期刊文献+
共找到17篇文章
< 1 >
每页显示 20 50 100
Situated Learning as Legitimate Peripheral Participation 被引量:1
1
作者 ZHENG Chunxian 《Journal of Philosophy Study》 2020年第10期649-653,共5页
The theory of situated learning as legitimate peripheral participation(LPP)is widely applied in the educational field.But understandings of it are diversified so that quite a lot of these understandings in literature ... The theory of situated learning as legitimate peripheral participation(LPP)is widely applied in the educational field.But understandings of it are diversified so that quite a lot of these understandings in literature are not in conform to the spirit of the theory.Thus,drawing on literature review,this paper attempts to explicate the theory from three aspects:practical and philosophical base,the central ideas of the theory,and its difference from the cognitive learning theory,aiming to contribute to an easier understanding of it by readers and researchers. 展开更多
关键词 situated learning legitimate peripheral participation UNDERSTANDING
下载PDF
Research on the Judicial Application of Legitimate Defense in China
2
作者 Peng Xinlin Dang Heping 《学术界》 CSSCI 北大核心 2019年第4期190-204,共15页
Legitimate defense plays an important role in curbing crimes,maintaining public order and fostering good moral conduct.In China’s judicial practice,cases on legitimate defense raised several controversies on the natu... Legitimate defense plays an important role in curbing crimes,maintaining public order and fostering good moral conduct.In China’s judicial practice,cases on legitimate defense raised several controversies on the nature of legitimate defense,limits of excessive defense and the applicable objects and definition of special defense.The nature of legitimate defense mainly involves defense intention,defense object,defense time and other factors.The defense intention is an important sign to differ the legitimate defense from the illegitimate defense.The object of legitimate defense can only be the unlawful infringer and the actor can only prevent the ongoing illegal infringement.The existence of unlawful infringement of reality is a prerequisite for legitimate defense to be exercised.The unlawful infringement that is justified by defense should be illegal,invasive,urgency and realistic.As an unlawful infringement,the excessive defense needs to be distinguished from the legitimate defense in terms of the defense limit.As for the “necessary limit”,in principle,it means the necessary defense can stop the present unlawful infringement,and there is an obvious difference between the illegitimate defense and legitimate defense in terms of the means of the actor and the intensity of behavior.Defense behavior shall be treated as excessive defense only if it “obviously exceeds necessary limit” and “cause great harm” at the same time.The key to apply the special defense lies in the accurate understanding of the applicable object of special defense,that is,special defense can only be applied to “ongoing physical assault,murder,robbery,rape,kidnap and other violent crimes that seriously endanger personal safety”. 展开更多
关键词 legitimate DEFENSE EXCESSIVE DEFENSE SPECIAL DEFENSE JUDICIAL APPLICATION
下载PDF
Performance analysis of legitimate UAV surveillance system with suspicious relay and anti-surveillance technology
3
作者 Yi Shen Zhiwen Pan +1 位作者 Nan Liu Xiaohu You 《Digital Communications and Networks》 SCIE CSCD 2022年第5期853-863,共11页
We propose a legal Unmanned Aerial Vehicle(UAV)surveillance system to perform passive surveillance or active jamming while in the presence of a suspicious relay or source,where a UAV works in half-duplex mode and the ... We propose a legal Unmanned Aerial Vehicle(UAV)surveillance system to perform passive surveillance or active jamming while in the presence of a suspicious relay or source,where a UAV works in half-duplex mode and the relay/source deploys artificial noise to prevent monitoring.Three schemes are considered for a Multiple-Input Multiple-Output(MIMO)UAV:surveilling followed by jamming;jamming followed by surveilling;and two-stage surveilling.For each scheme,a closed-form expression of surveilling non-outage probability is derived,and surveilling performance under different system configurations is analyzed.Monte Carlo(MC)simulation validates derivation correctness. 展开更多
关键词 UAV legitimate Surveillance Proactive surveilling Suspicious relay network HALF-DUPLEX
下载PDF
Being Tested With Inequity A theoretical analysis of legitimate English in IETLS and TOEFL
4
作者 王琳 《海外英语》 2012年第5X期118-120,共3页
With the ever increasing popularity of international standardized English proficiency tests,the test takers' craze for them has nev er been greater.However,the issue of the inequity which comes from the legitimate... With the ever increasing popularity of international standardized English proficiency tests,the test takers' craze for them has nev er been greater.However,the issue of the inequity which comes from the legitimate knowledge which decides a test-taker's score hasn't been fully exposed.The theoretical study of this issue in this paper helps explore the legitimate knowledge tested in international English proficiency tests.By examining the legitimate knowledge in the sample tests of IELTS and TOEFL,the study reveals the underlying bias which constitutes a decent score for the test takers.In the end,the study proposes a more balanced assessment model for discussion. 展开更多
