首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
孟津观兵激战牧野正当文王壮志满怀,施行仁政,振兴经济,伐纣拯民之图未敢稍怠,惜乎天不假年,賚志而殁,武王即位。在文王奠定周朝事业的基础上,武王继父之业,尊太公为"亚父"、"师尚父",外事商与尚父,内事与弟旦及奭[shì]共议,共襄盛举。太公助武王推行善政,经济发展,人民安康,诸侯归附。经过八年胼手胝足,悉心备  相似文献   

2.
《现代电子技术》2012,(4):61-61
主要栏目有:军事通信,无线通信,通信设备,信息安全,测控技术,数控技术,自动化技术,工控技术,汽车电子,智能交通,新型显示技术,电子技术。嵌入式技术,人工智能与仿真,软件技术,总线与网络,图形图像处理,科学计算及信息处理,航空航天技术,元器件与应用,光电子器件与测试,新型功率器件,电子测量与仪器,集成电路设计,新能源电源,控制与驱动,电能质量。  相似文献   

3.
苹果成功了,最新的预测是五年内将成为全球第一个市值超过万亿美元的IT公司,整个IT界都试图解读它的每个动作,希望找到苹果成功的秘密。事实上,苹果每一代新产品发布,业界拆的拆,砸的砸,但对苹果成功的解读,无不停留于皮毛。一个人如果傲气四射,那还是年少气盛,成不了大事;而一个曾经傲气云天的人,经历折戟沉沙的挫折之后,变得谦逊卑恭,行事步步为营,那大家就得小心了。苹果历来给业界的印象是其产品创意连连,设计精妙,但我行我素,不听外界声音。艺术品般的设计,封闭的系统,极高的溢  相似文献   

4.
明祟祯朱由检(接上期)努尔哈赤1626年逝世,公推皇太极即汗位,此人允文允武,内修政事,外勤征伐,用兵如神,征服朝鲜,统一蒙古,1635年称帝,国号大清。乘农民大起义明廷疲于应付之际,发起了史上有名的松(山)锦(州)之战,历时两年有余,镇边大将洪承畴惨败,  相似文献   

5.
《现代电视技术》2009,(4):155-155
泰克公司日前宣布,泰克公司Cerify开发者联盟(CDC)再添15位新成员,分别是AVECO,AZCAR Technologies Incorporated,Digital Rapids,Flatirons Solutions Corporation,Irdeto,NINSIGHT,Pharos Communications Ltd.,Ruzz TV,Screen Subtitling Systems,SGT,Tedial S.L.,TMD,Vcodes CPS Ltd.,Vizrt和Xytech Systems Corporation。这些新成员的加入使Cerify开发者联盟的成员总数扩大为25个。  相似文献   

6.
蔡磊 《电信技术》2008,(3):67-68
受近期雨雪、冰冻天气的影响,高压线路结冰,一些电力铁塔倒塌,电力部门出于安全的考虑进行限电,从而造成部分地区大范围长时间停电.另外,雨雪天气造成局部地区交通中断,同时由于部分基站所处地势较高,应急抢修人员、发电机无法到达,在电力无法保障的情况下,造成基站退出服务和移动通信中断.  相似文献   

7.
在二手电器商铺的广告页上,见到有款索尼26寸液晶彩电,款式新颖,功能很多,技术含量较高,更喜人之处是内置了BS.CS卫星接收机,且价位合理,于是托了位有路的朋友帮忙代购,以便得到更多的实惠,买到后经初步试用与玩弄,感觉不错,特介绍给各位有兴趣的朋友分享与参考。  相似文献   

8.
绿色,大自然中最令人赏心悦目的颜色,纷繁的世界因为有了绿色而变得生机盎然,生活也因为有了绿色而充满勃勃生机,在人文化的社会生活中,绿色被赋予更多的含义。就如我们在引言中提到的生命、生机,在2008年的春季,绿色奥运让我们看到了中国的生机,绿色带给我们更多新的生命,就如同数码产品的更新换代,不断的推陈出新,一个个更加鲜活的产品出现在我们面前,带来希望,让我们看到2008年市场繁荣的先兆。  相似文献   

9.
三千烦恼丝疯长,该修理一下了,走进那间街坊发廊,剪剪发,聊聊天,发丝落下,顿觉轻松了许多。而对于从事这项平凡工作的理发师傅,电影艺术家会为他们"修剪"出怎样的精彩呢?《缺席的人》坐等客人上门,洗剪吹,听客人或幽默或无趣的胡吹乱侃,每天重复,难免让人有些想法,《缺席的人》(The Man WhoWasn’t There)中的理发师埃迪便不满足于这种单调的生活,打算创业开干洗店,不料却陷入诈骗、勒索、谋杀、车祸的漩涡,这个沉默寡言的木讷理发师如何应对呢?埃迪温和本分,仿佛没有一点火气,甚至直觉妻子多丽丝与其老板戴夫有染也保持哑忍,只是,像《国产凌凌漆》里星爷一样嘴里经常叼着烟,一副既冷漠又心事重重的  相似文献   

