首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
近两个月来,本刊网站的论坛里又不太安静。有个叫"高清迷"的香港网友遭到了广东一些网友的质疑。彼此论战的焦点大部分在说香港电视好看或不好看。"高清迷"网友说大陆电视越来越好,水平已经超过香港的电视节目。广东网友们则是缅怀香港电视的辉煌历史。这原本是简单的我说你好你说我好,互相捧场的事情,但是网络的奇妙性在于事情并没有朝积极的方向发展,其结果是吵架不可避免的发生了。外来的和尚是不是会念经,我们先不去管他。重要的是我们要弄清楚自己是怎么回事。本文,是专业电视人对我国各省卫视台做的调查评估。让我们了解一下我国的电视台的现状吧。  相似文献   

2.
李晓延 《今日电子》2007,(5):126-127
2007年3月21日~23日的上海新国际博览中心是格外的热闹,超过2万名来自电子行业的专业观众汇聚与此.吸引他们来到这里的原因就是慕尼黑上海电子展,慕尼黑上海激光、光电展(LASER. World of Photonics China)、中国国际半导体设备、材料、生产和服务展览暨研讨会(SEMICON China),以及中国国际电子电路展览会(CPCA Show)四大电子业权威品牌展联合在此举行.  相似文献   

3.
ADSL服务     
现在使用ADSL上宽带网的用户是越来越多了,对ADSL设备的维护也成了一个不容忽视的问题.只有维护保养好它,不但让你的"宽带之旅"省心又省力,还能延长其寿命.ADSL的维护可分为软件和硬件两个方面来分析,软件主要是PPPOE协议的问题,和计算机本身的气操作系统,和网卡方面的事情.硬件主要是局端的节点设备,和用户端猫的问题.还有通信的线路等一些因素.  相似文献   

4.
命题逻辑是一个以命题为基本研究对象的数学化的逻辑系统,命题逻辑是数理逻辑的基础,也是计算机科学与技术的理论基础.为了深入理解命题逻辑,将命题逻辑与一般的代数学进行比较,从6个方面简要总结和论述命题逻辑中代数学的一些思想和方法,使得读者能从中体会到代数学的一些思想和方法在命题逻辑中的应用.  相似文献   

5.
引言 热插拔(hot swapping)的定义是从一块正在通电运作中的背板(backplane)上插入或移除电路板.这项技术被广泛应用在电信服务器(telecom servers)、USB界面、火线(firewire)界面和 CompactPCI应用等[参考1].这种技术可在维持系统背板的电压下,更换发生故障的电路板,而同时系统中其它正常的电路板仍可保持运作.  相似文献   

6.
袁坤 《IT时代周刊》2007,(22):20-20
11月1日,似乎是个好日子!来自英特尔、EMC、思科的3位跨国公司CEO均选在这一天访华,并宣布其在中国市场大手笔的战略投入. 11月2日,来自全球最大显卡芯片厂商NVIDIA公司的联合创始人、总裁兼CEO黄仁勋借访华之际,在清华大学美术学院报告厅进行了"GPU--还原一个真世界"的演讲.  相似文献   

7.
Attacks such as APT usually hide communication data in massive legitimate network traffic, and mining structurally complex and latent relationships among flow-based network traffic to detect attacks has become the focus of many initiatives. Effectively analyzing massive network security data with high dimensions for suspicious flow diagnosis is a huge challenge. In addition, the uneven distribution of network traffic does not fully reflect the differences of class sample features, resulting in the low accuracy of attack detection. To solve these problems, a novel approach called the fuzzy entropy weighted natural nearest neighbor(FEW-NNN) method is proposed to enhance the accuracy and efficiency of flowbased network traffic attack detection. First, the FEW-NNN method uses the Fisher score and deep graph feature learning algorithm to remove unimportant features and reduce the data dimension. Then, according to the proposed natural nearest neighbor searching algorithm(NNN_Searching), the density of data points, each class center and the smallest enclosing sphere radius are determined correspondingly. Finally, a fuzzy entropy weighted KNN classification method based on affinity is proposed, which mainly includes the following three steps: 1、 the feature weights of samples are calculated based on fuzzy entropy values, 2、 the fuzzy memberships of samples are determined based on affinity among samples, and 3、 K-neighbors are selected according to the class-conditional weighted Euclidean distance, the fuzzy membership value of the testing sample is calculated based on the membership of k-neighbors, and then all testing samples are classified according to the fuzzy membership value of the samples belonging to each class;that is, the attack type is determined. The method has been applied to the problem of attack detection and validated based on the famous KDD99 and CICIDS-2017 datasets. From the experimental results shown in this paper, it is observed that the FEW-NNN method improves the accuracy and efficiency of flow-based network traffic attack detection.  相似文献   

