期刊文献+
共找到12,043篇文章
< 1 2 250 >
每页显示 20 50 100
Rise of China’s Manufacturing Hidden Champions:A Resource Allocation Perspective--An Explorative Case Study of Hailiya Group
1
作者 Shan Yu Chen Jinlong 《China Economist》 2025年第1期78-100,共23页
Hidden champions play a critical role in China’s efforts to overcome technological and industrial“chokepoints”.These enterprises are pivotal for breaking free from Western technological embargoes,avoiding entrapmen... Hidden champions play a critical role in China’s efforts to overcome technological and industrial“chokepoints”.These enterprises are pivotal for breaking free from Western technological embargoes,avoiding entrapment in low-value-added production,and driving industrial upgrading.Given the distinct market environment in which China’s hidden champions have emerged,it is both timely and practically significant to examine their growth trajectories and underlying mechanisms.This study adopts a resource allocation perspective to investigate the development path of Chinese manufacturing enterprises into hidden champions,using a vertical case study of Hailiya Group.The findings reveal that such enterprises achieve hidden champion status by vertically concentrating on niche markets while harnessing technological potential and horizontally diversifying their technology application scenarios.Their growth follows a“T-shaped”strategy,combining vertical specialization in a focused market with horizontal expansion into new applications.Four critical mechanisms underpin the rise of manufacturing hidden champions:market niche positioning,innovation-driven focus,application scenario expansion,and ecosystem development.Specifically,these enterprises strategically target niche markets,establish a technology-oriented competitive edge,broaden technology applications to unlock new profit opportunities,and develop collaborative ecosystems to share resources and drive industrial advancement.This paper not only extends the interpretive boundaries of resource allocation theory but also offers fresh insights into the emergence of Chinese manufacturing enterprises as hidden champions,enriching our understanding of their unique growth dynamics. 展开更多
关键词 hidden champions resource allocation innovation assets customer assets growth mechanism
在线阅读 下载PDF
DH-LDA:A Deeply Hidden Load Data Attack on Electricity Market of Smart Grid
2
作者 Yunhao Yu Meiling Dizha +6 位作者 Boda Zhang Ruibin Wen FuhuaLuo Xiang Guo Junjie Song Bingdong Wang Zhenyong Zhang 《Computers, Materials & Continua》 2025年第11期3861-3877,共17页
The load profile is a key characteristic of the power grid and lies at the basis for the power flow control and generation scheduling.However,due to the wide adoption of internet-of-things(IoT)-based metering infrastr... The load profile is a key characteristic of the power grid and lies at the basis for the power flow control and generation scheduling.However,due to the wide adoption of internet-of-things(IoT)-based metering infrastructure,the cyber vulnerability of load meters has attracted the adversary’s great attention.In this paper,we investigate the vulnerability of manipulating the