计算机专业外文翻译(文献翻译)

计算机专业外文翻译(文献翻译)
计算机专业外文翻译(文献翻译)

红外数据通信技术外文翻译文献

红外数据通信技术外文翻译文献(文档含中英文对照即英文原文和中文翻译) Infrared Remote Control System Abstract Red outside data correspondence the technique be currently within the scope of world drive extensive usage of a kind of wireless conjunction technique, drive numerous hardware and software platform support. Red outside the transceiver product have cost low, small scaled turn, the baud rate be quick, point to point SSL, be free from electromagnetism thousand Raos

etc. characteristics, can realization information at dissimilarity of the product fast, convenience, safely exchange and transmission, at short distance wireless deliver aspect to own very obvious of advantage. Along with red outside the data deliver a technique more and more mature, the cost descend, red outside the transceiver necessarily will get at the short distance communication realm more extensive of application. The purpose that design this system is transmit customer’s operation information with infrared rays for transmit media, then demodulate original signal with receive circuit. It use coding chip to modulate signal and use decoding chip to demodulate signal. The coding chip is PT2262 and decoding chip is PT2272. Both chips are made in Taiwan. Main work principle is that we provide to input the information for the PT2262 with coding keyboard. The input information was coded by PT2262 and loading to high frequent load wave whose frequent is 38 kHz, then modulate infrared transmit dioxide and radiate space outside when it attian enough power. The receive circuit receive the signal and demodulate original information. The original signal was decoded by PT2272, so as to drive some circuit to accomplish customer’s operation demand. Keywords: Infrared dray;Code;Decoding;LM386;Red outside transceiver 1 Introduction 1.1 research the background and significance Infrared Data Communication Technology is the world wide use of a wireless connection technology, by the many hardware and software platforms supported. Is a data through electrical pulses and infrared optical pulse switch between the wireless data transceiver technology.

生态旅游英文文献

Gee Journal 31.4457-465457?1993 (Dec) by Kluwer Academic Publishers Ecotoufism in the Small Island Caribbean Weave~ David B., Prof. Dl:, UniversiO, of Regina, Luther College, Regina, Saskatchewan $4S OA2, Canada ABSTRACT: Ecotourism-related strategies can serve to enhance the tourism industries of small Caribbean islands, which are presently dominated by a 3S (sea, sand, sun) product. In the first place, the principles of Alternative Tourism can be applied to 3S tourism in order to minimize negative environmental impacts. Secondly, diversionary ecotourism opportunities can be promoted to diversify the tourism product, thus providing a nature-oriented alternative to resort-based tourists. Thirdly, regional ecotourism, catering to ecotourists, can be fostered in mountainous interiors, peripheral islands, undeveloped coastlines, rural agricultural areas and in offshore reefs. A fourth strategy, exemplified by Dominica, entails a comprehensive ecotourism approach for destinations in which 3S tourism is undesired or unsuited. Introdactien The concept of ecotourism has attracted a considerable amount of interest among both academics and non-academics since the term was first introduced in the mid-1980s (see for example Boo t990; Goriup 1991; Lindberg 1991; Nelson, Butler and Wall 1993; Whelan 1991; Ziffer 1989). In a frequently cited definition, Ceballos-Lascurain (1988) characterizes ecotourism as Tourism that involves travelling to relatively undisturbed or uncontaminated natural areas with the specific object of studying, admiring and enjoying the scenery and its wild plants and animals, as well as any existing cultural aspects (both past and present) found in these areas. While this definition is useful in stressing the environmental orientation of ecotourism, it is clear that the term has also come to be associated with a range o f characteristics which collectively define an "alternative tourism" (AT) paradigm (Dernoi 1981; Krippendorf 1987; Singh, Theuns and Go 1989). This paradigm has emerged as an alternative to "conventional mass tourism" (CMT), which has been criticized as an often inappropriate form of tourism, especially for smaller destinations. CMT characteristics, outlined and contrasted in Tab 1 with the AT model, tend to appear during the middle and later stages of a destination's cycle of evolution (Butler 1980; Christaller 1963; Stansfield 1978). With respect to accommodations, attractions, market and economic impact, the argument can be made that ecotourism and AT are merely other names for the early "exploration" stage of the resort cycle, when relatively unspoiled areas are opened up to further tourist incursions by a few pioneer travellers. However, as pointed out by Weaver (1991), what distinguishes this "circumstantial" AT from "deliberate" AT is the lack of regulations and policies which attempt to ensure that the activity is maintained at environmentally, economically and socially sustainable levels. "Deliberate" ecotourism, the subject of this paper, is therefore very" much associated with intentions of identifying and working within the carrying capacities of a particular area, and o f discouraging the emergence of a CM T product where it is deeme d to be undesirable or inappropriate. The recent proliferation of ecotourism case studies, based largely in the underdeveloped world, is not surprising in light of deliberate ecotourism's status as the fastest growing form o f tourism (Whelan 1991). For example, Dearden (1989) and Zurick (1992) examined the p h e n o m e n o n of mountain trekking in Nepal and northern Thailand respectively, while Boo (1990), and Fennell and

