期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
浅谈间接故意
1
作者 刘东昱 《魅力中国》 2011年第7期328-329,共2页
无需多言,世界各国刑法体系对故意犯罪实施处罚的态度是一致的,然而能够在立法中明确故意犯罪的实质概念却不容易。最大的困难是对间接故意的实质概念难以确定,即对间接故意的认识因素与意志因素在心理上的本质反映,十分抽象并且个... 无需多言,世界各国刑法体系对故意犯罪实施处罚的态度是一致的,然而能够在立法中明确故意犯罪的实质概念却不容易。最大的困难是对间接故意的实质概念难以确定,即对间接故意的认识因素与意志因素在心理上的本质反映,十分抽象并且个案差异难以把握。而间接故意实际上充当了故意成立的底线,它不仅划分出了与过失的界限,而且也为故意的成立设立了最后的屏障,刻画出了刑法处罚故意犯罪,追究故意责任的最低容忍程度. 展开更多
关键词 间接故意 容认 放任 意志
下载PDF
污染环境罪与投放危险物质罪竞合关系的教义学分析
2
作者 张轩铭 《黑龙江省政法管理干部学院学报》 2022年第1期46-50,共5页
司法实践中,“严重污染环境”的认定标准包含了被挑选的“人类法益的侵害表现”,而污染环境罪的公害性表现出一种投放危险物质罪所要求的“不特定”,因而公共安全也被部分学者认为是污染环境罪的法益。但根据构成要件的故意规制机能,行... 司法实践中,“严重污染环境”的认定标准包含了被挑选的“人类法益的侵害表现”,而污染环境罪的公害性表现出一种投放危险物质罪所要求的“不特定”,因而公共安全也被部分学者认为是污染环境罪的法益。但根据构成要件的故意规制机能,行为人所认识的受到侵害的法益内容只能是环境法益。两罪的竞合关系不是法条竞合而是想象竞合。对于两罪竞合关系问题的解决,应重回对公共安全犯罪故意的认定,以及强调想象竞合的明示机能。 展开更多
关键词 故意规制机能 想象竞合 容认 明示机能
下载PDF
An H.264/AVC Video Watermarking Scheme in VLC Domain for Content Authentication 被引量:1
3
作者 Sun Tanfeng Jiang Xinghao +3 位作者 Lin Zhigao Zhou Yue Lu Huan Wang Shilin 《China Communications》 SCIE CSCD 2010年第6期30-36,共7页
A semi-fragile content authentication algorithm is proposed for low bit-rate H.264/AVC video in VLC domain. Utilizing the intra prediction mode and coded block pattern in VLC domain, the proposed algorithm chooses tho... A semi-fragile content authentication algorithm is proposed for low bit-rate H.264/AVC video in VLC domain. Utilizing the intra prediction mode and coded block pattern in VLC domain, the proposed algorithm chooses those macro-blocks from which the signature is extracted and constructs content signature at macro-block level according to the relationship among the energies of quantized low-frequency coefficients of sub-macroblocks. The signature is embedded by modifying the trailing coefficients. The experimental results show that the proposed algorithm performs well in visual quality impact and keep the bit-rate basically unchanged. In addition, the algorithm can embed signatures into I, P, B slices simultaneously and remarkably enhances the watermark capacity. By verifying the extracted signature, the algorithm can detect and locate video tampering efficiently. 展开更多
关键词 H.264/AVC video watermarking content authentication VLC domain semi-fragile watermarking
下载PDF
A multiple watermarks algorithm for image content authentication
4
作者 蔡立军 李睿 易叶青 《Journal of Central South University》 SCIE EI CAS 2012年第10期2866-2874,共9页
A novel multiple watermarks cooperative authentication algorithm was presented for image contents authentication.This algorithm is able to extract multiple features from the image wavelet domain,which is based on that... A novel multiple watermarks cooperative authentication algorithm was presented for image contents authentication.This algorithm is able to extract multiple features from the image wavelet domain,which is based on that the t watermarks are generated.Moreover,a new watermark embedding method,using the space geometric model,was proposed,in order to effectively tackle with the mutual influences problem among t watermarks.Specifically,the incidental tampering location,the classification of intentional content tampering and the incidental modification can be achieved via mutual cooperation of the t watermarks.Both the theoretical analysis and simulations results validate the feasibility and efficacy of the proposed algorithm. 展开更多
关键词 multiple watermarks cooperation authentication wavelet transform image wavelet domain intentional contenttampering incidental modification
下载PDF
Task Complexity and Second Language Teaching
5
作者 GAO Hai-long 《Sino-US English Teaching》 2016年第12期924-927,共4页
In the past few years, the notion of task complexity has been receiving substantial attention in the field of second language acquisition. This paper explores task complexity from the cognitive perspective by analyzin... In the past few years, the notion of task complexity has been receiving substantial attention in the field of second language acquisition. This paper explores task complexity from the cognitive perspective by analyzing two studies with Skehan's limited capacity hypothesis and Robinson's cognition hypothesis. The two studies, namely You-Jin Kim's (2012) and Mirdamadi and Jong (2015), explore on how linguistic complexity affects language performance. Two hypotheses, Skehan's limited capacity hypothesis and Robinson's cognition hypothesis, explain the two studies from the cognitive perspective by predicting either that increasing task complexity reduces a pool of attentional capacity during task performance or that increasing complex tasks promotes greater accuracy and complexity of speech and writing. It is suggested that language teaching, syllabus designing in particular, should be based on the basis of task complexity. 展开更多
