期刊文献+
共找到64,181篇文章
< 1 2 250 >
每页显示 20 50 100
文明1(civilized)、文明2(civilization)、文明3(civitas)——论“文明”一词的三种不同含义
1
作者 叶文宪 《许昌学院学报》 CAS 2024年第3期57-65,共9页
学术界对于“什么是文明”存有争议的原因,是把文明(civilized)、文明社会(civilization)和国家(civitas)三个不同的概念混为一谈造成的。“文明1”大致相当于英语civilized(文明的)。文化是人群的生活方式,但是不仅彬彬有礼、琴棋书画... 学术界对于“什么是文明”存有争议的原因,是把文明(civilized)、文明社会(civilization)和国家(civitas)三个不同的概念混为一谈造成的。“文明1”大致相当于英语civilized(文明的)。文化是人群的生活方式,但是不仅彬彬有礼、琴棋书画、轻歌曼舞、美味佳肴是文化,愚昧粗鲁、恶俗陋习、野风蛮舞、吃糠咽菜也是生活方式,所以文明1不完全等同于文化,而只有被认可与受推崇的文化才被称为文明。无论古今中外,作为文化的文明1都是褒义的,文明1即“文明”的本义,也是对文化的价值判断。“文明2”相当于英语civilization(文明社会),摩尔根用以指称继蒙昧社会与野蛮社会之后出现的、高于蒙昧与野蛮状态的社会阶段。作为社会形态的文明2当然比蒙昧与野蛮社会要进步,但是文明社会并非一切都是文明的,其中充斥着种种不文明的蒙昧与野蛮,所以不能说文明2就是“文明的”社会。“文明3”相当于英语civitas(国家),是中国学者根据恩格斯的“国家是文明社会的概括”得出的概念,系指继部落联盟或酋邦之后出现的社会组织形态。因为不同国家的国体与政体各不相同,有了国家之后并非一切都变得比野蛮社会更文明了,所以作为国家的文明3也不都是“文明的”国家。 展开更多
关键词 文明1(civilized) 文明2(civilization) 文明3(civitas)
下载PDF
Civil3d技术在河道治理中的应用分析
2
作者 范会平 《中文科技期刊数据库(文摘版)工程技术》 2024年第3期0114-0116,共3页
为了切实加强水环境保护及水资源管理与利用,近年来我国一直在加快和加大力度落实河道治理,要想保证河道治理达到预期效果,并最大程度提高河道治理工程生态效益,首先要确保河道治理设计与施工方案的科学合理性,可见借助现代化技术手段,... 为了切实加强水环境保护及水资源管理与利用,近年来我国一直在加快和加大力度落实河道治理,要想保证河道治理达到预期效果,并最大程度提高河道治理工程生态效益,首先要确保河道治理设计与施工方案的科学合理性,可见借助现代化技术手段,优化和改进河道治理设计与规划是很有必要的。基于此本文首先进行Civil3d技术的梳理与说明,继而详细分析Civil3D软件在某河道治理项目的具体应用,旨在与相关工作人员相互交流、共同探讨。 展开更多
关键词 civil3d技术 河道治理 技术应用
下载PDF
Image Recognition Model of Fraudulent Websites Based on Image Leader Decision and Inception-V3 Transfer Learning
3
作者 Shengli Zhou Cheng Xu +3 位作者 Rui Xu Weijie Ding Chao Chen Xiaoyang Xu 《China Communications》 SCIE CSCD 2024年第1期215-227,共13页
The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current re... The fraudulent website image is a vital information carrier for telecom fraud.The efficient and precise recognition of fraudulent website images is critical to combating and dealing with fraudulent websites.Current research on image recognition of fraudulent websites is mainly carried out at the level of image feature extraction and similarity study,which have such disadvantages as difficulty in obtaining image data,insufficient image analysis,and single identification types.This study develops a model based on the entropy method for image leader decision and Inception-v3 transfer learning to address these disadvantages.The data processing part of the model uses a breadth search crawler to capture the image data.Then,the information in the images is evaluated with the entropy method,image weights are assigned,and the image leader is selected.In model training and prediction,the transfer learning of the Inception-v3 model is introduced into image recognition of fraudulent websites.Using selected image leaders to train the model,multiple types of fraudulent websites are identified with high accuracy.The experiment proves that this model has a superior accuracy in recognizing images on fraudulent websites compared to other current models. 展开更多
关键词 fraudulent website image leaders telecom fraud transfer learning
下载PDF
NFA:A neural factorization autoencoder based online telephony fraud detection
4
作者 Abdul Wahid Mounira Msahli +1 位作者 Albert Bifet Gerard Memmi 《Digital Communications and Networks》 SCIE CSCD 2024年第1期158-167,共10页
The proliferation of internet communication channels has increased telecom fraud,causing billions of euros in losses for customers and the industry each year.Fraudsters constantly find new ways to engage in illegal ac... The proliferation of internet communication channels has increased telecom fraud,causing billions of euros in losses for customers and the industry each year.Fraudsters constantly find new ways to engage in illegal activity on the network.To reduce these losses,a new fraud detection approach is required.Telecom fraud detection involves identifying a small number of fraudulent calls from a vast amount of