期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
互联网平台案例教学方法在放射诊断学教学中的应用
1
作者 赵海男 张秉哲 杨继金 《中国科技经济新闻数据库 教育》 2024年第3期0148-0150,共3页
探析互联网平台案例教学方法在放射诊断学教学中的应用价值。方法 此次择取院内放射诊断学实习医学生50例作为研究对象,2023年1月-2023年12月,随机数字表法下分组,对照组25例采取常规教学法,研究组25例则采取互联网平台案例教学案,并综... 探析互联网平台案例教学方法在放射诊断学教学中的应用价值。方法 此次择取院内放射诊断学实习医学生50例作为研究对象,2023年1月-2023年12月,随机数字表法下分组,对照组25例采取常规教学法,研究组25例则采取互联网平台案例教学案,并综合对比两组教学效果指标数据。结果 研究组专业考核成绩,高于对照组(P<0.05);研究组实习医学生学习效果评分,高于对照组(P<0.05)。结论 临床放射诊断学教学之中,采取互联网平台案例教学方法,可有效提高实习医学生专业成绩,加强学习效果,所具教学价值较高。 展开更多
关键词 放射诊断学 互联网平台案例教学方法 专业考核成绩 学习效果评分
下载PDF
互联网背景下原创设计版权保护方法应用研究 被引量:1
2
作者 许东林 张子帆 《新闻传播》 2021年第12期22-23,共2页
人类命运共同体的时代背景下,全民参与创造,保护知识产权就是保护科学技术和创新。通过查阅版权相关资料和网络原创设计版权侵权事件综合分析,文章通过阐述版权基本含有和保护的重要意义,认识互联网背景下原创设计版权保护的核心内容和... 人类命运共同体的时代背景下,全民参与创造,保护知识产权就是保护科学技术和创新。通过查阅版权相关资料和网络原创设计版权侵权事件综合分析,文章通过阐述版权基本含有和保护的重要意义,认识互联网背景下原创设计版权保护的核心内容和最终目的;以互联网为背景,分析版权保护的四大基本方法:著作权法、专利和商标法、第三方网络内容平台和互联网技术(以区块链技术为例)的保护方法;为普通创作者和优秀原创设计作品的创造与传播提供一个有益参考。 展开更多
关键词 原创设计版权 互联网方法 知识产权 区块链技术
下载PDF
应用互联网络子结构方法分析LPDA特性
3
作者 杜晓燕 张峰 +1 位作者 张秀钢 牛忠霞 《现代雷达》 CSCD 北大核心 2007年第9期77-80,共4页
文中介绍了互联网络子结构分析方法,并应用该方法对对数周期偶极天线进行特性分析。所得结论不仅丰富了对数周期天线的分析思路和方法,而且进一步有力验证了互联网络子结构思想的正确性和有效性。
关键词 互联网络子结构分析方法 对数周期偶极天线 分析方法
下载PDF
“互联网+”数字化教学方法在口腔黏膜病教学中的应用 被引量:10
4
作者 康媛媛 张英 孙妍 《中国高等医学教育》 2019年第8期99-100,共2页
目的:探讨"互联网+"数字化教学方法在口腔黏膜病教学中的效果。方法:选取中国医科大学口腔医学专业70名学生作为研究对象,随机分成两组,对照组采用传统LBL教学;实验组应用"互联网+"数字化教学方法教学。课程结束后... 目的:探讨"互联网+"数字化教学方法在口腔黏膜病教学中的效果。方法:选取中国医科大学口腔医学专业70名学生作为研究对象,随机分成两组,对照组采用传统LBL教学;实验组应用"互联网+"数字化教学方法教学。课程结束后比较两组学生的考核成绩,并调查学生对"互联网+"数字化教学方法的认可程度。结果:实验组的考试成绩优于对照组,且得到了学生的认可。结论:"互联网+"数字化教学方法可明显提高口腔黏膜病学的教学效果。 展开更多
关键词 "互联网+"数字化教学方法 口腔黏膜疾病 复发性阿弗他溃疡
下载PDF
互联网企业的价值评估 被引量:9
5
作者 张智芳 《经济研究导刊》 2009年第21期14-15,共2页
在分析互联网企业价值时,一个重要的问题便是:互联网的价值从何而来?或更准确地,从宏观上讲,作为信息社会的主流经济形态,互联网经济如何通过新创和转移的方式获得巨大的价值来源呢?在了解了来源后,又该如何更好地对互联网企业的价值进... 在分析互联网企业价值时,一个重要的问题便是:互联网的价值从何而来?或更准确地,从宏观上讲,作为信息社会的主流经济形态,互联网经济如何通过新创和转移的方式获得巨大的价值来源呢?在了解了来源后,又该如何更好地对互联网企业的价值进行评估呢?从构成角度考虑网络价值源泉及其价值评估的难点,并按不同方法解析价值评估相关指标。 展开更多
关键词 价值源泉 价值评估 评估方法:互联网企业
下载PDF
双创课程思政案例个性化推荐方法设计
6
作者 曹栩宁 钟元生 《中国教育技术装备》 2022年第18期53-56,共4页
不同学习者的兴趣和基础差异较大,“双创”课程案例较多,思政案例个性化推荐有利于增强学习者的学习效果。针对教学目标,确立思政元素,收集思政案例,审核评估案例,提取学习者特征数据与案例特征进行标签化,构建“双创”教育课程思政案... 不同学习者的兴趣和基础差异较大,“双创”课程案例较多,思政案例个性化推荐有利于增强学习者的学习效果。针对教学目标,确立思政元素,收集思政案例,审核评估案例,提取学习者特征数据与案例特征进行标签化,构建“双创”教育课程思政案例库。提出使用基于内容的个性化推荐过程,将案例推荐给学习者,将思政元素融入教学过程,帮助学习者进行个性化学习。 展开更多
关键词 “双创”教育 课程思政 思政案例库 个性化推荐 互联网+创新创业方法 思政元素
下载PDF
TELEMEDICINE FOR AMBLYOPIA TREATMENT BASED ON INTERNET
7
作者 项阳 顾其威 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2003年第1期103-107,共5页
Amblyopia is a common eye d isease caught by many children. For some reason, the traditional treating method is unsatisfactory and ineffective. By connecting home and hospital through Inte rnet, patients can receive... Amblyopia is a common eye d isease caught by many children. For some reason, the traditional treating method is unsatisfactory and ineffective. By connecting home and hospital through Inte rnet, patients can receive service of treatment designed for their own purpose. Thus the effectiveness of therapy is expected to have sigificent improvment. A n ew Internet based telemedicine system for amblyopia is put forward in this pape r with further discussions of its principles, framework and implementation method s. 展开更多
关键词 AMBLYOPIA computer ne tworks TELEMEDICINE
下载PDF
A novel internet traffic identification approach using wavelet packet decomposition and neural network 被引量:6
8
作者 谭骏 陈兴蜀 +1 位作者 杜敏 朱锴 《Journal of Central South University》 SCIE EI CAS 2012年第8期2218-2230,共13页
