首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   36篇
  免费   0篇
化学工业   3篇
金属工艺   1篇
机械仪表   3篇
建筑科学   3篇
无线电   6篇
冶金工业   1篇
原子能技术   1篇
自动化技术   18篇
  2021年   1篇
  2020年   1篇
  2018年   1篇
  2016年   1篇
  2015年   1篇
  2014年   1篇
  2012年   3篇
  2011年   3篇
  2010年   2篇
  2009年   3篇
  2008年   3篇
  2007年   3篇
  2005年   4篇
  2004年   2篇
  2003年   2篇
  2001年   1篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1996年   1篇
排序方式: 共有36条查询结果,搜索用时 843 毫秒
1.
In order to efficiently develop large-scale and complicated software, it is important for system engineers to correctly understand users’ requirements. Most requirements in large-scale projects are collected from various stakeholders located in various regions, and they are generally written in natural language. Therefore, the initial collected requirements must be classified into various topics prior to analysis phases in order to be usable as input in several requirements analysis methods. If this classification process is manually done by analysts, it becomes a time-consuming task. To solve this problem, we propose a new bootstrapping method which can automatically classify requirements sentences into each topic category using only topic words as the representative of the analysts’ views. The proposed method is verified through experiments using two requirements data sets: one written in English and the other in Korean. The significant performances were achieved in the experiments: the 84.28 and 87.91 F1 scores for the English and Korean data sets, respectively. As a result, the proposed method can provide an effective function for an Internet-based requirements analysis-supporting system so as to efficiently gather and analyze requirements from various and distributed stakeholders by using the Internet.  相似文献   
2.
One of the benefits of software product line approach is to improve time-to-market. The changes in market needs cause software requirements to be flexible in product lines. Whenever software requirements are changed, software architecture should be evolved to correspond with them. Therefore, domain architecture should be designed based on domain requirements. It is essential that there is traceability between requirements and architecture, and that the structure of architecture is derived from quality requirements. The purpose of this paper is to provide a framework for modeling domain architecture based on domain requirements within product lines. In particular, we focus on the traceable relationship between requirements and architectural structures. Our framework consists of processes, methods, and a supporting tool. It uses four basic concepts, namely, goal based domain requirements analysis, Analytical Hierarchy Process, Matrix technique, and architecture styles. Our approach is illustrated using HIS (Home Integration System) product line. Finally, industrial examples are used to validate DRAMA.  相似文献   
3.
In this work, we develop an efficient storage technique to support real-time streaming of layer encoded video in a single hard disk. The size of a single hard disk drive will soon be able to hold multi-tera bytes and is going to handle relatively larger number of files. We expect that disk layout in a single disk will be rather critical issue in determining the efficiency of the storage system. We propose a novel storage technique, Inter-Object Layer Clustering for layer encoded video objects. In Inter-Object Layer Clustering, storage is partitioned into two regions: lower layer partition and upper layer partition. Lower and upper layer partition harbor the lower layer and upper layer data blocks across all video objects and cluster them together. We develop an elaborate performance model for this placement scheme. We examine the performance of the proposed technique using analytical formulation as well as a physical experiment. We found that clustering the layers across all objects brings 100% increase in the number of concurrent sessions compared to the case where file is stored in temporal order when the clients’ access bandwidth is narrow. Inter-Object Layer Clustering shows 15% performance improvement compared to the clustering of layers within the objects.  相似文献   
4.
5.
Most blind and vision-impaired people use a white cane or a guide dog to aid their walking. The conventional white cane helps the user to perceive the environment simply by identifying the presence of nearby obstacles. In the present study, three infrared range sensors were used to identify the floor state. The sensor system, affixed to the user’s belt, does not require swinging motion or any other movement by the user. The three sensors are configured radially, and the design parameters are selected based on the sensor characteristics. The main difference from the conventional range sensor system for the blind is that the infrared range sensor system identifies three discrete states (even surface, ascending stair, descending stair). The condition for the state transition was derived from a sensor system model. Additionally, the effects of sensor system movement were verified by covariance analysis.  相似文献   
6.
