首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
RTF文件格式分析及在多媒体中的应用   总被引:2,自引:0,他引:2  
余阳  游燕 《计算机工程》1999,25(4):30-31
RTF是一种在不同操作系统下不同应用软件之进行文本和图象信息交换的文件格式。  相似文献   

2.
无线射频识别及其在制造业中的应用   总被引:7,自引:0,他引:7  
介绍了无线射频识别(RFID)的电子标签和阅读器.着重分析了RFID的工作原理和技术实现,包括:RFID的射频传输、反向散射调制(back scatter modulation),标签先发言(TTF)和阅读器先发言(RTF)、数据交换和多标签同时识别.阐述了RFID的应用系统,它包括RFID系统、计算机处理系统、应用软件和系统软件.还阐述了RFID在制造业中的具体应用,包括:生产自动化,仪器、工具、器材和仓储的管理,门禁保安和产品防伪等.  相似文献   

3.
在对RTF格式分析的基础上,结合Visual C++控件和文件结构化设计了新型的控件,可实现对含有OLE对象的R1F文档读写及存储,并通过包对象数据类型实现了对含有RTF文件内容的Access数据库访问,完成了RTF文档与ACCESS数据库较好的结合。  相似文献   

4.
The intent of this article is to provide the reader with an historical perspective of software vulnerability assessment. This historical overview will examine the lessons learned from the periods of formal approaches as applied to system certification and validation; to the periods where ‘simplistic’ tools are introduced to perform the tasks of vulnerability assessment; then to an overview of a macroscopic approach for studying the fundamental output of the complex nonlinear system known as software development; and finally to the present, where state-of-the-art tools and methodologies are beginning to apply principles of formal methods to the evaluation of software. The events and lessons learned from each of these periods will become evident to the reader, concluding with a requirement set and an outline for moving vulnerability analysis into the future.  相似文献   

5.
显示和保存带有文字、图片和表格的计算书是工程计算软件中必不可少的功能之一。主要介绍两种在C#开发工具中的RichTextBox和WebBrowser控件中显示文字、图片和表格的方法:一是用RTF控制代码生成RTF文本格式;二是用HTML控制符生成HTML文本格式,并分别通过两个简单实例来阐述两种方法在工程软件中的应用。  相似文献   

6.
This paper discusses the problem of automatic word boundary detection in the presence of variable-level background noise. Commonly used robust word boundary detection algorithms always assume that the background noise level is fixed. In fact, the background noise level may vary during the procedure of recording. This is the major reason that most robust word boundary detection algorithms cannot work well in the condition of variable background noise level. In order to solve this problem, we first propose a refined time-frequency (RTF) parameter for extracting both the time and frequency features of noisy speech signals. The RTF parameter extends the (time-frequency) TF parameter proposed by Junqua et al. from single band to multiband spectrum analysis, where the frequency bands help to make the distinction between speech signal and noise clear. The RTF parameter can extract useful frequency information. Based on this RTF parameter, we further propose a new word boundary detection algorithm by using a recurrent self-organizing neural fuzzy inference network (RSONFIN). Since RSONPIN can process the temporal relations, the proposed RTF-based RSONFIN algorithm can find the variation of the background noise level and detect correct word boundaries in the condition of variable background noise level. As compared to normal neural networks, the RSONFIN can always find itself an economic network size with high-learning speed. Due to the self-learning ability of RSONFIN, this RTF-based RSONFIN algorithm avoids the need for empirically determining ambiguous decision rules in normal word boundary detection algorithms. Experimental results show that this new algorithm achieves higher recognition rate than the TF-based algorithm which has been shown to outperform several commonly used word boundary detection algorithms by about 12% in variable background noise level condition, It also reduces the recognition error rate due to endpoint detection to about 23%, compared to an average of 47% obtained by the TF-based algorithm in the same condition.  相似文献   

