通信类外文文献翻译蜂窝网络中的全双工通信设备

通信类外文文献翻译蜂窝网络中的全双工通信设备
通信类外文文献翻译蜂窝网络中的全双工通信设备

蜂窝网络中的全双工通信设备

Sanghoon Kim和韦恩·斯塔克

密歇根州大学,安阿伯,MI48109

/

摘要——在本文中,我们研究了单波段全双工通信设备的性能改进,它可以发送和接收蜂窝网络同一频率的波段。在蜂窝网络中,两个不同的频率能够同时发送和接收半双工无线电。最近,全双工无线电允许无线节点同时发送和接收同一个频段。这表明,对于短距离通信,它是有作用的。同样,全双工通信是适合设备到设备(D2D )通信的,D2D通信通常是一个短距离通信。(D2D)通信是蜂窝网络中的垫片方案,使对等网络对主蜂窝网络产生有限的影响。当用户设备更靠近其他用户设备,而不是基站时,D2D通信会提高使用者之间通信的带宽效率。当全双工通信用于D2D通信时,本地用户之间的双向通信就只需要一个频段。全双工通信提高了D2D通信的带宽效率。我们提出了一个简单的全双工D2D通信协议,并对比传统蜂窝通信方案来分析该协议的带宽增益。

I.简介

无线网络经常在带宽效率或能量效率中受到限制。蜂窝网络通常依靠两个使用者之间的通信并利用大量基础设施来检查基站。如果两个使用者无限接近,那么频谱和能量的利用就不够有效,若此次通信包含大量信息,那么效率会更低。D2D通信直接发生在两个设备间,而不需通过一些基础设施,当D2D通信是适合的,协议的设计也是适合的,那么D2D通信就有了决定性的挑战。设备到设备的通信已包含在诸如IEEE802.11分布式标准中。在IEEE 802.11网络中,无线节点感知到信道,并决定它是否可以发送一个分组。在分布式无线网络中,节点采用了碰撞避免机制,例如CSMA / CA或RTS/ CTS协议。当一个接入点(AP)通常用于IEEE802.11 网络时,AP不直接控制任何的信道访问或资源分配。然而,设备到设备的通信没有被应用在蜂窝网络中。在蜂窝网络中,信息通过基站发送到目标用户设备(UE)。基站一般控制信道访问和分配资源,即使该通信发生在同一单元的用户设备中。

图片1:双工通信系统

图片2:全双工D2D和基础设施通信的比较

结合D2D 通信和蜂窝通信,可提高蜂窝网络的效率。当用户设备之间的距离近于到基站的距离,D2D 通信相对于通过基站的通信,能源和带宽效率更高。图2是D2D 通信效率更高的一个实例。因为信道访问与资源都受基站控制,所以蜂窝网络中的D2D 通信也应该由基站控制。因此,基站只允许在同一单元的本地用户设备之间使用D2D 通信,前提是它必须比通过基站的传统通信更有效率。用户设备节点比较靠近时,使用D2D 通信是合适的。随着用户设备节点的增加, D2D 通信吞吐量会急剧下降[1]。因为距离较短, D2D 通信比正常的蜂窝通信需要更少的资源,这就提高了总电池容量[2]。为D2D 通信管理干扰的协调资源分配被提议出来[3]。

我们将D2D 通信模型以无线通信的形式来支持位于邻近的设备的应用服务。适用于全双工D2D 通信的一个例子是,移动用户与此区的其他移动用户一起玩流行游戏,邻近用户设备之间的文件,图像,视频可以共享也是一个这样的例子。随着社会服务越来越多,通过移动设备邻近用户设备服务也变得可以利用,对D2D 通信的需求也会变得越多。

全双工通信的应用通常依靠频分复用或时分复用。应用D2D 通信需要无线电能够在单个频率上发送和接收信息。发射天线的发送给同时接受的接收天线带来了强大的自我干扰,D2D 通信应用因此受到挑战。模拟和数字干扰抵消的结合可以抑制自干扰[4]和[5]。有两个天线的全双工无线电已经应用,并已证明比处于低发射功率水平的半双工2×2MIMO 通信[5]具有更好的性能。在[6]和[7],采用全双工通信的MAC 协议是在ad-hoc 网络的背景下提出来的。

蜂窝通信采用的全双工通信已被考虑在[8]中的基于通信的基础设施。

全双工通信的特点与D2D 通信配合良好。 D2D 通信适用于近距离,全双工通信 在较短的距离内表现更好。在更短的距离内,全双工通信的自干扰会减少,因为发射功率会变低。在本文中,我们提出了一个完整的蜂窝网络D2D 双工通信协议。我们还分析了单频D2D 通信协议的带宽效率,并将它与传统蜂窝通信方案进行比较。这表明了单一频率D2D 通信提高了小区带宽效率。

这篇文章的要点如下。在第二节,我们会介绍系统模型。在第三节中,我们会分析单一频率的D2D 通信的性能。在第四节,我们提出了单频通信的资源分配协议和性能分析。结论会在第五节给出。

II. 系统模型

我们假设D2D 通信和初级(移动台对基站和基站对移动台)蜂窝网络共享整个相同的频带。我们假设网络以10 MHz 频段运行,并基于正交频分多址(OFDMA )。

A. 信道模型

我们假设独立等分布(IID )Rayleigh 衰落是在带宽的不同部分(在不同的时间间隔)。此外,有一个距离相关的路径损耗。假设在一个特定频率下所发送的信号功率是Pt ,在距离为d1是接收到的信号功率是:

