D 2012 Object-Based Attention Overrides Perceptual Load to Modulate
Java使用@Idempotent注解处理幂等问题,防止二次点击

Java使⽤@Idempotent注解处理幂等问题,防⽌⼆次点击Java使⽤⾃定义注解@Idempotent处理幂等问题,防⽌⼆次点击幂等实现原理就是利⽤AOP⾯向切⾯编程,在执⾏业务逻辑之前插⼊⼀个⽅法,⽣成⼀个token,存⼊redis并插⼊到response中返回给前台,然后前台再拿着这个token发起请求,经过判断,只执⾏第⼀次请求,多余点击的请求都拦截下来.创建⾃定义注解@Idempotentpackage mon.annotation;import ng.annotation.*;//注解信息会被添加到Java⽂档中@Documented//注解的⽣命周期,表⽰注解会被保留到什么阶段,可以选择编译阶段、类加载阶段,或运⾏阶段@Retention(RetentionPolicy.RUNTIME)//注解作⽤的位置,ElementType.METHOD表⽰该注解仅能作⽤于⽅法上@Target(ElementType.METHOD)public @interface Idempotent {}创建⾃定义注解@IdempotentTokenpackage mon.annotation;import ng.annotation.*;//注解信息会被添加到Java⽂档中@Documented//注解的⽣命周期,表⽰注解会被保留到什么阶段,可以选择编译阶段、类加载阶段,或运⾏阶段@Retention(RetentionPolicy.RUNTIME)//注解作⽤的位置,ElementType.METHOD表⽰该注解仅能作⽤于⽅法上@Target(ElementType.METHOD)public @interface IdempotentToken {}@Idempotent注解的配置类IdempotentInterceptorpackage org.jeecg.config.idempotent;import cn.hutool.core.util.ObjectUtil;import lombok.extern.slf4j.Slf4j;import ng3.StringUtils;import mon.annotation.Idempotent;import mon.annotation.IdempotentToken;import mon.util.RedisUtil;import ponent;import org.springframework.web.method.HandlerMethod;import org.springframework.web.servlet.HandlerInterceptor;import javax.servlet.http.HttpServletRequest;import javax.servlet.http.HttpServletResponse;import ng.reflect.Method;import java.util.UUID;/*** @author zbw*/@Slf4j@Componentpublic class IdempotentInterceptor implements HandlerInterceptor {private static final String VERSION_NAME = "version";private static final String TOKEN_NAME = "idempotent_token";private static final String IDEMPOTENT_TOKEN_PREFIX = "idempotent:token:";/*private RedisTemplate<String, Object> redisTemplate;*/private RedisUtil redisUtil;public IdempotentInterceptor(RedisUtil redisUtil){this.redisUtil = redisUtil;}@Overridepublic boolean preHandle(HttpServletRequest request, HttpServletResponse response, Object handler) throws Exception {if (!(handler instanceof HandlerMethod)) {return true;}HandlerMethod handlerMethod = (HandlerMethod) handler;Method method = handlerMethod.getMethod();IdempotentToken idempotentTokenAnnotation = method.getAnnotation(IdempotentToken.class);if(idempotentTokenAnnotation!=null){//重新更新tokenString token = UUID.randomUUID().toString().replaceAll("-","");response.addHeader(TOKEN_NAME,token);//解决后端传递token前端⽆法获取问题response.addHeader("Access-Control-Expose-Headers",TOKEN_NAME);redisUtil.set(IDEMPOTENT_TOKEN_PREFIX+token,token);}Idempotent idempotentAnnotation = method.getAnnotation(Idempotent.class);if(idempotentAnnotation!=null){checkIdempotent(request);}return true;}@Overridepublic void afterCompletion(HttpServletRequest request, HttpServletResponse response, Object handler, Exception ex) throws Exception {}private void checkIdempotent(HttpServletRequest request) {//⾸先到request中去拿TOKEN_NAMEString token = request.getHeader(TOKEN_NAME);if(ObjectUtil.isEmpty(token)){token = "";}if (StringUtils.isBlank(token)) {// header中不存在tokentoken = request.getParameter(TOKEN_NAME);if (StringUtils.isBlank(token)) {// parameter中也不存在tokenthrow new IllegalArgumentException("幂等token丢失,请勿重复提交");}}if (!redisUtil.hasKey(IDEMPOTENT_TOKEN_PREFIX+token)) {throw new IllegalArgumentException("请勿重复提交");}boolean bool = redisUtil.delete(IDEMPOTENT_TOKEN_PREFIX+token);if(!bool){throw new IllegalArgumentException("没有删除对应的token");}}}这个注解配置是基于redis的,在这⾥redis的配置略过,本章只是讲解如何简单的使⽤后端的话,需要在该页⾯的list查询上加上@IdempotentToken注解,原理是涉及到查询成功后会刷新⼀下页⾯,重新获取token @Idempotent注解配置完成就可以直接加在controller的对应⽅法上,如图:前端的⼀些配置(这⾥我⽤的是ant design vue):user.js⾥⾯加⼊idempotentToken:''SET_IDEMPOTENT_TOKEN:(state,token)=>{state.idempotentToken = token},getter.js⾥⾯加⼊idempotentToken: state => er.idempotentToken,request.js⾥⾯修改// request interceptore(config => {const token = Vue.ls.get(ACCESS_TOKEN)if (token) {config.headers[ 'X-Access-Token' ] = token // 让每个请求携带⾃定义 token 请根据实际情况⾃⾏修改 }const idempotent_token = Vue.ls.get(IDEMPOTENT_TOKEN)if(idempotent_token){config.headers['idempotent_token'] = idempotent_token}//update-begin-author:taoyan date:2020707 for:多租户let tenantid = Vue.ls.get(TENANT_ID)if (!tenantid) {tenantid = 0;}config.headers[ 'tenant_id' ] = tenantid//update-end-author:taoyan date:2020707 for:多租户if(config.method=='get'){if(config.url.indexOf("sys/dict/getDictItems")<0){config.params = {_t: Date.parse(new Date())/1000,...config.params}}}return config},(error) => {return Promise.reject(error)})// response interceptore((response) => {let idempotent_token = response.headers[IDEMPOTENT_TOKEN]if(idempotent_token){Vue.ls.set(IDEMPOTENT_TOKEN,idempotent_token,7 * 24 * 60 * 60 * 1000)mit('SET_IDEMPOTENT_TOKEN', idempotent_token)}return response.data}, err)const installer = {vm: {},install (Vue, router = {}) {e(VueAxios, router, service)}mutation-type.js加⼊定义的常量export const IDEMPOTENT_TOKEN='idempotent_token'这样算是完成了,再次出现⼆次请求时直接会被拦截。
Autodesk Nastran 2023 参考手册说明书

FILESPEC ............................................................................................................................................................ 13
DISPFILE ............................................................................................................................................................. 11
File Management Directives – Output File Specifications: .............................................................................. 5
BULKDATAFILE .................................................................................................................................................... 7
TmCalculator 1.0.3 核苷酸序列融解温度计算器说明书

Package‘TmCalculator’October12,2022Type PackageTitle Melting Temperature of Nucleic Acid SequencesVersion1.0.3Date2022-02-20Author Junhui LiMaintainer Junhui Li<****************.cn>Description This tool is extended from methods in Bio.SeqUtils.MeltingTemp of python.The melt-ing temperature of nucleic acid sequences can be calculated in three method,the Wal-lace rule(Thein&Wallace(1986)<doi:10.1016/S0140-6736(86)90739-7>),empirical formu-las based on G and C content(Marmur J.(1962)<doi:10.1016/S0022-2836(62)80066-7>,Schildkraut C.(2010)<doi:10.1002/bip.360030207>,Wet-mur J G(1991)<doi:10.3109/10409239109114069>,Unter-gasser,A.(2012)<doi:10.1093/nar/gks596>,von Ah-sen N(2001)<doi:10.1093/clinchem/47.11.1956>)and nearest neighbor thermodynamics(Bres-lauer K J(1986)<doi:10.1073/pnas.83.11.3746>,Sugi-moto N(1996)<doi:10.1093/nar/24.22.4501>,Allawi H(1998)<doi:10.1093/nar/26.11.2694>,San-taLu-cia J(2004)<doi:10.1146/annurev.biophys.32.110601.141800>,Freier S(1986)<doi:10.1073/pnas.83.24.9373>,Xia T(19 mar-ito S(2000)<doi:10.1093/nar/28.9.1929>,Turner D H(2010)<doi:10.1093/nar/gkp892>,Sugi-moto N(1995)<doi:10.1016/S0048-9697(98)00088-6>,Allawi H T(1997)<doi:10.1021/bi962590c>,Santalu-cia N(2005)<doi:10.1093/nar/gki918>),and it can also be corrected with salt ions and chemi-cal compound(SantaLucia J(1996)<doi:10.1021/bi951907q>,SantaLu-cia J(1998)<doi:10.1073/pnas.95.4.1460>,Owczarzy R(2004)<doi:10.1021/bi034621r>,Owczarzy R(2008)<doi:10.102 BugReports https:///JunhuiLi1017/TmCalculator/issuesLicense GPL(>=2)Depends R(>=2.10)NeedsCompilation noRepository CRANRoxygenNote7.1.2Date/Publication2022-02-2104:10:03UTC12c2s R topics documented:c2s (2)check_filter (3)chem_correction (4)complement (5)GC (6)print.TmCalculator (6)s2c (7)salt_correction (8)Tm_GC (9)Tm_NN (12)Tm_Wallace (15)Index17 c2s convert a vector of characters into a stringDescriptionSimply convert a vector of characters such as c("H","e","l","l","o","W","o","r","l","d")into a single string"HelloWorld".Usagec2s(characters)Argumentscharacters A vector of charactersValueRetrun a stringsAuthor(s)Junhui LiReferencescitation("TmCalculator")Examplesc2s(c("H","e","l","l","o","W","o","r","l","d"))check_filter3check_filter Check andfilter invalid base of nucleotide sequencesDescriptionIn general,whitespaces and non-base characters are removed and characters are converted to up-percase in given method.Usagecheck_filter(ntseq,method)Argumentsntseq Sequence(5’to3’)of one strand of the DNA nucleic acid duplex as string orvector of charactersmethod TM_Wallace:check and return"A","B","C","D","G","H","I","K","M","N","R","S","T","V","W"and"Y"TM_GC:check and return"A","B","C","D","G","H","I","K","M","N","R","S","T","V","W","X"and"Y"TM_NN:check and return"A","C","G","I"and"T"ValueReturn a sequence which fullfils the requirements of the given method.Author(s)Junhui LiReferencescitation("TmCalculator")Examplesntseq<-c("ATCGBDHKMNRVYWSqq")check_filter(ntseq,method= Tm_Wallace )check_filter(ntseq,method= Tm_NN )4chem_correction chem_correction Corrections of melting temperature with chemical substancesDescriptionCorrections coefficient of melting temperature with DMSO and formamide and these corrections are rough approximations.Usagechem_correction(DMSO=0,fmd=0,DMSOfactor=0.75,fmdmethod=c("concentration","molar"),fmdfactor=0.65,ptGC)ArgumentsDMSO Percent DMSOfmd Formamide concentration in percentage(fmdmethod="concentration")or molar (fmdmethod="molar").DMSOfactor Coefficient of Tm decreases per percent DMSO.Default=0.75von Ahsen N (2001)<PMID:11673362>.Other published values are0.5,0.6and0.675.fmdmethod"concentration"method for formamide concentration in percentage and"molar"for formamide concentration in molarfmdfactor Coefficient of Tm decrease per percent formamide.Default=0.65.Several pa-pers report factors between0.6and0.72.ptGC Percentage of GC(%).Detailsfmdmethod="concentration"Correction=-factor*percentage_of_formamidefmdmethod="molar"Correction=(0.453*GC/100-2.88)x formamideAuthor(s)Junhui Licomplement5 