期刊文献+
共找到38,274篇文章
< 1 2 250 >
每页显示 20 50 100
弹性退休制度下谁更愿意延迟退休?——基于Option Value模型的微观模拟
1
作者 郭秀云 李悦心 《人口与发展》 CSSCI 北大核心 2024年第4期132-144,共13页
人口老龄化背景下延迟退休年龄、建立弹性退休制度是大势所趋。养老金激励是弹性退休制度的重要内容。建立期权价值模型和养老金给付及奖惩因子模型,基于中国家庭收入调查项目(CHIP2018)的数据,对不同特征人群的养老金峰值、期权价值、... 人口老龄化背景下延迟退休年龄、建立弹性退休制度是大势所趋。养老金激励是弹性退休制度的重要内容。建立期权价值模型和养老金给付及奖惩因子模型,基于中国家庭收入调查项目(CHIP2018)的数据,对不同特征人群的养老金峰值、期权价值、内部报酬率进行模拟。研究发现:养老金总财富随退休年龄“先增后减”,男性的峰值年龄早于女性;引入养老金“奖惩”机制有助于提高最优退休年龄,激励劳动者延迟退休;考虑闲暇偏好的异质性,男性参保者更倾向于早退休,而女性参保者特别是女性较高收入群体更愿意延迟退休;厌恶风险的参保者更有可能选择早退休。建议尽早建立弹性退休年龄政策体系,增加劳动者的选择权和制度灵活性;引入精算调节因子构建养老金奖惩机制,完善养老保险待遇计发办法。 展开更多
关键词 延迟退休 养老金财富 option Value模型
下载PDF
基于IUV_5G Option3X架构网络规划与部署设计
2
作者 卢善勇 许景渊 《中国宽带》 2024年第1期1-3,共3页
本文基于IUV_5G Option3X架构,详细阐述了5G网络的规划与部署设计过程。首先介绍了5G NSA组网架构的背景和优势,然后深入探讨了IUV_5G全网部署与优化虚拟仿真平台的功能和应用。重点描述了核心网、无线网和承载网的部署过程,包括设备部... 本文基于IUV_5G Option3X架构,详细阐述了5G网络的规划与部署设计过程。首先介绍了5G NSA组网架构的背景和优势,然后深入探讨了IUV_5G全网部署与优化虚拟仿真平台的功能和应用。重点描述了核心网、无线网和承载网的部署过程,包括设备部署、数据配置和线路连接等具体步骤。通过业务验证确认了网络部署的成功,并对5G技术的未来发展进行了展望。 展开更多
关键词 5G网络 option3X架构 NSA组网 虚拟仿真平台 核心网
下载PDF
基于兴趣函数的多样化Option-Critic算法
3
作者 栗军伟 刘全 +1 位作者 黄志刚 徐亚鹏 《计算机研究与发展》 EI CSCD 北大核心 2024年第12期3108-3120,共13页
Option框架作为分层强化学习的一种常用时序抽象方法,允许智能体在不同的时间尺度上学习策略,可以有效解决稀疏奖励问题.为了保证Option可以引导智能体访问更多的状态空间,一些方法通过引入基于互信息的内部奖励和终止函数来提升Option... Option框架作为分层强化学习的一种常用时序抽象方法,允许智能体在不同的时间尺度上学习策略,可以有效解决稀疏奖励问题.为了保证Option可以引导智能体访问更多的状态空间,一些方法通过引入基于互信息的内部奖励和终止函数来提升Option内部策略的多样性.但这会导致算法学习速度慢和内部策略的知识迁移能力低等问题,严重影响了算法性能.针对以上问题,提出基于兴趣函数优化的多样化Option-Critic算法(diversity-enriched Option-Critic algorithm with interest functions,DEOC-IF).该算法在多样化Option-Critic算法(diversity-enriched Option-Critic,DEOC)的基础上,通过引入兴趣函数约束上层策略对Option内部策略的选择,既保证了Option集合的多样性,又使得学习到的内部策略可以关注状态空间的不同区域,有利于提高算法的知识迁移能力,加快学习速度.此外,DEOC-IF算法引入一种新的兴趣函数更新梯度,有利于提高算法的探索能力.为了验证算法的有效性和知识迁移能力,分别在4房间导航任务、Mujoco和MiniWorld实验环境中,将DEOC-IF算法与其他最新算法进行对比实验.结果表明,DEOC-IF算法具有更好的性能优势和策略迁移能力. 展开更多
关键词 强化学习 时序抽象 option框架 兴趣函数 option-Critic算法
下载PDF
基于互信息优化的Option-Critic算法
4
作者 栗军伟 刘全 徐亚鹏 《计算机科学》 CSCD 北大核心 2024年第2期252-258,共7页
时序抽象作为分层强化学习的重要研究内容,允许分层强化学习智能体在不同的时间尺度上学习策略,可以有效解决深度强化学习难以处理的稀疏奖励问题。如何端到端地学习到优秀的时序抽象策略一直是分层强化学习研究面临的挑战。Option-Crit... 时序抽象作为分层强化学习的重要研究内容,允许分层强化学习智能体在不同的时间尺度上学习策略,可以有效解决深度强化学习难以处理的稀疏奖励问题。如何端到端地学习到优秀的时序抽象策略一直是分层强化学习研究面临的挑战。Option-Critic(OC)框架在Option框架的基础上,通过策略梯度理论,可以有效解决此问题。然而,在策略学习过程中,OC框架会出现Option内部策略动作分布变得十分相似的退化问题。该退化问题影响了OC框架的实验性能,导致Option的可解释性变差。为了解决上述问题,引入互信息知识作为内部奖励,并提出基于互信息优化的Option-Critic算法(Option-Critic Algorithm with Mutual Information Optimization,MIOOC)。MIOOC算法结合了近端策略Option-Critic(Proximal Policy Option-Critic,PPOC)算法,可以保证下层策略的多样性。为了验证算法的有效性,把MIOOC算法和几种常见的强化学习方法在连续实验环境中进行对比实验。实验结果表明,MIOOC算法可以加快模型学习速度,实验性能更优,Option内部策略更有区分度。 展开更多
关键词 深度强化学习 时序抽象 分层强化学习 互信息 内部奖励 option多样性
下载PDF
Pricing Catastrophe Options with Credit Risk in a Regime-Switching Model
5
作者 XU Yajuan WANG Guojing 《应用概率统计》 CSCD 北大核心 2024年第4期572-587,共16页
In this paper,we consider the price of catastrophe options with credit risk in a regime-switching model.We assume that the macroeconomic states are described by a continuous-time Markov chain with a finite state space... In this paper,we consider the price of catastrophe options with credit risk in a regime-switching model.We assume that the macroeconomic states are described by a continuous-time Markov chain with a finite state space.By using the measure change technique,we derive the price expressions of catastrophe put options.Moreover,we conduct some numerical analysis to demonstrate how the parameters of the model affect the price of the catastrophe put option. 展开更多
