Using python, we developed a program to extract time from key steps in sim. log and perform statistics:
#!/usr/bin/python2.6import re,datetimefile_name='/home/alzhong/logs/qtat1/R2860.01.13/sim-applycommitrollback-bld1.log'file=open(file_name,'r')acnum=[];time_res=[];lnum=0def trans_time(time): t1=datetime.datetime.strptime(time,'%y/%m/%d %H:%M:%S') return t1for (num,line) in enumerate(file): if(r
illusion that the phone is shut down, making the phone black screen and keyboard invalid. The poisoned mobile phone can also be automatically started to leak all information about the mobile phone's environment.
After being poisoned, the mobile phone will automatically switch on and off, and will also be used to automatically send text messages to others, automatically call the phone, automatically access the Internet, and even damage the SIM card ch
Cmerror: 197
SM rejected-duplicate Sm
Cmerror: 198
TP-VPF not supported
Cmerror: 199
TP-VP not supported
Cmerror: 208
D0 sim sms storage full
Cmerror: 209
No SMS storage capability in Sim
Cmerror: 210
Error in MS
Cmerror: 211
Memory capacity exceeded
Cmerror: 212
ensure that businesses outside the village have been established (such as the village mobile phone project www.grameenfoundation.org/what-do/empowering-poor ). Some function machines provide functions such as multiple address books and call records to support multiple users. It is popular in developing countries to save money by using multiple SIM cards. In developing countries, one network may provide cheap local voice calls, And the other network m
Analysis of SIMLock and simlock Functions
I. background
The lock card is SIMLock. When the mobile phone is started or SIM card is inserted, the configuration information preset in NV on the modem side of the mobile phone will be compared with the information in the SIM card to check whether it matches. If yes, the SIM card can be used normally. If they do not mat
similar to Iccfilehandler, Uicccardapplication also creates different Iccrecords objects based on the current SIM type, the difference between this object and the Iccfilehandler is that Iccfilehandler is a SIM file system for manipulating objects, while Iccrecords is the SIM store content as the object of operation (Iccfilehandler emphasis on the underlying imple
When the last function is used to query the SQL group, the field location will affect the sorting rule of the query results of each group. If the last function is used to obtain the last query result, effective sorting is very important.
Example:
Access View Design (1 ):
Select tower information. number, monitoring common data. time, monitoring general data. line name, monitoring common data. tower number, monitoring common data. tower name (monitoring common data.
*}
Note: (1) the formula uses reversible conditions. If you only consider the ring $ d $, then (1) is not true.
5. It is proved that an exchange semi-group can be embedded into an Abel group if it satisfies the elimination law. Is this proposition true for an exchange semi-group meeting the elimination law?
It is proved that $ G $ is an interchanging monoid (the operation is recorded as multiplication), and a forward product $ g \ times g =\{ (a, B) |, B \ in G \} $
And define multiplication $
input, T is the matrix of m*n2,sim () function% call format: [Y,af,e,perf] = SIM (net,p,[],ai,t)% [Y,af,e,perf] = Sim (net,{q ts},ai,t)%% P,q: The number of test vectors;% Ai: initial layer delay, default is 0;% T: Test vectors;% TS: The number of steps to test;% Y: The output vector of the network;% Af: The layer delay state at the end of the training;% E: Erro
1. Try to open unread messages
: When the "Unread information icon cannot be deleted" problem, first try to open the unread text message.
1. Under the Standby page, click "Information".
2. Click on the right to display the "1" session box.
3. After reading, return to the mobile phone standby page, unread SMS icon can disappear.
2. Delete Inbox information
: When there is too much information in the Inbox or the information is ful
Vista System State Image Butler (SIM) is a graphical interface program that enables users to create "answer files" for unattended installations.
The answer file is like the previous "Unattend.txt" file on Windows 2000/XP, which allows you to preset all the options for Windows Installer, so users don't have to sit in front of the computer and keep clicking "Next" Options.
Vista's answer file is better planned than the Unattend.txt file. They are stor
Uicccard itself does not implement specific functions, just as an indirect interface to Uicccontroller to provide uicccardapplication objects and complete the creation of catservice work, And when the SIM card is plugged in or unplugged, the prompt box will need to restart the device.
first, the main function of Uicccard
We look at its functionality from the main methods provided by Uicccard. [Java] view plain Copy public boolean ISAPPLICATIONONICC
Frequently Used at commands of the Wavecom q2358c CDMA module are as follows:Factory certification at + cgmi get the manufacturer's logoSupported band for at + cgmm QueryRevise the software version for at + cgmr CertificationThe production sequence number at + cgsn queries IMEI No.Set at + CSCs for te to Support NetworkQuery imsi at + CIMI query International Mobile Phone support certificationCard authentication at + CCID query SIM card serial numberF
Below I from the perspective of Android development, simply write how to get mobile device information and mobile phone numberPreparation conditions: An Android phone, mobile SIM card to ensure plug-in phone, Eclipse ADT and ANDROID-SDK development environmentFirst step: Create a new Android project (Jinshantest),and need to add permissions in the project's Androidmanifest.xml fileLegend:Step Two: Create a new tool class Phoneinfo.java1.package com.ji
The MTK platform obtains the imsi number in the SIM card of the local machine.
The company developed the MTK platform. The boss requested the mobile phone number of the SIM card on the local machine to be obtained from the MTK code. After checking a lot of information, the result would not be available, the reason is that the mobile phone number is not directly stored in the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.