三网融合中英文对照外文翻译文献

合集下载

互联网Web服务中英文对照外文翻译文献

互联网Web服务中英文对照外文翻译文献

互联网Web服务中英文对照外文翻译文献(文档含英文原文和中文翻译)An internet-based logistics management system forenterprise chains.Developing the internet-based application toolWeb services offer new opportunities in business landscape, facilitating a global marketplace where business rapidly create innovative products and serve customers better. Whatever that business needs is, Web services have the flexibility to meet the demand and allow to accelerate outsourcing. In turn, the developer can focus on building core competencies to create customer and shareholder value. Application development is also more efficient because existing Web services, regardless of where they were developed, can easily be reused.Many of the technology requirements for Web services exist today, such as open standards for business to-business applications, mission-critical transaction platforms and secure integration and messaging products. However, to enable robust and dynamic integration of applications, the industry standards and tools that extend the capabilities of to days business-to-business interoperability are required. The key to taking full advantage of Web services is to understand what Web services are and how the market is likely to evolve. One needs to be able to invest inplatforms and applications today that will enable the developer to quickly and effectively realize these benefits as well as to be able to meet the specific needs and increase business productivity.Typically, there are two basic technologies to be implemented when dealing with internet-based applications; namely server-based and client-based. Both technologieshave their strong points regarding development of the code and the facilities they provide. Server-based applications involve the development of dynamically created web pages. These pages are transmitted to the web browser of the client and contain code in the form of HTML and JA V ASCRIPT language. The HTML part is the static part of the page that contains forms and controls for user needs and the JA V ASCRIPT part is the dynamic part of the page. Typically, the structure of the code can be completely changed through the intervention of web server mechanisms added on thetransmission part and implemented by server-based languages such as ASP, JSP, PHP, etc. This comes to the development of an integrated dynamic page application where user desire regarding problem peculiarities (calculating shortest paths, execute routing algorithms, transact with the database, etc.) is implemented by appropriately invoking different parts of the dynamic content of such pages. In server-based applications allcalculations are executed on the server. In client-based applications, JA V A applets prevail. Communication of the user is guaranteed by the well-known JA V A mechanism that acts as the medium between the user and code.Everything is executed on the client side. Data in this case have to be retrieved, once and this might be the time-consuming part of the transaction.In server-based applications, server resources are used for all calculations and this requires powerful server facilities with respect to hardware and software. Client-based applications are burdened with data transmission (chiefly related to road network data). There is a remedy to that; namely caching. Once loaded, they are left in the cache archives of the web browser to be instantly recalled when needed.In our case, a client-based application was developed. The main reason was the demand from the users point of view for personal data discretion regarding their clients. In fact, this information was kept secret in our system even from the server side involved.Data management plays major role in the good function of our system. This role becomes more substantial when the distribution takes place within a large and detailed road network like this of a major complex city. More specifically, in order to produce the proposed the routing plan, the system uses information about:●the locations of the depot and the customers within the road networkof the city (their co-ordinates attached in the map of the city),●the demand of the customers serviced,●the capacity of the vehicles used,●the spatial characteristics of road segments of the net work examined, ●the topography of the road network,●the speed of the vehicle, considering the spatial characteristics of theroad and the area within of which is moved,●the synthesis of the company fleet of vehicles.Consequently, the system combines, in real time, the available spatial characteristics with all other information mentioned above, and tools for modelling, spatial, non-spatial, and statistical analysis, image processing forming a scalable, extensible and interoperable application environment. The validation and verification of addresses of customers ensure the accurate estimation of travel times and distances travelled. In the case of boundary in the total route duration, underestimates of travel time may lead to failure of the programmed routing plan whereas overestimates can lower the utilization of drivers andvehicles, and create unproductive wait times as well (Assad, 1991). The data corresponding to the area of interest involved two different details. A more detailed network, appropriately for geocoding (approximately250,000 links) and a less detailed for routing (about 10,000 links). The two networks overlapped exactly. The tool that provides solutions to problems of effectively determining the shortest path, expressed in terms of travel time or distance travelled, within a specific road network, using the D ijkstra’s algorithm(Winston,1993). In particular, the Dijkstra’s algorithm is used in two cases during the process of developing the routing plan. In the first case, it calculates the travel times between all possible pairs of depot and customers so that the optimizer would generate the vehicle routes connecting them and in the second case it determines the shortest path between two involved nodes (depot or customer) in the routing plan, as this was determined by the algorithm previously. Due to the fact, that U-turn and left-,right-turn restrictions were taken into consideration for network junctions, an arc-based variant of the algorithm was taken into consideration (Jiang, Han, & Chen, 2002).The system uses the optimization algorithms mentioned in the following part in order to automatically generate the set of vehicle routes (which vehicles should deliver to which customers and in which order) minimizing simultaneously the vehicle costs and the total distance travelled by the vehicles This process involves activities that tend to be more strategic and less structured than operational procedures. The system helpsplanners and managers to view information in new way and examine issues such as:●the average cost per vehicle, and route,●the vehicle and capacity utilization,●the service level and cost,●the modification of the existing routing scenario by adding orsubtracting customers.In order to support the above activities, the interface of the proposed system provides a variety of analyzed geographic and tabulated data capabilities. Moreover, the system can graphically represent each vehicle route separately, cutting it o? from the final routing plan and offering the user the capability for perceiving the road network and the locations of depot and customers with all details.物流管理系统发展基于互联网的应用工具Web服务提供的商业景观的新机会,促进全球市场在业务快速推出创新的产品和客户提供更好的服务。

三网融合论文价值分析论文

三网融合论文价值分析论文

三网融合论文价值分析论文三网融合技术的价值分析与可行性研究摘要:所谓三网融合,就是指电信网、广播电视网和计算机通信网的相互渗透、互相兼容、并逐步整合成为全世界统一的信息通信网络,并且合并的方向是传输、接收和处理全部实现数字化。

目的是实现网络资源的共享,避免低水平的重复建设,形成适应性广、容易维护、费用低的高速宽带的多媒体基础平台。

Abstract: The so-called three net fusions refers to the mutual penetration and mutual compatibility of telecommunication networks, radio networks and computer communication networks, and gradually integrates into a unified information and communication networks around the world, and the combined direction is to achieve digitization of transmission, reception and processing. The aim is to achieve shared network resources, avoid low-level duplicated construction, and form a multimedia foundation platform of high-speed broadband, which has wide adaptability, easy maintenance and low cost.关键词:三网融合;技术;分析研究Key words: three net fusions;technology;analysis0基本概念三网融合是指电信网、计算机网和有线电视网三大网络通过技术改造,能够提供包括语音、数据、图像等综合多媒体的通信业务。

