数字电视外文翻译文献
电视系统传播在交流中的社会和文化意义-外文文献翻译2篇
外文原稿之一TV-Institutional Communication as a Social and CulturalPoint in the Communication(based on German and Kazakh Talk Shows)Author: D.M. Koishigulova, D.A. Karagoishiyeva, A.M. Dosanova, A.K.AbdirkenovaNationality: HollandSource:< TV-Institutional Communication as a Social and Cultural Point in the Communication>, printed by Elsevier in Holland on ScienceDirect, Procedia - Social and Behavioral Sciences, 2014, Vol.114Part of the thesis:TV programs are an important part of daily life of almost everyone. People watch TV to relax or get some new and relevant information. Comedy and drama TV series are more entertaining, while news and documentaries are of informational character. TV interviews and talk shows may be an intermediate form of these types of television programs, infotainment (Kazakova 2006). Talk shows are an essential part of modern colloquial culture, they have a social relevance, i.e. they have an impact on society.…MethodsThe basis of our methodological approach is conversional analysis that highlights the organized nature of the conversation and regulatory structures, which the speakers target at.…Since the object of our study are German and Kazakh television talk show, attention is drawn to one subclass of institutional interaction, namely, television-institutional interaction, which has its own characteristics that are not typical for either every day or for other institutional interaction.We are primarily interested in the fact that at the present time, when the contacts with foreign countries are becoming more intense and more frequent, and television is largely forms the presentation of the world, the urgent needfor a comprehensive study of linguistics is the linguistic discus within the institution of television, as well as samples of verbal and non-verbal behavior of the German and Kazakh society in a given communicative situation. It should be noted that the German talk show is also being actively studied from the point of view of journalism as the description analysis of the talk show structure as the most popular genre of German television.…Kazakhstani talk show appeared on television recently, and for that reason they could not get such popularity and widespread as in Germany. However, the development of the talk show genre on Kazakhstan TV has successfully launched and has a great future.Below, after the theoretical definitions analyzes will be presented, which were obtained in comparative studies of German and Kazakhstani talk shows. …we do not claim how to speak German and Kazakh correctly. We will not pay attention to the spelling mistakes or wrong accents in speech of communication participants. … From this point of view, the ro le of word, uttered on television, is extremely important in terms of the culture of speech in the broadest sense of the term. The fact that the person on the screen does not only report some information, but also performs, if we can express 'outwardly teaching' function, i.e. he is the image of acquisition of literary speech norms and demonstrates norms of literary language, including pronunciation. …Aim and tasksThe main objective of this work is the followings. First, it deals with the commonalities of television-institutional communication and compares its characteristics with the ordinary and other forms of institutional communication. Secondly, we are talking about conversational analysis of German and Kazakhstani talk shows to identify common traits and characteristics of a specific cultural character. Thirdly, attention is drawn to the role of the talk participants and definition of verbal and non-verbal categories. Fourth, the article discusses the thematic structure of German and Kazakh talk shows.Peculiarities of cultural nature of Kazakhstan and German talk showsNational and cultural peculiarities of behavior that has received increased attention became the object of observation and study of various scientific disciplines like linguistics, psycholinguistics, culturology, sociology,ethnology, cognitive science, intercultural communication, anthropology, etc. for the past two to three decades. This fact is not accidental because such studies can be conducted only on an interdisciplinary level, according to data of different human sciences. Researchers in different fields and areas of expertise of the person came to the conclusion that culture is reflected in people's minds, shapes their world view, and determines the specific behavior. Communicative behavior of people is part of their national culture, governed by national rules and traditions that have deep historical roots.…AnalysisNow let us consider the peculiarities of cultural character of Kazakhstani and German talk-show confessions. All speech acts produced by members of Kazakhstani and German talk show during discussing the topics were analyzed by us for the frequency of their expression (for each program).According to the results of our analysis more speech acts aimed at suppressing communication space interlocutor and urge him to certain speech acts take place in the argumentation style of German participants. So, for example, linguistic action "reproach" (11 times in the course of the German discussion, 1 time only in Kazakhstani discussion) encourage the other person to the speech act of "excuses", "protect oneself" or "explain", i.e. directly pressures on the party's image. Speech act "oppose"(to opinion, statement of interlocutor) is produced by the German participants 14 times, by Kazakhstani ones only 3 times. According to the classification of Polenz (1985), these speech acts belong to the class "directive", i.e. those speech acts that express the explicit requirements of the speaker to the listener: when "the speaker wants to be an action to be performed by his companion."In the Kazakhstani TV "debates" speech acts that are aimed at the interlocutors, but do not infringe or violate their communicative space are often produced. Speech acts "explain" (33 times in a Kazakhstani talk show, only 10 times in German talk show), and "inform" aim at providing the necessary knowledge and information to interlocutors. Speech act "ask"(29 times in aKazakhstani talk show, 19 in German talk show) is directed to obtaining the missing information from the communication partners. According to the classification Polenz (1985) "inform" and "explain" are "cognitive informing speech acts".Thus, the argumentative style of German participants is characterized by its rigidity and "aggressiveness" in relation to the interlocutors. There are also offensive language or nonverbal gestures:…K. Harprecht (1984, p. 46) notes that the Germans suppress not only the opposition, but also the possibility of its expression in comparing the German style of discussion with the U.S. one.In the German television debate several participants speak at the same time, they interrupt each other, as each of them strives to give his opinion on the subject of discussion, not yielding the right of speech to another participant, and in some cases even a presenter:…According to the results of the analysis we can conclude that the social distance between the German participants is much narrower than that of Kazakhstan.…The above discrepancy in speech acts, in argumentative style of the participants and the social distance present a picture of social relations in the German and Kazakhstani society: the participants are guided by different moral standards and follow cultural traditions and values established in their community.Statements both of German participants and the public are characterized by non-verbal gestures, commenting on the speech made by the action. Typically, these are torsion finger at one’s temple, facial expressions indicating disagreement with the panelist, very critical comments.In some cases, the non-verbal gestures are accompanied by the explicit verbal insults at the studio guest. If several participants are on the scene, a person asking a question points at the person the question addressed his index finger. At careful study of the video materials one can see that the German participants use non-verbal gesture to ask for the speech, and raisingthe index finger of their right hand (L. Weinrich 1992, p. 124) demonstrates that this gesture has culturally-specific character, as it plays the communicative situation within the institution of school/university. Each member of the German society knows that with the help of the non-verbal gestures in education one can signal the teacher about his eagerness to get the right for speech. In Kazakhstani cultural circle this gesture would correspond to a raised right (rarely left) hand, but this gesture is not used by Kazakhstani talk show participants. If the position or the response of one of the program participants is perceived negatively by the public, the public reaction is very aggressive in nature and is expressed both verbally and non-verbally. These are individual (offensive) remarks, stamping their feet, hum. It may be also noted that the public enjoys above named aggressive reaction to the participants. Facial expressions and general mood of the public indicate this fact. In this aspect it is necessary to point out the fact that in recent years, members of the German talk show, as well as the audience do not have higher education and adequate level of upbringing. These are the people who can afford offending expressions and gestures, even to the participants of an elderly age. Kazakhstani participants and the audience are mostly students and educated adults.In Kazakhstan the talk shows audience do not actively use non-verbal gestures, except applause or facial expression. Once again we would like to note that the fact that the dialogue is conducted in a TV studio has a huge impact on the natural communication of Kazakhstani participants, audience, and in some cases even a presenter.Despite the fact that Kazakhstan's talk show confessions, as well as in German, a television dialogue is based on personal experiences and the experiences of the participants in matters of love, which is one of the important features of this type of talk shows, intimate comments are omitted. The presenter’s direct question about the details of the sexual life cause great confusion in Kazakhstan program participants, as well as the viewers, while in the German talk show questions such as «Zwolf Jahre ohne Partner. Wie oft gehst du dich kalt duschen? <> Wir sind erwachsen. Wir haben ein gleiches Alter, deswegen bitte » (presenter’s question"Vera am Mittag ") (“Twentyyears without a man. How often do you have a cold shower? We are adults. We are the same age, that is why, do not be shy.”) are natural and habitual.…ConclusionIn conclusion, we note that Kazakhstan a balance between the international relations and traditional cultural values such as respect for the elderly, preserving clear social hierarchy, respect for other religions and cultural values, avoidance of inter-ethnic conflicts are maintained. Recent studies have shown that the Kazakhs avoid open conflicts, trying to compromise. During studying speech etiquette of Kazakhs, Baydurin (1991) indicates that the Kazakhs do not come into open conflict with someone, as they have the approval of paramount importance in the community, an expression of respect for the other person. In most cases, the Kazakhs, instead of openly expressing their disapproval when dealing with an opponent, resort to long pauses to reflect a more accurate answer, or try to change the subject. Perhaps because of this cultural feature of dialogue, Kazakhs often use phrases like "ұятболады, ыңғайсыз” or “елнедейді” (what a shame, it is inconvenient, what will people say?) in their speech.Ethnic forms of politeness of Kazakhs are deeply rooted, which related to the cultural traditions of the Kazakhs, named “Salt”. That tradition has a great influence on the behavior of people, their mentality and attitude to the social reality. The Kazakhs are very reserved in the manifestation of personal sensitivity in the implementation of the communicative act, exemplifying the many studies.中文译文之一电视系统传播在交流中的社会和文化意义(以德国和哈萨克斯坦的脱口秀节目为例)作者:D.M. Koishigulova, D.A. Karagoishiyeva, A.M. Dosanova, A.K.Abdirkenova国籍:荷兰出处:《电视系统传播在交流中的社会和文化意义(以德国和哈萨克的脱口秀节目为例)》,荷兰爱思唯尔多媒体出版集团出版,刊登于《社会能源与行为科学》,2014年第114期中文译文:电视节目已经成为每个人日常生活的重要组成部分。
电视信号——通信类外文文献翻译、中英文翻译
