共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
A Lee Gilbert Sunanda Sangwan Hilda Han Mei Ian 《Personal and Ubiquitous Computing》2005,9(4):198-208
With processors imbedded in appliances, cars, books, and other retail products, modern society has entered the world of pervasive computing. Yet few consumers are able to set up new digital devices and integrate them into everyday life. From this perspective, the data-enabled mobile phone leads the way. In many markets, mobile phones have a product life cycle of 12 months or less. Some subscribers are able to put their new phones to immediate and full use. For others, the learning curve is so steep that they move on to a replacement without having learned to exploit the functionality available in the first one. This work applies earlier findings by IMARC researchers in segmenting mobile data services (MDS) markets, interprets recent survey data, and synthesizes a model to guide design of the Out-of-the-Box Experience (OoBE) for mobile data subscribers. This integrative model can be applied across cultures to help service developers, facilitators and operators design, distribute and communicate new MDS to fulfill the demand side requirements of potential adopters, and to guide packaging design to improve user experiences during the early stages of use. 相似文献
3.
对Intel dpdk数据包捕获技术进行了深入研究,对其优缺点进行了详细的分析。在此基础上,利用dpdk设计并实现了一套基于Linux的数据包捕获系统,成功地将其应用于千兆网络安全防护系统中。使用BPS软件对基于dpdk的网络安全防护系统与基于pf_ring的网络安全防护系统进行仿真分析,结果表明dpdk对整体系统性能的提高成效显著,取得了良好的效果,验证了该方法的可行性。 相似文献
4.
《Ergonomics》2012,55(5):557-577
By their very nature laboratory experiments are at best only rough and approximate models of any real-life situation. First of all the possible independent variables that influence behaviour in any practical situation, a laboratory experiment selects only a. few for test. As a result, hidden or unsuspected interactions in real-life may easily nullify, or even reverse, conclusions arrived at in the laboratory. Second, variables always change when they are brought into the laboratory. Third, the effect of controlling extraneous or irrelevant variables in the laboratory is to increase the precision of an experiment but at the risk of discovering effects so small that they are of no practical importance. Fourth, the dependent variables (or criteria) used in laboratory experiments are variables of convenience. Rarely are they selected for their relevance to some practical situation. Last, the methods used to present variables in the laboratory are sometimes artificial and unrealistic. The safest and most honest conclusion to draw from all these considerations is that one should generalize with extreme caution from the results of laboratory experiments to the solution of practical problems. 相似文献
5.
基于Hibernate框架的数据持久层架构设计及应用 总被引:1,自引:0,他引:1
数据持久层在Web应用系统开发中,主要应用于业务逻辑和数据逻辑的松散耦合,提高软件可重用性。分析了Hibernate框架及DAO设计模式的工作原理.设计了基于Hibernate框架采用DAO设计模式的数据持久层架构体系,并通过具体Web应用,阐述了数据持久层架构的具体实现过程。Abstract: Data persistence is used in: business logic and data logic to improve software reusability in the Web application development. Introduced the signification of the data persistence, analyses work principle of Hibernate framework and the DAO design pattern, 相似文献
6.
Motion capture data digitally represent human movements by sequences of body configurations in time. Subsequence searching in long sequences of such spatio-temporal data is difficult as query-relevant motions can vary in execution speeds and styles and can occur anywhere in a very long data sequence. To deal with these problems, we employ a fast and effective similarity measure that is elastic. The property of elasticity enables matching of two overlapping but slightly misaligned subsequences with a high confidence. Based on the elasticity, the long data sequence is partitioned into overlapping segments that are organized in multiple levels. The number of levels and sizes of overlaps are optimized to generate a modest number of segments while being able to trace an arbitrary query. In a retrieval phase, a query is always represented as a single segment and fast matched against segments within a relevant level without any costly post-processing. Moreover, visiting adjacent levels makes possible subsequence searching of time-warped (i.e., faster or slower executed) queries. To efficiently search on a large scale, segment features can be binarized and segmentation levels independently indexed. We experimentally demonstrate effectiveness and efficiency of the proposed approach for subsequence searching on a real-life dataset. 相似文献
7.
针对传统碳一过程数据协调方法中过于复杂的编程和计算,提出一种基于MATLAB优化工具箱数据协调的新方法,该方法通过物料平衡关系建立焦化碳一过程的数据协调数学模型并利用MATLAB非线性优化工具箱强大的数值计算能力进行编程实现,实际应用于焦化碳一过程的数据校正结果表明,该方法是有效的,同时对其他相似过程的数据协调建模和求解也有一定的借鉴作用。 相似文献
8.
数据预处理在IT基础设施监控系统中的应用 总被引:1,自引:0,他引:1
数据质量的优劣对数据挖掘的成败有着举足轻重的影响,而作为数据挖掘过程第一步的数据预处理就是为了确保数据质量而设,其研究方兴未艾.从数据质量的概念出发,介绍了数据预处理的体系结构和常用方法,根据IT基础设置监控系统中的数据特点,探讨了数据预处理技术在该类数据上的典型应用. 相似文献
9.
