共查询到20条相似文献,搜索用时 82 毫秒
1.
《卫星电视与宽带多媒体》2008,(11)
近两个月来,本刊网站的论坛里又不太安静。有个叫"高清迷"的香港网友遭到了广东一些网友的质疑。彼此论战的焦点大部分在说香港电视好看或不好看。"高清迷"网友说大陆电视越来越好,水平已经超过香港的电视节目。广东网友们则是缅怀香港电视的辉煌历史。这原本是简单的我说你好你说我好,互相捧场的事情,但是网络的奇妙性在于事情并没有朝积极的方向发展,其结果是吵架不可避免的发生了。外来的和尚是不是会念经,我们先不去管他。重要的是我们要弄清楚自己是怎么回事。本文,是专业电视人对我国各省卫视台做的调查评估。让我们了解一下我国的电视台的现状吧。 相似文献
2.
2007年3月21日~23日的上海新国际博览中心是格外的热闹,超过2万名来自电子行业的专业观众汇聚与此.吸引他们来到这里的原因就是慕尼黑上海电子展,慕尼黑上海激光、光电展(LASER. World of Photonics China)、中国国际半导体设备、材料、生产和服务展览暨研讨会(SEMICON China),以及中国国际电子电路展览会(CPCA Show)四大电子业权威品牌展联合在此举行. 相似文献
3.
4.
命题逻辑是一个以命题为基本研究对象的数学化的逻辑系统,命题逻辑是数理逻辑的基础,也是计算机科学与技术的理论基础.为了深入理解命题逻辑,将命题逻辑与一般的代数学进行比较,从6个方面简要总结和论述命题逻辑中代数学的一些思想和方法,使得读者能从中体会到代数学的一些思想和方法在命题逻辑中的应用. 相似文献
5.
11月1日,似乎是个好日子!来自英特尔、EMC、思科的3位跨国公司CEO均选在这一天访华,并宣布其在中国市场大手笔的战略投入. 11月2日,来自全球最大显卡芯片厂商NVIDIA公司的联合创始人、总裁兼CEO黄仁勋借访华之际,在清华大学美术学院报告厅进行了"GPU--还原一个真世界"的演讲. 相似文献
6.
Neil Gutierrez 《电子与电脑》2008,(6)
引言 热插拔(hot swapping)的定义是从一块正在通电运作中的背板(backplane)上插入或移除电路板.这项技术被广泛应用在电信服务器(telecom servers)、USB界面、火线(firewire)界面和 CompactPCI应用等[参考1].这种技术可在维持系统背板的电压下,更换发生故障的电路板,而同时系统中其它正常的电路板仍可保持运作. 相似文献
7.
Attacks such as APT usually hide communication data in massive legitimate network traffic, and mining structurally complex and latent relationships among flow-based network traffic to detect attacks has become the focus of many initiatives. Effectively analyzing massive network security data with high dimensions for suspicious flow diagnosis is a huge challenge. In addition, the uneven distribution of network traffic does not fully reflect the differences of class sample features, resulting in the low accuracy of attack detection. To solve these problems, a novel approach called the fuzzy entropy weighted natural nearest neighbor(FEW-NNN) method is proposed to enhance the accuracy and efficiency of flowbased network traffic attack detection. First, the FEW-NNN method uses the Fisher score and deep graph feature learning algorithm to remove unimportant features and reduce the data dimension. Then, according to the proposed natural nearest neighbor searching algorithm(NNN_Searching), the density of data points, each class center and the smallest enclosing sphere radius are determined correspondingly. Finally, a fuzzy entropy weighted KNN classification method based on affinity is proposed, which mainly includes the following three steps: 1、 the feature weights of samples are calculated based on fuzzy entropy values, 2、 the fuzzy memberships of samples are determined based on affinity among samples, and 3、 K-neighbors are selected according to the class-conditional weighted Euclidean distance, the fuzzy membership value of the testing sample is calculated based on the membership of k-neighbors, and then all testing samples are classified according to the fuzzy membership value of the samples belonging to each class;that is, the attack type is determined. The method has been applied to the problem of attack detection and validated based on the famous KDD99 and CICIDS-2017 datasets. From the experimental results shown in this paper, it is observed that the FEW-NNN method improves the accuracy and efficiency of flow-based network traffic attack detection. 相似文献
8.
9.
The diode infrared focal plane array uses the silicon diodes as a sensitive device for infrared signal measurement. By the infrared radiation, the infrared focal plane can produces small voltage signals. For the traditional readout circuit structures are designed to process current signals, they cannot be applied to it. In this paper,a new readout circuit for the diode un-cooled infrared focal plane array is developed. The principle of detector array signal readout and small signal amplification is given in detail. The readout circuit is designed and simulated by using the Central Semiconductor Manufacturing Corporation (CSMC) 0.5 μm complementary metal-oxide-semiconductor transistor (CMOS) technology library. Cadence Spectre simulation results show that the scheme can be applied to the CMOS readout integrated circuit (ROIC) with a larger array, such as 320×240 size array. 相似文献
10.
2007年的元旦前,业界对商品化"中国芯"的最后一丝担忧得到了舒缓. 12月27日,神州龙芯集成电路设计有限公司对外公布,中科院计算所已选择与欧洲最大的半导体公司意法半导体,将就龙芯2E的生产和销售展开合作.双方合作细节至今未见披露,但知情人士向透露,双方已经达成初步意向,即意法半导体将出资3000万元购买龙芯2E处理器5年产销权,在此期间,这家法国公司每销售一枚处理器将向北京神州龙芯公司提交2美元的专利许可费.中科院计算所所长李国杰向证实,正式确认合作的时刻将等到今年3月,届时双方将齐聚人民大会堂公布合作详情. 相似文献
11.