原文:Television Video SignalsAlthough over 50 years old , the standard television signal is still one of the most common way to transmit an image. Figure 8.3 shows how the television signal appears on an oscilloscope. This is called composite video, meaning that there are vertical and horizontal synchronization (sync) pulses mixed with the actual picture information.These pulses are used in the television receiver to synchronize the vertical and horizontal deflection circuits to match the video being displayed. Each second of standard video contains 30 complete images, commonly called frames , A video engineer would say that each frame contains 525 lines, the television jargon for what programmers call rows. This number is a little deceptive because only 480 to 486 of these lines contain video information; the remaining 39to 45 lines are reserved for sync pulses to keep the television’s circuits synchronized with the video signal.Standard television uses an interlaced format to reduce flicker in the displayed image. This means that all the odd lines of each frame are transmitted first, followed by the even lines. The group of odd lines is called the odd field, and the group of even lines is called the even field. Since each frame consists of two fields, the video signal transmits 60 fields per second. Each field starts with a complex series of vertical sync pulses lasting 1.3 milliseconds. This is followed by either the even or odd lines of video. Each line lasts for 63.5 microseconds, including a 10.2 microsecond horizontal sync pulse, separating one line from the next. Within each line, the analog voltage corresponds to the gray scale of the image, with brighter values being in the direction away from the sync pulses. This place the sync beyond the black range. In video jargon, the sync pulses are said to be blacker than black..The hardware used for analog-to-digital conversion of video signals is called a frame grabber. This is usually in the form of an electronics card that plugs into a computer, and connects to a camera through a coaxial cable. Upon command from software, the frame grabber waits for the beginning of the next frame, as indicated by the vertical sync pulses. During the following two fields,each line of video is sampled many times, typically 512,640 or 720 samples per line, at 8bits per sample. These samples are stored in memory as one row of the digital image.This way of acquiring a digital image results in an important difference between the vertical and horizontal directions. Each row in the digital image corresponds to one line in the video signal, and therefore to one row of wells in the CCD. Unfortunately,the columns are not so straightforward. In the CCD, each row contains between about 400 and 800 wells (columns), depending on the particular device used. When a row of wells is read from the CCD, the resulting line of video is filtered into a smooth analog signal, such as in Figure 8.3. In other words, the video signal does not depend on how many columns are present in the CCD. The resolution in the horizontal direction is limited by how rapidly the analog signal is allowed to change. This is usually set at 3.2 MHz for color television, resulting in a rise time of about 100 nanoseconds, i.e, about1/500th of the 53.2 microsecond video line.When the video signal is digitized in the frame grabber, it is converted back into columns, However, these columns in the digitized image have no relation to the columns in the CCD. The number of columns in the digital image depends solely on how many times the frame grabber samples each line of video. For example, a CCD might have 800 wells per row, while the digitized image might only have 512 pixels (i.e , columns) per row.The number of columns in the digitized image is also important for another reason. The standard television image has an aspect ratio of 4 to 3, i.e. , it is slightly wider than it is high. Motion pictures have the wider aspect ratio of 25 to 9. CCDs used for scientific applications often have an aspect ratio of 1 to 1, i.e , a perfect square. In any event, the aspect ratio of a CCD is fixed by the placement of the electrodes, and cannot be altered. However, the aspect ratio of the digitized image depends on the number of samples per line. This becomes a problem when the image is displayed, either on a video monitor or in a hardcopy. If the aspect ratio isn’t properly reproduced, the image looks squashed horizontally or vertically.The 525 line video signal described here is called NTSC (National Television Systems Committee), a standard defined way back in 1954. This is the system used in the United States and Japan. In Europe there are two similar standards called PAL (Phase Alternation by Line) and SECAM (Sequential Chrominance And Memory). The basic concepts are the same , just the numbers are different. Both PAL and SECAM operate with 25 interlaced frames per second, with 625 lines per frame. Just as with NTSC, some of these lines occur during the vertical sync, resulting in about 576 lines that carry picture information. Other more subtle differences relate to how color and sound are added to the signal.The most straightforward way of transmitting color television would be to have three separate analog signals, one for each of the three colors the human eye can detect: red, green and blue. Unfortunately, the historical development of television did not allow such a simple scheme. The color television signal was developed to allow existing blackand white television sets to remain in use without modification. This was done by retaining the same signal for brightness information , but adding a separate signal for color information. In video jargon, the brightness is called the luminance signal, while the color is the chrominance signal. The chrominance signal is contained on a 3.58 MHz carrier wave added to the black and white video signal. Sound is added in this same way, on a 4.5 MHz carrier wave. The television receiver separates these three signals, processes them individually, and recombines them in the final diplay.译文:电视信号尽管已经拥有50年的历史了,电视信号依然是常用的传递信息的途径之一。
动画设计电视广告论文中英文外文翻译文献
动画设计电视广告论文中英文外文翻译文献Copywriting for Visual MediaBefore XXX。
and film advertising were the primary meansof advertising。
Even today。
local ads can still be seen in some movie theaters before the start of the program。
The practice of selling time een programming for commercial messages has e a standard in the visual media XXX format for delivering shortvisual commercial messages very XXX.⑵Types of Ads and PSAsThere are us types of ads and public service announcements (PSAs) that XXX ads。
service ads。
and XXX a specific product。
while service ads promote a specific service。
nal ads。
on theother hand。
promote an entire company or industry。
PSAs。
on the other hand。
are mercial messages that aim to educate andinform the public on important issues such as health。
safety。
and social XXX.⑶The Power of Visual AdvertisingXXX。
The use of colors。
【精品文档】40全媒体时代中国电视媒体的转型中英文双语外文文献翻译成品
外文标题:On Transformation of China’s TV Media in Omn i-media Era 外文作者:Ning YAN, *, Ke SU文献出处:International Conference on Social Science,2016英文1293单词,7086字符,中文2189汉字。
此文档是外文翻译成品,无需调整复杂的格式哦!下载之后直接可用,方便快捷!价格不贵。
On Transformation of China’s TV Media in Omn i-media EraNing YAN1, *, Ke SU 2Keywords: Omni-media, Media convergence, Industry transformation.Abstract. The advert of omni-media era poses unprecedented challenges to traditional TV media. Transformation and integration become imperative for its susta inable development. The paper tries to discuss successful transformation of TV media in terms of thinking pattern change, program editing system, and Human Resource Integration: how to enhance internet awareness and reconstruct media-user relationship; how to establish the editing system of "one source, multiple channels, various forms", and how to update human resource structure, management system and integration mechanism. IntroductionOmni-media is the integral combination of communication technology and media product services. The interactive and individualized features of omni-media transmission are changing TV audience's role as passive recipients. TV media is entering the "internet +" age, in which "+" can be followed by any conventional media. So what can "internet + TV media" bring us? How do we redefine TV media and its relationship with the audience? These are questions facing current China's TV media transformation, to which we are trying to find the answers.Enhance Internet Awareness and Reconstruct Media-user Relationship Relationship between TV media and its audience is bearing the brunt of omni-media impact. Independence and options granted by internet-era new media are transforming the TV - audience relationship to a TV - users one. The entirety of the media, market, production, consumption and transmission, evolve around users. New media regards users' information as valuable resources. It collects information about users' reading habits and life styles before analyzing their needs and improving user-friendliness. Understanding of users' basic needs guarantees shared values, brand resonance and better individualized products.In the further reform of China's TV media, a significant standard of its successful transformation is the capability of self-renewal, which centers on user experience. Aware of the significance of integration with internet new media, some TV media enterprises have opened their own websites and micro-blogs. However, absence of "user-centric, open and sharing" concepts combined with lack of market, user and services awareness account for failure of the transformation to achieve fruitful results.How to center media convergence around users? First, we must adopt a new thinking mode: to make plans and carry them out, with internet in mind. New media is about equal communication and interactive transmission. Users are no longer the passive recipients of TV programs they used to be. Importance should be attached to user experience, so that various individual needs for information can be fulfilled. An analogy of cooking and dining may help here. The public used to consume whatever the TV media served, Now the TV media has to prepare what the public orders. It even has to anticipate their appetite and favorites to prepare in advance. For example, the personal list of news topics can be based on each individual user's reading habits. To expand its influence, TV media has to tap into and make the best of users' internet habits.Establish the Editing System of " One Source, Multiple Channels, Various Forms" With new technology, conventional TV media and new medias (internet and smart-phones are equipped to go out of their ways to engage in close interaction and cooperation with each other. Further integration of them and upgrade in management system maximize social influence and social profits. At present, flaws in TV media system are detrimental to its transformation. To promote integrated development of TV media and new medias, we have to observe their respective rules. Various routes lead to the same destination: convergence or omni-media: one source processed and conveyed with multiple medias.The concept of omni-media has emerged after notions of new media, trans-media and multi-media. In a narrow sense, omni-media is the integration of conventional media with information-age media using new technology to upgrade their production, channels, transmission, marketing and management. In a broad sense, it is integrated utilization of media forms in brand-new ways of information production and transmission.Instead of partial and biased dependence on any single one of them, omni-media is the balanced and harmonious integration of content, channels, technology, management and production. To that end, editing process needs to be reconstructed and updated to establish a unified collecting and editing multimedia platform and to achieve the objective of "one source, multiple channels, various forms". Many TV media enterprises are making addition by setting up relevant new media departments. Compared with transformation, making addition is more convenient and involves less risk, for it does not change the status quo and vested interests, while increasing employment. However, simply adding an apartment does not give substantial boost to the convergence or coordination among different medias. We should go beyond the experimental phase of addition and go for transformation to real convergence by establishing omni-mediaplatforms.Omni-media presentations of the same information source can be various and vivid. For instance, a 5-minute video clip "How are Leads Made" went viral online, which presented in the form of cartoon how a politician in China climbs up the ladder to become a leader. Its success proves how the comprehensive application of scripts, pictures, graphs, cartoons, videos and audios can fulfill varied user experience with its dynamic and multidimensional demonstration.In light of Omni-Media Concept, update Human Resource Structure, Management System and Integration MechanismAnother breakthrough point in pushing TV media convergence is reform of talent system. Talent is a catalyst to accelerate media convergence and serves as a bridge between theory and technology. All relevant personnel are integrated into one department on the omni-media digital platform, so that the barriers between newspapers, radio, television and internet are broken by the convergence on human resource level. To adjust to the transformation, TV media needs all-around media talents, who are knowledgeable in arts, science, economy, finance, and management, as well as skillful in technology.An army of specialized and versatile talents not just helps media convergence, but effectively reduces the cost. Converting the same source into products for different medias saves a huge amount of labor, resources and funds, thus big profits gained. According to American psychologist Frederick Irving Herzberg’s Motivator-Hygiene theory, motivational factors can be responsible for increasing motivation. These factors could involve job recognition, potential for promotion or even the work in itself. On the other hand, lack of hygiene factors can lower motivation. These factors could be anything from clean toilets and comfortable chairs, to a reasonable level of pay and job security. To build a competent omni-media team integrating journalists, screenwriters and directors, we have to supplement training with new recruitment, try to motivate and guarantee talents' development, and create favorable environment for them to give full play to their potentials.Establishment of medical care system is a reflection of humanized management to extend the enterprise's concern from its personnel's performance in work to their mental and psychological well-being. Harmonious environment in media enterprises help tap into their most precious resources—talents.References[1] Hu Yong, Fan Haiyan, Internet: the King Who Rules, Hainan Publishing House, Haikou,1997.[2] Mark Levy, Journalism and Communication: Towards Cyberspace Era, Journalism&Communication, No. 1 (1997).[3] Wilbur Schramm, William E. Porter, (translated by Li Qi), Men, Women, Messages,and Media: Understanding Human Communication, Xin Hua Press, Beijin, 1984.[4] Cheng Zhongliang, Change of Journalist Profession in Omni-media Era, Youth Journalist, No. 18 (2010).全媒体时代中国电视媒体的转型Ning YAN1, *, Ke SU 2关键词:全媒体,媒体融合,产业转型摘要:全媒体时代背景下的广告业对传统电视媒体提出了前所未有的挑战。
数字信号 外文翻译 外文文献 英文文献 数字信号处理器简介