21P |h |t r P d α

= (1) 其中h 是Rayleigh 衰落,2|h |1E ??=??,α是路径损耗指数。使用MIMO 时,在发射器

和接收器天线元件之间,该信道在一个特定的频率h 衰弱被替换成衰落矩阵H 。可用于任何类型通信的带宽相对相干带宽是足够大的,所以衰落是独立的。

B. 无线电模型

我们假设无线电配备两个天线,D2D 模式传输天线用于传输,而另一个天线用于接

收。我们考虑的情况是,用户可以在一个天线传输同时在第二天线接收,如图1所示,然而,一个节点的发射天线所发送的信号会干扰到在同一节点中的接收天线所接收的信号。模拟和数字干扰抵消只能部分取消自干扰。另外,自干扰是不可能被完全地取消的。当一个节点是发射功率Pt ,残留的自干扰功率KPt 量中K 是自干扰消除因子。随着传输信号功率的增加,残留的自干扰也会增加。当两个用户之间的信道是独立同分布的快衰落与距离相关的路径损耗,完整的双工通信的SINR 可以表示为

20t t

P d SINR N W KP α=+ (2) t P 是D2D 通信的发射功率,2d 是两个节点之间的距离。

C. D2D 通信模型

我们假设D2D 通信只用于同一单元中的用户设备,因为D2D 通信被基站控制,不同单元的设备可能不能够直接通信,否则将是低效的。D2D 通信的带宽分配将在下一章介绍。

要建立D2D 通信,两个步骤是必需的。第一步骤是发现。发现是用来寻找邻近区域的可用服务。当D2D 通信支持用户移动设备的应用程序, D2D 通信的可能性就能被确定下来。用户设备需要确定其它装置是否处于同一单元的邻近区域,是否具备D2D 通信能力。这还存在服务发现协议,如Flashlinq[9] 和Wi-Fi Direct[10]。 Flashlinq 支持蜂窝网络中的服务发现。第二个步骤是D2D 通信设置。用户设备要求D2D 通信到基站和基站确定这两个通信方案(D2D 和正常通信)哪个更高效。当确定D2D 通信比通过基站的通信更有效率,D2D 通信就会被允许的,相关资源会得到分配。在本文中,我们假设第一个步骤是成功的,只考虑第二个步骤和实际的D2D 通信。我们假定用户清楚该信道状态,例如路径损耗和用户设备与D2D 通信之间的衰弱。在如 Flashlinq[9]的协议中,一种特殊类型的信标被用于广播或发现服务,用户设备通过听信标来估计到其他用户设备的信道。

因为全双工通信可以在同一频带中传输和接收信息,它可以提高一个单元的带宽效率。当D2D 通信用于同一单元两个用户设备之间的通信时,它用的带宽是基于基础设施的通信(FDD )的一半。全双工D2D 通信和基于基础设施的通信区别如图2所示。当用户设备与基站通信,它使用半双工模式的两个天线。当用户设备采用的是D2D 通信,它会采用全双工通信,各个方向使用天线1。

D. 基于基础设施的通信模型

我们假设基于频分双工的蜂窝通信在蜂窝网络中应用。基于基础设施的通信会出现两种情况。第一种情况是同一单元的用户设备间的通信。在协议中,当用户设备与同一单元的其他用户设备通信时,用户设备需要进行D2D 通信。当基站确定现有的蜂窝通信比D2D 通信更高效,两个用户设备则通过基站进行通信。在这种情况下,需要双频段来进行通信。每频段分配给每个用户设备来与该基站进行通信。用于用户设备和基站的通信,使用FDD 。我们假设有一半分配的带宽被用于上行链路,而另一半用于下行链路。对于D2D 通信的带宽分配将在下一章介绍。第二种情况是用户设备连接到一个单元外的实体。实体可以是互联网上的服务器或在另一个单元的另一个用户设备。对于这两种情况,我们只考虑用户设备和基站之间的开销。第二种情况,是不能被D2D 通信所取代的,并且与传统的蜂窝通信相同。

与D2D 通信相比,我们关心基于基础设施的通信的带宽效率。我们假定2×2的MIMO 通信投入使用,在接收器处的信道状态信息中通信实现2×2的MIMO 信道容量。然后,

容量为[11]

22

1log det(I )2H HH C E N *???=+???

? (3) 2×2的MIMO 通信中,N 为噪声方差,H 是信道矩阵。实际的蜂窝通信系统中存在开销传输,例如控制或信令信息,需要在使用者与基站之间进行交换。然而,在本文中,我们只考虑实际的数据包传输,因为D2D 通信和蜂窝通信需要的开销具有可比性。

III. 全双工D2D 通信协议

A. D2D 通信设置

在本节中,我们描述了D2D 通讯设置协议。一个用户设备请求与另一用户设备通过基站进行D2D 通信,请求中包括D2D 信道状态信息。当D2D 通信比蜂窝通信更高效时,基站会为D2D 通信分配一个频带。图3说明了一个具有D2D 通信功能的单元。我们假设用户设备和基站之间的信道状态通过蜂窝通信中的参考信号[12] 对基站而言是已知的。当基站发现的基础设施通信比提出的D2D 通信更高效时,它通过基站为通信分配资源。当D2D 通信完成时,该装置通知基站信息以重新分配资源。

图片3:全双工通信系统

B. D2D 通信标准

用给定的信道状态信息时,基站决定D2D 通讯是否比通过基站的通信更高效。hD2D 代表D2D 通信中1x1的信道状态,Hb ,i 是用户i 和基站之间的2x2信道状态。当

两个用户设备要发送给彼此包括M 位的数据包时,我们假设D2D 通信具有信道相互性。随后采用全双工D2D 通信传输两方数据包时间消耗为

2222log (1|h |SINR)D D D D M T WE =??+??

