期刊文献+
共找到14,802篇文章
< 1 2 250 >
每页显示 20 50 100
Development of Aircraft Maintenance Glossaries in Higher Education:Exploring Methodological Paths to Corpus-Driven Analysis of Key Keywords
1
作者 Malila PRADO Daniela TERENZI Diego BRITO 《中国科技术语》 2025年第1期83-93,共11页
This paper presents a project aimed at developing a trilingual visual dictionary for aircraft maintenance professionals and students.The project addresses the growing demand for accurate communication and technical te... This paper presents a project aimed at developing a trilingual visual dictionary for aircraft maintenance professionals and students.The project addresses the growing demand for accurate communication and technical terminology in the aviation industry,particularly in Brazil and China.The study employs a corpus-driven approach,analyzing a large corpus of aircraft maintenance manuals to extract key technical terms and their collocates.Using specialized subcorpora and a comparative analysis,this paper demonstrates challenges and solutions into the identification of high-frequency keywords and explores their contextual use in aviation documentation,emphasizing the need for clear and accurate technical communication.By incorporating these findings into a trilingual visual dictionary,the project aims to enhance the understanding and usage of aviation terminology. 展开更多
关键词 aircraft maintenance CORPUS keyword extraction
下载PDF
WoS题录Keywords字段关键词频度统计程序设计与实现 被引量:1
2
作者 朱玉强 《情报探索》 2015年第6期86-89,共4页
使用Visual Basic编程,采用正则表达式批量提取由Web of Science导出的Bib Tex题录中所有Keywords字段关键词,按需合并所得关键词的同义词、近义词及词形变化词,然后将出现频度的统计数据写入Excel表,并编制Excel宏自动生成折线图,实现... 使用Visual Basic编程,采用正则表达式批量提取由Web of Science导出的Bib Tex题录中所有Keywords字段关键词,按需合并所得关键词的同义词、近义词及词形变化词,然后将出现频度的统计数据写入Excel表,并编制Excel宏自动生成折线图,实现关键词分布的简单可视化。情报工作者后续可借助Excel功能对该程序生成的Excel表执行复杂的数据组合分析,以提高工作效率。 展开更多
关键词 Web of Science(WoS) 关键词 词频统计 Excel BibTex Visual Basic(VB)
下载PDF
An improved algorithm for weighting keywords in web documents 被引量:1
3
作者 孙双 贺樑 +1 位作者 杨静 顾君忠 《Journal of Shanghai University(English Edition)》 CAS 2008年第3期235-239,共5页
In this paper, an improved algorithm, web-based keyword weight algorithm (WKWA), is presented to weight keywords in web documents. WKWA takes into account representation features of web documents and advantages of t... In this paper, an improved algorithm, web-based keyword weight algorithm (WKWA), is presented to weight keywords in web documents. WKWA takes into account representation features of web documents and advantages of the TF*IDF, TFC and ITC algorithms in order to make it more appropriate for web documents. Meanwhile, the presented algorithm is applied to improved vector space model (IVSM). A real system has been implemented for calculating semantic similarities of web documents. Four experiments have been carried out. They are keyword weight calculation, feature item selection, semantic similarity calculation, and WKWA time performance. The results demonstrate accuracy of keyword weight, and semantic similarity is improved. 展开更多
关键词 improved vector space model (IVSM) representation feature feature item keyword weight semantic similarity
下载PDF
Lattice-Based Searchable Encryption Scheme against Inside Keywords Guessing Attack 被引量:3
4
作者 Xiaoling Yu Chungen Xu +1 位作者 Lei Xu Yuntao Wang 《Computers, Materials & Continua》 SCIE EI 2020年第8期1107-1125,共19页
To save the local storage,users store the data on the cloud server who offers convenient internet services.To guarantee the data privacy,users encrypt the data before uploading them into the cloud server.Since encrypt... To save the local storage,users store the data on the cloud server who offers convenient internet services.To guarantee the data privacy,users encrypt the data before uploading them into the cloud server.Since encryption can reduce the data availability,public-key encryption with keyword search(PEKS)is developed to achieve the retrieval of the encrypted data without decrypting them.However,most PEKS schemes cannot resist quantum computing attack,because the corresponding hardness assumptions are some number theory problems that can