检索证明范例

合集下载

论文收录和引用检索证明服务报告委托单【模板】

论文收录和引用检索证明服务报告委托单【模板】
*****文收录和引用检索证明服务报告委托单
委托时间___________完成时间___________编号:___________
论文作者姓名
中文:
英文(或拼音):
单位名称
中文:
英文:
委托人
通讯地址
邮政编码
电子信箱:
联系人
手机:
办公电话:
检索目的
收录证明( )请选择合适的选项或标注“V”
A、SCI收录; B、Pubmed收录; C、在线发表; D、以上均可;
E、其他(请注明文献数据库名称):
影响因子( )A、最新IF;B、论文发表当年IF
引文证明( )
检索用途
奖励申报( )、职称晋升( )、基金申请( )、机构评估( )、其它
检索要求:(如有特殊要求请注明)
需查证的文献篇数:_______篇
要查证的文献目录:(准确的文献作者、题目、期刊名称、出版年、卷、期、页码或会议名称、专著名称等,可以附件形式提供。注:文献的作者必须和第一栏中的论文作者相一致):
**请提供检索时间范围内作者工作过的所有单位的中英文名称。
费用

完成日期
年 月 日
委托人签名:
年 月 日
受理人签名:
年 月 日
备注:
山东省医药卫生科技信息研究所(***.cn)电话:********E-***

检索报告范例_供参考

检索报告范例_供参考

撰写检索报告的步骤 检索课题名称:
检索词:
检索范围(指检索哪些类型的数据库):
检索年限:
检索式:
检索结果:
筛选出所需文献:
导出选出文献的所需格式:
下载或浏览原文:
检索报告撰写
(范例)
一检索课题名称:本世纪以来海南生态旅游研究
二、检索词:海南、生态、旅游
检索时间条件:2000年1月1日至2012年12月7日三检索工具
1 CNKI平台:期刊库、硕博士学位论文库、会议论文库,成果库;
2万方平台:期刊库、学位论文、会议论文、成果数据库;
3 维普平台:期刊库
四检索式及检索过程(需要截图)
1 CNKI数据库中的检索式及检索过程截图:
检索式:TI=海南*生态and SU=旅游
检索过程截图:
2 万方数据库的检索式及检索过程截图:
检索式:题名=海南and题名或关键词=生态* 旅游检索过程截图:
2 维普数据库的检索式及检索过程:
检索式:T=海南and M=生态* 旅游
检索过程截图:
五检索结果(截出有检索结果篇数的部分)
CNKI检索结果截图:
万方检索结果截图:
维普检索结果截图:
六、筛选出所需文献(任选其中一个数据库筛选,截图)
七、导出查新格式(任选一个数据库导出,截图)
八、浏览其中一篇原文(任选一篇打开截图)。

