首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 218 毫秒
1.
In this paper, we propose a simply TCP-friendly source adaptation framework to provide a proportional bandwidth sharing service. Our scheme is based on the framework of Monotonic Response Function (MRF), can be used to bound the sending rate of a source within a predefined interval and provide very smooth traffic, and is suitable for multimedia applications over the Internet. As our scheme is also very simple and TCP-friendly, it is easy to be deployed over the current Internet. We verify our scheme with experimental studies.  相似文献   

2.
仲敏 《快乐阅读》2011,(20):164-165
Reading becomes more and more important in English learning in recent days.If we want to read efficiently,there are a lot of strategies for us to use when read.We can make predictions before reading a passage.When we read,we can read in a sense group.If we do not know the word when we read,we can guess the meaning of the word through the roots,the prefixes,the suffixes.In a word,having lots of practice with suitable reading strategies can enable us to improve our English reading skills.  相似文献   

3.
In the Albanian schools settings does not exist religious discrimination, neither gender discrimination, but there exists a discrimination, as unfair against children called "difficulty". The children who drop out of school are by far less numerous compared with those who start school, but who are not properly treated, so that they can progress the same as other children. The object of this article is the children with learning difficulties, the causes of these difficulties. One of the reasons, among many others, why this secret dropping out of school happens is also difficulty in learning that quite a few number of pupils have, which are not known to everyone, and consequently are not treated by all the teachers, or by the other people who surround the child, condemning him to a school failure and slim chances to succeed later in life. It has often been pointed out that to define the causes of these learning difficulties it is not an easy task. A large number of factors intermingle bringing about the hell of learning for some children. If it is impossible to intervene in different organic damages (even they in many cases can be prevented though), at least those depending on people can be avoided by offering a favorable environment, showing fondness towards them and making efforts to help these children. Above all, the authors have to be willing, to know and be able to do this as parents and precisely as teachers.  相似文献   

4.
Detecting objects of interest from a video sequence is a fundamental and critical task in automated visual surveillance. Most current approaches only focus on discriminating moving objects by background subtraction whether or not the objects of interest can be moving or stationary. In this paper, we propose layers segmentation to detect both moving and stationary target objects from surveillance video. We extend the Maximum Entropy (ME) statistical model to segment layers with features, which are collected by constructing a codebook with a set ofcodewords for each pixel. We also indicate how the training models are used for the discrimination of target objects in surveillance video. Our experimental results are presented in terms of the success rate and the segmenting precision.  相似文献   

5.
In standard canonical correlation analysis (CCA), the data from definite datasets are used to estimate their canonical correlation. In real applications, for example in bilingual text retrieval, it may have a great portion of data that we do not know which set it belongs to. This part of data is called unlabeled data, while the rest from definite datasets is called labeled data. We propose a novel method called regularized canonical correlation analysis (RCCA), which makes use of both labeled and unlabeled samples. Specifically, we learn to approximate canonical correlation as if all data were labeled. Then, we describe a generalization of RCCA for the multi-set situation. Experiments on four real world datasets, Yeast, Cloud, Iris, and Haberman, demonstrate that, by incorporating the unlabeled data points, the accuracy of correlation coefficients can be improved by over 30%.  相似文献   

6.
A theoretical scheme for alternative and secure direct communication is proposed. The communication is based on controlled quantum teleportafiou via W state. After insuring the security of the quantum channels (a set of qubits in the W states), Alice encodes the secret messages directly on a sequence of particle states and transmits them to Bob supported by Charlie, or to Charlie supported by Bob, using controlled quantum teleportafiou. Bob or Charfie can read out the encoded messages directly by the measurement on his qubits. In this scheme, the controlled quantum teleportafiou transmits Alice's message without revealing any information to a potential eavesdropper. Because there is no a transmission of the qubits carrying the secret messages between legitimate parties in the public channel, it is completely secure for direct secret communication if perfect quantum channel is used. We also discuss that when one of the three legitimate parties does not cooperate with others because of some reasons, the remaining two persons can still communicate with each other by entanglement purification. The main feature of this scheme is that the communicate between two sides is alternative but depends on the agreement of the third, and more over, the communication between two sides does not suspend with loss of one of three qubits ( i.e., one of the three legitimate parties does not cooperate with others).  相似文献   

7.
It is interesting to visit foreign country, but there are ___1___problems when we don't know thelanguage very well. It may be _____2_______to talk with the people there. We may not know how to__3__thetelephone in the country we are visiting. We may not know how to buy the thing we ____4___ .In a strange country we might want to know where to eat or what to order in a __5__. It is not  相似文献   

8.
In 2010,Frontiers of Education in China underwent a complete change of direction.From publishing Chinese academic papers that had been translated into English,the journal shifted to publishing original papers,which have not appeared in print anywhere before.This important reorientation allowed us to develop a close contact with scholars studying Chinese education around the world,and to publish their insights into Chinese education in a timely manner.Prior to publication,every paper goes through a rigorous peer review process and the subsequent decisions are made with adequate communication and discussion.In working with scholars who are knowledgeable about Chinese education,including our authors,readers,and reviewers,we have developed a solid professional relationship and a valuable friendship,for which we always feel grateful.Owing to their suggestions,we have been able to introduce various initiatives for the purpose of bettering this journal.  相似文献   