10.
告白     
苏少龙 《数字生活》2012,(3):106-107,105
唐代禅师青原惟信说:参禅之初,看山是山看水是水,禅有悟时,看山不是山看水不是水,禅中彻悟,看山仍是山看水仍是水。山山水水,水水山山,有还是无,在我看来,山水自在,人心自得。摄影亦是如此,我的摄影亦是如此。  相似文献   

11.
Graphene, a two‐dimensional, single‐atom‐thick carbon crystal arranged in a honeycomb lattice, shows extraordinary electronic, mechanical, thermal, optical, and optoelectronic properties, and has great potential in next‐generation electronics, optics, and optoelectronics. Graphene and graphene‐based nanomaterials have witnessed a very fast development of both fundamental and practical aspects in optics and optoelectronics since 2008. In this Feature Article, the synthesis techniques and main electronic and optical properties of graphene‐based nanomaterials are introduced with a comprehensive view. Recent progress of graphene‐based nanomaterials in optical and optoelectronic applications is then reviewed, including transparent conductive electrodes, photodetectors and phototransistors, photovoltaics and light emitting devices, saturable absorbers for ultrafast lasers, and biological and photocatalytic applications. In the final section, perspectives are given and future challenges in optical and optoelectronic applications of graphene‐based nanomaterials are addressed.  相似文献   

12.
现代通信网络应能满足各种通信业务和通信容量日益发展的需求,实现话音、数据、视频、IP等业务的一体化综合交换和传输。在比较TDM、IP和ATM三种协议的基础上,提出"采用内置RPR和MPLS功能的MSTP平台"建设光纤综合通信网络平台的实现方法。MSTP采用SDH的数据帧结构,保持了SDH标准光接口、灵活分插低速信号、自愈环保护和功能强大的网管等优点,可对TDM、IP和ATM协议进行优化传输。  相似文献   

13.
Three alternative schemes for secure Virtual Private Network (VPN) deployment over the Universal Mobile Telecommunication System (UMTS) are proposed and analyzed. The proposed schemes enable a mobile node to voluntarily establish an IPsec-based secure channel to a private network. The alternative schemes differ in the location where the IPsec functionality is placed within the UMTS network architecture (mobile node, access network, and UMTS network border), depending on the employed security model, and whether data in transit are ever in clear-text, or available to be tapped by outsiders. The provided levels of privacy in the deployed VPN schemes, as well as the employed authentication models are examined. An analysis in terms of cost, complexity, and performance overhead that each method imposes to the underlying network architecture, as well as to the mobile devices is presented. The level of system reliability and scalability in granting security services is presented. The VPN management, usability, and trusted relations, as well as their behavior when a mobile user moves are analyzed. The use of special applications that require access to encapsulated data traffic is explored. Finally, an overall comparison of the proposed schemes from the security and operation point of view summarizes their relative performance. Christos Xenakis received his B.Sc. degree in computer science in 1993 and his M.Sc. degree in telecommunication and computer networks in 1996, both from the Department of Informatics and Telecommunications, University of Athens, Greece. In 2004 he received his Ph.D. from the University of Athens (Department of Informatics and Telecommunications). From 1998–2000 was with the Greek telecoms system development firm Teletel S.A., where was involved in the design and development of advanced telecommunications subsystems for ISDN, ATM, GSM, and GPRS. Since 1996 he has been a member of the Communication Networks Laboratory of the University of Athens. He has participated in numerous projects realized in the context of EU Programs (ACTS, ESPRIT, IST). His research interests are in the field of mobile/wireless networks, security and distributed network management. He is the author of over 15 papers in the above areas. Lazaros Merakos received the Diploma in electrical and mechanical engineering from the National Technical University of Athens, Greece, in 1978, and the M.S. and Ph.D. degrees in electrical engineering from the State University of New York, Buffalo, in 1981 and 1984, respectively. From 1983 to 1986, he was on the faculty of Electrical Engineering and Computer Science at the University of Connecticut, Storrs. From 1986 to 1994 he was on the faculty of the Electrical and Computer Engineering Department at Northeastern University, Boston, MA. During the period 1993–1994 he served as Director of the Communications and Digital Processing Research Center at Northeastern University. During the summers of 1990 and 1991, he was a Visiting Scientist at the IBM T. J. Watson Research Center, Yorktown Heights, NY. In 1994, he joined the faculty of the University of Athens, Athens, Greece, where he is presently a Professor in the Department of Informatics and Telecommunications, and Director of the Communication Networks Laboratory (UoA-CNL) and the Networks Operations and Management Center. His research interests are in the design and performance analysis of broadband networks, and wireless/mobile communication systems and services. He has authored more than 150 papers in the above areas. Since 1995, he is leading the research activities of UoA-CNL in the area of mobile communications, in the framework of the Advanced Communication Technologies & Services (ACTS) and Information Society Technologies (IST) programmes funded by the European Union (projects RAINBOW, Magic WAND, WINE, MOBIVAS, POLOS, ANWIRE). He is chairman of the board of the Greek Universities Network, the Greek Schools Network, and member of the board of the Greek Research Network. In 1994, he received the Guanella Award for the Best Paper presented at the International Zurich Seminar on Mobile Communications.  相似文献   