云技术和服务中英文对照外文翻译文献

云技术和服务中英文对照外文翻译文献

中英文对照外文翻译文献(文档含英文原文和中文翻译)译文:利用云技术和服务的新兴前沿:资产优化利用摘要投资回报最大化是一个主要的焦点对所有公司。

信息被视为手段这样做。

此信息是用来跟踪性能和提高财务业绩主要通过优化利用公司资产。

能力和速度,这是可能的收集信息并将其分发到当前的技术该组织正在不断增加,事实上,有超过了行业的能力,接受和利用它。

今天,生产运营商被淹没在数据的结果一种改进的监控资产的能力。

智能电机保护和智能仪器和条件监控系统经常提供32多块每个设备的信息都与相关的报警。

通常运营商没有装备来理解或行动在这个信息。

生产企业需要充分利用标的物专门为这个目的,通过定位他们的工程人员区域中心。

这些工程师需要配备足够的知识能够理解和接受适当的行动来处理警报和警报通过这些智能设备。

可用的信息可以是有用的,在寻找方法增加生产,减少计划外的维护和最终减少停机时间。

然而,寻找信息在实时,或在实时获得有用的信息,而不花了显着的非生产时间,使数据有用的是一个巨大的挑战。

本文将介绍云技术作为一种获取可视化和报告的经济方法条件为基础的数据。

然后,它将讨论使用云技术,使工程资源与现场数据可通过网络浏览器访问的安全格式技术。

我们将覆盖资产的方法多个云服务的优化和效益飞行员和项目。

当重工业公司在全球范围看,世界级运营实现整体设备效率(OEE)得分百分之91。

从历史上看,石油和天然气行业的滞后,这得分十分以上(Aberdeen 集团“操作风险管理”十月2011)。

OEE是质量的商,可用性和效率得分。

这些,可用性似乎影响了石油和天然气行业的最大程度。

在石油和天然气的可用性得分的根源更深的研究导致旋转资产作为故障的根本原因,在70%的情况下,失去的生产或计划外停机。

鉴于这一行业的关键资产失败的斗争,但有方法,以帮助推动有效性得分较高,以实现经营效率的目标。

.在未来十年中,海上石油储量的追求将涉及复杂的提取方法和海底提取技术的广泛使用。

外文文献和中文翻译.doc-Internet-basedCommunications

外文文献和中文翻译.doc-Internet-basedCommunications

Internet-based CommunicationsIf you use the Internet, then you probably use Internet-based communications to contact family, friends or co-workers. From sending an instant message to a friend, to e-mailing co-workers, to placing phone calls, to conducting video conferences, the Internet offers a number of ways to communicate.The advantages of Internet-based communications are many. Since you're already paying for an Internet account (or your employer is), you can save money on phone calls by sending someone an instant message or by using V oIP instead of standard local telephone services. Of course, no technology is without a downside and Internet-based communications has plenty, such as viruses, privacy issues and spam. Like all technologies (and especially technology tied to the Internet), the way we can communicate online is constantly evolving . In this week's "Did Y ou Know...?" article we'll take a look at some of the most popular forms of Internet-based communications.Instant MessagingOne of the fastest-growing forms of Internet communications is instant messaging, or IM. Think of IM as a text-based computer conference between two or more people. An IM communications service enables you to create a kind of private chat room with another individual in order to communicate in real-time over the Internet. Typically, the IM system alerts you whenever somebody on your buddy or contact list is online. Y ou can then initiate a chat session with that particular individual.One reason that IM has become so popular is its real-time nature. Unlike e-mail, where you will wait for the recipient to check his or her e-mail and send a reply, if a person you want to reach is online and available in your IM contact list, your message appears instantly in a window on their screen.While IM is used by millions of Internet users to contact family and friends, it's also growing in popularity in the business world. Employees of a company can have instant access to managers and co-workers in different offices and can eliminate the need to place phone calls when information is required immediately. Overall, IM can save time for employees and help decrease the amount of money a business spends on communications.Key Terms To Understanding Internet-based Communications.SIPShort for Session Initiated Protocol, or Session Initiation Protocol, an application-layer control protocol; a signaling protocol for Internet Telephony. SIP canestablish sessions for features such as audio/videoconferencing, interactive gaming, and call forwarding to be deployed over IP networks.WAPShort for the Wireless Application Protocol, a secure specification that allows users to access information instantly via handheld wireless devices such as mobile phones, pagers, two-way radios, smartphones and communicators.More Internet-based Communications TermsE-mailInstant MessagingV oIPV oWiFiInternet FaxMobile IPIP AddressWhile different IM clients offer slightly different features and benefits, the look and feel of an IM client is basically the same. Public IM clients and services available include ICQ, AOL Instant Messenger (AIM), Microsoft MSN Messenger, and Y ahoo! Messenger. For businesses and enterprises looking for a more secure method of IM, there are enterprise IM packages available such as Microsoft Live Communication Server 2005 and IBM Lotus Instant Messaging. Third-party software is available to help businesses make using public IM services in the workplace more secure.Some problems and issues associated with IM include spim and virus propagation. Spim is the IM equivalent of spam and is perpetuated by bots that harvest IM screen names off of the Internet and simulate a human user by sending spim to the screen names via an instant message. The spim typically contains a link to a Web site that the spimmer is trying to market. Spim is a bit more intrusive than spam due to the nature of IM itself. These advertisements and junk messages will pop-up in your IM window and you need to deal with the messages immediately, where with e-mail you can usually filter a lot of it out and deal with it later. Additionally, viruses and Trojans can be spread through IM channels. These malicious programs are usually spread when an IM user receives a message that links to a Web site where the malicious code is downloaded. The message will appear to be from a known IM contact, which is why recipients re more likely to click the hyperlink and download the file. Using safe chat rules (such as never clicking the link) and keeping an updated anti-virus program on your system will help reduce the chances of becoming infected by malicious programs being spread through instant messaging.Internet Telephony & V oIPInternet telephony consists of a combination of hardware and software that enables you to use the Internet as the transmission medium for telephone calls. For users who have free, or fixed-price Internet access, Internet telephony software essentially provides free telephone calls anywhere in the world. In its simplest form, PC-to-PC Internet telephony can be as easy as hooking up a microphone to your computer and sending your voice through a cable modem to a person who has Internet telephony software that is compatible with yours. This basic form of Internet telephony is not without its problems, however. Connecting this way is slower than using a traditional telephone, and the quality of the voice transmissions is also not near the quality you would get when placing a regular phone call.Many Internet telephony applications are available. Some, such as CoolTalk and NetMeeting, come bundled with popular Web browsers. Others are stand-alone products. Internet telephony products are sometimes called IP telephony, V oice over the Internet (VOI) or V oice over IP (V oIP) products.V oIP is another Internet-based communications method which is growing in popularity. V oIP hardware and software work together to use the Internet to transmit telephone calls by sending voice data in packets using IP rather than by traditional circuit transmissions, called PSTN (Public Switched Telephone Network). The voice traffic is converted into data packets then routed over the Internet, or any IP network, just as normal data packets would be transmitted. When the data packets reach their destination, they are converted back to voice data again for the recipient. Y our telephone is connected to a V oIP phone adapter (considered the hardware aspect). This adapter is connected to your broadband Internet connection. The call is routed through the Internet to a regular phone jack, which is connected to the receiver's phone. Special hardware (the phone adapter) is required only for the sender.Much like finding an Internet service provider (ISP) for your Internet connection, you will need to use a V oIP provider. Some service providers may offer plans that include free calls to other subscribers on their network and charge flat rates for other V oIP calls based on a fixed number of calling minutes. Y ou most likely will pay additional fees when you call long distance using V oIP. While this sounds a lot like regular telephone service, it is less expensive than traditional voice communications, starting with the fact that you will no longer need to pay for extras on your monthly phone bill.E-mailShort for electronic mail, e-mail is the transmission of messages over communications networks. The messages can be notes entered from the keyboard or electronic files stored on disk. Most mainframes, minicomputers and computer networks have ane-mail system. Some e-mail systems are confined to a single computer system or network, but others have gateways to other computer systems, enabling you to send electronic mail anywhere in the world.Using an e-mail client (software such as Microsoft Outlook or Eudora), you can compose an e-mail message and send it to another person anywhere, as long as you know the recipient e-mail address. All online services and Internet Service Providers (ISPs) offer e-mail, and support gateways so that you can exchange e-mail with users of other systems. Usually, it takes only a few seconds for an e-mail to arrive at its destination. This is a particularly effective way to communicate with a group because you can broadcast a message or document to everyone in the group at once.One of the biggest black clouds hanging over e-mail is spam. Though definitions vary, spam can be considered any electronic junk mail (generally e-mail advertising for some product) that is sent out to thousands, if not millions, of people. Often spam perpetrates the spread of e-mail Trojans and viruses. For this reason, it's important to use an updated anti-virus program, which will scan your incoming and outgoing e-mail for viruses.For more information on e-mail, see "Deciphering Internet E-mail", a Webopedia Quick Reference.IRCShort for Internet Relay Chat, IRC is a multi-user chat system that allows to people gather on "channels" or "rooms" to talk in groups or privately. IRC is based on a client/server model. That is, to join an IRC discussion, you need an IRC client (such a mIRC) and Internet access. The IRC client is a program that runs on your computer and sends and receives messages to and from an IRC server. The IRC server, in turn, is responsible for making sure that all messages are broadcast to everyone participating in a discussion. There can be many discussions going on at once and each one is assigned a unique channel. Once you have joined an IRC chat room (chatroom discussions are designated by topics), you can type your messages in the public chatroom where all participants will see it, or you can send a private message to a single participant. With many IRC clients you can easily create your own chatroom and invite others to join your channel. You can also password protect your chatroom to allow for a more private discussion with just people whom you invite. Once you become familiar with your IRC client you'll find many options available to help you moderate and take part in a channel. One problem commonly associated with IRC is lag. IRC relies on the connections between the servers, and the connections or the servers can slow down. If you're in a discussion and people do not respond, or you notice that people are responding to things you types several minutes ago, then you can attribute this to lag. If you continue to experience lag, you can try connecting tothe IRC network on a different server.VideoconferencingVideoconferencing is a conference between two or more participants at different sites by using computer networks to transmit audio and video data. Each partic ipant has a video camera, microphone and speakers connected on his or her computer. As the two participants speak to one another, their voices are carried over the network and delivered to the other's speakers, and whatever images appear in front of the video camera appear in a window on the other participant's monitor.In order for videoconferencing to work, the conference participants must use the same client or compatible software. Many freeware and shareware videoconferencing tools are available online for download, and most Web cameras also come bundled with videoconferencing software. Many newer videoconferencing packages can also be integrated with public IM clients for multipoint conferencing and collaboration.In recent years, videoconferencing has become a popular form of distance communication in classrooms, allowing for a cost efficient way to provide distance learning, guest speakers, and multi-school collaboration projects. Many feel that videoconferencing provides a visual connection and interaction that cannot be achieved with standard IM or e-mail communications.SMS & Wireless CommunicationsShort message service (SMS) is a global wireless service that enables the transmission of alphanumeric messages between mobile subscribers and external systems such as e-mail, paging and voice-mail systems. Messages can be no longer than 160 alpha-numeric characters and must contain no images or graphics. Once a message is sent, it is received by a Short Message Service Center (SMSC), which must then get it to the appropriate mobile device or system. As wireless services evolved, Multimedia Messaging Service (MMS) was introduced and provided a way to send messages comprising a combination of text, sounds, images and video to MMS capable handsets.Communication on wireless devices such as mobile phones and PDAs is frequently changing. Today you can use your wireless device to not only make phone calls, but to send and receive e-mail and IM. While you can use e-mail, IRC or IM for free if you have an Internet account, you will end up paying fees to you mobile carrier to use these services on a wireless device.网络通讯如果你使用互联网,那么你可能通过因特网与家人朋友或同事通讯联系.网上提供多种沟通方式,如向一位朋友送即时讯息,或发送电子邮件给同事,拨打网络电话,召开视频会议.基于因特网通信优点有很多. 如果你是已付费的网络用户(或者是您的雇主),你就可以利用网络发送即时讯息或者使用网络电话代替标准本地电话服务. 当然,任何技术都是有负面的.基于因特网内的通讯.上有很多沟通,如病毒、垃圾邮件、隐私问题.像所有的技术(特别是因特网技术系)都是在不断演变才使得我们能网上沟通. 这篇文章中我们会介绍一些最流行的基于因特网的通信.即时信息增长最快的网络通讯方式莫过于即时信息,简称IM. IM的思想是基于两台或多台计算机之间的文本传输.通过因特网,IM通讯服务器就能够为你建造一个个性化的私人聊天室,你可以在个人列表中选择他人与你进行实时对话.通常,IM 系统允许你随时与你的联系列表中的某个朋友在线联络.你也可以新加入其它朋友一起,进行多人交谈.IM如此受欢迎的其中一个原因是它本身的实时性.不同于电子邮件,你只能等待接收他或她的电子邮件查阅后并回复.如果一个人要与你在线联系,就必须获得你的IM联系名,你的上线消息就会立即出现在他们的屏幕上的一个窗口中.当千百万网民利用IM与家人和朋友联系的同时,在商业领域也同样成为新宠.在公司中,当员工需要立即与其它办公室的主管或同事索取信息资料时,就无需拨打本地电话了.总而言之,IM既可以为员工节省时间,又有助于降低商务间的通讯开支.关键词在于理解基于因特网的通信.会话发起协议SIP是会话发起协议的简称,或者会话启动协议,是一个应用层控制协议;也是一项互联网技术的信令协议. SIP能创建特色会话,如音频/视频会议、互动游戏、以及部署在IP网络的呼叫转移. 安全规格,使用户能够通过即时信息接入设备.无线应用协议WAP是无线应用协议的简称,是一项准许用户通过无线手持设备获取即时信息的安全规格说明书 ,如用手持无线移动电话、寻呼机、收发两用无线电设备、智能电话与他人沟通.更多基于因特网的通信术语如下:e-mail电子邮件instant messaging即时消息VoIP 网络电话VoWiFi 无限网络电话Internet fax网络传真mobile IP IP电话IP address IP地址不同的IM客户端的特点和优势也不近相同,但基本功能还是大体相近. 大众普遍使用的IM包括ICQ 、AOL的即时通、MSN、雅虎通. 而商业和企业则使用一种更为安全的企业级的即时通讯包,如微软05版生活沟通服务器,IBM莲花即时通. 第三方软件使得商人在工作场合使用大众IM时更为安全有效.伴随IM而来的还有恶意垃圾电子邮件和病毒的繁殖等矛盾性问题. Spim 的意思是即时通讯中的垃圾邮件,更确切说,它是即时讯息成果中永久的蠕虫,它冒充真实的人类使用昵称向用户发送带病毒的即时讯息.恶意垃圾邮件通常包含一个链接网址,它为撰写垃圾邮件者建造了市场.对于即时讯息本身, 恶意垃圾邮件比垃圾邮件更具侵害性. 这些广告和垃圾信息在你的即时通讯工具窗口弹出,你需要立即处理这些信息,通常你都要先过滤掉大量垃圾邮件后再去处理那些你的电子邮件.另外,木马病毒可以通过即时讯息的渠道传播.这些恶意程式的散布通常是当一个即时讯息用户接收一条需要点击一个网址的信息时,就会下载恶意代码. 这个信息将会出现在一个已知的即时通讯中, 这就是为什么更多的接收者如此相似的去点击超级链接并下载文件的原因.利用聊天安全规则(如没点击链接),并保持最新的反病毒程序,将会有帮助于你的系统减少感染机会,并通过即时讯息传染恶意程式.互联网电话及网络电话互联网电话由硬件和软件结合组成,让能够用互联网作为传输介质进行电话呼叫. 用户可以免费或者只需要支付固定上网费用,通过网络电话软件本身所提供的免费电话就可呼叫世界上的任何用户. 这种使用计算机--计算机拨打网络电话的形式,只需要在你的计算机上配置一个麦克风,通过调制解调器,那么和你安装了相同网络电话软件的一方就能听到你透过麦克风向他传话的声音了.然而,这种网络电话的基本形式仍存在一定问题.这种方式相对于使用传统电话来说速度较慢,并且话音的质量也不能保证像付费电话那样清晰.某些网络电话程序是可以获得的,诸如cooltalk和NetMeeting,它们与当前流行的浏览器捆绑.另外的就都自成一体化产品. 互联网电话产品有时称为IP 电话、语音跨越在因特网(VOI)或IP语音产品(VoIP).VoIP是另一个越来越受欢迎基于互联网的通讯方式. VoIP的硬件和软件一起利用互联网进行电话交流,通过IP发送语音数据包,而非传统的电路传输. 称为PSTN(大众网络电话首选).语音转换成数据包然后路由在互联网,或者一些IP 网络,如同正常的数据包一样被传送. 当数据包抵达目的地后,它们又把接收者语音数据返回.您的电话是连接在VoIP电话适配器上(硬件组成方面).这个适配器是让你通过连接宽频上网. 电话是经由当地电话网上定期杰克,连接接收机的电话.就像为你连接网络寻找一个因特网服务供应商(ISP),你需要一个网络电话的供应商. 一些服务供应商推出了各种方案,可能包括提供免费呼叫某些单位的网络, 或者收取基于网络电话拨打固定电话呼叫时间的收费比率.当你使用的VoIP拨打长途电话时,最可能将为此付出额外的费用.尽管听起来不完全和普通电话一样,但它比传统的语音通讯要便宜的多,从此你不再需要在你每月电话单中支付额外费用.电子邮件E-Mail是电子邮件简称,它是通过网络来传递文本信息的.信息可以来自于键盘敲入或储存在磁盘中的电子文档. 很多巨型计算机,微型计算机都有电子邮件系统. 一些电子邮件系统是局限于单一的计算机系统或网络,但是有部分电脑系统等门户,让你在世界任何地方发送电子邮件.利用电子邮件客户端(如微软的Outlook或Eudora软件),你可以谱写一封电子邮件并发送到任何地方的人,只要你知道收件人的电子邮件地址. 所有在线服务和互联网服务供应商(ISPs)提供了电子邮件和支持网关,那么就可以用电子邮件与他们系统的用户交流. 通常,只需几秒钟电子邮件就能到达目的地. 这是一个特别有效的集体交流方式,让你可以一次性与集体每一位发送信息或文档.恶意垃圾邮件像一个巨大无比的黑云把电子邮件所笼罩.. 尽管定义多变,恶意垃圾邮件仍可以被认定为是上千封的电子垃圾信件(通常是一些产品广告), 如果没有数以万计的客户的话. 垃圾邮件照样常常被电子邮件木马、病毒所蔓延.为此,它的重要使用最新的反病毒程序,您将扫描收支电子邮件病毒. 因此,使用最新的反病毒程序尤为重要,它会扫描你发送和接收的电子邮件是否存在病毒.更多关于电子邮件信息,请见"互联网电子邮件破译",这是计算机与网络名词的在线查询字典的参考.因特网中继聊天IRC是因特网中继聊天的简称,IRC是多用户、多频道的群聊系统,许多用户可以在一个被称为“channel”或"房间"的地方就某一话题交谈或私谈.IRC是基于客户端/服务器端的模式.即参加室内讨论.你需要一个IRC的客户软件(如mIRC)和网络.IRC客户端程序运行在你的电脑与IRC服务器端做信息传递.而另一端也就是IRC服务器,它是负责确保所有信息传播给讨论组中的每一个成员.它可以让讨论者同时进行群聊,也可以彼此单独开设了通道.一旦加入一个IRC 聊天室(聊天室讨论主题由对话者决定),你可以在某个公共聊天室的公开讨论并让所有成员看到你信息内容,另外你也可以发送私人讯息给某个参与者.有了IRC 客户端你可以轻易创造自己的聊天室并邀请他人加入你的频道.在你想进行更私人对话时.也可以使用密码保护的方式,只允许你所邀请的人进入聊天室.一旦你熟悉了IRC的顾客,你就会在渠道里找到一些愿意参与并帮助你解决问题的人.与IRC伴随的一个普遍问题是滞后. IRC依赖于彼此相连的主机导致速度变慢.如果你所在的讨论组无人响应,或者你通知的那个人在几分钟以后才答复你,那么可以归结为这是滞后.如果你有多次滞后的经历,那么你可以尝试连接不同的IRC服务器.视频会议视像会议是由两个或多人在不同地点的与会者,利用电脑网络传送语音、录像资料的工具. 每位与会者都要将摄像头,麦克风和听筒与他/她的电脑连接.如果双方会议要给另一方知道,那么他们的声音将透过网络传到给另一个对话者,并且瞄准摄像头的画面也将会呈现在其它会议群的监视者.为了让工作视频会议有序,与会人员必须使用相同客户端或兼容的软件.许多免费软件和共享视频工具提供网上下载,绝大部分的在线影院都捆绑了视频会议的软件.一些新颖的视频会议将大众即时讯息客户端整合成套装,可以用作多方会议和项目.近年来,视频会议已成为一种流行的远程交流的教室,为远程学习,宾客讨论以及多媒体学校合作项目提供了高效的方式. 许多人都认为视频会议提供了一个标准即时信息软件或者电子邮件所不能完成的可视化互动连接.短讯及无线通讯短信服务(SMS)是全球无线服务,使的移动用户与外部系统之间可以传递任何的字母数字信息,如系统电子邮件、传呼、语音邮件系统. 信息可以不再超过160字母数字字符、图象或图形必须包含无. 一旦讯息被发送,就会被对应的移动设备或系统的某个短信服务中心接收.作为无线服务的演变,多媒体信息服务(彩信MMS)被推广,它提供了多种传递讯息方式,包括文字、声音、以手机彩信和视频图象集于一体的能力.无线通讯设备如移动电话、掌上电脑(PDA)等是时常革新的. 如今你所使用的无线设备并不仅限于电话呼叫,还可以收发电子邮件和即时信息. 如果你有一个因特网帐户,那么你使用的电子邮件、网络聊天室或即时讯息是免费的,不过,如果你用无线设备来完成服务,你仍需付费给你的移动运营商.。