7.
In this paper, we introduce a new representation – radiance transfer fields (RTF) – for rendering interreflections in dynamic scenes under low frequency illumination. The RTF describes the radiance transferred by an individual object to its surrounding space as a function of the incident radiance. An important property of RTF is its independence of the scene configuration, enabling interreflection computation in dynamic scenes. Secondly, RTFs naturally fit in with the rendering framework of precomputed shadow fields, incurring negligible cost to add interreflection effects. In addition, RTFs can be used to compute interreflections for both diffuse and glossy objects. We also show that RTF data can be highly compressed by clustered principal component analysis (CPCA), which not only reduces the memory cost but also accelerates rendering. Finally, we present some experimental results demonstrating our techniques.  相似文献   

8.
联邦式脆弱性信息系统访问控制模型研究   总被引:1,自引:0,他引:1  
深入分析脆弱性信息系统研究现状,指出现有脆弱性信息系统访问控制机制的不足之处。在分析联邦式系统特点的基础上,提出一种适用于联邦式脆弱性信息系统的访问控制模型,并介绍其实现技术要点。  相似文献   

9.
图文并茂的网络试卷,是进行网络无纸化考试的基础.为了进行网络题库的传递,必须将试卷中嵌入的图片、公式等直接保存到数据库中.如何解决数据库中的图文信息能在客户端完美显示,成为网络无纸化考试系统中的核心技术之一.本文提出基于Web0frice控件的网络试卷显示技术,用以解决RTF格式数据保存在数据库中的试卷题目信息在客户端...  相似文献   

10.
This research focuses on the development and validation of an instrument to measure the privacy concerns of individuals who use the Internet and two antecedents, perceived vulnerability and perceived ability to control information. The results of exploratory factor analysis support the validity of the measures developed. In addition, the regression analysis results of a model including the three constructs provide strong support for the relationship between perceived vulnerability and privacy concerns, but only moderate support for the relationship between perceived ability to control information and privacy concerns. The latter unexpected results suggest that the relationship among the hypothesized antecedents and privacy concerns may be one that is more complex than is captured in the hypothesized model, in light of the strong theoretical justification for the role of information control in the extant literature on information privacy.  相似文献   

11.
RTF (Rich Text Format), as presented to many users, is considered to be a so-called universal remedy against obtrusive macro-viruses and any other sort of malicious code. Numerous anti-virus companies categorically recommend not accepting any standard MS Word (DOC) files. It is true that RTF files cannot contain a macro-program (macros) in basic form — in the instance of conversion by standard means from other formats, the macros are automatically deleted — however, this same RTF feature has a flip side to it: users are lulled into a false sense of security, ignoring the basic principles of safety when working with RTF documents.  相似文献   

12.

This research focuses on the development and validation of an instrument to measure the privacy concerns of individuals who use the Internet and two antecedents, perceived vulnerability and perceived ability to control information. The results of exploratory factor analysis support the validity of the measures developed. In addition, the regression analysis results of a model including the three constructs provide strong support for the relationship between perceived vulnerability and privacy concerns, but only moderate support for the relationship between perceived ability to control information and privacy concerns. The latter unexpected results suggest that the relationship among the hypothesized antecedents and privacy concerns may be one that is more complex than is captured in the hypothesized model, in light of the strong theoretical justification for the role of information control in the extant literature on information privacy.  相似文献   

13.
介绍了一种符合ISO/IEC 15693协议的电子标签读写器系统,提出了一种适合于食品链信息管理的便携式RFID读卡器设计方案.该读卡器系统包括控制模块、射频识别通信模块、无线传感网数传模块、信息存储模块、电源管理模块、网络接口模块以及服务器数据备份等.本文主要介绍系统备模块的框架设计,并给出了信息的处理方法.  相似文献   

14.
王宇  卢昱 《计算机应用研究》2008,25(6):1796-1798
脆弱性分析是网络安全风险分析与控制的关键技术,脆弱性也是网络攻防双方争夺信息优势的焦点。阐述了网络攻防控制的作用原理,提出了相对脆弱性分析的概念,从结构脆弱性分析的角度,分析了信息网络中访问路径上的节点脆弱性,给出了分析模型以及计算关键节点和访问路径综合脆弱性的分析方法,对分析算法进行了描述。该算法可计算出信息网络中任意两对节点之间访问路径的最大综合脆弱性,为网络安全控制提供了有效评估手段。  相似文献   