Introduction to Digital Signal ProcessingSignal and digital signal processing as a branch of information processing, has infiltrated into the scientific research, technological development, industrial production, national defense and national economy in various fields has achieved fruitful results. Of the signal in time domain and transform domain analysis of the characteristics, processing, enable us to the nature of the signal features and a more clear awareness and understanding of the signals need to get our form of information of use to improve the extent, then in a broader and higher level the access to information. DSP chip, also known as digital signal processors, is particularly suitable for digital signal processing microprocessor. The emergence and development of DSP chips, digital signal processing technology for the improvement of many of the new system, the new algorithm came into being, the application field is expanding. Currently, DSP chips have been widely used in communications, automation, aerospace, military, medical and other fields.Digital signal processing is that the signal to digital form and deal with the theory and technology. Digital signal processing and analog signal processing is a subset of signal processing. The purpose of digital signal processing is a continuous real-world analog signals to measure or filter. Therefore needed before carrying out digital signal processing the signal from the analog domain into the digital domain, this is usually achieved through the ADC. The digital signal processing often have to transform the output to the analog domain, which is achieved through the DAC. The core digital signal processing algorithm is the discrete Fourier transform (DFT), is the DFT to the signal in the digital domain and frequency domain are realized discrete, general-purpose computer which can handle discrete signal. Er Shi digital signal processing theory to practical from the fast Fourier transform (FFT), FFT has significantly reduced the DFT computation to make real-time digital signal processing as possible, greatly promote the development of the discipline.The advantages of digital signal processing system as follows: 1. Good flexibility: when the processing method and parameters change, the processing system simply by changing the software design to meet the appropriate changes. 2. Precision: Signal processing systems can be A / D transformation of the median, the processor word length and the appropriate algorithm to meet the accuracy requirements. 3. Reliability: processing system affected by environmental temperature, humidity, noise and electromagnetic interference caused by the less affected. 4. Can be a large-scale integration: With the technological development of semiconductor integrated circuits, digital circuits can be used for very high integration, small size, low power consumption, and good product consistency.1.The development of DSPThe late 70s early 80s, AMI's S2811 chip, Intel's 2902 chip, the birth marks the beginning of DSP chips. With the rapid development of semiconductor integrated circuits, high-speed real-time digital signal processing and digital signal processing applications demands the continuous extension of the field, in the 80 years since the beginning of ten years, DSP made epoch-making development. View from the operation speed, MAC (multiply and accumulate) time of 400 nsfrom 80 down to 40 ns below, data-processing capacity several times. MIPS (million instructions per second) from the early 80's 5MIPS to the current 40 MIPS or more. Key components within the DSP chip multiplier accounts from the early 80s about 40% of mold Area dropped to less than 5%, on-chip RAM for more than an order of magnitude increase. View from the manufacturing process, the early 80s with 4μm of NMOS t echnology and is now using sub-micron CMOS technology, DSP chips, pin numbers from the early 80s up to 64 to more than 200 now, so the increase in the number of chip pins increase the flexibility of application, so that all external memory expansion and more convenient communication between processors. And earlier than DSP chips, DSP chips now have two floating point and fixed-point data format, floating-point DSP chips for floating-point operations, so computing precision greatly enhanced. DSP chip cost, size, voltage, weight and power consumption earlier DSP chip with a large degree of decline. In the DSP development system, software and hardware development tools continue to improve. At present some of the chip with the corresponding integrated development environment, which supports breakpoint settings and program memory, data memory and DMA access and the program running and tracking a single department, and can use high-level language programming, some manufacturers and some software development business application software for the DSP to prepare a common subroutine library and various algorithms and various interface program, which makes application development easier, shorten development time, thus increasing the efficiency of General characteristics of DSP chips(1) In a cycle to complete a multiplication and an accumulation.(2)Harvard architecture, program and data space separated, you can also access instructions and data.(3) Chip with fast RAM, typically by an independent data bus simultaneously in two visits.(4) A low cost or no cost recycling and jump hardware support.(5) Fast interrupt handling, and hardware I / O support.(6) With single-cycle operation in a number of hardware address generator.(7) Can perform multiple operations in parallel.(8) To support pipeline operations, fetch, decode, and execution operations may overlap.2.DSP Applications in Communication SystemDSP technology has been widely used in communications. Mainly in the following areas.(1)Software Defined RadioSoftware radio technology and computer technology is constantly touch merged into the 3rd generation mobile communication systems provide a good user interface. DSP hardware technology and its algorithm is the key to realization of software radio. Software radio system flexibility, openness and compatibility features of the signal processor is mainly centered through a common hardware platform and software to achieve. It is mainly to complete the internal data processing station, modem and codec and so on. As the internal data flow and a large radio filtering, frequency and other processing operations more often, to high-speed, real-time, parallel digital signal processor module or ASIC to meet the demand. To complete such an arduous task, to increase the processing speed required hardware, chip capacity expansion and requested algorithmfor optimization and improvement of the processor. The two aspects of the continuous improvement requirements will be the development of digital signal processing technology unremitting power. The only way to achieve high-speed internal software radio operation and multiple functions of the flexible switching and control. Software implementations are generally two types of devices that use DSP to implement and field-programmable gate array (FPGA) to implement.(2)Speech CodingThe purpose of voice data compression is that in the transmission rate as low as possible gain high-quality audio performance, that is, that narrow bandwidth of voice signals Ke Yi in the channel transmission, the voice of quality and Xiajiangdebu more Huo dropped as much as possible . Speech coding system for the early use of the waveform coding method, also called waveform coding. Essentially follows the Nyquist sampling theorem, strong adaptability, good quality synthetic speech, but the high rate coding, coding efficiency is very low. The parameter coding is different from the efficient encoding of waveform coding method, which is based on the mechanism in speech production, mainly on the extraction characteristics of speech signal encoding parameters, you can achieve very low encoding rate. But only to the effect of synthesized speech, voice quality than waveform coding.Over the past decade, speech coding technology has made breakthrough progress. ITU, one after another through a series of low bit rate speech coding standard telephone band. By the parameter coding and waveform coding the hybrid coding method that is of a synthetic coding, can get better sound quality at the same time reduce the coding rate, the most representative is the linear predictive coding (LPG) and Code Excited Linear Prediction Coding (CELP). This encoding can be 4-16kbit / s of the low coding rate on high-quality reconstructed speech, but the complexity of the algorithm, the computing speed of the processor demanding. On speech processing, the higher the compression ratio, the more complex encoding algorithm, real-time compression can not use the logic circuit, it will not use the bulky, slow, high cost of Microcomputer. The DSP is a suitable choice, the web conferencing, voice communications, surveillance systems are important areas of components. The use of DSP voice compression algorithm not only provides a broad application prospects, and the system design simple, reliability is also greatly improved.(3)GPS SystemGPS was developed by the United States to receive navigation satellite signals based on non-autonomous navigation system. Is widely used in various military and economic fields. With GPS technology in various fields to promote and popularize the application of the receiver's small size, intelligence and algorithms to meet user needs studies is necessary.There are two global positioning system components: the satellite constellation, ground control / monitoring network and user receivers. In GPS applications, GPS receivers often require reprocessing the data collected, or use GPS receivers to provide some information for the development of an industry. DSP small size, high speed, low power, high reliability characteristics. Suited to the complexity of real-time GPS signal processing. OEM version of its composition with the GPS information systems, not only satisfy the real-time GPS signal processing and highcomplexity, and because of the powerful DSP processing capability, the system can be further extensions.Typical Application: (1) General signal processing: convolution, correlation, FFT, Hilbert transform, adaptive filtering, spectrum analysis, waveform generation and so on. (2) Communications: High-speed modulator / demodulator, encoder / decoder, adaptive equalizer, simulation, honeycomb network of mobile phones, echo / noise cancellation, fax, telephone conference, spread spectrum communications, data encryption and compression . (3) voice signal processing: speech recognition, speech synthesis, text changed voice, speech coding vector. (4) graphics image signal processing: two, three-dimensional graphics transformation and processing, robot vision, digital map, image enhancement and recognition, image compression and transmission, animation, desktop publishing systems. (5) control: robot control, engine control, automatic driving, voice and so on. (6) Instruments: function occurs, data acquisition, aerospace wind tunnel testing. (7) Consumer Electronics: Digital TV, digital voice synthesis, toys and games, digital answering machine.To DSP chip as the core structure of the digital signal processing system, data acquisition, transmission, storage and high-speed real-time processing as one can fully realize the advantages of digital signal processing system, can satisfy the precision equipment in the field of manned space flight , reliability, channel bandwidth, power consumption, voltage and weight requirements. Currently, DSP chips are the high-performance, high integration and low cost of direction, the various kinds of common and dedicated DSP chips has introduced new, applied technology and development tools continues to improve. Such as real-time digital signal processing applications - especially in the field of manned space applications in a wider space. We have reason to believe, DSP chips will further the development and application of signal processing on the manned space far-reaching impact.数字信号处理器简介数字信号处理作为信号和信息处理的一个分支学科,已渗透到科学研究、技术开发、工业生产、国防和国民经济的各个领域,取得了丰硕的成果。
融媒体、多屏电视服务和三网融合外文文献翻译
融媒体、多屏电视服务和三网融合外文翻译英文Responding to media convergence: Regulating multi-screen televisionservices in ThailandTrisha Lin,Chanansara OranopAbstractThis study examines how Thailand’s convergence regulator, the National Broadcasting and Telecommunications Commission (NBTC), regulates digital television’s transition and new audiovisual services. In addition to document analysis, this study interviewed stakeholders (e.g. NBTC policymakers, broadcaster and cable TV operators). The socio-technical analyses show that the NBTC prioritized digital television transition and imposed substantive government/policy support. Comparatively, Internet Protocol television (IPTV) and mobile TV which are driven by the industry/market subsystem have sluggish regulatory advancements. The interview results show that the NBTC is likely to regulate multi-screen TV services’ contents and platforms separately as a result of complexity. Hence, this study recommends a platform-neutral approach to regulate audiovisual media categorized by socio-cultural impact and content production/aggregation model. It suggests that Thailand’s TV-like services which can reach a mass market and produce/aggregate contents/services via a gatekeeping mechanism shouldbe subject to strict content regulations and licensing schemes. However, light-touch regulations in content and licensing are suitable for governing emerging TV-like services which utilize a participatory content model with less socio-cultural impact. Finally, net neutrality is recommended in facilitating cross-platform content innovations and distribution.Keywords:Multi-screen TV,Convergence,Digital TV,IPTV,Mobile TV,Cross-platform video consumption,Platform neutrality,Net neutrality1. IntroductionDue to rapid technological advancements, television has transformed into various innovative and individualized audiovisual services including Internet Protocol television (IPTV), mobile TV, over-the-top TV, etc. As a result of improved viewing experiences and wireless connectivity, smartphones and tablets have become popular screens for people to watch videos on the move. In 2009, the emergence of three-screen TV developed integrated solutions for video