call traffic.Developing an effective strategy to combat fraud has become challenging.Although much effort has been made to detect fraud,most existing methods are designed for batch processing,not real-time detection.To solve this problem,we propose an online fraud detection model using a Neural Factorization Autoencoder(NFA),which analyzes customer calling patterns to detect fraudulent calls.The model employs Neural Factorization Machines(NFM)and an Autoencoder(AE)to model calling patterns and a memory module to adapt to changing customer behaviour.We evaluate our approach on a large dataset of real-world call detail records and compare it with several state-of-the-art methods.Our results show that our approach outperforms the baselines,with an AUC of 91.06%,a TPR of 91.89%,an FPR of 14.76%,and an F1-score of 95.45%.These results demonstrate the effectiveness of our approach in detecting fraud in real-time and suggest that it can be a valuable tool for preventing fraud in telecommunications networks. 展开更多
关键词 Telecom industry Streaming anomaly detection fraud analysis Factorization machine Real-time system Security
下载PDF
Credit Card Fraud Detection Using Improved Deep Learning Models
5
作者 Sumaya S.Sulaiman Ibraheem Nadher Sarab M.Hameed 《Computers, Materials & Continua》 SCIE EI 2024年第1期1049-1069,共21页
Fraud of credit cards is a major issue for financial organizations and individuals.As fraudulent actions become more complex,a demand for better fraud detection systems is rising.Deep learning approaches have shown pr... Fraud of credit cards is a major issue for financial organizations and individuals.As fraudulent actions become more complex,a demand for better fraud detection systems is rising.Deep learning approaches have shown promise in several fields,including detecting credit card fraud.However,the efficacy of these models is heavily dependent on the careful selection of appropriate hyperparameters.This paper introduces models that integrate deep learning models with hyperparameter tuning techniques to learn the patterns and relationships within credit card transaction data,thereby improving fraud detection.Three deep learning models:AutoEncoder(AE),Convolution Neural Network(CNN),and Long Short-Term Memory(LSTM)are proposed to investigate how hyperparameter adjustment impacts the efficacy of deep learning models used to identify credit card fraud.The experiments conducted on a European credit card fraud dataset using different hyperparameters and three deep learning models demonstrate that the proposed models achieve a tradeoff between detection rate and precision,leading these models to be effective in accurately predicting credit card fraud.The results demonstrate that LSTM significantly outperformed AE and CNN in terms of accuracy(99.2%),detection rate(93.3%),and area under the curve(96.3%).These proposed models have surpassed those of existing studies and are expected to make a significant contribution to the field of credit card fraud detection. 展开更多
关键词 Card fraud detection hyperparameter tuning deep learning autoencoder convolution neural network long short-term memory RESAMPLING
下载PDF
DC-FIPD: Fraudulent IP Identification Method Based on Homology Detection
6
作者 Yuanyuan Ma Ang Chen +3 位作者 Cunzhi Hou Ruixia Jin Jinghui Zhang Ruixiang Li 《Computers, Materials & Continua》 SCIE EI 2024年第11期3301-3323,共23页
