首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 703 毫秒
1.
Abstract In 1988 the eleven West-German Kultusminister , with responsibility for the school systems in their respective Bundeslaender , reached agreement with the Federal Ministry of Education and Science on the broad concept of 'Information and Communications Technology', ITG. After four years of discussion it was agreed that ITG should be introduced into the secondary level of the general schools. In spite of strong disagreements about the ways and speed of implementation, and after several years of experiments, important parts of the concept have become a reality in practically all of the old Bundeslaender. While acknowledging the complexity of the German educational system the paper attempts to outline the development of the concept of Information and Communications Technology and its consequences in teacher education. The development in the eastern part of Germany, the former GDR, has been completely different to that in the western part and this is also commented upon in the paper.  相似文献   

2.
Abstract To understand what is going on in France at the moment in the domain of computers and related communication technologies in teacher training, there are two major developments that have to be kept in mind. Firstly, the ways of becoming a teacher in France underwent major changes in 1991. It is therefore too early to come to general conclusions about the effects of this reform in the field of new information technologies. Secondly, French IT in schools policy has shifted from a large-scale centralized equipment operation, which provided microcomputers in each school from 1985 to 1987, to a more regional management of equipment funding, with less national piloting in the field. This paper describes what happened during the previous period and what is taking place now. With matters still evolving the paper represents a snapshot rather than an exhaustive survey; such a survey remains to be done.  相似文献   

3.
在网络层实现安全传输通道技术的研究   总被引:3,自引:0,他引:3  
安全传输通道是对传输的原始信息进行加密和协议封装处理,从而实现安全传输的技术,本文在TCP/IP的网络层上提出了实现安全传输通道的技术和解决方案。并对网络层的安全传输通道技术提出了实现机制。  相似文献   

4.
Abstract This paper charts the developments in information technology (IT) policies in education in Japan over the past decade with particular emphasis on the impacts on teacher education. Beginning with the work of the National Council on Educational Reform in 1985, the Japanese education system initiated a thorough analysis of the role of information technology in all aspects of education from kindergarten through to high school, vocational education and pre- and in-service teacher education. The various approaches culminated in guidelines and statutory requirements relating to both schools' curricula and teacher training, published in the period 1990–1992. More recently other ministries have contributed to developments including the Ministry for International Trade and Industry which has categorized the different types of information engineers and among these is the new Educational Engineer. The paper reports the processes leading to these developments.  相似文献   

5.
Abstract As with many European countries Denmark is experiencing change in teacher education and most notably in the wake of an act of government in 1992 which was designed to set out common aims for teacher education. Prior to that the content and structure of teacher education had been highly specified including, for example, the requirement that student teachers should take a course of 42 hours IT-related lessons. This paper provides a brief history of the background to the changes in teacher education and focuses on the implications that the more flexible aims for teacher education have for the future integration of IT in teacher education.  相似文献   

6.
Participatory Design has mainly been practiced in Europe and North America. Our seven-year experience in Nigeria suggests that user participation is also a must in developing countries. However, the scope of participation needs to be expanded. For instance, in health informatics the communities served by the health facility in question need to be involved along with computer professionals and health providers. This paper presents the results of an experiment in tripartite partnership in systems design for Primary Health Care by designers, users/providers, and community representatives in Ile-Ife, Nigeria. The experience was extremely encouraging.  相似文献   

7.
Abstract This paper outlines the consensual approach to the formulation of curriculum policy in general, and in relation to information technology (IT) in particular, in Scotland. It outlines the approaches to IT that have emerged as a result. These are founded on the premises that all children should develop knowledge and understanding about IT and skills in using IT; that IT should influence both content and delivery of the curriculum; and that IT (computing studies in Scotland) should be an elective for secondary school pupils. Against this background, the paper describes the evolution of policy and practice relating to IT in teacher education. It appraises the strategies which institutes are using for developing the professional skills necessary to deliver IT in the Scottish curriculum. It notes significant progress but highlights the need to develop strategies which integrate IT more deeply with other professional studies so that student teachers develop deeper, more reflective approaches to IT.  相似文献   

