首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The threat of cyber attacks motivates the need to monitor Internet traffic data for potentially abnormal behavior. Due to the enormous volumes of such data, statistical process monitoring tools, such as those traditionally used on data in the product manufacturing arena, are inadequate. “Exotic” data may indicate a potential attack; detecting such data requires a characterization of “typical” data. We devise some new graphical displays, including a “skyline plot,” that permit ready visual identification of unusual Internet traffic patterns in “streaming” data, and use appropriate statistical measures to help identify potential cyberattacks. These methods are illustrated on a moderate-sized data set (135,605 records) collected at George Mason University.  相似文献   

2.
The problem of maximum depth of monotone Boolean functions is investigated when k-input AND and OR gates are used for realisation.  相似文献   

3.
In this paper we present a method for creating a strategy to control the movements of a service robot, servicing thread rewinding machines. The robot moves from one machine to another detecting a dropped or broken thread. When this is detected the robot will restart the machine.

A previous paper considered a number of naive strategies and compared them to the simple strategy of just moving back and forth from one end of the line to the other. In this paper we will propose a new method for determining the strategy and we will examine the effects of this new strategy with the aid of simulation.  相似文献   


4.
Past research has extensively investigated the effect of media, especially focusing on how anonymity increases risk-related behaviors of groups when using computer-mediated communication (CMC). This study extends prior research by examining the differences in group risk-taking behaviors between face-to-face groups and completely non-anonymous CMC groups (i.e., groups working in a fully identified, synchronous CMC environment similar to popular instant messaging systems utilized widely within organizations). Drawing on the “decision analysis” perspective, a key framework for understanding organizational decision-making, the study also examines the effects of the firm's risk preferences as well as the type of information distribution among group members (i.e., full information known to all group members versus partial information know by only some of the members) on the groups' risk-taking behaviors. Results from a laboratory experiment using student subjects found no differences in risk-taking behaviors between CMC and face-to-face groups; additionally, no differences were found related to how information was distributed among group members. A significant effect was found, however, for the risk preference of the firm, showing that risk-neutral firms influenced groups to make riskier decisions than groups from risk-averse firms. Finally, groups within risk-neutral firms receiving partial information made riskier decisions than groups receiving full information. The implications of these results for future research and practice are examined.  相似文献   

5.
6.
7.
8.
Computer integrated manufacturing (CIM) is creating unexpected problems for a growing number of manufacturing companies. Manufacturers are finding it especially difficult to attract programmers who are both willing and able to develop the highly complex software that integrates existing accounting, sales, production, engineering, and quality control information subsystems. Consequently, many companies abdicate their responsibility for manufacturing information systems and seek third party support ranging from consulting assistance to a total takeover of the company's information resources and operations. Companies that “give away” their internal information system capabilities to third parties will ultimately lose control of their enterprise information, a danger to be avoided. Off-the-shelf software for desktop computers has become sufficiently powerful to help solve a major portion of this serious problem. We hypothesize that manufacturing engineers (and others) can be trained to use packaged software to leverage their company's systems programming capabilities. In effect they would become “paraprogrammers” who would help design, develop, and maintain manufacturing information systems. This new type of professional would not require a computer science or similar educational background, but could be trained to satisfy many specialized programming needs in a manner similar to how paramedics and paralegals are trained and used in the medical and legal professions, respectively. This paper reports on the early stages of research to determine whether or not product design engineers can use a desktop relational database management system and its various command languages to develop a master bill of material information system (BOMIS). The purpose of the research is to evaluate the amount of programming complexity reduction and increased operational effectiveness that can be achieved through paraprogramming by manufacturing engineers.  相似文献   

9.
10.
11.
12.
13.
Let g be any local property (e.g., gray level or gradient magnitude) defined on a digital picture. Let pg(z) be the relative frequency with which g has value z. At each point (x,y) of the picture we can display pg[g(x,y)], appropriately scaled; the result is called the pg transform of the picture. Alternatively, we can use joint or conditional frequencies of pairs of local properties to define transforms. This note gives examples of such transforms for various gs and discusses their possible uses and limitations.  相似文献   

14.
This paper looks at legal reasoning from the point of view of the work of the lawyer, rather than the law itself. In the case of Common Law systems, this means a more flexible view of how tasks are divided between the humans and the computer system, with an emphasis on decision support rather than complete automation. A process-based model of the lawyer's work is proposed in the form of a double syllogism, which displays an aesthetically pleasing symmetry, but also a significant asymmetry in the role played by perceived precedents. This arises from the use of inductive, rather than deductive, reasoning. The potential complications arising from the issue of the perception of precedents are discussed in depth.The double-syllogism model is then considered in the light of CommonKADS terminology and models. It is suggested that decision support systems using knowledge-based techniques, as required to support lawyers working under Common Law jurisdiction, raise a stronger form of the interaction problem that is well known in knowledge-based systems. This means that such systems are not well catered for in the existing CommonKADS Organisational, Agent, Task and Communication Models. The double-syllogism model is suggested as a supplement to CommonKADS in the development of such systems, at least until a more generic addition is available.  相似文献   

15.
16.
Eight VDTs of different trademarks were analysed in relation to the following properties:

( a) Contrasts of luminance between the screens on the one hand and source documents, as well as other surfaces of the VDT, on the other.

(b) Oscillation degree, sharpness and stability of characters.

( c) Face and legibility of characters.

( d) Dimensions, mobility and reflection degrees of the keyboards.

Special equipment was developed and standardized conditions were applied to the measurements.

The eight VDTs showed essential differences for all the parameters, which might be partially responsible for eye strain and postural complaints. It can be concluded that customers should pay more attention to ergonomic qualities when choosing a VDT. But such an endeavour remains useless if the customer does not, at the same time, look for a proper design of the whole workstation including the working environment.  相似文献   

17.
The main objective of the present article is to improve the bandwidth of a low profile Cylindrical Dielectric Resonator Antenna (CDRA) and operate it for WLAN and “C” band applications. An inverted umbrella shaped CDRA excited by a microstrip feedline with single stub is proposed here. Efficient coupling has been achieved by means of a single stub microstrip feed between DRA and the feed. The new shape of DRA and a single stub microstrip feed improves the bandwidth significantly as high as 28% from 5 to 6.67 GHz which is quite useful for both WLAN and “C” band applications. The proposed antenna is simple in construction, easy to fabricate, low profile and thickness of CDRA is only 5 mm. A parametric study is performed using Ansoft HFSS simulation software to optimize the antenna performance. The proposed CDRA is fabricated and the characteristics of the antenna are measured.  相似文献   

18.
Problems that are non-quantitative and not bound to a narrow knowledge domain have been served unsatisfactorily by decision support and expert systems. Alternative techniques that address this type of problem are explained here using two key concepts: problem type dependent process support and domain related knowledge. Process support refers to the program steps and the data items useful in finding the solution. Domain related knowledge is knowledge drawn from a specific domain, yet through abstraction applicable to a wider range of problems. Results of preliminary empirical analyses suggest that both concepts are useful.  相似文献   

19.
20.
This paper describes the information system used to search for a potential matrimonial partner. The search is based on comparison of the subject's record, which consists of his/her answers to about 400 items of a specially designed questionnaire, to the records of the potential partners. The basic principle of the system is representation of the set of candidates for the client with psychological warnings about potential “conflict zones” in relationships between client and candidate rather than a ranking of candidates based on hypothetical “psychological compatibility” indices.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号