首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 312 毫秒
1.
Social networking sites have gained popularity among all populations, especially young adults. Personality traits were found to be predictive of how individuals use social media. Therefore, this study sought to examine the association between shyness and self-disclosure to a Facebook friend as well as self-disclosure to a face-to-face friend. Two studies were conducted. The first study tested how shyness and social loneliness are related to self-disclosure to a Facebook friend to whom an individual talks most often. The second, follow-up study tested how shyness is related to self-disclosure to a Facebook friend to whom a person speaks to only though Facebook, and also to a face-to-face friend to whom the participants talk only face-to-face and never through Facebook. Participants were college students from a large research university in the United States. Study 1 found a negative association between shyness and self-disclosure to a Facebook friend. Study 2 found a negative association between shyness and self-disclosure to a face-to-face friend. The theoretical implications and limitations are discussed.  相似文献   

2.
This paper considers the nature of medical work and how new telemedicine technologies can be developed to support that work. Telemedicine developers attempt to increase communication and collaboration between medical practitioners and between patients and medics, with the goal being to make medical care and information more easily accessible. However, the focus of telemedicine systems appears to have so far been technology centred, and the work they are trying to support is often ignored. We argue that to develop appropriate telemedicine technologies, it is important to understand the nature of medical work, and to examine the manner in which medical practiceactually occurs. Only then will we be in a position to design appropriate telemedicine technologies to support these activities. Unless designers have an insight into the work itself, new technologies will continue to fail to support what telemedicine effectively aims to promote — collaboration and access to distributed knowledge.  相似文献   

3.
高源  刘佳  刘国华  宋驰 《计算机工程与设计》2004,25(12):2312-2314,2330
网络提供了一个无限的、变化的信息源,使得数据库由传统的静态存储变成了动态的存储,数据变成了流数据,查询变成了连续查询。为了有一个完善的系统来处理大量的数据及查询,提出了一个流查询处理方案,同时满足普通用户和高级用户(有计算机语言基础),并从几个重要的指标来阐述了如何提高查询效率,减少了系统瓶颈,并在原型系统中得到了验证。  相似文献   

4.
Advocates of the World Wide Web speak in glowing terms of its ability to provide greater access to information resources and to promote active reading and learning. Furthermore, students are now encouraged to construct Web pages, using hypertext as an alternative to traditional linear written documents. Although the ability to navigate the Web and to construct Web pages is not without merit, instructors who emphasize these skills are likely to sacrifice the stated objectives of most composition programs: to help students learn to write clear, coherent prose, to read critically and analytically, and to conduct meaningful research.  相似文献   

5.
6.
This study set out to investigate the type of media individuals are more likely to tell self-serving and other-oriented lies, and whether this varied according to the target of the lie. One hundred and fifty participants rated on a likert-point scale how likely they would tell a lie. Participants were more likely to tell self-serving lies to people not well-known to them. They were more likely to tell self-serving lies in email, followed by phone, and finally face-to-face. Participants were more likely to tell other-oriented lies to individuals they felt close to and this did not vary according to the type media. Participants were more likely to tell harsh truths to people not well-known to them via email.  相似文献   

7.
Metadata for anomaly-based security protocol attack deduction   总被引:1,自引:0,他引:1  
Anomaly-based intrusion detection systems (IDS) have been widely recognized for their potential to prevent and reduce damage to information systems. In order to build their profiles and to generate their requisite behavior observations, these systems rely on access to payload data, either in the network or on the host system. With the growing reliance on encryption technology, less and less payload data is available for analysis. In order to accomplish intrusion detection in an encrypted environment, a new data representation must emerge. We present a knowledge engineering approach to allow intrusion detection in an encrypted environment. Our approach relies on gathering and analyzing several forms of metadata relating to session activity of the principals involved and the protocols that they employ. We then apply statistical and pattern recognition methods to the metadata to distinguish between normal and abnormal activity and then to distinguish between legitimate and malicious behavior.  相似文献   