viewing (Krazit, 2009, Noam, 2008). Later, multi-screen TV services which allow users to consume videos on various screens (i.e., smartphones, games consoles, tablets, PCs, and TVs) introduced new ways to distribute, consume, share, and create content in countries with advanced information and communications technology (ICT) (Simon, 2011). On the one hand, cross-platform video consumption leads to continued significance of TV media nowadays.According to Ericsson Consumer Lab report (2014), TV remains the most used screen media for video consumption, yet its importance decreases due to prevalent use of portable devices. Avid multi-screen TV users are typically young adults (Pew Research Centre, 2012). On the other hand, multi-screen TV has brought complex convergence issues and regulatory challenges in existing socio-technical systems of traditional TV industries (Lin, 2011). In response to rapid audiovisual media convergence, different countries develop different regulations to foster innovations and economic growth and protect socio-cultural values like cultural diversity and minority.In Thailand, TV is most important media, accounting for 60% of advertising revenues, based on 2012 Nielsen media research (Yoonaidharma, 2012). However, it is the last ASEAN country to introduce digital TV (DTV). In December 2010, after its Parliament passed the Organization to Assign Radio Frequency and to Regulate Broadcasting and Telecommunication Services Act (henceforth, the NBTC Act), the long-term monopoly over Thailand’s telecommunication and broadcasting industries came to an end (Thaveechaiyagarn, 2012). Its first independent convergence regulator, the National Broadcasting and Telecommunications Commission (NBTC), was formed in late 2011, which aims to take concrete actions and make significant changes to ensure the growth of the two industries. The NBTC’s DTV master plan(2012–2016) widened business opportunities for broadcasters, content providers, telcos, device manufacturers, and advertising agencies (Leesa-nguansuk, 2012). After completing the spectrum auction of commercial DTV, a 10-year migration plan from analog to digital TV started in January 2015 with a goal of 80% population adoption by 2020 (Tortermvasana, 2012). Triple-play networks have grown steadily to provide IPTV services for Thai audiences despite the low broadband penetration (IPTV News, 2012). The widespread use of mobile phones in Thailand presents business opportunities for mobile TV services. These show that Thailand has great potential for multi-screen TV development.The multi-directional trajectory of emerging multi-screen TV is shaped by various actors in the socio-technical subsystems. Thailand’s TV industry, its most popular form of mass media, has long been controlled by the government for propaganda purposes. After the NBTC Act, how did advancing digital multi-screen technologies and changing media consumption styles reform audiovisual media environment and shape the convergence regulations in Thailand? Taking a socio-technical approach, this study examines the regulatory development of digital audiovisual media after the NBTC Act, and investigates how key stakeholders in the policy/government and industry/market subsystems shape the trajectory of emerging multi-screen television services. This study not only conducted document analysis of abundant second-handdata such as NBTC reports, policies/regulations documents, media market analyses, and news articles, but also interviewed key stakeholders involved in convergence including policymakers and regulators (e.g., NBTC’s vice chairman and committee of digital switchover), and broadcasters and cable TV operators (e.g., top management in MCOT and True Corporation Public Company) in June 2012, March 2013, and December 2014. This study used the socio-technical framework to analyze data and applied a platform-neutral multi-screen TV regulatory scheme (Lin, 2013) to make recommendations for Thailand’s case. The findi ngs contribute to the latest understanding of Thailand’s convergence and regulatory challenges in emerging multi-screen television services and make platform-neutrality recommendations to regulate content and licensing differently on four types of audiovisual media.2. Multi-screen television convergence issuesThe rapid adoption of smartphones and tablets as second screens has transformed traditional television viewing (Tribbey, 2014). In recent years, connected TV allows users to access Internet content such as web videos. Although many smart TVs are not comparable to smartphones in terms of usability, new TV devices and services such as Apple TV and Google TV bring Internet content and services to the living room and challenge conventional passive TV services directly. With the availability of new devices, the consumption of audiovisual content across platforms isgrowing rapidly, which shapes conventional TV businesses drastically and turns consumers’ viewing behaviors towards time-shifted and over-the-top services (Nielsen, 2014). Consumers select live and time-shifted audiovisual services and create personalized viewing schedules to fit their flexible digital lifestyle. It is crucial for industry players to address the evolving consumer expectations with multi-screen TV services.Regardless of platforms, TV is ultimately content-driven. Traditional TV channels, on-demand videos, and a huge amount of user-generated content give consumers a variety of viewing options and personalized experiences. As video delivery modes increase, audiovisual content producers (e.g., broadcasters, cable TV, and IPTV) have diverse ways to redistribute their programming to maximize long-tail revenues with increasing concerns over digital copyright protection. To engage audiences, TV operators harness social media to create a backchannel which facilitates social expression and co-viewing experiences (Shepatin, 2012).One key technological issue in multi-screen TV industry is providing integration solutions with system interoperability capabilities so that audiences can watch varieties of videos via different screens seamlessly. Also, it is essential to develop platform independent devices for different systems and networks (O’Neill, 2009). The 2012 Future of TV Surveyreported that over half of the TV operators regarded cloud computing as a crucial technology in TV innovations (Informa, 2012). Creating ubiquitous audiovisual contents over the cloud which can be distributed and accessed swiftly cross platforms is also the key to successful multi-screen TV services (Davidovitz, 2010).3. Multi-screen television regulatory issues3.1. Convergence policyIn the past, broadcast and telecommunications were clearly separate markets based on different technologies with distinct governance and regulatory frameworks. Through technological advances, this well-organized and segregated situation transformed into one of convergence, allowing for similar sets of services to be offered over various platforms, and for bundling distinct services onto one platform (triple and quadruple play) (OPTA, 2008). To face the convergence challenges, different countries set up different policies.Since digitalization blurs media distinctions, causes industry crossovers, and creates cross-platform content distribution, a differentiated regime governing European countries’ broadcasting and telecommunication industries is hard to sustain (Storsul and Syvertsen, 2007). In 1997, the EU Green Paper on Convergence (COM/1997/0623 final) was published, claiming that substantial changes in existing regulations were necessary to adapt to convergence (EuropeanCommission, 1997). It first emphasized regulatory barriers and interventions must be reduced and closely targeted in order to encourage investments in new media. Secondly, due to increasing horizontal regulation, common regulatory frameworks would replace the existing sector-specific regulations for broadcasting, telecommunications, and information technology. Finally, self-regulation played an important role in issues concerned with the protection of minors and public order.Some regulatory reform issues were continually addressed in the 2013 EU Green paper (COM/2013/0231 final) which discusses the convergence transformation of audiovisual media in the European market caused by the merger of traditional broadcast services and the Internet (European Commission, 2013). Its goals include turning media convergence into economic growth and business innovations as well as protecting values like media pluralism, cultural diversity, and consumer rights. It examines the existing technology-neutral Audiovisual Media Services Directive (A VMSD) which regulates media service providers with content editorial responsibilities regardless of platforms. The non-linear services are also subject to the E-Commerce Directive and data protection legislation. It also developed several policy strands for media literacy.Self-regulation plays a visible role in US responses to convergence. Self- and co-regulation become viable alternatives to traditional TV andtelecommunication regulations because the fast changes and difficulties in control and enforcement require flexible instruments which are better grounded in the market and more credible and less burdensome to stakeholders (OPTA, 2008). However, it is vulnerable to collusion and corruption which requires government support, constraint, or monitoring. In response to global competition and Internet complexity, the EU Commission also developed a code of good practice for self- and co-regulation exercises in 2012 (European Commission, 2013).To cope with convergence challenges, China’s then Premier Wen Jiabao announced in January 2010 the acceleration of its three-network integration (i.e., telecommunication, broadcasting, and the Internet), which initiated tremendous advancements in Chinese media convergence (Feng and Jiang, 2013). Meanwhile, the State Council set objectives to push for the full popularization of China’s triple-play convergence system by 2015 after a two-year experimental phase (2010–2012). The national blueprint of the three-network integration propels the development of multi-screen audiovisual services in China like DTV and mobile broadcasting TV. Although China launched its triple-play convergence much later than its western counterparts, its strong government support facilitated the fast advancement of innovative audiovisual services and thus developed enormous markets (e.g., China has the largest mobile TV in the world) (Lin, 2012).3.2. Multi-screen TV policyThe key regulatory challenge for multi-screen audiovisual services is to decide whether to apply existing, amended, or new policies to regulate cross-platform TV-like services, which is highly associated with policymakers’ perceptions of these innovations (Lin, 2013). Some countries use extended TV regulations such as licensing schemes and content regulations to govern new audiovisual services on other platforms in order to maintain existing interests (Noam, 2008). However, the traditional or amended broadcast model hardly covers complex issues of multi-screen TV that involves multiple platforms and cross-border content.Because the layer approach which treats audiovisual services on different platforms differently suffers from technocratic complexity, Noam (2008) proposed a two-tier framework to separately regulate content (i.e., message) and conduit (i.e., medium) of three-screen TV services. The current global trend is to move towards a common infrastructure regulation to govern various video delivery networks (e.g., broadcasting, fixed and wireless telecommunications) (Henten et al., n.d.). Lin (2011) suggested videos distributed via different mobile networks (i.e., mobile cellular technologies and mobile broadcasting frequency) should be regulated based on content nature (e.g., broadcasting/mass market and on-demand/niche). Additionally, Flew,2012, ALRC, 2012 recommended a platform-neutral approach to regulate media convergence, which focuses on regulating content classifications rather than means of delivery. The advantage of platform neutrality is to maintain an adaptive regulatory framework to cope with fast-changing technologies and global competition. Bauer and DeMaagd (2008) also emphasized the significance of net neutrality to foster business and innovation of multi-screen audiovisual media. They argued that without net neutrality, content providers would be forced to negotiate with different platform operators, which would generate higher transaction costs and cause less innovation incentives. Hence, applying net neutrality is useful in developing multi-screen TV businesses as it can reduce complicated content-platform negotiations and facilitate innovations. Moreover, to manage convergence complexity and foster new TV-like services, light-touch licensing and content regulations are recommended to regulate these next-generation media systems and innovative audiovisual services (Noam, 2008, Lin, 2011, Lin, 2012, Lin, 2013).To cope with complex convergence of audiovisual media, Lin’s (2013) multi-screen TV regulatory scheme which takes a platform-neutral approach to classify complex cross-platform videos recommended not differentiating policy treatments with respect to delivery and viewing modes. It proposes to categorize varieties of audiovisual services into four types based on two criteria: (1) the socio-cultural impact (i.e., ‘broadcastand mass media’ and ‘VOD and niche market’); and (2) the content production/aggregation model (i.e., ‘gatekeeping mechanism’ and ‘participatory mechanism’). Table 1 shows that each type of services is subject to different license and content regulations. To foster nascent audiovisual media and increase their competitive advantages, the principle of this multi-screen TV regulatory scheme is to apply light-touch licensing schemes and content regulations to innovative TV-like services which usually have less socio-cultural impact (i.e., ‘VOD and niche market’) and less control in content production/aggregation (i.e., ‘participatory mechanism’). That is, Type IV providers (e.g., Internet TV and mobile cellular videos) which provide on-demand videos to niche markets and produce/aggregate content through a participatory mechanism should be regulated under self- or co-regulation of content and Internet-like loose licensing schemes. In contrast, Type I operators (e.g., broadcasters) that create or aggregate audiovisual content via strict gatekeeping transmit scheduled broadcasting content to mass markets. They are subject to strict broadcasting TV content codes and individual licensing schemes. Type II operators (e.g., cable TV and wall-gardened IPTV) should be regulated by on-demand TV content code (and/or subscription TV content code) with individual licensing because they provide VODs selected through a gatekeeping mechanism. Finally, Type III operators (e.g., mobilebroadcasting TV) broadcast videos with some participatory contents and services. These new TV-like services tend to have less socio-cultural impact than Type I and Type II, due to their smaller viewership. Hence, at their early adopter stage, they are subject to subscription TV content regulations with less strict licensing schemes. As this multi-screen TV regulatory scheme aims to foster the growth of audiovisual media’s content creation, aggregation, and distribution (Lin, 2013), it is later applied to analyze Thailand’s various cross-platform audiovisual services after the NBTC Act.中文应对融媒体:在泰国规范多屏电视服务摘要本研究主要探索了泰国的媒体融合监管机构国家广播电视委员会(NBTC)如何监管数字电视的过渡和新的视听服务。
