首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 125 毫秒
1.
盛海波  曹伯燕 《电子科技》2006,(8):70-72,75
由EPSON、HP、RICOH和科达等企业联合提出的TWAIN协议是静态图像系统中图像获取设备与应用程序间的通信接口.其具有一致性好,兼容性强的特性,且系统架构简单健壮,稳定性高.文中从组成元素、系统架构和通信规范3个方面论述了TWAIN协议,并应用此协议设计和实现医用扫描仪设备驱动的通信模块,试验证明,此通信模块能够很好的满足实际需求.  相似文献   

2.
TWAIN协议是被广泛支持和使用的应用程序与数字图像设备之间的通信标准,该协议封装在twain_32.dll中,在.Net框架下不方便直接使用,文章设计实现了基于.Net的TWAIN协议接口,该接口能够充分利用.Net框架的应用程序设计中的优势,同时完全满足图像扫描的实际要求。  相似文献   

3.
介绍了TWAIN接口的标准,并分析了开发基于TWAIN接口的应用程序的方法.建立了基于TWAIN接口的图像测量系统,并分析了其测量的原理及标定的方法.位移测量的实验结果证明图像测量系统可应用于位移、长度、直径等工件尺寸的测量.  相似文献   

4.
吕国皎  吴非  杨艳 《现代显示》2009,20(7):33-38
文中介绍了CCD发展现状及工作原理、USB2.0协议、CPLD相关知识以及TWAIN协议,总结了线阵CCD图像采集系统的组建方法。  相似文献   

5.
TWAIN的原理及其应用开发   总被引:2,自引:0,他引:2  
尹东  王巍 《信息技术》2001,(9):15-16,18
随着计算机科学技术的飞速发展,声音,图形,图像以其直观的形象越来越受到人们的重视和喜爱,在多媒体世界中扮演着重要角色,如何在应用程序中简单方便地将图形,图像输出到计算机中,已成为一个非常普遍的问题,采用光电扫描仪是解决这一问题的有效途径。着重介绍扫描仪驱动接口-TWAIN的原理,使用和开发应用规范。  相似文献   

6.
在文字识别过程中,文字图像采集是重要的一步,为了能够高效、高质量地从外接物理设备采集图像并直接进行处理,文中介绍了TWAIN的基本原理和工作过程,说明了TWAIN的应用前景及TWAIN开发扫描仪驱动程序的优势,并基于TWAIN运用VC++实现了在扫描仪上对文字采集的应用。实验结果表明,应用TWAIN标准所开发的程序能够达到设计的要求。  相似文献   

7.
本文提出了一种基于消息的网络通讯模式,在该模式中,应用程序通过定义消息来描述通讯的内容,利用消息过滤器实现应用程序间的点对点、广播、客户/服务器等模式的通讯。该模式适用于多个应用程序间协同工作,这些应用程序可以分散于以TCP/IP为协议的网络站点上。  相似文献   

8.
在Facebook宣称不想被贴上游戏平台的标签,也不想依赖应用程序这种小玩意获取收入的时候,中国的SNS同行却俨然成了社交应用程序商店。  相似文献   

9.
郭梓琪 《广东电子》2009,(22):48-49
在Facebook宣称不想被贴上游戏平台的标签,也不想依赖应用程序这种小玩意获取收入的时候,中国的SNS同行却俨然成了社交应用程序商店。  相似文献   

10.
本文设计了一种基于Intel XScale PXA255硬件平台和嵌入式操作系统WinCE的二维条码数据采集器,可以有效地进行二维条码信息的译码.将应用程序分解成多任务,简化了应用系统软件设计.使用CMOS数字图像传感芯片,获取二维条码的原始图像,再由硬件平台中的图像处理程序对图像数据进行处理,然后在条码中定位单个码字符号的图像,利用算法识别出单个码字符号.  相似文献   

11.
用例模型是展现程序系统级行为的有效手段.文章针对具有并发特征的面向对象软件系统提出了一种多进程系统用例模型的逆向生成方法.该方法以进程为单位对目标系统的动态信息进行组织,使用单进程系统用例模型的逆向生成方法抽取出每个进程相应的用例模型,然后对具有相同进程名的不同进程的用例模型进行叠加,从而实现了多进程系统的用例模型的逆向生成.通过实验研究,表明该方法在恢复多进程系统的用例模型方面是有效的.  相似文献   

12.
周刚  陈奇 《舰船电子对抗》2007,30(6):16-19,25
作战使用时机决策是舰载有源、无源干扰使用的基本前提。结合相关电子对抗战术理论,通过建模分析,得出了有源压制式干扰和欺骗式干扰、无源冲淡式干扰和迷惑干扰的使用时机,探讨了伪装雷达幕的作战使用。其结论对有、无源干扰装备的作战使用决策具有重要的指导意义。  相似文献   