网络营销中英文对照外文翻译文献

网络营销中英文对照外文翻译文献

网络营销中英文对照外文翻译文献
网络营销已经成为现代市场营销的重要方式之一,不仅受到广大企业的关注,也成为了许多学者研究的热点。

本文翻译了一篇网络营销的英文文献,并提供了中英文对照。

英文原文:
Title: How to Use Content Marketing to Boost Your Leads by Withholding Information
Author: Konstantinos Loupelis
内容:本文主要介绍了如何利用内容营销来扩大潜在客户群,网站会员和现实销售。

内容营销是什么?内容营销是指利用高质量内容对观众进行品牌营销,将观众吸引到公司网站,从而增加客户数量。

而作者提供的方法是不要把所有信息都公布,而是在某一时刻进行揭秘,从而吸引更多观众。

中文翻译:
标题:如何利用内容营销来引导潜在客户
作者:Konstantinos Loupelis
内容:内容营销是广告营销的变体,但是它利用高质量的内容
吸引观众,从而增加客户数量。

通过提供有助于观众的有价值的信息,该方法不仅可以增加网站流量和现实销售,还可以增加网站会
员数量。

这种方法的核心是不公开所有信息,而是设法以有创意的
方式逐渐透露信息,吸引观众关注品牌,从而促进营销目标的实现。

通信外文翻译外文文献英文文献及译文

通信外文翻译外文文献英文文献及译文

通信外文翻译外文文献英文文献及译文Communication SystemA generalized communication system has the following components:(a) Information Source. This produces a message which may be written or spoken words, or some form of data.(b) Transmitter. The transmitter converts the message into a signal, the form of which is suitable for transmission over the communication channel.(c) Communication Channel. The communication channel is the medium used transmit the signal, from the transmitter to the receiver. The channel may be a radio link or a direct wire connection.(d) Receiver. The receiver can be thought of as the inverse of the transmitter. Itchanges the received signal back into a message and passes the message on to its destination which may be a loudspeaker,teleprinter or computer data bank.An unfortunate characteristic of all communication channels is that noise is added to the signal. This unwanted noise may cause distorionsof sound in a telephone, or errors in a telegraph message or data.Frequency Diversion MultiplexingFrequency Diversion Multiplexing(FDM) is a one of analog technologies. A speech signal is 0~3 kHz, single sideband amplitude (SSB) modulation can be used to transfer speech signal to new frequency bands,four similar signals, for example, moved by SSB modulation to share the band from 5 to 20 kHz. The gaps between channels are known as guard spaces and these allow for errors in frequency, inadequate filtering, etc in the engineered system.Once this new baseband signal, a "group" of 4 chEmnels, has been foimed it ismoved around the Lrunk network as a single unit. A hierarchy can be set up withseveral channels fonning a "group". several groups a "supergroup" and several"supergraup" eicher a "nmsrergroup" or "hypergroup".Groups or supergroups are moved around as single units by the communicationsequipment and it is not necessary for the radios to know how many channels are involved. A radio can handle a supergroup provided sufficient bandwidth is available. The size of the groups is a compromise as treating each channel individually involves far more equipment because separate filters, modulators and oscillators are required for every channel rather than for each group. However the failure of one module will lose all of the channels associated with a group.Time Diversion MultiplexingIt is possible, with pulse modulation systems, to use the between samples to transmit signals from other circuits. The technique is knownas time diversion multiplexing (TDM). To do this, it is necessary to employ synchronized switches at eachend of the communication links to enable samples to be transmittedin turn, from each of several circuits. Thus several subscribers appear to use the link simultaneously. Although each user only has periodic short time slots, the original analog signalsbetween samples can be reconstituted at the receiver.Pulse Code ModulationIn analog modulation, the signal was used to modulate the amplitude or frequency of a carrier, directly. However, in digital modulation a stream of pulse, representing the original,is created. This stream is then used to modulate a carrier or alternatively is transmitted directly over a cable. Pulse Code Modulation (PCM) is one of the two techniques commonly used.All pulse systems depend on the analog waveform being sampled at regular intervals. The signal created by sampling our analog speech input is known as pulse amplitude modulation. It is not very useful in practice but is used as an intermediate stage towards forming a PCM signal. It will be seen later that most of the advantages of digital modulation come from the transmitted pulses having two levels only, this being known as a binary system. In PCM the height of each sample is converted into a binary number. There are three step in the process of PCM: sampling, quantizing and coding.Optical Fiber CommunicationsCommunication may be broadly defined as the transfer of information from one point to another. When the information is to be conveyed over any distance acommunication system is usually required. Within a communication system the information transfer is frequently achieved by superimposing or modulating the information on to an electromagnetic wave which acts as a carrier for the informationsignal. This modulated carrier is then transmitted to the required destination where it is received and the original information signal is obtained by demodulation. Sophisticated techniques have been developed for this process by using electromagnetic carrier wavesoperating at radio frequencies as well as microwave and millimeter wave frequencies. However,拻 communication?may also be achieved by using an electromagneticcarrier which is selected from the optical range of frequencies.In this case the information source provides an electrical signal to a transmitter comprising an electrical stage which drives an optical source to give modulation of the light-wave carrier. The optical source which provides the electrical-optical conversionmay be either a semiconductor laser or light emitting diode (LED). The transmission medium consists of an optical fiber cable and the receiver consists of an optical detector which drives a further electrical stage and hence provides demodulation optical carrier. Photodiodes (P-N, P-I-N or avalanche) and , in some instances,phototransistor and photoconductors are utilized for the detection of the optical signal and the electrical-optical conversion. Thus there is a requirement for electrical interfacing at either end of the optical link and at present the signal processing is usually performed electrically.The optical carrier may be modulated by using either an analog or digital information signal. Analog modulation involves the variation of the light emitted from the optical source in a continuous manner. With digital modulation, however, discrete changes in the light intensity are obtained (i.e. on-off pulses). Although often simpler to implement, analog modulation with an optical fiber communication system is lessefficient, requiring a far higher signal to noise ratio at the receiver than digital modulation. Also, the linearity needed for analog modulation is not always provided by semiconductor optical source, especially at high modulation frequencies. For thesereasons,analog optical fiber communications link are generally limited to shorter distances and lower bandwidths than digital links.Initially, the input digital signal from the information source is suitably encoded for optical transmission. The laser drive circuit directly modulates the intensity of the semiconductor laser with the encoded digital signal. Hence a digital optical signal is launched into the optical fiber cable. The avalanche photodiode detector (APD) is followed by a fronted-end amplifier and equalizer orfilter to provide gain as well as linear signal processing and noise bandwidth reduction. Finally, the signal obtained isdecoded to give the original digital information.Mobile CommunicationCordless Telephone SystemsCordless telephone system are full duplex communication systems that use radio to connect a portable handset to a dedicated base station,which is then connected to adedicated telephone line with a specific telephone number on the public switched telephone network (PSTN) .In first generation cordless telephone systems5(manufactured in the 1980s), the portable unit communications only to the dedicatedbase unit and only over distances of a few tens of meters.Early cordless telephones operate solely as extension telephones to a transceiver connected to a subscriber line on the PSTN and are primarily for in-home use.Second generation cordless telephones have recently been introduced which allowsubscribers to use their handsets at many outdoor locations within urban centers such as London or Hong Kong. Modern cordless telephones are sometimes combined with paging receivers so that a subscriber may first be paged and then respond to the pageusing the cordless telephone. Cordless telephone systems provide the user with limited range and mobility, as it is usually not possible to maintain a call if the user travels outside the range of the base station. Typical second generation base stations provide coverage ranges up to a few hundred meters.Cellular Telephone SystemA cellular telephone system provides a wireless connection to the PSTN for any user location within the radio range of the system.Cellular systems accommodate alarge number of users over a large geographic area, within a limited frequency spectrum. Cellular radio systems provide high quality service that is often comparable to that of the landline telephone systems. High capacity is achieved by limiting the coverage of each base station transmitter to a small geographic area called a cell so that the same radio channels may be reused by another base station located some distance away. A sophisticated switching technique called a handoff enables a call to proceeduninterrupted when the user moves from one cell to another.A basic cellular system consists of mobile station, base stations and a mobile switching center (MSC). The Mobile Switching Center is sometimes called a mobiletelephone switching office (MTSO), since it is responsible for connecting all mobiles to the PSTN in a cellular system. Each mobilecommunicates via radio with one of the base stations and may be handed-off to any number of base stations throughout the duration of a call. The mobile station contains a transceiver, an antenna, and control circuitry,and may be mounted in a vehicle or used as a portable hand-held unit. Thebase stations consists of several transmitters and receivers which simultaneously handlefull duplex communications and generally have towers which support several transmitting and receiving antennas. The base station serves as a bridge between all mobile users in the cell and connects the simultaneous mobile calls via telephone linesor microwave links to the MSC. The MSC coordinates the activities of all the base stations and connects the entire cellular system to the PSTN. A typical MSC handles 100000 cellular subscribers and 5000 simultaneous conversations at a time, andaccommodates all billing and system maintenance functions, as well. In large cities, several MSCs are used by a single carrier.Broadband CommunicationAs can be inferred from the examples of video phone and HDTV, the evolution offuture communications will be via broadband communication centered around video signals. The associated services make up a diverse set of high-speed and broadbandservices ranging from video services such as video phone,video conferencing,videosurveillance, cable television (CATV) distribution, and HDTV distribution to the high-speed data services such as high-resolution image transmission, high-speed datatransmission, and color facsimile. The means of standardizing these various broadbandcommunication services so that they can be provided in an integrated manner is no other than the broadband integrated services digital network (B-ISDN). Simple put, therefore,the future communications network can be said to be a broadband telecommunicationsystem based on the B-ISDN.For realization of the B-ISDN, the role of several broadband communicationtechnologies is crucial. Fortunately, the remarkable advances in the field of electronics and fiber optics have led to the maturation of broadband communication technologies.As the B-ISDN becomes possible on the optical communication foundation, the relevant manufacturing technologies for light-source and passive devices and for optical fiberhave advanced to considerable levels. Advances in high-speed device and integratedcircuit technologies for broadband signal processing are also worthy of close attention. There has also been notable progress in software, signal processing, and video equipment technologies. Hence, from the technological standpoint, the B-ISDN hasfinally reached a realizable state.On the other, standardization activities associated with broadband communication have been progressing. The Synchronous Optical Network (SONET) standardization centered around the T1 committee eventually bore fmit in the form of the Synchronous Digital Hierarchy (SDH) standards of the International Consultative Committee in Telegraphy and Telephony (CCITT), paving the way for synchronous digital transmission based on optical communication. The standardization activities of the 5integrated services digital network (ISDN), which commenced in early 1980s with the objective of integrating narrowband services, expanded in scope with the inclusion of broadband services, leading to the standardization of the B-ISDN in late1980抯 and establishing the concept of asynchronous transfer mode (ATM)communication in process. In addition, standardization of various video signals is becoming finalized through the cooperation among such organizations as CCITT, the International Radio-communications Consultative Committee (CCIR), and theInternational Standards Organization (ISO), and reference protocols for high-speedpacket communication are being standardized through ISO, CCITT, and the Institute of Electrical and Electronics Engineer (IEEE).Various factors such as these have made broadband communication realizable.5Therefore, the 1990s is the decade in which matured broadband communicationtechnologies will be used in conjunction with broadband standards to realize broadband communication networks. In the broadband communication network, the fiber opticnetwork will represent the physical medium for implementing broadband communication, while synchronous transmission will make possible the transmission of broadband service signals over the optical medium. Also, the B-ISDN will be essentialas the broadband telecommunication network established on the basis of optical medium and synchronous transmission and ATM is the communication means that enables the realization of the B-ISDN. The most important of the broadband services to be providedthrough the B-ISDN are high-speed data communication services and videocommunication services.Image AcquisitionA TV camera is usually used to take instantaneous images and transform them into electrical signals, which will be further translated into binary numbers for the computer to handle. The TV camera scans oneline at a time. Each line is further divided into hundreds of pixels. The whole frame is divided into hundreds (for example, 625) of lines.The brightness of a pixel can be represented by a binary number with certain bits, for example, 8 bits. The value of the binary number varies from 0 to 255, a range great enough to accommodate all possible contrast levels of images taken from real scene.These binary numbers are sorted in an RAM (it must have a great capacity) ready for processing by the computer.Image ProcessingImage processing is for improving the quality of the images obtained. First, it is necessary to improve the signal-to-noise ratio. Here noise refers to any interference flaw or aberation that obscure the objects on the image. Second, it is possible to improve contrast, enhance sharpness of edges between images through various computational means.Image AnalysisIt is for outlining all possible objects that are included in the scene. A computer program checks through the binary visual informationin store for it and identifies specific feature and characteristics of those objects. Edges or boundaries are identifiablebecause of the different brightness levels on either side of them. Usingcertain algorithms, the computer program can outline all possible boundaries of the objects in the scene. Image analysis also looks for textures and shadings between lines.Image ComprehensionImage Comprehension means understanding what is in a scene. Matching the prestored binary visual information with certain templates which represent specific objects in a binary form is technique borrowed from artificial intelligence, commonly referred to as "templeite matching"emplate matching? One by one,the templates are checked against the binary information representing the scene. Once a match occurs, an object is identified. The template matching process continues until all possible objects in the scene have been identified, otherwise it fails.通信系统一般的通信系统由下列部分组成:信源。

在线聊天系统中英文对照外文翻译文献

在线聊天系统中英文对照外文翻译文献中英文对照外文翻译(文档含英文原文和中文翻译)Modeling and specification of Web services composition usingUML-SAbstractAs Web services composition arouses a growing interest, most research works address implementation and execution issues. Therefore, many composition languages (BPEL, XLANG, WSFL, WSCI, to name a few of them) have been proposed in the past few years. However, a weakness of these languages is that they are difficult to use in early stages of development, such as specification. In this paper, an extensio n to UML 2.0 called ”UML-S: UML for Services” is introduced. UML-S allows for a Model Driven Engineering (MDE) of Web services and their interactions.1. IntroductionMany companies are now using the Web as a platform to communicate with their partners. The Web and its technologies allows them to provide Web services to individuals as well as other businesses.The main challenges in the Web services paradigm are their discovery and their composition. In other words, one must be able to find a suitable Web service for a given task. This process is called the discovery [18, 19]. The second challenge is the one that is addressed in this paper. It is known as Web services composition [4, 10]. In Web services composition, already defined services are used together to achieve a larger task,resulting in a new composite and value-added Web service. T o accomplish this purpose, a common approach is to allow the Web services to interact in a scenario through the use of messaging mechanisms.Although a lot of research works deal with Web services interactions, most of them address language, implementation or application issues, neglecting early stages of the development process, such as specification. To address this issue, an extension to UML 2.0 called ”UML-S: UML for Services” is introduced. UML-S allows for modeling Web services as well as their interactions.The Unified Modeling Language (UML) has been defined by the Object Management Group (OMG) [2] to express graphically system development models.UML-S enables the developers to build composite Web services by following the principles of the Model-Driven Architecture (MDA). As a consequence, it is possible to generate platform-specific code from high-level UML-S models.This paper is structured as follows. Section 2 provides a survey of existing approaches to model Web services interactions. In section 3, the requirements for a good Web services composition modeling language are put forward. UML-S is then presented in details in section 4. After that, a case study is provided in section 5 to observe UML-S in action. Finally, section 6 draws the conclusions and presents future work.2.Related WorkThe Business Process Management Initiative (BPMI) has developed the Business Process Modeling Notation (BPMN). This notation is particularly useful to visualize BPEL processes.BPMN [23] is now maintained by the OMG. Unfortunately, one couldreproach toBPMN its lack of formalism, as explained by Wohed et at. in [24]. Although BPMN is an interesting solution, we preferred to extend UML 2.0 to achieve the same purpose. Indeed, UML was already used as a Process Modeling Language (PML) [9, 13, 16].As a matter of fact, UML has some very interesting features as a PML: it is standard, graphical, popular and it contains several diagrams which allows to model different views of a system.UML was already considered to describe Web services composition. In [20], an approach using UML activity diagrams to do so was presented by Skogan et al.They provide a way to model the coordination and the sequencing of the interactions between Web services. They also explain how UML activity diagrams can be converted into BPEL [1] or in WorkSCo [3].However, in this approach, methods input/output and data transformation are modeled in notes (i.e. comments) on the side of the workflow, which can get quite confusing when the composition flow gets complex.Chunming Gao et al. also present in [11] a non-graphical way to model Web services composition with some mobility and time constraint. To do so, they introduce Discrete Time Mobile Ambient calculus (DTMA), an extension to the formal model called Mobile ambients calculus [5]. Using DTMA, they focus on modeling BPEL operations. Due to their non-graphical nature, languages such as DTMA are less user-friendly than graphical like UML.Another approach to Web services composition modeling was proposed by De Castro et al in [6]. In their work, they make use of the behavior modeling method of MIDAS, a Model-Driven Architecture (MDA) framework [14]. MIDAS is a model-drivenmethodology for the development of Web Information Systems (WIS) based on the MDA [21], proposed by the OMG [2]. They introduced Web services composition through UML activity diagrams in their paper. However, the model is not detailed as much as necessary to allow code generation as BPEL. Some features could also be added such as data transformation and flow control mechanisms.In [12], Hamadi et al. put forwards Petri nets [17] based algebra for composing Web services. Petri nets are a well-known process modeling technique. The pros of using such Petri net based algebra is that it allows the verification of properties and the detection of inconsistencies. However, Web services need to be expressed using algebra constructs before being translated into a Petri net representation, adding consequently another necessary stage in the process.UML-S transformation rules from WSDL 2.0 and to WS-BPEL 2.0 were provided in [8]. UML-S activity diagrams verification and validation using Petri nets was also detailed in [15].3.Web services composition model requirementsIn this part, we state what the requirements for a good Web services composition modeling language. First of all, it is better to extends an already existing, well-known standard if it is adapted instead of coming up with a new model. UML modeling language is the de facto industry standard. Therefore it is a good candidate to be extended for Web services composition modeling. Moreover, UML is widely used and its graphical models are easily understandable. The modeling language should allow to represent Web services interfaces as well as the dynamism induced by their composition. UML class diagram is particularly adapted to represent interfaces. Additionally, UML activitydiagram is a excellent candidate to model Web services composition, due to its strength to represent the dynamic. A good modeling language can also be judged by its simplicity and its clarity. Graphical languages such as UML are known for being user-friendly. Finally, it is worth noting that a composite Web service simply calls other services and makes them interact. Therefore, there is not a lot of programming involved compared to usual Web services. As a consequence, a composite Web service’s code can be generated in its totality from high level graphical models such as UML’s. 4. UML-S: UML for Services The main contribution of this paper is ”UML-S: UML for Services”, an extension to UML 2.0 that allows for modeling Web services as well as their interactions. In UML-S, both class diagrams and activity diagrams are used to model and specify respectively Web services and their interactions. In part 4.1, we present UML-S extended class diagram. After that, the activity diagram proposal is detailed in part 4.2.建模和使用UML-S Web服务组合的规范摘要随着Web服务组合引起了越来越多的兴趣,大部分研究工作解决了实现和执行的问题。

