首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
本文介绍了光纤CATV网结构,HFC“三网合一”集成接入系统的网络结构、系统功能、实现方法,并结合现代企业CIMS网络工程,提出企业HFC系统设计方案。  相似文献   

2.
HFC网络计费管理的分析与研究   总被引:2,自引:0,他引:2  
罗静  汪敏 《计算机工程》1999,25(8):97-98
对HFC网的Internet服务计费机制进行了分析和设计,讨论了针对HFC网的用户接入特点,分析了计费系统中的一些关键问题和难点,从而提出解决方法。  相似文献   

3.
ACOUNTER-EXAMPLETOAFASTALGORITHMFORFINDINGTHECONVEXHULLOFASIMPLEPOLYGONGodfriedToussaintACOUNTER-EXAMPLETOAFASTALGORITHMFORFI...  相似文献   

4.
分析与评测     
《计算机》2000,(42)
扩展定位音效艺片CMI8738/PCI-6CHHRTF C3D Extension Positional Audiocom ChipC-Meda5.1CH功能演示系统硬件: PC(8738 6CH)-功放(Amplifier-5.1音箱 软件:4/6CH DEMO V2. 5 HRTF 3D 技术 1. HRTF 的来源和标准 HRTF 3D 来源及标准 HRTF是 Head Related Transfer Function的缩写,译为“头部相关传递函数”,最出名的就是 Sensaura的 HRTF 3D,而 C- Med…  相似文献   

5.
仿人智能控制与模糊控制神经网络融合技术   总被引:10,自引:0,他引:10  
章兢 《控制与决策》1999,14(5):428-432
在分析了仿人智能控制器(HIC)的特性基础上,针对其不足,提出将仿人智能控制器与模糊控制相融合的仿人智能模糊控制器(HIFC),实践表明HIFC的性能大大优于基本HIC和一般模糊控制器。最后提出一种正交基函数神经网络模型实现HIFC的方法,为HIFC的自学习提供了一条有效途径。  相似文献   

6.
非线性对流-扩散方程的高阶特征-差分格式及其误差估计由同顺(南开大学数学系)HIGH-ORDERCHARACTERISTIC-DIFFERENCESCHEMESFORTHENONLINEARCONVECTION-DIFFUSIONEQUATIONAN...  相似文献   

7.
校园网的HFC宽带Internet接入   总被引:1,自引:0,他引:1  
本文介绍了Internet接入技术,并重点阐述了HFC(光纤同轴混合)网接入技术和深职院校园网HFC宽带Internet接入方案与实施,特别对实施过程中遇到的特殊问题进行分析并给出了解决方案。  相似文献   

8.
IP电话采用的信道复用和基于分组交换的传输技术提高了线路传输利用率。HFC网双向改造的完成和 DOCSIS的不断完善为开展 IP电话增值业务提供了理想的接入网平台。本文研究了IP电话技术的现状、发展趋势,以及 IP电话的标准 H.323规约、 SIP、 MGCP、 RTP/RTCP和RSVP。最后介绍了一种国内开发的 HFC网上IP电话应用系统。  相似文献   

9.
本文介绍了INTERENT接入技术,并重点介绍了HFC网接入技术和深圳职业技术学院校园INTERNETHFC接入方案与实施。  相似文献   

10.
(接上期)HFC业务的关键技术 HFC网络可以提供的业务有语音(如电话)、数据传输(如计算机通信、电子邮件)、视频传输(如 VOD/NVOD、模拟/数字广播电视)等,基本上综合了当今的新技术。HFC宽带网业务的关键技术要解决4个问题:数字压缩技术、宽带交换技术、有限制接受系统和HFCLAN互联技术。 数字压缩技术:带宽一直是困扰通信界的大问题,尤其是传输数字化的运动图像。如何充分利用现有带宽传输尽可能宽的信号就自然而然地成为摆在我们眼前的课题。数字压缩编码这一新技术的出现给解决带宽的问题提供了途径…  相似文献   

11.
Competitive facility location problems have been investigated in many papers. In most, authors have applied location models with two competitors. In this paper three companies, which are mutually competitive, intend to locate their facilities in a linear market. It is well-known that Nash equilibrium solution for location problem does not include three competitive facilities. In this paper we present the optimal location strategies for three facilities. In our model we assume that the demands are continuously distributed in a linear market and the facilities are locating according to a specific order of sequence, A, B and C. We apply the Stackelberg equilibrium solutions for competitive location problems with three facilities. In our model, we consider the decision problems in three stages. In the first stage, we decide the optimal location of facility A, which is located optimally in respect to the remaining two facilities B and C. In the second stage, we determine the optimal location of facility B which is optimally located in respect to facility C, by utilizing the information on the location of facility A. Finally in the third stage problem we decide the location of facility C, optimally located by utilizing the information on the location of A and B. In the first stage, we need the optimal solutions of the second and third stages. In the second stage we need the optimal solution of the third stage problem. Therefore, first we solve the third stage problem which is the simplest. After that, we solve the second stage problem utilizing the optimal solution strategy of the third stage problem. In this paper we present the optimal location strategies for three facilities.  相似文献   

