首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
An overview of geographic information systems (GISs) is given, covering data collection, applications, organization, and data models. Recent trends in map data processing are examined, namely, automatic name placement, map generalization, an automatic digitizer and expert system for land-use analysis, a map oriented system for urban planning, and a knowledge-based GIS. Techniques for extracting information from paper-based images are discussed, and some experimental results are given  相似文献   

2.
对于高速网络中大容量数据流的实时查询处理,由于数据流的突发性,要求调度策略能够适应这一特点,在不降低处理系统性能的情况下进行较合适地处理.以链式调度为基础,综合先进先出和贪心策略的优点,采用一种低延迟的分段调度策略来处理数据流,可以尽量避免这些调度策略的缺陷,既能在一定程度上降低运行期间系统的存储需求,同时保持较低的输出延迟.  相似文献   

3.
Many processes in the industrial realm exhibit stochastic and nonlinear behavior. Consequently, an intelligent system must be able to ndapt to nonlinear production processes as well as probabilistic phenomena. To this end, an intelligent manufacturing system may draw on techniques from disparate fields, involving knowledge in both explicit and implicit form.In order for a knowledge based system to control a manufacturing process, an important capability is that of prediction: forecasting the future trajectory of a process as well as the consequences of the control action. This paper presents a comparative study of explicitaand implicit methods to predict nonlinear chaotic behavior. The evaluated models include statistica; procedures as well as neural networks and case based reasoning. The concepts are crystallized through a case study in the prediction of chaotic processes adulterated by various patterns of noise.  相似文献   

4.
Transaction Oriented Prolog-Online Environment is a multi-user, mainframe implementation of the logic programming language Prolog, specially designed and developed for the data processing environment. This article describes the background, functionality, implementation and use of TOP-ONE, stressing that applications of knowledge-based systems technology to data processing environments will achieve full success only when existing systems and existing conventional data are incorporated within the applications.  相似文献   

5.
Models of parallel computations are considered for a wide class of data processing programs. Properties of programs are investigated and approaches to parallelizing sequential data processing programs and designing parallel programs are proposed. Computation optimizing problems are formulated.Translated from Kibernetika, No. 4, pp. 1–8, 42, July–August, 1989.  相似文献   

6.
7.
8.
The Journal of Supercomputing - Increasingly, more manufacturing companies are equipping their products with smart capabilities which allow them to provide more informed services to customers....  相似文献   

9.
A spoken dialogue between a user and a computer system has to be governed by the system because of: (i) the limited capabilities of present word-recognition apparatus; and (ii) the limited possibilities of the system for 'understanding' its user. The user's part of the dialogue therefore needs to be unobtrusively controlled by the system by carefully phrased and timed prompts. Short pauses in these prompts enable the experienced user to make shortcuts through the dialogue, without forsaking complete explanations for the inexperienced user. The user is also able to control the system by utilizing other pauses in the system utterances for corrective words or protests in case of incorrect recognition.  相似文献   

10.
11.
With the vision of "Internet as a computer", complex software-intensive systems running on the Internet, or the "Internetwares", can be also divided into multiple layers. Each layer has a different focus, implementation technique, and stakeholders. Monitoring and adaptation of such multilayer systems are challenging, because the mismatches and adaptations are interrelated across the layers. This interrelation makes it difficult to find out: 1) When a system change causes mismatches in one layer, how to identify all the cascaded mismatches on the other layers? 2) When an adaptation is performed at one layer, how to find out all the complementary adaptations required in other layers? This paper presents a model-based approach towards cross-layer monitoring and adaptation of multilayer systems. We provide standard meta-modelling languages for system experts to specify the concepts and constraints separately for each layer, as well as the relations among the concepts from different layers. Within each individual layer, we use run-time models to represent the system state specific to this layer, monitor the systems by evaluating model changes according to specified constraints, and support manual or semi-automated adaption by modifying the models. When a change happens in the run-time model for one layer, either caused by system changes or by the adaptation, we synchronize the models for other layers to identify cascaded mismatches and complementary adaptations across the layers. We illustrate the approach on a simulated crisis management system, and are using it on a number of ongoing projects.  相似文献   

