首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Since its establishment in 1982, the Semiconductor Research Corporation (SRC) has funded extensive silicon-based semiconductor research at universities, including research in the area of computer aided design. While the consortium has had success with transferring this research to its members, the overall incidence of transfer has been limited. This study explored the key issues affecting the transfer of university computer-aided design (CAD) technology from the SRC CAD Center at Carnegie Mellon University to the SRC's industrial membership. Most research on improving technology transfer has focused on finding mechanisms to promote person-to-person interaction between developer and adopter. Interview and survey data collected from the 12 CAD Center faculty and 15 SRC member firm personnel suggest that transfer succeeds only when SRC member firms establish organizational incentives for technical personnel to commit their time to the implementation of university research, and when they provide these personnel the organizational resources needed to perform this implementation. Suggestions for improving the mechanisms of transfer are offered, but without reform in organizational incentives, improving these mechanisms is unlikely to significantly increase the rate at which university research is commercialized for actual industrial use  相似文献   

2.
Strategic e-Business Decision Analysis Using the Analytic Network Process   总被引:1,自引:0,他引:1  
The rapid global deployment of electronic business (e-business) and information systems has required managers to make decisions that seek to balance technical factors with strategic business goals. This research utilizes the analytic network process (ANP) to provide insight into optimum-seeking decision processes by managers, as investments are made to utilize e-commerce technologies. The nonlinear network approach of ANP was used to study the "systems with feedback" where the e-commerce strategy may both dominate and be dominated, directly and indirectly, by the business-level strategy. This study analyzes e-business decisions in organizations, based on management heuristics and perceptions of expected contributions of e-commerce strategies, as well as the business-level strategies. The ANP research methodology process is employed since it is well suited for the study of a multi-attribute decision problem to explore qualitative and quantitative preferences of top managers in independent, nondiversified firms involved in e-business. ANP is used to model decision complexities involved in integrating e-commerce innovation into the overall strategic planning of firms. Optimal e-business strategies are chosen by using systems-with-feedback, where interdependencies between four virtual e-commerce domains and two generic business level strategies are explored. This study obtained significant results and identified several important avenues for further research. Implications for theory and research are discussed.  相似文献   

3.
《Spectrum, IEEE》1990,27(10):73-76
The effects of changes in the industrial R&D climate on research performed at universities in both the East and West are examined. The approaches to using university research for industrial problems taken by SRC, a nonprofit industry consortium based in Research Triangle Park, NC, by the National Science Foundation, and by other university-industry collaborations are described. In Europe, Great Britain has taken the lead in making its institutions of higher education more market-driven by requiring them to compete for contracts from industry as well as from the public sector. Its universities (and their European counterparts) also have become more conscious of the value of their intellectual property. In Japan, where industrial researchers have dominated and academic R&D has not enjoyed much esteem, support continues for fields of basic research where the Japanese have established themselves, such as controlled nuclear fusion and high-energy physics. Universities also receive considerable funding from the Ministry of Education, Science, and Culture, and sometimes additional funding is available at the prefectural level  相似文献   

4.
Virtual Centre of Excellence in Mobile and Personal Communications   总被引:1,自引:0,他引:1  
The Mobile VCE was set up in 1996 by industry and the DTI with the objective of bringing together industry players and British universities to develop a common base of knowledge and specific implementation goals. BT has been a member of this group since its inception and has been a key player in helping to organise the university research to the maximum benefit of the Mobile VCE community. Mobile VCE is a not-for-profit company, established as a joint initiative of the mobile communications industry and leading research universities, with endorsement for the UK government. Its innovative approach provides companies with a cost-effective means of accessing the best of the academic base to undertake high quality, industry-led, research to support the future development of the wireless industry.  相似文献   

5.
Video security is becoming more and more important today, as the number of installed cameras can attest. There are many challenging commercial applications to monitor people or vehicle traffic. The work reported here has both research and commercial motivations. Our goals are first to obtain an efficient intelligent system that can meet strong industrial surveillance system requirements and therefore be real-time, distributed, generic and robust. Our second goal is to have a development platform that allows researchers to conceive and easily test new vision algorithms thanks to its modularity and easy set-up. This paper focuses on the image analysis modules. It considers the different kind of inputs, algorithm models in addition to delay and the need of generality.  相似文献   

