首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Abstract

ReActivities © are digital play sequences which encourage the integration of social, emotional and cognitive development in children on the autistic spectrum. High levels of anxiety in autistic children can inhibit playful experiences and increase the rigid, stereotypical and challenging behaviours which have a negative effect in social situations. Interactions with objects that offer repetition, pattern and similarity combined with colour and rhythm are regularly used by autistic children as methods to reduce anxiety. However little has been done to interpret these sensations in digital environments. The aim of ReActivities © has been to offer a rich physical and cognitive experience which simulates the perceptible characteristics of phenomena such as elasticity, velocity, gravity and inertia. This is an advanced form of cause and effect that promises a unique form of expression in response to exploration with computer technology. There are numerous thoughtful and engaging websites designed and maintained by autistic people which are testimony to the theory that computers, and particularly electronic networks, offer enormous possibilities for creativity, communication and fun. The project is utilising open source technology to enable autistic users, many of whom are already conversant with programming languages, to adapt and re-generate the software. Fostering a community approach to development affords further opportunities to explore an innovative, inclusive design method that, should it prove successful, could provide a model for other marginalised groups.  相似文献   

2.
IDDT: Fundamentals and Test Generation   总被引:5,自引:0,他引:5       下载免费PDF全文
It is the time to explore the fundamentals of IDDT testing when extensive work has been done for IDDT testing since it was proposed.This paper precisely defines the concept of average transient current(IDDT) of CMOS digital ICs,and experimentally analyzes the feasibility of IDDT test generation at gate level.Based on the SPICE simulation results,the paper suggests a formula to calculate IDDT by means of counting only logical up-transitions,which enables IDDT test generation at logic level.The Bayesian optimization algorithm is utilized for IDDT test generation.Experimental results show that about 25% stuck-open faults are with IDDT testability larger than 2.5,and likely to be IDDT testable.It is also found that most IDDT testable faults are located near the primary inputs of a circuit under test.IDDT test generation does not require fault sensitization procedure compared with stuck-at fault test generation.Furthermore,some redundant stuck-at faults can be detected by using IDDT testing.  相似文献   

3.
4.
Algorithmization and programming principles for logic control and reactive systems are formulated, regarding algorithms and programs as finite automata. The application of finite automata to programming for other problems is also reviewed.  相似文献   

5.
We say that a discrete-time system is ρ-stable if, roughly speaking, ρk >X k→0, where >X k is the system state. General ρ-stability theorems are established in this paper. They concern systems governed by functional difference equations. Systems of this type are encountered in the robustness studies. These ρ-stability theorems are a generalization of the well-known Lyapunov criterion. These results are applied to the robustness quantification problem in the second part of the paper. The case of discrete-time LQ regulators is deeply investigated. Robustness properties of continuous-time LQ regulators are found as the limit when the sampling period >T tends to zero; robustness deteriorates as T increases. An upper bound is given for >T, under which the robustness remains satisfactory. The practical interest of these theoretical results is illustrated on the basis of an industrial example.  相似文献   

6.
SolidModelingEror:AnalysisandCompensation①XuZhigangHuangKezhengAiXingShanLianyeColegeofMechanicalEngineering,ShandongUniversi...  相似文献   

7.
Fingerprint matching,spoof mitigation and liveness detection are the trendiest biometric techniques,mostly because of their stability through life,uniqueness and their least risk of invasion.In recent decade,several techniques are presented to address these challenges over well-known data-sets.This study provides a comprehensive review on the fingerprint algorithms and techniques which have been published in the last few decades.It divides the research on fingerprint into nine different approaches including feature based,fuzzy logic,holistic,image enhancement,latent,conventional machine learning,deep learning,template matching and miscellaneous tech-niques.Among these,deep learning approach has outperformed other approaches and gained significant attention for future research.By reviewing fingerprint literature,it is historically divided into four eras based on 106 referred papers and their cumulative citations.  相似文献   

