期刊文献+
共找到37篇文章
< 1 2 >
每页显示 20 50 100
国内著名搜索引擎的对比分析与评价——以搜搜、搜狗、有道和爱问为例 被引量:2
1
作者 莫纯锐 《电脑知识与技术》 2011年第3期1474-1476,1492,共4页
该文分别从界面特点、栓准率、可信度以及特色这四个方面对国内著名的四个搜索引擎进行比较分析。在功能分析方面,采用用户评价法.利用搜搜、搜狗、有道以及爱问这四搜索引擎分别对12组关键词组进行检索,并对检索结果进行评分统计。
关键词 索引擎 对比分析 用户评价法 搜搜 有道 爱问
下载PDF
搜搜发展模式研究
2
作者 齐媛媛 《传播与版权》 2014年第9期94-94,97,共2页
搜搜是腾讯的业务单元之一。本文介绍搜搜网站的概况,并从用户、情景搜索、盈利模式三方面分析其商业运作模式,指出其目前发展不力的原因主要在于缺乏竞争优势、附属危险性及推广宣传不到位等。
关键词 搜搜网站 商业盈利模式
下载PDF
微信搜索引擎优化策略的研究 被引量:1
3
作者 李灿辉 《数字技术与应用》 2020年第4期68-69,共2页
2019年微信搜索持续升级,如今微信搜一搜已成为10亿用户与微信生态中海量内容和服务连接的纽带。微信营销是目前最火的移动网络营销方式,微信搜索引擎优化带来的是精准的意向客户。本文从微信搜索排序的影响因素、排序的技巧、优化的策... 2019年微信搜索持续升级,如今微信搜一搜已成为10亿用户与微信生态中海量内容和服务连接的纽带。微信营销是目前最火的移动网络营销方式,微信搜索引擎优化带来的是精准的意向客户。本文从微信搜索排序的影响因素、排序的技巧、优化的策略等方面来进行微信搜索引擎优化的研究与探讨。 展开更多
关键词 微信SEO 微信 关键词挖掘
下载PDF
福建率先培训搜爆犬——“史宾格”01
4
作者 张杰 《警界科海》 2003年第1期37-37,共1页
关键词 爆犬 福建 训练工作 毒能力
下载PDF
英国搜毒搜武器专业犬的在岗复训
5
作者 张松 《中国工作犬业》 2006年第10期44-47,共4页
关键词 警犬 英国 在职训练 工作能力 武器专业犬 在岗复训
下载PDF
近几年我国网络互动问答平台研究述评 被引量:5
6
作者 赵发珍 《情报探索》 2012年第2期100-102,共3页
总结了近几年国内主要的互动问答平台理论研究成果,阐述了我国互动问答平台的研究现状、主要观点及其影响,并探讨了研究的发展趋势。
关键词 网络互动问答平台 百度知道 问答平台 搜搜问问
下载PDF
Design and implementation of semantic search engine Smartch 被引量:2
7
作者 文坤梅 卢正鼎 +1 位作者 李瑞轩 孙小林 《Journal of Southeast University(English Edition)》 EI CAS 2007年第3期317-321,共5页
To integrate reasoning and text retrieval, the architecture of a semantic search engine which includes several kinds of queries is proposed, and the semantic search engine Smartch is designed and implemented. Based on... To integrate reasoning and text retrieval, the architecture of a semantic search engine which includes several kinds of queries is proposed, and the semantic search engine Smartch is designed and implemented. Based on a logical reasoning process and a graphic user-defined process, Smartch provides four kinds of search services. They are basic search, concept search, graphic user-defined query and association relationship search. The experimental results show that compared with the traditional search engine, the recall and precision of Smartch are improved. Graphic user-defined queries can accurately locate the information of user needs. Association relationship search can find complicated relationships between concepts. Smartch can perform some intelligent functions based on ontology inference. 展开更多
关键词 semantic search search engine semantic search engine Smartch semantic web ONTOLOGY
下载PDF
The group search-based parallel algorithm for the serial Monte Carlo inversion method 被引量:3
8
作者 魏超 李小凡 郑晓东 《Applied Geophysics》 SCIE CSCD 2010年第2期127-134,193,共9页
With the development of parallel computing technology,non-linear inversion calculation efficiency has been improving.However,for single-point search-based non-linear inversion methods,the implementation of parallel al... With the development of parallel computing technology,non-linear inversion calculation efficiency has been improving.However,for single-point search-based non-linear inversion methods,the implementation of parallel algorithms is a difficult issue.We introduce the idea of group search to the single-point search-based non-linear inversion algorithm, taking the quantum Monte Carlo method as an example for two-dimensional seismic wave velocity inversion and practical impedance inversion and test the calculation efficiency of using different node numbers.The results show the parallel algorithm in theoretical and practical data inversion is feasible and effective.The parallel algorithm has good versatility. The algorithm efficiency increases with increasing node numbers but the algorithm efficiency rate of increase gradually decreases as the node numbers increase. 展开更多
