首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
实时视频传输有很大的实用价值,对采集到的原始视频信息进行压缩编码,获取己编码视频流是实现实时视频传输和QoS研究的关键.通过介绍MPEG-4标准视频压缩技术和几种基于MPEG-4标准的实用软件编码器,着重阐述了用XVID编码器获取MPEG-4标准视频流的方法,对其编码效果、效率进行了测试,给出了测试结果,还对用VFW进行视频捕获的方法做了简单介绍.  相似文献   

2.
视频传输是当前国内外研究的重要课题,尤其就对传输过程中Qos的控制,在当前网络质量不高的情况下进行视频传输具有重要的作用.研究了RTP、RTCP等多媒体实时传输技术的原理,具体阐述和讨论了RTP的实时传输MPEG-4技术以及RTCP的传输控制技术,探讨了RTP/RTCP在战术互联网中MPEG-4视频实时传输中的实现.  相似文献   

3.
由于球形检测算法的高计算复杂度,能提供软输出信息给后续纠错解码器的球形解码器的VLSI实现是一项挑战.提出了一种基于ONPC体系结构的深度优先搜索的软输出球形解码器的VLSI解决方案.对于采用4×4天线配置和64-QAM调制的MIMO系统,在17.7dB的信噪比下,所提出解决方案在0.13-μm CMOS工艺下能提供14Mbps的吞吐率,面积开销约为4.1mm2,并且BER性能优于幸存路径数为256的基于宽度优先搜索的K-best算法.  相似文献   

4.
论述了一种对电子系统VLSI自顶向下的层次化自动化测试方法及层次化自测试的概念和相应的可测试性设计结构,并讨论了数模混合集成电路的可测试性设计问题。  相似文献   

5.
针对大地形数据量庞大的特点,建立了地形多分辨率四叉树模型,构建了该模型的存储结构,即采用大数据文件加索引文件的形式进行存储,采用该存储结构可快速读取到需求数据,并阐述了数字高程模型(Digital Ele-vation Model,DEM)数据和纹理数据的存储步骤;设计了数据的并行多线程调度机制,该调度机制采用共享内存策略实现同步,确保了信息处理高效、有序地执行.结果表明:该模型在OSG中能够按需快速加载地形数据,实现高效渲染.  相似文献   

6.
结合纹理的结构分析方法 ,提出一种区域状结构 ,并把这种结构作为尺度空间中的特征。在基于区域状特征结构的尺度空间中 ,结构状纹理分析可转化为尺度空间中对特征结构的分析 ,从而实现了对纹理的多尺度分析。理论分析和实验结果证明了这种分析方法的有效性  相似文献   

7.
野营净水车装备研制成本高,如果结合实装训练,存在着数量、场地、安全因素等限制.基于这样的需求,开发基于虚拟现实的野营净水车模拟训练系统.技术实现上,应用视景仿真软件Creator的层次化结构、纹理映射和LOD等技术,建立、管理和优化模型.在Vega中设计仿真程序,通过设计碰撞检测,编辑漫游路径,实现自动漫游和基于鼠标的训练操作,且由于声音、文字效果的加入,使模拟训练更为真实.试验分析,该系统适应性好,克服了实装训练的一系列问题,提高了野营净水车的训练效率.  相似文献   

8.
基于提升算法的二维DWT高效VLSI实现结构   总被引:3,自引:0,他引:3       下载免费PDF全文
以CDF9/7小波为例构造了一种二维DWT变换的高效VLSI结构。采用改进的提升算法,减少了关键路径上的延时。把乘法器系数表示为CSD形式,将乘法优化为最少的移位加操作。提出了一种行变换和列变换同时进行的方法和实现结构,并且整个结构采用流水线处理。通过VHDL的行为级仿真,得到的数据和软件仿真的结果相同,证明了该结构的正确性。和其它结构相比,该结构处理速度更快,并且硬件利用率可达100%。  相似文献   

