Midea Group invested in the establishment of Zhixiang Life Electric Appliance Manufacturing Company.

According to public information, Zhixiang Life Electric Appliance Manufacturing Co., Ltd. was established recently. The legal representative is Xu Pingping, with a registered capital of 10 million yuan. Its business scope includes: research and development of household appliances; Household appliances manufacturing; Sales of household appliances; Sales of spare parts for household appliances; Retail of household appliances; Repair of household appliances, etc. According to the equity data, the company is wholly owned by Guangdong Midea Environmental Electric Appliance Manufacturing Co., Ltd., a subsidiary of Midea Group.

Team article by Professor Yu Kai from Shanghai Jiaotong University

Title: acoustic word embeddings for end-to-end speech synthesis (end-to-end speech synthesis based on acoustic word embedding)

Journal: Applied Sciences

Authors: Feiyu Shen, Chenpeng Du and Kai Yu,

Publication date: 27 September 2021

DOI:10.3390/app11199010

Wechat link:

https://mp.weixin.qq.com/s? __biz=MzI1MzEzNjgxMQ==&mid=2650042375&idx=2&sn=

151c5c62ae0d5583c474b10c284d5428&chksm=f1d9cac3c6ae43d556bf64fb78ad7179

03d668684fdcafaee7dd0ffd1d686fc17a573d1c6c20&token=497878244&lang=zh_CN#rd

Journal link:

https://www.mdpi.com/journal/applsci

Introduction of communication author

Professor Yu Kai

Shanghai Jiao Tong University

The main research direction is the research and industrialization of interactive artificial intelligence, speech and natural language processing and machine learning.

Speech synthesis is one of the key issues to realize human-computer interaction. Yu Kai’s team from the Cross-media Speech Intelligence Laboratory of Shanghai Jiaotong University recentlyApplied SciencesIn this paper, an end-to-end speech synthesis method based on acoustic word embedding is studied.

introduction

In recent years, the end-to-end text-to-speech synthesis (TTS) model based on sequence-to-sequence generation architecture has achieved great success in generating natural speech. In order to avoid frame-by-frame decreasing, unnatural TTS models, such as FastSpeech and FastSpeech2, are proposed to improve the speed of speech generation. However, vocabulary recognition is very important for TTS systems to generate highly natural speech, but most end-to-end TTS systems only use phonemes as input markers, ignoring the information of which vocabulary phonemes come from.

Previous studies used preset language words to embed phoneme sequences as the input of TTS system. However, because language information is not directly related to how words are pronounced, the embedding of these words hardly affects the improvement of TTS quality. In this paper, a word acoustic embedding method combined with TTS system is proposed. Experiments on LJSpeech data set show that the acoustic embedding of words significantly improves the likelihood of prosodic prediction of sonic level on training set and verification set. The subjective evaluation of the naturalness of synthesized audio shows that the system with acoustic word embedding is obviously superior to the pure TTS system and other TTS systems with preset word embedding.

design highlights

1. Propose an end-to-end TTS system based on Acoustic Word Embedding (AWE) joint training to help improve rhythm and naturalness;

2. Using the prosody modeling method based on GMM to objectively measure the prosody of synthesized audio;

3. Explore the best structure of word encoder and the best threshold of word frequency screening;

4. Subjective evaluation after the test shows that AWE is more natural than pre-trained word embedding.

End-to-end speech synthesis method based on acoustic word embedding

Part1: end-to-end speech synthesis

In this paper, FastSpeech2 is selected as the acoustic model, but prosody modeling is not explicitly considered, which makes it difficult to objectively evaluate the prosody prediction performance of TTS system without subjective listening test. Based on this, a phoneme-level prosodic prediction module is introduced into the model, which can predict the prosodic embedding distribution of each phoneme autoregressively. Compared with the standard Fastspeech2 system, it can not only improve naturalness, but also allow the logarithmic likelihood of prosodic embedding to easily and objectively evaluate the prosodic prediction performance at phoneme level, as shown in Figure 1.

Figure 1. End-to-end speech synthesis based on GMM prosody modeling.

Part2: Acoustic Word Embedding

Nowadays, most popular TTS systems use phonemes as sound input markers, ignoring the information of which vocabulary phonemes come from. However, vocabulary recognition is very important for TTS system to generate highly natural speech. In this paper, acoustic word embedding is proposed to synthesize natural speech, and a word encoder and a word phoneme aligner are introduced into the traditional TTS system. The architecture is shown in Figure 2.

Figure 2. Model architecture with acoustic word embedding.

Experimental setup and results

1. Experimental setup

The TTS model in this paper is based on Fastspeech2 (GMM prosodic modeling). The number of Gaussian components in GMM is set to 20, and Adam optimizer and Noam learning rate scheduling strategy are used for TTS training. The researchers used 320mel-spectrogram as acoustic features, with a frame shift of 12.5ms and a frame length of 50 ms.. MelGAN is used as vocoder to reconstruct waveform.

2. Word encoder architecture

The performance of three common word encoder structures is compared.

(1) None: the baseline of the word encoder is not used;

(2) BLSTM;: a layer of 512-dimensional bidirectional LSTM;

(3) Transformer: 6-layer 512-dimensional transformer module;

(4) Conv+Transformer: one layer of 1D-CNN with a core size of 3, followed by six layers of 512-dimensional Transformer module.

Table 1. Parameter number and reasoning speed of various encoder architectures (sec/frame).

3. Word frequency threshold

Table 2. Vocabulary and OOV under different word frequency thresholds.

