共查询到20条相似文献,搜索用时 156 毫秒
1.
智能工具机YH-ITM是一个基于RISC、支持多种人工智能语言和传统C语言的通用智能计算机系统。数据缓冲部件DBU是该系统中的一个重要组成部分。本文论述了DBU的功能、结构、工作状态、对多处理机环境及对Prolog的支持,以及对各类访问的处理。 相似文献
2.
BC是一种支持任意精度算术运算的C风格语言。本文介绍在国产UNIX版本运行的COSIX BC的设计及其实现,着重描述了它的主要设计特点以及对传统BC的改进。并对它的一个实现版本进行性能方面的评价。 相似文献
3.
HP BASIC/UX程序中调用C语言生成的CSUB,可以综合HPBASIC/UX和C语言的编程优点,使编程更方便,灵活,本文先介绍了CSUB的概念和基于HPBASIC/UX的C语言CSUB编程方法,最后给出了一个实例。 相似文献
4.
5.
作者在C环境下设计了一个DOS图形用户接口GUI,它为DOS提供了绘图和显示特殊文字的图形服务功能。本文介绍了在C环境下的DOS图形用户接口设计方法,以及FOXBASE+数据库系统和其它语言编写的应用程序与GUI的接口设计。 相似文献
6.
圆弧曲线的三次NURBS表示 总被引:18,自引:0,他引:18
本文首次提出三次NURBS曲线精确地表示圆弧的充要条件,解决了两方面的问题:一是已知三次NURBS曲线,如何判断它是否是圆弧,二是已知一圆弧曲线,怎样用三次NURBS曲线精确地表示,给出了圆弧曲线的三次NURBS表示的几何构造算法,均匀有理B样条曲线和有理Bezier曲线精确地表示圆弧曲线的充要条件可作为NURBS曲线的特殊情形得到,这些研究结果为NURBS应用于CAGD,CAD/CAM提供了一个 相似文献
7.
《数字社区&智能家居》2001,(25)
一、选择题(1—30题每小题1分,31—55题每小题2分,共80分) 下列各题A)、B)、C)、D)四个选项中,只有一个选项是正确的,请选出正确选项。 1.完整的计算机硬件系统一般包括外部设备和()。 A)运算器和控制器B)存储器 C)主机D)中央处理器 2.计算机能够自动工作,主要是因为采用了()。 A)二进制数制B)高速电子元件 C)存储程序控制D)程序设计语言 3.下面哪一组是系统软件()。 A)DOS和MIS B)WPS和UNIX C)DOS和UNIX D)UNIX和Word 4.下列各组设备中,全… 相似文献
8.
《CAD/CAM与制造业信息化》1995,(12)
CV公司软件精品荟萃创立于1969年的美国CV公司是全球CAD/CAE/CAM业界具有M十多年辉煌历史的计算机软件和服务公司。其软件系统支持世界上享有声誉的全部UNIX工作站平台,包括SUN、DEC、HP、SGI和IBM系列,还有运行于PC机上的软件... 相似文献
9.
BDCard是一个基于HAM模型的通用超文本系统。本文讨论BDCard的系统模型和用户界面模型,BDCard导航及迷途问题的解决方法,BDCard的交互制作及BDScript制作语言。然后介绍了两个BDCard系统的应用实例。 相似文献
10.
JDBC(Java DataBase Connectivity)是Java和数据库互连的接口,本文分析了JDBC的体系结构,讨论了JDBC URL和API;介绍了如何使用JDBC进行编辑;文中最后给出了一个JDBC编程的实例。 相似文献
11.
Wei Yu Xun Wang Xinwen Fu Dong Xuan Wei Zhao 《Parallel and Distributed Systems, IEEE Transactions on》2009,20(11):1611-1625
Internet threat monitoring (ITM) systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudonoise code (PN-code), to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack. 相似文献
12.
This paper is devoted to an industrial case study focused on the issue of how to enhance an existing knowledge management
tool (ITM) with reasoning capabilities, by introducing a semantic query mechanism as well as validation and inference services.
