首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 390 毫秒
1.
以“数据结构”课程为导向,可以指导“C语言程序设计”课程相关内容的应用案例设计。而将“以赛促学”的思想融入计算机大类基础课程中,以成果为导向,分层次学习“C语言程序设计”和“数据结构”,循序渐进,并针对每个知识点的项目案例驱动学习兴趣,可以体现应用型本科学以致用的宗旨。  相似文献   

2.
结合华南农业大学实际情况,探讨了“高教杯”图学大赛对图学教学改革和创新的 推动。从课程体系、教学资源、教学模式、实验室建设以及教师教学科研能力方面进行了阐述, 在课程体系方面构建了基础课程和综合提高课程相结合的工程图学课程体系,在教学资源方面 建设和优化了基于“互联网+”的教学资源,在教学模式方面试行了基于渐进式阶段项目教学学习 模式,在实验室建设方面加强了硬件现代化及开放式学科竞赛实验室建设,在教师能力方面阐 述了大赛对教师教学、科研和教改能力的提升。根据高等学校本科教学质量与教学改革工程的 建设精神,以“高教杯”图学竞赛为契机,将课堂学习和课外实践相结合,不断探索有利于创新 型人才培养的图学教学改革。  相似文献   

3.
“互联网+政务服务”是一个涵盖业务支撑体、基础平台体系、关键保障技术体系、评价考核体系的复杂系统工程,是关系到简政放权、放管结合、优化服务能否落到实处的关键所在。“互联网+政务服务”平台是通过科学的顶层设计,在国家标准的框架内,融入“互联网+”的实践成果,进行创新设计、建设和运营。使平台既有横向部门之间、纵向层级之间的体制机制创新,也有从行政审批服务扩展到公共便民服务的应用创新。  相似文献   

4.
One of the key factors in successful information security management is the effective compliance of security policies and proper integration of “people”, “process” and “technology”. When it comes to the issue of “people”, this effectiveness can be achieved through several mechanisms, one of which is the security awareness training of employees. However, the outcomes should also be measured to see how successful and effective this training has been for the employees.In this study, an information security awareness project is implemented in a company both by training and by subsequent auditing of the effectiveness and success of this training (which focussed on password usage, password quality and compliance of employees with the password policies of the company). The project was conducted in a Turkish company with 2900 white-collar employees. Each employee took information security training including password usage. Also, there were several supporting awareness campaigns such as educational posters, animations and e-messages on the company Intranet, surveys and simple online quizzes. The project was carried out over a 12 month period and three password security strength audits were made during this period. The results were comparatively and statistically analysed. The results show us the effectiveness of the project and the impact of human awareness on the success of information security management programmes in companies. This study gives us some crucial results, facts and methods that can also be used as a guideline for further similar projects.  相似文献   

5.
In function point analysis, fourteen “general systems characteristics” (GSCs) are used to construct a “value adjustment factor” (VAF), with which a basic function point count is adjusted. Although the GSCs and VAF have been criticized on both theoretical and practical grounds, they are used by many practitioners. This paper reports on an empirical investigation into their use and practical value. We conclude that recording the GSCs may be useful for understanding project cost drivers and for comparing similar projects, but the VAF should not be used: doubts about its construction are not balanced by any practical benefit. A new formulation is needed for using the GSCs to explain effort; factors identified here could guide further research.  相似文献   

6.
For each basic language operation we define its “unique” counterpart as being the operation that results in a language whose words can be obtained uniquely through the given operation. These unique operations can arguably be viewed as combined basic operations, placing this work in the popular area of state complexity of combined operations on regular languages. We study the state complexity of unique rational operations and we provide upper bounds and empirical results meant to cast light into this matter. Equally important, we hope to have provided a generic methodology for estimating their state complexity.  相似文献   

7.
The history of “general system theory” is investigated in order to clarify its meanings, vocations, foundations and achievements. It is characterized as the project of a science of the systemic interpretation of the “real”, renamed here “general systemology”. The contexts and modes of its elaboration, publication and implementation are discussed. The paper mostly focuses on the works of its instigator: Ludwig von Bertalanffy. However, general systemology was a collective project: the main contributions of other “systemologists”, from the 1950s until the 1970s, are hence also considered. Its solidarity with the history of the Society for General Systems Research is notably discussed. A reconstruction of the systemological hermeneutics is undertaken on this basis. It finds out the potential systematic unity underlying the diversity of the contributions to this both scientific and philosophical project. Light is thus shed on the actual scope of von Bertalanffy’s works.  相似文献   

