. 四面体theorem n. 定理,原则thermal a. 热量的温度的,热的thermal conductivity 热导性thermochemistry n. 热化学thermodynamics n. 热力学thiazole n. 噻唑thionyl n. 亚硫酰thiophene n. 噻吩thiophenol n. 硫酚titrant n. 滴定管titration n. 滴定方法toluene n. 甲苯torr n. 托(压力单位)toxic a. 有毒的toxicity n. 毒性transesterification n. 酯交换反应transition 跃迁transition state n. 过渡状态treatise n. 论文,论述tricarboxylic a. 三羧酸的trichloroethylene n. 三氯乙烯triene n. 三烯triplet n. 三重峰tubular reactor 管式反应器turbid a. 浑浊的,不清的Uultraviolet-visible spectroscopy n. 紫外-可见光谱unambiguous a. 不含糊的,明确的unconjugate a. 未共轭的unify vt. 统一unimolecular a. 单分子的univalent a. 一价的upfield n. 高磁场urea n. 尿素Vvaccine 疫苗valence n.(化合)价,原子价vaporize vt.(使)蒸发,(使)汽化vent v. 发泄(情绪),开孔n. 孔,口ventilation n. 通风,公开讨论,通风设备versatile a. 通用的,多才多艺的,反复无常的vibration n. 振动,摆动,颤动vibronic a. 电子振动的vice versa adj. 反之也然vinyl n. 乙烯基vinyl chloride n. 氯乙烯violate vt. 破坏,侵害viscosity index n. 黏度系数volatility n. 挥发度volumetric a. 测容量的,的容量Wwavelength n. 波长wavenumber n. 波数well-defined a. 定义明确的,清晰的withdraw vt. 拉, 提取, 取出withdrawal n. 收回,撤回Xxerography n. 静电复印法Yyeast n. 酵母Zzeolite n. 沸石zinc n.鋅zirconia n. 氧化锆。

我懂得了肩负着责任英文作文

我懂得了肩负着责任英文作文

我懂得了肩负着责任英文作文回答例子1:Title: Embracing Responsibility: A Journey of Self-DiscoveryIn the course of our lives, we often find ourselves confronted with the weight of responsibility. Whether it be in our personal relationships, academic pursuits, or professional endeavors, the notion of shouldering responsibility is an ever-present reality. It is through navigating these experiences that we come to understand the profound significance of responsibility and the transformative impact it has on our lives.For me, the realization of the importance of responsibility dawned gradually, unfolding through various stages of my life. As a child, responsibility was often equated with chores and obligations assigned by parents and teachers. These tasks, though mundane at the time, laid the foundation for a deeper understanding of accountability and commitment.As I transitioned into adolescence, the concept ofresponsibility took on new dimensions. I found myself entrusted with greater autonomy and decision-making authority. Whether it was managing my academics, extracurricular activities, or personal relationships, I began to recognize the direct correlation between accountability and success. Through trial and error, I learned that with autonomy comes the responsibility to make informed choices and accept the consequences that follow.However, it was not until adulthood that I truly grasped the profound significance of shouldering responsibility. In the professional realm, I found myself thrust into positions of leadership where the decisions I made held far-reaching implications. The weight of responsibility was palpable, as I was accountable not only for my own actions but also for the well-being of those under my guidance. It was during this time that I came to understand that responsibility is not merely a burden to be borne but a privilege to enact positive change and make meaningful contributions to the world around us.Beyond the professional sphere, the concept of responsibility permeated every facet of my life. In my personalrelationships, I learned that true intimacy and trust are built upon a foundation of reliability and accountability. Whether it was supporting loved ones through difficult times or honoring commitments made to friends and family, I realized that responsibility is the cornerstone of meaningful connections and mutual respect.Moreover, as a member of society, I recognized my obligation to contribute positively to the collective welfare of humanity. Whether it be through volunteer work, advocacy efforts, or simply living in accordance with ethical principles, I understood that each of us has a responsibility to leave the world a better place than we found it.Through embracing responsibility, I have come to understand that it is not merely a duty imposed upon us by external forces, but a fundamental aspect of our humanity. It is through accepting responsibility that we affirm our agency in shaping the course of our lives and influencing the world around us. It is a journey of self-discovery, requiring introspection, humility, and a willingness to learn from both successes and failures.In conclusion, the journey of embracing responsibility is a transformative odyssey that shapes our character, defines our relationships, and empowers us to effect positive change in the world. As we navigate the complexities of life, let us remember that with great responsibility comes great opportunity—to lead with integrity, to serve with compassion, and to leave a legacy of which we can be proud.回答例子2:Title: Understanding the Burden of ResponsibilityIntroduction:In life, we all come across situations where we are required to shoulder responsibilities. Whether it is in our personal relationships, academics, or professional life, understanding the importance of taking responsibility is crucial. In this essay, I will share my personal experiences and insights on how I have come to understand the burden of responsibility.Body:1. Personal Relationships:Taking responsibility in personal relationships is essential for maintaining healthy connections. I have learned that being accountable for my actions and words helps in building trust and respect. For instance, in a friendship, I have realized that being there for my friends during their difficult times and celebrating their successes is my responsibility. It is important to be reliable, dependable, and supportive in order to maintain strong bonds.2. Academic Responsibilities:As a student, I have come to understand the significance of fulfilling my academic responsibilities. Meeting deadlines, completing assignments, and studying diligently are all part of being responsible academically. Taking responsibility for my own learning not only helps me achieve better grades but also prepares me for future challenges. I have learned that being accountable for my education is crucial for personal growth and success.3. Professional Responsibilities:In the professional world, shouldering responsibility is of utmost importance. Being accountable for my work andactions helps in building a positive reputation. I have realized that meeting deadlines, completing tasks efficiently, and taking ownership of my work are essential for career advancement. Taking responsibility in my professional life not only reflects positively on me but also contributes to the success of the organization I work for.4. Social Responsibilities:Understanding the burden of responsibility extends beyond personal and professional realms. I have come to realize the importance of being responsible towards society as well. Contributing positively to the community, practicing good ethics, and being environmentally conscious are all part of social responsibility. I have learned that even small acts, such as volunteering or recycling, can make a significant impact on the well-being of society.5. Emotional Responsibilities:Taking responsibility for my own emotions and actions is crucial for personal growth and well-being. I have learned that blaming others for my own shortcomings or failures only hinders my progress. Accepting responsibility for my emotionsallows me to take control and make positive changes in my life.I have realized that by being accountable for my own happiness and emotional well-being, I can lead a more fulfilling life.Conclusion:Understanding the burden of responsibility is an essential aspect of personal growth and development. Whether it is in personal relationships, academics, professional life, or society, taking responsibility allows us to create positive change and achieve success. Through my own experiences, I have come to appreciate the importance of shouldering responsibilities and the impact it has on my life and the lives of those around me. It is through responsibility that we can truly make a difference and contribute positively to the world.。

