首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
介绍了一种STEPPER通用测试掩模(UTM)的设计构成及各测试元素图形的作用。在此基础上,分析了电子束制作UTM的误差,并阐述了UTM的测试方法、数据处理及其对STEPPER性能的影响。  相似文献   

2.
LTC台CHANNELBUSY故障的分析和处理天津日电电子通信工业有限公司田建忠TDNWLTMLTE-SSUB×TTESTLINKLCMFREC4LC图1LTC测试原理图LTTILTMLTCLTE-M在NEAX61程控交换机的日常测试和维护工作中,用...  相似文献   

3.
重点介绍了TI(TEXAS INSTRUMENTS)公司的定点信号处理芯征--TMS320C5X。然后,描述利用TMS320C50实现的可变速率可变时序的复分接器。  相似文献   

4.
熊平  卢豫曾 《微电子学》1995,25(5):23-29
降低表面电场原理可大大提高LDMOST的器件性能。本文详细研究了用RESURF原理设计的LDMOST的开态电阻与击穿电压的理论分析模型,并根据这一模型对RESURF LDMOST的优化设计深入的讨论。最后评价了高压RESURF LDMOST在保持器件耐压不变时降低其开态电阻的几种方法。  相似文献   

5.
QUEST7是GNNettest提供的七号信令监测系统的系列产品 ,是从单独的信令监测中心到包括区域监测中心(RSC)和中央监测中心(CSC)的监测体系。QUEST7建立在GNNettest的另两项成熟产品的基础上 :多链路信令分析仪MPA和管理系统QUESTR。MPA是一种先进的信令测试设备 ,支持七号共路信令系统 ,尤其适合智能网、GSM网等复杂信令的测试。QUESTR 则是基于UNIX的经济而高效的电信管理系统 ,最初是为监测电信网络的传输质量而开发的。MPA和QUESTR 在全球范围的电信网络运营维…  相似文献   

6.
THEOUTPUTOPTICALFIELDINTENSITYDISTRIBUTIONFORMEDBYANOPTICALFIBEREND¥YUANLi-Bo(Departmentofphysics,HarbinEngineeringUniversity...  相似文献   

7.
张彦 《电信技术》2000,(8):33-34
对用户交换机进行详细的话务统计和分析可以帮助提高用户交换机的维护质量 ,提高全网接通率。下面结合实际对S12用户交换机统计的方法进行比较。1一般统计(GENERALSTATICTIS)采用一般统计法对S12用户交换机进行统计 ,可分为两种方法。(1)对非商业性用户交换机群的一般统计(COUNTERSPERNONBUSINESSCOMMUNICATIONGROUPPABX)这种方法使用的计数器有 :1226:TERMATT-PBXG1228:TERMCONG -PBXG1240:TERM -OCC -PBXG12…  相似文献   

8.
音频广播的发展经历了由使用模拟技术到使用数字技术的质的飞跃 ,数字化、智能化、网络化是新型广播电台的必然发展趋势。丹麦TELECAST集团为广播电台提供了以光纤和计算机网络为基础的智能化的音频广播工艺网整体解决方案。我们认为 ,TELECAST集团的系统代表了广播电台中心技术最新的发展 ,为广播电台的节目录制、播控系统带来了令人耳目一新的变革。TELECAST集团由SAN DAR、SEEMAUDIO、NTP三家子公司组成 :SANDAR是做视频切换系统的公司 ,SEEMAU DIO主要从事数字播出、制作调音…  相似文献   

9.
高压RESURF LDMOSFET的实现   总被引:6,自引:0,他引:6  
卢豫曾 《电子学报》1995,23(8):10-14
利用RESURF技术,使用常规低压集成电路工艺,实现了适用于HVIC、耐压达1000V的LDMOSFET。本文介绍了该高压LEMOSFET的设计方法、器件结构、制造工艺测试结果,此外,本文还从实验和分析的角度探讨了覆盖在漂移区上面的金属栅-金属栅场板长度LF对RESURF器件耐压的影响。  相似文献   

10.
EMX-500交换机系统带数据丢失的原因分析江苏省徐州邮电局朱小枫EMX-500交换机的系统带最初是由MOTOROLA公司提供的,它共有3个组成部分,即PATCH,SYSGEN(SYSTENGENARATION)和空的CHANGEJOUNAL。前两部...  相似文献   

11.
UTM技术研究   总被引:4,自引:0,他引:4  
随着网络安全威胁更加复杂,单一的安全技术不再满足复杂网络综合性防御的需要,论文阐述了UTM技术在网络安全防御中的重要作用,探讨了UTM技术发鼹的必然,并从架构、典型技术、优点、缺点四方面对UTM技术进行了详细分析,最后提出财UTM技术发展的展望。  相似文献   

12.
浅析UTM设备在信息系统中的应用   总被引:2,自引:0,他引:2  
薛松  顾宁平 《电子工程师》2009,35(4):5-7,19
目前企业信息化系统建设过程中普遍会遇到多重信息安全问题,而传统防护设备种类繁多,类型复杂,同时也带来购买成本及后期维护成本较高的问题。文中介绍了UTM(统一威胁管理)设备作为一种新型信息安全防护设备的起源及发展,对其与传统防火墙设备的防护范围、防护安全威胁的种类等特点进行了对比分析,论证了UTM设备的独特优势,并进一步阐述了UTM设备在各种企业信息化系统建设过程中信息安全方面的合理部署使用,以及纠正了常见的认识误区,证明UTM设备是性价比高、可基本满足企业通常需要的一种新型信息安全防护多功能网关设备。  相似文献   

