区块链在军事领域的应用,军事区块链技术
请查看相关英文文档
Ⅰ Let’s talk about the reshaping and evolution of the financial industry: Fintech “accelerators” still need to return to their roots
“Fintech and industry cannot be ‘two skins’” “Financial "The nature of the industry cannot be changed" "Strong supervision does not mean that the development of the financial technology industry is over" "In-depth empowerment of finance and technology is the only way for us to lead to a better world"... On December 17, at the 2020 Nandu Financial Summit Forum , guests from academia, finance industry, and venture capital industry conducted a brainstorming around the theme of "Reshaping and Evolution-Technology drives the dual cycle of empowering the financial industry". Golden words came out frequently. They came from industry, academia, and From a research perspective, it explains the empowering effect of modern technologies such as financial technology on the financial industry, from which we may get a glimpse of the bright future of the development of the financial industry. The Nandu Financial Summit Forum is an annual high-end financial forum held by Southern Metropolis Daily since 2012. It is the longest-running, largest-scale, and highest-level financial summit in South China. This year is the ninth. This year’s forum, Nankai Financial (Guangdong) Chief Economist Forum and Guangzhou Financial Services Promotion Association provided cooperative support.
Roundtable discussion on the theme of "Reshaping and Evolution - Technology drives the financial industry to empower dual cycles"
The epidemic has inspired the financial industry to accelerate its embrace of financial technology. What are the new developments in the dual cycle pattern? Ideas, new opportunities? Professor Lu Lu, dean of Lingnan College of Sun Yat-sen University, believes that under the current situation, the opportunity for the development of financial technology lies in more and deeper cooperation with traditional financial institutions to breed new business forms. He said that the “Belt and Road Initiative” and the RECP Agreement will be major opportunities for financial technology to empower the real economy and promote the “dual cycle” economic development pattern.
The on-site guests mainly used the insurance industry as an example to discuss the "accelerator" role of financial technology on business. “What else can actuaries do in the era of big data? In the past, actuaries’ main focus was on making assumptions, and their ability was reflected in making the assumptions more accurate and setting up models one by one. Now with big data, actuaries still need to make assumptions. But the basis for these assumptions is more solid." Shen Shuguang, a dual-employed professor at Sun Yat-sen University's Lingnan College and School of Politics and Public Affairs, explained from the perspective of technology's transformation of actuaries' business.
"Take medical health as an example. Medical insurance data covers the medical treatment status of residents in Guangdong Province in the past many years. Data on all men's treatment for heart disease, surgery, medication, costs and other data are known. Through The results can be compared with a certain model. This shows that the foundation of actuarial science has undergone major changes, which will definitely affect pricing, will definitely make pricing rational, precise, and personalized, and will have a direct impact on channel rates. This In the face of a major epidemic, insurance companies can still grow - mobile Internet, big data, and artificial intelligence have transformed sales channels," Shen Shuguang concluded.
From a practical perspective in the insurance industry, General Manager of Mingya Insurance Brokers Guangdong BranchLi Yuanlan shared her experience in accelerating digital transformation during the epidemic, verifying the aforementioned views of Professor Shen Shuguang. She said that the epidemic has prompted a rapid transformation of business methods, and the entire process from marketing team management, product research and development to sales of insurance business is moving online. "Only in this way can the entire industry maintain a certain growth; and because of this, I think the entire insurance industry has done very well this year in terms of people's livelihood protection." She said, "This year has also resulted in the emergence of many companies. Provide more precise services to customers locally and provide broader services to customers at different levels."
How does financial technology promote in-depth changes in the financial industry? Zhang Aoping, a well-known financial scholar, venture capital expert/managing director of Rushi Capital, pointed out that according to the industry development cycle, the digital transformation of the financial industry is still in its infancy. With changes in technology, will the functions and attributes of the industry change? Change? Many guests present believed that the financial industry will still adhere to its essence and will not change.
Liu Lanbiao, deputy dean of the School of Finance at Nankai University/director of the Financial Technology Research Center of Nankai University, pointed out that digitization and technology may change specific financial services and the form of realizing these functions, and will also change the way financial institutions The scope of business that can be affected or covered, but whether the functions and attributes of the financial industry itself will change.
Fu Yu, assistant dean of the Peking University Digital China Institute (South China), also believes that digitalization is a tool, not a strategy, and it is impossible to change the attributes and functions of the financial industry. The essence of its problem-solving is Reduce costs and increase efficiency. For example, big data, blockchain, and Internet of Things technologies are used to solve the problems of high credit reporting costs and difficulty in credit identification, and solve the problems of high costs and difficult financing for physical enterprises.
In fact, 2020 is a year of drastic changes in financial technology supervision. The introduction of a series of regulatory policies has made the financial technology industry nervous. What should strong supervision supervise? How to effectively control risks? Dr. Fu Yu’s view is that financial technology and industry cannot be “two skins”. She explained that financial innovation has solved the problem of transactions, the emergence of insurance has solved the problem of maritime transportation, and the emergence of credit cards has solved the problem of global trade. Financial innovation must be integrated with industry, and it comes from industry. , and serve the industry, this is a fundamental point.
In addition, Zeng Yu, Vice President of Guangzhou Rural Revitalization Fund/Vice President of Guangzhou Green Finance Association, provided an idea for the digital transformation of the financial industry. He believed that the transformation path should be considered from the direction of supply-side structural reform, such as The cultivation of "finance + technology" two-way talents may become a key issue in the coming period. A key direction of discipline construction in colleges and universities.
II If you want to be a programmer, what major should you study in college?
