首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 82 毫秒
1.
近两个月来,本刊网站的论坛里又不太安静。有个叫"高清迷"的香港网友遭到了广东一些网友的质疑。彼此论战的焦点大部分在说香港电视好看或不好看。"高清迷"网友说大陆电视越来越好,水平已经超过香港的电视节目。广东网友们则是缅怀香港电视的辉煌历史。这原本是简单的我说你好你说我好,互相捧场的事情,但是网络的奇妙性在于事情并没有朝积极的方向发展,其结果是吵架不可避免的发生了。外来的和尚是不是会念经,我们先不去管他。重要的是我们要弄清楚自己是怎么回事。本文,是专业电视人对我国各省卫视台做的调查评估。让我们了解一下我国的电视台的现状吧。  相似文献   

2.
李晓延 《今日电子》2007,(5):126-127
2007年3月21日~23日的上海新国际博览中心是格外的热闹,超过2万名来自电子行业的专业观众汇聚与此.吸引他们来到这里的原因就是慕尼黑上海电子展,慕尼黑上海激光、光电展(LASER. World of Photonics China)、中国国际半导体设备、材料、生产和服务展览暨研讨会(SEMICON China),以及中国国际电子电路展览会(CPCA Show)四大电子业权威品牌展联合在此举行.  相似文献   

3.
ADSL服务     
现在使用ADSL上宽带网的用户是越来越多了,对ADSL设备的维护也成了一个不容忽视的问题.只有维护保养好它,不但让你的"宽带之旅"省心又省力,还能延长其寿命.ADSL的维护可分为软件和硬件两个方面来分析,软件主要是PPPOE协议的问题,和计算机本身的气操作系统,和网卡方面的事情.硬件主要是局端的节点设备,和用户端猫的问题.还有通信的线路等一些因素.  相似文献   

4.
命题逻辑是一个以命题为基本研究对象的数学化的逻辑系统,命题逻辑是数理逻辑的基础,也是计算机科学与技术的理论基础.为了深入理解命题逻辑,将命题逻辑与一般的代数学进行比较,从6个方面简要总结和论述命题逻辑中代数学的一些思想和方法,使得读者能从中体会到代数学的一些思想和方法在命题逻辑中的应用.  相似文献   

5.
袁坤 《IT时代周刊》2007,(22):20-20
11月1日,似乎是个好日子!来自英特尔、EMC、思科的3位跨国公司CEO均选在这一天访华,并宣布其在中国市场大手笔的战略投入. 11月2日,来自全球最大显卡芯片厂商NVIDIA公司的联合创始人、总裁兼CEO黄仁勋借访华之际,在清华大学美术学院报告厅进行了"GPU--还原一个真世界"的演讲.  相似文献   

6.
引言 热插拔(hot swapping)的定义是从一块正在通电运作中的背板(backplane)上插入或移除电路板.这项技术被广泛应用在电信服务器(telecom servers)、USB界面、火线(firewire)界面和 CompactPCI应用等[参考1].这种技术可在维持系统背板的电压下,更换发生故障的电路板,而同时系统中其它正常的电路板仍可保持运作.  相似文献   

7.
Attacks such as APT usually hide communication data in massive legitimate network traffic, and mining structurally complex and latent relationships among flow-based network traffic to detect attacks has become the focus of many initiatives. Effectively analyzing massive network security data with high dimensions for suspicious flow diagnosis is a huge challenge. In addition, the uneven distribution of network traffic does not fully reflect the differences of class sample features, resulting in the low accuracy of attack detection. To solve these problems, a novel approach called the fuzzy entropy weighted natural nearest neighbor(FEW-NNN) method is proposed to enhance the accuracy and efficiency of flowbased network traffic attack detection. First, the FEW-NNN method uses the Fisher score and deep graph feature learning algorithm to remove unimportant features and reduce the data dimension. Then, according to the proposed natural nearest neighbor searching algorithm(NNN_Searching), the density of data points, each class center and the smallest enclosing sphere radius are determined correspondingly. Finally, a fuzzy entropy weighted KNN classification method based on affinity is proposed, which mainly includes the following three steps: 1、 the feature weights of samples are calculated based on fuzzy entropy values, 2、 the fuzzy memberships of samples are determined based on affinity among samples, and 3、 K-neighbors are selected according to the class-conditional weighted Euclidean distance, the fuzzy membership value of the testing sample is calculated based on the membership of k-neighbors, and then all testing samples are classified according to the fuzzy membership value of the samples belonging to each class;that is, the attack type is determined. The method has been applied to the problem of attack detection and validated based on the famous KDD99 and CICIDS-2017 datasets. From the experimental results shown in this paper, it is observed that the FEW-NNN method improves the accuracy and efficiency of flow-based network traffic attack detection.  相似文献   

