首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 343 毫秒
1.
This article focuses on enriching the communication experience between human beings interacting through different kinds of devices, including mobile phones and PDAs. The key point is how to effectively exploit multimedia data to enhance the richness of communication without overloading the communication channel. To this end, the system tries to minimize the quantity of information transmitted over the networks and to maximize the usage of locally stored information. The proposed system sends several kinds of data, including continuous video, video clips, still images, and avatars, over the communication channel. The specific data that are sent are based on the parameters set by the transmitting and receiving terminals. Bandwidth-consuming data, such as continuous video, are transmitted only occasionally at the receiving terminal. The system has been partially implemented and incorporated in avatar-enabled cellular phones. The user may then easily create different avatars combining components characterizing faces, hair, and so on, and associate them with different callers. When a call comes through, the avatar corresponding to the caller is retrieved and displayed on the screen and the corresponding information is retrieved from the personal database.  相似文献   

2.
The wide spread of communication infrastructures brings with it a natural increase of transmission signals in several areas, in particular in urban environments. In this article we introduce a data model to represent the sensible area from an electromagnetic point of view. The risk analysis has to take into account a plethora of information related to several territorial aspects in order to have suitable knowledge about phenomena. The proposed model is the basis of a distributed sensor network to measure the field values which are used to have real-time monitoring. A prototypical system has been implemented and used in an urban area of the municipality of Napoli.  相似文献   

3.
The global economy is increasingly integrated due to the information and communication revolution. Countries have become more reliant on global supply chains that are driven by digital platforms. As a result, information and communication technology (ICT), international trade, and foreign direct investment (FDI) appear to have become drivers of economic growth. In this paper, we investigate whether this logical assertion is true. More importantly, we examine the interlinks among the variables in the short and long run. Directions of causal links among these variables are complex and sometimes subtle and it is therefore important to establish them through rigorous empirical analysis. For our study, we consider the G-20 countries over 1961–2019. Our study reveals a myriad of underlying temporal links among the variables. The key policy implication of these results is that long-term growth in this group of countries depends on greater co-development and harmonization of policies on ICT, FDI, and trade openness. Moreover, policymakers should be cognizant of the short-run connections between the covariates.  相似文献   

4.
钟东 《移动信息》2023,45(11):16-18
我国已经进入信息化时代,其中信息传播的方式发生了翻天覆地的变化。如果一直采用固定的数据传播方式和播放模式,则无法满足主流媒体个性化发展的需要,违背了时代发展的浪潮,难以进行有效的传播。基于此,文中研究了5G通信技术的优势以及5G通信技术与广播电视技术的融合,探讨了5G通信技术与广播电视技术融合的策略,以期促进广播电视行业的发展。  相似文献   

5.
董孝义 《半导体光电》1996,17(2):106-110
光子学是研究以光子为载体及其应用的一门新兴科学,是当今是未来信息科学的重要支柱,文章对光纤光栅,全光纤光子线路及其集成的研究进展与重要意义进行了评述,并指出:该项研究成果将可能导致现代光通信以及光子学技术产生革命性的突破。因此,应该抓住机遇,把握方向,组织攻关。文章还对重点研究课题提出了建议。  相似文献   

6.
21世纪以来,信息通信网络技术在我国经济发展、国家建设、提高民生质量等诸多领域上都做出了杰出贡献,也极大地促进了我国信息通信网络技术的发展进步。在快速发展的同时,由于我国网络管理结构建设不够完善,体制不够全面,导致信息网络安全管理工作出现不足,极大地影响了我国网络安全。随着网络技术的进一步发展,我们必须提高信息通信网络安全管理,积极利用大数据技术手段,加强我国信息通信网络建设。  相似文献   

7.
众所周知,信息化战争已经成为现代战争中的重要组成部分,如何掌控战场中的制信息权已经成为军事通信领域的主要研究目标。等幅报通信技术作为短波通信方式的一种,其本身所具备的诸多优势使它注定在军事通信技术中始终能占有一席之地。文章首先对短波通信和等幅报的基本概念进行简单阐述,而后总结了短波等幅报在军事通信中的优势,最后就如何进一步加强短波等幅报技术的运用提出了自己的看法。  相似文献   