If you want to be a programmer, you can study these two majors:
1. Software engineering
The software engineering major is based on computer science and technology disciplines, emphasizing the engineering nature of software development, enabling students to master computersOn the basis of scientific and technical knowledge and skills, students should be proficient in the basic knowledge, basic methods and basic skills necessary to engage in software requirements analysis, software design, software testing, software maintenance and software project management, etc., highlighting the professional knowledge and professional skills of students Skills development, cultivating senior professionals capable of engaging in software development, testing, maintenance and software project management.
2. Computer Science and Technology
The Computer Science and Technology major mainly cultivates good scientific literacy and a systematic and better mastery of computer science and technology, including computers. Basic theories, basic knowledge and basic skills and methods of hardware, software and applications, computer science and technology disciplines that can be engaged in computer teaching, scientific research and application in scientific research departments, educational units, enterprises, institutions, technical and administrative departments and other units of senior scientific and technical talents.
If you choose these two majors, you will learn a series of programming languages such as c language, c++, java, javaweb, etc. in college. It should be noted that in college, one language course usually ends in one semester. The learning progress will be very fast, and the course schedule will not be sufficient. If you want to learn well, you have to rely on your own efforts after class, and you must at least master a language that you are good at.
Abilities required to be a programmer
1. Programming language ability
As a qualified computer programmer , proficiency in a language is a must. This kind of proficiency does not mean that you can be proficient after reading a programming manual or copying a few programs. It requires accumulation over a long period of time.
2. Coding ability
Complying with coding standards is the most basic requirement for a programmer. The other one is comments. Be careful not to comment for the sake of comments. For classes, the main purpose is to explain responsibilities; for methods, the main purpose is to explain; for method bodies, the main purpose is to explain the implementation ideas. For large sections of code, divide them into sections, separate them with blank lines, and use inline comments to explain them.
3. Object-oriented thinking ability
Most programming languages are object-oriented programming languages. The common essence of these object-oriented programming languages is object-oriented thinking. Mastering these is more important than the object-oriented language itself, such as understanding inheritance, polymorphism, and overloading. Understanding of basic object-oriented principles, such as the open-closed principle, the interface isolation principle, the single responsibility principle, etc. On this basis, you should master common design patterns, such as factory pattern, strategy pattern, observer pattern, template method pattern, command pattern, etc.
Ⅲ The Chinese Academy of Engineering released the "Sixteen Major Challenges" for my country's electronic information technology. What are the specific contents and what topics are mainly targeted?
On April 26, the Chinese Academy of Engineering Information and Electronics The Faculty and China Information and Electronic Engineering Science and Technology Development Strategy Research Center released the "Sixteen Technical Challenges for the Development of China's Electronic Information Engineering Science and Technology (2020)" (hereinafter referred to as the "Challenge") at the Chinese Academy of Engineering.
"Challenges" analyzes the technical challenges faced by 16 fields of electronic information engineering science and technology in my country.
1. Microelectronics and Optoelectronics
Moore’s Law continues to approach the limits of physics and technology. New structures, new devices, new materials, new processes and new packaging are the challenges facing this field to make up for shortcomings, extend boards and achieve sustainable development. important challenges. At present, the miniaturization, high speed, low cost, low power consumption, multi-function, optoelectronic integration and intelligence of photonic integration and optoelectronic integrated chip technology surrounding the reception, transmission, modulation and amplification of communication lasers are the shortcomings in this field. , extension boards and important challenges for sustainable development.
2. Optical Engineering
Many organisms in nature have optical perception capabilities that are unmatched by current artificial systems. Focusing on "how bionic optics can simulate the tunable, wide spectrum, wide field of view, anti-reflection and stealth visual systems of these creatures, as well as endow the mechanisms and functions of intelligent perception of these creatures and their groups to artificial intelligence systems to improve the performance of bionic optics in strong backgrounds" "Dynamic perception and processing capabilities under interference" are important challenges.
3. Perception
Remote sensing technology is developing in the direction of combining active and passive and miniaturized high-repetition period observations. It is combined with intelligent processing technology of image information to promote the widespread application of remote sensing information; the rapid development of information technology We are promoting the research and development of digital and intelligent sensors. "Smart sensors with the capabilities of autonomous collection, data processing, transmission and security management" are an important challenge currently facing this field.
4. Measurements and Instruments
By implementing the International System of Units redefined based on "constants", China's measurement system is undergoing a historic change from a multi-layered pyramid structure to a flat structure, directly promoting the national measurement system Leap forward in the direction of digitalization, networking, and intelligence to support the sustained and high-quality development of China's science and technology, industry, health, and national defense. In particular, we will accelerate the development and production of measurement standards and measuring instruments that serve life safety and biosafety to meet the country's urgent needs. is an important challenge facing this field.
5. Electromagnetic space
The electromagnetic spectrum has become one of the main activity spaces and competitive resources of human society in the information age and the intelligent age. The number, type and frequency of users have exploded. System forms and technical systems such as electromagnetic space detection and perception, communication transmission and control control are gradually becoming integrated. Realizing intelligent full-spectrum and multi-integrated spectrum sensing, efficient spectrum utilization of high-frequency broadband, dynamic and refined frequency management and control, and high integration and low cost of system equipment are important challenges currently facing this field.
6. Network and Communications
Subject to limitations in available spectrum resources and key optoelectronic device indicators, the capacity expansion of mobile communications and optical fiber communications has slowed down. With the explosive growth of network traffic and the major demand for full coverage of the sky and the sea, the intergenerational leap in technology urgently requires breakthrough theories and technologies. In the three-element interconnection of people and things, as well as the deep integration of networks and various industries, the pressure and pressure on the network such as great complexity, huge capacity, large connections, wide coverage, high reliability, low energy consumption, and low cost are allDriven by this, network architecture, service quality, user experience, security and reliability are important challenges currently facing this field.