地缘冲突 合成生物学

地缘冲突 合成生物学

地缘冲突合成生物学英文回答:Geopolitical conflicts have been a recurring theme throughout history. These conflicts arise from the competition for resources, power, and influence between different nations or groups. They can manifest in various forms, such as territorial disputes, ideological differences, or economic rivalries.One example of a geopolitical conflict is the ongoing tension between China and Taiwan. The two entities have different political systems and have been engaged in along-standing dispute over the sovereignty of Taiwan. This conflict has led to military posturing, economic sanctions, and diplomatic isolation.Another example is the conflict between Israel and Palestine. This conflict has its roots in historical, religious, and territorial disputes. The two sides havebeen engaged in a protracted struggle for control over land, resources, and political power. The conflict has resultedin numerous wars, terrorist attacks, and human rights abuses.Geopolitical conflicts can also be fueled by competing interests in strategic regions. For instance, the United States and Russia have been involved in a power struggle in the Middle East. Both countries have vested interests inthe region's oil resources, as well as geopolitical influence. This has led to proxy wars, military interventions, and diplomatic maneuvering.Synthetic biology, on the other hand, is a relatively new field that combines biology, genetics, and engineeringto create new biological systems or modify existing ones.It holds great potential for various applications, such as healthcare, agriculture, and environmental sustainability.One example of synthetic biology is the development of genetically modified organisms (GMOs) in agriculture. Scientists have used synthetic biology techniques toenhance crop yields, improve resistance to pests and diseases, and increase nutritional value. However, the use of GMOs has also sparked controversies and debates about their safety, ethics, and potential impact on ecosystems.Another example is the development of syntheticbiology-based therapeutics. Scientists have engineered bacteria to produce therapeutic proteins or drugs, which can be used to treat various diseases. This approach has the potential to revolutionize medicine and provide more targeted and personalized treatments. However, it also raises concerns about the potential misuse of such technologies and the need for strict regulations.In conclusion, geopolitical conflicts arise from the competition for resources, power, and influence between nations or groups. They can manifest in various forms and have significant consequences for global stability and security. On the other hand, synthetic biology offers new possibilities for scientific advancements and technological innovations. However, it also raises ethical, safety, and regulatory challenges. Both topics have far-reachingimplications and require careful consideration and dialogue.中文回答:地缘冲突是历史上一直存在的主题。