A log statement is one of the key tactics for a developer to record and monitor important run-time behaviors of our system in a development phase and a maintenance phase. It composes of a message for stating log contents, and a log level (eg, debug or warn) to denote the severity of a message and controlling its visibility at run time. In spite of its usefulness, a developer does not tend to deeply consider which log level is appropriate in writing source code, which causes the system to be unmaintainable. To address this issue, this paper proposes an automatic approach to validating the appropriateness of the log level in consideration of the semantic and syntactic features and recommending a proper alternative log level. We first build the semantic feature vector to quantify the semantic similarity among application log messages using the word vector space, and the syntactic feature vector to capture the application context that surrounds the log statement. Based on the feature vectors and machine learning techniques, the log level is automatically validated, and an alternative log level is recommended if the log level is invalid. For the evaluation, we collected 22 open-source projects from three application domains, and obtained the 77% of precision and 75% of recall in validating the log levels. Also, our approach showed 6% higher accuracy than that of the developer group who has 7 to 8 years of work experience, and 72% of the developers accepted our recommendation.  相似文献   
7.
Ensuring and maintaining the structural integrity of the containment structure in nuclear power plants is essential for preserving the nuclear reactor and other safety-related systems as well as protecting plant workers and publics from hazardous radioactive materials. To date, the structural integrity of the containment has been evaluated periodically via various nondestructive inspection methods. However, these methods require considerable time and cost to estimate overall structural integrity. In this paper, the possibility of monitoring the structural integrity of the containment utilizing ambient vibration measurement is explored. The ambient vibration testing was selected because it can avoid the interruption of normal operation of power plants. To fulfill the objective, the ambient vibration of the containment of Ulchin Nuclear Power Plant Unit 5 in Korea was measured, and the modal parameters, i.e., resonant frequencies and corresponding mode shapes, were extracted using the modal identification techniques in the frequency domain, i.e., the peak picking and the frequency domain decomposition methods. Using the extracted modal parameters and the finite element model, the elastic modulus of the concrete was estimated based on the sensitivity-based system identification method.  相似文献   
8.
Interferons (IFNs) are a crucial component in the innate immune response. Especially the IFN-β signaling operates in most cell types and plays a key role in the first line of defense upon pathogen intrusion. The induction of IFN-β should be tightly controlled, because its hyperactivation can lead to tissue damage or autoimmune diseases. Activation of the IFN-β promoter needs Interferon Regulatory Factor 3 (IRF3), together with Nuclear Factor kappa-light-chain-enhancer of activated B cells (NF-κB) and Activator Protein 1 (AP-1). Here we report that a human noncoding RNA, nc886, is a novel suppressor for the IFN-β signaling and inflammation. Upon treatment with several pathogen-associated molecular patterns and viruses, nc886 suppresses the activation of IRF3 and also inhibits NF-κB and AP-1 via inhibiting Protein Kinase R (PKR). These events lead to decreased expression of IFN-β and resultantly IFN-stimulated genes. nc886′s role might be to restrict the IFN-β signaling from hyperactivation. Since nc886 expression is regulated by epigenetic and environmental factors, nc886 might explain why innate immune responses to pathogens are variable depending on biological settings.  相似文献   
9.
Since multizone recording disks have different bandwidths and capacities depending on the zone in use, data placement schemes for traditional constant angular density disks are not suitable for multizone recording disks. In this paper, we propose a new block placement algorithm for multizone recording disks used for continuous media servers. The proposed scheme exploits the bandwidth-saving effect of smoothing variable bit rate data before storing them. The diversity of zone bandwidths in multizone recording disks enables it possible to achieve large smoothing effect using relatively small buffer space. Variable bit rate data blocks of an object are smoothed using multiple smoothing rates which are bandwidths of zones multiplied by the service time assigned to the object and are stored into the corresponding zones. This multirate smoothing technique decreases the buffer space required to provide deterministic service to clients. Simulation results show that a proper restructuring of blocks according to the smoothing algorithm results in dramatic performance enhancement in continuous media servers.  相似文献   
10.
The structural condition of a concrete box-girder bridge is monitored twice by detecting and localizing potential damage in the bridge superstructure. Experimental field data were collected on the bridge in December 1997 and 9 months later in September 1998. Modal parameters for the structure are extracted from the measured frequency-response functions, and the resulting resonant frequencies and modeshapes are fed into a proven systems identification procedure. Modal parameters from the identified baseline structure and the modal parameters determined in the field are used as input to a field-tested nondestructive damage-evaluation method (the damage index method) to localize damage in the bridge superstructure. To provide some evidence of the veracity of the predictions of the possible damage locations, a visual inspection was performed on the bridge in May 1999, and surface cracks on the deck were recorded. A comparison of the predicted damage locations on the superstructure with the surface cracks documented via visual inspection is provided. The results indicate that a strong correlation exists between the predicted damage locations and the observed surface crack pattern.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号