12.
13.
In this paper we study the application of divergence-free wavelet bases for the analysis of incompressible turbulent flows and perform several experiments. In particular, we analyze various nominally incompressible fields and study the influence of compressible perturbations due to experimental and computational errors. In addition, we investigate the multiscale structure of modes obtained from the Proper Orthogonal Decomposition (POD) method. Finally, we study the divergence-free wavelet compression of turbulent flow data and present results on the energy recovery. Moreover, we utilize wavelet decompositions to investigate the regularity of turbulent flow fields in certain non-classical function spaces, namely Besov spaces. In our experiments, we have observed significantly higher Besov regularity than Sobolev regularity, which indicates the potential for adaptive numerical simulations.  相似文献   

14.
In this paper, we propose a new fully computerized image analysis method for measuring the thickness of muscles from ultrasound image obtained by muscle endurance test using morphological information of fascia and thoracic vertebra. Firstly, we divide the image into lumbar region and thoracolumbar region by the difference of density in image for measuring the thickness of muscles. In lumbar region, we notice that the intensity of fascia is relatively higher than other parts. Thus, we measure the thickness of muscles surrounding the fascia area. In the process, we apply median filter to candidate fascia areas for extracting candidate muscle layers between fascias. Then, the thickness of muscles we measure is that of the third layer. In thoracolumbar region, we apply region expansion method for classifying the region into subcutaneous fat part and part including thoracic vertebra. Then, we apply counting method and evolutionary computation search model to find the measuring location that is in between subcutaneous fat area and thoracic vertebra. In experiment, the proposed method is effective in measuring the thickness of muscles and avoids failures of previous studies. The performance of this approach is sufficiently comparable to that of medical experts.  相似文献   

15.
We study knowledge-based systems using symbolic many-valued logic and we focus on the management of knowledge through linguistic concepts characterized by vague terms or labels. In previous papers we have proposed a symbolic representation of nuanced statements. In this representation, we have interpreated some nuances of natural language as linguistic modifiers and we have defined them within a multiset context. In this paper, we continue the presentation of our symbolic model and we propose new deduction rules dealing with nuanced statements. We limit ourself to present new generalizations of the Modus Ponens rules dealing with nuanced statements.  相似文献   

16.
In this paper, we cast the design ofDelta-modulated control of a high-order system into the study of control Lyapunov functions. We classify the complex dynamics of the closed-loop system in three cases. In the first case, we show how Delta-modulated feedback introduces a finite set of globally attracting periodic points. We find the numbers and periods of all possible such periodic orbits. In addition, we characterize the attracting region for each of such periodic points. In the second case, we show that there is a maximal "stabilizable" region, and inside this region, there is a local attractor. In the last case, we show that all the states stabilizable by the Delta-modulated feedback constitute a Cantor set. This Cantor set is a repeller, and the closed-loop system is chaotic on the Cantor set  相似文献   

17.
Summary In this paper we study the convergence order for iterative multipoint procedures with memory and we determine also upper bounds for such an order. As a particular case, from the formulae we have deduced, we also obtain the convergence orders of iterative multipoint procedures without memory. In addition we fix the conditions which are necesary and sufficient to make such procedures optimal.  相似文献   

18.
In this paper, we discuss a number of current and future research directions in network optimization. First, we categorize current research efforts as primarily methodological or primarily applied and we carefully define the boundaries of each class. In addition, we survey the present capabilities of network algorithms. Next, we delineate objectives in each class. Finally, we list several network problems for each class that should, in our opinion, be investigated and we give pertinent background information.  相似文献   

19.
本文首先介绍了软件系统的开发背景和预期要达到的目标,然后在系统的体系结构上进行了简单的分析,在使用的关键技术进行了简单的介绍,对系统在系统安全方面进行了详细的介绍,最后介绍了整个软件系统的特点.  相似文献   

20.
基于智能卡的电子商务身份认证模型   总被引:2,自引:0,他引:2  
讨论了使用智能卡来完成身份认证功能的技术可行性,最后提出了保护智能卡系统免受攻击的几种方法。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号