首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
智能工具机YH-ITM是一个基于RISC、支持多种人工智能语言和传统C语言的通用智能计算机系统。数据缓冲部件DBU是该系统中的一个重要组成部分。本文论述了DBU的功能、结构、工作状态、对多处理机环境及对Prolog的支持,以及对各类访问的处理。  相似文献   

2.
BC是一种支持任意精度算术运算的C风格语言。本文介绍在国产UNIX版本运行的COSIX BC的设计及其实现,着重描述了它的主要设计特点以及对传统BC的改进。并对它的一个实现版本进行性能方面的评价。  相似文献   

3.
HP BASIC/UX程序中调用C语言生成的CSUB,可以综合HPBASIC/UX和C语言的编程优点,使编程更方便,灵活,本文先介绍了CSUB的概念和基于HPBASIC/UX的C语言CSUB编程方法,最后给出了一个实例。  相似文献   

4.
新硬件发布     
美达推出支持双赛扬的主板美达科技最近推出一款基于BX芯片组可通过一个370转换卡来支持双赛扬CPU的主板6ABD。要说明的是,这块转换卡不能用在别的主板上,因为双赛扬需要一个特殊的芯片来控制,这个芯片叫做“i82093”,扁平封装,普通BX主板上没有这个东西。该板价格却不贵,每块价格只有1280元(包括主板和卡)。技嘉推出820主板GA-6CX右边一款是技嘉标准的820主板GA-6CX,只有3个DIMM插槽,只支持RAMBUS,容量达IG。也采用DUALBIOS和STR技术,集成AUREAL88…  相似文献   

5.
作者在C环境下设计了一个DOS图形用户接口GUI,它为DOS提供了绘图和显示特殊文字的图形服务功能。本文介绍了在C环境下的DOS图形用户接口设计方法,以及FOXBASE+数据库系统和其它语言编写的应用程序与GUI的接口设计。  相似文献   

6.
圆弧曲线的三次NURBS表示   总被引:18,自引:0,他引:18  
本文首次提出三次NURBS曲线精确地表示圆弧的充要条件,解决了两方面的问题:一是已知三次NURBS曲线,如何判断它是否是圆弧,二是已知一圆弧曲线,怎样用三次NURBS曲线精确地表示,给出了圆弧曲线的三次NURBS表示的几何构造算法,均匀有理B样条曲线和有理Bezier曲线精确地表示圆弧曲线的充要条件可作为NURBS曲线的特殊情形得到,这些研究结果为NURBS应用于CAGD,CAD/CAM提供了一个  相似文献   

7.
一、选择题(1—30题每小题1分,31—55题每小题2分,共80分) 下列各题A)、B)、C)、D)四个选项中,只有一个选项是正确的,请选出正确选项。 1.完整的计算机硬件系统一般包括外部设备和()。 A)运算器和控制器B)存储器 C)主机D)中央处理器 2.计算机能够自动工作,主要是因为采用了()。 A)二进制数制B)高速电子元件 C)存储程序控制D)程序设计语言 3.下面哪一组是系统软件()。 A)DOS和MIS B)WPS和UNIX C)DOS和UNIX D)UNIX和Word 4.下列各组设备中,全…  相似文献   

8.
CV公司软件精品荟萃创立于1969年的美国CV公司是全球CAD/CAE/CAM业界具有M十多年辉煌历史的计算机软件和服务公司。其软件系统支持世界上享有声誉的全部UNIX工作站平台,包括SUN、DEC、HP、SGI和IBM系列,还有运行于PC机上的软件...  相似文献   

9.
BDCard是一个基于HAM模型的通用超文本系统。本文讨论BDCard的系统模型和用户界面模型,BDCard导航及迷途问题的解决方法,BDCard的交互制作及BDScript制作语言。然后介绍了两个BDCard系统的应用实例。  相似文献   

10.
JDBC(Java DataBase Connectivity)是Java和数据库互连的接口,本文分析了JDBC的体系结构,讨论了JDBC URL和API;介绍了如何使用JDBC进行编辑;文中最后给出了一个JDBC编程的实例。  相似文献   

11.
Internet threat monitoring (ITM) systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudonoise code (PN-code), to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.  相似文献   

12.
This paper is devoted to an industrial case study focused on the issue of how to enhance an existing knowledge management tool (ITM) with reasoning capabilities, by introducing a semantic query mechanism as well as validation and inference services. ITM knowledge representation language is based on topic maps. We show that these topic maps (and especially those describing the domain ontology and annotation base) can be naturally mapped to the SG\mathcal {SG} family, a sublanguage of conceptual graphs. This mapping equips ITM with a reasoning service. We finally present a media monitoring system benefiting from this transformation and combining ITM with the conceptual graph engine CoGITaNT.  相似文献   