Internet traffic classification plays an important role in network management, and many approaches have been proposed to classify different kinds of internet traffics. A novel approach was proposed to classify network... Internet traffic classification plays an important role in network management, and many approaches have been proposed to classify different kinds of internet traffics. A novel approach was proposed to classify network applications by optimized back-propagation (BP) neural network. Particle swarm optimization (PSO) algorithm was used to optimize the BP neural network. And in order to increase the identification performance, wavelet packet decomposition (WPD) was used to extract several hidden features from the time-frequency information of network traffic. The experimental results show that the average classification accuracy of various network applications can reach 97%. Moreover, this approach optimized by BP neural network takes 50% of the training time compared with the traditional neural network. 展开更多
关键词 neural network particle swarm optimization statistical characteristic traffic identification wavelet packet decomposition
下载PDF
How to Make Virtual Community More Active and Cohesive:From Brand and Perceived Protection Perspectives
9
作者 万岩 林国源 范静 《China Communications》 SCIE CSCD 2013年第12期1-15,共15页
With the increasing popularity of the Internet and mobile Internet, the Virtual Community (VC) is becoming an important medium for person-to-person communication. To realise the potential of the VC, it is neces- sar... With the increasing popularity of the Internet and mobile Internet, the Virtual Community (VC) is becoming an important medium for person-to-person communication. To realise the potential of the VC, it is neces- sary to cultivate within it good group cohesion and vitality. Using empirical and experimental research methods, this study explores the ef- fect of users' trust in the VC Platform (VCP) on group cohesion and vitality and how brand and perceived privacy security can affect us- ers' trust in the VC. The research results indi- cate that the brand of the VCP can directly af- fect users' trust in the VC, and can also influe- nce it indirectly through users' perceived pri- vacy protection and perceived security protec- tion. Further, this study also confu'ms that the performance of the VC (group cohesion and vitality) is significantly affected by users' trust in the VC. The results of this study can provide theoretical guidance for internet companies to maintain and enhance the value of VCs. 展开更多
关键词 trust in the virtual community pla-tform group privacy concern perceived priv-acy protection perceived security protection group cohesion group vitality
下载PDF
Study on Classification of Personality-Based Brand Archetype from the Perspective of Internet 被引量:1
10
作者 CHEN Fei YUE Xin YANG Xuecheng GE Tingting 《China Communications》 SCIE CSCD 2014年第7期153-160,共8页
Due to the rapid development,Internet has become the main field for brand building.Under this circumstance,the image of the brand is always consistent with the consumers' perception.Therefore,this study uses the m... Due to the rapid development,Internet has become the main field for brand building.Under this circumstance,the image of the brand is always consistent with the consumers' perception.Therefore,this study uses the method of text mining of search engine to explore the categories of brand archetype based on Brand Personality Theory from the perspective of Internet.The results find that 12 brand archetypes,including caregiver,sage,hero,innocent,dominator,creator,vitality,explorer,stylish woman,lover,cooperator,and vogue gentleman,have a high degree explanation.Deeper study uses case study to verify the reasonability and effectiveness of the classification standard. 展开更多
