共查询到20条相似文献,搜索用时 156 毫秒
1.
国家发改委、广电总局编制印发了《全国"十二五"广播电视村村通工程建设规划》,明确"十二五"期间村村通工程建设目标任务是,到2015年底,基本完成广播电视村村通工程建设任务,基本实现广播电视"户户通"。在村村通用户平台,各县要完成辖区内上万用户的基本资料的录入,在"村村通"单机版信息录入当中,由于不能验证身份证号的准确性,给信息录入人员在审核身份证号带来了很大的工作量,本文通过以excel函数和身份证号的末尾识别码,运用自编函数来保证了身份证号录入准确性。 相似文献
2.
3.
4.
5.
技术的演进需要对许多软硬件方案进行升级,一般来说,如需升级原有的16位设计,获得更高性能和应用灵活性,设计人员不得不选择针对更加复杂应用设计的高端微控制器. 相似文献
6.
7.
8.
9.
10.
Notre Dame大学电子工程分部的研究人员一次偶然的发现有可能谱写一种新的技术标准:一种制造激光二极管和其它先进混合式半导体器件的新标准。 其中的两位研究人员已经推导出一条构造自然超点阵形态材料的捷径,完全摒弃原来那种需费九牛二虎之力的延伸式沉积法。利用这种技术Se(硒)和Te(碲)原子可在Zi衬底上周期性形成层状结构。由此可见在正确 相似文献
11.
Bit-interleaved coded modulation with iterative decoding (ID) is an effective scheme for both AWGN and fading channels because it simultaneously realizes large Euclidean distance and high diversity. In the literature, ID schemes with hard-decision feedback (HDF), as well as soft-decision feedback (SDF), have been investigated. While HDF/ID exhibits a performance inferior to SDF/ID, it is much simpler to implement. To enhance the performance of HDF/ID with moderate additional complexity, we propose a uniform soft-decision feedback ID (USF/ID) scheme. The proposed scheme is applicable in both single antenna and multiple antenna communication systems. The simulation results verify that it achieves impressive performance gain over HDF/ID and has a practically more attractive implementation than SDF/ID, especially for complexity-constrained wireless applications. 相似文献
12.
Contention based MAC protocols are widely used in ad hoc networks because they are suitable, where no central control node exists. However, contention based MAC protocols waste much time because of frequent collisions and long contention times. Moreover, it is hard for them to fairly distribute medium access opportunities. As a result, the problem of unfair medium access may arise under normal network conditions. Recently, another contention based MAC protocol, named the Carrier Sense Multiple Access/ID Countdown (CSMA/IC) was proposed. CSMA/IC resolves medium access contention by comparing the IDs of contending nodes with a simple signaling process. Therefore, medium access collisions never happen as long as each node possesses a unique ID, and the time cost for contention may be smaller than any other contention based MAC protocols if the number of IDs is managed so as to be as small as possible. Furthermore, CSMA/IC may support fair medium access by manipulating the ID of each node properly. In this paper, we propose a novel dynamic ID management protocol which enables a node to acquire a unique ID without any message exchanges and fairly distributed the number of medium access opportunities to all contending nodes. The proposed protocol also makes the contention process of CSMA/IC efficient by dynamically managing the length of the ID field according to the network traffic. The simulation results show that the proposed ID management protocol significantly improves the aforementioned aspects of CSMA/IC MAC protocol compared to previous ID management schemes. 相似文献
13.
基于AVR单片机的125kHz简易RFID阅读器设计 总被引:1,自引:0,他引:1
射频识别技术已广泛应用于生产、生活的众多领域,该技术给人们的生活带来了众多的方便。介绍一种以AVR单片机为核心,并利用分立元件构成的125 kHz RFID阅读器设计,电路结构简单、无需读卡基站芯片、成本极低,用于读取EM4100ID卡,读卡距离可达8~15 cm。同时介绍了EM4100射频ID卡的结构及工作原理,提出一种应用AVR单片机对EM4100卡进行解码的软件设计方法。实验验证了方案的可行性和系统的稳定性,可将其应用于门禁、公交等系统中。 相似文献
14.
15.
