Saturday, April 30, 2011

Introduce for young and old mild fitness

Many people have such experience, run a fitness club in card, results of only a few times a year; Originally agreed and friends to practice pilates, because social parties, fixed sports and will miss; Weekend about good and friends meet, but temporary work overtime pitch but had to fail...
In fact, you need not guilt or regret, because this is not necessarily the well-equipped health movement in sports sites run and dancing, as long as intentional, ordinary life and the work of a bit habits can also have very good exercise the effect.
What is a moderate exercise
In recent years, experts put forward new ideas moderate exercise, moderate exercise is a kind of low intensity, low energy consumption, also called "movement patterns," moderate exercise. The so-called moderate, is about 2000 kilocalorie heat energy expenditure per week workout, that is 2 ~ 3 hours playing table tennis, apportioned to each day, about as long as the cumulative equivalent to half an hour of moderate exercise activity, and these activity can come very simple, below the bus, quick walk fifteen minutes go home, to do 20 minutes of other physical activity is enough.
Moderate exercise can adjust the mood, dissolve bad mood, has the catharsis function, can release inner depressive, forget worry, also can bring physical pleasure.
Continuously and proper movement can be uplifting, because such exercise prompts the brain to secrete more psychological "happy meal". Conversely, bitterly, excessive movement will make catecholamine and promote adrenal cortical hormone secretion increased, make blood T lymphocytes reduce B lymphocytes and restrain the biological activity and reduce the immune function.
Therefore, the human body after motion easily fatigue overload, even aggravating already disease condition. Excessive movement obviously adverse to the body. Also has a lot of people just in time or when the mood only occasionally do sports this once in a while, "movement" of health is useless, it's very easy to destroy the body's normal metabolism process, even can aggravate wear, cause life organ shorter.
Simple moderate exercise
How to grasp the appropriate amount "moderate exercise"? At present more recognized and easy criteria is: to take exercise every time after, feel excessive fatigue as appropriate. Also can use pulse and heartbeat frequency as the index, if exercise, heart rate and exercise sensor quickly. For normal adult per minute amounts and heart rate increased to 140 times advisable; The elderly per minute amounts and increased to 120 times advisable. 

Infrared transmission

Basically is same with bluetooth infrared transmission, but the infinite bandwidth different use. The principle is to use visual infrared spectra of invisible red outside light, so because infrared is also a kind of light, so it also has the characteristics of light, it cannot through opaque objects. Not because we can't see, it says it is not infrared exist around, we live in is filled with infrared light, it may be issued from the sun light, may also send, users do not need to use license namely can use infrared light. For example, Slow speed infrared (IR) used in the TV remote control there has been quite a long time, others like video, sound and other remote control is also; TV remote will particular signal encoding, then through infrared communication technology will coding send (usually you can see remote signal light once), and set the infrared receiver on TV, after receiving the coding decode and get the original signal; For example, the solution of the signal to television, the decoder for increasing volume after the action that will increase the volume. Low-speed infrared refers to the transmission rate per second for those in Kbits taller, it applies to transmit short message, text, or files. A low-speed infrared also have high-speed infrared (IR), it is making in the transmission rate per second means for those 4Mbits 1 or other higher transmission rate is still developing. For network solutions to say is concerned, high-speed infrared its foundation, including the file transfer, local area network links even multimedia transmission.
If use on the network? Infrared network applicable to such as the environment of the classroom, or small, enclosed area. For exquisite information security people, infrared network may be a good choice, because it could not penetrate walls transmission, bits of the building will be impossible to outside to distribute in direct intercepted the infrared signal within the building. But relatively, this also ─ ─ constitutes its shortcomings extremely vulnerable to wall infrared transmission of obstacles. On the other hand, infrared is also a kind of low cost wireless transmission form. Line of Sight infrared (letter) - like lasers - a straight Line, because the data transfer form on straight forward movement way, if transmission without any obstacles, then the data transmission can say quite quickly and has efficiency, because infrared also is a kind of light, so it going for the speed of light. But like sun's rays, infrared cannot penetrate walls or large object, therefore, in data transceiver ends of mutual alignment (i.e. to can see each other) to communicate, the mobile communication may often mobile location concerned, the situation is very adverse, and vulnerable to rain, snow or the fog of interference. 

RADIUS(Remote Authentication Dial In User Service)

RADIUS:Remote Authentication Dial In User Service,the remote user authentication system, RFC2865 dial-up by RFC2866 definition, at present, it is the most widely used AAA agreement.
introduction
RADIUS is a kind of C/S structure of agreement, its client first is NAS (asp.net Access Server) Server, now any operation RADIUS client software computer can become the RADIUS of the client. Authentication mechanism flexible RADIUS agreement, can use PAP, CHAP or Unix login the authentication and so on many kinds of ways. RADIUS is a scalable agreement, all the work it is based on the Attribute - Length - Value. The vector RADIUS also support vendors expand manufacturer proprietary attributes.
Because, simple RADIUS agreement can be expanded, so it has been widely used, including ordinary phone Internet, ADSL, community broadband Internet, IP telephone, VPDN Dialup grow independently, to order the Virtual Private based on dial-up subscribers dial-up Internet business), mobile phone prepaid services. Recently proposed IEEE standard 802.1 x, this is a kind of standard, based on port for wireless network access authentication when authentication, in also USES RADIUS agreement.
history
Livingston is initially RADIUS agreement by the company to put forward, the original aim for the dial-up users authentication and billing. Then after many improvements, forming a general certification billing agreements.
Founded in 1966, Inc. Is a Merit of the university of Michigan, a nonprofit company, its business operation and maintenance of the school MichNet Network connections. In 1987, the Merit in American NSF (national science foundation) won the bid NSFnet (i.e., won the operation of Internet predecessor) contract. Because NSFnet is based on IP networks, but MichNet based on proprietary network protocol, but how will MichNet Merit faced the proprietary network protocol evolution for IP, also want to put a large amount of MichNet dial-up business and its relevant proprietary protocol transplanted into IP network up.
In 1991, Merit decided to tender dial-up server vendors, a few months later, a company called Livingston company, some Suggestions for named RADIUS, won the contract.
In 1992, the IETF NASREQ working group in autumn, then was submitted a draft RADIUS as. Soon, RADIUS become in fact network access to the standard, almost all the network access server vendors are realized this agreement.
In 1997, RFC2058 published, followed by the RADIUS RADIUS RFC2865 RFC2138, the latest published in June 2000.
Basic working principle
User Access NAS, NAS to RADIUS server use Access - Require user information, including packets submit username, password and other related information, including through MD5 encryption user password is used, both sides share of keys, the key not pass through network dissemination; RADIUS server user name and password legitimacy for inspection, necessary to put forward a Challenge to the user, asked for further authentication, also can do the same for NAS authentication; If so, give NAS packets, Accept returns Access - allow users to undertake next work, or return to Access - Reject data packets, refused to user Access; If allowed to visit, NAS proposed RADIUS server Account - Require, billing request RADIUS server respond to user Account - Accept, the billing began, and users can conducted their own related operations.
RADIUS also support the agency and roaming function. Say simply, the acting is a server, can serve as other RADIUS server, responsible for forwarding agency of authentication and billing packet RADIUS. The so-called roaming function, is a concrete realization of agency that can let users through original and its irrelevant RADIUS server user authentication, located to the attribution operators can also get service, also can achieve virtual operation.
RADIUS server and NAS servers communicate via the UDP protocol, RADIUS server for the authentication, 1813 port 1812 responsible billing work. Port The basic consideration by UDP mostly because NAS and RADIUS server in the same LAN, use the UDP more convenient and UDP is connectionless RADIUS of pressure, can reduce the and better safety.
RADIUS agreement also provides retransmission mechanism. If NAS to a certain RADIUS server submission requests received no return information, so may require backup RADIUS service valued preach. With multiple backup RADIUS server, so NAS for retransmission, can use polling methods. If backup RADIUS server keys and former RADIUS server key is different, need to to be certified.

Running new tricks healthy and natural

Hand run is good for health
American fitness experts recently designed a new exercise -- "hand", is to "run for center hand" the fitness activities. Research thinks, "hand run" ineffective and particularly suited to ability to elderly, disabled or not only can play and jogging the same fitness effect, but also to control the common old people, arthritis and tennis elbow, periarthritis such diseases. Hand ran form varied, fitness person can lay on the grass, beaches or cushion for, of course, can also be lying in bed. Supine body, your arms upward unbend, activities, shaking finger outstretched arm elbows, such as wrist, the purpose is to promote blood circulation, make the whole arm all joints can activities open.
The rain ran brain strong body
According to medical meteorological department research thinks, a drizzle jogging has many sunny jogging incomparable care role. A plush drizzle, not only can make the tree more green, grass green, road more more clean, and can eliminate the dust, let air cleaner, more pure and fresh. In addition, the drizzle, dripped of anion, produced when a "air vitamin" reputation, can relax nerve, lower blood pressure, strengthen metabolism.
So American sports expert points out, the rain jogging can not only more health body, or a good brain activity, which is beneficial to the brain by stress tend quiet, namely people often say psychological and spiritual regulation. Accept the rain shower massage and compelling vibration, both refreshing body, fatigue and depressed bolton away, promote the body on the outside environment change adapt to, to prevent a cold, enhance their resistance, is helpful.
Water ran can lose weight
Kinematics experts say: water resistance is 12 times of air resistance in the water ran 45 minutes on land that is run 2 hours. Therefore, in the water run is a more effective doing aerobics. People who want to lose some weight not only can purify water jogging in abdominal redundant adipose, but also can make double leg becomes slender. The water jogging should be gradual, in water for 5 minutes, jogging heart rate shall not exceed 130 times per minute, and 11 - to rest and exercise two states of alternating advisable.
Do water jogging, when the body should be vertical suspended in deep waters, and the nostril slightly higher than the surface, the limbs of fierce row, some as best as the ducks flopped about water. 

