首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Abstract This paper describes an approach to the design of interactive multimedia materials being developed in a European Community project. The developmental process is seen as a dialogue between technologists and teachers. This dialogue is often problematic because of the differences in training, experience and culture between them. Conditions needed for fruitful dialogue are described and the generic model for learning design used in the project is explained.  相似文献   

2.
This paper deals with the question: What are the criteria that an adequate theory of computation has to meet? (1) Smith’s answer: it has to meet the empirical criterion (i.e. doing justice to computational practice), the conceptual criterion (i.e. explaining all the underlying concepts) and the cognitive criterion (i.e. providing solid grounds for computationalism). (2) Piccinini’s answer: it has to meet the objectivity criterion (i.e. identifying computation as a matter of fact), the explanation criterion (i.e. explaining the computer’s behaviour), the right things compute criterion, the miscomputation criterion (i.e. accounting for malfunctions), the taxonomy criterion (i.e. distinguishing between different classes of computers) and the empirical criterion. (3) Von Neumann’s answer: it has to meet the precision and reliability of computers criterion, the single error criterion (i.e. addressing the impacts of errors) and the distinction between analogue and digital computers criterion. (4) “Everything” computes answer: it has to meet the implementation theory criterion by properly explaining the notion of implementation.  相似文献   

3.
面向查询的多文档摘要技术有两个难点 第一,为了保证摘要与查询密切相关,容易造成摘要内容重复,不够全面;第二,原始查询难以完整描述查询意图,需进行查询扩展,而现有查询扩展方法多依赖于外部语义资源。针对以上问题,该文提出一种面向查询的多文档摘要方法,利用主题分析技术识别出当前主题下的子主题,综合考虑句子所在的子主题与查询的相关度以及子主题的重要度两方面因素来选择摘要句,并根据词语在子主题之间的共现信息,在不使用任何外部知识的情况下,进行查询扩展。在DUC2006评测语料上的实验结果表明,与Baseline系统相比,该系统取得了更高的ROUGE评价值,基于子主题的查询扩展方法则进一步提高了摘要的质量。  相似文献   

4.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

5.
The new method of defuzzification of output parameters from the base of fuzzy rules for a Mamdani fuzzy controller is given in the paper. The peculiarity of the method is the usage of the universal equation for the area computation of the geometric shapes. During the realization of fuzzy inference linguistic terms, the structure changes from the triangular into a trapezoidal shape. That is why the universal equation is used. The method is limited and can be used only for the triangular and trapezoidal membership functions. Gaussian functions can also be used while modifying the proposed method. Traditional defuzzification models such as Middle of Maxima − MoM, First of Maxima − FoM, Last of Maxima − LoM, First of Suppport − FoS, Last of Support − LoS, Middle of Support − MoS, Center of Sums − CoS, Model of Height − MoH have a number of systematic errors: curse of dimensionality, partition of unity condition and absence of additivity. The above-mentioned methods can be seen as Center of Gravity − CoG, which has the same errors. These errors lead to the fact that accuracy of fuzzy systems decreases, because during the training root mean square error increases. One of the reasons that provokes the errors is that some of the activated fuzzy rules are excluded from the fuzzy inference. It is also possible to increase the accuracy of the fuzzy system through properties of continuity. The proposed method guarantees fulfilling of the property of continuity, as the intersection point of the adjustment linguistic terms equals 0.5 when a parametrized membership function is used. The causes of errors and a way to delete them are reviewed in the paper. The proposed method excludes errors which are inherent to the traditional and non- traditional models of defuzzification. Comparative analysis of the proposed method of defuzzification with traditional and non-traditional models shows its effectiveness.  相似文献   

