首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 265 毫秒
1.
传统的建筑工程管理系统存在信息统计的效率较差的问题,降低了建筑工程管理人员工作的效率。提出基于无线传感网络的建筑工程的动态管理系统。依据建筑公司企业的现状,对市场经营的管理以及工程策划的管理与工程设备的管理、工程材料的管理与工程施工的管理为核心的业务流程进行详细的分析,对系统的需求进行总结,采用B/S的架构对无线传感网络的建筑工程的动态管理系统进行设计。对动态管理系统进行不同管理的职能设计对传统方法存在的弊端有效地克服,能对建筑工程进行动态的管理,有效的提高了工作的效率。完成对基于无线传感网络的建筑工程的动态管理的系统设计。实验的结果表明,该系统有效地提高了建筑工程管理人员工作的效率。  相似文献   

2.
伴随着经济建设的不断地加快,我们的城市建设的步伐也在不断的紧跟时代的步伐。城市的建设在如今的人们的生活中充当着非常重要的角色,一座城市的市政建设很能反映这座城市的发展的程度,所以在很多的地方把城市建设放在首位。在城市建设中给排水是极其重要的一个课题,因为这一方面的问题将直接的影响到城市的正常的工作、学习、生活。当前很多的部门已经注意到了这一点,已经进行了相关方面的具体的规划,目的就是为了更好的解决当前的问题,使得我们的城市建设更上一个台阶。下面就是对于相关方面的具体的分析。  相似文献   

3.
目前,随着工业化建筑的不断增大,对各种材料的消耗也极具增大,就目前的发展而言,工业炉这个行业消耗的能量是巨大的。根据相关的数据分析,每年的工业炉的能量消耗占据耗能量的排行的1/4。因此,工业炉在我国的制造行业中在我国占有非常重要的地位。但是随着各种工业化设施的不断修建,对工业炉的应用也越来越高,但是其利用的效率却是很低的。和其他的国家的工业炉的利用率相比,我国的工业炉利用率比其他的国家的利用率约小一半。因此,就要对我国的工业炉现状和发展趋势进行分析是非常必要的。本文针对工业炉的现状与发展趋势管窥进行具体化的分析,并提出了一系类的提高和改进工业炉燃料利用率的措施,用来提高能源利用水平,保证工业化的发展,以供参考。  相似文献   

4.
经济的快速发展,使我们的社会发生了很大的变化。在我们的很多的行业面临着严峻的改革的形式,由于残酷的竞争的压力,企业想要有更好的发展,就要不断的进行改革创新,在技术的层面占领先机。在众多的行业中,我们电力行业就是很好的一个例子,电力资源与我们每天的生活息息相关,但是供电需求的增大给我们带来了严峻的形式,想要保障供应的顺畅,就要保障设备的良好的状态。本文针对于电力设备的状态展开了论述,以及状态的检修进行了介绍。  相似文献   

5.
随着我国社会主义建设的不断加快,我国的社会经济得到飞速的发展。经济的发展必然引发人们对于生活质量提出更高的要求,进而带动了土建工作的迅速发展。土建工作的发展其实是与人们的日常生活紧密相关的,对于我国的现代化建设来讲,土建工程的建设质量将直接关系到我国经济建设的进程。目前,我国的土建工程或多或少的存在种种的问题。工程质量的良莠不齐,土建造成严重的环境破坏、土建工程中的伤亡事故频发等等,所有的问题都暴露出我国现阶段的土建工程建设还存在较大的缺陷。这些问题的出现在很大程度上影响了人们的正常生活,不良的土建施工现象也严重的影响了土建工程的工程质量。主要结合我国发展现阶段中土建工程的运作和发展现象,并对相关的发展弊端进行简要的分析,最后对土建工程管理改革的意义做一定的探讨,希望能对今后的土建工程建设有所帮助和借鉴。  相似文献   

6.
建筑结构的规范中没有给出复杂建筑物风荷载的局部系数,该类的建筑物风荷载需要利用风洞试验进行确定。提出基于风洞试验的多层建筑的围护结构的抗风设计方法,将规范中的阵风系数和局部的系数乘积进行修改成局部系数与脉动的风压系数的极值之和形式,可称为风压的系数极值。提出的多层建筑的围护结构设计的抗风计算的方法既适用迎风面的围护结构,同时也适用于气流分离的围护结构设计的计算。在脉动的风压系数的极值计算中,对气流分离的非正态的风压时程特性,采用非正态的峰值因子的简化计算,确定非正态的风压时程峰值的因子。与实例进行相结合,通过风洞的试验方法对多层建筑的围护结构进行设计的过程中,依据规范对围护设计的风压进行证明,说明,本文设计的围护结构能提高建筑的安全性。  相似文献   

