首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
基于内容的多媒体检索策略探析   总被引:5,自引:2,他引:5  
分析了传统文本检索技术在多媒体检索中的应用,探讨了基于内容的多媒体检索技术和发展,介绍了一个基于智能主体的多媒体图形并行检索系统的应用实例。  相似文献   

2.
互联网信息检索方式与检索策略   总被引:1,自引:0,他引:1  
邹育理 《情报杂志》2001,20(B06):48-50
讨论了互联网环境下的信息检索,介绍了检索工具的工作方式和主要检索功能,以及有关策略与技巧在实际检索中的具体运用。  相似文献   

3.
李娟 《情报科学》2000,18(10):889-891
本文分析讨论了检索学在现代信息技术特别是多媒体技术、网络技术、计算机技术的影响下,其检索内容,检索技术以及检索效果发生的变化。  相似文献   

4.
燕慧泉 《现代情报》2003,23(12):74-74,76
本文通过手工检索和计算机检索在检索策略的制定及执行方面进行比较,指出了两者在策略的拟定和优化方面的区别。  相似文献   

5.
论图书馆目录的利用   总被引:2,自引:0,他引:2  
丘玲 《现代情报》2003,23(2):108-108,92
图书信息浩如烟海。会用,可以变为金子;不会用,或许反遭困扰。所谓会用,首先就要学会利用图书馆目录。本文就我校有些读者不重视利用图书馆目录的倾向,从图书馆目录的形成、发展及其作用,论述了它的重要性。  相似文献   

6.
基于内容的图像信息检索综述   总被引:13,自引:0,他引:13  
刘伟成  孙吉红 《情报科学》2002,20(4):431-433,437
基于内容的图像检索技术,即从大量的静止或活动视频图像库中检索包含目标物体的图像(或视频片段),在高度信息化的今天,已成为内容图像库中图像信息组织和管理不可缺少的技术,本文介绍了基于内容检索技术的进展,并对其主要方法如基于颜色、形状、纹理等静止图像检索技术以及视频检索技术进行了讨论。  相似文献   

7.
Globalpat光盘数据库的特点及检索方法   总被引:2,自引:0,他引:2  
王瑛 《情报杂志》2001,20(10):71-72
介绍了GlobalPat专利文摘光盘数据库的特点及检索方法。  相似文献   

8.
徐贵水 《情报科学》1994,15(5):50-51,18
本文从被检索体的有序化入手,指出被检索体有序化的意义在于在检索中能通过标识符号的比较迅速缩小被检索体的检索范围,而被检索体检索范围如何被迅速地缩小,这可以由检索标识所反映的缩小法则近似地描述。本文对符号标识的缩小法则进行了比较详细的探讨。  相似文献   

9.
检索语言在文献检索教学中的定位   总被引:2,自引:0,他引:2  
Focused on the use of retrieval language in document retrieval teaching, this article discusses the influence of retrieval language on retrieval tool, retrieval mode and retrieval efficiency. It suggests that a retrieval language system be constructed and points out its proportion to document retrieval teaching.  相似文献   

10.
景来江 《情报科学》1991,12(3):24-29
文章将不同类型的MeSH中规范化的医学主题词,按不同的输入方式,在MEDLINE CD-ROM光盘中进行实验性检索,通过分析讨论8个检索结果一览表,探明了各种检索方式与查全率之间的关系。  相似文献   

11.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

12.
中德海洋学核心期刊论文国际合著的比较分析   总被引:1,自引:0,他引:1  
万琪  华薇娜 《现代情报》2016,36(2):150-156
本研究选取Web of Science数据库,收集中国和德国发表的海洋学论文,将论文分为国际合著组与非国际合著组,利用文献计量学的方法,借助EXCEL、SPSS和UCINET软件,比较两国各年的发文量、论文的篇均作者和篇均参考文献数、收录期刊的影响因子、论文的被引频次以及合著国家。研究结果显示,中国海洋学领域的国际合著起步晚于德国,但发展迅速,近年来中国海洋学国际合著的论文量已超过德国;同时中国海洋学国际合著论文的质量和学术影响力都弱于德国,并且中国海洋学论文合著国家的范围也小于德国海洋学的合著国家。  相似文献   

