期刊文献+
共找到38篇文章
< 1 2 >
每页显示 20 50 100
疫情下高职“计算机信息技术”课程的教学探讨
1
作者 游旷喆 《无线互联科技》 2021年第1期130-132,共3页
新冠疫情的突如其来改变了人们很多原先的生活节奏,学校里的师生同样面临此困境。文章以高职教学中的基础课“计算机信息技术”为例,指出了线上教学时所面临的一些问题,并给出了一些解决的方法,论述了笔者在线上教学中所实施的教学步骤... 新冠疫情的突如其来改变了人们很多原先的生活节奏,学校里的师生同样面临此困境。文章以高职教学中的基础课“计算机信息技术”为例,指出了线上教学时所面临的一些问题,并给出了一些解决的方法,论述了笔者在线上教学中所实施的教学步骤,力争做到线上线下教学效果的同质等效。 展开更多
关键词 新冠疫情 高职 “计算机信息技术” 线上教学 同质等效
下载PDF
新形势下大学生“计算机信息技术”教学改革分析
2
作者 侯刚 《无线互联科技》 2021年第23期129-130,共2页
近年来,社会各界对教育事业的重视程度越来越高,社会发展也对新时代人才提出了全新的要求。计算机信息技术应用作为现代人才的必备技能之一,得到了广大师生的普遍关注,对大学"计算机信息技术"相关课程进行改革与创新具有非常... 近年来,社会各界对教育事业的重视程度越来越高,社会发展也对新时代人才提出了全新的要求。计算机信息技术应用作为现代人才的必备技能之一,得到了广大师生的普遍关注,对大学"计算机信息技术"相关课程进行改革与创新具有非常重要的现实意义。文章从"计算机信息技术"课程教学现状与问题入手,简要分析了相应的改革措施。 展开更多
关键词 大学教育 “计算机信息技术” 教学改革
下载PDF
基于知识块的“计算机与信息技术基础”教学
3
作者 岳珊 《西部素质教育》 2020年第11期132-133,138,共3页
文章针对某大学文科专业包括法学、社会工作、国际贸易等九个专业的250名学生,以及计算机科学与技术、网络工程专业200名学生做了问卷调查,先了解了“计算机与信息技术基础”教学的知识块掌握情况,然后提出了基于知识块的“计算机与信... 文章针对某大学文科专业包括法学、社会工作、国际贸易等九个专业的250名学生,以及计算机科学与技术、网络工程专业200名学生做了问卷调查,先了解了“计算机与信息技术基础”教学的知识块掌握情况,然后提出了基于知识块的“计算机与信息技术基础”教学策略。 展开更多
关键词 知识块 “计算机信息技术基础”教学 实操知识块
下载PDF
Vision based terrain reconstruction for planet rover using a special binocular bundle adjustment 被引量:3
4
作者 Min-yi SHEN Zhi-yu XIANG Ji-lin LIU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第10期1341-1350,共10页
This paper presents a pure vision based technique for 3D reconstruction of planet terrain. The reconstruction accuracy depends ultimately on an optimization technique known as 'bundle adjustment'. In vision te... This paper presents a pure vision based technique for 3D reconstruction of planet terrain. The reconstruction accuracy depends ultimately on an optimization technique known as 'bundle adjustment'. In vision techniques, the translation is only known up to a scale factor, and a single scale factor is assumed for the whole sequence of images if only one camera is used. If an extra camera is available, stereo vision based reconstruction can be obtained by binocular views. If the baseline of the stereo setup is known, the scale factor problem is solved. We found that direct application of classical bundle adjustment on the constraints inherent between the binocular views has not been tested. Our method incorporated this constraint into the conventional bundle adjustment method. This special binocular bundle adjustment has been performed on image sequences similar to planet terrain circumstances. Experimental results show that our special method enhances not only the localization accuracy, but also the terrain mapping quality. 展开更多
关键词 3D reconstruction Binocular bundle adjustment (BBA) Scale-invariant feature transform (SIFT) Re-projectionerror RANSAC
下载PDF
A Metadata Model Based on Coupling Testing Information to Increase Testability of Component 被引量:1
5
作者 马良荔 郭福亮 吴朝晖 《Journal of Donghua University(English Edition)》 EI CAS 2008年第1期58-64,共7页
A software component must be tested every time it is reused in order to assure quality of component itself and system in which it is to be integrated.So how to increase testability of component has become a key techno... A software component must be tested every time it is reused in order to assure quality of component itself and system in which it is to be integrated.So how to increase testability of component has become a key technology in the software engineering community.Here a method is introduced to increase component testability.And meanings of component testability and relative effective ways to increase testability are summarized.Then definitions of component coupling testing criterion,DU-I(Definition-Use