期刊文献+
共找到301篇文章
< 1 2 16 >
每页显示 20 50 100
ADCP-YOLO:A High-Precision and Lightweight Model for Violation Behavior Detection in Smart Factory Workshops
1
作者 Changjun Zhou Dongfang Chen +1 位作者 Chenyang Shi Taiyong Li 《Computers, Materials & Continua》 2026年第3期1895-1919,共25页
With the rapid development of smart manufacturing,intelligent safety monitoring in industrial workshops has become increasingly important.To address the challenges of complex backgrounds,target scale variation,and exc... With the rapid development of smart manufacturing,intelligent safety monitoring in industrial workshops has become increasingly important.To address the challenges of complex backgrounds,target scale variation,and excessive model parameters in worker violation detection,this study proposes ADCP-YOLO,an enhanced lightweight model based on YOLOv8.Here,“ADCP”represents four key improvements:Alterable Kernel Convolution(AKConv),Dilated-Wise Residual(DWR)module,Channel Reconstruction Global Attention Mechanism(CRGAM),and Powerful-IoU loss.These components collaboratively enhance feature extraction,multi-scale perception,and localization accuracy while effectively reducing model complexity and computational cost.Experimental results show that ADCP-YOLO achieves a mAP of 90.6%,surpassing YOLOv8 by 3.0%with a 6.6%reduction in parameters.These findings demonstrate that ADCP-YOLO successfully balances accuracy and efficiency,offering a practical solution for intelligent safety monitoring in smart factory workshops. 展开更多
关键词 YOLO violation behavior detection AKConv CRGAM DWR Powerful-IoU
在线阅读 下载PDF
Conceptual design of the muonium-to-antimuonium conversion experiment(MACE)
2
作者 Ai-Yu Bai Han-Jie Cai +49 位作者 Chang-Lin Chen Si-Yuan Chen Xu-Rong Chen Yu Chen Wei-Bin Cheng Ling-Yun Dai Rui-Rui Fan Li Gong Zi-Hao Guo Yuan He Zhi-Long Hou Yin-Yuan Huang Huan Jia Hao Jiang Han-Tao Jing Xiao-Shen Kang Hai-Bo Li Jin-Cheng Li Yang Li Da-Ming Liu Shu-Lin Liu Gui-Hao Lu Han Miao Yun-Song Ning Jian-Wei Niu Hua-Xing Peng Alexey APetrov Yuan-Shuai Qin Ming-Chen Sun Jian Tang Jing-Yu Tang Ye Tian Rong Wang Xiao-Dong Wang Yi Wang Zhi-Chao Wang Chen Wu Tian-Yu Xing Wei-Zhi Xiong Yu Xu Bao-Jun Yan De-Liang Yao Tao Yu Ye Yuan Yi Yuan Yao Zhang Yongchao Zhang Zhi-Lv Zhang Guang Zhao Shi-Han Zhao 《Nuclear Science and Techniques》 2026年第4期139-187,共49页
The spontaneous conversion of muonium to antimuonium is an interesting charged lepton flavor violation phenomenon that offers a sensitive probe for potential new physics and serves as a tool to constrain the parameter... The spontaneous conversion of muonium to antimuonium is an interesting charged lepton flavor violation phenomenon that offers a sensitive probe for potential new physics and serves as a tool to constrain the parameter space beyond the Standard Model.The Muonium-to-Antimuonium Conversion Experiment(MACE)was designed to utilize a high-intensity muon beam,a Michel electron magnetic spectrometer,a positron transport system,and a positron detection system to either discover or constrain this rare process with a conversion probability of O(10^(-13)).This article presents an overview of the theoretical framework and a detailed description of the experimental design for muonium-to-antimuonium conversion. 展开更多
关键词 MUONIUM Lepton flavor violation Muon beam Drift chamber Microchannel plate Electromagnetic calorimeter
在线阅读 下载PDF
Centralized PV Coordination Control Strategy for Unbalanced LV Distribution Networks Based on Sensitivity Coefficient Weights
3
作者 Xuming Hu Nan Hu +3 位作者 Na Li Xinsong Zhang Xiaocen Xue Xiuyong Yu 《Energy Engineering》 2026年第3期391-410,共20页
The dense integration of residential distributed photovoltaic(PV)systems into three-phase,four-wire low-voltage(LV)distribution networks results in reverse power flow and three-phase imbalance,leading to voltage viola... The dense integration of residential distributed photovoltaic(PV)systems into three-phase,four-wire low-voltage(LV)distribution networks results in reverse power flow and three-phase imbalance,leading to voltage violations that hinder the growth of rural distributed PV systems.Traditional voltage droop-based control methods regulate PV power output solely based on local voltage measurements at the point of PV connection.Due to a lack of global coordination and optimization,their efficiency is often subpar.This paper presents a centralized coordinated active/reactive power control strategy for PV inverters in rural LV distribution feeders with high PV penetration.The strategy optimizes residential PV inverter reactive and active power