共查询到20条相似文献,搜索用时 10 毫秒
1.
2.
Roger H. Werner Gary E. Whitehouse Darrell G. Linton Lucy C. Morse 《Computers & Industrial Engineering》1983,7(4):257-266
The system by which the U.S. Navy trains personnel is modeled using the SLAM computer language. By incorporating both network simulation techniques and discrete event logic, the flow of students from a Recruit Training Center (RTC) through the Basic Electricity and Electronics (BEE) schools, the “A” schools and eventually to the fleet, is modeled to a level of detail represented by an individual BEE/“A” school classroom. Inputs for the model include the daily influx of trainees into an RTC for each classification, as well as the various drop, attrition and setback rates.
Since the objective of the study was to allow Navy representation to identify potential bottlenecks prior to their occurrence, the output variables depict both resources utilization and queuing statistics. The simulation model was executed, and the resulting outputs were used to test hypotheses. 相似文献
3.
Sylvain Lassarre Emmanuel Bonnet Franck Bodin Eleonora Papadimitriou George Yannis John Golias 《Computers, Environment and Urban Systems》2012
A pedestrian trip is a spatiotemporal process going through different states and related to different decisions made at certain times and locations on the urban network. The analysis of pedestrian trips in terms of crossing patterns is a complex task, which is often further limited by a lack of appropriate and detailed data. The objective of this research is the development and testing of appropriate indicators of pedestrian crossing behavior along urban trips, and a methodology for collecting and processing the data required for the analysis of this behavior. First, a comprehensive set of indicators for the assessment of pedestrian behavior in urban areas is proposed (i.e. average trip length, number, type and location of crossings). Then, a GIS tool is developed for the storage and integration of information on pedestrian trips, and the crossings made during the trips, with other geographical information (e.g. road network function and geometry, traffic control and pedestrian facilities). The proposed approach is then tested at network level on a sample of pedestrian trips collected by a field survey. The results suggest specific patterns of pedestrian crossing behavior, such as the tendency to cross at the beginning of the trip and the tendency to cross at mid-block locations when signalized junctions are not available. The results are further discussed in terms of urban planning and management implications. It is concluded that the proposed approach is very efficient for the analysis of pedestrian crossing behavior in urban areas. 相似文献
4.
Using customer relationship management (CRM) techniques, companies target market to their customers on an individualized basis. A variation on the CRM theme is employee relationship management (ERM), in which a company uses Web-based personalization techniques to develop a more effective relationship with its employees. This article reports some of the findings for a study sponsored by the U.S. Navy to determine how personalization can be used for a Web portal with the objective of boosting sailor morale and retention. It also discusses ways that CRM personalization techniques can be generalized to fields beyond marketing and employee relations. 相似文献
5.
《Computer aided design》1969,1(2):5-8
During the summer of 1968 Dr. Radley visited the U.S.A. with the specific aim of investigating and reporting on computer-aided design activities there. This paper is his report on the state of the art as he found it.He visited universities as well as commercial organisations and attended both the 5th Annual Design Automation Workshop, held in Washington, and WESCON 68. 相似文献
6.
Co-operative R&D in Advanced Information Technologies is not a Japanese privilege. 相似文献
7.
8.
9.
10.
As a potential strategy for developing regional Land surface climatologies, a statistical method to estimate the land-cover signal from the Normalized Difference Vegetation Index (NDVl) is developed and applied to the Midwest U.S.A. summer growing season. The method evaluates the temporal correlation of NDVl for non-consecutive scenes of the National Oceanic and Atmospheric Administration (NOAA) Advanced Very High Resolution Radiometer (AVHRR) at Local Area Coverage (LAC) resolutions. Conventional mapped data help separate the low frequency variations related to phenology from shorter-term fluctuations involving surface moisture. The land surface signal is more stable temporally when pixel data are aggregated to spatial resolutions commensurate with the Global Area Coverage (GAC) data. 相似文献
11.
12.
GPS技术是美国现代战争中的重要基石 全球定位系统(GPS)是利用围绕地球的24颗卫星准确计算出自身所在位置的系统。它不仅用于军事,而且广泛运用于汽车行驶导向,预测地震等民用领域。 在1991年海湾战争中,GPS就开始崭露头角。近年来,虽然GPS制导装置的应用仍处于实验阶段,但已经开发出安装有GPS导向装置的联合直接攻击炸弹和巡航导弹,并在1999年对科索沃的空袭中大量使用。在美军攻击阿富汗的军事行动中,它发挥了重要的作用。 联合直接攻击炸弹在距离目标30公里处投下炸弹,命中精度能达到10米。这种炸弹造价仅为1.8万美元,… 相似文献
13.