内侧杏仁核通过不同通路调控“趋向”和“回避”行为

内侧杏仁核通过不同通路调控“趋向”和“回避”行为

・380•生理科学进展2019年第50卷第5期22Proft J,Rzhepetskyy Y,Lazniewska J,et al.The Cacnalh mutation in the GAERS model of absence epilepsy enhances T-type Ca(2+)currents by altering calnexin-dependent trafficking of Cav3.2channels.Sci Rep,2017,7:11513. 23Ihara Y,Tomonoh Y,Deshimaru M,et al.Retigabine,a Kv7.2/Kv7.3-channel opener,attenuates drug-induced sei­zures in knock-in mice harboring kcnq2mutations.PLoS One,2016,11:e0150095.24Simeone KA,Hallgren J,Bockman CS,et al.Respiratory dysfunction progresses with age in Kenai-null mice,a mod­el of sudden unexpected death in epilepsy.Epilepsia, 2018,59:345-357.25Smith GD,Gao N,Lugo JN.Kv4.2knockout mice display learning and memory deficits in the Lashley maze.FlOOORes,2016,5:2456.26Arain FM,Boyd KL,Gallagher MJ.Decreased viability and absence-like epilepsy in mice lacking or deficient inthe GABAA receptor alpha1subunit.Epilepsia,2012, 53:el61〜el65.27Lee V,Sarkar J,Maguire J.Loss of Gabrd in CRH neurons blunts the corticosterone response to stress and diminishes stress-related behaviors.Psychoneuroendocrinology,2014, 41:75~88.28Wilking JA,Hesterberg KG,Crouch EL,et al.Chma4 A529knock-in mice exhibit altered nicotine sensitivity.Pharmacogenet Genomics,2010,20:121~130.29Boumil RM,Letts VA,Roberts MC,et al.A missense mutation in a highly conserved alternate exon of dynamin-1 causes epilepsy in fitful mice.PLoS Genet,2010,6:el001046.30Kehrl JM,Sahaya K,Dalton HM,et al.Gain-of-function mutation in Gnaol:a murine model of epileptiform enceph­alopathy(EIEE17)?Mamm Genome,2014,25:202〜210.内侧杏仁核通过不同通路调控“趋向”和“回避”行为俗话讲“每个人的内心都住着两个自我”。

英汉对照法医学辞典G-K

英汉对照法医学辞典G-K

G gait identification 步法鉴定 garrotting 绞死 gas poisoning 煤⽓中毒 gene 基因 geriatric medicine gigantic feature caused by putrefaction 巨⼈观 bloated cadaver gradated evaluation of trauma 〖拉〗损伤程度评定 graphology 笔迹学 grave wax ⼫蜡 adipocere graze 擦痕 grease collar 污垢轮 abrasion collar greater horn of hyoid ⾆⾻⼤⾓ greenish discoloration on cadaver ⼫绿体腐败征象。

在体表⾸先见到的是右下腹部、右季肋部和⿏蹊部⽪肤出现的绿⾊斑块。

griveous bodily harm 重伤 grouping of blood stain ⾎痕⾎型确定 gunshot trauma 射击伤 H bullet wound gunshot wound 枪弹伤 habit-forming 成瘾,习癖形成 handbook for postmortem examination of undetermined remains ⽆名⼫体遗骸检验⼿册 handformula 处⽅ handicap 残障 handwriting examination 笔迹检验 hanging 吊死 head injury 头部损伤/颅脑损伤 heart death ⼼脏死⼼脏先于呼吸停⽌所引起的死亡。

heart injury ⼼脏损伤 heat fracture 热作⽤⾻折 hematoma ⾎肿 hemorrhage 出⾎ heroin poisoning 海洛因中毒 hesitation 裂创 laceration hesitation mark 试切创在致命伤的附近,有数条长短不⼀、深浅不等的平⾏创⼝称为试切创,仅见于⾃杀。

高欢 中文翻译资料

高欢 中文翻译资料

英文翻译系别自动化系专业自动化班级 191101 学生姓名高欢学号 114393 指导教师赵静设计粗糙模糊pi控制整流器宁波生产职业技术学院、宁波、浙江315175年,中国QYD310@ 文摘在本文中,我们研究的应用模糊集理论、遗传算法和粗糙集理论技术的控制整流器。