nodal prices by injecting false load data into the meter measurements.By taking advantage of the changing properties of real-world load profile,we propose a deeply hidden load data attack(i.e.,DH-LDA)that can evade bad data detection,clustering-based detection,and price anomaly detection.The main contributions of this work are as follows:(i)We design a stealthy attack framework that exploits historical load patterns to generate load data with minimal statistical deviation from normalmeasurements,thereby maximizing concealment;(ii)We identify the optimal time window for data injection to ensure that the altered nodal prices follow natural fluctuations,enhancing the undetectability of the attack in real-time market operations;(iii)We develop a resilience evaluation metric and formulate an optimization-based approach to quantify the electricity market’s robustness against DH-LDAs.Our experiments show that the adversary can gain profits from the electricity market while remaining undetected. 展开更多
关键词 Smart grid security load redistribution data electricity market deeply hidden attack
在线阅读 下载PDF
TRE-DSP:A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
3
作者 Yousheng Zhou Rundong Peng +2 位作者 Yuanni Liu Pandi Vijayakumar Brij Gupta 《Digital Communications and Networks》 2025年第2期455-464,共10页
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every day.How to securely share data between the IoV operator and various value-added service providers becomes one of the... With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every day.How to securely share data between the IoV operator and various value-added service providers becomes one of the critical issues.Due to its flexible and efficient fine-grained access control feature,Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is suitable for data sharing in IoV.However,there are many flaws in most existing CP-ABE schemes,such as attribute privacy leakage and key misuse.This paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP).A partially hidden access structure is adopted to hide sensitive user attribute values,and attribute categories are sent along with the ciphertext to effectively avoid privacy exposure.In addition,key tracking and malicious user revocation are introduced with broadcast encryption to prevent key misuse.Since the main computation task is outsourced to the cloud,the burden of the user side is relatively low.Analysis of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV. 展开更多
关键词 PRIVACY-PRESERVING Attribute-based encryption Partially hidden policy Traceability User revocation Internet of vehicles
在线阅读 下载PDF
“Becoming a family”—the effects of the hidden curriculum in transferring institutional mission:An experience from a century-old nursing school
4
作者 Aimei Mao Hon-Lon Tam +1 位作者 Pak-Leng Cheong Iat-Kio Van 《International Journal of Nursing Sciences》 2025年第3期293-300,I0006,I0007,共10页
