首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
本文在开源(Open Source)项目Jakarta Lucene的基础上,结合多种开源文档格式分析工具,设计和实现了一种可扩展的全文检索框架,该框架可高效地对XML、HTML、MS Word、PDF等格式的文档进行全文检索.整个框架完全基于开源工具包,可以有效地对信息系统的开发进行支持.  相似文献   

2.
jini 《程序员》2005,(7):31-32
1999年,IBM与Novell签订合作协议,成功地提供电子商务的解决方案给予原先使用NetWare的用户。同年更是推出了WebSphere Application Server3.0,并且推出WebSphere Studio与VisualAge for Java让工程师可以快速开发相关的程序。2001年,IBM更是宣布将应用服务器、开发工具整合在一起,与DB2、Tivoli及Lotus结合成为一套共通解决方案,如今、IBM更是并入了Rational Rose(UML tools)让开发流程更是完整化。  相似文献   

3.
基于XML的开放式WebGIS的系统设计   总被引:1,自引:0,他引:1  
基于XML的开放式WebGIS的系统设计是解决传统WebGIS数据共享、服务互操作问题的好方法.本文分析了基于XML的开放式WebGIS系统的设计目标,提出了一个基于XML技术的WebGIS系统设计方案.  相似文献   

4.
"道德底线不似法律底线,没有明文规定,也没有强制性,是相对软性的东西,每个人心中都会有一些自认为神圣庄严的情感或信仰。那么我们只能够将其设定为‘不引起多数人的审美反感’、‘不伤害多数人的情感’、‘不损害多数人的利益’。""互联网拆除的不仅仅是进行表达时所可能遇到的障碍,它还拆除声音达致自己的受众的障碍。"  相似文献   

5.
计算机网络信息安全面临的问题和对策   总被引:1,自引:0,他引:1  
计算机的广泛应用把人类带入了一个全新的时代,特别是计算机网络的社会化,已经成为了信息时代的主要推动力.目前,全世界的军事、经济、社会、文化各个方面都越来越依赖于计算机网络,人类社会对计算机的依赖程度达到了空前的纪录.由于计算机网络的脆弱性,这种高度的依赖性使国家的经济和国防安全变得十分脆弱,一旦计算机网络受到攻击而不能正常工作,甚至瘫痪,整个社会就会陷入危机.  相似文献   

6.
婚姻与电脑     
茶余饭后的人们总是需要谈资的,而需求的力量往往巨大.所以对于"报纸"的发明和"狗仔队"的产生也就很好解释了,说来每年都有些网络大热话题作为热门话题,不过一般都逃不出什么品牌电脑的促销风暴,还有就是什么名流、富豪榜和个人年终奖的猜想.而在2008年,一场发生在著名主持人张斌和胡紫薇间"婚姻事件"  相似文献   

7.
<正>2007年11月1日,美国国家仪器公司(NI)在北京喜来登长城饭店成功举办了测量、控制和设计领域的年度盛会—NIDays 2007,这已经是NI公司连续第9年在中国地区举办这样的行业技术会议了。来自全国范围内各行各业的600多位用户、12家合作伙伴以及十多家媒体  相似文献   

8.
美国阿姆斯壮国际公司(Armstrong Intemational,Inc.)成立于1900年,是一家具有百年历史的国际公司,北京康森阿姆斯壮机械有限公司系中美合资生产型企业,由美国阿姆斯壮国际公司(Armstrong Intemational Inc)和北京拓峰科技开发有限责任公司共同投资建立,目前的北京康森阿姆斯壮继承了母公司的业务,主要从事蒸汽系统节能产品的生产制造,用户遍布全国,覆盖了包括石油、石化、冶金、化工、制药、机械、电子、电力、橡胶、造纸、食品等诸多行业.  相似文献   

