This study explores the variations in address forms within the Tinghu dialect of Yancheng city.The findings reveal that the ways individuals address one another in this region deviate from the established principles o...This study explores the variations in address forms within the Tinghu dialect of Yancheng city.The findings reveal that the ways individuals address one another in this region deviate from the established principles of tone sandhi theory.In Chinese phonology,it is generally assumed that individual characters serve as fundamental forms based on their standard pronunciations,with real-time pronunciations adapting to phonetic conditions.However,the study of address forms has not traditionally been integrated into this framework.Observations indicate that a wide range of addressing methods is employed in social interactions,reflecting the complexity of regional cultural traits and social dynamics.This research highlights the distinctive features of address forms in the Tinghu dialect,particularly in terms of tone sandhi,vocative expressions,and indirect address.By examining these unique characteristics,the study enhances our understanding of the principles governing tonal changes in Chinese.Furthermore,it offers valuable insights into the preservation and inheritance of regional dialects.展开更多
The increasing reliance on interconnected Internet of Things(IoT)devices has amplified the demand for robust anonymization strategies to protect device identities and ensure secure communication.However,traditional an...The increasing reliance on interconnected Internet of Things(IoT)devices has amplified the demand for robust anonymization strategies to protect device identities and ensure secure communication.However,traditional anonymization methods for IoT networks often rely on static identity models,making them vulnerable to inference attacks through long-term observation.Moreover,these methods tend to sacrifice data availability to protect privacy,limiting their practicality in real-world applications.To overcome these limitations,we propose a dynamic device identity anonymization framework using Moving Target Defense(MTD)principles implemented via Software-Defined Networking(SDN).In our model,the SDN controller periodically reconfigures the network addresses and routes of IoT devices using a constraint-aware backtracking algorithmthat constructs new virtual topologies under connectivity and performance constraints.This address-hopping scheme introduces continuous unpredictability at the network layer dynamically changing device identifiers,routing paths,and even network topology which thwarts attacker reconnaissance while preserving normal communication.Experimental results demonstrate that our approach significantly reduces device identity exposure and scan success rates for attackers compared to static networks.Moreover,the dynamic schememaintains high data availability and network performance.Under attack conditions it reduced average communication delay by approximately 60% vs.an unprotected network,with minimal overhead on system resources.展开更多
As a typical in-memory computing hardware design, nonvolatile ternary content-addressable memories(TCAMs) enable the logic operation and data storage for high throughout in parallel big data processing. However,TCAM c...As a typical in-memory computing hardware design, nonvolatile ternary content-addressable memories(TCAMs) enable the logic operation and data storage for high throughout in parallel big data processing. However,TCAM cells based on conventional silicon-based devices suffer from structural complexity and large footprintlimitations. Here, we demonstrate an ultrafast nonvolatile TCAM cell based on the MoTe2/hBN/multilayergraphene (MLG) van der Waals heterostructure using a top-gated partial floating-gate field-effect transistor(PFGFET) architecture. Based on its ambipolar transport properties, the carrier type in the source/drain andcentral channel regions of the MoTe2 channel can be efficiently tuned by the control gate and top gate, respectively,enabling the reconfigurable operation of the device in either memory or FET mode. When working inthe memory mode, it achieves an ultrafast 60 ns programming/erase speed with a current on-off ratio of ∼105,excellent retention capability, and robust endurance. When serving as a reconfigurable transistor, unipolar p-typeand n-type FETs are obtained by adopting ultrafast 60 ns control-gate voltage pulses with different polarities.The monolithic integration of memory and logic within a single device enables the content-addressable memory(CAM) functionality. Finally, by integrating two PFGFETs in parallel, a TCAM cell with a high current ratioof ∼10^(5) between the match and mismatch states is achieved without requiring additional peripheral circuitry.These results provide a promising route for the design of high-performance TCAM devices for future in-memorycomputing applications.展开更多
