首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 578 毫秒
1.
王琼  郭学文 《数字通信》2009,36(3):63-65
USAT技术是在原来SIM卡被动式的操作模式基础上,增加了SIM卡新的主动式操作的能力,即允许SIM卡中的应用和服务主动与手机终端进行交互操作。在USAT技术获得广泛应用之前,手机与SIM卡之间是一种不对称的主从关系,即SIM卡只能处于被动的接受手机的指令并执行的地位,手机则处于绝对的主动控制地位。任何一个动作只能由手机发起命令,并由SIM卡响应来完成。这种命令一响应的动作模式最大的缺陷在于SIM卡不具有主动权,从而限制了在SIM卡上的开发,制约了新的移动增值业务的发展。而USAT则为SIM卡的增值业务提供了良好的开发环境,可在SIM卡中设计功能丰富、操作简便的菜单,使用户可以用可视化、交互式的手段享受移动运营商提供的增值业务.  相似文献   

2.
孙娱 《移动通信》2010,34(9):70-72
文章简要介绍了WCDMA终端使用USIM卡的应用工具包USAT技术和其主要功能,并对其业务应用进行了介绍,指出USAT技术的应用为运营商提供了更为广泛灵活的业务发展空间。  相似文献   

3.
首先给出了UMTS业务体系结构,然后研究了UMTS中常用的业务工具包。业务工具包是关于协议、环境和API的必要规范,主要包括用户SIM应用工具包(USAT)、移动运行环境(MExE)、移动网增强逻辑的客户化应用(CAMEL)、开放业务接入(OSA)。  相似文献   

4.
文章首先介绍基于UICC卡远程文件管理的产生背景;接着介绍其技术实现机制,包括文件管理分类、管理指令实现、数据传输以及为保障安全性所采取的措施;然后介绍远程文件管理的一个典型应用:自助换卡;最后,展望了远程文件管理的应用前景并总结实现中所须注意的事项。  相似文献   

5.
多媒体指令利用中央处理器的能力实现并行处理。用户可以利用这些指令来提高应用项目的实效和功能。  相似文献   

6.
1.ROHS检测及证书简介 欧盟已在2006年7月1日开始正式实施”ROHS”指令(the restriction of the use of certain hazardous substances in electrical and electronic equipment,电气电子设备中限制使用某些有害物质指令),届时使用或含有镉(Cd)、铅(Pb)、汞(Hg)、六价铬(Cr6+)等四种重金属,以及多溴苯(PBB)、多溴二苯醚(PBDE)作为阻燃剂的电子电器产品将不允许进入欧盟市场。具体涉及电压范围在交流低于1000伏或直流低于1500伏的八大类电子电器设备:大型家电,  相似文献   

7.
深度神经网络在图像语音智能化处理领域的应用越来越广泛,但其算子、参数类型多,计算、存储密集大的特点制约了在航空航天、移动智能终端等嵌入式场景中的应用.针对这一问题,提出了解耦输入数据流,进行高效流水并行处理的思路,设计了一种神经网络加速器指令控制系统.不同算子的输入数据循环分块后,对应到指令组配置中,多状态机协同完成指...  相似文献   

8.
Xtensa LX处理器采用了Tensilica独创的可变长度指令扩展FLIX(Flexible Length Instruction eXtensions)体系结构,该体系结构是Xtensa指令集体系结构ISA的高效实现,它给设计人员以更多的选择去对系统设计的成本和性能进行折衷。FLIX技术为设计人员提供了灵活的方法,将单操作RISC指令、简单和复合操作TIE指令以及多操作FLIX指令自由地结合在一起。通过将多个操作封装在一个32位或者64位的宽指令字中,FLIX技术可以允许设计人员加速执行嵌入式应用程序中比较主要的“热点”代码,同时消除了超长指令字VLIW处理器体系结构中指令代码和系统性能方面的缺陷。  相似文献   

