首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 250 毫秒
1.
The concept of self is a fundamental characteristic of the human mind,and the alteration of self is thought to be a core deficit of schizophrenia.Previous studies have demonstrated that patients with schizophrenia are deficient in self-face recognition.Because self faces are not only self-related but also highly familiar,it is unclear whether such deficit arises from the breakdown of the self-awareness or the failure of recognizing the familiarity of self faces.Here we directly tested these two alternatives by instructing patients with schizophrenia to recognize the identity of a morphed face created by blending face features between any of two identities from the self face,a familiar face,and a novel face.We found that there was no association between the recognition of the self and the recognition of the familiarity,suggesting these two component processes are independent in schizophrenia.Further,patients with schizophrenia were significantly worse in recognizing the familiarity of faces than normal participants,whereas no difference in the sense of self was found between the two groups.Taken together,our finding suggests that it is the sense of familiarity,not the sense of self,that is selectively impaired in self-face recognition in schizophrenia.Thus,our study challenges the hypothesis that the deficit in self-face recognition in schizophrenia reflects the breakdown of self-awareness.  相似文献   

2.
Recently, there were debates about the specificity of lateral middle fusiform in face processing. The debates focused on whether these areas were specialized in face processing or involved in processing of visual expertise and categorization at individual level. The present study aims to investigate the neural mechanism of face processing, using Chinese characters as comparison stimuli. Chinese characters are greatly similar to faces on a variety of dimensions, among which the most significant one is that both faces and Chinese characters not only are extremely familiar to literate Chinese adults but also are processed at individual level. In the present study, faces and Chinese characters activated bilateral middle fusiform with great correlation. Greater activities were observed in the right fusiform face area (FFA) for faces than for Chinese characters. These results demonstrate that FFA is specialized in face processing per se rather than the processing of visual expertise and categorization at individual level.  相似文献   

3.
The magnesium alloy grew in a fashion of cellular crystals during the process of unidirectional solidification, and the {0001} crystal face orientation in the cast ingot of the magnesium alloy was studied. The theoretical model and methodology were set up, and a corresponding experiment was carried out to verify the theoretical analysis results. The experimental results indicate that the {0001} crystal face of magnesium crystals parallels to the width direction for the thin-plate cast ingot when the magnesium grows in a manner of cellular crystals. The separation angle between the {0001} crystal face of magnesium crystals and the vertical axis line of the cast ingot is about 62° for the circular column cast ingot, which distributes in cone-type. The theoretical analysis results are basically in agreement with the experimental ones of previous literatures and this paper.  相似文献   

4.
Some of face recognition methods based on Principal Component Analysis (PCA), Two-dimensional Principal Component Analysis (2DPCA) and Fisher's Linear Discriminant Analysis (FLDA) are comparatively studied in this paper. On the basis of the analysis of characteristics, application occasion and limitations, a new method of face recognition based on combining 2DPCA and FLDA is proposed. Finally, comparison simulations are performed with the methods and their combined methods by means of AT&T face database. The results show that the methods based on 2DPCA can have better recognition precision than the ones based on PCA; the method based on 2DPCA and FLDA improves the real-time characteristics in the condition of keeping the recognition precision and has the best performance.  相似文献   

5.
A closed-loop algorithm to detect human face using color information and reinforcement learning is presented in this paper. By using a skin-color selector, the regions with color “like“ that of human skin are selected as candidates for human face. In the next stage, the candidates are matched with a face model and given an evaluation of the match degree by the matching module. And if the evaluation of the match result is too low, a reinforcement learning stage will start to search the best parameters of the skin-color selector. It has been tested using many photos of various ethnic groups under various lighting conditions, such as different light source, high light and shadow. And the experiment result proved that this algorithm is robust to the vary-ing lighting conditions and personal conditions.  相似文献   