华电论文检索证明报告模板

华电论文检索证明报告模板

论文收录检索证明报告华北电力大学图书馆论文作者: Zhuxiao,Wang; Wang,Zhuxiao论文发表年限: 2012-2015检索数据库: Ei Compendex检索结果 :8篇收录Title:1. An Extension of Distributed Dynamic Description Logics for the Representation of Heterogeneous Mappings2. An architecture description language based on dynamic description logics for self-healing systems3. An architecture description language based on dynamic description logics4. An Architecture Dynamic Modeling Language for Self-Healing Systems5. A Tableau-Based Reasoning Algorithm for Distributed Dynamic Description Logics6.A formal model for attack mutation using dynamic description logics7. Linear cryptanalysis and security tradeoff of block ciphering systems with channel errors8. Research on sentiment analysis in sentence and text levels with priors特此证明!(盖章)检索报告人:年月日附件:收录情况:1. Accession number: 20132016337096Title: An extension of distributed dynamic description logics for the representation of heterogeneous mappingsAuthors: Wang, Zhuxiao1 ; Guo, Jing2 ; Chen, Fei3 ; Wu, Kehe3 ; Wang, Peng4Author affiliation: 1 School of Control and Computer Engineering, State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, North China Electric Power University, 102206 Beijing, China2 National Computer Network Emergency Response Technical Team, Coordination Center of China, 100029 Beijing, China3 School of Control and Computer Engineering, North China Electric Power University, 102206 Beijing, China4 Institute of Information Engineering, Chinese Academy of Sciences, 100195 Beijing, China Corresponding author: Wang,Z.(****************.cn)Source title: Journal of SoftwareAbbreviated source title: J. Softw.Volume: 8Issue: 1Issue date: 2013Publication year: 2013Pages: 243-250Language: EnglishISSN: 1796217XDocument type: Journal article (JA)Publisher: Academy Publisher, P.O.Box 40,, OULU, 90571, FinlandAbstract: As a family of dynamic description logics, DDL(X) is constructed by embracing actions into the description logic X, where X represents well-studied description logics ranging from the ALC to the SHOIQ. To efficiently support automated interoperability between ontology-based information systems in distributed environments, we have to design an expressive mapping language to semantically understand resources from remote and heterogeneous systems. Distributed Dynamic Description Logics D3L(X) is a natural generalization of the DDL(X) framework, which is designed to model the distributed dynamically-changing knowledge repositories interconnected by semantic mappings and to accomplish reasoning in distributed, heterogeneous environments. In this paper, we propose an extension of Distributed Dynamic Description Logics D3L(X) and investigate the reasoning mechanisms in D3L(X). © 2013 ACADEMY PUBLISHER.Number of references: 16Main heading: Data descriptionControlled terms: Formal languages - Interoperability - Mapping - Semantics Uncontrolled terms: Distributed Dynamic Description Logics - Distributed reasonings - Dynamic description logic - Semantic mapping - Tableau algorithmClassification code: 716 Telecommunication; Radar, Radio and Television - 717 Optical Communication - 718 Telephone Systems and Related Technologies; Line Communications -723 Computer Software, Data Handling and Applications - 902.1 Engineering Graphics - 903.2 Information DisseminationDOI: 10.4304/jsw.8.1.243-250Database: CompendexCompilation and indexing terms, © 2013 Elsevier Inc.2. Accession number: 20124415623183Title: An architecture description language based on dynamic description logics for self-healing systemsAuthors: Wang, Zhuxiao1 ; Peng, Hui2 ; Guo, Jing3 ; Wu, Kehe4 ; Cui, Wenchao4 ; Wang, Xiaofeng5Author affiliation: 1 School of Control and Computer Engineering, State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, North China Electric Power University, Beijing 102206, China2 Education Technology Center, Beijing International Studies University, Beijing 100024, China3 National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing 100029, China4 School of Control and Computer Engineering, Institute of Electric Information Security Engineering Research Center of Power Information, North China Electric Power University, Beijing 102206, China5 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China Corresponding author: Wang,Z.(****************.cn)Source title: International Journal of Advancements in Computing Technology Abbreviated source title: Intl. J. Adv. Comput. Technolog.Volume: 4Issue: 18Issue date: October 2012Publication year: 2012Pages: 89-96Language: EnglishISSN: 20058039E-ISSN: 22339337Document type: Journal article (JA)Publisher: Advanced Institute of Convergence Information Technology, Myoungbo Bldg 3F,, Bumin-dong 1-ga, Seo-gu, Busan, 602-816, Korea, Republic ofAbstract: As biological systems exhibit adaptation, healing and robustness in the face of changing environmental behavior, this paradigm has actuated research dealing with the concept of self-healing systems, which attempt to heal themselves in the sense of recovering from malicious attacks and rectifying of system faults. The goal of self-healing systems is to provide survivable systems that require high dependability, robustness, adaptability, and availability. Such systems maintain one or more models, whether external or internal, at run time as a basis for identifying problems and resolving them. This article describes an architectural description language, called ADML, which is being developed as a new formal language and/or conceptual model forrepresenting evolving software architectures. The ADML embraces dynamic change as a fundamental consideration, supports a broad class of adaptive changes at the architectural level, and offers a uniform way to represent and reason about both static and dynamic aspects of self-healing systems. Because the ADML is based on the Dynamic Description Logic DDL(SHON (D)), which can represent both dynamic semantics and static semantics under a unified logical framework, architectural ontology entailment for the ADML languages can be reduced to knowledge base satisfiability in DDL(SHON (D)), and dynamic description logic algorithms and implementations can be used to provide reasoning services for ADML. In this article, we present the syntax of ADML, explain its underlying semantics using the Dynamic Description Logic DDL(SHON (D)), and exemplify our approach by applying it to the domain of load balancing a wireless remote-access system; the preliminary results certify the potential of the approach. Number of references: 14Main heading: Data descriptionControlled terms: Formal languages - Knowledge based systems - Knowledge representation - Semantics - Software architectureUncontrolled terms: Architecture description languages - Dynamic adaptations - Dynamic description logic - Knowledge representation and reasoning - Self-healing systemsClassification code: 723 Computer Software, Data Handling and Applications - 903.2 Information DisseminationDOI: 10.4156/ijact.vol4.issue 18.11Database: CompendexCompilation and indexing terms, © 2013 Elsevier Inc.3. Accession number: 20125015790730Title: An architecture description language based on dynamic description logicsAuthors: Wang, Zhuxiao1 ; Peng, Hui2 ; Guo, Jing3 ; Zhang, Ying1 ; Wu, Kehe1 ; Xu, Huan1 ; Wang, Xiaofeng4Author affiliation: 1 School of Control and Computer Engineering, State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, North China Electric Power University, Beijing 102206, China2 Education Technology Center, Beijing International Studies University, Beijing 100024, China3 National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing 100029, China4 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China Corresponding author: Wang,Z.(****************.cn)Source title: IFIP Advances in Information and Communication TechnologyAbbreviated source title: IFIP Advances in Information and Communication Technology Volume: 385 AICTMonograph title: Intelligent Information Processing VI - 7th IFIP TC 12 International Conference, IIP 2012, ProceedingsIssue date: 2012Publication year: 2012Pages: 157-166Language: EnglishISSN: 18684238ISBN-13: 9783642328909Document type: Conference article (CA)Conference name: 7th IFIP International Conference on Intelligent Information Processing, IIP 2012Conference date: October 12, 2012 - October 15, 2012Conference location: Guilin, ChinaConference code: 94249Sponsor: IFIP TC12; Guilin University of Electronic Technology; Chinese Academy of Sciences, Institute of Computing TechnologyPublisher: Springer New York, 233 Spring Street, New York, NY 10013-1578, United States Abstract: ADML is an architectural description language based on Dynamic Description Logic for defining and simulating the behavior of system architecture. ADML is being developed as a new formal language and/or conceptual model for representing the architectures of concurrent and distributed systems, both hardware and software. ADML embraces dynamic change as a fundamental consideration, supports a broad class of adaptive changes at the architectural level, and offers a uniform way to represent and reason about both static and dynamic aspects of systems. Because the ADML is based on the Dynamic Description Logic DDL( (D)), which can represent both dynamic semantics and static semantics under a unified logical framework, architectural ontology entailment for the ADML languages can be reduced to knowledge base satisfiability in DDL( (D)), and dynamic description logic algorithms and implementations can be used to provide reasoning services for ADML. In this article, we present the syntax of ADML, explain its underlying semantics using the Dynamic Description Logic DDL( (D)), and describe the core architecture description features of ADML. © 2012 IFIP International Federation for Information Processing.Number of references: 14Main heading: Data descriptionControlled terms: Formal languages - Knowledge based systems - Knowledge representation - Semantics - Software architectureUncontrolled terms: Architectural description languages - Architectural levels - Architecture description - Architecture description languages - Conceptual model - Distributed systems - Dynamic adaptations - Dynamic changes - Dynamic description logic - Dynamic semantic - Hardware and software - Knowledge base - Knowledge representation and reasoning - Logical frameworks - ON dynamics - Satisfiability - Static and dynamic - Static semantics - System architecturesClassification code: 723 Computer Software, Data Handling and Applications - 903.2 Information DisseminationDOI: 10.1007/978-3-642-32891-6_21Database: CompendexCompilation and indexing terms, © 2013 Elsevier Inc.4. Accession number: 20121214883239Title: An architecture dynamic modeling language for self-healing systemsAuthors: Wang, Zhuxiao1 ; Guo, Jing2; Wu, Kehe1; He, Hui1; Chen, Fei1Author affiliation: 1 School of Control and Computer Engineering, State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, North China Electric Power University, Beijing 102206, China2 National Computer Network Emergency Response Technical Team, Coordination Center of China, Beijing 100029, ChinaCorresponding author: Wang,Z.