Information) and OP-Vs(Observation-Point Values)are given.Base on these,a definition-use table is introduced,which includes DU-A and OP-Vs item,to help component testers to understand and observe interior details about component under test better.Then a framework of testable component based on above DU-table is given.These facilities provide ways to detect errors,observe state variables by observation-points based monitor mechanism.Moreover,above methods are applied to our application developed by ourselves before,and some test cases are generated.Then our method is compared with Orso method and Kan method using the same example,presenting the comparison results.The results illustrate the validity of our method,effectively generating test cases and killing more mutants. 展开更多
关键词 COMPONENT component-based software testing coupling testing METADATA
下载PDF
BOOTSTRAPPING FOR EXTRACTING RELATIONS FROM LARGE CORPORA 被引量:5
6
作者 Li Weigang Liu Ting Li Sheng 《Journal of Electronics(China)》 2008年第1期89-96,共8页
A new approach of relation extraction is described in this paper. It adopts a bootstrap- ping model with a novel iteration strategy, which generates more precise examples of specific relation. Compared with previous m... A new approach of relation extraction is described in this paper. It adopts a bootstrap- ping model with a novel iteration strategy, which generates more precise examples of specific relation. Compared with previous methods, the proposed method has three main advantages: first, it needs less manual intervention; second, more abundant and reasonable information are introduced to represent a relation pattern; third, it reduces the risk of circular dependency occurrence in bootstrapping. Scalable evaluation methodology and metrics are developed for our task with comparable techniques over TianWang 100G corpus. The experimental results show that it can get 90% precision and have excellent expansibility. 展开更多
关键词 Relation extraction BOOTSTRAPPING PATTERNS TUPLES
下载PDF
Mining Maximal Frequent Patterns in a Unidirectional FP-tree 被引量:1
7
作者 宋晶晶 刘瑞新 +1 位作者 王艳 姜保庆 《Journal of Donghua University(English Edition)》 EI CAS 2006年第6期105-109,共5页
Because mining complete set of frequent patterns from dense database could be impractical, an interesting alternative has been proposed recently. Instead of mining the complete set of frequent patterns, the new model ... Because mining complete set of frequent patterns from dense database could be impractical, an interesting alternative has been proposed recently. Instead of mining the complete set of frequent patterns, the new model only finds out the maximal frequent patterns, which can generate all frequent patterns. FP-growth algorithm is one of the most efficient frequent-pattern mining methods published so far. However, because FP-tree and conditional FP-trees must be two-way traversable, a great deal memory is needed in process of mining. This paper proposes an efficient algorithm Unid_FP-Max for mining maximal frequent patterns based on unidirectional FP-tree. Because of generation method of unidirectional FP-tree and conditional unidirectional FP-trees, the algorithm reduces the space consumption to the fullest extent. With the development of two techniques: single path pruning and header table pruning which can cut down many conditional unidirectional FP-trees generated recursively in mining process, Unid_FP-Max further lowers the expense of time and space. 展开更多
关键词 data mining frequent pattern the maximal frequent pattern Unid _ FP-tree conditional Unid _ FP-tree.
