期刊文献+
共找到12,201篇文章
< 1 2 250 >
每页显示 20 50 100
Research and Application of In-seam Seismic Survey Technology for Disaster-causing Potential Geology Anomalous Body in Coal Seam 被引量:6
1
作者 TENG Jiwen LI Songying +10 位作者 JIA Mingkui LIAN Jie LIU Honglei LIU Guodong WANG Wei Volker SCHAPE FENG Lei YAO Xiaoshuai WANG Kang YAN Yafen ZHANG Wanpeng 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2020年第1期10-26,共17页
In order to effectively detect potential geology anomalous bodies in coal bearing formation,such as coal seam thickness variation,small faults,goafs and collapse columns,and provide scientific guidance for safe and ef... In order to effectively detect potential geology anomalous bodies in coal bearing formation,such as coal seam thickness variation,small faults,goafs and collapse columns,and provide scientific guidance for safe and efficient mining,the SUMMIT-II EX explosion-proof seismic slot wave instrument,produced by German DMT Company,was used to detect the underground channel wave with the help of transmission method,reflection method and transflective method.Region area detection experiment in mining face had been carried out thanks to the advantage of channel wave,such as its great dispersion,abundant geology information,strong anti-interference ability and long-distance detecting.The experimental results showed that:(1)Coal seam thickness variation in extremely unstable coal seam has been quantitatively interpreted with an accuracy of more than 80%generally;(2)The faults,goafs and collapse columns could be detected and predicted accurately;(3)Experimental detection of gas enrichment areas,stress concentration regions and water inrush risk zone has been collated;(4)A research system of disaster-causing geology anomalous body detection by in-seam seismic survey has been built,valuable and innovative achievements have been got.Series of innovation obtained for the first time in this study indicated that it was more effective to detect disaster-causing potential geology anomalies by in-seam seismic survey than by ground seismic survey.It had significant scientific value and application prospect under complex coal seam conditions. 展开更多
关键词 in-seam seismic SURVEY technology(ISS) disaster-causing potential GEOLOGY ANOMALOUS BODY dispersion feature mine geophysical prospecting quantitative interpretation
在线阅读 下载PDF
Hydrothermal Control by Deep Hidden Faults on Geothermal Systems in Sedimentary Basins:A Case Study of the Cangdong Fault in the North China Basin
2
作者 YIN Xiaoxiao LIN Jianwang +5 位作者 LI Hu LI Huanqing DONG Lufei YAN Jiaxian ZHANG Sen LI Zheng 《Acta Geologica Sinica(English Edition)》 2025年第1期243-257,共15页
Large basins are currently the global focus for geothermal development,with their hydrothermal system being controlled by a variety of factors,such as basement relief and fracture development.Donglihu is located at th... Large basins are currently the global focus for geothermal development,with their hydrothermal system being controlled by a variety of factors,such as basement relief and fracture development.Donglihu is located at the north of the Cangxian uplift in the North China Basin,the concentrated geothermal resource development zone in North China.This study systematically collects temperature logging data and long-term dynamic monitoring of water level and water quality as well as group well tracer test data carried out in this area in recent years,on the basis of which the hydrothermal controlling role of the deep hidden