首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
This paper traces the origin of intelligence in biological organisms, thought of as negative entropy systems, relating it to both perception and mobility. A distinction is made between behaviour which is a function of an animal's beliefs about its circumstances, and behaviour which is related to those circumstances more directly, only behaviour of the former sort being regarded as intelligent. It is claimed that in order to provide a model of the human mind, a robot would have to possess not only intelligence but also a use for that intelligence; and for that to be so it would have to possess purposes which were its own, not simply those of its manufacturer. There would, that is, have to be things which it was not only able but wanted to do. And for that to be so, its experience of the world would have to possess not simply an epistemic but also a phenomenal aspect. It could not be assumed that that would be so, however, since a robot, even if functionally equivalent to a person, would presumably be structured differently and made of different materials.  相似文献   

3.
Two new simulation languages, DESIRE P and DESCTOP, combine interpretation of the experiment protocol with fast compilation of the model differential equations and thus execute directly on a typed RUN command. Simulations run at about FORTRAN 77 speed. While earlier languages of this type (MICRODARE and DESIRE V3) were implemented in assembly language, both new systems are written in PASCAL except for FORTRAN integration routines and a small machine-language interface, so that the code was readily ported from the PDP-11 to the VAX. DESIRE P incorporates a new one-pass compiler and some precompiler syntax checking. DESCTOP is a general-purpose workstation language with complex arithmetic, matrix transformations, fast Fourier transforms, true procedures, and structured programming with automatic prettyprinting. Like DESIRE V3, both new languages permit convenient screen editing and contain operating-system commands and command procedures as a language subset. On the VAX, both languages support simulation with 100 or more state variables and Tektronix color graphics. An IBM PC/XT/AT version also exists.  相似文献   

4.
This paper presents a hybrid agent architecture that integrates the behaviours of BDI agents, specifically desire and intention, with a neural network based reinforcement learner known as Temporal Difference-Fusion Architecture for Learning and COgNition (TD-FALCON). With the explicit maintenance of goals, the agent performs reinforcement learning with the awareness of its objectives instead of relying on external reinforcement signals. More importantly, the intention module equips the hybrid architecture with deliberative planning capabilities, enabling the agent to purposefully maintain an agenda of actions to perform and reducing the need of constantly sensing the environment. Through reinforcement learning, plans can also be learned and evaluated without the rigidity of user-defined plans as used in traditional BDI systems. For intention and reinforcement learning to work cooperatively, two strategies are presented for combining the intention module and the reactive learning module for decision making in a real time environment. Our case study based on a minefield navigation domain investigates how the desire and intention modules may cooperatively enhance the capability of a pure reinforcement learner. The empirical results show that the hybrid architecture is able to learn plans efficiently and tap both intentional and reactive action execution to yield a robust performance.  相似文献   

5.
Social networking sites are built and designed to provide online services and a platform for people to social interacts and exchange information. This study used the social capital theory as a foundation to explore the social interaction factors and individual factors such as shared value, community identification, and information privacy concerns, and examine the mediating role of the desire to give information between trust on websites/members and information sharing behaviour in the proposed model. This research sample consists of seven hundred and twenty-seven members who have used the Facebook fan page for at least 6 months. This study adopted structural equation modeling to test the research hypotheses. The results of this study show that shared value, community identification, and information privacy concern directly influence trust on websites and members. Trust on websites and members directly influenced the desire to get/give information. Desire to give information directly influences information sharing behaviour. The desire to give information plays important mediating roles between trust on websites/members and information sharing behaviour. Finally, we provide conclusions and managerial implications of the findings.  相似文献   

6.
Massive Multiplayer Online Role-Playing Games (MMORPGs), which allow simultaneous participation of several gamers, have attracted a great deal of attention recently. Since MMORPGs can be categorized as a type of online community, the behavior of MMORPGs users needs to be considered as the general behavior in online communities. However, previous studies of online communities did not pay enough attention to MMORPGs, in which users can express themselves by interacting actively through games and game avatars. Understanding the characteristics of MMORPGs as online game communities where users communicate and interact will allow games to be vitalized and users to be immersed in games in a more positive way. Hence, using self-presentation theory and social identity theory, this study examined the factors influencing self-presentation desire and the mediating role of self-presentation desire examined in terms of trust of and commitments to online game communities. The results showed that the interactivity in the spaces of MMORPGs had the biggest impacts on self-presentation desire; personal innovativeness and game design quality also was influential. The results also indicated that self-presentation desire caused trust of online games and eventually led to even stronger commitments to gamers.  相似文献   