be solved efficiently under quantum computers.Besides,the traditional PEKS schemes have an inherent security issue that they cannot resist inside keywords guessing attack(KGA).In this attack,a malicious server can guess the keywords encapsulated in the search token by computing the ciphertext of keywords exhaustively and performing the test between the token and the ciphertext of keywords.In the paper,we propose a lattice-based PEKS scheme that can resist quantum computing attacks.To resist inside KGA,this scheme adopts a lattice-based signature technique into the encryption of keywords to prevent the malicious server from forging a valid ciphertext.Finally,some simulation experiments are conducted to demonstrate the performance of the proposed scheme and some comparison results are further shown with respect to other searchable schemes. 展开更多
关键词 Searchable encryption lattice assumption inside keywords guessing attack post-quantum secure
下载PDF
Model for the Vaccination against the Poliomyelitis 被引量:1
5
作者 Irene Duarte Gandica Lina Marcela Ocampo +1 位作者 Edwin Femando Duque Matin Maria Mercedes Gonzáilez 《Journal of Mathematics and System Science》 2013年第2期62-67,共6页
The poliomyelitis is an acute infection produced by the polio virus that affects the human central nervous system. It is transmitted by fecal-oral and respiratory contact.There are two types of vaccine, OPV (live att... The poliomyelitis is an acute infection produced by the polio virus that affects the human central nervous system. It is transmitted by fecal-oral and respiratory contact.There are two types of vaccine, OPV (live attenuated virus) and IPV (inactivated polio virus). Currently, there is a plan of vaccination until the age of 5 with OPV. The children vaccinated expel a virus (derived from the vaccine) to the environment, and some of the people that have oral contact with them, get vaccinated by the herd behavior. Nevertheless, taking into account the lately observed facts about the reversion to virulence of the oral polio vaccine during its circulation in the environment, a change in the current vaccination schedule is being contemplated, where the oral polio vaccine can be replaced by the inactivated vaccine. Nowadays, In Colombia the inactivated oral polio vaccine is recommended for children presenting immune deficiency who are vaccinated with IPV. These children do not expel poliovirus to the environment. This work presents a mathematical model that describes the dynamics of the infection in a population where the two types of vaccination are carried out. The population is divided into two groups of age and Michaelis-Menten interactions. Different strategies of vaccination are simulated and analyzed. 展开更多
关键词 poliomyelitis vaccine OPV vaccine IPV VACCINATION mathematical model.
下载PDF
CLINICAL OBSERVATION ON 134 CASES OF SEQUELAE OF POLIOMYELITIS TREATED WITH ACUPUNCTURE PLUS ACUPOINT-INJECTION
6
作者 Li Min, Wang ZhongxueAcupuncture Department, The First Affiliated Hospital of Henan Medical University, Zhengzhou 450052, ChinaLuo Yunpeng Henan College of Traditional Chinese Medicine, Zhengzhou 450003, China 《World Journal of Acupuncture-Moxibustion》 1994年第3期22-24,共3页
We had treated 134 cases of sequelae of poliomyelitis with acupuncture and acu-point-injection from 1989 to 1991. The patients’ ages ranged from 3 months to 2 years, and thecourses of disease were 3 days to 2 years. ... We had treated 134 cases of sequelae of poliomyelitis with acupuncture and acu-point-injection from 1989 to 1991. The patients’ ages ranged from 3 months to 2 years, and thecourses of disease were 3 days to 2 years. For most of cases, we had got a satisfactory effect after 3curative courses. The total effective rate was 91%. It indicates that the acupuncture plus acupoint-in-jection is a good method for treating the sequela of poliomyelitis. 展开更多
关键词 SEQUELA of poliomyelitis ACUPUNCTURE Point-injection
下载PDF
Improved Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords
7
作者 Ping Zhang Jianzhong Wang 《Journal of Computer and Communications》 2015年第9期90-98,共9页