Referencesvon Ahsen N,Wittwer CT,Schutz E,et al.Oligonucleotide melting temperatures under PCR conditions:deoxynucleotide Triphosphate and Dimethyl sulfoxide concentrations with comparison to alternative empirical formulas.Clin Chem2001,47:1956-C1961.Exampleschem_correction(DMSO=3)chem_correction(fmd=1.25,fmdmethod="molar",ptGC=50)complement complement and reverse complement base of nucleotide sequencesDescriptionget reverse complement and complement base of nucleotide sequencesUsagecomplement(ntseq,reverse=FALSE)Argumentsntseq Sequence(5’to3’)of one strand of the nucleic acid duplex as string or vector of charactersreverse Logical value,TRUE is reverse complement sequence,FALSE is not.Author(s)Junhui LiReferencescitation("TmCalculator")Examplescomplement("ATCGYCGYsWwsaVv")complement("ATCGYCGYsWwsaVv",reverse=TRUE)6print.TmCalculator GC Calculate G and C content of nucleotide sequencesDescriptionCalculate G and C content of nucleotide sequences.The number of G and C in sequence is divided by length of sequence(when totalnt is TRUE)or the number of all A,T,C,G and ambiguous base.UsageGC(ntseq,ambiguous=FALSE,totalnt=TRUE)Argumentsntseq Sequence(5’to3’)of one strand of the nucleic acid duplex as string or vector of characters.ambiguous Ambiguous bases are taken into account to compute the G and C content when ambiguous is TRUE.totalnt Sum of’G’and’C’bases divided by the length of the sequence when totalnt is TRUE.ValueContent of G and C(range from0to100Author(s)Junhui LiExamplesGC(c("a","t","c","t","g","g","g","c","c","a","g","t","a"))#53.84615GC("GCATSWSYK",ambiguous=TRUE)#55.55556print.TmCalculator Prints melting temperature from a TmCalculator objectDescriptionprint.TmCalculator prints to console the melting temperature value from an object of class TmCalculator.s2c7Usage##S3method for class TmCalculatorprint(x,...)Argumentsx An object of class TmCalculator....UnusedValueThe melting temperature value.s2c convert a string into a vector of charactersDescriptionSimply convert a single string such as"HelloWorld"into a vector of characters such as c("H","e","l","l","o","W","o","r","l","d Usages2c(strings)Argumentsstrings A single string such as"HelloWorld"ValueRetrun a vector of charactersAuthor(s)Junhui LiReferencescitation("TmCalculator")Exampless2c(c("HelloWorld"))8salt_correctionsalt_correction Corrections of melting temperature with salt ionsDescriptionCorrections coefficient of melting temperature or entropy with different operationsUsagesalt_correction(Na=0,K=0,Tris=0,Mg=0,dNTPs=0,method=c("Schildkraut2010","Wetmur1991","SantaLucia1996","SantaLucia1998-1", "SantaLucia1998-2","Owczarzy2004","Owczarzy2008"),ntseq,ambiguous=FALSE)ArgumentsNa Millimolar concentration of NaK Millimolar concentration of KTris Millimolar concentration of TrisMg Millimolar concentration of MgdNTPs Millimolar concentration of dNTPsmethod Method to be applied including"Schildkraut2010","Wetmur1991","SantaLucia1996", "SantaLucia1998-1","SantaLucia1998-2","Owczarzy2004","Owczarzy2008".Firstfourth methods correct Tm,fifth method corrects deltaS,sixth and seventh meth-ods correct1/Tm.See details for the method description.ntseq Sequence(5’to3’)of one strand of the nucleic acid duplex as string or vectorof characters.ambiguous Ambiguous bases are taken into account to compute the G and C content whenambiguous is TRUE.DetailsThe methods are:1Schildkraut C(2010)<doi:10.1002/bip.360030207>2Wetmur J G(1991)<doi:10.3109/10409239109114069>3SantaLucia J(1996)<doi:10.1021/bi951907q>4SantaLucia J(1998)<doi:10.1073/pnas.95.4.1460>5SantaLucia J(1998)<doi:10.1073/pnas.95.4.1460>6Owczarzy R(2004)<doi:10.1021/bi034621r>7Owczarzy R(2008)<doi:10.1021/bi702363u>methods1-4:Tm(new)=Tm(old)+correctionmethod5:deltaS(new)=deltaS(old)+correctionmethods6+7:Tm(new)=1/(1/Tm(old)+correction)Author(s)Junhui LiReferencesSchildkraut C.Dependence of the melting temperature of DNA on salt concentration[J].Biopoly-mers,2010,3(2):195-208.Wetmur J G.DNA Probes:Applications of the Principles of Nucleic Acid Hybridization[J].CRC Critical Reviews in Biochemistry,1991,26(3-4):3Santalucia,J,Allawi H T,Seneviratne P A.Improved Nearest-Neighbor Parameters for Predicting DNA Duplex Stability,[J].Biochemistry,1996,35(11):3555-3562.SantaLucia,J.A unified view of polymer,dumbbell,and oligonucleotide DNA nearest-neighbor thermodynamics[J].Proceedings of the National Academy of Sciences,1998,95(4):1460-1465.Owczarzy R,You Y,Moreira B G,et al.Effects of Sodium Ions on DNA Duplex Oligomers: Improved Predictions ofMelting Temperatures[J].Biochemistry,2004,43(12):3537-3554.Owczarzy R,Moreira B G,You Y,et al.Predicting Stability of DNA Duplexes in Solutions Containing Magnesium and Monovalent Cations[J].Biochemistry,2008,47(19):5336-5353. Examplesntseq<-c("acgtTGCAATGCCGTAWSDBSYXX")salt_correction(Na=390,K=20,Tris=0,Mg=10,dNTPs=25,method="Owczarzy2008",ntseq)Tm_GC Calculate the melting temperature using empirical formulas based onGC contentDescriptionCalculate the melting temperature using empirical formulas based on GC content with different optionsUsageTm_GC(ntseq,ambiguous=FALSE,userset=NULL,variant=c("Primer3Plus","Chester1993","QuikChange","Schildkraut1965","Wetmur1991_MELTING","Wetmur1991_RNA","Wetmur1991_RNA/DNA","vonAhsen2001"),Na=0,K=0,Tris=0,Mg=0,dNTPs=0,saltcorr=c("Schildkraut2010","Wetmur1991","SantaLucia1996","SantaLucia1998-1", "Owczarzy2004","Owczarzy2008"),mismatch=TRUE,DMSO=0,fmd=0,DMSOfactor=0.75,fmdfactor=0.65,fmdmethod=c("concentration","molar"),outlist=TRUE)Argumentsntseq Sequence(5’to3’)of one strand of the nucleic acid duplex as string or vectorof characters.ambiguous Ambiguous bases are taken into account to compute the G and C content whenambiguous is TRUE.userset A vector of four coefficient ersets override value sets.variant Empirical constants coefficient with8variant:Chester1993,QuikChange,Schild-kraut1965,Wetmur1991_MELTING,Wetmur1991_RNA,Wetmur1991_RNA/DNA,Primer3Plus and vonAhsen2001Na Millimolar concentration of Na,default is0K Millimolar concentration of K,default is0Tris Millimolar concentration of Tris,default is0Mg Millimolar concentration of Mg,default is0dNTPs Millimolar concentration of dNTPs,default is0saltcorr Salt correction method should be chosen when provide’userset’.Options are"Schildkraut2010","Wetmur1991","SantaLucia1996","SantaLucia1998-1","Owczarzy2004","Owczarzy2Note that"SantaLucia1998-2"is not available for this function.mismatch If’True’(default)every’X’in the sequence is counted as mismatchDMSO Percent DMSOfmd Formamide concentration in percentage(fmdmethod="concentration")or molar(fmdmethod="molar").Tm_GC11 DMSOfactor Coeffecient of Tm decreases per percent DMSO.Default=0.75von Ahsen N (2001)<PMID:11673362>.Other published values are0.5,0.6and0.675.fmdfactor Coeffecient of Tm decrease per percent formamide.Default=0.65.Several pa-pers report factors between0.6and0.72.fmdmethod"concentration"method for formamide concentration in percentage and"molar"for formamide concentration in molaroutlist output a list of Tm and options or only Tm value,default is TRUE.DetailsEmpirical constants coefficient with8variant:Chester1993:Tm=69.3+0.41(Percentage_GC)-650/NQuikChange:Tm=81.5+0.41(Percentage_GC)-675/N-Percentage_mismatchSchildkraut1965:Tm=81.5+0.41(Percentage_GC)-675/N+16.6x log[Na+]Wetmur1991_MELTING:Tm=81.5+0.41(Percentage_GC)-500/N+16.6x log([Na+]/(1.0+0.7 x[Na+]))-Percentage_mismatchWetmur1991_RNA:Tm=78+0.7(Percentage_GC)-500/N+16.6x log([Na+]/(1.0+0.7x[Na+])) -Percentage_mismatchWetmur1991_RNA/DNA:Tm=67+0.8(Percentage_GC)-500/N+16.6x log([Na+]/(1.0+0.7x [Na+]))-Percentage_mismatchPrimer3Plus:Tm=81.5+0.41(Percentage_GC)-600/N+16.6x log[Na+]vonAhsen2001:Tm=77.1+0.41(Percentage_GC)-528/N+11.7x log[Na+]Author(s)Junhui LiReferencesMarmur J,Doty P.Determination of the base composition of deoxyribonucleic acid from its thermal denaturation temperature.[J].Journal of Molecular Biology,1962,5(1):109-118.Schildkraut C.Dependence of the melting temperature of DNA on salt concentration[J].Biopoly-mers,2010,3(2):195-208.Wetmur J G.DNA Probes:Applications of the Principles of Nucleic Acid Hybridization[J].CRC Critical Reviews in Biochemistry,1991,26(3-4):33.Untergasser A,Cutcutache I,Koressaar T,et al.Primer3–new capabilities and interfaces[J].Nucleic Acids Research,2012,40(15):e115-e115.von Ahsen N,Wittwer CT,Schutz E,et al.Oligonucleotide melting temperatures under PCR conditions:deoxynucleotide Triphosphate and Dimethyl sulfoxide concentrations with comparison to alternative empirical formulas.Clin Chem2001,47:1956-1961.Examplesntseq<-c("ATCGTGCGTAGCAGTACGATCAGTAG")out<-Tm_GC(ntseq,ambiguous=TRUE,variant="Primer3Plus",Na=50,mismatch=TRUE)outout$Tmout$OptionsTm_NN Calculate melting temperature using nearest neighbor thermodynam-icsDescriptionCalculate melting temperature using nearest neighbor thermodynamicsUsageTm_NN(ntseq,ambiguous=FALSE,comSeq=NULL,shift=0,nn_table=c("DNA_NN4","DNA_NN1","DNA_NN2","DNA_NN3","RNA_NN1","RNA_NN2","RNA_NN3","R_DNA_NN1"),tmm_table="DNA_TMM1",imm_table="DNA_IMM1",de_table=c("DNA_DE1","RNA_DE1"),dnac1=25,dnac2=25,selfcomp=FALSE,Na=0,K=0,Tris=0,Mg=0,dNTPs=0,saltcorr=c("Schildkraut2010","Wetmur1991","SantaLucia1996","SantaLucia1998-1", "SantaLucia1998-2","Owczarzy2004","Owczarzy2008"),DMSO=0,fmd=0,DMSOfactor=0.75,fmdfactor=0.65,fmdmethod=c("concentration","molar"),outlist=TRUE)Argumentsntseq Sequence(5’to3’)of one strand of the nucleic acid duplex as string or vectorof characters.ambiguous Ambiguous bases are taken into account to compute the G and C content whenambiguous is