期刊文献+
共找到15,086篇文章
< 1 2 250 >
每页显示 20 50 100
Research on Improved MobileViT Image Tamper Localization Model
1
作者 Jingtao Sun Fengling Zhang +1 位作者 Huanqi Liu Wenyan Hou 《Computers, Materials & Continua》 SCIE EI 2024年第8期3173-3192,共20页
As image manipulation technology advances rapidly,the malicious use of image tampering has alarmingly escalated,posing a significant threat to social stability.In the realm of image tampering localization,accurately l... As image manipulation technology advances rapidly,the malicious use of image tampering has alarmingly escalated,posing a significant threat to social stability.In the realm of image tampering localization,accurately localizing limited samples,multiple types,and various sizes of regions remains a multitude of challenges.These issues impede the model’s universality and generalization capability and detrimentally affect its performance.To tackle these issues,we propose FL-MobileViT-an improved MobileViT model devised for image tampering localization.Our proposed model utilizes a dual-stream architecture that independently processes the RGB and noise domain,and captures richer traces of tampering through dual-stream integration.Meanwhile,the model incorporating the Focused Linear Attention mechanism within the lightweight network(MobileViT).This substitution significantly diminishes computational complexity and resolves homogeneity problems associated with traditional Transformer attention mechanisms,enhancing feature extraction diversity and improving the model’s localization performance.To comprehensively fuse the generated results from both feature extractors,we introduce the ASPP architecture for multi-scale feature fusion.This facilitates a more precise localization of tampered regions of various sizes.Furthermore,to bolster the model’s generalization ability,we adopt a contrastive learning method and devise a joint optimization training strategy that leverages fused features and captures the disparities in feature distribution in tampered images.This strategy enables the learning of contrastive loss at various stages of the feature extractor and employs it as an additional constraint condition in conjunction with cross-entropy loss.As a result,overfitting issues are effectively alleviated,and the differentiation between tampered and untampered regions is enhanced.Experimental evaluations on five benchmark datasets(IMD-20,CASIA,NIST-16,Columbia and Coverage)validate the effectiveness of our proposed model.The meticulously calibrated FL-MobileViT model consistently outperforms numerous existing general models regarding localization accuracy across diverse datasets,demonstrating superior adaptability. 展开更多
关键词 Image tampering localization focused linear attention mechanism MobileViT contrastive loss
下载PDF
Digital Text Document Watermarking Based Tampering Attack Detection via Internet
2
作者 Manal Abdullah Alohali Muna Elsadig +3 位作者 Fahd N.Al-Wesabi Mesfer Al Duhayyim Anwer Mustafa Hilal Abdelwahed Motwakel 《Computer Systems Science & Engineering》 2024年第3期759-771,共13页
Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentica... Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentication,and integrity verification of digital content interchanged through the Internet were utilized to solve a major concern in information and communication technologies.The authors’difficulties were tampering detection,authentication,and integrity verification of the digital contents.This study develops an Automated Data Mining based Digital Text Document Watermarking for Tampering Attack Detection(ADMDTW-TAD)via the Internet.The DM concept is exploited in the presented ADMDTW-TAD technique to identify the document’s appropriate characteristics to embed larger watermark information.The presented secure watermarking scheme intends to transmit digital text documents over the Internet securely.Once the watermark is embedded with no damage to the original document,it is then shared with the destination.The watermark extraction process is performed to get the original document securely.The experimental validation of the ADMDTW-TAD technique is carried out under varying levels of attack volumes,and the outcomes were inspected in terms of different measures.The simulation values indicated that the ADMDTW-TAD technique improved performance over other models. 展开更多
关键词 Content authentication tampering attacks detection model SECURITY digital watermarking
下载PDF
Environmental Friendly Route and Wool Shrink Proofing
3
作者 朱泉 吴婵娟 《Journal of Donghua University(English Edition)》 EI CAS 2003年第2期14-17,共4页
The shrink proofing on wool with treatment of protease named Argaenzyme STL was studied. The various pretreating auxiliaries, different parameters for protease treating process and the effect of stabilizer were discus... The shrink proofing on wool with treatment of protease named Argaenzyme STL was studied. The various pretreating auxiliaries, different parameters for protease treating process and the effect of stabilizer were discussed in detail. The varieties of some properties before and after protease treatment were also investigated. 展开更多
关键词 PROTEASE WOOL stabilizer pretreating auxiliary shrink proofing