7.
人的发展和社会的发展是有区别的,但又是相辅相成的。人的某些方面的发展不等于人的全面发展,某些个人的发展不等于整个社会的发展,也不等于全体的人的全面发展。在一定历史条件下,社会的发展是以牺牲某些个人的发展为代价的,没有不付出社会代价的社会进步和人的发展。同时为了维护整个社会的稳定发展,又必须把差别控制在合理的范围之内。这就要求我们必须建立一种动态的具有合理差别的和谐社会,以便最终能够实现全体的、全面的人的发展。  相似文献   

8.
爱因斯坦是20世纪最伟大的哲人科学家和最伟大的人。他的自由的心灵、独立的人格、广博的胸襟、人道的情怀、神圣的责任、理性的气质、批判的态度、攻坚的毅力、宽容的心地、臻美的追求、高洁的人品构成了"高山仰止、景行行止"的"爱因斯坦精神"。这种精神具有非私人的、超私人的生命,至今依然发出无穷无尽的光和热。  相似文献   

9.
随着社会经济的不断的发展,生态环境也遭受到了前所未有的破坏,一些地区出现了严重的水土流失的状况,尤其是以渭北早塬山区为主,在经济迅猛发展的过程中,一直被列入植被恢复的重点地区,不断的加强对渭北旱塬地区的生态建设,加大对其的造林工作,不断的创新和发展抗旱造林技术,能在根本上解决造林地的蓄水的问题,能切实的在造林的过程中保障生态环境的平衡,全面的提高造林的成活率,能最大程度的提高渭北旱塬山区的森林植被,全面的提高植被的成活率,抑制渭北旱塬山区的水土流失的情况,确保能更好的促进渭北地区的生态的平衡,促进经济的进步。本文就是要分析抗旱造林技术在渭北旱塬山区造林中的应用。  相似文献   

10.
向儿童学习     
儿童生活本身就是一个独立的、丰富的、充沛的过程。从儿童生活中那种情感的旺盛、感受性的深刻、意志的纯洁和优美来判断,儿童的生活要比一个成人的生活丰富的多。在儿童丰富的生活中,儿童表现出美好的情感,美好的天性;探究的行为,探究的心理;丰富的感受,丰富的心灵;奇特的想象,奇特的思维。因此,我们应该向儿童学习。  相似文献   

11.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

12.
This paper examines the category of "Woman" within the metastructure of a system of knowledge organization. We trace the subject scheme used to list books about women in a standard bibliographic guide over the first three-quarters of the twentieth century.Building on the feminist critique of subject representation, our analysis documents how the category was continually constructed over time, providing evidence of multiplication, isolation, and confusion in the process. The outcome is a framework that fails to capture the complex nature of knowledge about women and conceals relationships to the larger body of knowledge. The case of this legacy system exemplifies problems associated with representing the complexity and integration of knowledge and provides a basis for considering the potential residual impacts of current information organization and navigation systems.  相似文献   

13.
结合元极学三元学说,剖析《管子》的基本概念如道、宙合、精、德、中、智等的内涵,揭示时间、空间、精等是天地万物的共同特征或本质,注重时、空、精的层次性、无限性,以及人的生命本和本性展发。  相似文献   

14.
The main premise of this article is that in information societies generally, and in virtual social contexts particularly, a distinctive style of interaction to facilitate the communication of difference, heterotopic communication , has emerged. It rests on two cultural foundations: an ideological belief in the positive, socially integrating power of communication, and a prevailing ethic of instrumental rationality, subjective individualism, and strategically practiced self-interest. The former is demonstrated by the use of simulation and spectacle as sources of information; exhibitionism/voyeurism as a communicative style; and the awareness of surveillance. The latter is seen in the competitive use of knowledge as a commodity; a surface globalism masking deep parochialism; lateral as well as vertical information inequity; and the use of public versus private as strategies for engagement rather than as spaces. Those who engage in heterotopic communication resort to their 'own devices' both in the sense of personal agendas, strategies, interests, and interpretations, and in the form of the telecommunication tools that help realize them. These personal and technological devices allow individuals with the right educational and technical resources to avoid exposure to disagreement, difference, or other information that does not serve their direct purposes or reflect their particular views of the world; yet they also help convey the appearance of openness, availability, and cooperation. This style of interaction is used strategically in combination with information and communication technologies to gain social or economic advantages, but it may encourage social separatism and parochialism, inhibit the negotiation of disputes, and emphasize competing interests.  相似文献   