关键词 brand archetype brandpersonality brand positioning SE text mining
下载PDF
World Englishes on the Internet: Some Considerations for Teaching
11
作者 Sean Sutherland 《Sino-US English Teaching》 2011年第5期322-326,共5页
Exposing EFL (English as a Foreign Language) students to different varieties of English can be beneficial in numerous ways, but teachers may be unaware of how they can do this. This paper briefly explains the concep... Exposing EFL (English as a Foreign Language) students to different varieties of English can be beneficial in numerous ways, but teachers may be unaware of how they can do this. This paper briefly explains the concept of World Englishes, then describes one teacher's attempt to use the Internet to provide his students with examples of real English from around the world. Finally, it offers a selection of positive student responses to the experience. 展开更多
关键词 World Englishes university EFL INTERNET
下载PDF
Research on internet traffic classification techniques using supervised machine learning 被引量:1
12
作者 李君 Zhang Shunyi +1 位作者 Wang Pan Li Cuilian 《High Technology Letters》 EI CAS 2009年第4期369-377,共9页
Interact traffic classification is vital to the areas of network operation and management. Traditional classification methods such as port mapping and payload analysis are becoming increasingly difficult as newly emer... Interact traffic classification is vital to the areas of network operation and management. Traditional classification methods such as port mapping and payload analysis are becoming increasingly difficult as newly emerged applications (e. g. Peer-to-Peer) using dynamic port numbers, masquerading techniques and encryption to avoid detection. This paper presents a machine learning (ML) based traffic classifica- tion scheme, which offers solutions to a variety of network activities and provides a platform of performance evaluation for the classifiers. The impact of dataset size, feature selection, number of application types and ML algorithm selection on classification performance is analyzed and demonstrated by the following experiments: (1) The genetic algorithm based feature selection can dramatically reduce the cost without diminishing classification accuracy. (2) The chosen ML algorithms can achieve high classification accuracy. Particularly, REPTree and C4.5 outperform the other ML algorithms when computational complexity and accuracy are both taken into account. (3) Larger dataset and fewer application types would result in better classification accuracy. Finally, early detection with only several initial packets is proposed for real-time network activity and it is proved to be feasible according to the preliminary results. 展开更多
关键词 supervised machine learning traffic classification feature selection genetic algorithm (GA)
下载PDF
Two-stage evolutionary algorithm for dynamic multicast routing in mesh network
13
作者 Li ZHU Zhi-shu LI +1 位作者 Liang-yin CHEN Yan-hong CHENG 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第6期791-798,共8页