TRUE.Default is FALSE.comSeq Complementary sequence.The sequence of the template/target in3’->5’direc-tionshift Shift of the primer/probe sequence on the template/target sequence,default=0.for example:when shift=0,thefirst nucleotide base at5‘end of primer align tofirst one at3‘end of template.When shift=-1,the second nucleotide base at5‘end of primer align tofirst one at3‘end of template.When shift=1,thefirst nucleotide base at5‘end of primer align to second oneat3‘end of template.The shift parameter is necessary to align primer/probeand template/target if they have different lengths or if they should have danglingends.nn_table Thermodynamic NN values,eight tables are implemented.For DNA/DNA hybridizations:DNA_NN1,DNA_NN2,DNA_NN3,DNA_NN4For RNA/RNA hybridizations:RNA_NN1,RNA_NN2,RNA_NN3For RNA/DNA hybridizations:R_DNA_NN1tmm_table Thermodynamic values for terminal mismatches.Default:DNA_TMM1imm_table Thermodynamic values for internal mismatches,may include insosine mismatches.Default:DNA_IMM1de_table Thermodynamic values for dangling ends.DNA_DE1(default)and RNA_DE1dnac1Concentration of the higher concentrated strand[nM].Typically this will be theprimer(for PCR)or the probe.Default=25.dnac2Concentration of the lower concentrated strand[nM].selfcomp Sequence self-complementary,default=False.If’True’the primer is thoughtbinding to itself,thus dnac2is not considered.Na Millimolar concentration of Na,default is0K Millimolar concentration of K,default is0Tris Millimolar concentration of Tris,default is0Mg Millimolar concentration of Mg,default is0dNTPs Millimolar concentration of dNTPs,default is0saltcorr Salt correction method should be chosen when provide’userset’Options are"Schildkraut2010","Wetmur1991","SantaLucia1996","SantaLucia1998-1","SantaLucia1998-2","Owczarzy2004","Owczarzy2008".Note that NA means no salt correction.DMSO Percent DMSOfmd Formamide concentration in percentage(fmdmethod="concentration")or molar(fmdmethod="molar").DMSOfactor Coeffecient of Tm decreases per percent DMSO.Default=0.75von Ahsen N(2001)<PMID:11673362>.Other published values are0.5,0.6and0.675.fmdfactor Coeffecient of Tm decrease per percent formamide.Default=0.65.Several pa-pers report factors between0.6and0.72.fmdmethod"concentration"method for formamide concentration in percentage and"molar"for formamide concentration in molar.outlist output a list of Tm and options or only Tm value,default is TRUE.DetailsDNA_NN1:Breslauer K J(1986)<doi:10.1073/pnas.83.11.3746>DNA_NN2:Sugimoto N(1996)<doi:10.1093/nar/24.22.4501>DNA_NN3:Allawi H(1998)<doi:10.1093/nar/26.11.2694>DNA_NN4:SantaLucia J(2004)<doi:10.1146/annurev.biophys.32.110601.141800>RNA_NN1:Freier S(1986)<doi:10.1073/pnas.83.24.9373>RNA_NN2:Xia T(1998)<doi:10.1021/bi9809425>RNA_NN3:Chen JL(2012)<doi:10.1021/bi3002709>R_DNA_NN1:Sugimoto N(1995)<doi:10.1016/S0048-9697(98)00088-6>DNA_TMM1:Bommarito S(2000)<doi:10.1093/nar/28.9.1929>DNA_IMM1:Peyret N(1999)<doi:10.1021/bi9825091>&Allawi H T(1997)<doi:10.1021/bi962590c> &Santalucia N(2005)<doi:10.1093/nar/gki918>DNA_DE1:Bommarito S(2000)<doi:10.1093/nar/28.9.1929>RNA_DE1:Turner D H(2010)<doi:10.1093/nar/gkp892>Author(s)Junhui LiReferencesBreslauer K J,Frank R,Blocker H,et al.Predicting DNA duplex stability from the base se-quence.[J].Proceedings of the National Academy of Sciences,1986,83(11):3746-3750.Sugimoto N,Nakano S,Yoneyama M,et al.Improved Thermodynamic Parameters and Helix Ini-tiation Factor to Predict Stability of DNA Duplexes[J].Nucleic Acids Research,1996,24(22):4501-5.Allawi,H.Thermodynamics of internal C.T mismatches in DNA[J].Nucleic Acids Research,1998, 26(11):2694-2701.Hicks L D,Santalucia J.The thermodynamics of DNA structural motifs.[J].Annual Review of Biophysics&Biomolecular Structure,2004,33(1):415-440.Freier S M,Kierzek R,Jaeger J A,et al.Improved free-energy parameters for predictions of RNA duplex stability.[J].Proceedings of the National Academy of Sciences,1986,83(24):9373-9377.Xia T,Santalucia,J,Burkard M E,et al.Thermodynamic Parameters for an Expanded Nearest-Neighbor Model for Formation of RNA Duplexes with Watson-Crick Base Pairs,[J].Biochemistry, 1998,37(42):14719-14735.Chen J L,Dishler A L,Kennedy S D,et al.Testing the Nearest Neighbor Model for Canonical RNA Base Pairs:Revision of GU Parameters[J].Biochemistry,2012,51(16):3508-3522.Bommarito S,Peyret N,Jr S L.Thermodynamic parameters for DNA sequences with dangling ends[J].Nucleic Acids Research,2000,28(9):1929-1934.Turner D H,Mathews D H.NNDB:the nearest neighbor parameter database for predicting stability of nucleic acid secondary structure[J].Nucleic Acids Research,2010,38(Database issue):D280-D282.Sugimoto N,Nakano S I,Katoh M,et al.Thermodynamic Parameters To Predict Stability of RNA/DNA Hybrid Duplexes[J].Biochemistry,1995,34(35):11211-11216.Allawi H,SantaLucia J:Thermodynamics and NMR of internal G-T mismatches in DNA.Bio-chemistry1997,36:10581-10594.Santalucia N E W J.Nearest-neighbor thermodynamics of deoxyinosine pairs in DNA duplexes[J].Nucleic Acids Research,2005,33(19):6258-67.Peyret N,Seneviratne P A,Allawi H T,et al.Nearest-Neighbor Thermodynamics and NMR of DNA Sequences with Internal A-A,C-C,G-G,and T-T Mismatches,[J].Biochemistry,1999, 38(12):3468-3477.Examplesntseq<-c("AAAATTTTTTTCCCCCCCCCCCCCCGGGGGGGGGGGGTGTGCGCTGC")out<-Tm_NN(ntseq,Na=50)outout$OptionsTm_Wallace Calculate the melting temperature using the’Wallace rule’DescriptionThe Wallace rule is often used as rule of thumb for approximate melting temperature calculations for primers with14to20nt length.UsageTm_Wallace(ntseq,ambiguous=FALSE,outlist=TRUE)Argumentsntseq Sequence(5’to3’)of one strand of the DNA nucleic acid duplex as string or vector of characters(Note:Non-DNA characters are ignored by this method).ambiguous Ambiguous bases are taken into account to compute the G and C content when ambiguous is TRUE.outlist output a list of Tm and options or only Tm value,default is TRUE.Author(s)Junhui LiReferencesThein S L,Lynch J R,Weatherall D J,et al.DIRECT DETECTION OF HAEMOGLOBIN E WITH SYNTHETIC OLIGONUCLEOTIDES[J].The Lancet,1986,327(8472):93.Examplesntseq=c( acgtTGCAATGCCGTAWSDBSY )#for wallace ruleout<-Tm_Wallace(ntseq,ambiguous=TRUE)outout$OptionsIndexc2s,2check_filter,3chem_correction,4complement,5GC,6print.TmCalculator,6s2c,7salt_correction,8Tm_GC,9Tm_NN,12Tm_Wallace,1517。
计算机日语词汇学习

【计算机日语】词汇学习アーカイブ=打包=archiverアーカイバルメモリー=数据库存储器=archival memoryアーカイビング=打包=archivingアーカイバファイル=打包文件=archive fileアーキテクチャー=系统结构,架构=architectureアーキテクチャーフリープロセッサー=无结构式(信息)处理机=architecture free processor アーキテクチャーフリーマシン=无结构式计算机=architecture free machineアーギュメント=变元,参数,自变量=argumentアース=接地=earthアーティスティック=艺术的,技术的,美化的=artisticアーティフィシャル·リアリティ=虚拟现实=artificical reality/ARアーリーライトサイクル=初始写入周期=early write cycleアイコン=图标=iconアイコンの整列=排列图标アイテム=项目=itemアイテムコード=项目编号=item codeアイドルタイム=停机时间、空载时间=idle timeあいまい検索=模糊匹配检索アウトソーシング=外包=outsourcingアウトプット=输出=outputアウトプットインフォメーション=输出信息=output informationアウトプットエリア=输出区=output areaアウトプットオーダー=输出指令=output orderアウトプットキュー=输出队列=output queueアウトプットデバイス=输出设备=output deviceアウトラインフォント=空心字=outline fontアカウント=账户=accontアカデミックパッケージ=教学软件报=academic package空き番=空号空き容量=备用容量アキュムレーターレジスター=累加寄存器=accumulator register アクション=动作、效应=actionアクションコマンド=动作指令、运行命令=action commandアクセサリ=附件=accessoryアクセサリターミナル=辅助终端=accessory terminalアクセル(する)=访问、存取=accessアクセスギャップ=存取间隙=access gapアクセス権限=访问权アクセスコード=存取码=access codeアクセス識別子=访问修饰符アクセスタイム=存取时间アクセスビット=存取位=access bitアクセス頻度=访问频度アクセスプロトコル=访问协议=access protocolアクセスワイズ=存取位数=access widthアクセッサ=存取器(MSS中使用) =accessorアクセプト=接受、同意=acceptアクセラレータ=加速器=acceleratorアクチュアルアドレス=有效地址アクティビティーファイル=活动文件アクティブ=有效、当前、使用中=activeアクティブウインドウ=活动窗口アセンブリエラーメッセージ=汇编错误信息アセンブリ言語=汇编语言アセンブリルーチン=汇编程序=assembly routine遊びバイト=虚设字节値=数值値渡す=传值アダプタ=适配器、接合器=adapterアダプタシミュレータ=适配模拟器アダプタビリティ=适应性=adaptability圧縮(する)=压缩アットマーク=“@”标志アップグレード=升级=upgradeアステリスク=星号,通配符=asteriskアセンブリ=程序集,汇编=assemblyアドイン=插入=add_inアドレス演算子=地址运算符アドレス選択=寻址アドレスバー=地质栏アナリスト=分析者=analystアナログ=模拟=analogアナログ信号=模拟信号アブソリュートアドレス=绝对地址=absolute addressアプリケーション=应用软件=applicationアプリケーションテクノロジ=应用技术アベレージ=伦理函数=averageアクティビティ=当前,活动(性)=activityアラームメッセージ=警告消息=alarm message洗い出す=找出、挑出アルゴリズム=算法=algorithmアレイ=阵、列、数组=arrayアレイインディックス=数组下标アンインストール=卸载=uninstall暗号化=加密暗号化手法=加密技术イタラティブ=反复型インスペクション=(比レビュー更高一级的)检查=inspection インスタンス=实例=instanceインターフェース=接口=Interfaceインタプリタ=解释程序;翻译机=interpreterインデント/字下げ=indentインデックス=索引,引得=indexインフラ=基础,基础设施=infrastructureインヘリタンス=继承請け負う(側)=承办,承包エミュレータ=模拟器エンジニアリング=工学イーサネット=以太网=Ethernetイーサネットアドレス=以太网地址=Ethernet addressイーサネットカード=以太网卡=Ethernet carde-mail=伊妹儿=e-maile-mailアドレス=电子邮件地址=e-mail address異常終了=异常结束=abend (abnormal end)一時ファイル=暂存文件=temporary fileイベントドリブン=事件驱动=event drivenイベントドリブンプログラミング=事件驱动的程序设计=event-driven programming 違法コピー=非法拷贝=illegal copyイメージスキャナー=图像扫描器=image scannerインクジェットプリンタ=喷墨式打印机=ink jet printer印刷する=打印=printインストール=安装=installインストール済み=已安装インストールプログラム=安装程序=installation programインターネット=互联网络=Internetインターネットプロバイダー=交互网供应商=Internet providerインターフェース=接口=interfaceインターフェイスカード=接口卡片=interface cardインタープリタ=解释程序=interpreterインターレース=交错=interlaceウィザード=向导=wizardウイルス=病毒=virusウインドウ=窗口=windowウエッブサイト=网站=websiteウエッブノード=网络节点=web nodeウエッブブラウザー=网上浏览器=web browserウエッブページ=网页=web page液晶ディスプレイ=液晶显示=liquid crystal displayエディター=编辑程序=editorエラー=出错=errorエラー処理=错误处理=error handlingエラーメッセージ=出错信息=error messageエンコーディング=编码=encoding演算時間=运算时间=operation timeオーバーフロー=溢出=overflowオープン=打开=openオスコネクター=凸型接口=male connectorオスメス変換器=凹凸转换器=gender changerオフィスオートメーション=办公自动化=office automation オフィスコンピュータ=办公计算机=office computerオブジェクトモジュール=目标模块=object moduleオペレーションリサーチ=运筹学=operations reserchオペレーティングシステム=操作系统=operating system 親プロセス=父进程=parent processオンライン=联机=on-lineオーバーラップ=重叠,覆盖オーバーライド=重写、重写某个方法=overrideオブジェクト指向=面向对象オペレーティングシステム=OS=操作系统オリジナリティ=独创性。