Fig. 3. Loglikelihood curve of phoneme prosody with different word frequency thresholds.

conclusion

In this paper, an innovative method of directly training acoustic embedding of words in TTS system is proposed. The phoneme sequence and the word sequence pass through two encoders respectively, which are used as the input of TTS system together, and then the two output hidden states are spliced together for phoneme-level prosodic prediction. Experiments on LJSpeech data set show that the superposition structure of convolution and Transformer is the best for word encoder. In addition, the selection of word frequency threshold should be cautious, too large or too small threshold will lead to performance degradation. Finally, this paper compares the proposed system with several works that do not use the baseline of lexical information and use pre-trained words to embed. The subjective listening test shows that the system proposed in this paper is superior to all other systems in naturalness.

Applied SciencesPeriodical introduction

Editor-in-Chief: Takayoshi Kobayashi, The University of Electro-Communications, Japan.

The subject of the journal covers all aspects of applied physics, applied chemistry, engineering, environmental and earth sciences and applied biology.

 
 
 
Special statement: this article is reproduced only for the purpose of spreading information, and does not mean to represent the views of this website or to confirm the authenticity of its contents; If other media, websites or individuals reprint from this website, they must keep the "source" indicated on this website and bear legal responsibilities such as copyright; If the author doesn’t want to be reprinted or contact the reprint fee, please contact us.

In the era of vehicle networking safety and strong supervision, understand the key points of implementing mandatory national standards in advance →

  Driven by artificial intelligence and the new generation of information and communication technology, the automobile industry is accelerating the transformation, and intelligent networked vehicles have become the key direction of the global automobile industry transformation. However, development and risk coexist. According to the monitoring data of China Information and Communication Research Institute, in 2023, there were 8.05 million attacks on domestic car networking service platforms, a year-on-year increase of 25.5%.

  Intelligent driving, safety first. How to fasten the network "safety belt" for "smart car"? () Experts gave the answer when interviewed by CCTV →

  In order to further improve the technical level of information security protection of China’s automobile products, strengthen the ability of industrial chain risk prevention and response to cyber attacks, and build a baseline of automobile information security protection, the Ministry of Industry and Information Technology has organized the formulation of the mandatory national standard GB 44495-2024 "Technical Requirements for Vehicle Information Security" (hereinafter referred to as the "Standard"), which will be officially implemented on January 1, 2026.

  The Standard specifies the requirements of the automobile information security management system, as well as the technical requirements and test methods for external connection security, communication security, software upgrade security, data security, etc., and is applicable to M-class, N-class and O-class vehicles equipped with at least one electronic control unit.

  Tianrongxin, based on the detailed requirements for automobile information security in the Standard, analyzes the specific implementation path of the Standard around two chapters: information security management system requirements and information security technical requirements, hoping to provide effective technical reference for automobile information security construction.

  Information security management system requirements

  Vehicle information security management system that vehicle manufacturers should establish

  The Standard points out that vehicle manufacturers need to establish and strictly abide by the automobile information security management system covering the whole life cycle of vehicles.

  Internal management process

  Internal management processes involving information security should be formulated to ensure a clear division of responsibilities for information security and form a systematic management framework.

  risk management

  Establish a comprehensive risk management process, including identification, evaluation, classification and disposal of vehicle information security risks, and take corresponding measures according to different threat levels.

  Information security test

  Formulate and implement the vehicle information security testing process to ensure that the vehicle information system meets the safety requirements in all aspects of design, development, production and use.

  Monitoring and response

  In view of the network attacks, network threats and loopholes of vehicles, the process of real-time monitoring, rapid response and timely reporting is formulated to prevent the occurrence and spread of potential safety incidents.

  Supply chain management

  Formulate and implement the management process to ensure that the information security cooperation between suppliers and service providers meets the standard requirements.

  Tianrongxin: It can assist vehicle manufacturers to complete the construction of automobile information security system, and provide business consulting support, certification process guidance, system documents and process documents development.

  Business consulting and certification support: provide information security management system consulting and certification process guidance, and help enterprises build management processes that meet the requirements.

  Document and document development: assist in the development of information security management system documents, including management process, test and verification, risk management, etc., to ensure that the system is documented.

  Process construction: support the establishment of risk management, TARA analysis and safety testing processes, covering parts and vehicle safety testing.

  Vulnerability management: provide a vulnerability management process of monitoring, responding and reporting to ensure that enterprises respond to security vulnerabilities in a timely manner.

  Supplier management and platform construction: formulate supplier management system and build a safety management platform for vehicle networking to ensure effective reduction of information security risks.

  Technical requirements for information security

  Vehicle manufacturers should improve their information security capabilities.

  External connection safety requirements

  The Standard specifies the safety requirements for external connections to ensure that vehicles are free from the risks of attacks and data leakage when using wired and wireless connections. The specific contents include:

  Remote vehicle control safety: ensure the communication safety through remote control and prevent illegal vehicle control caused by remote attack.

  Third-party application security: protect the interaction security between third-party applications and vehicle systems, and prevent third-party applications from being maliciously exploited.

  External interface security: prevent intrusion through physical interfaces (such as USB and OBD ports) and ensure interface security.

  Tianrongxin: The safety of external connection of vehicles can be ensured through vehicle safety SDK, vehicle networking safety operation platform and vehicle safety detection platform.

  Vehicle Security SDK: It has the functions of intrusion detection, authentication and encryption, and firewall, and can comprehensively detect and reinforce the external interface of vehicles, remote control applications and third-party applications.

  Safety operation platform of vehicle networking: monitoring the safety status of vehicle network, realizing centralized management of safety events, risk awareness and safety disposal, providing various safety capabilities such as asset management, vulnerability management, alarm assessment, emergency response and situation awareness, and building a complete safety situation awareness and operation system of vehicle networking.