关键词 non-linear inversion single-point search group search parallel computation
下载PDF
User-oriented web search based on PLSA
9
作者 于芳 陈冬玲 +2 位作者 王大玲 于戈 鲍玉斌 《Journal of Southeast University(English Edition)》 EI CAS 2007年第3期347-351,共5页
In order to solve the problem that current search engines provide query-oriented searches rather than user-oriented ones, and that this improper orientation leads to the search engines' inability to meet the personal... In order to solve the problem that current search engines provide query-oriented searches rather than user-oriented ones, and that this improper orientation leads to the search engines' inability to meet the personalized requirements of users, a novel method based on probabilistic latent semantic analysis (PLSA) is proposed to convert query-oriented web search to user-oriented web search. First, a user profile represented as a user' s topics of interest vector is created by analyzing the user' s click through data based on PLSA, then the user' s queries are mapped into categories based on the user' s preferences, and finally the result list is re-ranked according to the user' s interests based on the new proposed method named user-oriented PageRank (UOPR). Experiments on real life datasets show that the user-oriented search system that adopts PLSA takes considerable consideration of user preferences and better satisfies a user' s personalized information needs. 展开更多
关键词 user-oriented search underlying search intention probabilistic latent semantic analysis (PLSA) user profile topics of interest
下载PDF
数字参考咨询与互动问答平台的分析比较
10
作者 李光华 《贵州广播电视大学学报》 2013年第2期58-62,共5页
最近几年,随着互联网的日益普及,数字参考咨询迅速兴起,开拓了参考咨询服务的新领域。与此同时,基于搜索引擎的互动问答平台'百度知道'和'搜搜问问'等应运而生。数字参考咨询与作为互动问答平台的代名词的'百度知道... 最近几年,随着互联网的日益普及,数字参考咨询迅速兴起,开拓了参考咨询服务的新领域。与此同时,基于搜索引擎的互动问答平台'百度知道'和'搜搜问问'等应运而生。数字参考咨询与作为互动问答平台的代名词的'百度知道'和'搜搜问问'之间有一定的相似性和可比性,通过对两者的全面分析比较,可为我校图书馆数字参考咨询提供一些有益的启示,促进知识分享和传播。 展开更多
关键词 数字参考咨询 百度知道 搜搜问问 问答平台 互动问答
下载PDF
嗅觉功能的研究与利用
11
作者 王力光 《警犬》 2004年第6期13-13,共1页
警犬发挥作用主要是靠其灵敏的嗅觉来实现的,如搜毒搜爆、追踪鉴别、消防救灾等,若没有良好的嗅觉功能,或嗅觉系统感染疾病而发生障碍,警犬的作用就不可能充分发挥,警犬的战斗力就无法实现。在科学技术飞速发展的今天,最先进的科... 警犬发挥作用主要是靠其灵敏的嗅觉来实现的,如搜毒搜爆、追踪鉴别、消防救灾等,若没有良好的嗅觉功能,或嗅觉系统感染疾病而发生障碍,警犬的作用就不可能充分发挥,警犬的战斗力就无法实现。在科学技术飞速发展的今天,最先进的科学仪器仍然取代不了警犬的作用。这是因为警犬在嗅觉上有其先天的优势。 展开更多
关键词 嗅觉功能 警犬 追踪鉴别
下载PDF
爆炸物急慢性中毒对警犬的健康危害研究
12
作者 马金磊 胡晓明 《兽医导刊》 2018年第22期198-199,202,共3页
警犬搜爆是应用广泛的业务工作。在训练警犬以爆炸物为嗅源物,达到使警犬识别爆炸物的目的。警犬在训练中容易误吞或因长期嗅闻挥发气体引起中毒的情况屡有发生,引起肝炎、白内障、贫血、高胆固醇、睾丸萎缩等一系列症状,警犬因此死亡... 警犬搜爆是应用广泛的业务工作。在训练警犬以爆炸物为嗅源物,达到使警犬识别爆炸物的目的。警犬在训练中容易误吞或因长期嗅闻挥发气体引起中毒的情况屡有发生,引起肝炎、白内障、贫血、高胆固醇、睾丸萎缩等一系列症状,警犬因此死亡、提前衰老和使用年限缩短的病例日益增加。本研究以日常训练中最常使用的2,4,6一三硝基甲笨(TNT)为爆炸物代表,采用口服的方法分别建立犬急慢性TNT中毒模型,从氧化应激和免疫反应等角度分析爆炸物对循环系统、免疫系统、生殖系统(公)、眼睛、神经系统的危害原理。阐明爆炸物危害警大健康的原理,为今后警犬爆炸物中毒的诊断和治疗提供依据,从最大程度上降低爆炸物对警犬健康的危害。 展开更多
关键词 警犬健康 爆训练 中毒诊断 治疗
下载PDF
新软情报站
13
《计算机应用文摘》 2011年第34期22-23,共2页
说实话,POP熊长这么大还没出过国,就连坐飞机都是10年前的事情了。前几天一位朋友从泰国旅游回来,把旅途见闻说得天花乱坠,让POP熊羡慕不已呀!
关键词 流行软件 腾讯 搜搜 涂鸦网站 找茬游戏
下载PDF
前狼后虎 企鹅小心
14
作者 姜美芝 《IT时代周刊》 2006年第2期17-17,共1页
腾讯也做搜索了。
关键词 企鹅 雅虎 搜搜 腾讯
下载PDF
传统互联网多路径抢滩无线领域 2012年或是拐点
15
作者 梁辰 《通信世界》 2011年第27期17-17,共1页
