首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
The ways to program the respond to the input equipment in Visual C++ program language are introduced in this paper. It also presents all the examples for keyboard, mouse, and joystick.  相似文献   

2.
3.
The -algebras are interesting algebraic structures. They were introduced by Esteva, Godo, and Montagna. These algebras are closely related to the well-known MV-algebras and -algebras. They have two sets of operations and reduct to one set is an MV-algebra and to the other one is a -algebra.Other important reducts of -algebras are so-called P-algebras (an MV-algebras enriched with product connective) and -algebras (-algebras with additional involutive negation).The definition of -algebras is based on its MV-algabraic reduct and the additional identities. In this paper we present how to base this definition on the other reducts we mention above. We present minimal sets of conditions which has to be added to the defining conditions of those reducts in order to obtain -algebras.  相似文献   

4.
One suggested method is to adjoin a quadratic form in the sensitivity vector to the integrand of the cost functional and to find the feedback, linear in the state and sensitivity vectors, which minimizes the augmented cost functional.

Several authors have incorrectly assumed that the augmented system can be treated as another optimal regulator problem. In this paper it is shown that the problem, when correctly formulated, has no solution in the sense that there can be no finite state-independent feedback matrices which will satisfy the necessary conditions for an optimum.  相似文献   

5.
The ways to program the respond to input equipmentin Borland C++Builder program language are introduced in thispaper. It also presents all the examples for keyboard, mouse,and joyatick .  相似文献   

6.
7.
8.
This paper mainly analyzes the algorithms and technology of congestion avoiding/controlling of active queue management that is applicable to the network processor, and discusses their performance criteria and technology features thoroughly. Then it proposes the method to protect and optimize TCP bandwidth by adopting several measures to the Internet touters, for example, active queue management, fair queue management, and dropping the packets. As a result, the danger of congestion collapse is decreased in a certain extent. Therefore, in order to alleviate the congestion of current Internet, an effective congestion avoiding/controlling strategy must be adopted.  相似文献   

9.
Geometer Rachel Fletcher introduces the Geometer’s Angle, a column in the Nexus Network Journal dedicated to geometrical constructions, the procedures for drawing them, their use, significance and symbolism.  相似文献   

10.
Knowledge on how workers perceive and associate their postures for trunk flexion with respect to linguistic categories, could allow for the development of simple and valid instruments for self-assessment and for more effective postural training. Considerable time and expense could be saved if reliable self-assessments were available. This study describes the anterior flexion angles of the trunk adopted by individuals according to linguistic categories (mild, moderate and severe) and registered by photograph. The postures were compared with postural recording protocols. Twenty sedentary individuals (10 male and 10 female) and 12 industrial female workers (6 healthy and 6 low back sufferers) participated. Subjects were capable of discriminating linguistic postural categories, since they adopted different trunk postures when distinct categories were requested (p< 0.0001). However, the individual variability was high for each category estimated. This could explain, at least in part, the low level of agreement between self-assessment and observational studies.  相似文献   

11.
This review introduces the concepts of gender bias and technology in education. It discusses the interaction between the two in the educational setting and the effects this interaction may have on teachers, students and materials used in the classroom. It is argued that areas in the educational setting that have been focused on as materials and practices that are biased have also been translated into the use of educational technology that is biased. This review makes the point that biases that have been pointed out and studied within the educational system have not been solved by the use of technology (as some had hoped). In fact, the biases have simply been converted into a new form and may have actually served to undo some the bias-eliminating practices that had been starting to take place in classrooms. Implications and suggestions for change are discussed.  相似文献   

12.
In actual manufacturing process, many weldments have large dimensions and complex shapes, and they are usually assembled through a multi-pass welding process. The joints of the tube–sphere intersection (J-groove joints) are complex. This paper presents a complete solution in determining the welding paths based on a developed J-groove joint robot. Generating complex welding paths in terms of cubic B-spline curves is made easy using path control modules such as interpolation module and local modification module. The point inversion module using particle swarm optimization is introduced to address the partition of path, which is required of the welding process. Experimental results show that higher efficiency as well as better weld quality can be achieved, indicating a promising and practical use of the robot for welding applications, which is rarely available at present.  相似文献   