8.
Testing software that has a GUI is difficult. Manual testing is costly and error-prone, but recorded test cases frequently “break” due to changes in the GUI. Test cases intended to test business logic must therefore be converted to a less “brittle” form to lengthen their useful lifespan. In this paper, we describe BlackHorse, an approach to doing this that converts a recorded test case to Java code that bypasses the GUI. The approach was implemented within the testing environment of Research In Motion. We describe the design of the toolset and discuss lessons learned during the course of the project.  相似文献   

9.
Today, due to the availability of free remote sensing data, efficient algorithms for image classification and increased connectivity and computing power, together with international policy initiatives, such as the United Nations Programme on Reducing Emissions from Deforestation and Forest Degradation (UN-REDD), more and more countries are investing in their own national forest monitoring schemes. However, tropical forests remain under threat worldwide. Recently, a citizen science project that enables citizens around the globe to be involved in forest monitoring tasks has been proposed, called “ForestWatchers” (www.forestwatchers.net). Its main goal is to allow volunteers (many of them with no scientific training) around the globe, with their own smartphones, tablets and notebooks, review satellite images of forested regions and confirm whether automatic assignments of forested and deforested regions are correct. Inspected images are then sent to a central database where the results are integrated to generate up-to-date deforestation maps. This approach offers a low-cost way to both strengthen the scientific infrastructure and engage members of the public in science. Here, we describe the methods developed within the scope of the ForestWatchers project to assess the volunteers’ performance. These tools have been evaluated with data of two of the project’s preliminary tasks. The first, called “BestTile”, asks volunteers to select which of several images of the same area has the least cloud cover, while in the second, called “Deforestation”, volunteers draw polygons on satellite images delimiting areas they believe have been deforested. The results from more than 500 volunteers show that using simple statistical tests, it is possible to achieve a triple goal: to increase the overall efficiency of the data collecting tasks by reducing the required number of volunteers per task, to identify malicious behavior and outliers, and to motivate volunteers to continue their contributions.  相似文献   

10.
A brief review of computer selection methods indicates that benchmark testing is the most common technique for computer selection. A model for selecting a set of programs comprising a benchmark is then constructed step-by-step up to a “basic model”. The “basic” model is altered and expanded up to a “global” model. The paper summarizes advantages of the model and cites some experimental results.  相似文献   

11.
Based on the development of the use of websites by brands, the purpose of this paper is to identify and describe different groups of luxury brands bearing in mind the persuasiveness of their websites (informativeness, usability, credibility, inspiration, involvement and reciprocity). The data for this study were collected from 197 luxury websites through content analysis methodology. Then, latent class cluster analysis was employed to identify the segments obtained in this study. The results confirm the existence of three segments of luxury brands according to website persuasiveness: “exclusive websites”, “transparent and accessible websites” and “old-fashioned websites”. This study helps luxury brand managers to evaluate the degree of persuasiveness of each group, determines how attractive the websites in each group are and suggests the measures necessary to improve their websites.  相似文献   

12.
This article explores the major software systems used by MOSIS since its inception in 1980, developed by the author. The MOSIS project (Metal Oxide Silicon Implementation System) has served the nation by turning VLSI (microchip) designs, submitted over e-mail, into fully packaged chips, sent back to the user via US mail. Before MOSIS, chip designers were faced with a prohibitive fabrication expense, and the daunting tasks of augmenting their designs with various tedious geometries and coordinating the various vendors ranging from mask making for the fabrication of silicon to packaging. The major innovation has been the “sharing of silicon”. The various “packers” that implement silicon sharing are explored, as well as the other requisite software.  相似文献   

13.
CDIO的核心理念是“做中学”和“项目化教学”,基于CDIO的工程理念展开对计算机专业人才的培养和学科发展的研究越来越受到教育者和研究者的关注。因此,本文基于知网的可视化分析能力通过关键词索引探究近十年来在CDIO理念引导下的计算机学科专业研究趋势与发展方向。  相似文献   

