首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
对于处理行刑衔接案件的程序问题进行了研究,提出了一种不同于传统先进行刑事处罚再进行行政处罚的观点。认为应该先进行行政处罚再进行刑事处罚,并对于其合理性进行了探究。  相似文献   

2.
本文对一种嵌入式操作系统进行覆盖测试的情况进行了探讨,详细描述了这类软件的特性,对这类软件进行覆盖测试的原理、过程和覆盖测试的结果进行了阐述,并对测试过程中的不足进行了分析。  相似文献   

3.
论述了网络管理系统进行统一的必要性,介绍了进行统一的不同层面,然后简要地分析了网络管理系统进行统一的内容和实现途径。  相似文献   

4.
系统分析了网吧的火灾危险性进行,对网吧按微机台数进行分级并对人员密度进行了抽样计算,提出了网吧消防安全管理的详细对策,并对农村网吧的快速发现情况进行了论证分析。  相似文献   

5.
电子商务技术扩散系统和扩散过程模型研究   总被引:1,自引:0,他引:1  
首先对电子商务技术扩散的涵义进行了研究,对电子商务技术扩散的概念进行了界定,然后对电子商务技术扩散系统的构成要素进行了分析。在以上分析的基础上,以创新扩散理论为基础建立了电子商务技术扩散的过程模型,并且对其扩散过程进行了深入分析。  相似文献   

6.
康健  孙济庆 《现代情报》2009,29(3):120-122
阐述了图书馆系统安全的重要性以及进行安全规划的必要性,对影响图书馆系统安全因素进行了分析.并在此基础上就如何进行安全规划和制定应急预案进行了说明。  相似文献   

7.
用ICP—AES法测定了锰铁中Mn、Si、P的含量,选择了元素的分析谱线并对分析条件进行了优化,确定了最佳的分析条件.进行了准确度及精密度的试验,对样品进行了分析并与国标法进行了对照,取得了满意的结果.  相似文献   

8.
对大学生的阅读倾向进行了分析,从阅读目的、方式、内容等方面进行了综述,提出了对其进行正确引导的有效途径。  相似文献   

9.
舒红宁  徐长红 《科技风》2012,(18):107-108
对专利文献进行了收集整理,对中国和外国的轧辊防偏析文献做了统计,从专利文献出发,阐述了防止轧辊偏析的方法。例如从材料上进行改进,从变质处理上进行改进,从热处理工艺上进行改进;添加磁场等,并对其进行了详细举例。  相似文献   

10.
王友翠  吕娜 《情报杂志》2007,26(11):154-156
对影响数字图书馆用户满意度的因素进行了分析,通过问卷对各指标进行了调研和结果分析,探索了对用户满意度进行测评的应用。  相似文献   

11.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

12.
中德海洋学核心期刊论文国际合著的比较分析   总被引:1,自引:0,他引:1  
万琪  华薇娜 《现代情报》2016,36(2):150-156
本研究选取Web of Science数据库,收集中国和德国发表的海洋学论文,将论文分为国际合著组与非国际合著组,利用文献计量学的方法,借助EXCEL、SPSS和UCINET软件,比较两国各年的发文量、论文的篇均作者和篇均参考文献数、收录期刊的影响因子、论文的被引频次以及合著国家。研究结果显示,中国海洋学领域的国际合著起步晚于德国,但发展迅速,近年来中国海洋学国际合著的论文量已超过德国;同时中国海洋学国际合著论文的质量和学术影响力都弱于德国,并且中国海洋学论文合著国家的范围也小于德国海洋学的合著国家。  相似文献   