structural-based score

structural-based score【structural-based score】:a step-by-step answerIntroduction:The concept of a structural-based score has gained significant attention in recent years due to its applicability in various fields, including medicine, finance, and machine learning. In this article, we will delve into the intricacies of a structural-based score, discussing its definition, applications, and the step-by-step process involved in its calculation.Definition of a structural-based score:A structural-based score is a numerical value assigned to an object or system based on its structural characteristics. It aims to capture the inherent properties or qualities of the object, which can then be quantified and compared with other objects in the same category or domain. The score offers a concise representation of the object's structural complexity, efficiency, or overall performance.Applications of a structural-based score:1. Medical applications: In healthcare, a structural-based score can be used to assess the severity of diseases, predict treatmentoutcomes, or measure the impact of healthcare interventions. For example, in cancer research, the structural-based score can quantify the density and distribution of tumor cells within a tissue sample, aiding in prognosis and treatment planning.2. Financial applications: In finance, a structural-based score can be utilized to evaluate the creditworthiness of individuals or businesses. By assessing various structural indicators, such asdebt-to-equity ratio, cash flow patterns, and asset allocation, financial institutions can assign a score to determine the likelihood of default or bankruptcy.3. Machine learning applications: Structural-based scores are widely employed in machine learning and data analysis. They assist in feature selection, model evaluation, and anomaly detection. For instance, in image recognition tasks, a structural-based score can quantify the complexity and arrangement of pixels, aiding in classifying and categorizing images.Step-by-step process of calculating a structural-based score:1. Identify the relevant attributes: Determine the key structural characteristics that define the object or system under consideration.These attributes can be both qualitative and quantitative and should reflect the desired aspects of the structural-based score.2. Assign weights to attributes: Assign weights to each attribute based on its relative importance in defining the overall structure. These weights can be determined by expert judgment, statistical analysis, or optimization algorithms.3. Normalize the attribute values: Normalize the attribute values ona common scale to eliminate biases arising from different measurement units. This step ensures that each attribute contributes proportionally to the overall structural-based score.4. Calculate sub-scores: Calculate sub-scores for each attribute by multiplying the normalized attribute values with their corresponding weights. These sub-scores represent the contribution of each attribute to the overall structural-based score.5. Combine sub-scores: Sum up the sub-scores to obtain the final structural-based score. This value represents the overall structure or performance of the object or system being evaluated.6. Interpret and utilize the score: Interpret the structural-based score in context, considering the range and distribution of scores within the domain of interest. Based on the score, make informed decisions or comparisons regarding the object's quality, efficiency, or other relevant factors.Conclusion:A structural-based score provides a comprehensive quantification of an object or system's structural characteristics, making it a valuable tool in various fields. By following a step-by-step process of attribute identification, weighting, normalization, and score calculation, one can derive meaningful insights and make informed decisions based on the resulting score. As technologies and domains evolve, the utilization of structural-based scores is expected to grow, further enhancing our understanding and evaluation of complex systems.。
Autodesk Vault配置(第一部分)说明书

MFG219615 –Autodesk Vault Configuration Part 1 Chris BennerCAD Supervisor –Powell Fabrication & Manufacturing, LLC Mark LancasterProduct Support Specialist–Synergis Engineering Design SolutionsClass DescriptionNow that you have purchased one of the Vault products, you need to get the environment set up for you and your users. This class will look at what to do once the Vault Server has been installed. We will discuss topics such as creating users and groups, setting up permissions and security, establishing projects and working folders, and getting your CAD content into the Vault itself.Key Learning Objectives•Learn how to create users and groups within Vault•Learn how to establish user and folder permissions to protect your data •Learn how to set up projects and establish working folders•Learn how to move locally stored CAD data to the VaultAbout Me: Chris Benner▪CAD Supervisor @ Powell Fabrication & Manufacturing, LLC. St. Louis, MI USA▪20 Plus years CAD experience, 10 years with Inventor▪Autodesk Expert Elite▪Dad, husband. Fan of American football, music, craft beer, good scotch and an occasional cigar, semi professional photographer.Home:About Powell Fabrication & Manufacturing, LLC▪Board drafting –Yes I’m old▪20+ yr MFG/CAD world▪15+ yr 3D CAD▪CAD/Doc Mgmt Admin About Me: Mark Lancaster▪Autodesk Partner/Synergis EDS ▪Quakertown PA ▪MFG/Vault Products▪Installation▪Licensing/Subscription Support▪Autodesk▪Expert Elite▪Certified Inventor Professional▪I&L and Inventor Forum▪Lean MFGCongratulations!Now That I Have Vault,… WhatDo I Do With It?•We Are Assuming It Has Been Installed•Our Presentation Centers on Vault Professional•We Will Start with Roles & Permissions, Users & Groups •Time is Short for this material so, if time permits we will then: o Run Through the Config Options –Sooo Many Optionso Talk About Adding Data to the VaultVault Settings & ConfigurationLaying the foundation for your Vault AKA: Roles, Users, Groups, and PermissionsA poor (Vault) foundation may perhaps lead to this over time.RolesWhat are Roles?•Assigned –Vault user or group of users •Pre-defined•Function ability•Lowest form of security•Useful →Vault Basic•Mandatory/Entry pointPre-defined RolesVault AdministratorPre-defined RoleDocument Editor (level 2)Pre-defined RolePermitted Functionswithin VaultOverlapping AbilitiesDocument Editor (Level 1)Defined functionsDocument Editor (Level 2)Level 1 + highlighted functionsUser assigned both roles?Lowest role is winnerHighlighted functions no longer permittedAdditional Info•Global vault setting•Vault level•Vault Pro 2018 –New vault admin roles •Vault Pro 2019 –Custom role •SpreadsheetRoles & PermissionsVault Workgroup/Pro only•Role Based Permissionso1st level permissions•ACL and State Permissionso2nd/3rd level permissions•Balancing point•Why it’s importantRoles & PermissionsVault Workgroup/Pro only•User/Administrator roleo Access to all vault functions•ACL Permissions appliedo Per vaulted fileo Deny modify/delete access I’m the VaultAdmin I can do anything I like within VaultWell I’m the Engineering Manager and I don’t want you to modify or delete our Area 51 CAD filesVault User Accounts/User ManagementVault Users Accounts•Entry point•Static Vault Accounto Vault Admin & Guest provided •Active Directory Domain Accounto Vault Pro Only•Global Setting•Special Accounts As a group we’re so happy & excited about our Vault andhow it’sconfiguredVault Administrator -Static•Administrator →Account name•Blank password →Change it •Disable?•Designate 2 Vault Admins•Separate user/admin account•IT Group/Train•DON’T LOCK OUT ADMINGuest -Static•Guest →Account name •Blank password•Disabled•Not a fanWARNINGBefore jumping in and creating any Vault Accounts and Groups make sure you have a plan in how this will be accomplished. Once a Vault Account or Group is created it is unableto be removed.Modifying, disabling or promoting/demoting isonly permittedStatic Account -Creation•ADMS Console/Vault Client•Vault Administrator•Mandatory Field•Need Role/Vault Access•Enable/Disable•Vault Admin/User managedStatic Account -Creation•Active Directory Account•Credentials/Windows Log in•Account Update•Managed →Active DirectoryActive Directory Domain Account Vault Professional Only•Vault Admin/Importso ADMS/Vault Cliento Involve IT support•Exist? Link?•Define →Vault AdministratorActive Directory Domain Account Vault Professional OnlyStatic vs Active Directory Domain Account Vault Professional Only Active Directory Domain Account (imported)Domain Server Name Domain Account Name Static Vault AccountVault Groups/Group ManagementVault Groups•An Extension for Users •Optional•Useful/Same Configuration •Static Group•Active Directory Domaino Vault Pro Only•Global Setting (YES/NO)Vault Group -Creation •ADMS Console/Vault Client•Vault Administrator•Group to Group assignment•Vault Admin managedVault Group -CreationActive DirectoryDomain Group•Active Directory Group –IT/Network/Permissions •Import →Vault Admin•Defined (in Vault) →Vault Admin•Managed →IT/Network•Exist? Link?