Applications of Wireless Sensor devices are widely used byvarious monitoring sections such as environmental monitoring, industrialsensing, habitat modeling, healthcare and enemy movement detection systems.Researchers ...Applications of Wireless Sensor devices are widely used byvarious monitoring sections such as environmental monitoring, industrialsensing, habitat modeling, healthcare and enemy movement detection systems.Researchers were found that 16 bytes packet size (payload) requires MediaAccess Control (MAC) and globally unique network addresses overheads asmore as the payload itself which is not reasonable in most situations. Theapproach of using a unique address isn’t preferable for most Wireless SensorNetworks (WSNs) applications as well. Based on the mentioned drawbacks,the current work aims to fill the existing gap in the field area by providingtwo strategies. First, name/address solutions that assign unique addresseslocally to clustered topology-based sensor devices, reutilized in a spatialmanner, and reduce name/address size by a noticeable amount of 2.9 basedon conducted simulation test. Second, name/address solutions that assignreutilizing of names/addresses to location-unaware spanning-tree topologyin an event-driven WSNs case (that is providing minimal low latenciesand delivering addressing packet in an efficient manner). Also, to declinethe approach of needing both addresses (MAC and network) separately, itdiscloses how in a spatial manner to reutilize locally unique sensor devicename approach and could be utilized in both contexts and providing anenergy-efficient protocol for location unawareness clustered based WSNs.In comparison, an experimental simulation test performed and given theaddresses solution with less overhead in the header and 62 percent fairpayload efficiency that outperforms 34 percent less effective globally uniqueaddresses. Furthermore, the proposed work provides addresses uniquenessfor network-level without using network-wide Duplicate Address Detection(DAD) algorithm. Consequently, the current study provides a roadmap foraddressing/naming scheme to help researchers in this field of study. In general,some assumptions were taken during the work phases of this study such asnumber of Cluster Head (CH) nodes is 6% of entire sensor nodes, locationunawareness for entire sensor network and 4 bits per node address space whichconsidered as the limitation of the study.展开更多
To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development...To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.展开更多
The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called M...The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.展开更多
The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting syste...The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting system using automatic addressable single-lamp control technology,and outlines the main development direction for this technology in modern tunnel lighting.The aim is to offer insights that can inform the rational deployment of this technology,thereby enhancing the lighting control effectiveness in modern tunnels and meeting their specific lighting requirements more effectively.展开更多
Power consumption in test mode is much higher than that in normal mode,which is prone to causing circuit damage and reducing the yield of chips.To reduce the power dissipation efficiently,a modified linear feedback sh...Power consumption in test mode is much higher than that in normal mode,which is prone to causing circuit damage and reducing the yield of chips.To reduce the power dissipation efficiently,a modified linear feedback shift register(LFSR)is designed to decrease switching activity dramatically during the generation of address sequences for memory built-in self-test(MBIST).The address models are generated by a blend of two address generators with an optimized address partition and two distinct controlled clock signals.An address generator circuit for MBIST of 64 k×32 static random access memory(SRAM)is designed to illustrate the proposed scheme.Experimental results show that when the address bus size is 16 bits,compared with the traditional LFSR,the proposed LFSR can reduce the switching activity and dynamic power by 71.1%and 68.2%,respectively,with low area overhead.展开更多
To deal with the junk e-mail problem caused by the e-mail address leakage for a majority of Internet users, this paper presents a new privacy protection model in which the e-mail address of the user is treated as a pi...To deal with the junk e-mail problem caused by the e-mail address leakage for a majority of Internet users, this paper presents a new privacy protection model in which the e-mail address of the user is treated as a piece of privacy information concealed. Through an interaction pattern that involves three parties and uses an e-mail address code in the place of an e-mail address, the proposed model can prevent the e-mail address from being leaked, thus effectively resolving the junk e-mail problem. We compare the proposed anti-spam method with the filtering technology based on machine learning. The result shows that 100% spams can be filtered out in our scheme, indicating the effectiveness of the proposed anti-spam method.展开更多
Most of users are accustomed to utilizing virtual address in their parallel programs running at the scalable high-performance parallel computing systems.Therefore a virtual and physical address translation mechanism i...Most of users are accustomed to utilizing virtual address in their parallel programs running at the scalable high-performance parallel computing systems.Therefore a virtual and physical address translation mechanism is necessary and crucial to bridge the hardware interface and software application.In this paper,a new virtual and physical translation mechanism is proposed,which includes an address validity checker,an address translation cache(ATC),a complete refresh scheme and many reliability designs.The ATC employs a large capacity embedded dynamic random access memory(eDRAM)to meet the high hit ratio requirement.It also can switch the cache and buffer mode to avoid the high latency of accessing the main memory outside.Many tests have been conducted on the real chip,which implements the address translation mechanism.The results show that the ATC has a high hit ratio while running the well-known benchmarks,and additionally demonstrates that the new high-performance mechanism is well designed.展开更多