15.
Contrary to the "retro" image often awarded them, and despite their continuing enthusiasm and responsibility for the organization of printed materials, librarians are upbeat about the prospects of an information society driven primarily by electronic technologies, but in which libraries can play an important part. Public librarians detect a natural correlation between the historic democratic mission of their institution and the increased accessibility made possible by digitalized sources. The library community's acceptance of the information society idea as a "given" social phenomenon supports discourses that play down historical continuities and herald the dawn of a new age. Such discourses ignore or reject historical evidence that points to the existence of past information societies, revolutions, and infrastructures defined, in part, by the operation of indirect surveillance, constituted by the bureaucratic information systems of modernity. Victorian Britain serves as a good example of an early information society, to which public libraries, themselves micro-information societies, contributed significantly. The role played by public librarians in the Victorian information society, illustrated in this article by evidence drawn from the contemporary library press, is seen in their preoccupation with the surveillance and ordering of knowledge; their adoption for library operations of the businesslike, bureaucratic procedures described recently by business historians; and their panoptic tracking of users and their activities.  相似文献   

16.
This article presents an account of the process of development of the NSFNET and its significance for the emergence of the Internet of the 1990s. The fact that the development of the interconnected system of computer networks occurred within the realm of academic research is not incidental. The dynamics of the world of scientific research were intimately related to the shaping of the network and to the way in which it spread to other sectors of society. The construction of computer networks crossed the boundaries between science and society in order to build the scientific realm by transforming the world in which it is embedded.  相似文献   

17.
中德海洋学核心期刊论文国际合著的比较分析   总被引:1,自引:0,他引:1  
万琪  华薇娜 《现代情报》2016,36(2):150-156
本研究选取Web of Science数据库,收集中国和德国发表的海洋学论文,将论文分为国际合著组与非国际合著组,利用文献计量学的方法,借助EXCEL、SPSS和UCINET软件,比较两国各年的发文量、论文的篇均作者和篇均参考文献数、收录期刊的影响因子、论文的被引频次以及合著国家。研究结果显示,中国海洋学领域的国际合著起步晚于德国,但发展迅速,近年来中国海洋学国际合著的论文量已超过德国;同时中国海洋学国际合著论文的质量和学术影响力都弱于德国,并且中国海洋学论文合著国家的范围也小于德国海洋学的合著国家。  相似文献   

18.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

19.
Trust between transaction partners in cyberspace has come to be considered a distinct possibility. In this article the focus is on the conditions for its creation by way of assuming, not inferring trust. After a survey of its development over the years (in the writings of authors like Luhmann, Baier, Gambetta, and Pettit), this mechanism of trust is explored in a study of personal journal blogs. After a brief presentation of some technicalities of blogging and authors’ motives for writing their diaries, I try to answer the question, ‘Why do the overwhelming majority of web diarists dare to expose the intimate details of their lives to the world at large?’ It is argued that the mechanism of assuming trust is at play: authors simply assume that future visitors to their blog will be sympathetic readers, worthy of their intimacies. This assumption then may create a self-fulfilling cycle of mutual admiration. Thereupon, this phenomenon of blogging about one’s intimacies is linked to Calvert’s theory of ‘mediated voyeurism’ and Mathiesen’s notion of ‘synopticism’. It is to be interpreted as a form of ‘empowering exhibitionism’ that reaffirms subjectivity. Various types of ‘synopticon’ are distinguished, each drawing the line between public and private differently. In the most ‘radical’ synopticon blogging proceeds in total transparency and the concept of privacy is declared obsolete; the societal gaze of surveillance is proudly returned and nullified. Finally it is shown that, in practice, these conceptions of blogging are put to a severe test, while authors often have to cope with known people from ‘real life’ complaining, and with ‘trolling’ strangers.  相似文献   

20.
The Principles of Fair Information Practice are almost three decades old and need to be broadened to take account of new technologies for collecting personal information such as drug testing, video cameras, electronic location monitoring, and the Internet. I argue that the ethics of a surveillance activity must be judged according to the means, the context and conditions of data collection, and the uses/goals, and suggest 29 questions related to this. The more one can answer these questions in a way that affirms the underlying principle (or a condition supportive of it), the more ethical the use of a tactic is likely to be. Four conditions are identified that, when breached, are likely to violate an individual's reasonable expectation of privacy. Respect for the dignity of the person is a central factor and emphasis is put on the avoidance of harm, validity, trust, notice, and permission when crossing personal borders.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号