下载PDF
A Leaking-Proof Theranostic Nanoplatform for Tumor-Targeted and Dual-Modality Imaging-Guided Photodynamic Therapy
4
作者 Duo Jin Yang Zhu +8 位作者 Manman Liu Wenxin Yu Jiaji Yu Xinwei Zheng Lulu Wang Yun Wu Kaiju Wei Junjie Cheng Yangzhong Liu 《Biomedical Engineering Frontiers》 CAS 2023年第1期187-196,共10页
Objective:A protein-based leaking-proof theranostic nanoplatform for dual-modality imaging-guided tumor photodynamic therapy(PDT)has been designed.Impact Statement:A site-specific conjugation of chlorin e6(Ce6)to ferr... Objective:A protein-based leaking-proof theranostic nanoplatform for dual-modality imaging-guided tumor photodynamic therapy(PDT)has been designed.Impact Statement:A site-specific conjugation of chlorin e6(Ce6)to ferrimagnetic ferritin(MFtn-Ce6)has been constructed to address the challenge of unexpected leakage that often occurs during small-molecule drug delivery.Introduction:PDT is one of the most promising approaches for tumor treatment,while a delivery system is typically required for hydrophobic photosensitizers.However,the nonspecific distribution and leakage of photosensitizers could lead to insufficient drug accumulation in tumor sites.Methods:An engineered ferritin was generated for site-specific conjugation of Ce6 to obtain a leaking-proof delivery system,and a ferrimagnetic core was biomineralized in the cavity of ferritin,resulting in a fluorescent ferrimagnetic ferritin nanoplatform(MFtn-Ce6).The distribution and tumor targeting of MFtn-Ce6 can be detected by magnetic resonance imaging(MRI)and fluorescence imaging(FLI).Results:MFtn-Ce6 showed effective dual-modality MRI and FLI.A prolonged in vivo circulation and increased tumor accumulation and retention of photosensitizer was observed.The time-dependent distribution of MFtn-Ce6 can be precisely tracked in real time to find the optimal time window for PDT treatment.The colocalization of ferritin and the iron oxide core confirms the high stability of the nanoplatform in vivo.The results showed that mice treated with MFtn-Ce6 exhibited marked tumor-suppressive activity after laser irradiation.Conclusion:The ferritin-based leaking-proof nanoplatform can be used for the efficient delivery of the photosensitizer to achieve an enhanced therapeutic effect.This method established a general approach for the dual-modality imagingguided tumor delivery of PDT agents. 展开更多
关键词 proof distribution RETENTION
下载PDF
Analysis of color difference in digital proofing based on color management system
5
作者 LIN Mao-hai ZHOU Shi-sheng 《通讯和计算机(中英文版)》 2009年第10期32-36,共5页
关键词 色彩管理系统 差异分析 数字打样 爱普生STYLUS 颜色再现 分光光度计 基础 彩色
下载PDF
Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain
6
作者 Jin Wang Wei Ou +3 位作者 Osama Alfarraj Amr Tolba Gwang-Jun Kim Yongjun Ren 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1805-1819,共15页
Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficien... Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficiency of block verification,when the whole transaction on the chain is verified.In order to improve the efficiency and privacy protection of block data verification,this paper proposes an efficient block verification mechanism with privacy protection based on zeroknowledge proof(ZKP),which not only protects the privacy of users but also improves the speed of data block verification.There is no need to put the whole transaction on the chain when verifying block data.It just needs to generate the ZKP and root hash with the transaction information,then save them to the smart contract for verification.Moreover,the ZKP verification in smart contract is carried out to realize the privacy protection of the transaction and efficient verification of the block.When the data is validated,the buffer accepts the complete transaction,updates the transaction status in the cloud database,and packages up the chain.So,the ZKP strengthens the privacy protection ability of blockchain,and the smart contracts save the time cost of block verification. 展开更多
关键词 Blockchain privacy protection zero-knowledge proof smart contract
下载PDF
Union Dyeing Behavior on the Blends of Tencel and Shrink-proofing Wool with the Same Reactive Dyestuffs in One Bath
7
作者 朱泉 吴婵娟 许斌 《Journal of Donghua University(English Edition)》 EI CAS 2002年第1期10-15,共6页
In order to obtain union colour on the blends of Tencel and shrink-proofing wool and improve the efficiency of dyeing process, the dyeing behavior on the blends of Tencel and shrink-proofing wool in the same bath was ... In order to obtain union colour on the blends of Tencel and shrink-proofing wool and improve the efficiency of dyeing process, the dyeing behavior on the blends of Tencel and shrink-proofing wool in the same bath was studied. The Argazol TW reactive dyestuffs were involved in the dyeing process. The parameters under different conditions such as exhaustion, fixation,compatibility as well as soaping fastness were investigated in detail. It is shown that the Argazol TW reactive dyestuffs are suitable for dyeing of blends of Tencel and shrink-proofing wool and good dyeing behavior can be expected. 展开更多
关键词 Tencel shrink-proofing wool Argazol TW reactive dyestuff exhaustion fixation.