A search strategy over encrypted cloud data based on keywords has been improved and has presented a method using different strategies on the client and the server to improve the search efficiency in this paper. The cl... A search strategy over encrypted cloud data based on keywords has been improved and has presented a method using different strategies on the client and the server to improve the search efficiency in this paper. The client uses the Chinese and English to achieve the synonym construction of the keywords, the establishment of the fuzzy-syllable words and synonyms set of keywords and the implementation of fuzzy search strategy over the encryption of cloud data based on keywords. The server side through the analysis of the user’s query request provides keywords for users to choose and topic words and secondary words are picked out. System will match topic words with historical inquiry in time order, and then the new query result of the request is directly gained. The analysis of the simulation experiment shows that the fuzzy search strategy can make better use of historical results on the basis of privacy protection for the realization of efficient data search, saving the search time and improving the efficiency of search. 展开更多
关键词 CLOUD Data FUZZY SEARCH keywords SYNONYMS Searchable ENCRYPTION
下载PDF
Problems and Countermeasures in the Keywords of Academic Papers
8
作者 WANG Fengnian 《Journalism and Mass Communication》 2019年第1期26-32,共7页
Keywords with the retrieval value clearly show the main contents, enhance the influence of academic periodicals, highlight specific information, and generalize information, but because of the ignorance of the value of... Keywords with the retrieval value clearly show the main contents, enhance the influence of academic periodicals, highlight specific information, and generalize information, but because of the ignorance of the value of keywords from some authors and editors, the lack of canonical guidance, and limitations of the editorial knowledge structure, there are some problems concerning keywords in academic papers, such as papers containing too many or too few keywords, or keywords being used in a way that is too general or colloquial. According to academic principle, accurate principle, logical principle, comprehensive principle, it is imperative to discuss how to choose keywords properly. 展开更多
关键词 keywords ACADEMIC PAPERS SELECTION CRITERIA of keywords COUNTERMEASURES of keywords
下载PDF
Primary breast cancer patient with poliomyelitis:A case report
9
作者 Xing-Miao Wang Yi-Zi Cong +2 位作者 Guang-Dong Qiao Song Zhang Li-Juan Wang 《World Journal of Clinical Cases》 SCIE 2020年第23期6190-6196,共7页
BACKGROUND Poliomyelitis is an acute infection caused by an enterovirus,which primarily infects the human gastrointestinal tract.In general,patients with polio have no association with the occurrence of cancer.The pre... BACKGROUND Poliomyelitis is an acute infection caused by an enterovirus,which primarily infects the human gastrointestinal tract.In general,patients with polio have no association with the occurrence of cancer.The present case study presents a rare case of poliomyelitis combined with primary breast cancer.CASE SUMMARY A 61-year-old woman who was diagnosed with poliomyelitis at 5 years old and confirmed invasive breast cancer by core needle biopsy(CNB)after hospitalization.The patient received a modified radical mastectomy and four cycles of chemotherapy with the TC(docetaxel and cyclophosphamide)regimen.The patient was also prescribed endocrine therapy without radiotherapy after chemotherapy.The patient had no evidence of lymphedema in the right upper extremities and no evidence of either regression or distant metastasis at the 1-year follow-up.CONCLUSION The pectoral muscles of patients with polio are easily damaged in traumatic procedures,such as CNB,local anesthesia for tumor excision,and general anesthesia for surgery.A CNB,modified radical mastectomy,and four cycles of TC chemotherapy were successfully completed for the present case and the adverse reactions were found to be tolerable.This case may indicate the relationship between breast cancer and polio,and the examination and treatment methods used could be used as a guide for similar cases in the future. 展开更多