(****************.cn)Source title: Procedia EngineeringAbbreviated source title: Procedia Eng.Volume: 29Monograph title: 2012 International Workshop on Information and Electronics Engineering Issue date: 2012Publication year: 2012Pages: 3909-3913Language: EnglishISSN: 18777058Document type: Conference article (CA)Conference name: 2012 International Workshop on Information and Electronics Engineering, IWIEE 2012Conference date: March 10, 2012 - March 11, 2012Conference location: Harbin, ChinaConference code: 89020Sponsor: Harbin University of Science and Technology; International Science and Engineering Research CenterPublisher: Elsevier Ltd, Langford Lane, Kidlington, Oxford, OX5 1GB, United Kingdom Abstract: As modern software-based systems increase in complexity, recovery from malicious attacks and rectification of system faults become more difficult, labor-intensive, and error-prone. These factors have actuated research dealing with the concept of self-healing systems, which employ architectural models to monitor system behavior and use inputs obtaining therefore to adapt themselves to the run-time environment. Numerous architectural description languages (ADLs) have been developed, each providing complementary capabilities for architectural development and analysis. Unfortunately, few ADLs embrace dynamic change as a fundamental consideration and support a broad class of adaptive changes at the architectural level. The Architecture Dynamic Modeling Language (ADML) is being developed as a new formal language and/or conceptual model for representing dynamic software architectures. The ADML couple the static information provided by the system requirements and the dynamic knowledge provided by tactics, and offer a uniform way to represent and reason about both static and dynamic aspects of self-healing systems. Because the ADML is based on the Dynamic Description Logic DDL, architectural ontology entailment for the ADML languages can be reduced to knowledge base satisfiability in DDL. © 2011 Published by Elsevier Ltd.Number of references: 10Main heading: ArchitectureControlled terms: Data description - Electronics engineering - Embedded systems -Formal languages - Knowledge based systems - Knowledge representation - Software architectureUncontrolled terms: Architecture description languages - Dynamic adaptation - Dynamic description logic - Knowledge representation and reasoning - Self-healing systemsClassification code: 723 Computer Software, Data Handling and Applications - 722 Computer Systems and Equipment - 718 Telephone Systems and Related Technologies; Line Communications - 717 Optical Communication - 716 Telecommunication; Radar, Radio and Television - 715 Electronic Equipment, General Purpose and Industrial - 714 Electronic Components and Tubes - 713 Electronic Circuits - 402 Buildings and TowersDOI: 10.1016/j.proeng.2012.01.593Database: CompendexCompilation and indexing terms, © 2013 Elsevier Inc.5. Accession number: 20124315590040Title: A tableau-based reasoning algorithm for distributed dynamic description logics Authors: Wang, Zhuxiao1 ; Guan, Zhitao1 ; Li, Wei1 ; Wu, Kehe1 ; Guo, Jing2 ; Tian, Guanhua3Author affiliation: 1 School of Control and Computer Engineering, State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, North China Electric Power University, 102206 Beijing, China2 National Computer Network Emergency Response Technical Team, Coordination Center of China, 100029 Beijing, China3 Institute of Automation, Chinese Academy of Sciences, 100190 Beijing, China Corresponding author: Wang,Z.(****************.cn)Source title: Communications in Computer and Information ScienceAbbreviated source title: Commun. Comput. Info. Sci.Volume: 307 CCISIssue: PART 1Monograph title: Information Computing and Applications - Third International Conference, ICICA 2012, ProceedingsIssue date: 2012Publication year: 2012Pages: 192-199Language: EnglishISSN: 18650929ISBN-13: 9783642340376Document type: Conference article (CA)Conference name: 3rd International Conference on Information Computing and Applications, ICICA 2012Conference date: September 14, 2012 - September 16, 2012Conference location: Chengde, ChinaConference code: 93206Sponsor: National Science Foundation of China; Hunan Institute of Engineering; YanshanUniversity; Northeastern University at Qinhuangdao; Chengde Petroleum CollegePublisher: Springer Verlag, Tiergartenstrasse 17, Heidelberg, D-69121, Germany Abstract: As a family of dynamic description logics, DDL(X) is constructed by embracing actions into the description logic X, where X represents well-studied description logics ranging from the ALC to the SHOIQ. The usage of distributed computation techniques in reasoning is an important premise for the adoption of Dynamic Description Logics in a real-world setting. Practical scalability of DDL(X) reasoning inspired recently a proposal of Distributed Dynamic Description Logics (D3L) framework. D3L is a natural generalization of the DDL(X) framework, which is designed to model the distributed dynamically-changing knowledge repositories interconnected by semantic mappings and to accomplish reasoning in distributed, heterogeneous environments. In this paper, we investigate the reasoning mechanisms in D3L and propose a tableau-based reasoning algorithm for D3L, built as a composition of the state of the art tableaux reasoners for DDL(X). © 2012 Springer-Verlag.Number of references: 15Main heading: Data descriptionControlled terms: Algorithms - Formal languages - Inference engines - Semantics Uncontrolled terms: Description logic - Distributed computations - Distributed dynamics - Distributed Reasoning - Dynamic description logic - Heterogeneous environments - Knowledge repository - Natural generalization - Reasoning algorithms - Reasoning mechanism - Semantic mapping - State of the art - Tableau algorithm - Tableaux reasonersClassification code: 723 Computer Software, Data Handling and Applications - 903.2 Information Dissemination - 921 MathematicsDOI: 10.1007/978-3-642-34038-3_27Database: CompendexCompilation and indexing terms, © 2013 Elsevier Inc.6. Accession number: 20150400451745Title: A formal model for attack mutation using dynamic description logicsAuthors: Wang, Zhuxiao1 Email author ****************.cn;Guo, Jing2 Email ********************************;Shi,******************************.cn;He,Hui1Email author ***************.cn;Zhang, Ying1 Email author *******************.cn;Peng, Hui3 ***************************.cn;Tian,*************************************.cn Author affiliation: 1 School of Control and Computer Engineering, State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, North China Electric Power University, Beijing, China2 National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China3 Education Technology Center, Beijing International Studies University, Beijing, China4 Institute of Automation, Chinese Academy of Sciences, Beijing, ChinaCorresponding author: Wang, ZhuxiaoSource title: IFIP Advances in Information and Communication TechnologyAbbreviated source title: IFIP Advances in Information and Communication Technology V olume: 432V olume title: Intelligent Information Processing VII - 8th IFIP TC 12 International Conference, IIP 2014, ProceedingsIssue date: 2014Publication year: 2014Pages: 303-311Language: EnglishISSN: 18684238ISBN-13: 9783662449790Document type: Journal article (JA)Publisher: Springer New York LLCAbstract: All currently available Network-based Intrusion Detection Systems (NIDS) rely upon passive protocol analysis which is fundamentally flawed as an attack can evade detection by exploiting ambiguities in the traffic stream as seen by the NIDS. We observe that different attack variations can be derived from the original attack using simple transformations. This paper proposes a semantic model for attack mutation based on dynamic description logics (DDL(X)), extensions of description logics (DLs) with a dynamic dimension, and explores the possibility of using DDL(X) as a basis for evasion composition. The attack mutation model describes all the possible transformations and how they can be applied to the original attack to generate a large number of attack variations. Furthermore, this paper presents a heuristics planning algorithm for the automation of evasion composition at the functional level based on DDL(X). Our approach employs classical DL-TBoxes to capture the constraints of the domain, DL-ABoxes to present the attack, and DL-formulas to encode the objective sequence of packets respectively. In such a way, the evasion composition problem is solved by a decidable tableau procedure. The preliminary results certify the potential of the approach. © IFIP International Federation for Information Processing 2014.Number of references: 9Main heading: Data descriptionControlled terms: Algorithms - Formal languages - Intrusion detection - Knowledge representation - SemanticsUncontrolled terms: Advanced evasion techniques - Dynamic description logic - Intrusion detection/prevention systems - Knowledge representation and reasoning - MultiprotocolsClassification code: 723 Computer Software, Data Handling and Applications - 903.2 Information DisseminationDatabase: CompendexCompilation and indexing terms, © 2015 Elsevier Inc.7. Accession number: 20130115855490Title: Linear cryptanalysis and security tradeoff of block ciphering systems with channel errorsAuthors: Guo, Jing1 ; Wang, Zhuxiao2Author affiliation: 1 National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC), Beijing 100029, China2 School of Control and Computer Engineering, State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, North China Electric Power University, Beijing 102206, ChinaCorresponding author: Guo,J.(**************************)Source title: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)Abbreviated source title: Lect. Notes Comput. Sci.Volume: 7645 LNCSMonograph title: Network and System Security - 6th International Conference, NSS 2012, ProceedingsIssue date: 2012Publication year: 2012Pages: 405-416Language: EnglishISSN: 03029743E-ISSN: 16113349ISBN-13: 9783642346002Document type: Conference article (CA)Conference name: 6th International Conference on Network and System Security, NSS 2012 Conference date: November 21, 2012 - November 23, 2012Conference location: Wuyishan, Fujian, ChinaConference code: 94688Publisher: Springer Verlag, Tiergartenstrasse 17, Heidelberg, D-69121, Germany Abstract: Channel errors are usually treated as an obstacle in designing an encrypted wireless system. So we are supposed to reduce them as much as possible due to the potential error bursts contributed by an avalanche effect of block ciphers. In this paper, we propose that channel errors are to be explored for the benefit of security enhancement as they could be translated to additional efforts in cryptanalysis for an adversary node. To achieve this, a system with an outer block channel coder and an inner block cipher is presented. A framework for linear cryptanalysis is established under which an eavesdropper takes advantage of linear relationship among coded symbols, as well as linear approximation of ciphers. Also presented is an analysis on the tradeoff between security enhancement and performance degradation in the presence of channel errors. © 2012 Springer-Verlag.Number of references: 13Main heading: CryptographyControlled terms: Commerce - Errors - Network securityUncontrolled terms: Avalanche effects - Block ciphers - Channel error - Coded symbols - Linear approximations - Linear cryptanalysis - Linear relationships - Performance degradation - Potential errors - Security enhancements - Wireless systems Classification code: 723 Computer Software, Data Handling and Applications - 731 Automatic Control Principles and Applications - 911.2 Industrial Economics - 921 MathematicsDOI: 10.1007/978-3-642-34601-9_31Database: CompendexCompilation and indexing terms, © 2013 Elsevier Inc.8. Accession number: 20123915464951Title: Research on sentiment analysis in sentence and text levels with priorsAuthors: He, Hui1, 3 ; Chen, Bo2 ; Wang, Zhuxiao3Author affiliation: 1 School of Control and Computer Engineering, North China Electric Power University, Beijing, China2 Beijing University of Posts and Telecommunications, Beijing, China3 Postdoctoral Working Station, China United Network Communications Group Company Limited, Beijing, ChinaCorresponding author: He,H.(****************)Source title: International Journal of Digital Content Technology and its Applications Abbreviated source title: Int. J. Digit. Content Technol. Appl.Volume: 6Issue: 15Issue date: August 2012Publication year: 2012Pages: 518-525Language: EnglishISSN: 19759339E-ISSN: 22339310Document type: Journal article (JA)Publisher: Advanced Institute of Convergence Information Technology, 707 Seokjang-dong, Gyeongju, BI Center, Room 207, Gyeongju, Gyeongbuk, 780-714, Korea, Republic of Abstract: Recently, sentiment analysis of text is becoming a hotspot in the study of natural language processing, which has drawn interesting attention due to its research value and extensive applications. This paper introduces a sentiment analysis system, which is to satisfy two aspects of sentiment analysis requirement in sentence and text levels. They are sentence orientation analysis and text sentiment retrieval. An improved Maximum Entropy (MaxEnt) with priors is used to judge the sentence orientation, which combined with Indri is used to retrieve sentiment texts according to interested terms. This sentiment analysis system has been applied in Chinese Opinion Analysis Evaluation (COAE). Promising results and analysis are presented at the end of this paper. Number of references: 26Main heading: Maximum entropy methodsControlled terms: Computational linguistics - Data mining - Information retrieval - Natural language processing systemsUncontrolled terms: Hot spot - Indri - Maximum entropy - NAtural language processing - Opinion analysis - Orientation analysis - Prior - Sentiment analysis Classification code: 716.1 Information Theory and Signal Processing - 721.1 Computer Theory, Includes Formal Logic, Automata Theory, Switching Theory, Programming Theory - 723.2 Data Processing and Image Processing - 723.5 Computer ApplicationsDOI: 10.4156/jdcta.vol6.issue15.59Database: CompendexCompilation and indexing terms, © 2013 Elsevier Inc.。