8.
XML语言在变电站设备描述中的应用   总被引:10,自引:0,他引:10  
针对目前变电站设备间互操作性和系统集成的困难,提出了解决这一问题的设备自描述技术,并讨论了设备互操作中信息的交换机制。该文介绍了XML技术的特点,基于XML的SCL基本概念和SCL对象模型技术。最后,总结了XML技术为设备自描述带来的优点。  相似文献   

9.
在沈阳市远郊-近郊-市区等不同城市化水平区内选取林地、草地和路边土几种不同利用方式下的表层土壤,对土壤中的微生物状况进行了初步分析。结果表明,随着城市化水平的提高,土壤中微生物的数量表现为明显的减少趋势。其中变化较大的是细菌,而真菌和放线菌的变化不明显。  相似文献   

10.
Modbus协议是自动化系统常用的一种多设备间的通讯传输协议。它已经成为一通用工业标准。标准Modbus协议可以使用RS232、RS485/422兼容串行接口,通信线采用2线制连接,通过Modbus协议使不同厂商生产的控制设备可以连成工业网络,进行集中监控。本文介绍了Modbus协议在天华化肥生产装置SIS逻辑控制系统与DCS控制系统间通讯技改实例,通过硬件组态和软件配置的相应介绍,旨在让读者了解有关ModBus常用组态方法和应用的基本原理,抛砖引玉,在解决其它设备间通讯问题时提供方法。文章着重对SIS和DCS间通讯方式存在问题的分析、认证、设计和施工进行了介绍,并通过SIS和DCS数据交换,为提高生产的管理水平和加强控制功能的解决提供了一种思路。  相似文献   

11.
The authors discuss aliasing errors in signature analysis registers for self-testing networks and review analytical results. The results show that when p, the probability that an error will occur at a network output, is close to 1/2, there is a bound of the aliasing error. The analysis uses a graph to represent the probability of transition, the Markov process, and z-transforms to analyze the behavior of the signature analysis register. For very small p(p?0) and very large p(p?1), the aliasing error solution for primitive polynomials is a series of terms (1-?)n in magnitude (where n is the number of random patterns being applied to the network or the length of the network output sequence). As compared with nonprimitive polynomials, whose solution is n(1-?)n or n2(1-?)n, in general primitive polynomials are much better with respect to aliasing. Simulation results are shown for aliasing errors for these polynomials, which give insight as to how aliasing occurs.  相似文献   

12.
《Ergonomics》2012,55(7):853-865
Ergonomic thought and practice were introduced in ancient China in relation to modern developments in Chinese ergonomics. Despite the ten-year interruption of the 'cultural revolution’ in the late 1960s and 1970s, ergonomics has made great progress in China in the last decade. In this paper some general developments in recent ergonomics’ teaching and in professional organizations are described. Four major areas of ergonomics research are illustrated: (1) Visual displays and signal design; (2) Human-computer interface with Chinese computers; (3) Cognitive strategies and decision support; (4) Mental workload and occupational stress. The main characteristics of Chinese ergonomics are discussed and new directions are highlighted, based on recent developments and progress.  相似文献   

13.
在无线局域网的快速切换过程中,当存在多个可选的目标接入,点(access point,AP)时,为了均衡负载,提出一种结合AP剩余带宽、信号强度以及AP当前负载比的目标AP选择方法。在所有可能的邻接AP中,若AP的剩余带宽小于移动终端所需带宽,则对这些AP不予考虑,否则,利用其邻接AP的负载比和终端接收到的AP的信号强度,计算函数,选择函数值最大的AP进行连接。仿真结果表明,该方法在整体性能上优于其它方法,没有出现某个AP负载超载。  相似文献   

14.
《Robotics and Computer》1987,3(4):373-380
This paper reviews recent progress in the field of computer-integrated manufacturing in Japan. In addition to the introduction of many turnkey CAD/CAM systems in mechanical industries, various VAD/CAE/CAM systems have been successfully developed in the automobile and electrical appliance industries. These systems drastically reduce the time required for the manufacturing of new products and improve their quality. Productivity of batch production has been increased through installment of unattended flexible manufacturing systems. Similar systems have been applied to medium-size lot and medium-size volume production. The operations of spot welding, arc welding, painting and assembling have been automated by the use of industrial robots. Very recently, much effort is being devoted to the construction of computer network systems for the coordination of all the production activities. This will allow for reduction in production lead times and decrease in stock items in factory inventory.  相似文献   