6.
Human dresses are different in thousands way. Human body image signals have big noise, a poor light and shade contrast and a narrow range of gray gradation distribution. The application of a traditional grads method or gray method to detect human body image edges can't obtain satisfactory results because of false detections and missed detections. According to the peculiarity of human body image, dyadic wavelet transform of cubic spline is successfully applied to detect the face and profile edges of human body image and Mallat algorithm is used in the wavelet decomposition in this paper.  相似文献   

7.
《矿物冶金与材料学报》2020,27(9):1165-1178
Voids (referred to as “stopes”) are generally created during underground mining activities and can lead to both local and regional geotechnical instabilities. To assist in managing the stability of mining-related voids and improving the recovery of orebodies, tailing-based backfill technology has been widely used around the world. In the design of tailing-based backfill strategy, the specific function and engineering requirements of the filling are intimately dependent on the stress distribution within the backfilled stope. In this paper, the main mechanics involved in tailing-based backfill in underground mines, which include arching, consolidation, hydration process, and movement of surrounding rocks, are reviewed. Research on the safety of a barricade and stability of an exposed fill face are also presented. In conclusion, the backfilling process should be performed on the basis of a better understanding of the complicated interactions of the mechanisms of filling, consolidation, and hydration process (when cement is added).  相似文献   

8.
The key to reduce shell breakout in the continuous casting process is to control shell thickness in the mold. A numerical simulation on the turbulent flow and heat transfer coupled with solidification in the slab mold using the volume of fluid (VOF) model and the enthalpy-porosity scheme was conducted and the emphasis was put upon the flow effect on the shell thickness profiles in longitudinal and transverse directions. The results show that the jet acts a stronger impingement on the shell of narrow face, which causes a zero-increase of shell thickness in a certain range near the impingement point. The thinnest shell on the slab cross-section locates primarily in the center of the narrow face, and secondly near the comer of the wide face. Nozzle optimization can obviously increase the shell thickness and make it more uniform.  相似文献   

9.
The relation betweenmining pressure field-fracture field and gas emission of working face is analyzed,and the concept that there is a stress point (or strain point) among permeability of coal is presented.It is believed that the mutation of coal permeability caused by the sudden loading or unloading of working face roof as periodic weighting occurs is the main reason that a lot of gas pour into the working face.Based on the above concept,the relation is established among abutment pressure during periodic weighting,permeability of coal seam and gas emission,and relation graph is drawn.Then the loading and unloading features of coal at the moment of fracture and non-fracture of main roof are revealed.And finally it is presented that the process of sudden loading or unloading as periodic weighting occurs plays an important role in rupture propagation of coal,analytical movement of gas and gas emission.  相似文献   

10.
Human expression rapid reconstruction has many potential applications in entertainment and social security. In this work, a rapid human expression measurement system based on a digital fringe projection and phase-shift technique is developed. The measurement system consists of a digital light processing (DLP) projector and a high-speed change-coupled device (CCD) camera. The DLP projector is used to project computer-generated fringe patterns onto the human face, and the high-speed CCD camera synchronized with the projector acquires the fringe images at a frame rate of 30 frames/s. Based on a three-step phase-shifting method and an accurate phase-height mapping algorithm, each frame of the 3-D human expression can be reconstructed. The principle of the proposed method is described and some experimental results are presented to demonstrate its performance. The experiment results show that the measurement system can reconstruct accurate 3-D human expression. An obvious merit of this method is that it can reconstruct the 3-D human expression in a very short time and it is not sensitive to the movement of the face during the measurement processing.  相似文献   

11.
A new design of LHM (left handed material) is suggested, in which the wave vector k and the energy flow S (the Poyming veclor) are in the opposite direction. Metallic cores or lines are coated with ferromagnetic layers to obtain negative permittivity and permeability. This design may bring some improvements over the binary design, such as higher homogeneity, smaller volume size, lower power loss, higher convenience and economy. The analytical expressions for the permiltivily s and permeability μ are shown to be negative in certain direction and frequency regions. Two specific structures are theoretically discussed and proved to be left-handed.  相似文献   