分析师预计,2012年移动互联网用户数将超过互联网用户数。7月26日,在2011易观移动互联网博览会上,易观国际分析师万芳在主题演讲中表示,2011年上半年中国移动互联网用户达3.7亿,而传统互联网用户为4.8亿,前者正不断追赶后者。她预计,201... 分析师预计,2012年移动互联网用户数将超过互联网用户数。7月26日,在2011易观移动互联网博览会上,易观国际分析师万芳在主题演讲中表示,2011年上半年中国移动互联网用户达3.7亿,而传统互联网用户为4.8亿,前者正不断追赶后者。她预计,2012年移动互联网用户数量将超过互联网用户数量。这并非易观国际第一次对这一追赶态势做出预测。早在2007年,易观国际就曾发布报告称,2008年中国无线互联网用户将超越传统互联网。不过,随着百度、360等传统互联网企业加大力度部署其无线领域,浏览器、输入法以及即时通信等产品的推出,2012年或成为整个互联网行业发展的一个真正拐点。 展开更多
关键词 用户 分析师 移动互联网 易观国际 互联网用户数 输入法 拐点 扭转点 齐向东 浏览器 领域 互联网行业 无线互联网 搜搜 多路径
下载PDF
Automatic Search of Impossible Differentials and Zero-Correlation Linear Hulls for ARX Ciphers 被引量:5
16
作者 Kai Zhang Jie Guan Bin Hu 《China Communications》 SCIE CSCD 2018年第2期54-66,共13页
In lightweight cryptographic primitives, round functions with only simple operations XOR, modular addition and rotation are widely used nowadays. This kind of ciphers is called ARX ciphers. For ARX ciphers, impossible... In lightweight cryptographic primitives, round functions with only simple operations XOR, modular addition and rotation are widely used nowadays. This kind of ciphers is called ARX ciphers. For ARX ciphers, impossible differential cryptanalysis and zero-correlation linear cryptanalysis are among the most powerful attacks, and the key problems for these two attacks are discovering more and longer impossible differentials(IDs) and zero-correlation linear hulls(ZCLHs). However, finding new IDs and ZCLHs for ARX ciphers has been a manual work for a long time, which has been an obstacle in improving these two attacks. This paper proposes an automatic search method to improve the efficiency of finding new IDs and ZCLHs for ARX ciphers. In order to prove the efficiency of this new tool, we take HIGHT, LEA, SPECK three typical ARX algorithms as examples to explore their longer and new impossible differentials and zero-correlation linear hulls. To the best of our knowledge, this is the first application of automatic search method for ARX ciphers on finding new IDs and ZCLHs. For HIGHT, we find more 17 round IDs and multiple 17 round ZCLHs. This is the first discovery of 17 round ZCLHs for HIGHT. For LEA, we find extra four 10 round IDs and several 9 round ZCLHs. In the specification of LEA, the designers just identified three 10 round IDs and one 7round ZCLH. For SPECK, we find thousands of 6 round IDs and forty-four 6 round ZCLHs. Neither IDs nor ZCLHs of SPECK has been proposed before. The successful application of our new tool shows great potential in improving the impossible differential cryptanalysis and zero-correlation linear cryptanalysis on ARX ciphers.. 展开更多
关键词 automatic search tool impossibledifferential cryptanalysis zero-correlation lin-ear cryptanalysis ARX ciphers modes opera-tion
下载PDF
A hybrid algorithm based on tabu search and large neighbourhood search for car sequencing problem 被引量:7
17
作者 ZHANG Xiang-yang GAO Liang +1 位作者 WEN Long HUANG Zhao-dong 《Journal of Central South University》 SCIE EI CAS CSCD 2018年第2期315-330,共16页
