首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
我国正处于国际国内形势复杂、人民内部矛盾凸显、刑事犯罪高发的时期,刑侦部门打击刑事犯罪、保护人民生命财产、维护社会稳定的任务更加繁重而艰巨。在这种形势下,探讨影响刑事犯罪的因素,更好地打击刑事犯罪,维护国家的安全和社会的稳定就显得尤为重要。文章采用贝叶斯网络和EM算法来分析影响某地区刑事犯罪的影响因素。给出了影响因素模型,从模型的结果来看,影响该地区的刑事犯罪的因素依次是人的因素、环境因素、犯罪类型因素、犯罪位置因素和交通因素等。研究结果可用于为领导决策提供理论指导和参考。  相似文献   

2.
王立松  陈兵  毛勇  章清 《计算机工程》2003,29(2):261-263
根据监狱管教工作的管理需求,设计并实现了监狱管教信息系统,该系统基于C/S和B/S两种运行模式,支持省局、监狱和监狱监区/分监狱三级应用,并且对监控防范系统、会见系统的功能以及与狱务公开系统进行了集成。  相似文献   

3.
In a recent paper (Johnson 1985) the theory of disturbance-accommodating control was used to derive a new family of adaptive controllers. A critical step in the derivation presented by Johnson (1985) involves the assumption that certain higher-order perturbation terms are negligible with respect to terms that are linear in the perturbations. In the present paper the validity of that approximation is investigated and the special (singular) condition under which the assumption fails is identified and characterized in terms of a new observability-like determinant.  相似文献   

4.
袁猛  陈震  危水根  江頔 《计算机工程》2011,37(3):215-217
提出一种改进的变分光流算法的能量泛函,该能量泛函的数据项由灰度不变假设和Hessian矩阵不变假设组成,并与Lucas局部光流一致方法相结合。平滑项的设计采用先各项同性平滑再各项异性平滑的策略,其中引入图像一致增强思想。实验结果证明,运用该方法进行光流计算的效果比以往变分方法有所改进。  相似文献   

5.
The Internet economics track will address how economic and policy issues relate to the emergence of the Internet as critical infrastructure. The authors provide a historical overview of internetworking, identifying key transitions that have contributed to the Internet's development and penetration. Its core architecture wasn't designed to serve as critical communications infrastructure for society; rather, the infrastructure developed far beyond the expectations of the original funding agencies, architects, developers, and early users. The incongruence between the Internet's underlying architecture and society's current use and expectations of it means we can no longer study Internet technology in isolation from the political and economic context in which it is deployed  相似文献   

6.
7.
This paper addresses the specification of and reasoning about interactive real-time systems, their interfaces, and architectures as well as their properties in terms of assumptions and commitments. Specifications are structured into assumptions restricting the behavior of the operational context of systems and commitments about the system behavior (also called rely/guarantee or assumption/promise specification patterns in the literature). A logical approach to assumption/commitment contracts is worked out based on a mathematical system model:
  • From assumption/commitment contracts plain interface assertions for the system are derived.
  • Healthiness conditions based on the system model are worked out for assumptions.
  • Safety and liveness properties for assumption/commitment contracts are identified.
  • From interaction specifications describing the interaction between two systems assumption/commitment contracts for the involved systems are derived.
  • Contracts for components in architectures are formulated in terms of assumptions and commitments and conditions are worked out to guarantee that assumptions for the composite systems guarantee the validity of the assumptions for components.
Based on the theoretical foundation architectural issues are considered for a systematic use of assumption/commitment patterns in system specification and architecture design.
  相似文献   

8.
A cantilever beam-plate, of magnetically soft material, inserted with its middle surface normal to a uniform magnetic field will buckle when the magnetic field reaches a critical value. The system of differential equations derived in this study are based on the Moon-Pao's model. The basic difference lies in the abandonment of the assumption that the magnetic couple acting on an element of the plate is proportional to the rotation of the middle surface of the plate. This assumption is employed in previous studies and leads to linear differential equations that is similar to the buckling problem of compressed rods or plates. Consequently, the complexity of the problem is reduced considerably. The derivation in this paper shows that the magnetoelastic buckling problem of the beam-plate is nonlinear. The solution to the system of differential equations is derived by coupling a finite element model for the magnetic field and a finite difference model for the cantilever beam-plate. The critical magnetic field, derived in this study is about 20% smaller than the experimental one, while theoretical results from previous works are about 180% larger than the experimental ones.  相似文献   

9.
晏明春  梁朝东 《计算机工程》2007,33(15):272-274
根据监狱信息系统功能模块多、用户数量大、人员调动频繁、信息机密性高的特点,提出了一种综合访问控制模型,给出了模型的形式化描述。该模型把MAC, RBAC, TRBAC有机地结合在一起,有可控性强和授权管理方便的特点。利用该模型,设计了权限管理子系统,给出了系统中权限管理的具体实现,解决了监狱系统中复杂的访问控制问题。  相似文献   

10.
11.
SUMMARY

Before September 2001, bioterrorism was a term that appeared occasionally in the news, but usually only in reference to foreign wars and conflicts, or in relation to an obscure possible threat. After anthrax spores began to be mailed to offices and agencies in October of 2001, the threat was no longer an abstraction, but a reality. As the Internet has become a ubiquitous resource, authoritative agencies and organizations have used the Internet as the quickest way to provide information on bioterrorism to the general public and to planning agencies. This article provides a starting point for searching for bioterrorism information and is by no means an exhaustive list.  相似文献   