Currently,telecom fraud is expanding from the traditional telephone network to the Internet,and identifying fraudulent IPs is of great significance for reducing Internet telecom fraud and protecting consumer rights.Ho... Currently,telecom fraud is expanding from the traditional telephone network to the Internet,and identifying fraudulent IPs is of great significance for reducing Internet telecom fraud and protecting consumer rights.However,existing telecom fraud identification methods based on blacklists,reputation,content and behavioral characteristics have good identification performance in the telephone network,but it is difficult to apply to the Internet where IP(Internet Protocol)addresses change dynamically.To address this issue,we propose a fraudulent IP identification method based on homology detection and DBSCAN(Density-Based Spatial Clustering of Applications with Noise)clustering(DC-FIPD).First,we analyze the aggregation of fraudulent IP geographies and the homology of IP addresses.Next,the collected fraudulent IPs are clustered geographically to obtain the regional distribution of fraudulent IPs.Then,we constructed the fraudulent IP feature set,used the genetic optimization algorithm to determine the weights of the fraudulent IP features,and designed the calculation method of the IP risk value to give the risk value threshold of the fraudulent IP.Finally,the risk value of the target IP is calculated and the IP is identified based on the risk value threshold.Experimental results on a real-world telecom fraud detection dataset show that the DC-FIPD method achieves an average identification accuracy of 86.64%for fraudulent IPs.Additionally,the method records a precision of 86.08%,a recall of 45.24%,and an F1-score of 59.31%,offering a comprehensive evaluation of its performance in fraud detection.These results highlight the DC-FIPD method’s effectiveness in addressing the challenges of fraudulent IP identification. 展开更多
关键词 fraudulent IP identification homology detection CLUSTERING genetic optimization algorithm telecom fraud identification
下载PDF
The Effects of Competence and Auditor Training on Fraud Detection Within Multinational Companies in Sub-Saharan Africa
7
作者 Ivan Djossa Tchokoté Joëlle Tsobze Tiomeguim 《Journal of Modern Accounting and Auditing》 2024年第1期1-13,共13页
The aim of this study is to examine the qualities that auditors engaged in detecting potential fraud within multinational corporations in Sub-Saharan Africa should possess.To achieve this goal,a quantitative approach ... The aim of this study is to examine the qualities that auditors engaged in detecting potential fraud within multinational corporations in Sub-Saharan Africa should possess.To achieve this goal,a quantitative approach was used to develop and test a research model based on three theories:agency theory,attribution theory,and cognitive dissonance theory.Responses from a panel of two hundred and nine(209)auditors who conducted a legal audit mission in a Sub-Saharan multinational were analyzed using SmartPLS 3.3.3 software.The results emphasize the crucial importance of auditors’competence and continuous training in fraud detection.However,professional skepticism and time pressure were found to be non-significant in this context.This conclusion provides essential insights for auditors,highlighting the key qualities needed to effectively address fraud detection within multinational corporations in Sub-Saharan Africa. 展开更多
关键词 fraud legal audit fraud detection MULTINATIONALS Sub-Saharan Africa
下载PDF
A Self-Adapting and Efficient Dandelion Algorithm and Its Application to Feature Selection for Credit Card Fraud Detection
8
作者 Honghao Zhu MengChu Zhou +1 位作者 Yu Xie Aiiad Albeshri 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第2期377-390,共14页
