共查询到20条相似文献,搜索用时 0 毫秒
1.
政府办公自动化系统的设计、实现和应用 总被引:5,自引:1,他引:4
政府办公自动化是电子政务系统的一个重要组成部分,实现政府办公自动化是提高办公质量和效率、促进政务公开的一个重要手段。以国家质量监督检验检疫总局办公自动化系统为原型,阐述了政府办公自动化系统的设计和实现方法,描述了系统的功能和特点,介绍了推广应用措施和效果。 相似文献
2.
3.
We consider a system which consists of one operating element and cold redundant elements of the same type. System failures are partially eliminated by repair and partially by replacement of the faulty element with a normally operating standby element (if no such element is available, the system fails). A comprehensive analysis of system failure probability is performed.Translated from Kibernetika, No. 1, pp. 94–98, January–February, 1991. 相似文献
4.
Cui W Liu S Tan L Shi C Song Y Gao ZJ Tong X Qu H 《IEEE transactions on visualization and computer graphics》2011,17(12):2412-2421
Understanding how topics evolve in text data is an important and challenging task. Although much work has been devoted to topic analysis, the study of topic evolution has largely been limited to individual topics. In this paper, we introduce TextFlow, a seamless integration of visualization and topic mining techniques, for analyzing various evolution patterns that emerge from multiple topics. We first extend an existing analysis technique to extract three-level features: the topic evolution trend, the critical event, and the keyword correlation. Then a coherent visualization that consists of three new visual components is designed to convey complex relationships between them. Through interaction, the topic mining model and visualization can communicate with each other to help users refine the analysis result and gain insights into the data progressively. Finally, two case studies are conducted to demonstrate the effectiveness and usefulness of TextFlow in helping users understand the major topic evolution patterns in time-varying text data. 相似文献
5.
《Accounting, Management and Information Technologies》1999,9(1):1-23
This paper shows how the theory development portion of action research can be made more rigorous. The process of theory formulation is an essential part of action research, yet this process is not well understood. A case study demonstrates how units of analysis and techniques from grounded theory can be integrated into the action research cycle in order to add rigor and reliability to the theory formulation process. 相似文献
6.
Computer vision is concerned with extracting information about a scene by analyzing images of that scene. Performing any computer vision task requires an enormous amount of computation. Exploiting parallelism appears to be a promising way to improve the performance of computer vision systems. Past work in this area has focused on applying parallel processing techniques to image-operator level parallelism. In this article, we discuss the parallelism of computer vision in the control level and present a distributed image understanding system (DIUS).In DIUS, control-level parallelism is exploited by a dynamic scheduler. Furthermore, two levels of rules are used in the control mechanism. Meta-rules are concerned mainly with which strategy should be driven and the execution sequence of the system; control rules determine which task needs to be done next. A prototype system has been implemented within a parallel programming environment, Strand, which provides various virtual architectures mapping to either a shared-memory machine, Sequent, or to the Sun network. 相似文献
7.
电子政务审批系统的设计和实现 总被引:2,自引:1,他引:2
对电子政务中应用的工作流技术以及IBM的工作流管理系统MQ Worknow做了简要介绍,提出了使用MQ Workflow作为工作流建模和执行平台,设计和实现了一个基于Web的网上审批系统,并将Web Senrice技术融合进来,实现了工作流系统对Web服务的调用。 相似文献
8.
Gurpreet S. Dhillon Mário Caldeira Mitchell R. Wenger 《The Journal of Strategic Information Systems》2011,20(4):438-448
This paper evaluates the interplay between intentionality of stakeholders, organizational power and information systems (IS) implementation in the context of an European firm implementing an Enterprise Resource Planning system. We found that the implementation coincided with significant restructuring of power relations within the firm. We also found that the intentions of various stakeholders came to bear in terms of how organizational power got manifested. Our findings suggest a complex interplay between individual intentions and organizational power. Specifically, our study contributes to the literature by providing insights into the systemic nature of organizational power regarding IS implementations and how it relates to individual intentions. 相似文献
9.
10.