•Auto-Create Account•Manual update•Not a fanMixing Roles, User’s, Groups & AccessVDB1VDB2Vault ServerRolesGroup AVault User Group B Group CVault Permissions (Vault Workgroup/Pro)Permissions –Why its ImportantVault User Doc EditorLVL 2Access to delete files across Vault ConditionalVAULT BASIC ONLY Conditional delete means there’s no relationship exist atthis timePermissions –Why its ImportantVault User Doc EditorLVL 2Access to delete files across Vault ConditionalVAULT WORKGROUP/PROPermissions –3 LevelsLifecycle State PermissionHighest Level of PermissionAccess Control List (ACL) PermissionObject Based SecuritySecondary Level of PermissionRole or Role Based PermissionLowest Form of PermissionPermissions –Role BasedProvide access (light switch) to perform certainfunctions within VaultPermissions –ACLVAULT WORKGROUP/PROControl access that’s granted by the assigned vault rolePermissions –Lifecycle StatePer Lifecycle State, Restrict access that’s granted by the Role/ACLPermissionWIP In ReviewVAULT WORKGROUP/PROPermissions –Access Control List (Vault Workgroup/Pro)ACL PermissionsVAULT WORKGROUP/PRO •Per Vault•Vault Administratoro Security Administrator (2018)•RMC Folder/File/Details/Security •READ/MODIFY/DELETE •Allow: Grant access•Deny: Deny access•Blank/None: Nether Grant/DenyACL PermissionsVAULT WORKGROUP/PRO •Start @ Vault Root •Propagate permissions•Don’t forget Admino Cloaking to resolve •Override if neededo Lower structureo@ file level•Don’t swing for the fences •Remove later onLowest Permission WinsUser is assigned Doc Editor LVL 1Role doesn’tallow files tobe deletedACL Permissiongranted todelete filesRolelimitationstill winsACL PermissionVault PermissionsPermissions –Effective AccessVAULT WORKGROUP/PRO•Vault 2016/2017 Release •Folder or File Level•What’s really happening •Obj Based, State, Effective •One time checkACL Permission –Effective Access。
认知心理学课件(中科院心理所)_第3讲 注意

每个人都知道注意是什么。它是心理接收信息的过 程。如果我们以一种清晰和生动的形式来看,它是 从同时呈现的几个物体或思维序列中选择一个对象 的过程。意识集中与专注是注意的核心。
William James (1890, pp. 403-404)
定义:注意是心理活动或意识对一定对象的指 向与集中。
注意的两个特点
内源性注意
外源性注意
这两种注意在产生机制上和对认知加工的影响大小上 都有着显著的差别
内源性线索时不同注意条件下的 数字大小比较
外源性线索时不同注意条件下的 数字大小比较
6、负启动现象
负启动(negative priming)现象揭示了注意在认 知活动中的复杂作用。 负启动实验范式
对负启动效应的解释
一般认为:
在对启动刺激进行加工时,注意在对目标字母进行 选择和识别的同时,抑制了忽略字母的激活。 当探测刺激中的目标字母在启动刺激中未被注意时, 二者在呈现时间上的区别性降低,因此使被试产生 混淆,从而影响对该字母的识别。
也有人认为:
7、朝向反射
(orientation reflex)
首先,呈现两个不同颜色的字母(启动刺激)。要求被试识别其 中一个字母(目标字母),而忽略另外一个字母(忽略字母)。 然后,呈现探测刺激,也是两个不同颜色的字母。 在目标重复启动条件中:启动刺激中的目标字母与探测刺激中 的目标字母是一致的; 在忽略重复条件中,启动刺激中的忽略字母与探测刺激中的目 标字母是一致的; 在控制条件中,启动刺激与探测刺激没有任何关系。
随意注意
2023-2024学年浙江省杭州市新东方高二上月考考英语试题04

2023-2024学年浙江省杭州市新东方高二上月考考英语试题04The Jane Austen Society of North America (JASNA) is dedicated to the enjoyment and appreciation of Jane Austen and her writing. JASNA is a nonprofit organization, staffed by volunteers, whose mission is to foster among the widest number of readers the study, appreciation, and understanding of Jane Austen’s works, her life, and her genius. We have over 5,000 members of all ages and from diverse walks of life. Although most live in the United States or Canada, we also have members in more than a dozen other countries.JASNA conducts an annual student Essay Contest to promote the study and appreciation of Jane Austen’s writing in new generations of readers. Students worldwide are invited to compete for scholarship awards.2023 Contest Topic: Marriages and Proposals(求婚)The 2023 Essay Contest topic is inspired by the theme of our upcoming Annual General Meeting: Pride and Prejudice.SubmissionsThe deadline for submissions is Thursday, June 1, 2023. We will begin accepting submissions in February 2023.Essay Contest AwardsFirst Place: $1, 000 scholarship, plus free registration and two nights’ lodging (住宿) for JASNA’s 2023 Annual General Meeting in Denver.Second Place: $500 scholarship.Third Place: $250 scholarship.Winners will also receive one year of membership in JASNA, publication of their essays on this website, and a set of Norton Critical Editions of Jane Austen’s novels.Essay FormatEntries that do not follow the following requirements or arrive after the deadline will be disqualified.·The essay must be written in English.·The title of the essay should appear at the top of page one; further pages should be numbered on the top right; the student’s name must not appear on the essay.·The essay must be 6-8 pages in length.1. Which of the following is NOT correct about JASNA?A.It is intended to encourage readers’ appreciation and understanding of Jane Austen’sworks.B.Its members of staff work on a voluntary basis with a shared mission.C.It appeals to readers of different ages and from all walks of life.D.Readers with JASNA membership all hold American or Canadian nationality.2. What will each of the winners be awarded?A.$500 scholarship plus free meals.B.A set of Jane Austen’s novels.C.Free accommodation for two nights in Denver.D.Opportunities to take part in a meeting.3. Which of the following will result in disqualification?A.Essays without the student’s name.B.Essays written in two languages.C.Essays submitted on May 31st, 2023.D.Essays covering 7 pages.Weifang, Shandong province, will exempt(免除)senior middle school tuition fees for the third child in every family born after May 31, 2021, local officials announced on Tuesday at a news conference on optimizing policies encouraging families to have more children.The tuition fee exemption is one of a series of measures released by the city to encourage the birthrate. Others include subsidies(补贴)for universal childcare services, house purchases and medical expenses for childbirth. The government is also optimizing pregnancy leave and encouraging employers to explore flexible working schedules for female workers.The newly released measures have received a mixed response from the public with some welcoming the policy, while others say the tuition benefit is t oo little and too far off to make an impact. “Is the child able to study in a senior middle school if he or she didn’t pass the examination?” said one user mockingly on the Twitter-like platform Sina Weibo.Cities in the province have been ramping up subsidies, and education and nursery care services to encourage families to have more children.Shandong province, with a population of over 100 million people, in 2022 recorded its lowest birthrate since 1983. “To encourage the birthrate, the government need to pay attention to the needs of families with only one child instead of only providing subsidies for couples with two or three children. Whether young couples have a high willingness to have one more child depends mostly on their experience of raising th e first child,” said Gao Ming, 35, a resident of Qingdao. She added that she didn’t want to have a second children, even if Qingdao took similar measures.4. What benefits can a woman with a third child enjoy in Weifang?A.The whole pregnancy leave and one-year maternal leave.B.The promise of her third child’s admission to senior middle school.C.Free tuition fees of her third child for senior middle school.D.The house purchases with expenses fully covered by the government.5. The underlined word “mockingly” in paragraph 3 is closest in meaning to ?A.jokingly B.alarmingly C.lovingly D.willingly6. Why does the passage end with a quote from Gao Ming?A.To present a fact. B.To illustrate a viewpoint.C.To solve a problem. D.To make a comparison.7. Which of the following might be the best title for this passage?A.Shandong witnessed its lowest birthrate in 2022.B.More measures are introduced to boost childbirth.C.Newly released measures caused different public responses.D.Is it a blessing or a curse to have more children?The hustle and bustle(喧嚣)of life, walking back and forth from the ideal to reality, and the inner confusion hidden behind a social mask-these daily experiences are recorded by Chinese youths in lines of poetry online. Recently, 124 Bilibili internet users shared their works in a poem collection.One blogger on Xiaohongshu who goes by the nickname Gehuaren is one such poetry lover. The twenty-something girl not only writes poems as a form of entertainment in her spare time, but also improvises(即兴创作)poems for others at night markets in Yunnan. As a street-stall poet, Gehuaren often writes pieces of poetry quickly based on themes from customers. Once the poem has been completed, she refuses to change her work because she feels her poems reflect her first reaction. For her, everything in the world, no matter trivial or significant, can serve as her poetic inspiration. “A glass, a tree in the dawn or a person who once talked with me…these all could become themes for my poems,” said Gehuaren.With free writing with a regular rhythm and broad themes, her poems strike a chord with many young people online, helping her gain over 190, 000 followers. Many have made comments “I feel healed by your poems because I can find beauty from unnoticeable things and in turn, slow down to reflect on my life.”Apart from poetry, various means such as vlogging and photosharing can be used to record moments of daily life. But young people consider poetry to be the best way to express them. “Taking photos or vlogging can just show the object or emotions in real life. Yet poetry, which can be used to excite the imagination, shows the beauty of daily life, ”an 18-year-old said. So when he is inspired by the beauty of daily life, the boy writes it down into lines of poetry and then shares them with his friends on his WeChat Moments.No matter why young people write their unique brand of poems, they are attempting to take every moment in lives seriously, face their lives bravely and actively express themselves.8. How does Gehuaren find inspiration for her poems?A.By referring to traditional Chinese poems.B.By attending various online poetry lectures.C.By exploring great moments in life.D.By observing