7. Cybersecurity
In the face of the changing situation in which countries are fiercely competing for Internet control, "maintaining cyber security sovereignty requires an innovative, proactive and adaptive multi-layered linkage technology system to build a fast and intelligent counterattack." "Intelligent active defense barriers, breaking through the key network border defense technologies that "defend attacks from outside," and forming self-centered threat perception and attack prediction capabilities are important challenges currently facing this field.
8. Hydroacoustic Engineering
Carry out underwater networked acoustic observations in the complex and changeable marine environment, obtain the laws of the marine underwater acoustic environment and underwater target acoustic information, and use real-time information transmission and Using big data information processing as a means to achieve independent control of ocean underwater information is an important challenge currently facing this field.
9. Electromagnetic fields and electromagnetic environmental effects
With the widespread use of 5G, artificial intelligence, the Internet of Things, and big data in high-speed communications, unmanned systems, industrial Internet, advanced energy, advanced aerospace and other fields, Application, various types of equipment face serious electromagnetic safety problems. Breaking through the constraints of traditional thinking and methods, establishing new theories of electromagnetic environmental effects and protection, developing new technologies, new materials and new devices, and improving the electromagnetic environment adaptability and electromagnetic balance capabilities of my country's information electronics and their applications are important challenges currently facing this field. .
10. Control
“In uncertain and complex dynamic environments such as intelligent manufacturing, unmanned driving, deep space and deep sea, how to use the theory, technology and system that integrates automation and artificial intelligence to target major equipment, For controlled objects with unclear mechanisms and difficult to establish mathematical models, such as autonomous moving bodies and process industry processes, achieving autonomous intelligent control, human-machine collaborative optimization decision-making, and integration of decision-making and control is an important challenge currently facing this field.
11. Cognition
The accelerated integration of brain cognition and artificial intelligence is widely used in unmanned systems, brain-like chips, intelligent vision and other fields. Innovative artificial intelligence technology based on brain cognitive mechanisms is an international hot spot. "Multi-scale dynamic brain observation, the revelation of mechanisms for cognitive functions such as memory, emotion, and vision, and the establishment of artificial intelligence theories and models that are easy to generalize, robust, and low-power consumption" are important challenges currently facing this field.
12. Computer systems and software
With the rapid development of artificial intelligence applications, the explosive growth of data and increasingly complex computing models, people's demand for computing power is growing rapidly. Facing the physical constraints of the post-Moore era, computing system architecture, system hardware, system software, application software and other aspects are facing important challenges such as high performance, high reliability, low energy consumption, agile design, intelligence and application diversity. . Intelligent computing has become the basic enabling technology for the transformation of traditional industries and the integrated development of emerging industries.
13. Computer Applications
With the deepening integration of computer application technologies represented by human-machine integration, blockchain, virtual reality, digital twins, etc. with various industries,The interoperability technologies that support various types of industrial equipment, information systems, business processes, enterprise products and services, and personnel are becoming increasingly complex. Building a more efficient, user-friendly, and intelligent interoperable technology system is an important challenge currently facing this field.
14. Industrial software system
The adaptation between the inherent discreteness of software operation and the inherent continuity of industrial system operation has become the primary problem for industrial basic software such as operating systems and middleware. High-stability 3D Industrial core software such as geometry engines, engineering analysis simulation solvers, and electronic design automation, as well as large-scale high-reliability embedded industrial software and new industrial Internet system software are important challenges currently facing this field.
15. Responding to major emergencies (part of the information field)
“How to establish an information-based decision-making platform for major emergencies at the national, provincial, and municipal levels (such as the outbreak of new coronavirus pneumonia, etc.), brainstorm, Break through limitations and extend to various economic and social fields; how to integrate data resources from relevant departments, including medical and health, public security, transportation, construction, environmental protection, education, energy, civil affairs, state-owned enterprise data, etc., to build a big data platform for major emergencies; "How to establish a computing environment and platform that can support emergency scientific research both during peacetime and during wartime, for the research and development of new drugs and vaccines, etc." is an important challenge to respond to major emergencies and improve national governance capabilities.
16. New infrastructure
The construction of new infrastructure represented by 5G, data centers, industrial Internet, Internet of Things, artificial intelligence, etc. is accelerating and is playing a strategic and leading role to support the epidemic and during the epidemic. High-quality economic and social development in the later period. As the construction speed accelerates and the scale continues to expand, new infrastructure is in the process of technological collaboration, large-scale networking, application model innovation, core technical support such as optoelectronic chips and key software, network security, high reliability, greenness and low cost, and is closely related to various industries. Vertical integration of convergence is an important challenge currently facing this field.
IV I have a curious question: why is the AOS privacy public chain so popular in markets such as South Korea, Europe, and Latin America?
As far as I know
AOS privacy public chain The foundation is registered in the UK, but the technical team is distributed in Europe and the United States and other places. It also has Korean communities, Russian communities, Japanese communities, Vietnamese communities, etc., and is currently planning to build Spanish communities, Portuguese communities, etc., AOS privacy public chain In fact, it is a very global project.
The reason why it is particularly popular in South Korea has a lot to do with the strong endorsement AOS has received in South Korea. At the end of last year, AOS held a conference in South Korea. The Chief of Staff of the South Korean Army and many members of Congress attended and took a group photo. This was a very direct and powerful endorsement and platform. It is said that the AOS public chain and the Korean blockchain Association, Korea Charity Foundation, Seoul National University and other institutions and universities have reached cooperation intentions, which shows the resources behind the project.
IV How Bitcoin is Calculated
To understand the technical principles of Bitcoin, you first need toUnderstand two important cryptographic techniques: HASH code: Convert a long string into a fixed-length string, and the conversion is irreversible, that is, it is impossible to guess the original string from the HASH code. The main one used in the Bitcoin protocol is SHA256.
