Cohesive devices in students’business English writing are regarded as the object of the research.Based on Haliday and Hasan’s cohesion theory,this paper introduces commonly-used cohesive devices in English writing.W...Cohesive devices in students’business English writing are regarded as the object of the research.Based on Haliday and Hasan’s cohesion theory,this paper introduces commonly-used cohesive devices in English writing.With the method of quantitative data,use and misuse frequency of cohesive devices in students’writings can be known.The paper will also analyze why misuses happen through qualitative data analysis and explore right ways of using cohesive devices.展开更多
SUMMARY The p value has been widely used as a way to summarise the significance in data analysis. However, misuse and misinterpretation of the p value is common in practice. Our result shows that if the model specific...SUMMARY The p value has been widely used as a way to summarise the significance in data analysis. However, misuse and misinterpretation of the p value is common in practice. Our result shows that if the model specification is wrong, the distribution of the p value may be inappropriate, which makes the decision based on the p value invalid.展开更多
Android applications are associated with a large amount of sensitive data,therefore application developers use encryption algorithms to provide user data encryption,authentication and data integrity protection.However...Android applications are associated with a large amount of sensitive data,therefore application developers use encryption algorithms to provide user data encryption,authentication and data integrity protection.However,application developers do not have the knowledge of cryptography,thus the cryptographic algorithm may not be used correctly.As a result,security vulnerabilities are generated.Based on the previous studies,this paper summarizes the characteristics of password misuse vulnerability of Android application software,establishes an evaluation model to rate the security level of the risk of password misuse vulnerability and develops a repair strategy for password misuse vulnerability.And on this basis,this paper designs and implements a secure container for Android application software password misuse vulnerability:CM-Droid.展开更多
Objectives: This paper deals with the methylphenidate (MPH) misuse by adults in Germany. Results of a survey among primary care physicians/internists have been supplemented by a comparison with the literature. Methods...Objectives: This paper deals with the methylphenidate (MPH) misuse by adults in Germany. Results of a survey among primary care physicians/internists have been supplemented by a comparison with the literature. Methods: In the period from October 5-20, 2015, a survey was sent to 414 primary care physicians/internists in four German cities (n = 10 were undeliverable). The response rate was 58% (n = 235). 34 original works on MPH abuse worldwide were found in the literature and are used in the analysis of the present data situation. The literature published before November 9, 2015 is considered in this paper. Results: 14% of the doctors who took part in the survey said that they had been asked for MPH prescriptions without any medical indication. The most frequent reason given for the request (42%) was adult attention deficit/hyperactivity disorder (ADHD) not verified by documents. According to the comparison with the literature, university students had a lifetime prevalence of MPH misuse ranging from 0.8% to 16.6% and school children had a misuse rate of 4.0%. In the civilian US population, the misuse rate was 4.2%. Among patients in possession of a current MPH prescription due to a diagnosis, the lifetime prevalence was 29% and among adolescents with suspected alcohol and/or drug problems 20%. Conclusions: MPH misuse is a major problem which has not been studied sufficiently. MPH misuse not only plays a role in the field of psychiatry, but also in other disciplines. Misuse particularly following a therapeutic prescription should be taken into account.展开更多
Significant concerns over the health,social and economic burdens of the two most common,and frequently co-misused drugs of abuse,alcohol and tobacco,has encouraged focused but separate health promotion and disease pre...Significant concerns over the health,social and economic burdens of the two most common,and frequently co-misused drugs of abuse,alcohol and tobacco,has encouraged focused but separate health promotion and disease prevention policies.However,this separation of focus means that while individuals who present with alcohol-related problems are increasingly supported to attain and maintain abstinence from alcohol they are not routinely assisted to refrain from smoking.This is tragically inopportune as alcohol and tobacco have an established"synergistic"effect on aerodigestive cancer risk.Moreover,even when patients successfully tackle their alcohol problems they remain at increased risk for developing these cancers,especially if they continue to smoke.A case series is presented together with a discussion on how service provision for co-misuse could be improved to obviate aerodigestive cancer risk.Given the prevalence of alcohol and tobacco use in the United Kingdom,these observations may have far reaching implications for the individual,health provider(s)and wider society.展开更多