关键词 ENGLISH PROFICIENCY Tests legitimate knowledge NEG
下载PDF
Blue Paper on the Role of Chinese Trade Unions in Safeguarding the Legitimate Rights and Interests of Workers 2004 (Excerpt)
5
作者 ALL-CHINA FEDERATION OF TRADE UNIONS 《The Journal of Human Rights》 2006年第1期10-17,共8页
During the course of 2004, the Chinese trade unions earnestly implemented their strategy of "Organizing for Better Protection," steppedup efforts to regulate industrial relations, effectively defended the legitimate... During the course of 2004, the Chinese trade unions earnestly implemented their strategy of "Organizing for Better Protection," steppedup efforts to regulate industrial relations, effectively defended the legitimate rights and interests of workers. 展开更多
关键词 WORK In EXCERPT Blue Paper on the Role of Chinese Trade Unions in Safeguarding the legitimate Rights and Interests of Workers 2004
原文传递
Blue Paper on the Role of Chinese Trade Unions in Safeguarding the Legitimate Rights and Interests of Workers (2005)(Excerpt)
6
《The Journal of Human Rights》 2006年第6期6-11,共6页
EDITOR'S NOTE: All China Federation of Trade Unions (ACFTU) has recently published Blue Paper on the Role of Chinese Trade Unions in Safeguarding the Legitimate Rights and Interests of Workers (2005), which cons... EDITOR'S NOTE: All China Federation of Trade Unions (ACFTU) has recently published Blue Paper on the Role of Chinese Trade Unions in Safeguarding the Legitimate Rights and Interests of Workers (2005), which consist of 11 parts: preserve the correct orientation of Chinese trade unions as a protector of workers' legitimate rights and interests; protect workers' right to join and form trade union; organize and represent workers to exercise the right to equal consultation; protect workers' labor and economic rights; guarantee workers' democratic and political rights; fulfill workers' spiritual and cultural needs; actively participate in adjusting labor relations and handling labor disputes; protect migrant workers' legitimate rights and interests; promote gender equality and protect women workers' special rights and interests; take innovations in the way trade unions protect workers; and mobilize and organize workers to play the role of the working class as the main force in economic construction, and the following is an abstracted edition of it. 展开更多
关键词 Blue Paper on the Role of Chinese Trade Unions in Safeguarding the legitimate Rights and Interests of Workers EXCERPT
原文传递
Legitimate Inflation Fears
7
《Beijing Review》 2010年第2期33-33,共1页
Desperately trying to cure their financial ailments, central banks in the West fired up their money-printing machines to pour liquidity into their respective banking systems. While this no doubt helped thaw the credit... Desperately trying to cure their financial ailments, central banks in the West fired up their money-printing machines to pour liquidity into their respective banking systems. While this no doubt helped thaw the credit freeze, it also inadvertently sowed the seeds of inflation. Andy Xie, a renowned independent Shanghai-based economist and former Morgan Stanley chief economist for Asia, discussed this issue in a recent interview with the Securities Times. Edited excerpts follow: 展开更多
关键词 In legitimate Inflation Fears
原文传递
Legitimate Sovereignty
8
作者 SUN XIAOYING a research fellow with the Institute of Southeast Asian Studies of the Guangxi Academy of Social Sciences 《Beijing Review》 2010年第32期12-12,共1页
Historical and legal evidence proves China’s indisputable sovereignty over the South China Sea At the foreign ministers’ meeting of the ASEAN Regional Forum in Viet Nam on July 23, U.S.Secretary of State Hillary Cli... Historical and legal evidence proves China’s indisputable sovereignty over the South China Sea At the foreign ministers’ meeting of the ASEAN Regional Forum in Viet Nam on July 23, U.S.Secretary of State Hillary Clinton said the UnitedState Hillary Clinton said the United States has a national interest in the South China Sea, hinting that Washington may interfere in the territorial disputes in the area. Her remarks caused a strong reaction from China. 展开更多
关键词 legitimate Sovereignty
原文传递
Multi Sensor-Based Implicit User Identification
9
作者 Muhammad Ahmad Rana Aamir Raza +5 位作者 Manuel Mazzara Salvatore Distefano Ali Kashif Bashir Adil Khan Muhammad Shahzad Sarfraz Muhammad Umar Aftab 《Computers, Materials & Continua》 SCIE EI 2021年第8期1673-1692,共20页