  Vehicle networking security detection platform: Through vehicle system security detection tools, vehicle networking application security detection tools, vehicle networking vulnerability scanning tools, etc., it helps vehicle companies and detection institutions to conduct safety baseline detection and standard compliance verification for vehicle external connection network security.

  Communication security requirements

  Communication security is a key part of the automobile information security protection system. The Standard puts forward the following technical requirements for communication security:

  Communication security is a key part of the automobile information security protection system. The Standard puts forward the following technical requirements for communication security:

  Communication authentication: ensure the authenticity of all communication participants and prevent unauthorized access.

  Integrity of communication channel: ensure that data has not been tampered with during transmission, and ensure the integrity of data.

  Validity of communication instructions: ensure the legality of all communication instructions and prevent forged instructions or malicious operations.

  Regional border protection: border protection ensures the safe isolation between the communication inside and outside the vehicle and prevents unauthorized access.

  Threat data identification and attack detection: detect abnormal data flow and potential attack behavior in time to prevent data leakage or system intrusion.

  Tianrongxin: The security of vehicle communication system can be guaranteed by means of communication identity authentication and encryption, communication channel integrity protection, and communication instruction validity and legality verification.

  Authentication and encryption of communication identity: through authentication and encryption technology, the identity authenticity of all communication participants is ensured, unauthorized access is prevented, the legitimacy of communication channels and encrypted transmission of data are guaranteed, and the confidentiality and integrity of data during communication are ensured.

  Integrity protection of communication channel: using encryption algorithm and data verification technology to ensure that data is not tampered with during transmission, prevent man-in-the-middle attacks and ensure the integrity of communication channel.

  Validity and legality verification of communication instructions: Based on vehicle communication protocol and instruction verification mechanism, ensure the legality of all communication instructions and prevent forged instructions, malicious operations or unauthorized instruction injection.

  Regional boundary protection and isolation: Through vehicle-mounted firewall technology and network security domain division, the security isolation between in-vehicle and out-of-vehicle communication is established to prevent cross-domain attacks or unauthorized access and ensure the communication security between different areas.

  Threat data identification and attack detection: The vehicle-mounted intrusion detection and defense system (IDS/IPS) can monitor and record abnormal communication data flow in real time, detect and identify potential attacks in time, and prevent data leakage and system intrusion.

  Network security testing and verification: provide integrated and standardized vehicle networking security testing capabilities through the vehicle networking security detection platform, identify potential threats in the vehicle communication process, analyze system vulnerabilities, verify the compliance capabilities of vehicles and parts, and ensure vehicle communication security.

  Security requirements for software upgrade

  The Standard clearly requires the safety of vehicle software upgrade, mainly focusing on the following aspects:

  Vulnerability security: Prevent the vulnerabilities in the software upgrade package from being exploited by attackers and ensure the security of the upgrade package.

  Online upgrade security: ensure the confidentiality and integrity of data transmission when upgrading software remotely, and prevent data leakage and tampering.

  Offline upgrade security: ensure the security of upgrade package and upgrade equipment during offline upgrade, and avoid malicious modification or malicious code implantation of upgrade package.

  Tianrongxin: provide all-round software upgrade security for vehicle manufacturers and third-party suppliers, and ensure the vulnerability protection of upgrade packages during the whole upgrade process and the security of online and offline upgrades.

  Vulnerability scanning: comprehensively scan and detect the vulnerabilities of the on-board software upgrade system and upgrade package, identify potential security vulnerabilities that may be exploited by attackers, and ensure that there are no security risks in the software upgrade package, which meets the requirements of vulnerability protection.

  Online upgrade security: through data encryption and authentication mechanism, the data transmission security during remote software upgrade is ensured, and the upgrade package is prevented from being intercepted, leaked or tampered during transmission. The system will verify the legality of the upgrade package to prevent unauthorized malware installation.

  Offline upgrade security: strictly verify the offline upgrade package and upgrade equipment to ensure the security of offline upgrade package and storage media. By encrypting and authenticating the upgrade equipment and media, the upgrade package can be prevented from being maliciously tampered with or implanted with malicious code, and the integrity and security of data in the offline upgrade process can be ensured.

  Security detection: security detection is carried out in all aspects of the upgrade to verify the authenticity and integrity of the upgrade package, to ensure that the system can operate stably and safely during the upgrade process, and to avoid the security threat caused by malicious tampering or counterfeiting of the upgrade package.

  Data security requirements

  With the continuous improvement of automobile informatization, the security of data in production, storage, transmission, access, use and destruction has become very important. The Standard puts forward multi-level protection requirements for data security, mainly including:

  Data production safety: ensure the safety of the data generation process in the car and prevent the data from being tampered with in the generation process.

  Data storage security: through encryption and access control mechanisms, ensure that key data stored in the car (such as vehicle identity information, sensitive personal information, security logs, etc.) will not be accessed or modified by unauthorized personnel.

  Data transmission security: ensure that the confidentiality and integrity of data are not threatened during the transmission between the car and the car.

  Data access control: set strict access control on key data in the car to ensure that only authorized personnel can access or operate.

  Data destruction security: ensure that when data is no longer needed, it can be destroyed safely and thoroughly to prevent data leakage.

  Tianrongxin: It can provide a vehicle data security mechanism to ensure the safety of vehicle data in all aspects of data production, storage, transmission, access and destruction.

  Data production safety: strictly protect the generation process of in-vehicle data to ensure that the data will not be tampered with or maliciously operated in the generation process, and ensure the authenticity and integrity of the data source.