The address term"老师"is used widely in modem society.This paper mainly studies the general use of the address term"老师".It raised the hypothesis firstly.Then some questionnaires were handed out t...The address term"老师"is used widely in modem society.This paper mainly studies the general use of the address term"老师".It raised the hypothesis firstly.Then some questionnaires were handed out to collect the data for the analysis.According to the statistics,this phenomenon is analyzed and interpreted.It is due to both psychological and social factors.展开更多
The effects of linear falling ramp reset pulse related to addressing operation in an alternating current plasma display panel (AC PDP) were studied. The wall charge waveforms were measured by the electrode balance m...The effects of linear falling ramp reset pulse related to addressing operation in an alternating current plasma display panel (AC PDP) were studied. The wall charge waveforms were measured by the electrode balance method in a 12-inch coplanar AC PDP. The wall charge waveforms show the relationship between the slope ratio of the falling ramp reset pulse and the wall charges at the end of the falling ramp reset pulse which influences the addressing stability. Then the effects of the slope ratio of the linear falling ramp reset pulse on the addressing voltage and addressing time were investigated. The experimental results show that the minimum addressing voltage increases with the increase of the slope ratio of the falling ramp reset pulse, and so does the minimum addressing time. Based on the experimental results, the optimization of the addressing time and the slope ratio of the falling ramp pulse is discussed.展开更多
Obama's election draws the world's attention because of his skin color,so is his inaugural address.The paper analyzes his inaugural address according to the parameter of the three metafunctions from the perspe...Obama's election draws the world's attention because of his skin color,so is his inaugural address.The paper analyzes his inaugural address according to the parameter of the three metafunctions from the perspective of systemic functional grammar:ideational,interpersonal and textual.Accordingly,transitivity system,Mood and modality,and thematic progression in the address are respectively examined.展开更多
Within the scope of human beings, some addressing terms are similar. However, different addressing terms still exist,which are influenced by the background of high context communication or low context communication. A...Within the scope of human beings, some addressing terms are similar. However, different addressing terms still exist,which are influenced by the background of high context communication or low context communication. A good example is that Chinese traditional culture, a typical instance of high context communication, puts much emphasis on etiquette, which is represented in addressing terms as more complex and definite; In western, with the background of low context communication, every individual is more equal and they address each other more generally and much simpler. This paper tries to explore the addressing terms both in Chinese and in English from the perspective of frame theory.展开更多
As the process of globalization moves on,cross-cultural communication has been a part of people' s daily lives.It is quite important for people to know how to behave properly in many situations.The present study a...As the process of globalization moves on,cross-cultural communication has been a part of people' s daily lives.It is quite important for people to know how to behave properly in many situations.The present study analyses the phenomena of pragmatic failure of address forms.The study may help enhance peoples' awareness on polite address in cross-cultural communi cation and improve their communicative competence.Foreign language teachers can get implications for their teaching methods,paying more attention on cultural teaching.In addition,the author hopes that equal cultural communication and multi-cultural concept can be achieved.展开更多
In discourse analysis,different analyzer uses different ways to analyze discourse.This essay analyzes Gettysburg Address theoretically and practically based on Function Grammar proposed by M.A.K.Halliday.It aims to ex...In discourse analysis,different analyzer uses different ways to analyze discourse.This essay analyzes Gettysburg Address theoretically and practically based on Function Grammar proposed by M.A.K.Halliday.It aims to explore rather than literal meaning of the Address from different language structures by adopting some theories in Functional Grammar.展开更多
Translational discourse requires at least three participants, therefore it is suggested to consider the universal model of the picture of the world, according to which it is much easier for a translator to combine the...Translational discourse requires at least three participants, therefore it is suggested to consider the universal model of the picture of the world, according to which it is much easier for a translator to combine the pictures of the world of an addressee and an author. An addressee is a mental image existing in the mind of an addresser during the creative process. Having defined its parameters, a translator has an opportunity to deliver the thought of an addresser to an addressee as accurately as possible and to select the means of expression that are clear to an addressee. The type of an addressee correlates with "the relation to the new".展开更多