everyday life.9. Why are Gehuaren’s poems so popular with her followers?A.They are original and full of imagination.B.They have a strong sense of rhythm.C.They record the beauty of small and ordinary things.D.They reflect the differences between the ideal and reality.10. What’s the 18-year-old’s attitude towards poetry?A.Positive. B.Neutral. C.Cautious. D.Objective.11. What can we infer about the young poets in the last paragraph?A.They hope to avoid challenges.B.They intend to impress their peers.C.They try to escape from the busy life.D.They make their thoughts known bravely.In the office of remote sensing scientist Liu Shaochuang, there is a huge photograph of a camel he snapped a decade ago in Xinjiang. He crouched for hours by a pool of water in the Gobi Desert to capture the image.Since 2012, he has led a team in tracking and studying wild camels using satellite remote sensing technology.Unlike zoologists who focus on species, Liu has studied the interrelationship between endangered animals and their environment, which he believes will help develop better protection strategies in the face of climate change.His interest in wild camels began when his team tested a prototype(雏形)design of the lunar rover Yutu in the desert. Living in the harsh deserts in northwestern China and southwestern Mongolia, camels are listed as critically endangered animals. Experts estimate that the population of this species is currently less than 1, 000, of which around 650 are in China.“Ten years ago, the research relied solely on human observation, which was very primitive, ”Liu says. Because camels are fully migratory and can travel over long distances, scientists used to learn their habits by studying hoof prints and droppings. It was hard to find one camel in the desert, let alone track it. But Liu thought his expertise in satellite navigation(导航)and remote sensing might come in useful in the study of wild camels.It was not easy at first. Liu learned zoology from scratch. His team had to spend several weeks each year braving dust and sandstorms in the vastness of the Gobi Desert seeking out camels. A scar on his right eyebrow is the result of a rollover accident on a rugged mountain road in Xinjiang. “The most exciting moment was attaching a satellite positioning collar to a wild camel. ”The tracking collar, equipped with special receivers, weighs only a few hundred grams. It can detach automatically and will not have a negative impact on the daily lives of the animals. The locations of the tracked animals are transmitted via satellite every day. Based on the data, scientists can get to know their migratory paths, living environments and possible threats they may meet with.For Liu, it is worth the significant sci-tech effort to study such a rare species. He adds wildlife protection and research will become more precise and efficient with the help of technology.12. What was it that made tracking wild camels difficult?A.The number of camels experienced a sharp decline.B.Massive migration made camels cover huge distances.C.Primitive tools were used in human observation.D.Hoof prints and droppings were never to be seen.13. What can be inferred from the scar on his right eyebrow?A.His carelessness in carrying out his research.B.His inexperience at the very beginning of his work.C.The rough conditions under which he worked.D.The stress he met with in his work.14. What does paragraph 7 mainly focus on?A.The formation of the tracking collar.B.The definition of the tracking collar.C.The importance of the tracking collar.D.The function of the tracking collar.15. Which of the following can best describe Liu Shaochuang?A.Generous and ambitious. B.Confident and grateful.C.Creative and determined. D.Optimistic and modest.Soothe the Sunday scariesMost of us look forward to the weekend as a time to relax, connect with friends and family, and deal with tasks from a to-do list that gets neglected during the workweek. But as the weekend comes to an end, many are missing out on Sunday Funday and instead experiencing an overwhelming sense of anxiety and even dread about the upcoming week. 16 Some people describe it as a heaviness they can feel in their body, while others feel so unsettled that they could jump out of their skin.Even though the Sunday scaries are common, they are manageable. Here’s how experts say you can ease your end-of-weekend anxiety.Structure your Sunday. 17 You might still go through that sense of dread, but that feeling is harder to hold on to when you’ re engaging in something that makes you feel good.Don’t forget to relax.If you’re feeling more stress, it’s important to make space for relaxing activities to ground yourself. Maybe a midafternoon shower or bath, maybe an engaging movie or show, whatever feels like a helpful distraction to reground from the scaries.Identify your anxiety sources. Try to figure out what’s really causing you to dread the week. 18 Even if there’s not a single reason behind your Sunday anxiety, organizing the stress into small parts can help make it all more manageable.19 Getting rid of the Sunday scaries isn’t just about minimizing the gloom o f the week ahead. Have something to look forward to. This gives you the opportunity to shift your thoughts to fun and will help improve your mood.End your Sunday with the right energy. Sunday night is a proper wind-down time. Maybe you want to journal, do a face mask, read a few pages of a good book. Do your best to honor this time and make Sunday night all about you. 20On a Friday evening in December, two weeks before Christmas, I lost my job. When my daughter, Kristil, then 12, and I planned to get our Christmas t ree, I listened to my voicemail: “We’re sorry but your work _______ has ended today. ”My heart sank. As a single parent, my anxiety _______.The next day as we searched for the tree, I _______ to be cheerful as I eyed each price tag(标签).“Is everything OK? ” Kristil asked. ”You seem worried. ”“I got some bad news yesterday,” I told her. ”I lost my job.”I eagerly _______ job as my bank account became smaller. I felt as if the world was closing in on me.One afternoon, I dropped Kristil in a wealthy community for a birthday party. I watched as she went in, _______ with all the nice things we couldn’t afford. I drove home _______. Back at home, I glanced out the window. It had been snowing _______ all morning. I noticed a slim woman trying to open her car door _______ the wind. As she got out, I realized it was my old professor, Sister Esther Heffernan. I’d first met her 10 years earlier when I was her student at Edgewood College. Kristil was 3 at that time, and I sometimes took her to class. Such was Sister Esther, a(n) _______professor. When I was busy with lessons, she would ________ coloring books to occupy Kristil.“Well, I called last week but couldn’t get through. ________, I thought I would come by.” Sister Esther said. “I have gifts for you and Kristil.”I made her a cup of tea, and we talked. Being in Sister Esther’s ________ gave me hope that things would be all right. I opened her card as she ________. Hundred-dollar bills fell onto the table. I gasped ________, tears of gratitude streaming down my face. Sister Esther had given me $1, 000.On Christmas Eve, I ________ watched as Kristil opened her gifts. In 2020, at age 91, Sister Esther died, but the love she gave during her life lives on in the hearts of many. I am lucky to be one of them.21.A.achievement B.assignment C.announcement D.attachment22.A.existed B.gathered C.exploded D.grew23.A.claimed B.intended C.struggled D.tended24.A.applied for B.signed up for C.accounted for D.made up for 25.A.filled B.surrounded C.covered D.decorated26.A.defeated B.puzzled C.scared D.inspired27.A.up and down B.on and off C.here and there D.in and out28.A.beneath B.beyond C.alongside D.against29.A.flexible B.respectable C.understanding D.intelligent30.A.take B.bring C.fetch D.show31.A.Therefore B.However C.Besides D.Otherwise32.A.presence B.charge C.favor D.absence33.A.faded away B.broke away C.pulled away D.put away34.A.in regret B.in amazement C.in despair D.in comfort35.A.expectantly B.hesitantly C.joyfully D.nervously阅读下面短文,在空白处填入1个适当的单词或括号内单词的正确形式。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