A dandelion algorithm(DA) is a recently developed intelligent optimization algorithm for function optimization problems. Many of its parameters need to be set by experience in DA,which might not be appropriate for all... A dandelion algorithm(DA) is a recently developed intelligent optimization algorithm for function optimization problems. Many of its parameters need to be set by experience in DA,which might not be appropriate for all optimization problems. A self-adapting and efficient dandelion algorithm is proposed in this work to lower the number of DA's parameters and simplify DA's structure. Only the normal sowing operator is retained;while the other operators are discarded. An adaptive seeding radius strategy is designed for the core dandelion. The results show that the proposed algorithm achieves better performance on the standard test functions with less time consumption than its competitive peers. In addition, the proposed algorithm is applied to feature selection for credit card fraud detection(CCFD), and the results indicate that it can obtain higher classification and detection performance than the-state-of-the-art methods. 展开更多
关键词 Credit card fraud detection(CCFD) dandelion algorithm(DA) feature selection normal sowing operator
下载PDF
Predictive maintenance and its applications in civil engineering structures:A review
9
作者 Shan Jiazeng Zhang Xi +2 位作者 Loong Cheng Ning Liu Yanzhe Hu Xinyue 《Journal of Southeast University(English Edition)》 EI CAS 2024年第3期245-256,共12页
Structural health monitoring and performance prediction are crucial for smart disaster mitigation and intelligent management of structures throughout their lifespan.Recent advancements in predictive maintenance strate... Structural health monitoring and performance prediction are crucial for smart disaster mitigation and intelligent management of structures throughout their lifespan.Recent advancements in predictive maintenance strategies within the industrial manufacturing industry have inspired similar innovations in civil engineering,aiming to improve structural performance evaluation,damage diagnosis,and capacity prediction.This review delves into the framework of predictive maintenance and examines various existing solutions,focusing on critical areas such as data acquisition,condition monitoring,damage prognosis,and maintenance planning.Results from real-world applications of predictive maintenance in civil engineering,covering high-rise structures,deep foundation pits,and other infrastructure,are presented.The challenges of implementing predictive maintenance in civil engineering structures under current technology,such as model interpretability of data-driven methods and standards for predictive maintenance,are explored.Future research prospects within this area are also discussed. 展开更多
关键词 predictive maintenance civil engineering structural health monitoring machine learning
下载PDF
Anti-Spoofing:Integrated Information Authentication of BeiDou-ⅡCivil Navigation Message
10
作者 Wu Zhijun Liang Cheng +2 位作者 Zhang Yun Liu Rusen Yue Meng 《China Communications》 SCIE CSCD 2024年第9期242-261,共20页
The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can le... The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can lead to wrong location reports and time indication.In order to deal with this threat,we proposed a scheme of anti-spoofing for BDⅡ-CNAV based on integrated information authentication.This scheme generates two type authentication information,one is authentication code information(ACI),which is applied to confirm the authenticity and reliability of satellite time information,and the other is signature information,which is used to authenticate the integrity of satellite location information and other information.Both authentication information is designed to embed into the reserved bits in BDⅡ-CNAV without changing the frame structure.In order to avoid authentication failure caused by public key error or key error,the key or public key prompt information(KPKPI)are designed to remind the receiver to update both keys in time.Experimental results indicate that the scheme can successfully detect spoofing attacks,and the authentication delay is less than 1%of the transmission delay,which meets the requirements of BDⅡ-CNAV information authentication. 展开更多