8.
Uncertainty, Monogamy, and Locking of Quantum Correlations   总被引:1,自引:0,他引:1  
Squashed entanglement and entanglement of purification are quantum-mechanical correlation measures and are defined as certain minimizations of entropic quantities. In this paper, we present the first nontrivial calculations of both quantities. Our results lead to the conclusion that both measures can drop by an arbitrary amount when only a single qubit of a local system is lost. This property is known as “locking” and has previously been observed for other correlation measures such as accessible information, entanglement cost, and logarithmic negativity. In the case of squashed entanglement, the results are obtained using an inequality that can be understood as a quantum channel analogue of well-known entropic uncertainty relations. This inequality may prove a useful tool in quantum information theory. The regularized entanglement of purification is known to equal the entanglement needed to prepare many copies of a quantum state by local operations and a sublinear amount of communication. Here, monogamy of quantum entanglement (i.e., the impossibility of a system being maximally entangled with two others at the same time) leads to an exact calculation for all quantum states that are supported either on the symmetric or on the antisymmetric subspace of a$dtimes d$-dimensional system.  相似文献   

9.
The logic in this paper shows why greater decentralization in business (including 'empowerment') is a response to fundamental changes in the economics of decision-making that are enabled by new information technologies. Our research suggests that a simple pattern of three successive stages underlies many of the changes that are taking place: As communication costs fall, independent decentralized decision-makers are replaced, first by centralized decision-makers, and then by connected decentralized decision-makers. This pattern explains important aspects of economic history in this century, and suggests that empowerment is not just a fad, but likely to become even more important in the next century.The paper also suggests that our very notions of centralization and decentralization are incomplete. When most people talk about empowerment, they are only thinking about going 'halfway' toward what is possible. To fully exploit the possibilities of new information technologies, we may need to expand our thinking to include 'radically decentralized organizations' — like the Internet and market economies.  相似文献   

10.
Early channel reliance research compared different modes of communication to assess relationships among nonverbal and verbal cues. Emerging communication technologies represent a new venue for gaining insights into the same relationships. In this article, the authors advance a principle of interactivity as a framework for decomposing some of those relationships and report an experiment in which physical proximity—whether actors are in the same place ("co-located") or interacting at a distance ("distributed")—and the availability of other nonverbal environmental, auditory, and visual information in distributed modes is varied. Results indicate that both proximity and availability of nonverbal cues affect communication processes, social judgments participants make about each other, and task performance. The authors discuss implications about gains and losses due to presence of nonverbal features.  相似文献   

11.
卢俊  张群飞  史文涛  张玲玲 《信号处理》2019,35(9):1484-1495
探测通信一体化将独立的探测与通信系统集成一起,通过共用一套硬件设备实现目标探测与信息传输功能,相比传统单一的探测与通信系统,其具有节约平台空间、降低平台能耗以及提高平台安全性等优点。首先介绍国内外陆上雷达通信一体化的相关研究,以及陆上与水下探测通信一体化的区别。结合水声传感网络的应用背景,借鉴雷达通信一体化研究技术,针对探测通信一体化亟需解决的共享波形设计、自干扰抑制以及共享信号处理三个问题,讨论了水下探测通信一体化在单基地、双基地、信息化、安全性方面的发展应用。无论是陆上还是水下,探测与通信作为信息系统的两大功能,两者的一体化设计是系统集成化、信息化、智能化的发展趋势之一。   相似文献   

12.
Encryption is an efficient method for information protection in communication links which are subject to wiretapping. In this paper we discuss the application of encryption to satellite communication systems in which the satellite has on-board processing capability. The on-board processor can be used in the key distribution process. Two examples of such processes are described. The first requires the storage in the satellite of one key for each user of the communication system. These are used together with a conventional encryption algorithm (DES, for example) to distribute communication keys to the users. The communication keys are then used to encrypt and decrypt information. The other key distribution process utilizes a trap-door one-way function, whose inverse is implemented in the satellite. The need for storage space in the satellite is smaller than that with the first method.  相似文献   

13.
Risk management are set of processes which include risk identification, risk analysis, risk evaluation and risk implementation. Risk exists throughout the entire life cycle of the project. It is an important guarantee for the success of the project to establish a good risk management mechanism and the risk-based decision-making mechanism. Personal communication tries to connect various telecommunication services to people, one of the key technologies to realise personal communication is to establish an advanced intelligent network--a kind of communication network that can provide and deal with the intelligent new businesses. It is an important guarantee for the success of the project to establish a good risk management mechanism and the risk-based decision-making mechanism.  相似文献   

14.
We investigate the capacity of opportunistic communication in the presence of dynamic and distributed spectral activity, i.e., when the time varying spectral holes sensed by the cognitive transmitter are correlated but not identical to those sensed by the cognitive receiver. We develop a two switch model that captures the localized spectral activity estimates at the transmitter and receiver. The information theoretic framework of communication with side information is employed to characterize the capacity of the cognitive link with both causal and non-causal side information at the transmitter and/or the receiver. These capacity results are used to determine the benefits of any feedforward and feedback information. We find that cognitive radio capacity is robust to the uncertainties arising out of distributed and dynamic spectral environments, even when the communication occurs in bursts of only 3-5 symbols. The capacity depends strongly on the correlation of the local spectral environment at the cognitive transmitter and receiver  相似文献   