模糊自适应控制方案借助粗糙集理论通过遗传算法(气)发现参数代替经典的控制中心。

一方面,遗传算法得到的最优参数准确的域模型,这曲调缩放因子的模糊自适应控制但不是建立在一个非线性系统。

另一方面,模糊自适应控制处理的反应动力学和复杂性整流器直流系统的操作点,通过调整其控制参数与粗糙的调谐器自适应的援助。

我们的研究包括简要介绍模糊控制和粗糙集算法,理论和应用程序。

我们也评估粗糙模糊控制的性能仿真。

我们的实验的重点是在整流侧的直流恒流控制系统。

结果表明有许多改进提供的基于粗糙集理论的模糊控制方案与唯一的模糊控制方案相比直流系统整流的一面。

1.介绍从一开始的电力历史,直流输电线路和电缆比那些更便宜和更有利的三相交流传播。

随着发电和需求在增加,为了权力处理大型散货,我们需要利用直流输电所提供的储蓄。

不仅用于长距离输电,也被用作交流网络的一部分来增强系统的稳定性。

但直流环节的操作和控制构成挑战的设计师在不同操作条件下选择适当的控制策略。

直流系统传统上使用PI控制器来控制直流电流从而保持当前的订单所需的水平。

然而,在控制非线性植物如火直流系统整流侧角,等模型控制模糊控制器显示更好的性能比传统PI控制器的动态干扰。

提出了一种新的方法来设计一个模糊PI控制申请成功地直流。

一般来说,系统自动控制器设计存在的问题,寻找合适的控制器结构和控制器参数对于一个给定的过程。

另外困难的是,控制器必须调整不仅仅是一个营业点,也为整个范围的操作点。

[1],[2]为了解决上面的问题,一种新的模糊自适应控制,介绍了粗糙集理论的援助计划。

介绍了粗糙集理论来处理困境。

由于粗糙集理论可以建立一个决策效用,接近控制工程师的知识如何调优系统的控制器,以改善其行为,粗糙集可用于设计一个自适应控制器。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Realization of Correlation Attack Against theFuzzy Vault SchemeAlisher Kholmatov and Berrin YanikogluFaculty of Engineering&Natural SciencesSabanci University,Istanbul,34956,TurkeyABSTRACTUser privacy and template security are major concerns in the use of biometric systems.These are serious concerns based on the fact that once compromised,biometric traits can not be canceled or reissued.The Fuzzy Vault scheme has emerged as a promising method to alleviate the template security problem.The scheme is based on binding the biometric template with a secret key and scrambling it with a large amount of redundant data,such that it is computationally infeasible to extract the secret key without possession of the biometric trait.It was recently claimed that the scheme is susceptible to correlation based attacks which assume the availability of two fuzzy vaults created using the same biometric data(e.g.two impressions of the samefingerprint)and suggests that correlating them would reveal the biometric data hidden inside.In this work,we implemented the fuzzy vault scheme usingfingerprints and performed correlation attacks against a database of400fuzzy vaults(200matching pairs).Given two matching vaults,we could successfully unlock59%of them within a short time.Furthermore,it was possible to link an unknown vault to a short list containing its matching pair,for41%of all vaults.These results prove the claim that the fuzzy vault scheme without additional security measures is indeed vulnerable to correlation attacks.Keywords:Fuzzy Vault,Template Protection,Biometrics,Privacy1.INTRODUCTIONWith increased security regulations and number of services provided using the Internet and other networked media,secure and privacy preserving authentication became an important issue.It is obvious that classical password or token-based authentication methods are not capable to provide security and convenience at the same time.For instance,it is difficult to remember a password complex enough to be secure and as a result people write down their passwords on unprotected media.Similarly,a secure token,such as a key or ID card, can be lost or broken.Biometric authentication is considered as one of the most promising methods to alleviate these problems,as it provides convenience(no need to remember anything,it can not be lost or stolen),high security and non-repudiation(not being able to deny involvement).However,there is increased concern over the loss of privacy and potential misuse of biometric data held in central repositories.Biometric data which can uniquely identify a person(e.g.fingerprints,iris patterns),can be used to track individuals by linking many separate databases (e.g.passport,police and health records).The association offingerprints with criminals raise further concerns forfingerprint databases in particular.For instance,latentfingerprints can be used to search for information about a person in a central database,if such databases are compromised.1,2Furthermore,biometric data may reveal certain health problems3or other discriminatory information,which also raises concern about possible discriminatory uses of central databases.Many suggestions have been made to provide increased template security.Ratha et al.suggested4and implemented5a framework of cancelable biometrics,where a biometric data undergoes the same predefined non-invertible distortion during both enrollment and verification phases.In that framework,distorted versions Further author information:Alisher Kholmatov:e-mail:alisher@,web:/∼alisherBerrin Yanikoglu:e-mail:berrin@,web:/berrinof a query biometric and the claimed identity’s template are matched during the authentication,and if the transformed biometric is compromised,then the user is re-enrolled to the system using a new transformation. Similarly,different applications are expected to use different transformations for the same user,to prevent linkage of different databases.Although this framework hides the original(undistorted)biometric and enables revocation of a(transformed)biometric,it introduces the challenge of management of transform databases and requires the registration of reference points.Yanikoglu and Kholmatov propose multi-biometric templates,6combining separate biometric features to obtain a non-unique identifier for the individual.As a particular example,they demonstrated afingerprint veri-fication system that uses two separatefingerprints of the same individual.A multi-biometric template