关键词 anti-spoofing AUTHENTICATION BeiDou-II civil navigation message(BDII-CNAV) SIGNATURE spoofing attack
下载PDF
基于Midas Civil对市政桥梁承台大体积混凝土热学性能研究
11
作者 余昭炜 《广东建材》 2024年第10期92-95,共4页
桥梁是城市市政基础设施不可或缺的一部分,而大体积混凝土施工质量的保证是桥梁质量得以保证的前提。本文先从大体积混凝土绝热温升的理论出发,从胶凝材料和结构角度研究出大体积混凝土内部温度变化的情况,然后通过在施工过程中采取相... 桥梁是城市市政基础设施不可或缺的一部分,而大体积混凝土施工质量的保证是桥梁质量得以保证的前提。本文先从大体积混凝土绝热温升的理论出发,从胶凝材料和结构角度研究出大体积混凝土内部温度变化的情况,然后通过在施工过程中采取相应的措施,进而控制混凝土内外温差,提高混凝土浇筑的质量。通过有限元Midas Civil市政桥梁的内部热传导特征以及内外温差变化情况进行模拟,得出混凝土内外温度变化的规律,并结合施工措施达到控制裂缝的目的,为同类型的项目提供参考。 展开更多
关键词 市政桥梁 大体积混凝土 Midas civil 内外温差 裂缝
下载PDF
An Anti-Fraud Policy:A Theoretical Framework for a Prosperity Tripod of Massive Data,Blockchain,and AI
12
作者 Reza G.Hamzaee Maryam Salimi 《Management Studies》 2024年第2期102-123,共22页
The authors’aspiration was to learn-and focus on policy against fraud-leading to the sustainably growing societal illnesses of dishonesty,fraud,pessimism,and divisive issues.The appropriate venue,within the currently... The authors’aspiration was to learn-and focus on policy against fraud-leading to the sustainably growing societal illnesses of dishonesty,fraud,pessimism,and divisive issues.The appropriate venue,within the currently evolving laws and regulations,is proposed to be a three-tier combination of massive data,including data accumulation,transformation,organization,stratification,estimations,data analysis,and blockchain technology,predicted to revolutionize competition and efficiency,which are further suggested to be prerequisites for a more successful creation and implementation of the third element,AI.A currently evolving prosperity tripod is hinging on the three technological legs of the massive data control/management,blockchain tech,and a rapidly growing AI.While briefly incorporating some analysis of the blockchain application,we have analytically focused on the rest-the data and AI-of what we deem to be the prospective prosperity tripod for businesses,markets,and societies,in general,despite the challenges and risks involved in each.Instead of h ypothesizing a predetermined economic model,we are proposing a data-based Vector Autoregression(VAR)methodology for the AI with an application to the fraud and anti-fraud structure and policymaking.Hopefully,the entire attempt would portend some tangible prospective contribution in an achievable positive societal change. 展开更多
关键词 fraud AI data VAR
下载PDF
基于Civil 3D部件编辑器的矿山排土场参数化设计研究
13
作者 苏高飞 梁耀 侯亚博 《现代矿业》 CAS 2024年第2期100-103,共4页
近年来,民用建筑行业BIM技术得到迅速发展,将其应用于有色冶金矿山设计工作势在必行,改变以往人工计算、应用AutoCAD插件出图的现状。为实现排土场参数化设计,结合排土场设计经验和计算机语言,基于Civil 3D部件编辑器(SAC)研究了参数化... 近年来,民用建筑行业BIM技术得到迅速发展,将其应用于有色冶金矿山设计工作势在必行,改变以往人工计算、应用AutoCAD插件出图的现状。为实现排土场参数化设计,结合排土场设计经验和计算机语言,基于Civil 3D部件编辑器(SAC)研究了参数化设计流程;针对排土场横断面形式,创建了多级边坡部件参数化模型,实现了快速建模、三维模型到二维图纸的转换以及排土场库容精确计算。基于SAC的排土场三维参数化设计技术促进了设计效率和精度的提升,总结形成了参数化设计技术在排土场设计过程中的应用流程,为类似项目提供参考。 展开更多
关键词 civil 3D部件编辑器 排土场 参数化设计
下载PDF
基于Civil3D在道路交叉口正向设计的研究与应用
14
作者 刘帮 《山东工业技术》 2024年第2期92-96,共5页
针对目前BIM正向设计所存在的出图效率低、设计工具操作不习惯、数据互通丢失率高等问题,结合某二级公路交叉口,将Civil 3D作为其正向设计的工具,开展基于Civil 3D在道路交叉口正向设计的研究,对道路交叉设计、道路优化、三维可视化等... 针对目前BIM正向设计所存在的出图效率低、设计工具操作不习惯、数据互通丢失率高等问题,结合某二级公路交叉口,将Civil 3D作为其正向设计的工具,开展基于Civil 3D在道路交叉口正向设计的研究,对道路交叉设计、道路优化、三维可视化等方面进行关键技术研究。研究结果表明,通过对地形数据优化分析,生成三维地形曲面,结合Civil 3D智能化、智慧化设计的特点,生成施工图级别的正向设计成果。工程应用结果表明,使用Civil 3D进行道路交叉口的正向设计,可以提高设计效率、减少设计错误、考虑不全面等问题,减少后期因为施工、地质突发情况对设计变更的影响。 展开更多
关键词 BIM正向设计 道路交叉口 civil 3D 关键技术研究
下载PDF
Exploring the Applications of Digital Twin Technology in Enhancing Sustainability in Civil Engineering:A Review
15
作者 Jiamin Huang Ping Wu +2 位作者 Wangxin Li Jun Zhang Yidong Xu 《Structural Durability & Health Monitoring》 EI 2024年第5期577-598,共22页
