首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Knowledge Management   总被引:1,自引:0,他引:1  
Until comparatively recently, the value of a company was felt to be determined mainly by the value of its tangible assets. In recent years, however, it has been increasingly recognised that in the post-industrial era, an organisation's success is more dependent on its intellectual assets than on the value of its physical resources.This increasing importance of intangible assets is evidenced by the high premiums on today's stockmarkets. We can measure this by expressing the market value of a company as a percentage of its book value. Looking at this index, we see that the Dow Jones Industrial has risen steadily over the last 25 years and now stands at over 400%.Underlying this trend are a number of factors. The requirement for highly-skilled labour in many industries, new computing and telecommunications technologies, faster innovation and ever shorter product cycles, has caused a huge change in the ways organisations compete — knowledge is now the key battleground for competition.Other factors driving companies to try to manage and exploit their intellectual assets more effectively are increasing employee turnover rates and a more mobile workforce, which can lead to loss of knowledge, and globalization, often requiring people to collaborate and exchange knowledge across continents and time zones.The knowledge management discipline aims to address this challenge and can be broadly defined as the tools, techniques and processes for the most effective and efficient management of an organisation's intellectual assets [1].  相似文献   

2.
杨莉杰 《现代电子技术》2005,28(16):42-44,48
笔记本因为其体积小、重量轻、携带方便等优点越来越受到人们的青睐,然而正是因为笔记本的体积小、集成度高,使得笔记本的生产技术比普通的台式机复杂得多,同时日常维护保养应该注意的问题也较多。本文主要分析了笔记本电脑的液晶显示面板、电池、硬盘、光驱、键盘、外壳等组件的工作原理,并且结合作者在长期维护笔记本电脑方面的经验,总结出在使用过程中常见的问题,为读者介绍了在工作学习中使用笔记本电脑时的保养和维护方法。  相似文献   

3.
在信息化建设过程中,企业知识管理得到越来越多的重视,本文简单介绍了知识库相关概念,分析建设知识库的难点,及基于XML建立知识库系统的发展历程,最后提出基于XML知识库管理系统技术难点及发展趋势。  相似文献   

4.
We provide a more general and, in our eyes, simpler variant of Prabhakaran, Rosen and Sahai’s (FOCS ’02, pp. 366–375, 2002) analysis of the concurrent zero-knowledge simulation technique of Kilian and Petrank (STOC ’01, pp. 560–569, 2001).  相似文献   

5.
孙小兵  王璐  王经纬  李斌  李宇 《电子学报》2018,46(7):1578-1583
软件bug问题在软件开发与维护过程中不可避免.然而软件历史库中的bug库与commit库之间没有直接的对应关系,并且随着bug信息、commit提交信息量的增长,搜索bug变得更加繁琐.本文提出一种基于知识图谱对bug问题进行探索性搜索的方法.通过建立bug报告、commit提交信息及相关人员(如:bug报告人、commit提交者等)信息的bug知识图谱,并结合探索性搜索的思想,不仅能准确搜索bug问题,还能提供相关辅助信息对bug问题进行探索性搜索,帮助软件开发人员更有效地理解和解决bug问题.  相似文献   

6.
Since knowledge is a critical resource for ensuring firm growth and survival, firms are increasingly going outside their boundaries and collaborating with other organizations to obtain new knowledge. This study focuses on two distinct self-enforcing safeguards important for interorganizational knowledge transfer. Using survey questionnaire data from senior executives in 180 small to large-sized industrial firms working with university research centers, we focus on the self-enforcing safeguards of self-interest assumption and relational trust and examine the role of each in university-industry knowledge transfer. Results from multiple linear regression show both self-interest assumption and relational trust are positively associated with greater knowledge transfer, however, relational trust is more strongly associated to knowledge transfer than self-interest assumption. We also found that as knowledge becomes more tacit, self-interest assumption becomes negatively associated with knowledge transfer while relational trust becomes more strongly positive. We conclude by discussing implications for future research and management practice.  相似文献   

7.
介绍了知识经济的特征和主要发展规律,通信企业现状及传统管理模式在知识经济时代主要弊端,提出了制定知识管理战略的建议。  相似文献   

8.
Hypermedia information systems, because of their inherent qualities of nonlinearity and associative linking, offer the potential of facilitating enhanced knowledge representation and construction for users. These capabilities will be more fully realized if hypermedia information systems are developed and implemented based on constructivist learning theory. This paper examines the qualities of hypermedia systems that enable them to facilitate learning, discusses the background of current learning theories, and provides a brief view of a possible hypermedia system based on constructivist learning principles that could be developed through the use of intelligent autonomous agents.  相似文献   