14.
15.
Over the years, safety in maritime industries has been reinforced by many state-of-the-art technologies. However, the accident rate hasn’t dropped significantly with the advanced technology onboard. The main cause of this phenomenon is human errors which drive researchers to study human factors in the maritime domain. One of the key factors that contribute to human performance is their mental states such as cognitive workload and stress. In this paper, we propose and implement an Electroencephalogram (EEG)-based psychophysiological evaluation system to be used in maritime virtual simulators for monitoring, training and assessing the seafarers. The system includes an EEG processing part, visualization part, and an evaluation part. By using the processing part of the system, different brain states including cognitive workload and stress can be identified from the raw EEG data recorded during maritime exercises in the simulator. By using the visualization part, the identified brain states, raw EEG signals, and videos recorded during the maritime exercises can be synchronized and displayed together. By using the evaluation part of the system, an indicative recommendation on “pass”, “retrain”, or “fail” of the seafarers’ performance can be obtained based on the EEG-based cognitive workload and stress recognition. Detailed analysis of the demanding events in the maritime tasks is provided by the system for each seafarer that could be used to improve their training. A case study is presented using the proposed system. EEG data from 4 pilots were recorded when they were performing maritime tasks in the simulator. The data are processed and evaluated. The results show that one pilot gets a “pass” recommendation, one pilot gets a “retrain” recommendation, and the other two get “fail” results regarding their performance in the simulator.  相似文献   

16.
面向大数据的海云数据系统关键技术研究   总被引:1,自引:0,他引:1  
由于数据产生成本的急速下降,人类社会产生的数据不仅以指数级别增长,而且数据的结构变得日趋复杂,使得传统的数据分析技术遇到了极大的挑战.如何对大量复杂数据进行分析和挖掘,从中提取有价值的知识用于决策,已经成为产业界和学术界的广泛关注问题,在一些国家已上升到国家战略层面.本文介绍了大数据的基本概念、特征和面临的科学问题,总结了中国科学院战略性先导科技专项“面向感知中国的新一代信息技术研究”中“海云数据系统关键技术研究与系统研制”课题的一些先期成果,为开发大数据管理、分析和挖掘系统提供一些参考依据.  相似文献   

17.
Formal Methods in System Design - Due to the high complexity of translating linear temporal logic (LTL) to deterministic automata, several forms of “restricted” nondeterminism have been...  相似文献   

18.
Given a rewriting system G (its alphabet, the set of productions and the axiom) one can define the language of G by
  1. taking out of all strings generated by G only those which are over a distinguished subalphabet of G, or
  2. translating the set of all strings generated by G by a fixed homomorphism.
The “trade-offs” between these two mechanisms for defining languages are discussed for both “parallel” rewriting systems from the developmental systems hierarchy and “sequential” rewriting systems from the Chomsky hierarchy.  相似文献   

19.
Enterprise Resource Planning (ERP) systems offer standard functionality that has to be configured and customized by a specific company depending on its own requirements. A consistent alignment is therefore an essential success factor of ERP projects. For this purpose, we propose an operational “Risk Factor Driven” approach that allows for the mitigation and monitoring of what we call the “Misalignment Risk”. This risk corresponds to the probability of the occurrence of misalignment, associated with the loss due to misalignment if it occurs. The mitigation aims to identify and treat the “Misalignment Risk Factors” (MRFs) influencing the Misalignment Risk. We suggest four steps to deal with MRFs, based on: (i) their classification according to the ERP project stages, (ii) the definition of their mutual influences, (iii) variables detailing them and (iv) related management practices to treat them. The monitoring assesses the evolution of the Misalignment Risk. From an academic point of view, the approach constitutes real progress for the alignment problem solving. By managing it as a risk, it guides researchers in the understanding of this major issue. The approach furthermore provides effective support and guidance to companies implementing ERP systems. It is illustrated through the application to the ERP project of a Small and Medium Enterprise. This application shows that it can be used in contexts where the ERP project expertise level is low.  相似文献   

20.
提出了UNIX系统内目录偏移量缓冲和最近文件名翻译快速缓冲等文件名翻译的两种缓冲机制,使原有的文件名翻译算法“namei()”约1/4时间都花在名字翻译程序的执行上的缺陷得以改进。提高了相应进程的执行效率,增强了适应能力。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号