13.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

14.
The main premise of this article is that in information societies generally, and in virtual social contexts particularly, a distinctive style of interaction to facilitate the communication of difference, heterotopic communication , has emerged. It rests on two cultural foundations: an ideological belief in the positive, socially integrating power of communication, and a prevailing ethic of instrumental rationality, subjective individualism, and strategically practiced self-interest. The former is demonstrated by the use of simulation and spectacle as sources of information; exhibitionism/voyeurism as a communicative style; and the awareness of surveillance. The latter is seen in the competitive use of knowledge as a commodity; a surface globalism masking deep parochialism; lateral as well as vertical information inequity; and the use of public versus private as strategies for engagement rather than as spaces. Those who engage in heterotopic communication resort to their 'own devices' both in the sense of personal agendas, strategies, interests, and interpretations, and in the form of the telecommunication tools that help realize them. These personal and technological devices allow individuals with the right educational and technical resources to avoid exposure to disagreement, difference, or other information that does not serve their direct purposes or reflect their particular views of the world; yet they also help convey the appearance of openness, availability, and cooperation. This style of interaction is used strategically in combination with information and communication technologies to gain social or economic advantages, but it may encourage social separatism and parochialism, inhibit the negotiation of disputes, and emphasize competing interests.  相似文献   

15.
This article presents an account of the process of development of the NSFNET and its significance for the emergence of the Internet of the 1990s. The fact that the development of the interconnected system of computer networks occurred within the realm of academic research is not incidental. The dynamics of the world of scientific research were intimately related to the shaping of the network and to the way in which it spread to other sectors of society. The construction of computer networks crossed the boundaries between science and society in order to build the scientific realm by transforming the world in which it is embedded.  相似文献   

16.
The development of vaccines to prevent infectious diseases has been one of the most important contributions of biomedical sciences. Increasing understanding in biochemistry, molecular biology, molecular genetics and related fields have provided an opportunity for the development of new generation vaccines that are based on rational design approaches. This is possible because of proper understanding of the microbial-genetics, biochemistry, host-pathogen interaction and recent developments in molecular immunology. Another important improvement made in the quality of vaccine production is the incorporation of immunomodulators or adjuvants with modified delivery vehicles viz liposomes, Iscoms and microspheres apart from alum being used as a gold standard. This article reviews the art of vaccination from Jenner period to present day context highlighting all the developments made at each stage of the vaccine development. Various criteria have been discussed regarding the selection of epitopes that expand B & T cells, its linkage with other accessory cells of the immune system, means to overcome MHC linked immune unresponsiveness, enhanced antigen processing and presentations that specially induce either helper or cytotoxic or mucosal immune responses were critically discussed.  相似文献   

17.
Trust between transaction partners in cyberspace has come to be considered a distinct possibility. In this article the focus is on the conditions for its creation by way of assuming, not inferring trust. After a survey of its development over the years (in the writings of authors like Luhmann, Baier, Gambetta, and Pettit), this mechanism of trust is explored in a study of personal journal blogs. After a brief presentation of some technicalities of blogging and authors’ motives for writing their diaries, I try to answer the question, ‘Why do the overwhelming majority of web diarists dare to expose the intimate details of their lives to the world at large?’ It is argued that the mechanism of assuming trust is at play: authors simply assume that future visitors to their blog will be sympathetic readers, worthy of their intimacies. This assumption then may create a self-fulfilling cycle of mutual admiration. Thereupon, this phenomenon of blogging about one’s intimacies is linked to Calvert’s theory of ‘mediated voyeurism’ and Mathiesen’s notion of ‘synopticism’. It is to be interpreted as a form of ‘empowering exhibitionism’ that reaffirms subjectivity. Various types of ‘synopticon’ are distinguished, each drawing the line between public and private differently. In the most ‘radical’ synopticon blogging proceeds in total transparency and the concept of privacy is declared obsolete; the societal gaze of surveillance is proudly returned and nullified. Finally it is shown that, in practice, these conceptions of blogging are put to a severe test, while authors often have to cope with known people from ‘real life’ complaining, and with ‘trolling’ strangers.  相似文献   

18.
军队信息化的动因、任务及对策探讨   总被引:2,自引:0,他引:2  
基于未来高技术战争需求的牵引、军用信息技术发展的推动和构建核心能力的内在要求,我军必须加快信息化建设。为此,本文运用战略管理中的价值链方法对军队的任务及军队信息化的任务进行了全面分析,并提出了加速我军信息化建设的对策。  相似文献   

19.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

20.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号