【机械类文献翻译】电视信号
原文:Television Video SignalsAlthough over50years old,the standard television signal is still one of the most common way to transmit an image.Figure8.3shows how the television signal appears on an oscilloscope.This is called composite video,meaning that there are vertical and horizontal synchronization(sync)pulses mixed with the actual picture information.These pulses are used in the television receiver to synchronize the vertical and horizontal deflection circuits to match the video being displayed.Each second of standard video contains30complete images,commonly called frames,A video engineer would say that each frame contains525lines,the television jargon for what programmers call rows.This number is a little deceptive because only480to486of these lines contain video information;the remaining39to45lines are reserved for sync pulses to keep the television’s circuits synchronized with the video signal.Standard television uses an interlaced format to reduce flicker in the displayed image.This means that all the odd lines of each frame are transmitted first,followed by the even lines.The group of odd lines is called the odd field,and the group of even lines is called the even field.Since each frame consists of two fields,the video signal transmits60fields per second.Each field starts with a complex series of vertical sync pulses lasting1.3milliseconds.This is followed by either the even or odd lines of video. Each line lasts for63.5microseconds,including a10.2microsecond horizontal sync pulse,separating one line from the next.Within each line,the analog voltage corresponds to the gray scale of the image,with brighter values being in the direction away from the sync pulses.This place the sync beyond the black range.In video jargon, the sync pulses are said to be blacker than black..The hardware used for analog-to-digital conversion of video signals is called a frame grabber.This is usually in the form of an electronics card that plugs into a computer,and connects to a camera through a coaxial cable.Upon command from software,the frame grabber waits for the beginning of the next frame,as indicated by the vertical sync pulses.During the following two fields,each line of video is sampled many times,typically512,640or720samples per line,at8bits per sample.These samples are stored in memory as one row of the digital image.This way of acquiring a digital image results in an important difference between the vertical and horizontal directions.Each row in the digital image corresponds to one line in the video signal,and therefore to one row of wells in the CCD.Unfortunately,the columns are not so straightforward.In the CCD,each row contains between about 400and800wells(columns),depending on the particular device used.When a row of wells is read from the CCD,the resulting line of video is filtered into a smooth analog signal,such as in Figure8.3.In other words,the video signal does not depend on how many columns are present in the CCD.The resolution in the horizontal direction is limited by how rapidly the analog signal is allowed to change.This is usually set at3.2 MHz for color television,resulting in a rise time of about100nanoseconds,i.e,about1/500th of the53.2microsecond video line.When the video signal is digitized in the frame grabber,it is converted back into columns,However,these columns in the digitized image have no relation to the columns in the CCD.The number of columns in the digital image depends solely on how many times the frame grabber samples each line of video.For example,a CCD might have800wells per row,while the digitized image might only have512pixels (i.e,columns)per row.The number of columns in the digitized image is also important for another reason. The standard television image has an aspect ratio of4to3,i.e.,it is slightly wider than it is high.Motion pictures have the wider aspect ratio Ds used for scientific applications often have an aspect ratio of1to1,i.e,a perfect square.In any event,the aspect ratio of a CCD is fixed by the placement of the electrodes,and cannot be altered.However,the aspect ratio of the digitized image depends on the number of samples per line.This becomes a problem when the image is displayed,either on a video monitor or in a hardcopy.If the aspect ratio isn’t properly reproduced,the image looks squashed horizontally or vertically.The525line video signal described here is called NTSC(National Television Systems Committee),a standard defined way back in1954.This is the system used in the United States and Japan.In Europe there are two similar standards called PAL (Phase Alternation by Line)and SECAM(Sequential Chrominance And Memory).The basic concepts are the same,just the numbers are different.Both PAL and SECAM operate with25interlaced frames per second,with625lines per frame.Just as with NTSC,some of these lines occur during the vertical sync,resulting in about576lines that carry picture information.Other more subtle differences relate to how color and sound are added to the signal.The most straightforward way of transmitting color television would be to have three separate analog signals,one for each of the three colors the human eye can detect:red, green and blue.Unfortunately,the historical development of television did not allow such a simple scheme.The color television signal was developed to allow existing blackand white television sets to remain in use without modification.This was done by retaining the same signal for brightness information,but adding a separate signal for color information.In video jargon,the brightness is called the luminance signal,while the color is the chrominance signal.The chrominance signal is contained on a3.58MHz carrier wave added to the black and white video signal.Sound is added in this same way, on a4.5MHz carrier wave.The television receiver separates these three signals, processes them individually,and recombines them in the final diplay.译文:电视信号尽管已经拥有50年的历史了,电视信号依然是常用的传递信息的途径之一。
外文文献--翻译--led显示屏
外文资料原文Large screen display system's researchLed developmentAlong with computer technology’s high speed development, LED (Light Emitting Diode) the screen display system takes after the television, the broadcast,the newspaper,the magazine “the fifth big media” marches into the social life fast each aspect。
Its collection microelectronic technology, the computer technology,the information processing and management technology in a body,may the information through the writing,the design, the animation and the video frequency four forms demonstrates。
With media and so on bank of television monitors,magnetism vane compares,the LED large screen display system has the design to be artistic,the color is sharp; The design,the color change are rich,are fast;The low power loss,the long life, the use cost low, work stably reliable and so on characteristics。
外文翻译---电视信号
外文资料及译文原文:Television Video SignalsAlthough over 50 years old , the standard television signal is still one of the most common way to transmit an image. Figure 8.3 shows how the television signal appears on an oscilloscope. This is called composite video, meaning that there are vertical and horizontal synchronization (sync) pulses mixed with the actual picture information.These pulses are used in the television receiver to synchronize the vertical and horizontal deflection circuits to match the video being displayed. Each second of standard video contains 30 complete images, commonly called frames , A video engineer would say that each frame contains 525 lines, the television jargon for what programmers call rows. This number is a little deceptive because only 480 to 486 of these lines contain video information; the remaining 39to 45 lines are reserved for sync pulses to keep the television’s circuits synchronized with the video signal.Standard television uses an interlaced format to reduce flicker in the displayed image. This means that all the odd lines of each frame are transmitted first, followed by the even lines. The group of odd lines is called the odd field, and the group of even lines is called the even field. Since each frame consists of two fields, the video signal transmits 60fields per second. Each field starts with a complex series of vertical sync pulses lasting 1.3 milliseconds. This is followed by either the even or odd lines of video. Each line lasts for 63.5 microseconds, including a 10.2 microsecond horizontal sync pulse, separating one line from the next. Within each line, the analog voltage corresponds to the gray scale of the image, with brighter values being in the direction away from the sync pulses. This place the sync beyond the black range. In video jargon, the sync pulses are said to be blacker than black..The hardware used for analog-to-digital conversion of video signals is called a frame grabber. This is usually in the form of an electronics card that plugs into a computer, and connects to a camera through a coaxial cable. Upon command from software, the frame grabber waits for the beginning of the next frame, as indicated by the vertical sync pulses. During the following two fields,each line of video is sampled many times, typically 512,640 or 720 samples per line, at 8bits per sample. These samples are stored in memory as one row of the digital image.This way of acquiring a digital image results in an important difference between the vertical and horizontal directions. Each row in the digital image corresponds to one line in the video signal, and therefore to one row of wells in the CCD. Unfortunately, the columns are not so straightforward. In the CCD, each row contains between about 400 and 800 wells (columns), depending on the particular device used. When arow of wells is read from the CCD, the resulting line of video is filtered into a smooth analog signal, such as in Figure 8.3. In other words, the video signal does not depend on how many columns are present in the CCD. The resolution in the horizontal direction is limited by how rapidly the analog signal is allowed to change. This is usually set at 3.2 MHz for color television, resulting in a rise time of about 100 nanoseconds, i.e, about 1/500th of the 53.2 microsecond video line.When the video signal is digitized in the frame grabber, it is converted back into columns, However, these columns in the digitized image have no relation to the columns in the CCD. The number of columns in the digital image depends solely on how many times the frame grabber samples each line of video. For example, a CCD might have 800 wells per row, while the digitized image might only have 512 pixels (i.e , columns) per row.The number of columns in the digitized image is also important for another reason. The standard television image has an aspect ratio of 4 to 3, i.e. , it is slightly wider than it is high. Motion pictures have the wider aspect ratio of 25 to 9. CCDs used for scientific applications often have an aspect ratio of 1 to 1, i.e , a perfect square. In any event, the aspect ratio of a CCD is fixed by the placement of the electrodes, and cannot be altered. However, the aspect ratio of the digitized image depends on the number of samples per line. This becomes a problem when the image isdisplayed, either on a video monitor or in a hardcopy. If the aspect ratio isn’t properly reproduced, the image looks squashed horizontally or vertically.The 525 line video signal described here is called NTSC (National Television Systems Committee), a standard defined way back in 1954. This is the system used in the United States and Japan. In Europe there are two similar standards called PAL (Phase Alternation by Line) and SECAM (Sequential Chrominance And Memory). The basic concepts are the same , just the numbers are different. Both PAL and SECAM operate with 25 interlaced frames per second, with 625 lines per frame. Just as with NTSC, some of these lines occur during the vertical sync, resulting in about 576 lines that carry picture information. Other more subtle differences relate to how color and sound are added to the signal.The most straightforward way of transmitting color television would be to have three separate analog signals, one for each of the three colors the human eye can detect: red, green and blue. Unfortunately, the historical development of television did not allow such a simple scheme. The color television signal was developed to allow existing black and white television sets to remain in use without modification. This was done by retaining the same signal for brightness information , but adding a separate signal for color information. In video jargon, the brightness is called the luminance signal, while the color is the chrominance signal.The chrominance signal is contained on a 3.58 MHz carrier wave added to the black and white video signal. Sound is added in this same way, on a 4.5 MHz carrier wave. The television receiver separates these three signals, processes them individually, and recombines them in the final diplay.译文:关键词:核心,合成信号,电压耦合电视信号尽管已经拥有50年的历史了,电视信号依然是常用的传递信息的途径之一。