6.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

7.
Impact of cognitive theory on the practice of courseware authoring   总被引:1,自引:0,他引:1  
Abstract The cognitive revolution has yielded unprecedented progress in our understanding of higher cognitive processes such as remembering and learning. It is natural to expect this scientific breakthrough to inform and guide the design of instruction in general and computer-based instruction in particular. In this paper I survey the different ways in which recent advances in cognitive theory might influence the design of computer-based instruction and spell out their implications for the design of authoring tools and tutoring system shells. The discussion will be divided into four main sections. The first two sections deal with the design and the delivery of instruction. The third section analyzes the consequences for authoring systems. In the last section I propose a different way of thinking about this topic.  相似文献   

8.
Possibilistic distributions admit both measures of uncertainty and (metric) distances defining their information closeness. For general pairs of distributions these measures and metrics were first introduced in the form of integral expressions. Particularly important are pairs of distributions p and q which have consonant ordering—for any two events x and y in the domain of discourse p(x)⪋ p(y) if and only if q(x) ⪋ q(y). We call such distributions confluent and study their information distances.

This paper presents discrete sum form of uncertainty measures of arbitrary distributions, and uses it to obtain similar representations of metrics on the space of confluent distributions. Using these representations, a number of properties like additivity. monotonicity and a form of distributivity are proven. Finally, a branching property is introduced, which will serve (in a separate paper) to characterize axiomatically possibilistic information distances.  相似文献   


9.
CCD camera modeling and simulation   总被引:2,自引:0,他引:2  
In this paper we propose a modeling of an acquisition line made up of a CCD camera, a lens and a frame grabber card. The purpose of this modeling is to simulate the acquisition process in order to obtain images of virtual objects. The response time has to be short enough to permit interactive simulation. All the stages are modelised: in the first phase, we present a geometric model which supplies a point to point transformation that provides, for a space point in the camera field, the corresponding point on the plane of the CCD sensor. The second phase consists of modeling the discrete space which implies passing from the continous known object view to a discrete image, in accordance with the different orgin of the contrast loss. In the third phase, the video signal is reconstituted in order to be sampled by the frame grabber card. The practical results are close to reality when compared to image processing. This tool makes it possible to obtain a short computation time simulation of a vision sensor. This enables interactivity either with the user or with software for the design/simulation of an industrial workshop equipped with a vision system. It makes testing possible and validates the choice of sensor placement and image processing and analysis. Thanks to this simulation tool, we can control perfectly the position of the object image placed under the camera and in this way, we can characterise the performance of subpixel accuracy determining methods for object positioning.  相似文献   

10.
This paper is concerned with the problem of gain-scheduled H filter design for a class of parameter-varying discrete-time systems. A new LMI-based design approach is proposed by using parameter-dependent Lyapunov functions. Recommended by Editorial Board member Huanshui Zhang under the direction of Editor Jae Weon Choi. This work was supported in part by the National Natural Science Foundation of P. R. China under Grants 60874058, by 973 program No 2009CB320600, but also the National Natural Science Foundation of Province of Zhejiang under Grants Y107056, and in part by a Research Grant from the Australian Research Council. Shaosheng Zhou received the B.S. degree in Applied Mathematics and the M.Sc. and Ph.D. degrees in Electrical Engineering, in January 1992, July 1996 and October 2001, from Qufu Normal University and Southeast University. His research interests include nonlinear control and stochastic systems. Baoyong Zhang received the B.S. and M.Sc. degrees in Applied Mathematics, in July 2003 and July 2006, all from Qufu Normal University. His research interests include and nonlinear systems, robust control and filtering. Wei Xing Zheng received the B.Sc. degree in Applied Mathematics and the M.Sc. and Ph.D. degrees in Electrical Engineering, in January 1982, July 1984 and February 1989, respectively, all from the Southeast University, Nanjing, China. His research interests include signal processing and system identification.  相似文献   