6.
A generic cell controller has been designed and developed for an automated VLSI manufacturing facility. The components of the design phase include the detailed understanding of motivation for the effort, a requirements analysis (functional specification), a determination of design goals, a determination of appropriate assumptions, a feasibility design, and an initial performance evaluation. The design is quite modular and enhances the generic attributes of cell controller operation. The cell controller design is independent of the facility hardware, software, and networking base, and may be adapted to a single or multitasking system. The main component of the design is an extensive relational database with a relatively uncomplicated and generic schema. This database incorporates many of the control aspects of the cell controller, thus reducing the volume of control software. An initial performance evaluation indicates that the design is suitable for operation as a cell controller even when implemented on a relatively slow single tasking PC  相似文献   

7.
In this article we discuss a test generation, design-for-testability and built-in self-test methodology for two-dimensional iterative logic arrays (ILAs) that perform arithmetic functions. Our approach is unique because a single graph labeling procedure is used to generate test vectors, implement design-for-testability as well as design the circuitry for built-in self-test. The graph labeling is based on mathematical properties of full-addition such as symmetry and self-duality. Circuit modifications are introduced by a systematic procedure based on the graph labeling, that enable them to be tested with a fixed number of tests irrespective of their size. The approach is novel as it also greatly simplifies the processes of on-chip test vector generation and response comparison that are necessary for built-in self-test. Each circuit module is tested in a pseudo-exhaustive manner with deterministic as opposed to random test sequences. This results in a comprehensive test of the circuit for which built-in self-test is designed.This research was supported by the General Electric Company and by the Semiconductor Research Corporation under contracts SRC RSCH 88-DP-108 at the University of Illinois and SRC RSCH 89-DP-142 at the University of Texas at Austin.  相似文献   

8.
The secure provision of mobile computing and telecommunication services is rapidly increasing in importance as both demand and applications for such services continue to grow. This paper is concerned with the design of public key based protocols suitable for application in upcoming third-generation mobile systems such as the Universal Mobile Telecommunications Service. Candidate protocols are considered for the authentication of a mobile user to a value-added service provider with initialization of a mechanism enabling payment for the value-added service. A set of goals for such a protocol are identified, as are a number of generic attacks; these goals and attacks are then used to evaluate the suitability of seven candidate third-generation user-to-network authentication protocols. Many of these candidate protocols are shown to have highly undesirable features  相似文献   

9.
The Valensole HF skywave radar, used since 1960 for remote sensing of geophysical media, has recently been upgraded by installation of a multireceiver system used with linear receiving arrays. The antenna elements are combined in subarrays and each of them is connected to a receiver. A new radar controller has been designed to allow for the automatic control of individual antenna elements. The purpose of this paper is to present this installation and the scientific goals which led the authors to build it. To illustrate the improved remote sensing capabilities of the multireceiver configuration, as compared to a single receiver system, the authors describe new results recently obtained in sea-state remote sensing applications and in ionospheric studies. This system has been built at a relatively low cost as allowed by a university budget  相似文献   

10.
This study investigated the effects global communication is having on the formulation and conduct of foreign policy and showed that it both constrains leaders and officials yet provides them with opportunities to advance their goals. The article presents a taxonomy where global communication is viewed as an actor in the policy process with corresponding attributes of type, activity, context, and concept. Four types of actors are identified: controlling, constraining, intervening, and instrumental. The article critically and respectively examines concepts developed to explain each type: the "CNN Effect theory,""real-time policy,""international political brokerage," and "media diplomacy." Although some of these concepts were found to be useful, major progress in this field requires interdisciplinary research based on joint application of theories and models from both communication and international relations.  相似文献   