8.
追日     
去年10月一个温暖的早晨,在澳大利亚内陆深处,14名麻省理工学院的学生和校友上午6点就爬出了他们的睡袋,准备车队,进行又一天的艰苦驾驶,在护卫队的护送下,他们驶过一段平坦、笔直、炎热、灰尘弥漫的道路.领头的车辆迎着其他车流,形成了一个缓冲带,一辆货车断后以监测整个队伍的进程.  相似文献   

9.
The diode infrared focal plane array uses the silicon diodes as a sensitive device for infrared signal measurement. By the infrared radiation, the infrared focal plane can produces small voltage signals. For the traditional readout circuit structures are designed to process current signals, they cannot be applied to it. In this paper,a new readout circuit for the diode un-cooled infrared focal plane array is developed. The principle of detector array signal readout and small signal amplification is given in detail. The readout circuit is designed and simulated by using the Central Semiconductor Manufacturing Corporation (CSMC) 0.5 μm complementary metal-oxide-semiconductor transistor (CMOS) technology library. Cadence Spectre simulation results show that the scheme can be applied to the CMOS readout integrated circuit (ROIC) with a larger array, such as 320×240 size array.  相似文献   

10.
2007年的元旦前,业界对商品化"中国芯"的最后一丝担忧得到了舒缓. 12月27日,神州龙芯集成电路设计有限公司对外公布,中科院计算所已选择与欧洲最大的半导体公司意法半导体,将就龙芯2E的生产和销售展开合作.双方合作细节至今未见披露,但知情人士向透露,双方已经达成初步意向,即意法半导体将出资3000万元购买龙芯2E处理器5年产销权,在此期间,这家法国公司每销售一枚处理器将向北京神州龙芯公司提交2美元的专利许可费.中科院计算所所长李国杰向证实,正式确认合作的时刻将等到今年3月,届时双方将齐聚人民大会堂公布合作详情.  相似文献   

11.
MPLS技术是一项具有多协议支持的技术,它综合利用了网络核心的交换技术和网络边缘的IP路由技术各自的优点,它将标记分配给多协议的数据桢以便在基于我展品信元的网络中传输。它能够提供现有传统IP路由技术所不能支持的要求保障QoS的业务,通过MPLS技术,我们可以提供各种新兴的增值业务,有效的实施流量工程和计费管理措施,扩展和完善更高等级的基础服务。  相似文献   

12.
In the Paper, we proposed a threshold mult- proxy multi-signature with share verification.In the scheme,a subset of original signers allows a designated group to proxy signers to sign on behalf of the original group, A message m has to be signed of proxy signers who can represent the proxy group. Then, the proxy signature is sent to the verifier group.A subset of verifiers in the verifier group can also represent the group to authenticate the proxy signature.In othe words,some threshold values will be given to indicate the number of persons to represent a group to authorize the signing capability or to sign a messagye or to verify the proxy signature.  相似文献   

13.
Ubiquitous computing applications or widespread robots interactions execute in unforeseen environments and need to adapt to changeful available services, user needs, and variations of the environment. Context-awareness ability addresses such a need, enabling, through adaptation rules, applications to react to the perceived dynamic variations. Responses to adaptation have to be quick enough to maximize the time during which the application is coherent with its environment. Adaptation rules, associating variations of the environment to application reactions, are usually established at design time. However, in unforeseen and partially anticipated environments, we claim that adaptation rules have to be dynamically extensible to match previously unexpected variations. Our approach enables rule composition and ensures a deterministic result. We propose to use parameter adaptation to quickly respond to environmental variations and dynamic compositional adaptation to provide extensibility to the parameter adaptation. To foster even lower response times, we internalize context-awareness processing and decision into the application.  相似文献   