11.
针对数据挖掘中挖掘过程不透明以及用户交互少的问题,本文设计并实现了VISDMiner系统。VISDMiner系统将可视化技术和数据挖掘技术结合在一起,提供对挖掘过程中各阶段产生的可视化子结果集的分析。用户可根据自己的领域知识和经验去调整数据挖掘算法模型的参数和可视化模型的参数,促进算法和挖掘分析过程的有效调优。为了处理高维数据集,VISDMiner系统采用一种基于最大信息系数的主成分分析改进算法MIC-PCA,该算法主要是针对传统PCA算法降维能力和分类准确率低的问题进行改进。实验结果表明,VISDMine不仅实现了数据挖掘过程的可视化,还提高了用户对数据挖掘〖JP2〗执行结果的可理解性,其采用的改进的MIC-PCA算法提高了PCA算法的降维能力和分类准确率。  相似文献   

12.
A high resolution optical tool is required to investigate the mechanical behavior and failure modes of micro-electromechanical systems (MEMS). We report on the possibilities of a newly developed optical characterization tool for MEMS devices. Both slow movements and fast mechanical vibrations up to 15 MHz can be monitored. The instrument can perform an imaging operation for a complete image at once by employing laser TV holography, which is a large advantage over scanning laser Doppler vibrometers. For vibration measurements, this new, interference based instrument uses a beat frequency between object excitation and reference beam excitation. A normal CCD camera is used to obtain 3D images and movies of periodic mechanical motions of MEMS devices. Excitation can be by means of a PZT, or by using electronic excitation. We show that the instrument is a very useful tool for the characterization and failure analysis of MEMS devices.The whole MEMS team at IMEC and their coworkers in projects are thanked for providing many of the samples shown in this paper. In particular, we would like to thank the following people. Melexis is thanked for providing the membrane sample of Fig. 4–6 and 14. Figs. 7–9 were measured in the frame of the MISTRA project (IWT contract 000167). Theo Rijks (Philips Natlab) provided the sample of Figs. 10 and 11. Chris Muhlstein sent the sample of Fig. 12 to us. Hans de Vries (Philips Centre for Industrial Technology/EP&A) is thanked for providing the sample of Fig. 13. The switch of Fig. 15 was made in the MIRS project (5012352345). Laurent Francis (IMEC) is thanked for providing the sample of Fig. 16. Sjoerd van de Geijn of Océ-Technologies B.V. provided the sample of Fig. 17.  相似文献   

13.
Personal computers and their relevant technologies have been widely used by artists and musicians to create and record their own music and electroacoustic compositions. "Laptoppers" are famous for using their laptops for their dance/electronic beats and music. A genre that has not relied on the use of PCs for the production of its music is rock/heavy metal, since bands of these genres usually book recording studio time where professionals take on the task of the production using expensive equipment. This study shows that in today's day and age, and with the software and hardware currently available, it is possible for rock/metal artists to use their PC to record and produce their own CD successfully and at an extremely competitive cost. The effort's of a rock band that does just this is followed from the beginning and the results of their CD production and song successes is presented. The article also serves as a "HowTo" guide that bands on a low budget can follow to make good quality demo CDs and enter the music business industry.  相似文献   

14.
Despite the increasing use of onshore and offshore business process outsourcing (BPO), a comprehensive literature review [38] finds that there has been limited empirical research on BPO outcomes. This article responds to the call for research by developing and testing a conceptual model for BPO outcomes using data from 50 firms publicly traded in the U.S., including 38 firms in the Forbes Global 2000. We find that client firm capabilities, vendor configuration, and country location lead to interesting tradeoffs in the BPO quality, cost, and time outcomes. For example, while multi-sourcing offers advantages such as risk mitigation, client firms encounter reduced BPO time benefits when they use multiple vendors. While onshore BPO can lead to an improved quality, higher onshore labor costs result in lower BPO cost savings. And while offshore destinations such as India offer lower labor costs, time zone differences lead to reduced BPO time benefits.  相似文献   

15.
Paradigmatic change is driving aesthetic change in cinema. This restructuring is not only transforming what is on the screen, but the means of production that put it there. The interplay of technology and culture, along with their dynamics has made this so. Marshall McLuhan's Laws of Media provide an effective lens with which to examine this change. Some preliminary observations on the shape of digital cinema are offered. However to paraphrase Al Jolson, you ain't seen nothin' yet.  相似文献   