Smartphones have ubiquitously integrated into our home and work environments,however,users normally rely on explicit but inefficient identification processes in a controlled environment.Therefore,when a device is stol... Smartphones have ubiquitously integrated into our home and work environments,however,users normally rely on explicit but inefficient identification processes in a controlled environment.Therefore,when a device is stolen,a thief can have access to the owner’s personal information and services against the stored passwords.As a result of this potential scenario,this work proposes an automatic legitimate user identification system based on gait biometrics extracted from user walking patterns captured by smartphone sensors.A set of preprocessing schemes are applied to calibrate noisy and invalid samples and augment the gait-induced time and frequency domain features,then further optimized using a non-linear unsupervised feature selection method.The selected features create an underlying gait biometric representation able to discriminate among individuals and identify them uniquely.Different classifiers are adopted to achieve accurate legitimate user identification.Extensive experiments on a group of 16 individuals in an indoor environment show the effectiveness of the proposed solution:with 5 to 70 samples per window,KNN and bagging classifiers achieve 87–99%accuracy,82–98%for ELM,and 81–94%for SVM.The proposed pipeline achieves a 100%true positive and 0%false-negative rate for almost all classifiers. 展开更多
关键词 SENSORS SMARTPHONE legitimate user identification
下载PDF
Typological Analysis of Genome Editing and Its Legal Regulation Approach
10
作者 靳雨露 LIU Zhao(译) 《The Journal of Human Rights》 2022年第5期868-887,共20页
Whether the legitimate boundary of human genome editing is gene therapy or genetic enhancement is an issue of fierce debate. To safeguard basic human rights such as the right to autonomous development and personal dig... Whether the legitimate boundary of human genome editing is gene therapy or genetic enhancement is an issue of fierce debate. To safeguard basic human rights such as the right to autonomous development and personal dignity, and protection of the current human social ethics and moral outlook and natural evolution order, gene therapy should be permitted while genetic enhancement should be prohibited. After the boundary of the genome editing application category is clearly defined, the risk that social inequality may increase, the biosafety and damage risk and the privacy and personal information disclosure risk brought by human genome editing should be analyzed.Based on this, the legal approach to regulating genome editing should be to adopt an inclusive and prudent hierarchical supervision idea ensuring universal access to genome editing under the social permission theory. A human rights impact assessment system and an in-process framework for diversified risk evaluation and inclusive and prudent hierarchical supervision, determine a posterior attribution principle and dynamically standardize genome editing application order in a closed-loop way. 展开更多
关键词 genome editing ETHICS MORALITY legitimate boundary risk analysis legal regulation
原文传递
EPC Implementation,Institutional Legitimacy,and Building Energy-Saving Performance
11
作者 刘丹 《中国城市经济》 2011年第5X期263-264,共2页
this paper suggested a model to address two important but unexplored questions-how EPC affects the buildings energy-saving performance and how institutional legitimacy of ESCOs moderates the relationship between EPC a... this paper suggested a model to address two important but unexplored questions-how EPC affects the buildings energy-saving performance and how institutional legitimacy of ESCOs moderates the relationship between EPC and buildings energy-saving performance.The results indicate that the implementation of EPC has a positive effect on building senergy-saving performance.And also,the sociopolitical legitimacy positively moderates the relationship between the implement of EPC and buildings energy-saving performance and the cognitive legitimacy positively moderates the relationship between the implement of EPC and buildings energy-saving performance. 展开更多
关键词 EPC ENERGY-SAVING MANAGEMENT INSTITUTIONAL Legitim
下载PDF
Manipulating De/Legitimation in Translation of Political Discourse
12
作者 Rasool Moradi-Joz Elham Kavandi 《Journal of Linguistics and Education Research》 2018年第1期39-47,共9页
This study seeks to gain an insight into political speech subtitle,focusing on de/legitimation as a macro-linguistic discursive strategy reflecting micro-linguistic discursive strategies so as to exemplify as to how s... This study seeks to gain an insight into political speech subtitle,focusing on de/legitimation as a macro-linguistic discursive strategy reflecting micro-linguistic discursive strategies so as to exemplify as to how such a discursive representation could be mediated through translation as a socio-communicative action and translation studies as a growing interdisciplinary field of inquiry.To this end,a twofold theoretical framework at both macro-linguistic and micro-linguistic levels is employed-consisting of a quadruple categorization of legitimation developed by Van Leeuwen(2008)[38]on political discourse(PD)and Fairclough's(2003)[12]critical discourse analysis(CDA)model on linguistic modality-to analyze one of the political speeches delivered by the Iranian former president Mahmood Ahmadinejad and subtitled into English by MEMRITV(Middle East Media Research Institute TV).The results,confirming political discourse and its translation as a means of de/legitimation,indicate that although there are no overt manipulations regarding the discourse of de/legitimation in the target text(TT),the manipulation of micro-linguistic device of modality constitutes a degree of covert manipulation of de-legitimizing discourse,altering the author's(the source text enunciator's)commitment to truth.It is concluded that viewing translation of political discourse as a means of de/legitimization in the context of micro-linguistic aspects such as modality could probably open a fruitful avenue to discourse studies in general and translation studies in particular.However,to comparatively achieve more reliable and informative results,adopting eclectic approaches to the critical study of PD seems to be more promising. 展开更多