Public key system: Corresponds to a public key and a private key. The application keeps the private key and makes the public key public. When A transfers information to B, he can use A's private key to encrypt the information, and B can use A's public key to decrypt it. This ensures that a third party cannot pretend to be A and send information; at the same time, when A transfers information to B, he uses B's public key to decrypt it. The key is encrypted and sent to B, who then uses his own private key to decrypt it. This ensures that a third party cannot eavesdrop on the communication between the two. The most common public key system is RSA, but the lliptic Curve Digital Signature Algorithm is used in the bitcoin protocol. What is the difference between cash and bank account? Bitcoin is electronic currency, and its unit is BTC. Also used in this article to refer to the entire bitcoin system. Just like opening an account in a bank, the corresponding concept in Bitcoin is an address. Everyone can have one or several bitcoin addresses, which are used to pay and receive money. Each address is a string starting with 1. For example, I have two bitcoin accounts, and. A Bitcoin account is uniquely determined by a pair of public and private keys. To save the account, you only need to save the private key file. The difference from bank accounts is that banks will save all transaction records and maintain the book balance of each account, while Bitcoin transaction records are jointly maintained by the entire P2P network through a pre-agreed agreement. How much money is in my account address? Although you can see the current account balance using Bitcoin software, unlike a bank, there is no place to maintain the book balance of each address. It can only calculate the account balance in real time through all historical transaction records. How do I pay my bill? When I pay from address A to the other party's address B, the payment amount is e. At this time, both parties will announce the transaction information to each network node, telling address A to pay address B, and the payment amount is e. In order to prevent a third party from forging the transaction information, the transaction information will be encrypted using the private key of address A. At this time, the network node that receives the transaction information can use the public key of address A to verify that the transaction information was indeed sent by A. Of course, the trading software will do these things for us, we only need to enter the relevant parameters in the software. What will the network node do after receiving the transaction information? This is the most important part of the entire Bitcoin system and needs to be elaborated on. For the sake of simplicity, only the currently implemented Bitcoin protocol is used here. In the current version, each network node will save all transaction information through synchronization. All transaction information that has occurred in history is divided into two categories. One category is "verified" transaction information, that is,Transaction information that has been verified is stored in a series of "blocks". The information of each "block" is the ID of the previous "bock" (the ID of each block is the HASH code of the block's HASH code) and the new transaction information (see an actual block). The other category refers to those transaction information that has not yet been verified. The transaction information just paid above falls into this category. When a network node receives new unverified transaction information (maybe more than one), since the node saves all historical transaction information, it can calculate the book balance of each address at that time, and thus can calculate the Whether the transaction information is valid, that is, whether there is sufficient balance in the payment account. After eliminating invalid transaction information, it first takes out the ID of the last "block", then combines these unverified transaction information with the ID, and adds a verification code to form a new "block". Building a new block above requires a lot of calculation work, because it needs to calculate the verification code so that the above combination becomes a block, that is, the first few digits of the HASH code of the block are 1. Currently, the first 13 bits need to be 1 (roughly so, not sure about the specific method), which means that if the block is generated by enumeration, the average number of enumerations is 16^13 times. Using CPU resources to generate blocks is called "gold mining" because producing the block will receive a certain reward, and the reward information has been included in the block. When a network node generates a new block, it is broadcast to other network nodes. However, this network block may not necessarily be accepted by the network, because other network nodes may have produced the block earlier. Only the earliest block produced or the block with the most subsequent blocks is valid, and the remaining blocks will no longer be used as the next block. initial block. How does the other party confirm that the payment was successful? When the payment information is distributed to the network node, the network node begins to calculate whether the transaction is valid (that is, whether the account balance is sufficient for payment), and attempts to generate blocks containing the transaction information. When a total of 6 blocks (1 direct block and 5 subsequent blocks) contain the transaction information, the transaction information is considered "verified", so the transaction is officially confirmed and the other party can confirm that the payment was successful. A possible problem is that I pay the balance in address A to address B and at the same time to address C. If I only verify that the single transaction is valid. At this time, my cheating method is to generate 6 blocks containing only B and send them to B before the truth is revealed, and generate 6 blocks containing only C and send them to C. Since the CPU time required for me to generate the block is veryChang Chang, compared with the entire network, my probability of succeeding in cheating like this is very slim. What is the motivation for network nodes to produce blocks? As can be seen from the above description, in order to make the transaction information effective, the network node needs to generate 1 and 5 subsequent blocks containing the transaction information, and such block generation is very CPU-intensive. So how to get other network nodes to help produce blocks as soon as possible? The answer is simple. The agreement stipulates that the address that produces the block will be rewarded with BTC, as well as the handling fees promised by both parties to the transaction. The current reward for producing a block is 50 BTC, which will be halved every four years in the future. For example, the reward between 2013 and 2016 was 25 BTC. Are transactions anonymous? Yes and no. All BITCOIN transactions are visible, and we can check all transaction records of each account, such as mine. But what is different from the bank currency system is that each person's account itself is anonymous, and each person can open many accounts. Overall, the so-called anonymity is not as good as claimed. But another advantage of using Bitcoin for black market transactions is that it cannot be frozen. Even if the police trace a Bitcoin address, there is still nothing they can do unless they can trace the computer used by the exchange based on the network address. How to ensure that Bitcoin does not depreciate? Generally speaking, when trading activity is equivalent, the value of a currency is inversely proportional to the amount of currency issued. Unlike the traditional money market, where the central bank can determine the amount of currency issuance, there is no central issuing agency in Bitcoin. Only by producing blocks can you obtain a certain amount of BTC currency. Therefore, the new increment of Bitcoin currency is determined by: 1. The speed of producing blocks: The Bitcoin protocol stipulates that the difficulty of producing blocks is fixed at an average of 2016 blocks every two weeks, and one block is produced in about 10 minutes. Moore's Law, which states that CPU speeds double every 18 months, will not speed up the production of blocks. 2. The number of rewards for producing blocks: Currently, the reward for each block produced is 50 BTC, which will be halved every four years. Starting in 2013, the reward will be 25 BTC, and starting in 2017, the reward will be 12.5 BTC. Combining the above two factors, the speed of bitcoin currency issuance is not controlled by any single node in the network node. Its protocol makes the stock of the currency known in advance, and the maximum stock is only 21 million BTC
VI US Media Assessing the strength of the People's Liberation Army, the navy ranks first and the air force ranks third. What are the advantages of my country's comprehensive strength and technology?