faults is systematically analyzed.The results show that the Cangdong fault communicates with different geothermal reservoirs in the shallow part and plays a specific role in the water-heat channel of the local area.As a result,the high-value area of the geothermal temperature gradient in the sedimentary layer of the Donglihu area is distributed around the Cangdong fault.The geothermal reservoir temperature of the Minghuazhen Formation within the influence of the fault is also significantly higher than the regional average,the hydraulic head of different geothermal reservoirs showing a consistent and synergistic trend.However,the water quality has been stable for many years without any apparent changes.This understanding has a particular significance for further deepening understanding of the geothermal genesis mechanism in sedimentary basins and guiding future geothermal exploration and development in the Donglihu area. 展开更多
关键词 sedimentary basin geothermal system hidden fault hydrothermal channel Cangdong fault
在线阅读 下载PDF
Rise of China’s Manufacturing Hidden Champions:A Resource Allocation Perspective--An Explorative Case Study of Hailiya Group
3
作者 Shan Yu Chen Jinlong 《China Economist》 2025年第1期78-100,共23页
Hidden champions play a critical role in China’s efforts to overcome technological and industrial“chokepoints”.These enterprises are pivotal for breaking free from Western technological embargoes,avoiding entrapmen... Hidden champions play a critical role in China’s efforts to overcome technological and industrial“chokepoints”.These enterprises are pivotal for breaking free from Western technological embargoes,avoiding entrapment in low-value-added production,and driving industrial upgrading.Given the distinct market environment in which China’s hidden champions have emerged,it is both timely and practically significant to examine their growth trajectories and underlying mechanisms.This study adopts a resource allocation perspective to investigate the development path of Chinese manufacturing enterprises into hidden champions,using a vertical case study of Hailiya Group.The findings reveal that such enterprises achieve hidden champion status by vertically concentrating on niche markets while harnessing technological potential and horizontally diversifying their technology application scenarios.Their growth follows a“T-shaped”strategy,combining vertical specialization in a focused market with horizontal expansion into new applications.Four critical mechanisms underpin the rise of manufacturing hidden champions:market niche positioning,innovation-driven focus,application scenario expansion,and ecosystem development.Specifically,these enterprises strategically target niche markets,establish a technology-oriented competitive edge,broaden technology applications to unlock new profit opportunities,and develop collaborative ecosystems to share resources and drive industrial advancement.This paper not only extends the interpretive boundaries of resource allocation theory but also offers fresh insights into the emergence of Chinese manufacturing enterprises as hidden champions,enriching our understanding of their unique growth dynamics. 展开更多
关键词 hidden champions resource allocation innovation assets customer assets growth mechanism
在线阅读 下载PDF
DH-LDA:A Deeply Hidden Load Data Attack on Electricity Market of Smart Grid
4
作者 Yunhao Yu Meiling Dizha +6 位作者 Boda Zhang Ruibin Wen FuhuaLuo Xiang Guo Junjie Song Bingdong Wang Zhenyong Zhang 《Computers, Materials & Continua》 2025年第11期3861-3877,共17页