8.
Embedded systems contain several layers of target processing abstraction. These layers include electronic circuit, binary machine code, mnemonic assembly code, and high-level procedural and object-oriented abstractions. Physical and temporal constraints and artifacts within physically embedded systems make it impossible for software engineers to operate at a single layer of processor abstraction. The Luxdbg embedded system debugger exposes these layers to debugger users, and it adds an additional layer, the extension language layer, that allows users to extend both the debugger and its target processor capabilities. Tcl is Luxdbg's extension language. Luxdbg users can apply Tcl to automate interactive debugging steps, to redirect and to interconnect target processor input-output facilities, to schedule multiple processor execution, to log and to react to target processing exceptions, to automate target system testing, and to prototype new debugging features. Inclusion of an extension language like Tcl in a debugger promises additional advantages for distributed debugging, where debuggers can pass extension language expressions across computer networks.  相似文献   

9.
The steps being taken to develop a US software research agenda and to bridge the gap between testing and analysis researchers and practitioners are discussed. The current software reliability crisis and the obstacles to developing more effective testing and analysis technology and transferring it to industry are reviewed. Nine research areas most likely to yield important results are outlined. A major initiative in testing and analysis to provide the needed resources, an organizing framework, and an impetus to broaden and intensify critical testing and analysis research is discussed  相似文献   

10.
Sexual topics are attractive to young adults and this may invoke substantial attention that diverts their thinking regarding sexual intervention to engage learning contents. The aim of this study was to explore students’ mindfulness when learning how to use condoms from watching videos on a social media (i.e., YouTube), and to self-assess their mindfulness, which reflected to their continuance intention to learn about safe sex via social media, mediated by their perception of hedonic and utilitarian values. Data from 132 senior high students were collected and subjected to confirmatory factor analysis and structural equation modeling. The results indicated that the neuroticism personality trait was positively correlated to mindfulness, but openness was negatively correlated to mindfulness. Mindfulness was positively correlated to both hedonic and utilitarian experiential values, and both experiential values were positively correlated to continuance intention to learn about safe sex via social media. The implications of this study suggest that social media may be a useful channel for senior high school students to learn sexual health concepts.  相似文献   

11.
The e-tutor plays a major role in supporting virtual collaborative learning, as he/she supervises learners in collaboratively solving tasks, acquiring new skills, and applying new knowledge. This study is aimed at gaining further insights into the daily support practices of e-tutors. Seventy-six e-tutors from 17 different European countries were invited to fill in an online questionnaire to evaluate collaborative activities, and to answer yes/no-questions regarding their intervention to support these collaborative activities. A cluster analysis identified two profiles of e-tutors according to the importance ascribed to collaborative activities, and to the number of times they intervened to foster such activities. The cluster validation revealed a difference between experienced and inexperienced European e-tutors in their support of online collaboration: e-tutors with experience considered specific cognitive activities to be more important for effective online collaboration, and they seemed to be more familiar in detecting and adequately intervening to avoid dysfunctional social phenomena. Thus, experience in supporting online collaboration seems to be a useful precondition for successfully intervening to stimulate necessary learning activities and to avoid dysfunctional collaborative activities.  相似文献   

12.
Semantic publishing is the use of Web and Semantic Web technologies to enhance the meaning of a published journal article, to facilitate its automated discovery, to enable its linking to semantically related articles, to provide access to data within the article in actionable form, and to facilitate integration of data between articles. Recently, semantic publishing has opened the possibility of a major step forward in the digital publishing world. For this to succeed, new semantic models and visualization tools are required to fully meet the specific needs of authors and publishers. In this article, we introduce the principles and architectures of two new ontologies central to the task of semantic publishing: FaBiO, the FRBR-aligned Bibliographic Ontology, an ontology for recording and publishing bibliographic records of scholarly endeavours on the Semantic Web, and CiTO, the Citation Typing Ontology, an ontology for the characterization of bibliographic citations both factually and rhetorically. We present those two models step by step, in order to emphasise their features and to stress their advantages relative to other pre-existing information models. Finally, we review the uptake of FaBiO and CiTO within the academic and publishing communities.  相似文献   