下载PDF
数字图像多功能水印综述 被引量:2
8
作者 赵蕾 桂小林 +1 位作者 邵屹杨 戴慧珺 《计算机辅助设计与图形学学报》 EI CSCD 北大核心 2024年第2期195-222,共28页
数字图像多功能水印技术通过将多种类型的水印嵌入到同一图像,以实现2种及以上的图像保护功能(版权保护、内容认证、篡改恢复等).当前,数字图像多功能水印算法仍面临着性能和应用场景等方面的挑战.为促进图像多功能水印的进一步发展,首... 数字图像多功能水印技术通过将多种类型的水印嵌入到同一图像,以实现2种及以上的图像保护功能(版权保护、内容认证、篡改恢复等).当前,数字图像多功能水印算法仍面临着性能和应用场景等方面的挑战.为促进图像多功能水印的进一步发展,首先系统地梳理了数字图像水印技术,包括其系统特性、常见分类、关键技术与成果,以及其可实现的功能与应用场景;在此基础上,对近10年来不同类别的多功能水印嵌入模型(融合水印嵌入、零水印嵌入、水印串行嵌入、水印并行嵌入)的相关工作进行归纳与分析;最后,总结了当前数字图像多功能水印技术的不足,展望了后续研究与发展趋势.综合分析发现,多水印的嵌入难免对水印综合性能造成损失,且多功能水印在真实应用场景中的效果仍待改善.人工智能等新技术在数字图像多功能水印中的应用有望提升算法性能. 展开更多
关键词 数字图像水印 多功能水印 版权保护 内容认证 篡改恢复
下载PDF
A Comparative Analysis of the New -3(-n) - 1 Remer Conjecture and a Proof of the 3n + 1 Collatz Conjecture
9
作者 Mike Remer 《Journal of Applied Mathematics and Physics》 2023年第8期2216-2220,共5页
This scientific paper is a comparative analysis of two mathematical conjectures. The newly proposed -3(-n) - 1 Remer conjecture and how it is related to and a proof of the more well known 3n + 1 Collatz conjecture. An... This scientific paper is a comparative analysis of two mathematical conjectures. The newly proposed -3(-n) - 1 Remer conjecture and how it is related to and a proof of the more well known 3n + 1 Collatz conjecture. An overview of both conjectures and their respective iterative processes will be presented. Showcasing their unique properties and behavior to each other. Through a detailed comparison, we highlight the similarities and differences between these two conjectures and discuss their significance in the field of mathematics. And how they prove each other to be true. 展开更多
关键词 -3(-n) - 1 Remer Conjecture 3n + 1 Collatz Conjecture Comparative Analysis proof Natural Numbers Integer Sequences Factorial Processes Par-tial Differential Equations Bounded Values Collatz Conjecture Collatz Algo-rithm Collatz Operator Collatz Compliance And Mathematical Conjectures
