首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
孟遨  赵敏  陈志逸 《指挥控制与仿真》2013,35(1):128-130,140
研究了基于CAN总线和以太网的船用仪表系统,实现了船用仪表的CAN总线及以太网的通讯。系统以ARM处理器STM32F10x为核心,通过CAN总线从船舶发动机电子控制单元处获取发动机转速、冷却水温度等发动机运行参数,以步进电机指针式仪表和LCD液晶显示屏式仪表等多种方式实现船舶各种运行工况的实时显示,通过一个裁剪过的适合嵌入式系统应用的TCP/IP协议栈,可使用上位机界面对船舶发动机进行实时监控。实际运行效果表明:系统运行稳定可靠,具有良好的应用前景。  相似文献   

2.
《中国军转民》2012,(10):78-78
1、技术开发单位 中国兵器工业集团中国北方车辆研究所2、技术简介总线型车身控制系统属于车辆电子信息与控制技术领域。本系统主要完成车身传感器及乘员操作的采集感知、车辆的启动控制、灯类负载的配电管理、电机类负载的动作控制、负载状态的实时监测、车辆工况的仪表指示、故障诊断的人机交互以及故障的降级使用等功能。本系统涉及的具体技术主要包括嵌入式微处理器硬件和软件应用技术、总线传输应用技术智能功率控制技术和负载状态监测与故障诊断技术。重型卡车车身控制系统主要由中央电控单元、主车门电控单元、辅车门电控单元、组合仪表等组成。  相似文献   

3.
坦克嵌入式模拟训练系统是指将模拟训练系统嵌入到坦克工作系统上,通过嵌入式设计使模拟训练系统成为坦克功能系统的组成部分。针对我军坦克装甲车辆不具有嵌入式模拟训练功能的现状,通过对现有装备的嵌入式改造,成功研制了具有较强沉浸感的新型嵌入式训练系统。可以使乘员充分利用坦克内的控制设备和通信设备在驻地进行训练;同时为乘员提供了真实的操作、训练环境,具有较好的训练效果。  相似文献   

4.
在分析国内外研究现状的基础上,针对现有的漏洞库系统在漏洞信息的组织、使用等方面存在的不足,采用分布计算技术、数据库技术、Web技术实现了网络安全脆弱性分析与处置系统。该系统实现了基于Web的漏洞库(含补丁库)的访问与维护工具,便于获取相应漏洞的解决方案和下载相应的补丁程序,降低了系统维护的开销,提高了系统的可维护性;补丁推送程序实现了对系统补丁程序的远程推送、漏洞修补和补漏检测,提高了系统的自动化程度,为网络安全脆弱性处置提供了有力工具。  相似文献   

5.
为实现控制距离远,精度高,必须提高远程设备信息的精度,因存在多个系统之间的通信问题,有时采用人工方式键入远程指示信息,在数据量大的情况下,导致信息键入失误率上升。为提高键入远程设备信息的精度,研究实现了基于ARM的远程设备信息的自动输入转换系统,远程设备信息通过RS485协议方式传输至本系统,系统解析信息协议、分析数据,并将得到的键盘鼠标数据以PS2键盘协议和串口鼠标协议转发给控制系统。在实际演练中,远程设备信息自动输入转换系统提高了信息的键入精度,为控制自动化提高了效率。  相似文献   

6.
在军事指挥控制模拟训练系统和训练装备研究领域,指控系统与仿真系统的开发是相对的,遵循不同的标准和协议,在结构和功能上存在很大的差异。通过建立指控交互信息的语义Web服务概念参考模型,提出指控系统与仿真系统互操作性面临的技术需求,研究基于指控交互信息用户语境的语义Web服务发现和服务组合,提出了基于静态与动态用户语境匹配的语义Web服务发现架构和服务匹配算法,以及基于用户语境的语义Web服务组合算法。  相似文献   

7.
为解决基于麒麟嵌入式操作系统的车载智能终端实际应用中的软件升级问题,提出了利用GPRS技术、IAP编程方式、应答机制、断点续传技术和校验机制实现嵌入式系统的软件远程升级方案,保证了数据传输的实时性、快速性、准确性和可靠性,并且通过各种实验模拟了升级过程中的异常情况,实验结果表明,所提出的方案能保证终端正确可靠地完成软件的远程升级,这也就验证了该远程升级方案的可行性.  相似文献   

8.
针对工业自动化领域运动控制系统中计算机机器视觉系统笨重的缺点,提出一种基于嵌入式图像处理与运动控制的测控系统。该系统以DM642芯片为机器视觉的图像处理单元,GTS-400-PG-PCI系列运动控制器为控制单元,设计了DSP与运动控制器通信的硬件电路,并通过上位机编程完成通讯与控制功能。通过实验验证,该系统的DSP成功检测到目标后,运动控制器能快速响应DSP输出的信号并控制伺服电机完成点位运动,对嵌入式机器视觉应用于运动控制系统具有实际意义。  相似文献   

9.
以GPRS网络的应用为例,阐述了城市火警控制中心通过远程监控设备对单个建筑物内火灾自动报警系统实现远程监控的可行性、系统工作原理和关键技术,并论述了该系统的应用前景。  相似文献   

10.
Web系统的广泛应用使其安全问题日益突出.通过分析当前Web系统存在的安全隐患,在Web资源的访问控制上引入了多级安全策略,从Web系统的功能需求和安全需求出发,分析了BLP模型直接应用于Web系统时导致的问题.在BLP模型的基础上,提出了Web系统的多级安全策略模型,对Web系统中的概念、对象和操作进行抽象和提炼,研究了Web系统处于安全状态时应当满足的安全条件,并在此基础上,对Web系统、系统状态、和状态转换进行了形式化描述.  相似文献   

11.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

12.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

13.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

17.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

18.
19.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

20.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号