control to enhance voltage quality.It uses sensitivity coefficients derived from the inverse Jacobian matrix to assign adjustment weights to individual PV units and iteratively optimize their power outputs.The control sequence prioritizes reactive power increases;if the coefficients are below average or the inverters reach capacity,active power is curtailed until voltage issues are resolved.A simulation based on a real 37-node rural distribution network shows that the proposed method significantly reduces PV curtailment.Typical daily results indicate a curtailment rate of 1.47%,which is significantly lower than the 15.4%observed with the voltage droop-based control method.The total daily PV power output(measured every 15 min)increases from 5.55 to 6.41 MW,improving PV hosting capacity. 展开更多
关键词 Low-voltage distribution network PV inverter voltage violation centralized iterative optimization control curtailment rate
在线阅读 下载PDF
CBBM-WARM:A Workload-Aware Meta-Heuristic for Resource Management in Cloud Computing 被引量:1
4
作者 K Nivitha P Pabitha R Praveen 《China Communications》 2025年第6期255-275,共21页
The rapid advent in artificial intelligence and big data has revolutionized the dynamic requirement in the demands of the computing resource for executing specific tasks in the cloud environment.The process of achievi... The rapid advent in artificial intelligence and big data has revolutionized the dynamic requirement in the demands of the computing resource for executing specific tasks in the cloud environment.The process of achieving autonomic resource management is identified to be a herculean task due to its huge distributed and heterogeneous environment.Moreover,the cloud network needs to provide autonomic resource management and deliver potential services to the clients by complying with the requirements of Quality-of-Service(QoS)without impacting the Service Level Agreements(SLAs).However,the existing autonomic cloud resource managing frameworks are not capable in handling the resources of the cloud with its dynamic requirements.In this paper,Coot Bird Behavior Model-based Workload Aware Autonomic Resource Management Scheme(CBBM-WARMS)is proposed for handling the dynamic requirements of cloud resources through the estimation of workload that need to be policed by the cloud environment.This CBBM-WARMS initially adopted the algorithm of adaptive density peak clustering for workloads clustering of the cloud.Then,it utilized the fuzzy logic during the process of workload scheduling for achieving the determining the availability of cloud resources.It further used CBBM for potential Virtual Machine(VM)deployment that attributes towards the provision of optimal resources.It is proposed with the capability of achieving optimal QoS with minimized time,energy consumption,SLA cost and SLA violation.The experimental validation of the proposed CBBMWARMS confirms minimized SLA cost of 19.21%and reduced SLA violation rate of 18.74%,better than the compared autonomic cloud resource managing frameworks. 展开更多
关键词 autonomic resource management cloud computing coot bird behavior model SLA violation cost WORKLOAD
在线阅读 下载PDF
Unbiased test of the hyperon CP violation in terms of detector resolution at STCF
5
作者 Ming Xu Liang Liu +2 位作者 Yupeng Pei Xiaorong Zhou Yingchun Zhu 《中国科学技术大学学报》 北大核心 2025年第4期41-47,40,I0002,共9页
The study of the charge conjugation and parity(CP)violation of hyperon is the precision frontier for probing possible new CP violation sources beyond the standard model(SM).With the large number of quantum entangled h... The study of the charge conjugation and parity(CP)violation of hyperon is the precision frontier for probing possible new CP violation sources beyond the standard model(SM).With the large number of quantum entangled hyperonantihyperon pairs to be produced at Super Tau-Charm Facility(STCF),the CP asymmetry of hyperon is expected to be tested with a statistical sensitivity of 10^(−4) or even better.To cope with the statistical precision,the systematic effects from various aspects are critical and need to be studied in detail.In this paper,the sensitivity effects on the CP violation parameters associated with the detector resolution,including those of the position and momentum,are studied and discussed in detail.The results provide valuable guidance for the design of STCF detector. 展开更多
关键词 BESIII experiment STCF hyperon CP violation detector resolution unbiased test
在线阅读 下载PDF
A Double-Edged Sword:A Scoping Review of the Mental Health Aspects of Parentification
6
作者 Istvan Berkes Bettina Piko 《International Journal of Mental Health Promotion》 2025年第11期1627-1643,共17页