The US media evaluates the strength of the People's Liberation Army. The navy ranks the first and the air force ranks third. my country's comprehensive strength and technology are indeed relatively strong. The advantage is that it currently has the world's largest army in terms of scale, and it also has the world's second largest navy in terms of scale. It is also very close to the US Navy in terms of strength. Technically, it also has the ability to produce its own products and has extremely mature technologies, such as radar technology and target technology.Currently the only country that possesses laser weapons, it is also a newly developed weapon in our country. It can use lasers to aim at targets more accurately and thereby attack the enemy.
Finally, China has a long history, and it loves peace and focuses on peace, but this does not mean that it can touch China’s bottom line at will. Once the bottom line and principles are touched, You need to bear the corresponding consequences.
Ⅶ What technologies are mainly used in smart tourism and what systems are they specifically used in?
What technologies are mainly used in smart tourism and what systems are they specifically used in?Smart tourism mainly uses new technologies such as cloud computing and the Internet of Things. Through the Internet/mobile Internet, with the help of portable terminal Internet devices, Hongyun Fuxing Smart Terminal is such a terminal device, which can help scenic spots effectively implement The creation of smart scenic spots.
Cloud Computing
To be precise, Cloud Computing does not refer to a specific technology or standard, but It is a concept, a computing model and an application model for IT resources. It provides ubiquitous, convenient and anytime shared configurable computing resources (such as networks, servers, storage, applications and services). Internet access required. End users do not need to understand the technical details of cloud computing or related professional knowledge. They only need to focus on what resources they need and how to obtain corresponding services through the Internet. Its purpose is to solve the massive data storage brought about by the development of the Internet. and deal with problems. The core idea of "cloud computing" is the effective allocation of computing, information and other resources. Cloud computing includes two aspects: on the one hand, it refers to the system platform used to construct applications, its status is equivalent to the operating system on a personal computer, called cloud computing platform (referred to as cloud platform); on the other hand, it describes the system platform built on Cloud computing applications on this platform (referred to as cloud applications). Cloud computing platforms can dynamically deploy, configure, reconfigure and de-deploy servers on demand; these servers can be physical or virtual. Cloud computing application refers to an application that can be expanded to be accessed through the Internet. It uses large-scale data centers and powerful servers to execute network applications and network services, allowing any user to access them through appropriate Cloud computing applications can be accessed with an Internet access device and a standard browser. Cloud computing services can be divided into three levels: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS).
The cloud computing construction of smart tourism must include both cloud computing platform and cloud computing applications. At present, in the practice of smart tourism, the concepts of cloud computing platform and cloud computing application are often confused, such as "tourism cloud", "tourism cloud computing", "tourism cloud computing platform", etc. In fact, cloud platforms are application-independent to a certain extent, so smart travelResearch on the application of cloud computing in tourism should focus on cloud computing applications, such as studying how to integrate a large amount or even a massive amount of tourism information and store it in a data center, and how to build a system that can be used by tourists, tourism organizations (enterprises, public management and services, etc.) ) various travel applications (information inquiry, online booking, payment, etc.) that obtain, store, process, exchange, query, analyze, and utilize. To a certain extent, cloud computing embodies the sharing and full utilization of tourism resources and social resources in smart tourism, as well as an intensive wisdom of resource optimization.
2. Internet of Things
The concept of Internet of Things (InterofThings, IOT) was proposed by the Massachusetts Institute of Technology in 1999. It mainly refers to relying on information sensing technologies and devices such as radio frequency identification (RFID) to connect and communicate with the network in accordance with agreed protocols, thereby forming a "network connected to things" and realizing the functional identification and identification of item information. manage. With the continuous development of information technology and applications, the connotation of the Internet of Things is also constantly expanding. At present, the Internet of Things, generally recognized by the industry and academia, refers to the use of radio frequency identification (RFID), global positioning system (GPS), and sensors, actuators and other devices to perceive and identify the physical world, and relies on communication networks for transmission and interconnection. Computing facilities and software systems are used for information processing and knowledge mining to achieve information interaction and seamless connection between people and things, and between things and things, thereby achieving real-time control, precise management and scientific decision-making of the physical world. The architecture of the Internet of Things consists of the perception layer (sensing devices, identification technology), the transmission layer (wireless communication technology, wide area network technology, gateway technology) and the application layer (cloud computing, massive data storage, data exploration and analysis, artificial intelligence )composition.
The Internet of Things in smart tourism can be understood as an expansion suite of Internet tourism applications and a form of ubiquitous Internet tourism applications. If Shanxi tourism applications based on Internet technology are called "online tourism", then tourism applications based on Internet of Things technology can be called "online and offline tourism" that cover both "online" and "offline". Internet of Things technology breaks through the "online" limitations of Internet applications, and this breakthrough is adapted to the mobile and non-online characteristics of tourists. The ubiquitous network refers to the ubiquitous network, that is, based on the needs of individuals and society, using existing and new network technologies to realize ubiquitous on-demand information between people, people and things, and things and things. A comprehensive service network system for acquisition, transmission, storage, cognition, decision-making and use. The "online" and "offline" integration of tourism applications based on the Internet of Things reflects the "ubiquitous" essential feature of the ubiquitous network, and this essence is also adapted to the dynamic and mobile characteristics of tourists.
