期刊文献+
共找到12,040篇文章
< 1 2 250 >
每页显示 20 50 100
TRE-DSP:A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
1
作者 Yousheng Zhou Rundong Peng +2 位作者 Yuanni Liu Pandi Vijayakumar Brij Gupta 《Digital Communications and Networks》 2025年第2期455-464,共10页
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every day.How to securely share data between the IoV operator and various value-added service providers becomes one of the... With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every day.How to securely share data between the IoV operator and various value-added service providers becomes one of the critical issues.Due to its flexible and efficient fine-grained access control feature,Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is suitable for data sharing in IoV.However,there are many flaws in most existing CP-ABE schemes,such as attribute privacy leakage and key misuse.This paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP).A partially hidden access structure is adopted to hide sensitive user attribute values,and attribute categories are sent along with the ciphertext to effectively avoid privacy exposure.In addition,key tracking and malicious user revocation are introduced with broadcast encryption to prevent key misuse.Since the main computation task is outsourced to the cloud,the burden of the user side is relatively low.Analysis of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV. 展开更多
关键词 PRIVACY-PRESERVING Attribute-based encryption Partially hidden policy Traceability User revocation Internet of vehicles
在线阅读 下载PDF
Rise of China’s Manufacturing Hidden Champions:A Resource Allocation Perspective--An Explorative Case Study of Hailiya Group
2
作者 Shan Yu Chen Jinlong 《China Economist》 2025年第1期78-100,共23页
Hidden champions play a critical role in China’s efforts to overcome technological and industrial“chokepoints”.These enterprises are pivotal for breaking free from Western technological embargoes,avoiding entrapmen... Hidden champions play a critical role in China’s efforts to overcome technological and industrial“chokepoints”.These enterprises are pivotal for breaking free from Western technological embargoes,avoiding entrapment in low-value-added production,and driving industrial upgrading.Given the distinct market environment in which China’s hidden champions have emerged,it is both timely and practically significant to examine their growth trajectories and underlying mechanisms.This study adopts a resource allocation perspective to investigate the development path of Chinese manufacturing enterprises into hidden champions,using a vertical case study of Hailiya Group.The findings reveal that such enterprises achieve hidden champion status by vertically concentrating on niche markets while harnessing technological potential and horizontally diversifying their technology application scenarios.Their growth follows a“T-shaped”strategy,combining vertical specialization in a focused market with horizontal expansion into new applications.Four critical mechanisms underpin the rise of manufacturing hidden champions:market niche positioning,innovation-driven focus,application scenario expansion,and ecosystem development.Specifically,these enterprises strategically target niche markets,establish a technology-oriented competitive edge,broaden technology applications to unlock new profit opportunities,and develop collaborative ecosystems to share resources and drive industrial advancement.This paper not only extends the interpretive boundaries of resource allocation theory but also offers fresh insights into the emergence of Chinese manufacturing enterprises as hidden champions,enriching our understanding of their unique growth dynamics. 展开更多
关键词 hidden champions resource allocation innovation assets customer assets growth mechanism
在线阅读 下载PDF
“Becoming a family”—the effects of the hidden curriculum in transferring institutional mission:An experience from a century-old nursing school
3
作者 Aimei Mao Hon-Lon Tam +1 位作者 Pak-Leng Cheong Iat-Kio Van 《International Journal of Nursing Sciences》 2025年第3期293-300,I0006,I0007,共10页