下载PDF
论环境民事公益诉讼中因果关系要件的证明 被引量:2
10
作者 石晓波 卢炳权 《河南社会科学》 CSSCI 北大核心 2024年第2期43-52,共10页
当前,环境民事公益诉讼中因果关系要件的证明责任如何分配及其证明标准如何设定,对此理论界和实务界仍有很大争议。在证明责任分配问题上,解决路径在于参照适用《民法典》第一千二百三十条的规定,由被告承担环境民事公益诉讼中因果关系... 当前,环境民事公益诉讼中因果关系要件的证明责任如何分配及其证明标准如何设定,对此理论界和实务界仍有很大争议。在证明责任分配问题上,解决路径在于参照适用《民法典》第一千二百三十条的规定,由被告承担环境民事公益诉讼中因果关系要件的客观证明责任。与此同时,原告需提供能够证明关联性事实的初步证据。这一规则应当理解为因果关系的法律推定。将因果关系法律推定规则引入环境民事公益诉讼中具有合理性基础,如纠正人们对环境侵权因果关系要件“证明责任倒置”的错误认识、防止原告滥用诉权、平衡原被告双方的举证负担。在证明标准问题上,环境民事公益诉讼中因果关系要件的证明标准应因事后救济性环境民事公益诉讼和预防性环境民事公益诉讼的类型划分而有所区别,且受关联性事实认定标准的影响。 展开更多
关键词 环境民事公益诉讼 因果关系 初步证据 证明责任分配 法律推定 证明标准
下载PDF
基于防虫网+的热区豇豆病虫害生态调控策略 被引量:1
11
作者 王硕 吕宝乾 +3 位作者 王树昌 吴圣勇 谢文 张起恺 《热带农业科学》 2024年第7期27-35,共9页
豇豆是海南重要冬季瓜菜之一,生产受蓟马、斑潜蝇和枯萎病危害严重。目前海南豇豆病虫害防控主要依赖于化学农药,使得蓟马等抗性增强、农药残留超标,当地环境生物多样性受影响。对海南豇豆病虫害的现状及其防控中技术单一、滥用农药等... 豇豆是海南重要冬季瓜菜之一,生产受蓟马、斑潜蝇和枯萎病危害严重。目前海南豇豆病虫害防控主要依赖于化学农药,使得蓟马等抗性增强、农药残留超标,当地环境生物多样性受影响。对海南豇豆病虫害的现状及其防控中技术单一、滥用农药等问题进行分析,并提出了功能植物的引入、景观设计优化、农业管理的改进以及生物防治与科学用药4项主要生态调控技术,提出了具体的实施方案,为海南豇豆种植业的可持续发展提供科学指导和实践依据。 展开更多
关键词 绿色防控 生态调控 防虫网+ 功能植物 景观设计
下载PDF
司法实践中“证据标准”之评析 被引量:3
12
作者 纵博 《地方立法研究》 CSSCI 2024年第2期110-130,共21页
“证据标准”是我国近年刑事司法实践中发展出的一个区别于“证明标准”的独特概念,其核心是指某类犯罪定罪量刑所需的基本证据,另外还包括收集各类证据应遵循的程序性规范和技术性规范。“统一证据标准”不应作为“以审判为中心”诉讼... “证据标准”是我国近年刑事司法实践中发展出的一个区别于“证明标准”的独特概念,其核心是指某类犯罪定罪量刑所需的基本证据,另外还包括收集各类证据应遵循的程序性规范和技术性规范。“统一证据标准”不应作为“以审判为中心”诉讼制度改革的核心,因为“统一证据标准”不仅无助于庭审实质化的实现,还会妨碍法官对证据的主观判断。“证据标准”并非一种法定证据制度,但由于它本身具有一些违反诉讼证明原理之处,所以仍会给我国的刑事证明带来一些消极影响,包括强化诉讼证明偏重客观化的倾向、抹杀不同类型案件证明路径的差异性、使控方在收集和审查证据中侧重于指控有罪的心理偏差更为严重。“证据标准”对侦查取证环节可以发挥一定的积极作用,有利于指引和规范侦查取证,也有利于过程证据、辅助证据的收集。总体上看,“证据标准”弊大于利,并非我国刑事诉讼程序和证据制度完善所必需,可以予以舍弃;即便要继续运用,也应将其限于侦查取证阶段,并将其改造为一种指导性、全面性的取证指南,才能使其在合理范围内发挥作用。 展开更多
关键词 证据标准 证明标准 取证指南 以审判为中心
下载PDF
A Proof of Brouwer’s Fixed Point Theorem Using Sperner’s Lemma
13