composed of twofingerprints is stored in the central database and imprints from bothfingers are required in the verification process,lowering the risk of misuse and privacy loss.They show that searching the combinedfingerprint database using a singlefingerprint is impractical and the security is also increased using twofingerprints.Recently,Cam-likaya et al7applied this framework to voice andfingerprint biometrics,however it is not straightforward how to extend the framework to other combination schemes(possibly involving a cryptographic key)or to other biometric modalities.Jules et al proposed the fuzzy vault scheme,8which can be utilized to lock and release an encryption key using biometric data.The fuzzy vault is an example of recent work that focuses on combining cryptography and biometrics to take advantage of bothfields8–15:while biometrics provide non-repudiation and convenience, traditional cryptography provides adjustable levels of security and can be used not just for authentication,but also for encryption.While there are other important privacy preserving and/or biometric encryption frameworks such as the helper data architecture11,12the biohashing scheme9,10and the biometric encryption framework,14there is not much work studying vulnerabilities of such schemes.In this paper,we concentrate on one recent such work by Scheirer et al.16suggesting a number of attacks on the fuzzy vault and biometric encryption frameworks.In particular,we quantify the vulnerability of the fuzzy vault scheme against correlation attacks and show that it is indeed vulnerable to such attacks.2.RELATED WORKFuzzy VaultJules and Sudan proposed a scheme called fuzzy vault,8which they call an error tolerant encryption operation. Fuzzy vault scheme provides a framework to encrypt(”lock”)some secret value(eg.cryptographic key)using an unordered set of locking elements as a key,such that a person who possesses a substantial amount of the locking elements will be able to decrypt the secret.It is based on the difficulty of the polynomial reconstruction problem.The encoding and decoding are done as follows:Assume that Alice wants to secure her cryptographic key S(a random bit stream)using an arbitrary set of elements A.She selects a polynomial P(x)of degree D and encodes S into the polynomial’s coef-ficients.Encoding can be achieved by slicing S into non-overlapping bit chunks and then mapping these onto the coefficients.The mapping must be invertible meaning that the coefficients can be unambiguously mapped back to the corresponding bit chunks,which when concatenated will reconstruct the S.Then,Al-ice evaluates the polynomial at each element of her set A and stores these pairs/points into the set G,where G={(a1,P(a1)),(a2,P(a2)),...,(a N,P(a N))},a i∈A and|A|=N.Finally,she generates another random set of chaffpoints R such that none of the points(x,y)lie on the polynomial(i.e.y=P(x)).Finally,she merges the sets G and R to form the vault and makes the vault public.Note that within the vault,it is not known which points belong to G or R.The steps required to lock a secret in the Fuzzy Vault are illustrated in Fig.1.Now suppose that Bob has his own set of elements B and he wants tofind out(”unlock”)Alice’s secret locked in the vault.He will be able to do so only if his set B largely overlaps with Alice’s A,so as to identify a substantial number of the points that lie on the polynomial,from the vault.Given at least D+1such pairs, he applies one of the known polynomial reconstruction techniques(grange interpolating polynomial)to reconstruct the polynomial and extracts the secret S.Notice that if Bob does not know which of the points of the vault lie on the polynomial,it should be computationally infeasible for him to unlock the vault.Figure1.Vault Locking phase:(a)Create a polynomial by encoding the Secret as its coefficients.(b)Project elements a i of the locking set A onto the polynomial(c)Randomly create chaffpoints(represented by small black circles)and add to the vault.(d)Final appearance of the vault,as stored to the system database.Whereas perturbation of a single bit in a key of a classical cryptosystem(eg.AES,RSA)hinders decryption completely,the fuzzy vault allows for some minor differences between the encryption&decryption keys(here the unordered sets used to lock and unlock the vault).This fuzziness is necessary in the context of biometrics,since different measurements of the same biometric often result in different signals,due to noise in the measurement or non-linear distortions.Furthermore,it is also important that the scheme works with unordered elements,since it is difficult to establish a consistent ordering within the measured features for most of the biometric modalities. Despite its applicability to biometrics,it is not straightforward how to implement the fuzzy vault using biometric data,due to the difficulty of matching the template and query biometric signals(i.e.locking and unlocking sets, respectively)especially within the presence of random data(the chaffpoints).Fuzzy Vault Implementation Using FingerprintsUludag et al.17demonstrated thefirst implementation of the fuzzy vault scheme usingfingerprints,assuming pre-alignedfingerprints.Yang and Verbauwhede18also implemented the fuzzy vault withfingerprints,but they