关键词 Breast cancer Diagnostic imaging FOLLOW-UP poliomyelitis SURGERY Case report
下载PDF
KEYWORDS INDEX(2006;Volume 8)
10
《Asian Journal of Andrology》 SCIE CAS CSCD 2006年第6期761-763,共3页
关键词 429 555 GENE Volume 8 keywords INDEX
下载PDF
Keywords Index
11
《Cell Research》 SCIE CAS CSCD 2006年第12期979-982,983,共5页
关键词 GENE keywords Index CELL
下载PDF
炭专业文献中的关键词(Keywords for carbons)——技术方法(Techniques)
12
作者 李峰 王茂章 《新型炭材料》 SCIE EI CAS CSCD 北大核心 2008年第1期50-50,共1页
关键词 电子 轻子 TECHNIQUES keywords for carbons
下载PDF
Global Stability of a SVEIR Epidemic Model: Application to Poliomyelitis Transmission Dynamics
13
作者 L. N. Nkamba J. M. Ntaganda +2 位作者 H. Abboubakar J. C. Kamgang Lorenzo Castelli 《Open Journal of Modelling and Simulation》 2017年第1期98-112,共15页
The lack of treatment for poliomyelitis doing that only means of preventing is immunization with live oral polio vaccine (OPV) or/and inactivated polio vaccine (IPV). Poliomyelitis is a very contagious viral infection... The lack of treatment for poliomyelitis doing that only means of preventing is immunization with live oral polio vaccine (OPV) or/and inactivated polio vaccine (IPV). Poliomyelitis is a very contagious viral infection caused by poliovirus. Children are principally attacked. In this paper, we assess the impact of vaccination in the control of spread of poliomyelitis via a deterministic SVEIR (Susceptible-Vaccinated-Latent-Infectious-Removed) model of infectious disease transmission, where vaccinated individuals are also susceptible, although to a lesser degree. Using Lyapunov-Lasalle methods, we prove the global asymptotic stability of the unique endemic equilibrium whenever ?. Numerical simulations, using poliomyelitis data from Cameroon, are conducted to approve analytic results and to show the importance of vaccinate coverage in the control of disease spread. 展开更多
关键词 DETERMINISTIC SVEIR Model poliomyelitis Imperfect VACCINE Direct LYAPUNOV Method EQUILIBRIUM States Global Stability
下载PDF
炭专业文献中的关键词(Keywords for carbons)——炭的类型(Tpyes of carbon)
14
作者 李峰 王茂章 《新型炭材料》 SCIE EI CAS CSCD 北大核心 2008年第1期94-94,共1页
关键词 GRAPHITE keywords for carbons Tpyes of carbon
下载PDF
炭专业文献中的关键词(Keywords for carbons)—制备和过程(Preparation and processing)
15
作者 李峰 王茂章 《新型炭材料》 SCIE EI CAS CSCD 北大核心 2006年第1期42-42,共1页
关键词 keywords for carbons Preparation and processing
下载PDF
炭专业文献中的关键词(Keywords for carbons)——制备和过程(Preparation and processing)
16
作者 李峰 王茂章 《新型炭材料》 SCIE EI CAS CSCD 北大核心 2008年第1期85-85,共1页
关键词 keywords for carbons Preparation and processing
下载PDF
炭专业文献中的关键词(Keywords for carbons)—性质和现象(Properties and phenomend)
17
作者 李峰 王茂章 《新型炭材料》 SCIE EI CAS CSCD 北大核心 2005年第4期323-323,共1页
关键词 keywords for carbons Properties and phenomend
下载PDF
炭专业文献中的关键词(Keywords for carbons)—炭的类型(Tpyes of carbon)
18
作者 李峰 王茂章 《新型炭材料》 SCIE EI CAS CSCD 北大核心 2005年第4期316-316,共1页
关键词 GRAPHITE 中间相 金相相组成 Tpyes of carbon keywords for carbons
下载PDF
Keywords Index of Volume 17
19
《Journal of Chinese Pharmaceutical Sciences》 CAS 2008年第4期349-351,共3页
关键词 OC keywords Index of Volume 17
下载PDF
CHINA KEYWORDS
20
《China Today》 2020年第7期19-19,共1页
Editor’s Note:The column China Keywords aims to facilitate readers’understanding of China’s political thinking,policies,and approach to development.Its content mainly comes from the“China Keywords”platform,a nati... Editor’s Note:The column China Keywords aims to facilitate readers’understanding of China’s political thinking,policies,and approach to development.Its content mainly comes from the“China Keywords”platform,a national-level project undertaken by the China International Publishing Group,Academy of Contemporary China and World Studies,and China Academy of Translation.This issue continues to center on the book Keywords to Understand China:The Belt and Road Initiative,briefing our readers about cooperation priorities of the initiative. 展开更多
关键词 keywords development. COLUMN
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部