首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
《IEE Review》2003,49(11):50-53
Ever falling chip geometries are beginning to raise serious doubts as to the long-term viability of flash. Quantum tunnelling is integral to the operation of flash memory, and as chips are getting smaller the ultra-thin tunnelling barrier is becoming increasingly prone to breaking down. A second problem is with the lifetime of flash-based devices, which can be limited to around 100000 cycles. This is fine for some applications, but inadequate where data storage requirements extend over decades. Flash is also quite slow and difficult to program, two problems that are getting more significant as chip areas increase and supply voltages fall. There are three technologies looking to replace flash: magnetic RAM (MRAM), ferroelectric RAM (FRAM) and ovonic RAM. All of these use new materials to create truly nonvolatile memories with long lifetimes. Getting any one of them to replace flash in the marketplace will depend on producing a sufficiently small memory cell, while at the same time minimising the number of additional processing steps required.  相似文献   

2.
Our prototype authoring tool synchronizes computer graphics animation, narration and background music. It lets users visualize the contents of a background music track and narration along a single time line and displays an animation's scenario sharing the same time line. A graphical user interface supports interactive editing of both background music and narration without any loss in quality  相似文献   

3.
Alty  J. 《IEE Review》1997,43(1):11-14
In the world of music, the benefits of computers are widely recognised. In this paper, the author describes how, more recently, the technology wheel has turned full circle with creative musicians now contributing to the development of computer technology  相似文献   

4.
Ainsworth  P. 《IEE Review》1996,42(4):140-142
There is a time bomb ticking away within the world's computers. Come the next millennium and many computer systems will, quite literally, not know what year it is. Here, the author describes the origins of this problem and suggests some solutions  相似文献   

5.
Silk  D.J. 《IEE Review》1988,34(3):120-121
Computer-based fraud is an increasing crime with only one in twenty frauds resulting in a successful prosecution. In order to make systems secure the use of the public key cipher (PKC) system is being introduced. PKC has the advantage that the secret aspect of the process is wholly under the control of the person receiving the information. The use of PKC with a digital signature is discussed  相似文献   

6.
《IEE Review》1997,43(6):256-258
The capabilities of computer algebra extend well beyond the bounds of mathematics. The author describes some of the less obvious ways in which these powerful software packages can come to the help of the busy engineer in many fields, including text processing, graphics etc  相似文献   

7.
《Spectrum, IEEE》2001,38(11):56-60
As in controlling the spread of real diseases, the key to effective defenses against computer viruses is to understand the cause and mechanism of infection, not to focus on the symptoms. A computer virus that erases a user's files may seem very different from one that merely prints out the occasional annoying message, but chances are, they both got into the system in a similar fashion. Malicious software falls, by and large, into three classes: Trojans, viruses, and worms. The way in which these viruses work is explained, as are methods to counteract them  相似文献   

8.
《Spectrum, IEEE》2002,39(12):40-44
An increasing number of other games are taking advantage of changes in computer architecture and the growth in processing power to become smarter than ever before. Although most of these games use relatively unsubtle AI techniques, a few pioneers are even showing the academic AI community a trick or two. While AI originated in the laboratory, it has now been coopted by designers of video games, and work is under way on increasing the learning powers of a video games cast of characters and refining their social interactions with one another and with human players, too. At this point, even cinematographers and the military are showing interest in possible applications. To beat the competition, video games are getting smarter. Game AIs have two big advantages over their academic counterparts-they can cheat, and they can get a lot of help from the world they find themselves in.  相似文献   

9.
10.
《Spectrum, IEEE》2003,40(4):26-31
With a new computer network automated investigative tools, and more channels for sharing information, the FBI hopes to finally know what it knows. The fall of 2001 saw the start of an ambitious program of modernization, which seems to recognize that the barriers that prevent the FBI from analyzing and sharing data are as much cultural as technological. These include accelerating a bureau-wide overhaul of basic computer hardware, software, and network infrastructure and replacing the FBI's ancient DOS-based Automated Case Support (ACS) database with a more user-friendly Windows-based system that can search on not just text but also photos, video and audio records, known as the Virtual Case File system.  相似文献   