13.
空间决策支持系统及其应用   总被引:11,自引:1,他引:10  
空间决策支持系统(SDSS)是以地理信息系统(GIS)为基础,以模型库驱动为核心,主要用于解决难以具体描述和模拟且结构较差的空间问题。主要论述空间决策支持系统的发展、功能及其应用。SDSS是以GIS为系统框架的四库结构模型,即数据库、模型库、方法库、知识库及其管理系统。采用空间信息和非空间信息综合集成的数据和模型双驱动方式,进行SDSS的设计。它是具有信息分析与存贮、信息评价与预测及信息决策与管理的面向对象、面向空间和面向用户的决策系统,并提供快速、多层次、高质量的信息服务和辅助决策。  相似文献   

14.
低碳建筑是营造可持续发展未来的关键。本文通过对低碳建筑的全面分析以及对全球知名的设计实例的分析,探讨适应低碳经济时代的建筑发展的方向、目标,指出低碳建设和设计要走向集约型、走向自然、走向效率设计、走向适应性设计、走向循环设计、走向智能化设的发展途径,以及低碳建筑未来的发展方向。  相似文献   

15.
以视频交通流检测和车辆识别系统的设计和实现为引导,对目标检测和目标识别的原理做了介绍,并对图像处理过程中的图像滤波降噪、图像增强、图像分割、特征提取,以及图像目标识别等问题进行了描述。并且进行了视频交通流检测和车辆识别的系统设计和实现。  相似文献   

16.
Abstract

The issue of access to government information in South Africa is clearly a significant one. Ways in which to exploit available infrastructure and expertise to achieve access to this information is becoming an area of considerable debate. The Minister of Posts and Telecommunications has established a human focus as the starting point in the approach to information and communication. People require easy access to information to make the practical decisions that govern their daily lives and enable them to exercise increasing control. Information is also the basis of interaction between communities and their representatives about the many issues being considered at all levels of government. Access to information is critical to development and democracy.  相似文献   

17.
The paper reports on a Department of Culture, Museums and Sport (DCMS) funded project which provided modest amounts of time for teachers to be freed from their classroom teaching to explore the use of information and communications technology (ICT) in their subject teaching, and to meet up together to discuss their use of new technology. The funding was sufficient to provide a day of supply cover for two groups of secondary teachers in different curriculum subjects (history and science) to meet towards the start of the academic year to discuss their use of ICT, a day of supply cover to work on their ideas and interests, and a day to meet together again towards the end of the year to share ideas and experiences.  相似文献   

18.
目前在智能建筑弱电工程中一些工程商及业主往往忽视防雷接地,给工程遗留下安全隐患;鉴于大多从事智能建筑弱电工程的工程商来自与IT行业的转型,不太了解弱电工程防雷接地技术及施工,本文较深入地探讨了智能建筑弱电工程防雷接地设计和施工,供相关工程商及技术人员参考,以起抛砖引玉之效。  相似文献   

19.
在设计师需要的时候提供适时、必要而不冗余的设计资源,是智能辅助设计软件系统最基本的特征。设计师意图的实时捕捉正是提供适时、必要资源的基础。通过研究设计过程中的人机交互行为,建立MultiAgent工作模型, 利用Agent从人机操作交互、上下文内容推理以及设计师的习惯符号化等方面实现设计师意图的捕捉,在此基础上构建一个顺应设计师设计思维发展和工作进程的智能辅助设计平台。  相似文献   

20.
Business processes, operational environment, variability of resources and user needs may change from time to time. An effective workflow management software system must be able to accommodate these changes. The ability to dynamically adapt to changes is a key success factor for workflow management systems. Holonic multi-agent systems (HMS) provide a flexible and reconfigurable architecture to accommodate changes based on dynamic organization and collaboration of autonomous agents. Although HMS provides a potential architecture to accommodate changes, the dynamic organization formed in HMS poses a challenge in the development of a new software development methodology to dynamically compose the services and adapt to changes as needed. This motivates us to study and propose a methodology to design self-adaptive software systems based on the HMS architecture. In this paper, we formulate a workflow adaptation problem (WAP) and propose an interaction mechanism based on contract net protocol (CNP) to find a solution to WAP to compose the services based on HMS. The interaction mechanism relies on a service publication and discovery scheme to find a set of task agents and a set of actor agents to compose the required services in HMS. We propose a viable self-adaptation scheme to reconfigure the agents and the composed services based on cooperation of agents in HMS to accommodate the changes in workflow and capabilities of actors. We propose architecture for our design methodology and present an application scenario to illustrate our idea.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号