首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 343 毫秒
1.
《电信网技术》2009,(1):52-58
介绍了EPON的几种典型应用模式,包括驻地网应用模式、大客户专线应用模式、农村信息化应用模式、视频监控承载应用模式、无线基站应用模式、EPON+EoC应用模式。分析了几种应用模式的应用场合和优缺点。  相似文献   

2.
首先介绍了互动电视应用领域的新技术趋势-应用流化技术,以及基于应用流化技术实现的应用的模式。针对传统应用商店的工作模式,结合应用流化技术的特点,实现融合应用商店模式的升级。从技术层面,应用流化技术与传统应用相结合,配合传统应用下载模式的融合管理,提出融合应用商店的运作模式。  相似文献   

3.
《中国新通信》2010,(2):70-72
3G应用分为个人应用和行业应用。行业应用是3G发展的未来,个人应用的重点在将有线与无线结合在一起的家庭应用。  相似文献   

4.
为对各种电视应用进行运营和管理,提出一种互联网电视应用商店的设计和实现方法。在该方法中,电视应用商店与应用管理平台互相配合完成互联网电视应用管理和运营功能,具体包括应用上传、应用发布、应用下载、应用下线功能。另外,还对电视应用商店的管理流程进行阐述。  相似文献   

5.
本文从数字水印技术的一般应用原理、广播电视应用、数字电视应用、胶片电影应用、数字电影应用5个方面,详细介绍了该技术在视频产品安全中的应用.  相似文献   

6.
随着IT系统规模和范围的扩大,在应用系统中,应用层面的安全问题仍然是复杂和具有挑战性的工作。论文概述了公钥基础设施(PKI)在应用系统中的应用和建设问题,并在总结国内很多成功的应用安全建设项目的基础上给出了应用安全支撑系统的设计理念,此理念主要是将PKI基础设施和应用相对分离,使用应用安全支撑系统将PKI基础设施和应用更好地进行连接。应用安全支撑系统的存在将很大程度解决PKI和应用很难集成的问题,并能在一定程度上将安全和应用相对分开,使得PKI技术更能在应用中得到普及和使用。  相似文献   

7.
目前,全球主流应用分发平台是应用程序商店,而通过操作系统平台构建的垂直应用程序商店则是应用商店中最具竞争力的渠道。在我国,第三方应用商店是主流的应用分发渠道,市场呈现寡头控制格局,且面临中长尾应用难以有效分发、各应用商店同质化现象严重、国内应用商店监管运营机制不完善等问题。近来出现的全功能轻应用、应用内搜索等应用分发新模式,为我国应用分发平台突破发展瓶颈创造了可能。  相似文献   

8.
陈文祥 《电子技术》2024,(2):180-181
阐述计算机辅助技术在数控加工制造中的应用价值,探讨其具体应用,包括CAD/CAM技术的应用、模拟和仿真技术的应用、数据管理和集成技术的应用。分析数控加工中计算机软件的应用要点。  相似文献   

9.
蓝牙耳机应用模型在PC机上的实现和应用   总被引:2,自引:0,他引:2  
孙涛  石建军 《通信技术》2009,42(2):230-232
基于蓝芽技术的应用模型有很多种,文章讲到的蓝牙耳机应用模型(Headset Profile)就是其中的一个,它依赖于蓝牙应用规范中的2个通用的应用模型GAP(通用访问模型)和SPP(串口应用模型)。文章给出了蓝牙耳机应用的基本概念及其应用模型并在PC机上实现了该应用,该应用使用户摆脱了电缆线(耳机线)的束缚,能够在较大的自由空间内通话。  相似文献   

10.
应用数学促信息化应用深入发展   总被引:1,自引:0,他引:1  
本文构建了应用数学促进信息化应用的关系框架,重点阐述了未来应用数学在信息化领域中的四大重要应用方向,包括网络技术、图像处理以及模式识别、数据加密和身份认证、数据挖掘技术,得出应用数学与信息化结合的作用结果,包括利用应用数学工具扩大信息化应用广度、深度,并对现有应用发展进行支持和优化,提高信息化的价值,支持决策分析,同时也使应用数学自身得到发展  相似文献   

11.
This article provides an overview of opportunities and challenges related to joint deployments of macro and femtocells. It provides insights on possible deployment architectures for femtocells along with an analysis framework for quantifying macro offloading benefits in realistic network deployment scenarios by means of advanced performance analysis techniques. Such benefits include potential enhancement in quality of radio signals for users served by the macro network in joint macro-femto deployments. This in turn translates into potentially better data rates (throughput) for macrocell users and may offer the possibility of adding more users to the macro network while preserving the network configuration -- resulting in direct capital expenditure savings. The approach taken in this article consists of creating a framework for quantifying macro offloading benefits in joint macro-femto deployments. A baseline configuration where all users (indoor and outdoor) are served by a traditional macro network (state-of-the-art macro only network) is considered first. The analysis is followed through joint macro-femto deployments, where femtocells serve indoor users. Through comparison of the baseline configuration and the joint macro-femto analysis, we quantify the benefits of the joint macro-femto deployment.  相似文献   