下载PDF
A Distributed Data Mining System Based on Multi-agent Technology 被引量:1
8
作者 郭黎明 张艳珍 《Journal of Donghua University(English Edition)》 EI CAS 2006年第6期80-83,共4页
Distributed Data Mining is expected to discover preciously unknown, implicit and valuable information from massive data set inherently distributed over a network. In recent years several approaches to distributed data... Distributed Data Mining is expected to discover preciously unknown, implicit and valuable information from massive data set inherently distributed over a network. In recent years several approaches to distributed data mining have been developed, but only a few of them make use of intelligent agents. This paper provides the reason for applying Multi-Agent Technology in Distributed Data Mining and presents a Distributed Data Mining System based on Multi-Agent Technology that deals with heterogeneity in such environment. Based on the advantages of both the CS model and agent-based model, the system is being able to address the specific concern of increasing scalability and enhancing performance. 展开更多
关键词 Distributed Data Mining MULTI-AGENT CORBA Client/Server.
下载PDF
Development of CAPP System for Small and Medium Size Apparel Enterprises 被引量:1
9
作者 尹玲 张文斌 《Journal of Donghua University(English Edition)》 EI CAS 2006年第5期68-71,共4页
Existing computer-aided process planning (CAPP) systems for garment manufacturing emphasize all-purpose ones, lack specialism and availability. So, few developed is popular in the garment industries. This study is i... Existing computer-aided process planning (CAPP) systems for garment manufacturing emphasize all-purpose ones, lack specialism and availability. So, few developed is popular in the garment industries. This study is intended for developing a CAPP system, which aims at the actual condition of process planning in the small and medium size apparel enterprises (SMAs). It enables the technologists of process planning to be quicker in generating suitable plans that are similar to existing styles or new. It also automatically provides labor cost by considering the shop-ricer caztiticns. Process planning is achieved by adopting the Hybrid Interactive-variant process planning mete. The proposed system has been realized in Borland Delphi 7 and Orade 8. For validation of the system, the software has been implemented successfully in a firm named Jingchen in China. 展开更多
关键词 CAPP apparel enterprises Hybrid Interactivewriant process planning.
下载PDF
Image Registration Based on Improved Mutual Information with Hybrid Optimizer 被引量:3
10
作者 TANG Min 《Chinese Journal of Biomedical Engineering(English Edition)》 2008年第1期18-25,共8页
An improved image registration method is proposed based on mutual infor- mation with hybrid optimizer. Firstly, mutual information measure is combined with morphological gradient information. The essence of the gradie... An improved image registration method is proposed based on mutual infor- mation with hybrid optimizer. Firstly, mutual information measure is combined with morphological gradient information. The essence of the gradient information is that locations a large gradient magnitude should be aligned, but also the orientation of the gradients at those locations should be similar. Secondly, a hybrid optimizer combined PSO with Powell algorithm is proposed to restrain local maxima of mutual information function and improve the registration accuracy to sub-pixel level. Lastly, muhlresolution data structure based on Mallat decomposition can not only improve the behavior of registration function, but also improve the speed of the algorithm. Experimental results demonstrate that the new method can yield good registration result, superior to traditional optimizer with respect to smoothness and attraction basin as well as convergence speed. 展开更多
关键词 image registration mutual information muhiresolution data structure particle swarm optimization powell algorithm
下载PDF
Attribute reduction based on background knowledge and its application in classification of astronomical spectra data 被引量:2
11
作者 张继福 Li Yinhua Zhang Sulan 《High Technology Letters》 EI CAS 2007年第4期422-427,共6页
To improve the efficiency of the attribute reduction, we present an attribute reduction algorithm based on background knowledge and information entropy by making use of background knowledge from research fields. Under... To improve the efficiency of the attribute reduction, we present an attribute reduction algorithm based on background knowledge and information entropy by making use of background knowledge from research fields. Under the condition of known background knowledge, the algorithm can not only greatly improve the efficiency of attribute reduction, but also avoid the defection of information entropy partial to attribute with much value. The experimental result verifies that the algorithm is effective. In the end, the algorithm produces better results when applied in the classification of the star spectra data. 展开更多
关键词 rough set theory background knowledge intbrmation entropy attribute reduction astronomical spectra data
下载PDF
Data Mining and Visualization of Grid-Based City Emergency System
12
作者 薛京生 孙济洲 +2 位作者 刘牧星 张旭 何宏 《Transactions of Tianjin University》 EI CAS 2005年第2期125-128,共4页