made the assumption that rotation&translation invariant features can be reliably extracted from minutiae, which is difficult in practice.Furthermore,they store reference minutia point along with the vault,which may leak some information.We will review the system by Uludag et al.as it relates the most to this work.In this work,minutia points of template and queryfingerprints are used as locking and unlocking sets,to lock a128-bit long data(S)which forms the cryptographic key.Specifically,the values obtained by concatenation of the corresponding x&y coordinates of minutiae points are used as set elements.To make sure that the desired S is unlocked from the vault through an error-prone process,cyclic redundancy check bits(16bits)are concatenated to S.Then,S,together with its check bits,is divided into non-overlapping chunks(16bits each), giving the coefficients of an8th degree polynomial.To lock the secret,template minutiae points are projected onto this polynomial and random chaffpoints not lying on the polynomial are added,to form the vault.Based on empirical estimations,they used18minutia points and200chaffpoints.To unlock the secret,i.e.reconstruct S,theyfirst match the query minutia set with the abscissa part of the vault and identify candidate points lying on the polynomial.Since D+1points are required to reconstruct apolynomial of degree D,all possible D+1point combinations of the candidate set are tried,tofind the one with the correct check bits.After reconstructing each of these polynomials,the coefficients and the check bits are found and S is said to be successfully unlocked when the check bits verify.Authors report a79%of correct reconstruction rate with0%false accept rate.To bypass the problem of matching the minutiae points and tofind an upperbound for the performance of the scheme,the authors used afingerprint database where minutia points and the correspondence between template and queryfingerprints were established by an expert.During the experiments,the minutiae sets of matingfingerprints were pre-aligned(i.e.rotated&translated)according to this established correspondence. Later on Kholmatov et al19implemented the fuzzy vault using an exhaustive matcher seeking the best alignment between the testfingerprint and the vault,while exploring all available rotation and translations.Uludag and Jain20later automated the matching between testfingerprint and vault,by extracting distinguishing points from fingerprint’s ridge curves and using these as a helper data for the alignment.Attacks on Fuzzy VaultScheirer et al.16suggests a number of attacks targeted on the the fuzzy vault scheme.They classify suggested at-tacks into3groups:i)attacks via record multiplicity,ii)stolen key-inversion attack,and iii)blended substitution attack.Attacks via record multiplicity assume that an attacker intercepts multiple enrollments/encodings which are created using the same biometric data(e.g.two fuzzy vaults created using imprints of the samefingerprint,but different chaffpoints).Scheirer et al.claimed that correlation of two such enrollments may reveal the biometric data encoded within each enrollment,suggesting that a correlation peak must occur at the point where biometric data of corresponding encodings overlap the most.Stolen key-inversion attack assumes that an attacker obtains a secret key which is released upon the presen-tation of a genuine biometric to a corresponding system.The attacker could obtain that key by means of social engineering or weak coupling between different modules of the system,etc.Then,the attacker may retrieve the biometric data from its corresponding encoding,by utilizing this key.In the case of fuzzy vault,it is a straightforward task to identify genuine&chaffpoints given the key(i.e.the polinomial coefficients)is known: Using the key,one would compute p(x)for each given x and verify which of the vault points(chaffor biometric) actually have the correct p(x),hence correspond to the biometric.Finally,the blended substitution attack considers the scenario where a malicious attacker injects his own data into someone’s template.After such injection,both genuine and malicious users will be positively authenticated against the same enrollment record.In the case of the fuzzy vault scheme,during the vault construction the attacker would insert his own minutiae points,possibly using his own secret(i.e.polynomial).When the attacker later presents hisfingerprint for the verification,the genuine user‘s minutiae points will act as chaffpoints and the attacker will get authenticated.While the implementation of this attack may not be straightforward,it is obvious that the fuzzy vault may be susceptible for this type of attack.In fact,Kholmatov et al.19exploited this additive property of the fuzzy vault scheme to implement a biometric based secret sharing.Scheirer et al.only suggested the aforementioned attacks,without providing any particular implementations. As the success of stolen key-inversion attacks against the fuzzy vault scheme is mostly obvious,the success of the other two attacks must be substantiated.In this work,we address this issue and empirically assess vulnerability of the fuzzy vault scheme against record multiplicity attacks.Note that recently Nandakumar et al21described and implemented