BACKGROUND Patients with ulcerative colitis(UC) may be exposed to opioids over their disease duration. The use of such medications carries significant risk, including intestinal dysmotility and potential for addiction...BACKGROUND Patients with ulcerative colitis(UC) may be exposed to opioids over their disease duration. The use of such medications carries significant risk, including intestinal dysmotility and potential for addiction. However, the rates of narcotic use and misuse in patients with UC have not been studied extensively. Functional gastrointestinal disorders(FGID) are prevalent in patients with UC, and have been shown to increase the risk of narcotic use and misuse in patients with Crohn's disease. We hypothesized that patients with UC and a concurrent diagnosis of FGID would have increased rates of both opioid use and misuse in our patient cohort.AIM To evaluate the prevalence of chronic opioid use and misuse in UC.METHODS A retrospective chart review of UC patients seen at the University of Virginia Digestive Health Center was performed on all patients evaluated between 2006 and 2011. Patient demographics, medical, surgical, and medication histories were obtained from the electronic medical record. Concomitant diagnosis of FGID was also noted at the time. The electronic prescription monitoring program was accessed to obtain prescription opioid filling histories. Prescription opioid misuse was defined as opioid prescriptions filled from four or more prescribers and four or more different pharmacies in a 12-mo period.RESULTS A total of 497 patients with UC were included. Patients with UC and FGID were more likely to be female, but no other demographic variables were associated with FGID. Of the UC patients who had FGID, a greater proportion were found to be using opioids chronically(36% with FGID vs 9% without FGID, P < 0.0001)and were misusing prescription opioids(12.8% vs 1.3%, P < 0.001). Multivariate logistic regression demonstrated a significant association with FGID and chronic opioid use(OR = 4.50; 95%CI: 1.91-10.59) and opioid misuse(OR = 5.19; 95%CI1.04-25.76). Tobacco use(OR 2.53; 95%CI: 1.06-6.08) and anxiety(OR 3.17; 95%CI:1.08-9.26) were other variables associated with an increased risk of chronic narcotic use.CONCLUSION FGID was associated with a 4.5-fold increase in chronic opioid use and a 5-fold increased risk of opioid misuse in this patient cohort with UC.展开更多
We investigate security at the same time as the functional requirements by refining and integrating use, misuse, and mitigation use cases. Security requirements rely on the interactions among normal system execution (...We investigate security at the same time as the functional requirements by refining and integrating use, misuse, and mitigation use cases. Security requirements rely on the interactions among normal system execution (use cases), attacks (misuse cases), and necessary security strategies (mitigation use cases), but previous approaches only use a high-level of abstraction. We use refinement to uncover details of each case and the relationships among them before integrating them. We identify and model “includes” and “extends” relationships within each refined case type, and use a condition-driven process that maintains these relationships as refinement continues. We then systematically identify and model “threatens” and “mitigates” relationships to integrate the cases at a detailed level.展开更多
The incidence of prescription opioid misuse in Canada is increasing. Initiatives for safe prescribing practices for opioid medications include risk assessment for current and future opioid misuse. A clinical screening...The incidence of prescription opioid misuse in Canada is increasing. Initiatives for safe prescribing practices for opioid medications include risk assessment for current and future opioid misuse. A clinical screening tool that can be universally applied to all patient populations is currently not available. Our objective was to provide a brief narrative review on opioid misuse from a Canadian perspective as well as a critical appraisal of the available clinical screening tools for detecting aberrant behaviors associated with opioid misuse. The Drug Abuse Screening Test, Addiction Behaviors Checklist, Diagnosis, Intractability, Risk and Efficacy Inventory, Pain Assessment and Documentation Tool, Prescription Drug Use Questionnaire, Prescription Opioid therapy Questionnaire, Screener and Opioid Assessment for Patients with Pain(SOAPP), Revised SOAPP, Pain Medication Questionnaire, Opioid Risk Tool and Current Opioid Misuse Measure were included in the following review. Overall, a wide variability in quality, sensitivity and specificity was observed between screening tools. There is an overall lack of applicability to diverse patient populations as the majority of screening tools have been validated in pain clinic populations only. To conclude, there is a great need for a validated and convenient aberrant behaviors risk assessment tool that can be applied to a diverse patient population in a clinical setting.展开更多