Objectives This study aimed to examine the role of the hidden curriculum in transmitting the educational mission and its impacts on nursing students’professional socialization.Methods This constructivist grounded the... Objectives This study aimed to examine the role of the hidden curriculum in transmitting the educational mission and its impacts on nursing students’professional socialization.Methods This constructivist grounded theory study involved twenty-six students and five faculty members from a century-old nursing school in Macao.Semi-structured interviews examined the factors influencing nursing students’choice of a specific nursing school and their general learning experiences in nursing studies.Open and focused coding was employed to develop categories and concepts that capture the nuances of how the hidden curriculum influences students’personal experiences,perceptions,and values related to developing their professional identities.The data analysis was guided by the“Community of Practice”model.Results The educational mission fostered a hidden curriculum that emphasized nurturing qualities and social responsibilities,creating a family-like learning environment that positively influenced the professional socialization of nursing students.Under the core theme of“becoming a family,”two sub-themes emerged:“student-peer interactions-fostering sisterly/brotherly learning partnerships”and“student-faculty interactions–faculty’s acting as parenting instructors.”While the hidden curriculum promoted a democratic and egalitarian learning atmosphere among student-peers,it simultaneously reinforced hierarchical power dynamics among senior-junior students and student-faculty relationships,mirroring the power-based interpersonal dynamics often found in traditional Chinese families.Conclusions Explicating the educational mission can help shape a hidden curriculum that benefits nursing students’professional socialization.Faculty members should reflect on the power inequalities reproduced by the hidden curriculum and establish appropriate boundaries in student-faculty relationships. 展开更多
关键词 Community of practice Educational mission hidden curriculum Nurse students Professional socialization Qualitative study
在线阅读 下载PDF
DH-LDA:A Deeply Hidden Load Data Attack on Electricity Market of Smart Grid
4
作者 Yunhao Yu Meiling Dizha +6 位作者 Boda Zhang Ruibin Wen FuhuaLuo Xiang Guo Junjie Song Bingdong Wang Zhenyong Zhang 《Computers, Materials & Continua》 2025年第11期3861-3877,共17页
The load profile is a key characteristic of the power grid and lies at the basis for the power flow control and generation scheduling.However,due to the wide adoption of internet-of-things(IoT)-based metering infrastr... The load profile is a key characteristic of the power grid and lies at the basis for the power flow control and generation scheduling.However,due to the wide adoption of internet-of-things(IoT)-based metering infrastructure,the cyber vulnerability of load meters has attracted the adversary’s great attention.In this paper,we investigate the vulnerability of manipulating the nodal prices by injecting false load data into the meter measurements.By taking advantage of the changing properties of real-world load profile,we propose a deeply hidden load data attack(i.e.,DH-LDA)that can evade bad data detection,clustering-based detection,and price anomaly detection.The main contributions of this work are as follows:(i)We design a stealthy attack framework that exploits historical load patterns to generate load data with minimal statistical deviation from normalmeasurements,thereby maximizing concealment;(ii)We identify the optimal time window for data injection to ensure that the altered nodal prices follow natural fluctuations,enhancing the undetectability of the attack in real-time market operations;(iii)We develop a resilience evaluation metric and formulate an optimization-based approach to quantify the electricity market’s robustness against DH-LDAs.Our experiments show that the adversary can gain profits from the electricity market while remaining undetected. 展开更多
