首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 301 毫秒
1.
原核细胞仿生自修复电路设计   总被引:7,自引:2,他引:5       下载免费PDF全文
仿生电子阵列是模拟生物体自修复机制,具有在线自修复能力的新型电路.针对基于真核细胞的仿生电子阵列配置存储消耗大等不足,在比较真核细胞、原核细胞基因结构的基础上,提出了一种基于原核细胞的仿生电子阵列结构,设计实现了差分二进制相移键控调制电路,通过仿真验证了该结构的有效性.  相似文献   

2.
仿生自修复硬件多层结构模型   总被引:1,自引:0,他引:1       下载免费PDF全文
针对仿生自修复硬件细胞间信号传输复杂、效率低等问题,借鉴内分泌系统中激素的传输方式,提出基于片上网络和近邻连接的4层仿生自修复硬件结构模型,并以实现有限脉冲响应滤波器为例,对模型进行详细论述。基于该模型的自修复硬件,具有灵活的布线能力与良好的容错能力,表明该模型为高可靠性自修复硬件设计提供了新途径。  相似文献   

3.
演化硬件通过演化的方式实现电路功能,可看作是演化算法和可编程逻辑器件的有机结合.演化硬件通过演化算法可实现自身结构重构,使系统具有自适应性、自组织、自修复特性.基于演化硬件这些特性,提出了一种武器系统维护的新方法--自修复.首先介绍了演化硬件的基本理论,然后介绍了演化硬件用于实现武器系统自修复的工作原理及其优点,以及所需的关键技术.  相似文献   

4.
针对已有工作面向粗粒度可重构结构(CGRA)研究循环映射的不足,提出一种新颖的存储感知的关键循环映射方法 MALP。该方法定义RCP_CGRA体系结构模型并阐述关键循环到CGRA的映射问题,通过引入结合数组分簇的多面体数据域划分方法进行循环存储分析,根据分析结果,结合体系结构资源约束实现了循环的有效映射。实验结果表明,与已有的方法相比,MALP方法能够快速分析存储需求并有效降低循环映射的资源占用率,提高数据吞吐量,进一步提升了CGRA上循环映射的性能。  相似文献   

5.
针对战场和恶劣环境下装备的应急维修和现场原位抢修的需求,引入智能结构的自适应与自修复思想,将在系统重构功能统一组织为应急维修致动器,既能重配置硬件赋予新功能,也能将遗传算法与硬件结合实现自身结构的进化,使装备具有自适应性、自组织、自修复特性,有很强的灵活性和实用性,为应急维修和现场原位抢修提供了一条有效的途径。  相似文献   

6.
为实现飞机CAN总线线缆的多种性能测试,研制了一种基于便携式工控机、VC++和Access数据库的新型的线缆综合测试系统,详细介绍了系统的硬件结构、软件设计方法;该测试系统硬件设计采用电路模块化设计技术并集成于工控机上,实现了飞机电缆的短路测试、接地测试、断路测试、交叉测试以及总线传输阻抗与信号衰减的测量,同时实现了总线通信的测试;软件通过接口完成数据库查询、数据分析以及结果显示、存储、报表和打印功能。系统检测速度快、可靠性高,实现了飞机线缆的集成化、自动化、可视化测试。  相似文献   

7.
由宇宙辐射等环境因素引起的硬件瞬时故障会极大降低计算机系统的可靠性。为了减小硬件瞬时故障对系统可靠性的影响,保证程序的正确运行,基于RISC-V开源内核“蜂鸟e203”提出一种标记指令复算与纠错机制。该机制为指令码额外增加了复算标记,以较小的硬件开销实现对指定指令的复算操作。此外,该机制可以在第一次复算结果与初始运算结果不等时自动进行二次复算,并由三次运算结果的多数表决结果来纠正大部分硬件瞬时故障所引起的数据流异常。实验表明,通过与中断处理程序相结合,在随机注入瞬时故障的情况下,程序的正确执行概率平均增加了86.67%。  相似文献   

8.
针对电子装备功能结构的复杂性,提出了一种基于FBS(功能——行为——结构)模型的电子装备仿真的新方法,并详细介绍了该模型的原理及其分析、建立过程.然后以该模型为基础,分析了如何针对电子装备的具体结构、功能特点,确立仿真策略、选择仿真软件以满足仿真要求,并以某复杂电子装备为例,探讨了其虚拟仿真的设计与实现.最后根据实际应...  相似文献   

9.
结合透明计算结构特点,提出一种实现实时信号级仿真系统的方法。该方法将信号生成部分的结构划分为特征提取和信号重构两部分,并将信号重构的硬件部分归为信号接收端,信号发射端的最终输出为信号特征值。所以在各节点间传递的为信号的特征值,信号数据直接在接收端产生,避免了因采样率过大引起传输数据饱和、传输速率慢等问题。通过改变仿真系统中信号发射、接收端功能结构,降低系统各节点间信号传输数据量,提高系统运行速率,从而实现实时信号级仿真。该方法已经逐步应用于战场环境、电子对抗仿真之中,证明了该方法的可行性和有效性。  相似文献   

10.
利用低延迟、低功耗、高可靠的闪存芯片构建闪存存储阵列是实现高性能存储系统的有效手段。但应用传统磁盘阵列技术构建闪存存储阵列,会引入磨损均衡、校验数据更新频繁导致阵列生命周期降低等问题。针对闪存固有的读写特性,设计实现了一种基于NAND Flash的高性能磁盘阵列机制——基于缓存的可重构磁盘阵列策略。该机制采用可重构条带的思想,利用存储等级的内存作为缓存,对数据顺序重组。实验结果表明:该策略能够有效降低垃圾回收开销,提高闪存阵列的性能和使用寿命。  相似文献   

11.
后基因组时代生物信息学的新进展   总被引:5,自引:1,他引:5       下载免费PDF全文
生物信息学是近年来综合生命科学与信息科学而迅速发展起来的一门新兴交叉学科。对后基因组时代生物信息学的几个热点研究方向进行了概述,介绍了当前一组有影响的代表性工作,初步分析了各种研究的技术特点与适用范围,并对今后的研究作了展望,提出了亟待解决的一些关键问题。  相似文献   

12.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

13.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

14.
15.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

16.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

17.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

18.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

19.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号