(4) 其中SINR 在(2)中已给出。同一单元使用基于基础设施的通信的两方数据传输时间消耗为

inf inf 222,1,11inf 222,2,222log det(I )222log det(I )22b b O b b O M

T P W E H H N W d M P W E H H N W d αα*?*?=??+????+??+????

(5) 其中d1和 d2为用户设备和基站之间的距离,Pinf 是基于基础设施通信的传输信号功率。

全双工D2D 通信有效吞吐量SD2D ,基于基础设施的通信有效吞吐量Sinf ,分别为 222D D D D

M S T =

(6) 和 inf inf

2M S T = (7) 当基站从用户设备接收到D2D 通信请求和相关的信息时,它会比较两种方案的有效吞吐量(6)和(7),并选择可实现更高的吞吐量的传输方式。

C .资源分配

进行通信的带宽应该由所述基站分配。在相同单元两个用户设备之间的通信需要两个频

带,因为每个用户设备都需要访问基站。 D2D 通信和单元外实体蜂窝通信需要一个频带。我们对一个单位的带宽定义为

22unit D D Cin Cout

W W N N N =++ (8) 其中,W 是分配给单元的总带宽,ND2D 和 Ncin 分别是使用在同一单元用户设备之间

的D2D 通信和蜂窝通信的配对数,Ncout 是单元外实体通信的用户设备数量。D2D 对通信和实体外的用户设备通信得到了一个单元的带宽,同一单元用户设备之间的蜂窝通信得到了两个单元的带宽。按这种情况每个单元带宽被分配给每个用户设备。

IV. 性能分析

随着性能分析的第一步,我们比较同一单元下的两个用户设备使用全双工通信和基于

基础设施通信的吞吐量。我们假设两个用户设备距离百米,每个用户设备到基站的距离被假定相等,为100米-900米不等。我们也假设为基于基础设施的通信使用20 dBm 的发射功率,D2D 通信使用10 dBm 的发射功率。假设路径损耗指数α为4。我们假设130分贝自干扰消除由无线电实现。图4显示了全双工通信和基于基础设施的通信的吞吐量性能。首先,我们可以看到,自干扰消除确定了全双工通信的吞吐量。全双工通信用更少的自干扰消除实现了更少的吞吐量。我们可以看到当用户设备和基站之间的距离增加时,D2D 通信变得比基于基础设施的通信更高效。到基站的距离增加时,基于基础设施的通信的吞吐量会降低。然而,D2D 通信的性能没有随着到基站的距离的缩短而改变。我们认为当用户设备之间的距离减小时,全双工D2D 通信的性能会提高。距离缩短时,更小的发射功率是必要的,它能减少自干扰,从而提高吞吐量。全双工通信的性能对自干扰消除的量是敏感的。目前自干扰抵消可以通过110分贝[13]降低自干扰。我们显示了110分贝,120分贝和130分贝干扰减少的结果。

图片4:D2D通信系统与基础设施通信系统的吞吐量比较

在下一步的性能分析中,我们考虑在D2D通信带宽更高效的情况下,单元支持D2D 通信时总容量的大小。我们还考虑在单元只支持基于基础建设的通信时的总吞吐量性能。总容量是一个单元在同一时间的所有有效吞吐量的总和。我们假设单元的形状是六边形,正好可以嵌入半径为1km的圆。我们假设一个单元有100个用户。用户分两种类型。第一种用户与单元外实体通信。第二种用户中,我们假设m%的总用户要与单元内其他用户通信。他们请求当全双工D2D通信提高吞吐量时,允许进行D2D通信。当D2D通信不被允许时,他们通过基站进行通信。我们随机放置单元内的100个用户设备。我们假定用户设备选择一个最邻近的用户设备作为D2D通信伙伴,选择过程由发现算法完成。我们假定D2D通信使用的发射功率为10dBm和蜂窝通信使用的发射功率为20dBm。

图片5:全双工D2D通信启用单元的总容量和传统通信的比较

图5所示的是全双工D2D通信启用单元的总容量和传统通信的比较。首先,我们可以看到,传统蜂窝通信的吞吐量会随着单元内通信比例的增加而减少。因为单元内部通信,相比其他情况会需要双倍的带宽,单元内部通信的增加就意味着单元内部带宽效率的降低。第二,全双工D2D通信可避免显著性能下降。使用全双工的D2D通信,单元支持单元内用户设备之间的通信需求的资源比传统通信所需少一半。然而,全双工D2D

