首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
Advocates of the World Wide Web speak in glowing terms of its ability to provide greater access to information resources and to promote active reading and learning. Furthermore, students are now encouraged to construct Web pages, using hypertext as an alternative to traditional linear written documents. Although the ability to navigate the Web and to construct Web pages is not without merit, instructors who emphasize these skills are likely to sacrifice the stated objectives of most composition programs: to help students learn to write clear, coherent prose, to read critically and analytically, and to conduct meaningful research.  相似文献   

2.
Flooding causes more financial and physical destruction in the United States than any other natural hazard. To stem flood losses, local floodplain managers make decisions on how best to mitigate, prepare, and respond to flood hazards. Using quantitative and qualitative data gathered from interviews with 200 floodplain managers in the United States, this study explores the extent to which local communities are concerned about floods, perceptions of communities' ability to mitigate, prepare, and respond to floods, as well as the factors contributing to communities' perceptions of their ability to mitigate, prepare, and respond to floods. Findings indicate that floodplain managers generally perceived their communities to be very or somewhat concerned and prepared for floods. Floodplain managers also perceived their communities' ability to mitigate and respond to floods as being good. Lastly, the findings show that participation in the Federal Emergency Management Agency's Community Rating System was positively associated with floodplain managers' perceptions of their community's ability to mitigate, prepare, and respond to floods.  相似文献   

3.
This research uses the boundary cutting, spatial-temporal segmentation, block based searching, and gray scale histogram technique to extract the eyes, nose, and mouth images. In this research, gray scale histograms are used to salient the eyes, nose, and mouth features. A spatial-temporal template is designed to slide the eyes, nose, and mouth images to extract the eyes, nose, and mouth image. In order to obtain the best result, the generic algorithm and spatial region partition techniques need to be used to remove noise and to precisely bind the object region to obtain a more accurate result.  相似文献   

4.
低碳建筑是营造可持续发展未来的关键。本文通过对低碳建筑的全面分析以及对全球知名的设计实例的分析,探讨适应低碳经济时代的建筑发展的方向、目标,指出低碳建设和设计要走向集约型、走向自然、走向效率设计、走向适应性设计、走向循环设计、走向智能化设的发展途径,以及低碳建筑未来的发展方向。  相似文献   

5.
Embedded systems contain several layers of target processing abstraction. These layers include electronic circuit, binary machine code, mnemonic assembly code, and high-level procedural and object-oriented abstractions. Physical and temporal constraints and artifacts within physically embedded systems make it impossible for software engineers to operate at a single layer of processor abstraction. The Luxdbg embedded system debugger exposes these layers to debugger users, and it adds an additional layer, the extension language layer, that allows users to extend both the debugger and its target processor capabilities. Tcl is Luxdbg's extension language. Luxdbg users can apply Tcl to automate interactive debugging steps, to redirect and to interconnect target processor input-output facilities, to schedule multiple processor execution, to log and to react to target processing exceptions, to automate target system testing, and to prototype new debugging features. Inclusion of an extension language like Tcl in a debugger promises additional advantages for distributed debugging, where debuggers can pass extension language expressions across computer networks.  相似文献   

6.
《Computer Networks》2007,51(10):2645-2676
As ICT services are becoming more ubiquitous and mobile and access technologies grow to be more heterogeneous and complex, we are witnessing the increasing importance of two related needs: (i) users need to be able to configure and personalize their services with minimal effort; (ii) operators desire to engineer and manage their networks easily and efficiently, limiting human agency as far as possible. We propose a possible solution to reach these goals. Our vision, developed in the so-called Simplicity project, is based on a personalization device, which, together with a brokerage framework, offers transparent service configuration and runtime adaptation, according to user preferences and computing/networking context conditions. The capabilities of this framework can be exploited: (i) on the user side, to personalize services, to improve the portability of services over heterogeneous terminals and devices, to adapt services to available networking and terminal technologies; (ii) on the network side, to give operators more powerful tools to define new solutions for distributed, technology-independent, self-organizing, autonomic networking systems. Such systems could be designed so as to be able to react autonomously to changing contexts and environments.In this paper, we first describe the main aspects of the Simplicity solution. We then want to show that our approach is indeed viable. To prove this point, we present an application which exploits the capabilities of the Simplicity system: a mechanism to drive mobile users towards the most appropriate point of access to the network, taking into account both user preferences and network context. We use simulation to evaluate the performance of this procedure in a specific case study, where the aim is to balance the load in an 802.11b access network scenario. The numerical results show the effectiveness of the proposed procedure when compared to a legacy scenario and to another solution from literature.To give ample proof of the feasibility of our solution, we also designed and implemented a real prototype. The prototype enables not only the load to be balanced among different 802.11 access points, but also network and application services to be differentiated as a function of user profiles and network load. The main aspects of this prototype are presented in this paper.  相似文献   