13.
Online commerce and communication has long been hampered by fears about consumer security and privacy combined with a lack of standards and high costs for technologies that attempt to address these concerns. To resolve these issues, a new industry-wide collaboration was launched earlier this year. Tasking itself with the development of an open reference architecture by leveraging existing open standards for the universal adoption of strong authentication technology across all networks, the Open Authentication Reference Architecture (OATH) group aims to develop authentication, giving customers the confidence to conduct commerce online.  相似文献   

14.
《Card Technology Today》2004,16(5):10-11
The wave of bank mergers and acquisitions that swept the financial services industry during the late 1990s have as yet unrealised promises of better value for money. With the financial sector's economic downturn biting into profits and bringing costs under the microscope more than ever before, banks need to reassess their card payments processing strategies in order to eliminate as much unnecessary expenditure as possible.  相似文献   

15.
In the last couple of years, the wireless LAN market has gained great momentum and the deployment of WLAN equipment in public access places, SMEs, SoHos and residential areas is shortly expected to become widespread. The fact that WLANs can be more cost effective than wired LANs, and that it provides access to a network anywhere in the building, makes this technology an excellent solution to improve a company’s efficiency and customer satisfaction.Visit www.compseconline.com for the latest computer security industry news  相似文献   

16.
17.
This article presents a conceptualisation of technologies as simple, ambient forms. By avoiding the tendency to solve problems and by being open to interaction that emerges through repetition and flow, we argue that technology can offer more for people than functionality. When the user is given freedom to discover control without burdensome cognitive demands and the fear of failure, even everyday technologies can arouse curiosity and thus reveal untapped ability. What is unique about our work is its therapeutic application as a medium for engaging the most hard to reach children on the autism spectrum. Our theoretical foundations are drawn from the human–computer interaction paradigm of tangible interaction. This is of interest to us as a framework for the study of the physical and sensory manipulation of information. For children with cognitive and developmental delays, discovering a close match between physical control and digital response has proved both rewarding and motivating. The significance of this is illustrated through a range of studies undertaken with children with autism spectrum disorders. These include a mixed group attending a holiday club, a study that introduced keyboard activities to children with poor receptive communication and a case study using an ordinary microphone. The research captures emergent, exploratory interaction with a software application called ReacTickles. The case study uses a specifically customised video coding technique to analyse idiosyncratic interactions that demonstrate the impact of simple, playful interaction on self-esteem and creativity.  相似文献   

18.
The Ouroboros Model offers a novel cognitive architecture with an algorithmic backbone of iterative and self-referential processing. All memory content is organized into meaningful pieces of data, i.e.,chunks and schemata, which are laid down as a kind of snapshots of all activations at a relevant point in time. This entails a grainy structure of memory content. Whereas a core process of "consumption" analysis can naturally be defined taking advantage of this parcellation, it necessitates interpolation for fine nuances, especially for the representation of intermediate values during transients. It is argued that, in the vertebrate brain, essential interpolation functionality is provided by the cerebellum. Findings concerning movement control and perception as well as the involvement of the cerebellum in more abstract, cognitive, tasks can be interpreted as reflecting a function of the cerebellum as a co-processor, i.e., a general-purpose interpolator. The cerebellum is thus boosting representations in cerebral cortex areas, which are reciprocally connected with cerebellar cortex areas. In this paper, it is sketched how the new "interpolator hypothesis" can explain manifold observations, effectively subsuming previous theories of the function of the cerebellum. Directly relating to the BICA challenge, a general-purpose interpolator is postulated as an efficient device providing fine-grained resolution for the representation of diverse content, potentially useful in any cognitive architecture.  相似文献   

19.
In this paper we give a new and simple construction for the cyclic [(q m ? 1)/(q ? 1), q m?1, q m?2(q? 1)]—difference sets (q = p γ is a prime power) using the methods of coding theory. The construction is such that, in the case q = 2, the 2-ranks of both the incidence matrix and its complementary matrix are easily determined.  相似文献   

20.
创新整合点①利用科大讯飞畅言智慧课堂及大数据精准学情库测评数据,了解学生阶段性学习的薄弱点和易错点,编写有针对性的教学设计和教学PPT,以数据驱动的方式实现精准教学。②使用腾讯翻译君、讯飞听见、讯飞智能输入法等人工智能(AI)软件,构建学习支架,鼓励学生积极尝试,帮助不同掌握程度的学生均能参与课堂活动,促进课堂公平有质量发展。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号