To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development...To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.展开更多
Climate change,which is the result of human activities,has wide-ranging impact.It poses a serious threat to human rights.Environmental rights are where the protection of the ecological environment and the development ...Climate change,which is the result of human activities,has wide-ranging impact.It poses a serious threat to human rights.Environmental rights are where the protection of the ecological environment and the development of human rights intersect.In view of the close relationship between the actions for addressing climate change and environmental rights,China should integrate the protection of environmental rights into the actions for addressing climate change,so as to achieve simultaneous development of both.In the process of coping with climate change,the right to climate stability that mainly pursues a“harmless”environment and the right to a more livable climate that pursues a“beautiful eco-environment”are specific manifestations of environmental rights and should be the priority of protection efforts.However,there are still some obstacles to achieving the coordinated development of the efforts to address climate change and the protection of environmental rights because traditional rights protection methods mainly give individuals subjective rights with the power to claim and are thus difficult to meet the needs of environmental rights protection in the context of climate change,and there are inherent value differences between responding to climate change and the realization of other human rights.Building a multi-level national obligation system to address climate change,giving full play to the role of courts in responding to climate change through moderate judicial activism,and coordinating the efforts to cope with climate change and the development of human rights under the guidance of a holistic system view are effective ways to overcome the aforementioned difficulties.展开更多
The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called M...The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.展开更多
The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting syste...The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting system using automatic addressable single-lamp control technology,and outlines the main development direction for this technology in modern tunnel lighting.The aim is to offer insights that can inform the rational deployment of this technology,thereby enhancing the lighting control effectiveness in modern tunnels and meeting their specific lighting requirements more effectively.展开更多
Within the scope of human beings, some addressing terms are similar. However, different addressing terms still exist,which are influenced by the background of high context communication or low context communication. A...Within the scope of human beings, some addressing terms are similar. However, different addressing terms still exist,which are influenced by the background of high context communication or low context communication. A good example is that Chinese traditional culture, a typical instance of high context communication, puts much emphasis on etiquette, which is represented in addressing terms as more complex and definite; In western, with the background of low context communication, every individual is more equal and they address each other more generally and much simpler. This paper tries to explore the addressing terms both in Chinese and in English from the perspective of frame theory.展开更多
WS-Addressing用端点引用(EndpointReference,EPR)来进行Web服务寻址,EPR是动态生成的服务端点描述,它不能直接存储在统一描述、发现和集成(universal description discovery and integration,UDDI)的静态数据结构中。为实现UDDI和WS-Ad...WS-Addressing用端点引用(EndpointReference,EPR)来进行Web服务寻址,EPR是动态生成的服务端点描述,它不能直接存储在统一描述、发现和集成(universal description discovery and integration,UDDI)的静态数据结构中。为实现UDDI和WS-Addressing共存的Web服务模型,提供了在UDDI中支持WS-Addressing的方法,并通过购物车的实现来说明应用程序应如何支持WS-Addressing。展开更多
Applications of Wireless Sensor devices are widely used byvarious monitoring sections such as environmental monitoring, industrialsensing, habitat modeling, healthcare and enemy movement detection systems.Researchers ...Applications of Wireless Sensor devices are widely used byvarious monitoring sections such as environmental monitoring, industrialsensing, habitat modeling, healthcare and enemy movement detection systems.Researchers were found that 16 bytes packet size (payload) requires MediaAccess Control (MAC) and globally unique network addresses overheads asmore as the payload itself which is not reasonable in most situations. Theapproach of using a unique address isn’t preferable for most Wireless SensorNetworks (WSNs) applications as well. Based on the mentioned drawbacks,the current work aims to fill the existing gap in the field area by providingtwo strategies. First, name/address solutions that assign unique addresseslocally to clustered topology-based sensor devices, reutilized in a spatialmanner, and reduce name/address size by a noticeable amount of 2.9 basedon conducted simulation test. Second, name/address solutions that assignreutilizing of names/addresses to location-unaware spanning-tree topologyin an event-driven WSNs case (that is providing minimal low latenciesand delivering addressing packet in an efficient manner). Also, to declinethe approach of needing both addresses (MAC and network) separately, itdiscloses how in a spatial manner to reutilize locally unique sensor devicename approach and could be utilized in both contexts and providing anenergy-efficient protocol for location unawareness clustered based WSNs.In comparison, an experimental simulation test performed and given theaddresses solution with less overhead in the header and 62 percent fairpayload efficiency that outperforms 34 percent less effective globally uniqueaddresses. Furthermore, the proposed work provides addresses uniquenessfor network-level without using network-wide Duplicate Address Detection(DAD) algorithm. Consequently, the current study provides a roadmap foraddressing/naming scheme to help researchers in this field of study. In general,some assumptions were taken during the work phases of this study such asnumber of Cluster Head (CH) nodes is 6% of entire sensor nodes, locationunawareness for entire sensor network and 4 bits per node address space whichconsidered as the limitation of the study.展开更多