8.
The language FCP(:,?) is the outcome of attempts to integrate the best of several flat concurrent logic programming languages, including Flat GHC, FCP (↓, |) and Flat Concurrent Prolog, in a single consistent framework. FCP(:) is a subset of FCP(:, ?), which is a variant of FPP(↓, |) and employs concepts of the concurrent constraint framework of cc(↓, |). FCP(:, ?) is a language which is strong enough to accommodate all useful concurrent logic programming techniques, including those which rely on atomic test unification and read-only variables, yet incorporates the weaker languages mentioned as subsets. This allows the programmer to remain within a simple subset of the language such as Flat GHC when the full power of atomic unification or read-only variables is not needed.  相似文献   

9.
《Information & Management》1996,30(5):211-221
In today's society, the development of new technologies generally outpaces the laws and regulations created to protect them. This is precisely what has happened in copyright cases involving the copyrightability of the “look and feel” of a program (the visual displays and specific command keystrokes that make a computer program unique). Currently, regulatory agencies and judicial interpretation of copyright law is not precise, leading to uncertainty and a lack of uniformity. Until the courts and/or agencies reach some consistency in their rulings, software developers and individual programmers are left in a quandary as to when charges of copyright infringement might be served. Although it may be difficult to achieve consistent interpretation, US case law does provide some guidance that can aid US developers in not only protecting their work, but also avoiding charges of copyright infringement. This paper examines the current US copyright laws and limitations with special attention to “look and feel.” International copyright aspects, as outlined in the Berne Convention, the General Agreement on Tariffs and Trade (GATT), and the North American Free Trade Agreement (NAFTA) are also addressed. It also reviews several cases that deal with (or have somehow impacted) questions surrounding “look and feel,” along with commentaries on their individual impacts, evaluates where copyright laws stand today, and discusses some possible alternatives for software developers based on the results of recent cases.  相似文献   

10.
11.
Abstract:

This qualitative case study sought to identify and explore new roles adopted by three science teachers when the context of teaching and learning science was drastically changed. The study was conducted in a school utilizing student‐centred, self‐paced learning, where traditional classrooms have been replaced by subject‐specific resource areas and seminar rooms. Students do not follow a fixed daily schedule; instead, they plan their own school day and move freely between resource areas at self‐directed, often irregular intervals, according to daily and weekly goals. Through interviews, classroom observation, and personal journals, the study explored the ways in which the teachers perceived and implemented their roles in the changed context.  相似文献   

12.
13.
This paper presents a kind of visual programming,which is called R-technology of programming,The R-technology is independent of any programming language or operating system and the R-chart is in accord with international standard(ISO 8631H).The package of R-technology has been applied to the high level languages such as PASCAL.C,ASSEMBLER,FORTRAN,PL/1,MODULA-2 and RTRAN,This package is applied to computers ranging from mainframes(IBM370) and minis(VAX) to micros(IBM/PC).  相似文献   

14.
As the Internet rapidly changes the way we communicate and carry out our business, what are the challenges and opportunities for the cultural sector? Will national cultural identities be subsumed in an emerging global mono‐culture? What is the role of government in this situation? This paper discusses these questions and describes why and how the Australian Government responded with a new cultural online service ‐ Australia's Cultural Network <http://www.acn.net.au/> ‐ to provide a single access point for the general public and a resource exchange for those in the Australian cultural community wanting to make the transition to the growing online economy.  相似文献   

15.
This paper presents a kind of visual programming, which is called R-technology of programming.The R-technology is independent of any programming language or operating system and the R-chart isin accord with international standard (ISO 8631H). The package of R-technology has been applied tothe high level languages such as PASCAL, C, ASSEMBLER, FORTRAN, PL/1, MODULA-2 andRTRAN. This package is applied to computers ranging from mainframes (IBM 370) and minis (VAX)to micros (IBM/PC).  相似文献   