Objectives:Parentification,a role reversal where children assume age-inappropriate duties in the family,is a significant childhood adversity often linked to disrupted developmental trajectories and poor mental health ... Objectives:Parentification,a role reversal where children assume age-inappropriate duties in the family,is a significant childhood adversity often linked to disrupted developmental trajectories and poor mental health outcomes.Yet the complexity of parentification,influenced by various contextual factors,obscures a comprehensive understanding of its psychological consequences and its mental health aspects.The paper aims to map up-to-date research,synthesize key findings,and identify critical knowledge gaps.Methods:To that end,a systematic search was performed in Scopus,PsycINFO,PubMed,and EBSCO databases,and data was extracted and reviewed by two reviewers.The search yielded 29 studies,including 9 qualitative,1 mixed,and 19 quantitative studies that examined the mental health aspects of parentification,from various countries of origin.Results:Parentification,often arising from contexts like parental illness or substance abuse,is linked to varied mental and physical health outcomes.These outcomes are strongly moderated by the adolescent’s subjective perception of their role and the presence of protective factors like strong sibling relationships.The review also identified a clear pathway for the intergenerational transmission of parentification,where a parent’s own history was found to impact their parenting cognitions.Conclusion:This review concludes that future longitudinal research should move beyond negative or positive outcomes of parentification and investigate the mediating and moderating mechanisms that play a crucial role in the outcomes.Furthermore,the absence of prevalence studies on parentification is a notable limitation,and as a result,the size of the affected population remains unknown.Further research is also needed to identify potential protective factors in various circumstances. 展开更多
关键词 PARENTIFICATION mental health filial responsibilities young caregivers boundaries violation
暂未订购
Deterministic transmission in user-scalable cell-free MIMO-OFDM systems
7
作者 ZHANG Cheng ZHANG Li +1 位作者 MENG Fan HUANG Yongming 《Journal of Southeast University(English Edition)》 2025年第4期430-436,F0003,共8页
This paper proposes a data-and model-driven col-laborative resource scheduling method to maximize the spec-tral efficiency(SE)of cell-free(CF)downlink multiuser multiple-input multiple-output(MIMO)systems,subject to d... This paper proposes a data-and model-driven col-laborative resource scheduling method to maximize the spec-tral efficiency(SE)of cell-free(CF)downlink multiuser multiple-input multiple-output(MIMO)systems,subject to delay violation probability and power constraints.The method integrates the weighted minimum mean square error(WMMSE)algorithm within the safety reinforcement learn-ing(Safety-RL)framework.The original optimization problem is decomposed into two coupled subproblems.The Safety-RL algorithm leverages state features to determine user priority weights and allocate bandwidths,while the WMMSE algorithm calculates the precoding matrix and fur-ther schedules resources based on user priority weights to obtain the reward and costs of Safety-RL.Considering dy-namic user access in CF systems,a distributed algorithm with user scalability is also proposed.Simulation results demonstrate that the proposed approach improves the SE while meeting the different delay violation probability con-straints of users.Furthermore,the distributed algorithm of-fers comparable performance to the fully centralized method while considerably reducing model training overhead,par-ticularly as users dynamically access the system. 展开更多
关键词 delay violation probability constraint CELL-FREE safety reinforcement learning resource scheduling
在线阅读 下载PDF
Testing Quantum Local Realism in BESIII via Massive Hyperon-Antihyperon Pairs
8
《Bulletin of the Chinese Academy of Sciences》 2025年第4期204-205,共2页
The nonlocality of quantum correlations,as manifesting through the violation of Bell inequalities,constitutes a fundamental property of the microscopic world.In contrast to macroscopic systems,where spatially separate... The nonlocality of quantum correlations,as manifesting through the violation of Bell inequalities,constitutes a fundamental property of the microscopic world.In contrast to macroscopic systems,where spatially separated objects cannot influence each other instantaneously,entangled quantum particles maintain correlated properties even at large distances:Measurement of one particle in an entangled pair results in an immediate change in the state of its counterpart.While various forms of Bell inequalities have been experimentally confirmed in photonic and atomic systems,their exploration in high-energy physics contexts remains limited. 展开更多