9.
工程陶瓷表面粗糙度与图像纹理特征关系   总被引:1,自引:0,他引:1  
为描述陶瓷磨削表面纹理特征与粗糙度的相互关系,实现快速评定和预测陶瓷磨削加工表面粗糙度,运用灰度共生矩阵对表面纹理特征进行提取和分析。根据采样点间距、灰度级随特征值的变化曲线确定灰度共生矩阵影响因素,按4个方向建立灰度共生矩阵并计算所有纹理特征参数均值。通过分析特征参数间相关性,确定4个参数为陶瓷磨削表面纹理主要特征参数。该参数与表面粗糙度的变化规律,可以反映陶瓷磨削表面粗糙度,进而评估磨削加工质量与可靠性。  相似文献   

10.
运用组件的思想,对常规导弹任务规划系统进行了设计,将其划分为任务想定编辑器、任务规划器、作战想定编辑器及作战方案评估器4大组件,较好地实现了可扩展、可重用的技术需求;对每一个组件模块进行了结构、功能和实现设计,并对其中最关键的任务规划器中的任务规划模型进行了研究。运用.Net和C#编程对系统进行了实现。  相似文献   

11.
ABSTRACT

While the study of organised violence is considered essential to understanding the history of the West, and accordingly imbued with various layers of meaning and remembrance, war is widely regarded as inimical to the modern nation in Africa and stable development more broadly. Using examples drawn from primarily from East Africa, this paper considers the ways in which warfare in the deeper (‘precolonial’) past has been framed and envisioned in recent decades, in particular by governments whose own roots lie in revolutionary armed struggle and who began life as guerrilla movements. While in some cases particular elements of the deeper past were indeed mobilised in pursuit of contemporary political goals, in many other scenarios histories of precolonial violence were beheld as problematic and unworthy of remembrance. This paper highlights the paradox and ambiguity which has attended the memory of key aspects of Africa’s deeper past.  相似文献   

12.
The UK’s interrogation operations during the conflict in Iraq (2003–2008) are often portrayed by the media as involving significant amounts of mistreatment. This article demonstrates that these practices are not necessarily representative of the UK’s interrogation operations across this conflict. In doing so it contributes to the limited literature on the practice of interrogation and on the UK’s combat operations in Iraq. The UK’s interrogation capability, and therefore its intelligence-gathering capability, is shown to have rested primarily with the military’s Joint Forward Interrogation Team (JFIT). The JFIT suffered from limitations to the number, training and experience of its interrogators and interpreters. It is argued that maintaining a permanent, higher level of preparedness for interrogation by the British armed forces is desirable.  相似文献   

13.
本文介绍了笔者为开发名为OONMES的网络管理专家系统所实现的一个简单专家系统工具SIM-LISP。SIM-LISP是一个用C/C++语言来实现的模拟LISP语言的可调用函数集,它短小精巧,速度快,可以完成针对网管专家系统的事实或规则知识的表示、匹配、合一和推理等基本操作,并有与知识对象的连接功能,是网管专家系统内核实现的支撑环境。  相似文献   

14.
This article consists of selected translations from captured interviews and dairies of Al Qaida members. The time period covered is from mid-2001 to early 2002 and concerns their operations in Afghanistan. The material clearly conveys a range of emotion, from confident to despondent, as well as efforts to contest the US actions. The first several pages give the reader context and some possible “lessons learned,” but the story(ies) are best told by the Al Qaida members themselves. All names are pseudonyms.  相似文献   

