首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
在计算机辅助几何设计(CAGD)中,曲面曲线的凸性是一种重要的特性.旨在解决多项式的正性和凸性问题.凸性可以通过正性来解决.通过推广经典的Sturm定理,得到一种多项式正性的算法.由此提出了任意阶多项式为正的一个充要条件,也提出了一个实用的算法,从而可以只用此多项式的系数来表示得到的充要条件.  相似文献   

2.
软件测试性定义研究   总被引:1,自引:1,他引:0  
当前的软件测试性定义众多,但还存在各种问题。综合各测试性定义,提出软件测试性是软件易于测试和暴露缺陷的能力。简要介绍九个测试性特性:可理解性、可控性、可观测性、测试支持能力、简单性、可分解性、适用性、可跟踪性和敏感性,分析它们与软件测试性的关系。最后描述软件测试性与其它软件质量因素的关系。全面的软件测试性定义研究有助于更深入地理解软件测试性。  相似文献   

3.
付剑平  陆民燕 《计算机应用》2008,28(11):2915-2918
软件测试性设计分为四类:设计时应当遵循的测试性设计原则,通过改变设计或代码提高软件测试性的专用测试性设计技术,为软件增加专门测试结构的结构化测试性设计技术和在软件开发全周期考虑软件测试的测试性设计综合技术。软件测试性设计方法借用了很多硬件测试性设计思想,但在许多方面还能进一步发展。  相似文献   

4.
为了保证用户在云存储服务器中数据的完整性,在分析已有数据持有性证明方案的基础上,提出了一种基于编码Hash同态性的数据持有性证明方案。通过将伪随机数与数据块进行“捆绑”作为标签来固定数据块位置,同时引进一种基于编码的Hash,并利用同态性来完成数据持有性验证。该方案的安全性依赖于译码的NP完全问题,可抵抗量子攻击,较传统的基于Hash同态性的数据持有性证明方案更难被攻破,同时通过理论分析,算法时间开销比以往方案更快,更有效。  相似文献   

5.
网络抗毁性测度研究   总被引:2,自引:0,他引:2  
针对网络抗毁性测度问题,依据抗毁性三原则——阻挡、识别和恢复,提出了多维网络抗毁性测度提取方法,该方法综合运用了多种抗毁性分析技术,结合实际验证筛选,为提炼抗毁性测度提供了有效途径;提出了三层树状结构的网络抗毁性测度集,为抗毁性测度提供了可行的分类参考;最后,提出了抗毁性测度度量方法并给出了其形式化描述,实现不同类型抗毁性测度值的获取。分析表明,提出的网络抗毁性测度提取方法、测度集合和度量方法具有良好的一致性和可行性。  相似文献   

6.
为了研究网络调度对能控性与能观性的影响,对输入、输出通道都存在通信约束的网络控制系统的调度进行建模;利用通信序列表示通道的调度情况,最终将模型转化为离散切换系统;在静态调度下,利用循环不变子空间理论及其相关的性质,给出了网络控制系统能控性、能观性成立的充要条件,并给出了原有控制系统与经网络静态调度后的系统之间能控性、能观性的关系;最后用仿真实例说明了所提结论的正确性。  相似文献   

7.
为了研究赋权网络的抗毁性评估问题, 首先给出了赋权网络的定义, 提出了赋权网络的抗毁性测度——粘聚度、连通度、平均粘聚度、平均连通度; 然后研究了一种基于平均粘聚度和平均连通度这两项抗毁性测度的赋权网络抗毁性评估方法, 并通过实例对该方法进行验证, 结果表明, 该方法能有效评估赋权网络的抗毁性。  相似文献   

8.
CMOS器件进入深亚微米阶段,VLSI集成电路(IC)继续向高集成度,高速度,低功耗发展,使得IC在制造、设计、封装,测试上都面临新的挑战,测试已从IC设计流程的后端移至前端,VLSI芯片可测试性设计已成为IC设计中必不可少的一部分,本文介绍近几年来VLSI芯片可测试性设计的趋势,提出广义可测试性设计(TDMS技术)概念,即可测试试性,可调试性,可制造性和可维护性设计,并对可调试性设计方法学和广义可测试性设计的系统化方法作了简单介绍。  相似文献   