12.
Abstract

A spoken dialogue between a user and a computer system has to be governed by the system because of: (i) the limited capabilities of present word-recognition apparatus; and (ii) the limited possibilities of the system for ‘understanding’ its user. The user's part of the dialogue therefore needs to be unobtrusively controlled by the system by carefully phrased and timed prompts. Short pauses in these prompts enable the experienced user to make shortcuts through the dialogue, without forsaking complete explanations for the inexperienced user. The user is also able to control the system by utilizing other pauses in the system utterances for corrective words or protests in case of incorrect recognition.  相似文献   

13.
A cross-layer framework for privacy enhancement in RFID systems   总被引:1,自引:0,他引:1  
In this paper, we introduce a cross-layer framework for enhancing privacy in RFID systems. The framework relies on mechanisms in the physical (PHY) layer, as well as the medium access control (MAC) layer, to provide flexible protection over the unique identifiers of low-cost RFID tags. Such a framework prevents adversaries and malicious parties from tracking RFID tags through the monitoring of their unique identifiers. More specifically, our framework relies on masking of the identifier at the PHY layer, whereby bit-collisions are induced between the backscattered tag identifier and a protective mask, such that a legitimate reader can be allowed to recover the tag identifier but an illegitimate party would not be able to do so. To strengthen the level of protection provided by the bit-collision masking method, we present the randomized bit encoding scheme that is used in our framework. In addition, we also incorporate mechanisms in the MAC layer, and make use of cross-layer interactions between the MAC and the PHY layers to provide flexible privacy protection. This allows tags that do not require privacy protection to be read conveniently while allowing tags that need to be protected to stay protected.  相似文献   

14.
15.
This article analyzes deliberate tampering in automated data transmission and processing systems. The method of dynamic programming is considered, which makes it possible to obtain the most accurate solution for problems of the optimization of protection in automated data transmission and processing systems. It is suggested to use the method of counter solutions of dynamic programming functional equations in order to reduce the dimension of the optimization problem of information security in automated systems. An experimental study is conducted, and the effectiveness of this method is evaluated.  相似文献   

16.
Looped-functionals have been shown to be relevant for the analysis of a wide variety of systems. However, the conditions obtained in previous papers on the analysis of sampled-data, impulsive and switched systems have only been shown to be sufficient for the characterisation of their associated discrete-time stability conditions. We prove here that these conditions are also necessary. This result is derived for a wider class of linear systems, referred to as impulsive pseudo-periodic systems, that encompass periodic, impulsive, sampled-data and switched systems as special cases.  相似文献   

17.
A brief analysis of character strings and string processing is given. Text processing is defined as the processing of character strings to control not only the sequential relations among the characters, but also spatial and form relations among the symbols used to produce a physical display of the character string. Requirements are given for a data structure by which character strings may be represented to facilitate text processing, including independent manipulation of sequential, spatial, and form relations. A Text Processing Code (TPC) meeting these requirements is presented in detail. Several other coding schemes are examined and shown to be inadequate for text processing as defined here.  相似文献   

18.
We consider application of the two-armed bandit problem to processing a large number N of data where two alternative processing methods can be used. We propose a strategy which at the first stages, whose number is at most r ? 1, compares the methods, and at the final stage applies only the best one obtained from the comparison. We find asymptotically optimal parameters of the strategy and observe that the minimax risk is of the order of N α , where α = 2 r?1/(2 r ? 1). Under parallel processing, the total operation time is determined by the number r of stages but not by the number N of data.  相似文献   

19.
The paper aimed at demonstrating the feasibility of reducing complexity of the distributed switches interconnecting the units of the data processing systems. Simplification was obtained by the use of optical facilities: to switch n devices, it is possible to design the single-step switches of n log2 n switching elements assuming any of the two possible states. Retroreflectors were proposed to simplify organization of the group connections. Methods for using the proposed devices in the switching modes that underlie many tasks of control of interaction of the data processing devices were presented.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号