9.
10.
郭志勇  毕恒  张辉 《信息技术》2003,27(8):78-80
介绍了知识管理的概念 ,其核心内容是企业知识的收集、共享、分类、检索、使用和创新。而管理信息系统是建立在信息技术基础上 ,为企业决策层及员工提供决策运行手段的管理平台。将知识管理有机地融入企业的管理信息系统中 ,将极大地提高企业管理信息系统的应用水平 ,使企业真正成为具有国际竞争力的“知识型”企业。  相似文献   

11.
1 Introduction Therearelessandlessbooksonmanagementtalkingaboutmanagingsubordinates.Becausetheworldecono myisshiftingfromacommandmodeltoaknowledgemodel,businessleadershipormanagerstodayhavetolearntomanageinaknowledgesociety ,wheretheynolongerhavecommandauthority ,wheretheyareneithercontrollednorcontrolling .Ourworldhasalreadyshiftedfromindustrialagetoinformationage .Theindustrialageneededworkerstouniteasanorganizationandworktogether,otherwise ,nothingcouldbeoperated .Ac cordingtoPeterF .Dr…  相似文献   

12.
余洋  朱少敏  卞超轶 《电信科学》2019,35(11):132-139
随着泛在电力物联网的建设,电力网络向互联互通转变、数据向交互共享转变、业务向横向贯通转变,对原有网络安全防护体系提出了新的挑战。网络安全可视化技术通过对图模式的展示和分析,帮助网络安全人员快速识别潜在攻击,定位异常事件,发现新的攻击类型,快速捕获全局网络安全态势。基于知识图谱进行泛在电力物联网安全分析,通过对内外部威胁情报进行建模,构建概念实体间关系,将威胁情报知识图谱化,把复杂的警报信息转换成直观的、便于理解的图形图像信息,为泛在电力物联网的网络安全防护决策提供精准支撑。  相似文献   

13.
姚前  陈舜  谢立 《电子学报》2007,35(4):659-662
知识签名就是签名者在非交互的情况下向别人证明其知道某个秘密而不泄露该秘密本身,现在知识签名广泛应用在群签名中.本文主要研究了带系数的离散对数知识签名,并对几种类型的带系数签名函数进行了定义和证明.通过对签名函数增加系数,可以有效地扩大签名函数的选择范围,增加知识签名的适用性.  相似文献   

14.
15.
张奕  邹福泰 《通信技术》2020,(1):168-173
人工智能在恶意域名检测领域的应用越来越广泛,而传统的恶意域名检测方法主要采用黑名单方式,存在时效性较差的问题。因此,提出了一种将知识图谱与恶意域名检测相结合的系统,完成了信息在知识图谱中的存储和表示。将系统的嵌入式模型作为输入,使用BiLSTM神经网络提取特征并完成最终的检测。实验表明,在通过真实数据构造的数据集上,该系统性能良好,对恶意域名的检测准确率高达99.31%。  相似文献   

16.
小常识     
  相似文献   

17.
The personalization in knowledge portals and knowledge management systems is mainly performed based on users' explicitly specified categories and keywords. The explicit specification approach requires users' participation to start personalization services, and has limitation to adapt changes of users' preference. This paper suggests two implicit personalization approaches: automatic user category assignment method and automatic keyword profile generation method. The performances of the implicit personalization approaches are compared with traditional personalization approach using an Internet news site experiment. The result of the experiment shows that the suggested personalization approaches provide sufficient recommendation effectiveness with lessening users'unwanted involvement in personalization process.  相似文献   

18.
网络入侵检测中,攻击的形式越来越多样化和复杂化,网络多步攻击成为当前攻击的主要形式.智能规划最早用于人工智能领域,将一个领域内的知识形成规划推理时的规划域,将待求解的问题对应于规划问题.将智能规划应用于多步攻击领域,用以对多步攻击进行识别,并以此为基础,提出一种基于知识表示的多步攻击规划问题描述模型,用以提供解决复杂网络攻击数据的形式化描述问题的一种探索.实验中规划问题采用PDDL语言进行描述,对所提模型进行可用性验证.  相似文献   

19.
基于Web的个人知识管理(PKM)系统的开发与研究   总被引:1,自引:0,他引:1  
21世纪是知识经济时代,随着“知识爆炸”的到来,个人知识管理越来越体现出其重要性。从个人知识管理的概念出发,着重介绍了个人知识管理系统功能模块及其关键技术,最后探讨了个人知识管理的前景和面临的挑战。  相似文献   

20.
军事专业知识在军事决策系统、军事智能教学系统、军事知识查询系统等高技术产品中具有重要的作用。知识库是机器智能的重要来源,所以有必要建立一个完善、协调、具有良好联通性的大型军事知识库,而大量实践证明计算机真正具有智能不仅需要大型知识库,而且更需要知识间广泛的联通。本文主要讨论军事概念联通。所谓概念联通是指通过关系链或属性或属性值将两个概念联系起来的过程。概念联通的目的之一就是通过概念联通帮助发现不同知识源的知识之间的不一致性,尽可能保证所获取知识的完备性和精确性,建立一个大型的军事专业知识库。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号