With the advent of the big data era and the rise of Industrial Revolution 4.0,digital twins(DTs)have gained sig-nificant attention in various industries.DTs offer the opportunity to combine the physical and digital wor... With the advent of the big data era and the rise of Industrial Revolution 4.0,digital twins(DTs)have gained sig-nificant attention in various industries.DTs offer the opportunity to combine the physical and digital worlds and aid the digital transformation of the civil engineering industry.In this paper,605 documents obtained from the search werefirst analysed using CiteSpace for literature visualisation,and an author co-occurrence network,a keyword co-occurrence network,and a keyword clustering set were obtained.Next,through a literature review of 86 papers,this paper summarises the current status of DT application in civil engineering based on a review of the origins,concepts,and implementation techniques of DTs,and it introduces the application of DTs in the full project lifecycle.This study shows that DTs have great potential to address many of the challenges faced by civil engineering.In this regard,the paper also presents some thoughts on the future directions of DT research. 展开更多
关键词 Digital twins civil engineering full lifecycle literature visualisation analysis
下载PDF
Real-Time Fraud Detection Using Machine Learning
16
作者 Benjamin Borketey 《Journal of Data Analysis and Information Processing》 2024年第2期189-209,共21页
Credit card fraud remains a significant challenge, with financial losses and consumer protection at stake. This study addresses the need for practical, real-time fraud detection methodologies. Using a Kaggle credit ca... Credit card fraud remains a significant challenge, with financial losses and consumer protection at stake. This study addresses the need for practical, real-time fraud detection methodologies. Using a Kaggle credit card dataset, I tackle class imbalance using the Synthetic Minority Oversampling Technique (SMOTE) to enhance modeling efficiency. I compare several machine learning algorithms, including Logistic Regression, Linear Discriminant Analysis, K-nearest Neighbors, Classification and Regression Tree, Naive Bayes, Support Vector, Random Forest, XGBoost, and Light Gradient-Boosting Machine to classify transactions as fraud or genuine. Rigorous evaluation metrics, such as AUC, PRAUC, F1, KS, Recall, and Precision, identify the Random Forest as the best performer in detecting fraudulent activities. The Random Forest model successfully identifies approximately 92% of transactions scoring 90 and above as fraudulent, equating to a detection rate of over 70% for all fraudulent transactions in the test dataset. Moreover, the model captures more than half of the fraud in each bin of the test dataset. SHAP values provide model explainability, with the SHAP summary plot highlighting the global importance of individual features, such as “V12” and “V14”. SHAP force plots offer local interpretability, revealing the impact of specific features on individual predictions. This study demonstrates the potential of machine learning, particularly the Random Forest model, for real-time credit card fraud detection, offering a promising approach to mitigate financial losses and protect consumers. 展开更多
关键词 Credit Card fraud Detection Machine Learning SHAP Values Random Forest
下载PDF
基于Civil 3D进行符合国标的超高加宽设计
17
作者 王振宇 康宁 《河南建材》 2024年第1期4-7,共4页
BIM的快速发展为道路设计提供了新的发展契机。作为一款成熟的道路设计BIM软件,无论是设计规范,还是装配部件,Civil 3D都支持自主定义,这为道路行业BIM的发展提供了一个很好的设计平台。在各等级道路中,道路的超高加宽设计对于行车的安... BIM的快速发展为道路设计提供了新的发展契机。作为一款成熟的道路设计BIM软件,无论是设计规范,还是装配部件,Civil 3D都支持自主定义,这为道路行业BIM的发展提供了一个很好的设计平台。在各等级道路中,道路的超高加宽设计对于行车的安全性与舒适性至关重要,但是在进行路线超高加宽设计时,Civil 3D所依托的是美国标准规范。为了让设计更适合中国道路实际情况,根据中国路线设计规范修编Civil 3D的超高加宽设计文件是至关重要的,可以为中国标准下的公路行业BIM设计发展提供一定的帮助。 展开更多
