首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
2.
Many students with master's degrees who enter fields where policy-making and management are intertwined lack the ability to direct or use supporting research based on computerized quantitative techniques. We have developed a first year graduate course which gives students experience with a real, often controversial, research problem. These students, who come largely from non-numerical backgrounds, become capable of communicating effectively with programmers and of evaluating statistical research by others, so that upon graduation they are much more capable of doing relatively sophisticated, computerized research on their own.  相似文献   

3.
4.
5.
校园网络的建立,给学校的教学科研与管理带来了诸多便利的同时,也面临着网络的安全运行和维护的问题。建立科学合理的校园网络运维体系,在保证了校园网正常运行的同时,还提高了抗风险能力。本文针对大学校园网络运维体系进行探讨。  相似文献   

6.
随着互联网的飞速发展,各种互联网金融主体以低门槛、高效率的特点如雨后春笋般涌现。但是互联网金融蓬勃发展的背后却也隐藏着集资诈骗、非法吸收公众存款等涉众型经济犯罪隐患,这种风险严重影响了经济安全与社会稳定,应高度警惕。文章采用文献阅读、案例分析以及实战应用等方法,提出并实践了建立金融风险管控中心的构想,根据工作经验总结了互联网金融平台风险管控中的内外问题,挖掘了抑制互联网金融安全风险的方法。从而推动互联网金融行业的正规化,促进行业法律法规的完善,并为政府的监督管理提供可实施的建议。  相似文献   

7.
基于Internet的个性化信息检索技术的研究   总被引:6,自引:4,他引:6  
对搜索引擎个性化模式的提取方式进行了分类探讨,对当今流行的个性化检索技术进行了分类比较,指出了它们的特点差别;最后在此基础上讨论搜索引擎个性化技术所面临的问题以及其发展趋势。  相似文献   

8.
This paper examines the relationship between operational research (OR) and computer technology. It does this by first sketching some conflicting opinions expressed about computers and OR, and then examining various motivations, styles and methods that can be identified for adopting computer-based approaches. This analysis is used to report on the results of a survey on computers in OR, based on UK Operational Research Society members. On the basis of the analysis and the survey results the authors make some observations on the diffusion process within operational research.  相似文献   

9.
本文分析了下一代互联网中的地址解析原理,指出了它对ARP协议多方面的改进措施,同时也分析指出它存在的安全问题,并给出了解决之道。  相似文献   

10.
Internet addiction is a rapidly growing field of research, receiving attention from researchers, journalists and policy makers. Despite much empirical data being collected and analyzed clear results and conclusions are surprisingly absent. This paper argues that conceptual issues and methodological shortcomings surrounding internet addiction research have made theoretical development difficult. An alternative model termed compensatory internet use is presented in an attempt to properly theorize the frequent assumption that people go online to escape real life issues or alleviate dysphoric moods and that this sometimes leads to negative outcomes. An empirical approach to studying compensatory internet use is suggested by combining the psychological literature on internet addiction with research on motivations for internet use. The theoretical argument is that by understanding how motivations mediate the relationship between psychosocial well-being and internet addiction, we can draw conclusions about how online activities may compensate for psychosocial problems. This could help explain why some people keep spending so much time online despite experiencing negative outcomes. There is also a methodological argument suggesting that in order to accomplish this, research needs to move away from a focus on direct effects models and consider mediation and interaction effects between psychosocial well-being and motivations in the context of internet addiction. This is key to further exploring the notion of internet use as a coping strategy; a proposition often mentioned but rarely investigated.  相似文献   

11.
针对高耗能设备量大面广,用能分散,节能减排缺乏有效切入点的现实瓶颈,运用信息传感和互联网技术,设计智慧用能互联网云平台,并提出用云平台结合工程技术中心的运营模式,整合分散用能产业链,做绿色智慧能源供应商。即通过互联网+智慧锅炉、炉窑,将分散用能企业互联互通,利用大数据整合产业链资源,并通过工程中心技术支撑及合同能源托管运营,使耗能设备安全、节能及环保运行。在应用上,已开发了具有自主知识产权的锅炉物联网监测系统,创建了锅炉物联网监测智慧云平台,并建立了日常巡视值班制度和诊断处置机制,已有133台在用锅炉接入平台。平台运行期间,已成功消除20余次安全隐患,监测到上千次能效超标报警,成功帮助80余家企业节能,取得良好社会效益和节能效果。  相似文献   

12.
为了缩短软件测试周期,本文把马尔可夫链模型运用于软件可靠性测试中,提出了这一技术进行软件可靠性测试的方法。在测试过程中使用了新的评判准则分析测试结果,通过实例证明了该评判准则的实用性和有效性。  相似文献   