  Data storage security: through encryption technology and access control mechanism, the key data stored in the car, such as vehicle identity information, sensitive personal information and security logs, are protected to ensure that these data will not be accessed, read or tampered by unauthorized personnel.

  Data transmission security: Encrypted transmission protocol is adopted to ensure high confidentiality and integrity of data transmission inside and outside the vehicle, and to prevent data from being intercepted, leaked or tampered with during transmission.

  Data access control: set strict access control for key data in the car to ensure that only authorized personnel can access or operate these data, effectively avoiding unauthorized access and potential security risks.

  Data destruction security: when data is no longer needed, ensure that data can be destroyed safely and thoroughly, and prevent the risk of data leakage or malicious recovery in the destruction process.

  In addition, based on Tianrongxin vehicle networking security detection platform, the vehicle data security capability is comprehensively tested and verified through automated and standardized processes to ensure that data security measures meet the requirements of the Standard, and at the same time effectively reduce the potential risks of vehicles in data security.

  According to the forecast, in 2025 /2030, the incremental output value of China’s automobile and Lu Yun integration is expected to reach 729.5/258.25 billion yuan respectively. As a mainstay, the intelligent networked automobile industry accounts for more than 80%. Based on the continuous accumulation practice, Tianrongxin has now formed an Internet of Vehicles security system, which includes integrated deep Internet of Vehicles security protection, multi-dimensional Internet of Vehicles data security governance and full life-cycle Internet of Vehicles security operation. In a recent interview with Information Security and Communication Security Magazine, Tianrongxin Fan Xuejian emphasized that the integrated safety of vehicles and Lu Yun should focus on the whole chain protection!

  The safety of intelligent networked automobile products is the focus of consumers’ attention, and it is also the fundamental guarantee for the sustained and healthy development of intelligent networked automobile industry. In the future, Tianrongxin will adhere to the development of the vehicle networking industry with safety "genes", continue to strengthen the deep integration of new technologies, new models and intelligent networking scenarios, and explore a new paradigm of intelligent networking vehicle safety. Based on cloud security protection, it will form a flexible and adaptive vehicle-road cloud protection system with deep defense, synergy and linkage.

Detailed explanation of WeChat "trumpet" function

The national software WeChat once again attracted attention.

On February 3, "WeChat mobile phone number can register two accounts" rushed to the hot search. What do you mean, "WeChat mobile phone number can register two accounts"? Simple understanding is the "trumpet" of WeChat. If you only have one mobile phone number, but want to register two WeChat accounts, it was not possible before, but now you can register two micro signals with one mobile phone number.

For many WeChat users, with more and more WeChat friends, all kinds of friends are concentrated in a micro-signal, which is inconvenient to manage, so many users work under one number and live under one number. As early as 2018, the new function released by WeChat has the function of switching login accounts. However, switching accounts means that you need two mobile phone numbers to register two WeChat accounts.

Many WeChat users feel that this function is a real "epic update". How to register WeChat "trumpet"? What will happen to the new and old WeChat accounts after registration? What should I pay attention to when using it? What convenience can "trumpet" bring?

To register WeChat trumpet, you can do it in WeChat-Me-Settings. Click Switch Account in Settings, and the currently used WeChat account and the prompt of "Add Account" will appear on the page. After clicking Add Account-Register a new account, you can choose whether to register with the new mobile phone number or use the current WeChat mobile phone number to assist in registration.

Of course, the WeChat "trumpet" is registered with the current WeChat mobile phone number. Many netizens said that the WeChat "trumpet" could not be opened for various reasons, for example, the WeChat account without WeChat payment could not be opened, and some netizens encountered the prompt that "there are many people trying to register at present, so you can try again later" when registering. In short, I feel that the current registration function is not stable.

Of course, not all WeChat users can register WeChat "trumpet". There is a certain threshold. According to the official announcement, the conditions for opening WeChat "trumpet" include that the current WeChat account has been bound with the mobile phone number, WeChat payment has been opened, and the registration time has exceeded a certain period of time, and the current account has no security risks.

The step of "auxiliary registration through the current WeChat mobile phone number" is not complicated. According to the prompt, security verification is carried out, including sending a short message according to the prompt, and the user is required to send a short message with the specified content to a specified number with the current WeChat mobile phone number. In fact, the whole registration process is basically this step, and then we need to set the micro signal and login password.

When logging in to this "trumpet" for the first time, WeChat will prompt you to create a micro signal. Be sure to remember that the micro-signal should be set to be easy to remember, because after the registration is completed, the micro-signal "trumpet" will appear in the list of "switching accounts". If you choose to log in with "trumpet", you can’t log in with your mobile phone number as before, but log in by "micro-signal+password". Although you can get it back if you forget the micro-signal, it will be more troublesome.

There is not much difference between using WeChat "trumpet" and using the old WeChat account. The most basic chat, address book and circle of friends are almost the same. There is no data sharing between the WeChat trumpet and the original WeChat account. The friends in the WeChat account are still in the original WeChat account, and the friends in the WeChat trumpet should be added again, which is equivalent to opening a brand-new WeChat account.

However, because there is no real-name authentication, the function of WeChat payment cannot be used in the "trumpet". If you want to open WeChat payment, you need to re-authenticate your real name, that is, you need a mobile phone number for registration authentication.

You don’t need a mobile phone number to register a new WeChat. The WeChat "trumpet" is like a "compressed version". Besides separating work and life to a certain extent, it can also be used by children. Before registering a WeChat account for a child, it was necessary to "consume" a parent’s mobile phone number or set up a new one, which would also bring some inconvenience. Opening a "trumpet" can solve this problem.