WS-Addressing用端点引用(EndpointReference,EPR)来进行Web服务寻址,EPR是动态生成的服务端点描述,它不能直接存储在统一描述、发现和集成(universal description discovery and integration,UDDI)的静态数据结构中。为实现UDDI和WS-Ad...WS-Addressing用端点引用(EndpointReference,EPR)来进行Web服务寻址,EPR是动态生成的服务端点描述,它不能直接存储在统一描述、发现和集成(universal description discovery and integration,UDDI)的静态数据结构中。为实现UDDI和WS-Addressing共存的Web服务模型,提供了在UDDI中支持WS-Addressing的方法,并通过购物车的实现来说明应用程序应如何支持WS-Addressing。展开更多
文摘This study explores the variations in address forms within the Tinghu dialect of Yancheng city.The findings reveal that the ways individuals address one another in this region deviate from the established principles of tone sandhi theory.In Chinese phonology,it is generally assumed that individual characters serve as fundamental forms based on their standard pronunciations,with real-time pronunciations adapting to phonetic conditions.However,the study of address forms has not traditionally been integrated into this framework.Observations indicate that a wide range of addressing methods is employed in social interactions,reflecting the complexity of regional cultural traits and social dynamics.This research highlights the distinctive features of address forms in the Tinghu dialect,particularly in terms of tone sandhi,vocative expressions,and indirect address.By examining these unique characteristics,the study enhances our understanding of the principles governing tonal changes in Chinese.Furthermore,it offers valuable insights into the preservation and inheritance of regional dialects.
基金supported by the National Key Research and Development Program of China(Project No.2022YFB3104300).
文摘The increasing reliance on interconnected Internet of Things(IoT)devices has amplified the demand for robust anonymization strategies to protect device identities and ensure secure communication.However,traditional anonymization methods for IoT networks often rely on static identity models,making them vulnerable to inference attacks through long-term observation.Moreover,these methods tend to sacrifice data availability to protect privacy,limiting their practicality in real-world applications.To overcome these limitations,we propose a dynamic device identity anonymization framework using Moving Target Defense(MTD)principles implemented via Software-Defined Networking(SDN).In our model,the SDN controller periodically reconfigures the network addresses and routes of IoT devices using a constraint-aware backtracking algorithmthat constructs new virtual topologies under connectivity and performance constraints.This address-hopping scheme introduces continuous unpredictability at the network layer dynamically changing device identifiers,routing paths,and even network topology which thwarts attacker reconnaissance while preserving normal communication.Experimental results demonstrate that our approach significantly reduces device identity exposure and scan success rates for attackers compared to static networks.Moreover,the dynamic schememaintains high data availability and network performance.Under attack conditions it reduced average communication delay by approximately 60% vs.an unprotected network,with minimal overhead on system resources.
基金supported by the National Key Research&Development Projects of China(Grant No.2022YFA1204100)National Natural Science Foundation of China(Grant No.62488201)+1 种基金CAS Project for Young Scientists in Basic Research(YSBR-003)the Innovation Program of Quantum Science and Technology(2021ZD0302700)。
文摘As a typical in-memory computing hardware design, nonvolatile ternary content-addressable memories(TCAMs) enable the logic operation and data storage for high throughout in parallel big data processing. However,TCAM cells based on conventional silicon-based devices suffer from structural complexity and large footprintlimitations. Here, we demonstrate an ultrafast nonvolatile TCAM cell based on the MoTe2/hBN/multilayergraphene (MLG) van der Waals heterostructure using a top-gated partial floating-gate field-effect transistor(PFGFET) architecture. Based on its ambipolar transport properties, the carrier type in the source/drain andcentral channel regions of the MoTe2 channel can be efficiently tuned by the control gate and top gate, respectively,enabling the reconfigurable operation of the device in either memory or FET mode. When working inthe memory mode, it achieves an ultrafast 60 ns programming/erase speed with a current on-off ratio of ∼105,excellent retention capability, and robust endurance. When serving as a reconfigurable transistor, unipolar p-typeand n-type FETs are obtained by adopting ultrafast 60 ns control-gate voltage pulses with different polarities.The monolithic integration of memory and logic within a single device enables the content-addressable memory(CAM) functionality. Finally, by integrating two PFGFETs in parallel, a TCAM cell with a high current ratioof ∼10^(5) between the match and mismatch states is achieved without requiring additional peripheral circuitry.These results provide a promising route for the design of high-performance TCAM devices for future in-memorycomputing applications.