15.
The prospect of terrorists deploying weapons of mass destruction (WMD) is often referred to as the foremost danger to American national security. This danger has become more realistic because of al-Qaeda's expanding global network and the expressed willingness to kill thousands of civilians. In the past four years, numerous media reports have documented the group's ongoing quest for WMD capabilities; many reports have detailed al-Qaeda members’ attempts to manufacture or obtain certain chemical, biological, radiological, and nuclear (CBRN) agents to use in WMD against targets in the West and the Middle East. Yet the question remains: Does al-Qaeda's current WMD capability match its actual intent? While most studies of the group have focused on its explicit desire for WMD, allegations of CBRN acquisition, and the killing potential of specific CBRN agents, few open-source studies have closely examined the evolution of al-Qaeda's consideration of WMD and, most notably, the merit of actual CBRN production instructions as depicted and disseminated in the group's own literature and manuals. The following report will examine the history of al-Qaeda's interest in CBRN agents, the evolution of the network's attitude toward these weapons, and the internal debate within the organization concerning acquisition and use of WMD. More so, the following research will assess the validity of actual CBRN production instructions and capabilities as displayed and disseminated in al-Qaeda's own literature and websites.  相似文献   

16.
Despite the lance’s status and the amount of attention the couched lance has received in historiography, study of its martial art has been neglected. The various lance types and techniques used by western European cavalry have only recently begun to receive scholarly attention. Additionally, Medieval European lance use has too often been studied in isolation, without an adequate understanding of the idiosyncratic and asymmetrical dynamics of mounted combat. Although the charge with the couched lance was a valid tactic, it was only one of many. Light and heavy lances were used in one hand or two to trip, block, unhorse, and wrestle. These techniques were governed by the harsh laws of distance, speed, impact, iron, and asymmetry. By utilizing the surviving Fechtbücher and several Peninsular and Near Eastern sources, a brief foray into the diverse techniques of lance use and their purposes has been attempted here.  相似文献   

17.
This article describes the Distributed Interaction Campaign Model (DICM), an exploratory campaign analysis tool and asset allocation decision‐aid for managing geographically distributed and swarming naval and air forces. The model is capable of fast operation, while accounting for uncertainty in an opponent's plan. It is intended for use by commanders and analysts who have limited time for model runs, or a finite budget. The model is purpose‐built for the Pentagon's Office of Net Assessment, and supports analysis of the following questions: What happens when swarms of geographically distributed naval and air forces engage each other and what are the key elements of the opponents’ force to attack? Are there changes to force structure that make a force more effective, and what impacts will disruptions in enemy command and control and wide‐area surveillance have? Which insights are to be gained by fast exploratory mathematical/computational campaign analysis to augment and replace expensive and time‐consuming simulations? An illustrative example of model use is described in a simple test scenario. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 562–576, 2016  相似文献   

18.
《Arms and Armour》2013,10(2):149-162
Firth’s were the first of the Sheffield steel makers to enter the field armaments. Their involvement with Colt has been outlined in an article in the journal of the Colt Collectors Association in America and their activities as steelmakers to the small-arms industries has been covered in a previous issue of this Journal. This article gives a brief overview of their involvement as manufacturers in the field of heavy armaments, being the first to make all-steel guns and their evolving role in the use of steel for ordnance, culminating in the displacement of wrought iron by the adoption of steel for ordnance manufacture by the Royal Gun Factory in the 1880s. It also highlights their development of stainless steel in this context.  相似文献   

19.
ABSTRACT

While many militaries have tried to capitalize on the potential of information operations in internal war, few have succeeded. I argue that military information campaigns fall short of expectations for two reasons. First, the theory of influence militaries generally embrace – communications as a non-lethal weapons system – is largely invalid. While treating information as a weapons system makes it easier to integrate it into the existing military planning system, this overstates the independent effects of communications on behavior and understates the importance of interactive effects of what commercial marketing theory refers to as the “marketing mix” – product, price, promotion, and placement. It would be more appropriate to treat military information operations as a form of marketing: a composite effort to induce a specific behavior in a target audience by applying a combination of material and ideational instruments. The marketing model suggests that the efficacy of information operations will depend not simply on the message and its delivery (promotion) but on the behavior the sender seeks to induce (the product), the costs of that behavior (the price), and the opportunities available for such behavior (the placement).  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号