The load profile is a key characteristic of the power grid and lies at the basis for the power flow control and generation scheduling.However,due to the wide adoption of internet-of-things(IoT)-based metering infrastr... The load profile is a key characteristic of the power grid and lies at the basis for the power flow control and generation scheduling.However,due to the wide adoption of internet-of-things(IoT)-based metering infrastructure,the cyber vulnerability of load meters has attracted the adversary’s great attention.In this paper,we investigate the vulnerability of manipulating the nodal prices by injecting false load data into the meter measurements.By taking advantage of the changing properties of real-world load profile,we propose a deeply hidden load data attack(i.e.,DH-LDA)that can evade bad data detection,clustering-based detection,and price anomaly detection.The main contributions of this work are as follows:(i)We design a stealthy attack framework that exploits historical load patterns to generate load data with minimal statistical deviation from normalmeasurements,thereby maximizing concealment;(ii)We identify the optimal time window for data injection to ensure that the altered nodal prices follow natural fluctuations,enhancing the undetectability of the attack in real-time market operations;(iii)We develop a resilience evaluation metric and formulate an optimization-based approach to quantify the electricity market’s robustness against DH-LDAs.Our experiments show that the adversary can gain profits from the electricity market while remaining undetected. 展开更多
关键词 Smart grid security load redistribution data electricity market deeply hidden attack
在线阅读 下载PDF
TRE-DSP:A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
5
作者 Yousheng Zhou Rundong Peng +2 位作者 Yuanni Liu Pandi Vijayakumar Brij Gupta 《Digital Communications and Networks》 2025年第2期455-464,共10页
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every day.How to securely share data between the IoV operator and various value-added service providers becomes one of the... With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every day.How to securely share data between the IoV operator and various value-added service providers becomes one of the critical issues.Due to its flexible and efficient fine-grained access control feature,Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is suitable for data sharing in IoV.However,there are many flaws in most existing CP-ABE schemes,such as attribute privacy leakage and key misuse.This paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP).A partially hidden access structure is adopted to hide sensitive user attribute values,and attribute categories are sent along with the ciphertext to effectively avoid privacy exposure.In addition,key tracking and malicious user revocation are introduced with broadcast encryption to prevent key misuse.Since the main computation task is outsourced to the cloud,the burden of the user side is relatively low.Analysis of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV. 展开更多
关键词 PRIVACY-PRESERVING Attribute-based encryption Partially hidden policy Traceability User revocation Internet of vehicles
在线阅读 下载PDF
“Becoming a family”—the effects of the hidden curriculum in transferring institutional mission:An experience from a century-old nursing school
6
作者 Aimei Mao Hon-Lon Tam +1 位作者 Pak-Leng Cheong Iat-Kio Van 《International Journal of Nursing Sciences》 2025年第3期293-300,I0006,I0007,共10页