15.
《Information & Management》1996,30(3):111-117
A survey of union and management negotiators was conducted to characterize the use of computers and other information technology (IT) in collective bargaining activities. Software use, data sources, and attitudes toward the use of computers by both types of negotiators were examined and compared. Results suggest that while, computer use is extensive among both labor and management negotiators, programs in use are generally limited to spreadsheets and database management systems. Negotiators tend to use computers primarily to generate contract packages and conduct cost-benefit analyses. Concerns regarding Information used in decision-making are consistent with those posed in the information systems literature.  相似文献   

16.
In recent years, information and communication technologies (ICTs), particularly web-based technologies, have created a more complex and challenging information technology (IT) environment for governments throughout the world. As more and more activities are migrating from physical to virtual media, users and employees have been faced with relentless pressure to use technology. This calls for a greater understanding of the human, social and cultural issues involved in the acceptance of IT systems by all stakeholders of the organisation. Indeed increasingly it has been acknowledged that one of the main determinants of IT success is organisational culture, and consequently the purpose of this research is to examine cultural barriers and enablers which have impeded or facilitated the implementation of E-Government initiatives in Malaysia. An anthropological framework based on the Grid and Group Cultural Theory of Mary Douglas is used to study this issue in more depth. This framework identifies four cultural cosmologies – hierarchism, egalitarianism, individualism and fatalism. We argue that cultural cosmologies can have both enabling and constraining characteristics and that cultural pluralism in the enabling forms of hierarchism, egalitarianism and individualism is essential for the successful implementation and operation of E-Government services. We illustrate these points through two case studies in Malaysia – one displaying constraining characteristics, which impeded IT implementation/use and the other displaying enabling characteristics, which facilitated IT implementation/use. Finally, a cross comparison of the two case studies on cultural issues is also provided.  相似文献   

17.
综述了根瘤菌分类,影响根瘤固氮机制的因素、根瘤菌及其宿主基因型的遗传改良与筛选,提出了花生根瘤菌应用存在问题及研究对策。  相似文献   

18.
We address the problem of detecting irregularities in visual data, e.g., detecting suspicious behaviors in video sequences, or identifying salient patterns in images. The term “irregular” depends on the context in which the “regular” or “valid” are defined. Yet, it is not realistic to expect explicit definition of all possible valid configurations for a given context. We pose the problem of determining the validity of visual data as a process of constructing a puzzle: We try to compose a new observed image region or a new video segment (“the query”) using chunks of data (“pieces of puzzle”) extracted from previous visual examples (“the database”). Regions in the observed data which can be composed using large contiguous chunks of data from the database are considered very likely, whereas regions in the observed data which cannot be composed from the database (or can be composed, but only using small fragmented pieces) are regarded as unlikely/suspicious. The problem is posed as an inference process in a probabilistic graphical model. We show applications of this approach to identifying saliency in images and video, for detecting suspicious behaviors and for automatic visual inspection for quality assurance. Patent Pending  相似文献   

19.
It is shown that two types of symmetry are possible for pairs of bases; however, only one, more efficient method of encoding and decoding information is implemented in nature. It is proved that the symmetry of short sequences including separate bases follows from the symmetry of sequences of bases. A model of Markov chains is used to show that the symmetry of sequences of bases follows from the symmetry of pairs of bases.  相似文献   

20.
Abstract

Hypermedia is defined as an interactive multimedia application where discrete information units of various formats can be accessed in nonlinear ways. This kind of application does differ from traditional information delivery systems in allowing the user considerable freedom in making navigational decisions; users are able to determine, at least to some extent, the media-form of presentation and the order of material presented. However given this freedom, it is possible in some situations that learners might stray from the teacher's instructional objective and become overly engaged in unrelated browsing activities. This study investigates navigational behaviors made by college undergraduate music appreciation students who used a hypermedia program as a supplement to traditional instruction. Results indicated that students accessed these materials in strikingly different ways. While some users read the screens in linear fashion not viewing any multimedia nodes, others made many nonlinear jumps and investigated multimedia nodes often. Although most students did access the musical nodes, most did not listen to the musical examples in their entirety. Overall lesson length varied considerably. Results also indicated that students acted in dynamic fashions, making many navigational actions that were not related to the established instructional objective.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号