关键词 violation bell inequalitiesconstitutes hyperon antihyperon pairs entangled pair nonlocality quantum local realism quantum particles bell inequalities entangled particles
在线阅读 下载PDF
Dual-field and cross-field nonclassical light generation in a one-^(133)Cs atom cavity QED system
9
作者 Zhiqiang Wen Chen Wang Shougang Zhang 《Communications in Theoretical Physics》 2025年第10期138-146,共9页
Nonclassical light fields exhibit unique quantum characteristics that not only expand the scope of optical research but also provide a solid foundation for advancements in quantum technologies.In this study,we investi... Nonclassical light fields exhibit unique quantum characteristics that not only expand the scope of optical research but also provide a solid foundation for advancements in quantum technologies.In this study,we investigate a system consisting of one-^(133)Cs atom placed in a resonant cavity.Pumped by 459 nm laser light,the system generates cavity modes corresponding to the atomic 7S_(1/2)→6P_(3/2)(1470 nm)and 7S_(1/2)→6P_(1/2)(1359 nm)transitions,which are associated with the clock states of the cesium active optical clock.By analyzing the statistical and dynamical properties of the fields,we systematically explore the nonclassical behavior of the system under varying coupling strengths and cavity decay rates.We identify parameter regions where both individual fields and their cross-correlation exhibit nonclassicality,with the Cauchy-Schwarz(CS)violation coefficient R reaching a maximum of 13.9.This demonstrates the system’s ability to generate highly nonclassical photon pairs,enriching the repertoire of nonclassical light sources. 展开更多
关键词 cavity QED nonclassical photon pairs violation of the Cauchy-Schwarz inequality second-order correlation function
原文传递
Production of the massless dark photon γ associated with the photon γ from charged lepton flavor violating decay processes
10
作者 Si Li Chong-Xing Yue +1 位作者 Xue-Jia Cheng Yang-Yang Bu 《Communications in Theoretical Physics》 2025年第6期129-132,共4页
The massless dark photon~γ can only interact with the Standard Model(SM)sector via higherdimensional operators.In this letter,we investigate its production associated with the ordinary photonγfrom the lepton flavor ... The massless dark photon~γ can only interact with the Standard Model(SM)sector via higherdimensional operators.In this letter,we investigate its production associated with the ordinary photonγfrom the lepton flavor violation(LFV)process l_(i)→l_(j)γγ and di-production from the LFV process l_(i)→l_(j)γγ induced by dipole operators.Comparing the obtained numerical results with the corresponding experimental measurements,we obtain the constraints on the effective couplings of γ with the SM charged leptons.The upper limit of the effective coupling|DLμe|2+|DRμe|2coming from the process μ→e~γγis looser than the processμ→eγ by about one order of magnitude. 展开更多
关键词 massless dark photon lepton flavor violation process effective couplings
原文传递
Characteristics and risk of violation behavior of non-motorists at signalized intersections 被引量:6
11
作者 赵星 任刚 +2 位作者 杜轩 王鹏 王卫杰 《Journal of Southeast University(English Edition)》 EI CAS 2011年第4期423-429,共7页
Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaire... Aiming at prevalent violations of non-motorists at urban intersections in China, this paper intends to clarify the characteristics and risks of non-motorist violations at signalized intersections through questionnaires and video recordings, which may serve as a basis for non-motorized vehicle management. It can help improve the traffic order and enhance the degree of safety at signalized intersections. To obtain the perception information, a questionaire survey on the Internet was conducted and 972 valid questionnaires were returned. It is found that academic degree contributes little to non-motorist violations, while electrical bicyclists have a relatively higher frequency of violations compared with bicyclists. The video data of 18 228 non-motorist behaviors indicate that the violation rate of all non-motorists is 26.5%; the number of conflicts reaches 1 938, among which violation conflicts account for 66.8%. The study shows that the violation rates and the violation behavior at three types of surveyed intersections are markedly different. It is also concluded that the conflict rates and the violation rates are positively correlated. Furthermore, signal violation, traveling in the wrong direction, and overspeeding to cross the intersection are the most dangerous among traffic violation behaviors. 展开更多