A cluster analyzing algorithm based on grids is introduced in this paper,which is applied to data mining in the city emergency system. In the previous applications, data mining was based on the method of analyzing poi... A cluster analyzing algorithm based on grids is introduced in this paper,which is applied to data mining in the city emergency system. In the previous applications, data mining was based on the method of analyzing points and lines, which was not efficient enough in dealing with the geographic information in units of police areas. The proposed algorithm maps an event set stored as a point set to a grid unit set, utilizes the cluster algorithm based on grids to find out all the clusters, and shows the results in the method of visualization. The algorithm performs well when dealing with high dimensional data sets and immense data. It is suitable for the data mining based on geogra-(phic) information system and is supportive to decision-makings in the city emergency system. 展开更多
关键词 GRID EMERGENCY data mining VISUALIZATION
下载PDF
Integrated criteria for covert channel auditing
13
作者 Chang-da WANG Shi-guang JU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第6期737-743,共7页
A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for cov... A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for covert channel auditing are given. Whereas TCSEC (Trusted Computer System Evaluation Criteria) or CC (Common Criteria for Information Technology Security Evaluation) only use the bandwidth to evaluate the threat of covert channels, our new criteria integrate the security level difference, the bandwidth sensitive parameter, bandwidth, duration and instantaneous time of covert channels, so as to give a comprehensive evaluation of the threat of covert channels in a multilevel security system. 展开更多
关键词 Multilevel security Covert channel Covert channel auditing
下载PDF
A Study on Acupressure Points Online Database
14
作者 Zizhong J. Wang Tara A. Santos 《Computer Technology and Application》 2011年第9期686-690,共5页
Acupuncture points or acupressure points have been popularly used for thousands years for Chinese to cure various illness or pains. The method comes with less or no side effects, comparing the western medicine chemica... Acupuncture points or acupressure points have been popularly used for thousands years for Chinese to cure various illness or pains. The method comes with less or no side effects, comparing the western medicine chemicals. With the new computer information technologies, the ancient Chinese healing tool could be very convenient for people to take care of themselves at home or work. In this paper, the authors present their online database system for locating the acupressure points. A case study shows the details of the design and structure of the online system. 展开更多
关键词 Acupressure points DATABASES information systems PHP/MySQL
下载PDF
An entropy-based unsupervised anomaly detection pattern learning algorithm
15
作者 杨英杰 马范援 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第1期81-85,共5页
Currently, most anomaly detection pattern learning algorithms require a set of purely normal data from which they train their model. If the data contain some intrusions buried within the training data, the algorithm m... Currently, most anomaly detection pattern learning algorithms require a set of purely normal data from which they train their model. If the data contain some intrusions buried within the training data, the algorithm may not detect these attacks because it will assume that they are normal. In reality, it is very hard to guarantee that there are no attack items in the collected training data. Focusing on this problem, in this paper, firstly a new anomaly detection measurement is proposed according to the probability characteristics of intrusion instances and normal instances. Secondly, on the basis of anomaly detection measure, we present a clustering-based unsupervised anomaly detection patterns learning algorithm, which can overcome the shortage above. Finally, some experiments are conducted to verify the proposed algorithm is valid. 展开更多
关键词 anomaly detection intrusion detection computer security pattern learning
下载PDF
Research and Review on Computer Forensics
16
作者 Guo Hong Jin Bo Huang Daoli 《China Communications》 SCIE CSCD 2010年第6期37-43,共7页
With the development of Internet and information technology, the digital crimes are also on the rise. Computer forensics is an emerging research area that applies computer investigation and analysis techniques to help... With the development of Internet and information technology, the digital crimes are also on the rise. Computer forensics is an emerging research area that applies computer investigation and analysis techniques to help detection of these crimes and gathering of digital evidence suitable for presentation in courts. This paper provides foundational concept of computer forensics, outlines various principles of computer forensics, discusses the model of computer forensics and presents a proposed model. 展开更多
关键词 computer forensics computer crime digital evidence
下载PDF
Linguistic Truth Values Lattice Implication Algebras
17
作者 潘小东 徐扬 《Journal of Donghua University(English Edition)》 EI CAS 2006年第6期101-104,109,共5页
In order to study uncertainty reasoning and automatic reasoning with linguistic terms, in this paper, the set of basic linguistic truth values and the set of modifiers are defined, according to common sense; partially... In order to study uncertainty reasoning and automatic reasoning with linguistic terms, in this paper, the set of basic linguistic truth values and the set of modifiers are defined, according to common sense; partially orderings are defined on them. Based on it, a lattice implication algebra model L18 of linguistic terms is built; furthermore, its some basic properties are discussed. 展开更多
关键词 linguistic truth value linguistic variable computing with words lattice implication algebra Subalgebra.