11.
Efficient sample rate conversion for software radio systems   总被引:1,自引:0,他引:1  
An efficient sample rate conversion (SRC) method for software radio (SWR) systems is proposed. The proposed method modifies conventional single- or multistage SRC processes such that the computation of the output of a particular stage is performed in a hierarchical fashion. This SRC method consumes fewer computations than traditional SRC methods over a range of SRC factors and is especially suitable for SWR base station transmitters. The computational requirements of the proposed SRC method and conventional SRC methods are compared and simulation results of the proposed method are discussed.  相似文献   

12.
本文提出的小型化模测终端可以实现降低模测成本、提升模测效率两大目标。文中首先介绍了小型化模测终端的研发背景,然后,论证了其中涉及的两大关键技术;接着,说明了小型化模测终端的应用场景;最后,AICL项目组还基于定制样机开展了实验室及外场测试验证,通过实测证明了小型化模测终端的可行性。  相似文献   

13.
Recent results of the autonomous sensor research program HUMAN++ will be summarized in this paper. The research program aims to achieve highly miniaturized and (nearly) autonomous sensor systems that assist our health and comfort. Although the application examples are dedicated to human monitoring/assistance, the necessary technology development for this program is generic and can serve many wireless sensor applications. This multi-disciplinary program combines research on wireless ultra-low-power communications, research on 2D/3D integration and packaging platforms, energy scavenging techniques, as well as low-power and ultra-low-power sensor circuit design. An example sensor system is the wearable wireless EEG system.  相似文献   

14.
现阶段高职院校计算机专业的学生就业情况比较严峻,在对学生进行就业指导的过程中,教师应该从多个方面和多个渠道为学生提供就业指导服务。在开展工作的过程中要帮助学生确立工作的目标,确保学生能够找到理想的工作,这是就业指导工作开展的重点内容。在当前的市场环境下,要想帮助高职院校计算机专业的学生顺利就业,教师应该对企业的用人要求进行全面的了解,而且要对学生的就业需求进行深入的研究,才能帮助学生选择最合适的岗位。文章就高职计算机专业学生就业指导进行相关的分析和探讨。  相似文献   

15.
Few studies have specifically examined online trolling behavior and the forms and current conditions of online trolling victimization that may develop among university students, as well as the correlation of these to personality traits. The valid sample included 285 university students, with 80.6% and 19.3% being male and female, respectively. The research results are: 1. Online trolling behavior is more common in those who more frequently post text information on Facebook than those who do not; 203 (71.2%) and 211 (74.0%) experienced at least 1 instance of online trolling behavior or being an online trolling victim, respectively, in the previous week; 2. University students’ online trolling behavior types are ranked by quantity as evocative trolling, malicious trolling, obstruction trolling, and pathological trolling; 3. University students’ online trolling victimization types are ranked by quantity as identity victimization, dissemination victimization, malicious victimization, and obstruction victimization; 4. Sense of inferiority is a significant predictive variable for online trolling behavior and online trolling victimization. At the same time, social extraversion and depression significantly and positively predict online trolling behavior. Based on the foregoing results, the study proposed discussion and recommendations for university students and future research.  相似文献   

16.
The real-time streaming of bursty continuous media, such as variable-bit rate encoded video, to buffered clients over networks can be made more efficient by collaboratively prefetching parts of the ongoing streams into the client buffers. The existing collaborative prefetching schemes have been developed for discrete time models, where scheduling decisions for all ongoing streams are typically made for one frame period at a time. This leads to inefficiencies as the network bandwidth is not utilized for some duration at the end of the frame period when no video frame ldquofitsrdquo into the remaining transmission capacity in the schedule. To overcome this inefficiency, we conduct in this paper an extensive study of collaborative prefetching in a continuous-time model. In the continuous-time model, video frames are transmitted continuously across frame periods, while making sure that frames are only transmitted if they meet their discrete playout deadlines. We specify a generic framework for continuous-time collaborative prefetching and a wide array of priority functions to be used for making scheduling decisions within the framework. We conduct an algorithm-theoretic study of the resulting continuous-time prefetching algorithms and evaluate their fairness and starvation probability performance through simulations. We find that the continuous-time prefetching algorithms give favorable fairness and starvation probability performance.  相似文献   