9.
指出一个好的密码函数除了自身需要具备良好的复杂性外,对其做一个较小的改动后仍需具有良好的复杂性;基于此思想对布尔函数的正规性这一复杂性指标作了改进,定义了扩展的正规性,讨论了扩展正规性和正规性之间的关系以及扩展正规性和代数免疫之间的关系;并从布尔函数代数正规型的角度分析了函数的正规性和代数免疫阶,为正规性和代数免疫的分析提供了一条新的思路。  相似文献   

10.
研究了随机系统的能稳性和精确能控性的关系,象确定性情形一样,我们证明了在随机情形下,精确能控性蕴涵着的能稳性。  相似文献   

11.
With the convergence of digital media into ever-widening social and technological networks for creation and distribution, the contexts for writing and the study of writing and writers have certainly changed. Researchers must navigate a dense matrix of ethical and legal issues in all phases of research when studying the ever-changing processes and products of digital communications. In this article, I draw from numerous sources to articulate a few of the challenges facing digital writing researchers in this age of convergence, focusing on issues of representation (researcher, participant, third-party), issues of informed consent, and issues of copyright and fair use.  相似文献   

12.
概念的形成是实现人工智能的基础,为研究人工智能系统中概念的形成过程,从人对事物形成概念的过程出发进行了研究。比较人和人工智能系统的概念形成过程得到了如下特点:人的优势在于能自主地确定对象表象和对象功能中的各种特征和划分等,能在对象、描述性定义和功能性定义对应关系不完备情况下通过思维和联想建立概念;人工智能系统的优势在于丰富的对象表象感知能力,对象的各种特征和划分的长期存储、运算和分析能力;而人工智能的概念形成过程存在的缺点基本与人的概念形成过程的优点对应。因此本文认为人工智能的概念形成过程必须关注因素的智能识别、功能的系统实践和人经验知识的有师学习。现有技术在缺乏人经验知识的情况下,人工智能系统不能自主建立概念和知识库,不能实现智能过程。  相似文献   

13.
The way ahead with the practical development and application of Ergonomic methods is through a better anticipation and appreciation of changes to system effectiveness and human work that will be incurred through the introduction of new technologies to the workplace. These improvements will involve an improved awareness by the system of the working context and environment. The argued future is with improvements in the handling and use of knowledge by systems. The development of suitable Ergonomics methods, or the careful adaptation of existing methods, should accompany any technological revolution. Moreover, future methods are needed that are specifically developed to be applicable to the real time study of work considering both work context and the amalgamation of results from the use of many diverse methods throughout the design and development life cycle of a system. Part of this process will be a necessary complementation of both quantitative and qualitative methods and guidelines. Another focus should be on creating improved Ergonomics participation within multidisciplinary system design and development environments throughout the system's life cycle. Only through this avenue can Ergonomics show a consistent and valued contribution to quality design and its development. In parallel to such a contribution will be an acceptance by other engineering disciplines, managers, and customers that such an application of Ergonomics is cost effective.  相似文献   

14.
Expert system verification and validation: a survey and tutorial   总被引:2,自引:0,他引:2  
Assuring the quality of an expert system is critical. A poor quality system may make costly errors resulting in considerable damage to the user or owner of the system, such as financial loss or human suffering. Hence verification and validation, methods and techniques aimed at ensuring quality, are fundamentally important. This paper surveys the issues, methods and techniques for verifying and validating expert systems. Approaches to defining the quality of a system are discussed, drawing upon work in both computing and the model building disciplines, which leads to definitions of verification and validation and the associated concepts of credibility, assessment and evaluation. An approach to verification based upon the detection of anomalies is presented, and related to the concepts of consistency, completeness, correctness and redundancy. Automated tools for expert system verification are reviewed. Considerable attention is then given to the issues in structuring the validation process, particularly the establishment of the criteria by which the system is judged, the need to maintain objectivity, and the concept of reliability. This is followed by a review of validation methods for validating both the components of a system and the system as a whole, and includes examples of some useful statistical methods. Management of the verification and validation process is then considered, and it is seen that the location of methods for verification and validation in the development life-cycle is of prime importance.  相似文献   