计算机专业毕业设计说明书外文翻译(中英对照)

Talking about security loopholes Richard S. Kraus reference to the core network security business objective is to protect the sustainability of the system and data security, This two of the main threats come from the worm outbreaks, hacking attacks, denial of service attacks, Trojan horse. Worms, hacker attacks problems and loopholes closely linked to, if there is major security loopholes have emerged, the entire Internet will be faced with a major challenge. While traditional Trojan and little security loopholes, but recently many Trojan are clever use of the IE loophole let you browse the website at unknowingly were on the move. Security loopholes in the definition of a lot, I have here is a popular saying: can be used to stem the "thought" can not do, and are safety-related deficiencies. This shortcoming can be a matter of design, code realization of the problem. Different perspective of security loo phole s In the classification of a specific procedure is safe from the many loopholes in classification. 1. Classification from the user groups: ● Public loopholes in the software category. If the loopholes in Windows, IE loophole, and so on. ● specialized software loophole. If Oracle loopholes, Apach e,

人工智能专业外文翻译-机器人

译文资料: 机器人 首先我介绍一下机器人产生的背景,机器人技术的发展,它应该说是一个科学技术发展共同的一个综合性的结果,同时,为社会经济发展产生了一个重大影响的一门科学技术,它的发展归功于在第二次世界大战中各国加强了经济的投入,就加强了本国的经济的发展。另一方面它也是生产力发展的需求的必然结果,也是人类自身发展的必然结果,那么随着人类的发展,人们在不断探讨自然过程中,在认识和改造自然过程中,需要能够解放人的一种奴隶。那么这种奴隶就是代替人们去能够从事复杂和繁重的体力劳动,实现人们对不可达世界的认识和改造,这也是人们在科技发展过程中的一个客观需要。 机器人有三个发展阶段,那么也就是说,我们习惯于把机器人分成三类,一种是第一代机器人,那么也叫示教再现型机器人,它是通过一个计算机,来控制一个多自由度的一个机械,通过示教存储程序和信息,工作时把信息读取出来,然后发出指令,这样的话机器人可以重复的根据人当时示教的结果,再现出这种动作,比方说汽车的点焊机器人,它只要把这个点焊的过程示教完以后,它总是重复这样一种工作,它对于外界的环境没有感知,这个力操作力的大小,这个工件存在不存在,焊的好与坏,它并不知道,那么实际上这种从第一代机器人,也就存在它这种缺陷,因此,在20世纪70年代后期,人们开始研究第二代机器人,叫带感觉的机器人,这种带感觉的机器人是类似人在某种功能的感觉,比如说力觉、触觉、滑觉、视觉、听觉和人进行相类比,有了各种各样的感觉,比方说在机器人抓一个物体的时候,它实际上力的大小能感觉出来,它能够通过视觉,能够去感受和识别它的形状、大小、颜色。抓一个鸡蛋,它能通过一个触觉,知道它的力的大小和滑动的情况。第三代机器人,也是我们机器人学中一个理想的所追求的最高级的阶段,叫智能机器人,那么只要告诉它做什么,不用告诉它怎么去做,它就能完成运动,感知思维和人机通讯的这种功能和机能,那么这个目前的发展还是相对的只是在局部有这种智能的概念和含义,但真正完整意义的这种智能机器人实际上并没有存在,而只是随着我们不断的科学技术的发展,智能的概念越来越丰富,它内涵越来越宽。 下面我简单介绍一下我国机器人发展的基本概况。由于我们国家存在很多其

指纹识别系统(文献综述)

