首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
针对装甲车辆电源系统整流装置内部二极管的开路和短路故障,提出一种基于快速傅立叶变换(FFT)和Elman神经网络的诊断方法。在主电路结构基础上,通过增加外围测试电路的硬件设计方案,获取两路测试信号;对测试信号进行FFT运算,提取基波频率1次~6次谐波分量所占直流分量百分比为故障特征量,借助Elman神经网络的模式识别功能,实现整流装置故障诊断及模式分类。结合装甲车辆电源系统数学模型,基于仿真结果,构建了整流诊断装置诊断模型,开发了整流装置故障诊断系统,应用结果验证了该方法的有效性。  相似文献   

2.
介绍了通过硬件仿真和软件编程实现配电器功能的原理和方法,并通过系统设计方案论证及硬件设计实现了对配电教学训练仿真系统的开发,提出了通过串行通信与PC机通信及在原有系统的基础上进行功能扩展来实现系统升级扩展的方法;软件设计采用去除冗余设计和软件仿真两次简化的模型,由控制软件对系统状态进行控制,节点状态由程序中的状态变量所体现,人机交互软件接收指令数据,并输出至主控计算机.  相似文献   

3.
在部分低精度浮点运算应用中,需要流水的浮点倒数近似值运算。本文基于SRT-4算法设计并实现了一种流水的浮点倒数近似值运算部件。该部件采用6级流水线结构,运算结果精度至少为8位有效尾数。为了支持对非规格化浮点数的硬件处理,还设计并实现了改进版,有利于进一步提高浮点倒数近似值运算的性能。改进版采用8级流水线结构,新增了源操作数预规格化和结果后规格化功能模块,可以实现对非规格化浮点数的硬件处理。经过逻辑综合评估,改进版的硬件开销是面积在合理范围内增加19.23%,且对时序没有明显影响,可以满足预期的1.6 GHz频率设计目标。  相似文献   

4.
提出了针对从右到左平方乘算法实现的RSA故障分析算法,该算法利用多次在模幂运算执行过程中在不同指定位置对模数N注入故障获得的故障签名,通过密钥搜索恢复出参与故障运算的密钥片断,最终恢复完整密钥。从理论上分析了该算法的复杂度,并通过仿真实验进行了验证,得到了密钥搜索空间和所需注入故障数目与一次攻击恢复密钥片断长度之间的对应关系。  相似文献   

5.
一、概述 622集成电路电子计算机(以下简称622机),是一台字长为16位的定点小型多功能通用机。 622机指令系统和DJS—130机具有兼容性,130机的所有程序系统均能在622机上运行。不同的是,622机具有乘除法指令,并且增加了六种控制台指令。这六种指令用来逐门诊断运算器的故障,检测内存,自动输入十四条二进制初始引导程序,以及用来调试机器指令。中央处理机由微程序控制器和运算器组成。它通过存贮器总线与存贮器连接,通过输入——输出总线与外部设备连接。处理机中有四个通用累加器,其中两个可做变址寄存器用。  相似文献   

6.
在实时控制系统中,乘除法指令用的较多。DJS—130机无专门的乘除法指令,用子程序做乘、除法,每次需时150μS以上,即乘、除法运算速度每秒6700次。虽然加、减法运算速度可达每秒50万次,但平均速度并不高。若乘、除法指令占30%,平均执行一条指令的时间为:150×0.3+2×0.7=46.4μS即,速度只有1/(46.4×10~(-6))≈2万次/秒。 622机增加了专门的乘除法指令,每次乘、除法时间为18μS,平均执行一条指令的时  相似文献   

