首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 503 毫秒
1.
针对利用EXCEL对不同专业学员的不同学科成绩进行诸如累计分数段人数、计算标准差等的分类统计操作时的重复性和繁杂性,本文设计了基于VBA图形界面的解决方案,并给出了实现其主要功能的部分VBA程序。  相似文献   

2.
本文采用EXCEL VBA技术开发了一种通用证书打印系统,无需更改VBA程序,只需简单设置打印参数,即可对各种不同的证书模板进行打印,并且可以在同一个页面上一次打印多个证书。  相似文献   

3.
为解决结构不同的Excel工作表数据的合并汇总,研究了OFFICE2003自带的Visual Basic for Application(简称VBA)语言,用VBA编程实现了异构表的合并汇总,弥补了Excel"数据"主菜单栏的"合计计算"命令的不足。  相似文献   

4.
王燕 《福建电脑》2013,(10):177-179
职场中办公人员经常碰到使用Office套装软件难以处理的工作,通过VBA编程在不同的岗位上,根据需求编写出有用的代码生成各种功能模块,可以帮助他们解决这样的困难,更有助于工作自动化,提高工作效率.Office取得巨大成功的一个重要原因就是VBA,使用VBA可以完成很多事情.  相似文献   

5.
针对企业财务银企对账业务采用不同方法的优缺点,提出了基于VBA的银企电子对账系统,利用VBA技术,通过对企业与银行对账单的读取与比对,输出差异项,帮助企业对账人员快速、准确地生成银行余额调整表.  相似文献   

6.
周洪林 《福建电脑》2011,27(9):180-181
使用VBA可以轻松地进行流水帐管理,通过VBA创建管理界面,用户可以在不同的工作表之间切换,使用vlookup函数、sumif函数、sum函数进行流水帐的计算,使用饼图可以查看利润获取情况。  相似文献   

7.
在一个多工作表的Excel工作簿中,利用VBA编程实现了不同用户按照各自的权限浏览访问其中不同工作表的方法.  相似文献   

8.
VBA集成技术研究   总被引:1,自引:0,他引:1  
首先介绍了VBA产生背景、特性和功能.然后,分析了VBA的系统结构,集成途径,重点剖析了VBA集成工具--APC.最后讲述在VC 6环境下,利用APC(Application Programmability Component)集成VBA环境的关键步骤,并以一个事例说明之.  相似文献   

9.
10月12日,在Microsoft专业开发人员大会上的主题演说中,Microsoft公司主席兼首席执行官比尔·盖茨宣布Microsoft已与Corel公司达成协议,在Corel公司产品中集成MicrosoftVisual Basic for Applications(VBA)。VBA是世界最流行的编程环境,可用于定制开发和扩展应用程序。在另一项宣布中,Corel公司概述了在Corel WordPerfect套件和CorelDRAW等不同产品集成VBA的计划。  相似文献   

10.
用VB和VBA实现动态报表   总被引:6,自引:2,他引:6  
首先讲述了通过VBA完成一个动态报表任务的具体过程 ,然后分析了VBA的特点 ,最后对VBA源代码的获取作了一个简要的介绍。  相似文献   

11.
The occupation of firefighting is one that has repeatedly attracted the research interests of ergonomics. Among the activities encountered are attention to live fires, performing search and rescue of victims, and dealing with emergencies. The scientific literature is reviewed to highlight the investigative models used to contribute to the knowledge base about the ergonomics of firefighting, in particular to establish the multi-variate demands of the job and the attributes and capabilities of operators to cope with these demands. The job requires individuals to be competent in aerobic and anaerobic power and capacity, muscle strength, and have an appropriate body composition. It is still difficult to set down thresholds for values in all the areas in concert. Physiological demands are reflected in metabolic, circulatory, and thermoregulatory responses and hydration status, whilst psychological strain can be partially reflected in heart rate and endocrine measures. Research models have comprised of studying live fires, but more commonly in simulations in training facilities or treadmills and other ergometers. Wearing protective clothing adds to the physiological burden, raising oxygen consumption and body temperature, and reducing the time to fatigue. More sophisticated models of cognitive function compatible with decision-making in a fire-fighting context need to be developed. Recovery methods following a fire-fighting event have focused on accelerating the restoration towards homeostasis. The effectiveness of different recovery strategies is considered, ranging from passive cooling and wearing of cooling jackets to immersions in cold water and combinations of methods. Rehydration is also relevant in securing the safety of firefighters prior to returning for the next event in their work shift.  相似文献   