Tips:

About WeChat "trumpet", you need to know these.

Q: How many WeChat accounts can a WeChat account assist in registering?

A:What we call "trumpet" is actually to register a new account with an authenticated WeChat account. Each WeChat account can only register one WeChat account, that is, there can only be one trumpet. If you want to register more than one "trumpet", the page will prompt "It is temporarily impossible to register a new micro-signal".

Q: How to let others search for their own "trumpet"?

A:When adding a friend, just tell the other party your own "small" micro signal. If you tell the other party your mobile phone number, the other party will find the original WeChat account.

Q: What should I do if I want to use WeChat payment on the trumpet?

A:You need to bind a new mobile phone number to "trumpet", but it must be a mobile phone number that is not bound to other WeChat, which is equivalent to making "trumpet" an independent WeChat account. Specific operations can be in the "trumpet" I-Settings-account and security-mobile phone number in the binding of a new mobile phone number, go through the identity authentication and other real-name processes.

Q: If you forget the micro-signal and password of the trumpet, how can you get it back?

A: When registering a trumpet, you need to use a mobile phone number to complete a short message verification. This is to ensure the security of the registered account, and this mobile phone number is only used for micro-signal security verification in registration. If there is no "trumpet" bound to the new mobile phone number, you can perform security operations such as login verification and password recovery verification through the old account. If the "trumpet" has been bound with a new mobile phone number, just log in or retrieve the password through the mobile phone verification code.

Q: Many users find it troublesome to switch WeChat accounts. Can I log in to two accounts at the same time after opening the "trumpet"?

A:You think too much about this question, and it is still not possible at present. The two WeChat accounts are relatively independent.

You can have a look

Don’t miss these new WeChat features.

In addition to registering WeChat "trumpet", if your WeChat is upgraded to the latest version 8.0.32, I believe you will find many changes, which is also the first updated version of WeChat in 2023.

1. Add a message prompt when refusing to call.

When I received a voice or video call from WeChat at an inconvenient time, all I could do before was to "refuse". After the rejection, if you want to send a message to the other party, in addition to the reminder of "Call Rejected", a "Send Message" button is added on the message banner of voice or video. Click "Send Message", the page will automatically jump to the quick chat interface, and you can send a message directly to the other party, eliminating the step of going to the friend list to find friends.

2. Support indoor map function

Many "road idiots" have the experience of getting lost in the shopping mall. If you make an appointment to meet your friends in the shopping mall, but you just can’t find the location that your friends said, you can try the indoor map function of WeChat. When sending location or real-time location to friends, the new version can not only send accurate floor location, but also specific to a store. However, at present, only some regions and large supermarkets support this function. If the coverage is getting wider and wider, this function is still very practical.

3. Video playback is scalable

Watching photos on WeChat can be zoomed, but watching videos can’t. Now watching videos and watching photos have "equal treatment". After selecting a video, click "Play Full Screen", and you can pinch or double-click the screen with your two fingers. The video screen will be enlarged or reduced, similar to zooming photos.

4. Customize chat history cleaning

Chat record is the "treasure" of WeChat, which accounts for most of the chat record in the memory of the mobile phone, and it is very tangled every time it is deleted. Before, you can choose to clean up the chat history in the time range of all time, three months ago and one year ago. Now the time range you can choose is more detailed, and now the option of "custom time" has been added to the filter criteria. By "start date" and "end date", you can clean up the chat records of a certain day, or you can freely choose to clean up the records of a certain time period, so that you can delete them more accurately and greatly improve the convenience.

Changan’s listing will be a hit, with 1.5L+ pre-driver.

Many netizens left messages to see Changan UNI-V iDD, and it came today. The following small series will tell you in detail.

First of all, from the appearance, the head of Changan UNI-V Zhidian iDD looks very solid and sporty. The headlights are very cute and highly recognizable. The car is equipped with LED daytime running lights, automatic opening and closing, adaptive far and near light, delayed closing and so on. Coming to the side of the car body, the car body size is 4720MM*1838MM*1435MM, and the car body looks very full with large-sized thick-walled tires, which is eye-catching. Looking back, the overall shape of the rear of the car echoes the front face, and the taillights give people a very round feeling, which is very simple.

In terms of interior, the interior of Changan UNI-V Zhidian iDD presents a simple design style, which is consistent with the positioning of the car. The steering wheel shape of the car is eye-catching, and it is made of imitation leather, which looks a little more delicate. From the central control point of view, the car is equipped with a young touch-sensitive LCD central control screen, which makes the interior style impressive and the details are still in place. The interior feels good. Let’s take a look at the dashboard and seats. The dashboard design is remarkable and eye-catching. The car adopts imitation leather seats, which are wrapped in place, with exquisite materials and comfortable ride.

In terms of configuration, Changan UNI-V Zhidian iDD is equipped with driving mode selection, remote control key, Bluetooth key, interior atmosphere light, traction control (ASR/TCS, etc.), original factory interconnection/mapping and other configurations.

Do you have a lot of ideas after reading today’s story? The model class introduced today is the most considered class when many people buy their first car, mainly because the size of this class is moderate and the price is reasonable.

Guangzhou Automobile Toyota Fenglanda, a standard 2.0L engine, starts at 125,800 yuan.

withoutOn the timeshowfor interrogatives and adverbs/used to show confusechangemove, users just need itbuyCheshi,"cost-effective"convenienceexistthisindividualtimewaitBecome an electionselectvehicletypeofmarkQuasi.

specialdon’tbeexistCompact SUVleadregion, "justbuysteamvehicleThis specialpointtablecurrentgetmoreforsuddenlycome out, "thin skin stuffing.many"ofproduceproductTo consumerscomesayMorehaveTemptation.