17.
The generic ring model considers algorithms that operate on elements of an algebraic ring by performing only the ring operations and without exploiting properties of a given representation of ring elements. It is used to analyze the hardness of computational problems defined over rings. For instance, it is known that breaking RSA is equivalent to factoring in the generic ring model (Aggarwal and Maurer, Eurocrypt 2009). Do hardness results in the generic ring model support the conjecture that solving the considered problem is also hard in the standard model, where elements of ? n are represented by integers modulo n? We prove in the generic ring model that computing the Jacobi symbol of an integer modulo n is equivalent to factoring. Since there are simple and efficient non-generic algorithms which compute the Jacobi symbol, this provides an example of a natural computational problem which is hard in the generic ring model, but easy to solve if elements of ? n are given in their standard representation as integers. Thus, a proof in the generic ring model is unfortunately not a very strong indicator for the hardness of a computational problem in the standard model. Despite this negative result, generic hardness results still provide a lower complexity bound for a large class of algorithms, namely all algorithms solving a computational problem independent of a given representation of ring elements. From this point of view, results in the generic ring model are still interesting. Motivated by this fact, we also show that solving the quadratic residuosity problem generically is equivalent to factoring.  相似文献   

18.
胡正平  白帆  王蒙  孙哲  赵淑欢 《信号处理》2016,32(7):801-809
针对训练样本字典学习仅包含全局信息、缺乏局部信息的不足,引入与类别相关的原子字典, 提出基于原子与分子字典联合扩展的加权稀疏表示人脸识别方法。首先,对各类训练样本进行PCA学习,得到带标记的训练样本基,构造PCA基原子字典,同时将训练样本字典作为分子字典。进而,利用原子字典与分子字典结合得到扩展字典模型。测试时,根据测试样本与扩展字典基之间的距离进行加权得到与当前测试样本关联的重构字典集,最后对测试样本稀疏重构,利用残差进行分类判别。为验证本文方法有效性,分别在AR、Georgia Tech和CMU PIE人脸数据库上进行实验。   相似文献   

19.
沟槽型VDMOS源区的不同制作方法研究   总被引:1,自引:0,他引:1  
马万里  赵文魁 《半导体技术》2011,36(11):840-843,856
沟槽VDMOS产品为满足电性能力要求,源极区域必须与p型体区短接,为了达到此目的,传统的做法是,源极需要进行一次光刻,在p型体区中做出阻挡源区注入的胶块,然后再进行源区注入。提出几种其他的制作方式,可以省去源区光刻,但同样可以达到原来的目的。诸如,通过刻蚀Si孔将源区与p型体区短接;或者利用刻蚀出的沟槽侧壁做屏蔽进行源区注入;利用凸出沟槽的多晶硅做屏蔽进行源区注入。这些办法都可简化工艺流程,缩短制造周期,节约制造成本,增强器件可靠性,提高产品的竞争力。  相似文献   

20.
Applications of Machine Learning to Cognitive Radio Networks   总被引:3,自引:0,他引:3  
Cognitive radio offers the promise of intelligent radios that can learn from and adapt to their environment. To date, most cognitive radio research has focused on policy-based radios that are hard-coded with a list of rules on how the radio should behave in certain scenarios. Some work has been done on radios with learning engines tailored for very specific applications. This article describes a concrete model for a generic cognitive radio to utilize a learning engine. The goal is to incorporate the results of the learning engine into a predicate calculus-based reasoning engine so that radios can remember lessons learned in the past and act quickly in the future. We also investigate the differences between reasoning and learning, and the fundamentals of when a particular application requires learning, and when simple reasoning is sufficient. The basic architecture is consistent with cognitive engines seen in AI research. The focus of this article is not to propose new machine learning algorithms, but rather to formalize their application to cognitive radio and develop a framework from within which they can be useful. We describe how our generic cognitive engine can tackle problems such as capacity maximization and dynamic spectrum access.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号