16.
It can be observed from looking backward that processor architecture is improved through spirally shifting from simple to complex and from complex to simple. Nowadays we are facing another shifting from complex to simple, and new innovative architecture will emerge to utilize the continuously increasing transistor budgets. The growing importance of wire delays, changing workloads, power consumption, and design/verification complexity will drive the forthcoming era of Chip Multiprocessors (CMPs). Furthermore, typical CMP projects both from industries and from academics are investigated. Through going into depths for some primary theoretical and implementation problems of CMPs, the great challenges and opportunities to future CMPs are presented and discussed. Finally, the Godson series microprocessors designed in China are introduced.  相似文献   

17.
This paper deals with the reachability and controllability of periodic discrete-time systems. First, we supply two necessary and sufficient complete reachability conditions, which apply to reversible and non-reversible systems, respectively. Then, a necessary and sufficient complete controllability condition is provided. This condition, as well as the complete reachability criteria, is given in terms of the reachability gramian matrix. Equivalent modal criteria for reachability and controllability are established in the second part of the paper.  相似文献   

18.
Although there is debate about emerging production systems, there is little analysis of their direct impact on traditional industrial relations. In this article the authors begin with an exploration of the literature on production systems and argue that there is confusion between the characteristics of, and distinctions between, emerging production systems. As companies diffuse their own production systems, there arises not only a great variety of models, but also a convergence of the principle characteristics of these production models. These are identified as teams, multiskilled workers, and management-initiated employee participation programs. These “new” production models might best be generically termed “lean team” systems, and the consequences for labor and unions are potentially significant. Drawing on research in Colgate-Palmolive, a multinational manufacturing company operating in Australia, one such production model is examined. It would appear that the consequences of the new production system for the union are complex and potentially responsible for their exclusion. © 1998 John Wiley & Sons, Inc.  相似文献   

19.
Systems of linear ordinary differential and difference equations of the form $A_r (x)\xi ^r y(x) + \ldots + A_1 (x)\xi y(x) + A_0 (x)y(x) = 0,\xi \in \left\{ {\frac{d} {{dx}},E} \right\}$ , where E is the shift operator, Ey(x) = y(x + 1), are considered. The coefficients A i (x), i = 0, ..., r, are square matrices of order m, and their entries are polynomials in x over a number field K, with A r (x) and A 0(x) being nonzero matrices. The equations are assumed to be independent over K[x, ξ]. For any system S of this form, algorithms EGδ (in the differential case) and EGσ (in the difference case) construct, in particular, the l-embracing system $\bar S$ of the same form. The determinant of the leading matrix $\bar A_r (x)$ of this system is a nonzero polynomial, and the set of solutions of system $\bar S$ contains all solutions of system S. (Algorithm EGδ provides also a number of additional possibilities.) Examples of problems that can be solved with the help of EGδ and EGσ are given. The package EG implementing the proposed algorithms in Maple is described.  相似文献   

20.
In this paper we consider the development, integration, and application of reliable and efficient computational tools for the geometry modeling, mesh generation, structural analysis, and sensitivity analysis of variable-thickness plates and free-form shells under dynamic loads. A flexible shape-definition tool for surface modeling using Coons patches is considered to represent the shape and the thickness distribution of the structure, followed by an automatic mesh generator for structured meshes on the shell surface. Nine-node quadrilateral Mindlin–Reissner shell elements degenerated from 3D elements and with an assumed strain field, the so-called Huang–Hinton elements, are used for the FE discretization of the structure. The Newmark direct integration algorithm is used for the time discretization of the dynamic equilibrium equations for both the structural analysis and the semi-analytical (SA) sensitivity analysis. Alternatively, the sensitivities are computed by using the global finite difference (FD) method. Several examples are considered. In a companion paper, the tools presented here are combined with mathematical programming algorithms to form a robust and reliable structural optimization process to achieve better dynamic performance on the shell designs.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号