11.
《IEE Review》1991,37(6):235-239
All processes need some form of control, even if this only consists of simply switching motors and actuators on and off. In some cases, process parameters must be controlled very precisely. Rule-based control offers more flexibility and better control of such complex processes than more conventional model-based techniques. Here, the author describes how rule-based expert systems have proved their worth in real heavy-industrial applications, and could bring benefits to many others  相似文献   

12.
《Spectrum, IEEE》2001,38(1):80-82
The author discusses power consumption of computers and their peripherals and household appliances which are supposedly switched off. The author examines the claims that the Internet is leading to growth in demand for electricity. The impact of this demand for power on the energy supply industry is also discussed  相似文献   

13.
14.
This paper discusses the use of intrusion detection systems to protect against the various threats faced by computer systems by way of worms, viruses and other forms of attacks. Intrusion detection systems attempt to detect things that are wrong in a computer network or system. The main problems of these systems, however, are the many false alarms they produce, their lack of resistance to both malicious attacks and accidental failures, and the constant appearance of new attacks and vulnerabilities. IBM Zurich Research Laboratory has developed a system that specifically targets worms rather than trying to prevent all breaches of computer security. Called Billy Goat, the specialized worm detection system runs on a dedicated machine connected to the network and detects worm-infected machines anywhere in it. Billy Goat has been proven effective at detecting worm-infected machines in a network. It is currently used in several large corporate intranets, and it is normally able to detect infected machines within seconds of their becoming infected. Furthermore, not only is it able to detect the presence of a worm in the network, it can even provide the addresses of the infected machines. This makes it considerably easier to remedy the problem.  相似文献   

15.
Comerford  R. 《Spectrum, IEEE》1993,30(5):60-61
Terminals using the X Window System are discussed. The open X standard is described, and the restrictions it imposes are noted. Selection criteria for X terminals are examined  相似文献   

16.
《IEE Review》1988,34(7):283-287
ICL is currently implementing a phased CIM strategy at its printed circuit board (PCB) manufacturing site at Kidsgrove. The manufacturing process begins with laminate and components entering the factory, and ends with tested PCBs leaving to be fitted into products at ICL's assembly plants or stored for field spares. The author shows that one of the major problems in installing computer-integrated and flexible manufacturing systems (for PCB production applications) is the integration of existing numerically controlled machines  相似文献   

17.
《Spectrum, IEEE》2003,40(2):42-47
Hardware and software engineers who work in the Wild West of computer audio gather annually at a Texas ranch to tackle their collective challenges, spend the nights in jam sessions, and commune with the emus. This paper describes the seventh annual Project Bar-B-Q, an offbeat and influential three-day retreat for leaders in the field of audio engineering. Their aim is to improve computer audio, and make consumers care more about computer audio in the first place. This long weekend is an opportunity for competitors to work together on divining the challenges that face them collectively.  相似文献   

18.
汽车驾驶模拟器视景的三维动画实现   总被引:4,自引:0,他引:4  
尹念东 《信息技术》2004,28(9):70-72,88
OpenGL(Open Graphic Library)是一个三维的计算机图形和模型库,用户基于OpenGL不仅能够方便地制作三维图形,而且能够实现高质量的三维动画。介绍了OpenGL的变换和动画的原理,设计了汽车驾驶模拟器视景系统的动画层次,视景系统能够实时地提供与汽车运动位置所对应的场景,实现了复杂层次的驾驶视景三维动画。  相似文献   

19.
20.
It is shown that all finite Cayley graphs can be represented by generalized chordal rings (GCR). An example Borel Cayley graph is used to illustrate the generation of GCR representations. A sufficient condition is given for the representation of a Cayley graph as a chordal ring (CR). With the integer labeling of GCR representations, a straightforward, progressive routing algorithm based on table look-up is summarized  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号