期刊文献+
共找到12,281篇文章
< 1 2 250 >
每页显示 20 50 100
Research and Application of In-seam Seismic Survey Technology for Disaster-causing Potential Geology Anomalous Body in Coal Seam 被引量:6
1
作者 TENG Jiwen LI Songying +10 位作者 JIA Mingkui LIAN Jie LIU Honglei LIU Guodong WANG Wei Volker SCHAPE FENG Lei YAO Xiaoshuai WANG Kang YAN Yafen ZHANG Wanpeng 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2020年第1期10-26,共17页
In order to effectively detect potential geology anomalous bodies in coal bearing formation,such as coal seam thickness variation,small faults,goafs and collapse columns,and provide scientific guidance for safe and ef... In order to effectively detect potential geology anomalous bodies in coal bearing formation,such as coal seam thickness variation,small faults,goafs and collapse columns,and provide scientific guidance for safe and efficient mining,the SUMMIT-II EX explosion-proof seismic slot wave instrument,produced by German DMT Company,was used to detect the underground channel wave with the help of transmission method,reflection method and transflective method.Region area detection experiment in mining face had been carried out thanks to the advantage of channel wave,such as its great dispersion,abundant geology information,strong anti-interference ability and long-distance detecting.The experimental results showed that:(1)Coal seam thickness variation in extremely unstable coal seam has been quantitatively interpreted with an accuracy of more than 80%generally;(2)The faults,goafs and collapse columns could be detected and predicted accurately;(3)Experimental detection of gas enrichment areas,stress concentration regions and water inrush risk zone has been collated;(4)A research system of disaster-causing geology anomalous body detection by in-seam seismic survey has been built,valuable and innovative achievements have been got.Series of innovation obtained for the first time in this study indicated that it was more effective to detect disaster-causing potential geology anomalies by in-seam seismic survey than by ground seismic survey.It had significant scientific value and application prospect under complex coal seam conditions. 展开更多
关键词 in-seam seismic SURVEY technology(ISS) disaster-causing potential GEOLOGY ANOMALOUS BODY dispersion feature mine geophysical prospecting quantitative interpretation
在线阅读 下载PDF
Hydrothermal Control by Deep Hidden Faults on Geothermal Systems in Sedimentary Basins:A Case Study of the Cangdong Fault in the North China Basin
2
作者 YIN Xiaoxiao LIN Jianwang +5 位作者 LI Hu LI Huanqing DONG Lufei YAN Jiaxian ZHANG Sen LI Zheng 《Acta Geologica Sinica(English Edition)》 2025年第1期243-257,共15页
Large basins are currently the global focus for geothermal development,with their hydrothermal system being controlled by a variety of factors,such as basement relief and fracture development.Donglihu is located at th... Large basins are currently the global focus for geothermal development,with their hydrothermal system being controlled by a variety of factors,such as basement relief and fracture development.Donglihu is located at the north of the Cangxian uplift in the North China Basin,the concentrated geothermal resource development zone in North China.This study systematically collects temperature logging data and long-term dynamic monitoring of water level and water quality as well as group well tracer test data