新媒体中英文对照外文翻译文献

文献信息:文献标题:The effect of new media on consumer media usage: An empirical study in South Korea(新媒体对消费者媒体使用的影响:韩国的实证研究)国外作者:ongRoul Woo,Jae Young Choi,Jungwoo Shin,Jongsu Lee 文献出处:《Technological Forecasting and Social Change》,2014,89(1):3-11 字数统计:英文 2191 单词,12445 字符;中文 4024 汉字外文文献:The effect of new media on consumer media usage:An empirical study in South KoreaAbstract The advent and proliferation of the Internet (a form of new media) have heavily influenced consumers' media usage behavior and a number of other social, political, cultural, and economic outcomes. The recent introduction of smart mobile media, including smartphones and tablets, is expected to similarly affect these issues. This study empirically analyzes how the advent of the Internet and smart mobile media affects Korean consumers' media usage behavior, seeking to provide a means to anticipate the ripple effect to societal outcomes related to the evolution of new media in Korea. We modeled consumers' media usage behavior and conducted preference and simulation analyses using data gleaned from a survey of consumers' media behavior and a Multiple Discrete-Continuous Extreme Values (MDCEV) model. The results of the analyses illustrate how consumer preferences regarding old and new media differ in terms of sociodemographic variables. Moreover, the analysesrevealed that whereas the advent of the Internet has negatively influenced consumers' use of old media, the arrival of smart mobile media has had a synergistic effect on television use. As a result, the advent of mobile media increased the use of television, but decreased use of other forms of old media.Keywords: New media; Media usage behavior; Preference analysis; Scenario analysis; Multiple Discrete-Continuous Extreme Value model1.IntroductionMedia are continuously evolving (Stöber, 2004). Although early forms of media (e.g., mail, telegram, telephone) were used primarily to exchange simple messages, the advent of mass media like newspapers and magazines allowed media to be used to deliver vast amounts of information to a large and unspecified audience. When electronic media like radio and TV became popular during the early 20th century, they were used to deliver a substantial amount of information to recipients in real time. Most recently, however, digital media (e.g., the Internet, mobile technology) have fundamentally altered the media environment. Specifically, the advent of digital media has facilitated the fast and easy consumption, retention, and sharing of a significant amount of information between multiple users.To differentiate these from analog media, such as newspapers, magazines, radio, and television, many scholars and professionals have referred to digital media as “new media.” Although researchers have defined new media in a wide variety of ways, we define new media as digital media capable of saving, handling, delivering, and exchanging information through digital binary codes (Negroponte, 1996; Flew, 2002; Manovich, 2003; Jenkins, 2006). The emergence of new media has become institutionalized in our society, fundamentally changing our methods of exchanging information and the consumer behaviors of media usage. It has also had a significant effect on many social, political, cultural, and economic activities (Stöber, 2004).Researchers have long-studied the influence of media evolution on societal outcomes, with a particular emphasis on the advent and proliferation of the Internet. Some of the most notable studies in this domain have explored the influence of the Internet on traditional media usage (Bromley and Bowles, 1995; Mokhtari et al., 2009), social relations (Haythornthwaite, 2002; Brignall and Van Valey, 2005; Amichai-Hamburger and Hayat, 2011), the economy (Litan and Rivlin, 2001; Lucas and Sylla, 2003), politics (Farrell, 2012), education (Agarwal and Day, 1998; Arsham, 2002), and corporate marketing (Avlonitis and Karayanni, 2000; Hennig-Thurau et al., 2010).The arrival and development of new media in the 21st century have put pressure on companies and governments to understand the Internet and use it in accordance with their specific objectives. For example, companies largely sought to leverage the Internet to maximize the effectiveness of their marketing efforts. Similarly, governments sought to use the Internet to efficiently publicize policies. Given the extent to which organizations in both the private and public sectors have used the Internet to achieve specific objectives, many researchers have worked to identify the implications of their Internet usage. For example, Bhatnagar and Ghose (2004) found that Internet retailers could use customers' Internet search patterns according to demographic characteristics and product types to cultivate store loyalty among those customers. Naik and Peters (2009) also illustrated Internet use for marketing purposes, empirically showing that the development of a marketing scheme that is comprised of the appropriate mix of print-, television-, radio-, and Internetbased messages can efficiently build customer loyalty. In a similar vein, Lin et al. (2013) analyzed consumers' simultaneous usage of these four media types and found that media campaigns that leverage both old and new media are most effective.Similar to the Internet, the recent introduction of personal mobile smart devices has contributed to the evolution of media usage. This is particularly notable, given that smart device usage is spreading at a faster rate than older media (MIT Technology Review, 2012). This proliferation of new media will allow people toeasily access and share massive amounts of digitized information anywhere and at any time.Despite these developments, most research in this domain has been focused on predicting and measuring the preference and demand for smart media products and services (Chen and Hsieh, 2012; Choi et al., 2013; Park et al., 2013; Lee, 2014). Though useful in its own right, this line of research has failed to consider the ways in which the development of new media has affected a number of salient socioeconomic outcomes. To address this gap, we analyze the ways in which Internetbased new media, digital media broadcasting (DMB), and older forms of media (e.g., magazines, television) affect certain societal outcomes. Specifically, in this paper, we use a Multiple Discrete-Continuous Extreme Value (MDCEV) model and scenario simulations to investigate Korean consumers' media usage, designed to forecast the socioeconomic effects related to the evolution of new media.In addition, we explore how the emergence of new media affects the use of old media. Jenkins (2006) argued that new media has a tendency to incite drastic changes. For example, when new media emerge, they tend to displace old media, changing consumers' media consumption habits. Therefore, before it is possible to understand the socio-economic effects of new media emergence, it is first necessary to explore and understand changes in consumers' media usage behavior resulting from the advent of the Internet and other digital media.2.Background2.1.Definition and classification of new mediaResearchers have defined new media in a number of different ways, so there is currently no consensus with regard to how to conceptualize new media. For the purposes of the current study, we define new media as digital media capable of saving, handling, delivering, and exchanging information through digital binary codes. Thisdefinition suggests that new media facilitate not only the free exchange of digitalized information in compressed form, but also user interaction. Using this definition as a guide, and in accordance with definitions proposed by Jenkins (2006), we can categorize computers, the Internet, and smart mobile devices as new media. Comparatively, we can categorize print, television, and radio as old media. For the purposes of this research, we will analyze consumers' usage behavior for seven forms of media: newspapers, magazines, radio, television, computer-based Internet, mobile Internet, and DMB. Using these definitions, we categorize newspapers, magazines, radio, and television as old media; and the Internet, mobile Internet, and DMB as new media.2.2.New media usage in KoreaAccording to the International Telecommunication Union (2013), Korea ranks first in the world in information and communication technology readiness, usage, and capability as of 2013. In addition, other organizations reported that Korea also ranked first in terms of Internet penetration (97.2%; Organisation for Economic Co-operation and Development, 2012), and second in terms of smartphone penetration (73.0%; Our Mobile Planet, 2013). These figures indicate that Korea is characterized by the most widespread and pervasive use of the Internet, smart devices, and other new media globally. As such, Korean consumers represent the most active group in terms of new media use. Given the degree to which the Korean population uses new media, new media-related industries experience continuous growth with the support of policies developed by the Korean government. The Korean case allows an illustration of the changes in media usage following the diffusion of new media, therefore facilitating a forecast of changes in the social, political, cultural, and economic dynamics of the country.3.Model specificationsThis study uses Bhat's (2005, 2008) Multiple DiscreteContinuous Extreme Value (MDCEV) to analyze consumers' media usage behavior. The MDCEV model consists of the utility according to the consumers' choice and its corresponding usage in combination under random utility theory. The MDCEV model considers both product choice and usage behavior simultaneously, and is used in various fields. Its use is especially widespread in the transportation field to model household vehicle type holdings and its mileage (e.g., Bhat and Sen, 2006; Ahn et al., 2008; Shin et al., 2012). This study uses the MDCEV model to analyze consumer's media choice and usage time together. More specifically, we leveraged a mixed MDCEV model, which reflects heterogeneity among consumers' media preferences and usage through distribution to each parameter (Bhat, 2005, 2008; Ahn et al., 2008; Shin et al., 2012).The mixed MDCEV is difficult to estimate with classical maximum likelihood methods. Therefore, we used a Bayesian estimation method to accommodate the computational complexity of the estimation process associated with the mixed MDCEV. The advantage of the Bayesian estimation method is that it is capable of solving local optimal solution problems using the initial value. In contrast, the maximum likelihood estimation method is a classical estimation method (Allenby and Rossi, 1998; Huber and Train, 2001; Edwards and Allenby, 2003; Train, 2003). Bhat (2005, 2008) published detailed information about the MDCEV model.4.Concluding remarksThe introduction of new media has affected consumer media usage behavior in a number of ways. In addition, the recent emergence of smart mobile media has significantly affected the dynamics of the current media market. Given these effects, we sought to provide a means for forecasting the effects of introducing new media into an existing media market as well as how the introduction of new media could affect the ways in which communication technologies evolve. Specifically, we leveraged MCR data in an MDCEV model to analyze (a) consumer preferences forold and new media alternatives, and (b) the ripple effect of the introduction of new media on the existing media market.Our results revealed that generally, consumers are more interested in emergent mobile media (e.g., mobile Internet and DMB) than other forms of media. More specifically, our results showed that younger consumers tend to gravitate towards mobile Internet, DMB, and radio because they are familiar with mobile devices. Given this, when the Korean government or companies promote new policies or products/services to younger consumers, it may be useful for them to use mobile media as the primary communication channel. Our results also showed that consumers with more education tended to prefer Internet and print media, indicating that these channels are important conduits for circulating information for the educated. In addition, consumers with higher household incomes tended to report a preference for using the Internet and mobile Internet media. Similarly, early adopters indicated that they preferred to use, in order of decreasing preference, mobile Internet, traditional Internet, and television. Consumers with higher levels of brand-loving tendency reported a preference for mobile Internet, television, traditional Internet, print media, and DMB. Taken together, these results provide useful guidance for companies to effectively engage with target audiences in the era of new media. Finally, our estimation of satiation parameters indicated that mobile media alternatives have greater market potential than those that cannot be used in a mobile sense.Further, our scenario analyses showed that the introduction of the Internet and mobile media generally negatively affects consumer usage of television, radio, and print media. Although they both have this effect, the introduction of the Internet into an extant media market has more substantial effects than the introduction of mobile media. Interestingly, our analyses suggested that when mobile media are introduced, the likelihood of a consumer choosing or using traditional Internet, radio, and print media decreases, but the probability of choice and usage for television increases. This result may indicate that Internet usage patterns have partially shifted from the personal computer context to the mobile context. This result may also suggest thatthere exists a synergistic effect between mobile media and television, as high-quality content can be used on these two media in concert.Although our results provide a wealth of useful information for government organizations and companies related to targeted marketing and media usage, this study is subject to a few limitations. First, the introduction of new media into extant media markets can generate substitution and complementary relationships between old and new media. However, the MDCEV model employed to perform the analyses was unable to account for these relationships directly. Moreover, our scenario analyses only evaluate substitution and complementary relationships between old and new media indirectly. Second, although Korean mobile media consumption has grown exponentially since 2011, we were unable to account for this growth in our analysis due to the lack of current data. In spite of these shortcomings, the results of this study can be used effectively to establish government policies or market products and services in countries in which new media are pervasive.中文译文:新媒体对消费者媒体使用的影响:韩国的实证研究摘要互联网的出现和传播(一种新媒体的形式)严重影响了消费者的媒体使用行为和其他一些社会、政治、文化和经济成果。

云技术和服务中英文对照外文翻译文献

云技术和服务中英文对照外文翻译文献中英文对照外文翻译文献(文档含英文原文和中文翻译)译文:利用云技术和服务的新兴前沿:资产优化利用摘要投资回报最大化是一个主要的焦点对所有公司。