关键词 PRICING catastrophe option credit risk REGIME-SWITCHING measure change
下载PDF
Influence of acceleration stage electrode voltage on the performance of double-stage Hall effect thruster with adjustable zero magnetic point
6
作者 陈龙 高维富 +5 位作者 崔作君 段萍 许雪松 阚子晨 檀聪琦 陈俊宇 《Plasma Science and Technology》 SCIE EI CAS CSCD 2024年第6期60-69,共10页
The configuration of electrode voltage and zero magnetic point position has a significant impact on the performance of the double-stage Hall effect thruster. A 2D-3V model is established based on the two-magnetic peak... The configuration of electrode voltage and zero magnetic point position has a significant impact on the performance of the double-stage Hall effect thruster. A 2D-3V model is established based on the two-magnetic peak type double-stage Hall thruster configuration, and a particle-in-cell simulation is carried out to investigate the influences of both acceleration electrode voltage value and zero magnetic point position on the thruster discharge characteristics and performances.The results indicate that increasing the acceleration voltage leads to a larger potential drop in the acceleration stage, allowing ions to gain higher energy, while electrons are easily absorbed by the intermediate electrode, resulting in a decrease in the anode current and ionization rate. When the acceleration voltage reaches 500 V, the thrust and efficiency are maximized, resulting in a 15%increase in efficiency. After the acceleration voltage exceeds 500 V, a potential barrier forms within the channel, leading to a decrease in thruster efficiency. Further study shows that as the second zero magnetic point moves towards the outlet of the channel, more electrons easily traverse the zero magnetic field region, participating in the ionization. The increase in the ionization rate leads to a gradual enhancement in both thrust and efficiency. 展开更多
关键词 Hall thruster particle-in-cell simulation intermediate electrode zero magnetic point
下载PDF
Modeling the Spatio-Temporal Dynamics of Local Context for a Contextualized Diffusion of Agroecological Intensification Options in Niger
7
作者 Nouhou Salifou Jangorzo Maud Loireau +3 位作者 Abou-Soufianou Sadda Ousmane Sami Mari Abdoul-Aziz Saïdou Hassane Bil-Assanou Issoufou 《International Journal of Geosciences》 CAS 2024年第3期270-301,共32页
Spatio-temporal variability and dynamics in Sahelian agro-pastoral zones make each local situation a special case. These specificities must be considered to guide the dissemination of agricultural options with a view ... Spatio-temporal variability and dynamics in Sahelian agro-pastoral zones make each local situation a special case. These specificities must be considered to guide the dissemination of agricultural options with a view to sustainable development. The territorial scale of municipalities is not sufficient for this necessary contextualization;the scale of the “village terroir” seems to be a better option. This is the hypothesis we put forward in the framework of the Global Collaboration for Resilient Food Systems program (CRFS), i.e. local context is spatially defined by village terroir. The study is based on data collected through participatory mapping and surveys in “village terroirs” in three regions of Niger (Maradi, Dosso and Tillabéri). Then the links between farm managers and their cultivated land, as well as the spatio-temporal dynamics of local context are analyzed. This study provides evidence of the