Objectives This study aimed to examine the role of the hidden curriculum in transmitting the educational mission and its impacts on nursing students’professional socialization.Methods This constructivist grounded the... Objectives This study aimed to examine the role of the hidden curriculum in transmitting the educational mission and its impacts on nursing students’professional socialization.Methods This constructivist grounded theory study involved twenty-six students and five faculty members from a century-old nursing school in Macao.Semi-structured interviews examined the factors influencing nursing students’choice of a specific nursing school and their general learning experiences in nursing studies.Open and focused coding was employed to develop categories and concepts that capture the nuances of how the hidden curriculum influences students’personal experiences,perceptions,and values related to developing their professional identities.The data analysis was guided by the“Community of Practice”model.Results The educational mission fostered a hidden curriculum that emphasized nurturing qualities and social responsibilities,creating a family-like learning environment that positively influenced the professional socialization of nursing students.Under the core theme of“becoming a family,”two sub-themes emerged:“student-peer interactions-fostering sisterly/brotherly learning partnerships”and“student-faculty interactions–faculty’s acting as parenting instructors.”While the hidden curriculum promoted a democratic and egalitarian learning atmosphere among student-peers,it simultaneously reinforced hierarchical power dynamics among senior-junior students and student-faculty relationships,mirroring the power-based interpersonal dynamics often found in traditional Chinese families.Conclusions Explicating the educational mission can help shape a hidden curriculum that benefits nursing students’professional socialization.Faculty members should reflect on the power inequalities reproduced by the hidden curriculum and establish appropriate boundaries in student-faculty relationships. 展开更多
关键词 Community of practice Educational mission hidden curriculum Nurse students Professional socialization Qualitative study
在线阅读 下载PDF
Uncovering Hidden Spin of Scalar Fields with Higher-Order Derivative Lagrangian:On the Wave Spin in Drifted and Dissipative Fields
7
作者 Shuo Xin Mengxiang Xie Jie Ren 《Chinese Physics Letters》 2025年第6期70-77,共8页
Scalar fields should have no spin angular momentum according to conventional textbook understandings inclassical field theory.Yet,recent studies demonstrate the undoubted existence of wave spin endowed by acousticand ... Scalar fields should have no spin angular momentum according to conventional textbook understandings inclassical field theory.Yet,recent studies demonstrate the undoubted existence of wave spin endowed by acousticand elastic longitudinal waves,which are of irrotational curl-free nature without vorticity and can be describedby scalar fields.Moreover,the conventional theory cannot even answer the question of whether wave spin existsin dissipative fields,given the ubiquitous dissipation in reality.Here,to resolve the seeming paradox and answerthe challenging question,we uncover the origin of wave spin in scalar fields beyond traditional formalism byclarifying that the presence of higher-order derivatives in scalar field Lagrangians can give rise to non-vanishingwave spin.For“spinless”scalar