9.
5月12日,一场突如其来的大地震袭击了四川省及其周边一些地区,这场大地震,夺去了数万人的生命,也牵动了国家和亿万人民群众的心。灾害发生后,全体中国人民众志成城,在罕见的特大地震面前表现出钢铁般的意志和战胜灾害的决心。党和国家领导人对抗震救灾工作迅速作出重要指示,温家宝总理灾后四个小时,不顾随时可能发生的余震,亲临救  相似文献   

10.
一、传统保存方案的缺陷 传统的工程图样和资料的保存归档形式是通过纸质或胶片的形式进行的,很多企业都用专门的仓库保管这些珍贵的技术资料.这些资料的内容相当广泛,包括机械设计、建筑设计、工程设计、测绘及地图等各行业的信息.资料的介质也有不同的分类,包括硫酸纸、纸质蓝图、白图及胶片等.  相似文献   

11.
诉微分算子CCS(Calclus of Communi-cating Systems)是由英国爱丁堡大学计算机科学系的RobinMilner首先提出的。CCS是一个在数学上完整的理论算子系统,可以作为计算机通讯系统的基本理论模型。我们先简要说明一个CCS的内容。我们所作的工作是在理论上扩充地的CCS,使得我们的CCS更为一般化。在我们的观战看来,RobinMiber的CCS只不过是我们的CCS的一  相似文献   

12.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

13.
Specularities often confound algorithms designed to solve computer vision tasks such as image segmentation, object detection, and tracking. These tasks usually require color image segmentation to partition an image into regions, where each region corresponds to a particular material. Due to discontinuities resulting from shadows and specularities, a single material is often segmented into several sub-regions. In this paper, a specularity detection and removal technique is proposed that requires no camera calibration or other a priori information regarding the scene. The approach specifically addresses detecting and removing specularities in facial images. The image is first processed by the Luminance Multi-Scale Retinex [B.V. Funt, K. Barnard, M. Brockington, V. Cardei, Luminance-Based Multi-Scale Retinex, AIC’97, Kyoto, Japan, May 1997]. Second, potential specularities are detected and a wavefront is generated outwards from the peak of the specularity to its boundary or until a material boundary has been reached. Upon attaining the specularity boundary, the wavefront contracts inwards while coloring in the specularity until the latter no longer exists. The third step is discussed in a companion paper [M.D. Levine, J. Bhattacharyya, Removing shadows, Pattern Recognition Letters, 26 (2005) 251–265] where a method for detecting and removing shadows has also been introduced. The approach involves training Support Vector Machines to identify shadow boundaries based on their boundary properties. The latter are used to identify shadowed regions in the image and then assign to them the color of non-shadow neighbors of the same material as the shadow. Based on these three steps, we show that more meaningful color image segmentations can be achieved by compensating for illumination using the Illumination Compensation Method proposed in this paper. It is also demonstrated that the accuracy of facial skin detection improves significantly when this illumination compensation approach is used. Finally, we show how illumination compensation can increase the accuracy of face recognition.  相似文献   

14.
FTDSS:高容错分布式共享存储机制   总被引:1,自引:1,他引:1  
Computerized data has become critical to the survival of an enterprise. Company must have a strategy for recovering their data should data lose. RAID is a popular mechanism to offer good fault-tolerance. But RAID can notwork well when one more disks fail. In this paper, we present an efficient Network-based high High-Tolerance Dis-tributed Shared Storage mechanism called FTDSS. FTDSS makes use of disk space of node in Network to build alarge pubhc shared storage space. Users can read/write their file from/to the public storage space from node of net-work. Physically File is stored in each node in form of data fragment or XOR verify fragment. Because of redundant XOR fragments, file is available even when two more nodes fail. FTDSS realize distant redundant srorage. At last,this paper use experiment to prove that FTDSS can offer high. fault-tolerance and advanced performance.  相似文献   

15.
The theses of existonness, compoundness, and polyadness are proved. The consistency of these theses with the reversibility principle is founded. Existential foundations of the composition paradigm are constructed. __________ Translated from Kibernetika i Sistemnyi Analiz, No. 2, pp. 3–12, March–April 2008.  相似文献   