existence and functional usefulness of the village terroir for farmers, their land management and their activities. It demonstrates the usefulness of contextualizing agricultural options at this scale. Their analysis elucidates the links between “terroirs village” and the specific functioning of the agrosocio-ecosystems acting on each of them, thus laying the systemic and geographical foundations for a model of the spatio- temporal dynamics of “village terroirs”. This initial work has opened up new perspectives in modeling and sustainable development. 展开更多
关键词 NIGER option by Context Local Condition Complex System Multiscale Conceptual Modeling
下载PDF
A Cross-Sectional Study on the Impact of Operation Triple Zero (OTZ) Program on Viral Load Suppression amongst Members of the Adolescent Club in 68 Nigerian Army Reference Hospital Yaba Lagos, Nigeria
8
作者 Nkechinyere Harrison Ismail Lawal +7 位作者 Yakubu Adamu Kehinde Aribisala Adegbenga Olarinoye Uzoamaka Agbaim Funmilayo Owolabi Dooshima Okonkwo Laura Chittenden Nathan Okeji 《World Journal of AIDS》 2024年第2期35-44,共10页
Background: In Nigeria, adolescents and young people (AYP) aged 10 - 24, comprise 22.3% of the population and with HIV prevalence of 3.5%. The AYP living with HIV enrolled at the 68 NARHY, Lagos reflects the national ... Background: In Nigeria, adolescents and young people (AYP) aged 10 - 24, comprise 22.3% of the population and with HIV prevalence of 3.5%. The AYP living with HIV enrolled at the 68 NARHY, Lagos reflects the national challenges with poor viral suppression. The OTZ program aligns with the UNAIDS 95-95-95 goals. It seeks to empower AYPLHIV to be in charge of their treatment and commit to triple zero outcomeszero missed appointments, zero missed drugs, and zero viral loads. The purpose of the study was to assess the impact of the OTZ program on viral load suppression among members of the adolescent club in 68 NARHY, Lagos. Method: A cross-sectional retrospective study to evaluate the impact of the OTZ program on the viral load of 53 AYP enrolled in the OTZ program between March 2019 to December 2019 was analyzed. The Percentage of viral load suppression before enrollment compared with 6 and 12 months after enrollment into the OTZ program. The AYP is grouped into 10 - 14, 15 - 19, and 20 - 24 years. Activities conducted were peer driven monthly meetings with the AYP during which the adolescents interacted on issues relating to improving their treatment outcomes, healthcare workers reviewed their clinical status, viral load result, provider peer counseling, and caregivers engagement to support adherence to medication and ARV refills. Results: Before OTZ, 81% aged 10 - 14 years, 75% aged 15 - 19 years, and 25% aged 20 - 24 years were virally suppressed (VL less than 1000 copies/ml). Six months after enrollment, 94% were virally suppressed95% aged 10 - 14 years, 96% aged 15 - 19 years, and 66% aged 20-24 years. Twelve months after enrollment, 96% of AYP were virally suppressed100% aged 10-14 years, 93% aged 15 - 19 years, and 100% aged 20 - 24 years. Males viral load (VL) suppression improved from 79% to 96% and 92%, while females VL suppression improved from 69% to 93% and 100% at 6 and 12 months respectively. Conclusion: The OTZ activities contributed to improved viral load suppression in the AYP of the facility. 展开更多
关键词 Impact Operation Triple zero ADOLESCENT Viral Load NIGERIA
下载PDF
NORMALITY AND THE NUMBER OF ZEROS
9