carried out in this area in recent years,on the basis of which the hydrothermal controlling role of the deep hidden faults is systematically analyzed.The results show that the Cangdong fault communicates with different geothermal reservoirs in the shallow part and plays a specific role in the water-heat channel of the local area.As a result,the high-value area of the geothermal temperature gradient in the sedimentary layer of the Donglihu area is distributed around the Cangdong fault.The geothermal reservoir temperature of the Minghuazhen Formation within the influence of the fault is also significantly higher than the regional average,the hydraulic head of different geothermal reservoirs showing a consistent and synergistic trend.However,the water quality has been stable for many years without any apparent changes.This understanding has a particular significance for further deepening understanding of the geothermal genesis mechanism in sedimentary basins and guiding future geothermal exploration and development in the Donglihu area. 展开更多
关键词 sedimentary basin geothermal system hidden fault hydrothermal channel Cangdong fault
在线阅读 下载PDF
Rise of China’s Manufacturing Hidden Champions:A Resource Allocation Perspective--An Explorative Case Study of Hailiya Group
3
作者 Shan Yu Chen Jinlong 《中国经济学人(中英文)》 2025年第1期78-100,共23页
Hidden champions play a critical role in China’s efforts to overcome technological and industrial“chokepoints”.These enterprises are pivotal for breaking free from Western technological embargoes,avoiding entrapmen... Hidden champions play a critical role in China’s efforts to overcome technological and industrial“chokepoints”.These enterprises are pivotal for breaking free from Western technological embargoes,avoiding entrapment in low-value-added production,and driving industrial upgrading.Given the distinct market environment in which China’s hidden champions have emerged,it is both timely and practically significant to examine their growth trajectories and underlying mechanisms.This study adopts a resource allocation perspective to investigate the development path of Chinese manufacturing enterprises into hidden champions,using a vertical case study of Hailiya Group.The findings reveal that such enterprises achieve hidden champion status by vertically concentrating on niche markets while harnessing technological potential and horizontally diversifying their technology application scenarios.Their growth follows a“T-shaped”strategy,combining vertical specialization in a focused market with horizontal expansion into new applications.Four critical mechanisms underpin the rise of manufacturing hidden champions:market niche positioning,innovation-driven focus,application scenario expansion,and ecosystem development.Specifically,these enterprises strategically target niche markets,establish a technology-oriented competitive edge,broaden technology applications to unlock new profit opportunities,and develop collaborative ecosystems to share resources and drive industrial advancement.This paper not only extends the interpretive boundaries of resource allocation theory but also offers fresh insights into the emergence of Chinese manufacturing enterprises as hidden champions,enriching our understanding of their unique growth dynamics. 展开更多
关键词 hidden champions resource allocation innovation assets customer assets growth mechanism
