期刊文献+
共找到24篇文章
< 1 2 >
每页显示 20 50 100
航海仪器操作智能评估系统的设计与实现 被引量:10
1
作者 杨晓 金一丞 +1 位作者 任鸿翔 廉静静 《中国航海》 CSCD 北大核心 2013年第4期28-33,共6页
目前对航海仪器的评估主要还是依赖于评估员,在评估过程中存在着标准不统一以及客观性的问题,且评估效率不高。航海仪器智能评估系统的开发和设计,可以有效解决上述问题。利用Visual C++2008开发了全球定位系统(GPS)、船舶自动识别系统(... 目前对航海仪器的评估主要还是依赖于评估员,在评估过程中存在着标准不统一以及客观性的问题,且评估效率不高。航海仪器智能评估系统的开发和设计,可以有效解决上述问题。利用Visual C++2008开发了全球定位系统(GPS)、船舶自动识别系统(AIS)、回声测声仪(Echo Sounder)、速度计程仪(Speed Log)等仿真设备;通过专家咨询及调研,设计了智能评估试题,建立了航海仪器智能评估模型,开发了基于客户端/服务器端(C/S)架构的智能评估终端及考务终端。通过测试发现,航海仪器智能评估系统显示的成绩与评估员给出的评估成绩基本吻合,达到了学员训练及评估考试的使用要求。 展开更多
关键词 船舶、舰船工程 航海仪器 评估系统 (客户 服务器)架构 隶属度
下载PDF
基于C/S的视频车辆检测系统设计 被引量:3
2
作者 王玲 《电子测试》 2014年第5X期1-3,共3页
通过对视频流中的车辆进行检测和跟踪,可以准确地统计交通信息,及时的对交通事件报警,对交通路段拥堵情况做出准确的分析,有效缓解交通堵塞。实时分析交通路段通行车辆的数据,有助于调整车辆通过路口时间,加大某路段的通行流量,缓解道... 通过对视频流中的车辆进行检测和跟踪,可以准确地统计交通信息,及时的对交通事件报警,对交通路段拥堵情况做出准确的分析,有效缓解交通堵塞。实时分析交通路段通行车辆的数据,有助于调整车辆通过路口时间,加大某路段的通行流量,缓解道路交通压力。 展开更多
关键词 C/S(客户、服务器) 视频 检测
下载PDF
面向高职院校的物资库存管理系统设计与开发
3
作者 邢宏珍 李晶骅 陈雷 《十堰职业技术学院学报》 2007年第5期101-103,共3页
高职院校作为一种特殊的事业单位,其物资与库存管理与企业差别极大,其WMS系统的设计与开发也不可能沿用企业模式,本文通过一个开发实例,从系统的需求分析、总体设计、主要功能模块以及软件开发平台选择等方面介绍了面向高职院校物资与... 高职院校作为一种特殊的事业单位,其物资与库存管理与企业差别极大,其WMS系统的设计与开发也不可能沿用企业模式,本文通过一个开发实例,从系统的需求分析、总体设计、主要功能模块以及软件开发平台选择等方面介绍了面向高职院校物资与库存管理的WMS系统的设计思路及过程。 展开更多
关键词 WMS(仓库管理系统) C/S(客户/服务器) B/S(浏览器/服务器) OOP(面向对象的程序设计) OOA(面向对象分析)
下载PDF
CPE虚拟环境创建方法研究
4
作者 郎为民 姚晋芳 +2 位作者 余亮琴 邹力 王振义 《电信快报》 2021年第8期1-5,共5页
目前,虚拟化正在改变企业内传统网络功能的使用方式,而专用硬件设备的广泛使用且缺乏完整的方案方法,这在很大程度上导致了网络环境的复杂、昂贵且不灵活。SDN(软件定义网络)和NFV(网络功能虚拟化)等新技术为简化这种网络环境提供了机... 目前,虚拟化正在改变企业内传统网络功能的使用方式,而专用硬件设备的广泛使用且缺乏完整的方案方法,这在很大程度上导致了网络环境的复杂、昂贵且不灵活。SDN(软件定义网络)和NFV(网络功能虚拟化)等新技术为简化这种网络环境提供了机会。文章分析CPE(客户端设备)虚拟环境创建的重要性,研究虚拟环境创建的4种方法:基于Linux网桥的方法、基于标准虚拟交换机的方法、基于DPDK(数据平面开发工具包)虚拟交换机的方法、基于SR-IOV(单根输入/输出虚拟化)的方法,最后对4种方法的吞吐量性能进行比较。 展开更多
关键词 CPE(客户设备) SDN(软件定义网络) NFV(网络功能虚拟化) DPDK(数据平面开发工具包) SR-IOV(单根输入/输出虚拟化)
下载PDF
浅谈电信原始数据采集系统 被引量:2
5
作者 熊晓玲 《科技情报开发与经济》 2009年第25期108-110,共3页
阐述了一个基于C/S架构的电信原始数据采集系统,主要完成电信计费原始数据信息的采集工作。
关键词 数据采集系统 电信原始数据 C/S(客户/服务器) JDBC
下载PDF
A Trusted Measurement Scheme Suitable for the Clients in the Trusted Network 被引量:3
6
作者 GONG Bei ZHANG Jianbiao +1 位作者 YE Xiaolie SHEN Changxiang 《China Communications》 SCIE CSCD 2014年第4期143-153,共11页
The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network... The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection. 展开更多
关键词 trusted computing trusted network AUTHENTICATION state measurement real-time measurement
下载PDF
Parallelized Jaccard-Based Learning Method and MapReduce Implementation for Mobile Devices Recognition from Massive Network Data 被引量:2
7
作者 刘军 李银周 +2 位作者 Felix Cuadrado Steve Uhlig 雷振明 《China Communications》 SCIE CSCD 2013年第7期71-84,共14页
The ability of accurate and scalable mobile device recognition is critically important for mobile network operators and ISPs to understand their customers' behaviours and enhance their user experience.In this pape... The ability of accurate and scalable mobile device recognition is critically important for mobile network operators and ISPs to understand their customers' behaviours and enhance their user experience.In this paper,we propose a novel method for mobile device model recognition by using statistical information derived from large amounts of mobile network traffic data.Specifically,we create a Jaccardbased coefficient measure method to identify a proper keyword representing each mobile device model from massive unstructured textual HTTP access logs.To handle the large amount of traffic data generated from large mobile networks,this method is designed as a set of parallel algorithms,and is implemented through the MapReduce framework which is a distributed parallel programming model with proven low-cost and high-efficiency features.Evaluations using real data sets show that our method can accurately recognise mobile client models while meeting the scalability and producer-independency requirements of large mobile network operators.Results show that a 91.5% accuracy rate is achieved for recognising mobile client models from 2 billion records,which is dramatically higher than existing solutions. 展开更多