指纹识别方法的综述 摘 要: 对在指纹的预处理和特征提取、指纹分类、指纹的匹配过程中的方向图、滤波器、神经网络等关 键性原理和技术做了详细的说明,并对在各个过程中用到的方法做了进一步的比较,讨论了各种方法的优越性。 0 引 言 自动指纹识别是上世纪六十年代兴起的,利用计算机取代人工来进行指纹识别的一种方法。近年 来,随着计算机技术的飞速发展,低价位指纹采集仪的出现以及高可靠算法的实现,更使得自动指纹识 别技术越来越多地进入到人们的生活和工作中,自动指纹识别系统的研究和开发正在成为国内外学术 界和商业界的热点。相对于其他生物特征鉴别技术例如语音识别及虹膜识别,指纹识别具有许多独到 的优点,更重要的是它具有很高的实用性和可行性,已经被认为是一种理想的身份认证技术,有着十分 广泛的应用前景,是将来生物特征识别技术的主流。 1 指纹取像 图 1 是一个自动指纹识别系统AFIS(Automated Fingerprint Identification System) 的简单流程。 → → → ↓ ↑ ———— 将一个人的指纹采集下来输入计算机进行处理是指纹自动识别的首要步骤。指纹图像的获取主要利用设备取像,方便实用,比较适合AFIS 。利用设备取像的主要方法又利用光学设备、晶体传感器和超声波来进行。光学取像设备是根据光的全反射原理来设计的。晶体传感器取像是根据谷线和脊线皮肤与传感器之间距离不同而产生的电容不同来设计的。超声波设备取像也是采用光波来取像,但由于超声波波长较短,抗干扰能力较强,所以成像的质量非常好。 2 图像的预处理与特征提取 无论采取哪种方法提取指纹,总会给指纹图像带来各种噪声。预处理的目的就是去除图像中的噪 音,把它变成一幅清晰的点线图,以便于提取正确的指纹特征。预处理是指纹自动识别过程的第一步, 它的好坏直接影响着指纹识别的效果。常用的预处理与特征提取( Image Preprocessing and Feature Ex 2 t raction) 方法的主要步骤包括方向图计算、图像滤波、二值化、细化、提取特征和后处理。当然这些步骤 可以根据系统和应用的具体情况再进行适当变化。文献[ 1 ]提出了基于脊线跟踪的方法能够指纹取像 图像预处理 特征提取 指纹识别 数据库管理

旅游管理专业论文外文文献翻译

外文资料译文及原文 译文(一) 消费者体验旅游和品牌的结合 米契尔罗伯特 定义消费者体验旅游 制造工厂参观,公司博物馆和公司访客中心表现为被不同名字已知的观光事业片段:制造业观光事业,工业的吸引、工业的观光事业和工业的遗产观光事业。在每一个描述性的长期的共同目标是在消费者学习品牌,其运作,生产过程,历史和历史意义的时候建立一个消费者和品牌之间的纽带。有人建议在这里CET代表一个统一的主题的旅游。这个术语捕捉消费者的消费能力发现更多关于他们所消费的品牌,而制造商可以在与该工厂的客人接触的30-120分钟时间里建立与这些消费者更密切的关系。 参与的品牌 品牌经理寻求解决在三个层次消费者的需求: (1)功能(对消费者提供解决问题的办法); (2)符号(提供心理欲望满意度); (3)经历(提供感官快乐,品种,认知,刺激) CET可以通过视觉地介绍品牌,运作,生产工艺,历史和历史意义加强消费者和品牌之间的纽带。这种纽带可以被看作是个人品牌参与和品牌忠诚度的提高。认知参与反映了消费者对产品的兴趣(或学习更多)。CET可以通过刺激消费者对于品牌和生产过程的想象提高消费者的认知水平。此外,积极口碑沟通刺激满足旅客可能会比其他形式的促销更可信。 缺乏现有的直接研究关注 迄今为止,CET已经在行销文学中受到一点注意。米契尔和米契尔(2001年)对此内容这种的旅游网站进行了评估。此外,这些相同的作者已经评估食物和饮料工业中的现象(米契尔和米契尔,2000年),非营利部门(米契尔和米契尔,2001年b),和整体经济(米契尔等, 2001)。米契尔和米契尔(2002)为学者提出了格式,用来评估在当地的服务领域这些设施的地方利益。该主题通常包括对整合营销的简要讨论,但已收到直接研究的关注很有限。