A software security testing behavior model,SETAM,was proposed in our previous work as the integrated model for describing software security testing requirements behavior,which is not only compatible with security func...A software security testing behavior model,SETAM,was proposed in our previous work as the integrated model for describing software security testing requirements behavior,which is not only compatible with security functions and latent typical misuse behaviors,but also with the interaction of them.In this paper,we analyze the differences between SETAM with security use case and security misuse case in different types of security test requirements.To illustrate the effectiveness of SETAM,we compare them in a practical case study by the number of test cases and the number of faults detected by them.The results show that SETAM could decrease about 34.87%use cases on average,and the number of faults detected by SETAM increased by 71.67%in average,which means that our model can detect more faults with fewer test cases for software security testing.展开更多
We present here an alternative definition of the P-value for statistical hypothesis test of a real-valued parameter for a continuous random variable X. Our approach uses neither the notion of Type I error nor the assu...We present here an alternative definition of the P-value for statistical hypothesis test of a real-valued parameter for a continuous random variable X. Our approach uses neither the notion of Type I error nor the assumption that null hypothesis is true. Instead, the new P-value involves the maximum likelihood estimator, which is usually available for a parameter such as the mean μ or standard deviation σ of a random variable X with a common distribution.展开更多
The acquisition and usage of definite article THE has always gained attention from scholars from domestic and overseas due to its difficulty of learning and mastering. As a result, the relative study of definite artic...The acquisition and usage of definite article THE has always gained attention from scholars from domestic and overseas due to its difficulty of learning and mastering. As a result, the relative study of definite article THE acquisition has been one of the the most significant tasks of second language acquisition all the time. For English majors, the acquisition of definite articles THE runs through the whole process of language learning and application. Learner' s version of foreign language, known as interlanguage, is a kind of language that exists between the mother tongue (Chinese) and the target language (English). Interlanguage is a systematic unit which changes and develops constantly. Since definite article THE has rather complex and frequently altered usage, it is inevitable that there are a throng of misuse and problems for English majors when they are using definite article THE. This paper intends to do a survey focusing on English majors' application situation of definite article THE. Through analyzing the common misuse and mistakes appeared when English majors are using definite article THE, this paper aims to summerize the FAQ (frequently asked questions) and causes of those misuses. At the same time, the 100 experimental subjects of this survey are equally and randomly chosen from freshmen and third year students of foreign languages college, OUC (Ocean University of China). By comparing the experimental results of two different grade English major students, this paper aims to demonstrate the influence of different grades on the mastering of definite articles THE of English majors.展开更多
In forensic investigations,it is vital that the authenticity of digital evidence should be ensured. In addition,technical means should be provided to ensure that digital evidence collected cannot be misused for the pu...In forensic investigations,it is vital that the authenticity of digital evidence should be ensured. In addition,technical means should be provided to ensure that digital evidence collected cannot be misused for the purpose of perjury. In this paper,we present a method to ensure both authenticity and non-misuse of data extracted from wireless mobile devices. In the method,the device ID and a timestamp become a part of the original data and the Hash function is used to bind the data together. Encryption is applied to the data,which includes the digital evidence,the device ID and the timestamp. Both symmetric and asymmetric encryption systems are employed in the proposed method where a random session key is used to encrypt the data while the public key of the forensic server is used to encrypt the session key to ensure security and efficiency. With the several security mechanisms that we show are supported or can be implemented in wireless mobile devices such as the Android,we can ensure the authenticity and non-misuse of data evidence in digital forensics.展开更多