关键词 mobile device recognition data mining Jaccard coefficient measurement distributed computing MAPREDUCE
下载PDF
Understanding BitTorrent Through Real Measurements
8
作者 Wojciech Mazurczyk Pawe Kopiczko 《China Communications》 SCIE CSCD 2013年第11期107-118,共12页
In this paper, we present the resuks of the BitTorrent measurement study. Two sources of BitTorrent data were utilised: meta- data files and the logs of one of the currently most popular BitTorrent clients--gTorrent.... In this paper, we present the resuks of the BitTorrent measurement study. Two sources of BitTorrent data were utilised: meta- data files and the logs of one of the currently most popular BitTorrent clients--gTorrent. Experimental data were collected for fifteen days from the popular torrent-discovery site thepiratebay.org (more than 30 000 torrents were captured and analysed). During this pe- riod the activity and logs of an unmodified version of μTorrent client downloading ses- sions were also captured. The obtained ex- perimental results are swarm-oriented, which allows us to look at BitTorrent and its users from an exchanged resources perspective. Moreover, comparative analysis of the clients' connections with and without the μTP proto- col is carried out to verify the extent to which μTP improves BitTorrent transmissions. To the authors' best knowledge, none of the previous studies have addressed these issues. 展开更多
关键词 BitTorrent traffic analysis meas-urement study meta-data files μTorrent μTP
下载PDF
DVE architecture based on message category
9
作者 吴言华 张强 +1 位作者 蔡云泽 许晓鸣 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2009年第4期492-497,共6页
By importing the idea of P2P,and transmitting messages among clients directly into the client-server architecture,a new hybrid architecture was presented with the help of AOI technology and message category.Theoretica... By importing the idea of P2P,and transmitting messages among clients directly into the client-server architecture,a new hybrid architecture was presented with the help of AOI technology and message category.Theoretical analysis of this architecture was presented in detail.A series of simulation experiments was carried out to verify its effectiveness.Results indicate that the new architecture produces less server message workload than traditional architectures,which can improve the scalability of DVE systems. 展开更多
关键词 distributed virtual environment(DVE) AOI message category ALM
下载PDF
Adapting the Servqual Scale to a Private Hospital Emergency Services: An Empirical Investigation
10
作者 Luis E. Ibarra Vanessa Casas M Ana L. Partida 《Chinese Business Review》 2014年第5期273-289,共17页
Most of the time, clients only have one opportunity to evaluate a service received in terms of quality and satisfaction; under this premise organizations have been concerned with developing, in a permanent manner, a q... Most of the time, clients only have one opportunity to evaluate a service received in terms of quality and satisfaction; under this premise organizations have been concerned with developing, in a permanent manner, a quality evaluation culture in the services offered to their clients. To do this, procedures and methods that let them achieve it, have been implemented. That is the case of the model that concedes to measure and evaluate service quality, which is redefined and named Servqual, considering a multidimensional theoretical construct that explains the client's perception of quality service considering the differences between what is expected and what is received. Therefore, the goal of this study is to identify the factors that define the quality of emergency services provided by a private hospital in Hermosillo, Sonora, Mtxico, a sample of 384 patients, with a confidence level of 95% and a margin of permissible error of 5%. A questionnaire with 22 items was applied to measure the perceptions and expectations of users in terms of the quality of the service, which was subjected to an extensive evaluation of reliability and construct validity, with an estimate Cronbach's alpha of 95.6% and 97.9% respectively. The results showed that Servqual is a valid, reliable, and dependable instrument to monitor and measure the quality of the services offered in private hospitals in Hermosillo, and permit hospital administrators to identify opportunities or improvement areas, from the patients' perspective. 展开更多