只有比基于基础设施的通信更高效时才会被允许使用。当在单元内通信比率低时,距离最邻近的用户设备很远的可能性就越大。在这种情况下,使用基于基础设施的通信更好,全双工D2D通信也是不被基站允许的。因此,随着单元内通信比率的增加,总容量会减少。由于在单元内部通信需求增加,需要进行D2D通信的用户设备距离比较近的可能性就越大。因此,130分贝自干扰抵消的总和吞吐量再一次随着单元内部通信的大量增多而增多。第三,使用全双工D2D通信的单元内部总容量依赖于自干扰消除量。在用户设备非常接近的情况下,消除量越少,全双工D2D通信性就比基于基础设施的通信具有更好的性能。因此,使用全双工D2D通信随着自干扰消除的减小而减小,引起了总和容量的下降。然而,在所有的自干扰假设下,全双工D2D通信比传统的蜂窝通信提高了更多的吞吐量总和,性能增益会随着单元内部比率的增加而增加。当单元内部通信比率是50%,全双工D2D启用单元会达到13%(110分贝取消),32%(120分贝取消),和51%的(130分贝取消)的总吞吐量,这比传统通信要高很多。

V.结论

在本文中,我们调查了全双工D2D通信的性能改进和基于基础设施通信的性能改进,并进行比较。D2D通信是覆盖通信方案,可以让邻近的用户以一个对等的方式交换数据包。当用户邻近时,它可以提高单元的容量。单波段全双工通信再同一频带上发射和接收信息,与D2D通信特征匹配。在两个用户距离临近时,它的性能比半双工更好。我们提出了一个在蜂窝网络中采用全双工D2D通信的协议。它表明提出的协议和全双工D2D通信提高了单元容量,和两个用户之间的有效吞吐量。它也表明,随着单元内部通信比率的增加,全双工D2D通信的性能增益也会增加。我们的结论是在未来蜂窝通信网络中,许多邻近的通信服务需要实行,全双工D2D通信可以作为一个提高带宽效率的候选。

VI.感谢

国家科学基金会批号CCF-0910765的资金支持了部分研究。

参考文献

[1] K. Doppler, M. Rinne, C. Wijting, C. Ribeiro, and K. Hugl, “Deviceto-device

communication as an underlay to lte-advanced net works,”Communications Magazine, IEEE, vol. 47, no. 12, pp. 42–49, 2009.

[2] H.-Y. Hsieh and R. Sivakumar, “On using peer-to-peer communication incellular

wireless data networks,” Mobile Computing, IEEE Transactionson, vol. 3, no. 1, pp.

57–72, 2004.

[3] P. Janis, V. Koivunen, C. Ribeiro, J. Korhonen, K. Doppler, and K. Hugl,

“Interference-aware resource allocation for device-to-device radio underlaying cellular networks,” in Vehicular Technology Conference, 2009.VTC Spring 2009. IEEE 69th, 2009, pp. 1–5.

[4] J. I. Choi, M. Jain, K. Srinivasan, P. Levis, and S. Katti, “Achievingsingle channel,

full duplex wireless communication,” Mobicom ’10,September 2010.

[5] M. Jain, J. I. Choi, T. M. Kim, D. Bharadia, S. Seth, K. Srinivasan,P. Levis, S. Katti,

and P. Sinh a, “Practical, real-time, full duplexwireless,” Mobicom ’11, September 2011.

[6] B. Radunovi, D. Gunawardena, A. Proutiere, N. Singh, V. Balan, andP. Key,

“Efficiency and fairness in distributed wireless networks throughself-interference cancellation and s cheduling,” Technical report MSRTR-2009-27, Microsoft Research, 2009.

[7] S. Kim and W. Stark, “On the performance of full duplex wirelessnetworks,” CISS,

2013.

[8] S. Goyal, P. Liu, S. Hua, and S. Panwar, “Analyzing a full-duplex cellularsystem,” in Conference on Information Sciences and Systems (CISS),2013, 2013.

[9] X. Wu, S. Tavildar, S. Shakkottai, T. Richardson, J. Li, R. Laroia, and

A. Jovicic, “Flashlinq: A synchronous distributed scheduler for peerto-peer ad hoc networks,” in Communication, Control, and Computing(Allerton), 2010 48th Annual Allerton Conference on. IEEE, 2010.

[10] Wi-Fi Alliance, “Wi-Fi certified Wi-Fi Direct,” White Paper: . org/news articles. php, 2010.

[11] D. Tse and P. Viswanath, Fundamentals of Wireless Communications.Cambridge University Press, 2005.

[12] “3GPP TS 36.211 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal TerrestrialRadio Access (E-UTRA); Physical Channels and Modulation.”

网络营销参与与消费者行为外文翻译

网络营销参与与消费者行为外文翻译 本科毕业论文设计外文翻译原文 Internet Marketing Involvement and Consumer Behavior Introduction One of the most stunning aspects of the past few years has been the speed at which the Internet market has expanded and matured This rapid rate of Internet adoption has resulted in an extraordinary pace of change in the marketing landscape- and opened up a variety of opportunities for marketers All across Taiwan and around the world shopping centers are closing their doors as consumers turn to the Internet for all of their shopping needs The Internet as the primary on-line marketing channel is now overtaking the commercial on-line servicesIn fact all of the on-line service firms now offer Internet access as a primary service Users can send e-mails exchange views shop for products and access newsfood recipes art and business information As the Internet establishes its position as a mainstream marketing channel consumer criticism regarding Internet marketing strategies have increased as well Critics worry about information privacy including issues related to the acquisition and dissemination