Gac Toyota fenglandarighteyefrontConsumer’sinclined to one sidegoodwatch from a height or distancesuch aspoint topalm.

For example, the handsome front face shape, the addition of three-dimensional embedded front fender and the long and narrow headlight group make a clear distinction between Fenglanda and other models of GAC Toyota, and also make the sense of movement of the whole vehicle more prominent.

And with the addition of bright cutting aluminum alloy wheels and suspended LED taillights, GAC Toyota Flanders have a sense of movement and strength.Let’s not talk about its seven bicycle colors and four double car colors, so that consumers can choose.Diversified choices can satisfy consumers’ demand for individuality.

After entering the car, the space visual design is simple and capable.There are not many physical buttons in the cockpit of Guangzhou Automobile Toyota Fenglanda, and there is one suspended central control panel with rich built-in.

At the same time, GAC Toyota Flanders is also equipped with 7 or more SRS airbags and 9 high-profile models, while the same class cars are usually only 6 models.Guangzhou Automobile Toyota Fenglanda even has knee airbag equipment in the driver’s seat, which is rare at the same level.

From the point of view of active safety, Toyota Safety Sense Zhixing safety system equipped by Guangzhou Automobile Toyota Fenglanda has achieved quasi-L2 automatic driving, which also makes Guangzhou Automobile Toyota Fenglanda the leader among joint venture compact SUVs of the same level.

The tough body and abundant airbags have built a solid protective net for GAC Toyota; Toyota Safety Sense security system performs sentry duty to provide security for safe travel.

On the whole, the strength of GAC Toyota Flanders can be seen. The whole system uses 2.0L engines, and many models in the same class start with 1.5L engines.It also performs well in power, with a maximum speed of 100km/h and a maximum climbing degree of-7. In addition, Guangzhou Automobile Toyota Front Lante also adopts a dual-clutch automatic transmission.Moreover, GAC Toyota Fenglanda has been equipped with active safety driving assistance since the second lowest match, but many cars of the same class are only installed on the high match.

The battery life reaches 820KM! FAW Hongqi EH7 is listed, starting from 229,800 yuan

In the increasingly fierce competition in the new energy vehicle market, FAW Hongqi has once again refreshed consumers’ expectations. Recently, FAW Hongqi’s newly launched EH7 model was officially launched. The EH7 model has a cruising range of up to 820 kilometers, bringing users a more lasting and convenient driving experience. The starting price of FAW Hongqi EH7 is 229,800 yuan, which will undoubtedly add new vitality to FAW Hongqi’s competition in the new energy vehicle market.

In terms of appearance, the front face adopts a closed front grille design, and the headlights on both sides present two positive and negative "7" shapes, but the lower part is not the headlights but the air inlet. The lower air inlet is like a curved shape on both sides, which is very similar to a smiley face. The black front lip of the car also adds a bit of movement to the car, and the logo adopts a new shape.

The lines on the side are very smooth, the front fender is made of black and red decorative panels, and the door handle is made of hidden door handles. The overall shape of the tail looks very full, the ducktail above is full with the sporty rear surrounding movement at the bottom, and the through tail light in the middle and the extended wing design on both sides are very recognizable. In terms of body size, the length, width and height are: 4980mm, 1915mm, 1490mm, and the wheelbase is 3000mm.

In the interior part, the most eye-catching feature is its special-shaped central control screen. The gradually narrowing design from the central control screen to the dashboard is still very novel. The size of the dashboard and the central control screen is 6 inches and 15.5 inches. The steering wheel is equipped with a double-spoke multi-function steering wheel that is straight up and down. The bottom of the central control screen is also equipped with a number of touch buttons. There are also two water cup holders in the storage area below. There is also a wireless charging panel with a hair dryer on the suspended armrest.

In the power part, the car adopts pure electric drive mode, using rear single motor and front and rear double motor two configurations, the maximum horsepower of the single motor version is 344 horsepower, the maximum torque is 450N · m, the total horsepower of the dual motor version is 619 horsepower, the total torque of the motor is 756N · m, the fastest acceleration time of 100 kilometers is 3.5 seconds, and the power consumption of 100 kilometers is in the range of 13.9kWh to 15.1kWh. The batteries are all made of Sanyuanli batteries of Ningde era. The battery capacity is 75/85/111 kWh three capacity versions, of which the maximum fast charging power is 365kw.

In terms of configuration, the entire vehicle is equipped with a high standard active safety warning system, side air curtain, full-speed adaptive cruise, 360-degree panoramic image, L2-level auxiliary driving, variable steering ratio system, non-openable panoramic sunroof, mobile phone Bluetooth key, keyless entry for the whole vehicle, electric adjustment of the main and passenger seats, and a variety of driving modes.

To sum up, the launch of FAW Hongqi EH7 has undoubtedly brought new vitality to the new energy vehicle market. Its long battery life, unique appearance design, luxurious interior configuration and strong power performance have all made consumers look forward to this model. If you are interested in this car, please leave a message in the comment area.

Shanghai area red flag EH7 price cut is coming, the lowest price 199,800! Quantity is limited

Welcome to Autohome Shanghai Promotions Channel to bring you the latest car information. At present, high-profile models are undergoing large-scale promotions, and car buyers in Shanghai will have the opportunity to enjoy a cash discount of up to 30,000 yuan. The minimum selling price of this luxury sedan has been adjusted to 199,800 yuan, which undoubtedly provides consumers with an excellent opportunity to buy a car. If you are interested in Hongqi EH7, don’t miss this rare opportunity. Click "Check Car Price" in the quotation form now, and contact the dealer as soon as possible to get more specific preferential policies and higher discounts to start your distinguished driving experience.

