首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
介绍了一种基于USB技术的便携式高炮连集成指挥平台,叙述了设计构想及工作原理.详细描述其硬件电路设计,包括:主控机、通信控制电路及各接口电路的设计;然后给出了相应的软件设计,包括单片机通信控制软件及主控机各主要工作模块的软件设计.实验证明该集成指挥平台具有良好的性能,且充分考虑系统工作环境电磁环境复杂、无间断工作的特点...  相似文献   

2.
设计了一个基于STM32系列微控制器的导航设备模拟板,模拟了导航设备的各种功能。模拟板能够模拟雷达导航接口的如下信号:ARINC 429总线数据输出、数字-自整角机输出(模拟航向信号)、DA数据输出(模拟偏航距)、DO数据输出(模拟主警告和偏航距标志)。板卡采用USB总线接口与上位机通信。详细介绍了模拟板的系统结构,给出了硬件系统的详细设计,并详细讨论了模拟板的STM32微控制器固件程序设计、USB驱动程序设计。硬件调试和真实环境测试表明,设计的模拟板满足了导航设备模拟的需求,便于外场测试。  相似文献   

3.
针对某型自行高炮火控系统在线性能测试的需求,设计了一种火控系统并行通信信号在线检测模块。该测试模块将待测装备信号引入模块输入端,根据并行通信信号的时序实现分时多点数据采集,并传输到主控计算机进行数据的分析与处理。对监测节点的设置进行了分析与选择,设计了监测系统结构与测试接口。测试结果表明,该测试模块能够实现对稳定跟踪系统、火控计算机系统和火炮随动系统等火控系统主要单体之间并行通信信号的在线测试和分析,及时发现系统异常。  相似文献   

4.
激光远场光斑检测中信号采集与转贮技术研究   总被引:1,自引:0,他引:1  
设计了16×16面阵靶板多路探测信号的采集与转贮系统电路,用于信号采集及向上位机的传送。系统采用W 77E58为采集电路的CPU,以FT245BM为核心构成USB接口电路,实现了256路信号的快速采集与转贮,较好地解决了对多路探测器实时快速采集和向上位机传送的问题,从而使激光远场光斑测试系统能够实时测量远场光斑的能量分布和变化情况。  相似文献   

5.
针对目前自动测试系统中要求测试信号传输距离远、传输速度快、传输信号种类多、系统工作环境恶劣等问题,设计并实现了基于PXI总线的模拟用户V口通信模块。利用专用接口芯片PCI9656设计了PXI总线接口模块,利用FPGA实现了对来自电话接口(V口)典型的双音多频拨号信息的判读和控制。本设计具有传输速度快、灵活高效的特点,增强了系统的集成度、稳定性和可靠性。  相似文献   

6.
为实现装甲车辆电气系统的数字化控制和在线故障诊断,设计了以DSP为控制核心并辅以CAN总线接口电路的数字式灭火抑爆控制系统。系统移植了嵌入式实时操作系统μC/OS-II,实现了灭火抑爆、故障监视、自诊断以及和上位机通信等功能。实验结果表明,该系统各项指标均达到或超过原模拟控制系统指标,且具有很高的实时性和很强的稳定性。  相似文献   

7.
为使便携式计算机与1553B总线设备间的数据通讯更加方便快捷,提高设备检测效率,设计了一种便携式1553B总线通讯接口卡。接口卡采用功能模块化的方法,设计了USB协议接口模块和1553B协议处理模块,并将USB总线通讯接口模块、缓冲模块、定时模块均集成于一片FPGA上。为实现安全性与可靠性,同时还设计了ESD保护电路。给出了接口卡的总体设计思想及工作原理,详细介绍了硬件设计和软件设计思想。经多次测试,验证了其可行性,结果满足实际应用的需求,实现了接口卡的可靠性和便携性。  相似文献   

8.
介绍了一种基于USB技术的温度采集系统的设计方案及实现方法,该系统综合运用了USB技术、单片机技术以及数据采集技术,整个设计由温度采集模块、数据传输模块、PC机应用程序3部分组成。阐述了系统硬件设计中温度采集模块和数据传输模块的组成结构及硬件的实现方法;对系统软件设计中的设计思想及编程方法进行了详细分析,并给出了USB固件编程和驱动程序的开发工具及流程。该系统实现了通过USB总线对温度采集设备的数据采集与控制。实验表明该系统具有高速、实时、性价比高等特点。  相似文献   

9.
针对某通信系统中的有线通信模块,采用半实物仿真技术对其进行仿真,论述了基于DSP和USB技术的设计,详细地描述了系统各部分的构成及工作原理,其调制部分通过按位分析数据并控制8253输出不同频率的方波实现;解调部分通过AD采样并由DSP对数据进行信号处理而实现.同时给出硬件接口设计思路和原理图,最后介绍相关软件基本框架.  相似文献   

10.
针对某总线数据传输网络要求利用光纤实现宽频带通信链路的问题,提出了一种基于高速光纤通信接口的总线网络链路设计,该设计中以现场可编程逻辑门阵列(field programmable gate array,FPGA)为控制芯片,HTA8525和Aurora协议为光纤通信接口的核心实现光电转换,利用以太网模块将数据转化为上位机可识别的数据帧,可验证总线数据传输的准确性。实验和仿真结果表明,总线网络中的光纤通信链路传输速率达到10 Gb/s级,能够快速进行数据传输,并且可以将数据回传至上位机进行观察分析,解决传统总线网络中传输速率受限等问题,同时提升总线网络的可靠性,满足任务要求。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号