首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 281 毫秒
1.
图书馆自助借还书系统服务探讨   总被引:1,自引:1,他引:0  
文章论述了图书馆自助借还书系统的应用及研究现状,并通过图书馆自助借还系统的使用实践,分析了在使用过程中会遇到的问题,总结了自助借书使用的有利方面和不足之处,并提出了相应的对策。  相似文献   

2.
简述了深圳市宝安区图书馆自助借还书系统的应用情况及服务效益,分析了自助借还书服务存在的问题,提出了参考性建议,供其他公共图书馆参考借鉴。  相似文献   

3.
黄燕 《科教文汇》2012,(22):207-208
随着科学技术的发展,我国许多图书馆开始应用图书自助借还系统。自助借还书系统在图书馆工作中增加了图书馆借还书时间、馆藏文献流通量,使图书馆工作重心转向深层次的服务上,为培养学科馆员创造了有利的条件。但是该系统也存在很多问题:价格昂贵,错借、漏借图书,对图书加工要求较高,容易造成拒借率上升等。  相似文献   

4.
高校图书馆管理中RFID自助借还系统的应用是数字化、信息化建设的必然选择,有助于提升管理效率、服务质量,提供便利服务,为高校新型图书馆建设提供支持。本文分析了RFID自助借还系统构成与特点及其在师范大学中的应用效果,并就系统应用中出现的问题与对策进行了探讨,希望能为高校图书馆管理建设提供参考。  相似文献   

5.
阐述了图书馆借还书服务的发展概况,分析了自助借还书系统在实际使用过程中有可能出现的各种问题,提出了相应的对策。  相似文献   

6.
图书馆RFID系统架构浅谈   总被引:1,自引:0,他引:1  
李郎达 《现代情报》2009,29(11):120-121,124
RFID技术日益受到图书馆行业的重视,目前国内已陆续有多家图书馆开始着手引进RFID系统,开展了自助借还书等服务。本文在介绍RFID技术的基础上讨论了图书馆RFID系统架构问题。  相似文献   

7.
通过对黑龙江八一农垦大学图书馆自助借还机在实际应用过程中的利弊进行分析研究,提出了应对措施,以期推动自助借还机的广泛应用,助力黑龙江八一农垦大学智慧图书馆的建设,并促进图书馆之间的交流合作。  相似文献   

8.
1.RFID技术在图书馆和图书行业的应用现状从上世纪90年代后期以来,国外许多图书馆和图书馆系统供应商开始研究RFID在图书馆管理中的应用,美国Checkpoint、3M、法国Tagsys、瑞士Bibliotheca、新加坡STLogitrack等公司先后推出了包括基于HFRFID技术的自助借还、馆藏清点、全  相似文献   

9.
介绍了RFID技术的特点、组成及工作原理,概述了基于RFID的自助借还书系统的原理和工作流程,总结了该系统的主要优点、缺点及应对措施.  相似文献   

10.
概述了国内外智慧图书馆研究、图书馆自助服务研究和智慧图书馆管理系统研究,梳理了高校智慧图书馆自助服务与管理系统研究理论研究成果,并从图书馆精细化管理系统、座位管理系统、会议管理系统、研讨室管理系统、自助文印系统、自助复印系统、自助打印系统、自助扫描系统、电子阅报系统、图书馆多媒体信息发布系统、电子阅览室信息管理系统、自助借还等12个方面探讨了高校智慧图书馆自助服务与管理系统构建。  相似文献   

11.
智能车辆是智能交通系统研究的热点领域,开展智能车辆的障碍物检测技术研究,是车辆辅助驾驶及无人驾驶的关键技术之一。随着计算机硬件的快速发展,计算性能不断提高,一些新的算法或方法也不断被提出,而障碍物检测技术仍然是智能车辆研究的重点和难点。文章介绍了双目立体视觉相关的一些理论,对近年来的一些基于双目立体视觉的障碍物检测方法分析并进行综述。  相似文献   

12.
网络信息挖掘系统评价初探   总被引:1,自引:0,他引:1  
贾丰  张燕 《情报理论与实践》2003,26(3):267-269,237
随着电子商务的蓬勃兴起 ,许多企业已经开始意识到其所拥有的丰富的信息资源在商业决策中具有潜在的巨大商业价值。更好的决策支持需求和企业电子商务的开展正推动着网络信息挖掘系统的研究与开发。鉴于网络信息挖掘是在数据挖掘的基础上发展起来的 ,因此对于网络信息挖掘系统的基本问题 ,本文仍将利用数据挖掘系统的基本理论来描述。目前 ,由于网络信息挖掘系统的发展正在起步阶段 ,因此它的分类还无法达到数据挖掘系统分类那样细致。具体而言 ,对网络信息挖掘系统分类可以从商业能力、挖掘数据类型、挖掘功能、数据分析方法和应用领域角度…  相似文献   

13.
智能停车场系统技术及实施   总被引:1,自引:0,他引:1  
朱毅 《科技广场》2012,(1):114-117
智能停车场是智能建筑的重要组成部分,本文以停车场智能检测及控制为研究内容,阐述了智能停车场的组成、工作原理及结构特点,论述了智能停车场的功能及发展趋势,简述了实施方案。  相似文献   

14.
Despite the large volume of research conducted in the field of intrusion detection, finding a perfect solution of intrusion detection systems for critical applications is still a major challenge. This is mainly due to the continuous emergence of security threats which can bypass the outdated intrusion detection systems. The main objective of this paper is to propose an adaptive design of intrusion detection systems on the basis of Extreme Learning Machines. The proposed system offers the capability of detecting known and novel attacks and being updated according to new trends of data patterns provided by security experts in a cost-effective manner.  相似文献   