In China, sports and physical activity (PA) have tradition- ally been an integral part of school curricula to promote fitness and enhance healthy growth among children and ado- lescents. Three decades of economic re...In China, sports and physical activity (PA) have tradition- ally been an integral part of school curricula to promote fitness and enhance healthy growth among children and ado- lescents. Three decades of economic reforms, however, have brought major changes in social, economic.展开更多
In the digital synthesis of wideband periodic signals using an Arbitrary Waveform Gen-erator(AWG),the frequency resolution and spectral complexity of the synthesized signals are com-monly limited by the memory capacit...In the digital synthesis of wideband periodic signals using an Arbitrary Waveform Gen-erator(AWG),the frequency resolution and spectral complexity of the synthesized signals are com-monly limited by the memory capacity and clock frequency of the AWG.This paper proposes a novel sequential addressing scheme and then presents several sequences to improve the frequency resolution of the synthesized periodic signals without changing their spectral envelopes and basic time-domain characteristics under the condition of a fixed memory capacity and a fixed clock fre-quency.The main idea of the scheme is using the address generator in an AWG to program and produce addresses to read fixed waveform data in variable order,and thus to generate waveforms of various periods and profiles.The scheme is applied in simulating signal scenarios for military com-munication countermeasure experiments,and achieves high performance.展开更多
The compilation of technology lists addressing climate change has a guiding effect on promoting technological research and development,demonstration,and popularization.It is also crucial for China to strengthen ecolog...The compilation of technology lists addressing climate change has a guiding effect on promoting technological research and development,demonstration,and popularization.It is also crucial for China to strengthen ecological civilization construction,achieve the carbon emission peak and carbon neutrality target,and enhance global climate governance capabilities.This study first proposes the existing classification outline of the technology promotion lists,technology demand lists,and future technology lists.Then,different methodologies are integrated on the basis of the existing outline of four technology lists:China’s existing technological promotion list for addressing climate change,China’s demand list for climate change mitigation technology,China’s key technology list for addressing climate change,and China’s future technology list for addressing climate change.What’s more,core technologies are analyzed in the aspects of technology maturity,carbon reduction cost,carbon reduction potential,economic benefits,social influence,uncertainty,etc.The results show that:key industries and sectors in China already have relatively mature mitigation/adaptation technologies to support the achievement of climate change targets.The multi-sectoral system of promoting climate friendly technologies has been established,which has played an active role in tackling climate change.Currently,climate technology needs are concentrated in the traditional technology and equipment upgrading,renewable energy technology,and management decision-making support technology.The key technologies are concentrated in 3 major areas and 12 technological directions that urgently need a breakthrough.For carbon emmission peak and nentrality,carbon depth reduction and zero carbon emissions and geoengineering technology(CDR and SRM)have played an important role in forming the structure of global emissions and achieving carbon neutrality in the future.Thus,the uncertainty assessment for the comprehensive technology cost effectiveness,technology integration direction,technical maturity,ethics and ecological impacts is supportive to the national technology strategy.Finally,the presented study proposes several policy implications for medium-and long-term technology deployment,improving technology conversion rate,promoting the research and development of core technologies,and forming a technology list collaborative update and release mechanism.展开更多
In contrast with English,Chinese addressing system is characterized by the great number coupled with cultural connotations,thus adding to the difficulty in Chinese-English translation.In this paper,the author endeavor...In contrast with English,Chinese addressing system is characterized by the great number coupled with cultural connotations,thus adding to the difficulty in Chinese-English translation.In this paper,the author endeavors to locate the source of differences between Chinese & English addressing terms and seek the cultural connotations and pragmatic equivalence of Chinese addressing terms in translation.展开更多