信息被视为手段这样做。

此信息是用来跟踪性能和提高财务业绩主要通过优化利用公司资产。

能力和速度,这是可能的收集信息并将其分发到当前的技术该组织正在不断增加,事实上,有超过了行业的能力,接受和利用它。

今天,生产运营商被淹没在数据的结果一种改进的监控资产的能力。

智能电机保护和智能仪器和条件监控系统经常提供32多块每个设备的信息都与相关的报警。

通常运营商没有装备来理解或行动在这个信息。

生产企业需要充分利用标的物专门为这个目的,通过定位他们的工程人员区域中心。

这些工程师需要配备足够的知识能够理解和接受适当的行动来处理警报和警报通过这些智能设备。

可用的信息可以是有用的,在寻找方法增加生产,减少计划外的维护和最终减少停机时间。

然而,寻找信息在实时,或在实时获得有用的信息,而不花了显着的非生产时间,使数据有用的是一个巨大的挑战。

本文将介绍云技术作为一种获取可视化和报告的经济方法条件为基础的数据。

然后,它将讨论使用云技术,使工程资源与现场数据可通过网络浏览器访问的安全格式技术。

我们将覆盖资产的方法多个云服务的优化和效益飞行员和项目。

当重工业公司在全球范围看,世界级运营实现整体设备效率(OEE)得分百分之91。

从历史上看,石油和天然气行业的滞后,这得分十分以上(Aberdeen 集团“操作风险管理”十月2011)。

OEE 是质量的商,可用性和效率得分。

这些,可用性似乎影响了石油和天然气行业的最大程度。

在石油和天然气的可用性得分的根源更深的研究导致旋转资产作为故障的根本原因,在70%的情况下,失去的生产或计划外停机。

鉴于这一行业的关键资产失败的斗争,但有方法,以帮助推动有效性得分较高,以实现经营效率的目标。

.在未来十年中,海上石油储量的追求将涉及复杂的提取方法和海底提取技术的广泛使用。

互联网智能设备中英文对照外文翻译文献

互联网智能设备中英文对照外文翻译文献(文档含英文原文和中文翻译)Mobile Malware and Smart Device Security:Trends, Challenges and SolutionsAbdullahi Arabo and Bernardi PranggonoThe Oxford Internet Institute (OII), Oxford University, Oxford, OX1 3JS, U.K. School of Engineering and Built Environment, Glasgow Caledonian University, Glasgow, G4 0BA, U.K.Abstract —This work is part of the research to study trends and challenges of cyber security to smart devices in smart homes. We have seen the development and demand for seamless interconnectivity of smart devices to provide various functionality and abilities to users. While these devices provide more features andfunctionality, they also introduce new risks and threats. Subsequently, current cyber security issues related to smart devices are discussed and analyzed. The paper begins with related background and motivation. We identified mobile malware as one of the main issue in the smart devices’ security. In the near future, mobile smart device users can expect to see a striking increase in malware and notable advancements in malware-related attacks, particularly on the Android platform as the user base has grown exponentially. We discuss and analyzed mobile malware in details and identified challenges and future trends in this area. Then we propose and discuss an integrated security solution for cyber security in smart devices to tackle the issue.Index — Botnet, cyber security, mobile malware, security framework, smart device securityI. INTRODUCTIONThe Internet is one of the most remarkable developments to have happened to mankind in the last 100 years. The development of ubiquitous computing makes things even more interesting as it has given us the possibility to utilise devices and technology in unusual ways. We have seen the development and demand for seamless interconnectivity of smart devices to provide various functionalities and abilities to users. But we also know the vulnerabilities that exist within this ecosystem. However, these vulnerabilities are normally considered for larger infrastructures and little attention has been paid to the cyber security threats from the usage and power of smart devices as a result of the Internet of Things (IoT) technologies. In the IoT vision, every physical object has a virtual component that can produce and consume services. Smart spaces are becoming interconnected with powerful smart devices (smartphones, tablets, etc.). On the other hand, we also have the backbone, the power grid that powers our nations. These two phenomena are coming at the same time. The increased usage of smart meters in our homes or businesses provides an avenue of connectivity as well as powerful home services or interconnected powerful smart devices. The example of the smart grid also provides the means of controlling and monitoring smart grid infrastructures via the use of portable smart devices.The vulnerability of the connected home and developments within the energy industry’s new wireless smart grid are exposed to the wrong people; it will inevitably lead to lights out for everyone. This will eventually uncover the multitude of interconnected smart devices in the IoT as a hotbed for cyber-attacks or robot networks (botnets) and a security nightmare for smart space users and possibly for national infrastructures as a whole.The latest research has reported that on average people own three internet-connected smart devices such as smartphones and tablets. Therefore, as a resultof the ubiquity of smart devices, and their evolution as computing platforms, as well as the powerful processors embedded in smart devices, has made them suitable objects for inclusion in a botnet. Botnets of mobile devices (also known as mobile botnets) are a group of compromised smart devices that are remotely controlled by bot-masters via command-and-control (C&C) channels. Mobile botnets have different characteristics in several aspects as compared to PC-based botnets, such as their C&C channels medium.PC-based botnets are seen as the most common platforms for security attacks, and mobile botnets are seen as less of a threat in comparison to their counterparts. This is so for different reasons, such as limited battery power, resource issues, and Internet access constraints, etc. Therefore, the efforts directed to both the manifestation of operating mobile botnets and corresponding research and development endeavours are not as wide as for PC-based botnets. However, this development could change with the recent surge in popularity and use of smart devices. Smart devices are now widely used by billions of users due to their enhanced computing ability, practicality and efficient Internet access, thanks to advancement in solid-state technologies.Moreover, smart devices typically contain a large amount of sensitive personal and corporate data and are often used in online payments and other sensitive transactions. The wide spread use of open-source smart device platforms such as Android and third-party applications made available to the public also provides more opportunities and attractions for malware creators. Therefore, for now and the near future smart devices will become one of the most lucrative targets for cybercriminals.The main focus of this paper is threefold: firstly to highlight the possible threats and vulnerability of smart devices, secondly to analyse the challenges involved in detecting mobile malware in smart devices and finally to propose a general security solution that will facilitate solving or addressing such threats. The rest of the paper is organized as follows. In section II we provide a detailed analysis of the security threats on smart devices and their links with cyber security. We have identified mobile malware as one of the main issues and we discuss it in more detail in Section III. Section IV provides our proposed security solution that will be able to deter the problems of mobile malware. The paper is concluded in section V.II. SECURITY THREATS ON SMART DEVICESThe weakest link in any IT security chain is the user. The human factor is the most challenging aspect of mobile device security. Home users generally assume that everything will work just as it should, relying on a device’s default settings without referring to complex technical manuals. Therefore service content providers and hardware vendors need to be aware of their responsibilities in maintaining network security and content management on the devices they provide. Service providers might also have the opportunity to provide add-on security services to complement theweaknesses of the devices.The issue of cyber security is much closer to the home environment than has been usually understood; hence, the problem of cyber security extends beyond computers it is also a threat to portable devices. Many electronic devices used at home are practically as powerful as a computer - from mobile phones, video consoles, game consoles and car navigation systems. While these devices are portable, provide more features and functionality, they also introduce new risks.These devices previously considered as secure can be an easy target for assailants. The information stored and managed within such devices and home networks forms part of an individual’s Critical Information Infrastructure (CII) [2] as identified by the POSTnote on cyber security in the UK. For example, an attacker may be able to compromise a smart device with a virus, to access the data on the device. Not only do these activities have implications for personal information, but they could also have serious consequences if corporate information were also stored on the smart device.The use of mobile devices in healthcare is also more common these days, such as in mobile-health. A typical example is having a health device connected to the home network, which is capable of transmitting data wirelessly to hospitals and other relevant parties. Most of the manufacturers of these devices do not put much effort in trying to make sure that the devices are secure. If these devices are compromised not only will the information and privacy of the user of the device be compromised, but the attacker can even change the settings of the devices, which could lead to harmful consequences. It has been shown that it is possible to hack into a pacemaker and read the details of data stored in the device such as names and medical data without having direct access to the devices simply by standing nearby [3].Therefore, it is also possible to reconfigure the parameters of the device. This is not only applicable to medical devices, but also to any devices that are used within the home network for any purpose.According to the Juniper Networks report [4], 76 percent of mobile users depend on their mobile devices to access their most sensitive personal information, such as online banking or personal medical information. This trend is even more noticeable with those who also use their personal mobile devices for business purposes. Nearly nine in ten (89 percent) business users report that they use their mobile device to access sensitive work-related information.Another more worrying impact is when cybercriminals use the vast resources of the network to turn it into a botnet and launch a cyber-attack on national critical infrastructures. There are some Android applications that when downloaded from a third party market (not the Android market) are capable of accessing the root functionality of devices (“rooted”) and turning them into botnet soldiers without theuser’s explicit consent.People could easily and unwittingly download malware to their smart devices or fa ll prey to “man-in-the-middle” attacks where cyber-criminals pose as a legitimate body, intercept and harvest sensitive information for malicious use. In 2011, there was a mix of Android applications removed from the Android Market because they contained malware. There were over 50 infected applications - these applications were copies of “legitimate” applications from legitimate publishers that were modified to include two root exploits and a rogue application downloader .The Juniper Networks Mobile Threat Centre (MTC) reported that in 2011 there was an unparalleled increase in mobile malware attacks, with a 155 percent increase from the previous year across all platforms [5]. It is also reported that Android malware experienced an increase of 3,325 percent in 2011. Notable in these findings is a significant number of malware samples obtained from third-party applications which do not enjoy the benefit or protection Google Play Store scanning techniques. Previously, an Android developer could post an application to the official Android Market and have it available immediately, without inspection or vetting to block pirated or malicious applications.This increase in malware is mainly due to the combination of Google Android’s dominant market share in smartphone (68.8 percent in 2012) and the lack of security control over the applications appearing in the various Android application markets. It was reported recently that Google Play store, which has more than 700,000 apps just passed 15 billion downloads. Security firm Fortinet estimated that money-stealing malware has increased exponentially in 2006-2011 as shown in Figure 1. Based on an estimation by Kaspersky Lab, cybercriminals who target smart devices like smartphones earn from $1,000 to $5,000 per day per person. Mobile phone hacking is also getting more attractive with the rise of the Near-Field Communication technology (NFC), which expands the use of smart devices as e-wallet or helps people to read product information.In December 2011 alone, Kaspersky Lab discovered more than 1,000 new Trojans targeting smartphones. That is more than all the smartphone viruses spotted during 2003-2010. This trend is continuing; in 2012, the number of cyber-attacks targeting mobile devices increased exponentially during the first quarter, as reported by security firm Trend Micro [6].Their report identified approximately 5,000 new malicious Android applications in just the first three months of the year, mainly due to the increase of the Android user base. The research also pointed out a marked escalation in the number of active advanced persistent threat (APT) campaigns currently being mounted against companies and governments. APT is a cyber-attack launched by a group ofsophisticated, determined, and coordinated attackers who systematically compromise the network of a specific target or entity for a prolonged period. Security researchers see APT in different ways, while some researchers regard APT as different type of attack; others just categorize it as a more organized botnet with more resources behind it.Malware developments that targets smart home devices have several known monetization factors. Most malwares are aimed at mobile pick pocketing (short message service (SMS) or call fraud) or the ability to charge premium bills via SMS or calls, as illustrated in Figure 2. Some malware are used as part of botnet creations. Malwares like DreamDroid (or DroidDream) [7] have integrated thousands of mobile devices into extensive botnets. Some of the malwares are developed to exploit vulnerabilities on either the operating systems (OS), installed applications, or just to create trouble to user information.Home devices and general consumer electronics are progressively becoming more advanced and are capable of connecting with other devices over a network. While it may sound unreal, devices such as TVs, digital picture frames, smart