fields of only first-order derivatives,we can make the hidden wave spin emergeby revealing a latent field that leads to the original field through a time derivative,thus giving higher-order termsin Lagrangian.Based on the standard Noether theorem approach,we exemplify the wave spin for unconventionaldrifted acoustic fields,and even for dissipative media,in scalar fields with higher-order derivative Lagrangian.The results would prompt people to build more comprehensive and fundamental understandings of structuralwave spin in classical fields. 展开更多
关键词 higher order derivative Lagrangian hidden spin acousticand elastic longitudinal waveswhich acoustic waves wave spin spin angular momentum scalar fields
原文传递
The rediscovery of Mozart's hidden gem
8
作者 孙启禄 《疯狂英语(新悦读)》 2025年第4期25-28,76,共5页
1 In 2024,audiences were treated to something very special:new music by Wolfgang Amadeus Mozart.That's right-new Mozart music!2 Leipzig Municipal Libraries announced their exciting find.Researchers came across thi... 1 In 2024,audiences were treated to something very special:new music by Wolfgang Amadeus Mozart.That's right-new Mozart music!2 Leipzig Municipal Libraries announced their exciting find.Researchers came across this lost work while updating the Köchel catalogue,a list of Mozart's compositions.The piece is a seven⁃movement string trio,written in the mid to late 1760s,when Mozart was very young.The handwritten manuscript,titled Serenate ex C,uses dark brown ink on off⁃white paper.Now,it's been renamed Ganz kleine Nachtmusik and lasts about 12 minutes. 展开更多
关键词 new music dark brown ink string trio ganz kleine n REDISCOVERY hidden gem k chel cataloguea K chel catalogue
在线阅读 下载PDF
Hidden Concerns and Countermeasures for China’s Green Energy Mineral Resource Supply Security
9
作者 Fang Ruirui Liu Guizhou +3 位作者 Dou Lirong Hu Ning Xia Xiaodi Feng Lianyong 《China Oil & Gas》 2025年第5期47-52,共6页
Achieving the dual carbon goal through energy transition has become a global consensus.The increasingly recognized of mineral resources is increasingly recognized due to their role in determining the pace of energy tr... Achieving the dual carbon goal through energy transition has become a global consensus.The increasingly recognized of mineral resources is increasingly recognized due to their role in determining the pace of energy transition.China has a leading capacity in the production and processing of certain minerals.However,because the major sources are abroad,China still faces certain disadvantages in acquiring upstream resources.In response to the complex international situation and high consumption demand。 展开更多
关键词 mineral resources dual carbon goal COUNTERMEASURES Chinas green energy mineral resource supply security achieving dual carbon goal energy transition hidden concerns
在线阅读 下载PDF
高原型藏羊羔羊多疫苗联合免疫试验研究
10
作者 才仁卓玛 铁富萍 +2 位作者 才仁 扎西卓玛 刘伟红 《青海畜牧兽医杂志》 2026年第1期18-23,共6页
本研究对高原型藏羊羔羊进行了口蹄疫、小反刍兽疫、羊痘、包虫病和布病5种疫苗不同组合注射免疫试验,结果表明,与单苗免疫比较,不同疫苗产生抗体的干扰和拮抗作用不明显,抗体阳性率在70%以上,产生的抗体效价相对较高且稳定,达到了国家... 本研究对高原型藏羊羔羊进行了口蹄疫、小反刍兽疫、羊痘、包虫病和布病5种疫苗不同组合注射免疫试验,结果表明,与单苗免疫比较,不同疫苗产生抗体的干扰和拮抗作用不明显,抗体阳性率在70%以上,产生的抗体效价相对较高且稳定,达到了国家规定的免疫要求,联合免疫后羔羊不良反应不明显,可以在实际工作中推广应用。 展开更多
关键词 藏羔羊 多疫苗 联合 免疫
在线阅读 下载PDF
基于改进隐半马尔可夫模型的设备故障诊断与寿命预测研究
11
作者 刘勤明 向浩东 +1 位作者 刘文溢 何基伟 《系统科学与数学》 北大核心 2026年第2期480-499,共20页