英语作文-电视行业的数字化转型与智能化发展
英语作文-电视行业的数字化转型与智能化发展The digital transformation and intelligent development of the television industry mark a significant shift in how content is produced, distributed, and consumed. In the past, television was a one-way street, with broadcasters sending signals and viewers passively receiving them. Today, the industry is characterized by a two-way flow of information, where viewers have become active participants, influencing the content they watch and how they watch it.Digital Transformation。
The digital transformation of the television industry began with the transition from analog to digital broadcasting. This shift allowed for higher quality video and audio, as well as the ability to transmit additional data such as subtitles and multiple audio tracks. Digital broadcasting also paved the way for high-definition television (HDTV), which has since become the standard for viewers expecting crisp, clear images.With the advent of the internet, television has embraced streaming as a new distribution model. Services like Netflix, Hulu, and Amazon Prime have changed the game, offering on-demand content that is accessible from anywhere at any time. This has led to the phenomenon known as 'cord-cutting', where viewers cancel traditional cable subscriptions in favor of online streaming services.Intelligent Development。
关于电视机科技的说明方法作文
关于电视机科技的说明方法作文Television technology has significantly evolved over the years, offering consumers a wide range of features and options for a more enhanced viewing experience. 电视技术在多年来发展迅速,为消费者提供了更多功能和选择,带来更加尖端的观看体验。
From the early days of black and white TVs to the high-definition flat-screen TVs of today, the advancements in technology have revolutionized how we watch and interact with television content. 从早期的黑白电视到今天的高清平板电视,技术的进步彻底改变了我们观看电视节目的方式和互动体验。
One of the most significant changes in television technology has been the shift from analog to digital broadcasting. 电视技术中一个最重要的变化是从模拟到数字广播的转变。
Digital TV offers clearer picture quality, better sound, and more channels, providing viewers with a more immersive and enjoyable viewing experience. 数字电视提供了更清晰的画面质量、更好的音效和更多频道,为观众带来更具沉浸感和愉悦体验。
With the introduction of smart TVs, viewers now have access to a wide range of online content, apps, and streaming services right from their television sets. 随着智能电视的问世,观众现在可以直接从他们的电视机上访问各种在线内容、应用和流媒体服务。
显示技术外文文献阅读
外文文献阅读及翻译译文及原稿译文题目光电显示发展趋势原稿题目Photoelectric display development trend原稿出处Photoelectric display the 10th period John Smith Display the information publishing house姓名:郑航天学号:31102138班级:通信1102光电显示发展趋势摘要:光电显示技术的简介。
分析中国光电显示市场现状以及发展趋势。
介绍光电显示技术的类型及其主流产品。
介绍一些有较好发展前景的未成熟技术。
关键字:光电显示;显像管技术;液晶显示技术;等离子显示技术;发展现状;前景。
一光电显示技术简介:光电显示技术是多学科的交叉综合技术,主要有: 1、阴极射线管(Cathode Ray Tube-CRT)。
是传统的光电信息显示器件,它显示质量优良,制作和驱动比较简单,有很好的性能价格比,但同时它也有一些严重的缺点,如有电压高、软x-射线、体积大、笨重、可靠性不高等。
2、液晶显示(Liquid Crystal-LC)。
液晶是一种介于固体于液态之间的有机化合物,兼有液体的流动性与固体的光学性质,即现在的液晶显示器LCD。
3、等离子体显示(Plasma Display Panel-PDP)。
等离子体显示是利用气体放电发光进行显示的平面显示板,可以看成是有大量小型日光灯排列构成的。
等离子体显示技术成为近年来人们看好的未来大屏幕平板显示的主流。
4、电致发光(Electro Luminescnce Diode-ELD)等。
或场致发光显示-Field Emitting Tube,FET,是另一种很有发展前途的平板显示器件,它是将电能直接转换成光能的一种物理现象。
1.1阴极射线管(CRT)阴极射线管的关键部件是连在荧光屏后部成为一体的电子枪。
电子枪发射出一束经过图像信号调制的窄电子流,经过加速、聚焦、偏转后打在荧光屏的荧光粉上使之发光。
有关数字电视的两篇最新译文
有关数字电视的两篇最新译文
徐孟侠
【期刊名称】《电视技术》
【年(卷),期】2001(000)006
【摘要】之一:消费者对数字电视的热情继续增长——50%的消费者计划在2002年年底前转换到数字电视(英国)今天公开的最新调查表明:消费者对数字电视的热情看来正逐步高涨。
从一项为Pace Micro Technology对1000个消费者进行的盖洛普民意测验(Gallup poll)显示:超过40%的英国人计划在2001年年底之前采用数字电视。
28%的英国人目前正在接收数字电视;而另外有13%的英国人表示在12个月内改换成数字电视。
把这个合计数字再加上两年内准备改换为数字电视的答复者,该项调查表明50%以上的消费者在2002年年底之前将采用数字电视。
【总页数】2页(P19-20)
【作者】徐孟侠
【作者单位】天津大学电子信息工程学院
【正文语种】中文
【中图分类】TN94
【相关文献】
1.从目的加忠诚的法则对比“三国演义”的两篇译文 [J], 高珺
2.有关数字电视的四篇最新译文 [J], 严静兰;徐孟侠
3.对《将进酒》两篇英译文的经验功能分析 [J], 余瑞瑞
4.从经验功能角度浅析《滁州西涧》及两篇译文 [J], 曹卓希
5.译文两篇:谭恩美论美国华裔的语言经历和体验 [J], 唐书哲
因版权原因,仅展示原文概要,查看原文内容请购买。
互联网智能设备中英文对照外文翻译文献
互联网智能设备中英文对照外文翻译文献(文档含英文原文和中文翻译)Mobile Malware and Smart Device Security:Trends, Challenges and SolutionsAbdullahi Arabo and Bernardi PranggonoThe Oxford Internet Institute (OII), Oxford University, Oxford, OX1 3JS, U.K. School of Engineering and Built Environment, Glasgow Caledonian University, Glasgow, G4 0BA, U.K.Abstract —This work is part of the research to study trends and challenges of cyber security to smart devices in smart homes. We have seen the development and demand for seamless interconnectivity of smart devices to provide various functionality and abilities to users. While these devices provide more features andfunctionality, they also introduce new risks and threats. Subsequently, current cyber security issues related to smart devices are discussed and analyzed. The paper begins with related background and motivation. We identified mobile malware as one of the main issue in the smart devices’ security. In the near future, mobile smart device users can expect to see a striking increase in malware and notable advancements in malware-related attacks, particularly on the Android platform as the user base has grown exponentially. We discuss and analyzed mobile malware in details and identified challenges and future trends in this area. Then we propose and discuss an integrated security solution for cyber security in smart devices to tackle the issue.Index — Botnet, cyber security, mobile malware, security framework, smart device securityI. INTRODUCTIONThe Internet is one of the most remarkable developments to have happened to mankind in the last 100 years. The development of ubiquitous computing makes things even more interesting as it has given us the possibility to utilise devices and technology in unusual ways. We have seen the development and demand for seamless interconnectivity of smart devices to provide various functionalities and abilities to users. But we also know the vulnerabilities that exist within this ecosystem. However, these vulnerabilities are normally considered for larger infrastructures and little attention has been paid to the cyber security threats from the usage and power of smart devices as a result of the Internet of Things (IoT) technologies. In the IoT vision, every physical object has a virtual component that can produce and consume services. Smart spaces are becoming interconnected with powerful smart devices (smartphones, tablets, etc.). On the other hand, we also have the backbone, the power grid that powers our nations. These two phenomena are coming at the same time. The increased usage of smart meters in our homes or businesses provides an avenue of connectivity as well as powerful home services or interconnected powerful smart devices. The example of the smart grid also provides the means of controlling and monitoring smart grid infrastructures via the use of portable smart devices.The vulnerability of the connected home and developments within the energy industry’s new wireless smart grid are exposed to the wrong people; it will inevitably lead to lights out for everyone. This will eventually uncover the multitude of interconnected smart devices in the IoT as a hotbed for cyber-attacks or robot networks (botnets) and a security nightmare for smart space users and possibly for national infrastructures as a whole.The latest research has reported that on average people own three internet-connected smart devices such as smartphones and tablets. Therefore, as a resultof the ubiquity of smart devices, and their evolution as computing platforms, as well as the powerful processors embedded in smart devices, has made them suitable objects for inclusion in a botnet. Botnets of mobile devices (also known as mobile botnets) are a group of compromised smart devices that are remotely controlled by bot-masters via command-and-control (C&C) channels. Mobile botnets have different characteristics in several aspects as compared to PC-based botnets, such as their C&C channels medium.PC-based botnets are seen as the most common platforms for security attacks, and mobile botnets are seen as less of a threat in comparison to their counterparts. This is so for different reasons, such as limited battery power, resource issues, and Internet access constraints, etc. Therefore, the efforts directed to both the manifestation of operating mobile botnets and corresponding research and development endeavours are not as wide as for PC-based botnets. However, this development could change with the recent surge in popularity and use of smart devices. Smart devices are now widely used by billions of users due to their enhanced computing ability, practicality and efficient Internet access, thanks to advancement in solid-state technologies.Moreover, smart devices typically contain a large amount of sensitive personal and corporate data and are often used in online payments and other sensitive transactions. The wide spread use of open-source smart device platforms such as Android and third-party applications made available to the public also provides more opportunities and attractions for malware creators. Therefore, for now and the near future smart devices will become one of the most lucrative targets for cybercriminals.The main focus of this paper is threefold: firstly to highlight the possible threats and vulnerability of smart devices, secondly to analyse the challenges involved in detecting mobile malware in smart devices and finally to propose a general security solution that will facilitate solving or addressing such threats. The rest of the paper is organized as follows. In section II we provide a detailed analysis of the security threats on smart devices and their links with cyber security. We have identified mobile malware as one of the main issues and we discuss it in more detail in Section III. Section IV provides our proposed security solution that will be able to deter the problems of mobile malware. The paper is concluded in section V.II. SECURITY THREATS ON SMART DEVICESThe weakest link in any IT security chain is the user. The human factor is the most challenging aspect of mobile device security. Home users generally assume that everything will work just as it should, relying on a device’s default settings without referring to complex technical manuals. Therefore service content providers and hardware vendors need to be aware of their responsibilities in maintaining network security and content management on the devices they provide. Service providers might also have the opportunity to provide add-on security services to complement theweaknesses of the devices.The issue of cyber security is much closer to the home environment than has been usually understood; hence, the problem of cyber security extends beyond computers it is also a threat to portable devices. Many electronic devices used at home are practically as powerful as a computer - from mobile phones, video consoles, game consoles and car navigation systems. While these devices are portable, provide more features and functionality, they also introduce new risks.These devices previously considered as secure can be an easy target for assailants. The information stored and managed within such devices and home networks forms part of an individual’s Critical Information Infrastructure (CII) [2] as identified by the POSTnote on cyber security in the UK. For example, an attacker may be able to compromise a smart device with a virus, to access the data on the device. Not only do these activities have implications for personal information, but they could also have serious consequences if corporate information were also stored on the smart device.The use of mobile devices in healthcare is also more common these days, such as in mobile-health. A typical example is having a health device connected to the home network, which is capable of transmitting data wirelessly to hospitals and other relevant parties. Most of the manufacturers of these devices do not put much effort in trying to make sure that the devices are secure. If these devices are compromised not only will the information and privacy of the user of the device be compromised, but the attacker can even change the settings of the devices, which could lead to harmful consequences. It has been shown that it is possible to hack into a pacemaker and read the details of data stored in the device such as names and medical data without having direct access to the devices simply by standing nearby [3].Therefore, it is also possible to reconfigure the parameters of the device. This is not only applicable to medical devices, but also to any devices that are used within the home network for any purpose.According to the Juniper Networks report [4], 76 percent of mobile users depend on their mobile devices to access their most sensitive personal information, such as online banking or personal medical information. This trend is even more noticeable with those who also use their personal mobile devices for business purposes. Nearly nine in ten (89 percent) business users report that they use their mobile device to access sensitive work-related information.Another more worrying impact is when cybercriminals use the vast resources of the network to turn it into a botnet and launch a cyber-attack on national critical infrastructures. There are some Android applications that when downloaded from a third party market (not the Android market) are capable of accessing the root functionality of devices (“rooted”) and turning them into botnet soldiers without theuser’s explicit consent.People could easily and unwittingly download malware to their smart devices or fa ll prey to “man-in-the-middle” attacks where cyber-criminals pose as a legitimate body, intercept and harvest sensitive information for malicious use. In 2011, there was a mix of Android applications removed from the Android Market because they contained malware. There were over 50 infected