OBSERVATIONObject-Based Attention Overrides Perceptual Load to ModulateVisual DistractionJoshua D.Cosman and Shaun P.VeceraUniversity of IowaThe ability to ignore task-irrelevant information and overcome distraction is central to our ability to efficiently carry out a number of tasks.One factor shown to strongly influence distraction is the perceptual load of the task being performed;as the perceptual load of task-relevant information processing increases,the likelihood that task-irrelevant information will be processed and interfere with task performance decreases.However,it has also been demonstrated that other attentional factors play an important role in whether or not distracting information affects performance.Specifically,object-based attention can modulate the extent of distractor processing,leaving open the possibility that object-based attention mechanisms may directly modulate the way in which perceptual load affects distractor processing.Here,we show that object-based attention dominates perceptual load to determine the extent of task-irrelevant information processing,with distractors affecting performance only when they are contained within the same object as the task-relevant search display.These results suggest that object-based attention effects play a central role in selective attention regardless of the perceptual load of the task being performed.Keywords:selective attention,perceptual load,object-based attention,visual attention,perceptual groupingSelective attention allows us to process task-relevant informa-tion while effectively ignoring task-irrelevant information and minimizing distraction.For example,our ability to read a news-paper in a crowded coffeehouse depends on our ability focus on the words on the page while simultaneously ignoring the conver-sations around us.It has been proposed that the perceptual load of a task determines the likelihood that task-irrelevant information will be processed and cause distraction,a proposal formalized in Lavie’s “Load Theory”of selective attention (Lavie,1995;Lavie,Hirst,De Fockert,&Viding,2004).Specifically,Load Theory proposes that perceptual-level attention is a finite resource—when perceptual load is high and processing capacity is exhausted,the processing of task-irrelevant distractors is attenuated early and distracting information does not influence task performance.Fur-thermore,load theory proposes that processing capacity is filled in a mandatory manner,such that when perceptual load is low,attentional resources obligatorily “spill over”to task-irrelevant distractors,causing them to interfere with task performance.Given its parsimonious resolution to debates regarding the locus of se-lection (e.g.,Deutsch &Deutsch,1963;Treisman,1969),load theory has been an influential theory of attentional selection inboth cognitive psychology and neuroscience,and has received support from numerous behavioral and neuroscientific studies (e.g.,Bahrami,Lavie,&Rees,2007Cosman &Vecera,2009,2010;Lavie &Cox,1997;Rees,Frith,&Lavie,1997).At the same time,factors other than perceptual load have been shown to affect the extent of task-irrelevant information process-ing.For example,using a modified flanker task,Kramer and Jacobson (1991)demonstrated that the amount of interference caused by a task-irrelevant flanker varied as a function of whether or not it was part of the same perceptual group as the task-irrelevant target,using good continuation and connectedness as cues (see also Baylis &Driver,1992;Chen,2003;Richard,Lee,&Vecera,2008).When a central target was physically connected to two task-irrelevant flanking distractors and created one object,flankers influenced RTs to the target;however,the flankers had little or no effect when they were physically separated from the target (Kramer &Jacobson,1991;Richard et al.,2008).Taken together,the studies outlined above suggest that in addi-tion to perceptual load,other factors such as perceptual grouping or object-based attention may play a crucial role in determining the level of distractor processing.Given that object-based attention mechanisms control the allocation and spread of attentional re-sources (e.g.,Hollingworth,Maxcey-Richard,&Vecera,2012Vecera,1994;Vecera &Farah,1994;Richard et al.,2008),it is plausible that these mechanisms may directly influence the oper-ation of selective attention regardless of perceptual load.For example,all features of task-relevant objects may be obligatorily processed under high-load conditions even when some of these features are task-irrelevant,and features of objects that are irrele-This article was published Online First March 5,2012.Joshua D.Cosman and Shaun P.Vecera,Departments of Neuroscience and Psychology,University of Iowa.Correspondence concerning this article should be addressed to Joshua D.Cosman,Departments of Neuroscience and Psychology,University of Iowa,Iowa City,IA 52242.E-mail:joshua-cosman@Journal of Experimental Psychology:©2012American Psychological Association Human Perception and Performance 2012,Vol.38,No.3,576–5790096-1523/12/$12.00DOI:10.1037/a0027406576vant to task performance may be effectively ignored even under low-load conditions(O’Craven,Downing,&Kanwisher,1999; Richard et al.,2008;Wu¨hr&Frings,2008).In other words,it is possible that object-based attention mechanisms can trump per-ceptual load to determine whether task-irrelevant information re-ceives processing resources.In the standard perceptual load task,a task-relevant search array and task-irrelevant distractor appear as parts of different perceptual groups(e.g.,Lavie&Cox,1997;see also Beck& Lavie,2005).Under these conditions,larger flanker congruency effects are observed when the search task is low,as opposed to high,in perceptual load.In the current study,we were interested in examining whether this effect of load on distractor process-ing could be modulated by simple object cues placed strategi-cally in these displays.Specifically,we included a superordi-nate object structure that encompassed both the search array and one of two possible distractor locations(see Figure1).As a result,on each trial the task-irrelevant flanker was either a part of the same or different object as the task-relevant search array, giving us the ability to measure object-based effects on distrac-tor processing under varying conditions of perceptual load.If perceptual load predominates to determine the extent of task-irrelevant information processing,we would expect to see flanker congruency effects emerge when the search task is low in perceptual load,but not when it is high in perceptual load, regardless of which object contains the flanker(i.e.,a typical perceptual load effect).In contrast,if object-based attention mechanisms arising from our object manipulation act as a primary determinant of whether task-irrelevant information is processed and allowed to affect behavior,we would expect to see flanker congruency effects emerge when the flanker is contained within the same object as the search array,but not when it appears in a different object than the search array, regardless of perceptual load.This would indicate that the superordinate object structure and corresponding object-based attention effects were sufficient to override the effect of load on distractor processing,and would point to a central role for object-based attention mechanisms in determining the extent to which task-irrelevant information is processed.MethodParticipantsEighteen University of Iowa undergraduates participated for course credit.All participants had normal or corrected-to-normal vision.Stimuli and ProcedureA Macintosh mini computer displayed stimuli on a17-inch CRT and recorded responses and response latencies.The experiment was controlled using MATLAB and the Psychophysics toolbox (Brainard,1997).Participants sat65cm from the screen in a dimly lit room and performed a basic search task like that depicted in Figure1.Following the presentation of a fixation point for1,000ms,the search displays were presented for150ms.The search arrays themselves always appeared as part of the same object and con-sisted of letters presented around fixation following the arc of an imaginary circle(radius2.0°),and were either high load displays containing a target letter(E or H)among five heterogeneous distractor letters(D,J,K,B,T each measuring0.9°ϫ1.4°),or low load displays consisting of the target letter and five small place-holder circles(each0.25°radius),with load being blocked(see Lavie&Cox,1997).The objects on which the search array and flanker appeared consisted of two gray3D rendered objects pre-sented on a white background,one large(12°ϫ10°)and one small (3°ϫ10°).The large object always contained the task-relevant search array,and on half of the trials also contained a single, task-irrelevant flanker letter(same-object flanker condition).On the other half of trials,the flanker letter appeared in the smaller object(different-object flanker condition).The flanker appeared equidistant from the search array in both object conditions with a distance of approximately2.2°from the edge of the search array to the edge of the flanker,with the relative location of each object (left vs.right side of display)and the congruency of the flanker letter being equiprobable and pseudorandomly determined on each trial.Participants were instructed to maintain central fixation and to search the circular arrays for the target while ignoring the task-irrelevant flankers and objects.Participants performed three high-load and three low-load blocks of96trials each for total of576 trials,with load blocks alternated and starting order counterbal-anced across subjects.1ResultsReaction times faster than200ms or longer than3,000ms were excluded from the analyses.Removal of these outliers excluded less than2%of the reaction time(RT)data.Additionally,the data from two participants were excluded because overall accuracy was greater than3SDs below the mean,leaving data from16partic-ipants in the analyses below.We performed an omnibus three-way ANOVA with flanker object(same vs.different)display load(high vs.low),and flanker congruency(congruent vs.incongruent)on both correct mean RTs(see Figure2)and percent errors.For RTs, we observed a main effect of congruency,F(1,15)ϭ33.5,pϽ.0001,with faster RTs to congruent trials(587ms)than to incon-gruent trials(609ms),as well as a main effect of load,F(1,15)ϭ83.6,pϽ.0001,with faster RTs on low load trials(526ms)than high load trials(671ms).We also found a significant interaction between flanker object and congruency F(1,15)ϭ11.0,pϽ.01. No other main effects or interactions were significant,F sϽ3.5, psϾ.08.Secondary two-way ANOVAs were conducted on RTs from high and low load conditions to examine the root of the flanker 1Ten observers performed a basic version of