9.
刘静  孔燕 《海外英语》2012,(22):157-158
Functional equivalence,a focus in the translation studies,has been bombarded with numerous criticisms.Meanwhile,relevance translation theory,proposed by Ernst-August Gutt,offers a united theoretical framework for translation studies.The development of the translation theories does not rely on the appearance of a brand-new theory,but on the successful connection among various theories.To split or to unify,it is a question and it will direct the further development of translation studies.Analyzing the similarities and differences between these two theories,the author are striving for a unity of them and striking a better way to approach translation studies.  相似文献   

10.
In this paper we introduce a framework for using quality as an incentive to promote proper application level congestion control. Through integrating a joint-source channel coder and feedback-based congestion control scheme, we are able to construct accurate and efficient quality incentives. The framework is applicable in all network architectures where end-to-end congestion control may be used, and is as such not specific to either best-effort or traffic class-based architectures. The concept is presented along with preliminary simulations that highlight the resulting rate control accuracy. We also discuss how to implement some well-known congestion control schemes within our framework.  相似文献   

11.
秘密是人类共同的经验,是儿童成长经历的一个显著特征。秘密不仅指那些藏在我们内心深处的东西,也可指那些我们只愿意与某些人分享的东西。秘密影响着个人性格特征的塑造、自我意识的形成以及人际关系的发展等。秘密在儿童的成长中作用在于秘密促进儿童自我意识的形成和发展、秘密促进儿童人际关系的发展。但目前我们对秘密的教育作用关注不够,学校、家庭、现代媒体往往明显或潜在地侵犯儿童的秘密。尊重儿童、关注儿童,需要我们为儿童创设一个秘密的空间,保持秘密和监管之间的平衡、加强对现代媒体的监督,让秘密促进孩子健康成长。  相似文献   

12.
Shamir门限体制的推广应用   总被引:2,自引:0,他引:2  
Shamir门限体制是基于LaGrange插值公式的秘密共享密码体制 .本文基于Shamir门限体制的方法 ,利用算法的有关性质 ,将Shamir门限体制推广应用于更为复杂的秘密共享问题 ,从而构建出新的秘密共享体制 .  相似文献   

13.
Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computation and electronic commerce. But up to now, study of signature based on general vector space secret sharing is very weak. Aiming at this drawback, the authors did some research on vector space secret sharing against cheaters, and proposed an efficient but secure vector space se…  相似文献   

14.
分享行为是亲社会行为的一种表现形式,幼儿分享意识和分享行为的发展是幼儿建立良好同伴关系、形成道德的基础。通过创设糖果分享、玩具分享和奖品分享3种情景,对农村3-5岁幼儿的分享行为进行观察与分析。结果显示:农村幼儿的分享水平较低,分享水平随年龄的增长而提高;玩具分享上存在性别和是否独生的差异,不存在年龄差异;糖果分享和奖品分享上存在年龄差异,但不存在性别和是否独生上的差异。基于对农村3-5岁幼儿分享行为的特点分析,进一步提出提高农村幼儿分享水平的建议。  相似文献   

15.
提出一种基于LUC公钥体制的分类多秘密共享方案,该方案使用各用户的私钥作为各自的秘密份额,秘密分发者不需要进行秘密份额的分配,整个系统不需要维护安全的信道,每个子组共享一个秘密,全体参与者共享一个总秘密,所有类型的秘密之和构成核心秘密,该方案能够有效地保管多个秘密,并且实现了对多个秘密的分类管理,其安全性是基于LUC密码体制与Sham ir门限秘密方案的安全性.  相似文献   

16.
《元朝秘史》写作过程考略   总被引:2,自引:0,他引:2  
《元朝秘史》的写作历时旷久,绝非一次性所完成。佐证有二。基一,《元朝秘史》采用编年体例,但在叙事模式方面却存在与此相悖的三大问题,即补充叙述、叙事主体的人称变化、叙事次序颠倒等;其二,《元史》世祖本纪、文宗本纪颇有延访太祖事迹付史馆、续写《蒙古脱卜赤颜》的记载。参互元人所撰碑版文字,又足以表明现存《秘史》远非这一皇家秘籍的全部内容。  相似文献   

17.
教育资源库的建设面临着资源难以大范围共享和重用的问题。本文参考国内现有研究成果,在对北京市属高校特色教育资源库建设项目现状进行充分调研的基础上,提出了一个基于SOA的资源共享框架并搭建了支撑系统,论述了系统的主要架构和关键技术实现。希望在对现有各资源站点改动最小的基础上解决资源的共享问题,提高工作效率并在此基础上创新现有资源应用和管理方式,以提高优质资源的利用率。  相似文献   

18.
近年来,新闻暗访的报道频频见诸媒体,引来了越来越多质疑的声音。暗访对新闻的真实性造成了不可避免的影响,而且从伦理道德方面来看,暗访这一非常规采访手段的使用也存在着诸多不规范的地方。  相似文献   

19.
Personalisation of learning is a recurring trend in our society, referred to in government speeches, popular media, conference and research papers and technological innovations. This latter aspect—of using personalisation in technology‐enhanced learning (TEL)—has promised much but has not always lived up to the claims made. Personalisation is often perceived to be a positive phenomenon, but it is often difficult to know how to implement it effectively within educational technology. In order to address this problem, we propose a framework for the analysis and creation of personalised TEL. This article outlines and explains this framework with examples from a series of case studies. The framework serves as a valuable resource in order to change or consolidate existing practice and suggests design guidelines for effective implementations of future personalised TEL.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号