7.
为减少远程Cache访问延迟,提高共享存储系统的性能,提出了一种新的基于程序内在写突发特性的最后一次写访问预测方法,并对一个具体的目录协议进行了改造,以支持该预测方法。通过预测Cache块的最后一次写访问并提前对其进行降级,处理器能直接从主存中读取数据,从而减少了远程Cache访问所需的一个网络跳步数。与当前基于指令的预测方法相比,该方法能极大减少存储开销。基准测试程序的评测结果表明,该方法能获得83.1%的预测准确率,并且能提高8.57%的程序执行性能,同时与基于指令的预测方法相比,该方法能分别减少历史踪迹表69%的存储开销和签名表36%的存储开销。  相似文献   

8.
为减少远程Cache访问延迟,提高共享存储系统的性能,提出了一种新的基于程序内在写突发特性的最后一次写访问预测方法,并对一个具体的目录协议进行了改造,以支持该预测方法。通过预测Cache块的最后一次写访问并提前对其进行降级,处理器能直接从主存中读取数据,从而减少了远程Cache访问所需的一个网络跳步数。与当前基于指令的预测方法相比,该方法能极大减少存储开销。基准测试程序的评测结果表明,该方法能获得83.1%的预测准确率,并且能提高8.57%的程序执行性能,同时与基于指令的预测方法相比,该方法能分别减少历史踪迹表69%的存储开销和签名表36%的存储开销。  相似文献   

9.
本章将介绍所有功能部件和外围硬件的实现方法。硬件简图在附录A中,它们按功能部件排列,各图的标题字首表示有关功能部件的名称,序列发生器和微处理机的程序说明见附录B。这些说明包括程序的微位定义、测试位定义、存储器映射和程序指令级说明。下面几节在讨论硬件和控制说明时参照了上述附录。  相似文献   

10.
当前,船舶多缸柴油机普遍缺乏有效的各缸功率均匀性故障检测手段,最为有效的缸内压力检测法受限于昂贵的测试仪器和复杂的检测过程而难以广泛应用,目前仅能根据各缸爆压、排温等参数进行准确度不高的分析。柴油机瞬时转速信号能够间接反映缸内压力,它包含丰富的信息量,测量方便,可以作为各缸功率均匀性检测的有效信息源。据此对6-135型柴油机通过调整部分气缸喷油量的方法进行各缸功率不均匀故障的模拟,通过对其瞬时转速信号的测试和分析,从中提取各缸瞬时转速升程相对值作为有效故障特征。正常状态下,各缸瞬时转速升程相对值变化范围在±10%以内,若该参数下降超过10%,可认为对应的气缸存在发出功率偏少问题。该方法能够正确判断各缸功率均匀性故障,可为多缸柴油机工作均匀性分析提供新的检测途径。  相似文献   

11.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

12.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

13.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

14.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

15.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

16.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

17.
18.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

19.
The UK’s interrogation operations during the conflict in Iraq (2003–2008) are often portrayed by the media as involving significant amounts of mistreatment. This article demonstrates that these practices are not necessarily representative of the UK’s interrogation operations across this conflict. In doing so it contributes to the limited literature on the practice of interrogation and on the UK’s combat operations in Iraq. The UK’s interrogation capability, and therefore its intelligence-gathering capability, is shown to have rested primarily with the military’s Joint Forward Interrogation Team (JFIT). The JFIT suffered from limitations to the number, training and experience of its interrogators and interpreters. It is argued that maintaining a permanent, higher level of preparedness for interrogation by the British armed forces is desirable.  相似文献   

20.
ABSTRACT

While the study of organised violence is considered essential to understanding the history of the West, and accordingly imbued with various layers of meaning and remembrance, war is widely regarded as inimical to the modern nation in Africa and stable development more broadly. Using examples drawn from primarily from East Africa, this paper considers the ways in which warfare in the deeper (‘precolonial’) past has been framed and envisioned in recent decades, in particular by governments whose own roots lie in revolutionary armed struggle and who began life as guerrilla movements. While in some cases particular elements of the deeper past were indeed mobilised in pursuit of contemporary political goals, in many other scenarios histories of precolonial violence were beheld as problematic and unworthy of remembrance. This paper highlights the paradox and ambiguity which has attended the memory of key aspects of Africa’s deeper past.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号