applications - these applications were copies of “legitimate” applications from legitimate publishers that were modified to include two root exploits and a rogue application downloader .The Juniper Networks Mobile Threat Centre (MTC) reported that in 2011 there was an unparalleled increase in mobile malware attacks, with a 155 percent increase from the previous year across all platforms [5]. It is also reported that Android malware experienced an increase of 3,325 percent in 2011. Notable in these findings is a significant number of malware samples obtained from third-party applications which do not enjoy the benefit or protection Google Play Store scanning techniques. Previously, an Android developer could post an application to the official Android Market and have it available immediately, without inspection or vetting to block pirated or malicious applications.This increase in malware is mainly due to the combination of Google Android’s dominant market share in smartphone (68.8 percent in 2012) and the lack of security control over the applications appearing in the various Android application markets. It was reported recently that Google Play store, which has more than 700,000 apps just passed 15 billion downloads. Security firm Fortinet estimated that money-stealing malware has increased exponentially in 2006-2011 as shown in Figure 1. Based on an estimation by Kaspersky Lab, cybercriminals who target smart devices like smartphones earn from $1,000 to $5,000 per day per person. Mobile phone hacking is also getting more attractive with the rise of the Near-Field Communication technology (NFC), which expands the use of smart devices as e-wallet or helps people to read product information.In December 2011 alone, Kaspersky Lab discovered more than 1,000 new Trojans targeting smartphones. That is more than all the smartphone viruses spotted during 2003-2010. This trend is continuing; in 2012, the number of cyber-attacks targeting mobile devices increased exponentially during the first quarter, as reported by security firm Trend Micro [6].Their report identified approximately 5,000 new malicious Android applications in just the first three months of the year, mainly due to the increase of the Android user base. The research also pointed out a marked escalation in the number of active advanced persistent threat (APT) campaigns currently being mounted against companies and governments. APT is a cyber-attack launched by a group ofsophisticated, determined, and coordinated attackers who systematically compromise the network of a specific target or entity for a prolonged period. Security researchers see APT in different ways, while some researchers regard APT as different type of attack; others just categorize it as a more organized botnet with more resources behind it.Malware developments that targets smart home devices have several known monetization factors. Most malwares are aimed at mobile pick pocketing (short message service (SMS) or call fraud) or the ability to charge premium bills via SMS or calls, as illustrated in Figure 2. Some malware are used as part of botnet creations. Malwares like DreamDroid (or DroidDream) [7] have integrated thousands of mobile devices into extensive botnets. Some of the malwares are developed to exploit vulnerabilities on either the operating systems (OS), installed applications, or just to create trouble to user information.Home devices and general consumer electronics are progressively becoming more advanced and are capable of connecting with other devices over a network. While it may sound unreal, devices such as TVs, digital picture frames, smart meters and e-readers are quite vulnerable and absolutely capable of causing problems on your network. The next few years will provide opportunities for various types of malware developers to explore unlikely methods of achieving their goals. Smartphones are not invulnerable and Macs can get malware, such as the CVE-2012-0507 vulnerability [8].Luigi Auriemma in [9] has uncovered a vulnerability in a Samsung D6000 high definition (HD) TV that caused it to get stuck in an endless loop of restarts. Auriemma's report followed another denial-of-service (DoS) vulnerability in Sony Bravia TVs uncovered by Gabriel Menezes Nunes [10] which stops users from changing the volume, channels or access any functions.In the 2012 first quarterly report from Trend Micro [11], it was pointed out that the large diffusion of mobile devices and the increase in awareness of the principal cyber threats have resulted in an increase in the interest of cybercrime in the mobile sector. Another significant interest is concentrated on the threat in terms of the rapid spread of botnets based on mobile devices, favored by the total almost absence of protection and the difficulty of tracing the agents composing the network. If these exploits are targeted by well-established hacker groups such as Anonymous, it will pose a bigger threat to organizations and smart environments that protect highly sensitive data, targeting companies and individuals for various political and financial reasons.III. MOBILE MALWAREOne of the major and most common problems in today’s Internet is malware. Among these malware, Botnets are considered as the biggest challenge. Botnets are used to send email spam, carry out distributed denial of services (DDoS) attacks, andfor hosting phishing and malware sites. Botnets are slowly moving towards smart devices since those devices are now basically everywhere, powerful enough to run a bot and offer additional gains for a bot-master such as financial gains as discussed earlier. With PC-based botnets, cybercriminals often use zombies within botnets to launch DDoS attacks. Even though there have been no major mobile DDoS incidents, with current trends we can expect to see this in the near future.Botnets are maintained by malicious actors commonly referred to as “bot-masters” that can access and manage the botnet remotely or via bot proxy servers as illustrated in Error!Reference source not found.. The bots are then programmed and instructed by the bot-master to perform a variety of cyber-attacks, including attacks involving the further distribution and installation of malware on other information systems.In PC-based botnets, botnet master controllers typically use http requests with normal port 80 to transmit and receive their messages. In mobile-based botnets, the bot-master also uses similar http techniques to distribute their commands but also exploits SMS, Bluetooth, etc. The bot-master exploits operating system and configuration vulnerabilities to compromise smart devices and to install the bot software.The first mobile malware, known as Cabir, was discovered in 2004 and was also known as the first mobile worm. The first mobile botnet was discovered around July 2009, when a security researcher found SymbOS.Yxes or SymbOS.Exy.C (aka Sexy Space) [12] targeting Symbian devices and using simple HTTP-based Command-and-Control (C&C).Later the same year, a security researcher discovered Ikee.B [13], which targets jailbroken iPhones using a similar mechanism to SymbOS.Yxes. Geinimi, which is considered to be the first Android botnet, was discovered in China in December 2010. Geinimi also implements similar HTTP-based C&C with the added feature of encrypted communications. Ge inimi steals the device’s international mobile equipment identity (IMEI), international mobile subscriber identity (IMSI), GPS coordinate, SMS, contact list, etc. and forwards it to the bot-master.Although advanced mobile botnets have not been observed in the main population of smartphones, we believe it is just a matter of time. As shown in [14], mobile botnets are obviously serious threats for both end users and cellular networks. Threats imposed by botnets will continue to increase. As more people use smart devices, it is essential to analyze and explore the mechanisms of mobile botnets and develop security solutions in regard to smart devices.The use of C&C for a mobile botnet stipulates additional challenges that differentiate it from well-known PC-based botnets. Some of these main challenges include, among others: computational power, seamless connectivity, inter-connectivitywith other secure platforms networks, portability and amount of stored sensitive data, and computational power. PC-based botnets also use an IRC-channel as the main C&C communication channel.The impact of SMS-based C&C, IP-based C&C, and Bluetooth-based C&C has been addressed in detail in [15], while P2P-based C&C mobile botnets are analyzed and discussed in [16].As a result of the abilities of smart devices in terms of placing i.e. calls, use of SMS and MMS amongst others, the burdens for mobile botnets are very interesting and challenging as it opens the door for easy financial gain for a bot-master. Additionally, since mobile phones interact with operators and other networks, attacks against the critical infrastructure are also possible.Hence, it is possible to launch sophisticated cyber-attacks on the mobile phone network that will be very hard to prevent.Detecting and preventing malware is not a trivial task as malware developers adopt and invent new strategies to infiltrate mobile devices. Malware developers employ advanced techniques such as obfuscation and encryption to camouflage the signs of malware and thereby undermine anti-malware software.Some of the main reasons why mobile malware are an attractive point for viruses and malware developers are:1.The ubiquity of smart devices such as smartphones in general.2.The increasing computational powers of smart devices. Whose they arebecoming virtually as powerful as desktop systems.3.The lack of awareness of the threats and the risk attached to smart devicesfrom the end-user’s perspective.4.The growing uses of jailbreak/rooted devices both on iOS and Androiddevices.5.Each smart device really is an expression of the owner. It provides ameans to track the user’s activity, hence serves as a single gateway to our digital identity and activities.6.Most of the widely used smart devices operate on an open platform suchas Android, which encourages developers and download of applications from both trusted applications markets and third party markets.IV. POTENTIAL SECURITY SOLUTIONSConsidering the above threats and challenges, a new security solution is essential for cyber security for smart devices in smart homes. More specifically, several keyresearch tasks are required: 1) investigate new secure system architecture for smart devices in smart homes; 2) re-evaluate and enhance security system architecture for smart devices in smart homes.Android OS has four layers: Linux kernel, libraries (+Android runtime), application solution and applications layers (see Figure 4). So, basically Android runtime is a kind of “glue” between the Linux kernel and the applications.Figure 4. Android OS layersThe main security features common to Android involve process and file system isolation; application or code signing; ROM, firmware, and factory restore; and kill switches.However, the main security issue with Android OS is it relies heavily to the end-user to decide whether an application is safe or not. Even though Google’s just adding one piece of the security layer by scanning an applications in the Google Play, the end users still needs to analyze and make the final decision themselves whether to continue with the installation or not. Until now, the end-users cannot rely on the operating system to protect themselves from malware.As part of Google’s marketing strategy to gain market share as big as possible by offering applications as many as possible, the Android application publishing process makes it easy for developers to develop Android applications, but also provides too much space for malicious application creators.Malicious applications have successfully infected Android market before, one example being a malware application called droid09 which allowed users to carry out banking transactions. The application needs the user to provide the bank’s details and tricks the user by masquerading a legitimate login of a bank website (phishing).Malware applications have become more sophisticated these days; they find new ways and techniques to enter the system by exploiting software vulnerabilities or by just tricking the users.End-user: It is always essential for the end-user to be aware of the security measures of their mobile device. End-users should be aware of at least the following measures:Install anti-virus and anti-malware solutions to protect the device againstmalware and viruses. Also ensure to turn on the automatic update. It is been shown that installing anti-virus and anti-malware is very effective to protect mobile devices from malicious applications [5, 6, 17].