15.
RFID双频EPC标签读写器的设计   总被引:2,自引:0,他引:2  
雷建龙 《微计算机信息》2006,22(20):241-242
阐述了863子课题“双频RFID读写器”的设计,所建立的物流终端信息平台将作为项目后期开发的基本硬件平台。课题的总体目标是设计一台能够识别遵守13.56MHz和902-928MHz频段的EPC规范标签的物流信息平台。它的硬件体系包括一个信息处理平台通过扩展子板上的扩展接口外接多个RFID读写模块与无线通信模块。基于它的软件模块体系结构信息处理能力强、易于扩展,同时能提供包括远程控制等复杂的网络功能,这种设计带来了良好的可测性和灵活性,同时具有使用方便的特点。  相似文献   

16.
利用VB 6.0开发化学试卷生成器   总被引:6,自引:7,他引:6  
针对化学试卷中存在的图形内容及特殊字符格式,通过解析RTF格式文档的源代码,利用Visual Basic设计开发了可以自动生成RTF格式试卷文档的化学试卷生成器。该程序根据命题条件从试题库中随机提取试题,并截取试题内容,在RTF文件头之后依次以RTF源代码形式添加试卷头、试题内容及结束符,最终得到RTF格式试卷文档,实现计算机辅助生成化学试卷。  相似文献   

17.
基于攻击图的工控系统脆弱性量化方法   总被引:2,自引:0,他引:2  
提出了一种基于攻击图的工控系统脆弱性量化研究方法. 从工控系统中存在的漏洞利用难度和漏洞危害性两个维度出发, 同时结合具体的工业系统中有关防御强度、攻击强度、物理损失、信息损失等方面, 提出了一系列的脆弱性量化指标, 制定了比较全面的等级划分标准. 之后将量化指标与攻击图相结合, 利用攻击过程中每一步的原子攻击期望来对可能存在的所有攻击路径进行脆弱性分析. 最后以典型的锅炉控制系统作为实验背景进行了案例分析. 实验结果表明, 该方法能够较全面地分析工控系统中潜在的隐患威胁, 科学合理地评估各条攻击路径的脆弱性, 由此得到总攻击期望最大的攻击路径.  相似文献   

18.
A comparison is made between traditional embossed braille, which provides important information about page format, and speech, which presents information sequentially, thus losing page format information. Advances in technology have led to the advent of machines with dynamic braille displays which present the equivalent of a single line of embossed braille and which also provide computer access to blind users. These devices retain many of the advantages of embossed braille with added features such as editing flexibility. However, with speech-based systems, they do not present the user with the spatial relationships among the words on a page, the format information of a page layout, or the structure of columnar information. It was hypothesized that these format characteristics were important to locating information on a page, and that if these could be restored, the reader would operate more efficiently. A test apparatus was devised and a testing methodology was developed to test this thesis. The apparatus simulated a situation in which the reader utilized a single-line dynamic braille display mounted on a track so it could be moved vertically from line to line, much as one might move one's hands when scanning a page of embossed braille. This gives the reader direct feedback through arm location as to where he is reading on the page. Testing consisted of having subjects read sections of text and columnar information, and then respond by locating the answer in the text. It was discovered that physically scanning up and down the document allowed the users to develop a clearer sense of the overall gestalt of the page. Furthermore, readers were able to locate information using this technique approximately 80% faster than when using a single-line dynamic display which required the use of pushbuttons or a joystick to navigate around the page.  相似文献   

19.
刘广孚 《微型电脑应用》2001,17(6):54-56,53
Rich Textbox控件是一个功能很强的字处理控件,内容存储为RTF格式,本文介绍了在VB中通过调用API函数实现RTF格式文档打印和预览的方法。  相似文献   

20.
以应用SAMsys公司MP9320读写器的射频识别(RFID)系统为基础,阐述了在C++ Builder开发环境下,开发通过计算机串口操控读写器工作方式和读写标签的ActiveX控件的方法。该控件屏蔽了后台信息系统与读写器硬件的直接通信,减轻了后台信息系统数据获取的复杂度。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号