矫直机中英文对照外文翻译文献

中英文资料翻译 原文: AUTOMATING THE CONTROL OF MODERN EQUIPMENT FOR STRAIGHTENING FLAT-ROLLED PRODUCTS The company Severstal’ completed the successful introduction of new in-line plate-straightening machines (PSMs) on its 2800 and 5000 mills in August 2003 [1, 2, 3]. The main design features of the machines are as follows: ●each machine is equipped with hydraulic hold-down mechanisms (to improve the dynamics and accuracy of the machine adjustments and more reliably maintain a constant gap); ●the machines have mechanisms to individually adjust each work roller with the aid of hydraulic cylinders (this broadens the range of straightening regimes that can be realized by providing a measure of control over the change in the curvature of the plate); ●each work roller is provided with its own adjustable drive (to eliminate rigid kinematic constraints between the spindles); ●the system of rollers of the PSM is enclosed in cassettes (to facilitate repairs and reduce roller replacement costs); ●the PSM has a system that can be used to adjust the machine from a nine-roller straightening scheme to a five- ●roller scheme in which the distance between the rollers is doubled (this is done to widen the range of plate thick-nesses that the machine can accomodate). Thus, the new straightening machine is a sophisticated multi-function system of mechanisms that includes a wide range of hydraulically and electrically driven components controlled by digital and analog signals. The entire complex of PSM mechanisms can be divided into two functional groups: the main group, which includes the mechanisms that partici-pate directly in the straightening operation (the hold-down mechanisms, the mechanisms that individually adjust the rollers,the mechanisms that adjust the components for different straightening regimes, the mechanism that moves the top roller of the feeder, and the main drive); the auxiliary group (which includes the cassette replacement mechanism, the

计算机网络新技术外文翻译文献

计算机网络新技术外文翻译文献 (文档含中英文对照即英文原文和中文翻译) 译文: 计算机网络新技术 摘要 21世纪是一个信息时代的经济,计算机网络技术是这个时期的代表技术,以非常快的、具创造性得不断地发展,并将深入到人民群众的工作,生活和学习中。因此,控制这种技术看起来似乎具有很重要的意义。现在,我主要是采用新技术的几种网络技术在现实生活的应用。 关键字 因特网数字证书数字银包网格存储 3G

1.前言 互联网满36岁,仍然是一个进展中的工作。36年后在加州大学洛杉矶分校的计算机科学家使用15英尺的灰色电缆连接两台笨重的电脑,测试了一种在网络上新的数据交换的方式,这将最终成为互联网依然是一个在取得进展的工作。 大学的研究人员正在试验如何提高网络容量和速度。编程人员正在设法为网页注入更多的智能。并正在进行重新设计网络以减少垃圾邮件(垃圾邮件)和安全麻烦的工作。 与此同时威胁织机:批评人士警告说,商业,法律和政治压力可能会阻碍一些使互联网发展到今天的创新的类型。 斯蒂芬克罗克和温顿瑟夫属于1969年9月2日研究生加入的加州大学洛杉矶分校斯莱昂兰罗克教授工程实验室的团体,作为位无意义的测试数据两台计算机之间默默流动。到第二年的1月,其他三个“节点”加入到了这个网络。 然后是电子邮箱,几年之后,在七十年代后期一个所谓的核心通信协议即TCP / IP 协议,在80年代域名系统和在1990年万维网-现在的第二个最流行的应用背后电子邮件出现了。互联网的扩大,超出其最初的军事和教育领域延伸到了企业和全球的家庭中。 今天,克罗克仍然为互联网工作,为协作设计更好的工具。作为互联网管理机构的安全委员会主席,他正试图保卫系统的核心处理免受来自外部的威胁。 他认识到,他帮助建立的互联网工作远未完成,而这些改变是在商店,以满足多媒体日益增长的需求。网络供应商现唯一的“最佳努力”是在提供的数据包上。克罗克说,需要有更好的保障,以防止跳过和过滤现在常见的视频。 瑟夫,现在在MCI公司说,他希望他建立了有内置安全的互联网。微软,雅虎和美国在线公司,和其他的一些,目前正在努力改进网络,使邮件发送者可以验证的方式发送以降低使用虚假地址发送垃圾邮件。 瑟夫说,现在正在制定许多功能,是不可能立即解决计算速度慢和互联网管道窄,或

网络营销外文翻译

E---MARKETING (From:E--Marketing by Judy Strauss,Adel El--Ansary,Raymond Frost---3rd ed.1999 by Pearson Education pp .G4-G25.) As the growth of Googel. shows, some marketing principles never change.Markets always welcome an innovative new product, even in a crowded field of competitors ,as long as it provides customer value.Also,Google`s success shows that customers trust good brands and that well-crafted marketing mix strategies can be effective in helping newcomers enter crowded markets. Nevertheless, organizations are scrambling to determine how they can use information technology profitably and to understand what technology means for their business strategies. Marketers want to know which of their time-ested concepts will be enhanced by the Internet, databases,wireless mobile devices, and other technologies. The rapid growth of the Internet and subsequent bursting of the dot- bubble has marketers wondering,"What next?" This article attempts to answer these questions through careful and systematic examination of successful e-mar-keting strategies in light of proven traditional marketing practices. (Sales Promotion;E--Marketing;Internet;Strategic Planning ) 1.What is E--Marketing E--Marketing is the application of a broad range of information technologies for: Transforming marketing strategies to create more customer value through more effective segmentation ,and positioning strategies;More efficiently planning and executing the conception, distribution promotion,and pricing of goods,services,and ideas;andCreating exchanges that satisfy individual consumer and organizational customers` objectives. This definition sounds a lot like the definition of traditional marketing. Another way to view it is that e-marketing is the result of information technology applied to traditional marketing. E-marketing affects traditional marketing in two ways. First,it increases efficiency in traditional marketing strategies.The transformation results in new business models that add customer value and/or increase company profitability.