Friday, April 29, 2011

Elliptical Machine

If you have been to the gym or fitness club, will find Elliptical Machine (Elliptical Machine) has been popular. These low intensity exercise equipment can provide the cardiovascular system fitness training and comprehensive in the groin muscle exercise. Elliptical machine equipped with arms, can even exercise rocker upper muscle, forming a complete set of training system.
Elliptical machine is also called elliptic training machine or cross-training machine, combined with all kinds of the most popular household fitness equipment training action. "Ellipse" this word comes from pedaling motion of elliptic shape, this is a treadmill, climb stairs, cycling, skiing part of the unity of the movement devices. Elliptical machine can let you in the machine when motion, as in the ski machine that slide, also can simply adjust a foot pedal add slope, thereby gaining more like climbing stairs or ride a bicycle cadence feeling.
Elliptical machine to become one of the main reasons is its function is various. Any routine training after a period of repeat after will become boring, therefore, training instrument, the higher the flexibility to change you will get more exercise way, thus not lose exercise interest. Besides like gymnastical bicycle that can change the resistance, elliptical machine are also equipped with outside pedal, can like crossing treadmill that regulate gradient. Elliptical machine equipped with double rocker armrest can be used to exercise the upper part of the body, you can also completely ignore them and focus on private parts or exercise, or for an aerobic training. Elliptical machine also has the function of backward motion, thus crushed enables you to exercise different lower limb muscle group. Elliptical machines have primary mode training, can automatically change resistance and slope, also can combine the push-pull boom to back pedal alternating movement forward. This kind of family fitness equipment can offer many kinds of exercise, let you actively achieve fitness goals.
However, if you are using elliptical machine, your foot on the pedal will keep place state, so your back, hip or joint won't force. This means that although elliptic function provides the high strength training, but its athletic intensity but with uninterrupted walking strength almost. So, for those who seriously overweight, back or joint pain of the people, elliptical machine is a kind of very appropriate family fitness products. 

Rfid technology introduction

RFID(Radio Frequency Identification) from the 1980s a mature automatic identification technology. Due to the large scale integrated circuit technology maturity, the volume of the radio frequency identification system, and consequently before considerably reduced the stage to the practical application. It USES rf manner non-contact two-way communication, achieves the recognition of purpose and exchange data. It and earlier or early contact recognition technology different, the RFID system is the rf CARDS and literacy can be completed without contact between identification. So it can be in more extensive application of the occasion.
The typical rfid system includes two parts: they are rf card, reading and writing implement.
Rf card of several main module integration to a chip, complete with reading and writing implement communication, chip memory parts used to store the identification number or other data: memory capacity from a few bits to dozens of 1000 bits. Chip peripheral only connection antenna (and battery), can be used as the identity card or personnel goods identification card. Card encapsulation can have different forms, such as common credit card pour circles and forms of the form etc. And bar code, the same magnetic card or IC card or early identification technology, rf card compared with non-contact, long distance, suitable for bad work environment, can identify target motion, etc.
In most RFID system, reading and writing in - a region is formed energy is emitted depends on electromagnetic field, regional work frequency and antenna size. Rf CARDS after this area for signal detection to start reading through information and sending stored data. Literacy is usually provides a signal sent by a clock signal and rf card required enough energy, one of the clock signal make data synchronization, which simplifies the design of the system. Reading and writing implement receives card data error decoding and, after checking to decide data validity, then through RS232, RS422, RS485 or wireless means to send data to a computer network. Simple RFID products is a contactless IC card, and complex RFID products can and external sensor interface connection to measure and record the different parameters or even connect with GPS system to track objects.
Should say barcode, magnetic card, IC card, rf CARDS recognition technology has its own advantages and disadvantages, suitable for application occasion. 

SSL VPN

The SSL VPN is to solve the remote users access to sensitive company data the simplest the safe treatment technologies. Compared with complex IPSec VPN, SSL through the easy-to-use methods to realize information remote connectivity. Any installation browser machine can use SSL VPN, this is because the SSL embedded in the browser, it does not require IPSec VPN as traditional as per a client to install client software.
SSL introduces
SSL (Secure Sockets Layer) is developed by Netscape one set of Internet data security agreement, the current version for 3.0. It has been widely used in between Web browser and server the identity authentication and encryption data transmission. SSL protocol is located in the TCP/IP protocol and various application layer protocol for data communications between provide security support. SSL Protocol can be divided into two layers: SSL Record Protocol (SSL Protocol) : it establish Record in reliable transfer Protocol (such as TCP) above, for high-rise protocols that provide the data package, compression, encryption basic function such as support. SSL Protocol Handshake Handshake agreement (SSL) : it is based in SSL record above used in actual agreement before the start of the data transmission, telecommunications identity authentication, the parties hereto negotiate encryption algorithm, exchange encryption keys, etc.
VPN introduces
VPN(Virtual Private Network) we can take it as a virtual out of understanding enterprise internal special line. It can through the special encrypted communication protocols of the Internet on the connection in the different places of the between two or more Intranet to build a proprietary lines of communication is analogous to set up a special line the same, but it doesn't need to really laid the physical lines such as fiber optic cable. This is like to apply for special line, but no service to the charge, also laying lines without buying router etc hardware devices. VPN technology were router has one of the most important technologies, currently in switches, firewall equipment or Windows 2000 software also support VPN function, in a word, the core of the VPN using public network is established in virtual private network.
Virtual private network (VPN) is defined as through a public network (usually Internet) to establish a temporary, safety of connections, is a path through the chaos safe and stable public network of tunnels. Virtual private network is to enterprise company branch, business partners and suppliers with company Intranet establish reliable safety connection, and ensure the safety of data transmission.
Virtual private network can be used for growing mobile users global Internet access, in order to achieve safety connection; Can be used to achieve enterprise web site secure communications between virtual private line, used for economic effectively connected to commercial partners and the safety of users outside networking virtual private network. Below we combining site about cisco and Microsoft about VPN articles introduce this aspect of information, more abundant related aspects we will later day added.
In view of the different user requirements, VPN has three solutions: remote Access this (Access VPN), the enterprise internal this (Intranet VPN) and enterprises expand this (Extranet VPN), the three types of VPN respectively with the traditional remote Access network, enterprise internal Intranet and enterprise nets and related partnership enterprise nets that form the Extranet (external expansion) corresponds.
At present many units are facing this challenge: branch, dealers, partners and customers and away on business personnel demand immediate after public nets visit our resources, these resources include: the company's internal material, office OA, ERP system, CRM system, project management system, etc. Now many company IPSec VPN to ensure through use of corporate and branches and mobile staff safety connection between.
For many IPSec VPN users, IPSec VPN solutions of high cost and complex structure is very headache. Exist the fact that, in deploy and use software and hardware client, need a lot of evaluation, deployment, training, upgrades and support, for users, these whether in economic and technology is a great burden, the remote solutions and expensive internal application combined to any IT professionals, IT is a serious challenge. IPSec VPN due to the above limitations, a lot of enterprises are think IPSec VPN is a high cost and the complex degree high, even a cannot the implementation scheme. To remain competitive, eliminate the enterprise internal information island, many companies need with related enterprise in different between individuals and organizations to deliver a message, so many companies need to find an implementation is simple, do not need to change the existing network structure, operation cost is low solutions. 