1.Biochemical structure and molecular activity of meldonium Meldonium(commercial name Mildronate)was originally synthesized in the mid-1970s at the Institute of Organic Synthesis of the Latvian Soviet Socialist Republ...1.Biochemical structure and molecular activity of meldonium Meldonium(commercial name Mildronate)was originally synthesized in the mid-1970s at the Institute of Organic Synthesis of the Latvian Soviet Socialist Republic Academy of Sciences.The chemical structure of this compound(3-(2,2,2-展开更多
In the course of college English teaching, English teachers may find some errors made by the non-English majors. Errors made when they are using English verbs are analyzed from the aspect of the similarities and diffe...In the course of college English teaching, English teachers may find some errors made by the non-English majors. Errors made when they are using English verbs are analyzed from the aspect of the similarities and differences between English verbs and Chinese verbs in this thesis. We can conclude that the most obvious cause of the misuse seems to be the interference of the first language (L1), that is, interlingual errors affect the English output of Chinese students. At last, the author calls for more input of the difference between L1 and L2 in L2 teaching and acquisition so that the same mistakes can be avoided.展开更多
Based on the teaching video of middle school English teachers, through observation and analysis, it puts forward the problem of less use, wrong use and abuse in the use of teachers' teaching gestures in middle sch...Based on the teaching video of middle school English teachers, through observation and analysis, it puts forward the problem of less use, wrong use and abuse in the use of teachers' teaching gestures in middle school English teaching. And then it puts forward corresponding solutions from three aspects: concept, theory and practice. Hoping to provide further reference to the complementary role of teaching gesture and teaching discourse.展开更多
The core issue concerning the usage of tense and aspect is seen as significantly important(Michaelis,1994;Swales and Feak,2000),especially in English writing in college.This study identifies the erroneous use of tense...The core issue concerning the usage of tense and aspect is seen as significantly important(Michaelis,1994;Swales and Feak,2000),especially in English writing in college.This study identifies the erroneous use of tense and aspect in liberal arts students' writing in comparison with that of engineering students' to examine their application ability in writing and identify areas of English learning in need of intensive instruction.This paper displays the frequency rates of errors about two English tenses(the present and the past),two aspects(the progressive and the perfect)based on an online writing corpus of students in two majors,which leads to the result that students in both majors are more likely to make mistakes in the present time and perfect aspect,liberal arts students less influenced.In addition,engineering students writing score seems to be more related to their grammatical errors than that of liberal arts students.To improve their writings,practical teaching strategies such as being aware of cross-lingual influence,practicing grammar on context level,personalized instructions,are also provided.展开更多
The term“porphyry”has a specific geological meaning but has been used freely by sculptors and art historians to name many types of stone that are not,geologically,porphyries.“Porphyries”have been associated with n...The term“porphyry”has a specific geological meaning but has been used freely by sculptors and art historians to name many types of stone that are not,geologically,porphyries.“Porphyries”have been associated with nobility and Imperial Monuments since Roman times.This paper discusses some examples from Karelia in Russia and from Sweden used in St Petersberg and the use of Russian Shoksha“porphyry”in Paris,France.It highlights several types of stone that have been referred to as porphyries but are not.The Shoksha stone has been of architectural and artistic importance both nationally and internationally for some 300 years.This might qualify it as a candidate for Global Heritage Stone Resource status.展开更多
文摘Cohesive devices in students’business English writing are regarded as the object of the research.Based on Haliday and Hasan’s cohesion theory,this paper introduces commonly-used cohesive devices in English writing.With the method of quantitative data,use and misuse frequency of cohesive devices in students’writings can be known.The paper will also analyze why misuses happen through qualitative data analysis and explore right ways of using cohesive devices.
文摘SUMMARY The p value has been widely used as a way to summarise the significance in data analysis. However, misuse and misinterpretation of the p value is common in practice. Our result shows that if the model specification is wrong, the distribution of the p value may be inappropriate, which makes the decision based on the p value invalid.
基金This work is supported by The National Natural Science Foundation of China (Nos.U1536121,61370195).