13.
基于统计和规则相结合的科技术语自动抽取研究   总被引:4,自引:0,他引:4  
科技术语自动抽取是中文信息处理领域的一个重要研究课题,在信息检索、机器翻译等领域,特别是在专利翻译中有着广泛应用。结合专利翻译任务,主要研究专利中科技术语的识别方法,在分析目前已有方法的基础之上,提出了一种使用条件随机场模型进行标注识别,并结合规则对错误识别结果进行后处理的科技术语识别方法。实验结果表明,提出的统计和规则相结合的识别方法是有效的,开放测试结果F值达到了84.4%。  相似文献   

14.
Basic competence in research methods and statistics is core for many undergraduates but many students experience difficulties in acquiring knowledge and skills in this area. Interest has recently turned to serious games as providing engaging ways of learning. The CHERMUG project was developed against this background to develop games to support students in learning about research methods and statistics. As a first step in designing the CHERMUG games a narrative literature review was carried out to establish whether similar games, animations and simulations already existed. Search terms used in the literature review included varied terms for digital games, simulations and animations, terms relevant to the twin goals of learning and engagement in games and terms for research methods and statistics. Application of the inclusion criteria led to 26 papers which were considered relevant. Synthesis of the papers suggested that there is reason to be optimistic that a game-based approach might be effective in learning in this area.  相似文献   

15.
The internet is increasingly used in psychological research to solicit participants and collect data. This paper includes two studies examining the quality of data obtained via web-based methods administered either inside or outside the lab. Both studies used item recognition accuracy as a proxy for attention to questions. Study 1 examined the extent to which undergraduate participants (N = 504) read and attended to questions either inside or outside the lab. Study 2 (N = 744) replicated Study 1, added a Mechanical Turk sample, and examined attention to non-intuitive survey instructions. Results indicated that participants demonstrated good item recognition, regardless of locale or sample; however, small sex effects on accuracy were found in both studies. Specifically, women were more accurate at identifying previously seen items than men in both Study 1 and Study 2. In Study 2, Mechanical Turk participants were more likely to read instructions than undergraduate participants, regardless of whether they participated inside or outside of the lab. The findings support the use of the internet for sampling purposes as well as survey administration, and suggest that researchers use care when studies include non-intuitive instructions.  相似文献   

16.
17.
Multimedia Tools and Applications - In the perspective of Internet advancements for the future Internet, Information Centric Network (ICN) offers a communication model, which is different from the...  相似文献   

18.
研究采用计算机及网络技术提高弱视治疗效果的途径.通过互联网将家庭治疗终端与中央服务器连接,对治疗过程进行监测和控制.通过研究JavaBean组件技术和J2EE分布式应用体系模型,提出了基于J2EE的系统解决方案,并研究了XML在其中的应用.远程弱视治疗系统可及时采集治疗过程数据,判定治疗效果、适时调整个性化治疗方案,从而提高治疗效果.  相似文献   

19.
There is considerable interest in the potential for using operational research (O.R.) in developing countries. One sign of this is the formation of new societies for O.R. scientists in countries and regions where no such society had existed. Since 2003, such societies have been formed in several parts of Africa. This paper focuses on West Africa, and presents a bibliography of papers relating to applications of O.R. in the nations of this part of the continent. The paper describes the way in which the bibliography was collated and discusses the overall picture that the list of papers presents of the state of O.R. in the 18 countries that are considered.  相似文献   

20.
Recently, the Tactile Internet (TI) becomes a new era of the Internet. The TI provides ultra-reliable, ultra-responsive and intelligent network connectivity for delivering real-time control and physical haptic experiences from a remote location. The TI provides a different feeling to human–machine interaction by implementing the real-time interactive systems. In this review article, we discuss a generalized authentication model which can be used to perform authentication procedure among different communicating parties in order to secure remote surgery in the TI environment. By using the proposed authentication model, an authentication protocol can be designed so that an authenticated surgeon can use the robot/robotic arms to perform the surgery securely as well as remotely. Since the application is very critical, the important instructions provided by the surgeon to the robot/robotic arms must not be leaked in between the communication during the surgical procedure. To deal with this emerging research area, a secure mutual user authentication mechanism should be provided between a remote surgeon and the robot/robotic arms so that they can communicate securely using the established session key among them. Further, several security issues and challenges for such kind of communication are also discussed in this article. Finally, we discuss few points that need to be considered as future research works that are related to authentication for securing remote surgery in the TI environment.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号