首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
卫星固态存储器数据容错设计与机制   总被引:1,自引:0,他引:1       下载免费PDF全文
卫星数据传输系统的可靠性面临着空间粒子效应、信道干扰等多重威胁。在介绍数据传输系统关键设备星载大容量固态存储器设计与实现的基础上,从管理信息、数据位流、星地链路、文件传输四个方面构建容错机制,综合应用汉明编译码、RS编译码、低密度奇偶校验码编码等数据检纠错技术,增强存储器管理信息、存储数据、信道传输的容错性能。在实际型号任务固态存储器的基础上,结合CCSDS文件传输协议提出基于自动重传机制的文件可靠传输设计,提高数据传输全流程的容错性能。固态存储器使用多级流水写入、总线并行扩展等技术,吞吐率理论上接近900Mbps,容量达到256Gb。  相似文献   

2.
为记录子弹从预发射到落地过程的状态数据,设计了一种遥测与固态存储相结合的数据采集回收系统.该系统以FPGA芯片为逻辑控制中心,高速采集传感器等设备的输出数据,采集数据经编帧后分别进行固态存储和PCM码无线遥测存储,回收数据由上位机软件处理,还原子弹全程飞行状态.全套系统经地面测试各性能满足设计要求.软硬回收兼备的存储方式既提高了子弹在高过载等恶劣环境下数据回收的概率,也实现了子弹飞行状态的实时监测,提高了地面人员的反应速度.  相似文献   

3.
为满足航天大容量存储系统对高速存储及数据完整的需求,实现了一个基于NAND型内存的高性能控制器,提出了一种实现于NAND型内存芯片内部的流水编程机制,以及一种可以保证数据无缝连接的坏块处理机制。介绍了存储控制器的各个模块设计,并分析了不同情况编程机制所需的时间计算方法,建立仿真模型,利用蒙特卡洛方法仿真并讨论了流水编程机制的性能优化效果。在实际硬件平台验证了流水编程机制和坏块处理机制,结果表明该大容量存储系统的存储速率可达100MB/s,读取数据与存入数据保持一致,数据无乱序无丢失。  相似文献   

4.
提出了具有地址码学习功能的通用遥控飞机编码芯片。它包含振荡器电路、分频电路、并行取样电路、地址并-串转换电路、同步电路、控制电路、译码器电路、存储器电路及输出控制电路。该芯片基于TSMC 2.25 CMOS工艺制造,拥有20位内码和可预烧100万组内码组合。芯片采用了脉冲宽度调制技术(PWM),实现了地址码学习,降低了重码率,减少了各用户之间的码间冲突和提高了同类芯片的可靠传输和接收。其通用性和实用性是目前在无线通讯电路中作地址编码识别最常用的芯片之一。  相似文献   

5.
介绍了一种基于ARM11的数据采集存储系统的设计原理和实现方法,以低功耗微处理器S3C6410为核心,并搭建嵌入式Linux系统平台来实现,其中数据采集模块主要包括信号调理电路、A/D转换和系统控制中心3个部分,数据存储模块由NAND Flash存储来实现,通过实验验证,本设计实现了数据实时监测,数据存储和数据回传等功能。  相似文献   

6.
利用低延迟、低功耗、高可靠的NAND Flash构建闪存存储阵列是实现高性能存储系统的有效手段。但应用传统RAID技术构建闪存存储阵列,会引入磨损均衡,校验数据更新频繁导致阵列生命周期降低等问题。针对闪存固有的读写特性,设计实现了一种基于NAND Flash的高性能RAID机制——基于缓存的可重构RAID策略(Cache-Based Reconfigurable RAID,CBR-RAID)。该机制采用可重构条带的思想,利用非易失存储器SCM(Storage Class Memory)作为缓存,对数据顺序重组。实验结果表明该策略能够有效降低垃圾回收开销,提高闪存阵列的性能和使用寿命  相似文献   

7.
叙述了一种基于FPGA的模数混合采集存储系统的设计,以XILINX公司sparten2系列的xc2s100芯片为主控单元,结合相关外围电路和SAMSUNG公司的FLASH存储器,系统实现了8路模拟信号和1路数字量信号的采集,再进行相应编码并混合存储在FLASH存储器中.  相似文献   

8.
利用低延迟、低功耗、高可靠的闪存芯片构建闪存存储阵列是实现高性能存储系统的有效手段。但应用传统磁盘阵列技术构建闪存存储阵列,会引入磨损均衡、校验数据更新频繁导致阵列生命周期降低等问题。针对闪存固有的读写特性,设计实现了一种基于NAND Flash的高性能磁盘阵列机制——基于缓存的可重构磁盘阵列策略。该机制采用可重构条带的思想,利用存储等级的内存作为缓存,对数据顺序重组。实验结果表明:该策略能够有效降低垃圾回收开销,提高闪存阵列的性能和使用寿命。  相似文献   

9.
针对校验矩阵形如准循环双对角阵的结构化LDPC码,对比研究了两类高效的编码算法:矩阵分解编码算法和分项累加递归编码算法,证明了两类算法从实现角度是等价的,但分项累加递归编码算法推导更为直观,且便于硬件并行实现。基于分项累加编码算法,提出了一种适合准循环双对角LDPC码的部分并行编码结构,设计实现了IEEE 802.11n标准中的LDPC码编码器。FPGA实现结果表明,所设计的LDPC编码器具有硬件开销较小、吞吐率高的优点,在码长为1944bit、码率为5/6时信息比特吞吐率最高可达13Gbps。  相似文献   

10.
异构混合存储的软硬件协同数据放置策略   总被引:1,自引:0,他引:1       下载免费PDF全文
分析比较当前大数据中心典型混合存储架构,针对其不能综合运用存储管理系统和存储设备优势的问题,提出软硬件协同的数据放置策略,同时考虑软件层混合存储管理系统和硬件层混合存储设备的特点,根据应用特性为数据选择合适的存储管理系统和设备。面向不同应用场景,提出运行前规划存储路径的静态放置模式和运行中规划存储路径的动态放置模式。基于存储管理系统和设备性能参数建模,采用仿真方法实现各数据放置策略,并运行实际应用中的三类负载进行实验测试,结果表明采用软硬件协同的数据放置策略相比只考虑存储管理系统和存储设备的数据放置策略,性能可以提高近30%。  相似文献   

11.
在研究图像编解码理论和计算图像相似性参数的基础上,提出了基于图像编码技术的网络信息安全传输方法,通过在网络上传输经过编码的参照图像和相似性参数约定,达到图像通信保密的目的,保障了需要传输的图像在网络上的安全性.  相似文献   

12.
快速的复连通区域扫描线图形填充新方法   总被引:9,自引:0,他引:9       下载免费PDF全文
对复连通区域填充算法进行了细致的研究,提出一种新的扫描线填充算法。该算法先对目标边界进行标注,提供判断条件,然后用扫描线进行填充;该算法不仅适用于单连通区域,而且也适用于复杂区域的填充。该算法效率高,通用性强,实现简单,填充准确。  相似文献   

13.
一种计算任意形状封闭区域面积的新方法   总被引:16,自引:1,他引:15       下载免费PDF全文
在图像模式识别中 ,面积是很重要的特征。提出一种计算面积的新方法 ,利用Freeman链码矢量分析 ,对边界像素标注综合处理 ,再进行边界像素坐标加权求和计算 ,求得目标面积 ;该方法与原有计算面积的方法相比 ,该方法实现简单 ,计算量小 ,结果准确  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

17.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

18.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

19.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号