在线阅读 下载PDF
DH-LDA:A Deeply Hidden Load Data Attack on Electricity Market of Smart Grid
4
作者 Yunhao Yu Meiling Dizha +6 位作者 Boda Zhang Ruibin Wen FuhuaLuo Xiang Guo Junjie Song Bingdong Wang Zhenyong Zhang 《Computers, Materials & Continua》 2025年第11期3861-3877,共17页
The load profile is a key characteristic of the power grid and lies at the basis for the power flow control and generation scheduling.However,due to the wide adoption of internet-of-things(IoT)-based metering infrastr... The load profile is a key characteristic of the power grid and lies at the basis for the power flow control and generation scheduling.However,due to the wide adoption of internet-of-things(IoT)-based metering infrastructure,the cyber vulnerability of load meters has attracted the adversary’s great attention.In this paper,we investigate the vulnerability of manipulating the nodal prices by injecting false load data into the meter measurements.By taking advantage of the changing properties of real-world load profile,we propose a deeply hidden load data attack(i.e.,DH-LDA)that can evade bad data detection,clustering-based detection,and price anomaly detection.The main contributions of this work are as follows:(i)We design a stealthy attack framework that exploits historical load patterns to generate load data with minimal statistical deviation from normalmeasurements,thereby maximizing concealment;(ii)We identify the optimal time window for data injection to ensure that the altered nodal prices follow natural fluctuations,enhancing the undetectability of the attack in real-time market operations;(iii)We develop a resilience evaluation metric and formulate an optimization-based approach to quantify the electricity market’s robustness against DH-LDAs.Our experiments show that the adversary can gain profits from the electricity market while remaining undetected. 展开更多
关键词 Smart grid security load redistribution data electricity market deeply hidden attack
在线阅读 下载PDF
TRE-DSP:A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
5
作者 Yousheng Zhou Rundong Peng +2 位作者 Yuanni Liu Pandi Vijayakumar Brij Gupta 《Digital Communications and Networks》 2025年第2期455-464,共10页
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every day.How to securely share data between the IoV operator and various value-added service providers becomes one of the... With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every day.How to securely share data between the IoV operator and various value-added service providers becomes one of the critical issues.Due to its flexible and efficient fine-grained access control feature,Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is suitable for data sharing in IoV.However,there are many flaws in most existing CP-ABE schemes,such as attribute privacy leakage and key misuse.This paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP).A partially hidden access structure is adopted to hide sensitive user attribute values,and attribute categories are sent along with the ciphertext to effectively avoid privacy exposure.In addition,key tracking and malicious user revocation are introduced with broadcast encryption to prevent key misuse.Since the main computation task is outsourced to the cloud,the burden of the user side is relatively low.Analysis of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV. 展开更多