Thursday, April 28, 2011

Dumbbell exercise the muscle the best method

Dumbbell is one of the important instrument bodybuilding training. It is like a hammer and chisel, can sculpture body every muscle. As long as there is vice dumbbell and a bench, you can follow one's inclinations, undertake various bodybuilding training. With a pair of dumbbell introduces below the practice all over your body method.
1, lower back, compared with barbells can reduce the lifting of the spine of pressure. Besides, with the dumbbell made action also more comfortable. If use dumbbell made straight leg dragged practice, also can effective developed biceps.
2, little legs: department, holding the dumbbell made single leg lift heel practice, than with crus machine training effect is good. Also on board KeJiao former palm on his knees, dumbbell single leg or legs sit-down lift heel practice.
3, compared with barbells back: with one or two dumbbell do to practice (single arm bent rowing back is much safer) can make back muscle growth faster. Single arm dumbbell row has been Mr Seven-time winner lee haney Olympia payale practice, not only can exercise back before chest muscle, and saw the back sides can developed muscle.
4, chest: supine on the bench, PingWo, with dumbbell do on the inclined pushed and pushed, than with barbells do more conducive to muscle growth, because it can deeply and widely stimulating muscles. Usable also dumbbell do multi-angle birds in practice, various parts of chest muscle development. A good way to practice is finished a group of dumbbell made immediately after birds, a group of dumbbell lie nominate practice. Such practice not only effect is good, but also can reduce the shoulder burden, avoid sports injury.
5, shoulder: various forms of dumbbell exercise can develop the shoulder muscles. For instance, with dumbbell do side to lift, former smooth lift and practice to develop shoulder birds leaned over the deltoid muscle in the bunch, bravery beam and after beam. Development trapezius muscle can use dumbbell shrug or around the ring practice.
6, biceps: dumbbell curved heave is many strong and handsome champion biceps muscle to practice "peak" a best practice. The dumbbell bent for different way can make the upper arm more stout, and seen from behind block separation, clear outstanding.
7, triceps: robot arms with dumbbell do neck flexion or after practice, can make arms developed into horseshoe-shaped like triceps. When practicing as far as possible will be lower, with dumbbells to strengthen training effect.
8 and the forearm: dumbbell is resting wrist curved heave can develop forearm inside muscle group; Development outside muscle group responded with a forearm and wrist bent for the grip.
9, thigh: heel pad small boards dumbbell weight squats practice, can develop quadriceps muscle. If lie in long benches feet to clip dumbbell do practice, then can bend for developing biceps. Still can do dumbbell cut squat.
10, abdomen: supine, will receive an abdomen sit since Dido dumbbells, abdominal muscle practice; To receive an abdomen, i.e., lift a leg (fixed) can practice next abdomen muscles.
Strong has been on home - dumbbell family training plan
In the home can create the gym trained body, like couples dumbbell and bench in front as easy to follow, as long as the reference we introduce below a Wednesday days training plan.
Visit you stations around the fitness center may be a exasperating experience: before we leave to prepare all kinds of things, before you arrive in dealing with traffic jams at the front desk, then is waiting for testing the membership card, this had half hour, you can even warm-up has not started yet. It is not consider your training partner would meet the same question to be late, so, your training will also be postponed. That if counting in Smith before waiting time machine?...
As a result, you haven't had the time as they wish begin his training plan. But, it may be as the surrounding no one disturb, you will have the best state. Just yourself, all familiar wall, a training stool, and some dumbbell and hot fitness enthusiasm.
We've made your planning a training plan on Wednesday days, only the necessary equipment: a pair of adjustable weight dumbbell and adjustable Angle training stool. In the first two weeks of training, the concern is power, each group keep 6 ~ 8 times and the rest time control in 1 1/2 to 2 minutes. In subsequent stages, you will increase to 12 times to get the maximum growth speed muscles, therefore, the rest time does not exceed 1 minute.
In the house there is no high drop-down combination instrument? No problem. No posture lift heel machine? We have for you to solve. We have considered the more questions, if you charge to the visiting guests membership fee went (a joke).
Torre robot bend inclined dumbbells heave
(alternative action: the curved lever request lift)
Start: adjusting the bench to 45 degrees or higher. Hands dumbbell, will armpit, upper arm on stools vertex place just on back of a chair. Elbow bend slightly.
Action: the contraction biceps will raise as much as possible, the dumbbells left back to avoid the elbow. At a peak extrusion biceps then slowly back to the initial position. A big arms fully extended.
Wide grip dumbbell upright boating
(alternative action: wide grip barbells upright boating)
Start: erect, wide grip dumbbell, dumbbell hands in front of your body, hold out a bosom, two shoulders on both sides after zhang.
Action: improve dumbbell to shoulder height, elbow higher than hand back to the initial position, peak contraction.
Posture dumbbell lift heel
(alternative action: posture lift heel machine)
Start: knee bends sitting at the end of the bench, tiptoe on a piece of wood (or some can provide stable objects) about 4 ~ 6 centimeters tall can let guarantee your knee free from top to bottom. Will the dumbbells, keep a slight thigh to put on the dumbbell grip.
Action: slowly to the ground reduces knee, until you feel the stretch calf muscles, upward dumbbell, before the calf muscles reply extrusion do peak contraction.
ZhiBei to pull the
(alternative action: ZhiBei cable dropdown)
Start: hold good dumbbell, palm and backward back unbend, knee bends, exercise with the ground, the other arm vertical ahold to support a thigh.
Action: keep arm as far as possible as straight, shrinking latissimus muscle, keep a moment to stay above the back along the path back to slowly again initial position. The opposite side versa. 

Embedded Processor

Embedded processor is the core of the embedded system is control of the system operation, the auxiliary hardware unit. Range extremely broad, from initial 4 processor, are still at large scale application 8-bit microcontroller, the latest widely favored 32-bit, 64-bit embedded CPU.
Embedded processor
Now the world has embedded function characteristics processor has more than 10 kinds, popular architecture including MCU, MPU and so on more than 30 series. In view of the embedded system wide development prospects, many semiconductor manufacturers are embedded processors, and mass production the company independent design processors have also become a trend of future embedded fields, including from MCU, DSP to FPGA had assorted varieties, faster, performance is more and more strong, the price also more and more low. Present embedded processor addressing space can from 64kB to 16MB processing speed fastest, can achieve 2000 the MIPS, encapsulation from 8 pins to 144 ranging from pins.
classification
According to the current situation, embedded processor can be divided into the following several categories:
Embedded microcontroller processor
Micro Processor embedded microcontroller Processor (MPU) Unit,
Embedded microcontroller processor is by general computer evolved from the CPU. Its characteristic is a 32-bit processor, has high above the performance, of course, the price also corresponding higher. But with computer processor is different, in actual embedded application, retain only and the function of embedded application, closely related to remove the other hardware part redundancy function, thus to the lowest power consumption and resources to achieve the special requirements of embedded application. And industrial control computer embedded microcontroller processor, compared with small volume, light weight, low cost, high reliability advantages. At present the main embedded processor types have Am186/88, 386EX, SC - 400, Power PC, 68000, the MIPS, ARM/StrongARM series, etc. One Arm/StrongArm is designed for handheld devices development embedded microprocessors, belong to middle-grade price.
Embedded microcontroller controller
Embedded Microcontroller controller Unit (MCU), Microcontroller
The typical representative of embedded microcontroller controller is a single-chip microcomputer, from the late 1970s microcontroller appear to today, although has over 20 years of history, but the eight electronic components currently in embedded devices are still extremely extensive application. Single-chip microcomputer chip inside integrated ROM/an EPROM, RAM, bus, the bus logic, timing/counters, the watchdog, the I/O and serial port, pulse width modulation output, A/D and D/A, Flash RAM, EEPROM, etc. Various kinds of necessary function and peripherals. Compared with embedded microcontroller processor, the biggest characteristic is to micro controller using a single chip, much smaller, so that power consumption and cost reduction, reliability. Micro controller is present embedded system industrial mainstream. Micro controller of peripherals resources is compared commonly is rich, suitable for control, thus says micro controller.
Due to the low price, high MCU, so have the function of the varieties and number and more representative including the 8051, MCS - 251, MCS - 96/196 / P51XA, C166/296, 68K series and MCU 167, 8XC930/931, C540, C541, and support the I2C Bus, LCD, CAN - and numerous special MCU and compatible series. Now accounts for about 70% of MCU embedded system of market share. Atmel produce of Avr microcontroller lately because of its integrated devices such as the FPGA, so the high ratio of performance to price which will promote the development of microcontroller higher. 

Internet Key Exchange protocol (IKE)

Internet Key Exchange protocol (IKE) is used for exchange and management for use in the VPN encryption key. So far, it is still a security flaw. Based on the agreement of the important practical significance, a brief introduction to the work of its mechanisms and security analysis is carried out; for the attacks and DoS attacks against the middleman, the corresponding correction method; also the main mode pre-shared key authentication method put forward new proposals; Finally, it two trends: JFK and IKEv2. Internet Key Exchange (IKE) to solve the network in a secure environment (such as the Internet) to create or update in the safe sharing of key issues. IKE is a very general agreement, not only for the IPsec security association negotiation, but also for SNMPv3, RIPv2, OSPFv2 and any other requirements of confidentiality agreements negotiate security parameters.
 
IKE is a hybrid protocol, the Internet Security Association and Key Management Protocol (ISAKMP) and two OAKLEY key exchange protocol with SKEME composition. ISAKMP IKE to create the framework defined by, and follows the OAKLEY key exchange mode and SKEME sharing and key update technology, but also defines its own way of two key exchange: main mode and active mode.

Barbells practice increase muscle mass

Want to increase muscle mass, barbells practice is the most important, most basic exercises.
Force beauty health to coach division senior guidance suggestion beginners will barbells practice in the first step, because barbells practice action amplitude was relatively small, so must from different angles on the inclined and (holding), use different from a stimulus to the entire chest muscles.
Relatively simple safety practice method is flat barbells and triceps-act, can effectively exercise the chest, increasing the thickness. First flat on lie push stool, naturally on the ground and feet before and then adjust the body position, make the eye is located directly and triceps-act to rack the barbell.
Hold a wide, from par and triceps-act to take off from shelves barbell, slow down the barbell brachial and ground parallel, until now. So repeated practice three or four groups and each group about 12 to 15 times its European, specific depending on individual body condition. Skilled, can do after the barbells, key exercise and triceps-act under the chest muscles, operation difficulty slightly strengthened.
Dumbbell --, chest muscle width
Dumbbell exercise requires practice more than the barbell balance and the coordinated ability to control weight, its action to a larger extent, therefore can stretch muscles, practice broad mind. Usually there are two kind of training action, flat dumbbell lie push and flat dumbbell bird.
The former is flat on training each hand stool, holding dumbbell. Straight up, arms, will dumbbell, slow down palm relative brachial and ground parallel until the dumbbells, then push up so far back to start posture, so dumbbells repetitive.
The so-called dumbbell bird is flat on training stool, lift on each hand hold dumbbell, palm, open arms, relative to the sides of its body along the arc trajectory slow down dumbbell, parallel to ground until upper arm, and then return to the way so far. Two groups of sports should pay attention to in the process of pushing, ensure the vertical pushing up dumbbell, don't skewed.
To coach remind beginners had better get someone aside protection, avoid action does not coordinate damage muscles. Dumbbell practice still have an advantage, is that it can anytime, anywhere can undertake, to coach at home can also suggested ordinary practicing in front of a mirror, one side can correct action, one side can enjoy their exercise results. 