关键词 methodology Servqual quality of service level of satisfaction perceptions and expectations of the users
下载PDF
Remote-Controlled Ambidextrous Robot Hand Concept
11
作者 Emre Akyurek Alexandre Dilly Fabrice Jourdan Zhu Liu Souraneel Chattoraj Itziar Berruezo Juandeaburre Michel Heinrich Leonid Paramonov Peter Turner Stelarc Tatiana Kalganova 《Computer Technology and Application》 2013年第11期569-574,共6页
In the development of robotic limbs, the side of members is of importance to define the shape of artificial limbs and the range of movements. It is mainly significant tbr biomedical applications concerning patients su... In the development of robotic limbs, the side of members is of importance to define the shape of artificial limbs and the range of movements. It is mainly significant tbr biomedical applications concerning patients suffering arms or legs injuries, fn this paper, the concept of an ambidextrous design lbr robot hands is introduced. The fingers can curl in one xvay or another, to imitate either a right hand or a left hand. The advantages and inconveniences of different models have been investigated to optimise the range and the maximum force applied by fingers. Besides, a remote control interthce is integrated to the system, allowing both to send comrnands through internet and to display a video streaming of the ambidextrous hand as feedback. Therefore, a robotic prosthesis could be used for the first time in telerehabilitation. The main application areas targeted are physiotherapy alter strokes or management of phantom pains/br amputees by/earning to control the ambidextrous hand. A client application is also accessible on Facehook social network, making the robotic limb easily reachable for the patients. Additionally the ambidextrous hand can be used tbr robotics research as well as artistic performances. 展开更多
关键词 Robot hand pneumatic muscles remote platform video streaming TELEREHABILITATION hand recognition
下载PDF
Framework for Quality Improvement of Infrastructure Projects
12
作者 Abukar Warsame 《Journal of Civil Engineering and Architecture》 2013年第12期1529-1539,共11页
In order to achieve high quality that not only gives acceptable return value to society but also satisfies the needs of all the stakeholders of infrastructure projects, comprehensive understanding of issues pertaining... In order to achieve high quality that not only gives acceptable return value to society but also satisfies the needs of all the stakeholders of infrastructure projects, comprehensive understanding of issues pertaining to the quality of the project is needed. The aim of this study is to provide an overview the most common procurement methods used in constructing infrastructure transport projects and analyze how these methods contribute to the desired quality of the final product in relation to client competence. An on-line survey of construction actors was carried out to ascertain quality level of Swedish infrastructure transport projects and determinant factors of quality problems. An equal number of respondents indicated that the quality of infrastructure projects has either increased or remained same level over the past twenty years. Respondents also pointed out lack of client competence that is vital in realizing the desired quality level through proper procurement, monitoring and evaluation procedures. Public clients heavily rely on traditional design-build procurement that requires considerable client involvement of a project. Thus, the association of quality problems and lack of client competence may not be a mere coincidence but an overlooked outcome of current situation. 展开更多
关键词 COMPETENCE infrastructure transport procurement QUALITY warranties
下载PDF