12.
In the Paper, we proposed a threshold mult- proxy multi-signature with share verification.In the scheme,a subset of original signers allows a designated group to proxy signers to sign on behalf of the original group, A message m has to be signed of proxy signers who can represent the proxy group. Then, the proxy signature is sent to the verifier group.A subset of verifiers in the verifier group can also represent the group to authenticate the proxy signature.In othe words,some threshold values will be given to indicate the number of persons to represent a group to authorize the signing capability or to sign a messagye or to verify the proxy signature. 相似文献
13.
Jean-Yves Tigli Stéphane Lavirotte Ga?tan Rey Vincent Hourdin Nicolas Ferry Christophe Vergoni Michel Riveill 《电信纪事》2012,67(7-8):313-327
Ubiquitous computing applications or widespread robots interactions execute in unforeseen environments and need to adapt to changeful available services, user needs, and variations of the environment. Context-awareness ability addresses such a need, enabling, through adaptation rules, applications to react to the perceived dynamic variations. Responses to adaptation have to be quick enough to maximize the time during which the application is coherent with its environment. Adaptation rules, associating variations of the environment to application reactions, are usually established at design time. However, in unforeseen and partially anticipated environments, we claim that adaptation rules have to be dynamically extensible to match previously unexpected variations. Our approach enables rule composition and ensures a deterministic result. We propose to use parameter adaptation to quickly respond to environmental variations and dynamic compositional adaptation to provide extensibility to the parameter adaptation. To foster even lower response times, we internalize context-awareness processing and decision into the application. 相似文献
14.
Technical communicators need to be prepared for the challenges of international communication. This tutorial focuses on the need for technical communication faculty to prepare students to be skilled intercultural communicators and to play a role on the translation team. The tutorial begins with a discussion of the importance of writing for translation in the international workplace and then presents specific assignments designed to instruct students in intercultural communication and give them experience writing for translation. In addition to introducing students to the cultural issues that impact the creation of documentation for international audiences, these assignments also serve to reinforce core skills recognized as vital to professional success in the field of technical communication. Taken together, these assignments can be used as the basis for a course in international technical communication. An appendix to the tutorial includes numerous resources available to faculty who want either to develop a course in international technical communication or to include some of the assignments in existing technical communication courses. 相似文献
15.
16.
遗留系统是企业建立新信息系统时,面临的首要问题。在简单介绍了中间件技术的基础上,提出利用中间件技术通过构件化实现对遗留系统改造的方法,改造过程包括4个阶段:恢复遗留系统的软件体系结构;设计目标系统的软件体系结构;重新构造目标系统的构件;实现基于构件的目标系统。实践证明,该方法对遗留系统的再工程具有较大的实用价值。 相似文献
17.
Distributed code assignments for CDMA packet radio networks 总被引:2,自引:0,他引:2
Limin Hu 《Networking, IEEE/ACM Transactions on》1993,1(6):668-677
Code-division multi-access (CDMA) techniques allow many users to transmit simultaneously in the same band without substantial interference by using approximately orthogonal (low cross-correlation) spread-spectrum waveforms. Two-phase algorithms have been devised to assign and reassign spread-spectrum codes to transmitters, to receivers and to pairs of stations in a large dynamic packet radio network in polynomial times. The purpose of the code assignments is to spatially reuse spreading codes to reduce the possibility of packet collisions and to react dynamically to topological changes. These two-phase algorithms minimize the time complexity in the first phase and minimize the number of control packets needed to be exchanged in the second phase. Therefore, they can start the network operation in a short time, then switch to the second phase with the goal of adapting to topological changes. A pairwise code-assignment scheme is proposed to assign codes to edges. Simulations based on well-controlled topologies (sparse topologies) show that the scheme requires much fewer codes than transmitter-based code assignment, while maintaining similar throughput performance 相似文献
18.
In optical performance monitoring system,the analog to digital converter is needed to detect the peak of nanosecond pulse and get the signal envelope.A scheme based on a designed anti-aliasing filter and analog to digital converter is proposed to broaden the nanosecond pulse and make it easier for the analog to digital converter to catch the peak of the nanosecond pulse.The experimental results demonstrate that,with the proposed scheme,the optical performance system needs less time to get the recovered eye-diagram of high speed optical data signal,and is robust to phase mismatch in the analog to digital converter circuit. 相似文献
19.
Ando B. Baglio S. Bulsara A. Marletta V. Savalli N. 《IEEE instrumentation & measurement magazine》2009,12(2):31-37
In this article, a novel approach to sensing static electric fields has been presented. The approach is extremely interesting due to the low cost of the technology and the simplicity of the architecture. The purpose of the article is to highlight the strategic role of behavioral models in the development and design of E-field sensors. It is important to observe that simulation results must always be supported by experimental evidence to confirm the predicted behaviors. A good solution to perform a reliable investigation, if allowed, is to model the main blocks of the system separately and at the same time to experimentally assess their real behavior to confirm theoretical expectations. 相似文献
20.
王勤红 《信息技术与标准化》2011,(7):56-59
以PMBOK项目管理思想为基础,结合集成类IT项目的具体实践,经过多个项目摸索,寻找CMMI模型与集成类IT项目管理过程之间的映射关系.在此基础上进行归纳、总结、提炼,提出了一个初步的、基于CMMI模型的集成类IT项目管理体系架构. 相似文献