关键词 PRIVACY-PRESERVING Attribute-based encryption Partially hidden policy Traceability User revocation Internet of vehicles
在线阅读 下载PDF
“Becoming a family”—the effects of the hidden curriculum in transferring institutional mission:An experience from a century-old nursing school
6
作者 Aimei Mao Hon-Lon Tam +1 位作者 Pak-Leng Cheong Iat-Kio Van 《International Journal of Nursing Sciences》 2025年第3期293-300,I0006,I0007,共10页
Objectives This study aimed to examine the role of the hidden curriculum in transmitting the educational mission and its impacts on nursing students’professional socialization.Methods This constructivist grounded the... Objectives This study aimed to examine the role of the hidden curriculum in transmitting the educational mission and its impacts on nursing students’professional socialization.Methods This constructivist grounded theory study involved twenty-six students and five faculty members from a century-old nursing school in Macao.Semi-structured interviews examined the factors influencing nursing students’choice of a specific nursing school and their general learning experiences in nursing studies.Open and focused coding was employed to develop categories and concepts that capture the nuances of how the hidden curriculum influences students’personal experiences,perceptions,and values related to developing their professional identities.The data analysis was guided by the“Community of Practice”model.Results The educational mission fostered a hidden curriculum that emphasized nurturing qualities and social responsibilities,creating a family-like learning environment that positively influenced the professional socialization of nursing students.Under the core theme of“becoming a family,”two sub-themes emerged:“student-peer interactions-fostering sisterly/brotherly learning partnerships”and“student-faculty interactions–faculty’s acting as parenting instructors.”While the hidden curriculum promoted a democratic and egalitarian learning atmosphere among student-peers,it simultaneously reinforced hierarchical power dynamics among senior-junior students and student-faculty relationships,mirroring the power-based interpersonal dynamics often found in traditional Chinese families.Conclusions Explicating the educational mission can help shape a hidden curriculum that benefits nursing students’professional socialization.Faculty members should reflect on the power inequalities reproduced by the hidden curriculum and establish appropriate boundaries in student-faculty relationships. 展开更多
关键词 Community of practice Educational mission hidden curriculum Nurse students Professional socialization Qualitative study
在线阅读 下载PDF
Uncovering Hidden Spin of Scalar Fields with Higher-Order Derivative Lagrangian:On the Wave Spin in Drifted and Dissipative Fields
7
作者 Shuo Xin Mengxiang Xie Jie Ren 《Chinese Physics Letters》 2025年第6期70-77,共8页
Scalar fields should have no spin angular momentum according to conventional textbook understandings inclassical field theory.Yet,recent studies demonstrate the undoubted existence of wave spin endowed by acousticand ... Scalar fields should have no spin angular momentum according to conventional textbook understandings inclassical field theory.Yet,recent studies demonstrate the undoubted existence of wave spin endowed by acousticand elastic longitudinal waves,which are of irrotational curl-free nature without vorticity and can be describedby scalar fields.Moreover,the