3. Mobile communication technology
Mobile communication is one of the things-to-thing communication modes. It mainly refers to wireless communication between mobile devices and between mobile devices and fixed devices. , to realize the wireless connection of real-time data of the device between the system and the remote device.. Therefore, mobile communication can be understood as a thing-to-thing connection method of the Internet of Things, and is the core infrastructure supporting the smart tourism Internet of Things. The reason why mobile communication technology is specially proposed as a connection method of the Internet of Things is because with the development and popularization of mobile terminal devices and technologies such as smart phones and handheld computers (PDA), mobile communication technology has enabled the tourism application of information technology. The development from being centered on personal computers to being centered on "people" who carry mobile communication terminal devices - tourists, reflects the direction of information technology application with individual travelers as service objects. Personal computers are connected based on computer network technology, and various tourism applications are prosperous through Internet technology; while mobile communication terminal devices are connected based on mobile communication technology, and various tourism applications are prosperous through Internet and Internet of Things technologies. Mobile communication technology has developed rapidly since its birth. It has developed from the first generation to the third generation (3G) and is developing to the fourth generation (4G). Mobile communication technology in smart tourism provides tourists with a wealth of high-quality services, such as full-course (before, during, and after travel) information services, ubiquitous (any time, any place) mobile access services, and diverse users Terminals (personalization and multi-mode human-computer interaction such as voice, touch, vision, etc.) as well as smart services and smart mobile agents (intelligentagent), etc.
The application of mobile communication technology in smart tourism will greatly improve tourists’ travel experience and recreation quality, improve tourism destination management level and service quality, and make tourism management and services more refined and high-quality. Advance. Mobile communication technology embodies the wisdom in smart tourism to meet the personalized needs of tourists and provide high-quality and high-satisfaction services.
4. Artificial Intelligence Technology
Artificial Intelligence (AI) is the basic theory, method and method that studies how to use computer software and hardware to simulate certain intelligent behaviors of human beings. Technology involves research on knowledge representation, automatic reasoning and search methods, machine learning and knowledge acquisition, knowledge processing systems, natural language understanding, computer vision, intelligent robots, automatic programming, etc. It has been widely used in robots, decision-making systems, control systems and simulation systems.
Smart tourism includes advanced computer software, hardware and communication technology with the Internet of Things and mobile communications as the core, as well as reasonable and effective allocation technology of computing and information resources with cloud computing as the core; however, , how to make full use of the large or even massive amounts of data and information that smart tourism continuously collects, stores and processes so that it can play an important role in tourism services and management is a key issue related to the success or failure of smart tourism. Artificial intelligence is the key technology used by smart tourism to effectively process and use data, information and knowledge, and use computer reasoning technology to support decision-making and solve problems. In the field of tourism research, artificial intelligence is more often used in tourism demand forecasting; and the role of artificial intelligence in smart tourism is not onlyThis also includes recreation quality evaluation, tourism service quality evaluation, tourism emergency warning, tourism impact perception research and many other fields. If the Internet of Things, cloud computing and mobile communication technologies are regarded as the architectural technologies of smart tourism, then artificial intelligence is the core technology of smart tourism.
In what industries are titanium materials specifically used?Titanium alloys are very promising for use on ships. This is related to the strength and toughness of titanium alloy, as well as its corrosion resistance. Titanium in seawater is extremely stable. Basically, it can be considered that the hull will not corrode. This can not only reduce maintenance costs, but also lighten the hull. The weight is a huge benefit to the ship. In addition, it is necessary to mention two points: First, titanium is non-magnetic, which is very helpful against magnetic detection. As for magnetic mines, it is not worth worrying about. Second, it is naturally integrated with advanced ship composite material coatings. The stealth composite materials to be used in the future have a shortcoming, which is that they react with the high-strength special steel used in previous ships. Due to the potential difference, electricity is easily generated in seawater. Oops, it accelerates corrosion. This kind of thing has been tested on 052. It won't take long for it to become rusty, but these coatings can be perfectly integrated with titanium alloy.
(2) The use of titanium in the defense industry of other countries
Many of the weapons and equipment that have been retired, are in service or are under development in the world use titanium and its alloy structural parts. With the modernization The change in the mode of war requires the modern army to have outstanding rapid maneuverability. Therefore, the army must rely on the ability of transport aircraft to achieve rapid maneuverability. This requires the army's originally heavy equipment to be made as lightweight as possible. For example, all countries now hope that Your own artillery can be quickly and effectively transferred to another place to achieve strategic or tactical purposes. This will inevitably make the development of titanium alloys in the field of artillery bright. For example, the American M777 light howitzer uses a titanium alloy shell. The total combat weight has been reduced to 3.175 tons, and it can be transported by V22 or C130 by air to achieve rapid maneuverability. Similar is the British UFH ultra-light 155mm artillery, which uses 1 ton of titanium alloy in a weight of less than 4 tons. This is especially true in the field of air force and naval equipment. The following is a brief introduction to typical examples of successful applications of titanium alloys:
① Titanium materials for aircraft
Nowadays, the global economy has gradually come out of the trough, and the international aviation industry has begun to With the emergence of restorative growth, the international titanium industry has also ushered in a new period of rapid growth with this trend, and Chinese companies will also usher in new opportunities.
In recent years, the replacement of fourth-generation fighter jets has begun. In the following years, many new fighter jets will enter the military every year. New fighter jets are very particular and forward-looking in material selection. In the next many years, the military and aviation industry will inevitably be the largest users of titanium materials.