关键词 TRANSLATION studies Critical DISCOURSE analysis(CDA) Political DISCOURSE ANALYSIS MODALITY De/legitimation Manipulation
下载PDF
Cooperative Proactive Eavesdropping over Two-Hop Suspicious Communication Based on Reinforcement Learning 被引量:1
13
作者 Yaxin Yang Baogang Li +2 位作者 Shue Zhang Wei Zhao Libin Jiao 《Journal of Communications and Information Networks》 CSCD 2021年第2期166-174,共9页
Legitimate surveillance has attracted more and more concern,and effective proactive intervention can eavesdrop the illegitimate information.In this paper,we propose legitimate eavesdropping over a two-hop suspicious c... Legitimate surveillance has attracted more and more concern,and effective proactive intervention can eavesdrop the illegitimate information.In this paper,we propose legitimate eavesdropping over a two-hop suspicious communication link by two full-duplex legitimate monitors(LMs)based on multi-agent deep deterministic policy gradient(MADDPG)algorithm in two phases.In phase 1,the suspicious transmitter sends information to the suspicious assistant relay,and the assistant relay decodes and forwards the received message to the suspicious receiver in phase 2.Meanwhile,two LMs cooperatively emit jamming to suspicious relay and receiver during each phase.Particularly,each LM is considered to be an energy-limited device,and eavesdropping is a long-term process,so we adopt expected eavesdropping energy efficiency(EEE)over a period of time to evaluate eavesdropping performance.However,for two LMs,how to cooperatively make jamming power decision at each hop in a dynamic environment is a huge challenge.Therefore,MADDPG algorithm,as a multi-agent reinforcement learning approach with the advantage of dynamic decision-making,is utilized to solve the issue of jamming power decision for each LM.In the simulation,the results show that our proposed cooperative jamming scheme can obtain higher expected EEE. 展开更多
关键词 legitimate surveillance two-hop dynamic decision-making expected EEE MADDPG
原文传递
Effects of nectar-robbing on plant reproduction and evolution
14
作者 ZHANG Yanwen WANG Yong GUO Youhao 《Frontiers in Biology》 CSCD 2007年第4期443-449,共7页
The relationship between plant and pollinator is considered as the mutualism because plant benefits from the pollinator’s transport of male gametes and pollinator benefits from plant’s reward.Nectar robbers are freq... The relationship between plant and pollinator is considered as the mutualism because plant benefits from the pollinator’s transport of male gametes and pollinator benefits from plant’s reward.Nectar robbers are frequently described as cheaters in the plant-pollinator mutualism,because it is assumed that they obtain a reward(nectar)without providing a service(pollination).Nectar robbers are birds,insects,or other flower visitors that remove nectar from flowers through a hole pierced or bitten in the corolla.Nectar robbing repre-sents a complex relationship between animals and plants.Whether plants benefit from the relationship is always a con-troversial issue in earlier studies.This paper is a review of the recent literatures on nectar robbing and attempts to acquire an expanded understanding of the ecological and evolutionary roles that robbers play.Understanding the effects of nectar robbers on the plants that they visited and other flower visi-tors is especially important when one considers the high rates of robbing that a plant population may experience and the high percentage of all flower visitors that nectar robbers make to some species.There are two standpoints in explaining why animals forage on flowers and steal nectar in an illegitimate behavior.One is that animals can only get food in illegitimate way because of the mismatch of the morphologies of animals’mouthparts and floral structure.The other point of view argues that nectar robbing is a relatively more efficient,thus more energy-saving way for animals to get nectar from flowers.This is probably associated with the difficulty of changing attitudes that have been held for a long time.In the case of positive effect,the bodies of nectar robbers frequently touch the sex organs of plants during their visiting to the flowers and causing pollination.The neutral effect,nectar robbers’behavior may destruct the corollas of flowers,but they neither touch the sex organs nor destroy the ovules.Their behavior does not affect the fruit sets or seed sets of the hosting plant.Besides the direct impacts on plants,nectar robbers may also have an indirect effect on the behavior of the legitimate pollinators.Under some circumstances,the change in pollinator behavior could result in improved repro-ductive fitness of plants through increased pollen flow and out-crossing. 展开更多