14.
Technical communicators need to be prepared for the challenges of international communication. This tutorial focuses on the need for technical communication faculty to prepare students to be skilled intercultural communicators and to play a role on the translation team. The tutorial begins with a discussion of the importance of writing for translation in the international workplace and then presents specific assignments designed to instruct students in intercultural communication and give them experience writing for translation. In addition to introducing students to the cultural issues that impact the creation of documentation for international audiences, these assignments also serve to reinforce core skills recognized as vital to professional success in the field of technical communication. Taken together, these assignments can be used as the basis for a course in international technical communication. An appendix to the tutorial includes numerous resources available to faculty who want either to develop a course in international technical communication or to include some of the assignments in existing technical communication courses.  相似文献   

15.
随着嵌入式软件的规模和复杂性不断提高,白盒测试中经常用到覆盖率测试。轻量级覆盖率测试工具GCOV在使用上具有操作繁琐的弊端。本文基于GCOV覆盖率测试的原理,依据shell脚本批处理的特点将各部分操作封装为脚本工具,实现各脚本工具调用。通过该设计进行覆盖率报告输出节省了大量时间,提高了软件开发测试的效率。  相似文献   

16.
遗留系统是企业建立新信息系统时,面临的首要问题。在简单介绍了中间件技术的基础上,提出利用中间件技术通过构件化实现对遗留系统改造的方法,改造过程包括4个阶段:恢复遗留系统的软件体系结构;设计目标系统的软件体系结构;重新构造目标系统的构件;实现基于构件的目标系统。实践证明,该方法对遗留系统的再工程具有较大的实用价值。  相似文献   

17.
Distributed code assignments for CDMA packet radio networks   总被引:2,自引:0,他引:2  
Code-division multi-access (CDMA) techniques allow many users to transmit simultaneously in the same band without substantial interference by using approximately orthogonal (low cross-correlation) spread-spectrum waveforms. Two-phase algorithms have been devised to assign and reassign spread-spectrum codes to transmitters, to receivers and to pairs of stations in a large dynamic packet radio network in polynomial times. The purpose of the code assignments is to spatially reuse spreading codes to reduce the possibility of packet collisions and to react dynamically to topological changes. These two-phase algorithms minimize the time complexity in the first phase and minimize the number of control packets needed to be exchanged in the second phase. Therefore, they can start the network operation in a short time, then switch to the second phase with the goal of adapting to topological changes. A pairwise code-assignment scheme is proposed to assign codes to edges. Simulations based on well-controlled topologies (sparse topologies) show that the scheme requires much fewer codes than transmitter-based code assignment, while maintaining similar throughput performance  相似文献   

18.
In optical performance monitoring system,the analog to digital converter is needed to detect the peak of nanosecond pulse and get the signal envelope.A scheme based on a designed anti-aliasing filter and analog to digital converter is proposed to broaden the nanosecond pulse and make it easier for the analog to digital converter to catch the peak of the nanosecond pulse.The experimental results demonstrate that,with the proposed scheme,the optical performance system needs less time to get the recovered eye-diagram of high speed optical data signal,and is robust to phase mismatch in the analog to digital converter circuit.  相似文献   

19.
In this article, a novel approach to sensing static electric fields has been presented. The approach is extremely interesting due to the low cost of the technology and the simplicity of the architecture. The purpose of the article is to highlight the strategic role of behavioral models in the development and design of E-field sensors. It is important to observe that simulation results must always be supported by experimental evidence to confirm the predicted behaviors. A good solution to perform a reliable investigation, if allowed, is to model the main blocks of the system separately and at the same time to experimentally assess their real behavior to confirm theoretical expectations.  相似文献   

20.
以PMBOK项目管理思想为基础,结合集成类IT项目的具体实践,经过多个项目摸索,寻找CMMI模型与集成类IT项目管理过程之间的映射关系.在此基础上进行归纳、总结、提炼,提出了一个初步的、基于CMMI模型的集成类IT项目管理体系架构.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号