关键词 task complexity limited capacity hypothesis cognition hypothesis
下载PDF
论间接故意与轻信过失之司法认定——以盖然性理论为视野 被引量:3
6
作者 汤火箭 叶睿 《西南民族大学学报(人文社会科学版)》 CSSCI 北大核心 2008年第11期224-228,共5页
容认说虽准确区分了间接故意与轻信过失在意志因素方面之本质差异,但其强调对心理状态之探求使得司法认定工作面临困境。实体法层面之概念区分与具体实践之司法认定是两个层面的工作。应当在坚持容认说之基础上将盖然性理论引入间接故... 容认说虽准确区分了间接故意与轻信过失在意志因素方面之本质差异,但其强调对心理状态之探求使得司法认定工作面临困境。实体法层面之概念区分与具体实践之司法认定是两个层面的工作。应当在坚持容认说之基础上将盖然性理论引入间接故意与轻信过失之司法认定,以建立起客观外化且切实可行的认定标准。 展开更多
关键词 盖然性说 容认 间接故意 轻信过失 司法认定
原文传递
同语的语用功能及相关句法、语义问题 被引量:1
7
作者 霍四通 《语言研究集刊》 2007年第1期107-126,326,共21页
同语是跨语言的一种语言现象,也是修辞学和语法学研究共同关心的一种语言现象,值得深入探讨。汉语中的同语按语用功能大致可分为机警式同语和容认式同语两大类。但历时和共时的语料都证明这种功能类别和句法形式不是简单对应关系。同语... 同语是跨语言的一种语言现象,也是修辞学和语法学研究共同关心的一种语言现象,值得深入探讨。汉语中的同语按语用功能大致可分为机警式同语和容认式同语两大类。但历时和共时的语料都证明这种功能类别和句法形式不是简单对应关系。同语的对举和连用不改变其基本语用功能。很多句式和同语的关系还需要进一步研究。 展开更多
关键词 同语 语用 机警 容认
原文传递
我国刑法中犯罪故意涵义的反思
8
作者 洪求华 《刑事法评论》 2019年第1期154-174,共21页
犯罪故意包括认识因素和意志因素,但我国刑法总则规定的犯罪故意的认识内容不甚科学,应将认识内容界定为犯罪的构成要件事实;总则规定间接故意的意志因素是放任也不甚科学,应改为容认,并赋予其更多的内涵。犯罪故意的意志因素与认识因... 犯罪故意包括认识因素和意志因素,但我国刑法总则规定的犯罪故意的认识内容不甚科学,应将认识内容界定为犯罪的构成要件事实;总则规定间接故意的意志因素是放任也不甚科学,应改为容认,并赋予其更多的内涵。犯罪故意的意志因素与认识因素二者的关系是驱动与被驱动、支配与被支配的阶梯式层级关系,即意志因素属于第一层级,认识因素属于意志活动的第二层级。基于传统立法的不科学性,建议修改犯罪故意的条文。 展开更多
关键词 认识因素 意志要素 容认 层级关系
原文传递
A Semi-Fragile Wavelet Transform Watermarking Scheme for Content Authentication of Images
9
作者 宋好好 张艳 邹春明 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第5期569-573,共5页
A novel semi-fragile watermarking scheme for the content authentication of images using wavelet transform(WT) is presented in this paper.It is tolerant to the embedded wavelet image compression methods based on WT suc... A novel semi-fragile watermarking scheme for the content authentication of images using wavelet transform(WT) is presented in this paper.It is tolerant to the embedded wavelet image compression methods based on WT such as embedded zerotree wavelet(EZW) ,set partitioning in hierarchical trees(SPIHT) and embedded block coding with optimized truncation(EBCOT) in JPEG2000 to a pre-determined bit-plane,but is sensitive to all other malicious attacks.The image features are generated from the lowest-frequency(LF) subband of the original image as the embedded watermark.The watermark is embedded into the pre-determined bit-plane by adjusting the corresponding values in the given subband.In the process of watermarking authentication,we compare the image features generated from the LF subband of the received image with the embedded watermarking information(the image features of the original image) extracted from the pre-determined bit-plane in the given subband of the received image to decide whether the image is attacked maliciously or processed acceptably(the embedded wavelet compression) .The most important advantage of our watermarking scheme is that the watermark information can be extracted from the watermarked image when detecting watermark,so the received image authentication needs no information about the original image or watermark.Experimental results prove the effectiveness of our proposed watermarking scheme. 展开更多
关键词 WAVELET image watermarking information security SEMI-FRAGILE
原文传递
A SURVEY ON LEARNING STYLE ACCOMMODATION IN COLLEGE EFL CLASSROOM 被引量:1
10
作者 王晓光 《Chinese Journal of Applied Linguistics》 2007年第2期115-124,共10页
For effective second language learning, the compatibility between the learners' learning preferences and teachers' instructional approaches in classroom learning activities is of crucial importance. However, t... For effective second language learning, the compatibility between the learners' learning preferences and teachers' instructional approaches in classroom learning activities is of crucial importance. However, there is some incongruity in between in the college EFL classroom in China, which has very much hindered students' language learning progress. Based on statistical survey and classroom observations, the paper examines the general differences in college students' learning preferences, presents some findings on the various conflicting situations, and discusses its implications for second language learning and teaching. 展开更多
关键词 learning style EFL classroom compatibility CONFLICT
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部