关键词 traffic violation behavior traffic safety non- motorist signal intersection
在线阅读 下载PDF
Deviation in Advertising English from a Stylistic Perspective
12
作者 罗敏 《英语广场(学术研究)》 2012年第10期15-17,共3页
Advertising English is viewed as an English style with such functional factors as attention value, readability, memorability, selling power. Commercial advertisements are the major concern of this paper. Deviation, na... Advertising English is viewed as an English style with such functional factors as attention value, readability, memorability, selling power. Commercial advertisements are the major concern of this paper. Deviation, namely the violation to the norms of a language, frequently appears in advertisements and can meet requirements of the style of advertising English. Due to limited space, this paper focuses on deviation on the phonological, graphological, lexical, grammatical, and semantic level. Analyzing deviation in advertising English can promote readers' aesthetic and appreciative ability and encourage advertisers to create advertisements with more efficiency, novelty, innovation in more effective language. 展开更多
关键词 advertising English deviation STYLISTIC VIOLATION NORM
在线阅读 下载PDF
Towards Effective Bus Lane Monitoring Using Camera Sensors
13
作者 Xu Li Xuegang Yu Ke He 《Wireless Sensor Network》 2011年第5期174-182,共9页
City administrators need to guarantee bus priority in urban public transportation. Building large-scale dedicated bus lanes is a cost-effective solution but it suffers from illegal utilization of dedicated bus lines b... City administrators need to guarantee bus priority in urban public transportation. Building large-scale dedicated bus lanes is a cost-effective solution but it suffers from illegal utilization of dedicated bus lines by other non-permitted vehicles. In general, two systems can be utilized for bus lane monitoring: road-side system and bus mounted system. Although the former one has the advantage in terms of larger surveillance coverage, the investment cost makes it less feasible because of scalability issue. In this paper, we focus on bus mounted system to improve surveillance coverage without additional infrastructure cost. We introduce DoubleChecking, a cooperative violator identification scheme that can accurately pick out those non-permitted vehicles or violators. DoubleChecking is designed to improve the surveillance coverage of bus mounted system by using communications/cooperation between mounted camera sensors and existing camera sensors around intersections. Through theoretical analysis and simulation results, we show that DoubleChecking yields good performance for violator identification. 展开更多
关键词 COOPERATIVE violator Identification BUS LANE ENFORCEMENT System SENSORS ITS
暂未订购
English Euphemism and its Linguistic Analysis from the Cooperative Principle Perspective
14
作者 毕春意 《海外英语》 2014年第10X期229-230,共2页
Euphemism is a common phenomenon in languages.It's a more mild and polite way to say something unpleasant and embarrassing.It's a figure of speech as well as a cultural phenomenon.Euphemism functions to enhanc... Euphemism is a common phenomenon in languages.It's a more mild and polite way to say something unpleasant and embarrassing.It's a figure of speech as well as a cultural phenomenon.Euphemism functions to enhance the effect of communication and maintain harmonious interpersonal relations.With the development of modern society,it has become an indispensable element in people's interactions.Many linguists and scholars have studied this linguistic phenomenon from different angles.Based on their achievements,the author has a tentative analysis of the three kinds of negative effects by using euphemism from the perspective of Cooperative Principle. 展开更多
关键词 ENGLISH EUPHEMISM COOPERATIVE PRINCIPLE VIOLATION
在线阅读 下载PDF
An Analysis of the Verbal Humor in the Movies If You Are The One Ⅰ&Ⅱ from the Perspective of Pragmatics
15
作者 黄瑞 《海外英语》 2011年第5X期281-283,共3页