关键词 plant reproductive ecology nectar robbing HOST legitimate pollinator reproductive fitness
原文传递
A King's Two Bodies: The Northern Wei Emperor Wencheng and Representations of the Power of His Monarchy
15
作者 Scott Pearce 《Frontiers of History in China》 2012年第1期90-105,共16页
This article examines the various ways in which the Northern Wei emperor Wenchengdi (440465; r. 452-465) was portrayed to his subjects. As is the case with many monarchs in many countries, he played different parts ... This article examines the various ways in which the Northern Wei emperor Wenchengdi (440465; r. 452-465) was portrayed to his subjects. As is the case with many monarchs in many countries, he played different parts before different groups. For his soldiers, he was represented as a great hunter and marksman; to farmers in the lowlands, as a caring protector and benefactor; to potentially rebellious groups on the periphery, as a strong and steady observer of their actions. At the same time, it was in his reign that the Northern Wei court began efforts to use Buddhism as an overarching way to justify rule to all within the realm, by initiating construction of the famous cave-temples at Yungang, where "Buddhas became emperors and emperors Buddhas." The spectacles through which Wenchengdi was portrayed are contextualized by a parallel examination of the very difficult life of the person behind the pomp and circumstance. 展开更多
关键词 Northern Wei Wenchengdi legitimation propaganda ErnstKantorowicz BUDDHISM military culture
原文传递
The Problematic of "High (-Brow) Literature" and "Low (-Brow) Literature": Some Thoughts on the Origins of Modern Chinese Literature
16
作者 Xiaoping Wang 《Frontiers of Literary Studies in China-Selected Publications from Chinese Universities》 2013年第1期117-141,共25页
This paper discusses the criteria according to which literature iscategorized as "high (-brow) literature" or "low (-brow) literature" in modem China. I suggest that these standards change over time and are in... This paper discusses the criteria according to which literature iscategorized as "high (-brow) literature" or "low (-brow) literature" in modem China. I suggest that these standards change over time and are intimately tied to the problematics of canonization, legitimization, and cultural hegemony. In modem China, the criteria are also closely related to class differentiation. Furthermore, I contend that, in the Chinese academic world, there is often a tendency to interpret certain forms of middle-brow literature as belletristic literature that breaks though the boundary between "high (-brow) literature" and "low (-brow) literature." In discussing "middle-brow" literature in modem China, this paper takes "Mandarin Ducks and Butterfly" literature as the object of its analysis and proposes that middle-brow literature is essentially the moralization of political and social issues, which serves to displace social-economic and political concerns. This is usually accomplished through the glorification of conservative ethical-moral viewpoints. 展开更多
关键词 high (-brow) literature low (-brow) literature canonization legitimization cultural hegemony CONSERVATISM Mandarin and Butterflyliterature
原文传递
The Will to Allegory and the Origin of Chinese Modernism: Rereading Lu Xun's Ah Q--The Real Story
17
作者 Xudong Zhang 《Frontiers of Literary Studies in China-Selected Publications from Chinese Universities》 2012年第2期147-183,共37页
Through a formal analysis of this seminar work of Lu Xun, the author observes that the narrative and dramatic motivation of Ah Q--The Real Story is an intense yet futile search for a proper name and identity within a ... Through a formal analysis of this seminar work of Lu Xun, the author observes that the narrative and dramatic motivation of Ah Q--The Real Story is an intense yet futile search for a proper name and identity within a system of naming and identity-formation as the system, by default, repels the identity-seeking and "homecoming" effort of the sign in question ("Ah Q"). Based on this observation, the author goes on to argue that the origin of Chinese modernism lies in a highly political awareness of one's loss of cultural belonging and thus one's collective alienation from the matrix of tradition and indeed existence. Departing from conventional reading of this work, often anchored in sociopolitical interpretations of class, nation, and group psychology centered on the "critique of national characteristics" discourse, this article maintains that the true ambition and literary energy of Lu Xun's masterpiece can only be fully grasped when one confronts this epic cul^tral-political struggle to regain a cultural system's power and legitimation to name one's own existence and define one's own value. 展开更多
关键词 MODERNISM ORIGIN ALLEGORY IDENTITY cultural politics legitimation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部