Modeling and performance analysis of VI‐CRA: A congestion control algorithm for vehicular networks 下载免费PDF全文
This study proposes a Vehicle ID‐based CAM Rate Adaptation (VI‐CRA) algorithm for beacon messages in the vehicular network. Foremost, an improved vehicle ID–based analytical model is proposed at the MAC layer of vehicular network. The model weighs the random back‐off number chosen by vehicles participating in the back‐off process, with the vehicle ID incorporated in their respective CAMs. This eventually leads to the selection of a vehicle ID–based random back‐off number, minimizing the probability of collision due to same back‐off number selection. It is worth noting that the improved analytical model outperforms the existing works in terms of average packet delay since only one fourth of the contention window size is used throughout the simulation. To enhance the performance of the analytical model, the paper incorporates a congestion control algorithm, by adapting the rate of CAM broadcast over the control channel. The algorithm is designed considering a wide range of scenarios, ranging from nonsaturated to extremely saturated network (in terms of collision probability) and sparsely distributed to teemed network (in terms of vehicular density). For better analyses of simulation results, the algorithm is applied over different vehicle ID–based back‐off numbers. Simulation results for all the back‐off numbers show that vehicle ID–based CAM rate adaptation algorithm performs better than the traditional fixed CAM rate IEEE 802.11p, even at high vehicular density. 相似文献
16.
Maeda S. Kuriyama H. Ipposhi T. Maegawa S. Inoue Y. Inuishi M. Kotani N. Nishimura T. 《Electron Devices, IEEE Transactions on》2003,50(6):1451-1458
An idea for obtaining unique identification (ID) numbers using polycrystalline silicon (poly-Si) thin-film transistors (TFTs) with a logic LSI compatible process is proposed. Like an actual human fingerprint, the characteristic variations of poly-Si TFTs are utilized for ID numbers in LSIs. The variation of poly-Si TFT characteristics is random, and this method offers unique, nonalterable, and nonduplicable numbers without any special processes, unlike other methods such as flash memory and mask ROM. These characteristics are highly suitable for ID number applications. The device physics of poly-Si TFTs for realizing the stable recognition of ID numbers was studied and a recognition circuit is proposed. The design guidelines for the grain size of poly-Si and AFD applications are also discussed. 相似文献
17.
Li Hua Zhu Yaoting Zhu Guangxi 《电子科学学刊(英文版)》2000,17(4):357-362
Watermarking is a technique for labeling digital pictures by hiding secret information into images. Watermark embedding is a method to discourage unauthorized copying and identify the owner or distributor of digital data. In this paper, a new method is proposed. The watermark is processed as a visually recognizable pattern-binary image, which includes more information than the traditional symbol or ID number and is "extracted" instead of only "detected" to characterize the owner. The watermark is hidden in the host image by selectively modifying the middle-frequency part of the host image in conjunction with the human visual system(HVS) and the image discrete cosine transform(DCT). The experimental results show that this method can survive image cropping and image compression, and get better results, this is also a prospective method. 相似文献
18.
Anti-Collision algorithm is one of the most important components of radio frequency identification (RFID) technology, which possesses a key position in the performance of the whole system. ALOHA algorithm is one of the most popular methods to solve the collision problem because of its efficiency and practicability. The grouping method has been developed for enhancing the performance of conventional ALOHA when there are thousands of tags. However, the existing grouping method has limitations in applications due to its rigorous requirements for the estimation of the number of backlog tags or the admirable characteristics of the tags' ID number. Working on the improvement of the grouping methods, we proposed an algorithm named split-ALOHA with a novel grouping method that split tags as a binary tree. The novel grouping method makes it more practicable than the existing grouping methods due to the simplified requirements for tags. Simulations of the proposed algorithm show the superior performance of a linearly increasing of the number of consumed time slots while the number of tags increases. The algorithm performance analysis between split-ALOHA and ALOHA algorithms with other grouping methods has been implemented in a proper way. 相似文献
19.
《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》1966,54(12):1698-1708
This paper reviews the history, concepts, state-of-the-art, and future directions of the use of man-computer graphics for computer-aided design. Computer-aided design is based on a real-time graphical dialogue between the man and the computer in which the man draws on a display by means of a "light pen" or other input device. The computer "understands" the picture, makes calculations based on it, and presents the results pictorially to the user for his approval or revision. This man-computer graphical conversation has been made possible by recent advances in the speed of the digital computer, time-sharing programming, computer-driven display technology, and graphical input devices. The light pen is the most commonly used graphical input device, but keyboards, joysticks, flat matrix arrays, and other devices are also used. The programming state-of-the-art is a limiting factor in the implementatation of graphical computer-aided design; much work remains to be done in systems programming, efficient time sharing, list structure concepts, file organization, and memory protection. A number of experimental equipment configurations in use in various laboratories are cited and the hardware state-of-the-art is reviewed. Several experimental and production applications of computer-aided design evolved in a large aircraft company are described and illustrated, by display photographs. These applications relate to structural analysis, dynamics, information retrieval, accounting, and numerical control tape preparation. For the future, advances are required in improved man-computer communication, techniques to permit the operation of displays at great distances from the central computer, and methods of inputting existing drawings into the computer in a meaningful form. 相似文献