Wednesday, April 27, 2011

Three fitness equipment winter fitness are the most popular

Fitness is a kind of sports, especially a including unarmed or use instrument gymnastics, gymnastics can enhance strength, flexibility, increase stamina and improve coordination, strengthen body parts control ability, so as to keep fit, fitness have the effect, is to be after a period of exercise, can get recognized. Peace health network all aspects you introduced the most detailed fitness information.
Winter cold climates, easy to make because if colds are aerobic exercise, can effectively enhance the immunity. But winter fitness cannot overnight, good family fitness coach specially suitable for citizens to recommend three winter exercise fitness equipment.
Indoor cycling: indoor cycling sport intensity is great, the quantity of heat that use up the most, and entertaining and participation are stronger, not only can increase the movement of fun, can still improve cardiovascular function of abdomen and legs, the shape of the areas such as well. Change
The treadmill: the treadmill is people familiar with and common an aerobic exercise program, it can effectively improve the human body of cardiorespiratory fitness and physical qualities, both men and women, in view of the waist, brachial ministry reduce fat effect are obvious, and operate up very simple.
Rowing machine: rowing machine is a kind of very new aerobic exercise program, and the treadmill, in addition to improve human compared the cardiopulmonary and physical qualities, but also suitable for fitness person upper back and the movement, the two areas reduce fat effect is good. 

MHP(Multimedia Home Platform)

MHP(Multimedia Home Platform) is formulated by DVB alliance a standard. As one of the projects, DVB it began in 1997. The DVB - MHP not only covers application programming interface (API, and included family digital network (IHDN) and local clusters, its purpose is to standardization family platform, the successful applications for future interactive multimedia is essential. It also can be regarded as a broadcast work to interactive DVB pure natural upgrade, the TV application from analog TV business promotes the digital TV transition to television.
Development history
Multimedia family platform (MHP), which is called by a proposed the European organization, whose aim is to develop a variety of digital multimedia services can access the common platform.
In 1993 the interactive platform in digital TV on this project;
In 1997, was listed in DVB plan
In July 1998 from Java virtual machine technology is added to the MHP kernel;
February 2000 Steering Board (EIGT Steering committee) the 28th congress approved in MHP1.0 standard; add DVB
In July 2000 MHP1.0 become ETSI standards TS101 689; series of
In April 2001 MHP1.0.1 consistency test and DVB release version, DVB and ETSI center document management agreement reached MHP. MHP expert group began to develop the MHP Test Suite;
In October 2001 MHP1.0.1 for TS101 689 released ETSI V1.1.2;
November 2001 for MHP1. 1 released ETSI TS101 689 V1.1.1
2002 April Finland became the world's first through the use of MHP to achieve wireless pickupstation interactive services country;
November 2002 Streering CableLabs OCAP (Board through the comcast interactive services laboratory of the cable TV industry standard) and make the software GEM (Globally Executable MHP) in the first version;
December 2002 1.0.2 DVB through MHP Test Suite b --? The first complete MHP test kit:
January 2003 TS102 GEM for standards issued by ETS 819;
April 2003 MHP1.1.1 MHP1.0.3, DVB approval and submit to give ETSI, respectively TS101 as standard 812V1. 812V1. TS102 3.1 and standards standardized work; 2.1
June 2003 DTV standard ARIB (Japan) was in Japan's data broadcast based on the application of GEM accept environment;
In July 2003, ETSI approved release ES201 689 V1.1.1 (a standard the MHP standard version) ETSI for their opinion.
Technical characteristics
MHP mainly defines STB middleware the overall structure, transfer protocol, content formats, Java virtual machine and APIs, DVB - J safety, each layer application state and details, performance, application of automatic startup, and also define the special application signaling.
framework
MHP is defined into three layers: resources layer, system software layer and the application layer. The typical resources include: MPEG processing, layer I/O devices, CPU, storage and graphics system. System software layer of abstraction to application layer provides a visual platform, conducting an application manager (also called navigator) to manage MHP and application of MHP.
kernel
The MHP of system software, the core part -- is essentially a middleware, and other middleware is different, MHP middleware is not a private middleware, which is an open, unity of middleware. MHP standard just define some apis interface, it gives no method of realizing MHP, therefore, realize the concrete scheme MHP mainly by middleware vendors and STB manufacturer are given.
Many package provides the platform used API. Only through these designated application MHP the API access platform. In the designated with underlying resources and API between need a mapping software system.
MHP built on the basis of DVB - J. Mircosystems DVB - J including Sum of Java virtual machine company. 

Digital Envelopes

PKCS# 7 will digital envelopes as defined in terms of text, and to make the following interpretation: digital envelope contains encrypted content and encrypted for encryption this content key. Although often use the recipient's public key encryption keys to encrypt ", "but this is not necessary, can also use the sender and the receiver Shared symmetric key gets to encryption. When the recipient receive digital envelopes, first gets with your private key or decryption, get "Shared key encryption keys", again use this key unlock, original for.
Detailed information
Application and application methods
Digital envelopes are public-key cryptosystem in actually of an application, are using encryption techniques to ensure that only the specific provisions of the recipient can read communication content.
In digital envelope, information sender use semmetry key to encrypt information content, then will the symmetry with the recipient's key public-key encryption (this part to call the number envelope), will it and after together encrypted information sent to the recipient, receiving FangXianYong corresponding private key open digital envelopes, get symmetric key, then use the symmetric key unlock encrypted information. This technology security quite high. Digital envelopes mainly include digital envelope packing and digital envelopes dissembling, digital envelope packing is to use each other's public key will encryption/decryption key encryption process, only each other private key to the encrypted data (communication key) reduction; Digital envelopes dissembling is to use the private key will encrypt data declassified process.
Key replacement
Digital envelopes function similar to ordinary envelopes, ordinary envelope in legal constraints to ensure that only the recipient can read the content of the letter; Digital envelopes used the cipher technology guarantee prescribed receive talents can only reading information content. Digital envelopes adopted a symmetric cryptosystem and public-key cryptosystem. Information sender, first using randomly generated symmetric password encrypted message recipient, reuse encrypted password encrypted symmetrical, was called the symmetric password after digital envelope. In the message, if the receiving party declassified information, must first with their own decrypted digital envelopes, get symmetric password, can use semmetry password decryption information received. This helps to ensure that the data transmission authenticity and integrity.
In some important e-commerce transactions key must be replaced regularly, in order to solve the key problems, each replacement with symmetrical encryption technology and public key technical advantages, it overcomes the secret key encryption secret key distribution difficulties and public key encryption of problem, use longer encrypted two levels to obtain public key encryption technology flexibility and secret key technical efficiency. Information on use of a password sender to encrypt messages, thereby ensuring only prescribed intended recipients can read the content of the letter. Adopting digital envelopes technology, even encrypt files by others, because those illegal intercepts intercepts sender cannot get the communication of keys, so impossible to classify documents." 

Indoor cycling behavioral essentials

Tired of monotonous on a treadmill to jogging, want to follow a single gym password jump hold, we need to create a more youth more simple workout. So, we look to cast back familiar bicycle. Kinematics experts also for cycling generally optimistic about, think cycling has exercise internal organs stamina and improve cardiopulmonary function of nervous system, but also can improve the agility.
Your present work is far from home, suit the dress bound your body. So you go to the gym indoor cycling room, need not do on the road, "nor" cleaner traffic hazards, you just as music rhythm and coach, both feet in situ kept on car, can enjoy sports fun.
But not everyone is suitable for use indoor cycling lose weight. According to the fitness club coach introduction, the first training for member, must first check their own physical condition, according to body response to exercise time and specific methods to determine. He thinks, cycling sports require strong leg strength, suggest members a month of had better want to do again after the campaign has gone through training, or cardiopulmonary function and legs can not bear this strong movement.
Originated in the U.S. indoor cycling is currently in the gym's popular aerobics project. With music, lamplight of activists, imitate all kinds of sports mode, such as climbing, rapid riding, etc, the interesting, very strong.
Indoor cycling's biggest characteristics is to let you feel you can already long body reserves of energy released immediately, produce a kind of accomplishment. Section for 45 minutes, bike course warm-up five minutes before; 35 minutes main training, the coach will according to the personal strength to adjust the resistance and car RPM, and simulated the downhill, in-situ go movement, while in exercise endurance much fat; The last 5 minutes of relaxation exercises, make the line looks better.
Such a lesson the whole persist can consume 400-500 calories, which is equivalent to an hour and a half long, not only can reduce fat, still can improve heart lungs function.
Pose points
Don't shrug, keep straight, avoid contain sloping back or too, make back pressure and injury;
Whether any action, head back as far as possible with flat, not exorbitant or keep up before;
Set good foot set, tightening;
Arms keep microwarpdrives, wrist don't too crooked;
Sports wear slacks and short-sleeved T-shirt. 