论文收录引用检索证明报告

论文收录引用检索证明报告

论文收录引用检索证明报告
报告编号:JS200905008
论文收录引用
检索证明报告
教育部科技查新工作站(G07)南京航空航天大学查新检索咨询中心
二零零九年五月八日
检索证明报告
委托人单位:南京航空航天大学
委托人:张三
检索要求:1、检索作者近五年发表的论文或专著被SCI、EI、ISTP收录情况。

2、检索作者近五年发表的论文或专著被他引情况。

检索日期:2009年05月08日
检索数据库:
1.SCI EXPANDED网络版(ISI Web of Science,1998 - 2009)
2.EI COMPENDEX 网络版(Engineering Village 2,1969 - 2009)
3.ISTP网络版(ISI Proceedings,1991 - 2009)
检索结果:
经检索,作者近五年发表的论文或专著被以上数据库收录和引用情况如下:
1. SCI收录:作者有5篇论文被SCI收录(均同时被EI收录)。

2. EI收录:作者有5篇期刊论文被EI收录。

3. ISTP收录:作者有5篇会议论文被ISTP收录。

4. SCI引用:作者有4篇文献被他人引用11次。

(此处“他引”是指文献被除作者及合作者以外其他人的引用)。

说明:数据会有遗漏(详见附件)
特此证明!
检索证明人:
教育部科技查新工作站(G07)
南京航空航天大学查新检索咨询中心2009-05-08。

论文收录检索证明

论文收录检索证明

论文收录检索证明尊敬的读者:作者:所属机构:大学发表时间:2022年5月收录情况:1. 收录数据库:中国知网(CNKI)2. 检索情况:该论文已被中国知网收录,并在其数据库中进行检索。

3. 影响因子:该论文在CNKI数据库中的影响因子为2.5。

4. 引用情况:截至目前,该论文已被引用20次。

证明人:职务:大学图书馆馆长日期:2022年10月10日特此证明。

论文收录检索证明尊敬的读者:作者:所属机构:大学发表时间:2022年5月收录情况:1. 收录数据库:中国知网(CNKI)2. 检索情况:该论文已被中国知网收录,并在其数据库中进行检索。

3. 影响因子:该论文在CNKI数据库中的影响因子为2.5。

4. 引用情况:截至目前,该论文已被引用20次。

证明人:职务:大学图书馆馆长日期:2022年10月10日特此证明。

该论文在学术界引起了广泛关注,得到了同行的高度评价。

论文中的研究成果为图像识别技术的发展提供了有力支持,对于推动相关领域的研究具有重要意义。

论文收录检索证明尊敬的读者:作者:所属机构:大学发表时间:2022年5月收录情况:1. 收录数据库:中国知网(CNKI)2. 检索情况:该论文已被中国知网收录,并在其数据库中进行检索。

3. 影响因子:该论文在CNKI数据库中的影响因子为2.5。

4. 引用情况:截至目前,该论文已被引用20次。

证明人:职务:大学图书馆馆长日期:2022年10月10日特此证明。

该论文在学术界引起了广泛关注,得到了同行的高度评价。

论文中的研究成果为图像识别技术的发展提供了有力支持,对于推动相关领域的研究具有重要意义。

谢谢!大学图书馆2022年10月10日。

文献检索证明附表样例

文献检索证明附表样例
文献检索证明附表样例
序号
论文名称
作者排名
文中单位
发表刊物
(名称、年卷期、页码)
收录
类型
影响因子
大类分区
1.
第一作者
1.华南农业大学;2.中山大学
……
SCI
3.536(发文当年,如2012年)
生物2区(发文当年)
2.
3.
4.
……
通讯作者
华南农业大学
……
EI
/
/
5.
……
注:(1)文中单位写中文,如果某作者文中单位有多个,需按顺序均填上;
0
2
合计
122
3
27
114
3
26
去重后:总引146次
去重后:他引137次
注:“大类分区”和“影响因子”查看中科院JCR分区在线平台检索结果页;“被引频次”查看SCI引用检索结果页。
收录
类型
IF2012
大类分区
(2011)
被引频次
SCIE
总引
CPCI
总引
CSCD
总引
SCIE
他引
CPCI
他引
CSCD
他引
1
......
第一作者
SOIL BIOLOGY & BIOCHEMISTRY
2008, 41(4): 965-978
SCI
3.504
农林科学1区
12
0
4
12
0
4
2
......
通讯作者
(2)“发表刊物”、“发表年月”和“文献类型”,可在SCI/EI检索结果页中拷贝,EI数据库中未标注发表年月者,可以不填;大类分区和影响因子查看中科院JCR分区在线平台检索结果页。

法律案件检索报告范文(3篇)

法律案件检索报告范文(3篇)

第1篇一、案件基本信息案件名称:张三诉李四合同纠纷案案号:(2022)XX民初XX号审理法院:XX市XX区人民法院起诉时间:2022年4月1日开庭时间:2022年5月15日判决时间:2022年6月10日二、案件背景原告张三与被告李四于2021年5月签订了一份《房屋租赁合同》,约定张三将位于XX市XX区的一套房屋出租给李四,租赁期限为一年,租金每月XX元。