Objectives This study aimed to examine the role of the hidden curriculum in transmitting the educational mission and its impacts on nursing students’professional socialization.Methods This constructivist grounded the... Objectives This study aimed to examine the role of the hidden curriculum in transmitting the educational mission and its impacts on nursing students’professional socialization.Methods This constructivist grounded theory study involved twenty-six students and five faculty members from a century-old nursing school in Macao.Semi-structured interviews examined the factors influencing nursing students’choice of a specific nursing school and their general learning experiences in nursing studies.Open and focused coding was employed to develop categories and concepts that capture the nuances of how the hidden curriculum influences students’personal experiences,perceptions,and values related to developing their professional identities.The data analysis was guided by the“Community of Practice”model.Results The educational mission fostered a hidden curriculum that emphasized nurturing qualities and social responsibilities,creating a family-like learning environment that positively influenced the professional socialization of nursing students.Under the core theme of“becoming a family,”two sub-themes emerged:“student-peer interactions-fostering sisterly/brotherly learning partnerships”and“student-faculty interactions–faculty’s acting as parenting instructors.”While the hidden curriculum promoted a democratic and egalitarian learning atmosphere among student-peers,it simultaneously reinforced hierarchical power dynamics among senior-junior students and student-faculty relationships,mirroring the power-based interpersonal dynamics often found in traditional Chinese families.Conclusions Explicating the educational mission can help shape a hidden curriculum that benefits nursing students’professional socialization.Faculty members should reflect on the power inequalities reproduced by the hidden curriculum and establish appropriate boundaries in student-faculty relationships. 展开更多
关键词 Community of practice Educational mission hidden curriculum Nurse students Professional socialization Qualitative study
在线阅读 下载PDF
Uncovering Hidden Spin of Scalar Fields with Higher-Order Derivative Lagrangian:On the Wave Spin in Drifted and Dissipative Fields
5
作者 Shuo Xin Mengxiang Xie Jie Ren 《Chinese Physics Letters》 2025年第6期70-77,共8页
Scalar fields should have no spin angular momentum according to conventional textbook understandings inclassical field theory.Yet,recent studies demonstrate the undoubted existence of wave spin endowed by acousticand ... Scalar fields should have no spin angular momentum according to conventional textbook understandings inclassical field theory.Yet,recent studies demonstrate the undoubted existence of wave spin endowed by acousticand elastic longitudinal waves,which are of irrotational curl-free nature without vorticity and can be describedby scalar fields.Moreover,the conventional theory cannot even answer the question of whether wave spin existsin dissipative fields,given the ubiquitous dissipation in reality.Here,to resolve the seeming paradox and answerthe challenging question,we uncover the origin of wave spin in scalar fields beyond traditional formalism byclarifying that the presence of higher-order derivatives in