Tuesday, April 26, 2011

Fashion treadmill exercise equipment

Electric treadmill profile
Electric treadmill has five casing electronic watch, will activists running speed, time, mileage, the number of calories, heart rate are displayed. So, activists, when fitness to his own body situation well, by driving with was rubber roll, so the impact of ability to run the street than joints to reduce many, not easy cause injuries, so as to ensure the scientific and exercise safety.
The treadmill is an analog running, walking sports fitness equipment. Running and footfall belong to systemic aerobic exercise. According to statistics, kinematics expert on land 1,000 meters per run, the both legs have to hit the ground 600-700 times. Not only the feet, legs and coxal muscle will be affected by vibration, still easily sprained muscle or strain ligaments. Moreover, running if leaping upwards and old are not suitable for through violent running way fitness. But now the treadmill in design more and more scientific, can pass the buffering devices on the conveyor belt, and to reduce the impact of the knee and back.
In addition, the sport strength set scientifically correct outdoor running function after the runner movement, at by keeping certain movement rhythm and intensity, help fitness person in the shortest possible time get the biggest aerobic training effect. Obviously improved cardiopulmonary function. And because the treadmill is reference of human physiological mechanism design, so activists can also through the use of machine correct posture error before running.
First use
In the first time use electric treadmill before, please first stood acquainted with how to control it - such as start, stop and adjustable speed etc, wait till you get familiar with only after can use. Then stood to treadmill on both sides of the plastic skid plate, use both hands seized armrest, open to the machine 1.6 ~ 3.2 kilometers per hour low speed, stand straight, and look to the future, with one foot in the run 瓟 "several times on", try to relax; Then stood together with the running with the sport. After suiting in the feeling, slowly add speed increased to 3 ~ 5 kilometers per hour. Keep this speed for 10 minutes, then slowly let loom stop. First time use don't high-speed operation, in case fall.
To back up
No matter how you walk the speed, best first stretch. Warm muscle easier stretch, so first on 5 ~ 10 minutes to warm up. Then stop stretching in accordance with the following methods - be five times and each time every leg do 10 seconds or more time, after the exercise to do it again.
1. Downward-pointing slightly bent knees bent, the body slowly forward, let back and shoulders down, hands tried to touch the toes. Keep 10 ~ 15 seconds, then relax. Repeat three times.
2. Hamstring stretch sitting on the seat cushions, clean leg unbend. Put another leg to adduction, make its close to the inside of the leg unbend. Try to use a hand to touch the toes. Keep 10 ~ 15 seconds, then relax. Each leg repeat three times.
3. Crus and heel tendon stretch two hands on the wall or tree stand, a foot in the rear. Keep hind legs to erect and heel touchdown, tilted wall or trees. Keep 10 ~ 15 seconds, then relax. Each leg repeat three times.
4. Quadriceps muscles extend to left hand helps the wall or table master right balance, then back extension, seize the right ankle to coxal pull, slowly until you feel ham front muscles tense. Keep 10 ~ 15 seconds, then relax. Each leg repeat three times.
5. Seam of skeletal muscle (thigh muscles) stretch foot relatively, knees outwards and sat down. Both hands captures feet to the groin direction to pull. Keep 10 ~ 15 seconds, then relax.
exercise
Exercise for 15-20 minutes of good way is to save time. The treadmill 4-4.8 kilometers per hour speed warm-up 5 minutes, then every 2 minutes by increased 0.3 kilometers per hour speed increases until you feel in a continuous movement speed 45 minutes will be very challenging. Walking with fixed pace about 1 km, and record the time used. This may use 15 to 25 minutes. To 4.8 kilometers per hour when the speed of 1 km walk about the journey, with 20 minutes. In you can easily do this several times, can gradually improve the speed, so that lasts 30 minutes you can get very good exercise. Before walking exercise program in heart, to be clear: can't rush, the exercise of his life to your health, not just a become namely magic.
Exercise frequency: target is 3-5 times per week, each exercise 15-60 minutes. The best is formulated according to their own physical condition good exercise schedule, not the be fond of according to oneself to exercise, you can adjust speed and motion time to master acuteness degree of motion. Above content is for reference only, particular case please to professionals consultation.
clothing
What you need is just a pair of good shoes, the proposal is chosen running shoes or fitness shoes. Meanwhile sole don't stick a foreign body, avoid to carry into foreign treadmill run down wear running boards and running belt. Clothes should wear comfortable and suitable for sports, the proposal is chosen cotton breathable sportswear.
In addition, before motion you necessary to know their health to make suits own motion plan, suggested to doctors or professional advice, maybe you can get twice the result with half the effort. 

UWB(Ultra Wideband)

UWB(Ultra Wideband) is a carrierless communications technology, using femtosecond seconds to level on the sine wave narrow pulses transmitted data. Some called it a revolutionary for radio spectrum, thinks it will become the progress of short-range wireless communication future mainstream technology.
UWB (the mk-ultra - Wideband) ultra-wideband, starting with using pulse radio technology, the technology can be traced back to the 19th century. Then by big companies such as Intel paper presents the application of the UWB technology program MB a - OFDM because of the two schemes are entirely different, and each has powerful faction, UWB standards formulated support 802.15.3 a workgroup could not decide in both the standard solutions, and eventually to market its solution. UWB still debate so far. UWB pulse width modulation using level in ns fast rising and falling pulse, pulse from dc to cover the spectrum of GHz, do not need regular narrowband modulation of RF frequency conversion needed, pulse forming can directly send it to antenna launch. Pulse fengfeng time interval from 10 to 100 ps level. What shape can narrow spectrum through continuous monopulse shape and antenna load characteristics to adjust. WB signal in time axis is sparse distribution, the power spectral density quite low, RF can simultaneously launching multiple UWB signal. UWB signal is similar to baseband signal, can use OOK, mirror pulse keying, pulse amplitude modulation or pulse position modulation. UWB is different from the baseband signal is transformed into radio frequency (RF) of conventional wireless system, which can be regarded as the baseband spread in RF programs in building internal energy spectrum density with extremely low 100 Mb/s data rate.
To further improve the data rate, UWB application ultrashort baseband rich GHz spectrums, use safe level of Signaling Signaling Method (Intriguing. Based on the broad spectrum UWB in 2002, the FCC announced UWB can be used for accurate location, metal detector, a new generation of WLAN and wireless communications. To protect the GPS, navigation and military communication frequency UWB limit, in 3.1 - GHz and below 41 dB 10.6 transmission power.

PKI(Public Key Infrastructure)

PKI(Public Key Infrastructure) is a kind of followed the agreed standard key management platform, it can provide for all network applications such as encryption and digital signature necessary password service and key and certificate management system, simply put, PKI is to use the public key theory and technology established the basis of providing secure services facilities. PKI technology is the core of information security technology, but also the key and e-commerce based technology.
PKI technology including the encryption, the basis of digital signature, data integrity mechanism, digital envelope, dual digital signature, etc.
PKI(Public Key Infrastructure) refers to the public key concepts and techniques in providing security services to enforce and the generality of security infrastructure. This definition covering content, is a broader by many people accept the concept. This specifies anything with public key technology, on the basis of security infrastructure are PKI. Of course, no good asymmetric algorithm and good key management is impossible to provide perfect security services, also cannot called PKI. That is to say, the definition of the must have already implied the key management functions.
X.509 standard, to distinguish themselves from rights Management Infrastructure Management Infrastructure, the abbreviation Privilege (PMI), will PKI defined as support public key Management and support the authentication, encryption, integrity and the Infrastructure for sexual services]]. This concept, compared with the first concept can provide not only the narrative PKI security services, the more stressed PKI must support public key management. That is to say, just use public key technology is not called PKI, still should provide public key management. Because PMI use only public key technology but not management public-key, so, PMI can separately described without such confusing concept with public key certificate. X.509 from concept to distinguish PKI and PMI standards of narrative. However, due to the use of the public key technology, PMI establishment and use of the PMI must have PKI key management support. That is to say, PMI had to distinguish themselves from PKI binding together. When we put the two together, PMI + PKI was completely fell on x.509 standard definition of PKI terms. According to the definition of x.509, PMI + PKI can still called PKI, while PMI can as part of a PKI.
The national audit administration [iii] in 2001 and 2003 report put PKI definition for hardware, software, strategy and people, when perfecting system consisting of implementing after, can for sensitive communication and transaction provides a set of information security, including confidentiality, integrity, authenticity and cannot be denied. Although this definition does not mention public key technology, but so far, satisfy the conditions mentioned above only public key technical structure infrastructure, that is to say, only the first definition fits the definition of PKI. So this definition does not conflict with the first definition.
To sum up, we think: PKI is to use public key concepts and technical implementation and support public key management and provide authenticity, confidentiality, integrity and security service shall be investigated for sex of generality security infrastructure. 

Massage chair for attention of choose and buy

As people paid more and more attention to health, massage stick, massage chairs, massage health care equipment such as machine, therapeutic more and more into ordinary people family. Tens of thousands of yuan from as high as senior massage chair, to hundreds of yuan, few yuan of common therapeutic massage device, many citizens, home, these health care equipment is no longer rare.
People tired, sitting her on a massage chair, listen to music relaxes nervous, this is the science of rest. Don't look down upon a massage chair effect, sitting for long for people to work and study, massage make haemal circulation unobstructed, improve the backache backache disease such as, can still improve sleep quality.
First choose with oneself body massage chairs match. If that is too big or too small cannot make massage chair massage to the corresponding body parts. Because massage chair is mainly used to relax and care, so when the choose and buy should consider its function is comprehensive, main should pay attention to the following functions:
Massage position adjustment, speed, strength adjustment function;
Back chair, legs, and Joe torre automatic lift adjustment, leg telescopic functions;
Sitting posture pose and massage, legs, and adjust;
Massage size degrees adjustment.
By massage, it can clear the meridians, keep the body's blood circulation, contentious, so after massage balance between Yin and Yang and feel muscle relaxation, joints flexible, uplifting, eliminate fatigue, to maintain good health has an important role. 