合同签订后,李四按时支付了第一个月的租金。

然而,自第二个月起,李四未再支付租金,且在原告多次催要下仍不支付。

原告张三遂向法院提起诉讼,要求被告李四支付剩余租金及违约金。

三、法律依据1. 《中华人民共和国合同法》第二十二条:当事人应当履行合同约定的义务,不得擅自变更或者解除合同。

第二十三条:当事人一方不履行合同义务或者履行合同义务不符合约定的,应当承担继续履行、采取补救措施或者赔偿损失等违约责任。

2. 《中华人民共和国民法典》第七百零九条:当事人一方未支付价款或者报酬的,对方可以请求其支付价款或者报酬。

第七百一十一条:当事人一方不履行合同义务或者履行合同义务不符合约定的,应当承担继续履行、采取补救措施或者赔偿损失等违约责任。

四、案件检索结果1. 案例一:(2021)XX民初XX号,原告王某诉被告李某租赁合同纠纷案判决结果:法院判决被告李某支付原告王某剩余租金及违约金。

本案与本案案情相似,法院判决支持了原告的诉讼请求,对本案具有参考价值。

2. 案例二:(2020)XX民初XX号,原告赵某诉被告钱某租赁合同纠纷案判决结果:法院判决被告钱某支付原告赵某剩余租金及违约金。

本案与本案案情相似,法院判决支持了原告的诉讼请求,对本案具有参考价值。

3. 案例三:(2019)XX民初XX号,原告孙某诉被告周某租赁合同纠纷案判决结果:法院判决被告周某支付原告孙某剩余租金及违约金。

本案与本案案情相似,法院判决支持了原告的诉讼请求,对本案具有参考价值。

五、案件分析通过检索上述案例,可以看出在租赁合同纠纷案件中,法院普遍认为租赁合同双方当事人应当履行合同约定的义务。

国家图书馆检索证明 (7页)

国家图书馆检索证明 (7页)

本文部分内容来自网络整理,本司不为其真实性负责,如有异议或侵权请及时联系,本司将立即删除!== 本文为word格式,下载后可方便编辑和修改! ==国家图书馆检索证明篇一:国家图书馆论文收录引用检索申请单国家图书馆论文收录引用检索申请单联系方式:电话010-********传真010-********E_mail:kjck@ 篇二:国家图书馆馆藏文献复制证明委托单国家图书馆馆藏文献复制证明委托单国家图书馆馆藏文献复制证明收费标准(自201X年3月1日起实施)一、证明费:100元。

二、附件费用:1. 纸本书籍、报纸、期刊:中文文献30元/篇;外文文献50元/篇。

2. 数据库文献:中文文献20元/篇;外文文献50元/篇。

3. 纸本图片类广告:50元/条。

三、成本费用:1. 报纸保存本扫描:A3 4元/张,A4 3元/张2. 复印费:A4 0.2元/张3. 打印费:A4 0.5元/张4. 快递费:北京地区15元起,外埠25元起;四、加急费:5篇以内的馆藏文献复制证明服务,用户需要当天完成的,收取总费用的100%的加急费;超过5篇文献原则上当天不提供检索报告,具体完成时间根据实际情况双方约定,用户需要在约定时间前完成咨询的,收取总费用的50%-100%的加急费。

五、其他费用:其他特殊情况,用户可通过邮件或电话向咨询馆员咨询。

国家图书馆科技查新中心篇三:《文献信息检索》习题答案文献信息检索(答案)《文献信息检索》习题答案一、单选题1、文献是记录有知识的(A)A.载体B.纸张C.光盘 D.磁盘2、如果需要检索某位作者的文献被引用的情况,应该使用(C)检索。

A.分类索引 B.作者索引 C.引文索引D.主题索引3、下列哪种文献属于二次文献( D.)A.专利文献B.学位论文C.会议文献D.目录4、纸质信息源的载体是(D)A.光盘B.缩微平片C.感光材料D.纸张5、《中国图书馆分类法》(简称《中图法》)将图书分成( A.)A.5大部分22个大类B.5大部分26个大类C.6大部分22个大类D.6大部分26个大类6、利用文献末尾所附参考文献进行检索的方法是(C)A.倒查法B.顺查法C.引文追溯法D.抽查法7、广义的信息检索包含两个过程(B)A.检索与利用B.存储与检索C.存储与利用D.检索与报道8、中国国家标准的代码是(A)A.GB. B.CB.C.ZGD.CG9、( D )是报道文献出版或收藏信息为主要功能的工具。

论文收录检索证明

论文收录检索证明

论文收录检索证明检索课题:五邑大学教师2008年发表的论文被美国《科学引文索引》SCI、美国《科学技术会议索引》ISTP、美国《工程索引》EI收录的情况。

检索工具及年限:《科学引文索引》SCI网络数据库1997-2009《工程索引》EI-VILLAGE数据库1970-2009《科技会议索引》ISTP网络数据库(同光盘版)1996-2009检索结果:经上述数据库及年限范围内的检索,五邑大学教师2008年发表的论文被三大索引收录的情况如下:1、EI网络版收录32篇。

2、SCI网络版收录20篇。

3、ISTP网络版(同光盘版)收录15篇。

详情见附件。

华南理工大学图书馆情报咨询部2009年2月24日论文收录检索证明(附件一)经美国《工程索引》EI-VILLAGE数据库检索,五邑大学教师2008年发表的论文被EI网络版收录了32篇。