meters and e-readers are quite vulnerable and absolutely capable of causing problems on your network. The next few years will provide opportunities for various types of malware developers to explore unlikely methods of achieving their goals. Smartphones are not invulnerable and Macs can get malware, such as the CVE-2012-0507 vulnerability [8].Luigi Auriemma in [9] has uncovered a vulnerability in a Samsung D6000 high definition (HD) TV that caused it to get stuck in an endless loop of restarts. Auriemma's report followed another denial-of-service (DoS) vulnerability in Sony Bravia TVs uncovered by Gabriel Menezes Nunes [10] which stops users from changing the volume, channels or access any functions.In the 2012 first quarterly report from Trend Micro [11], it was pointed out that the large diffusion of mobile devices and the increase in awareness of the principal cyber threats have resulted in an increase in the interest of cybercrime in the mobile sector. Another significant interest is concentrated on the threat in terms of the rapid spread of botnets based on mobile devices, favored by the total almost absence of protection and the difficulty of tracing the agents composing the network. If these exploits are targeted by well-established hacker groups such as Anonymous, it will pose a bigger threat to organizations and smart environments that protect highly sensitive data, targeting companies and individuals for various political and financial reasons.III. MOBILE MALWAREOne of the major and most common problems in today’s Internet is malware. Among these malware, Botnets are considered as the biggest challenge. Botnets are used to send email spam, carry out distributed denial of services (DDoS) attacks, andfor hosting phishing and malware sites. Botnets are slowly moving towards smart devices since those devices are now basically everywhere, powerful enough to run a bot and offer additional gains for a bot-master such as financial gains as discussed earlier. With PC-based botnets, cybercriminals often use zombies within botnets to launch DDoS attacks. Even though there have been no major mobile DDoS incidents, with current trends we can expect to see this in the near future.Botnets are maintained by malicious actors commonly referred to as “bot-masters” that can access and manage the botnet remotely or via bot proxy servers as illustrated in Error!Reference source not found.. The bots are then programmed and instructed by the bot-master to perform a variety of cyber-attacks, including attacks involving the further distribution and installation of malware on other information systems.In PC-based botnets, botnet master controllers typically use http requests with normal port 80 to transmit and receive their messages. In mobile-based botnets, the bot-master also uses similar http techniques to distribute their commands but also exploits SMS, Bluetooth, etc. The bot-master exploits operating system and configuration vulnerabilities to compromise smart devices and to install the bot software.The first mobile malware, known as Cabir, was discovered in 2004 and was also known as the first mobile worm. The first mobile botnet was discovered around July 2009, when a security researcher found SymbOS.Yxes or SymbOS.Exy.C (aka Sexy Space) [12] targeting Symbian devices and using simple HTTP-based Command-and-Control (C&C).Later the same year, a security researcher discovered Ikee.B [13], which targets jailbroken iPhones using a similar mechanism to SymbOS.Yxes. Geinimi, which is considered to be the first Android botnet, was discovered in China in December 2010. Geinimi also implements similar HTTP-based C&C with the added feature of encrypted communications. Ge inimi steals the device’s international mobile equipment identity (IMEI), international mobile subscriber identity (IMSI), GPS coordinate, SMS, contact list, etc. and forwards it to the bot-master.Although advanced mobile botnets have not been observed in the main population of smartphones, we believe it is just a matter of time. As shown in [14], mobile botnets are obviously serious threats for both end users and cellular networks. Threats imposed by botnets will continue to increase. As more people use smart devices, it is essential to analyze and explore the mechanisms of mobile botnets and develop security solutions in regard to smart devices.The use of C&C for a mobile botnet stipulates additional challenges that differentiate it from well-known PC-based botnets. Some of these main challenges include, among others: computational power, seamless connectivity, inter-connectivitywith other secure platforms networks, portability and amount of stored sensitive data, and computational power. PC-based botnets also use an IRC-channel as the main C&C communication channel.The impact of SMS-based C&C, IP-based C&C, and Bluetooth-based C&C has been addressed in detail in [15], while P2P-based C&C mobile botnets are analyzed and discussed in [16].As a result of the abilities of smart devices in terms of placing i.e. calls, use of SMS and MMS amongst others, the burdens for mobile botnets are very interesting and challenging as it opens the door for easy financial gain for a bot-master. Additionally, since mobile phones interact with operators and other networks, attacks against the critical infrastructure are also possible.Hence, it is possible to launch sophisticated cyber-attacks on the mobile phone network that will be very hard to prevent.Detecting and preventing malware is not a trivial task as malware developers adopt and invent new strategies to infiltrate mobile devices. Malware developers employ advanced techniques such as obfuscation and encryption to camouflage the signs of malware and thereby undermine anti-malware software.Some of the main reasons why mobile malware are an attractive point for viruses and malware developers are:1.The ubiquity of smart devices such as smartphones in general.2.The increasing computational powers of smart devices. Whose they arebecoming virtually as powerful as desktop systems.3.The lack of awareness of the threats and the risk attached to smart devicesfrom the end-user’s perspective.4.The growing uses of jailbreak/rooted devices both on iOS and Androiddevices.5.Each smart device really is an expression of the owner. It provides ameans to track the user’s activity, hence serves as a single gateway to our digital identity and activities.6.Most of the widely used smart devices operate on an open platform suchas Android, which encourages developers and download of applications from both trusted applications markets and third party markets.IV. POTENTIAL SECURITY SOLUTIONSConsidering the above threats and challenges, a new security solution is essential for cyber security for smart devices in smart homes. More specifically, several keyresearch tasks are required: 1) investigate new secure system architecture for smart devices in smart homes; 2) re-evaluate and enhance security system architecture for smart devices in smart homes.Android OS has four layers: Linux kernel, libraries (+Android runtime), application solution and applications layers (see Figure 4). So, basically Android runtime is a kind of “glue” between the Linux kernel and the applications.Figure 4. Android OS layersThe main security features common to Android involve process and file system isolation; application or code signing; ROM, firmware, and factory restore; and kill switches.However, the main security issue with Android OS is it relies heavily to the end-user to decide whether an application is safe or not. Even though Google’s just adding one piece of the security layer by scanning an applications in the Google Play, the end users still needs to analyze and make the final decision themselves whether to continue with the installation or not. Until now, the end-users cannot rely on the operating system to protect themselves from malware.As part of Google’s marketing strategy to gain market share as big as possible by offering applications as many as possible, the Android application publishing process makes it easy for developers to develop Android applications, but also provides too much space for malicious application creators.Malicious applications have successfully infected Android market before, one example being a malware application called droid09 which allowed users to carry out banking transactions. The application needs the user to provide the bank’s details and tricks the user by masquerading a legitimate login of a bank website (phishing).Malware applications have become more sophisticated these days; they find new ways and techniques to enter the system by exploiting software vulnerabilities or by just tricking the users.End-user: It is always essential for the end-user to be aware of the security measures of their mobile device. End-users should be aware of at least the following measures:Install anti-virus and anti-malware solutions to protect the device againstmalware and viruses. Also ensure to turn on the automatic update. It is been shown that installing anti-virus and anti-malware is very effective to protect mobile devices from malicious applications [5, 6, 17].•Install a personal firewall to protect mobile device interfaces from direct attack and illegal access. The effectiveness of mobile firewalls to increase a mobile device’s security is shown in [18].Install only applications from trusted sources that have legitimate contact information and a website. As the current Android Market (Google Play) does not adopt a certification process for applications, it is up to the end-user to make sure he/she only installs trusted applications from trusted developers.Install only applications from the official and original developer (for example, if you are installing Instagram applications, make sure you download it from Instagram Inc.).Check the permissions carefully when the application is prompting you during the installation phase. For example, when you install a wallpaper application, do you think it really needs full Internet access?Ensure your OS and software's always up-to-date with the latest versions and security patches need to be installed.Install remote locate, track, lock, wipe, backup and restore software to retrieve, protect or restore a lost or stolen mobile device and the personal data on the device.Only install applications that have a high number of downloads and positive reviews.Never view sensitive data over public wireless networks which have no passwords or encryption.Should be alert to anomaly behaviours and activities in their devices.Should be careful when clicking links on social network sites. Malicious links on social networks can be a very effective method to spread malware.Participants tend to trust such networks and are thus willing to click on links that are on “friends’” social networking sites.Mobile Network Operators (MNOs): MNO also has responsibility to create a more secure environment for their customers. MNOs need to install anti-virus and anti-malware software to scan outgoing and incoming SMS and MMS to the mobile network, as many malwares use SMS/MMS to propagate and contact the bot-master. MNO should also build a global partnership with related agencies such as other MNOs to prevent mobile malware propagation by exchanging information, knowledge, database and expertise.Apps Developers: Developers also need to take care of the security measuresimplemented in their application. They should ensure that private data is not being sent via an unencrypted channel; the data must be sent through HTTPS or TLS networks.Developers should minimize the use of built-in permissions in their applications, for example do not ask for full Internet access permission, INTERNET, unless it is essential for your applications to work properly. Android has about 100 built-in permissions that control operations such as dialing the phone (CALL_PHONE), sending shot message (SEND_SMS), etc.In Android, there are three main “ security protection levels” for permission labels: a “normal” permission is granted to any application that requests it; a “dangerous” permission is only granted after user approval at install-time; and a “signature” permission is only granted to applications signed by the same developer key as the application defining the permission label.This “signature” protection level is integral in ensuring that third-party applications do not gain access affecting the Android’s trusted computing base (TCB)’s integrity.Furthermore, applications developers need only collect data which is essential and required for the application otherwise it will be tampered by the attackers. This is also useful to minimize repackaging attacks. Repackaging attacks are a very common approach, in which a malware developer downloads a legitimate application, modifies it to include malicious code and then republishes it to an application market or download site.It is shown that the repackaging technique is highly effective mainly because it is often difficult for end-users to tell the difference between a legitimate application and its malicious repackaged form. In fact, repackaging was the most prevalent type of social engineering attack used by Android malwaredevelopers in the first two quarters of 2011 [17]. One of the characteristics of Android malware is typically it is specifically developed for a speci fic group of users. It is very unlikely for an Android user from Russia to be infected by Chinese malware for example. Android malware is typically created by cybercriminals with users in specific countries as their target, which is usually their own compatriot. Market Store: The store needs to vet and rigorously screen new mobile applications before they can be put in the market. Google (Google Play) recently made a significant improvement in their security by screening new applications before they were put in the market. Applications store providers also should consider certification for each application before it can be published in the marketplace. The effectiveness of such certification process is shown in [19]. Applications should be rigorously reviewed to ensure that applications are safe from malicious codes, reliable, perform as expected, and are also free of explicit and offensive material.。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