a fuzzy vault which is hardened using passwords,to eliminate some of the weaknesses of the fuzzy vault scheme.Specifically,they construct the fuzzy vault after transforming(translation and rotation)thefingerprint minutiae,effectively eliminating correlation-based attacks.However,their scheme causes some increase in the False Reject Rate due to the matching being carried in the transformed space.Furthermore,considering the case where the password may be compromised, the vulnerability of the vault remains to be quantified.Figure2.Thisfigure depicts the alignments of two matching vaults,created using different impressions of the same fingerprint(on the left)and completely differentfingerprints(on the right).In eachfigure,crosses representfingerprint minutiae while dots identify chaffpoints of their corresponding vaults.In order to differentiate between two vaults,their corresponding minutiae and chaffpoints are colored by the same color(either red/lighter or black/darker).Additionally, all points within a certain distance of each other are considered as matching and are shown circled.3.IMPLEMENTATION OF CORRELATION BASED ATTACKSWe suggest to assess the feasibility of the correlation attack under three different scenarios:i)given two fuzzy vaults locked using the same biometric trait but different chaffpoints and different secrets(i.e.different poly-nomials),is it practically possible to reconstruct the secrets encoded in their corresponding vaults?ii)given a fuzzy vault belonging to an unknown person and a set of vaults linked to their corresponding identities,what is the success rate of correctly identifying the unknown person using the correlation attack?iii)given two sets of vaults,how likely is it to correctly link corresponding vaults in these sets?Note that the second scenario is a subtask of the third.We carried our experiments on the fuzzy vaults created using ourfingerprint-based fuzzy vault construction scheme.19Thefingerprint database used to construct the fuzzy vaults consists of400fingerprint images(2 different impressions for each of200differentfingers)acquired with an optical sensor and with manually labeled minutiae ing this database,we created a fuzzy vault from eachfingerprint(a total of200fuzzy vaults pairs).Each fuzzy vault is locked using different chaffpoints and different secrets(i.e.different polynomials). The number of chaffpoints added to each vault was200and the polynomial degree was set to8,as used in.17,19 Unlocking two matching fuzzy vaultsIn order to assess the feasibility of thefirst scenario,we matched each corresponding vault pair using exhaustive matching,seeking the best alignment between two vaults over all their relative rotations&translations.The best alignment is decided as the one which maximizes the number of matching points between the two vaults.Figure 2depicts alignments of two vaults created using the same(on the left)and different(on the right)fingerprints. As can be seen,genuine points align very well in vaults created using the samefingerprint,while that is not the case for non-matching vaults.Note that after alignment,we obtain matching minutiae points,as well as chaffpoints matching with other chaffpoints or minutiae points.The vault(s)can be unlocked if i)number of matching minutiae points(M)is sufficient to decode the polynomial of degree D(i.e.M≥D+1)and ii)the total number of matching points(N) is not too large with respect to M,so that the brute force attack(i.e.trying all possible combinations of D+1out of N points)to reconstruct the polynomial is computationally feasible.The expected number of attempts (A)to unlock one of the vaults can be formulated as follows:A=ND+1MD+1During our experiments,we observed that on average there are43matching points(i.e.N)between corre-sponding vaults,where22out of these points are minutiae points(i.e.M).Based on the above formulation, 1133attempts are required on average to reconstruct corresponding vaults and the whole process(exhaustive matching and decoding attempts)takes approximately50seconds for a non-optimized Matlab implementation on a PC with3GHz CPU and sufficient RAM.Notice that once we unlock one of the vaults,separating chaffand minutiae points is done,and unlocking the second vault is straightforward.Using this method,we could successfully reconstruct59%of the corresponding fuzzy vault pairs(i.e.118 out200)created using ourfingerprint database.This success rate is enough to conclude that the fuzzy vault is indeed vulnerable against such attacks.In order to increase the success rate,one could also try to use alignments where the number of matching points exceed certain threshold,instead of using only the best alignment. Correlating two databasesThe success rates of last two scenarios are assessed by matching each fuzzy vault with the rest of the available vaults(399matches for our database),to simulate the situation where one vault would be matched to all the vaults in a separate database.In matching one vault against all others,it is reasonable to expect that the alignment between the corre-sponding vaults(i.e.those created using different impressions of the samefingerprint)would result in the highest number of matching points(i.e.N),compared to alignments with non-matching vaults.We tried to validate this