下载PDF
Computer Audit Risk Control Research
18
作者 CHAI Qin 《International English Education Research》 2018年第2期10-12,共3页
The development of computer information technology makes the information of the audited unit more and more high. The introduction of accounting computerization information system makes the processing of enterprise eco... The development of computer information technology makes the information of the audited unit more and more high. The introduction of accounting computerization information system makes the processing of enterprise economic business more convenient and efficient. Here came the computer controlled environment audit new risks, of course, the computer technology applied to the audit work to improve the audit efficiency by a lot, but also increased the complex information technology environment audit risk. Starting from the concept of computer audit risk, this paper analyzes and discusses the new risks and causes of audit under the computer condition, and puts forward some constructive risk control measures. 展开更多
关键词 Computer audit Risk control The intemal control
下载PDF
Ethics of Information Technologies in Knowledge Society
19
作者 Jacob Dahl Rendtorff 《Journalism and Mass Communication》 2016年第4期213-220,共8页
How should we define the ethics of information technology? It is not a new field of study in the sense that it requires an entirely new ethical thinking. Rather, it is a field where we can try to use our traditional ... How should we define the ethics of information technology? It is not a new field of study in the sense that it requires an entirely new ethical thinking. Rather, it is a field where we can try to use our traditional philosophical notions and apply them to this field of computer technology, information science, and knowledge society in order to define responsibility and accountability. Although relations of causalities may be blurred and complex because of the auto-poetic development of computers and information systems we may still have to face the fact that human beings are fundamentally responsible behind the responsibilities of the computers. So we can say that the concept of reliability and accountability is related to human responsibility in the field of Internet technology. Indeed, issues of hacking, viruses and intervention in computers also pose the problems of responsibility and violation of property and copyrights and here we face similar issues as when we talk about physical property rights although what happens is going on in cyberspace. Also we face fundamental problems about transparency, power and democracy of society as the result of the information revolution in knowledge. This shows how it becomes more and more difficult for governments and organizations to hide information and that information is becoming more and more public. We can also talk about the present development as a technology-driven information revolution in knowledge society. The information overload is a result of this revolution that is expressed in the Internet and that changes the relation of human beings to society where human beings need to access information technology and tools in order to be able to live and work in society. 展开更多
关键词 ETHICS information technologies COMMUNICATION knowlegde SOCIETY social responsibility businessethics
下载PDF
A Scalable Communication Mechanism in Service Emergence Based on Bio-network
20
作者 孙宏彬 丁永生 《Journal of Donghua University(English Edition)》 EI CAS 2008年第4期384-388,共5页
A scalable communication mechanism is proposed for service emergence based on bio-network.Service emergence is a novel model inspired by the characteristics of emergence and self-evolution in biological neuroendocrine... A scalable communication mechanism is proposed for service emergence based on bio-network.Service emergence is a novel model inspired by the characteristics of emergence and self-evolution in biological neuroendocrine and immune system,emergent communication means a group communication of mobile bio-entities.A series of protocol and algorithm are presented within frequently bio-entities migration and failure,it includes distribution and parallelization of message propagation method,a token-ring protocol that considerably improves the performance of emergence,and failure detection mechanisms.Experiment results show the desired capability via the proposed solution. 展开更多
关键词 service emergence COMMUNICATION bio-entity PROTOCOL
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部