首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
本文对面向对象的数据库(OODB)的性能进行了综合评价,纠正了对于面向对象数据库的一些误解,分析了尚待解决的一些问题,探讨了面向对象数据库发展的一些问题。  相似文献   

2.
为了提高整个远程复制系统的性能,对卷复制系统进行了优化.采用了多线程并行处理技术和流水线技术,设计了一种高性能的日志和位图,采用了网络自适应的复制协议和高效的请求合并策略.实验结果表明,该优化策略减少了应用等待的时间,降低了网络发送的时间开销,合理利用了有限的复制带宽,提高了复制效率.  相似文献   

3.
基于CSCW的OAS的研究   总被引:2,自引:0,他引:2  
本文介绍了CSCW的概念,全面分析了OAS,着重剖析了OAS中的CSCW特征,并推荐了一个基于LotusNotes的解决方案。  相似文献   

4.
提供了城市供水水泵的变压变流量自动控制方法,成功地解决了水源地和地区加压站昼夜之间水流量和水压变化大、难以控制的问题。实现了按需供应的最佳供水方式,大幅度地降低了耗电量,节约了水源,减轻了城市自来水管道的压力。同时也为油泵供油、风机送风等提供了一种可借鉴的控制方法。  相似文献   

5.
潇然 《网友世界》2008,(11):96-96
5月12日下午2点半左右,正在写稿的我,突然感觉左右晃悠了几下,也就是那么5、6秒钟。没经历过地震的我当时就在想,对着电脑时间有点久了,头开始晕晕的了,休息一会再干活吧。刚刚起身,就看到几乎所有同事不约而同地站了起来,在互相说着什么。仔细一听,好像大家都感觉到在晃动,不知道谁喊了一声“地震了”,我才反应过来。我承认我的反应已经太慢了,根本想不到这几秒钟的晃动竟结中国带来了如此重大的损失……  相似文献   

6.
基于神经网络的视频压缩的FPGA实现   总被引:1,自引:0,他引:1  
基于PC的传统的视频压缩实时性较差,给视频的实时压缩和传输带来了困难.针对实时视频压缩传输的难点,提出了在FPGA平台上实现基于神经网络的视频压缩的策略.在建立了基于神经网络的视频压缩系统结构的基础上,给出了神经网络算法的设计,同时完成了非线性的神经元激励函数的线性逼近,并给出了典型FPGA模块的设计,最后通过DSPBuilder和Matlab工具对编写的verilog模块加以验证,给出了实验结果.  相似文献   

7.
徐大华  刘晶 《计算机工程与设计》2007,28(6):1453-1454,1476
阐述了开发临床诊治信息系统的必要性,介绍了工作流的现状,探讨了工作流参考模型.提出了建立在工作流基础上的临床诊治信息系统的开发方法和功能要求.设计了系统的体系结构,探讨了系统开发的技术路线和实现方案,通过对有限状态机和Petri网的性能比较,设计出了基于Petri Net网的临床诊治系统模型.最后通过系统的正常运行验证了设计思路和模型的正确性.  相似文献   

8.
面向瘦客户机的嵌入式操作系统的研究   总被引:1,自引:1,他引:1  
介绍了瘦客户计算的概念,在研究了瘦客户机操作系统要考虑的问题的基础上,分析了Linux作为瘦客户机操作系统的可行性,并对操作系统的内核、函数库、图形用户接口、中文显示和输入等方面进行了详细的分析,提出了相应的解决方法。  相似文献   

9.
余芳  陈琛 《福建电脑》2006,(5):130-131
本文详细介绍了HART协议,在此基础上阐述了设计符合HART协议的的通信软件的设计思想,并给出了程序流程图。  相似文献   

10.
陈虹宇 《福建电脑》2013,(11):147-149
Windows Communication Foundation(WCF)作为一个真正的面向服务的产品,已经改变了面向对象、面向组件等通常的开发模式。分析了WCF与微软其它分布式计算技术的相似和不同之处,然后重点研究了WCF的架构,指出了WCF在构建分布式应用中的优势。最后提出了基于WCF的安全应用,设计了使用密钥加密法的消息层次安全性的安全模型。  相似文献   