expectation and aligned each vault with all of the remaining vaults in the database and picked one with the highest number of matching points for decoding.This process returned the matching vault as the top-choice for 24%of all the vaults(96/400).When we considered top-10choices,the matching vault was found for41%of all the vaults.Since unlocking attempts for a vault takes a short time,an attacker who wants tofind a matching vault canfind the best aligned vaults and try to decode them all in turn,succeeding with a high probability in a reasonable time(50sec×10=8min,in the worst case for our implementation).These experiments support the claim that the fuzzy vault scheme without additional security enhancing measures such as the one suggested by Nandakumar et al,21is vulnerable to correlation attacks.4.SUMMARY AND CONCLUSIONThe fuzzy vault scheme emerged as a promising solution for preserving privacy in biometric based authentication systems.In this paper,we empirically assessed the vulnerability of the fuzzy vault scheme against correlation based attacks.We implemented the fuzzy vault scheme usingfingerprints and found that using a database of400fingerprint impressions,we were able to successfully unlock59%of the vaults created using different impressions of the same fingerprint.Additionally,we showed that for41%of all the cases,it was possible to link an unknown vault to a small set containing the matching vault.This results prove the claim that the fuzzy vaults scheme without additional security measures is vulnerable to such attacks.ACKNOWLEDGMENTSWe thank Erkay Savas and Albert Levi for useful discussions on this topic.This work is supported by T¨UB˙ITAK (The Scientific and Technical Research Council of Turkey),under project number105E165.REFERENCES1.G.Tomko,“Biometrics as a privacy-enhancing technology:Friend or foe of privacy?,”In Privacy Laws&Business9th Privacy Commissioners/Data Protection Authorities Workshop,1998.2.M.Crompton,“Biometrics and privacy:The end of the world as we know it or the white knight of privacy?,”in First Biometrics Institute Conference,2003.3.W.H.I.McLean,“Genetic disorders of palm skin and nail,”Journal of Anatomy202(1),pp.133–141,2003.4.N.K.Ratha,J.H.Connell,and R.M.Bolle,“Enhancing security and privacy in biometrics-based authen-tication systems,”IBM Syst.J.40(3),pp.614–634,2001.5.N.K.Ratha,S.Chikkerur,J.H.Connell,and R.M.Bolle,“Generating cancelablefingerprint templates,”IEEE Trans.Pattern Anal.Mach.Intell.29(4),pp.561–572,2007.6.B.Yanikoglu and A.Kholmatov,“Combining multiple biometrics to protect privacy,”in BCTP Workshopat Internatinal Conference on Pattern Recognition,August2004.7.E.Camlikaya,A.Kholmatov,and B.A.Yanikoglu,“Multimodal biometric templates for verification usingfingerprints and voice,”in Biometric Technology For Human Identification V,Proceedings of SPIE,16-20 March,2008.8.A.Juels and M.Sudan,“A fuzzy vault scheme,”IEEE International Symposium on Information Theory,p.408,2002.9.A.Teoh Beng Jin,K.Toh,and Y.Wai Kuan,“2ns discretisation of biophasor in cancellable biometrics,”inInternational Conference on Biometrics,2007.10.A.Teoh Beng Jin, D.Ngo Chek Ling,and A.Goh,“Biohashing:two factor authentication featuringfingerprint data and tokenised random number,”Pattern Recognition37(11),pp.2245–2255,2004.11.P.Tuyls,E.Verbitskiy,T.Ignatenko,D.Denteneer,and T.Akkermans,“Privacy protected biometrictemplates:Acoustic ear identification,”Proceedings of SPIE:Biometric Technology for Human Identification 5404,pp.176–182,2004.12.J.Linnartz and P.Tuyls,“New shielding functions to enhance privacy and prevent misuse of biometric tem-plates,”Proceeding of International Conference on Audio and Video Based Biometric Person Authentication (LNCS2688),pp.393–402,2003.13.G.Davida,Y.Frankel,and B.Matt,“On enabling secure applications through on-line biometric identifica-tion,”In IEEE Symposium on Privacy and Security,p.408,1998.14.C.Soutar,D.Roberge,A.Stoianov,R.Gilroy,and V.Kumar,Biometric Encryption,Chapter22of theICSA Guide to Cryptography,R.K.Nichols,McGraw-Hill,Ed.1999.15.C.Soutar,D.Roberge,S.Stojanov,R.Gilroy,and B.V.Kumar,“Biometric encryption using image process-ing,”In Proceedings of SPIE,Optical Security and Counterfeit Deterrence Techniques II3314,pp.178–188, 1998.16.W.J.Scheirer and T.E.Boult,“Cracking fuzzy vaults and biometric encryption,”in IEEE BiometricsResearch Symposium at the National Biometrics Consortium Conference,Sep.2007.17.U.Uludag,S.Pankanti,and A.Jain.,“Fuzzy vault forfingerprints,”Proceeding of International Conferenceon Audio and Video Based Biometric Person Authentication,pp.310–319,2005.18.S.Yang and I.Verbauwhede,“Secure fuzzy vault basedfingerprint verification system,”Signals,Systemsand Computers,2004.Conference Record of the Thirty-Eighth Asilomar Conference on,pp.577–581,2004.19.A.Kholmatov,B.A.Yanikoglu,E.Savas,and A.Levi,“Secret sharing using biometric traits,”in BiometricTechnology For Human Identification III,Proceedings of SPIE,6202,18April,2006.20.U.Uludag and A.K.Jain,“Securingfingerprint template:fuzzy vault with helper data,”in Proc.IEEEWorkshop on Privacy Research In Vision,June22,2006.21.K.Nandakumar,A.Nagar,and A.K.Jain,“Hardeningfingerprint fuzzy vault using password,”in Inter-national Conference on Biometrics,pp.927–937,2007.。

相关文档
最新文档