Monday, April 25, 2011

Network Drive

A network drive: when the network computer disk as a Shared data area allows network users access to, the driver became a network drive. Sometimes use a network drive is to limited, and only after the network administrator authorized network users can access them. The drive can be hard disk drives, read-only CD drive, floppy disk drive, etc. Also, use a network drive and local drive no different, only faster than local use slowly.
Cd-rom, floppy disk, hard disk, these can be read or storage file equipment, become drive,, and, of course, MD, U plate and so on, also is the category network drive realize through mapped on the unit like using the local hard disk drives the same equipment, can generally located in the other connected by network hosts, and also can be special external expansion storage devices. 

Fast Charging

introduction
Fast charging in 1 ~ 5h means at or near the batteries fully charged a charging methods state. Often used for traction with batteries need in a relatively short period when fully charged the state recovery charge. On the performance of the fast charging battery life and damage. The normal rechargeable battery it took about 10 ~, how can 20h fast charging without damaging battery performance and life expectancy, is hot research topic of attention.
Quick charger principle and characteristics
Circuit features
1, output voltage set (e.g. 36V), if charged bottles, killing one plate shedding disconnect the battery impassability, or appearance of short-circuit, then the battery voltage namely reducing or zero, then the charger will no output current.
2, if charged bottles of voltage deviation set, such as setting voltage is the voltage 36V, mistakenly meet 24V, 6V battery 12V, such as no output current, charger, if set for 24V mistakenly 36V battery, due to pick for the voltage output voltages below battery charger, and therefore could not to the accumulator.
3, charger two output terminal short-circuit, because the charger if the trigger circuit of SCR silicon can work and thus SCR not conduction, output current is zero.
4, if use wrongly will battery is negative, then at the silicon-controlled trigger circuit reverse deadlines, without triggering signal, silicon controlled not conduction, output current is zero.
5, using pulse, to extend battery life charging. Due to low voltage ac after rectifying the whole wave is only when the pulsing dc voltage is greater than the battery voltage wave, SCR will conduction, and when pulse dc voltage at the trough area, SCR, to stop against partial deadline, and the accumulator is pulsing dc flows through the battery.
6, rapid charging, full stop. Due to start charging lower ends when the battery voltage, and charging electric current is bigger. When the battery is sufficient 36V battery voltage (44V), because of getting closer to recharging voltage dc voltage pulse wave value, then charging current also will be more and more small, automatic into Juan flow recharged. When the battery voltage been debated on both ends of the rectifier output, charging process peaks maximum stop. After the test, three electric car batteries 12Ah three 36V (12V/with the charger series), with just a few hours can fill.
7, circuit is simple, easy to make, almost no maintenance and repair. ?
Circuit principle
By AC220V utility, via T1 step-down transformer D4 whole wave - D1 after rectifying, supply charging circuits work. When the output set in the correct polarity access by charging bottle, if rectification after each half the output voltage ripple peaks value over battery output voltage, the silicon controlled SCR Q of the collector current triggered by conduction, electricity flows through SCR give the accumulator. Voltage ripple voltage, close to the battery controlled shutoff, stop charging. Adjust R4, adjustable transistor Q conduction voltage, general but will XiaoDiaoZheng by big to R4 to Q conduction can trigger SCR (conduction) can. Figure D5 used as power light-emitting tube D6 instructions as charging instructions.
Component selection
BK200 type control power transformer available with output voltage transformer, 36V block, also can use which has 40.9 type 200V ring transformer, choose 22Vx2 or secondary voltage for 20V x 2 block series use. The author use which has 40.9 type change, and second class ring for 24Vx2, 12Vx2 voltage, 0 to 6-23V three groups, if its 24Vx2 block series (volt), the output voltage is too high, charging excessive current electric car batteries (to the 36V, on an average of charging electric current measurement ammeter approximately 1.5-1.8 A, this is average, then peak current can reach 5-7A above), in order to reduce the transformer output voltage, will the rest of the 12 v x 2 and O - 6V two coil pick in primary coil toward string, making the subprime output voltage 40V reduced to drag, carrying (average charge current when A 1.2, can meet the 36V) for use. Because of which has 40.9 type ring transformer only scenedesmus price for 23 yuan or so, can reduce production cost is available, enthusiasts around the system transformer.
In addition, circuits of the whole bridge rectifying D4 can choose - D1 8-10 square full bridge, among a circular installing hole, can be installed in aluminum plates to heat dissipation. 1OA/SCR available phase failure is 100V gold seal, the unidirectional silicon controlled rectifier bridge with fixed in the same cooling with nuts on aluminum. Q of the parameters for the trigger triode Vceo p 60V, IM = 1A, can choose 2SB536, B564 B1008, B1015 or 2SA684, A720 etc, pipe. R6 used as the current limit protection, if the transformer subprime output voltage appropriate, charging current (average) does not exceed 1.5 A, this resistance can also save need not.
The charger if used for other voltage battery (such as 24V, 12V, etc), then can select the subprime output voltage transformer, respectively 26V, 22V - 14V type etc, 12V - while appropriate resistance of reducing R2 and R5, usable also band switch control subprime ac voltage and respectively, make the charger resistance conversion has greater range of use. 

Spring five kinds of super thin body weight coup yoga and commands

Yoga's popular not makes no sense: it can be SuJiu slim muscle, improve body flexibility, effectively relieve pressure. But, various kinds of yoga curriculum is a toss-up.
Add a faster, Stan the rhythm of yoga to improve physical endurance and ai, improve by jia, body posture, and kundalini USES carols and breathing looking for spiritual fulcrum.
According to their own requirements, look below yoga classes which most fellowship with you?
Hadad HATHA yoga ()
Suit a crowd: hope when practicing yoga base motion beginners.
Physical and mental earnings: hadad yoga is the most popular yoga routines. It is natural and pure, simple and unadorned, action covers stance and posture, and combined with breath between mind and body, strengthen the echo.
Practise:
Trees pose. Fingers-crossed stand, pay attention to your feet stand still. Slowly, carry to lift the right thigh, or try to elevate the leg inside. Stretched to the head, keep hands palm photograph, and work to make right leg inside leveled and pelvis. Keep pose 5 to 15 seconds.
Exercise purpose: the legs and cross department, balance.
KUNDALINI yoga (KUNDALINI)
Suit a crowd: hope to relieve pressure, awaken people inner energy.
Physical and mental earnings: New York universal power yoga treatment center director ROM flooded - arroyo said: "the word kundalini energy. This means is actually using breathing, yoga posture and carols to activate the spirit system and some body organs, in order to achieve the Ming to enlightenment, get peace of mind realm with peace." Kundalini yoga courses including posture, breathing exercises and sing carols, such as read nam's pizza Turner (sat), meaning "true is my nature.
Sartre kerry and (Sat), meaning is meditation kriya takes. Kneeling sit, arms upward unbend, near the ear the elbow. Finger crossed, the finger points upwards. Inspiratory, drive to the spine, and then press navel breathe in. Repeat 3 minutes.
Training purpose: the shoulder, arm, spirit.
Burke lahm yoga (BIRKRAM)
Suit a crowd: hope that through special challenging way to improve body flexibility of a practitioner of yoga.
The physical and mental earnings: burke ramesses taking 6.004 environment is 38 degrees of indoor temperature. Boston burke lahm yoga center director Jonathan Burbank said, hotter environment can preheating muscle, make the aspirant can more easily finish action]. This yoga including 26 minutes practice. Each practice take about 10-60 seconds, and need to press the same order repeated several times.
String month type posture. First a hot bath to preheat the muscles. Then two feet, arms upward stretch, the palm folded. Along with the arm, body as far as possible up extrusion ear stretch. Eyes front one point, bending slowly to the right, and will cross department left party crowded, notice body always towards ahead, and maintain the arm unbend. Keep this pose for 1 minute, then change another side repeated.
Exercise purpose: cross department, shoulders.
By Carrie yoga (ai IYENGAR)
Suit a crowd: the character active, hopes to increase the flexibility of people (especially body body injury, is restoring).
Physical and mental earnings: Los Angeles BKS moxa for jia yoga research institute Leslie Peters said: "because of the characteristics of elliott is to pay attention to fine yoga correctly body posture, and emphasis on details."
Meditate with some tools need, such as tape, diamonds and blankets, etc. Using them, can also emphasized the action do accuracy position. Some pose sometimes need to keep 1 minutes or longer, to co-ordinate and rectify the purpose of bones and muscles.
Triangle type posture. The arm to the side and extend, palm down. Two feet apart, foot and striding fingers alignment. His left foot to evaginate 90, turn right 45. The body to right stretch, the right hand down tao ankle (or with a square).
Exercise purpose: back, cross department, the leg.
Add ASHTANGA yoga (o Stan)
Suit a crowd: running, cycling sports lovers, as well as other wants to improve balance and flexibility of people.
Physical and mental earnings: o Stan add yoga is often called powerful yoga, it emphasizes endurance and power. American New York hard and soft, Stan add yoga research institute berrill "qiqi said:" ah Stan add yoga is a method to improve concentration degree and self-control in the difficulty of the training, it is popular among athletes."
Board type posture. To start, both hands is located in push-ups shoulder posture, and shoulders aligned below elbows close to the body, on both sides. The body from head to foot keep a straight line. 