11.
诉微分算子CCS(Calclus of Communi-cating Systems)是由英国爱丁堡大学计算机科学系的RobinMilner首先提出的。CCS是一个在数学上完整的理论算子系统,可以作为计算机通讯系统的基本理论模型。我们先简要说明一个CCS的内容。我们所作的工作是在理论上扩充地的CCS,使得我们的CCS更为一般化。在我们的观战看来,RobinMiber的CCS只不过是我们的CCS的一  相似文献   

12.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

13.
Specularities often confound algorithms designed to solve computer vision tasks such as image segmentation, object detection, and tracking. These tasks usually require color image segmentation to partition an image into regions, where each region corresponds to a particular material. Due to discontinuities resulting from shadows and specularities, a single material is often segmented into several sub-regions. In this paper, a specularity detection and removal technique is proposed that requires no camera calibration or other a priori information regarding the scene. The approach specifically addresses detecting and removing specularities in facial images. The image is first processed by the Luminance Multi-Scale Retinex [B.V. Funt, K. Barnard, M. Brockington, V. Cardei, Luminance-Based Multi-Scale Retinex, AIC’97, Kyoto, Japan, May 1997]. Second, potential specularities are detected and a wavefront is generated outwards from the peak of the specularity to its boundary or until a material boundary has been reached. Upon attaining the specularity boundary, the wavefront contracts inwards while coloring in the specularity until the latter no longer exists. The third step is discussed in a companion paper [M.D. Levine, J. Bhattacharyya, Removing shadows, Pattern Recognition Letters, 26 (2005) 251–265] where a method for detecting and removing shadows has also been introduced. The approach involves training Support Vector Machines to identify shadow boundaries based on their boundary properties. The latter are used to identify shadowed regions in the image and then assign to them the color of non-shadow neighbors of the same material as the shadow. Based on these three steps, we show that more meaningful color image segmentations can be achieved by compensating for illumination using the Illumination Compensation Method proposed in this paper. It is also demonstrated that the accuracy of facial skin detection improves significantly when this illumination compensation approach is used. Finally, we show how illumination compensation can increase the accuracy of face recognition.  相似文献   

14.
FTDSS:高容错分布式共享存储机制   总被引:1,自引:1,他引:1  
Computerized data has become critical to the survival of an enterprise. Company must have a strategy for recovering their data should data lose. RAID is a popular mechanism to offer good fault-tolerance. But RAID can notwork well when one more disks fail. In this paper, we present an efficient Network-based high High-Tolerance Dis-tributed Shared Storage mechanism called FTDSS. FTDSS makes use of disk space of node in Network to build alarge pubhc shared storage space. Users can read/write their file from/to the public storage space from node of net-work. Physically File is stored in each node in form of data fragment or XOR verify fragment. Because of redundant XOR fragments, file is available even when two more nodes fail. FTDSS realize distant redundant srorage. At last,this paper use experiment to prove that FTDSS can offer high. fault-tolerance and advanced performance.  相似文献   

15.
The theses of existonness, compoundness, and polyadness are proved. The consistency of these theses with the reversibility principle is founded. Existential foundations of the composition paradigm are constructed. __________ Translated from Kibernetika i Sistemnyi Analiz, No. 2, pp. 3–12, March–April 2008.  相似文献   