关键词 Smart grid security load redistribution data electricity market deeply hidden attack
在线阅读 下载PDF
Uncovering Hidden Spin of Scalar Fields with Higher-Order Derivative Lagrangian:On the Wave Spin in Drifted and Dissipative Fields
5
作者 Shuo Xin Mengxiang Xie Jie Ren 《Chinese Physics Letters》 2025年第6期70-77,共8页
Scalar fields should have no spin angular momentum according to conventional textbook understandings inclassical field theory.Yet,recent studies demonstrate the undoubted existence of wave spin endowed by acousticand ... Scalar fields should have no spin angular momentum according to conventional textbook understandings inclassical field theory.Yet,recent studies demonstrate the undoubted existence of wave spin endowed by acousticand elastic longitudinal waves,which are of irrotational curl-free nature without vorticity and can be describedby scalar fields.Moreover,the conventional theory cannot even answer the question of whether wave spin existsin dissipative fields,given the ubiquitous dissipation in reality.Here,to resolve the seeming paradox and answerthe challenging question,we uncover the origin of wave spin in scalar fields beyond traditional formalism byclarifying that the presence of higher-order derivatives in scalar field Lagrangians can give rise to non-vanishingwave spin.For“spinless”scalar fields of only first-order derivatives,we can make the hidden wave spin emergeby revealing a latent field that leads to the original field through a time derivative,thus giving higher-order termsin Lagrangian.Based on the standard Noether theorem approach,we exemplify the wave spin for unconventionaldrifted acoustic fields,and even for dissipative media,in scalar fields with higher-order derivative Lagrangian.The results would prompt people to build more comprehensive and fundamental understandings of structuralwave spin in classical fields. 展开更多
关键词 higher order derivative Lagrangian hidden spin acousticand elastic longitudinal waveswhich acoustic waves wave spin spin angular momentum scalar fields
原文传递
The rediscovery of Mozart's hidden gem
6
作者 孙启禄 《疯狂英语(新悦读)》 2025年第4期25-28,76,共5页
1 In 2024,audiences were treated to something very special:new music by Wolfgang Amadeus Mozart.That's right-new Mozart music!2 Leipzig Municipal Libraries announced their exciting find.Researchers came across thi... 1 In 2024,audiences were treated to something very special:new music by Wolfgang Amadeus Mozart.That's right-new Mozart music!2 Leipzig Municipal Libraries announced their exciting find.Researchers came across this lost work while updating the Köchel catalogue,a list of Mozart's compositions.The piece is a seven⁃movement string trio,written in the mid to late 1760s,when Mozart was very young.The handwritten manuscript,titled Serenate ex C,uses dark brown ink on off⁃white paper.Now,it's been renamed Ganz kleine Nachtmusik and lasts about 12 minutes. 展开更多
关键词 new music dark brown ink string trio ganz kleine n REDISCOVERY hidden gem k chel cataloguea K chel catalogue
在线阅读 下载PDF
Fermions: Spin, Hidden Variables, Violation of Bell’s Inequality and Quantum Entanglement
7
作者 Doron Kwiat 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第4期1613-1627,共15页
Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s co... Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s constant. Quantum mechanics is described with real fields and real operators. Schrodinger and Dirac equations then are solved. The solution to Dirac equation gives four, real, 2-vectors solutions ψ1=(U1D1)ψ2=(U2D2)ψ3=(U3D3)ψ4=(U4D4)where (ψ1,ψ4) are coupled via linear combinations to yield spin-up and spin-down fermions. Likewise, (ψ2,ψ3) are coupled via linear combinations to represent spin-up and spin-down anti-fermions. For an incoming entangled pair of fermions, the combined solution is Ψin=c1ψ1+c4ψ4where c1and c4are some hidden variables. By applying a magnetic field in +Z and +x the theoretical results of a triple Stern-Gerlach experiment are predicted correctly. Then, by repeating Bell’s and Mermin Gedanken experiment with three magnetic filters σθ, at three different inclination angles θ, the violation of Bell’s inequality is proven. It is shown that all fermions are in a mixed state of spins and the ratio between spin-up to spin-down depends on the hidden variables. 展开更多