文摘Applications of Wireless Sensor devices are widely used byvarious monitoring sections such as environmental monitoring, industrialsensing, habitat modeling, healthcare and enemy movement detection systems.Researchers were found that 16 bytes packet size (payload) requires MediaAccess Control (MAC) and globally unique network addresses overheads asmore as the payload itself which is not reasonable in most situations. Theapproach of using a unique address isn’t preferable for most Wireless SensorNetworks (WSNs) applications as well. Based on the mentioned drawbacks,the current work aims to fill the existing gap in the field area by providingtwo strategies. First, name/address solutions that assign unique addresseslocally to clustered topology-based sensor devices, reutilized in a spatialmanner, and reduce name/address size by a noticeable amount of 2.9 basedon conducted simulation test. Second, name/address solutions that assignreutilizing of names/addresses to location-unaware spanning-tree topologyin an event-driven WSNs case (that is providing minimal low latenciesand delivering addressing packet in an efficient manner). Also, to declinethe approach of needing both addresses (MAC and network) separately, itdiscloses how in a spatial manner to reutilize locally unique sensor devicename approach and could be utilized in both contexts and providing anenergy-efficient protocol for location unawareness clustered based WSNs.In comparison, an experimental simulation test performed and given theaddresses solution with less overhead in the header and 62 percent fairpayload efficiency that outperforms 34 percent less effective globally uniqueaddresses. Furthermore, the proposed work provides addresses uniquenessfor network-level without using network-wide Duplicate Address Detection(DAD) algorithm. Consequently, the current study provides a roadmap foraddressing/naming scheme to help researchers in this field of study. In general,some assumptions were taken during the work phases of this study such asnumber of Cluster Head (CH) nodes is 6% of entire sensor nodes, locationunawareness for entire sensor network and 4 bits per node address space whichconsidered as the limitation of the study.
基金supported by the National Key R&D Program of China(Project Number:2022YFB2902100).
文摘To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.
基金supported by the National Key Research and Development Program of China(No.2016YFB0800601)the Key Program of NSFC-Tongyong Union Foundation(No.U1636209)+1 种基金the National Natural Science Foundation of China(61602358)the Key Research and Development Programs of Shaanxi(No.2019ZDLGY13-04,No.2019ZDLGY13-07)。
文摘The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.
文摘The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting system using automatic addressable single-lamp control technology,and outlines the main development direction for this technology in modern tunnel lighting.The aim is to offer insights that can inform the rational deployment of this technology,thereby enhancing the lighting control effectiveness in modern tunnels and meeting their specific lighting requirements more effectively.
基金Fundamental Research Funds for the Central Universities(No.JUSRP51510)Primary Research&Development Plan of Jiangsu Province(No.BE2019003-2)。
文摘Power consumption in test mode is much higher than that in normal mode,which is prone to causing circuit damage and reducing the yield of chips.To reduce the power dissipation efficiently,a modified linear feedback shift register(LFSR)is designed to decrease switching activity dramatically during the generation of address sequences for memory built-in self-test(MBIST).The address models are generated by a blend of two address generators with an optimized address partition and two distinct controlled clock signals.An address generator circuit for MBIST of 64 k×32 static random access memory(SRAM)is designed to illustrate the proposed scheme.Experimental results show that when the address bus size is 16 bits,compared with the traditional LFSR,the proposed LFSR can reduce the switching activity and dynamic power by 71.1%and 68.2%,respectively,with low area overhead.
基金Supported by National Natural Science Foundation of China(U1736116,61272500,60373075)the National High-Tech R&D Program(863 Program)(2015AA017204)
文摘To deal with the junk e-mail problem caused by the e-mail address leakage for a majority of Internet users, this paper presents a new privacy protection model in which the e-mail address of the user is treated as a piece of privacy information concealed. Through an interaction pattern that involves three parties and uses an e-mail address code in the place of an e-mail address, the proposed model can prevent the e-mail address from being leaked, thus effectively resolving the junk e-mail problem. We compare the proposed anti-spam method with the filtering technology based on machine learning. The result shows that 100% spams can be filtered out in our scheme, indicating the effectiveness of the proposed anti-spam method.