题录如下:1. Effect of processing parameters on the uniformity of adhesive meltblown webWang, Xiaomei (王晓梅)(Department of Textiles and Apparel, Wuyi University); Zhao, Qiming (赵其明)Source: Polymer Engineering and Science, v 48, n 11, November, 2008, p 2143-21462. Complete chaotic synchronization characteristics of the linear-polarization mode of vertical-cavity surface-emitting semiconductor lasers with isotropic optical feedbackZhong, Dong-Zhou (钟东洲)(School of Informatics(信息学院), Wuyi University); Xia, Guang-Qiong; Wu, Zheng-Mao; Jia, Xin-Hong Source: Optics Communications, v 281, n 6, Mar 15, 2008, p 1698-17093. Realization of phosphorus-doped p-type ZnO thin films via diffusion and thermal activation Ding, Ruiqin(丁瑞钦-数理系)(Institute of thin films and nanomaterials, Wuyi University) (数理系/薄膜与纳米材料研究所); Zhu, Huiqun(朱慧群-数理系); Wang, Yi Source: Materials Letters, v 62, n 3, Feb 15, 2008, p 498-5004.. Study on technological parameters of core-shell Nano-powder prepared by one-step method Liu, Zhi-Ping 刘志平(Wuyi University); Huang, Hui-Min; Ji, Wen-Jin Source: Cailiao Kexue yu Gongyi/Material Science and Technology, v 16, n 5, October, 2008, p 667-669+674 Language: Chinese5. 5. Control technology of knowledge-flow in collaborative designWang, Shengfa(王生发-机电)(Wuyi University); Gu, Xinjian; Zhang, Taihua; Guo, Jianfeng; Pan, Min (潘敏-机电) Source: Nongye Jixie Xuebao/Transactions of the Chinese Society of Agricultural Machinery, v 39, n 11, November, 2008, p 122-126 Language: Chinese6. Improving image encryption using multi-chaotic mapZhai, Yikui(翟懿奎)(Wuyi University, School of Information); Lin, Shuyong; Zhang, Qiong Source: Proceedings - 2008 Workshop on Power Electronics and Intelligent Transportation System, PEITS 2008, Proceedings - 2008 Workshop on Power Electronics and Intelligent Transportation System, PEITS 2008, 2008, p 143-1487. Freeway on-ramp metering using fuzzy immune PID controllerLiang, Xinrong(梁新荣)(School of Information, Wuyi University); Wei, Yanxiu Source: Proceedings of the World Congress on Intelligent Control and Automation (WCICA), Proceedings of the 7th World Congress on Intelligent Control and Automation, WCICA'08, 2008, p 3722-3726 Language: Chinese8.. Influences of preparation techniques on the microstructure and electric characteristics of p-ZnO thin filmsDing, Rui-Qin(丁瑞钦-数理系)(Institute of Thin Films and Nano-Materials, Wuyi University) (数理系/薄膜与纳米材料研究所); Chen, Yi-Zhan; Zhu, Hui-Qun(朱慧群); Li, Yang-Gang; Ding, Xiao-Gui; Yang, Liu; Huang, Xin-Dian; Qi, De-Bei; Tan, Jun Source: Rengong Jingti Xuebao/Journal of Synthetic Crystals, v 37, n 5, October, 2008, p 1237-1241+1272 Language: Chinese9. Freeway on-ramp control based on the composition of PID controller and CMACLiang, Xinrong(梁新荣)(School of Information, Wuyi University); Fan, Yekun Source: Proceedings of the 27th Chinese Control Conference, CCC, Proceedings of the 27th Chinese Control Conference, CCC, 2008, p 354-357 Language: Chinese10. Magnetron sputtering used to prepare fluorocarbon coatings deposited on PET fabrics Huang, Mei-Lin (黄美林)(Wuyi University)(纺织服装系); Di, Jian-Feng(狄剑锋); Qi, Hong-Jin(齐宏进) Source: Gaofenzi Cailiao Kexue Yu Gongcheng/Polymeric Materials Science and Engineering, v 24, n 2, February, 2008, p 148-151 Language: Chinese11. Neural network ensemble based on feature selectionLin, Jian (Institute of System Science and Technology, Wuyi University); Zhu, Bangzhu(朱帮助)Source: 2007 IEEE International Conference on Control and Automation, ICCA, 2007 IEEE International Conference on Control and Automation, ICCA, 2008, p 1844-184712. Fabrication of p-type ZnO thin films via magnetron sputtering and phosphorus diffusion Ding, Ruiqin(丁瑞钦)(Institute of Thin Films and Nanomaterials, Wuyi University) (数理系/薄膜与纳米材料研究所); Zhu, Huiqun(朱慧群); Zeng, Qingguang(曾庆光)Source: Vacuum, v 82, n 5, Jan 8, 2008, p 510-51313. Particle swarm optimization based PI controller for freeway ramp meteringFan, Yekun (School of Information, Wuyi University); Liang, Xinrong (梁新荣)Source: Proceedings of the 27th Chinese Control Conference, CCC, Proceedings of the 27th Chinese Control Conference, CCC, 2008, p 503-506 Language: Chinese14. Wavelet Bayesian based on information entropyLi, Chengfei (李澄非)(Wuyi University); Zuo, Deming(左德明)Source: Journal of Information and Computational Science, v 5, n 2, March, 2008, p 739-74615. A high precision SADI method for the semiconductor device simulationLiu, Zhan(刘战)(School of Information Engineering, Wuyi University); Shen, Jingjing; Gu, Xiaofeng; Yu, Zongguang; Hu, Xiduo; Zang, Jiafeng Source: Guti Dianzixue Yanjiu Yu Jinzhan/Research and Progress of Solid State Electronics, v 28, n 4, December, 2008, p 483-487+544 Language: Chinese16. LATEX SSP-convergence of fuzzy nets and its applicationBai, Shi-Zhong 白世忠,(Wuyi University, Department of Mathematics); Luo, Hai Source: Proceedings - 5th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, v 1, Proceedings - 5th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, 2008, p 433-43517. LATEX Strong-I Nβ-compactness in L-topological SpacesBai, Shi-Zhong白世忠,(Wuyi University, Department of Mathematics); Fan, Lei; Wang, Wan-Liang Source: Proceedings - 5th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, v 1, Proceedings - 5th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, 2008, p 436-43818. Fast parallel classification method for imbalanced classesLuo, Bing(罗兵)(School of Informatics, Wuyi University)(信息学院); Gan, Junying Source: Journal of Information and Computational Science, v 5, n 4, July, 2008, p 1577-158619. LATEX fuzzy Y-irresolute mappingsWang, Yin-Hang (Wuyi University, Department of Mathematics); Bai, Shi-Zhong白世忠,Source: Proceedings - 5th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, v 1, Proceedings - 5th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, 2008, p 282-28520. 3-D face reconstruction using RBF and B spline methodHe, Guo-Hui (何国辉)(School of Information, Wuyi University)(信息学院); Zhu, Bin; Gan, Jun-Ying Source: Proceedings - 1st International Congress on Image and Signal Processing, CISP 2008, v 1, Proceedings - 1st International Congress on Image and Signal Processing, CISP 2008, 2008, p 239-24321. LATEX L-fuzzy strong pre-connectivityBai, Shi-Zhong白世忠,(Wuyi University, Department of Mathematics); Wu, Xiu-Yun Source: Proceedings - 5th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, v 1, Proceedings - 5th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, 2008, p 316-31822. An algorithm: Filling the missing values in the incomplete decision tableWu, Ming-Fen(吴明芬)(School of Information, Wuyi University); Wang, Ting-Liang Source: Proceedings of the 7th International Conference on Machine Learning and Cybernetics, ICMLC, v 1, Proceedings of the 7th International Conference on Machine Learning and Cybernetics, ICMLC, 2008, p 190-19523. Wavelet Bayesian based on information entropyLi, Chengfei(李澄非)(Wuyi University); Zuo, Deming(左德明)Source: Journal of Information and Computational Science, v 5, n 2, March, 2008, p 739-746 Language: Chinese24. Poly-Si film functional layer based AM-OLED display panelLi, Yang(李阳)(Department of Mathematics and Physics, Wuyi University); Zhao, Shuyun; Wu, Chunya; Meng, Zhiguo; Wang, Yi; Xiong, Shaozhen Source: Pan Tao Ti Hsueh Pao/Chinese Journal of Semiconductors, v 29, n 12, December, 2008, p 2393-2397 Language: Chinese25. Pose-varied face recognition based on 3-D face modelHe, Guo-Hui (何国辉)(School of information, Wuyi University); Zhu, Bin; Gan, Jun-Ying Source: Proceedings of the 7th International Conference on Machine Learning and Cybernetics, ICMLC, v 5, Proceedings of the 7th International Conference on Machine Learning and Cybernetics, ICMLC, 2008, p 2987-299226.. Face recognition based on committee machineGan, Jun-Ying (甘俊英)(School of Information, WuYi University); He, Si-Bin Source: Proceedings of the 2008 International Conference on Wavelet Analysis and Pattern Recognition, ICWAPR, v 1, Proceedings of the 2008 International Conference on Wavelet Analysis and Pattern Recognition, ICWAPR, 2008, p 352-35527. Fuzzy radicals and prime fuzzy ideals of ordered semigroupsXie, Xiang-Yun (谢祥云)(Department of Mathematics and Physics, Wuyi University); Tang, Jian Source: Information Sciences, v 178, n 22, Nov 15, 2008, p 4357-437428. Smoothing Newton method for operator equations in Banach spacesLiu, Jing(刘晶) (Department of Mathematics and Physics, Wuyi University)(数理系); Gao, Yan Source: Journal of Applied Mathematics and Computing, v 28, n 1-2, August, 2008, p 447-46029. Vector polarization mode switch mechanism of the vertical-cavity surface-emitting laser with anisotropic optical feedback injectionZhong, Dong-Zhou (钟东洲)(School of Informatics (信息学院), Wuyi University); Cao, Wen-Hua; Wu, Zheng-Mao; Xia, Guang-Qiong Source: Wuli Xuebao/Acta Physica Sinica, v 57, n 3, March, 2008, p 1548-1556 Language: Chinese30. Automatic classification of form features based on neural networks and fourier transform He, Guo-Hui (何国辉)(School of Information, Wuyi University)(信息学院); Xie, Zheng-Mei; Chen, Rong Source: Proceedings of the 7th International Conference on Machine Learning and Cybernetics, ICMLC, v 2, Proceedings of the 7th International Conference on Machine Learning and Cybernetics, ICMLC, 2008, p 1162-116631. Research on face and iris feature recognition based on 2DDCT and kernel fisher discriminant analysisGan, Jun-Ying (甘俊英)(School of Information, Wuyi University); Gao, Jian-Hu; Liu, Jun-Feng Source: Proceedings of the 2008 International Conference on Wavelet Analysis and Pattern Recognition, ICWAPR, v 1, Proceedings of the 2008 International Conference on Wavelet Analysis and Pattern Recognition, ICWAPR, 2008, p 401-40532. Hierarchical freeway control based on the composition of PID controller and CMAC Liang, Xinrong(梁新荣)(School of Information, Wuyi University); Wei, Yanxiu Source: Proceedings of the World Congress on Intelligent Control and Automation (WCICA), Proceedings of the 7th World Congress on Intelligent Control and Automation, WCICA'08, 2008, p 1247-1251 Language: Chinese华南理工大学图书馆情报咨询部2009年2月24日论文收录检索证明(附件二)经美国SCI网络数据库(1997-2009)检索,,五邑大学教师2008年发表的论文被美国《科学引文索引》SCI网络版收录了20篇。

