首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Principles developed in cybernetics and systems theory can offer meaningful hindsight to research and development in computer science and may also provide some kind of guidance to the future study of computer science. In this paper we provide some comments on the role of analogy in software reuse from the perspective of cybernetics. Our purpose is to encourage a dialogue between researchers in software engineering and those in the study of cybernetics and systems. Three aspects of cybernetics are examined: the two-dimensional nature of cybernetics and systems theory, software reuse as a form of self-adaptation that originated from the abstract schema implied by analogy, and the nonrational cognitive process involved in using analogy for software reuse. We hope that cybernetics can provide meaningful insight related to analogy in software reuse; we also hope this kind of study will benefit cybernetics itself.  相似文献   

2.
Recent developments in cybernetics have challenged key tenets in the philosophy of science. The philosophy of science constitutes a theory of knowledge that is often called realism. However, the philosophy of science is not a unified field, there are a variety of points of view. Contemporary cybernetics, meanwhile, is developing a philosophy called constructivism. This paper compares cybernetics with two important schools of thought within the philosophy of science, lists several different assumptions that lead to misunderstandings between scientists and cyberneticians, and then suggests a way of resolving the differences not by rejecting science but by enlarging it.  相似文献   

3.
As opposed to closed systems, the state dynamics of open systems are additionally determined by independently acting external forces called "environment" in ecology. Ecosystems are open dynamical systems whose stability characteristics are commonly described in terms of resistance and resilience of system states towards the “disturbing” effects of external forces. The implicit ideas of invariance and attractivity of specific system states, however, are borrowed from the stability theory of closed dynamical systems and are therefore of limited utility for comprehensive representations of stability characteristics in open dynamical systems. Based on a generic formulation of dynamical input-output systems, it is demonstrated that the notion of adaptation of a system's responses (outputs) to its environment (inputs), when quantified by adaptational valuation functions, provides formulations which establish the desired extension of the ideas of stability known from closed systems. In essence, stability can then be viewed as a system's capacity to immediately or ultimately realize adapted responses. This capacity can conveniently be described for example with the aid of adaptational potentials of system states as described by the set of environments to which adaptation is possible. Regulatory and structural adaptation, which are the two forms of adaptation taking place without and with changes in system state, respectively, are shown to imply a natural hierarchy in adaptational processes. It is suggested that the involved levels of hierarchy be viewed to represent a mechanism for preserving adaptability in ecosystems, which in turn constitutes one of the most crucial components of ecosystem stability.  相似文献   

4.
基于Symantec Ghost企业版的局域网管理实现   总被引:2,自引:0,他引:2  
赛门铁克公司的Ghost企业版能够提供给系统管理员更灵活的操作系统配置解决方案和全面的PC管理,强大约功能使其完全能够胜任企业、政府、学校等部门的计算机系统管理。本文介绍了Chost企业版的独特的管理实现机制,并给出了一个基于Symantec Ghost企业版的公共机房管理的例子。  相似文献   

5.
C. A. DEAVOURS 《Cryptologia》2013,37(2):187-190
We consider the use of genetic algorithms (GAs) as powerful tools in the breaking of cryptographic systems. We show that GAs can greatly facilitate cryptanalysis by efficiently searching large keyspaces, and demonstrate their use with GENALYST, an order-based GA for breaking a classic cryptographic system.  相似文献   

6.
企业管理信息系统的面向对象分析   总被引:1,自引:0,他引:1  
研究了用面向对象技术进行企业信息系统分析的方法,主要研究了系统分析中用户需求模型的建立方法,系统中界面对象、实体对象和控制对象的标识方法及分析模型的建立。这种方法清楚地表现了用户的需求,且分析模型具有环境可适应性和易维护性。  相似文献   

7.
企业MIS中物流管理的一种信息模型和应用服务器解决方案   总被引:2,自引:0,他引:2  
本文给出企业 MIS中物流管理的一种信息模型及其实现方案 ,并针对这种模型在设计、开发和实施过程中可能出现的问题给出一种基于应用服务器的解决方案  相似文献   

8.
为了实现生产资料相关数据的无线管理,提出了基于射频识别引RFID(Radio Frequency Identification)技术的企业远程管理系统的设计方法.系统采用nRF24LE1芯片作为核心元件,构建有源RFID系统的硬件电路和软件流程,使标签和读写器配置简单,性能稳定,读写距离远,便于系统功能的扩展.在产品、...  相似文献   

9.
针对商品混凝土企业试验室信息量大、手工书写效率低、数据统计分析困难的特点,提出了一种基于客户端/服务器架构的信息管理系统设计方案,并详细介绍了其系统功能和设计特色.通过系统实施,用户既可以实现试验室日常的业务流程,又能对试验数据进行统计分析,得出对企业有价值的信息,从而真正体现出企业信息化的优势.  相似文献   

10.
The role of the network has evolved over the past few years from enterprise data conduit to enterprise data base. IS managers are beginning to view the network not just as a resource, but as an asset  相似文献   