14.
As the convergence in digital industry takes shape, the digital networks, both wireline and wireless, are also converging to offer seamless services and enhanced experience to the user. With the arrival of the mobile Internet the mobility is also moving into new areas, e.g., imaging, games, video, multimedia, and across different types of networks. In this paper we explore why, what, and how of the network convergence, and identify how the industry viewpoints align and differ. We also identify the key barriers to achieving true network convergence. We then discuss the role of the Internet Protocol (IP) as the common thread that enables network convergence, and the key industry and standards initiatives to actually provide solutions and the equipment to implement a cost-efficient and high performance converged network. Sudhir Dixit joined Nokia Research Center in 1996, where he is currently a Research Fellow and works on next generation wireless networks. From 1996 to 2003 he was a Senior Research Manager, focusing on IP/ATM, wireless, content networks, and optical networks. Prior to that he worked at NYNEX Science & Technology (now Verizon), GTE (now Verizon), Codex Motorola, Wang, Harris, and STL (now Nortel Europe Labs). He has published or presented over 150 papers, published three books, and holds 14 patents. He is on the Editorial Board of the IEEE Communications Magazine, Springer's Wireless Personal Communications Journal, and KIC's Journal of Communications and Networks. He received a B.E. degree from MANIT, Bhopal, India, an M.E. degree from BITS, Pilani, India, a Ph.D. degree from the University of Strathclyde, Glasgow, Scotland, and an M.B.A. degree from Florida Institute of Technology, Melbourne. He is a Fellow of IEE (UK) and IETE (India). He represents Nokia on the Steering Board of the Wireless World Research Forum, and is also Chair of the SIG on Self-Organization of Wireless World Systems.  相似文献   

15.
组呼通信在指挥调度中有着重要作用,而在一些地面没有基站的地方,就无法正常使用。卫星通信具有无视地形,通信范围广,不易受陆地灾害影响,易于建设等优点。把卫星通信和组呼通信结合在一起的卫星组呼通信技术兼顾两者的优点,能更好的发挥指挥调度这一作用。当前卫星组呼通信采用固定频率方式,组呼成员在一个频率下进行通信,这种方式实用性不好。本文研究的是移动卫星组呼,在GMR-1系统的基础上研究了卫星组呼通信中MAC层的功能,提出了MAC-Ready-Gcc、MAC-Dedicated-Gcc这两个为了支持组呼的状态,并针对在MAC层发生的PTT竞争提出了一种回退策略。  相似文献   

16.
The tremendous momentum toward building a mobile wireless Internet using the Internet Protocol (IP) has thrust many challenges upon the technology developers and the operators. These challenges encompass the 2.5G, 3G, and future solutions and standards. Some of the key issues deal with supporting IP traffic across different wireless and MAC protocols, end-to-end QoS and mobility, traffic engineering and scalability, protection/restoration, operations and management, authentication/privacy/security, billing, and content and context aware networking. This article addresses the drivers, the issues, and solutions (wherever possible) in the above areas, and concludes with a summarization of the challenges that lie ahead.  相似文献   