12.
In Release 17, 3GPP introduced adaptations and enhancements to the 5G new radio (NR) specification to support non-terrestrial networks (NTNs) operation. The main challenges were due to long propagation delays, especially in GEO deployments, and the movement of the satellites in LEO deployments. In this paper, we give an overview of the protocol adaptations to support NTNs. The main user plane protocol adaptations include changes to random access and hybrid automatic repeat request to due long propagation delays. The control plane protocol adaptations include a variety of mobility related enhancements for user equipment.  相似文献   

13.
We use a constrained optimization framework to derive scaling laws for data-centric storage and querying in wireless sensor networks. We consider both unstructured sensor networks, which use blind sequential search for querying, and structured sensor networks, which use efficient hash-based querying. We find that the scalability of a sensor network's performance depends upon whether the increase in energy and storage resources with more nodes is outweighed by the concomitant application-specific increase in event and query loads. We derive conditions that determine: 1) whether the energy requirement per node grows without bound with the network size for a fixed-duration deployment, 2) whether there exists a maximum network size that can be operated for a specified duration on a fixed energy budget, and 3) whether the network lifetime increases or decreases with the size of the network for a fixed energy budget. An interesting finding of this work is that three-dimensional (3D) uniform deployments are inherently more scalable than two-dimensional (2D) uniform deployments, which in turn are more scalable than one-dimensional (1D) uniform deployments.   相似文献   

14.
In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with legitimate in-network communication. In this article, we introduce Secure Walking GPS, a practical and cost effective secure localization and key distribution solution for real, manual deployments of WSNs. Using the location information provided by the GPS and inertial guidance modules on a special master node, Secure Walking GPS achieves accurate node localization and location-based key distribution at the same time. We evaluate our localization solution in real deployments of MicaZ. Our experiments show that 100% of the deployed nodes localize (i.e., have a location position) and that the average localization errors are within 1–2 m, due mainly to the limitations of the existing commercial GPS devices. Our further analysis and simulation results indicate that the Secure Walking GPS scheme makes a deployed WSN resistant to the Dolev-Yao, the wormhole, and the GPS-denial attacks, the scheme is practical for large-scale deployments with resource-constrained sensor nodes and has good localization and key distribution performance.  相似文献   

15.
Wireless Personal Communications - Centralized radio access network (CRAN) is getting considerable attention in 5G radio access network infrastructure because of supporting deployments of small...  相似文献   

16.
Geetha  N.  Mahesh  K. 《Wireless Personal Communications》2022,126(2):1553-1575
Wireless Personal Communications - Users in practical cellular geographical areas are found to be non-uniformly distributed. Small cell (SC) deployments in heterogeneous user distribution in a...  相似文献   

17.
Deployments over large geographical areas in the Internet of Things (IoT) pose a major challenge for single‐hop localization techniques, giving rise to applications of multi‐hop localizations. And while many proposals have been made on implementations for multi‐hop localization, a close understanding of its characteristics is yet to be established. Such an understanding is necessary, and is inevitable in extending the reliability of location based services in IoT. In this paper, we study the characteristics of multi‐hop localization and propose a new solution to enhance the performance of multi‐hop localization techniques. We first examine popular assumptions made in simulating multi‐hop localization techniques, and offer rectifications facilitating more realistic simulation models. We identify the introduced errors to follow the Gaussian distribution, and the estimated distance follows the Rayleigh distribution. We next use our simulation model to characterize the effect of the number of hops on localization in both dense and sparse deployments. We find that, contrary to common belief, it is better to use long hops in sparse deployments, while short hops are better in dense deployments – despite the traffic overhead. Finally, we propose a new solution that decreases and manages the overhead generated during the localization process. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

18.
Random scattering of WSNs is needed in many practical cases due to the large scale of the network required or to the inaccessibility of the terrain. However several important features of deployments of this type have been neglected due to their analytical complexity. Node placement must guarantee correct operation: if nodes are too separated many would be isolated and data would not reach the sinks. Besides, if the nodes are too close, the area covered would be small and little information would be retrieved. Moreover, the target area cannot be considered homogeneous since in real-life situations some zones are more important than others. This paper addresses these constraints by proposing and solving an optimization problem which maximizes network sensing coverage. In our model several clusters of nodes are spread over the target area following Gaussian random distributions, and the goal is to decide the optimal launch point and the dispersion for each cluster. This corresponds to real situations where clusters are dropped in an airborne launch in which dispersion is controlled by the release altitude. The problem is solved by considering iterative steps where single cluster deployments are addressed. Several tests validate our approach and indicate that our method outperforms previous approaches, especially in deployments with a low number of nodes, which are more challenging from the optimization perspective.  相似文献   

19.
介绍了当前智慧城市平台部署面临的关键问题,对智慧城市平台部署步骤提出了建议,最后给出了智慧城市平台的建设模式和商业模式。  相似文献   

20.
本文从电信级以太网的应用现状入手,分别对其三大应用领域进行概括介绍。通过对国内外应用和部署上差异的分析,重点阐述和探讨了电信级以太网在国内不同运营商的部署情况和演进思路。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号