8.
追日     
去年10月一个温暖的早晨,在澳大利亚内陆深处,14名麻省理工学院的学生和校友上午6点就爬出了他们的睡袋,准备车队,进行又一天的艰苦驾驶,在护卫队的护送下,他们驶过一段平坦、笔直、炎热、灰尘弥漫的道路.领头的车辆迎着其他车流,形成了一个缓冲带,一辆货车断后以监测整个队伍的进程.  相似文献   

9.
The diode infrared focal plane array uses the silicon diodes as a sensitive device for infrared signal measurement. By the infrared radiation, the infrared focal plane can produces small voltage signals. For the traditional readout circuit structures are designed to process current signals, they cannot be applied to it. In this paper,a new readout circuit for the diode un-cooled infrared focal plane array is developed. The principle of detector array signal readout and small signal amplification is given in detail. The readout circuit is designed and simulated by using the Central Semiconductor Manufacturing Corporation (CSMC) 0.5 μm complementary metal-oxide-semiconductor transistor (CMOS) technology library. Cadence Spectre simulation results show that the scheme can be applied to the CMOS readout integrated circuit (ROIC) with a larger array, such as 320×240 size array.  相似文献   

10.
(1)原来转播的中央1套节目变成了中央2套。检查机柜正常.调出菜单发现原设定的频率1290变为970,其他节目正常。重新调整频率,节目恢复正常,分析其原因为接收一体机内部集成块出现误码导致原储存的数据发生变化。  相似文献   

11.
WiFi access point pricing as a dynamic game   总被引:1,自引:0,他引:1  
We study the economic interests of a wireless access point owner and his paying client, and model their interaction as a dynamic game. The key feature of this game is that the players have asymmetric information - the client knows more than the access provider. We find that if a client has a "web browser" utility function (a temporal utility function that grows linearly), it is a Nash equilibrium for the provider to charge the client a constant price per unit time. On the other hand, if the client has a "file transferor" utility function (a utility function that is a step function), the client would be unwilling to pay until the final time slot of the file transfer. We also study an expanded game where an access point sells to a reseller,which in turn sells to a mobile client and show that if the client has a web browser utility function, that constant price is a Nash equilibrium of the three player game. Finally, we study a two player game in which the access point does not know whether he faces a web browser or file transferor type client, and show conditions for which it is not a Nash equilibrium for the access point to maintain a constant price.  相似文献   

12.
The purpose of this note is to present an alternate derivation of a formula for the synthesis of a loaded line. The problem is to determine the values of the normalized susceptances a and c mounted an exact quarter-wavelength apart along a uniform line. These are arranged in the order a, c, c,. . .c, a to achieve a loaded line with a given phase shift and perfect match. In order to analyze a particular line design for standing-wave ratio and phase shift over a band of frequencies on a digital computer, it is worthwhile to know the values of the susceptances to many more decimal places than one would achieve from a simple graph.  相似文献   

13.
《Spectrum, IEEE》2005,42(6):14-15
This paper presents a soccer ball containing a transmitter that reveals the exact location of the ball on the pitch. It is a coin-size radio transmitter that broadcasts a pulsed signal in the 2.4 gigahertz band to a dozen receivers mounted on floodlight masts and near the sidelines. The receivers relay the pulses to a central computer, which then calculates the ball's exact location. The main goal of this transmitter is to help referees with tough calls, such as when a goalkeeper intercepts a ball on the fly after it has crossed the goal line. In such a case, the system would send a vibratory alert to a special wristwatch worn by the referee, signaling that the ball went over the goal.  相似文献   

14.
We describe a method for identifying the source of a satellite interferer using a single satellite. The technique relies on the fact that the strength of a carrier signal measured at the downlink station varies with time due to a number of factors, and we use a quantum‐inspired algorithm to compute a “signature” for a signal, which captures part of the pattern of variation that is a characteristic of the uplink antenna. We define a distance measure to numerically quantify the degree of similarity between two signatures, and by computing the distances between the signature for an interfering carrier and the signatures of the known carriers being relayed by the same satellite at the same time, we can identify the antenna that the interferer originated from, if a known carrier is being relayed from it. As a proof of concept, we evaluate the performance of the technique using a simple statistical model applied to measured carrier data.  相似文献   