This study analyzes the the verbal humor in the movie series If You Are The One from the perspective of some pragmatic theories.The findings of the study provide explanations towards generative mechanism of humor,such... This study analyzes the the verbal humor in the movie series If You Are The One from the perspective of some pragmatic theories.The findings of the study provide explanations towards generative mechanism of humor,such as the violation of Cooperative Principle,avoiding face-threatening acts,and particularly,creatively reveal that special use of Politeness Principle can produce a humourous effect,too. 展开更多
关键词 VERBAL humor VIOLATION OVERUSE PRAGMATICS cooperative PRINCIPLE POLITENESS PRINCIPLE
在线阅读 下载PDF
The Violation of Cooperative Principle and English Teaching
16
作者 张大海 《海外英语》 2013年第21期291-293,共3页
The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvant... The Violation of CP has closely related to English teaching.The violation of CP can be divided into two aspects—the unintentional violation and the intentional violation.The unintentional violation has some disadvantages to English teaching while the intentional violation of CP has some advantages.In this paper,I discussed the relation between the violation of CP and English teaching briefly and give some suggestions to English teachers. 展开更多
关键词 VIOLATION COOPERATIVE PRINCIPLE ENGLISH TEACHING i
在线阅读 下载PDF
A Study on English Euphemisms and Cooperative Principle in Pragmatics
17
作者 孙宏 《疯狂英语(教师版)》 2012年第3期158-161,共4页
As a cultural phenomenon,euphemism is categorized as a linguistic concept as well.Euphemism means speaking with good words or in a pleasant manner.The social functions of euphemism are:substitution of taboo words,stra... As a cultural phenomenon,euphemism is categorized as a linguistic concept as well.Euphemism means speaking with good words or in a pleasant manner.The social functions of euphemism are:substitution of taboo words,strategic use of language,and expression of politeness,humor and satire.Besides,euphemism is closely associated with cooperative principle in pragmatics. 展开更多
关键词 EUPHEMISM FUNCTION TABOO cooperative principle VIOLATION
在线阅读 下载PDF
Frame length optimization for multi-antenna downlink systems based on delay-bound violation probability constraints
18
作者 谭雨凤 李俊超 +1 位作者 夏玮玮 沈连丰 《Journal of Southeast University(English Edition)》 EI CAS 2015年第2期163-169,共7页
A flame length optimization scheme is proposed for multi-antenna downlink systems to guarantee diverse delay- bound violation probability constraints. Due to the difficulties of extracting the quality of service (QoS... A flame length optimization scheme is proposed for multi-antenna downlink systems to guarantee diverse delay- bound violation probability constraints. Due to the difficulties of extracting the quality of service (QoS) metrics from the conventional physical-layer channel models, the link-layer models named effective bandwidth and effective capacity are applied to statistically characterize the source traffic patterns and the queuing service dynamics. With these link-layer models, the source traffic process and the channel service process are mapped to certain QoS parameters. The packet delay-bound violation probability constraints are converted into minimum data rate constraints and the optimization problem is thus formulated into simultaneous inequalities. With the assumption of ergodic block-fading channels, the optimal frame lengths of single-user and multiuser systems are calculated respectively by numerical iterative methods. Theoretical analyses and simulation results show that the given delay-bound violation probability constraints are well satisfied with the optimal frame length. 展开更多
关键词 delay-bound violation probability frame lengthoptimization effective bandwidth effective capacity multi-antenna systems quality of service
在线阅读 下载PDF
On the Causes of the Violation of Cooperative Principle 被引量:1
19
作者 朱毅 刘爱玲 《海外英语》 2015年第19期217-218,共2页
Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to ... Grice s Cooperative Principle places a great role in explaining how the human speech communication really does.Grice holds that the participants in a conversation should adhere to the Cooperative Principle.However,to our surprise,in actual speech communication,it is many phenomena of the violation of Cooperative Principle that there exist.In the light of Grice ' s Cooperative Principle,probing the causes of the violation of Cooperative Principle,the paper is to reveal some regular patterns of human language communication,to delve into the efficient models stimulating the development of a language,and to offer some research conclusions for promoting the tacit understanding of communication and the standardization of language. 展开更多
关键词 COOPERATIVE PRINCIPLE VIOLATION CAUSES
在线阅读 下载PDF
上一页 1 2 16 下一页 到第
使用帮助 返回顶部