关键词 FERMIONS SPIN hidden Variables Bell’s Inequality Violation Spin Entanglement
在线阅读 下载PDF
RAISING THE DEBT CEILING:China deploys one of its largest-ever fiscal initiatives to address hidden liabilities
8
作者 Tao Xing 《China Report ASEAN》 2024年第12期60-61,共2页
China has allocated a combined 10 trillion yuan(US$1.39 trillion)in new fiscal funding to replace hidden local government debt,or liabilities that local governments do not o"cially report.This marks one of the la... China has allocated a combined 10 trillion yuan(US$1.39 trillion)in new fiscal funding to replace hidden local government debt,or liabilities that local governments do not o"cially report.This marks one of the largest moves of its kind in recent years.The Standing Committee of the National People’s Congress(NPC),China’s top legislative body,approved a bill that raises the ceiling on local government debt by 6 trillion yuan(US$834 billion)to address existing hidden debt,Xu Hongcai,deputy head of the NPC’s Financial and Economic Affairs Committee,said at a press conference after the Standing Committee of the 14th NPC concluded its 12th session in Beijing on November 8. 展开更多
关键词 replace hidden ABILITIES
暂未订购
Deciphering the Hidden Secrets between the Early Skin Wrinkling & the Metabolic (X) Syndrome with the Possible Reversal of This Process at the Molecular Level
9
作者 Dalal Alsaadoun 《Journal of Cosmetics, Dermatological Sciences and Applications》 2024年第1期45-68,共24页
The aging process is a group of degenerative changes that physiologically occur in most of the people in the elderly. This affects one or more of the human body systems. The treatment of diseases related to the aging ... The aging process is a group of degenerative changes that physiologically occur in most of the people in the elderly. This affects one or more of the human body systems. The treatment of diseases related to the aging process has a huge impact on the economy of all nations. Aging of the skin comes on the top and despite that, the results of the already present lines of treatment are not always satisfactory. This acts as a stimulus for us to dig deeper to discover the root causes of the premature aging of the skin. This was simply caused by the accumulation of repeated minute damage to the internal structure skin. In other words, if the degree of minute damage is more than the capacity of the skin to repair, the repeated micro-damage is presented in the long run as a skin wrinkling. Moreover, the skin acts as a mirror that reflects the internal structures of the human body. Thus, the more degenerative changes in the human body systems, the more the skin could become wrinkled. Our strategy to prevent or at least slow down the aging process of the skin depends on 2 main steps;the 1<sup>st</sup> is to reduce the micro-damage as can as possible, and the 2<sup>nd</sup> is to enhance the capacity of tissue regeneration to be able to reverse the already present damaged skin. As the 2 processes are synchronized with each other, this strategy would be considered the ideal for prevention of skin wrinkling especially premature ones. This not only reverses premature skin wrinkling but also protects it from future wrinklings. This review sharply pointed out the role of the functional collagen of the dermal layer of the skin in the prevention of skin wrinklings. Therefore, it would be the target to study how collagen works in the complex machinery of the dermal layer of the skin. This concept deeply believes that the recovery of dermal collagen has a much better effect than simply ingesting collagen or receiving a topical collagen booster. . 展开更多
关键词 COLLAGEN Skin Wrinkling Glycation Hyper-Insulinemia hidden Obesity Vis-ceral Fat Inflammatory Cytokines
在线阅读 下载PDF