•Install a personal firewall to protect mobile device interfaces from direct attack and illegal access. The effectiveness of mobile firewalls to increase a mobile device’s security is shown in [18].Install only applications from trusted sources that have legitimate contact information and a website. As the current Android Market (Google Play) does not adopt a certification process for applications, it is up to the end-user to make sure he/she only installs trusted applications from trusted developers.Install only applications from the official and original developer (for example, if you are installing Instagram applications, make sure you download it from Instagram Inc.).Check the permissions carefully when the application is prompting you during the installation phase. For example, when you install a wallpaper application, do you think it really needs full Internet access?Ensure your OS and software's always up-to-date with the latest versions and security patches need to be installed.Install remote locate, track, lock, wipe, backup and restore software to retrieve, protect or restore a lost or stolen mobile device and the personal data on the device.Only install applications that have a high number of downloads and positive reviews.Never view sensitive data over public wireless networks which have no passwords or encryption.Should be alert to anomaly behaviours and activities in their devices.Should be careful when clicking links on social network sites. Malicious links on social networks can be a very effective method to spread malware.Participants tend to trust such networks and are thus willing to click on links that are on “friends’” social networking sites.Mobile Network Operators (MNOs): MNO also has responsibility to create a more secure environment for their customers. MNOs need to install anti-virus and anti-malware software to scan outgoing and incoming SMS and MMS to the mobile network, as many malwares use SMS/MMS to propagate and contact the bot-master. MNO should also build a global partnership with related agencies such as other MNOs to prevent mobile malware propagation by exchanging information, knowledge, database and expertise.Apps Developers: Developers also need to take care of the security measuresimplemented in their application. They should ensure that private data is not being sent via an unencrypted channel; the data must be sent through HTTPS or TLS networks.Developers should minimize the use of built-in permissions in their applications, for example do not ask for full Internet access permission, INTERNET, unless it is essential for your applications to work properly. Android has about 100 built-in permissions that control operations such as dialing the phone (CALL_PHONE), sending shot message (SEND_SMS), etc.In Android, there are three main “ security protection levels” for permission labels: a “normal” permission is granted to any application that requests it; a “dangerous” permission is only granted after user approval at install-time; and a “signature” permission is only granted to applications signed by the same developer key as the application defining the permission label.This “signature” protection level is integral in ensuring that third-party applications do not gain access affecting the Android’s trusted computing base (TCB)’s integrity.Furthermore, applications developers need only collect data which is essential and required for the application otherwise it will be tampered by the attackers. This is also useful to minimize repackaging attacks. Repackaging attacks are a very common approach, in which a malware developer downloads a legitimate application, modifies it to include malicious code and then republishes it to an application market or download site.It is shown that the repackaging technique is highly effective mainly because it is often difficult for end-users to tell the difference between a legitimate application and its malicious repackaged form. In fact, repackaging was the most prevalent type of social engineering attack used by Android malwaredevelopers in the first two quarters of 2011 [17]. One of the characteristics of Android malware is typically it is specifically developed for a speci fic group of users. It is very unlikely for an Android user from Russia to be infected by Chinese malware for example. Android malware is typically created by cybercriminals with users in specific countries as their target, which is usually their own compatriot. Market Store: The store needs to vet and rigorously screen new mobile applications before they can be put in the market. Google (Google Play) recently made a significant improvement in their security by screening new applications before they were put in the market. Applications store providers also should consider certification for each application before it can be published in the marketplace. The effectiveness of such certification process is shown in [19]. Applications should be rigorously reviewed to ensure that applications are safe from malicious codes, reliable, perform as expected, and are also free of explicit and offensive material.。
裸眼3d技术-论文外文翻译正文终稿
New Glasses-Free 3-D Approach Could Work on Thin, Flexible Displays新式3D眼镜变得透薄柔性3D television was heralded as the breakthrough technology of the 2010 Consumer Electronics Show. Hot on the heels of James Cameron’s eye-opening Avatar, 3D HDTVs were everywhere on the show floor.3D电视被誉为2010消费电子展的突破性的技术。
当年詹姆斯·卡梅隆的《阿凡达》令人大开眼界,掀起3D热潮,3D电视在展会上随处可见。
One year later, at CES 2011, 3D was back again — this time iterating. We saw bigger 3D HDTVs, 3D displays that didn’t require special glasses, and camcorders that captured 3D content.一年后,在CES 2011上,3D又回来了-这一次我们看到更大的3D电视,3D 显示器,不需要特殊的眼镜,和3D摄像机拍摄。
But where is 3D now? It’s certainly not showing up big on our CES 2012 radar, and now looks like over-hyped technology in hindsight — especially to those of us who always though t 3D’s natural home was in the movie theater, not the living room.但是现在的3D展现在哪里?至少在CES 2012上,并没太多亮点。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
数字电视外文翻译文献(文档含中英文对照即英文原文和中文翻译) 原文:Ginga Middleware and Digital TV in Latin AmericaGabriel Baum, Universidad Nacional de La PlataLuiz Fernando G. Soares, Pontifical Catholic University of Rio de JaneiroIn 2005, Brazil launched its digital TV (DTV) agenda. Its main premise was to reduce the digital divide present in the country, giving the lower social classes the right to access , produce, and distribute information . As a natural consequence, a second premise stressed the generation of local IT jobs and companies to support the entire effort.To bring the benefits of DTV to the masses, Brazil devised the Japanese-Brazilian terrestrial DTV(ISDB-T—the International Standard for Digital Broadcasting),taking the earlier ISDB Japanese standard as a base (with some video and audio coding updates) and introducing the innovative Brazilian middleware system, called Ginga.Argentina adopted ISDB-T in2009 with similar objectives to those of Brazil. Since then, Ginga has been adopted in 12 Latin-American countries. Several other countries in Central America and Africa are testing it as well.Ginga MiddlewareThe middleware lies between the application code and runtime infrastructure to enable fast and easy development of TV applications . In 2007, the Brazilian terrestrial DTV standard2 adopted the Nested Context Language3 as its declarative language. In the beginning of 2009, NCL and its user agent, Ginga-NCL, became part of ISDB-T standards and of the International Telecommunication Union (ITU-R)BT 1699 Recommendation. Also in 2009, NCL and Ginga-NCL became an ITU-T Recommendation for IPTV services.4 Ginga was the first free DTV middleware. Ginga-NCL and NCL specifications are open source and royalty free, independent ofthe distribution network used. NCL and Ginga-NCL were conceived at the Tele Media Lab at Pontifical Catholic University of Riode Janeiro (PUC-Rio)/Brazil and have been designed as a joint effort, including LIFIA Lab at National University of La Plata(UNLP)/Argentina.RequirementsAiming at social inclusion, a middleware must support TV (“T”)applications such as T-learning, T-government, and T-health. However, social inclusion is reached not only by offering access to information but also by providing knowledge about how to generate information. Therefore, a DTV system should offer a user-friendly language for designing application sand services. This language should be simple enough to be understood and learned by nonexperts. Moreover, it should belight weight, because its interpreter must run in low-cost receivers with limited resources. However, it should also be powerful enough to support creativity.This need for a simple, light weight, and expressive language led to a declarative domain-specific language (DSL) for TV application design, in which the complex algorithmic steps to accomplish a task are left to the machine and aren’t under user responsibility. The focus on media synchronization(in its general aspect—having interactivity as a particular case),content and presentation adaptability, support for multiple device exhibitions, and support that would also allow for generating live DTV applications, were the requirements that guided the NCL design.ArchitectureGinga was initially proposed forterrestrialtems, butthe same architecture and facilitieswere later applied to IPTV.Figure 1. The Ginga architecture:(a) the general architecture and(b) optional extensions.Furthermore, the modular architecture of Ginga also allows for its use with other transport systems (such as satellite and cable TV), depending only on its Ginga Common Core (Ginga-CC) subsystem. Figure 1a depicts the Ginga components and how they relate with other components of a general DTV architecture.The Ginga-CC subsystem delivers applications to Ginga-NCL. The Ginga-NCL presentation engine is the logical subsystem responsible for running NCL applications. The Ginga architecture also offers optional extensions (see Figure 1b). For example, for terrestrial DTV systems, the Ginga-J execution engine (required for fixed receivers and optional for portable receivers in Brazil; and optional for all kind of receivers in Argentina) is responsible for running Java DTV applications. Connected or Broadband TV might also define some extensions to implement services, such as Electronic Program Guides and widgets. IPTV specific services, such as video on demand, datacasting, and so on, are examples of other possible extensions. Ginga offers NCL services to all extensions through a well-defined API.Ginga-NCL has an open source GPL reference implementation (www.sof .br) recognized by ITU-T. Some open source products have been derived from this implementation, including LIFIA middleware (ginga.ar) for set-topboxes (http:// .ar/ginga.ar) and Nokia middleware for mobile phones (/content/ 48850?clickSource=search&pos=2). There are also some other propr ietar y Ginga implementations. Although there are many Ginga implementations, some still worry that a monopoly could be created for the market of Ginga, mainly resulting from its possible extensions. This should be strongly opposed.ImpactGinga has helped create many jobs and IT companies in Brazil— at least 13 small and medium-size software companies and 60 service providers. TV manufacturers have been merely assemblers of multinational companies in the country, but now they’re obliged to establish local development sections to incorporate the technological innovations being created. As for Brazilian private (commercial) broadcasters, t hey’re not committed to social inclusion. Of course, this scenario causes some tensions, which can only be overcome with a strong and responsible government policy and strong technical support from academia.In Argentina, around a dozen companies have shown interest in developing applications or services based on Ginga, and some have developed products. In addition, some academic laboratories— mainly LIFIA and the University of 3 de Febrero, with the support of the Ministry of Federal Planning— have developed technologic a l innovations and interactive applications based on Ginga. If Argentina can turn LIFIA’s “ginga. ar” free implementation (based on the PUC-Rio’s reference implementation) into a de facto product, then it can provide a platform on which IT companies could develop new products and services.Content DistributionThe right to distribute content is an important component of social inclusion, yet private (commercial) broadcasters won’t transmit social third-party content for free. Perhaps state and federal governments could pay for some transmissions of large-scale interest, but independent producers, such as community TV programmers, can’t afford to distribute their content. Public broadcasting could be a solution. Although the process of digitalization for public broadcasters in Brazil is behind schedule, the process has currently started, so there’s hope.The Argentinian program is heavily based on public media, such as Public TVand other channels like “Encuentro” and “INCAA TV.” Althoug h several private broadcasters have joined the initiative, the production of content is being led by the federal government, promoting the production of content to strengthen and democratize communication.Nevertheless, another alternative for democratizing content distribution comes from IP networks—in particular, the Internet (see www.iptv.br initiative). Ginga is an international standard not only for terrestrial DTV but also for IPTV services and thus for hybrid DTV.Ginga-NCL can embed language players but can also be embedded in other language players—for example, acting as a plug-in for HTML-5 browsers. An NCL application can be embedded in an HTML application and, at the same time, it can embed another HTML application. A work in this direction has just been finished for Firefox and Chrome; and has already been started for HBBTV (Hybrid Broadcast Broadband TV) and LIME/BML (Lightweight Interactive Multimedia Environment). Several issues are under consideration for the next generation of the NCL language, such as high-level abstractions for defining relationships, better support for context-aware applications, and support for multimodal interactions and 3D objects. Novel issues for Ginga-CC are also being considered to keep Ginga as a competitive DTV middleware in the world market.References1. L.F.G. Soares, R.F. Rodrigues, and M.F. Moreno, “Ginga-NCL: The Declarative Environment of the Brazilian Digital TV System,” J. Brazilian Computer Soc., vol. 12, no. 4, 2007, pp. 37–46.2. ABNT NBR 15606-2, Ginga-NCL for Fixed and Mobile Receivers—XML Application Language for Application Coding, 2nd ed., Brazilian Nat’l Standards Organization, 2011.3. L.F.G. Soares et al., “Ginga-NCL: Declarative Middleware for Multimedia IPTV Services,” IEEE Comm. Ma gazine, vol. 48, no. 6, 2010, pp. 74–81.4. Nested Context Language (NCL) and Ginga-NCL for IPTV Services, ITU-T Recommendation H.761, Apr. 2009.Gabriel Baum is a professor of informatics at the Universidad Nacional de La Plata.Contact him at gbaum@sol. .ar.Luiz Fernando Gomes Soares is a full professor at the Pontifical Catholic University of Rio de Janeiro. He’s also the main architect of Ginga, co-editor of the ITU-T H.761 Recommendation for IPTV Services, and chair of the Brazilian译文:银河中间件和在拉美地区的数字电视Gabriel 鲍姆大学国立 de La PlataLuiz Fernando G.Soares,教廷天主教大学的里约热内卢2005 年,巴西推出数字电视(DTV)议程。