Saturday, April 23, 2011

Eight commonly used method of fitness styling great PK

Fitness is simple: the principle of practice is to increase muscle resistance to build a vigorous and graceful shape; Sports sweat to eliminate redundant and adipose and become slim. However, even though these basic fitness method can sometimes make us temptation.
When, where, how to fitness will achieve the best effect? Let's discuss it.
1, indoor exercises pk outdoor exercise
Outdoors, relatively rough pavement will generate more friction; The influence of natural wind, movement by the body can be affected by greater resistance; In addition, up-slope, the transformation also makes downhill outdoor sports can keep trying to change the rhythm. So whether running, biking or roller skating, practitioners in outdoor games will be more resistance, the body itself need to consume more calories. Rather than on the treadmill, outdoor running can burn a 3% to 5% calories. In addition, fresh air and transform scenery can let fitness more interesting, can also help practitioners insist on longer. Of course, the bad weather or too strong, too dark for outdoor exercise the light person also have potential danger, under such circumstances, we should turn to an indoor sports, fitness equipment to make up with. For example we can climb the treadmill simulation, the motion of, as long as the constantly changing running Angle can achieve results.
Suggestion: if the condition permits, outdoor exercise wins out
2, the treadmill pk bicycle
Generally speaking, like the treadmill such instruments can make practitioners consume more calories. In addition, a study also shows: in 18.5 minutes, a moderate intensity treadmill exercise can make you the most burning 200 calories, boating and cross-country skiing heat burning followed, fixed bike (not the indoor cycling) minimum, need to exercise calorie burning 32 minutes to burn 200 CARDS.
But that doesn't mean the treadmill is your only choice of going to the gym for a workout. Doing the same kind of fitness day after day practice easy state of arrives soon after fitness bottleneck, therefore also needs practitioners often transform fitness project and the way.
Proposal: the treadmill and other instruments used alternately. 75% of the treadmill exercise time, with the remaining 25% in other instruments on time. In four days a week (for example, can exercise the treadmill three days with other devices, leaving day of practice)
Three, short time high intensity exercise pk long time gentle exercise
Short-term high intensity exercise is a rebound with moderate exercise methods, but at the same time, short time, high intensity exercise the combustion of heat can achieve long time downy exercise 1.5 to 2 times, even exercise can keep on burning after 75 to 125 calories.
But burning heat faster doesn't mean fitness more scientific and more healthy. Excessive short-term high intensity exercise may cause sports injury. But 45 to 60 minutes of low degree of long time exercise can also help the body, which generate more mitochondria mitochondria is the dynamic cell self burns calories, so metabolism will be naturally faster.
Proposal: a combination. If you within a week do aerobic exercise for more than four days (including four days), it is recommended that you will be one or two kind of short-term high intensity exercise with medium and low intensity exercise for long periods of time together.
4, morning exercise pk evening exercise
Recently, the American sports medicine for habit in the morning, afternoon and evening exercise the practitioner conducted a survey, the results showed that, in the three months, 85% of morning exercise person feel fitness is hard to insist, 50% afternoon exercise feel a little reluctantly, and fitness among the evening exercise, only 25% of the people think fitness a little difficult. This is because human at 6 o 'clock in the afternoon, between ~ 8 PM supreme, the body temperature flexibility and sensitivity of the best and muscle strength and heart lungs function also is in the best state. Therefore, night sports practice, the most effective, fitness durability also is the best. In addition, if you get used to the outdoors exercise, the morning air quality also is not one day is the best of, if you exercise site near the main blocks, so air of dust and gas content in the early morning will reach maximum, especially not suitable for exercise me. 

Data Switching

Data in multiple Data Switching refers to a DTE for between any two terminal equipment, building Data communication temporary interconnect pathways process called Data exchange.
classification
Data exchange can be divided into: circuit-switched; Packet switching and packet switching. Circuit switching principle and basic same telephone exchange principle. Circuit switching drawback is circuit, the parties in communications utilization rate is low in the process of idle time, circuit cannot be used fully. Packet switching principle is when the sender information reached a message switching of computer, at first, to stay in external storage, determine the central processor analysis header, and choose to forwarding routing with corresponding output electricity by turning on line, waiting on the output. Once the circuit spare, immediately be removed from external storage after message out, it improves the utilization rate of this circuit. A message switching although improves the utilization rate of circuit, but a message via store-and-forward will generate large delay. Packet switching is also a store-and-forward exchange with a message switching approach, but the message is different, it is divided into certain length, the group by group as a single unit store-and-forward. This will not only have a message switching mode the advantages of improving circuit utilization, and overcome delay big shortcoming.
Circuit switching
When the user data transfer between, between users exchange center in establishing a temporary data circuit. Circuit after connect, user data transfer, both sides will occupy to transmission, and have been finished dismantling circuit so far. Circuit switching into delay are small and without processing of data switches, and suitable for transmission good real-time performance and batch large data.
Packet switching
Are generally using a computer to realize. Mail end users first put to-be-sent data encoded message, along with receiving mail address and other auxiliary data all sent to local exchange center, where they store intact and appropriate treatment. When local exchange center, when the jammer are free to the next message transmitted to exchange center of received signal, finally by the exchange center will message transfer to the user. Message switching advantage is: (1) transmission high reliability, it can effectively using error calibration and retransmission technology; (2) the line is high efficiency, it can take multiple low-speed circuit is concentrated into high-speed circuits transmission, and can make multiple users sharing a channel; (3) use flexible, it can undertake code transformation, rate transformation, and it work such as pretreatment in type, rate, procedures between different terminals data transmission. But, message exchange is not suitable for conversational and real-time demand higher business. According to general message exchange the data transfer important and urgent degree, divided into different preferences to transmission.
Packet switching
introduction
The data segmentation into several shorter length (usually less than 128 characters) in group, each packet data and information within outside also includes except in switch control information, they exchanged within as a whole. Each packet switching transmission path in the different within. Packet switching also USES store-and-forward technology, and error inspection, retransmission, return to send response operation, finally receiving mail all the grouping the receiving the mix in sequence data.
advantages
Compared with message exchange, packet switching advantage is:
(1), generally in exchange in message transmission delay is every node receiving and forwarding on the sum of the whole message, while in delay, a grouping of packet switching to send a node, can then send the next packet, so total delay is decreased;
(2) each node need buffer capacity reduced, it is helpful to improve the utilization rate of storage resources node;
(3) directs a mistake, as long as transmission resend one or several group, need not reissue the whole message, so that it can improve the transmission efficiency. Packet switching shortcoming is each packet to add some control information, it makes transmission efficiency decreases, especially in long message for them. General packet switching provides a virtual circuit and data reported two basic operations.
Basic classification
(1) a virtual circuit: in data exchange, by sending end before the Internet address sure path and logical channel, and will be connected each logical channel constitute a virtual circuit. A virtual circuit is different from entity circuit. Once established shall occupy entity circuit this circuit, and whether data transmission. But a virtual circuit only in the transmission of data to occupy, namely is only dynamically using entity circuit, data packet along a virtual circuit transmission, its reception sequence and sending sequence is the same. Data transmission is dismantled after this the virtual circuits. This kind of a virtual circuit called exchange virtual circuits (SVC). If in particular between users permanently establish a virtual circuit, there's no establishment and demolished a virtual circuit process, and the only data transmission process. This kind of a virtual circuit called permanent virtual circuits (PVC). A virtual circuit method is suitable for communication time longer interactive session handling. CCITT (CCITT) suggest it as packet-switched public data networks. The basic business way
(2) data report: requirements for each data packet have mail the letter and receive all the network address of each grouping nodes switches to determine each packet transmission path, in net along a different path transmission, such groups receiving order and sending sequence might be different. Sending end to receive the grouping of to sequential change, can return to the original message. Data submitted suitable for transmission method is to contain only a single packet of short message, such as status information, control information, etc. 

IMS(IP Multimedia Subsystem)

IMS(IP Multimedia Subsystem) is a kind of brand-new multimedia business form, it can satisfy the end-users now more novel, more diversified multimedia business needs.
IMS (IP Subsystem) essentially say in a network structure. The technology is rooted in mobile field, was originally for mobile network defined the 3GPP, while in NGN framework, IMS should also support fixed access and mobile access. At present the IMS enhancement 3GPPR6 covering basic already frozen, marks the IMS technology have to mature.
In the framework of NGN, terminal and access network is various, and its core network only, the core of a IMS SIP protocol and characteristic is adopted with access irrelevance.
Conform to the trend of network IP, IMS system USES SIP protocol to end-to-end call control. IP technology in the Internet application has been very mature, is the leading technology, Internet and it convenient to provide various information service flexibly, and can according to customer's need to quickly create new services. But one of the most prominent IP technology feature is "do our best", in the security of data transmission and billing control, but ragged, and only consider fixed the access method. Based on the traditional circuit switching mobile network, albeit with access flexibility, can the phonetic anytime and anywhere, but unable to exchange support IP technology, so can form a vertical business launched way, different business application interoperability is lower and the need to more business gateway access mobile communication network. Different business separately business access, networking and operation control and business application development, including even such main network business charging units are must establish independent operation system. So, until now telecom business mainstream is still voice business. The deployment of new business, in the present condition is very easy to incur greater risks and costs. In this case, whether YiDongWang or fixed nets are based on IP network evolution to an inevitable trend, has become.
However will IP technology is introduced into the telecommunication level field, we must consider the actual network operation to operators of demand, need from nets yuan IMS network function, interface protocols, QoS and safety, billing the aspects of fixed access support. From the current research look, SIP is a simplicity, compatibility, modular design and third-party control based on Internet communications market to become the mainstream of the agreement. So based on SIP IMS framework through the utmost reuse Internet technologies and protocols, inheritance of cellular mobile communication system network technology and fully endemic soft exchange network technology for reference, so it can provide the QoS guarantee, telecommunication level of business and effective flexible pricing, and with a fusion of the powerful ability comprehensive network business. So, using the IMS system, telecommunications operator can low cost into its have long sought mobile field, and mobile operators can be in guarantee its original voice and text message service quality is not affected, relaxed under the premise of the rich multimedia introduced new business, the so-called whole business operations.
As for access irrelevance, refers to the soft exchange network technology IMS reference image based on the gateway, solutions, including signaling gateway (SGW), media gateway (MGW), media gateway controllers (MGCF), and in such nets yuan MGCF and MGW also adopt the IETF and ITU - T together to develop of h. 248 / MEGACO agreement. Such design makes the IMS system terminal can be mobile terminal, also can be fixed telephone terminal, multimedia terminal, PC, etc, access is not limited to cellular rf interface can be is wireless WLAN, or cable LAN, DSL technologies. In addition, because in business floor adopts an IMS the soft exchange network open business provides frame, can fully support based on the application server third-party service provision, which means operators may not to change the existing network structure, don't put any equipment costs conditions, easily develop new business, and applied upgrades. 

