排序方式: 共有31条查询结果,搜索用时 15 毫秒
1.
作为税收体制改革的深化,为进一步规范政府收入行为,强化以税收方式参与国民收入分配和再分配的力度,弱化规费收入的作用,国家将实行“费改税”的改革,除允许地方政府保留必要的规费收入外,将适时开征一些新的税收。本文力图对目前地方政策性投融资的基本状况进行较为全面的剖析,并以此为基础,探索社会主义市场经济体制下,构建地方政策性投融资体系,以为地方政府部门决策提供新的思路。 相似文献
2.
介绍创建一个多用户分布式虚拟海洋战场环境系统的相关理论和技术。该系统采用客户-服务器的通信模式和TCP传输协议实现了客户端和服务器端之间的通信,采用基于图形与图象混合建模和绘制技术实现了虚拟海洋战场环境构造。最后给出了该系统实现的软、硬件平台和实验结果。 相似文献
3.
This paper presents a detail analysis of two bandwidth packing algorithms, used for processing connection requests in the centralized wireless network. Each call comes with a specific bandwidth request. A request can be satisfied only if there is sufficient bandwidth available during resource scheduling and allocation. Unsatisfied requests were held in a queue. The metric of bandwidth utilization ratio was used to quantify the performance of our algorithms. By theoretical analysis, our algorithms can improve the average bandwidth usage ratio significantly, about 8%~10% without adding much computation complexity. Moreover, our algorithms outperform next fit with fragmentation (NFF) algorithm when the bandwidth resource is scarce. In this paper, the contributions follows: Introducing bandwidth packing problem into wireless network; Proposing two new bandwidth packing algorithms for wireless network where the complicate scheduling algorithms are prohibited; Studying the average performance of our algorithms mathematically, which agree well with the simulation results. 相似文献
4.
介绍了双信号台测向定位中利用牛顿迭代法进行概位修正的方法,分析了牛顿迭代法对概位修正误差的消除过程。仿真结果表明:在满足舰船导航精度要求下,牛顿迭代法的迭代次数少,且误差很小,达到了概位修正的要求。 相似文献
5.
AbstractCopy deterrence is a digital watermarking application which enables a seller to identify the buyers who obtain digital content legally but illegally redistribute it. However, in many buyer-seller watermarking protocols proposed for copy deterrence, the seller has to embed two watermarks into each copy of the digital content before it is sold. In this paper, we propose a new buyer-seller watermarking protocol in which the seller can reduce the number of the embedded watermarks from two to one. The proposed protocol also provides a more efficient solution to the unbinding problem than that of Lei et al’s scheme. 相似文献
6.
7.
通过对通信对抗无人机对海上目标的超短波通信的干扰效能分析,得知在一般情况下,无人机的干扰功率只要大于0.416W就能进行有效干扰。通过与无人机对陆地目标的超短波通信干扰效能的比较分析,结果表明,在相同的电台通信距离,相同的干扰效果的情况下,无人机对海上舰舰超短波通信电台实施有效干扰的距离小于对陆地上车车超短波通信电台实施有效干扰的距离。 相似文献
8.
9.
文中结合南海海区概况和亚运赛事活动,分析了该海区海上救助力量的现状和存在问题,并提出了提高海上救助能力的几点建议。 相似文献
10.
AbstractA buyer-seller watermarking protocol is a combination of traditional watermarking and fingerprinting techniques. Recently, Frattolillo proposed such a watermarking protocol suitable for web context. Frattolillo’s scheme has two problems which would make it hard to implement practically. Several possible solutions to the two problems are presented in this paper. 相似文献