针对设备的健康诊断和剩余寿命预测问题,提出一种数据-模型双驱动的随机过程模型.首先针对非振动类信号提出了一种新的信号标量化方法,使得连续性信号(温度、速度、压强等)能够通过标量化方法形成可以输入到隐半马尔可夫模型的数据类型... 针对设备的健康诊断和剩余寿命预测问题,提出一种数据-模型双驱动的随机过程模型.首先针对非振动类信号提出了一种新的信号标量化方法,使得连续性信号(温度、速度、压强等)能够通过标量化方法形成可以输入到隐半马尔可夫模型的数据类型.其次,提出一种新式退化核驱动的改进隐半马尔可夫模型(deterioration kernelbased modified hidden semi-Markov model,DK-MHSMM)实现机械装备观测标度至潜在状态的过程映射,动态甄别设备状态模式.再次,在DK-MHSMM中引入粘连系数,运用遗传算法以及樽海鞘群算法的协同进化算法替代常规EM参数估计方法对模型参数进行估计,根据设备全寿命分布特点以及设备当前状态值提出了相应的剩余寿命预测方法.最后,利用涡扇发动机数据集对该方法进行了验证,验证了该方法的有效性和可行性. 展开更多
关键词 隐半马尔可夫模型 故障诊断 剩余寿命预测 樽海鞘群算法 协同进化
原文传递
智能变电站二次设备隐藏故障自动检测方法
12
作者 代小翔 胡绍谦 张亮 《自动化应用》 2026年第2期176-178,共3页
针对智能变电站二次设备隐藏故障自动检测存在的检测精度较低的问题,提出智能变电站二次设备隐藏故障自动检测方法。首先,从智能变电站过程层网络获取SV报文数据,采用IEEE 1588精确时间协议实现多源采样数据的同步处理,获取二次设备的... 针对智能变电站二次设备隐藏故障自动检测存在的检测精度较低的问题,提出智能变电站二次设备隐藏故障自动检测方法。首先,从智能变电站过程层网络获取SV报文数据,采用IEEE 1588精确时间协议实现多源采样数据的同步处理,获取二次设备的隐藏故障信号;然后,采用小波变换技术对所蕴含的故障信号展开分解处理,提取故障特征;最后,利用深度卷积神经网络构建二次设备隐藏故障自动化检测模型,通过对故障特征的深度挖掘,识别检测故障类型。结果表明,该方法的重叠误差不超过1%,错检率不超过2%,实现了对智能变电站二次设备隐藏故障的自动检测。 展开更多
关键词 变电站 二次设备 隐藏故障 检测精度 小波变换技术 深度卷积神经网络
在线阅读 下载PDF
Prediction of Hidden Blood Loss During Posterior Spinal Surgery 被引量:9
13
作者 白冰 田园 +3 位作者 张越伦 马满娇 虞雪融 黄宇光 《Chinese Medical Sciences Journal》 CAS CSCD 2019年第1期38-44,共7页
Objective Identification of the risk factors for extraordinary hidden blood loss(HBL) could clarify the underlying causes and provide more appropriate management. This study aims to identify the predictors of HBL in s... Objective Identification of the risk factors for extraordinary hidden blood loss(HBL) could clarify the underlying causes and provide more appropriate management. This study aims to identify the predictors of HBL in spinal surgery.Methods Medical records were retrospectively retrieved to collect the data of patients who undergoing posterior thoracic and lumbar fusion surgery or scoliosis surgery. Demographic information, perioperative visible blood loss volume, as well as laboratory results were recorded. The patients receiving fusion surgery or scoliosis surgery were further divided into the HBL positive subgroup and the HBL negative subgroup. Differences in the variables between the groups were then analyzed. Binary logistic regression analysis was performed to determine independent risk factors associated with HBL.Results For patients undergoing posterior spinal surgery, the independent risk factors associated with HBL were autologous transfusion(for fusion surgery P = 0.011, OR: 2.627, 95%CI: 1.574-2.782; for scoliosis surgery P < 0.001, OR: 2.268, 95%CI: 2.143-2.504) and allogeneic transfusion(for fusion surgery P < 0.001, OR: 6.487, 95%CI: 2.349-17.915; for scoliosis surgery P < 0.001, OR: 3.636, 95%CI: 2.389-5.231).Conclusion Intraoperative blood transfusion might be an early-warning indicator for perioperative HBL. 展开更多
关键词 SPINAL SURGERY hidden BLOOD LOSS TRANSFUSION PREDICTION
暂未订购
职普融通视域下国际综合高中的建设经验与中国镜鉴——基于社会学制度主义视角
14
作者 贾维强 《职教通讯》 2026年第1期96-103,共8页
综合高中作为全球教育改革的制度转向,旨在打破普通教育与职业教育的二元分流,构建更加灵活、多元的教育体系。基于社会学制度主义的分析框架,综合高中制度的运行并非路径整合,而是规制性、规范性与文化认知性三大制度要素交织下的复杂... 综合高中作为全球教育改革的制度转向,旨在打破普通教育与职业教育的二元分流,构建更加灵活、多元的教育体系。基于社会学制度主义的分析框架,综合高中制度的运行并非路径整合,而是规制性、规范性与文化认知性三大制度要素交织下的复杂实践。尽管综合高中在芬兰、德国和澳大利亚等国家的实施各异,但其面临的主要挑战具有共通性,包括政策与实践间的张力、学术课程与职业课程的结构性失衡、以及文化认知上的“隐性分轨”。在借鉴国际经验的基础上,需要从健全政策体系、凝聚社会共识、重塑文化认知等多个维度进行系统性优化,以完善我国本土教育生态的综合高中制度,为人才培养模式的多元化提供更加广阔的空间。 展开更多
关键词 综合高中 职普融通 社会学制度主义 隐性分轨
在线阅读 下载PDF
基于数据增强多模态大语言模型微调的高处吊篮隐患识别
15
作者 王明达 赵宝熙 +1 位作者 冷高强 韦永健 《安全与环境学报》 北大核心 2026年第2期651-657,共7页
针对建筑施工中高处吊篮隐患精准识别的需求,提出一种基于数据增强多模态大语言模型微调的高处吊篮隐患识别方法。采用DeepSeek数据增强技术生成多样化的问题,并结合人工标注构建高质量的场景对话数据集,形成增量数据集;基于增量数据集... 针对建筑施工中高处吊篮隐患精准识别的需求,提出一种基于数据增强多模态大语言模型微调的高处吊篮隐患识别方法。采用DeepSeek数据增强技术生成多样化的问题,并结合人工标注构建高质量的场景对话数据集,形成增量数据集;基于增量数据集,利用低秩适配技术对Qwen2.5-VL模型进行增量微调。结果表明:经增量微调的Qwen2.5-VL-DL模型B_(4)得分率为66.46%,R_(1)和R_(2)得分率分别为69.57%和68.81%,均优于主流多模态大语言模型,隐患识别能力得到有效提升。 展开更多
