首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
辩证唯物主义认为,意识是人脑的机能。人工智能的发展,对这个问题提出了挑战。电脑将赶上瘩超过人脑,这是可能的么?说能,人造出的东西能统治人自己,那说明人是愚蠹的;说不能,那同样说明人是无能的,这个悖论怎么解决呢?辩证法和现实的科学实践将会做出科学的回答。  相似文献   

3.
What is the first step beyond this dreaming activity? Understanding where future research in this area could move is an excellent extension of this work. Is the distancing experienced by girls’ interactions with computer software oozing beyond the borders of the screen, beyond what is inside the computer? Might it be that the distancing is also a function of the external manifestation of the computer itself the way it looks on the outside? We don’t know how important the physical structure of the computer is. This is an area worthy of more rigorous research. Our work focuses on the actual, unalterable hardware facets of computers from the late 1990’s the outside 6 and suggests alternative constructions that might make computers more approachable for and appealing to girls. But we don’t know if indeed such computers would be more appealing, nor do we know what the interest or impact of more essentialized recent computers such as the Barbie and Hot Wheels computers are. Rigorous qualitative research into the adoption tendencies and impact on gender relations of the introduction of such essentialized products needs to be accomplished. The original design of the computer was based not on marketing needs or perceptions, nor on progressive concepts of equity, but rather on functionality for those who created the hardware itself. As a result, it is likely to be quite appealing to the designers, but may be less so to those who were outside this creative process. The importance of resting the design decisions with users has been the subject of several important texts on developing computer systems including Norman’s Design of Everyday Things (1988) and also Schuler & Namioka’s Participatory Design: Principles and Practices (1993).  相似文献   

4.
The study presented here will examine the connection between teaching and development, focusing in particular on how children solve “missing addend” story problems. Vygotsky’s theory of development will serve as the framework. Ordinarily, when second graders are forced to solve a problem of this type by choosing an arithmetic operation (+ or ?), half of them fail. The most frequent error is choosing addition. The subjects in the experiment presented here were second graders who had always been given the opportunity to use objects or drawings to “act out” (model) the actions expressed in the problem statament. They had never been in the above “forced-choice” situation. Moreover, they had been taught to use a “forward strategy” to solve subtraction problems like 42–36 (to get from 36 to 40, it takes 4; and then to get to 42, it takes 2 more) and a “backward strategy” for subtraction problems like 42–6. When given the following missing-addend problem: “Pierre has 63 pieces of candy and paul has 4. Paul wants to have the same number of pieces as Pierre. How many pieces of candy must Paul buy?” none of these children performed an addition, approximately half did a subtraction, and the others succeeded by using a breakdown strategy or a drawing. The overall success rate was 92%. The results obtained suggest a way of operationalizing the notion of “zone of proximal development” for problem solving of this type.  相似文献   

5.
在计算机程序设计教学活动中,上机是一项很重要的内容,为了掌握了解学生学习和完成上机练习的情况,常常要检查学生的磁盘,由于在正常情况下,磁盘程序拷贝简单容易,学生的上机练习甚至考试内容互相拷贝的现象时有发生。所以,检查的结果反应不了学生的实际水平,给评定学生学习成绩带来困难。本文针对这一实际问题,提出了一种简单易行有效的磁盘加密措施,并把它用于学生磁盘管理,使问题得到园满解决,收到了很好的效果。本文所介绍的方法,对其它学校的学生磁盘管理也很有参考价值。  相似文献   

6.
Two computer simulations were developed and used to investigate systems thinking and environmental problem solving in children. Ninety-two primary school children (aged 8 years and 11 years) interacted with computer simulation of either a deforestation problem or a water depletion problem. The children's task was to manipulate the simulation thereby enabling it to run for as long as possible before resources—water or trees—were exhausted. This could be achieved via a number of strategies and their use by the two groups of children was compared. Through efficient use of resources and recycling strategies, the older children outperformed the younger children. Magical thinking was more prevalent among the 8-year-olds. The results also suggest that seemingly isomorphic environmental problems may not be interpreted as such.  相似文献   