作者 WANG Guang-sheng WEI Dong-mei XU Yan 《数学杂志》 2024年第5期377-382,共6页
In this paper,we study normal families of meromorphic functions.By using the idea in[11],we obtain some normality criteria for families of meromorphic functions that concern the number of zeros of the differential pol... In this paper,we study normal families of meromorphic functions.By using the idea in[11],we obtain some normality criteria for families of meromorphic functions that concern the number of zeros of the differential polynomial,which extends the related result of Li,and Chen et al..An example is given to show that the hypothesis on the zeros of a(z)is necessary. 展开更多
关键词 Meromorphic function normal family differential polynomial zero
下载PDF
On Zero Dynamics and Controllable Cyber-Attacks in Cyber-Physical Systems and Dynamic Coding Schemes as Their Countermeasures
10
作者 Mahdi Taheri Khashayar Khorasani Nader Meskin 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第11期2191-2203,共13页
In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose condition... In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose conditions under which one can execute zero dynamics and controllable attacks in the CPS. The above conditions are derived based on the Markov parameters of the CPS and elements of the system observability matrix. Consequently, in addition to outlining the number of required actuators to be attacked, these conditions provide one with the minimum system knowledge needed to perform zero dynamics and controllable cyber-attacks. As a countermeasure against the above stealthy cyber-attacks, we develop a dynamic coding scheme that increases the minimum number of the CPS required actuators to carry out zero dynamics and controllable cyber-attacks to its maximum possible value. It is shown that if at least one secure input channel exists, the proposed dynamic coding scheme can prevent adversaries from executing the zero dynamics and controllable attacks even if they have complete knowledge of the coding system. Finally, two illustrative numerical case studies are provided to demonstrate the effectiveness and capabilities of our derived conditions and proposed methodologies. 展开更多
关键词 Controllable attacks cyber-physical systems(CPS) dynamic coding zero dynamics attacks stealthy cyber-attacks
下载PDF
Vector magnetometry in zero bias magnetic field using nitrogen-vacancy ensembles
11
作者 Chunxing Li Fa-Zhan Shi +1 位作者 Jingwei Zhou Peng-Fei Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第10期21-29,共9页
The application of the vector magnetometry based on nitrogen-vacancy(NV)ensembles has been widely investigatedin multiple areas.It has the superiority of high sensitivity and high stability in ambient conditions with ... The application of the vector magnetometry based on nitrogen-vacancy(NV)ensembles has been widely investigatedin multiple areas.It has the superiority of high sensitivity and high stability in ambient conditions with microscale spatialresolution.However,a bias magnetic field is necessary to fully separate the resonance lines of optically detected magneticresonance(ODMR)spectrum of NV ensembles.This brings disturbances in samples being detected and limits the rangeof application.Here,we demonstrate a method of vector magnetometry in zero bias magnetic field using NV ensembles.By utilizing the anisotropy property of fluorescence excited from NV centers,we analyzed the ODMR spectrum of NVensembles under various polarized angles of excitation laser in zero bias magnetic