scalar field Lagrangians can give rise to non-vanishingwave spin.For“spinless”scalar fields of only first-order derivatives,we can make the hidden wave spin emergeby revealing a latent field that leads to the original field through a time derivative,thus giving higher-order termsin Lagrangian.Based on the standard Noether theorem approach,we exemplify the wave spin for unconventionaldrifted acoustic fields,and even for dissipative media,in scalar fields with higher-order derivative Lagrangian.The results would prompt people to build more comprehensive and fundamental understandings of structuralwave spin in classical fields. 展开更多
关键词 higher order derivative Lagrangian hidden spin acousticand elastic longitudinal waveswhich acoustic waves wave spin spin angular momentum scalar fields
原文传递
The rediscovery of Mozart's hidden gem
6
作者 孙启禄 《疯狂英语(新悦读)》 2025年第4期25-28,76,共5页
1 In 2024,audiences were treated to something very special:new music by Wolfgang Amadeus Mozart.That's right-new Mozart music!2 Leipzig Municipal Libraries announced their exciting find.Researchers came across thi... 1 In 2024,audiences were treated to something very special:new music by Wolfgang Amadeus Mozart.That's right-new Mozart music!2 Leipzig Municipal Libraries announced their exciting find.Researchers came across this lost work while updating the Köchel catalogue,a list of Mozart's compositions.The piece is a seven⁃movement string trio,written in the mid to late 1760s,when Mozart was very young.The handwritten manuscript,titled Serenate ex C,uses dark brown ink on off⁃white paper.Now,it's been renamed Ganz kleine Nachtmusik and lasts about 12 minutes. 展开更多
关键词 new music dark brown ink string trio ganz kleine n REDISCOVERY hidden gem k chel cataloguea K chel catalogue
在线阅读 下载PDF
Research and Application of In-seam Seismic Survey Technology for Disaster-causing Potential Geology Anomalous Body in Coal Seam 被引量:6
7
作者 TENG Jiwen LI Songying +10 位作者 JIA Mingkui LIAN Jie LIU Honglei LIU Guodong WANG Wei Volker SCHAPE FENG Lei YAO Xiaoshuai WANG Kang YAN Yafen ZHANG Wanpeng 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2020年第1期10-26,共17页
In order to effectively detect potential geology anomalous bodies in coal bearing formation,such as coal seam thickness variation,small faults,goafs and collapse columns,and provide scientific guidance for safe and ef... In order to effectively detect potential geology anomalous bodies in coal bearing formation,such as coal seam thickness variation,small faults,goafs and collapse columns,and provide scientific guidance for safe and efficient mining,the SUMMIT-II EX explosion-proof seismic slot wave instrument,produced by German DMT Company,was used to detect the underground channel wave with the help of transmission method,reflection method and transflective method.Region area detection experiment in mining face had been carried out thanks to the advantage of channel wave,such as its great dispersion,abundant geology information,strong anti-interference ability and long-distance detecting.The experimental results showed that:(1)Coal seam thickness variation in extremely unstable coal seam has