7.
In the previous article we discussed some basic ideas in theoretical computer science like decision problems, languages, Turing machines, their encodings as strings over a finite alphabet, Universal Turing machines and some important computational complexity classes. In this article we discuss a powerful technique called diagonalization for arriving at lower bounds on computing resources for deciding languages. We will discuss the method, its success and possible limitations.  相似文献   

8.
Developing countries have been quite successful at expanding enrollments in education, especially at the lower levels. But for any given level of efficiency, increased enrollments require increased resources, in order to maintain quality. If these resources are not forthcoming, the increase in educational quantity may come at the expense of quality. Is there a quantity–quality trade-off and what public policies can diminish it, in the face of strong constraints on public budgets? This paper explores the negative impact of such an enrollment expansion—unaccompanied by increased numbers of teachers—on school conditions and learning, using a cross-district time series analysis of Tamil Nadu, India as a case in point. It examines alternative policies which can be used to avoid such negative effects—by more efficient use of existing public resources and by expansion of over-all educational resources through greater reliance on private management and finance.  相似文献   

9.
SN弹性砂轮是磨具新品种,能够在普通机床上实现对零件的磨削和抛光加工。将数控车床和SN弹性砂轮抛磨技术溶于一体,可进一步拓展数控车床的使用功能。在实际应用中,通过减小数控车床的脉冲当量(即步进位移精度),弥补了数控车床位移精度较低的缺陷;通过特殊的循环程序结构设计,解决了SN弹性砂轮抛磨时不定次数的无进给量或微进给量的补磨磨削,保证了零件的加工精度。  相似文献   

10.
本文主要研究不确定环境下的一种生产计划问题,这种生产计划问题是指在资源有限的前提下如何制定合适的生产方案使企业获得最大收益,其中每种产品对各种资源的需求量和每种产品的单位生产利润均为不确定变量.对此情况的生产计划问题首先建立了不确定规划模型;然后利用不确定理论有关知识简化了该模型,以便求其最优解;最后运用求解线性规划的软件matlab求出实际数值问题的最优解.  相似文献   

11.
在网络经济中,信息资源占有着重要的地位。网络经济的迅猛发展,使信息的共享与知识产权的保护成为当前凸现的伦理问题,如何解决这一对矛盾对于网络经济和人类社会的发展具有重要的意义。应从网络技术,网络立法,网络主体的权利与义务相统一等三个方面寻找这一矛盾的解决思路。  相似文献   

12.
Could anyone reasonably oppose the idea that quality and excellence are essential to the university? However unlikely it seems, that is exactly what we would like to do in this article: we would like to reject the demand for quality and excellence in the university. We would like to arrive at a point at where the need for quality is no longer necessary. In this article, such a refusal will direct us to a proposal for using the spaces offered by the university and its teaching and research in a different way; in a way that transforms the university into a world university. This paper will argue that a world university is concentrated around attentive pools of worldly study. It is a university that has to invent new languages in order to answer the question “How can we live together?” In order to answer this question, and to be “present in the present,” we will clarify our argument that both acceptance and attention are needed in the world university. This position implies a kind of curiosity that is not driven by the “will to know” but by a caring attitude to what is happening now.  相似文献   

13.
随着网络和社会的发展,语言变得越来越简单并且多样化,在各种各样的新语言形式中,网络语言就是一种。给网络语言下个适当的定义并不是件容易的事情。网络语言与我们的日常生活有着紧密的联系,并且被广泛地接受。许多人,包括语言学家都认为网络语言不是一种规范的语言,然而,它却是我们语言中一个重要的部分。当然,它不可避免的也会有些缺点。网络语言在网络中十分流行并被广泛接受,所以我们有必要对它多一些了解。为了对网络语言有更深入更清晰的认识,我们必须知道它的产生、发展、基本特点,不同类型以及使用原则。同时,我们必须对它有正确的认识。怎样更好的利用它是我们必须解决的问题。  相似文献   