中英文对照外文翻译(文档含英文原文和中文翻译)译文:三网融合的物理网络选择所谓的“三网”,是指电信业务网、广播电视网和计算机网,但这并不是在物理概念上的分割,而是在业务上的分割。

实际的网络(即物理网络)其实只有通信网和广播电视网,其名称也是因模拟领域业务和技术相关而形成的。

因为在模拟领域,不同的业务对传输方法有不同的要求,因而形成不同的网络。

因此,从某种意义上说,“三网”都是模拟传输的产物。

在数字领域,所有的语言、文字、图片和图像等信息都是以“0”和“1”的数字信号出现,因此对数字网来说不存在几个网的问题,多个业务网完全可以共存于一个物理网中。

信源的数字化导致了信息的汇聚,进而导致了三网的融合。

所谓“三网融合”,指的是将计算机网、电话网和电视网有机地融合起来,以降低总的成本投入,方便人们的使用,提高效率,产生更多的经济效益和社会效益。

我们知道,技术进步总是从一个方向、一个领域或一种装置上逐步取得突破的,而人类对技术的需求却是以自我为中心的,而且是全方位的,这就是“三网融合”的原始驱动力。

“三网融合”正逐渐成为世人瞩目的焦点,同时也孕育着巨大的市场机会。

尤其是在二十世纪末,这一领域已经发生了突破性的变化。

外国的大型计算机企业,如微软、索尼等公司,已经把“三网融合”作为其今后发展的业务重点而加以大力推进。

前不久闹得沸沸扬扬的微软“维纳斯”计划就是瞄准了这一市场。

就国内而言,北京、上海、青岛、重庆、江西等省市已经在开展这方面的探索,如上海广电集团研制的“SGIT三网合一”多媒体信息网络系统,就准备在在其公司开发的居民住宅小区进行试运行;而重庆华信高技术公司日前则声称其成功地开发了“三网合一”的HFC用户接入系统,能够利用有线电视网并行传输电视、电话和计算机信息;中信国安、海信电器等上市公司也已经在这一领域迈出了扎实的一步。