The effects of linear falling ramp reset pulse related to addressing operation in an alternating current plasma display panel (AC PDP) were studied. The wall charge waveforms were measured by the electrode balance m...The effects of linear falling ramp reset pulse related to addressing operation in an alternating current plasma display panel (AC PDP) were studied. The wall charge waveforms were measured by the electrode balance method in a 12-inch coplanar AC PDP. The wall charge waveforms show the relationship between the slope ratio of the falling ramp reset pulse and the wall charges at the end of the falling ramp reset pulse which influences the addressing stability. Then the effects of the slope ratio of the linear falling ramp reset pulse on the addressing voltage and addressing time were investigated. The experimental results show that the minimum addressing voltage increases with the increase of the slope ratio of the falling ramp reset pulse, and so does the minimum addressing time. Based on the experimental results, the optimization of the addressing time and the slope ratio of the falling ramp pulse is discussed.展开更多
Autoconfiguration protocols are important in maintaining mobile ad hoc networks (MANETs). In this paper, we present an autoconfiguration protocol called the one-step addressing (OSA) protocol characterized by its simp...Autoconfiguration protocols are important in maintaining mobile ad hoc networks (MANETs). In this paper, we present an autoconfiguration protocol called the one-step addressing (OSA) protocol characterized by its simplicity. Mathematical model is developed to evaluate the performance of the proposed protocol. The results of the model, which are validated by the simulation results, show that the OSA protocol outperforms the well-known token-based protocol in terms of both latency and communications overhead.展开更多
A reference database of addressing is an important resource for urban applications. The efficiency of an addressing system depends on both data quality and technical architecture. Data must respect a standard model th...A reference database of addressing is an important resource for urban applications. The efficiency of an addressing system depends on both data quality and technical architecture. Data must respect a standard model that is flexible to meet different cases in the field. The technical architecture should be service oriented to offer a shared resource for multiple users and applications. This paper is to develop an addressing model for Morocco that extends Davis’s and Fonseca’s model presented in their work on the certainty of locations produced by an address geocoding system. We discuss the addressing data dictionary and acquisition plan in Morocco, revealing a diversified data management environment, characterized by multiple sources and actors. As a novelty in the field of GIS, we establish our technical architecture around cloud computing, according Service Oriented Application (SOA) standards. Our approach is based on the three pillars of cloud computing which are Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a service (IaaS).展开更多
The addressing and routing algorithm on hexagonal networks is still an open problem so far.Although many related works have been done to resolve this problem to some extent,the properties of hexagonal networks are sti...The addressing and routing algorithm on hexagonal networks is still an open problem so far.Although many related works have been done to resolve this problem to some extent,the properties of hexagonal networks are still not explored adequately.In this paper,we first create an oblique coordinate system and redefine the Euclidean space to address the hexagonal nodes.Then an optimal routing algorithm using vectors and angles of the redefined Euclidean space is developed.Compared with the traditional 3-directions scheme and the Cayley graph method,the proposed routing algorithm is more efficient and totally independent of the scale of networks with two-tuples addresses.We also prove that the path(s) obtained by this algorithm is always the shortest one(s).展开更多
THE people" is a frequently mentioned phrase,to the extent of being the main theme of the report delivered at the 19th National Congress of the Communist Party of China(CPC)by General Secretary Xi Jinping."W...THE people" is a frequently mentioned phrase,to the extent of being the main theme of the report delivered at the 19th National Congress of the Communist Party of China(CPC)by General Secretary Xi Jinping."We must put the people’s interests above all else,see that the gains of reform and development benefit all our people in a展开更多
Modern shared-memory multi-core processors typically have shared Level 2(L2)or Level 3(L3)caches.Cache bottlenecks and replacement strategies are the main problems of such architectures,where multiple cores try to acc...Modern shared-memory multi-core processors typically have shared Level 2(L2)or Level 3(L3)caches.Cache bottlenecks and replacement strategies are the main problems of such architectures,where multiple cores try to access the shared cache simultaneously.The main problem in improving memory performance is the shared cache architecture and cache replacement.This paper documents the implementation of a Dual-Port Content Addressable Memory(DPCAM)and a modified Near-Far Access Replacement Algorithm(NFRA),which was previously proposed as a shared L2 cache layer in a multi-core processor.Standard Performance Evaluation Corporation(SPEC)Central Processing Unit(CPU)2006 benchmark workloads are used to evaluate the benefit of the shared L2 cache layer.Results show improved performance of the multicore processor’s DPCAM and NFRA algorithms,corresponding to a higher number of concurrent accesses to shared memory.The new architecture significantly increases system throughput and records performance improvements of up to 8.7%on various types of SPEC 2006 benchmarks.The miss rate is also improved by about 13%,with some exceptions in the sphinx3 and bzip2 benchmarks.These results could open a new window for solving the long-standing problems with shared cache in multi-core processors.展开更多
基金supported by the National Key R&D Program of China(Project Number:2022YFB2902100).