field with a quantitative numerical modeland reconstructed the magnetic field vector.The minimum magnetic field modulus that can be resolved accurately is downto~0.64 G theoretically depending on the ODMR spectral line width(1.8 MHz),and~2 G experimentally due to noisesin fluorescence signals and errors in calibration.By using 13C purified and low nitrogen concentration diamond combinedwith improving calibration of unknown parameters,the ODMR spectral line width can be further decreased below 0.5 MHz,corresponding to~0.18 G minimum resolvable magnetic field modulus. 展开更多
关键词 vector magnetometry NV ensembles optically detected magnetic resonance(ODMR) zero bias magnetic field
下载PDF
Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust
12
作者 Xiaoyan Zhu Ruchun Jia +1 位作者 Tingrui Zhang Song Yao 《Computers, Materials & Continua》 SCIE EI 2024年第3期4363-4377,共15页
The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the ... The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system. 展开更多
关键词 zero trust access policy air traffic information sharing network privacy data tam-per-proof certification features
下载PDF
Privacy-preserving authentication scheme based on zero trust architecture
13
作者 Fei Tang Chunliang Ma Kefei Cheng 《Digital Communications and Networks》 CSCD 2024年第5期1211-1220,共10页
Zero trust architecture is an end-to end approach for server resources and data security which contains identity authentication,access control,dynamic evaluation,and so on.This work focuses on authentication technolog... Zero trust architecture is an end-to end approach for server resources and data security which contains identity authentication,access control,dynamic evaluation,and so on.This work focuses on authentication technology in the zero trust network.In this paper,a Traceable Universal Designated Verifier Signature(TUDVS)is used to construct a privacy-preserving authentication scheme for zero trust architecture.Specifically,when a client re-quests access to server resources,we want to protect the client's access privacy which means that the server administrator cannot disclose the client's access behavior to any third party.In addition,the security of the proposed scheme is proved and its fficiency is analyzed.Finally,TUDVS is applied to the single packet autho-rization scenario of the zero trust architecture to prove the practicability of the proposed scheme. 展开更多
关键词 zero trust architecture PRIVACY-PRESERVING Authentication Anonymity revocation
下载PDF
重视血管co-option在肝癌治疗中的潜在机制及治疗靶点作用
14
作者 齐明皓 李景涛 翟博 《世界华人消化杂志》 CAS 2024年第11期827-834,共8页
肝细胞癌(hepatocellular carcinoma,HCC)是最常见的癌症之一.HCC起病隐匿,多数患者首次诊断时已丧失根治性手术的机会,系统性的抗肿瘤治疗成为中晚期HCC治疗的关键.其中抗肿瘤药物出现耐药性是HCC疗效不佳,影响HCC患者预后的重要原因之... 肝细胞癌(hepatocellular carcinoma,HCC)是最常见的癌症之一.HCC起病隐匿,多数患者首次诊断时已丧失根治性手术的机会,系统性的抗肿瘤治疗成为中晚期HCC治疗的关键.其中抗肿瘤药物出现耐药性是HCC疗效不佳,影响HCC患者预后的重要原因之一,如何改善HCC的治疗效果仍是现今研究的重点.尽管国内外对以新生血管生成为基础的抗肿瘤药物的研究不断深入,但对共用正常组织血管来满足肿瘤自身代谢需求的血管共选择(vascular co-option)模式研究较少,其对HCC的进展及抗肿瘤治疗的影响也未被人考虑在内.本文就血管co-option对HCC多种治疗方式的影响及相关机制进行概述,以期为改善HCC耐药奠定理论基础. 展开更多
关键词 肝癌 肿瘤耐药 血管co-option 新生血管生成 抗血管生成治疗 免疫治疗
下载PDF
Algorithm for Visualization of Zero Divisor Graphs of the Ring ℤn Using MAPLE Coding
15
作者 Nasir Ali 《Open Journal of Discrete Mathematics》 2024年第1期1-8,共8页