Wenhua Hu Jeffrey C. Carver Vaibhav Anu Gursimran S. Walia Gary L. Bradshaw 《Empirical Software Engineering》2018,23(6):3768-3800
Developing error-free software requirements is of critical importance to the success of a software project. Problems that occur during requirements collection and specification, if not fixed early, are costly to fix later. Therefore, it is important to develop techniques that help requirements engineers detect and prevent requirements problems. As a human-centric activity, requirements engineering can be influenced by psychological research about human errors, which are the failings of human cognition during the process of planning and executinge a task. We have employed human error research to describe the types of problems that occur during requirements engineering. The goals of this research are: (1) to evaluate whether understanding human errors contributes to the prevention of errors and concomitant faults during requirements engineering and (2) to identify error prevention techniques used in industrial practice. We conducted a controlled classroom experiment to evaluate the benefits that knowledge of errors has on error prevention. We then analyzed data from two industrial surveys to identify specific prevention and mitigation approaches employed in practice. The classroom study showed that the better a requirements engineer understands human errors, the fewer errors and concomitant faults that engineer makes when developing a new requirements document. Furthermore, different types of Human Errors have different impacts on fault prevention. The industry study results identified prevention and mitigation mechanisms for each error type. Human error information is useful for fault prevention during requirements engineering. There are practices that requirements engineers can employ to prevent or mitigate specific human errors. 相似文献
14.
N.S. Rajbman 《Automatica》1976,12(1):73-95
The paper is an attempt to describe the use of identification methods in the U.S.S.R. where these develop and extend at a rate comparable to that of the rest of the world. Therefore complete coverage seems to be impossible in one article. Furthermore, many of the methods used in the U.S.S.R. were described in surveys presented to preceding IFAC Congresses and Symposia. Therefore attention is focused on methods which have not been adequately covered in those papers. Relatively much attention is given to adaptive, dispersional, ‘standard’ and distributed models. The essence of each method is described in brief and actual plants are listed where these methods are applied. References are made to papers which describe these methods in more detail. The final part of the paper is a very brief account of other kinds of models and their application. 相似文献
15.
Waheed Moomina Hussain Shahid Khan Arif Ali Ahmed Mansoor Ahmad Bashir 《Multimedia Tools and Applications》2020,79(33-34):24347-24365
Multimedia Tools and Applications - In the context of video-based image classification, image annotation plays a vital role in improving the image classification decision based on it’s... 相似文献
16.
This work describes a computational approach for a typical machine-vision application, that of human action recognition from video streams. We present a method that has the following advantages: (a) no human intervention in pre-processing stages, (b) a reduced feature set, (c) modularity of the recognition system and (d) control of the model’s complexity in acceptable for real-time operation levels. Representation of each video frame and feature extraction procedure are formulated in the lattice theory context. The recognition system consists of two components: an ensemble of neural network predictors which correspond to the training video sequences and one classifier, based on the PREMONN approach, capable of deciding at each time instant which known video source has potentially generated a new sequence of frames. Extensive experimental study on three well known benchmarks validates the flexibility and robustness of the proposed approach. 相似文献
17.
M. J. Showalter 《Computers & Operations Research》1977,4(4):257-269
The work force tour assignment problem in a U.S. Postal Service Sectional Center Facility consists of specifying the weekly tour start time, work center assignment, and mail class responsibility for each postal employee. Any efficient work force assignment must be made subject to a number of constraints including tour schedule requirements, work center capacities, mail arrival volumes, and mail flow patterns through the processing system. A heuristic algorithm of a building, or construction, nature is described which evaluates these many constraints in developing efficient work force tour assignment solutions. Once the problem setting and the heuristic algorithm are described, the use of the procedure is demonstrated by analyzing a hypothetical problem. 相似文献
18.
针对分级身份密码(HIBC)批验签过程中的错误签名快速识别问题,设计实现了一种错误签名混合筛选算法。针对HIBC签名算法不完全聚合的特点,首先将所有签名作为树叶构造平衡二叉树,然后通过拆分攻克与指数测试方法查找错误签名,并且利用计算中间值的关联性减少计算开销。算法性能分析表明,当批验签中错误签名数大于2时,该算法计算开销低于独立测试、通用折半拆分、指数测试以及裁剪搜索算法,能够有效筛选出HIBC批验签中的错误签名,可以应用在云计算认证等应用场景中。 相似文献
19.
20.
Charles R. Franz 《Information & Management》1985,8(3):147-153
Recent developments in statutory and case law in the USA now make it possible to protect by copyright, proprietary computer programs from unauthorized copying provided that the copyright-holding party attempts to display the copyright notice publicly. Considerable progress has been made toward patentable computer software, but the issue of whether a computer program itself may be patented still remains unresolved. The Patent and Trademark Office (PTO) and the Court of Customs and Appeals (CCPA) have agreed that the application of a computer program, containing a mathematical algorithm, in a process may constitute patentible subject matter. The cases pertaining to copyrightable and patentable software together with an explanation of the wording of the new Section 117 of the 1976 Copyright Act are shown in the Appendixes to the article. The paper presents the issues pertaining to copyright and patent protection of computer software and some relevant cases for each issue. It concludes with a discussion of unresolved questions in protecting proprietary software. 相似文献