12.
In this paper, the applications of evolutionary al gorithm in prediction of protein secondary structure and tertiary structures are introduced, and recent studies on solving protein structure prediction problems using evolutionary algorithms are reviewed, and the challenges and prospects of EAs applied to protein structure modeling are analyzed and discussed. Foundation item: Supported by the National Natural Science Foundation of China( 60133010,70071042,60073043) Biography: Zou Xiu-fen ( 1966-), female, Associate professor, research direction:evolutionary computing, parallel computing, bioinformatics.  相似文献   

13.
Based on the difficulty of solving the ECDLP (elliptic curve discrete logarithm problem) on the finite field, we present a (t, n) threshold signature scheme and a verifiable key agreement scheme without trusted party. Applying a modified elliptic curve signature equation, we get a more efficient signature scheme than the existing ECDSA (ellipticcurve digital signature algorithm) from the computability and security view. Our scheme has a shorter key, faster computation, and better security.  相似文献   

14.
Adopting the lifting scheme, introduced by Sweldens, a new wavelet is constructed. It overcomes the shortcoming of the classical wavelets that has no flexibility in the number of vanishing moment. Two examples are given to prove the second-generation wavelets‘s potentialities in the singularity detection of signal: a wavelet with vanishing moment and symmetry can be constructed according to the problem.  相似文献   

15.
Asymptotic expressions for the fields scattered by an isotropic impedance wedge at skew incidence are derived in the frame of the uniform geometrical theory of diffraction (UTD). They are obtained by approximately solving the difference equations generated from impedance boundary con ditions (IBCs) in Maliuzhinets' approach. The method overcomes the discontinuity of the nonuniform evaluation given in the literature referred and can give out satisfactory numerical results.  相似文献   

16.
In this paper, algorithms of constructing wavelet filters based on genetic algorithm are studied with emphasis on how to construct the optimal wavelet filters used to compress a given image,due to efficient coding of the chromosome and the fitness function, and due to the global optimization algorithm, this method turns out to be perfect for the compression of the images. Foundation item: Supported by the Natural Science Foundation of Education of Hunan Province(21010506) Biography: Wen Gao-jin( 1978-), male, Master candidate, research direction: evolutionary computing.  相似文献   

17.
A new approach based on the concept of the diversity increment is applied to reconstruct a phylogeny. The phylogeny of the Eutherian orders use concatenated H-stranded amino acid sequences, and the result is consistent with the commonly accepted one for the Eutherians. Foundation item: Supported by the National Natural Science Foundation of China ( 30170214) and the Open Foundation of the State Key Laboratory of Software Engineer, Wuhan University, China. Biography: Shi Feng ( 1966- ), male, Ph. D, Associate professor, research direction: bioinformatics.  相似文献   

18.
The mutual information function is used to describe the auto-correlation of amino acids in protein. We find two interesting phenomenon: (1) for any given big protein, the mutual information function l(k) is almost a const, where k is the length of gap. (2) for any two sequence similar proteins, the mutual information are nearly the same. As a consequent, we may use mutual information of protein as a character for sequences comparison. Foundation item: Supported by the National Natural Science Foundation of China (30170214) Biography: Shi Feng ( 1966-), male, Ph. D, Associate professor, research direction: bioinformatics.  相似文献   

19.
Zhou et al give an attack on Ham's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.  相似文献   

20.
A new concept of characteristic scanning radial (CSR) is proposed for the segmented image on the basis of two shape-speciiic points oi its shape-objects. Subsequently, two characteristic attribute sequences (CAS) of relative distance and relative direction are derived to represent the spatial orientation relationships among objects of the image. A novel image retrieval algorithm is presented using these two CASs. The proposed retrieval approach not only satisfies the transformational invariance, but also attains the quantitative comparison of matching. Experiments identify the effectiveness and efficiency of the algorithm adequately.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号