9.
冯晓  李伟  戴紫彬  马超  李功丽 《电子学报》2017,45(6):1311-1320
现有的可重构分组密码实现结构中,专用指令处理器吞吐率不高,阵列结构资源利用率低、算法映射过程复杂.为此,设计了分组密码可重构异构多核并行处理架构RAMCA(Reconfigurable Asymmetrical Multi-Core Architecture),分析了典型SP(AES-128)、Feistel(SMS4)、L-M(IDEA)及MISTY(KASUMI)结构算法在RAMCA上的映射过程.在65nm CMOS工艺下完成了逻辑综合和功能仿真.实验表明,RAMCA工作频率可达到1GHz,面积约为1.13mm2,消除工艺影响后,对各分组密码算法的运算速度均高于现有专用指令处理器以及Celator、RCPA和BCORE等阵列结构密码处理系统.  相似文献   

10.
社会正步入信息时代,信息 进入了生活的方方面面,信息的形式又是多种多样的,可以是视频,音频,也可以是文字。为更快更方便地传播这些信息,人们发展了很多先进的技术,如:无线通信,卫星广播,DSL 接入等等。所有这些技术都有这样一个共同要求:高速处理数据。基于VelociTI架构的DSP C6000系列正是德州仪器公司(TI)针对更强处理能力推出的DSP。该系列根据内核分为C62,C67系列,其中C62为定点处理器,C67为浮点处理器。它们都采用超长指令字的架构,该架构中多个执行单元可以并行处理,在一个…  相似文献   

11.
目前,市场上流行的手机背光源的导光板基本上为单面网点(球型微透镜阵列)的结构。文章介绍了一种新型手机用导光板的设计,其采用一面为网点结构,另一面为轮廓渐变的V-槽形结构的自由曲面,以使导光板的配光更加合理。模拟结果显示,导光板照度比单面网点的导光板要高出1倍左右。采用这样的结构,背光模组中至少可以少用一层3M公司的增亮膜(棱镜膜).倬背光樽组的成本有效降低.  相似文献   

12.
Watermarking codes are analyzed from an information-theoretic viewpoint as identification codes with side information that is available at the transmitter only or at both ends. While the information hider embeds a secret message (watermark) in a covertext message (typically, text, image, sound, or video stream) within a certain distortion level, the attacker, modeled here as a memoryless channel, processes the resulting watermarked message (within limited additional distortion) in attempt to invalidate the watermark. In most applications of watermarking codes, the decoder need not carry out full decoding, as in ordinary coded communication systems, but only to test whether a watermark at all exists and if so, whether it matches a particular hypothesized pattern. This fact motivates us to view the watermarking problem as an identification problem, where the original covertext source serves as side information. In most applications, this side information is available to the encoder only, but sometimes it can be available to the decoder as well. For the case where the side information is available at both encoder and decoder, we derive a formula for the identification capacity and also provide a characterization of achievable error exponents. For the case where side information is available at the encoder only, we derive upper and lower bounds on the identification capacity. All characterizations are obtained as single-letter expressions  相似文献   

13.
It is shown that for a two-sided junction, the doping profile can only be uniquely determined from C(V) measurements if the doping profile is known on one side. Expressions are derived which enable the calculation of the complete doping profile from C(V) measurements and the knowledge of the doping profile on one side.  相似文献   

14.
The impact of side information about the distortion measure in problems of quantization is analyzed. It is shown that such “distortion side information” is not only useful in general, but that in many cases knowing it at only the encoder is as good as knowing it at both encoder and decoder, and knowing it at only the decoder is useless. Moreover, it is shown that the strategy of exploiting distortion side information at the encoder by describing it for the decoder is inefficient. Thus, distortion side information is a natural complement to side information about the source signal, as studied by Wyner and Ziv, which if available only at the decoder is often as good as knowing it at both encoder and decoder. When both types of side information are present, conditions are established under which encoder-only distortion side information and decoder-only signal side information are sufficient in the high-resolution limit, and the rate penalty for deviating from this configuration is characterized.   相似文献   