作者 Cassie Lu 《数学计算(中英文版)》 2023年第2期1-6,共6页
This article offers a simple but rigorous proof of Brouwer’s fixed point theorem using Sperner’s Lemma.The general method I have used so far in the proof is mainly to convert the n-dimensional shapes to the correspo... This article offers a simple but rigorous proof of Brouwer’s fixed point theorem using Sperner’s Lemma.The general method I have used so far in the proof is mainly to convert the n-dimensional shapes to the corresponding case under the Sperner’s Labeling and apply the Sperner’s Lemma to solve the question. 展开更多
关键词 Brouwer’s Fixed Point Theorem Sperner’s Lemma proof
下载PDF
矿井无线电波防爆安全发射功率研究 被引量:4
14
作者 孙继平 彭铭 《工矿自动化》 CSCD 北大核心 2024年第3期1-5,共5页
5G,5.5G,WiFi6,WiFi7,UWB,ZigBee等矿井移动通信系统及人员和车辆定位系统等发射的大功率无线电波有点燃瓦斯和煤尘的风险。因此,需要合理设置防爆无线电设备发射的无线电波防爆安全功率阈值,限制防爆无线电设备发射的无线电波功率。欧... 5G,5.5G,WiFi6,WiFi7,UWB,ZigBee等矿井移动通信系统及人员和车辆定位系统等发射的大功率无线电波有点燃瓦斯和煤尘的风险。因此,需要合理设置防爆无线电设备发射的无线电波防爆安全功率阈值,限制防爆无线电设备发射的无线电波功率。欧洲标准CLC/TR 50427:2004《Assessment of inadvertent ignition of flammable atmospheres by radio-frequency radiation-Guide》规定了爆炸性气体环境中无线电波防爆安全接收点火功率阈值,但缺少无线电波防爆安全发射功率阈值的内容。国家标准GB/T 3836.1—2021《爆炸性环境第1部分:设备通用要求》和国际标准IEC 60079-0:2017《Explosive atmospheres-Part 0:Equipment-General requirements》虽然有无线电波防爆安全发射功率阈值的相关规定,但错误地将欧洲标准CLC/TR 50427:2004中的无线电波防爆安全接收点火功率阈值修改为无线电波防爆安全发射功率阈值,大大降低了爆炸性环境中无线电设备所能允许的最大发射功率。由于煤矿井下没有能作为接收天线的起重机这类细长结构物体,且现有矿井无线通信及定位系统工作频率均远大于30 MHz,所以,无线电波防爆安全接收点火功率阈值应为8 W,而不是国家标准GB/T 3836.1—2021和国际标准IEC 60079-0:2017规定的无线电波防爆安全发射功率阈值6 W。在发射天线发射的无线电波能量全部被等效天线吸收的最不利于无线电防爆的传输和耦合情况下,无线电设备工作频率为等效天线谐振频率时,接收点火功率达到最大,为等效天线接收的总功率的一半,即发射功率的一半。在实际工程中,无线传输效率和耦合效率均不会为1,因此,无线电波防爆安全发射功率阈值应是无线电波防爆安全接收点火功率阈值2倍以上。煤矿井下无线电波防爆安全接收点火功率阈值为8 W,因此,煤矿井下无线电波防爆安全发射功率阈值应大于16 W。 展开更多
关键词 矿井无线电波 防爆安全 接收点火功率 发射功率
下载PDF
无线电波发射功率防爆要求与检测方法 被引量:1
15
作者 孙继平 彭铭 《工矿自动化》 CSCD 北大核心 2024年第6期1-5,22,共6页