The car sequencing problem(CSP)concerns a production sequence of different types of cars in the mixed-model assembly line.A hybrid algorithm is proposed to find an assembly sequence of CSP with minimum violations.Firs... The car sequencing problem(CSP)concerns a production sequence of different types of cars in the mixed-model assembly line.A hybrid algorithm is proposed to find an assembly sequence of CSP with minimum violations.Firstly,the hybrid algorithm is based on the tabu search and large neighborhood search(TLNS),servicing as the framework.Moreover,two components are incorporated into the hybrid algorithm.One is the parallel constructive heuristic(PCH)that is used to construct a set of initial solutions and find some high quality solutions,and the other is the small neighborhood search(SNS)which is designed to improve the new constructed solutions.The computational results show that the proposed hybrid algorithm(PCH+TLNS+SNS)obtains100best known values out of109public instances,among these89instances get their best known values with100%success rate.By comparing with the well-known related algorithms,computational results demonstrate the effectiveness,efficiency and robustness of the proposed algorithm. 展开更多
关键词 car sequencing problem large neighborhood search tabu search ratio constraint
下载PDF
A Fast and Memory-Efficient Approach to NDN Name Lookup 被引量:4
18
作者 Dacheng He Dafang Zhang +2 位作者 Ke Xu Kun Huang Yanbiao Li 《China Communications》 SCIE CSCD 2017年第10期61-69,共9页
For name-based routing/switching in NDN, the key challenges are to manage large-scale forwarding Tables, to lookup long names of variable lengths, and to deal with frequent updates. Hashing associated with proper leng... For name-based routing/switching in NDN, the key challenges are to manage large-scale forwarding Tables, to lookup long names of variable lengths, and to deal with frequent updates. Hashing associated with proper length-detecting is a straightforward yet efficient solution. Binary search strategy can reduce the number of required hash detecting in the worst case. However, to assure the searching path correct in such a schema, either backtrack searching or redundantly storing some prefixes is required, leading to performance or memory issues as a result. In this paper, we make a deep study on the binary search, and propose a novel mechanism to ensure correct searching path without neither additional backtrack costs nor redundant memory consumptions. Along any binary search path, a bloom filter is employed at each branching point to verify whether a said prefix is present, instead of storing that prefix here. By this means, we can gain significantly optimization on memory efficiency, at the cost of bloom checking before each detecting. Our evaluation experiments on both real-world and randomly synthesized data sets demonstrate our superiorities clearly 展开更多
关键词 named data networking binary search of hash table bloom filter
下载PDF
An Effective Long String Searching Algorithm towards Component Security Testing 被引量:2
19
作者 Jinfu Chen Lili Zhu +4 位作者 Zhibin Xie Michael Omari Hilary Ackah-Arthur Saihua Cai Rubing Huang 《China Communications》 SCIE CSCD 2016年第11期153-169,共17页
In the execution of method invocation sequences to test component security,abnormal or normal information is generated and recorded in a monitor log. By searching abnormal information from monitor log,the exceptions t... In the execution of method invocation sequences to test component security,abnormal or normal information is generated and recorded in a monitor log. By searching abnormal information from monitor log,the exceptions that the component has can be determined. To facilitate the searching process,string searching methods could be employed. However,current approaches are not effective enough