首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
本文论述了一个由单片机和MODEM所组成的远程数据传输系统,这一系统可用普通的市话线路与话路另一端的PC机进行数据通信。系统中的MODEM由单片低速调制解调器芯片MC145443所组成,文中对这一芯片的性能特点作了介绍,并论述了这一数据传输系统的软件、硬件工作原理。  相似文献   

2.
针对数据传输系统丢点问题,依据连续正弦信号瞬时相位差分特性,探讨了一种自动检测数据传输系统丢点方法。首先在数据传输系统采集前端加入正弦信号;然后将解包好的数据通过希尔伯特变换求取数据瞬时相位,并从前向后进行相位补偿,使数据瞬时相位呈连续递增形式;最后通过相位差分法求得瞬时相位前向差分。由理论分析可知:连续正弦信号未丢点时,当前位置数据相比前一位置数据相位差为2πfc/fs(fc为正弦信号频率,fs为数据传输系统采样率);连续正弦信号丢点时,当前位置数据相比前一位置数据相位差为2πfc(n+1)/fs(n为传输数据丢失点数)。由此特性,可实现对数据传输系统是否丢点实现自动检测。理论分析和实验结果表明,探讨的数据传输系统丢点检测方法可实现对数据传输系统是否丢点实现自动检测,便于工程应用。  相似文献   

3.
频谱感知是认知无线电的关键技术,能量检测广泛应用于频谱感知。针对认知无线电频谱感知技术较少运用于实践的不足,提出了基于0FDM传输系统的频谱感知。在0FDM系统中利用能量检测的判决结果控制子载波的开关,实现感知结果对数据传输的控制,最后利用认知无线电平台进行实时数据的传输。实验结果表明,系统能够在认知无线电平台上成功进行无线通信的数据发送与接收,频谱感知结果能够有效控制数据传输,为认知无线电由理论研究步向实际应用奠定了基础,具有一定的实用价值。  相似文献   

4.
设计了一种基于FPGA与DSP的高速多通道实时数据采集传输系统。该系统通过FPGA实现对时钟、ADC、DSP等芯片的功能配置,采集数据由FPGA预处理后通过EMIF接口传送至DSP,并完成后续的复杂信号处理。该系统最高数据采集速率可达500 MSPS,FPGA与DSP之间可实现高速率的数据传输。实际测试结果表明,该系统实现了多通道数据的实时同步采集、传输与处理,数据采集达到较高性能,能够满足当前复杂电磁环境下精确制导雷达数据处理分析的需求。  相似文献   

5.
卫星固态存储器数据容错设计与机制   总被引:1,自引:0,他引:1       下载免费PDF全文
卫星数据传输系统的可靠性面临着空间粒子效应、信道干扰等多重威胁。在介绍数据传输系统关键设备星载大容量固态存储器设计与实现的基础上,从管理信息、数据位流、星地链路、文件传输四个方面构建容错机制,综合应用汉明编译码、RS编译码、低密度奇偶校验码编码等数据检纠错技术,增强存储器管理信息、存储数据、信道传输的容错性能。在实际型号任务固态存储器的基础上,结合CCSDS文件传输协议提出基于自动重传机制的文件可靠传输设计,提高数据传输全流程的容错性能。固态存储器使用多级流水写入、总线并行扩展等技术,吞吐率理论上接近900Mbps,容量达到256Gb。  相似文献   

6.
针对C3I系统中警戒雷达的扫描跟踪和雷达情报数据录取仪的数据处理以及有线传输功能进行模拟.该模拟系统包括两部分,目标情报数据的产生与数据的调制和输出.应用EVC编程实现了目标情报数据的生成和系统控制,系统数据调制采用2FSK,由FPGA编程实现.应用PC104总线和FPGA技术构建了硬件平台.  相似文献   