Emoti-Shing: Detecting Vishing Attacks by Learning Emotion Dynamics through Hidden Markov Models
10
作者 Virgile Simé Nyassi Franklin Tchakounté +3 位作者 Blaise Omer Yenké Duplex Elvis Houpa Danga Magnuss Dufe Ngoran Jean Louis Kedieng Ebongue Fendji 《Journal of Intelligent Learning Systems and Applications》 2024年第3期274-315,共42页
This study examines vishing, a form of social engineering scam using voice communication to deceive individuals into revealing sensitive information or losing money. With the rise of smartphone usage, people are more ... This study examines vishing, a form of social engineering scam using voice communication to deceive individuals into revealing sensitive information or losing money. With the rise of smartphone usage, people are more susceptible to vishing attacks. The proposed Emoti-Shing model analyzes potential victims’ emotions using Hidden Markov Models to track vishing scams by examining the emotional content of phone call audio conversations. This approach aims to detect vishing scams using biological features of humans, specifically emotions, which cannot be easily masked or spoofed. Experimental results on 30 generated emotions indicate the potential for increased vishing scam detection through this approach. 展开更多
关键词 Social Engineering hidden Markov Model Vishing Voice Mining
在线阅读 下载PDF
Fresnel Equations Derived Using a Non-Local Hidden-Variable Particle Theory
11
作者 Dirk J. Pons 《Journal of Modern Physics》 2024年第6期950-984,共35页
Problem: The Fresnel equations describe the proportions of reflected and transmitted light from a surface, and are conventionally derived from wave theory continuum mechanics. Particle-based derivations of the Fresnel... Problem: The Fresnel equations describe the proportions of reflected and transmitted light from a surface, and are conventionally derived from wave theory continuum mechanics. Particle-based derivations of the Fresnel equations appear not to exist. Approach: The objective of this work was to derive the basic optical laws from first principles from a particle basis. The particle model used was the Cordus theory, a type of non-local hidden-variable (NLHV) theory that predicts specific substructures to the photon and other particles. Findings: The theory explains the origin of the orthogonal electrostatic and magnetic fields, and re-derives the refraction and reflection laws including Snell’s law and critical angle, and the Fresnel equations for s and p-polarisation. These formulations are identical to those produced by electromagnetic wave theory. Contribution: The work provides a comprehensive derivation and physical explanation of the basic optical laws, which appears not to have previously been shown from a particle basis. Implications: The primary implications are for suggesting routes for the theoretical advancement of fundamental physics. The Cordus NLHV particle theory explains optical phenomena, yet it also explains other physical phenomena including some otherwise only accessible through quantum mechanics (such as the electron spin g-factor) and general relativity (including the Lorentz and relativistic Doppler). It also provides solutions for phenomena of unknown causation, such as asymmetrical baryogenesis, unification of the interactions, and reasons for nuclide stability/instability. Consequently, the implication is that NLHV theories have the potential to represent a deeper physics that may underpin and unify quantum mechanics, general relativity, and wave theory. 展开更多
关键词 Wave-Particle Duality Optical Law Fresnel Equation Non-Local hidden-Variable
在线阅读 下载PDF
Prediction of Hidden Blood Loss During Posterior Spinal Surgery 被引量:9
12
作者 白冰 田园 +3 位作者 张越伦 马满娇 虞雪融 黄宇光 《Chinese Medical Sciences Journal》 CAS CSCD 2019年第1期38-44,共7页