文摘Android applications are associated with a large amount of sensitive data,therefore application developers use encryption algorithms to provide user data encryption,authentication and data integrity protection.However,application developers do not have the knowledge of cryptography,thus the cryptographic algorithm may not be used correctly.As a result,security vulnerabilities are generated.Based on the previous studies,this paper summarizes the characteristics of password misuse vulnerability of Android application software,establishes an evaluation model to rate the security level of the risk of password misuse vulnerability and develops a repair strategy for password misuse vulnerability.And on this basis,this paper designs and implements a secure container for Android application software password misuse vulnerability:CM-Droid.
文摘Objectives: This paper deals with the methylphenidate (MPH) misuse by adults in Germany. Results of a survey among primary care physicians/internists have been supplemented by a comparison with the literature. Methods: In the period from October 5-20, 2015, a survey was sent to 414 primary care physicians/internists in four German cities (n = 10 were undeliverable). The response rate was 58% (n = 235). 34 original works on MPH abuse worldwide were found in the literature and are used in the analysis of the present data situation. The literature published before November 9, 2015 is considered in this paper. Results: 14% of the doctors who took part in the survey said that they had been asked for MPH prescriptions without any medical indication. The most frequent reason given for the request (42%) was adult attention deficit/hyperactivity disorder (ADHD) not verified by documents. According to the comparison with the literature, university students had a lifetime prevalence of MPH misuse ranging from 0.8% to 16.6% and school children had a misuse rate of 4.0%. In the civilian US population, the misuse rate was 4.2%. Among patients in possession of a current MPH prescription due to a diagnosis, the lifetime prevalence was 29% and among adolescents with suspected alcohol and/or drug problems 20%. Conclusions: MPH misuse is a major problem which has not been studied sufficiently. MPH misuse not only plays a role in the field of psychiatry, but also in other disciplines. Misuse particularly following a therapeutic prescription should be taken into account.
文摘Significant concerns over the health,social and economic burdens of the two most common,and frequently co-misused drugs of abuse,alcohol and tobacco,has encouraged focused but separate health promotion and disease prevention policies.However,this separation of focus means that while individuals who present with alcohol-related problems are increasingly supported to attain and maintain abstinence from alcohol they are not routinely assisted to refrain from smoking.This is tragically inopportune as alcohol and tobacco have an established"synergistic"effect on aerodigestive cancer risk.Moreover,even when patients successfully tackle their alcohol problems they remain at increased risk for developing these cancers,especially if they continue to smoke.A case series is presented together with a discussion on how service provision for co-misuse could be improved to obviate aerodigestive cancer risk.Given the prevalence of alcohol and tobacco use in the United Kingdom,these observations may have far reaching implications for the individual,health provider(s)and wider society.
文摘BACKGROUND Patients with ulcerative colitis(UC) may be exposed to opioids over their disease duration. The use of such medications carries significant risk, including intestinal dysmotility and potential for addiction. However, the rates of narcotic use and misuse in patients with UC have not been studied extensively. Functional gastrointestinal disorders(FGID) are prevalent in patients with UC, and have been shown to increase the risk of narcotic use and misuse in patients with Crohn's disease. We hypothesized that patients with UC and a concurrent diagnosis of FGID would have increased rates of both opioid use and misuse in our patient cohort.AIM To evaluate the prevalence of chronic opioid use and misuse in UC.METHODS A retrospective chart review of UC patients seen at the University of Virginia Digestive Health Center was performed on all patients evaluated between 2006 and 2011. Patient demographics, medical, surgical, and medication histories were obtained from the electronic medical record. Concomitant diagnosis of FGID was also noted at the time. The electronic prescription monitoring program was accessed to obtain prescription opioid filling histories. Prescription opioid misuse was defined as opioid prescriptions filled from four or more prescribers and four or more different pharmacies in a 12-mo period.RESULTS A total of 497 patients with UC were included. Patients with UC and FGID were more likely to be female, but no other demographic variables were associated with FGID. Of the UC patients who had FGID, a greater proportion were found to be using opioids chronically(36% with FGID vs 9% without FGID, P < 0.0001)and were misusing prescription opioids(12.8% vs 1.3%, P < 0.001). Multivariate logistic regression demonstrated a significant association with FGID and chronic opioid use(OR = 4.50; 95%CI: 1.91-10.59) and opioid misuse(OR = 5.19; 95%CI1.04-25.76). Tobacco use(OR 2.53; 95%CI: 1.06-6.08) and anxiety(OR 3.17; 95%CI:1.08-9.26) were other variables associated with an increased risk of chronic narcotic use.CONCLUSION FGID was associated with a 4.5-fold increase in chronic opioid use and a 5-fold increased risk of opioid misuse in this patient cohort with UC.