文摘To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.
基金This paper is a phased achievement of the 2022 judicial research major project of the Supreme People’s Court,“Research on Judicial Service to Guarantee Carbon Peak and Carbon Neutrality”(Project Approval No.ZGFYZDKT20220301)the major project of the National Social Science Foundation,“Research on Legal Regulations for Biodiversity Protection under the Overall System View”(Project Approval No.19ZDA162).
文摘Climate change,which is the result of human activities,has wide-ranging impact.It poses a serious threat to human rights.Environmental rights are where the protection of the ecological environment and the development of human rights intersect.In view of the close relationship between the actions for addressing climate change and environmental rights,China should integrate the protection of environmental rights into the actions for addressing climate change,so as to achieve simultaneous development of both.In the process of coping with climate change,the right to climate stability that mainly pursues a“harmless”environment and the right to a more livable climate that pursues a“beautiful eco-environment”are specific manifestations of environmental rights and should be the priority of protection efforts.However,there are still some obstacles to achieving the coordinated development of the efforts to address climate change and the protection of environmental rights because traditional rights protection methods mainly give individuals subjective rights with the power to claim and are thus difficult to meet the needs of environmental rights protection in the context of climate change,and there are inherent value differences between responding to climate change and the realization of other human rights.Building a multi-level national obligation system to address climate change,giving full play to the role of courts in responding to climate change through moderate judicial activism,and coordinating the efforts to cope with climate change and the development of human rights under the guidance of a holistic system view are effective ways to overcome the aforementioned difficulties.
基金supported by the National Key Research and Development Program of China(No.2016YFB0800601)the Key Program of NSFC-Tongyong Union Foundation(No.U1636209)+1 种基金the National Natural Science Foundation of China(61602358)the Key Research and Development Programs of Shaanxi(No.2019ZDLGY13-04,No.2019ZDLGY13-07)。
文摘The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.
文摘The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting system using automatic addressable single-lamp control technology,and outlines the main development direction for this technology in modern tunnel lighting.The aim is to offer insights that can inform the rational deployment of this technology,thereby enhancing the lighting control effectiveness in modern tunnels and meeting their specific lighting requirements more effectively.
文摘Within the scope of human beings, some addressing terms are similar. However, different addressing terms still exist,which are influenced by the background of high context communication or low context communication. A good example is that Chinese traditional culture, a typical instance of high context communication, puts much emphasis on etiquette, which is represented in addressing terms as more complex and definite; In western, with the background of low context communication, every individual is more equal and they address each other more generally and much simpler. This paper tries to explore the addressing terms both in Chinese and in English from the perspective of frame theory.