通信工程项目毕业材料外文翻译

用于多跳认知无线电网络的分布式网络编码控制信道 Alfred Asterjadhi等著 1 前言 大多数电磁频谱由政府机构长期指定给公司或机构专门用于区域或国家地区。由于这种资源的静态分配,许可频谱的许多部分在许多时间和/或位置未使用或未被充分利用。另一方面,几种最近的无线技术在诸如IEEE802.11,蓝牙,Zigbee之类的非许可频段中运行,并且在一定程度上对WiMAX进行操作;这些技术已经看到这样的成功和扩散,他们正在访问的频谱- 主要是2.4 GHz ISM频段- 已经过度拥挤。为了为这些现有技术提供更多的频谱资源,并且允许替代和创新技术的潜在开发,最近已经提出允许被许可的设备(称为次要用户)访问那些许可的频谱资源,主要用户未被使用或零星地使用。这种方法通常被称为动态频谱接入(DSA),无线电设备发现和机会性利用未使用或未充分利用的频谱带的能力通常称为认知无线电(CR)技术。 DSA和CR最近都引起了无线通信和网络界的极大关注。通常设想两种主要应用。第一个是认知无线接入(CW A),根据该认知接入点,认知接入点负责识别未使用的许可频谱,并使用它来提供对次用户的接入。第二个应用是我们在这个技术中研究的应用,它是认知自组织网络(CAN),也就是使用 用于二级用户本身之间通信的无许可频谱,用于诸如点对点内容分发,环境监控,安全性等目的,灾难恢复情景通信,军事通信等等。 设计CAN系统比CW A有更多困难,主要有两个原因。第一是识别未使用的频谱。在CW A中,接入点的作用是连接到互联网,因此可以使用简单的策略来推断频谱可用性,例如查询频谱调节器在其地理位置的频谱可用性或直接与主用户协商频谱可用性或一些中间频谱经纪人另一方面,在CAN中,与频谱调节器或主要用户的缺乏直接通信需要二级用户能够使用检测技术自己识别未使用的频谱。第二个困难是辅助用户协调媒体访问目的。在CW A中存在接入点和通常所有二级用户直接与之通信(即,网络是单跳)的事实使得直接使用集中式媒体接入控制(MAC)解决方案,如时分多址(TDMA)或正交频分多址(OFDMA)。相反,预计CAN将跨越多跳,缺少集中控制器;而对于传统的单通道多跳自组织网络而言,这个问题的几个解决方案是已知的,因为假设我们处理允许设备访问的具有成

乡村旅游与可持续发展【外文翻译】

外文翻译 译文 标题:乡村旅游与可持续发展 资料来源: 亚诺什学院 - 布达佩斯经济科学大学 作者:塔玛拉拉茨 - 拉斯洛坡格左 引言 乡村旅游是旅游产业的一个部分,这在匈牙利显得尤为重要。在一个国家没有壮观的自然景观,没有海滨、高山、雨林、珍奇动物的情况下,迷人的村庄、温泉、河流和湖泊这些旅游资源可以利用起来。优美环境与当地人们传统的热情接待相结合,能够提供给游客愉快的体验,让游客在安静的环境中得到放松并且欣赏到文化景观。 一方面,乡村旅游业的发展使匈牙利旅游资源呈现多样化,使国家形象更加多姿多彩。另一方面,乡村旅游是刺激经济增长的一种手段,促进了欠发达地区的产业发展,并改善当地居民的生活水平。 如果乡村旅游要发挥其真正的作用,在某种程度上得到进一步的发展,那么在其自身发展的基础上,就要确保资源的长期可持续性发展。那么,什么是乡村旅游的可持续发展方式?如何对其可持续性进行监测来达到促进农村发展的目的?本文试图回答这些问题,并且通过提出匈牙利乡村旅游指标来了解被认为是这种类型的旅游的目前情况。 旅游业可持续发展 可持续发展的概念是由世界环境与发展委员会在1987年的布伦特兰报告中关提出来的,可持续发展定义为“发展,以满足当代人的需求又不损害子孙后代能满足自己的需要”。 旅游业是世界各地最重要的经济活动之一,1997年世界各地国际运送超过6.17亿人,年收益产生448亿美元(WTO,1998年),这是一个重要的经济力量。1996年产生生产总值3153.3亿美元,为255万人创造就业机会,参与生产应用程序。旅游业生产值占到世界10.7%的国内生产总值,766亿美元用于投资应用程序,每年都