conventional theory cannot even answer the question of whether wave spin existsin dissipative fields,given the ubiquitous dissipation in reality.Here,to resolve the seeming paradox and answerthe challenging question,we uncover the origin of wave spin in scalar fields beyond traditional formalism byclarifying that the presence of higher-order derivatives in scalar field Lagrangians can give rise to non-vanishingwave spin.For“spinless”scalar fields of only first-order derivatives,we can make the hidden wave spin emergeby revealing a latent field that leads to the original field through a time derivative,thus giving higher-order termsin Lagrangian.Based on the standard Noether theorem approach,we exemplify the wave spin for unconventionaldrifted acoustic fields,and even for dissipative media,in scalar fields with higher-order derivative Lagrangian.The results would prompt people to build more comprehensive and fundamental understandings of structuralwave spin in classical fields. 展开更多
关键词 higher order derivative Lagrangian hidden spin acousticand elastic longitudinal waveswhich acoustic waves wave spin spin angular momentum scalar fields
原文传递
The rediscovery of Mozart's hidden gem
8
作者 孙启禄 《疯狂英语(新悦读)》 2025年第4期25-28,76,共5页
1 In 2024,audiences were treated to something very special:new music by Wolfgang Amadeus Mozart.That's right-new Mozart music!2 Leipzig Municipal Libraries announced their exciting find.Researchers came across thi... 1 In 2024,audiences were treated to something very special:new music by Wolfgang Amadeus Mozart.That's right-new Mozart music!2 Leipzig Municipal Libraries announced their exciting find.Researchers came across this lost work while updating the Köchel catalogue,a list of Mozart's compositions.The piece is a seven⁃movement string trio,written in the mid to late 1760s,when Mozart was very young.The handwritten manuscript,titled Serenate ex C,uses dark brown ink on off⁃white paper.Now,it's been renamed Ganz kleine Nachtmusik and lasts about 12 minutes. 展开更多
关键词 new music dark brown ink string trio ganz kleine n REDISCOVERY hidden gem k chel cataloguea K chel catalogue
在线阅读 下载PDF
Hidden Concerns and Countermeasures for China’s Green Energy Mineral Resource Supply Security
9
作者 Fang Ruirui Liu Guizhou +3 位作者 Dou Lirong Hu Ning Xia Xiaodi Feng Lianyong 《China Oil & Gas》 2025年第5期47-52,共6页
Achieving the dual carbon goal through energy transition has become a global consensus.The increasingly recognized of mineral resources is increasingly recognized due to their role in determining the pace of energy tr... Achieving the dual carbon goal through energy transition has become a global consensus.The increasingly recognized of mineral resources is increasingly recognized due to their role in determining the pace of energy transition.China has a leading capacity in the production and processing of certain minerals.However,because the major sources are abroad,China still faces certain disadvantages in acquiring upstream resources.In response to the complex international situation and high consumption demand。 展开更多
关键词 mineral resources dual carbon goal COUNTERMEASURES Chinas green energy mineral resource supply security achieving dual carbon goal energy transition hidden concerns
在线阅读 下载PDF
基于改进Faster R-CNN的输变电工程塔基隐性病害GPR图像识别研究
10
作者 程江洲 杨静怡 +1 位作者 鲍刚 罗应权 《地球物理学进展》 北大核心 2026年第1期442-452,共11页
