首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
《数字通信世界》2006,(11):95-95
President Zhao Jibin of China Titong goes to Jiangsu to do some surveys and after listening to the working report of Jiangsu Tietong, he inspects the network development in Nanjing, Suzhou, Changzhou and other cities. Zhao JiBin emphasizes China Tietong should be on the way of "enlarge private network coverage and make great progress in network regionalization", make every effort to lay a solid management foundation and improve management level so as to ensure the accurate orientation and implement of the whole development strategy. All members of China Tietong must hold a clear understanding about future development direction.  相似文献   

2.
Smartphone use by adolescents is increasingly attracting the interest of social scientists, parents, and educational stakeholders (teachers, educators, educational policy makers), generally in a negative context. There are, however, many myths surrounding the issue, resulting from the reproduction of stereotypes about the psychosocial functioning of adolescents in cyberspace, as well as inadequately constructed research tools that measure how new media are used. This text is an attempt to show the phenomenon of problematic Internet use through the prism of screen time measured using real data from smartphones. The research was conducted in first half of 2022 among adolescents aged 13–19 in Bosnia and Herzegovina (N = 1185, mean age = 15.47 with standard deviation = 1.84). The research was implemented using a triangulation of tools such as the Smartphone Addiction Scale (SAS Scale), Software Installed on the Smartphone (SIS Scale), The Bergen Social Media Addiction Scale (BSMAS), and the Screen Time Scale (STS). From the data collected, it was noted that: 1) Screen time correlates weakly with problematic smartphone use and social networking; 2)The average period of smartphone use in the study group is 3 h49 minutes per day, of which 37 min are related to web browsing, while 2 h22 minutes are related to social networking; 3) A quarter of adolescents use a smartphone more than 5.5 h per day, of which more than 2 h15 minutes is screen time related to social media; 4) Approximately half of the respondents use smartphones slightly more than 2 h per day; 5) Girls use smartphones for longer than boys; 6) Place of residence (city or countryside) does not affect screen time; 7) Screen time is related to a medium degree to the type of software installed on the smartphone; 8) There is a need to refine the measurement methodology of screen time and to abandon self-declaration in this area.  相似文献   

3.
4.
The objectives of this study are to investigate (1) the positive effects of smartphone users’ core self-evaluations (CSEs), online consumer conformity, and the social identity of their emotions, (2) the effects of their positive emotions on their trust, and (3) the effects of their trust on their intention to purchase paid apps and willingly engage in co-production. A questionnaire was employed to examine the relationship between the users’ CSEs, online consumer conformity, and social identity, on the one hand, with their intention to purchase paid apps and willingly engage in co-production on the other hand. The findings were as follows: (1) CSE, online consumer conformity, and social identity positively affected the users’ emotions, (2) positive emotions had a significantly positive effect on user trust, and (3) trust had significantly positive effects on the users’ intention to purchase paid apps.  相似文献   

5.
电脑天天都降价,我该怎么办?等到什么时候?  相似文献   

6.
7.
8.
9.
10.
Patent protection is the most difficult intellectual property protection to acquire but it is also the most powerful. I am frequently asked the question, What is patentable in the United States? The answer is that four requirements must be satisfied in order to attain and maintain patent protection in the United States. Those four requirements correspond to sections of the patent statute that are located under title 35 of the United States Code (35 U.S.C.): 101 (statutory subject matter), 102 (novelty), 103 (non-obviousness) and 112 (certain written requirements). This article will detail those four requirements and focus on how they relate to inventions relating to circuits and systems.  相似文献   

11.
12.
With the development of both optical fiber-based communication and sensation, one interesting topic has been pointed out. How to connect those mountains of sensors to detect the signal in a large area, and how to make the cost of sensing system lower enough should be studied. A network of sensors is a good option. All sensing equipments, including the interrogators and the sensors, will be internetworking together. However, fiber optic communication networks have been developed very well over the past two decades. Is it necessary to rebuild a new network for sensors? In this paper, some new technologies in the two areas of fiber optic sensors and fiber optic communication will be addressed. Then, the available overlay architecture of a fiber optic sensors network will be presented. Finally, a polymorphous optical burst switching (POBS)-based architecture will be proposed, which can support all kinds of services, including digital data optical circuit/burst/packet switching and analog fiber optic sensor signal circuit/burst switching, etc.  相似文献   

13.
Providing an efficient and stable communication framework of Vehicular Ad hoc Network (VANET) is an emerging issue. Most of conventional VANET communication schemes only support short range transmission, vehicles need to relay traffic data or frequently switch to different roadside units. Such an ad hoc-based method suffers a high jitter delay and makes it difficult to develop travel and real-time multimedia services, such as traffic information dissemination and fleet management. Fortunately, existing novel wireless technologies, e.g. WiMAX mobile multi-relay (MMR), provide long transmission range and high transmission rate in mobile environments. This study presents a Safety/Vehicular Information Delivery (SVID) framework, an application-layer VANET communication protocol. A power-abundant, large size vehicle, called SIP-based relay vehicle (SRV), e.g. long distance transportation bus, plays as a relay station (RS) providing the connectivity to other small vehicles around it. To provide VANET services in SVID, this work adopts a SIP-based mechanism. The proposed scheme can provide more efficient communication than conventional VANET ad hoc mode. Simulation results show that the proposed scheme achieves a low SIP transaction time, jitter delay, frame loss rate while avoiding the broadcast storm problem.  相似文献   