7.
Semantic publishing is the use of Web and Semantic Web technologies to enhance the meaning of a published journal article, to facilitate its automated discovery, to enable its linking to semantically related articles, to provide access to data within the article in actionable form, and to facilitate integration of data between articles. Recently, semantic publishing has opened the possibility of a major step forward in the digital publishing world. For this to succeed, new semantic models and visualization tools are required to fully meet the specific needs of authors and publishers. In this article, we introduce the principles and architectures of two new ontologies central to the task of semantic publishing: FaBiO, the FRBR-aligned Bibliographic Ontology, an ontology for recording and publishing bibliographic records of scholarly endeavours on the Semantic Web, and CiTO, the Citation Typing Ontology, an ontology for the characterization of bibliographic citations both factually and rhetorically. We present those two models step by step, in order to emphasise their features and to stress their advantages relative to other pre-existing information models. Finally, we review the uptake of FaBiO and CiTO within the academic and publishing communities.  相似文献   

8.
We provide a retrospective account of how a generic event notification service called Elvin and a suite of simple client applications: CoffeeBiff, Tickertape and Tickerchat, came to be used within our organisation to support awareness and interaction. After overviewing Elvin and its clients, we outline various experiences from data collated across two studies where Elvin and its clients have been used to augment the workaday world to support interaction, to make digital actions visible, to make physical actions available beyond the location of action, and to support content and socially based information filtering. We suggest there are both functional and technical reasons for why Elvin works for enabling awareness and interaction. Functionally, it provides a way to produce, gather and redistribute information from everyday activities (via Elvin) and to give that information a perceptible form (via the various clients) that can be publicly available and accessible as a resource for awareness. The integration of lightweight chat facilities with these information sources enables awareness to easily flow into interaction, starting to re-connect bodies to actions, and starting to approximate the easy flow of interaction that happens when we are co-located. Technically, the conceptual simplicity of the Elvin notification, the wide availability of its APIs, and the generic functionality of its clients, especially Tickertape, have made the use of the service appealing to developers and users for a wide range of uses.  相似文献   

9.
王娜  王亚弟  汪斌强 《计算机工程》2006,32(14):122-124
目前安全协议的设计方法存在方法抽象、适用范围小、复杂及不系统的特点。基于此,文章提出了一种设计方法,通过组合协议类型及安全属性的实现模块构成初始协议,再根据协议要求完善初始协议形成最终协议。方法适用于全部安全协议,便于协议设计人员操作,而且更易实现安全协议的设计自动化。最后,以端到端的密钥建立协议为例,对此方法进行了说明。  相似文献   

10.
Electronic markets rely on database technology for efficient search for products, services, customers, and trading partners. Yet, database technology was not designed to build electronic markets, and it often fails to fully support market search activities. Market search often requires browsing and incremental search, attribute and constraint tradeoffs, approximate matches, and incorporation of user and task characteristics into searches. None of these requirements are supported directly by the database technology. Three major extensions to database technology are proposed to effectively support electronic markets. First, incremental search techniques are proposed to allow users to browse databases, and to move from solution to solution by following attribute and constraint tradeoffs. These techniques require systems to have some knowledge of similarity, distance, direction, and tradeoffs. Second, typing and stereotyping techniques are introduced to allow users to relate task and user characteristics to product attributes. These techniques require integration of typing systems with database searches. Third, a comprehensive search strategy is developed that combines incremental search and stereotyping techniques by utilizing product, task, and user ontologies.  相似文献   

11.
The author identifies four guiding principles which have come into play in this work of creating information systems and tools to support information systems. The first principle, open-eyes, is used to characterize information systems that remain open to new information, and consequently can compensate for changes in their mission or inaccuracies in their execution of that mission. The second principle involves abstraction levels, which in information systems are similar to differentiation in calculus. They are used to study the changes within a group of heterogeneous objects, with respect to an object type classification, so as to understand and make use of their patterns and ultimately to control the new objects of each type. The third principle, layered architecture, is used to identify a pattern of successive reimplementations of a set of functions, so as to isolate specific environmentally oriented issues. The fourth principle involves relationships, used to define associations between objects and constraints on those associations and to provide access to objects based on their associations. Reference is made to several specific projects which revealed the operation of these principles  相似文献   

12.
在计算机多媒体教室的电脑系统维护管理中,如何避免学生的误操作,防止其对电脑系统配置的非法修改,杜 绝学生上课打电脑游戏、非法文件共享等违纪现象,维持正常的教学秩序,保证任课老师的教学过程顺利进行,是机房管理员 的首要任务,也是机房日常维护的难点之一。本文旨在为电脑教室提供综合管理功能,对机房计算机系统统一配置,实现快 捷、高效的管理,以减轻机房管理员的工作负担,保证机房系统安全,维持电脑室正常的课堂纪律和教学秩序。  相似文献   