been quantitatively interpreted with an accuracy of more than 80%generally;(2)The faults,goafs and collapse columns could be detected and predicted accurately;(3)Experimental detection of gas enrichment areas,stress concentration regions and water inrush risk zone has been collated;(4)A research system of disaster-causing geology anomalous body detection by in-seam seismic survey has been built,valuable and innovative achievements have been got.Series of innovation obtained for the first time in this study indicated that it was more effective to detect disaster-causing potential geology anomalies by in-seam seismic survey than by ground seismic survey.It had significant scientific value and application prospect under complex coal seam conditions. 展开更多
关键词 in-seam seismic SURVEY technology(ISS) disaster-causing potential GEOLOGY ANOMALOUS BODY dispersion feature mine geophysical prospecting quantitative interpretation
在线阅读 下载PDF
Fermions: Spin, Hidden Variables, Violation of Bell’s Inequality and Quantum Entanglement
8
作者 Doron Kwiat 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第4期1613-1627,共15页
Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s co... Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s constant. Quantum mechanics is described with real fields and real operators. Schrodinger and Dirac equations then are solved. The solution to Dirac equation gives four, real, 2-vectors solutions ψ1=(U1D1)ψ2=(U2D2)ψ3=(U3D3)ψ4=(U4D4)where (ψ1,ψ4) are coupled via linear combinations to yield spin-up and spin-down fermions. Likewise, (ψ2,ψ3) are coupled via linear combinations to represent spin-up and spin-down anti-fermions. For an incoming entangled pair of fermions, the combined solution is Ψin=c1ψ1+c4ψ4where c1and c4are some hidden variables. By applying a magnetic field in +Z and +x the theoretical results of a triple Stern-Gerlach experiment are predicted correctly. Then, by repeating Bell’s and Mermin Gedanken experiment with three magnetic filters σθ, at three different inclination angles θ, the violation of Bell’s inequality is proven. It is shown that all fermions are in a mixed state of spins and the ratio between spin-up to spin-down depends on the hidden variables. 展开更多
关键词 FERMIONS SPIN hidden Variables Bell’s Inequality Violation Spin Entanglement
在线阅读 下载PDF
RAISING THE DEBT CEILING:China deploys one of its largest-ever fiscal initiatives to address hidden liabilities
9
作者 Tao Xing 《China Report ASEAN》 2024年第12期60-61,共2页
China has allocated a combined 10 trillion yuan(US$1.39 trillion)in new fiscal funding to replace hidden local government debt,or liabilities that local governments do not o"cially report.This marks one of the la... China has allocated a combined 10 trillion yuan(US$1.39 trillion)in new fiscal funding to replace hidden local government debt,or liabilities that local governments do not o"cially report.This marks one of the largest moves of its kind in recent years.The Standing Committee of the National People’s Congress(NPC),China’s top legislative body,approved a bill that raises the ceiling on local government debt by 6 trillion yuan(US$834 billion)to address existing hidden debt,Xu Hongcai,deputy head of the NPC’s Financial and Economic Affairs Committee,said at a press conference after the Standing Committee of the 14th NPC concluded its 12th session in Beijing on November 8. 展开更多