文摘WS-Addressing用端点引用(EndpointReference,EPR)来进行Web服务寻址,EPR是动态生成的服务端点描述,它不能直接存储在统一描述、发现和集成(universal description discovery and integration,UDDI)的静态数据结构中。为实现UDDI和WS-Addressing共存的Web服务模型,提供了在UDDI中支持WS-Addressing的方法,并通过购物车的实现来说明应用程序应如何支持WS-Addressing。
文摘Applications of Wireless Sensor devices are widely used byvarious monitoring sections such as environmental monitoring, industrialsensing, habitat modeling, healthcare and enemy movement detection systems.Researchers were found that 16 bytes packet size (payload) requires MediaAccess Control (MAC) and globally unique network addresses overheads asmore as the payload itself which is not reasonable in most situations. Theapproach of using a unique address isn’t preferable for most Wireless SensorNetworks (WSNs) applications as well. Based on the mentioned drawbacks,the current work aims to fill the existing gap in the field area by providingtwo strategies. First, name/address solutions that assign unique addresseslocally to clustered topology-based sensor devices, reutilized in a spatialmanner, and reduce name/address size by a noticeable amount of 2.9 basedon conducted simulation test. Second, name/address solutions that assignreutilizing of names/addresses to location-unaware spanning-tree topologyin an event-driven WSNs case (that is providing minimal low latenciesand delivering addressing packet in an efficient manner). Also, to declinethe approach of needing both addresses (MAC and network) separately, itdiscloses how in a spatial manner to reutilize locally unique sensor devicename approach and could be utilized in both contexts and providing anenergy-efficient protocol for location unawareness clustered based WSNs.In comparison, an experimental simulation test performed and given theaddresses solution with less overhead in the header and 62 percent fairpayload efficiency that outperforms 34 percent less effective globally uniqueaddresses. Furthermore, the proposed work provides addresses uniquenessfor network-level without using network-wide Duplicate Address Detection(DAD) algorithm. Consequently, the current study provides a roadmap foraddressing/naming scheme to help researchers in this field of study. In general,some assumptions were taken during the work phases of this study such asnumber of Cluster Head (CH) nodes is 6% of entire sensor nodes, locationunawareness for entire sensor network and 4 bits per node address space whichconsidered as the limitation of the study.
文摘In China, sports and physical activity (PA) have tradition- ally been an integral part of school curricula to promote fitness and enhance healthy growth among children and ado- lescents. Three decades of economic reforms, however, have brought major changes in social, economic.
基金the National Grand Fundamental Research 973 Program of China (No.2004CB318109)the National High-Technology Research and Development Plan of China (No.2006AA01Z452)
文摘In the digital synthesis of wideband periodic signals using an Arbitrary Waveform Gen-erator(AWG),the frequency resolution and spectral complexity of the synthesized signals are com-monly limited by the memory capacity and clock frequency of the AWG.This paper proposes a novel sequential addressing scheme and then presents several sequences to improve the frequency resolution of the synthesized periodic signals without changing their spectral envelopes and basic time-domain characteristics under the condition of a fixed memory capacity and a fixed clock fre-quency.The main idea of the scheme is using the address generator in an AWG to program and produce addresses to read fixed waveform data in variable order,and thus to generate waveforms of various periods and profiles.The scheme is applied in simulating signal scenarios for military com-munication countermeasure experiments,and achieves high performance.
基金Special Programm for Compiling the Fourth National Assessment Report on Climate Change of the Ministry of Science and Technology.
文摘The compilation of technology lists addressing climate change has a guiding effect on promoting technological research and development,demonstration,and popularization.It is also crucial for China to strengthen ecological civilization construction,achieve the carbon emission peak and carbon neutrality target,and enhance global climate governance capabilities.This study first proposes the existing classification outline of the technology promotion lists,technology demand lists,and future technology lists.Then,different methodologies are integrated on the basis of the existing outline of four technology lists:China’s existing technological promotion list for addressing climate change,China’s demand list for climate change mitigation technology,China’s key technology list for addressing climate change,and China’s future technology list for addressing climate change.What’s more,core technologies are analyzed in the aspects of technology maturity,carbon reduction cost,carbon reduction potential,economic benefits,social influence,uncertainty,etc.The results show that:key industries and sectors in China already have relatively mature mitigation/adaptation technologies to support the achievement of climate change targets.The multi-sectoral system of promoting climate friendly technologies has been established,which has played an active role in tackling climate change.Currently,climate technology needs are concentrated in the traditional technology and equipment upgrading,renewable energy technology,and management decision-making support technology.The key technologies are concentrated in 3 major areas and 12 technological directions that urgently need a breakthrough.For carbon emmission peak and nentrality,carbon depth reduction and zero carbon emissions and geoengineering technology(CDR and SRM)have played an important role in forming the structure of global emissions and achieving carbon neutrality in the future.Thus,the uncertainty assessment for the comprehensive technology cost effectiveness,technology integration direction,technical maturity,ethics and ecological impacts is supportive to the national technology strategy.Finally,the presented study proposes several policy implications for medium-and long-term technology deployment,improving technology conversion rate,promoting the research and development of core technologies,and forming a technology list collaborative update and release mechanism.
文摘In contrast with English,Chinese addressing system is characterized by the great number coupled with cultural connotations,thus adding to the difficulty in Chinese-English translation.In this paper,the author endeavors to locate the source of differences between Chinese & English addressing terms and seek the cultural connotations and pragmatic equivalence of Chinese addressing terms in translation.