13.
The growing use of acronyms in technical and nontechnical communications is addressed. It is shown that acronyms can hinder communication. Their use is analyzed and classified. Suggestions are given on how to use acronyms effectively  相似文献   

14.
15.
A new etch system is described which produces pits on the technologically important B face of (111) and (211) CdTe and CdZnTe which are commonly used in mercury cadmium telluride (MCT) epitaxy. A ratio of approximately 10 wide: 1 deep is achieved with this etch allowing its use without removing excessive material. Examples of the use of this etch are given and a comparison is made with the Nakagawa, A face etch system which is in common use to characterize this family of materials. A screening protocol is discussed which integrates the use of etch pitting into the manufacture of substrates for use in epitaxial MCT applications. Comparisons are made between CdZnTe substrates grown using the horizontal and vertical Bridgman techniques.  相似文献   

16.
Although a large body of literature exists about the use of formal selection techniques (FST) in the selection of research and development (R&D) projects, most of it has focused on the instrumental use of the techniques and much scepticism exists about their value. Very little attention has been paid to the political or supportive use of the techniques, though project selection is often a political process. This study uses a two by two analytical framework combining these two forms of use. An empirical analysis of 149 individuals in 149 different companies describing 258 R&D selection decisions uses discriminant analysis to identify the determinants of the four different kinds of use at three levels of analysis: the individual, the project, and the organization. Considerable consistency is shown across levels and the importance of the supportive/political use of FST is emphasized  相似文献   

17.
We compare two approaches to use multiple transmit antennas in an FEC coded wireless system: smart antennas use an antenna array to direct a beam in the direction of the dominant transmission path in order to obtain an antenna gain. Another approach is to use multiple transmit antennas for diversity using space-time block codes. Since no knowledge of the channel is required at the transmitter we denote this approach as dumb antennas. Using equivalent single-input channel models we compare smart and dumb antennas in terms of the BER performance and channel capacity and discuss under which conditions it is preferable to use multiple transmit antennas for transmit diversity or for beamforming  相似文献   

18.
In this paper, we study the relationship between factors influencing the strategic use of IT and business performance by conducting a survey of small and medium‐size enterprises (SMEs). From the results of our survey we came to several conclusions which are presented here. First, IT investment has a significant impact on the strategic use of IT, and the strategic use of IT has a significant impact on business performance. Second, SME investment in IT and strategic use of IT are influenced by both the intensity of competition in the market environment and partnership with other organizations. Third, the support from the management group in SMEs is a core factor for IT investment and strategic use of IT. Finally, for SMEs to use IT strategically and successfully, it is necessary to combine members' participation with a flexible organizational structure and culture.  相似文献   

19.
The energy requirements of everyday activities such as housework, travel or sleep differ considerably; hence, individual time use – the pattern of activities individuals perform during a day – is crucial for the energy consumption associated with lifestyles. Increasing use of information and communication technology (ICT) in everyday life changes individual time use and thus affects the associated energy requirements. ICT can have increasing or decreasing effects on energy use (e.g. it can reduce transport through virtual mobility or increase transport by creating the desire to travel to places seen on the Internet). Understanding the causal relationships between ICT, time, and energy use is essential to promote its desired impacts and prevent socially and environmentally unfavorable (unsustainable) ones. Despite various approaches to time use across disciplines, no consistent conceptual framework of the impact of ICT on time use and environmental impact exists so far. In this paper, we review existing literature on (1) ICT impacts on time use, and (2) environmental impacts of time use. Aiming to bridge differences across disciplines and methodological approaches, we develop a conceptual framework for systematically assessing the impact of ICT on time and energy use. The core of this framework is the categorization of ICT impacts on the relaxation of time and space constraints to activities, parallelization, fragmentation, substitution, avoidance, and delegation of activities, changes to the duration and manner of activities, changes to the process of activity planning, and generation of new ICT-based activities. In a broader systems perspective, these effects also trigger causal chains which can form feedback loops and thus change time-use patterns with some delay (systemic effects). Changes in time use affect direct energy requirements through the energy used to perform activities (e.g. in the form of electricity or fuels). Indirect energy requirements, the energy embedded in goods, only change if production of goods can be avoided (e.g. if telecommuting leads to fewer cars being purchased). The net energy impact of a given ICT use case depends on direct and indirect energy requirements of the activities performed before and after adoption of the use case. We demonstrate the application of the framework by qualitatively assessing time and energy use impacts of a frequently discussed ICT use case: telecommuting.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号