ISSHP检索证明模板

ISSHP检索证明模板

检索证明根据委托方提供的论文目录(2011年),经美国《社会科学及人文科学会议录索引》ISSHP网络数据库检索,华南理工大学化学与化工学院洪艳萍(Hong Yanping)发表的论文被美国《社会科学及人文科学会议录索引》ISSHP收录了1篇(第一作者1篇;详情见数据库网页打印件)。

题录如下:1.Title: Organic Dye Bearing Asymmetric Double Donor-pi-Acceptor Chains forDye-Sensitized Solar Cells Record contains structuresAuthor(s): Hong Yanping; Liao Jin-Yun; Cao Derong; et al.Source: JOURNAL OF ORGANIC CHEMISTRY V olume: 76 Issue: 19 Pages:8015-8021 DOI: 10.1021/jo201057b Published: OCT 7 2011Language: EnglishAddresses:1). S China Univ Technol, Sch Chem & Chem Engn, Guangzhou 510640, Peoples R China2)S China Univ Technol, State Key Lab Luminescent Mat & Devices, Guangzhou 510640, Peoples R China3)Sun Yat Sen Univ, MOE Key Lab Bioinorgan & Synthet Chem, State Key Lab Optoelect Mat & Technol, KLGHEI Environm & Energy Chem,Sch Chem & Chem Eng, Guangzhou 510275, Guangdong, Peoples R China4)Jiangxi Agr Univ, Coll Food Sci & Engn, Nanchang 330045, Peoples R China5)Johannes Gutenberg Univ Mainz, Inst Organ Chem, D-55099 Mainz, Germany特此证明华南理工大学图书馆情报咨询部2012年3月28日。

检索报告参考范例

检索报告参考范例

检索报告参考范例一、我选择的检索课题是:为考研搜集相关信息和资料二、和这个课题相关的信息需求主要有:a)考研要选择学校和专业;b)要选择导师;c)要了解导师的专业方向;d)要知道考试科目;e)要知道考试大纲;f)要知道专业课的参考书;g)考试科目的历年考题;h)各科培训讲义、培训视频等等。

三、相关信息的检索渠道分别是:a)通过查找和浏览各高校的招生简章或者相关学院网站了解专业、导师、专业课参考书信息;b)通过期刊论文数据库查找导师发表的文章或者通过学位论文数据库查找导师指导的学生写的学位论文来了解导师的研究方向;c)用图书馆的数据库查询图书的馆藏并去图书馆借书;d)用电子书数据库查询相关书籍;e)通过搜索引擎或试题数据库查找考试大纲、讲义、历年考题、培训视频等。

四、检索过程及结果如下:a)在搜索引擎(如百度)中输入四川大学,找到四川大学网站,通过上面的链接分别打开招生就业网和研究生院网站,通过浏览查找,发现研究生院的网上有四川大学2012年硕士研究生招生专业目录(/newDetail.aspx?ID=935)b)招生简章上有各学院的专业、专业方向、指导老师等信息,我选择了经济学院的西方经济学专业,导师为张衔老师,考试科目为:英语、政治、数学和经济学原理。

c)通过查找四川大学经济学院网站,找到四川大学2012年硕士研究生入学考试参考书目汇总(/NewsDetail.aspx?id=1660),找到经济学原理的参考书为政治经济学(上册)(朱方明主编四川大学出版社)、西方经济学(李扬主编四川大学出版社)、国际经济学(李天德主编四川大学出版社)d)在百度百科中输入“张衔”,获得了有关张衔老师的介绍资料(/view/688750.htm);在CNKI中以“作者”作为检索点、以“张衔”作为检索词,找到了张衔老师发表的论文45篇,其中以第一作者发表论文29篇,最近两年以第一作者发表的论文如下(只列出2010年以来的4篇):[1]张衔,. 劳动生产率与商品价值量关系的思考[J]. 教学与研究,2011,(7).[2]张衔,谭克诚,. 企业社会责任研究新探[J]. 中国流通经济,2011,(1).[3]张衔,庄志晖,. 另一种经济学:理解资本主义的现代视角——评《理解资本主义:竞争、统制与变革》[J]. 教学与研究,2010,(9).[4]张衔,肖斌,. 企业社会责任的依据与维度[J]. 四川大学学报(哲学社会科学版),2010,(2).e)通过万方学位论文数据库,以“导师”为检索点,以“张衔”为检索词,找到张衔老师指导的硕士学位论文7篇(/Paper.aspx?f=narrow&n=10&q=%E5%BC%A0%E8%A1%94%20%E8%AE%BA%E6%96%87%E7%B1%BB%E5%9E%8B%3AWF_XW%20%E5%AF%BC%E5%B8%88%3A%22%E5%BC%A0%E8%A1%94%22&userid=):1 国有企业劳动者参与剩余分配研究[学位论文] 谌洁,2009 - 四川大学四川大学:政治经济学2 企业组织:基于信任的研究[学位论文] 陈昆,2008 - 四川大学四川大学:政治经济学3 我国企业并购中政府行为扭曲的研究[学位论文] 卢小青,2005 - 四川大学四川大学:政治经济学4 我国地方公债发行研究[学位论文] 付传明,2005 - 四川大学四川大学:政治经济学5 中国经济增长的产业组织分析[学位论文] 付彤杰,2005 - 四川大学四川大学:政治经济学6 虚拟经济与实体经济关系研究[学位论文] 潘妍妍,2005 - 四川大学四川大学:政治经济学7 产品质量与经济增长质量[学位论文] 彭岚,2005 - 四川大学四川大学:政治经济学f)通过四川师范大学图书馆网站首页的书目与外借查询链接,进入四川师范大学图书馆馆藏书目查询系统,以题名和责任者为检索点,分别找到:国际经济学(李天德主编四川大学出版社)索书号:F11-0/4012政治经济学(上册)(朱方明主编四川大学出版社)F0-0/2506/2g)在超星数据库中,进入高级检索界面,以书名和著者为检索点,可以找到:政治经济学(上册)(朱方明主编四川大学出版社)国际经济学(李天德主编四川大学出版社)在书生之家数据库中,进入组合检索界面,以书名和著者为检索点,可以找到:政治经济学(上册)(朱方明主编四川大学出版社)h)西方经济学(李扬主编四川大学出版社)这本书在四川师范大学图书馆、四川大学图书馆都没有,在当当网、卓越网上也没有。