现行国家标准GB/T 3836.1—2021《爆炸性环境第1部分:设备通用要求》和国际标准IEC 60079-0:2017《Explosive atmospheres-Part 0:Equipment-General requirements》规定无线电发射器的阈功率为无线电发射器的有效输出功率与天线增益的... 现行国家标准GB/T 3836.1—2021《爆炸性环境第1部分:设备通用要求》和国际标准IEC 60079-0:2017《Explosive atmospheres-Part 0:Equipment-General requirements》规定无线电发射器的阈功率为无线电发射器的有效输出功率与天线增益的乘积。在无线电波防爆安全发射功率阈值一定的条件下,天线增益越大,无线电发射器的有效输出功率就越小,这将限制通过增大天线增益,提高无线传输距离。因此,有必要对国家标准GB/T 3836.1—2021和国际标准IEC 60079-0:2017中规定的阈功率的正确性进行研究,提出合理的无线电波发射功率防爆要求与检测方法。提出了无线电波防爆安全发射功率与天线增益无关,国家标准GB/T 3836.1—2021和国际标准IEC 60079-0:2017规定的无线电发射器的阈功率是错误的。提出了煤矿井下无线电波防爆安全发射功率阈值应大于16 W,且与天线增益无关;国家标准GB/T 3836.1—2021和国际标准IEC 60079-0:2017规定阈功率不得大于6 W,且与天线增益相关,是错误的。提出了无线电波防爆安全性能检测方法——检测无线电发射器输出功率,这既可保证通过检测的防爆无线电设备的防爆安全,又简化了检测方法,更提高了防爆无线电设备的无线电波发射功率,解除了对天线增益的限制,将大大提高煤矿井下防爆无线电设备的无线传输距离。 展开更多
关键词 矿井无线电波 防爆安全 天线增益 发射功率 输出功率 防爆安全性能检测
下载PDF
基于强化样本的伪孪生网络图像篡改定位模型
16
作者 王金伟 张子荷 +1 位作者 罗向阳 马宾 《网络与信息安全学报》 2024年第1期33-47,共15页
随着互联网不断发展,网络上的篡改图像越来越多,掩盖篡改痕迹的手段越来越丰富。而现在大多数检测模型没有考虑到图像后处理操作对篡改检测算法的影响,限制了其在实际生活中的应用。为了解决上述问题,提出了一种通用的基于强化样本的伪... 随着互联网不断发展,网络上的篡改图像越来越多,掩盖篡改痕迹的手段越来越丰富。而现在大多数检测模型没有考虑到图像后处理操作对篡改检测算法的影响,限制了其在实际生活中的应用。为了解决上述问题,提出了一种通用的基于强化样本的伪孪生网络图像篡改定位模型。所提模型利用伪孪生网络,一方面学习真实图像中的篡改特征;另一方面通过约束卷积,抑制图像内容,从而能够更加关注篡改残留的痕迹信息。网络的两分支结构可以达到充分利用图像特征信息的目的。模型利用强化样本,可以自适应地生成当前最需要学习的篡改类型图片,实现对模型有针对性地训练,使得模型在各个方向上学习收敛,最终得到全局最优模型。利用数据增强思路,自动生成丰富的篡改图像以及其对应的掩膜,这很好地解决了篡改数据集有限的问题。在4个数据集上的大量实验证明了所提模型在像素级操作检测方面的可行性和有效性。尤其是在Columbia数据集上,算法的F1值提高了33.5%,Matthews correlation coefficirnt(MCC)得分提高了23.3%,说明所提模型利用深度学习模型的优点,显著提高了篡改定位的检测效果。 展开更多
关键词 强化样本 篡改定位 伪孪生网络 数据增强 篡改图像
下载PDF
新时期刑事印证证明的误解与澄清 被引量:1
17
作者 张庆立 《辽宁警察学院学报》 2024年第1期40-46,共7页
印证是从属于自由心证的证明过程,既无法涵盖所有的犯罪类型,也无法适用于所有的待证事实,故无法成为与法定证明、自由证明相并列的一类新模式。但作为方法,印证证明仍然具有重要地位,实践中被广泛诟病的虚假印证、误解印证等不符合印... 印证是从属于自由心证的证明过程,既无法涵盖所有的犯罪类型,也无法适用于所有的待证事实,故无法成为与法定证明、自由证明相并列的一类新模式。但作为方法,印证证明仍然具有重要地位,实践中被广泛诟病的虚假印证、误解印证等不符合印证要求,故冤假错案也不能归咎于印证本身。实践中,印证证明与证明标准混同的问题突出,事实上二者之间既有联系又有区别,呈现方法和目的的关系,方法自然不同于目的,但方法是达成目的的手段,目的是方法努力的终点。因此,尽管印证具有提升裁判者心证的积极意义,但不能人为拔高至证明模式的程度,在实践中既要反对意图抛弃印证的“冤假错案成因论”,也要反对过度崇尚印证的“证明标准等同论”。 展开更多