14.
The increasing number of radio access technologies and the availability of multi-radio devices boost the need for novel resource allocation schemes in cellular networks. This paper uses a cooperative game theoretic approach for resource allocation at the network level, while utilizing simultaneous use of available radio interfaces at the device level. We model resource allocation management using the well known bankruptcy model and apply Kalai-Smorodinsky bargaining solution method to find a distribution rule, based on which we propose resource allocation and call admission control schemes. Performance analysis of our allocation and control schemes demonstrates significant improvements over previous approaches in terms of utilization of the available bandwidth and the number of call drops. We also study the performance of proposed approach for different operator policies.  相似文献   

15.
Management consultants appear to be particular knowledge workers that are characterised by an expert and self-sufficient profile. The aim of this research is to understand whether their professional characteristics still allow them to share knowledge and lead them to use a formal network (through a knowledge management system, kms) or an informal one (person-to-person). To study their kms using and sharing behaviour, a qualitative case study methodology was adopted, based on observation and multi-hierarchical ranking, multi-site, partly-structured interviews among consultants within the same consulting firm. The results firstly show that use and knowledge-sharing behaviours are differently influenced by practical and social characteristics; moreover, the social professional context of these self-sufficient experts encourages most of them to share knowledge within a more informal network.  相似文献   

16.
The increasing use of network monitoring and the growth of the Internet and intranets are converging trends that make IP network infrastructures the logical means of delivering network monitoring, using browser ‐bused clients. Copyright © 1999 John Wiley & Sons, Ltd.  相似文献   

17.
Editor's note: Longtime Alternatives columnist Bob Creo, a veteran Pittsburgh neutral, is revisiting his classic CPR Institute website columns of a decade ago in a Back to Basics Series that he has subtitled “Human Problems, Human Solutions.” In his recent Master Mediators columns, Creo has focused on neuroscience, psychological factors and cognitive biases that affect dispute resolution. These updated Back to Basics columns, in print for the first time, began in November, revisiting mediation‐room techniques and practice issues. This month, the focus is on how the humanity and values of the mediator align with the process and the participants.  相似文献   

18.
In this paper, we investigate experimentally and via simulation the pros and cons of a narrow filter receiver for differential quadrature phase-shift keying based on a single optical filter and eschewing the conventional asymmetrical Mach-Zehnder interferometer structure. We quantify the performance differences between the two receivers, allowing system designers and operators to determine when the less complex narrow filter receiver might be the appropriate choice. We numerically optimize the 3-dB bandwidth and center frequency of the narrow filter and show it is more robust to carrier frequency detuning than the conventional solution. We show that the narrow filter receiver is more tolerant to chromatic dispersion (CD) than the conventional one, and equally tolerant to first-order polarization-mode dispersion. We show the impact of the 3-dB bandwidth on the receiver performance when CD accumulates. Finally, we show via experiments and simulations that the 3 dB advantage of the conventional receiver vanishes when the nonlinear impairments are fiber nonlinearities; comparing the two receivers at the optimum launch power for a 25 times 80 km system, the difference in optical SNR margin is reduced to ~1.6 dB. Experiments are conducted at 42 Gb/s using a commercially available narrow filter for reception.  相似文献   

19.
Smart sensor network arises as a new generation of sensor networks, where a crowd of possibly anonymous volunteers are involved in the tasks of collecting data from the surrounding environment and providing it to the community. In this paper, we analyze one of the main questions, often forgotten, in these scenarios: whether or not we can trust the sensor readings provided by the individuals engaged in the sensor network. We introduce a data reliability architecture capable of filtering and validating sensor readings in an open environment, where not all users are equally honest. Simulations based on a real world smart sensor application allow us to make a first analysis of the proposed architecture's performance and the variables that have a significant impact on this performance. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

20.
Zakheim  D.S. 《Spectrum, IEEE》1999,36(3):29-31
Could a small country develop the capability to hit the United States with a long-range unconventional weapon during the first decades of the next century? Most certainly one could. But whether such a state would be inclined to try is an entirely different matter. The risk is real. Congress learned in 1998, according to “The Report of The Commission to Assess the Ballistic Missile Threat to the United States”, that the United States has entered “a new nonproliferation environment” in which there is a far greater availability of ballistic missiles and weapons of mass destruction. The main points of the report are discussed and a table is given showing the ballistic missile types held by lesser powers  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号