7.
很多系统在以太网通讯中使用UDP报文进行网络数据的传输,为了完成对这些系统的仿真驱动,通常需要在一台PC机用单网卡或多网卡实现基于UDP协议的信息流仿真。在缺少目标系统的某些节点时,该PC机模拟相关节点的UDP报文的发送、接收,驱动目标系统的运行;当目标系统全系统运行时,该PC机监听以太网上的UDP报文,为目标系统的事后分析记录数据。本文论述了在Windows NT系列平台在通过Windows Socket及特殊的NDIS中间驱动实现UDP信息流的技术。  相似文献   

8.
介绍了将蓝牙技术结合嵌入式设备应用到监控系统中的方法,实现PDA与无人机飞行控制计算机间的无线实时数据传输和分析处理.实验表明蓝牙技术能够方便、安全、稳定地代替有线电缆,为控制领域的数据传输提供新的思路.  相似文献   

9.
借助于抗扰物联网技术,科技产业能够实现精细化管理、高效化运作。借助现代科技,基于NFC实现抗扰物联网监测系统的研究与设计。虽然我国当前已经逐步构建抗扰物联网通信系统,但其存在着布线难、操作难、数据传输难等阻碍问题,而据分析近距离通信技术构成的两级农业监测信息物联通信方案能够有效解决当前阻碍。因而通过设计Zigbee自组织网络改善系统内的各个模块的数据无线传输;在系统中纳入NFC技术,达到整个系统整体同移动终端的近距离无线传输,针对数据传输在检测中出现的干扰性较强的问题,提出运用捕获算法(PMF-FFT)。该算法融合了部分匹配滤波器和FFT技术,能够实现通信干扰对消除并比传统系统更加节约能源消耗。最终对基于NFC的抗扰物联网监测系统通过实践操作进行了验证。  相似文献   

10.
本文描述了一个可以在64kb/s数字信道上实现的话音-数据混合传输设备,利用话音的空闲来传输数据,而不是让话音和数据采用各自的传输设备,也不是增加数据传输速率。当检测到话音停顿状态时,线路即用来传输数据,而在突发话音到来期间,线路便阻塞数据的传输。给出了两种混合传输系统的模型。第一种模型数据的到达是随机突发的,用于描述一种人机相互作用的过程。第二种模型数据是连续到达的,用于描述文件传输、传真等等。本文计算了两种模型所需的缓冲器容量、阻塞概率、数据时延和其它因素。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

16.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

17.
18.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

19.

The Soviet Union was able to develop a large military-industrial complex and become the world's second superpower despite deficiencies in its centrally planned economy because defence was given high priority status and special planning, rationing and administrative mechanisms were used to attain national security objectives. However, in the period 1976-85 the effectiveness of priority protection diminished and defence institutions experienced more of the problems typical of the shortage economic system. The heavy defence burden also created growing difficulties for the civilian economy. The attempts by the Gorbachev government to reform the defence sector and improve defence-economic relationships during perestroika (1985-91) uniformly failed. For most of the transition period, the Russian military-industrial complex has been adversely affected by its low priority status, cuts in defence spending, instability of the hybrid politico-economic system, and negative growth of the economy. The armed forces and defence industry have been reduced in size and their outputs of military services and equipment have fallen to low levels. Nevertheless, the Russian armed forces still have over one million troops, significant stocks of sophisticated conventional weapons, and a large nuclear arsenal. The government of President Putin has raised the priority of the defence sector, increased real defence spending, and adopted ambitious plans to revive Russian military power. It is likely, though, that tight resource constraints will hamper efforts to reform the armed forces and to upgrade weapons. By 2010 Russia will be an important, but not dominant, military power in Eurasia.  相似文献   

20.
The collapse of the Soviet Union precipitated the massive expansion of drug use and trade in Russia. The country now has one of the largest populations of injecting drug users in the world and has become the largest single-country market for Afghan heroin. In 2003 the Federal Service for the Control of the Drugs Trade was created to coordinate a comprehensive counternarcotics strategy appropriate to the scale of this threat. The service continues to face a number of challenges in its early stages of development. However, it has made considerable advances in improving responses to large-scale organised crime and in building international cooperation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号