11.
The role of the network has evolved over the past few years from enterprise data conduit to enterprise data base. IS managers are beginning to view the network not just as a resource, but as an asset  相似文献   

12.
企业预算管理系统的设计与实现   总被引:3,自引:0,他引:3  
本文介绍了利用信息化手段完善财务管理的现状,解决财务预算工作中存在的问题。为了使企业的财务预算制度执行得更有效率、更易于管理,介绍了一套企业预算管理的信息化实施方案。通过对需求的分析,给出了预算管理系统的功能模型。采用面向对象的设计和分析方法,使用统一建模语言对系统进行了建模,详细分析和设计了系统的用例图、静态结构模型及动态行为模型,最后使用基于B/S结构的三层模型架构实现了该系统。  相似文献   

13.
本文提出 一种利用一幅透视图象重建对称形体的算法,通过对透视图中灭点位置分布规律的解析求出透视投影时视点的位置以及物体的对称平面后,即可唯一地确定物体上任意一对对称点的三维坐标。  相似文献   

14.
可重构的企业管理信息系统研究   总被引:6,自引:0,他引:6  
可重构性是智能系统的基本特性 ,已受到人们的广泛重视 .本文提出了可重构的企业管理信息系统概念 ,指出了开发可重构信息系统的重要性和必要性 ,并对如何开发的问题提出了自己的想法 .文章最后对一些著名的集成化管理软件开发情况作了简单介绍  相似文献   

15.
Abstract

The purpose of this paper is to show how cybernetic concepts can be used to guide organizational design and development activities. The intent of the paper is to demonstrate how a cybernetic model of a viable organization can be used to diagnose potential problems in existing organizations and serve to guide organizational development activities, For illustrative purposes, a case study of the Air Force Logistics Command (AFLC) is used to demonstrate how the cybernetic organizational model can be made operational in the “real world.” The paper is designed to show how this methodology can be used as a road map for integrating and guiding several initiatives which are underway to make AFLC more responsive in meeting potential wartime scenarios. This paper is organized in sections which: (1) describe AFLC mission responsibilities and organization; (2) identify current major problems; (3) describe and use a cybernetic organizational model to diagnose causes of current problems; and (4) develop some observations which can be used to guide future organizational design and development efforts.  相似文献   

16.
基于软件体系结构的Agent规约和演化   总被引:5,自引:0,他引:5  
借助软件体系结构描述语言C2的表达能力,基于组件,连接体和体系结构配置3要素,研究适合于Agent规约和构造的组合方法,以软件体系结构的类型化理论为基础,探讨了基于子类型关系的Agent演化,用扩充关系表达有相互关联的不同类型的Agent之间的关系,通过为遗留代码定做包装器,领域翻译器以及相应的界面和约束,将非Agent实体迁移为Agent,相关案例说明结合组合,基于子类型关系的演化,扩充,迁移等方法,可以满足多Agent系统构造过程中Agent类型的多样性。  相似文献   

17.
The analysis presented is an attempt to explain the changes laking place in post-communist Eastern Europe using the concept of organizational change. Organizational change is understood as an attempt to ensure a strategic match between the environment and organizational structure and processes. Four types of change are identified and analyzed: innovative, adaptive, regressive, and systemic. Up to 1990, cycles of changes could be observed in the communist systems. Innovative changes have been followed by stagnation punctured with adaptation followed by regression. In 1989–1990 in Hungary and Poland the cycle has been altered: adaptive change brought a short period of innovation, which slipped out of control of the communists and spontaneously transformed itself into systemic change leading to a new identity for the system. In this way the transition toward democracy and a market economy began. Within this frame of reference the Polish and Hungarian reforms are explained. The mechanism of change is analyzed in terms of external necessities, contingencies, possible options and courses of action, and the power game within the system.  相似文献   

18.
19.
借鉴国内外行包管理系统研究成果,针对目前铁路行包管理系统所采用的信息采集方式效率低和易出错等问题,提出一个较完整的基于RFID技术的铁路行包信息管理系统的技术解决方案。重点阐述该系统的组成结构、功能部署和工作原理,描述和实现高频RFID采集器的硬件电路设计和行包信息管理软件的设计。基于该研究,设计和实现的系统能够提高铁路行包管理的效率和安全性。  相似文献   

20.
COBIT在企业信息安全管理中的应用实践   总被引:1,自引:0,他引:1  
随着企业运作对信息依赖性日渐增加,信息已经成为企业的一种非常重要的资产,对企业目标的实现起着关键的作用,所以信息需要妥善管理确保其安全性.目前信息安全管理仅依靠技术手段和传统的管理方式来实现,没有形成可行全面的安全管理体系,造成企业信息安全管理的效益低下.通过分析IT治理的权威标准COBIT和信息安全管理相关的控制目标,结合目前企业在信息安全管理上面临的主要问题,针对具体企业案例,研究将COBIT应用到企业信息安全管理中的实践模式.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号