13.
在记忆成为常态,而遗忘成为例外的大数据时代,欧盟数据改革提出的“被遗忘和删除权”备受各方关注和争议.本文通过探讨被遗忘权对个人信息保护的重要意义,研究欧盟《一般数据保护条例》草案中“被遗忘和删除权”的具体内容,分析我国现阶段删除权的法律现状及缺陷,提出大数据环境下我国被遗忘权的立法构建,以期提高个人信息在线环境的安全性.  相似文献   

14.
对视景仿真软件Vega和DI—GUY人体仿真软件进行了介绍,从工程应用的角度,阐述如何实现虚拟人在场景中的漫游,将DI—GUY人体模型做了适当的修改,提出了一种基于空间定位装置的虚拟入手臂控制方法,给出了方法的具体实现步骤,以及空间定位装置对于本系统的具体应用方法,给出了如何设计手部的碰撞检测的方法,以便进行操作动作的训练,选取要操作的对象物,并对如何应用数据手套形成手部操作训练动作进行了介绍。  相似文献   

15.
Our living environments are being gradually occupied with an abundant number of digital objects that have networking and computing capabilities. After these devices are plugged into a network, they initially advertise their presence and capabilities in the form of services so that they can be discovered and, if desired, exploited by the user or other networked devices. With the increasing number of these devices attached to the network, the complexity to configure and control them increases, which may lead to major processing and communication overhead. Hence, the devices are no longer expected to just act as primitive stand-alone appliances that only provide the facilities and services to the user they are designed for, but also offer complex services that emerge from unique combinations of devices. This creates the necessity for these devices to be equipped with some sort of intelligence and self-awareness to enable them to be self-configuring and self-programming. However, with this "smart evolution", the cognitive load to configure and control such spaces becomes immense. One way to relieve this load is by employing artificial intelligence (AI) techniques to create an intelligent "presence" where the system will be able to recognize the users and autonomously program the environment to be energy efficient and responsive to the user's needs and behaviours. These AI mechanisms should be embedded in the user's environments and should operate in a non-intrusive manner. This paper will show how computational intelligence (CI), which is an emerging domain of AI, could be employed and embedded in our living spaces to help such environments to be more energy efficient, intelligent, adaptive and convenient to the users.  相似文献   

16.
While acknowledging the many benefits that cloud computing solutions bring to the world, it is important to note that recent research and studies of these technologies have identified a myriad of potential governance, risk, and compliance (GRC) issues. While industry clearly acknowledges their existence and seeks to them as much as possible, timing-wise it is still well before the legal framework has been put in place to adequately protect and adequately respond to these new and differing global challenges.

This paper seeks to inform the potential cloud adopter, not only of the perceived great technological benefit, but to also bring to light the potential security, privacy, and related GRC issues which will need to be prioritized, managed, and mitigated before full implementation occurs.  相似文献   

17.
We are working to make vehicle teleoperation accessible to all users, novices and experts alike. In our research, we are developing a new control model for teleoperation, sensor-fusion displays and a suite of remote driving tools. Our goal is to build a framework which enables humans and robots to communicate, to exchange ideas and to resolve differences. In short, to develop systems in which humans and robots work together and jointly solve problems.  相似文献   

18.
网络图计算一直以来是计算机软件资格与水平考试中信息系统集成项目管理工程师和项目管理师考试的重点,也是考生的难点。对此,给出了一种口诀法,逐步引导考生理解术语、学会做图、学会找出关键路径、学会计算,最后给出了一个运用口诀法解题的案例。  相似文献   

19.
遗传规划算法在化合物设计、筛选研究中的应用   总被引:2,自引:0,他引:2  
采用计算机科学中新兴的遗传规划算法思想,结合化学物质的本质特点,运用进化操作来实现化合物的合成设计和筛选。文中针对算法运用讨论了函数集、终止集问题,通过计算元素组成的字符串的化合价的结果来确定适应度函数,既符合化学学科的本质规律,又满足了算法的要求。通过复制、交换和突变操作,经过多代次的进化终止,取得了满意的结果。文章还针对其实用性,从化学本质出发,提出了建议和研究方向。可以说本文是遗传规划在化学化合物合成筛选中运用的成功探索,同时也为进一步研究打下了坚实的基础。  相似文献   

20.
The convergence of mobile communications and handheld computers offers the opportunity to develop technology that will assist individuals and groups to learn anytime, anywhere. We describe the theory-informed design, implementation and evaluation of a handheld learning device. It is intended to support children to capture everyday events such as images, notes and sounds, to relate them to web-based learning resources, to organise these into a visual knowledge map, and to share them with other learners and teachers. A working prototype system, for children aged 9–11, is discussed and evaluated, as an exemplar of personal mobile systems for life-long learning.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号