17.
Towards Mobile Ubiquitous Service Environment   总被引:2,自引:0,他引:2  
In this article we present a perspective on future vision of mobile communications and services which is referred to as Mobile Ubiquitous Service Environment (MUSE). Based on analysis of wireless communications and services, we exploit a conceptual model for MUSE via a top-down approach. The conceptual model consists of three major elements: Terminal Service Environment (TSE), Network Service Environment (NSE) and User Identity (UID). The concept of Always the Best Experience (ABE) is addressed as the hinge in design and development such that the user-centric services could be provided automatically and intelligently in the future diverse wireless world Based on these, we further discuss the issues on design and implementation of architecture of future wireless communication system. Requirements for architecture brought by the new features of MUSE are listed. Moreover, we also address several tradeoffs that should be taken into consideration in design. Finally, the deployment challenges for MUSE, such as reflectiveness of system, security and privacy, as well as peer-to-peer AAA are predicted.Ji Yang received PhD degree on Circuit and System, Bachelor degree on Telecommunication Engineering from Beijing University of Posts and Telecommunications (BUPT) in 2002 and 1993 respectively. Currently, he is an associate professor of BUPT, chief technical supervisor of Wireless Technology Innovation Institute, and vice manager of MTlab of Sino-Germany Software Institute. He leads the research on service and application in Future Forum in China. He also made much contribution to the China Communication Standardization Association (CCSA), including the vision of future Mobile Ubiquitous Service Environment, architecture of future B3G mobile terminal, etc. His research interests include architecture design for mobile ubiquitous networks, theory of self-organization, etc.Zhang Ping is now the professor of Beijing University of Posts and Telecommunications and director of Wireless Technology Innovation (WTI) Institute, BUPT. He has also served on the senior member of C3G Group, China MOST 863 future mobile communication FuTURE project, vice-chairman of China FuTURE Forum, and member of Vision Committee of World Wireless Research Forum(WWRF), he was vice chair of WWRF in 2005. He is also invited as the consultants for many domestic and oversea communication companies. He is very active on the international research activity on Beyond 3G area. He also participated in several European projects such as E2R and MOCCA. Until now, he has published 6 books, around 400 publications in journals and conferences in the area of telecommunications. His main research interests are theory and applications in wireless communication area. He was awarded by government, city of Beijing and Ministry of Information Industry several times for his great contribution to the industry and research activity in China.Hu Zheng is a PH.D candidate in mobile communications engineering in Wireless Technology Innovation Institute (WTI) at Beijing University of Posts and Telecommunications (BUPT). He received B.S degree from Nanjing University of Posts and Telecommunications in 2002, majoring in computer communications engineering. He currently works on serivce aspects of mobile ubiquitous communication system with focus on design and performance evaluation of interaction protocols and services in self-organized service environment.Wang Xu received the B.Tech. degree in electronic engineering from Beijing Polytechnic University (now named as Beijing University of Technology), Beijing, China, in 2002. Now he is working for his Ph.D. degree in Wireless Technology Innovation (WTI) Institute, Beijing University of Posts and Telecommunications (BUPT). His current interests include wireless communications in personal area, ad hoc networks and peer-to-peer system.Li Yinong received the BS degree major in Telecommunication Engineering in 1993 from Beijing University of Posts and Telecommunications, the MS degree and PhD degree major in Telecommunication and Electronic System in 1995 and 2003 from the Beijing University of Posts and Telecommunications. He is currently a lecture of STE (School of Telecommunication Engineering) of BUPT. His main research interests include service modeling, service composition approach, and intelligent service. In BUPT, he has given several lectures to both graduate and undergraduate students such as Information Theory, Speech Recognition, Pattern Recognition and Artificial Intelligence.  相似文献   

18.
随着现代科学和信息技术的不断进步,示波器作为一种电子测量处理仪器也在不断发展并且已经变的越来越精密,也越来越智能.传统的模拟示波器受到低频响应能力和带宽限制等多方面因素影响在很多领域已显得力不从心,虚拟示波器的出现很好的解决了这些问题.本文以LabVIEW18版本为开发平台,设计制作了一款基于声卡的虚拟示波器.重点介绍...  相似文献   

19.
3D monoliths have undergone great progress in the past decades in scientific and engineering fields. Especially, compressible and elastic 3D monoliths (CEMs) hold great promise in a series of applications, such as pressure/strain sensing, energy storage, oil/water separation, and thermal insulation, attributed to their unique mechanical properties and multifunctionality (e.g., conductivity, thermal stability, and high adsorption capacity). Recently, plenty of advanced CEMs have been developed from 1D and 2D building blocks, polymers, and biomass via various methods. Herein, the latest progress in controllable design and preparation of advanced CEMs, which mainly refer to aerogels, sponges, and foams, are reviewed in terms of their structural units and applications. The relationship between structure and mechanical performances of CEMs is discussed. Moreover, their applications in sensing, energy storage and conversion, water treatment, fire‐resistance, and electromagnetic interface shielding are presented. Finally, the challenges and future opportunities of CEMs are also discussed.  相似文献   

20.
This paper investigated the impacts of self-esteem and empathy on cyber bullies, victims and bystanders. Additionally, it also examined their impacts on emotional responses experienced, and actions taken by the perpetrators, victims and bystanders. Self-administered surveys were used to gather data from a large sample of 1263 young adults, mostly university students in Malaysia (Mage?=?20.9?years; SD?=?1.22). The Rosenberg Self-Esteem Scale and Toronto Empathy Scale were used to measure self-esteem and empathy, respectively. Binary logistic regressions revealed no significant impacts of self-esteem and empathy on the participants, regardless of their roles. However, self-esteem was found to have significant relationships with victims’ feeling angry and reporting a cyberbullying incident. As for bystanders, self-esteem also had significant relationships with feeling angry, sad, victim-pity and defending the victims. Empathy had no significant relationships with any of the actions and emotional responses for bullies, victims and bystanders.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号