Objective Identification of the risk factors for extraordinary hidden blood loss(HBL) could clarify the underlying causes and provide more appropriate management. This study aims to identify the predictors of HBL in s... Objective Identification of the risk factors for extraordinary hidden blood loss(HBL) could clarify the underlying causes and provide more appropriate management. This study aims to identify the predictors of HBL in spinal surgery.Methods Medical records were retrospectively retrieved to collect the data of patients who undergoing posterior thoracic and lumbar fusion surgery or scoliosis surgery. Demographic information, perioperative visible blood loss volume, as well as laboratory results were recorded. The patients receiving fusion surgery or scoliosis surgery were further divided into the HBL positive subgroup and the HBL negative subgroup. Differences in the variables between the groups were then analyzed. Binary logistic regression analysis was performed to determine independent risk factors associated with HBL.Results For patients undergoing posterior spinal surgery, the independent risk factors associated with HBL were autologous transfusion(for fusion surgery P = 0.011, OR: 2.627, 95%CI: 1.574-2.782; for scoliosis surgery P < 0.001, OR: 2.268, 95%CI: 2.143-2.504) and allogeneic transfusion(for fusion surgery P < 0.001, OR: 6.487, 95%CI: 2.349-17.915; for scoliosis surgery P < 0.001, OR: 3.636, 95%CI: 2.389-5.231).Conclusion Intraoperative blood transfusion might be an early-warning indicator for perioperative HBL. 展开更多
关键词 SPINAL SURGERY hidden BLOOD LOSS TRANSFUSION PREDICTION
暂未订购
基于标记树对象抽取技术的Hidden Web获取研究 被引量:9
13
作者 宋晖 张岭 +1 位作者 叶允明 马范援 《计算机工程与应用》 CSCD 北大核心 2002年第23期9-12,24,共5页
目前标准的搜索引擎能够检索的仅仅是WorldWideWeb提供的小部分称为可索引的Web信息。大量的HiddenWeb信息(估计容量是可索引Web的500倍)对这些搜索引擎是不可见的。这些信息隐藏在Web页面的搜索表单后面,保存在大型的动态数据库中。该... 目前标准的搜索引擎能够检索的仅仅是WorldWideWeb提供的小部分称为可索引的Web信息。大量的HiddenWeb信息(估计容量是可索引Web的500倍)对这些搜索引擎是不可见的。这些信息隐藏在Web页面的搜索表单后面,保存在大型的动态数据库中。该文提出了一套检索HiddenWeb信息的方法,给出了系统的框架结构,并详细讨论了实现的关键技术。系统采用新的基于标记树的对象抽取(Tag-Tree-basedObjectExtraction)方法自动地从Web页面中抽取HiddenWeb信息,然后在此基础上给出了结构化的HiddenWeb信息查询算法。文章最后对实验结果进行了讨论。 展开更多
关键词 标记树 对象抽取 hiddenWeb 互联网 搜索引擎 信息检索 结构化查询 数据库
在线阅读 下载PDF
基于启发式查询词选择算法的Hidden Web获取研究 被引量:1
14
作者 姚全珠 杨增辉 +1 位作者 张楠 田元 《计算机工程与应用》 CSCD 北大核心 2007年第34期174-176,203,共4页
Hidden Web因为其隐蔽性而难以直接抓取,因此成为信息检索研究的一个新领域。提出了一种获取Hidden Web信息的方法,讨论了实现的关键技术。通过设计提出的启发式查询词选择算法,提高了抓取的效率。实验证明了该模型和算法的有效性。
关键词 信息检索 hidden WEB 爬虫 启发式算法
在线阅读 下载PDF
Ontology mapping based on hidden Markov model 被引量:2
15
作者 尹康银 宋自林 徐平 《Journal of Southeast University(English Edition)》 EI CAS 2007年第3期389-393,共5页
The existing ontology mapping methods mainly consider the structure of the ontology and the mapping precision is lower to some extent. According to statistical theory, a method which is based on the hidden Markov mode... The existing ontology mapping methods mainly consider the structure of the ontology and the mapping precision is lower to some extent. According to statistical theory, a method which is based on the hidden Markov model is presented to establish ontology mapping. This method considers concepts as models, and attributes, relations, hierarchies, siblings and rules of the concepts as the states of the HMM, respectively. The models corresponding to the concepts are built by virtue of learning many training instances. On the basis of the best state sequence that is decided by the Viterbi algorithm and corresponding to the instance, mapping between the concepts can be established by maximum likelihood estimation. Experimental results show that this method can improve the precision of heterogeneous ontology mapping effectively. 展开更多
关键词 ontology heterogeneity ontology mapping hidden Markov model semantic web
在线阅读 下载PDF
民航主题Hidden-Web爬虫的设计与实现 被引量:1
16
作者 张校慧 徐彬 +1 位作者 陈国强 陈珊 《计算机应用与软件》 CSCD 北大核心 2008年第7期187-189,共3页
分析了现今搜索引擎技术在民航主题Hidden-Web获取方面的缺陷,以此为鉴设计并实现了一个民航主题Hidden-Web爬虫。此爬虫使用主题分类等相关技术发现并抓取民航主题Hidden-Web所对应的前台Form,生成相应的Form库,然后利用启发式规则对F... 分析了现今搜索引擎技术在民航主题Hidden-Web获取方面的缺陷,以此为鉴设计并实现了一个民航主题Hidden-Web爬虫。此爬虫使用主题分类等相关技术发现并抓取民航主题Hidden-Web所对应的前台Form,生成相应的Form库,然后利用启发式规则对Form库中的Form进行填写并搜集含有匹配结果的页面集。实验证明此爬虫的性能令人满意且对其它Hidden-Web的应用研究具有借鉴意义。 展开更多
关键词 hidden-Web FORM 民航 爬虫
在线阅读 下载PDF
TONE MODELING BASED ON HIDDEN CONDITIONAL RANDOM FIELDS AND DISCRIMINATIVE MODEL WEIGHT TRAINING 被引量:1
17
