共查询到20条相似文献,搜索用时 62 毫秒
1.
2.
网关型ONU作为网关及PON技术的融合,不仅保持了PON原有的管理方式,还支持运营商实现远端管理;PON系统具有高带宽和低成本等优势;在ONU网关上开发融合无线接口,可以在支持传统有线业务的基础上,丰富光纤系统的接口种类;既保持原有优势,又增加系统的无线资源;传统的方法是在有线接入设备上开通无线接入通道,不能实现集中控制和管理;针对现有技术的不足,提出了新的设计方法,采用基于FPGA和嵌入式处理器的方法;进一步给出了详细的实现过程;测试验证表明该设计比原有方案有优势。 相似文献
3.
针对网络传输带宽的瓶颈限制,该文提出一种带宽改造方案,对现有网络进行改造,设计的依据是电话线传输上行链路信号,闭路电视传输下行链路信号。利用现有的网络既可以实现上网功能,又可保持原有电话线路和电视线路的功能,减少重新布线造成的资源浪费,对解决光纤入户的带宽瓶颈问题和今后的家庭智能化提供一种方式。该文改造方案可以增加带宽,提高传输速率。 相似文献
4.
针对网络传输带宽的瓶颈限制,该文提出一种带宽改造方案,对现有网络进行改造,设计的依据是电话线传输上行链路信号,闭路电视传输下行链路信号。利用现有的网络既可以实现上网功能,又可保持原有电话线路和电视线路的功能,减少重新布线造成的资源浪费,对解决光纤入户的带宽瓶颈问题和今后的家庭智能化提供一种方式。该文改造方案可以增加带宽,提高传输速率。 相似文献
5.
6.
7.
8.
介绍一种基于IPQAM的接入网下行带宽扩容系统,并针对该系统中的QAM资源分配问题展开研究.将业务的带宽需求描述为带宽上下限和效用函数,以UMM(Utility Max-min,效用最大最小)公平性为研究目标,设计了一种新的单链路UMM公平分配算法.该算法与基于分段线性函数的算法相比,具有更高的计算精确度,而时间复杂度相似.基于该算法,在兼顾带宽利用率和效用公平性的原则下,设计了QAM频点选择算法和单频点带宽分配算法.仿真结果表明,本文的单链路UMM公平分配算法具有较高的精确度,并且,QAM频点选择算法使得多频点间公平性较好. 相似文献
9.
首先简述Intemet的服务质量保证能力的不足,分析了区分服务的网络系统模型和实现机制,然后提出一种边界结点采用基于TSW的三色标记算法和核心结点采用自适应RIO算法相结合的支持区分服务的路由队列调度和管理方案。最后对该方案的带宽资源使用效率进行分析,能够保证各个流聚集在共享带宽资源的公平性。 相似文献
10.
针对网络化运动控制系统带宽限制和静态分配无法有效利用带宽资源的问题,提出了基于控制性能指标和当前网络状态的动态带宽分配策略.在保证各控制环最小可用带宽的前提下,根据定义的代价函数优化分配剩余带宽资源,实现带宽使用的最小化和系统性能的最大化.从算法实现的角度,按平衡状态、扰动状态和最大需求状态给出了3种典型的带宽分配方案,仿真结果证明了方案的有效性. 相似文献
11.
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China. 相似文献
12.
张涛 《计算机测量与控制》2015,23(1):86-89
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值. 相似文献
13.
本文分析了法律数据库的结构和特点,介绍了采用面向对象设计方法和超文本数据库技术开发和实现法律信息库系统将作为重要网络资源之一为不同用户进行法律咨询服务。 相似文献
14.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times. 相似文献
15.
16.
17.
《中国科学:信息科学(英文版)》2014,(8)
正SCIENCE CHINA Information Sciences(Sci China Inf Sci),cosponsored by the Chinese Academy of Sciences and the National Natural Science Foundation of China,and published by Science China Press,is committed to publishing highquality,original results of both basic and applied research in all areas of information sciences,including computer science and technology;systems science,control science and engineering(published in Issues with odd numbers);information and communication engineering;electronic science and technology(published in Issues with even numbers).Sci China Inf Sci is published monthly in both print and electronic forms.It is indexed by Academic OneFile,Astrophysics Data System(ADS),CSA,Cabells,Current Contents/Engineering,Computing and Technology,DBLP,Digital Mathematics Registry,Earthquake Engineering Abstracts,Engineering Index,Engineered Materials Abstracts,Gale,Google,INSPEC,Journal Citation Reports/Science Edition,Mathematical Reviews,OCLC,ProQuest,SCOPUS,Science Citation Index Expanded,Summon by Serial Solutions,VINITI,Zentralblatt MATH. 相似文献
18.
正Erratum to:J Zhejiang Univ-Sci C(ComputElectron)2014 15(7):551-563doi:10.1631/jzus.C1300320The original version of this article unfortunately contained mistakes.Algorithm 6 should be as follows:Algorithm 6 FGKFCM-F clustering Input:(1)X={x_1,x_2,…,x_N},,x_iR~d,i=1,2,…,N,the dataset;(2)C,1C≤N,the number of clusters;(3)ε0,the stopping criterion; 相似文献
19.
20.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice. 相似文献