Design and Implementation of Agricultural Products Logistics Management System based on WebGIS
13
作者 Qijin DONG Xianglong LI 《International Journal of Technology Management》 2015年第3期15-18,共4页
The system will be to build a complete logistics monitoring system based on WebGIS, using the development technology of the third party map which is popular at present, the client technology Ajax is introduced into th... The system will be to build a complete logistics monitoring system based on WebGIS, using the development technology of the third party map which is popular at present, the client technology Ajax is introduced into the two map development platform based on WebGIS, draw lessons from the mature MapABC map service interface for API programming, establish the optimization model of distribution route with hard time windows, and studies the application of tabu search algorithm to solve the distribution path optimization model. At the same time, t;he system can realize vehicle abnormal alarm, shortest path planning and analysis of statistical query functions, can display the corresponding curves on the map that query be some statistical analysis results or a heat map by the user, get a more intuitive feel and better user experience. 展开更多
关键词 Agriculture Products DISTRIBUTION WEBGIS DECISION Information Platform AJAX
下载PDF
he Design and Implementation of Medical Image Processing System based on DICOM Format
14
作者 Jing HUA 《International Journal of Technology Management》 2014年第7期21-23,共3页
In order to fast transmission and processing of medical images and do not need to install client and plug-ins, the paper designed a kind of medical image reading system based on BS structure. This system improved the ... In order to fast transmission and processing of medical images and do not need to install client and plug-ins, the paper designed a kind of medical image reading system based on BS structure. This system improved the existing IWEB in the framework of PACS client image processing, medical image based on the service WEB completion port model. To realize the fast loading images with high concurrency, compared with the traditional WEB PACS, this system has the advantages of no client without plug-in installation, at the same time in the transmission and processing performance image has been greatly improved. 展开更多
关键词 DICOM DICOM browser Communication service program Medical Image Processing
下载PDF
The solution and management of VPN based IPSec technology
15
作者 GUO-FANG ZHANG 《International Journal of Technology Management》 2014年第7期124-129,共6页
The rapid development of electronic businesses raises the need for exchanging information between enterprise networks via internet. Ira secure connection is necessary then a virtual private network(VPN) is essential... The rapid development of electronic businesses raises the need for exchanging information between enterprise networks via internet. Ira secure connection is necessary then a virtual private network(VPN) is essential. IPSec use encrypting and encapsulating technology in client device and establishes a secure tunnel connection. The private network built by IPSec technology can ensure good transmission performance and service quality over public networks. This paper analyses the architecture of IPSec and describes the process of creating a site- to-site IPSec VPN between header and branch of enterprise over internet. In addition, this study analyses the encryption at the boundary of the network and concludes a propose some practical problems need to consider inside enterprise network. 展开更多
关键词 VPN IPSEC ENCRYPTION AUTHENTICATION
下载PDF
The Study of Marketing Tactics for SoLoMo-Mode- Based Handset Banks
16
作者 Liu Jian 《International Journal of Technology Management》 2014年第9期34-36,共3页