to search long pattern string. In order to mine the specific information with less number of matches,we proposed an improved Sunday string searching algorithm in this paper. Unlike Sunday algorithm which does not make use of the already matched characters,the proposed approach presents two ideas — utilizing and recycling these characters. We take advantage of all matched characters in main string,if they are still in the matchable interval compared with pattern string,to increase the distance that pattern string moves backwards. Experimental analysis shows that,compared to Sunday algorithm,our method could greatly reduce the matching times,if the scale of character set constituting both main string and pattern string is small,or if the length of pattern string is long. Also,the proposed approach can improve the search effectiveness for abnormal information in component security testing. 展开更多
关键词 component testing security detection monitor log abnormal information string-searching
下载PDF
An integrated framework for discovering digital library collections
20
作者 CALHOUN Karen 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第11期1318-1326,共9页
Information seekers are generally on their own to discover and use a research library’s growing array of digital col- lections, and coordination of these collections’ development and maintenance is often not optimal... Information seekers are generally on their own to discover and use a research library’s growing array of digital col- lections, and coordination of these collections’ development and maintenance is often not optimal. The frequent lack of a con- scious design for how collections fit together is of equal concern because it means that research libraries are not making the most of the substantial investments they are making in digital initiatives. This paper proposes a framework for a research library’s digital collections that offers integrated discovery and a set of best practices to underpin collection building, federated access, and sus- tainability. The framework’s purpose is to give information seekers a powerful and easy way to search across existing and future collections and to retrieve integrated sets of results. The paper and its recommendations are based upon research undertaken by the author and a team of librarians and technologists at Cornell University Library. The team conducted structured interviews of forty-five library staff members involved in digital collection building at Cornell, studied an inventory of the library’s more than fifty digital collections, and evaluated seven existing Open Archives Initiative (OAI) and federated search production or prototype systems. The author will discuss her team’s research and the rationale for their recommendations to: present a cohesive view of the library’s digital collections for both browsing and searching at the object level; take a programmatic (rather than project-based) approach to digital collection building; require that all new digital collections conform to library-developed and agreed-upon OAI best practices for data providers; and implement organizational structures to sustain the library’s digital collections over the long term. 展开更多
关键词 Digital collections Federated searching Open Archives Initiative (OAI) Digital library best practices
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部