Mild recently announced the concept of a new submarine-borne "Cormorant" unmanned attack aircraft. The length of the "Cormorant" drone is 5.8 meters.With a wingspan of 4.86 meters, it is an unmanned fighter aircraft that has been reused many times. The "Cormorant" was conceptually designed by the famous Lockheed Martin Skunk Works. Because its entry and exit channels are mainly seawater, the entire aircraft is made of titanium alloy to prevent corrosion. The total take-off weight does not exceed 4 tons, can carry a payload of 453 kilograms, and is mainly used to launch from the strategic missile launcher of the Ohio-class nuclear submarine, and is mainly used to destroy near-coastal targets. The air inlet of the machine is located at the nose of the machine and is shaped like a triangle. Due to the use of titanium alloy, its body is extremely strong and can withstand the pressure of 150 feet of water depth. And in order to prevent external pressure instability, all unnecessary spaces inside the body are filled with special plastic. In order to increase the concealment of flight, its appearance also adopts a complex stealth design. The "Cormorant" is expected to have a maximum flight speed of 880 kilometers/hour, a cruising speed of 550 kilometers/hour, a maximum flight altitude of 10.7 kilometers, a combat radius of 926 kilometers, and a sustainable flight of 3 hours.
②The application of titanium in the navy
The application of titanium in the navy is also very extensive. The main application countries are Soviet/Russian submarines.
"Akula" class attack nuclear submarine: The "Akula" class adopts a drop-shaped, double-hulled hull, with an inner layer made of titanium alloy. Designed by the famous Soviet "Malachite" submarine design bureau and manufactured by the Komsomolsk Shipyard and the Severodvinsk Shipyard
"Sierra" class attack nuclear submarine: Russia's "Sierra" class (also known as S -class) multi-purpose attack nuclear submarine. It can be said to be the most mysterious member of Russia's large nuclear submarine family. Mainly because the "Sierra" class boat uses a titanium alloy double hull. Its large diving depth, high speed, strong firepower and good stealth performance are impressive. But the cost was very expensive, and it was nicknamed "Goldfish". Only 4 ships were built. (See the picture below)
As for the pinnacle of titanium materials on submarines, I still think it should be awarded the Typhoon class: the Soviet Union built a total of 6 "Typhoon" class submarines, and the "Typhoon" was the first of them ship. What's special about the "Typhoon" class is that it has a complete set of independent navigation and combat systems such as torpedoes, missiles, and power units; it adopts a double-shell structure with a reserve buoyancy of about 32%, and there is a gap of more than 3 meters between the two shells. The spacing enhances the ability to withstand underwater explosions and collisions. Each Typhoon-class ship uses about 9,000 tons of titanium, which is equivalent to my country’s current total titanium production in a year! It can be seen how huge the military investment was during the Soviet period
The Soviet Union/Russia also had titanium-hulled nuclear submarines such as the Alpha class, etc., but they have not formed a certain climate, so they will not be described again. In addition to being used on the shell, titanium on submarines is also used on the pipes and condensers of submarines. Now almost all condensers on submarines and surface ships are made of titanium. It can be said that in submarines and ships Within the service life, there is generally no need to replace the titanium condenser. Firstly, it can save maintenance costs, and secondly, the attendance will not be reduced due to condenser failure.Rate.
Due to material prices and output, there are few reports of submarines from other countries using titanium hulls.
The performance of titanium and its alloys is unquestionable. The metallurgical processes of various titanium alloys are also very common for large countries, but they only consider the cost. With the development of the economy, the special requirements of national defense are also able to be guaranteed. Therefore, titanium and its alloys will usher in rapid development in the future civilian and military fields. At the same time, titanium and its alloys will also greatly improve the performance of some special equipment.
Are you talking about the specific business applications of multi-threading?
Think about it, if it is a single thread, and 10,000 people are now accessing a web page, and it takes 1S to execute the same request, is it only the first person who enters that can access it? One has to wait 1S, the third has to wait 2S, and so on. Then everyone else needs to wait for the first person to leave before the next person can visit. This is still in blocking queue mode. Otherwise, you may not be allowed to access directly.
If it is multi-threading, now 10,000 people visit a website, and 1,000 execution threads are opened at the same time. In blocking queue mode. Is it possible to handle simultaneous access by 1,000 people at the same time? Assuming it is all parallel, does it only take 1S for 1,000 people to see the web page, and only 10S for at most 1,000 people to see the web page?
To put it simply, a bucket is 10 liters. Is it faster if I use a 1-liter bucket to pour one liter at a time or 10 1-liter buckets at the same time?
It is used in many fields such as management, statistics and finance, and finance.
Excel is an important part of Microsoft Office suite software. It can process various data, statistical analysis and assist decision-making operations
You don’t need to know that the program execution is successful, but you need to know that the program execution failed. Success is preset.
If you really need to traverse, use vector or deque or list
However, the motherboard is also suspected of being faulty C: memory problem DD:
HRS connectors are used in many fields, such as home appliance industry, mobile phone industry, industrial field, aerospace field, automobile and many other fields.
HRS Agent-Qiao's Electronics-Xiaomeng
It is mainly used to solve various problems in online finance, such as identity verification and transactions. Regarding bottlenecks in confirmation and fund settlement, Wang Yongli still knows a lot about Internet technology.