关键词 刑事印证 证明模式 冤假错案 证明标准
下载PDF
刑事抽样证明扩张适用的风险及防控 被引量:2
18
作者 姚显森 张遥远 《河南财经政法大学学报》 CSSCI 2024年第1期132-144,共13页
为应对网络犯罪海量证据运用与罪量证明难题,司法解释扩张了刑事抽样证明的适用范围。这种扩张适用主要表现为从法定的特殊犯罪拓展为具有海量证据的犯罪,从实物证据扩张至部分言词证据,从控诉方延伸至辩护方。然而,在相关规则尚不完备... 为应对网络犯罪海量证据运用与罪量证明难题,司法解释扩张了刑事抽样证明的适用范围。这种扩张适用主要表现为从法定的特殊犯罪拓展为具有海量证据的犯罪,从实物证据扩张至部分言词证据,从控诉方延伸至辩护方。然而,在相关规则尚不完备的情况下,易出现过度减轻控诉方的证明义务,不当加重辩护方的辩护负担,大幅增加审判方的裁判错误等风险。鉴此,应系统建构风险防控的技术与法律机制。在技术方面,抽样总体满足数量与同质性要求,抽样样本量采用数量和比例相结合的判定标准,抽样方法应当具有可靠性。在法律方面,建立健全刑事抽样证明适用必要性的司法审查机制,明确规定刑事抽样证明主体的抽样开示义务,严格要求刑事抽样证明必须达到排除合理怀疑标准。 展开更多
关键词 刑事抽样证明 海量证据 网络犯罪 扩张适用
下载PDF
中国式刑事证明结构:分段包干与选择性接力 被引量:1
19
作者 李昌盛 《浙江工商大学学报》 CSSCI 北大核心 2024年第1期60-71,共12页
1979年颁行的《刑事诉讼法》确立了我国分段包干与选择性接力的证明结构。它既体现在侦诉审关系中,也体现在上下审关系中。在这一结构中,公检法在各自主导的诉讼阶段只有调查程序和方式的差异,并无查证责任和目标的差异。后端办案机关... 1979年颁行的《刑事诉讼法》确立了我国分段包干与选择性接力的证明结构。它既体现在侦诉审关系中,也体现在上下审关系中。在这一结构中,公检法在各自主导的诉讼阶段只有调查程序和方式的差异,并无查证责任和目标的差异。后端办案机关有接力查证的责任。接力者具有依照法定证明标准选择是否接力的判断权,也有选择接力主体、范围和方法的裁量权。《刑事诉讼法》虽然历经多次修改,但均朝着优化结构的方向前行。我国刑事证明结构具有如下鲜明特色:一是事实认定权力的去中心主义,二是专门机关查证责任的同质化,三是查证范围认定权的单元化,四是“调查”真相演变为“接着查”真相,五是作为查明真相协助者的辩方。 展开更多
关键词 刑事证明结构 分段包干 选择性接力 查证责任
下载PDF
边缘异常识别下视频图像篡改细节检测
20
作者 陈烽 杨怀 《计算机仿真》 2024年第2期192-195,226,共5页
视频图像不同栅格位置或不同压缩区域被合成为篡改图像时会出现特征块效应的差异,改变原视频的关键信息。为了准确识别图像中被篡改的像素点,提出基于边缘异常识别的视频图像篡改检测方法。通过离散余弦变换,将能量全部集中到图像的低... 视频图像不同栅格位置或不同压缩区域被合成为篡改图像时会出现特征块效应的差异,改变原视频的关键信息。为了准确识别图像中被篡改的像素点,提出基于边缘异常识别的视频图像篡改检测方法。通过离散余弦变换,将能量全部集中到图像的低频系数内,描述出视频的边缘等细节。利用能量比与频域熵间关系得出图像中能量的可疑度,结合预测掩膜概率图划分出发生篡改的位置区域。利用Sobel边缘检测边缘点,量化边缘点特征判断出边缘是否异常,当出现异常对其跟踪直至目标消失,检测出视频图像中的篡改位置区域。实验结果表明,所提方法能够精准检测出视频图像被篡改位置,且耗时低于1ms,应用优势显著。 展开更多
关键词 边缘异常 视频图像篡改 能量可疑度 预测掩膜概率图 篡改检测
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部