计算机网络安全文献综述

计算机网络安全综述学生姓名:李嘉伟 学号:11209080279 院系:信息工程学院指导教师姓名:夏峰二零一三年十月

[摘要] 随着计算机网络技术的快速发展,网络安全日益成为人们关注的焦点。本文分析了影响网络安全的主要因素及攻击的主要方式,从管理和技术两方面就加强计算机网络安全提出了针对性的建议。 [关键词] 计算机网络;安全;管理;技术;加密;防火墙 一.引言 计算机网络是一个开放和自由的空间,但公开化的网络平台为非法入侵者提供了可乘之机,黑客和反黑客、破坏和反破坏的斗争愈演愈烈,不仅影响了网络稳定运行和用户的正常使用,造成重大经济损失,而且还可能威胁到国家安全。如何更有效地保护重要的信息数据、提高计算机网络的安全性已经成为影响一个国家的政治、经济、军事和人民生活的重大关键问题。本文通过深入分析网络安全面临的挑战及攻击的主要方式,从管理和技术两方面就加强计算机网络安全提出针对性建议。

二.正文 1.影响网络安全的主要因素[1] 计算机网络安全是指“为数据处理系统建立和采取的技术和管理的安全保护,保护计算机硬件、软件数据不因偶然和恶意的原因而遭到破坏、更改和泄漏”。计算机网络所面临的威胁是多方面的,既包括对网络中信息的威胁,也包括对网络中设备的威胁,但归结起来,主要有三点:一是人为的无意失误。如操作员安全配置不当造成系统存在安全漏洞,用户安全意识不强,口令选择不慎,将自己的帐号随意转借他人或与别人共享等都会给网络安全带来威胁。二是人为的恶意攻击。这也是目前计算机网络所面临的最大威胁,比如敌手的攻击和计算机犯罪都属于这种情况,此类攻击又可以分为两种:一种是主动攻击,它以各种方式有选择地破坏信息的有效性和完整性;另一类是被动攻击,它是在不影响网络正常工作的情况下,进行截获、窃取、破译以获得重要机密信息。这两种攻击均可对计算机网络造成极大的危害,并导致机密数据的泄漏。三是网络软件的漏洞和“后门”。任何一款软件都或多或少存在漏洞,这些缺陷和漏洞恰恰就是黑客进行攻击的首选目标。绝大部分网络入侵事件都是因为安全措施不完善,没有及时补上系统漏洞造成的。此外,软件公司的编程人员为便于维护而设置的软件“后门”也是不容忽视的巨大威胁,一旦“后门”洞开,别人就能随意进入系统,后果不堪设想。

有关隧道方面外文文献与翻译

A convection-conduction model for analysis of the freeze-thaw conditions in the surrounding rock wall of a tunnel in permafrost regions HE Chunxiong( 何春雄 ), (State Key Laboratory of Frozen Soil Engineering, Lanzhou Institute of Glaciology and Geocryology, Chinese Academy of Sciences, Lanzhou 730000, China; Department of Applied Mathematics, South China University of Technology, Guangzhou 510640, China) WU Ziwang( 吴紫汪 )and ZHU Linnan( 朱林楠 ) (State key Laboratory of Frozen Soil Engineering, Lanzhou Institute of Glaciology and Geocryology Chinese Academy of Sciences, Lanzhou 730000, China) Received February 8, 1999 Abstract Based on the analyses of fundamental meteorological and hydrogeological conditions at the site of a tunnel in the cold regions, a combined convection-conduction model for air flow in the tunnel and temperature field in the surrounding has been constructed. Using the model, the air temperature distribution in the Xiluoqi No. 2 Tunnel has been simulated numerically. The simulated results are in agreement with the data observed. Then, based on the in situ conditions of sir temperature, atmospheric pressure, wind force, hydrogeology and engineering geology, the air-temperature relationship between the temperature on the surface of the tunnel wall and the air temperature at the entry and exit of the tunnel has been obtained, and the freeze-thaw conditions at the Dabanshan Tunnel which is now under construction is predicted. Keywords: tunnel in cold regions, convective heat exchange and conduction, freeze-thaw. A number of highway and railway tunnels have been constructed in the permafrost regions and their neighboring areas in China. Since the hydrological and thermal