7.
本文提出了一种分级入侵预警方案。文章说明了分级入侵预警系统的整体框架,分析了各组成部分的功能和实现方案。该预警方案能够利用网络安全漏洞检测系统的检测结果对依据攻击关系图预测的下一步攻击进行分析,实现分级预警。  相似文献   

8.
Early jump-out corner detectors   总被引:5,自引:0,他引:5  
The authors present two new corner detectors. One works by using dissimilarity, along the contour direction to detect curves in the image contour, and the other estimates image curvature along the contour direction. These operators are fast, robust to noise, and require no subjective thresholding  相似文献   

9.
The need for early detection of temporal events from sequential data arises in a wide spectrum of applications ranging from human-robot interaction to video security. While temporal event detection has been extensively studied, early detection is a relatively unexplored problem. This paper proposes a maximum-margin framework for training temporal event detectors to recognize partial events, enabling early detection. Our method is based on Structured Output SVM, but extends it to accommodate sequential data. Experiments on datasets of varying complexity, for detecting facial expressions, hand gestures, and human activities, demonstrate the benefits of our approach.  相似文献   

10.
11.
12.
In past columns we have discussed how MIS can encourage an organization without a strategic plan to develop one (the objective being for MIS to gain guidance in formulating its own strategic plan). In this column, however, we consider an organization ready and eager to modify its own strategic plan to meet new conditions. This is a golden opportunity for MIS to aid in the organization's strategic planning activity by contributing information that policymaking executives can use to craft a new strategy.  相似文献   

13.
14.
离子选择电极的早年岁月当现代离子选择电极(ISEs)问世接近50周年时,Matrafured会议看来是我们回忆早年时光的最恰当场合,因为匈牙利被普遍认同为这一类新型电极的诞生地。在上世纪60年代和70年代参与离子选择电极研究工作的我们都可以回忆起那见证新发现的激动人心时刻。本文从对早年研究工作引领者的简单回忆开始,继之以我本人当初对这类新型电极进行验证实验的情况。  相似文献   

15.
提出了一种根据网络统计特征动态调节参数的RED改进算法DRED(Dynamic RED),它能够降低丢包率,提高RED算法的网络适应性和链路利用率。实验结果表明,DRED算法是有效的。  相似文献   

16.
Bankruptcy prediction has long time been an active research field in finance. One of the main approaches to this issue is dealing with it as a classification problem. Among the range of instruments available, we focus our attention on the Evolutionary Nearest Neighbor Classifier (ENPC). In this work we assess the performance of the ENPC comparing it to six alternatives. The results suggest that this algorithm might be considered a good choice.  相似文献   

17.
本文从场景的角度研究软件早期可靠性建模方法,给出了基于用例图确定场景运行剖面的方法,利用简化通信图确定可靠性模型中的参数。模型与UML图无缝集成,可应用于软件开发生命周期早期。用个人登录控制系统(PACS)实例介绍了模型的应用。与已有方法相比,该模型简单且吝易工具实现。  相似文献   

18.
早期确定性拥塞指示算法   总被引:1,自引:0,他引:1  
分析了RED算法在拥塞指示信息传输上的不足,提出了一种早期确定性拥塞指示算法,使得拥塞指示能尽可能快地到达TCP源,以有效地响应路由器的早期拥塞,使用改进的NS进行了仿真实验,实验结果表明该算法在保证网络吞吐率的基础上,能更有效地降低路由器中的丢包率,提高网络的利率率。  相似文献   

19.
In this article, I describe the design of an early 1950s attempt to build a relatively low-cost computer, using a mechanical desktop calculator to perform the arithmetic operations. The resulting computer-one of the earliest attempts at building a "minicomputer"-could perform stored-program addition, subtraction, multiplication, and division, as well as carry out a simple decision operation based on a number comparison. To solve a problem, the operator would type in a program sequence based on the use of nine basic instructions. Total memory capacity was 400 words.  相似文献   

20.
Early computer developments and related topics at the University of Madrid and the Institute of Electricity and Automatics (CSIC) In Madrid (Spain) during the 1950s and 1960s are discussed.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号