14.
通过对世界上具有不同意识形态、其居民有不同宗教信仰的国家或地区的多部民法典的考察,可以得知要物合同制度式微的看法没有依据。但这些立法例似乎呈现出要物合同制度与意思自治原则之间存在着冲突。鉴于此,二者是否真的存在冲突就必须给予回答。面对此种所谓冲突,建议不能盲目确认其存在,从而主张完全废除要物合同制度以求解决,而应谨慎地思考前述冲突的产生原因及要物合同存续的原因,慎重对待要物合同的前途。  相似文献   

15.
实训对于高职会计专业在校学生职业能力的培养意义深远。目前高职院校会计专业的实训模式可归纳为"专项技能实训——综合(分岗或不分岗)模拟实训——顶岗实战实训"。这样的模式从简到繁、由易到难,似乎很合乎人才培养的规律性要求,但在实际操作中存在很多问题,对培养学生职业能力作用有限。这种模式在实施中存在的主要问题具体表现为:实训内容缺乏系统性和规范性,带有明显的理论教学的印迹,实训过程控制不力以及重视不够、投入不够等。探索建立"融入理论教学的专项技能实训——分岗、轮岗的综合仿真实训——实务专家参与的实账实训——跨专业的综合仿真实训——老师参与的顶岗实战实训"新模式,并进行系统性和规范性的实训内容的设计,改变实训指导老师的定式思维,将校内实训提到实战高度,做好实训过程的控制,重视并加大投入,可以促进高职会计专业实训目标的达成。  相似文献   

16.
排课作为高校教学常规中重要的实施环节,受到诸多条件的限制和制约。如何在有限的教学资源下完成大规模的排课,让有限的教学资源达到最优化组合是目前较为突出的问题。基于此,文章通过对实践教学机房容量数据进行分析,实现利用有限的教学资源完成较多学时数的合理化排课进程。  相似文献   

17.
This volume is largely about nontraditional data; this paper is about a nontraditional visualization: classification trees. Using trees with data will be new to many students, so rather than beginning with a computer algorithm that produces optimal trees, we suggest that students first construct their own trees, one node at a time, to explore how they work, and how well. This build-it-yourself process is more transparent than using algorithms such as CART; we believe it will help students not only understand the fundamentals of trees, but also better understand tree-building algorithms when they do encounter them. And because classification is an important task in machine learning, a good foundation in trees can prepare students to better understand that emerging and important field. We also describe a free online tool—Arbor—that students can use to do this, and note some implications for instruction.  相似文献   

18.
柯东林 《鄂州大学学报》2007,14(2):11-12,16
在数据库中使用事务功能,就可以把数据遭破坏的可能性降到最低。然而,事务处理需要耗费大量的计算机资源,它必然会引起系统性能的降低,甚至由于多个事务的不合理设计造成冲突而产生死锁现象,这是一名数据开发者所不愿意面对但却必须解决的重要问题,该文描述了通过优化事务的方法来避免死锁的发生。  相似文献   

19.
许南英是台湾近代著名爱国诗人。他考上进士后被授予官职,但没有赴任就回乡了。关于此中原因,一般认为是由于他志向不在当官,但通过分析可以发现,更为深层次的真正原因应是贫穷。弄清这个原因,对于解读他的诗作和更好地了解后来他在不得已的情况下走进官场的痛苦心境均有帮助作用。  相似文献   

20.
The purpose of this aricle is to present several implications and recommendations regarding what elementary school children, aged 9–12 years, know about computer passwords and what they know about why computer passwords are important. Student knowledge can then be used to make relevant curriculum decisions based in conjunction with applicable state and national standards. Weak computer password construction, use, and knowledge have been identified as areas of high risk for data security. By identifying what children know about passwords, an appropriate curriculum can be designed to help children develop strong password habits that will minimize unauthorized data access via computer technology. This is especially important because elementary school children today will become industry computer users tomorrow. By instilling appropriate computer password habits in children today, curriculum can be designed to follow them through the education experience and into industry. Relevant standards from the International Society for Technology in Education (ISTE), ISTE National Educational Technology Standards for Students (NETS?S), and the Association for Computing Machinery's Computer Science Teachers Association K–12 (CSTA K–12) are referenced.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号