In which aspect of computer systems is interrupt technology specifically applied? Interrupt refers to a reaction of the CPU to an event that occurs in the system: the CPU suspends the executing program, retains the scene, and automatically transfers to execute the corresponding processing program. After processing the event, it returns to the breakpoint to continue execution. "Interrupt" program
In the computers we use, all hardware needs to perform interrupt request actions. Simply put, its function is to stop the working state of its related hardware. We can give an example from daily life to illustrate. Suppose you are writing a letter to a friend and the phone rings. At this time, you put down the pen in your hand to answer the phone, and then continue writing the letter after the call is over. This example shows the process of interruption and its processing: a phone call allows you to temporarily suspend your current work and deal with more urgent matters - answer the phone, and then return to the phone after finishing the urgent matters. Go back to where you were before. In this example, the phone call can be called an "interrupt request", and your pause in writing to answer the phone is called an "interrupt response", and the process of answering the phone is "interrupt processing". From this we can see that when the computer is executing the program, due to a special situation (or "event"), the system temporarily suspends the current program and switches to execute the program that handles this special event. After completion, return to the interruption point of the original program and continue execution, and this process is called interruption.
The role of interrupts
We can give another example to illustrate the role of interrupts. Suppose a friend comes to visit you, but because you don’t know when he will arrive, you can only wait at the door, so you can’t do anything; but if you install a doorbell at the door, you don’t have to wait at the door and can do other things at home. When a friend comes to work, you ring the doorbell to notify you. Only then do you interrupt your work and open the door, thus avoiding unnecessary waiting. The same goes for computers, such as printing documents. Because the CPU transmits data at a high speed and the printer is slow, if interrupt technology is not used, the CPU will often be in a waiting state, which will make the computer's work efficiency extremely low. After using the interrupt method, the CPU can perform other work while printing, and will only respond temporarily after the current content in the printer buffer has been printed and an interrupt request is issued. The current job is transferred to perform the operation of stopping printing, and then returns to the original program. This greatly improves the efficiency of the computer system.
irq interrupt
There are several types of interrupts in computers. According to the source of the interrupt signal, it can be divided into: hardware interrupt and software interrupt. Hardware interrupts are mostly issued by peripheral devices and computer system controllers, while software interrupts are generally generated by software commands. There are "maskable interrupts" and "unmaskable interrupts" in hardware interrupts. As the name suggests, the maskable interrupt can be decided by the computer according to the needs of the system whether to perform reception processing or delayed processing (i.e., masking), while the non-maskable interrupt directly enables the corresponding interrupt handler.Processing, it cannot and will not be delayed. The irq interrupt is a maskable hardware interrupt. Its full name is interrupt request, which is "interrupt request".
In a computer system, an interrupt controller 8259 or 8259a chip (now this chip is mostly integrated into other chips) controls the interrupt of each hardware in the system. There are currently 16 groups of irqs. Excluding the group of irqs used for bridging, there are actually only 15 groups of irqs available for hardware calls. These irqs have their own recommended configurations.
Assign irq interrupt
The operating systems we use daily have different irq settings, so when installing new hardware, the system often cannot automatically detect the correct irq to assign to the required Called hardware, this will cause the hardware device or the original old hardware to not work properly. In fact, this is because the system automatically assigns the irq of the hardware to other hardware with the same irq, causing a conflict and causing the hardware to not work properly. Generally, if you encounter this situation, you only need to manually adjust the irq configuration of the new and old hardware to solve the problem.
Some commonly used hardware generally has its default irq value. For example, sound cards often use irq5 or 7. Although most of these accessories can work with other irq values, if you encounter particularly "picky" software or games and other programs, such as sound cards that can only recognize irq values 5 or 7, then if you set it to irq9 It's all wasted effort.
Discrete mathematics is used in computer programming
Cybernetics and differential equations are used in electronic technology
Ⅷ This year’s hot blockchain Is it possible for project AOS to enter the top 10 in market value?
I think it is possible
I have been watching this project being developed since 2019. I am more optimistic about several points of this project:
(1) The technical capabilities of this project are excellent, and the original technical team of EOS is coming to work. The specific technical advantages of AOS can be seen on their official website.
(2) This project is coming, a bit like TRON. The road show in South Korea at the end of last year invited the Chief of Staff of the South Korean Army and many members of Congress. It is said that it is currently working with the largest entertainment company in South Korea. The brokerage company has reached a preliminary cooperation intention, and you can watch concerts using AOS in the future.
(3) The scale of the community is quite large. A relatively large user community has been established in many regions around the world, and the user consensus is quite strong.
(4) This public chain project is indeed valuable and has commercial value in many fields. For example, AOS is the world’s fastest private blockchain network that supports smart contracts. The AOS platform supports users to independently issue privacy assets. Any Everyone can issue their own privacy tokens, and for example, based on the AOS network, we can design bothA company option management system that protects privacy and controls default risk. The number of options for each employee is kept confidential, and option redemption is guaranteed by smart contract technology. To sum up, technology, commercialization, operation and promotion, and community scale are all very good. This is why I am optimistic about AOS.
Ⅸ The relationship between technology and thought
Technology and thought have something in common. Both technology and thought belong to the category of culture, and both can react on practice. But the two have different focuses.
You see, there are more than a dozen Aegis-class ships in the United States that have been retired. How many of ours are in service? Our aircraft carriers are not yet at the technical level of the old American Kitty Hawk in the 1970s
Let’s look at the things that are not so easy to see, such as the armor-piercing bombs that the media has been talking about all day long, what can penetrate a 1-meter steel plate, and the use of new materials
/>You can take a look at the declassified materials from the United States. In 1968, the Army conducted a test report on armor-piercing materials. You will find that the technologies for making bullet cores made of different density materials that we broke through around 2010 were all researched 50 years ago.
It is said that the navy is a dumpling, but at the height of the Cold War, the United States was a nuclear submarine. 6 ships are produced at a time, with an average of 2.2 ships in service per year
No way, this is the gap
Moore’s Law only applies to the electronics industry, the mechanical field still relies on accumulation
- 上一篇: 络谱区块链登记开放平台是由什么研发的,区块链流览器
- 下一篇: 区块链众泰汽车股票,众泰车联网官方网站