基金supported by the 2002 Ministry of Education Project for Science and Technology (2002,No.77)
文摘The effects of linear falling ramp reset pulse related to addressing operation in an alternating current plasma display panel (AC PDP) were studied. The wall charge waveforms were measured by the electrode balance method in a 12-inch coplanar AC PDP. The wall charge waveforms show the relationship between the slope ratio of the falling ramp reset pulse and the wall charges at the end of the falling ramp reset pulse which influences the addressing stability. Then the effects of the slope ratio of the linear falling ramp reset pulse on the addressing voltage and addressing time were investigated. The experimental results show that the minimum addressing voltage increases with the increase of the slope ratio of the falling ramp reset pulse, and so does the minimum addressing time. Based on the experimental results, the optimization of the addressing time and the slope ratio of the falling ramp pulse is discussed.
文摘Autoconfiguration protocols are important in maintaining mobile ad hoc networks (MANETs). In this paper, we present an autoconfiguration protocol called the one-step addressing (OSA) protocol characterized by its simplicity. Mathematical model is developed to evaluate the performance of the proposed protocol. The results of the model, which are validated by the simulation results, show that the OSA protocol outperforms the well-known token-based protocol in terms of both latency and communications overhead.
文摘A reference database of addressing is an important resource for urban applications. The efficiency of an addressing system depends on both data quality and technical architecture. Data must respect a standard model that is flexible to meet different cases in the field. The technical architecture should be service oriented to offer a shared resource for multiple users and applications. This paper is to develop an addressing model for Morocco that extends Davis’s and Fonseca’s model presented in their work on the certainty of locations produced by an address geocoding system. We discuss the addressing data dictionary and acquisition plan in Morocco, revealing a diversified data management environment, characterized by multiple sources and actors. As a novelty in the field of GIS, we establish our technical architecture around cloud computing, according Service Oriented Application (SOA) standards. Our approach is based on the three pillars of cloud computing which are Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a service (IaaS).
基金supported in part by International Researcher Exchange Project of National Science Foundation of China and Centre national de la recherche scientifique de France(NSFC-CNRS)under Grant No.61211130104national information security project 242 under Grant No.2014A104National Science Foundation of China under Grants No.60932003,61271220,61202266,61172053
文摘The addressing and routing algorithm on hexagonal networks is still an open problem so far.Although many related works have been done to resolve this problem to some extent,the properties of hexagonal networks are still not explored adequately.In this paper,we first create an oblique coordinate system and redefine the Euclidean space to address the hexagonal nodes.Then an optimal routing algorithm using vectors and angles of the redefined Euclidean space is developed.Compared with the traditional 3-directions scheme and the Cayley graph method,the proposed routing algorithm is more efficient and totally independent of the scale of networks with two-tuples addresses.We also prove that the path(s) obtained by this algorithm is always the shortest one(s).
文摘THE people" is a frequently mentioned phrase,to the extent of being the main theme of the report delivered at the 19th National Congress of the Communist Party of China(CPC)by General Secretary Xi Jinping."We must put the people’s interests above all else,see that the gains of reform and development benefit all our people in a
文摘Modern shared-memory multi-core processors typically have shared Level 2(L2)or Level 3(L3)caches.Cache bottlenecks and replacement strategies are the main problems of such architectures,where multiple cores try to access the shared cache simultaneously.The main problem in improving memory performance is the shared cache architecture and cache replacement.This paper documents the implementation of a Dual-Port Content Addressable Memory(DPCAM)and a modified Near-Far Access Replacement Algorithm(NFRA),which was previously proposed as a shared L2 cache layer in a multi-core processor.Standard Performance Evaluation Corporation(SPEC)Central Processing Unit(CPU)2006 benchmark workloads are used to evaluate the benefit of the shared L2 cache layer.Results show improved performance of the multicore processor’s DPCAM and NFRA algorithms,corresponding to a higher number of concurrent accesses to shared memory.The new architecture significantly increases system throughput and records performance improvements of up to 8.7%on various types of SPEC 2006 benchmarks.The miss rate is also improved by about 13%,with some exceptions in the sphinx3 and bzip2 benchmarks.These results could open a new window for solving the long-standing problems with shared cache in multi-core processors.