首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 390 毫秒
1.
NFS是Linux中实现网络文件共享的关键。本文主要分析了NFS的实现机制。包括NFS与VFS、RPC的接口和NFS高速缓存,并以系统调用sysread()为例剖析了NFS的工作流程。在本文分析的基础之上,可以对Linux和NFS作出适当的改进,开发出功能强大的分布式文件系统。  相似文献   

2.
SunOS提供了非常丰富的网络服务,本文对Sun工作站的操作系统Sun OS及其网络服务作了初步介绍,着重介绍了NFS的工作机制和管理配置,并概述了为NFS提供服务的RPC/XDR,最后还简述了SunOS的另一个重要服务NIS的原理和应用。  相似文献   

3.
PC环境下DSP TMS320C30系统是一个被广泛采用的高速实时数字信号处理系统。本文介绍一种高性能PC软件开发环境NDPC-386语言编译器,对于数据量处理较大的DSP系统,该语言在其中有较好应用。同时,本文指出在NDP C-386语言程序时应注意的问题。  相似文献   

4.
《计算机》2000,(17)
3DFX今天宣布预发售Voodoo5 Voodoo5基于3DFX的VSA-100芯片,首次提供了对FSAA的支持(Full-sceneanti-aliasing)以及反锯齿效果等…… Final Fantasy X(最终幻想X)同时登陆PS2和 PC 日本史克威尔近日宣布将于今年秋季同时在PS2和PC上发布《最终幻想10》的BETA测试版。这是最终幻想系列首次同步登陆PC吧?对于那些没有次世代主机的 FF FANS来说,无疑是个好消息。游戏的正式发售时间依然定在2001年春季,看来还需要等待颇长一段时间…  相似文献   

5.
在MS-DOS6诸多的新功能中,最富特色的莫过于MULTICONFIG,即它在CON-FIG.SYS中所具有的多重可选择性。本文通过实例介绍了这一功能的应用。  相似文献   

6.
本文介绍了分布式计算环境中两种典型的远程过程调用机制:OSF/DCE中选用的RPC,即NCS2.0,和Sun/ONC中的RPC。文中重点在以下七个方面进行了比较性研究:数据表示,联编,可扩展性与一致性,传输层无关性与透明性,可靠性,安全性和多线程技术。最后,介绍了为实现两种RPC间的可移植性和可互操作性所作的努力。  相似文献   

7.
本文介绍了一个基于SUPCONJX-300的间歇生产过程监控系统的实现,并给出了控制系统结构和基于JX-300的SC语言的具体实施方法,在某调味品公司的酱油生产过程中得到应用,取得了显著的经济效益。  相似文献   

8.
AFEATURE-BASEDPRODUCTMODELLINGSYSTEMONPC(CASESTUDYOFPARTSDESIGNFORPRESSMACHINE)YonasHagos;TongBingshuAbstract:Thisarticlerepo...  相似文献   

9.
首先介绍MAP制订的FTAM-AI标准,对它的五类函数的功能和结构进行分析,然后讨论它在SUN-UNIX上的实现,提出了一种积木式构造方法,最后介绍在网络环境下,应用FTAM-AI服务开发的、多台计算机之间的文件操作系统程序UFO。  相似文献   

10.
初级程序员软件考试辅导系列讲座第四讲PC-DOS使用简介周必水MS-DOS是美国MICROSOFT公司开发的磁盘操作系统,在IBM公司为PC选用后,又将其命名为PC-DOS。在PC机及其兼容机中配置了几个操作系统,DOS是其主操作系统,它是一个单用户...  相似文献   

11.
12.
Social networking sites have gained popularity among all populations, especially young adults. Personality traits were found to be predictive of how individuals use social media. Therefore, this study sought to examine the association between shyness and self-disclosure to a Facebook friend as well as self-disclosure to a face-to-face friend. Two studies were conducted. The first study tested how shyness and social loneliness are related to self-disclosure to a Facebook friend to whom an individual talks most often. The second, follow-up study tested how shyness is related to self-disclosure to a Facebook friend to whom a person speaks to only though Facebook, and also to a face-to-face friend to whom the participants talk only face-to-face and never through Facebook. Participants were college students from a large research university in the United States. Study 1 found a negative association between shyness and self-disclosure to a Facebook friend. Study 2 found a negative association between shyness and self-disclosure to a face-to-face friend. The theoretical implications and limitations are discussed.  相似文献   

13.
A digital library (DL) consists of a database which contains library information and a user interface which provides a visual window for users to search relevant information stored in the database. Thus, an abstract structure of a digital library can be defined as a combination of a special purpose database and a user-friendly interface. This paper addresses one of the fundamental aspects of such a combination. This is the formal data structure for linking an object oriented database with hypermedia to support digital libraries. It is important to establish a formal structure for a digital library in order to efficiently maintain different types of library information. This article discusses how to build an object oriented hybrid system to support digital libraries. In particular, we focus on the discussion of a general purpose data model for digital libraries and the design of the corresponding hypermedia interface. The significant features of this research are, first, a formalized data model to define a digital library system structure; second, a practical approach to manage the global schema of a library system; and finally, a design strategy to integrate hypermedia with databases to support a wide range of application areas. Received: 15 December 1997 / Revised: June 1999  相似文献   

14.
While gait recognition is the mapping of a gait sequence to an identity known to the system, gait authentication refers to the problem of identifying whether a given gait sequence belongs to the claimed identity. A typical gait authentication system starts with a feature representation such as a gait template, then proceeds to extract its features, and a transformation is ultimately applied to obtain a discriminant feature set. Almost every authentication approach in literature favours the use of Euclidean distance as a threshold to mark the boundary between a legitimate subject and an impostor. This article proposes a method that uses the posterior probability of a Bayes' classifier in place of the Euclidean distance. The proposed framework is applied to template-based gait feature representations and is evaluated using the standard CASIA-B gait database. Our study experimentally demonstrates that the Bayesian posterior probability performs significantly better than the de facto Euclidean distance approach and the cosine distance which is established in research to be the current state of the art.   相似文献   