上海地区红旗EH7降价来袭,最低售价19.98万!数量有限

上海地区红旗EH7降价来袭,最低售价19.98万!数量有限

As a luxury business car, the Hongqi EH7 shows the side design of elegance and power. The body size is 4980mm*1915mm*1490mm, and the wheelbase is up to 3000mm, ensuring a spacious interior space and a comfortable ride experience. The precise layout of the front wheelbase of 1645mm and the rear wheelbase of 1655mm gives the vehicle excellent stability. The tire size is 245/50 R18, and it is paired with a streamlined wheel design, which not only provides good grip, but also adds a sense of mobility and fashion to the vehicle. Overall, the side lines of the Hongqi EH7 are smooth and full of power, highlighting its extraordinary identity and taste.

上海地区红旗EH7降价来袭,最低售价19.98万!数量有限

In terms of interior design, Hongqi EH7 adheres to the concept of both luxury and technology. The car is wrapped in exquisite leather to create an elegant and comfortable atmosphere. The steering wheel is made of advanced leather to provide a good grip, and supports manual up, down, and front and rear adjustment to ensure that the driver can easily find the ideal position. A large 15.5-inch central control screen stands in front, equipped with an advanced automatic speech recognition control system, which can easily control functions such as multimedia, navigation, telephone and air conditioning, showing the intelligent side of technology.

In the seat part, the Hongqi EH7 is made of imitation leather and leather/flip material, which is not only comfortable to the touch, but also has good air permeability. The main driver’s seat has four-way adjustment, including front and rear, backrest, high and low and waist support, providing comprehensive comfort support. The passenger seat also supports multi-directional adjustment to ensure passenger comfort. The front seat is also equipped with heating and ventilation functions, as well as headrest speakers, so the driver can enjoy a high-quality ride experience. In addition, the driver’s seat is also equipped with a power seat memory function, reflecting the thoughtfulness of user requests.

In terms of practical configuration, the car is equipped with two USB and Type-C ports in the front and rear rows to meet the charging needs of passengers. The front row is even equipped with a wireless charging function for mobile phones, highlighting the intelligent and user-friendly design of the Hongqi EH7. The rear seats support proportional reclining, providing passengers with flexible loading space to meet the travel needs of different occasions in an all-round way.

The Hongqi EH7 is equipped with a powerful engine with a maximum power of 253 kW, providing the driver with abundant power support. At the same time, the maximum torque of the engine is 450 Nm, ensuring that the vehicle can maintain good acceleration and responsiveness in all road conditions. The excellent performance of this engine undoubtedly enhances the overall driving experience of the Hongqi EH7.

In short, as the owner of Autohome said, the Hongqi EH7 has successfully captured the hearts of consumers with its unique design and exquisite craftsmanship. Whether it is the aesthetic pursuit of the appearance or the use of technology in the details, it shows the deep understanding and persistent pursuit of the Hongqi brand for high-end luxury cars. This car undoubtedly finds the best balance between luxury and innovation, bringing users a driving experience that exceeds expectations.

18 Tule 4.0 Middle East Edition XE Cost-effective off-road vehicles

  The large and medium-sized SUVs of various luxury brands are inseparable from each other, and with the arrival of the Tule 4.0 L version, it is like a sharp sword, breaking through their circle and attempting to insert a foot; the new Tule 4.0 uses its full-size SUV ima****o stand at a high place and defy those opponents who occupy this market segment, as if to express: "****** human beings, brother from the million level to accompany you to play". As a Japanese full-size hardcore off-road vehicle, Tule has directly dropped from the price of nearly one million to the price range of 46-680,000, and has entered the herd at a price that is cheaper for nearly 400,000. You must know that most of the full-size SUVs are hurting each other at the million level except for it.

  For more discount details, please call the phone number at the bottom of the article for consultation.

  The front face of the Nissan Tule 4.0 has a strong impact, which should be the roughest part of the car. The 18-inch wheel hub is not too big, and the shape of the multi-spoke wheel hub is relatively thick and luxurious. It adopts a high-performance front braking system with 4-piston calipers, which greatly enhances the safety performance of the Tule. The new Nissan Tule chassis adopts the most reliable hard shaft design, and the rear defense tilt bar can also have an electric cancellation function, which is convenient for off-road. This is a hard-core four-wheel drive model that is loved and rare by real four-wheel drive fans.

  Nissan Tule 4.0’s customary four-wind wheel design, the thickness is relatively comfortable, plus the material of leather and solid wood, it feels excellent in the hand. In addition, the steering wheel is powerful, integrated with audio, air conditioning control and Bluetooth car hands-free system, so that the driver is safer in driving, do not leave the steering wheel. At the same time, there is a steering wheel heating function. The interior of the 18 Nissan Tule Y62 4.0XE has both comfort and functionality. It is still a three-row model. The interior material is also more elegant, and the wood grain spline trim. The design of the central control part is more luxurious. The style of the standard Japanese luxury car, BOSE audio is the choice of many mid-to-high-end cars.

  Nissan Tourist has adopted a 4-piston caliper high-performance front braking system, which greatly enhances the safety function of Tourist. In terms of safety, the new Tourist is equipped with front airbags, seat airbags, front and rear side airbags, etc., which ensures your safety to a great extent. Nissan Tourist has won the favor of off-road enthusiasts with its strong off-road skills and excellent protection. Contented with off-road enthusiasts who travel remotely, wear sand, and cross the supply of very large Kuangsui. The Nissan Tourist chassis adopts the most reliable hard shaft plan, and the rear anti-tilt rod can have an electric cancellation function, which is convenient for off-road. This is the favorite and valuable hard four-wheel drive model for real four-wheel drive fans.