13.
何建新 《现代导航》2013,4(4):246-251
介绍了UTM格网坐标具有快捷方便、精度高、易识别的特点,提出了利用UTM格网坐标与地形数字高程,构建地形基准数据库的方法。  相似文献   

14.
Jia  Yunjian  Zhang  Yu  Liang  Liang  Xu  Weiyang  Zhou  Sheng 《Wireless Networks》2017,23(5):1645-1654

Mobile Instant Messaging (MIM) applications transmit not only user-triggered messages (UTMs), but also keep-alive messages (KAMs) via radio access network, which induces heavy burden in control plane channel and wastes user equipment (UE) energy consumption. In this paper, we deduce the joint distribution of KAM period and UTM mean interval from the MIM application traffic characteristics. Correlating the joint distribution with radio resource control (RRC) state machine in LTE networks, we derive two analytical expressions for the control plane signaling load and UE energy consumption respectively. Then, the variation of signaling load and energy usage is demonstrated with different settings of RRC release timer, KAM period and UTM mean interval. The analysis indicates that KAM period is the upper bound of RRC release timer when reducing the signaling load. Besides, five times of UTM mean interval is the upper bound of KAM period when reducing the UE energy consumption and signaling load. These results can guide both network operators and MIM application developers to properly set control parameters for balancing the signaling load and UE energy consumption.

  相似文献   

15.
Energy harvesting by using functional materials in suspension systems bear potential to win-back certain (even if low) amounts of vibrational energy, otherwise dissipated via the conventional (passive) dampers. Piezoelectric (PE) ceramics are functional materials that can be used for transforming mechanical energy into electrical and vice versa. In this paper, we study the capabilities and efficiency of energy harvesting (EH) with PE transducers under two different kinds of external excitation: i) Periodic and ii) stochastic. An appropriate nonlinear lumped parameter electromechanical model (LPEM) is brought into the two-port network notation. Laboratory experiments were conducted under periodic external force-controlled excitation performed on a universal test machine (UTM). The two-port model parameters were identified and the model was validated by comparing results of numerical simulations and experiments. Extended simulations have been conducted to investigate the EH capabilities of PE transducers in automotive applications, i.e. EH in suspension systems under the standardized road conditions. The analysis results of the power conversion and EH efficiency are presented and discussed.  相似文献   

16.
随着攻击技术的不断成熟,各类攻击逐步从网络层向应用层发展,单一功能的安全防护设备虽然专业性强,但往往需要多台设备配合,协调性、可维护性、投入成本往往不尽如人意。而优秀的UTM产品往往具备基于应用协议层防御、低误报率检测、高可靠高性能平台和统一组件化管理的特点。  相似文献   

17.
A huge amount of sensitive personal data is being collected by various online health monitoring applications. Although the data is anonymous, the personal trajectories (e.g., the chronological access records of small cells) could become the anchor of linkage attacks to re-identify the users. Focusing on trajectory privacy in online health monitoring, we propose the User Trajectory Model (UTM), a generic trajectory re-identification risk predicting model to reveal the underlying relationship between trajectory uniqueness and aggregated data (e.g., number of individuals covered by each small cell), and using the parameter combination of aggregated data to further mathematically derive the statistical characteristics of uniqueness (i.e., the expectation and the variance). Eventually, exhaustive simulations validate the effectiveness of the UTM in privacy risk evaluation, confirm our theoretical deductions and present counter-intuitive insights.  相似文献   

18.
网络威胁种类和数量迅速增加,传统信息安全防护手段难以有效解决网络安全问题,对图书馆应用系统的正常使用构成较大影响。按照"软硬兼施、协同组合"的思路,部署UTM设备和内网安全管理软件,从网络关口和网络终端两个边界角度对图书馆网络安全进行分析,将两个安全边界的防护手段进行统一和组合,形成完整的边界安全防护方案,实现协同配合、精准控制和一体化管理,更好地保护图书馆网络和数字资源。  相似文献   

19.
金钊 《电子科技》2007,(4):18-21,26
通用串行总线技术是一种为实现计算机与各种外设进行数据交换提出的工业标准。它具有快速、双向、支持实时传输、支持即插即用等技术优点。其控制核心包括USB主机控制器和设备控制器。文中设计了符合USB2.0规范的USB设备控制器IP软核。首先通过对USB2.0设备控制器进行分析,为设计划分层次和模块;然后逐个模块地进行结构设计和细节设计;最后对USB设备控制器的设计进行整体逻辑功能仿真。  相似文献   

20.
The goal of the project described in this paper is to build a prototype of an operational system, which will provide registration within subpixel accuracy of multitemporal Landsat data, acquired by either Landsat-5 or Landsat-7 Thematic Mapper instruments. Integrated within an automated mass processing system for Landsat data, the input to our registration system consists of scenes that have been geometrically and radiometrically corrected, as well as preprocessed for detection of clouds and cloud shadows. Such preprocessed scenes are then georegistered relative to a database of Landsat chips. This paper describes the entire registration process, including the use of landmark chips, feature extraction performed by an overcomplete wavelet representation, and feature matching using statistically robust techniques. Knowing the approximate longitudes and latitudes or the UTM coordinates of the four corners of each incoming scene, a subset of the chips that represent landmarks included in the scene are selected to perform the registration. For each of these selected landmark chips, a corresponding window is extracted from the incoming scene, and each chip-window pair is registered using a robust wavelet feature-matching methodology. Based on the transformations from the chip-window pairs, a global transformation is then computed for the entire scene using a variant of a robust least median of squares estimator. Empirical results of this registration process, which provided subpixel accuracy for several multitemporal scenes from different study areas, are presented and discussed.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号