关键词 replace hidden ABILITIES
暂未订购
Emoti-Shing: Detecting Vishing Attacks by Learning Emotion Dynamics through Hidden Markov Models
10
作者 Virgile Simé Nyassi Franklin Tchakounté +3 位作者 Blaise Omer Yenké Duplex Elvis Houpa Danga Magnuss Dufe Ngoran Jean Louis Kedieng Ebongue Fendji 《Journal of Intelligent Learning Systems and Applications》 2024年第3期274-315,共42页
This study examines vishing, a form of social engineering scam using voice communication to deceive individuals into revealing sensitive information or losing money. With the rise of smartphone usage, people are more ... This study examines vishing, a form of social engineering scam using voice communication to deceive individuals into revealing sensitive information or losing money. With the rise of smartphone usage, people are more susceptible to vishing attacks. The proposed Emoti-Shing model analyzes potential victims’ emotions using Hidden Markov Models to track vishing scams by examining the emotional content of phone call audio conversations. This approach aims to detect vishing scams using biological features of humans, specifically emotions, which cannot be easily masked or spoofed. Experimental results on 30 generated emotions indicate the potential for increased vishing scam detection through this approach. 展开更多
关键词 Social Engineering hidden Markov Model Vishing Voice Mining
在线阅读 下载PDF
Deciphering the Hidden Secrets between the Early Skin Wrinkling & the Metabolic (X) Syndrome with the Possible Reversal of This Process at the Molecular Level
11
作者 Dalal Alsaadoun 《Journal of Cosmetics, Dermatological Sciences and Applications》 2024年第1期45-68,共24页
The aging process is a group of degenerative changes that physiologically occur in most of the people in the elderly. This affects one or more of the human body systems. The treatment of diseases related to the aging ... The aging process is a group of degenerative changes that physiologically occur in most of the people in the elderly. This affects one or more of the human body systems. The treatment of diseases related to the aging process has a huge impact on the economy of all nations. Aging of the skin comes on the top and despite that, the results of the already present lines of treatment are not always satisfactory. This acts as a stimulus for us to dig deeper to discover the root causes of the premature aging of the skin. This was simply caused by the accumulation of repeated minute damage to the internal structure skin. In other words, if the degree of minute damage is more than the capacity of the skin to repair, the repeated micro-damage is presented in the long run as a skin wrinkling. Moreover, the skin acts as a mirror that reflects the internal structures of the human body. Thus, the more degenerative changes in the human body systems, the more the skin could become wrinkled. Our strategy to prevent or at least slow down the aging process of the skin