计算机专业外文文献翻译6

外文文献翻译(译成中文2000字左右): As research laboratories become more automated,new problems are arising for laboratory managers.Rarely does a laboratory purchase all of its automation from a single equipment vendor. As a result,managers are forced to spend money training their users on numerous different software packages while purchasing support contracts for each. This suggests a problem of scalability. In the ideal world,managers could use the same software package to control systems of any size; from single instruments such as pipettors or readers to large robotic systems with up to hundreds of instruments. If such a software package existed, managers would only have to train users on one platform and would be able to source software support from a single vendor. If automation software is written to be scalable, it must also be flexible. Having a platform that can control systems of any size is far less valuable if the end user cannot control every device type they need to use. Similarly, if the software cannot connect to the customer’s Laboratory Information Management System (LIMS) database,it is of limited usefulness. The ideal automation software platform must therefore have an open architecture to provide such connectivity. Two strong reasons to automate a laboratory are increased throughput and improved robustness. It does not make sense to purchase high-speed automation if the controlling software does not maximize throughput of the system. The ideal automation software, therefore, would make use of redundant devices in the system to increase throughput. For example, let us assume that a plate-reading step is the slowest task in a given method. It would make that if the system operator connected another identical reader into the system, the controller software should be able to use both readers, cutting the total throughput time of the reading step in half. While resource pooling provides a clear throughput advantage, it can also be used to make the system more robust. For example, if one of the two readers were to experience some sort of error, the controlling software should be smart enough to route all samples to the working reader without taking the entire system offline. Now that one embodiment of an ideal automation control platform has been described let us see how the use of C++ helps achieving this ideal possible. DISCUSSION C++: An Object-Oriented Language Developed in 1983 by BjarneStroustrup of Bell Labs,C++ helped propel the concept of object-oriented programming into the mainstream.The term ‘‘object-oriented programming language’’ is a familiar phrase that has been in use for decades. But what does it mean? And why is it relevant for automation software? Essentially, a language that is object-oriented provides three important programming mechanisms:

文献综述_人工智能

人工智能的形成及其发展现状分析 冯海东 (长江大学管理学院荆州434023) 摘要:人工智能的历史并不久远,故将从人工智能的出现、形成、发展现 状及前景几个方面对其进行分析,总结其发展过程中所出现的问题,以及发展现状中的不足之处,分析其今后的发展方向。 关键词:人工智能,发展过程,现状分析,前景。 一.引言 人工智能最早是在1936年被英国的科学家图灵提出,并不为多数人所认知。 当时,他编写了一个下象棋的程序,这就是最早期的人工智能的应用。也有著名的“图灵测试”,这也是最初判断是否是人工智能的方案,因此,图灵被尊称为“人工智能之父”。人工智能从产生到发展经历了一个起伏跌宕的过程,直到目前为止,人工智能的应用技术也不是很成熟,而且存在相当的缺陷。 通过搜集的资料,将详细的介绍人工智能这个领域的具体情况,剖析其面临的挑战和未来的前景。 二.人工智能的发展历程 1. 1956年前的孕育期 (1) 从公元前伟大的哲学家亚里斯多德(Aristotle)到16世纪英国哲学家培根(F. Bacon),他们提出的形式逻辑的三段论、归纳法以及“知识就是力量”的警句,都对人类思维过程的研究产生了重要影响。 (2)17世纪德国数学家莱布尼兹(G..Leibniz)提出了万能符号和推理计算思想,为数理逻辑的产生和发展奠定了基础,播下了现代机器思维设计思想的种子。而19世纪的英国逻辑学家布尔(G. Boole)创立的布尔代数,实现了用符号语言描述人类思维活动的基本推理法则。 (3) 20世纪30年代迅速发展的数学逻辑和关于计算的新思想,使人们在计算机出现之前,就建立了计算与智能关系的概念。被誉为人工智能之父的英国天才的数学家图灵(A. Tur-ing)在1936年提出了一种理想计算机的数学模型,即图灵机之后,1946年就由美国数学家莫克利(J. Mauchly)和埃柯特(J. Echert)研制出了世界上第一台数字计算机,它为人工智能的研究奠定了不可缺少的物质基础。1950年图灵又发表了“计算机与智能”的论文,提出了著名的“图灵测试”,形象地指出什么是人工智能以及机器具有智能的标准,对人工智能的发展产生了极其深远的影响。 (4) 1934年美国神经生理学家麦克洛奇(W. McCulloch) 和匹兹(W. Pitts )建立了第一个神经网络模型,为以后的人工神经网络研究奠定了基础。 2. 1956年至1969年的诞生发育期 (1)1956年夏季,麻省理工学院(MIT)的麦卡锡(J.McCarthy)、明斯基(M. Minshy)、塞尔夫里奇(O. Selfridge)与索罗门夫(R. Solomonff)、 IBM的洛