ALINEA, which was introduced almost 30 years ago, remains certainly the most well-known feedback loop for ramp metering control. A theoretical proof of its efficiency at least when the traffic conditions are rather mild is given here, perhaps for the first time. It relies on tools stemming from the new model-free control and the corresponding ‘intelligent’ proportional controllers. Several computer experiments confirm our theoretical investigations. 相似文献
11.
12.
Consider a very large ordered collection of indices for an index organization of a dynamically changing random access file. In this paper, we propose a technique for compressing keys from the collection of indices into the minimal set, and hence reducing tremendously the storage space requirement. A set of criteria is given for considering whether the application of this compression technique on keys can meet the minimal space requirement. We also propose the storage structure design for these compressed indices with a view to tackling the key redundancy problem, supporting a general algorithm for retrieving the keys and minimizing costs for updating and maintenance of indices. Finally, we give a comparison between the use of ON KEY interruption implemented in PL/1 and the use of the key compression technique and the hierarchical tree structure as our alternative in dealing with indexed sequential files. 相似文献
13.
蓝牙访问控制方案的设计与实现 总被引:1,自引:0,他引:1
通过分析L2CAP层和RFCOMM层连接建立过程以及HCI层、L2CAP层和RFCOMM层接收流程上的数据分组,提出了一种在HCI层、L2CAP层和RFCOMM层实施的蓝牙访问控制方案,并基于BlueZ协议栈进行了仿真实现.实验结果表明,该方案能够实现对蓝牙服务应用的实时控制,解决了蓝牙访问控制方案存在延时问题,确保蓝牙设备内资源的安全. 相似文献
14.
With the proliferation of telecommunications technologies, the information-based communication infrastructure is becoming an increasingly critical organization resource. In order effectively to channel limited resources (skills, capital, technology) to the most strategically critical communication needs of the organization, the development of business driven planning methodologies which result in a well-defined architecture (blueprint) of organizational communication processes are needed. Unfortunately, while architectural issues are of utmost importance today, researchers have focused almost exclusively on data oriented models. This study attempts to expand this view and provide a holistic representation of information architecture. With the perspective provided by this definitional framework, two methods for development of communications architecture are discussed and evaluated: (1) a flow based approach; and (2) network analysis. Network analysis in particular shows great promise in constructing robust representations of organizational communication processes. 相似文献
15.
16.
Premjit K. Sanjram 《Displays》2013,34(4):283-291
The study investigates the effect of attention on prospective memory performance in programmer multitasking (N = 60) incorporating a taxonomical understanding of prospective memory errors. It also presents an analysis of cognitive workload (CWL). The results demonstrate that people are more vulnerable to prospective memory performance failure when there is a situation that one is required to devote more attention in monitoring to identify a cue for an intended action. Omission error is the most prominent among all types of prospective memory error. Analysis reveals that when there is a stimulus driven situation of attention capture, a performance decrement observed in terms of prospective memory is not necessarily concerned with an increase in CWL. 相似文献
17.
18.
19.
为了提高联网(certificate authority,CA)的安全性,基于(t,n)秘密共享思想,引入安全芯片及RSA分步签名方法,提出了一种具有容忍入侵能力的CA方案。新提出的CA方案从算法理论和系统架构两方面着手,克服传统CA的安全缺陷,保证CA私钥在产生、拆分和分步签名时的安全性,有效地解决了CA抵抗内外部攻击问题,确保了联网CA系统具有一定的入侵容忍能力。最后通过C++和OpenSSL实现了CA系统,验证了该CA方案的可行性。 相似文献
20.
设计了一种穿戴系统电源控制器,是基于单片机控制的电源控制器,为穿戴式系统提供电源管理功能。具有双电池的充电/供电管理,内置单片机,电源开关软控制,并可遥控关机,可实时监控并指示控制器各工作状态,可指示电池电量信息,与上位机通信上传工作状态及电池电量等信息。具有充满保护、过流保护、短路保护、输入反接保护、双电池并接工作等保护功能。具有效率高、体积小、操作简单、功能全、双电池配置灵活、金属外壳电磁兼容性好、可靠性高等优点。可以用太阳能电源或手摇发电机通过控制器给电池充电,提高其野外使用适应性。 相似文献