首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
针对信号在长距离高速传输时存在丢数和误码的现象,提出了一种基于CRC+ECC双校验的长线LVDS传输设计方案.该设计以LVDS数据链路搭建高速信号传输平台,分别从硬件和逻辑两个方面进行高速长距离传输数据的可靠性设计.硬件方面在发送端和接收端分别采用驱动电路和均衡电路减少传输路径的损耗,逻辑方面通过CRC校验与ECC校验相结合的方法,在高速传输时为数据提供少错纠正、多错重传的技术保障,降低了数据传输时的带宽消耗.经试验验证,通过串接多级连接器,实现了75 m双绞屏蔽传输电缆上的串行数据传输,码率可达400 Mbit/s,误码率为0.  相似文献   

2.
针对信息截获领域中(n,n-1,m)卷积码盲识别问题,提出基于遗传算法的盲识别方法。该方法在矩阵分析得到编码参数之后,利用遗传算法的全局搜索能力实现对基本校验多项式矩阵的精确识别,进而实现对基本生成多项式矩阵的识别。仿真表明:该方法能够在高误码条件下实现对(n,n-1,m)卷积码的盲识别,且运算量相对于以往的高容错识别方法得到降低。  相似文献   

3.
传感器精度提高对于改进伺服系统控制性能具有重要意义。研究了旋转变压器测量误差的构成,通过对旋转变压器内部角度测量回路进行建模,分析了测量误差的构成。由于测量误差主要为偶数次谐波,提出通过多项式拟合、傅里叶分解和查表等不同方法进行精度补偿,并在实际产品上进行了标定和验证,显著提高了旋转变压器的测量精度。  相似文献   

4.
飞机综合显示系统中图形填充与字符显示   总被引:1,自引:0,他引:1  
首先分析了现代飞机对EFIS性能提出的新要求,提出了一种新的提高EFIS系统实时性可靠的硬件解决方案,并在该方案的基础上开发了EFIS硬件电路.基于此硬件方案,分析了字符生成和图形填充在提高EFIS系统实时性方面所起的关键作用.通过对几种不同的图形填充与字符生成方法分析比较,得出结论:采用改进的边标志位填充算法,图形、字符分层生成后叠加重构的方法作为EFIS系统的软件算法实现方式.  相似文献   

5.
本文介绍了CRC码的一种快速生成方法。文中说明了该方法的设计思想、实现步骤以及某些技术细节。与常用的长除法相比,该算法简单、效益显著,因而具有一定的实用价值。  相似文献   

6.
针对主流方法对弱小目标识别效率低的问题,提出了一种基于可变卷积与迁移学习的小样本检测方法。基于可变卷积思想改进特征提取主干网络,实现在少量数据上达到和普通卷积在大量数据上相等的学习能力。设计一种Soft-NMS共同作用的方法降低多目标重叠容易出现的漏检问题。通过在公开数据集PASCAL VOC和实测弱小目标数据集上的实验表明,所提算法实现小样本条件下对实测弱小目标的检测与识别,且与原始方法相比性能有显著提高,在公开数据集上较原算法提高了5.5%,在实测数据集上较原算法提高了8.3%。  相似文献   

7.
针对大多数基于数据驱动的航空发动机剩余寿命预测方法未细分其退化过程与复杂输入数据之间的关系,无法准确识别和提取关键特征的问题。提出一种基于多尺度融合预测模型(MSF)的航空发动机剩余寿命预测方法。该方法利用静态协变量编码网络(SCCN)和变量选择网络(VSN)针对输入数据类型进行特征选择,将SCCN生成的静态协变量连接到模型的不同位置,以提升模型捕捉不同尺度时间特征的能力,并融入门控残差机制构建模型基本框架,既能提高模型的适应性也能保证信息在网络中传递的效率,采用分位数误差作为损失函数实现了多尺度的预测,有效的提高了预测的准确性。在CMAPSS涡扇发动机数据集上进行实验分析,FD002、FD004测试集的预测精度分别达到91.9%和92.4%,通过与其他深度学习方法进行对比,RMSE最优值分别提高15.54%和16.91%,Score最优值分别提高83.21%和78.78%。  相似文献   

8.
针对寿命预测模型迁移问题,提出了一种长短周期记忆网络微调(long short-term memory fine tune, LSTM-fine-tune)的迁移模型,利用理想条件下的试验数据对模型进行训练。在迁移过程中,对部分LSTM网络层进行冻结,利用实际服役环境下的数据对网络其他部分进行修正。为验证模型的泛化能力,采用不同相位与幅值的正弦函数生成数据,通过学习数据获取正弦函数的经验知识,并应用至其他正弦函数的回归,结果表明LSTM-fine-tune模型能够快速拟合,平均均方误差仅为1.033 5,明显低于直接预测误差1.536 8。为通过实际监测数据检验本方法泛化能力,分别获取了试验条件下与实际服役环境下氧气浓缩器的数据,对模型的泛化能力进行验证。结果表明,迁移后训练集预测精度提高了43.0%,测试集预测精度提高了20.2%。  相似文献   

9.
现有的点对点安全验证系统都是基于电缆连接实现系统信息传输的。电缆传输信号存在传输衰减大、抗干扰能力差、在雷暴天气易发生事故等缺点。通过将基于单片机89C2051的远程光纤通信应用到现有设备来改进控制信号的传输模式,将电信号转换为光信号,在数据传输中使用传输同步码加密、数据包CRC校验、串行数据编码以及光纤连通性定时自动监测等技术,可以从物理信号传输到数据接收处理的整个过程中保证系统的安全性和可靠性;同时,通过光纤通信方案,也能节省系统构建和维护的经费。  相似文献   

10.
校验是仿真技术必不可少的环节。针对雷达目标识别的工程应用,提出了可用于初步校验雷达目标回波仿真技术的准则和方法。提出特征量稳健性校验方法,用于验证仿真回波的特征稳定性;提出特征量相容性校验方法,比较分析仿真回波特征与实测数据特征;并依据F isher判决准则提出仿真回波样本库不同类别目标间特征量的可分性分析方法。以某雷达目标回波仿真技术为例,建立仿真回波样本库,对校验方法进行了实验验证。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

16.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
19.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号