15.
近年来,农产品安全问题日益严峻,传统的农产品追溯体系面临公信力缺失、监管困境和扩展性问题,农产品质量安全追溯迫在眉睫。随着区块链技术不断发展,其具有的分布式、去中心化、不可篡改、可追溯等特性在改善农产品溯源系统数据安全性、透明性等方面发挥着重要作用,并受到了各个行业的广泛关注。在简述可追溯性和追溯系统概念的基础上,介绍物联网和区块链技术,并探讨了当前国内外学者将区块链和物联网框架融合应用到农产品溯源中的一些相关研究,同时阐述了溯源系统在物联网与区块链结合下带来的安全、可靠、透明等好处及面临可扩展性、效率问题、资源浪费等挑战,最后对当前农产品溯源体系建设提出建议以及未来的研究方向。  相似文献   

16.
Environmental ergonomics: a review of principles, methods and models   总被引:5,自引:0,他引:5  
A review of the principles, methods and models used in environmental ergonomics is provided in terms of the effects of heat and cold, vibration, noise and light on the health, comfort and performance of people. Environmental ergonomics is an integral part of the discipline of ergonomics and should be viewed and practised from that perspective. Humans do not respond to the environment in a way monotonically related to direct measures of the physical environment. There are human characteristics which determine human sensitivities and responses. Practical methods for assessing responses to individual environmental components are presented as well as responses to ‘total’ environments and current and proposed International Standards concerned with the ergonomics of the physical environment.  相似文献   

17.
The interaction of adolescents’ presential and cyberspace contexts accentuates the emergence of the aggressive-victim role. This profile takes on new dimensions as a result of the many combinations involved in the co-existence of bullying and cyberbullying. The twofold object of the present work was to: (i) determine the prevalence of victim-aggressive in the various forms that this role might be found in the context of bullying and cyberbullying; and (ii) explore the synergistic relationship established between the type and frequency of the abuse suffered and the type and frequency of the aggression perpetrated. The sample consisted of 1648 adolescents of from 12 to 16 years in age. The instrument used to acquire the data was a questionnaire. The results revealed the existence of four categories of aggressive victims: traditional aggressive-victims, aggressivecybervictims, cyberaggresive-victims, and cyberaggresive-cybervictims. The types of bullying suffered and perpetrated were found to be directly related and the frequencies of these two classes of attack were positively correlated. This allows one to predict the cyberspace and presential behaviour that will be displayed by adolescents who are being subjected to certain types of bullying and cyberbullying.  相似文献   

18.
社会Agent的BDO模型   总被引:15,自引:0,他引:15  
目前MAS中思维状态的研究趋势是在个体模型中加入社会思维属性,研究社会承诺、依赖、联合意图的推理关系。在BDI模型中,以意图为中心的观点不描述社会Agent。该文分析了以竭力为中心的Agent思维状态研究存在的问题,提出MAS的分层模型,并提出以信念、愿望和义务作为基本思维属性(简称BDO)来描述Agent的思维状态和社会属性,给出了BDO逻辑和语义模型,考虑了奖励、惩罚、承诺和承诺解除问题,并对队、组织、组织意图等现象给出了描述。该文力图更自然地描述社会性Agent的思维状态和群体概念,是对Rao和Georgeff提出的BDI模型的改进。最后通过一个例子说明了BDO的表达能力。进一步的工作包括建立更为完善的语义模型、结合各个思维属性的动态修正语义给出BDO Agent的动态模型以及给出基于BDO逻辑框架的Agent/MAS实现结构。  相似文献   

19.
对Office及Authorware做了深入的研究和分析,Office有其应用简单、覆盖面广的特点,而课件制作工具Authorware有其交互性强和对多媒体元素较好控制的特性,将两者结合起来,能够制作出操作便捷、使用广范的课件。  相似文献   

20.
为解决高山大岭输电线路工程装置性材料及施工器具运输,通过采用简易循环索道运输方法,解决高山大岭输电线路工程装置性材料及施工器具运输的难题。从简易循环索道的适用范围、架设、运输效率及与传统人(畜)力运输成本比对等方面得出结果在高山大岭地形条件下,输电线路材料简易循环索道运输的应用将是制约本工程施工的必然性和必然结果。简易循环索道运输方式技术合理、方案环保、安全可靠, 彻底解决了高山大岭输电线路部分塔基小运道需采用铺设栈道,工程量大,成本过高等方面引发的装置性材料运输难题,尤其对塔材超重、超大件的运输难题的解决提供了保证,不仅提高了施工运输工效,同时取得了很好的经济、社会效益, 在输电线路恶劣地形的施工中具有很高的推广价值。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号