12.
《Ergonomics》2012,55(9):1317-1329
Hotness, weight, fitting problems etc., have been found to be the chief causes of the unpopularity of industrial safety helmets in tropical environments in developing countries (DC). Some selected safety helmets manufactured in industrialized countries (IC) were modified to provide extra head ventilation and to reduce weight, in order to make them more acceptable to users in hot environments. The modified helmets were subjected to ergonomics evaluation both objectively and subjectively in the laboratory (in simulated tropical conditions) as well as in the field situation. There was evidence that white helmets had some advantages in comfort, viz. reduction of hotness, compared to the other colours, e.g. red, green etc., when worn in the presence of radiant heat in the laboratory. Ventilation holes provided at the top of the shell seemed to reduce the greenhouse effect within the helmet shell which therefore felt less uncomfortable than a fully covered helmet. Even with a small reduction of weight, such as 45 g in helmets weighing about 350g, the difference in weight was perceived by the wearers. In adapting helmets made in IC for use in tropical climates, head ventilation and low weight perception are important aspects in comfort which need to be considered. In addition to low cost, a harness material suitable for sweat absorption is required. Adjustability and sizing to fit 90% of the user population also needs to be considered in the design and manufacture of safety helmets for people in DC.  相似文献   

13.
Abstract This paper examines the proposals for Information Technology (IT) in current curriculum developments in England and Wales and in Scotland. It points out significant differences between the pattern of curriculum developments in these two parts of the United Kingdom, noting in particular, that developments under the heading of The National Curriculum do not apply in Scotland. Nevertheless, IT developments in Scotland have many similarities to those in the rest of the UK and it is from this shared experience that a view is offered as to whether the proposals under The National Curriculum will allow IT to reach its full potential to shape the curriculum and to improve learning and teaching styles. Among the issues considered are the interplay between IT and the curriculum, the impact of IT on learning and teaching and the fundamental question as to whether the system—pupils, teachers, staff management and staff development arrangements—are likely to be able to respond to the National Curriculum proposals.  相似文献   

14.
Improving the network interface performance is needed by the demand of applications with high communication requirements (for example, some multimedia, real-time, and high-performance computing applications), and the availability of network links providing multiple gigabits per second bandwidths that could require many processor cycles for communication tasks. Multicore architectures, the current trend in the microprocessor development to cope with the difficulties to further increase clock frequencies and microarchitecture efficiencies, provide new opportunities to exploit the parallelism available in the nodes for designing efficient communication architectures. Nevertheless, although present OS network stacks include multiple threads that make it possible to execute network tasks concurrently in the kernel, the implementations of packet-based or connection-based parallelism are not trivial as they have to take into account issues related with the cost of synchronization in the access to shared resources and the efficient use of caches. Therefore, a common trend in many recent researches on this topic is to assign network interrupts and the corresponding protocol and network application processing to the same core, as with this affinity scheduling it would be possible to reduce the contention for shared resources and the cache misses. In this paper we propose and analyze several configurations to distribute the network interface among the different cores available in the server. These alternatives have been devised according to the affinity of the corresponding communication tasks with the location (proximity to the memories where the different data structures are stored) and characteristics of the processing core. As this approach uses several cores to accelerate the communication path of a given connection, it can be seen as complementary to those that consider several cores to simultaneously process packets belonging to either the same or different connections. Message passing interface (MPI) workloads and dynamic web servers have been considered as applications to evaluate and compare the communication performance of these alternatives. In our experiments, performed by full-system simulation, improvements of up to 35% in the throughput and up to 23% in the latency have been observed in MPI workloads, and up to 100% in the throughput, up to 500% in the response time, and up to 82% in the requests attended per second have been measured in dynamic web servers.  相似文献   

15.
The term systematic review is used to refer to a specific methodology of research, developed in order to gather and evaluate the available evidence pertaining to a focused topic. It represents a secondary study that depends on primary study results to be accomplished. Several primary studies have been conducted in the field of Software Engineering in the last years, determining an increasing improvement in methodology. However, in most cases software is built with technologies and processes for which developers have insufficient evidence to confirm their suitability, limits, qualities, costs, and inherent risks. Conducting systematic reviews in Software Engineering consists in a major methodological tool to scientifically improve the validity of assertions that can be made in the field and, as a consequence, the reliability degree of the methods that are employed for developing software technologies and supporting software processes. This paper aims at discussing the significance of experimental studies, particularly systematic reviews, and their use in supporting software processes. A template designed to support systematic reviews in Software Engineering is presented, and the development of ontologies to describe knowledge regarding such experimental studies is also introduced.  相似文献   

