首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 484 毫秒
1.
从C ̄3CM系统分布式体系结构的需要出发,提出了总线型分布式C ̄3CM系统的构成原理方案,在探讨C ̄3CM系统的拓扑结构时,着重研究了NOVELL网络的功能,亦提出了实现全分布式体系结构的主要技术支撑。  相似文献   

2.
本文提出了以美国军用标准1553B作为我国地空导弹弹上信息处理系统的总线标准。井结合某型号提出一种系统分布式结构的技术途径。  相似文献   

3.
分布式战术C~3I系统的体系结构和开发途径   总被引:1,自引:0,他引:1  
前段简要地介绍了野战高炮、地空导弹防空情报指挥系统的硬、软件体系结构及其构成的方法;中段在简单阐述了集中式战术C3I系统的蔽端和分布式战术C3I系统的优点之后对集中式与分布式战术C3I系统作了全面的比较;第三段集中阐述构成分布式战术C3I系统尚存在的困难,在我国当前技术条件下,构建面向对象的初级分布式战术C3I系统是比较现实的途径,并给出了较多具体的方法。  相似文献   

4.
以STD总线微机系统为核心构成的自动检测系统,具有高可靠性,模块化开放式结构等特点。HJ-73导弹综合检测系统的测控模块由STD总线单片机系统构成,本文介绍丁测控模块测量方法、硬件软件构成及工作原理。  相似文献   

5.
一种多处理机集束总线互连结构性能分析   总被引:1,自引:0,他引:1       下载免费PDF全文
针对紧耦合多处理机系统中采用的集束总线结构 ,对系统中单个处理机的处理效率进行了分析 ,据此 ,提出了关于该类互连结构中总线和存储器设置方面的建议。最后 ,对集束总线结构、共享总线结构和分布式总线结构系统的性能进行了比较分析。  相似文献   

6.
战车火控仿真评估系统是为适应新装备的预研与研制、现装备的技术改造、部队的技术保障需要而产生的,这一系统是综合有火控系统、指控系统和电子综合化系统的半实物仿真与性能评估试验平台,而其中的仿真控制与测试分系统又是重要组成部分,起着仿真控制、数据处理、传输等重要作用.在分析仿真控制与测试分系统功能的基础上,确定了仿真控制与测试分系统基于CAN总线的分布式设计方案.  相似文献   

7.
CAN总线是现场总线领域很有发展前途的一种通讯技术,具有许多优点,现应用已较为成熟.本文以摆式列车分布式控制中的数据通讯为例,介绍了CAN总线通讯系统的设计与应用.  相似文献   

8.
论述了以CAN总线为基础的火灾监控系统的设计与实现方案,包括系统总体方案、系统硬件与软件设计,并结合实际工程对系统进行了实验研究。该监控系统可以方便地集成多种传感器和联动设备,在信息传输的安全性、准确性、实时性方面达到了较高要求,并且可以很方便地在此硬件平台的基础上实现分布式的智能火灾探测与控制,能满足大部分的监控需要,具有良好的应用前景。  相似文献   

9.
CAN总线是现场总线领域很有发展前途的一种通信技术,本文就CAN总线在分布式仿真系统设计中的应用做了深入的讨论,介绍了系统实现时的网络通信协议,并用VisualC 语言对CAN通信进行程序设计。  相似文献   

10.
分布式探测系统实现了探测控制系统的分布化和网络化,但由于网络信息传输时延的存在,使得信息传输实时性受到诸多条件的影响。为此,在分析分布式探测系统时延特性的基础上,利用MATLAB/Truetime工具箱实现系统的建模仿真,针对不同网络延时、丢包、干扰等情况对系统稳定性能进行了对比分析。仿真结果表明:网络时延增大是影响系统稳定性能的主要因素,仿真流程对于网络探测的硬件系统构成和通信协议设计具有指导性意义。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

16.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号