16.
《Ergonomics》2012,55(12):1597-1618
Although often suggested as a control measure to alleviate musculoskeletal stresses, the use of mechanical assistance devices (i.e. manipulators) in load transfers has not been extensively studied. Without data describing the biomechanical effects of such devices, justification for decisions regarding implementation of such tools is difficult. An experimental study of two types of mechanical manipulators (articulated arm and overhead hoist) was conducted to determine whether biomechanical stresses, and hence injury risk, would be alleviated. Short distance transfers of loads with moderate mass were performed both manually and with manipulator assistance under a variety of task conditions. Using analysis and output from new dynamic torso models, strength demands at the shoulders and low back, lumbar spine forces, and lumbar muscle antagonism were determined. Strength requirements decreased significantly at both the shoulders and low back when using either manipulator in comparison with similar transfers performed manually. Peak spine compression and anteriorposterior (a-p) shear forces were reduced by about 40% on average, and these reductions were shown to be primarily caused by decreases in hand forces and resultant spinal moments. Two metrics of muscular antagonism were defined, and analysis showed that torso muscle antagonism was largest overall when using the hoist. The results overall suggest that hoist-assisted transfers, although better in reducing spine compression forces, may impose relatively higher demands on coordination and/or stability at extreme heights or with torso twisting motions. The relatively higher strength requirements and spine compression associated with the articulated arm may be a result of the high inertia of the system. Potential benefits of practice and training are discussed, and conclusions regarding implementation of mechanical manipulators are given.  相似文献   

17.
A major challenge in nanoscience is the design of synthetic molecular devices that run autonomously (that is, without externally mediated changes per work-cycle) and are programmable (that is, their behavior can be modified without complete redesign of the device). DNA-based synthetic molecular devices have the advantage of being relatively simple to design and engineer, due to the predictable secondary structure of DNA nanostructures and the well-established biochemistry used to manipulate DNA nanostructures. However, ideally we would like to minimize the use of protein enzymes in the design of a DNA-based synthetic molecular device. We present the design of a class of DNA-based molecular devices using DNAzyme. These DNAzyme-based devices are autonomous, programmable, and further require no protein enzymes. The basic principle involved is inspired by a simple but ingenious molecular device due to Tian et al. [Y. Tian, Y. He, Y. Chen, P. Yin, C. Mao, A DNAzyme that walks processively and autonomously along a one-dimensional track, Angew. Chem. Intl. Ed. 44 (2005) 4355–4358] that used DNAzyme to traverse on a DNA nanostructure, but was not programmable in the sense defined above (it did not execute computations).  相似文献   

18.
19.
Abstract This paper describes an approach to the design of interactive multimedia materials being developed in a European Community project. The developmental process is seen as a dialogue between technologists and teachers. This dialogue is often problematic because of the differences in training, experience and culture between them. Conditions needed for fruitful dialogue are described and the generic model for learning design used in the project is explained.  相似文献   

20.
基于LDA话题演化研究方法综述   总被引:6,自引:1,他引:5  
现实生活中不断有新话题的产生和旧话题的衰减,同时话题的内容也会随着时间发生变化。自动探测话题随时间的演化越来越受到人们的关注。Latent Dirichlet Allocation模型是近年提出的概率话题模型,已经在话题演化领域得到较为广泛的应用。该文提出了话题演化的两个方面 内容演化和强度演化,总结了基于LDA话题模型的话题演化方法,根据引入时间的不同方式将目前的研究方法分为三类 将时间信息结合到LDA模型、对文本集合后离散和先离散方法。在详细叙述这三种方法的基础上,针对时间粒度、是否在线等多个特征进行了对比,并且简要描述了目前广泛应用的话题演化评测方法。文章最后分析了目前存在的挑战,并且对该研究方向进行了展望。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号