基金Supported by the National Natural Science Foundation of China(61103083,61133007)National High Technology Research and Development Program of China(863Program)(2012AA01A301,2015AA01A301)
文摘Most of users are accustomed to utilizing virtual address in their parallel programs running at the scalable high-performance parallel computing systems.Therefore a virtual and physical address translation mechanism is necessary and crucial to bridge the hardware interface and software application.In this paper,a new virtual and physical translation mechanism is proposed,which includes an address validity checker,an address translation cache(ATC),a complete refresh scheme and many reliability designs.The ATC employs a large capacity embedded dynamic random access memory(eDRAM)to meet the high hit ratio requirement.It also can switch the cache and buffer mode to avoid the high latency of accessing the main memory outside.Many tests have been conducted on the real chip,which implements the address translation mechanism.The results show that the ATC has a high hit ratio while running the well-known benchmarks,and additionally demonstrates that the new high-performance mechanism is well designed.
文摘The address term"老师"is used widely in modem society.This paper mainly studies the general use of the address term"老师".It raised the hypothesis firstly.Then some questionnaires were handed out to collect the data for the analysis.According to the statistics,this phenomenon is analyzed and interpreted.It is due to both psychological and social factors.
基金supported by the 2002 Ministry of Education Project for Science and Technology (2002,No.77)
文摘The effects of linear falling ramp reset pulse related to addressing operation in an alternating current plasma display panel (AC PDP) were studied. The wall charge waveforms were measured by the electrode balance method in a 12-inch coplanar AC PDP. The wall charge waveforms show the relationship between the slope ratio of the falling ramp reset pulse and the wall charges at the end of the falling ramp reset pulse which influences the addressing stability. Then the effects of the slope ratio of the linear falling ramp reset pulse on the addressing voltage and addressing time were investigated. The experimental results show that the minimum addressing voltage increases with the increase of the slope ratio of the falling ramp reset pulse, and so does the minimum addressing time. Based on the experimental results, the optimization of the addressing time and the slope ratio of the falling ramp pulse is discussed.
文摘Obama's election draws the world's attention because of his skin color,so is his inaugural address.The paper analyzes his inaugural address according to the parameter of the three metafunctions from the perspective of systemic functional grammar:ideational,interpersonal and textual.Accordingly,transitivity system,Mood and modality,and thematic progression in the address are respectively examined.
文摘Within the scope of human beings, some addressing terms are similar. However, different addressing terms still exist,which are influenced by the background of high context communication or low context communication. A good example is that Chinese traditional culture, a typical instance of high context communication, puts much emphasis on etiquette, which is represented in addressing terms as more complex and definite; In western, with the background of low context communication, every individual is more equal and they address each other more generally and much simpler. This paper tries to explore the addressing terms both in Chinese and in English from the perspective of frame theory.
文摘As the process of globalization moves on,cross-cultural communication has been a part of people' s daily lives.It is quite important for people to know how to behave properly in many situations.The present study analyses the phenomena of pragmatic failure of address forms.The study may help enhance peoples' awareness on polite address in cross-cultural communi cation and improve their communicative competence.Foreign language teachers can get implications for their teaching methods,paying more attention on cultural teaching.In addition,the author hopes that equal cultural communication and multi-cultural concept can be achieved.
文摘In discourse analysis,different analyzer uses different ways to analyze discourse.This essay analyzes Gettysburg Address theoretically and practically based on Function Grammar proposed by M.A.K.Halliday.It aims to explore rather than literal meaning of the Address from different language structures by adopting some theories in Functional Grammar.
文摘Translational discourse requires at least three participants, therefore it is suggested to consider the universal model of the picture of the world, according to which it is much easier for a translator to combine the pictures of the world of an addressee and an author. An addressee is a mental image existing in the mind of an addresser during the creative process. Having defined its parameters, a translator has an opportunity to deliver the thought of an addresser to an addressee as accurately as possible and to select the means of expression that are clear to an addressee. The type of an addressee correlates with "the relation to the new".
文摘WS-Addressing用端点引用(EndpointReference,EPR)来进行Web服务寻址,EPR是动态生成的服务端点描述,它不能直接存储在统一描述、发现和集成(universal description discovery and integration,UDDI)的静态数据结构中。为实现UDDI和WS-Addressing共存的Web服务模型,提供了在UDDI中支持WS-Addressing的方法,并通过购物车的实现来说明应用程序应如何支持WS-Addressing。