总的说来,国内已有不少地方和企业瞄准了“三网合一”广阔的市场前景,准备或已经实施其抢占滩头的战略计划。

但就目前而言,他们之中大多数还处于投入阶段,现阶段还没有收到显著的效益,但有一点是不容置疑的,那就是:国内、国外有远见的企业已经在悄悄瓜分这一市场,星星之火将在不久的将来将演成燎原之势。

纵观世界IT产业,自康柏和Digital之间的“世界购并”后,1998年6月全球的第二大电信公司棗北方电信以91亿美元收购了全球的第三大计算机网络公司棗贝网,标志着业务融合的屏障开始大片拆除,一个大范围的电信产业和计算机产业走向统一的浪潮即将来到。

全新的企业形象将引出全新的产业格局。

就国内而言,信息产业部的成立,标志着我国产业格局也将发生巨大的变化。

但我国的电信网、有线电视网和计算机网是否能马上合并成一个统一的网络呢?由于长期的地方经济保护主义和传统经济模式的影响,加上电信和广播电视网本身技术层面及经营模式上的差别,要在我国实现三网融合,仍存在着大量亟待解决的问题。

我国三网的发展和数字化的实现,都是在原有业务上发展起来的。

因此它们之间存在着不兼容的问题。

如IP网近年来以惊人的摩尔速度发展,千兆路由器已进入实用阶段。

但其IP协议是由互联网业务发展而来的,主要适用于小容量非实时业务,因此在用于大容量的广播电视时,大容量广播电视实时传输和质量控制方面仍存在着明显的问题。

同时,经济可行性问题也非常突出。

据有关资料统计,截止到1999年,我国互联网出口不足80Mbps,而上网用户已达140万户,占用通道平均5714bps,若考虑少数大容量用户,一般用户远小于这个数字,但来自每个用户的收益远远超过相应的有线电视,要在IP 网上挤出几百兆来实现电视的接入是不可能的。

同样,也很难要求在使用300-3400Hz带宽已经实现可观收入的情况下用原有通信网来实现电视的接入。

有线广播电视网的业务是由其性质所决定的,主要是传播党、政府、人民需要的广播电视信息。

当然,可以利用网络的优势,开发多功能业务。

但想在网上完全取代固定电话公司的话音业务也是不现实的。

因此,目前在一个网络中实现三种业务的三网合一是不现实的。

这也是业界为什么逐步用“三网融合”取代“三网合一”的提法的主要原因。

三网只有在社会主义市场经济的条件下,以原有业务为主,逐步开展其他网络业务,并引入适度的竞争,才能推进我国信息产业的发展,并进而逐步走向三网融合。

电信业务网电信业务网是以电话网为基础逐步发展起来。

目前信息到户主要是双绞线,通过交换机与骨干网相连。

电话网是最早进行数字化的,传输方式逐步向光纤到户发展,传输协议从准同步体系(PDH)到同步体系(SDH)进而到非同步转移模式(ATM)发展,但由于发展的不平衡,尚不能做到全网传输和交换的数字化。

虽然有非对称用户环路(ADSL)和高速用户环路(VDSL)等方式,速率可以从几Mbps到几十Mbps,但整个网络的流通能力受到双绞线传输容量这一瓶颈的抑制。

目前电话双绞线上网的主流频率为56K,其物理极限为64K,潜力非常有限。

这将是电信业务网一个难以逾越的障碍。

计算机网计算机网络初期主要是局域网,远程网是在国际互联网大规模发展后才迅速进入平常百姓家庭的,目前主要依赖于电信网,因此同样受到到户双绞线传输容量和CABLE MODEM速度的限制,但其互联网协议众多的优越性正在被其他网络所采用。

广播电视网我国的广播电视网络是全国最大的公众信息网络,由于其带宽比电话要宽得多,因而其网络具有一定优势。

特别是近十年来发展起来的广播电视网的后起之秀棗有线电视网,具有网络技术设备先进、光缆为主干线;贯通全国和各省市首府及其大部分的城镇;宽带双向光纤同轴电缆混合网(HFC)入户的优点;与电话接入方式相比,其传输的带宽约为电话线的一万倍,而且在有线电视的同一根同轴电缆上,利用频分技术,可以同时看电视、打电话、上计算机网,且互不干扰。

而不象电信网接入时会出现不能同时上计算机网和打电话的现象。

目前有线电视网已拥有用户终端数7700万户,是世界上用户规模最大的有线电视网络。

但由于其发展不平衡,全国各地网络分配网带宽不一,使用器材离散性大等诸多原因,因而也只有在对现有网络进行不同程度的升级改造之后,才有进一步拓展广播电视业务以外的其它增值业务的可能。

从以上的分析中可以看出,目前三网在技术上各有长短,但有线电视网既可同时支持模拟业务和数字业务,又拥有丰富的带宽资源和广泛的受众资源,在适应性和可改造性方面,都占有一定的优势。

在三网逐渐走向融合的大前提下,及早确定最终的物理网络,将避免重复低效的投资,有利于我国信息业的长远发展。

我个人认为,无论是从技术角度还是从经济实用角度出发,广播电视网络中的有线电视网都将是三网融合之物理网络的最佳选择。

原文:Triple play of the physical network selectionThe so-called "triple play" refers to the telecommunications business network, radio and TV and computer networks, but this is not in the physical concept of the split, but split in the business. The actual network (physical network) is in fact only communication networks and broadcast networks, its name is due to the analog domain, business and technology-related formation. Because in the analog domain, the different business have different requirements for the transmission method, resulting in a different network. Therefore, in a sense, the "triple play" product of analog transmission. In the digital domain, all of the language, text, pictures and images and other information are "0" and "1" digitalsignals, and therefore does not exist a few network for digital network, multiple service network can be coexist on a single physical network. The source of digital has led to the convergence of information, which led to the integration of the three networks.The so-called "triple play", referring to the computer network, telephone network and television network organic blend to reduce the total cost of investment, to facilitate the use of people, to improve efficiency, generate more economic and social benefits. We know that technological progress is always from one direction, a field or a device gradually achieve a breakthrough, human demand for technology is self-centered, and all, this is the "triple play" the original driving force. "Triple play" is becoming the focus of world attention, but also gave birth to a huge market opportunity. Especially at the end of the twentieth century, this area has occurred a breakthrough change. Large foreign computer companies such as Microsoft, Sony and other companies, the "triple play" as the focus of its future development to be vigorously promoted. Not long ago ignited Microsoft's "Venus" program is aimed at this market. Domestically, Beijing, Shanghai, Qingdao, Chongqing, Jiangxi and other provinces and cities in carrying out this exploration, such as developed by the Shanghai SV A Group "SGIT triple play" multimedia information network system, ready in his company to develop the residential areas in the test run; Chongqing Huaxin high-techcompany has claimed that it has successfully developed a "triple play" of HFC user access system can take advantage of the cable television network parallel transmission of television, telephone and computer information;CITIC Guoan, Hisense Electric and other listed companies have also taken a solid step in this field. In general, the country has a lot of places and businesses aimed at the "triple play" broad market prospects, preparation or implementation of its strategic plan to seize the beachhead. But for now, most of them are still in the input stage, has yet to receive significant benefits, but there is no question, that is: domestic, foreign, far-sighted companies have quietly carved up market, the spark will in the near future evolves into a prairie fire.Looking at the world IT industry, since the World acquisitions Compaq and Digital, the date of June 1998 the world's second largest telecommunications company Northern Telecom for $ 9.1 billion acquisition of the world's third-largest computer network dates shellfish net, barrier marks the business integration of large tracts removed, and a wide range of telecommunications industry and computer industry toward a unified wave coming. The new corporate image will lead to a new industrial pattern. Domestically, the establishment of the Ministry of Information Industry, indicates that China's industrial structure will also change dramatically.China's telecommunications networks, cable TV and computer networks can be immediately merged into a unified network?Due to the impact of long-term local economic protectionism and traditional economic model, coupled with differences in the telecommunications and broadcast networks the technical level and business model, in China, triple play, there are still a lot of problems to be solved.The development of China's three networks and digital implementation, developed the original business. There are incompatibility issues between them.Such as the IP network in recent years to the development of the amazing speed of Moore, gigabit router has entered the practical stage. But the IP protocol from the Internet business development, is mainly applied to the non-real-time services for small capacity, in radio and television for high-capacity, high-capacity real-time transmission of radio and television, and quality control, there are still obvious problems. At the same time, the economic viability of problem is also very prominent. According to statistics, in 1999, the export of China's Internet to 80Mbps. Internet users has reached 1.4 million, occupy channels average 5714bps, considering the small number of high-capacity users, the average user is far less than this figure, but from each The user's benefits far exceed the corresponding cable TV access is not possible to squeeze a few megabytes in IP networks.Similarly, it is difficult with the existing communication network to access TV in the case of 300-3400Hz bandwidth has beenachieved substantial revenues. The business of cable television network is determined by its very nature, is the dissemination of the party, government and people need radio and television information. Of course, you can use the advantages of the network, the development of multi-function business. But would like to completely replace the fixed-line telephone company's voice business online is unrealistic. Therefore, at present in a network of three business triple-play is not realistic. This is also the industry's why gradually with the main reason of the "triple play" instead of "triple play" of the formulation. The three networks only under the conditions of the socialist market economy, mainly to the existing business, a gradual development of other network services, and the introduction of an appropriate degree of competition in order to promote the development of China's information industry, and thus gradually moving towards triple play.Telecom Services NetworkTelecommunications service network is the telephone network based on the progressive development. Information to the home is a twisted pair, connected through a switch and the backbone network. Telephone network from the quasi-synchronous hierarchy (PDH) to synchronous hierarchy (SDH) and then to the asynchronous transfer mode (ATM) is a pioneer in digital transmission gradually to the FTTH development, transport protocol, but because of the imbalance in development, still cannot do the whole network digital transmission and switching.Although the asymmetric subscriber line (ADSL) and high-speed subscriber loop (VDSL) and other ways, the rate can range from a few Mbps to tens of Mbps, but the flow capacity of the entire network by the inhibition of the twisted pair transmission capacity bottleneck. Internet telephone twisted pair mainstream frequency of 56K, its physical limit of 64K, the potential is very limited. This will be the telecommunications service network is an insurmountable obstacle.Computer NetworkThe early stage of computer network LAN, remote network is quick access to large-scale development of the Internet before the ordinary people, families, mainly dependent on the telecommunications network, and therefore subject to the same home twisted pair transmission capacity and the CABLE MODEM speed limit, butThe many advantages of Internet Protocol is used by other network.Radio and television networksChina's Radio and Television NetworkChina's Radio and Television Network is the nation's largest public information network, due to a much wider bandwidth than telephone, and thus the network has certain advantages. In particular, is a rising star date of the broadcast networks over the past decade the development of cable television, network technology, advanced equipment, fiber optic cablemain trunk; through national and provincial capitals and most of its cities and towns; broadband bi-directional fiber-coaxial hybrid network(HFC) the advantages of home; and telephone access mode, the transmission bandwidth of about a million times in the telephone line, and cable TV with a coaxial cable, using the frequency division technique, you can also watch TV , phone calls, computers on the network, and without disturbing each other. Not like the telecommunication network access will not at the same time on the computer network and call the phenomenon. Cable television network currently has a user terminal 77 million users the largest cable TV network in the world. However, due to the uneven development of different across the country network distribution network bandwidth, the use of equipment discrete large a number of reasons, therefore, only in different degrees of upgrading the existing network, only to further expand outside the radio and television service the possibility of other value-added services. It can be seen from the above analysis, each the length of the current triple-play technically, but the cable networks can support both analog business and digital business, but also has abundant bandwidth resources and a wide range of audience resources, adaptability and transformation in terms of an advantage. Under the premise of the three networks is gradually moving toward integration, and early identification of the ultimate physical network, and will avoid a repeat of inefficient investment, long-term development ofChina's information industry. Personally, I think, whether it is from a technical point of view or from the practical point of view of economy, radio and television network cable television network will be the best choice of the triple play of the physical network.。

相关文档
最新文档