This research investigates the comparative efficacy of generating zero divisor graphs (ZDGs) of the ring of integers ℤ<sub>n</sub> modulo n using MAPLE algorithm. Zero divisor graphs, pivotal in the study ... This research investigates the comparative efficacy of generating zero divisor graphs (ZDGs) of the ring of integers ℤ<sub>n</sub> modulo n using MAPLE algorithm. Zero divisor graphs, pivotal in the study of ring theory, depict relationships between elements of a ring that multiply to zero. The paper explores the development and implementation of algorithms in MAPLE for constructing these ZDGs. The comparative study aims to discern the strengths, limitations, and computational efficiency of different MAPLE algorithms for creating zero divisor graphs offering insights for mathematicians, researchers, and computational enthusiasts involved in ring theory and mathematical computations. 展开更多
关键词 zero Divisor Graph Ring Theory Maple Algorithm n Modulo n Graph Theory Mathematical Computing
下载PDF
From Standard Policy-Based Zero Trust to Absolute Zero Trust (AZT): A Quantum Leap to Q-Day Security
16
作者 Fazal Raheman 《Journal of Computer and Communications》 2024年第3期252-282,共31页
Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is ... Cybercrime is projected to cost a whopping $23.8 Trillion by 2027. This is essentially because there’s no computer network that’s not vulnerable. Fool-proof cybersecurity of personal data in a connected computer is considered practically impossible. The advent of quantum computers (QC) will worsen cybersecurity. QC will be a boon for data-intensive industries by drastically reducing the computing time from years to minutes. But QC will render our current cryptography vulnerable to quantum attacks, breaking nearly all modern cryptographic systems. Before QCs with sufficient qubits arrive, we must be ready with quantum-safe strategies to protect our ICT infrastructures. Post-quantum cryptography (PQC) is being aggressively pursued worldwide as a defence from the potential Q-day threat. NIST (National Institute of Standards and Technology), in a rigorous process, tested 82 PQC schemes, 80 of which failed after the final round in 2022. Recently the remaining two PQCs were also cracked by a Swedish and a French team of cryptographers, placing NIST’s PQC standardization process in serious jeopardy. With all the NIST-evaluated PQCs failing, there’s an urgent need to explore alternate strategies. Although cybersecurity heavily relies on cryptography, recent evidence indicates that it can indeed transcend beyond encryption using Zero Vulnerability Computing (ZVC) technology. ZVC is an encryption-agnostic absolute zero trust (AZT) approach that can potentially render computers quantum resistant by banning all third-party permissions, a root cause of most vulnerabilities. Unachievable in legacy systems, AZT is pursued by an experienced consortium of European partners to build compact, solid-state devices that are robust, resilient, energy-efficient, and with zero attack surface, rendering them resistant to malware and future Q-Day threats. 展开更多
关键词 CYBERSECURITY Quantum Computers Post Quantum Cryptography Q-Day zero Trust
下载PDF
On Zero Translation in News Discourse
17
作者 GE Zhiwei 《Sino-US English Teaching》 2024年第9期434-438,共5页
In the context of globalization,zero translation words are more and more frequently used in news discourse.This article aims to explore the reasons for the frequent use of zero translation words in news discourse and ... In the context of globalization,zero translation words are more and more frequently used in news discourse.This article aims to explore the reasons for the frequent use of zero translation words in news discourse and their impact on news discourse from the perspectives of translation studies and journalism and communication studies. 展开更多