15.
Many people with disabilities do not have the dexterity necessary to control a joystick on an electric wheelchair. Moreover, they have difficulty to avoid obstacles. The aim of this work is to implement a multi-modal system to control the movement of an Electric wheelchair using small vocabulary word recognition system and a set of sensors to detect and avoid obstacles. The methodology adopted is based on grouping a microcontroller with a speech recognition development kit for isolated word from a dependent speaker and a set of sensors. In order to gain in time design, tests have shown that it would be better to choose a speech recognition kit and to adapt it to the application. The text was submitted by the authors in English.  相似文献   

16.
This article presents a new method to solve a dynamic sensor fusion problem. We consider a large number of remote sensors which measure a common Gauss–Markov process. Each sensor encodes and transmits its measurement to a data fusion center through a resource restricted communication network. The communication cost incurred by a given sensor is quantified as the expected bitrate from the sensor to the fusion center. We propose an approach that attempts to minimize a weighted sum of these communication costs subject to a constraint on the state estimation error at the fusion center. We formulate the problem as a difference-of-convex program and apply the convex-concave procedure (CCP) to obtain a heuristic solution. We consider a 1D heat transfer model and a model for 2D target tracking by a drone swarm for numerical studies. Through these simulations, we observe that our proposed approach has a tendency to assign zero data rate to unnecessary sensors indicating that our approach is sparsity-promoting, and an effective sensor selection heuristic.  相似文献   

17.
This paper proposes a three-phase approach to forecast a competitive price for a notebook computer as a function of constituent features. Phase I uses regression analysis to relate computer price to constituent features in each of a series of time periods. Phase II involves a time series analysis of each regression coefficient to quantify how trends in market conditions (e.g., the evolution of component technology) affect the market value of each feature. Phase III uses the time series analysis to forecast future market values of each feature and combines these results to forecast a competitive selling price for a notebook model that is composed of a selected set of features. The approach can be used in support of management decisions related to prescribing when to upgrade a notebook model and what features to include in each upgrade. The approach can be used, for example, to forecast notebook model price at introduction, and the rate at which price will erode over the model’s life cycle. Computational results indicate that the approach can forecast the price of a notebook computer model up to four months in advance of its introduction to within 10%. It can also forecast the rate of price erosion to within 10% for up to seven months after introduction — the length of the life cycle of a typical notebook model. Since this approach uses only publicly available data, it can be used easily in industry.  相似文献   

18.
Requirements Engineering-Based Conceptual Modelling   总被引:1,自引:1,他引:1  
The software production process involves a set of phases where a clear relationship and smooth transitions between them should be introduced. In this paper, a requirements engineering-based conceptual modelling approach is introduced as a way to improve the quality of the software production process. The aim of this approach is to provide a set of techniques and methods to capture software requirements and to provide a way to move from requirements to a conceptual schema in a traceable way. The approach combines a framework for requirements engineering (TRADE) and a graphical object-oriented method for conceptual modelling and code generation (OO-Method). The intended improvement of the software production process is accomplished by providing a precise methodological guidance to go from the user requirements (represented through the use of the appropriate TRADE techniques) to the conceptual schema that properly represents them (according to the conceptual constructs provided by the OO-Method). Additionally, as the OO-Method provides full model-based code generation features, this combination minimises the time dedicated to obtaining the final software product.  相似文献   

19.
Research on intelligent tutoring systems has mainly concentrated on how to reduce a cognitive load which a student will bear in learning a domain. This load reduction approach contributes to facilitating his/her learning. However the approach often fails to reinforce the student's comprehension and retention. Another approach to tutoring is to apply a load to him/her purposefully. In this paper, we present a framework for cognitive load application and describe a demonstration system. The framework imposes a load on a student who tries to understand an explanation. The important point toward the load application is to provide the student with an optimal load that does not go beyond his/her capacity for understanding. This requires controlling the student's load by means of explanations. In order to implement such load control, it is necessary to estimate how much load the explanation imposes on his/her understanding process. The load estimate depends on his/her understanding capability since the same explanation imposes a different load according to the capability. Therefore a student model representing his/her capability is required. This paper shows how our system accomplishes a proper load application by generating explanations with the load estimate.  相似文献   

20.
The per service cost has been a serious impediment to wide spread usage of on-line digital continuous media service, especially in the entertainment arena. Although handling continuous media may be achievable due to technology advances in the past few years, its competitiveness in the market with existing service type such as video rental is still in question. In this paper, we propose a model for continuous media service in a distributed infrastructure which has a video warehouse and intermediate storages connected via a high speed communication network, in an effort to reduce the resource requirement to support a set of service requests. The storage resource and network resource to support a set of requests should be properly quantified to a uniform metric to measure the efficiency of the service schedule. We developed a cost model which maps the given service schedule to a quantity. The proposed cost model is used to capture the amortized resource requirement of the schedule and thus to measure the efficiency of the schedule. The distributed environment consists of a massive scale continuous media server called a video warehouse, and intermediate storages connected via a high speed communication network. An intermediate storage is located in each neighborhood, and its main purpose is to avoid the repeated delivery of the same file to a neighborhood. We consider a situation where a request for a video file is made sometime in advance. We develop a scheduling algorithm which strategically replicates the requested continuous media files at the various intermediate storages.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号