16.
《Ergonomics》2012,55(12):1597-1618
Although often suggested as a control measure to alleviate musculoskeletal stresses, the use of mechanical assistance devices (i.e. manipulators) in load transfers has not been extensively studied. Without data describing the biomechanical effects of such devices, justification for decisions regarding implementation of such tools is difficult. An experimental study of two types of mechanical manipulators (articulated arm and overhead hoist) was conducted to determine whether biomechanical stresses, and hence injury risk, would be alleviated. Short distance transfers of loads with moderate mass were performed both manually and with manipulator assistance under a variety of task conditions. Using analysis and output from new dynamic torso models, strength demands at the shoulders and low back, lumbar spine forces, and lumbar muscle antagonism were determined. Strength requirements decreased significantly at both the shoulders and low back when using either manipulator in comparison with similar transfers performed manually. Peak spine compression and anteriorposterior (a-p) shear forces were reduced by about 40% on average, and these reductions were shown to be primarily caused by decreases in hand forces and resultant spinal moments. Two metrics of muscular antagonism were defined, and analysis showed that torso muscle antagonism was largest overall when using the hoist. The results overall suggest that hoist-assisted transfers, although better in reducing spine compression forces, may impose relatively higher demands on coordination and/or stability at extreme heights or with torso twisting motions. The relatively higher strength requirements and spine compression associated with the articulated arm may be a result of the high inertia of the system. Potential benefits of practice and training are discussed, and conclusions regarding implementation of mechanical manipulators are given.  相似文献   

17.
A major challenge in nanoscience is the design of synthetic molecular devices that run autonomously (that is, without externally mediated changes per work-cycle) and are programmable (that is, their behavior can be modified without complete redesign of the device). DNA-based synthetic molecular devices have the advantage of being relatively simple to design and engineer, due to the predictable secondary structure of DNA nanostructures and the well-established biochemistry used to manipulate DNA nanostructures. However, ideally we would like to minimize the use of protein enzymes in the design of a DNA-based synthetic molecular device. We present the design of a class of DNA-based molecular devices using DNAzyme. These DNAzyme-based devices are autonomous, programmable, and further require no protein enzymes. The basic principle involved is inspired by a simple but ingenious molecular device due to Tian et al. [Y. Tian, Y. He, Y. Chen, P. Yin, C. Mao, A DNAzyme that walks processively and autonomously along a one-dimensional track, Angew. Chem. Intl. Ed. 44 (2005) 4355–4358] that used DNAzyme to traverse on a DNA nanostructure, but was not programmable in the sense defined above (it did not execute computations).  相似文献   

18.
19.
基于LDA话题演化研究方法综述   总被引:6,自引:1,他引:5  
现实生活中不断有新话题的产生和旧话题的衰减,同时话题的内容也会随着时间发生变化。自动探测话题随时间的演化越来越受到人们的关注。Latent Dirichlet Allocation模型是近年提出的概率话题模型,已经在话题演化领域得到较为广泛的应用。该文提出了话题演化的两个方面 内容演化和强度演化,总结了基于LDA话题模型的话题演化方法,根据引入时间的不同方式将目前的研究方法分为三类 将时间信息结合到LDA模型、对文本集合后离散和先离散方法。在详细叙述这三种方法的基础上,针对时间粒度、是否在线等多个特征进行了对比,并且简要描述了目前广泛应用的话题演化评测方法。文章最后分析了目前存在的挑战,并且对该研究方向进行了展望。  相似文献   

20.
BOOTSTRAP methodology was initially developed in an ESPRIT project together with European industry. After February 1993, the methodology has been managed and further developed by a European Economic Interest Group, called BOOTSTRAP Institute. BOOTSTRAP methodology version 3.0 was released in September 1997. It is compliant with the ISO/IEC software engineering standard number 15504, the emerging standard on software process assessment. The core of the methodology consists of an assessment model and method. The assessment model of the methodology version 3.0 was updated to align with the ISO 12207 life-cycle and 15504 reference model requirements. In addition to the Process and Capability dimensions, it contains a Technology dimension. The Process dimension contains 33 different processes organised in six clusters: Organisation, Life Cycle Dependent, Management, Support, Customer-Supplier, and Process Related. The Capability dimension consists of six levels, each level consisting of one or more process attributes, adopted from ISO 15504. An assessment is conducted at SPU and project levels. The BOOTSTRAP Institute organises and co-ordinates assessor training and registration scheme. BOOTSTRAP methodology is being used in two European projects: SPAM and PROFES.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号