针对输变电工程塔基因施工过程中操作不当及相关环境因素导致的混凝土隐性病害识别难题,本文提出了一种基于改进的Faster R-CNN网络GPR图像识别方法.首先,以ResNet-50为主干网络融合通道注意力机制,并通过层间位置对比实验优化了SE模块... 针对输变电工程塔基因施工过程中操作不当及相关环境因素导致的混凝土隐性病害识别难题,本文提出了一种基于改进的Faster R-CNN网络GPR图像识别方法.首先,以ResNet-50为主干网络融合通道注意力机制,并通过层间位置对比实验优化了SE模块的嵌入层级与位置,在强化关键特征提取的同时有效降低了计算冗余.其次,引入soft-NMS算法优化紧密相邻目标的边框预测精度,提高紧密相连目标的检测能力.最后,采用生成对抗网络扩增gprMax仿真生成的刚性直柱式基础GPR图像数据集,并对样本进行识别标注.实验结果表明,优化模型平均精度均值达到84.49%,F-Score为77.58%.相较于传统的FasterRCNN目标检测模型,改进模型识别精度提高了6.37%. 展开更多
关键词 探地雷达 隐性病害检测 Faster R-CNN 生成对抗网络
原文传递
高原型藏羊羔羊多疫苗联合免疫试验研究
11
作者 才仁卓玛 铁富萍 +2 位作者 才仁 扎西卓玛 刘伟红 《青海畜牧兽医杂志》 2026年第1期18-23,共6页
本研究对高原型藏羊羔羊进行了口蹄疫、小反刍兽疫、羊痘、包虫病和布病5种疫苗不同组合注射免疫试验,结果表明,与单苗免疫比较,不同疫苗产生抗体的干扰和拮抗作用不明显,抗体阳性率在70%以上,产生的抗体效价相对较高且稳定,达到了国家... 本研究对高原型藏羊羔羊进行了口蹄疫、小反刍兽疫、羊痘、包虫病和布病5种疫苗不同组合注射免疫试验,结果表明,与单苗免疫比较,不同疫苗产生抗体的干扰和拮抗作用不明显,抗体阳性率在70%以上,产生的抗体效价相对较高且稳定,达到了国家规定的免疫要求,联合免疫后羔羊不良反应不明显,可以在实际工作中推广应用。 展开更多
关键词 藏羔羊 多疫苗 联合 免疫
在线阅读 下载PDF
基于多模态特征的暗链标题检测方法
12
作者 印杰 刘家银 +2 位作者 黄肖宇 兰浩良 谢文伟 《信息网络安全》 北大核心 2026年第3期462-470,共9页
随着网页篡改植入暗链现象的愈演愈烈以及自动化检出方法的普及,暗链标题植入已成为危害网络安全的重要因素之一。当前,攻击者常采用形近字、干扰符号、表情文字等手段进行伪装,这对基于单模态自然语言处理的检测技术构成了挑战。针对... 随着网页篡改植入暗链现象的愈演愈烈以及自动化检出方法的普及,暗链标题植入已成为危害网络安全的重要因素之一。当前,攻击者常采用形近字、干扰符号、表情文字等手段进行伪装,这对基于单模态自然语言处理的检测技术构成了挑战。针对这一问题,文章提出基于混合特征的多模态检测方法。该方法首先利用BERT与ResNet分别提取标题文本的语义特征与图像特征,随后通过门函数和多头注意力方法对特征进行深度融合,进而实现对暗链标题的分类。实验结果表明,在评测数据集上,所提方法的识别准确率达到0.966,较基准方法提升了约1个百分点,这表明图像特征可以有效弥补文本特征在应对标题伪装时的不足。 展开更多
关键词 暗链标题检测 BERT ResNet 多模态特征融合
在线阅读 下载PDF
基于轨迹微分段模型的快速地图匹配方法
13
作者 康军 高晟恺 来嘉宝 《计算机科学》 北大核心 2026年第4期252-259,共8页
地图匹配是智能交通系统中的核心技术之一,旨在将GPS轨迹数据映射至城市路网上,消除定位误差并还原实际行驶路径。随着GPS轨迹数据量的爆炸性增长,传统的基于隐马尔可夫模型(HMM)的地图匹配方法因高计算成本和时序依赖性问题,难以满足... 地图匹配是智能交通系统中的核心技术之一,旨在将GPS轨迹数据映射至城市路网上,消除定位误差并还原实际行驶路径。随着GPS轨迹数据量的爆炸性增长,传统的基于隐马尔可夫模型(HMM)的地图匹配方法因高计算成本和时序依赖性问题,难以满足实时处理要求。为此,提出了一种基于轨迹微分段模型的快速地图匹配方法(Micro-Segment Fast Matching,MSFM)。该方法基于滑动窗口机制,将轨迹分解为固定长度的微轨迹段,在分布式计算环境中利用向量化计算方法,在兼顾地图匹配准确性的条件下大幅度提升了计算效率。实验结果表明,在给定的分布式集群环境下,MSFM实现了约110000点/秒的地图匹配速度,比基准算法快约7倍,同时保持了95.86%的匹配准确率。MSFM方法通过改进轨迹数据的存储结构,在高效实时处理大规模轨迹数据方面具有显著的性能优势。 展开更多
关键词 地图匹配 轨迹微分段 隐马尔可夫模型 分布式计算 向量化计算
在线阅读 下载PDF
人工智能的治理角色:基于股价崩盘风险“坏消息”机制的实证研究
14
作者 朱莉 杜晓倩 《金融发展研究》 北大核心 2026年第2期14-26,共13页
在数字经济时代,人工智能能否在企业微观层面发挥治理效能、重塑资本市场风险治理模式是亟待检验的重要议题。本文以2010—2024年中国A股上市公司为样本,实证检验人工智能对股价崩盘风险的影响及内在机理。研究发现,人工智能技术应用能... 在数字经济时代,人工智能能否在企业微观层面发挥治理效能、重塑资本市场风险治理模式是亟待检验的重要议题。本文以2010—2024年中国A股上市公司为样本,实证检验人工智能对股价崩盘风险的影响及内在机理。研究发现,人工智能技术应用能显著抑制股价崩盘风险,这一结论在经过工具变量法、倾向得分匹配(PSM)等一系列内生性与稳健性检验后依然成立,且该效应在市场化程度高、两权分离度高、市场竞争程度较低及处于成长期的企业中更为凸显。机制分析表明,人工智能主要通过两条路径发挥“坏消息”治理功能:一是压缩“坏消息”隐藏空间;二是减少“坏消息”产生源头。进一步分析揭示,高管团队的数字领导力是强化人工智能治理效应的关键催化剂,为技术价值转化提供了组织保障。本研究将人工智能的经济后果研究拓展至技术治理领域,为监管部门引导人工智能赋能资本市场风险防控、企业推进“技术+管理”协同治理提供了实证参考。 展开更多
关键词 人工智能 股价崩盘风险 “坏消息”隐藏 技术治理 数字领导力
在线阅读 下载PDF
智能变电站二次设备隐藏故障自动检测方法
15
作者 代小翔 胡绍谦 张亮 《自动化应用》 2026年第2期176-178,共3页
针对智能变电站二次设备隐藏故障自动检测存在的检测精度较低的问题,提出智能变电站二次设备隐藏故障自动检测方法。首先,从智能变电站过程层网络获取SV报文数据,采用IEEE 1588精确时间协议实现多源采样数据的同步处理,获取二次设备的... 针对智能变电站二次设备隐藏故障自动检测存在的检测精度较低的问题,提出智能变电站二次设备隐藏故障自动检测方法。首先,从智能变电站过程层网络获取SV报文数据,采用IEEE 1588精确时间协议实现多源采样数据的同步处理,获取二次设备的隐藏故障信号;然后,采用小波变换技术对所蕴含的故障信号展开分解处理,提取故障特征;最后,利用深度卷积神经网络构建二次设备隐藏故障自动化检测模型,通过对故障特征的深度挖掘,识别检测故障类型。结果表明,该方法的重叠误差不超过1%,错检率不超过2%,实现了对智能变电站二次设备隐藏故障的自动检测。 展开更多
关键词 变电站 二次设备 隐藏故障 检测精度 小波变换技术 深度卷积神经网络
在线阅读 下载PDF
Prediction of Hidden Blood Loss During Posterior Spinal Surgery 被引量:9
16
作者 白冰 田园 +3 位作者 张越伦 马满娇 虞雪融 黄宇光 《Chinese Medical Sciences Journal》 CAS CSCD 2019年第1期38-44,共7页