关键词 zero translation words news discourse communication studies
下载PDF
Research on Value Evaluation Method of Investment Project Based on Fuzzy Composite Real Options
18
作者 Huanyu Li 《Economics World》 2024年第1期24-34,共11页
Venture capital investments are characterized by high input,high yield,and high risk.Due to the complexity of the market environment,stage-by-stage investment is becoming increasingly important.Traditional evaluation ... Venture capital investments are characterized by high input,high yield,and high risk.Due to the complexity of the market environment,stage-by-stage investment is becoming increasingly important.Traditional evaluation methods like comparison,proportion,maturity,internal rate of return,scenario analysis,decision trees,and net present value cannot fully consider the uncertainty and stage characteristics of the project.The fuzzy real options method addresses this by combining real option theory,fuzzy number theory,and composite option theory to provide a more accurate and objective evaluation of Public-Private Partnership(PPP)projects.It effectively considers the interaction of options and the ambiguity of project parameters,making it a valuable tool for project evaluation in the context of venture capital investment. 展开更多
关键词 real option fuzzy method Geske composite option
下载PDF
基于MIKE ZERO 2020的郁江贵港河段一维水质模型
19
作者 王思雅 吕俊 《广西水利水电》 2024年第5期130-137,共8页
基于MIKE ZERO 2020软件中的HD水动力学模块和AD对流扩散模块,建立郁江贵港市河段的水文、水质信息耦合模型,对郁江贵港河段的水位、流量以及污染物在水体中迁移扩散衰减情况进行了模拟分析。根据郁江近年来的水文资料对模型进行率定并... 基于MIKE ZERO 2020软件中的HD水动力学模块和AD对流扩散模块,建立郁江贵港市河段的水文、水质信息耦合模型,对郁江贵港河段的水位、流量以及污染物在水体中迁移扩散衰减情况进行了模拟分析。根据郁江近年来的水文资料对模型进行率定并验证。将该模型应用于2023年6月21日~7月6日的洪水过程,结果表明,所建立的模型在率定和验证及应用期间模拟效果均表现良好,模拟精度高。充分证明该模型适用于模拟郁江贵港河段的水文、水质信息变化特征,为提高贵港市防洪、水情预报及水污染预测提供了重要的技术支撑。 展开更多
关键词 MIKE zero 2020 HD水动力模型 AD对流扩散模型 耦合模拟分析 郁江贵港河段
下载PDF
A Critical Analysis of the Chinese Translation of“Zero Report”-Towards the Standardization of Terminology from the Perspective of Global Health Communication
20
作者 WU He-xiong 《Journal of Literature and Art Studies》 2024年第12期1126-1132,共7页
The term“zero report,”an essential component of public health surveillance systems,is used to denote the reporting of zero cases of a specified disease during a given period.Its Chinese translation,“零报告”,has of... The term“zero report,”an essential component of public health surveillance systems,is used to denote the reporting of zero cases of a specified disease during a given period.Its Chinese translation,“零报告”,has often been misinterpreted by the public as“no report”or“absence of report,”resulting in confusion and misinformation.This paper examines the linguistic and cultural factors contributing to this misinterpretation,exploring the semantic discrepancies between“zero”in English and“零”in Chinese.Using a mixed-methods approach that combines theoretical analysis and empirical survey data,the paper highlights the challenges of translating technical terminology across linguistic and cultural contexts.It also provides recommendations for improving the translation of“zero report”and other public health terms to ensure clear global communication. 展开更多
关键词 “zero report” terminology translation public health communication semantic discrepancies cross-cultural translation terminology standardization
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部