12.
邓林  余刘琅  韩江洪 《计算机工程》2007,33(15):142-143,
根据监狱信息系统功能模块多、用户数量大、人员调动频繁、信息机密性高的特点,提出了一种综合访问控制模型,给出了模型的形式化描述.该模型把MAC, RBAC, TRBAC有机地结合在一起,有可控性强和授权管理方便的特点.利用该模型,设计了权限管理子系统,给出了系统中权限管理的具体实现,解决了监狱系统中复杂的访问控制问题.  相似文献   

13.
Derivation of Error Distribution in Least Squares Steganalysis   总被引:4,自引:0,他引:4  
This paper considers the least squares method (LSM) for estimation of the length of payload embedded by least-significant bit replacement in digital images. Errors in this estimate have already been investigated empirically, showing a slight negative bias and substantially heavy tails (extreme outliers). In this paper, (approximations for) the estimator distribution over cover images are derived: this requires analysis of the cover image assumption of the LSM algorithm and a new model for cover images which quantifies deviations from this assumption. The theory explains both the heavy tails and the negative bias in terms of cover-specific observable properties, and suggests improved detectors. It also allows the steganalyst to compute precisely, for the first time, a p-value for testing the hypothesis that a hidden payload is present. This is the first derivation of steganalysis estimator performance  相似文献   

14.
15.
It is known that the critical points of the distance function induced by a dense sample P of a submanifold Σ of ℝn are distributed into two groups, one lying close to Σ itself, called the shallow , and the other close to medial axis of Σ, called deep critical points. We prove that under (uniform) sampling assumption, the union of stable manifolds of the shallow critical points have the same homotopy type as Σ itself and the union of the stable manifolds of the deep critical points have the homotopy type of the complement of Σ. The separation of critical points under uniform sampling entails a separation in terms of distance of critical points to the sample. This means that if a given sample is dense enough with respect to two or more submanifolds of ℝn, the homotopy types of all such submanifolds together with those of their complements are captured as unions of stable manifolds of shallow versus those of deep critical points, in a filtration of the flow complex based on the distance of critical points to the sample. This results in an algorithm for homotopic manifold reconstruction when the target dimension is unknown.  相似文献   

16.
监狱信息化建设是时代发展和监管改造工作的需要,监狱信息化的标准应包括监狱管理编码标准、罪犯信息编码标准和警察职工信息编码标准三个方面。其研究有利于避免信息系统低水平重复,有利于信息的交流和共享,有利于保证系统的开发质量,同时也是调控监狱信息化建设的有力杠杆。为了监狱信息化建设的顺利必须保证标准化先行。  相似文献   

17.
Jentsch F  Bowers C  Salas E 《Human factors》2001,43(3):496-507
Observational learning is based on a critical assumption that trainees can and do recognize critical modeled behaviors. This assumption has been virtually untested in applied settings. We studied the effects of work experience and instructions on the ability of 59 observers to recognize target behaviors in an observational learning paradigm similar to existing ones. Additionally, we investigated the effects of two key factors that were hypothesized to affect the recognition process in observational learning. The results indicated that only observers who had a minimum of work experience (i.e., intermediate and experienced observers in the study) were able to consistently recognize targeted behaviors. Additionally, recognition was influenced by the level of detail of instructions given to the participants. Finally, characteristics of the modeled behaviors greatly affected recognition: Overall, examples of negative behaviors were better recognized than were positive examples. Behaviors whose consequence was shown were also better recognized than those that were neither reinforced nor punished in the video. The results are discussed in terms of their implications for the design of observational learning as a training strategy in complex and applied social learning situations. The applications of this work include the design of training, and the training of evaluators and observers.  相似文献   

18.
李惟  滕桂法 《微计算机信息》2007,23(21):201-203,206
针对司法政务中监狱部门的实际情况和对狱内现有信息化系统的分析,探讨了数据仓库技术在监狱政务系统中的应用,重点设计了针对监狱部门的数据仓库系统与现有监狱信息化系统的整合架构与模型方案,研究了数据仓库系统的规划与开发方法,并对数据仓库技术在监狱部门等的政务系统中的应用进行了总结与展望.  相似文献   

19.
An analytical delay model   总被引:5,自引:0,他引:5       下载免费PDF全文
Delay consideration has been a major issue in design and test of high performance digital circuits.The assumption of input signal change occurring only when all internal nodes are stable restricts the increas of clock frequency.It is no longer true for wave pipelining circuits.However,previous logical delay models are based on the assumption.In addition,the stable time of a robust delay test generally depends on the longest sensitizable path delay.Thus,a new delay model is desirable.This paper explores th necessity first.Then,Boolean process to analytically describe the logical and timing behavior of a digital circuit is reviewed.The concept of sensitization is redefined precisely in this paper.Based on the new concept of sensitization,an analytical delay model is introduced.As a result,many untestable delay faults under the logical delay model can be tested if the output waveforms can be sampled at more time points.The longest sensitizable path length is computed for circuit design and delay test.  相似文献   

20.
针对各类网络违法犯罪活动日益泛滥的严峻形势,文章介绍了美国等西方互联网发达国家在立法、执法、司法、社会监督等方面已形成的相对成熟运作体系,以及在防治网络违法犯罪方面取得的经验,对加强网络安全监管及打击网络违法犯罪等方面都启示颇多.该文提出了应结合中国具体国情,从推进立法、明确服务商责任、推行网络实名制、推进全社会共同监管和加强国际交流合作等方面来开展治理工作,多种措施并举防治网络违法犯罪.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号