ITM knowledge representation language is based on topic maps. We show that these topic maps (and especially those describing
the domain ontology and annotation base) can be naturally mapped to the
SG\mathcal {SG}
family, a sublanguage of conceptual graphs. This mapping equips ITM with a reasoning service. We finally present a media monitoring
system benefiting from this transformation and combining ITM with the conceptual graph engine CoGITaNT. 相似文献
13.
在机载斜视阵雷达中,杂波谱对距离有依赖性导致了传统空时二维处理难以抑制杂波.根据杂波的分布特性,提出了一种杂波谱补偿的降维方法.该方法采用导数更新法级联多级维纳滤波器.首先通过导数更新方法对杂波谱进行有效的补偿,消除了杂波谱对距离的依赖性,然后使用多级维纳滤波器对数据进行分解降维处理,避免了矩阵求逆的运算,降低了数据的运算量.理论分析和仿真结果表明,本文方法既可以有效消除杂波谱对距离的依赖性,准确地估计出互相关系数,同时减少了运算量. 相似文献
14.
《Computers & Structures》2001,79(22-25):2091-2102
In comparison to FEM or to time step procedures integral transform methods (ITM) have a very restricted domain for application. Under the condition however, that they can be used at all, they lead to a deeper understanding of the physical nature of the problem, they may allow to ameliorate existing computational techniques and they can be used to develop new approaches “on their own right”.The paper shows examples for illustration. After a short introduction of different well known transform techniques and respective operations in the original and the transformed domains, it deals with signal processing: In a first example different possibilities for the interpretation of time dependent signals in the original domain, in a Fourier or in a wavelet transformed domain are compared. After that the usefulness of ITM is illustrated in regard of reliability questions. It is shown that typical characteristics known for time depending signals exist in a comparable, however more general, manner also in regard of spatial relations for problems of half space dynamics. ITM does not only allow interpretations but –– e.g. for the half space dynamics –– it leads also to very efficient solution techniques, particularly for moving loads. It can be used also for the development of auxiliary techniques for FEM or BEM approaches. Finally also in stochastic dynamics it is applicable with great advantages. 相似文献
15.
16.
本文基于YH-F2系统编译程序设计,为最大程度地开发YH-F2对复杂算术表达式的并行计算能力,引入二次文法及双带产生式系统描述算术表达式,并据此设计双带产生式的SLR制导翻译方法,对复杂表达式进行并行代码生成,取得了圆满的效果。 相似文献
17.
为了保证手机信息安全,设计实现了一种基于内置三轴加速度传感器的手机用户认证方案。通过内置三轴加速度传感器采集认证手势信号,提出差分自底向上线性分段方法进行有效手势动作端点的自动检测,利用小波包分解对有效手势信号进行去噪,进一步设计基于欧氏距离的动态时间规整算法计算测试手势和模板手势的相似度,从而得出认证结果。相比于现有常用手势端点检测方法,差分自底向上线性分段方法能更准确地截取有效手势信号。实验结果表明,当他人模仿手势错误接受率为0%时,本文认证手势错误拒绝率小于5%,有效实现了用户认证。 相似文献
18.
Often system developers follow Unified Modeling Language (UML) activity diagrams to depict all possible flows of controls
commonly known as scenarios of use cases. Hence, an activity diagram is treated as a useful design artifact to identify all
possible scenarios and then check faults in scenarios of a use case. However, identification of all possible scenarios and
then testing with activity diagrams is a challenging task because several control flow constructs and their nested combinations
make path identification difficult. In this paper, we address this problem and propose an approach to identify all scenarios
from activity diagrams and use them to test use cases. The proposed approach is based on the classification of control constructs
followed by a transformation approach which takes into account any combination of nested structures and transforms an activity
diagram into a model called Intermediate Testable Model (ITM). We use ITM to generate test scenarios. With our approach it is possible to generate more scenarios than the existing
work. Further, the proposed approach can be directly carried out using design models without any addition of testability information
unlike the existing approaches. 相似文献
19.
20.