Objective Identification of the risk factors for extraordinary hidden blood loss(HBL) could clarify the underlying causes and provide more appropriate management. This study aims to identify the predictors of HBL in s... Objective Identification of the risk factors for extraordinary hidden blood loss(HBL) could clarify the underlying causes and provide more appropriate management. This study aims to identify the predictors of HBL in spinal surgery.Methods Medical records were retrospectively retrieved to collect the data of patients who undergoing posterior thoracic and lumbar fusion surgery or scoliosis surgery. Demographic information, perioperative visible blood loss volume, as well as laboratory results were recorded. The patients receiving fusion surgery or scoliosis surgery were further divided into the HBL positive subgroup and the HBL negative subgroup. Differences in the variables between the groups were then analyzed. Binary logistic regression analysis was performed to determine independent risk factors associated with HBL.Results For patients undergoing posterior spinal surgery, the independent risk factors associated with HBL were autologous transfusion(for fusion surgery P = 0.011, OR: 2.627, 95%CI: 1.574-2.782; for scoliosis surgery P < 0.001, OR: 2.268, 95%CI: 2.143-2.504) and allogeneic transfusion(for fusion surgery P < 0.001, OR: 6.487, 95%CI: 2.349-17.915; for scoliosis surgery P < 0.001, OR: 3.636, 95%CI: 2.389-5.231).Conclusion Intraoperative blood transfusion might be an early-warning indicator for perioperative HBL. 展开更多
关键词 SPINAL SURGERY hidden BLOOD LOSS TRANSFUSION PREDICTION
暂未订购
打开“黑箱”:隐性壁垒对民营企业高质量发展的制约机制与破障路径探析
17
作者 汤蕴懿 杨欣晨 《上海市社会主义学院学报》 2026年第2期61-81,共21页
民营企业是推进中国式现代化与高质量发展的重要微观基础,破除其面临的隐性壁垒是激发市场活力、构建全国统一大市场的关键举措,然而由于其具有“隐蔽性”与“模糊性”特征,形成了学界与政策制定者难以穿透的“黑箱”。本研究聚焦民营... 民营企业是推进中国式现代化与高质量发展的重要微观基础,破除其面临的隐性壁垒是激发市场活力、构建全国统一大市场的关键举措,然而由于其具有“隐蔽性”与“模糊性”特征,形成了学界与政策制定者难以穿透的“黑箱”。本研究聚焦民营企业在市场准入、要素获取等领域面临的多维隐性障碍,基于2015—2024年沪深A股上市民营企业数据,界定隐性壁垒“玻璃门”“旋转门”“弹簧门”“隔离门”四维内涵,构建多维度隐性壁垒量化体系,揭示其对民营企业高质量发展“质”和“量”双维度的影响机制,为精准破除隐性壁垒、优化民营企业发展制度环境、推动民营经济高质量发展提供重要的理论支撑与实践路径。 展开更多
关键词 隐性壁垒 民营企业 高质量发展
在线阅读 下载PDF
大学生隐匿性心理危机的识别与家校医社全程干预模式构建
18
作者 冯桂梅 金连海 《吉林医药学院学报》 2026年第2期124-128,共5页
隐匿性心理危机因隐蔽性强、识别难度大,已成为高校心理健康教育工作的重点与难点。本文从心理危机概念界定出发,明确大学生隐匿性心理危机的核心特征,建立分类型观测指标体系,探索多维度识别方法,并构建积极心理学理念下“家校医社”... 隐匿性心理危机因隐蔽性强、识别难度大,已成为高校心理健康教育工作的重点与难点。本文从心理危机概念界定出发,明确大学生隐匿性心理危机的核心特征,建立分类型观测指标体系,探索多维度识别方法,并构建积极心理学理念下“家校医社”全程干预模式,旨在为高校提前识别、预防和干预隐匿性心理危机提供实践路径,完善大学生心理健康教育工作体系。 展开更多
关键词 大学生 隐匿性心理危机 识别方法 家校医社 干预模式
在线阅读 下载PDF
新疆山洪灾害风险隐患调查分析初探
19
作者 张娜 陈超 郭彪彪 《中国防汛抗旱》 2026年第4期54-60,共7页
新疆山洪灾害呈现点多面广分散、季节性明显、突发性强、破坏性大、成因多元复合等特点。针对新疆山洪风险隐患调查分析现状和具体工作开展情况,总结提出“空天地”多尺度排查调查和多场景多工况分析框架、小流域风险隐患调查分析体系... 新疆山洪灾害呈现点多面广分散、季节性明显、突发性强、破坏性大、成因多元复合等特点。针对新疆山洪风险隐患调查分析现状和具体工作开展情况,总结提出“空天地”多尺度排查调查和多场景多工况分析框架、小流域风险隐患调查分析体系构建方法和步骤,并通过典型流域实例分析,实践小流域山洪“隐患识别—风险模拟—影响评估—防控防治”全过程管理,以期为今后新疆开展同类工作提供参考。 展开更多
关键词 山洪灾害 小流域 风险隐患 新疆
在线阅读 下载PDF
职普融通视域下国际综合高中的建设经验与中国镜鉴——基于社会学制度主义视角
20
作者 贾维强 《职教通讯》 2026年第1期96-103,共8页
综合高中作为全球教育改革的制度转向,旨在打破普通教育与职业教育的二元分流,构建更加灵活、多元的教育体系。基于社会学制度主义的分析框架,综合高中制度的运行并非路径整合,而是规制性、规范性与文化认知性三大制度要素交织下的复杂... 综合高中作为全球教育改革的制度转向,旨在打破普通教育与职业教育的二元分流,构建更加灵活、多元的教育体系。基于社会学制度主义的分析框架,综合高中制度的运行并非路径整合,而是规制性、规范性与文化认知性三大制度要素交织下的复杂实践。尽管综合高中在芬兰、德国和澳大利亚等国家的实施各异,但其面临的主要挑战具有共通性,包括政策与实践间的张力、学术课程与职业课程的结构性失衡、以及文化认知上的“隐性分轨”。在借鉴国际经验的基础上,需要从健全政策体系、凝聚社会共识、重塑文化认知等多个维度进行系统性优化,以完善我国本土教育生态的综合高中制度,为人才培养模式的多元化提供更加广阔的空间。 展开更多
关键词 综合高中 职普融通 社会学制度主义 隐性分轨
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部