13.
在机载斜视阵雷达中,杂波谱对距离有依赖性导致了传统空时二维处理难以抑制杂波.根据杂波的分布特性,提出了一种杂波谱补偿的降维方法.该方法采用导数更新法级联多级维纳滤波器.首先通过导数更新方法对杂波谱进行有效的补偿,消除了杂波谱对距离的依赖性,然后使用多级维纳滤波器对数据进行分解降维处理,避免了矩阵求逆的运算,降低了数据的运算量.理论分析和仿真结果表明,本文方法既可以有效消除杂波谱对距离的依赖性,准确地估计出互相关系数,同时减少了运算量.  相似文献   

14.
《Computers & Structures》2001,79(22-25):2091-2102
In comparison to FEM or to time step procedures integral transform methods (ITM) have a very restricted domain for application. Under the condition however, that they can be used at all, they lead to a deeper understanding of the physical nature of the problem, they may allow to ameliorate existing computational techniques and they can be used to develop new approaches “on their own right”.The paper shows examples for illustration. After a short introduction of different well known transform techniques and respective operations in the original and the transformed domains, it deals with signal processing: In a first example different possibilities for the interpretation of time dependent signals in the original domain, in a Fourier or in a wavelet transformed domain are compared. After that the usefulness of ITM is illustrated in regard of reliability questions. It is shown that typical characteristics known for time depending signals exist in a comparable, however more general, manner also in regard of spatial relations for problems of half space dynamics. ITM does not only allow interpretations but –– e.g. for the half space dynamics –– it leads also to very efficient solution techniques, particularly for moving loads. It can be used also for the development of auxiliary techniques for FEM or BEM approaches. Finally also in stochastic dynamics it is applicable with great advantages.  相似文献   

15.
银河TS-1微处理器的流水线   总被引:1,自引:0,他引:1  
赵学秘  陆洪毅  王蕾  戴葵  王志英 《计算机工程》2003,29(5):142-143,F003
银河TS-1微处理器是国防科技大学计算机学院自行设计的具有自主版权的32位嵌入式微处理器,参考标准DLX5级流水线设计了银河TS-1流水线核基本的指令处理通路和数据通路,并以此为基础提出了一种更为高效的6级流水线:取指,译码,操作数准备,ALU执行,数据获取,写回。此6级流水线与5级流水线相比,硬件开销增加很少,但加速比小于1.54。  相似文献   

16.
本文基于YH-F2系统编译程序设计,为最大程度地开发YH-F2对复杂算术表达式的并行计算能力,引入二次文法及双带产生式系统描述算术表达式,并据此设计双带产生式的SLR制导翻译方法,对复杂表达式进行并行代码生成,取得了圆满的效果。  相似文献   

17.
为了保证手机信息安全,设计实现了一种基于内置三轴加速度传感器的手机用户认证方案。通过内置三轴加速度传感器采集认证手势信号,提出差分自底向上线性分段方法进行有效手势动作端点的自动检测,利用小波包分解对有效手势信号进行去噪,进一步设计基于欧氏距离的动态时间规整算法计算测试手势和模板手势的相似度,从而得出认证结果。相比于现有常用手势端点检测方法,差分自底向上线性分段方法能更准确地截取有效手势信号。实验结果表明,当他人模仿手势错误接受率为0%时,本文认证手势错误拒绝率小于5%,有效实现了用户认证。  相似文献   

18.
Often system developers follow Unified Modeling Language (UML) activity diagrams to depict all possible flows of controls commonly known as scenarios of use cases. Hence, an activity diagram is treated as a useful design artifact to identify all possible scenarios and then check faults in scenarios of a use case. However, identification of all possible scenarios and then testing with activity diagrams is a challenging task because several control flow constructs and their nested combinations make path identification difficult. In this paper, we address this problem and propose an approach to identify all scenarios from activity diagrams and use them to test use cases. The proposed approach is based on the classification of control constructs followed by a transformation approach which takes into account any combination of nested structures and transforms an activity diagram into a model called Intermediate Testable Model (ITM). We use ITM to generate test scenarios. With our approach it is possible to generate more scenarios than the existing work. Further, the proposed approach can be directly carried out using design models without any addition of testability information unlike the existing approaches.  相似文献   

19.
本文简要地介绍YH-2并行巨型机有关结构设计中对标准化、通用化及模块化的几点考虑。  相似文献   

20.
本文简要地介绍YH-2并行巨型机有关结构设计中对标准化、通用化及模块化的几点考虑。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号