虹膜识别外文翻译文献

虹膜识别外文翻译文献 虹膜识别外文翻译文献 (文档含中英文对照即英文原文和中文翻译) 外文: The first chapter 1.1 The research background of iris recognition Biometrics is a technology for personal identification using physiological characteristics and behavior characteristics inherent in the human body. Can be used for the biological characteristics of biological recognition, fingerprint, hand type face, iris, retina, pulse, ear etc.. Behavior has the following characteristics: signature, voice, gait, etc.. Based on these characteristics, it has been the development of hand shape recognition, fingerprint recognition, facial recognition, iris recognition, signature recognition and other biometric technology, many techniques have been formed and mature to application of. Biological recognition technology in a , has a long history, the ancient Egyptians through identification of each part of the body size measure to carry out identity may be the earliest human based on the earliest history of biometrics. But the modern biological recognition technology began in twentieth Century 70 time metaphase, as biometric devices early is relatively expensive, so only a higher security level atomic test, production base.due to declining cost of microprocessor and various electronic components, precision gradually improve, control device of a biological recognition technology has been gradually applied to commerce authorized, such as access control, attendance management, management system, safety certification field etc.. All biometric technology, iris recognition is currently used as a convenient and accurate.

旅游品牌定位外文翻译文献

旅游品牌定位外文翻译文献(文档含英文原文和中文翻译)

原文: Destination brand positions of a competitive set of near-home destinations Abstract: Although the branding literature commenced during the 1940s, the first publications related to destination branding did not emerge until half a century later. A review of 74 destination branding publications by 102 authors from the first 10 years of destination branding literature (1998–2007) found at least nine potential research gaps warranting attention by researchers. In particular, there has been a lack of research examining the extent to which brand positioning campaigns have been successful in enhancing brand equity in the manner intended in the brand identity. The purpose of this paper is to report the results of an investigation of brand equity tracking for a competitive set of destinations in Queensland, Australia between 2003 and 2007. A hierarchy of consumer-based brand equity (CBBE) provided an effective means to monitor destination brand positions over time. A key implication of the results was the finding that there was no change in brand positions for any of the five destinations over the four year period. This leads to the proposition that destination position change within a competitive set will only

5G无线通信网络中英文对照外文翻译文献

5G无线通信网络中英文对照外文翻译文献(文档含英文原文和中文翻译)

翻译: 5G无线通信网络的蜂窝结构和关键技术 摘要 第四代无线通信系统已经或者即将在许多国家部署。然而,随着无线移动设备和服务的激增,仍然有一些挑战尤其是4G所不能容纳的,例如像频谱危机和高能量消耗。无线系统设计师们面临着满足新型无线应用对高数据速率和机动性要求的持续性增长的需求,因此他们已经开始研究被期望于2020年后就能部署的第五代无线系统。在这篇文章里面,我们提出一个有内门和外门情景之分的潜在的蜂窝结构,并且讨论了多种可行性关于5G无线通信系统的技术,比如大量的MIMO技术,节能通信,认知的广播网络和可见光通信。面临潜在技术的未知挑战也被讨论了。 介绍 信息通信技术(ICT)创新合理的使用对世界经济的提高变得越来越重要。无线通信网络在全球ICT战略中也许是最挑剔的元素,并且支撑着很多其他的行业,它是世界上成长最快最有活力的行业之一。欧洲移动天文台(EMO)报道2010年移动通信业总计税收1740亿欧元,从而超过了航空航天业和制药业。无线技术的发展大大提高了人们在商业运作和社交功能方面通信和生活的能力无线移动通信的显著成就表现在技术创新的快速步伐。从1991年二代移动通信系统(2G)的初次登场到2001年三代系统(3G)的首次起飞,无线移动网络已经实现了从一个纯粹的技术系统到一个能承载大量多媒体内容网络的转变。4G无线系统被设计出来用来满足IMT-A技术使用IP面向所有服务的需求。在4G系统中,先进的无线接口被用于正交频分复用技术(OFDM),多输入多输出系统(MIMO)和链路自适应技术。4G无线网络可支持数据速率可达1Gb/s的低流度,比如流动局域无线访问,还有速率高达100M/s的高流速,例如像移动访问。LTE系统和它的延伸系统LTE-A,作为实用的4G系统已经在全球于最近期或不久的将来部署。 然而,每年仍然有戏剧性增长数量的用户支持移动宽频带系统。越来越多的

相关文档
最新文档