depends on 2 main steps;the 1<sup>st</sup> is to reduce the micro-damage as can as possible, and the 2<sup>nd</sup> is to enhance the capacity of tissue regeneration to be able to reverse the already present damaged skin. As the 2 processes are synchronized with each other, this strategy would be considered the ideal for prevention of skin wrinkling especially premature ones. This not only reverses premature skin wrinkling but also protects it from future wrinklings. This review sharply pointed out the role of the functional collagen of the dermal layer of the skin in the prevention of skin wrinklings. Therefore, it would be the target to study how collagen works in the complex machinery of the dermal layer of the skin. This concept deeply believes that the recovery of dermal collagen has a much better effect than simply ingesting collagen or receiving a topical collagen booster. . 展开更多
关键词 COLLAGEN Skin Wrinkling Glycation Hyper-Insulinemia hidden Obesity Vis-ceral Fat Inflammatory Cytokines
在线阅读 下载PDF
东北地区名老中医对《黄帝内经》伏邪理论的发挥 被引量:1
12
作者 张钰欣 刘雨昕 +3 位作者 张硕 田栋 曹娜 翟双庆 《中华中医药杂志》 北大核心 2025年第4期2026-2029,共4页
东北地区名老中医以《黄帝内经》伏邪理论为基础,创新性提出“先天伏寒”“邪伏浮络”“邪匿脑髓”等理论。拓展伏邪成因,提出外感、内伤均可导致伏邪。重视伏寒致病,以寒邪内伏阐释冠心病、胃炎等内伤疾病的发生。提出伏邪致病具有病... 东北地区名老中医以《黄帝内经》伏邪理论为基础,创新性提出“先天伏寒”“邪伏浮络”“邪匿脑髓”等理论。拓展伏邪成因,提出外感、内伤均可导致伏邪。重视伏寒致病,以寒邪内伏阐释冠心病、胃炎等内伤疾病的发生。提出伏邪致病具有病象不显、反复难愈、外因引动的特点,明确邪气伏留部位对疾病的影响。针对伏邪外达由深至浅、伏邪发病以正虚为本的特征,提出顺势透达、补虚培元、祛邪扶正的治疗原则,并明确邪气潜伏之时,人体所出现的特殊表现,提出临床需认真观察,及时治疗,可阻止伏邪发病,防止疾病发生。 展开更多
关键词 东北地区 名老中医 《黄帝内经》 伏邪 发挥
原文传递
隐形冠军企业如何通过融资协同激活技术创新?——泰达洁净2004—2023年纵向案例研究 被引量:1
13
作者 李莉 刘书宁 刘田田 《外国经济与管理》 北大核心 2025年第2期119-134,152,共17页
技术创新作为影响隐形冠军企业成长的关键因素已被学术界广泛探讨,然而,在技术创新需要高额资金投入又面临严重融资约束下,企业应该如何打破融资困境,仍未得到充分的理论解释。本文采用案例研究方法,通过对泰达洁净公司的技术创新历程... 技术创新作为影响隐形冠军企业成长的关键因素已被学术界广泛探讨,然而,在技术创新需要高额资金投入又面临严重融资约束下,企业应该如何打破融资困境,仍未得到充分的理论解释。本文采用案例研究方法,通过对泰达洁净公司的技术创新历程进行深入分析,探讨了隐形冠军企业通过融资协同激活技术创新的路径与机理。研究发现:隐形冠军企业技术创新的不同发展阶段会对其融资系统信任类型的构建产生影响,企业于技术创新的探索、发展和深化阶段分别构建了制度型、知识型和认同型信任;信任的构建帮助企业获取信任方所提供的关系型融资,以及金融市场所提供的市场型融资,并在隐形冠军企业技术实力不断提升的背景下实现融资协同模式的动态演化;基于不同信任类型的融资协同模式助推隐形冠军企业分别开展研发导向型、价值导向型,以及研发+价值导向型技术创新活动。这些结论对融资协同、技术创新、隐形冠军等方面的研究做出了理论贡献,同时对中国新质生产力发展提供有益参考。 展开更多
关键词 隐形冠军 融资协同 技术创新 案例研究
原文传递
基于集成学习模型与贝叶斯优化算法的成矿预测 被引量:1
14
作者 孔春芳 田倩 +3 位作者 刘健 蔡国荣 赵杰 徐凯 《地学前缘》 北大核心 2025年第4期122-139,共18页
全球进入隐伏矿体勘查时代,急需新的找矿预测方法。利用集成学习进行的数据驱动的成矿预测模型正在成为深部隐伏矿产勘探的有力工具。然而,基于集成学习的成矿预测模型面临着一些普遍的问题,特别是模型的参数调优。模型的参数调优是一... 全球进入隐伏矿体勘查时代,急需新的找矿预测方法。利用集成学习进行的数据驱动的成矿预测模型正在成为深部隐伏矿产勘探的有力工具。然而,基于集成学习的成矿预测模型面临着一些普遍的问题,特别是模型的参数调优。模型的参数调优是一个非常耗时的过程,需要繁琐的计算和足够的专家经验。本文提出了一种基于多源地学知识与贝叶斯优化算法的集成学习模型来解决上述问题。具体来说,首先,基于多源地学知识,构建锰矿成矿预测数据库;其次,基于自适应提升模型(Adaptive Boosting,AdaBoost)和随机森林(Random Forest,RF)模型,建立黔东北锰矿成矿预测模型;然后,采用贝叶斯优化算法(Bayesian Optimization,BO),通过5倍交叉验证的辅助,寻找BO-AdaBoost和BO-RF模型最合适的超参数组合;最后,利用精度、准确率、召回率、F_(1)分数、kappa系数、AUC值等参数及已有成果检测模型的性能。实验结果发现,BO-AdaBoost和BO-RF模型的AUC值都得到了显著的提高,表明BO是一个强大的优化工具,优化结果为集成学习模型的超参数设置提供了参考。同时,实验结果也表明:BO-AdaBoost模型(92.8%)比BO-RF模型(89.9%)具有更高的预测精度和地质泛化能力,在成矿预测方面具有巨大潜力。基于BO-AdaBoost模型的预测图为黔东北隐伏锰矿矿床的勘探提供了重要线索,并可以指导未来的矿产勘探与开发。 展开更多
关键词 集成学习 自适应提升模型 随机森林 贝叶斯优化算法 隐伏锰矿 成矿预测
在线阅读 下载PDF
基于双重预防机制的化工园区信息系统研究与设计 被引量:1
15
作者 袁亮 肖文东 +3 位作者 蒋洋 赵军 梅晶 张教 《现代化工》 北大核心 2025年第S1期370-374,380,共6页