计算机网络体系结构外文翻译

附录A With the new network technology and application of the continuous rapid development of the computer network should. Use of becoming increasingly widespread, the role played by the increasingly important computer networks and human. More inseparable from the lives of the community's reliance on them will keep growing. In order for computers to communicate, they must speak the same language or protocol. In the early days of networking, networks were disorganized in many ways. Companies developed proprietary network technologies that had great difficulties in exchanging information with other or existing technologies; so network interconnections were very hard to build. To solve this problem, the International Organization for Standardization(ISO)created a network model that helps vendors to create networks compatible with each other. Finding the best software is not easy. A better understanding of what you need and asking the right questions makes it easier. The software should be capable of handling challenges specific to your company. If you operate multiple distribution centers, it may be beneficial to create routes with product originating from more than one depot. Few software providers though, are capable of optimizing routes using multiple depots. The provider should be able to support installation of its product. Make sure to clearly understand what training and software maintenance is offered. Obviously, selecting the right routing/scheduling software is critically important. Unfortunately, some companies are using software that may not be best suited to their operation. Logistics actives with responsibility for approving the software ought to be comfortable they've made the right decision. It is important to realize that not all routing/scheduling software is alike! There questions to ask are:Which operating system is used?How easy is the software to use?Here is a good way to tell. Ask if its graphical user interface(GUI)is flexible. Find out about installation speed - how long does it take?Is the software able to route third party customers with your core business?When was the software originally released and when was it last upgraded? In 1984, ISO released the Open Systems Interconnection(OSI)reference model,

互联网网络营销外文文献翻译

互联网网络营销外文文献翻译 (含:英文原文及中文译文) 文献出处:Peter Kenzelmann. Technical Consultancy in Internationalization[J]. International Marketing Review, 2006, 4(3):20-29. 英文原文 The technical basis of network marketing Peter Kenzelmann Network marketing is based on the technology infrastructure of computer network technology, as represented by information technology. Computer networks of modern communications technology and computer technology to the product of combining it in different geographic regions and specialized computer equipment for external interconnection lines of communication into a large, powerful networks, thus enabling a large number of computers can easily transmit information to each other, share hardware, software, data and other resources. And network marketing is closely related to the computer network there are three types: the Internet, Extranet and Intranet. The theoretical basis for the network marketing Theoretical foundation of network marketing is direct marketing network theory, network theory of relationship marketing, marketing theory and network software to integrate marketing theory. (A) Direct Response Network Marketing Theory

网络安全外文翻译文献

网络安全外文翻译文献 (文档含英文原文和中文翻译) 翻译: 计算机网络安全与防范 1.1引言 计算机技术的飞速发展提供了一定的技术保障,这意味着计算机应用已经渗透到社会的各个领域。在同一时间,巨大的进步和网络技术的普及,社会带来了巨大的经济利润。然而,在破坏和攻击计算机信息系统的方法已经改变了很多的网络环境下,网络安全问题逐渐成为计算机安全的主流。

1.2网络安全 1.2.1计算机网络安全的概念和特点 计算机网络的安全性被认为是一个综合性的课题,由不同的人,包括计算机科学、网络技术、通讯技术、信息安全技术、应用数学、信息理论组成。作为一个系统性的概念,网络的安全性由物理安全、软件安全、信息安全和流通安全组成。从本质上讲,网络安全是指互联网信息安全。一般来说,安全性、集成性、可用性、可控性是关系到网络信息的相关理论和技术,属于计算机网络安全的研究领域。相反,狭隘“网络信息安全”是指网络安全,这是指保护信息秘密和集成,使用窃听、伪装、欺骗和篡夺系统的安全性漏洞等手段,避免非法活动的相关信息的安全性。总之,我们可以保护用户利益和验证用户的隐私。 计算机网络安全有保密性、完整性、真实性、可靠性、可用性、非抵赖性和可控性的特点。 隐私是指网络信息不会被泄露给非授权用户、实体或程序,但是授权的用户除外,例如,电子邮件仅仅是由收件人打开,其他任何人都不允许私自这样做。隐私通过网络信息传输时,需要得到安全保证。积极的解决方案可能会加密管理信息。虽然可以拦截,但它只是没有任何重要意义的乱码。 完整性是指网络信息可以保持不被修改、破坏,并在存储和传输过程中丢失。诚信保证网络的真实性,这意味着如果信息是由第三方或未经授权的人检查,内容仍然是真实的和没有被改变的。因此保持完整性是信息安全的基本要求。 可靠性信息的真实性主要是确认信息所有者和发件人的身份。 可靠性表明该系统能够在规定的时间和条件下完成相关的功能。这是所有的网络信息系统的建立和运作的基本目标。 可用性表明网络信息可被授权实体访问,并根据自己的需求使用。 不可抵赖性要求所有参加者不能否认或推翻成品的操作和在信息传输过程中的承诺。

冲压模具成型外文翻译参考文献

冲压模具成型外文翻译参考文献 (文档含中英文对照即英文原文和中文翻译) 4 Sheet metal forming and blanking 4.1 Principles of die manufacture 4.1.1 Classification of dies In metalforming,the geometry of the workpiece is established entirely or partially by the geometry of the die.In contrast to machining processes,ignificantly greater forces are necessary in forming.Due to the complexity of the parts,forming is often not carried out in a single operation.Depending on the geometry of the part,production is carried out in several operational steps via one or several production processes such as forming or blanking.One operation can also include several processes simultaneously(cf.Sect.2.1.4). During the design phase,the necessary manufacturing methods as well as the sequence and number of production steps are established in a processing plan(Fig.4.1.1).In this plan,the