15.
A dynamic voltage restorer (DVR) can be installed in a middle-voltage (MV) power grid, to concurrently protect a cluster of sensitive loads from voltage sags. To further improve its efficiency and reduce the difficulty in its implementation, a novel control strategy for operating such a DVR as a virtual impedance in series with sensitive loads is proposed in this paper. In addition to its usual function of compensating for voltage sags, such a DVR can also operate as a virtual inductance, to function as a fault current limiter (FCL) during a downstream fault, or a virtual capacitance, to function as a series compensator (SC) to compensate the voltage loss along the feeder line during heavy load. Based on a dual-loop control design, strategies for operating a DVR as a series virtual inductance and a virtual capacitance are proposed, and methods for tuning the parameter values and a stability analysis of the whole system are presented. The feasibility and effectiveness of the proposed method are verified by simulations using the PSCAD software, and experimental results obtained using a prototype DVR are presented.  相似文献   

16.
As an analytical method for nonuniform transmission lines (NTLs) equivalent transformations are extended to a more general case, namely a mixed lumped Brune-type section and a uniform transmission line (unit element, UE). Circuits consisting of a cascade connection of a lumped Brune section and a UE are equivalent to one consisting of a cascade connection of a nonuniform transmission line whose characteristic impedance distribution is expressed with a trigonometric function and a lumped Brune section. This equivalent transformation method is easily applied to a circuit consisting of a lumped C section and a UE. The equivalent circuit is a circuit consisting of an NTL and a lumped C section. In this case, the characteristic impedance distribution of the NTL may be expressed in terms of a hyperbolic function. Exact network functions of the NTLs are easily obtained from the equivalent circuits without solving the telegrapher's equation. By considering the limiting case of these equivalent transformations, equivalent transformations for circuits consisting of a cascade connection of a lumped resonance circuit and a circuit and a uniform transmission line are derived  相似文献   

17.
Established thermoelectric theory enables direct calculation of the power output and conversion efficiency if the temperature difference across a module is given. However, in some applications such as those using a radioisotope or solar radiation as a heat source, the thermal input remains constant while the temperature difference varies with the geometry of the thermoelectric module. In this paper, a theoretical framework for thermoelectric module design under a given thermal input is presented. It provides a convenient approach for module geometry optimization. The usefulness of the theory is demonstrated through a design study, in which an appropriate thermoelement length for a solar thermoelectric system is determined by considering conflicting requirements for a longer length to obtain a greater temperature difference and for a shorter length to produce a larger power output.  相似文献   

18.
19.
The structural instability of isolated nm-sized alloy particles has been investigated by in situ transmission electron microscopy, using particles in the Sn-Bi system. In a pure tin (Sn) particle, no structural fluctuation was induced under electron-beam irradiation. In a tin-rich solid solution particle, an orientational fluctuation took place at a rate of approximately once per 1-3 s. In a high concentration alloy particle with a two-phase microstructure, a structural fluctuation occurred at a rate of a few hertz. Namely, the fluctuation became more frequent with increasing bismuth (Bi) concentration, no matter whether it consists of a single phase or multiple phases. A good parallelism can be found between this fluctuation enhancement with bismuth concentration and the fact that the free-energy difference between a solid particle and the corresponding liquid one decreases continuously with bismuth concentration and approaches a value close to zero at the eutectic composition. These results lead to a view that a nm-sized solid particle exhibits a structural instability under electron-beam irradiation when the free-energy difference between a solid particle and the corresponding liquid one is reduced to a value close to zero.  相似文献   

20.
Hierarchical Modulation (HM) is a means to enhance the spectral efficiency of a system by superposing, in terms of modulation, an additional stream for a given user with good radio conditions on a basic stream of a user with worse radio conditions. This, in turn, increases the throughput of the former user and hence the overall performance of the whole system. We consider, in this work, such a performance at the flow level, for a realistic dynamic setting where users come to the system and leave it after a finite duration corresponding, for instance, to the completion of a file transfer. We specifically model and quantify, both analytically and via simulations, the gain thus achieved and propose two extensions to the basic HM algorithm: a first one in which a user with bad radio conditions is also superposed on one with better radio conditions and a second one in which a user of one type is further superposed on a user of the same type as well.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号