15.
This paper addresses L2 observer-based fault detection issues for a class of nonlinear systems in the presence of parametric and dynamic uncertainties, respectively. To this end, three different types of uncertain affine nonlinear system models studied in this paper are described first. Then, the integrated design schemes of L2 observer-based fault detection systems are derived with the aid of Hamilton–Jacobi inequalities (HJIs), respectively. Numerical examples are also provided in the end to demonstrate the effectiveness of the proposed results.  相似文献   

16.
This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow for quantifying how much information that is leaking, where these information leakages are, as well as showing what these leakages mean. This includes adding enforcement mechanisms ensuring that operation on sensitive information is transparent and auditable. The data controller or external quality assurance organisations can then verify or certify that the security operation operates in a privacy friendly manner. The roadmap furthermore outlines how privacy-enhanced intrusion detection systems should be implemented by initially providing privacy-enhanced alarm handling and then gradually extending support for privacy enhancing operation to other areas like digital forensics, exchange of threat information and big data analytics based attack detection.  相似文献   

17.
【目的】 系统梳理国内外学术不端检测系统特点、局限性及存在争议,提出针对我国科技期刊的启示与建议。【方法】 通过文献调研与归纳总结,剖析学术不端检测系统现状及问题;结合国内外资料调研及编辑工作实践,得出启示与建议。【结果】 国外研发学术不端检测系统的时间较早,2009年国内成功研发学术不端检测系统并将其投入使用后,抄袭与剽窃等学术不端行为被有效遏制;但对学术不端检测系统的局限性认识不足、过度依赖学术不端检测系统、设置的文字复制比阈值太低,引起新的学术不端问题,不利于引导学术研究和学术继承性、创造性发展。【结论】 (1)科技期刊编辑部应理性使用检测系统、设置合理阈值、科学界定学术不端行为,为规范学术研究、保证研究质量和及时准确发布研究成果建立正确导向;(2)科技期刊编辑部应与相关机构联合,建立统一的引用规范,根据不同学科特点和论文类型等采用不同的阈值,实行“人机”结合、精准检测;(3)建立学术不端审核机制,规范审核流程,提升编辑把关能力,形成以编辑为主、多方联合的多元防治体系;(4)应用新技术不断提升检测系统查准率,提供更多服务功能,满足不同学科及新型出版方式的多样化需求;(5)建立学术不端法治体系,建立终身信誉制度或荣誉准则制度,开展科研诚信终身化与常态化教育,相关单位将学术道德纳入人才评价体系,促进学术生态良性发展。  相似文献   

18.
Machine learning applications must continually utilize label information from the data stream to detect concept drift and adapt to the dynamic behavior. Due to the computational expensiveness of label information, it is impractical to assume that the data stream is fully labeled. Therefore, much research focusing on semi-supervised concept drift detection has been proposed. Despite the large research effort in the literature, there is a lack of analysis on the information resources required with the achievable concept drift detection accuracy. Hence, this paper aims to answer the unexplored research question of “How many labeled samples are required to detect concept drift accurately?” by proposing an analytical framework to analyze and estimate the information resources required to detect concept drift accurately. Specifically, this paper disintegrates the distribution-based concept drift detection task into a learning task and a dissimilarity measurement task for independent analyses. The analyses results are then correlated to estimate the required number of labels within a set of data samples to detect concept drift accurately. The proximity of the information resources estimation is evaluated empirically, where the results suggest that the estimation is accurate with high amount of information resources provided. Additionally, estimation results of a state-of-the-art method and a benchmark data set are reported to show the applicability of the estimation by proposed analytical framework within benchmarked environments. In general, the estimation from the proposed analytical framework can serve as guidance in designing systems with limited information resources. This paper also hopes to assist in identifying research gaps and inspiring new research ideas regarding the analysis of the amount of information resources required for accurate concept drift detection.  相似文献   

19.
李容 《科学学研究》2012,30(1):72-80
 根据问卷调查的数据对我国公共农业科研机构的科研激励制度进行了描述,讨论了科学家对公共农业科研机构利益目标的认知,并从职称晋升、学术奖励、绩效薪酬等方面分析了现行科研激励制度对科学家的影响。研究表明争取科研经费是得到样本科学家普遍认同的公共农业科研机构利益目标,为农户服务则被样本科学家认为是公共农业科研机构最重要的价值使命。同时现行科研激励制度并没有有效促进科学家学术水平的提高,在学术评审中“打招呼”等潜规则的存在则严重影响了科学家的学术信心。  相似文献   

20.
Critical research is becoming increasingly accepted as a valid approach to research in information systems. It is deemed to be particularly suitable for situations where researchers want to address conspicuous injustice, such as in areas of development or the digital divide. Critical research in information systems (CRIS), I will argue, is a possible approach to some of the ethical problems arising in the context of information and communication technology (ICT). It can be sensitive to the question of culture and therefore suitable for researching cross-cultural ethical questions in ICT. It is often unclear, however, what exactly critical research stands for and to what extent critical approaches are applicable across cultural boundaries. This paper will address these problems by proposing a definition of critical research as focused on changing the status quo and aiming for emancipation. It will then look at the question whether different cultures are compatible and comparable and what the role of culture in research on information systems is. The paper will then return to the question whether the critical intention to emancipate and empower humans is an expression of cultural imperialism or whether there are valid ways of promoting emancipation across cultural divides.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号