图书馆检索报告范例

图书馆检索报告范例

图书馆检索报告范例第一篇:图书馆检索报告范例检索报告范例检索课题:查找有关“ 计算机在经济管理中的应用”方面的相关资料1、课题分析:①学科范围:计算机科学(TP);经济学(F)②文献类型:(电子期刊、论文、图书)③主题:计算机应用;经济管理④时间:2000-2009 ⑤语种:中文⑥地域:国内外2、选择检索系统①利用“中文科技期刊数据库”查找期刊论文。

②利用“超星数字图书馆”检索电子图书。

③利用“万方数据资源系统”查找学位论文。

3、制定检索策略1)选择检索途径:根据已知条件和主题分析结果,拟选择关键词途径2)检索词:计算机;信息化;经济管理;经济计划;经济计算;3)构建检索式:①计算机 and(经济管理 or 经济计算 or 经济计划)②信息化 and(经济管理 or 经济计算 or 经济计划)4、输入检索式,检索结果输出:①利用“中文科技期刊数据库”查找 87篇期刊论文ϖ作者标题出处ϖ董振宁,融计算机教育于经济管理类专业课教学的研究[J].洛阳大学学报,2007,2 ②利用“ 超星数字图书馆”检索电子图书3 00条。

ϖ赵青平,宏观经济计划管理[M].北京:北京经济学院出版社,1991,9 ③利用“万方数据资源系统”查找学位论文 17篇ϖ高清华,基于计算机的宏观经济预测模型库管理系统研究和应用[D].北京:北京经济信息研究所,2002 ϖ检索结果调整ϖ 1.检索结果过多,且有些关联度不大时,拟采取的措施……..ϖ 2.检索结果过少,且有可能遗漏信息时,拟采取的措施……..5、获取原文资料(要求列出其中一篇的题名、作者、文献来源、文摘等信息)ϖ融计算机教育于经济管理类专业课教学的研究(略)6、对检索过程的总结和评价:是否达到了预期的目的,是否有值得改进的地方(略)第二篇:图书馆信息检索大赛活动主题:图书馆信息检索大赛一、主办单位:重庆医药高等专科学校医学技术系二、指导单位:重庆医药高等专科学校图书馆、医学技术系党团总支三、协助媒体:图书馆公告四、活动目的及原则:促进同学们对图书馆的了解,增强主人翁意识。

案件法律检索报告范文(3篇)

案件法律检索报告范文(3篇)

第1篇一、案件背景(一)案件基本信息案件名称:张三诉李四合同纠纷案原告:张三被告:李四案号:(2021)XX民初XX号法院:XX区人民法院诉讼请求:1. 判令被告支付原告合同约定的款项人民币XX万元;2. 判令被告承担本案诉讼费用。

(二)案件起因原告张三与被告李四于2019年签订了一份《合作协议》,约定双方合作开展某项目。

根据协议约定,被告应于2020年12月31日前支付原告人民币XX万元作为项目启动资金。

然而,被告未按约定支付款项,原告多次催促无果,遂向法院提起诉讼。

二、法律检索目的本次法律检索的主要目的是为了明确本案涉及的法律法规、司法解释以及相关案例,为诉讼代理人提供法律依据,提高诉讼胜诉率。

三、法律检索范围1. 相关法律法规:《中华人民共和国合同法》、《中华人民共和国民事诉讼法》等。

2. 司法解释:《最高人民法院关于审理合同纠纷案件若干问题的解释(一)》等。

3. 相关案例:通过中国裁判文书网、北大法宝等平台检索相关案例。

四、法律检索结果(一)法律法规1. 《中华人民共和国合同法》合同是平等主体的自然人、法人、其他组织之间设立、变更、终止民事权利义务关系的协议。

当事人订立合同,应当具有相应的民事权利能力和民事行为能力。

当事人依法可以委托代理人订立合同。

2. 《中华人民共和国民事诉讼法》第六条民事案件的当事人有权委托代理人进行诉讼。

第七条当事人可以自行和解。

第八条人民法院审理民事案件,应当根据自愿和合法的原则进行调解;调解不成的,应当及时判决。

(二)司法解释1. 《最高人民法院关于审理合同纠纷案件若干问题的解释(一)》第一条当事人之间签订的合同,具有以下情形之一的,应当认定无效:(一)违反法律、行政法规的强制性规定;(二)违反公序良俗;(三)以欺诈、胁迫手段订立合同,损害国家利益;(四)恶意串通,损害国家、集体或者第三人利益;(五)以合法形式掩盖非法目的。

第二条当事人一方不履行合同义务或者履行合同义务不符合约定的,对方可以请求履行、采取补救措施或者赔偿损失。

检索报告格式模板

检索报告格式模板

检索报告格式模板
标题:检索报告。

日期:XXXX年XX月XX日。

1.前言。

本检索报告旨在对XXX(主题)进行分析,为相关领域的研究和实践
提供参考和支持。

本报告主要通过检索XXX(数据库名称)等电子数据库,对国内外相关文献进行检索和分析,并从中筛选出具有较高参考价值的文
献进行总结和分析。

2.检索方法。

本次检索主要使用电子数据库检索方法,以XXX(数据库名称)为主
要检索工具,尝试使用不同的检索词进行检索,确保检索的全面性和准确性。

具体的检索方式以及检索词详见附件1。

3.检索结果。

共检索到XXX篇文献,其中按时间顺序展示前XX篇文献,如下所示:(此处可使用表格、列表等形式展示文献列表)。

4.文献分析。

4.1文献综述。

(此处可对检索到的文献进行综述,如对同一研究方向的文献进行归
纳和总结,或根据不同时间阶段的文献进行分类分析等)。

4.2文献质量评价。

4.3文献主要内容。

(此处可以对选定的几篇文献进行分析和总结,如对目标领域的某个方面进行细致解读,或通过文献的分析来回答特定的问题等)。

5.结论。

(此处列出所有被引用的文献)。

附件1:检索方法和检索词。

(此处可以简单介绍一下使用的数据库以及检索词的设置和使用方法)。

SCI检索证明模板

SCI检索证明模板

SCI检索证明模板
[模板]
科学引文索引(SCI)检索证明
致:XXX机构/单位
我谨向贵单位申请提供一份SCI检索证明,以证明我的研究成果在国际知名学术期刊上发表或被收录。

以下是我个人的相关信息:
姓名:XXX
学号/工号:XXX
研究领域/专业:XXX
在贵单位的工作/学习期间:XXX年-XXX年
我特此请求你们提供的SCI检索证明应包括以下内容:
1.标题列表:列出我发表或被收录的SCI论文的标题,可包括同行评审论文、会议论文等,其中包括以下信息:
-论文标题
-期刊名称/会议名称
-期刊/会议论文编号(如有)
-刊期/会议日期
-DOI(数字对象唯一标识符,如有)
2.期刊/会议论文的详细信息:提供我发表或被收录的SCI论文的详细信息,包括以下内容:
-期刊/会议名称
-期刊/会议论文编号(如有)
-刊期/会议日期
-DOI(数字对象唯一标识符,如有)
-论文标题
-期刊名称
-卷号,期号(如有)
-DOI(数字对象唯一标识符,如有)
4.检索结果截图:提供SCI检索系统检索结果截图,以证明我论文的SCI收录情况。

截图应包括以下信息:
-检索关键词
-检索日期
-论文题目
-期刊/会议名称
-年份/日期
-归属类别(如SCI、SSCI、EI等)。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
相关文档
最新文档