Friday, April 22, 2011

Java Extension

Javajava logo is introduced from a programming language. It is a way to execute by explaining the language, grammar rules and c + + is similar. Meanwhile, Java is also a cross-platform programming language. Java programming application can say everywhere, from embedded devices to a server. One of the people in the browser use "(small" Applet application) is to use one of the Java language program, with compiler will it compiled into the class files, will it exists in page, WWW HTML files and make corresponding on marker, client just put in Java client software can be run directly on the Internet. "Applet"
What is a Java
Java is launched from a programming language. It is a way to execute by explaining the language, grammar rules and c + + is similar. Meanwhile, Java is also a cross-platform programming language. Java programming application can say everywhere, from embedded devices to a server. One of the people in the browser use "(small" Applet application) is to use one of the Java language program, with compiler will it compiled into the class files, will it exists in page, WWW HTML files and make corresponding on marker, client just put in Java client software can be run directly on the Internet. "Applet" Java is very suitable for enterprise network and Internet environment, now has become the most popular Internet, most influential one of the programming language. Java has many admirable advantages, such as simple, object-oriented, distributed, explanation, reliable, safe, structure neutrality, portability, high-performance, multithreading, dynamic, etc. Java devoid of c + + outweighed the function and many rarely used function. Jave can run with any microprocessors, use Java development programs can be on the network transmission and runs on any client.
Java extended range
Is can support Java program expanded, more used for mobile phones. Java programs include: applications, games, e-books, etc!
Java also claims to be can use of language, the cross-platform compiler itself was largely because Java, and not directly produce after executable code, but produce a middle called ByteCode, this code code necessary for the literal translation in through Java to read it, can truly be executed on the platform, so as long as the literal translation device containing this kind of Java ByteCode also can interpret it can execute Java compiled program, reason and Java program is compiled in which platform, completely has no involvement. Java written procedures can be divided into two classes, respectively is Java Applet and general apply, and apply this category is with general procedures, such as c + + role is more similar, is a separate executable applications, like HotJava is a browser, and that is to use Java program developed. The most common Java programs include applications and applets. Application is separate programs, such as HotJava browser software is written in Java language. Applets similar to applications, but they can't run separately, in support of Java Applets can run the browser. Applet mainly is placed inside the HTML pages, browsing play a role.
The goal is to meet the Java in a full of all kinds of different kinds of machines, different operating system platform online environment development software. Use Java programming language, can add sundry in a web of dynamic effect. Can put on one paragraph of animation, add sound, can also build interactive web, etc.
Java mobile software platform
Java mobile software platform using the basic Java platform is CLDC and MIDP, is part of the J2ME. 

Gnutella

Gnutella is simple and convenient network exchange documents software, provide another way more simple swap file for you choose. Theoretically, as long as all connected network file sharing out one, then everybody needs can be solved. Whether you want to graphics files, music and even recipes, as long as someone to share this file, we should be able to find through Gnutella.
Generation and development
March 14, 2000, America and eastern standard time morning, underground hackers Slashdot mailing list site published a message, said AOL's Nullsoft department had issued an open source software, the Napster clone could be searching for and download any kind computer files software was named Gnutella.
In March 2000, 15, the United States eastern standard time, CNN reported 4:25 Nullsoft have to switch this may have more potential than the Napster company share files software download, and the reason is probably Gnutella to record giant warner music causes of the potential threat and EMI, when AOL is combined with warner the negotiations. But, right now the software has been downloaded the Nullsoft site from thousands of copies, and various third-party organization soon began to clone Gnutella clients to develop their own version. These clone version of the Nullsoft design with agreement of Gnutella compatible with each other, so can the Nullsoft communication and and the original client communication. When people began to run these cloned unauthorized client software, a compatible, after the application of network began to grow and Gnutella with Gnutella agreement without center way of communication. This network, in the past, the remarkable growth in 2001 start called Gnutella network.
All use Gnutella agreement client program operation of computer is called in Gnutella network (gNet). On the Internet, each computer can also connected another one computer again. For example: when a user visits, she's not here. Two places are independent of each other. In the Internet, a user Gnutella allows simultaneous connection of a multitude of other computers. From many sources of information may also receive.
On the network in Gnutella every computer connection many other computer (points). Each of these points are connected to other computers. This process infinite sustained. If a user connection 4 computers, each computer and other four computer connected with the computer, users can for a total of 4 + 4 * 4 = 20 user information exchange. So, news only a transfer 2 times along the number of search requests transmission, also called survival time or call TTL. That way, users of TTL is 2. If we expand the example above, the user TTL to assume we in the network, and three of each computer connection four new computer, so it can carry out the total number of the computer information exchange 4 + 4 * 4 + 4 * 4 * 4 = 84. Therefore, the computer can communicate with users with its search the number of requests of TTL value and the number of computers with TTL increase exponentially increase relationship. Gnutella network, theoretically at least, can arrive in the Internet by connecting every computer. How to a Gnutella network operating more detailed explanation, it will see specific Gnutella agreement.
Gnutella is not a web site. Do not contain website. In Gnutella network available on content not from websites or Gnutella compatible software issuers, it comes from other users (in their own run on a computer software). Compatible Gnutella Gnutella is a networking protocol, it defines scattered in a completely under the network environment way to communicate each other. Computer
Gnutella is a set of open mode, non-centralized for personal search system to individuals, mainly used for searching and swap file via the Internet. Gnutella is neither company nor a specific application. It is not a website. However, some website provides news and information about Gnutella. Gnutella is a technical name, like "email" and "Web" the same. The earliest Gnutella clients is developed by Nullsofe company. America online quickly closed this website, but before that have several thousand download it. The earliest version is a good starting point, but there are many mistakes. After a long time, there have been many different companies, individuals and groups in based on the development of continuous development of Gnutella agreement software. Gnutella is centralized characteristics of Gnutella. This means that the network existence doesn't rely on a home central company. If a company is bankrupt, Gnutella still will continue to operate. Gnutella clients connected, and no central server. To do this, they must be able to find other users, this can through to his friends connected to other users connected, the index table, or using the Internet relay chat (IRC) to achieve. Gnutella advantages can freely sharing any files. 1. Non-centralized distributed search system - totally useful search function, without the need for centralized search database. 2. A firewall -- when a customer can also be correct in a firewall for friendly transmission. 3. The agreement according to the document form records. 4. Free software, any client code are in the open. 5. Many client can set up bandwidth, limiting total and every client upload rate, thereby preventing your line saturated. 6. The anonymity - can see what others are Internet search. However, for specific url inquires the is anonymous. 7. Can change the port - harder to stop/limit access to. 8. To define your internal network, only keep one exports to the rest of the Internet. This makes others harder to stop to Gnutella network access. Gnutella shortcomings some people some advantages as the shortcomings. For example: 1. Since some bandwidth is used to maintain links to Gnutella network, so speed may slow, especially in dial-up cases. This problem is being gradually resolved. 2. Some experts say IT could give users use Gnutella brings security problems. 3. Lack of central coordination is expected to limit Gnutella network development, but by software developers on composed of loose organizations, network technology limited is being gradually overcome. In July 2001, Gnutella network can already a burden tens of thousands of users, this is better than 2000 December 20 times the high number. 4. The plan might become a headache to the copyright owner long-term problems. Updated Gnutella project is establishing a huge scale, constantly perfected network. In June 2001, website report said in a week nearly 100 million people download the latest generation of program Gnutella LimeWire Bare - country and. Some people think like Gnutella such personal music for personal systems in addition to exchange the documents and some other USES, such as search yahoo's web site information. As Gnutella works continue to, the company behind LimeWire in summer 2001 for the best research report about Gnutella provide cash rewards Gnutella network looks will become the Internet a permanent and standardized software system. Gnutella network for the entertainment industry is thriving, the latter had a bad news to think it need not fear Gnutella, because their technical problems will limit the scale of the network. However, 2001 explosive growth led to the use of individual Gnutella users infringement tentative prosecution. But the developer does not congress, Gnutella is liable, because its program can be used in many other USES, but with different Napaster, and they did not need to maintain any copyrighted material database.