计算机网络外文翻译

附录 一、英文原文: The NetWorks Birth of the Net The Internet has had a relatively brief, but explosive history so far. It grew out of an experiment begun in the 1960's by the U.S. Department of Defense. The DoD wanted to create a computer network that would continue to function in the event of a disaster, such as a nuclear war. If part of the network were damaged or destroyed, the rest of the system still had to work. That network was ARPANET, which linked U.S. scientific and academic researchers. It was the forerunner of today's Internet. In 1985, the National Science Foundation (NSF) created NSFNET, a series of networks for research and education communication. Based on ARPANET protocols, the NSFNET created a national backbone service, provided free to any U.S. research and educational institution. At the same time, regional networks were created to link individual institutions with the national backbone service. NSFNET grew rapidly as people discovered its potential, and as new software applications were created to make access easier. Corporations such as Sprint and MCI began to build their own networks, which they linked to NSFNET. As commercial firms and other regional network providers have taken over the operation of the major Internet arteries, NSF has withdrawn from the backbone business. NSF also coordinated a service called InterNIC, which registered all addresses on the Internet so that data could be routed to the right system. This service has now been taken over by Network Solutions, Inc., in cooperation with NSF. How the Web Works The World Wide Web, the graphical portion of the Internet, is the most popular part of the Internet by far. Once you spend time on the Web,you will begin to feel like there is no limit to what you can discover. The Web allows rich and diverse communication by displaying text, graphics, animation, photos, sound and video. So just what is this miraculous creation? The Web physically consists of your personal computer, web browser software, a connection to an Internet service provider, computers called servers that host digital data and routers and switches to direct the flow of information. The Web is known as a client-server system. Your computer is the client; the remote computers that store electronic files are the servers. Here's how it works: Let's say you want to pay a visit to the the Louvre museum website. First you enter the address or URL of the website in your web browser (more about this shortly). Then your browser requests the web page from the web server that hosts the Louvre's site. The Louvre's server sends the data over the Internet to your computer. Your web

网络营销策略外文文献翻译

文献出处:Guzzo T, D’Andrea A, Ferri F, et al. Evolution of Marketing Strategies: From Internet Marketing to M-Marketing[C]//On the Move to Meaningful Internet Systems: OTM 2012 Workshops. Springer Berlin Heidelberg, 2012: 627-636. 原文 Evolution of Marketing Strategies:From Internet Marketing to M-Marketing Tiziana Guzzo, Alessia D’Andrea, Fernando Ferri, and Patrizia Grifoni 1 Introduction Marketing is “the process which creates, communicates, delivers the value to the consumers, and maintains the relationship with consumers. It generates the strategy that underlies sales techniques, business communication, and business developments. It is “an integrated process through which companies build strong consumers relationships and create value for their consumers and for themselves” Marketing strategies have a long history and mainly interested economists and sociologists. The wide use of Internet, pervasiveness of social networks and the evolution of mobile devise are implying a wider involvement of interdisciplinary competences enlarging the interest toward ICT competences. This paper is to describe the evolution of marketing strategies from the advent of the Web (Internet Marketing) - through the advent of Social Networks (Marketing 2.0) - to the evolution of Mobile Social Networks (M-marketing). In particular, the paper analyses the use that Italian people make of mobile devices and the user perception and acceptance of M-marketing.

材料英文文献翻译

The development of plastic mould China's industrial plastic moulds from the start to now, after more than half a century, there has been great development, mold levels have been greatly enhanced. Mould has been at large can produce 48-inch big-screen color TV Molded Case injection mold, 6.5 kg capacity washing machine full of plastic molds, as well as the overall car bumpers and dashboards, and other plastic mould precision plastic molds, the camera is capable of producing plastic mould , multi-cavity mold small modulus gear and molding mold. --Such as Tianjin and Yantai days Electrical Co., Ltd Polaris IK Co. manufactured multi-cavity mold VCD and DVD gear, the gear production of such size precision plastic parts, coaxial, beating requirements have reached a similar foreign the level of product, but also the application of the latest gear design software to correct contraction as a result of the molding profile error to the standard involute requirements. Production can only 0.08 mm thickness of a two-cavity mold and the air Cup difficulty of plastic doors and windows out of high modulus, and so on. Model cavity injection molding manufacturing accuracy of 0.02 to 0.05 mm, surface roughness Ra0.2 μ m, mold quality, and significantly increase life expectancy, non-hardening steel mould life up to 10~ 30 million, hardening steel form up to 50 ~ 10 million times, shorten the delivery time than before, but still higher than abroad,and the gap between a specific data table. Process, the multi-material plastic molding die, efficient multicolor injection mould, inserts exchange structure and core pulling Stripping the innovative design has also made great progress. Gas-assisted injection molding, the use of more mature technologies, such as Qingdao Hisense Co., Ltd., Tianjin factory communications and broadcasting companies, such as mold manufacturers succeeded in 29 ~ 34-inch TV thick-walled shell, as well as some parts on the use of gas-assisted mould technology Some manufacturers also use the C-MOLD gas-assisted software and achieved better results. Prescott, such as Shanghai, such as the new company will provide users with gas-assisted molding equipment and technology. Began promoting hot runner mold, and some plants use rate of more than 20 percent, the general heat-thermal hot runner, or device, a small number of units with the world's advanced level of rigorous hot runner-needle device, a small number of units with World advanced level of rigorous needle-hot runner mould. However, the use of hot runner overall rate of less than 10%, with overseas compared to 50 ~ 80%, the gap larger. In the manufacturing technology, CAD / CAM / CAE technology on the level of application of a new level to the enterprise for the production of household appliances representatives have introduced a considerable number of CAD / CAM systems, such as the United States EDS UG Ⅱ,

相关文档
最新文档