胡晓东 《计算机测量与控制》2018,26(2):68-71
为解决传统加密传输数据监测系统在数据传输过程中易产生数据丢失、损坏等问题,提出并设计大型数据库加密传输数据智能监测系统。给出系统整体框架结构,硬件部分主要由四部分组成,用户登陆模块主要对访问角色进行划分,生成该身份对应的权限;密匙管理模块对权限信息进行保护和储存;文件安全传输模块对数据进行安全传输;系统软件部分主要对平分的64bit数据进行双路加解密,完成大型数据库加密传输数据智能监测系统设计。实验结果表明,该系统数据丢失率低、数据损坏少,有效提高了数据传输安全性,充分满足加密传输数据监测系统的设计需求。 相似文献
10.
为实现黄河水文人工测验数据的数字化,解决自动监测数据的摘录与格式转换等资料整编难题,基于 B/S 结构构建黄河水文测验数据在线处理系统,设计水文测验原始资料库表结构,可对人工测验数据进行在线录入与计算、自动监测数据进行在线摘录与整编格式转换后,直接存储于水文测验原始资料数据库中,对数据库中的水文测验原始数据还可按照制定的审查规则进行数据的自动审查,检查其合理性。系统在黄河水文河南测区 1 a 多的运行表明:系统符合基层水文站的测算需求和使用习惯,不但提高人工测验数据的准确率与记载格式的规范度,也提升自动监测数据的摘录与数据格式转换的工作效率,可实现水文测验数据的“日清月结”。 相似文献
11.
For accomplishing low-attended manufacture, step by step, it is necessary that information handling in technological production planning, management and shop control processes is organized economically. This is especially true with respect to computer-aided product development and production planning, faster order throughput, control of production equipment and delivery of information needed for high equipment utilization with a simultaneous increase in the volume of data processed automatically. These complex requirements call for a new type of approach in information handling technology (CAD/CAM) and corresponding layouts of workstations for the designer and manufacturing engineer. Such CAD/CAM facilities should be user-friendly so that they can be adapted to the user's need and not vice versa. 相似文献
12.
Corrie van der Lelie 《Personal and Ubiquitous Computing》2006,10(2-3):159-162
In the realm of product design, communication between designer, client, design team and future users is of great importance.
Throughout the design process, ideas and concepts are generated and must be conveyed to these people to evoke comments, judgement
or acceptance, depending on the process phase. Storyboards are a valuable aid to the designer in this task by providing a
common visual language that people from different backgrounds can ‘read’ and understand. However, the visualisation style
of the storyboards influences the reactions. Where open and sketchy storyboards are inviting comments, sleek and detailed
presentations can be overwhelming. Storyboards not only help the product designer to get a grip on target groups, context,
product use and timing, but also in communicating about these aspects with all people involved.
This paper is part of the 3AD design colloquium Creative connections [1]. 相似文献
13.
为确保丹江口库区水质自动监测站数据的真、准、全,在数据采集及传输方面,规范采样要求及数据传输标准,完善关键参数及流程日志信息的上传;在人员管理方面,数据审核员须通过主管部门组织的技术培训和考核,具备数据综合分析、质量管理等相关能力;在数据审核流程方面,对监测数据进行严格的审核流程设计,水站监测数据实施平台在线审核,审核全过程各环节均记录留痕;在质控管理方面,水站构建贯穿水站运行全过程的多级质控措施(包括日质控、周质控、月质控、盲样考核)和多维度质控体系;在数据连续性方面,根据不同停运条件,及时完成手工补测工作;同时,参照全国已建立的监测技术指标体系,为保障监测数据的真实准确提供技术依据。通过以上相关措施,能够确保自动监测数据真实、准确、完整。 相似文献
14.
新旧系统切换中数据转换的研究与实现 总被引:3,自引:0,他引:3
数据转换是信息系统升级、新旧信息系统切换过程中的重要工作。按照软件工程的方法,对数据转换过程中的各个环节进行定义,保证通过有效的数据转换工作使历史数据资源在新系统中得以利用。 相似文献
15.
数据访问对象模式在企业应用集成中的应用 总被引:3,自引:0,他引:3
在提出企业应用集成(EAI)在面对异构数据源集成和整合所出现的问题的基础上,提出以J2EE设计模式中的数据访问对象(DAO)模式来解决该问题的方法,并结合对DAO设计模式的实现,详细讨论了在EAI中应用DAO设计模式对提高系统重用性、灵活性,维护整个系统架构稳定性所起的作用。 相似文献
16.
17.
18.
赵兰梅 《网络安全技术与应用》2014,(2):30-31
本文由网络编码的诞生背景、基本原理、数据模型以及优缺点等内容,简单为大家介绍网络编码的基础理论知识;在此基础上,后文将对网络编码模型、编码接点的判断以及编码感知路径的构建进行深入的探究。此外,本文还将对网络编码的数据传送技术进行研究,对研究的详细情况进行汇报。 相似文献
19.
计算机网络技术的迅速发展,给人们的生产生活带来较多便利,但诸如网络入侵等不良行为也随之出现,往往造成较大的经济损失.为此,人们开始将数据挖掘应用到网络入侵检测中,以确保网络安全性.本文介绍了数据挖掘在网络入侵检测中应用中的相关知识,以期为有效避免网络入侵行为提供参考. 相似文献
20.