15.
The smart grid is an innovative energy network that will improve the conventional electrical grid network to be more reliable, cooperative, responsive, and economical. Within the context of the new capabilities, advanced data sensing, communication, and networking technology will play a significant role in shaping the future of the smart grid. The smart grid will require a flexible and efficient framework to ensure the collection of timely and accurate information from various locations in power grid to provide continuous and reliable operation. This article presents a tutorial on the sensor data collection, communications, and networking issues for the smart grid. First, the applications of data sensing in the smart grid are reviewed. Then, the requirements for data sensing and collection, the corresponding sensors and actuators, and the communication and networking architecture are discussed. The communication technologies and the data communication network architecture and protocols for the smart grid are described. Next, different emerging techniques for data sensing, communications, and sensor data networking are reviewed. The issues related to security of data sensing and communications in the smart grid are then discussed. To this end, the standardization activities and use cases related to data sensing and communications in the smart grid are summarized. Finally, several open issues and challenges are outlined. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

16.
17.
Verbal and nonverbal communication are seen in terms of interacting streams of spontaneous and symbolic communication, and posed "pseudo-spontaneous" displays. Spontaneous communication is defined as the nonintentional communication of motivational-emotional states based upon biologically shared nonpropositional signal systems, with information transmitted via displays. Symbolic communication is the intentional communication, using learned, socially shared signal systems, of propositional information transmitted via symbols. Pseudo-spontaneous communication involves the intentional and strategic manipulation of displays. An original meta-analysis demonstrates that, like verbal symbolic communication, nonverbal analogic (pantomimic) communication is related to left hemisphere cerebral processing. In contrast, spontaneous communication is related to the right hemisphere.  相似文献   

18.
为了更加客观地评估电磁环境复杂度及其对电子信息系统的影响,该文以通信系统为例剖析了电磁环境复杂度根源表征量 信干噪比,建立了电磁环境等级与2FSK, BPSK, QPSK, MSK, QAM数据通信系统性能的映射,并引入电磁环境余量和信号余量概念,给出了面向典型数据通信系统的电磁环境图谱,为实现有用信号强度、电磁环境干扰和噪声信号强度到电磁环境复杂度等级间转换提供了直接途径。以此为基础,研究了面向电子信息系统的极化量提取、实时频谱分析技术,提出了电磁环境测量评估系统组成,分析了其工作原理,设计了面向电子信息系统的电磁环境测量、评估流程。最后,利用数字仿真方式,对于应用MSK/单极天线、64-QAM/偶极天线、QPSK/喇叭天线、2FSK/缝隙天线的4类通信系统,分析了上述系统在同一电磁环境下的不同效应,其复杂度等级分别为III级,V级,IV级和II级。结果显示,面向对象的电磁环境要素测量可有效地获取与电子信息系统相关的电磁环境分量;相同电磁环境下不同通信设备可产生不同效应,这充分验证了电磁环境的复杂度具有明显的相对性。  相似文献   

19.
由于信道情况差的中继对协作贡献小,且消耗额外的能量,基于某种标准选择出一个或者多个好的中继参加协作,可以提高协同通信系统性能,所以中继选择是协同通信系统的研究热点。针对一个发送端、接收端及每个中继都配置单根天线的无线中继网络,在假设发送方不知道信道信息而接收方已知全部信道信息前提下,本文提出了中继未知任何信道信息时的中继选择方案。首先提出基于信噪比最大的单中继选择方案,推导了单中继选择的成对错误概率表达式;其次提出基于中继排序方法的多中继选择方案,推导了选择2个中继的成对错误概率的下界;最后给出了仿真结果。理论与仿真结果都表明,中继未知任何信道信息的情况下,选择2个中继参加协作的系统错误概率却高于单中继选择。   相似文献   

20.
The use of influential network members to facilitate the process of behavioral change has long been a goal of communication campaign designers, particularly in health settings. In a series of 3 studies, measures of 3 types of influential others (those who are highly connected, persuasive, and informed) who play an important role in the dissemination of information through social networks are developed and validated. Across studies, the data were, in the main, consistent with the hypotheses, suggesting that these indices measure what they purport to measure and that they do it with high reliability. The potential for the connectivity, persuasiveness, and health maven constructs to increase the effectiveness of the diffusion of behavioral change is discussed.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号