In financial services, handset bank is known as one of major channels and this is the way to go in future and a key way for banks to compete on mobile intemet. Handset bank allows clients to make trades when and where... In financial services, handset bank is known as one of major channels and this is the way to go in future and a key way for banks to compete on mobile intemet. Handset bank allows clients to make trades when and where they choose. In this way, fast and easy banking is available to clients. This paper centers on marketing tactics of handset bank and thus presents a SoLoMo-based handset bank marketing mode, in order to provide a reference to the innovation and practice of handset bank marketing principles and means. 展开更多
关键词 Handset bank Marketing tactics SoLoMo mode
下载PDF
Develop and Implement of Real-time Network Monitoring Software based on C/S
17
作者 Shefeng Yuan 《International Journal of Technology Management》 2015年第1期62-64,共3页
This article mainly introduces the multi-layer distributed C/S architecture of system design scheme. Its working principle is the client program runs automatically after the computer starts, and establish communicatio... This article mainly introduces the multi-layer distributed C/S architecture of system design scheme. Its working principle is the client program runs automatically after the computer starts, and establish communication with the application server. The network administrator can monitor and intelligent management of the client computer through the server program, the computer will execute the corresponding operation according to the server to send command instructions. The system realize the main module of the whole system framework, network monitoring data initialization module, network data transmission module, image coding and decoding module, the advantages of system make full use of existing LAN resources, timely delivery and manaRement information. 展开更多
关键词 COMPUTER INTELLIGENT C/S mode network monitoring system
下载PDF
准东通讯公司综合业务管理系统功能的拓展与完善
18
作者 尹权 《大陆桥视野》 2013年第8期39-42,共4页
在电信运营系统的各项业务中,计费系统是电信企业适应当今日趋激烈的市场竞争的重要技术支撑,是高质量服务的重要手段。同时也是电信企业科学决策的重要依据。近年来,准东通讯公司新推出的宽带业务和SCDMA移动市话业务,对2002年投... 在电信运营系统的各项业务中,计费系统是电信企业适应当今日趋激烈的市场竞争的重要技术支撑,是高质量服务的重要手段。同时也是电信企业科学决策的重要依据。近年来,准东通讯公司新推出的宽带业务和SCDMA移动市话业务,对2002年投入使用的《综合业务管理系统》来说却是一块空白,将成为公司业务发展的瓶颈。针对上述这种状况,我们必须对《综合业务管理系统》进行拓展、功能补充,并做到新功能模块与《综合业务管理系统》融为一体,数据共享。 展开更多
关键词 综合业务 C S(客户 服务器) BDE合账
下载PDF
A COST-SHARING METHOD FOR AN UNCAPACITATED FACILITY LOCATION GAME WITH PENALTIES 被引量:3
19
作者 Zhen WANG Dachuan XU 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2012年第2期287-292,共6页
This paper considers a variant of the classical facility location game called the uncapacitared facility location game with penalties (UFLGWP). Unlike the standard UFLG, each client in the UFLGWP is either assigned ... This paper considers a variant of the classical facility location game called the uncapacitared facility location game with penalties (UFLGWP). Unlike the standard UFLG, each client in the UFLGWP is either assigned to an open facility or rejected by paying a penalty. The authors propose a 3-approximate cross-monotonic cost-sharing method for the UFLGWP. 展开更多
关键词 Cost-sharing method cross-monotonicity facility location game.
原文传递
Conjugated polyelectrolytes for label-free visual detection of heparin 被引量:3
20
作者 PU KanYi ZHAN RuoYu LIANG Jing LIU Bin 《Science China Chemistry》 SCIE EI CAS 2011年第4期567-574,共8页
Conjugated polyelectrolytes (CPEs),with electron-delocalized backbones and charged ionic side chains,are unique sensory materials for the construction of optical biosensors.In this feature article,CPE-based visual det... Conjugated polyelectrolytes (CPEs),with electron-delocalized backbones and charged ionic side chains,are unique sensory materials for the construction of optical biosensors.In this feature article,CPE-based visual detection of heparin is summarized.Three CPE-based heparin probes,including ratiometric,light-up and colormetric probes,are discussed in terms of molecular design,detection selectivity and quantification capability.The work summarized here provides fundamental guidelines for CPE-based label-free visual sensing. 展开更多
关键词 conjugated polyelectrolyte HEPARIN fluorescence resonance energy transfer SENSOR
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部