文摘We investigate security at the same time as the functional requirements by refining and integrating use, misuse, and mitigation use cases. Security requirements rely on the interactions among normal system execution (use cases), attacks (misuse cases), and necessary security strategies (mitigation use cases), but previous approaches only use a high-level of abstraction. We use refinement to uncover details of each case and the relationships among them before integrating them. We identify and model “includes” and “extends” relationships within each refined case type, and use a condition-driven process that maintains these relationships as refinement continues. We then systematically identify and model “threatens” and “mitigates” relationships to integrate the cases at a detailed level.
文摘The incidence of prescription opioid misuse in Canada is increasing. Initiatives for safe prescribing practices for opioid medications include risk assessment for current and future opioid misuse. A clinical screening tool that can be universally applied to all patient populations is currently not available. Our objective was to provide a brief narrative review on opioid misuse from a Canadian perspective as well as a critical appraisal of the available clinical screening tools for detecting aberrant behaviors associated with opioid misuse. The Drug Abuse Screening Test, Addiction Behaviors Checklist, Diagnosis, Intractability, Risk and Efficacy Inventory, Pain Assessment and Documentation Tool, Prescription Drug Use Questionnaire, Prescription Opioid therapy Questionnaire, Screener and Opioid Assessment for Patients with Pain(SOAPP), Revised SOAPP, Pain Medication Questionnaire, Opioid Risk Tool and Current Opioid Misuse Measure were included in the following review. Overall, a wide variability in quality, sensitivity and specificity was observed between screening tools. There is an overall lack of applicability to diverse patient populations as the majority of screening tools have been validated in pain clinic populations only. To conclude, there is a great need for a validated and convenient aberrant behaviors risk assessment tool that can be applied to a diverse patient population in a clinical setting.
基金Supported by the National High Technology Research and Development Program of China(863 Program)(2009AA01Z402)the PLA University of Science and Technology Pre-research Project(20110202,20110210)+1 种基金the Natural Science Foundation of Jiangsu Province of China(BK2012059,BK2012060)the PLAUST Outstanding Graduate Student Thesis Fund(2012)
文摘A software security testing behavior model,SETAM,was proposed in our previous work as the integrated model for describing software security testing requirements behavior,which is not only compatible with security functions and latent typical misuse behaviors,but also with the interaction of them.In this paper,we analyze the differences between SETAM with security use case and security misuse case in different types of security test requirements.To illustrate the effectiveness of SETAM,we compare them in a practical case study by the number of test cases and the number of faults detected by them.The results show that SETAM could decrease about 34.87%use cases on average,and the number of faults detected by SETAM increased by 71.67%in average,which means that our model can detect more faults with fewer test cases for software security testing.
文摘We present here an alternative definition of the P-value for statistical hypothesis test of a real-valued parameter for a continuous random variable X. Our approach uses neither the notion of Type I error nor the assumption that null hypothesis is true. Instead, the new P-value involves the maximum likelihood estimator, which is usually available for a parameter such as the mean μ or standard deviation σ of a random variable X with a common distribution.