16.
Due to the large volume of data related to vessels, to manually pore through and to analyze the information in a bid to identify potential maritime threat is tedious, if at all possible. This study aims to enhance maritime situational awareness through the use of computational intelligence techniques in detecting anomalies. A knowledge discovery system based on genetic algorithm termed as GeMASS was proposed and investigated in this research. In the development of GeMASS, a machine learning approach was applied to discover knowledge that is applicable in characterizing maritime security threats. Such knowledge is often implicit in datasets and difficult to discover by human analysts. As the knowledge relevant to maritime security may vary from time to time, GeMASS was specified to learn from streaming data and to generate up-to-date knowledge in a dynamic fashion. Based on the knowledge discovered, the system functions to screen vessels for anomalies in real-time. Traditionally in maritime security studies, datasets that are applied as knowledge sources are related to vessels’ geographical and movement information. This study investigated a novel leverage of multiple data sources, including Automatic Identification System, classification societies, and port management and security systems for the enhancement of maritime security. A prototype of GeMASS was developed and employed as a vehicle to study and demonstrate the functions of the proposed methodology.  相似文献   

17.
The causes and effects of machine breakdowns have frequently been investigated in the past. One popular stream of research studies technical errors in production and analyzes their impact on the inventory policy of the company. In this paper, we show that random shifts in the production rate of a machine, which may occur, for example, due to technical defects, may lead to a reduction in total cost and therewith to an increase in profit. This obvious paradox may lead to situations where it is economically rational for the company to sustain a technically inefficient situation, or even to take measures to intentionally induce a shift in the production rate, for example by damaging the machine on purpose. In this paper, we illustrate this paradox by referring to an existing inventory model, and trace it back to common assumptions made in the literature.  相似文献   

18.
In recent years there has been a call within composition to include sound, among other modes, such as word and image in writing. Some of this call relies on a movement to multimodal composition in order to capture both the richness of rhetorical possibility and the reality of communities of practice, and some is in response to a perceived shift in writing due to digital media tools and environments. Regardless of the impetus for including the auditory realm in the composition classroom, it is important for the field of composition and rhetoric to develop further pedagogies of sound so that students are not simply offered the opportunity to produce diverse texts, but instead, are invited to enter “the playing field.” In order to do this I first explore an approach to teaching auditory rhetoric based on ways of knowing sound from an acoustics and musicology perspective, then I consider a phenomenological approach based on listening, and finally I construct a model of “tuning the sonic playing field” that draws on the literal, material practice of tuning as a metaphor for how sound may be taught in composition. The “tuning” approach to teaching sound draws on attention, embodiment, listening, and negotiation. Rather than simply offering students opportunities to use sound in rhetorically sensitive ways, this final approach asks instructors to become “attuned” to how different auditory epistemologies influence students’ ability to design and compose in sound.  相似文献   

19.
Despite the great strides in information and communication technology (ICT) and the global and far-reaching effects of its spread, women in the Arab Gulf region, in general, and in Oman, in particular, are at a higher risk of being marginalized from today's knowledge-based economy, due to factual findings related to a traditionally male-dominated ICT sector, unequal access to training, the lack of Arabized Internet content and training, and the lack of awareness and policy advocacy, among others. This research aims to provide a gender-sensitive assessment of the ICT space in Oman and the status of women within it, and to develop the seeds of an information base that provides gender analysis of the opportunities and challenges in the ICT space. Survey results show that socio-cultural norms, the innate character issues of Omani females, access and training, and career counseling are mostly the factors that inhibit them from entering and adopting a career in ICT. The analysis and recommendations presented in this research are intended to assist policymakers who are willing and committed to reorienting ICT policy to take account of the needs, aspirations, and constraints of women in Omani society. © 2008 Wiley Periodicals, Inc.  相似文献   

20.
推进“互联网+电子政务”创新,对加快转变政府职能,提高政府服务效率和透明度,便利群众办事创业,进一 步激发市场活力和社会创造力具有重要意义。现阶段我国电子政务发展过程中还存在很多亟待解决的问题,要求我们对电子 政务模式进行不断创新。本文主要针对当前电子政务发展中的问题,提出打造开放服务型政府、打造便民服务型政府、打造廉 洁服务型政府、打造智慧服务型政府四项创新发展模式,以期能够推动我国电子政务的发展。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号