13.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

14.
The main premise of this article is that in information societies generally, and in virtual social contexts particularly, a distinctive style of interaction to facilitate the communication of difference, heterotopic communication , has emerged. It rests on two cultural foundations: an ideological belief in the positive, socially integrating power of communication, and a prevailing ethic of instrumental rationality, subjective individualism, and strategically practiced self-interest. The former is demonstrated by the use of simulation and spectacle as sources of information; exhibitionism/voyeurism as a communicative style; and the awareness of surveillance. The latter is seen in the competitive use of knowledge as a commodity; a surface globalism masking deep parochialism; lateral as well as vertical information inequity; and the use of public versus private as strategies for engagement rather than as spaces. Those who engage in heterotopic communication resort to their 'own devices' both in the sense of personal agendas, strategies, interests, and interpretations, and in the form of the telecommunication tools that help realize them. These personal and technological devices allow individuals with the right educational and technical resources to avoid exposure to disagreement, difference, or other information that does not serve their direct purposes or reflect their particular views of the world; yet they also help convey the appearance of openness, availability, and cooperation. This style of interaction is used strategically in combination with information and communication technologies to gain social or economic advantages, but it may encourage social separatism and parochialism, inhibit the negotiation of disputes, and emphasize competing interests.  相似文献   

15.
This article presents an account of the process of development of the NSFNET and its significance for the emergence of the Internet of the 1990s. The fact that the development of the interconnected system of computer networks occurred within the realm of academic research is not incidental. The dynamics of the world of scientific research were intimately related to the shaping of the network and to the way in which it spread to other sectors of society. The construction of computer networks crossed the boundaries between science and society in order to build the scientific realm by transforming the world in which it is embedded.  相似文献   

16.
The development of vaccines to prevent infectious diseases has been one of the most important contributions of biomedical sciences. Increasing understanding in biochemistry, molecular biology, molecular genetics and related fields have provided an opportunity for the development of new generation vaccines that are based on rational design approaches. This is possible because of proper understanding of the microbial-genetics, biochemistry, host-pathogen interaction and recent developments in molecular immunology. Another important improvement made in the quality of vaccine production is the incorporation of immunomodulators or adjuvants with modified delivery vehicles viz liposomes, Iscoms and microspheres apart from alum being used as a gold standard. This article reviews the art of vaccination from Jenner period to present day context highlighting all the developments made at each stage of the vaccine development. Various criteria have been discussed regarding the selection of epitopes that expand B & T cells, its linkage with other accessory cells of the immune system, means to overcome MHC linked immune unresponsiveness, enhanced antigen processing and presentations that specially induce either helper or cytotoxic or mucosal immune responses were critically discussed.  相似文献   

17.
Trust between transaction partners in cyberspace has come to be considered a distinct possibility. In this article the focus is on the conditions for its creation by way of assuming, not inferring trust. After a survey of its development over the years (in the writings of authors like Luhmann, Baier, Gambetta, and Pettit), this mechanism of trust is explored in a study of personal journal blogs. After a brief presentation of some technicalities of blogging and authors’ motives for writing their diaries, I try to answer the question, ‘Why do the overwhelming majority of web diarists dare to expose the intimate details of their lives to the world at large?’ It is argued that the mechanism of assuming trust is at play: authors simply assume that future visitors to their blog will be sympathetic readers, worthy of their intimacies. This assumption then may create a self-fulfilling cycle of mutual admiration. Thereupon, this phenomenon of blogging about one’s intimacies is linked to Calvert’s theory of ‘mediated voyeurism’ and Mathiesen’s notion of ‘synopticism’. It is to be interpreted as a form of ‘empowering exhibitionism’ that reaffirms subjectivity. Various types of ‘synopticon’ are distinguished, each drawing the line between public and private differently. In the most ‘radical’ synopticon blogging proceeds in total transparency and the concept of privacy is declared obsolete; the societal gaze of surveillance is proudly returned and nullified. Finally it is shown that, in practice, these conceptions of blogging are put to a severe test, while authors often have to cope with known people from ‘real life’ complaining, and with ‘trolling’ strangers.  相似文献   

18.
军队信息化的动因、任务及对策探讨   总被引:2,自引:0,他引:2  
基于未来高技术战争需求的牵引、军用信息技术发展的推动和构建核心能力的内在要求,我军必须加快信息化建设。为此,本文运用战略管理中的价值链方法对军队的任务及军队信息化的任务进行了全面分析,并提出了加速我军信息化建设的对策。  相似文献   

19.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

20.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号