关键词 安全工程 建筑安全 多模态大语言模型 DeepSeek数据增强 隐患识别 监督微调
原文传递
基于离散小波变换的隐框玻璃幕墙结构胶损伤程度识别方法
16
作者 阎玉芹 杨帆 +3 位作者 付娜 张鑫 王祥诚 孙捷 《机电工程技术》 2026年第4期8-13,55,共7页
针对隐框玻璃幕墙结构胶损伤程度难以量化评估的问题,提出一种基于离散小波变换的损伤识别方法。利用橡胶锤激励玻璃面板,采用高灵敏度加速度传感器采集振动响应信号;选用db3小波基函数对信号进行6层分解,提取细节系数模极大值作为损伤... 针对隐框玻璃幕墙结构胶损伤程度难以量化评估的问题,提出一种基于离散小波变换的损伤识别方法。利用橡胶锤激励玻璃面板,采用高灵敏度加速度传感器采集振动响应信号;选用db3小波基函数对信号进行6层分解,提取细节系数模极大值作为损伤指标;设计包含单边损伤程度0~75%、多边同损伤程度不同位置共7种工况的600 mm×600 mm隐框玻璃幕墙试件实验,系统采集49个测点的数据。结果表明,d4层细节系数模极大值与损伤程度呈现强线性负相关(R^(2)=0.98),损伤程度每增加1级,模极大值下降11.3m/s^(2),严重损伤时d4值较无损状态降低75.1%;d2和d3层系数对损伤位置敏感,结合d4层模极大值下降幅度的空间差异,损伤位于测点对侧与邻近时降幅相差5.7 m/s^(2),可以此实现损伤位置的可靠定位。相较传统模态分析法,该方法无需建模,识别误差降低40%以上,为幕墙安全监测提供高精度、抗干扰的技术支撑。 展开更多
关键词 隐框玻璃幕墙 结构胶 离散小波变换 损伤识别 细节系数模极大值
在线阅读 下载PDF
从休息权到离线权:数字时代劳动者权益保障的范式革新
17
作者 邹开亮 李征 《宜宾学院学报》 2026年第1期62-69,共8页
在数字化时代,数字技术的发展和电子通信设备的普及打破了传统工作与非工作的时空边界,劳动者在非工作时间无法“离线”以屏蔽用人单位工作任务的“滋扰”,这损害了劳动者身心健康。离线权是数字化时代劳动者应当保有的一项新型独立权利... 在数字化时代,数字技术的发展和电子通信设备的普及打破了传统工作与非工作的时空边界,劳动者在非工作时间无法“离线”以屏蔽用人单位工作任务的“滋扰”,这损害了劳动者身心健康。离线权是数字化时代劳动者应当保有的一项新型独立权利,虽然具有保障劳动者休息权利的现实功能,但不宜将其纳入劳动者休息权范畴。在我国劳动立法完善进程中,应当在明确劳动者离线权的独立权利地位和适用主体范围的基础上,细化“线上加班”的认定与量化规则,同时强化保障劳动者离线权的执法监察,并通过加强宣传、政府引导等措施提高劳动者对于离线权的认识与维权意识,从多层面入手切实保障数字化时代劳动者的合法权益。 展开更多
关键词 数字化时代 离线权 休息权 隐性加班 劳动监察 新型独立权利
在线阅读 下载PDF
基于启发式查询词选择算法的Hidden Web获取研究 被引量:1
18
作者 姚全珠 杨增辉 +1 位作者 张楠 田元 《计算机工程与应用》 CSCD 北大核心 2007年第34期174-176,203,共4页
Hidden Web因为其隐蔽性而难以直接抓取,因此成为信息检索研究的一个新领域。提出了一种获取Hidden Web信息的方法,讨论了实现的关键技术。通过设计提出的启发式查询词选择算法,提高了抓取的效率。实验证明了该模型和算法的有效性。
关键词 信息检索 hidden WEB 爬虫 启发式算法
在线阅读 下载PDF
Ontology mapping based on hidden Markov model 被引量:2
19
作者 尹康银 宋自林 徐平 《Journal of Southeast University(English Edition)》 EI CAS 2007年第3期389-393,共5页
The existing ontology mapping methods mainly consider the structure of the ontology and the mapping precision is lower to some extent. According to statistical theory, a method which is based on the hidden Markov mode... The existing ontology mapping methods mainly consider the structure of the ontology and the mapping precision is lower to some extent. According to statistical theory, a method which is based on the hidden Markov model is presented to establish ontology mapping. This method considers concepts as models, and attributes, relations, hierarchies, siblings and rules of the concepts as the states of the HMM, respectively. The models corresponding to the concepts are built by virtue of learning many training instances. On the basis of the best state sequence that is decided by the Viterbi algorithm and corresponding to the instance, mapping between the concepts can be established by maximum likelihood estimation. Experimental results show that this method can improve the precision of heterogeneous ontology mapping effectively. 展开更多
关键词 ontology heterogeneity ontology mapping hidden Markov model semantic web
在线阅读 下载PDF
基于标记树对象抽取技术的Hidden Web获取研究 被引量:9
20
作者 宋晖 张岭 +1 位作者 叶允明 马范援 《计算机工程与应用》 CSCD 北大核心 2002年第23期9-12,24,共5页
目前标准的搜索引擎能够检索的仅仅是WorldWideWeb提供的小部分称为可索引的Web信息。大量的HiddenWeb信息(估计容量是可索引Web的500倍)对这些搜索引擎是不可见的。这些信息隐藏在Web页面的搜索表单后面,保存在大型的动态数据库中。该... 目前标准的搜索引擎能够检索的仅仅是WorldWideWeb提供的小部分称为可索引的Web信息。大量的HiddenWeb信息(估计容量是可索引Web的500倍)对这些搜索引擎是不可见的。这些信息隐藏在Web页面的搜索表单后面,保存在大型的动态数据库中。该文提出了一套检索HiddenWeb信息的方法,给出了系统的框架结构,并详细讨论了实现的关键技术。系统采用新的基于标记树的对象抽取(Tag-Tree-basedObjectExtraction)方法自动地从Web页面中抽取HiddenWeb信息,然后在此基础上给出了结构化的HiddenWeb信息查询算法。文章最后对实验结果进行了讨论。 展开更多
关键词 标记树 对象抽取 hiddenWeb 互联网 搜索引擎 信息检索 结构化查询 数据库
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部