our load task to ensure that our stimuli generate a typical load effect.This task consisted of192trials of high and low load search arrays(blocked)presented on a gray back-ground,identical to the search arrays used in the primary experiment.An ANOVA performed on RTs in this task revealed a significant main effect of load F(1,9)ϭ29.0,pϽ.001.,with response times in high-load trials (638ms)being overall slower than responses in low-load trials(497ms), and a significant load by congruency interaction,F(1,9)ϭ4.96,pϭ.05. Thus,the current displays generate what would be considered typical load effects in the absence of the object structure imposed in the experiment of interest.577OBJECTS MODULATE DISTRACTIONobject by congruency interaction.A significant main effect of congruency was observed in both the low load,F (1,15)ϭ18.5,p Ͻ.001,and high load,F (1,15)ϭ15.4,p Ͻ.001,conditions.Importantly,significant two-way interactions between flanker ob-ject and congruency were observed in both the low load,F (1,15)ϭ4.5,p ϭ.05,and high load,F (1,15)ϭ7.6,p ϭ.01,conditions,with flanker effects being significantly larger when the flanker appeared in the same object as the target,regardless of load.Moreover,we observed no three-way interaction,F (1,15)Ͻ1,ns ,indicating that our object manipulation eliminated the inter-action between perceptual load and flanker congruency typically observed in this task (e.g.,Lavie et al.,2004;Lavie &Cox,1997),and providing evidence that object-based attention effects can override the effect of perceptual load to determine whether task-irrelevant information affects performance during search.The error rates generally paralleled the RTs.Most important,error rates showed larger flanker effects in the same object con-dition than in the different object condition for both low and high load displays,although these differences were not significant:We observed a main effect of congruency,F (1,15)ϭ4.5,p ϭ.05,but no other main effects or interactions were significant,F s Ͻ2.1,p s Ͼ.17.DiscussionOur results show that object-based attention strongly determines the extent of task-irrelevant information processing,modulating selective attention based on whether the task-relevant and irrele-vant information are part of the same or a different object.Fur-thermore,this effect was observed regardless of theperceptualFigure 1.Task diagram showing examples of low-load same object (left)and high-load different object trials(right).Figure 2.Reaction Times and error rates (at base of the bar)for each condition in the experiment.Error bars represent 95%confidence intervals (Cousineau,2005;Loftus &Masson,1994).578COSMAN AND VECERAload of the search task.During high-load search,where attentional capacity should have been exhausted and attentional filtering very effective(Lavie,1995;Lavie et al.,2004),task-irrelevant flanker letters still exerted an interference effect if targets and flankers appear in the same object.Conversely,during low-load search, filtering of the flanker was enhanced when the to-be-ignored letter did not group with the search array.Thus,adding a superordinate object structure that encompassed the search display led to in-creased processing of distracting information located within the object boundary and an attenuation of processing for distracting information located outside of the object boundary.Such a finding is at odds with load theory,which posits that resource demands on perceptual-level attention are the sole factor driving selective at-tention mechanisms.The fact that the relationship between the object containing the search array and that containing the distractor directly determined the extent of distractor processing in the face of our perceptual load manipulation suggests that perceptual load is not the sole determinant of attentional selection.Instead,these results are in line with studies that propose a key role for objects in modulating the extent of task-irrelevant infor-mation processing.Specifically,our results are predicted by spreading enhancement accounts of object-based attention,in which attentional resources spread within an object,enhancing the representations of features contained in those objects(Han, Dosher,&Lu,2003;Hollingworth et al.,2012;Mozer,2002; Richard et al.,2008;Valdes-Sosa,Bobes,Rodriguez,&Pinilla, 1998).The increased magnitude of flanker effects when the task-irrelevant flanker appeared in the same object as the search array is presumably due to such a spreading mechanism—when the flanker appeared in the same object as the search array,it is likely that attention spread throughout the object and led to an enhanced representation of both task-relevant and task-irrelevant items,gen-erating increased interference when task-irrelevant distractors ap-peared in the object containing the search array.Given this direct modulation of perceptual load effects and distractor interference by object-based attention mechanisms,it appears that object boundaries and the attentional effects they produce can act as a primary determinant of what information is processed and allowed to affect behavior.ReferencesBahrami,vie,N.,&Rees,G.(2007).Attentional load modulates responses of human primary visual cortex to invisible stimuli.Current Biology,17,509–513.doi:10.1016/j.cub.2007.01.070Baylis,G.C.,&Driver,J.(1992).Visual parsing and response competi-tion:The effect of grouping factors.Perception&Psychophysics,51, 145–162.doi:10.3758/BF03212239Beck,D.M.&Lavie,N.(2005).Look here but ignore what you see: Effects of distractors at fixation.Journal of Experimental Psychology: Human Perception and Performance,31,592–607.doi:10.1037/0096-1523.31.3.592Brainard,D.H.(1997).The psychophysics toolbox.Spatial Vision,10, 433–436.doi:10.1163/156856897X00357Chen,Z.(2003)Attentional focus,processing load,and Stroop interfer-ence.Perception&Psychophysics,65,888–900.doi:10.3758/ BF03194822Cosman,J.D.,&Vecera,S.P.(2009).Perceptual load modulates atten-tional capture by abrupt onsets.Psychonomic Bulletin&Review,16, 404–410.doi:10.3758/PBR.16.2.404Cosman,J.D.,&P.(2010).Attentional capture by motion onsets is modulated by perceptual load.Attention,Perception,&Psychophysics, 72,2096–2105.Cousineau,D.(2005).Confidence intervals in within-subject designs:A simpler solution to Loftus and Masson’s method.Tutorials in Quanti-tative Methods for Psychology,1,42–45.Deutsch,J.A.,&Deutsch,D.(1963).Attention:Some theoretical consid-erations.Psychological Review,70,80–90.doi:10.1037/h0039515 Han,S.,Dosher,B.A.,&Lu,Z.-L.(2003).Object attention revisited: Identifying mechanisms and boundary conditions.Psychological Sci-ence,14,598–604.doi:10.1046/j.0956-7976.2003.psci_1471.x Hollingworth,A.,Maxcey-Richard,A.M.,&Vecera,S.P.(2012).The spatial distribution of attention within and across objects.Journal of Experimental Psychology:Human Perception and Performance,38, 135–151.doi:10.1037/a0024463Kramer,A.F.,&Jacobson,A.(1991).Perceptual organization and focused attention:The role of objects and proximity in visual processing.Per-ception&Psychophysics,50,267–284.doi:10.3758/BF03206750 Lavie,N.,&Cox,S.(1997).On the efficiency of attentional selection: Efficient visual search results in inefficient rejection of distraction. Psychological Science,8,395–396.doi:10.1111/j.1467-9280.1997 .tb00432.xLavie,N.,Hirst,A.,De Fockert,J.W.,&Viding,E.(2004).Load theory of selective attention and cognitive control.Journal of Experimental Psychology:General,133,339–354.doi:10.1037/0096-3445.133.3.339 Lavie,N.(1995).Perceptual load as a necessary condition for selective attention.Journal of Experimental Psychology:Human Perception and Performance,21,451–468.doi:10.1037/0096-1523.21.3.451 Loftus,G.R.,&Masson,M.E.J.(1994).Using confidence intervals in within-subject designs.Psychonomic Bulletin&Review,1,476–490. doi:10.3758/BF03210951Mozer,M.C.(2002).Frames of reference in unilateral neglect and visual perception:A computational perspective.Psychological Review,109, 156–185.doi:10.1037/0033-295X.109.1.156O’Craven,K.,Downing,P.,&Kanwisher,N.(1999).fMRI Evidence for Objects as the Units of Attentional Selection.Nature,401,584–587. doi:10.1038/44134Rees,G.,Frith,C.,&Lavie,N.(1997).Modulating irrelevant motion perception by varying attentional load in an unrelated task.Science, 278(5343),1616–1619.doi:10.1126/science.278.5343.1616 Richard,A.M.,Lee,H.,&Vecera,S.P.(2008).Attentional spreading in object-based attention.Journal of Experimental Psychology:Human Perception and Performance,34,842–853.doi:10.1037/0096-1523.34.4.842Treisman,A.M.(1969).Strategies and models of selective attention. Psychological Review,76,282–299.doi:10.1037/h0027242Valdes-Sosa,M.,Bobes,M.A.,Rodriguez,V.,&Pinilla,T.(1998). Switching attention without shifting the spotlight:Object-based atten-tional modulation of brain potentials.Journal of Cognitive Neurosci-ence,10,137–151.doi:10.1162/089892998563743Vecera,S.P.,&Farah,M.J.(1994).Does visual attention select objects or locations?Journal of Experimental Psychology:General,123,146–160. doi:10.1037/0096-3445.123.2.146Vecera,S.P.(1994).Grouped locations and object-based attention:Com-ment on Egly,Driver,&Rafal(1994).Journal of Experimental Psy-chology:General,123,316–320.doi:10.1037/0096-3445.123.3.316 Wu¨hr,P.,&Frings,C.(2008).A case for inhibition:Visual attention suppresses the processing of irrelevant objects.Journal of Experimental Psychology:General,137,116–130.doi:10.1037/0096-3445.137.1.116Received June30,2011Revision received July20,2011Accepted July21,2011Ⅲ579OBJECTS MODULATE DISTRACTION。