作者 黄浩 朱杰 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第1期43-50,共8页
The use of hidden conditional random fields (HCRFs) for tone modeling is explored. The tone recognition performance is improved using HCRFs by taking advantage of intra-syllable dynamic, inter-syllable dynamic and d... The use of hidden conditional random fields (HCRFs) for tone modeling is explored. The tone recognition performance is improved using HCRFs by taking advantage of intra-syllable dynamic, inter-syllable dynamic and duration features. When the tone model is integrated into continuous speech recognition, the discriminative model weight training (DMWT) is proposed. Acoustic and tone scores are scaled by model weights discriminatively trained by the minimum phone error (MPE) criterion. Two schemes of weight training are evaluated and a smoothing technique is used to make training robust to overtraining problem. Experiments show that the accuracies of tone recognition and large vocabulary continuous speech recognition (LVCSR) can be improved by the HCRFs based tone model. Compared with the global weight scheme, continuous speech recognition can be improved by the discriminative trained weight combinations. 展开更多
关键词 speech recognition MODELS hidden conditional random fields minimum phone error
在线阅读 下载PDF
Hidden Web信息获取 被引量:3
18
作者 陈珂 陈小英 徐科 《计算机时代》 2007年第5期54-56,共3页
如今Web上越来越多的信息可以通过查询接口获得,但为了获取某Hidden Web站点的页面,用户不得不键入一系列的关键词。由于没有直接指向Hidden Web页面的静态链接,当前大多搜索引擎不能发现和索引这些页面。然而,研究表明,由Hidden Web站... 如今Web上越来越多的信息可以通过查询接口获得,但为了获取某Hidden Web站点的页面,用户不得不键入一系列的关键词。由于没有直接指向Hidden Web页面的静态链接,当前大多搜索引擎不能发现和索引这些页面。然而,研究表明,由Hidden Web站点提供的高质量的信息对许多用户来说非常有价值。文章通过研究针对特定类型的表单,建立一个有效的Hidden Web爬虫,以便获取Hidden Web后台数据库信息。 展开更多
关键词 hidden Web hidden WEB爬虫 静态链接 搜索引擎 采样策略
在线阅读 下载PDF
Optimal state and branch sequence based parameter estimation of continuous hidden Markov model
19
作者 俞璐 吴乐南 谢钧 《Journal of Southeast University(English Edition)》 EI CAS 2005年第2期136-140,共5页
A parameter estimation algorithm of the continuous hidden Markov model isintroduced and the rigorous proof of its convergence is also included. The algorithm uses theViterbi algorithm instead of K-means clustering use... A parameter estimation algorithm of the continuous hidden Markov model isintroduced and the rigorous proof of its convergence is also included. The algorithm uses theViterbi algorithm instead of K-means clustering used in the segmental K-means algorithm to determineoptimal state and branch sequences. Based on the optimal sequence, parameters are estimated withmaximum-likelihood as objective functions. Comparisons with the traditional Baum-Welch and segmentalK-means algorithms on various aspects, such as optimal objectives and fundamentals, are made. Allthree algorithms are applied to face recognition. Results indicate that the proposed algorithm canreduce training time with comparable recognition rate and it is least sensitive to the training set.So its average performance exceeds the other two. 展开更多
关键词 continuous hidden Markov model optimal state and branch sequence MAXIMUMLIKELIHOOD CONVERGENCE viterbi algorithm
在线阅读 下载PDF
IMPROVEMENTS IN HIDDEN LINE REMOVAL ALGORITHM FOR BI-PARAMETRIC SURFACES
20
作者 李卫国 唐月红 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 1998年第2期93-97,共5页
A hidden line removal algorithm for bi parametric surfaces is presented and illustrated by some experimental results. The enclosure test is done using area coordinates. A technique of moving box of encirclement is p... A hidden line removal algorithm for bi parametric surfaces is presented and illustrated by some experimental results. The enclosure test is done using area coordinates. A technique of moving box of encirclement is presented. It is found that the algorithm is of general purpose, requires minimal computer storage, has high accuracy and simplicity, and is very easy to be implemented on a computer. 展开更多
关键词 computational geometry computer graphics computer aided design hidden line removal area coordinates bi parametric surfaces
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部