  The introduction of Nissan Tule 4.0 is enough to drive the re-shuffling of SUV models in the 500,000 price range. Its arrival can give you the full-size body you never thought of and the absolutely hardcore off-road hardware. At the same time, Tule can also provide eight years 180,000 kilometers of vehicle quality assurance. The disadvantage is that the low-end configuration is not luxurious enough, but in general, the advantages outweigh the disadvantages; no, when we shot this car in the store, eight batches of users came to see the car in two hours. You can see the popularity of this car.

  18 Nissan Tule Y62 Middle East 4.0 XE The rear design of the car is more prominent. The taillight group is fully transparent and integrated with LED light sources. In terms of body size, the length, width and height of the Tule are the same as the current model, with 5140/1995/1955mm and a wheelbase of 3075mm. The new Tule will continue the current power system. Equipped with VK56VD 4.0 V6 naturally aspirated engine, the maximum power is 293kW and the maximum torque is 555Nm. This engine has C-VTC intake and exhaust continuous variable valve timing control system, VVEL variable valve lift technology and in-cylinder direct injection technology.

Tianjin Fengcheng Yuanda International Trade Co., Ltd. – Binhai Store

  Address: Jinbin Jiezuo, No. 98 Huanghai Road, Binhai New Area Development Zone, Tianjin

  Tel: 15320135620 Manager Guo (same as WeChat)

  Disclaimer: The above car purchase discount information is provided by the comprehensive dealer on this website. Due to market factors, the price fluctuates greatly, and it is only for car purchase reference. Its authenticity, accuracy and legality are the responsibility of the dealer. This website does not provide any guarantee and does not assume any legal responsibility.

Comment immediately | three generations of blood is not allowed to apply. Why did the regular operation of the Tobacco Bureau go to the hot search?

  Today, a piece of news that "three generations of blood is not allowed to apply for a job as stipulated by the Tobacco Bureau in many places" went on a hot search. According to reports, the recruitment announcement of college graduates in 2023 issued by Shandong Tobacco Monopoly Bureau recently requires that candidates should not apply for positions that constitute cadres’ avoidance after employment, nor should they apply for positions in the unit system where they are husband and wife, lineal blood relatives, collateral blood relatives within three generations and close in-laws as leading members.

  Some media have found out that tobacco bureaus and tobacco companies in many parts of the country have put forward this requirement in recruitment. In fact, looking through the recruitment information of tobacco bureaus in recent years, we can find that it is a routine operation to list the avoidance system. The above provisions come from Article 11 of the Notice of China Tobacco Corporation of the State Tobacco Monopoly Bureau on Printing and Distributing the Measures for the Administration of Recruitment in the Tobacco Industry, which has existed for a long time and is very clear.

  Many netizens thought that this regulation only existed this year, and even thought that these regulations were stipulated by the local tobacco bureau itself, which is actually a misunderstanding.

  It is not just the tobacco industry. Generally speaking, government departments, state-owned enterprises and institutions have similar regulations to prevent inbreeding and nepotism, and there is no lack of regulation at the institutional level. Therefore, these recruitment regulations are more emphasis on the existing rules and disciplines, and are also the basic requirements for recruitment in the public sector. The key to our discussion should be implementation and supervision.

  Many people don’t know that this is an existing rule, but it actually reflects a question: Why is something that should be common sense not popularized? This may indicate that the avoidance system has not been emphasized and implemented enough in some places and departments.

  The website of the State Supervision Commission of the Central Commission for Discipline Inspection once issued a document saying, "Count the patrol feedback reports from the central and local governments in recent years, ‘ Nepotism ’ ‘ Inbreeding ’ It has been mentioned many times. From the perspective of the field, it is mainly concentrated in state-owned enterprises such as finance, telecommunications, electric power and tobacco "; And a typical case is disclosed: among the 691 cadres managed by the head office of ICBC, 220 cadres’ spouses and children have 240 people working in the system.

  At the same time, this article mentioned that the way of inbreeding is also more hidden. For example, tailor the recruitment requirements according to the conditions of relatives and conduct "resume-style" recruitment; Another example is to exchange conditions and cross-arrange with other units. Try every means to evade the avoidance system, and the supervision department should also detect this kind of small mind in time, improve the sensitivity of supervision, and especially give play to the social power of mass supervision.

  It is worth mentioning that there are some voices on the internet that are dissatisfied with the "three generations of so-and-so", and the voices of the three generations of electricity, oil, tobacco and banks are endless. This counterproductive "positive propaganda" has become a typical manifestation of "low-level red". Behind the fierce public sentiment is the simple and fair demand for employment, hoping to learn the real skills and find a good job; I hope that a good job is not an internal cycle in a small circle; I hope that "background" and "resources" will no longer become obstacles to the rise of children from poor families.

  Report to the 20th CPC National Congress of the Party pointed out, "Eliminate unreasonable restrictions and employment discrimination that affect equal employment, so that everyone has the opportunity to realize their own development through hard work". "Equal employment" and "anti-employment discrimination" first appeared in the report of the Party’s National Congress.

  Employment is the most basic livelihood, and it is also the ultimate destination and foothold of the "maximum fairness" of education fairness. This time, the public reacted so strongly to the long-standing old rule that "three generations of blood is not allowed to apply for jobs" in the tobacco system, pointing to the concern about "inbreeding" and longing for a level playing field in which people are competent and eat according to their real abilities.