16.
属性的识别对物体的识别起到了比较重要的作用,例如人脸验证和场景识别。提高属性的识别率对后面基于属性特征的应用的正确率有很大的影响。近些年来,有些工作也开始关注于属性的学习,而很多的工作都是基于属性之间独立的假设,但在实际中很多的属性都是强相关的,例如没有胡子和女性,光头和头发的颜色;很多的工作忽略了类别之间的不平衡性,例如光头的样本比例可能只占样本的很小一部分。基于这2个观察,本文提出一种基于多任务的类别不平衡的人脸属性识别网络架构,该网络结构是由Densenet修改而来。该方法比以往的方法效果要好,一定程度上缓解了不平衡问题,且参数少,计算效率更高,在公开人脸属性数据集CelebA和LFWA上的实验验证了该方法的有效性。  相似文献   

17.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

18.
Uneven‐aged forest management is acquiring increasing importance throughout the world as an alternative to clear cutting. Simple stage‐structured matrix models can be used to predict the growth of uneven‐aged stands, and they are easily incorporated in optimization analysis. Parameters of these models can be estimated from readily available permanent plot data. Such a growth and yield model is presented for mixed, uneven‐aged Douglas‐fir and hardwood stands. The model was calibrated with data from 66 permanent plots in Oregon and Washington. The density‐dependent matrix model predicts the number of trees by diameter class and species type, softwood or hardwood. The parameters are based on individual tree growth equations, individual tree mortality equations, and stand ingrowth equations. The individual tree equations are a function of tree diameter, stand density, species, and site index. The stand‐level ingrowth equations are a function of stand density. The model was validated in the short term by comparing the number of trees in each diameter and species class at the time of the second inventory with the number predicted by the model, given conditions at the first inventory. A long‐term validation of the model was also done by comparing the steady‐state stand structure and stand volume with those observed for old‐growth stands. The model was applied to show the effects of different cutting cycles on productivity, diversity of tree species and size, and financial returns. The results suggest that uneven‐aged management of the Douglas‐fir forest type in the Pacific Northwest can be as productive as even‐aged management, with the added benefits of continuous cover forestry.  相似文献   

19.
属性加密(Attribute-BasedEncryption,ABE)将密钥和密文与一系列属性相关联,被广泛应用于云计算的访问控制中。针对现有撤销方案效率低下的问题,提出一种更高效、细粒度的访问控制方案。方案中采用的访问结构可以表达任意涉及布尔运算符的访问策略;在加密过程中,构建一种属性用户组随机密钥分发方法,并结合ABE实现双重加密,将所有撤销操作转化成属性级别细粒度的撤销;新方案的数据始终以密文形式存在于服务器上,降低了对服务器的安全限制,可以将大部分密文重加密任务转移给云服务器执行,有效利用云服务器的计算能力,提升系统的运行效率,减少通信开销。  相似文献   

20.
Evolution is a function of energy itself, and all energetic systems, including societies, evolve within the bounds of thermodynamic laws. Non-equilibrium thermodynamics, joined with ecological energetic analysis, will reveal a strong analogy between chemical, biological, social and ecosystem evolution

In the context of energy and evolution, recent self-organization theories are reviewed, synthesized and extended by the Theory of Radially Evolving Energy (TREE). Radial evolution, describing the increasing concentration of energy density in successively emerging systems, is dimensionally distinct from, yet consistent with, Darwinian theory

Human acceleration of a natural feedback between energy consumption and technology threatens the health of our populations and those of other species. This feedback, formation of intergovernmental systems, mortality of social systems, and loss of individual human freedom to governmental control are predicted by the theory of radial evolution. To understand the adaptive compromises that lie ahead, we must learn the natural parameters that drive and bound society's growth.  相似文献   


设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号