首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
介绍了建筑火灾防控一体化系统设计和数据分析的研究背景、意义和现状,明确了该系统的设计目标,进行了可行性分析,提出了系统的架构;对系统进行了详细的需求分析,包括用户角色需求、系统功能要求、系统数据要求和系统性能需求;采用面向对象分析和设计方法,对该系统进行了功能设计并进行了数据库设计,给出了数据库设计的E-R图;结合系统应用进行了总结和展望。  相似文献   

2.
阐述了抗击巡航导弹作战系统的概念.针对抗击巡航导弹作战系统的特点,建立了抗击作战系统效能分析的指标体系.运用模糊理论和灰色系统理论,分别建立了单系统多级模糊分析模型和多系统灰色关联度分析模型.结合实例,分析和计算了抗击作战系统效能,验证了两种效能分析方法的有效性.  相似文献   

3.
本文介绍了直接序列扩频通信信号处理实验系统的研制情况,介绍了该系统的硬件结构,软件结构,对该系统的处理过程进行了系统说明,并给出了该系统的性能测试框图及测试结果。  相似文献   

4.
基于自适应控制策略下的Rossler和Chen混沌系统的同步   总被引:1,自引:1,他引:0  
讨论了2个著名的混沌系统的混沌同步控制问题.在响应系统与驱动系统具有相同的结构,但未知驱动系统参数的情况下,设计出了有效的自适应控制器,实现了系统间的全局状态同步.仿真结果验证了该控制器的有效性.  相似文献   

5.
提出了一个新的三维混沌系统,研究了该系统的基本动力学行为,据此分析了系统在某一区间参数下的新混沌系统状态;根据新混沌系统的数学模型,进行了计算机软件数值模拟仿真.  相似文献   

6.
研究了美、俄、日等国军队指挥自动化系统的现状及发展趋势,着重介绍了美军的战略指挥控制系统与战术指挥控制系统、情报侦察与预警探测系统、通信系统、电子战系统.强调目前典型的指挥自动化系统就是上述系统有机结合的整体.分析了我军指挥自动化系统的发展需求,提出了系统对策与建议.  相似文献   

7.
智能化无人作战系统及其关键技术   总被引:1,自引:0,他引:1  
智能化无人作战系统是信息化武器装备发展的必然结果,将极大地提高武器装备的作战效能,并对未来战争产生深远的影响。研究了智能化无人作战系统的基本概念,分析了智能化无人作战系统的战场感知系统、决策支持系统和精确打击系统,探讨了智能化无人作战系统的主要关键技术。  相似文献   

8.
本文建立了干扰抵消器系统模型,导出了系统传递函数,分析了系统的响应时间,指出了干扰抵消器闭环系统的收敛时间是影响话音抵消效果的关键。  相似文献   

9.
为分析和评估多功能战斗机系统作战效能,依据美国工业界武器系统效能咨询委员会给出的模型思路和方法,对战机系统作战效能进行了分析和评估建模.建立了系统可用度,可信度模型框图,给出了系统可用度,可信性,系统能力和作战效能计算公式,详细估算和讨论了系统可靠性、维修性、保障性和系统性能参数对战机系统可用度、任务可信性和效能的影响.  相似文献   

10.
在确立防空系统的射击效能评价准则的基础上,探讨了一种防空系统射击效能的评价方法;建立了防空系统的射击效能的一般数学模型;通过对给定数学模型进行分析,找出了影响防空系统射击效能的主要因素,从而得出了防空系统各组成部分的毁伤造成防空系统整体射击效能下降之间的关系表达式.  相似文献   

11.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

12.
This article examines the implications of the proliferation of cyberwarfare capabilities for the character and frequency of war. Consideration of strategic logic, perceptions, and bargaining dynamics finds that the size of the effect of the proliferation of cyberwarfare capabilities on the frequency of war will probably be relatively small. This effect will not be constant across all situations; in some cases the advent of cyberwarfare capabilities may decrease the likelihood of war. On the other hand, the use of computer network attack as a brute force weapon will probably become increasingly frequent.  相似文献   

13.
A range of theories have sought to explain and predict secession with varying degrees of success. Arguing that a disproportionate focus upon the seceding group as the unit of analysis has frustrated the development of a comprehensive theoretical framework that is universally valid, this article highlights the role of predecessor institutions of governance and the failure of states to successfully incorporate these as an important, but neglected, causal factor in the study of secession. The inclusion of pre-state institutions of governance and processes of state formation not only results in a more complete, and therefore accurate, explanatory account of secession, but also explains why some regions have been more prone to secession than others.  相似文献   

14.
针对目前网络在人们的日常生活中的应用越来越广泛这种实际情况,介绍一些与网络数据安全有关的知识,对数据加密模型、对称(私用密钥)加密体制、非对称(公开密钥)加密体制等概念及常用算法进行了介绍。通过列举的方法介绍了加密应用中常用的几种技术,得出了XML加密技术在网络加密技术应用中有不可比拟的优势的结论。  相似文献   

15.
The collapse of the Soviet Union precipitated the massive expansion of drug use and trade in Russia. The country now has one of the largest populations of injecting drug users in the world and has become the largest single-country market for Afghan heroin. In 2003 the Federal Service for the Control of the Drugs Trade was created to coordinate a comprehensive counternarcotics strategy appropriate to the scale of this threat. The service continues to face a number of challenges in its early stages of development. However, it has made considerable advances in improving responses to large-scale organised crime and in building international cooperation.  相似文献   

16.
破片速度的测量是导弹实弹飞行试验中一项难度较高的课题,准确的测量结果对于科学评价武器毁伤效能等技术指标具有十分重要的意义.立足国内技术现状,综述了导弹破片速度测量评定的一般方法,分析了各方法的基本原理,针对每种方法探讨了测量评定破片速度所存在的误差源.结合导弹实弹飞行试验特点及靶场试验实际情况,重点对采用靶网法测量单枚破片速度的误差及误差源进行了分析,给出了误差修正模型及提高测速精度的技术措施,并指出了靶场现有破片测速方案的不足和改进方向.论文成果在靶场实践中得到了部分应用.  相似文献   

17.
运用当前国际上最流行的MATLAB软件及SIMULINK软件包,对8-300柴油机带水力测功器系统进行了PID控制器的设计及仿真,并分析了仿真结果,最后得出了对实现该系统控制有重要价值的PID控制器.  相似文献   

18.
《Arms and Armour》2013,10(2):103-123
The Royal Armouries of Leeds preserves a rare example of an early fifteenth-century German tournament high saddle that is also one of the earliest complete western medieval saddles preserved. It bears witness to an extreme form of tournament which stood very far from the real practice of war: the Hohenzeuggestech. Impact marks of lances and swords, visible on the saddle, reveal the violence of the blows exchanged during these meetings, a violence often hard to observe in the contemporary but conventional representations of jousters and tourneyers. Thus, by the means of its excellent state of preservation, the Leeds high saddle sheds some light on the jousts and tourneys on high saddles, once so popular and plentiful in what remains of the civilian iconography of the late fourteenth- and the fifteenth-century Germanic world.  相似文献   

19.
20.
中国式建筑的困境在于附加意识形态性的起源和前因后果的关系倒置.近现代建筑进入中国后,曾经保持着与世界的同步发展,直至20世纪50年代初.中国式建筑是伴随着中西古今之争而产生的命题,建筑被赋予了意识形态的内容.在全球化背景下,重新认识中国式建筑产生和发展的局限性,其实质在于混淆了现代化与西方化之区别,将现代化等同于西方化...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号