关键词 BIM civil 3D 道路设计 超高加宽 中国标准
下载PDF
The Positive Significance of Confucian Civilization in Peace Building
18
作者 PU Jingxin ZHENG Hongju 《International Relations and Diplomacy》 2024年第1期18-25,共8页
The Confucian emphasis on benevolence and empathy can be applied in conflict resolution processes.When parties in conflict embrace these values,it becomes easier to find common ground,compromise,and work towards peace... The Confucian emphasis on benevolence and empathy can be applied in conflict resolution processes.When parties in conflict embrace these values,it becomes easier to find common ground,compromise,and work towards peaceful solutions.Confucian civilization,with its emphasis on ethics,harmony,and diplomacy,offers valuable contributions to peace-building efforts in the contemporary world.By promoting virtuous leadership,fostering cross-cultural understanding,and emphasizing ethical governance,Confucianism can play a positive role in achieving and maintaining global peace.Confucianism continues to exert significant influence in the contemporary world,particularly in the context of peace-building efforts.This article explores the positive significance of Confucian civilization in contributing to peace-building endeavors globally. 展开更多
关键词 Confucian civilization CONFUCIANISM BENEVOLENCE peace-building HARMONY cross-cultural understanding
下载PDF
Association between Mental Health Literacy and Workplace Well-Being of Chinese Grassroots Civil Servants:The Chain Mediating Effects of Regulatory Emotional Self-Efficacy and Resilience
19
作者 Yi Tang Yajun Zhao +4 位作者 Zihan Jin Shengnan Wu Zhijun Zhang Ju Zhou Ling Zhou 《International Journal of Mental Health Promotion》 2024年第7期559-568,共10页
This study aimed to investigate the relationship between mental health literacy(MHL)and workplace well-being(WWB)of Chinese grassroots civil servants,with regulatory emotional self-efficacy(RESE)and resilience as media... This study aimed to investigate the relationship between mental health literacy(MHL)and workplace well-being(WWB)of Chinese grassroots civil servants,with regulatory emotional self-efficacy(RESE)and resilience as mediating variables.A questionnaire survey was conducted among Chinese grassroots civil servants,with a valid sample size of 2673 after excluding missing values and conducting relevant data processing.The PROCESS was used to examine the relationship between MHL,RESE,resilience,and WWB.The study found that MHL among grassroots civil servants was positively and significantly correlated with WWB(r=0.73,p<0.01).RESE partially mediated the relationship between MHL and WWB(β=0.25,95%CI[0.22,0.28]).Resilience partially mediated the relationship between MHL and WWB(β=0.22,95%CI[0.19,0.26]).MHL had a positive effect on WWB through the chain mediating effect of RESE and resilience(β=0.05,95%CI[0.03,0.07]).There is a close relationship between MHL and WWB,where Chinese grassroots civil servants with higher levels of MHL can develop stronger RESE and resilience,leading to higher WWB.The results of this study remind organizational institutions of Chinese grassroots civil servants that enhancing MHL,RESE,and resilience is an important pathway to promoting their WWB. 展开更多
关键词 Mental health literacy workplace well-being regulatory emotional self-efficacy RESILIENCE Chinese grassroots civil servants
下载PDF
基于Midas Civil的桥梁承载力检算分析
20
作者 唐颖林 汤维 《北方交通》 2024年第3期14-17,21,共5页
文章以衡山路跨陇海立交桥第1联边跨、中跨受力最不利梁为工程研究案例,基于Midas Civil有限元软件对桥梁承载力进行检算分析,并介绍桥梁工程检算参数取值。通过Midas Civil建立桥梁模型,模拟桥梁结构和荷载,对比分析桥梁元结构的承载... 文章以衡山路跨陇海立交桥第1联边跨、中跨受力最不利梁为工程研究案例,基于Midas Civil有限元软件对桥梁承载力进行检算分析,并介绍桥梁工程检算参数取值。通过Midas Civil建立桥梁模型,模拟桥梁结构和荷载,对比分析桥梁元结构的承载能力和桥梁实际承载能力,结果表明该桥梁结构满足规范荷载等级使用要求。研究可为同类型工程提供经验参考。 展开更多
关键词 桥梁工程 承载能力 荷载 Midas civil
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部