15.
As an effective molecular modification strategy, side chain engineering has been widely used in promoting the photovoltaic performance of non-fullerene acceptors. Herein, a novel non-fullerene small molecular acceptor i-IEOSi-4F comprising siloxane-terminated alkoxyl side chain was successfully designed and synthesized. The molecule shows an optical band gap of 1.53 eV, with large extinction coefficient of 2.36 × 105 M−1 cm−1 in solution. Two fluorobenzotriazole based polymers J52 and PBZ-2Si with the same backbone units but different side chains were employed as the donor to construct the active layers that all can demonstrate suitable energy levels and complementary absorptions with i-IEOSi-4F. Relative to J52 only bearing alkyl side chain, PBZ-2Si with siloxane-terminated side chain could induce more balanced carrier transports and more favorable morphology, leading to a higher power conversion efficiency (PCE) of 12.66% with a good fill factor of 71.45%. The efficiency is 21% higher than that of 10.46% for the J52 based devices. Our results not only indicate that siloxane-terminated alkoxyl side chain is valuable for efficient non-fullerene acceptors, but also demonstrate that siloxane-terminated side chain on both polymer donor and small molecular acceptor is a useful combination to realize more efficient polymer solar cells.  相似文献   

16.
无论是不控整流电路,还是相控整流电路,功率因数低都是难以克服的缺点.PWM整流电路是采用PWM控制方式和全控型器件组成的整流电路,本文以《电力电子技术》教材为基础,详细分析了单相电压型桥式PWM整流电路的工作原理和四种工作模式.通过对PWM整流电路进行控制,选择适当的工作模式和工作时间间隔,交流侧的电流可以按规定目标变化,使得能量在交流侧和直流侧实现双向流动,且交流侧电流非常接近正弦波,和交流侧电压同相位,可使变流装置获得较高的功率因数.  相似文献   

17.
This paper is about the analytical calculation of the line side behaviour of an uncontrolled B12-rectifier with capacitive DC-smoothing. The analytical calculation makes it possible to quantify the effects on the line current in a very short time compared to time consuming simulation studies. This publication only deals with the DC-current that has no gaps. The piecewise determined currents on the secondary side of the transformer are transformed to the primary side. After that, the spectrum of the mains current can be determined easily.  相似文献   

18.
Over past few decades, various ways have been conducted through side channel attacks to steal information for a computer system. Unlike conventional hardware-based methods, i.e. power-based side channel, side channel on micro-architecture does not require any physical access to the devices under interest. Instead, only compromised programs need to be co-located on the same machine as the victim. For some other scenarios, malicious users can form side channel information leveraging the timing of program execution. In this survey, we are presenting a comprehensive taxonomy of attack vectors in stack cache memory modules, which mostly are the points of attack by side channel. Due to the significance of side channel attacks, the challenges and overheads of these attack vectors are described through the course of this study. We discuss what side channel attacks are, how they are used, and how they can be prevented through the use of obfuscation techniques. To accomplish this, we introduce the findings of a number of relevant works. These include successful attacks on systems using novel variations of side channel attacks and preventative measures against the attacks.  相似文献   

19.
Small side modes which contain on the average only a few percent of the total output of injection lasers can cause high bit-error rates through power fluctuations. By measuring the RF spectrum and the bandwidth dependence of the statistical power distributions, we have clarified the nature of these fluctuations. We find that although a laser is driven above threshold, an individual small side mode behaves like a chaotic light source, i.e., a laser biased below threshold.  相似文献   

20.
In this paper, it is shown that the uniform power allocation across transmit antennas is optimal in the sense that this strategy maximizes the minimum average mutual information of a multiple-input multiple-output system across the class of any arbitrary correlated fading channels, with constraints on the the total fixed transmit power (P/sub Q/), total power of the fades at the transmitter side (P/sub T/), and total power of the fades at the receiver side (P/sub R/), if the channel state information is perfectly known at the receiver side only.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号