In order to share multimedia transmissions in mesh networks and optimize the utilization of network resources, this paper presents a Two-stage Evolutionary Algorithm (TEA), i.e., unicast routing evolution and multicas... In order to share multimedia transmissions in mesh networks and optimize the utilization of network resources, this paper presents a Two-stage Evolutionary Algorithm (TEA), i.e., unicast routing evolution and multicast path composition, for dynamic multicast routing. The TEA uses a novel link-duplicate-degree encoding, which can encode a multicast path in the link-duplicate-degree and decode the path as a link vector easily. A dynamic algorithm for adding nodes to or removing nodes from a multicast group and a repairing algorithm are also covered in this paper. As the TEA is based on global evaluation, the quality of the multicast path remains stabilized without degradation when multicast members change over time. Therefore, it is not necessary to rearrange the multicast path during the life cycle of the multicast sessions. Simulation results show that the TEA is efficient and convergent. 展开更多
关键词 Dynamic multicast ROUTING ENCODING Quality of Service (QoS) Evolution Genetic algorithm (GA)
下载PDF
试论信息技术教学学科素养的提升路径
14
作者 孔植 《发明与创新(初中生)》 2019年第8期11-11,共1页
信息技术作为国家伟大发展事业中的教育事业,它是一项能够提高国家文明的基本任务。想要提高学生们的信息技术综合素质,就一定要把关于学生对信息技术全方面的实践活动弄清,并由此来开展信息技术教学任务。
关键词 信息技术 素质 互联网:教学方法:教育
下载PDF
A social tag clustering method based on common co-occurrence group similarity 被引量:6
15
作者 Hui-zong LI Xue-gang HU +2 位作者 Yao-jin LIN Wei HE Jian-han PAN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第2期122-134,共13页
Social tagging systems are widely applied in Web 2.0.Many users use these systems to create,organize,manage,and share Internet resources freely.However,many ambiguous and uncontrolled tags produced by social tagging s... Social tagging systems are widely applied in Web 2.0.Many users use these systems to create,organize,manage,and share Internet resources freely.However,many ambiguous and uncontrolled tags produced by social tagging systems not only worsen users' experience,but also restrict resources' retrieval efficiency.Tag clustering can aggregate tags with similar semantics together,and help mitigate the above problems.In this paper,we first present a common co-occurrence group similarity based approach,which employs the ternary relation among users,resources,and tags to measure the semantic relevance between tags.Then we propose a spectral clustering method to address the high dimensionality and sparsity of the annotating data.Finally,experimental results show that the proposed method is useful and efficient. 展开更多
关键词 Social tagging systems Tag co-occurrence Spectral clustering Group similarity
原文传递
Trustworthy Mobile Network Architecture Based on Locator/Identity Split
16
作者 Haoxue Wang Ke Zhu Yuxiang Hu Dongnian Cheng 《Journal of Systems Science and Information》 2008年第1期71-80,共10页
Today's Internet architecture faces many challenges, from poor support for mobility to security threats. By analyzing the drawbacks of current TCP/IP protocol, we propose a new network architecture model LISNA. LISNA... Today's Internet architecture faces many challenges, from poor support for mobility to security threats. By analyzing the drawbacks of current TCP/IP protocol, we propose a new network architecture model LISNA. LISNA defines a kind of network architecture with mobility and trustworthiness, based upon the decoupling of end-host identity information from location information. This paper makes a brief description of the basic concepts and model structure that support network mobility and security. After introducing the key techniques in LISNA, the paper further illustrates how to promote the mobility handoff and to keep security association. 展开更多
关键词 location/identity split trustworthy mobile network LISNA network architecture model
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部