以双重预防机制中的风险分级管控和隐患排查治理为2大主体,提出了双重预防机制的流程架构。通过PyQt5设计了一种针对化工园区的双重预防机制系统。通过整合风险点识别与登记、风险点清单管理、隐患填报以及隐患清单管理等功能,该系统实... 以双重预防机制中的风险分级管控和隐患排查治理为2大主体,提出了双重预防机制的流程架构。通过PyQt5设计了一种针对化工园区的双重预防机制系统。通过整合风险点识别与登记、风险点清单管理、隐患填报以及隐患清单管理等功能,该系统实现了全面且简便的风险和隐患管理,实现了化工企业对安全管理的多样化生产要求。与传统的预防系统相比,本系统具有操作简便、功能全面、高效处理和安全可靠等优点。 展开更多
关键词 双重预防机制 风险分级 隐患排查 信息系统
原文传递
基于堤防隐患探测的探地雷达数据处理研究 被引量:1
16
作者 李长征 刘冠英 +2 位作者 邢戍彪 何鲜峰 杨磊 《山西建筑》 2025年第5期1-5,24,共6页
堤防工程在我国防洪工程体系中占有极其重要的地位。探地雷达是探测堤防隐患、掌握堤防质量的有效方法,在堤顶布设单条探地雷达测线是进行堤防隐患探测的常用工作方式。在进行堤防隐患探测时,对堤顶测线进行了加密处理,并在两侧堤坡布... 堤防工程在我国防洪工程体系中占有极其重要的地位。探地雷达是探测堤防隐患、掌握堤防质量的有效方法,在堤顶布设单条探地雷达测线是进行堤防隐患探测的常用工作方式。在进行堤防隐患探测时,对堤顶测线进行了加密处理,并在两侧堤坡布设了测线。文章对堤坡雷达数据进行地形校正,然后与堤顶探测数据进行融合,实现了探测成果中既同时显示堤顶测线与堤坡测线成果,又显示堤坡与堤顶地形的目标。通过堤顶测线加密处理,对堤顶雷达探测成果进行了三维成像。工程应用表明,进行地形校正与数据融合的探地雷达探测成果图能精确定位地下异常体;钻孔和静力触探结果验证了探地雷达三维成像划分堤防土层的准确性。 展开更多
关键词 探地雷达 堤防隐患 地形校正 三维成像
在线阅读 下载PDF
教育综合改革背景下隐性课程的开发研究 被引量:1
17
作者 刘美凤 刘耔杉 +1 位作者 张智妍 吕秋燕 《电化教育研究》 北大核心 2025年第7期69-76,共8页
科技进步带来的环境变化对人才培养提出新挑战,同时也带来新机遇。教育综合改革背景下,加强显性课程与隐性课程融合成为实现培养学生高阶思维、素养和价值观的重要途径。将隐性课程开发研究与教育综合改革背景相结合,发现隐性课程开发... 科技进步带来的环境变化对人才培养提出新挑战,同时也带来新机遇。教育综合改革背景下,加强显性课程与隐性课程融合成为实现培养学生高阶思维、素养和价值观的重要途径。将隐性课程开发研究与教育综合改革背景相结合,发现隐性课程开发在实现人才素养目标、契合数字时代学习模式和与显性课程协同增效方面具有重要价值。基于课程开发的一般性范式和对当代隐性课程开发范式的特殊性分析,构建了教育综合改革背景下的隐性课程开发范式,包括隐性课程目标确定、表现形式匹配、实施策略设计和评价方案的制定,补充了现有研究对当代新教育情境下如何充分利用新的资源和技术手段开发隐性课程的关注缺失,提出了形成整体性课程规划、隐性课程新形式开发、提供教师脚手架工具的实施路径。 展开更多
关键词 隐性课程 新课程方案 技术赋能 课程开发 课程协同
在线阅读 下载PDF
多尺度反向校正增强和无损下采样的毫米波图像目标检测方法 被引量:1
18
作者 叶学义 韩卓 +2 位作者 蒋甜甜 王佳欣 陈华华 《电子测量与仪器学报》 北大核心 2025年第4期50-61,共12页
针对毫米波图像中隐匿目标局部信噪比低导致检测障碍的问题,提出了一种基于多尺度反向校正增强和无损下采样的检测方法。首先设计了一种多尺度反向校正特征增强模块,在提取多尺度特征的多卷积核Res2Net上融合反向校正操作,实现大感受野... 针对毫米波图像中隐匿目标局部信噪比低导致检测障碍的问题,提出了一种基于多尺度反向校正增强和无损下采样的检测方法。首先设计了一种多尺度反向校正特征增强模块,在提取多尺度特征的多卷积核Res2Net上融合反向校正操作,实现大感受野区域对区域内相关小感受野区域卷积计算的反向校正,使得深度模型不仅能够获取更细粒度的特征,而且使宏观判别性表示贯穿多个尺度的特征信息;其次,利用非跨步卷积层的SPD-Conv实现无损下采样,缓解卷积下采样导致的信息丢失;最后,采用K-means++聚类算法生成适合隐匿目标检测任务的新锚框。实验在YOLO系列中选择了各方面性能都适中的YOLOv5s作为基础框架,针对现有的两种毫米波图像数据集(阵列图像集和线扫图像集)平均精度均值(mAP)mAP@0.5分别达到了96.21%和97.97%,相较于原版YOLOv5s以及YOLO其他系列等性能有显著提升。实验结果表明,该方法在不明显增加参数量和推理时间的同时,能够有效提升深度模型的检测性能。 展开更多
关键词 隐匿目标检测 主动毫米波图像 多尺度反向校正特征增强 无损下采样 K-means++
原文传递
BP神经网络回归预测模型的改进 被引量:3
19
作者 何大四 金璐琪 +1 位作者 张祖铭 赵强强 《机械工程与自动化》 2025年第1期224-226,共3页
为了优化BP神经网络,提出了一种优化BP神经网络的流程。首先,判断各影响因素之间的自相关性,如果各影响因素满足自相关评价指标,则可以使用BP神经网络进行回归训练;其次,改变BP神经网络的隐藏节点数、学习效率、训练误差和训练次数等影... 为了优化BP神经网络,提出了一种优化BP神经网络的流程。首先,判断各影响因素之间的自相关性,如果各影响因素满足自相关评价指标,则可以使用BP神经网络进行回归训练;其次,改变BP神经网络的隐藏节点数、学习效率、训练误差和训练次数等影响因素;最后,加入遗传算法或者粒子群算法与BP神经网络组成混合算法,以提高BP神经网络的训练精度。 展开更多
关键词 BP神经网络 隐藏节点 混合算法 回归预测 自相关性
在线阅读 下载PDF
人工智能赋能高职教师角色重塑:技术红利、风险隐忧与应对策略 被引量:1
20
作者 王钢 孙不凡 宗方 《中国职业技术教育》 北大核心 2025年第14期5-15,共11页
人工智能的快速迭代与广泛应用正在引发职业教育的深刻变革,如何善用人工智能技术赋能高职教师角色重塑,成为当前职业教育数字化转型的核心议题。深入探讨人工智能赋能高职教师角色重塑的技术红利和风险隐忧,有助于探索构建人机协同的... 人工智能的快速迭代与广泛应用正在引发职业教育的深刻变革,如何善用人工智能技术赋能高职教师角色重塑,成为当前职业教育数字化转型的核心议题。深入探讨人工智能赋能高职教师角色重塑的技术红利和风险隐忧,有助于探索构建人机协同的智慧型教育新范式,为人工智能更好地赋能高素质专业化高职教师队伍建设提供有益参考。在新一轮科技革命的赋能机遇中,人工智能应用能够在产教融合、精准教学、协同创新、双师培养四个方面正向赋能教师角色重塑,但同时也潜藏着教育主体性消解、教育伦理失范、师生交流异化及创新生态恶化四方面隐患。对此,唯有强化教师主体意识、完善数据治理机制、重构师生教育交往并回归创新本质,方能在技术洪流中锚定时代育人坐标,守住“立德树人”的育人初心。 展开更多
关键词 人工智能 职业教育 高职教师 角色重塑 技术红利 风险隐忧
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部