文摘The acquisition and usage of definite article THE has always gained attention from scholars from domestic and overseas due to its difficulty of learning and mastering. As a result, the relative study of definite article THE acquisition has been one of the the most significant tasks of second language acquisition all the time. For English majors, the acquisition of definite articles THE runs through the whole process of language learning and application. Learner' s version of foreign language, known as interlanguage, is a kind of language that exists between the mother tongue (Chinese) and the target language (English). Interlanguage is a systematic unit which changes and develops constantly. Since definite article THE has rather complex and frequently altered usage, it is inevitable that there are a throng of misuse and problems for English majors when they are using definite article THE. This paper intends to do a survey focusing on English majors' application situation of definite article THE. Through analyzing the common misuse and mistakes appeared when English majors are using definite article THE, this paper aims to summerize the FAQ (frequently asked questions) and causes of those misuses. At the same time, the 100 experimental subjects of this survey are equally and randomly chosen from freshmen and third year students of foreign languages college, OUC (Ocean University of China). By comparing the experimental results of two different grade English major students, this paper aims to demonstrate the influence of different grades on the mastering of definite articles THE of English majors.
基金Sponsored by Shandong Natural Science Foundation-Youth Found Project(Grant No.ZR2013FQ024)the Opening Project of State Key Laboratory of Digital Publishing Technology
文摘In forensic investigations,it is vital that the authenticity of digital evidence should be ensured. In addition,technical means should be provided to ensure that digital evidence collected cannot be misused for the purpose of perjury. In this paper,we present a method to ensure both authenticity and non-misuse of data extracted from wireless mobile devices. In the method,the device ID and a timestamp become a part of the original data and the Hash function is used to bind the data together. Encryption is applied to the data,which includes the digital evidence,the device ID and the timestamp. Both symmetric and asymmetric encryption systems are employed in the proposed method where a random session key is used to encrypt the data while the public key of the forensic server is used to encrypt the session key to ensure security and efficiency. With the several security mechanisms that we show are supported or can be implemented in wireless mobile devices such as the Android,we can ensure the authenticity and non-misuse of data evidence in digital forensics.
文摘1.Biochemical structure and molecular activity of meldonium Meldonium(commercial name Mildronate)was originally synthesized in the mid-1970s at the Institute of Organic Synthesis of the Latvian Soviet Socialist Republic Academy of Sciences.The chemical structure of this compound(3-(2,2,2-
文摘In the course of college English teaching, English teachers may find some errors made by the non-English majors. Errors made when they are using English verbs are analyzed from the aspect of the similarities and differences between English verbs and Chinese verbs in this thesis. We can conclude that the most obvious cause of the misuse seems to be the interference of the first language (L1), that is, interlingual errors affect the English output of Chinese students. At last, the author calls for more input of the difference between L1 and L2 in L2 teaching and acquisition so that the same mistakes can be avoided.
文摘Based on the teaching video of middle school English teachers, through observation and analysis, it puts forward the problem of less use, wrong use and abuse in the use of teachers' teaching gestures in middle school English teaching. And then it puts forward corresponding solutions from three aspects: concept, theory and practice. Hoping to provide further reference to the complementary role of teaching gesture and teaching discourse.
文摘The core issue concerning the usage of tense and aspect is seen as significantly important(Michaelis,1994;Swales and Feak,2000),especially in English writing in college.This study identifies the erroneous use of tense and aspect in liberal arts students' writing in comparison with that of engineering students' to examine their application ability in writing and identify areas of English learning in need of intensive instruction.This paper displays the frequency rates of errors about two English tenses(the present and the past),two aspects(the progressive and the perfect)based on an online writing corpus of students in two majors,which leads to the result that students in both majors are more likely to make mistakes in the present time and perfect aspect,liberal arts students less influenced.In addition,engineering students writing score seems to be more related to their grammatical errors than that of liberal arts students.To improve their writings,practical teaching strategies such as being aware of cross-lingual influence,practicing grammar on context level,personalized instructions,are also provided.
文摘The term“porphyry”has a specific geological meaning but has been used freely by sculptors and art historians to name many types of stone that are not,geologically,porphyries.“Porphyries”have been associated with nobility and Imperial Monuments since Roman times.This paper discusses some examples from Karelia in Russia and from Sweden used in St Petersberg and the use of Russian Shoksha“porphyry”in Paris,France.It highlights several types of stone that have been referred to as porphyries but are not.The Shoksha stone has been of architectural and artistic importance both nationally and internationally for some 300 years.This might qualify it as a candidate for Global Heritage Stone Resource status.