首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 187 毫秒
1.
设计了用于监控的短距图像信号无线通信系统,以单片机最小系统 、升压模块 、无线收发模块 、电源模块 、继电器模块 、字符叠加模块等模块为核心,采用2.4G的无线传输方式实现无线通信网络的传输.其中,单片机最小系统中采用按键控制影像B、影像C的切换传输,实现视频信号的短距离传输.整个无线传输系统稳定性强,传输视频信号稳定,影像清晰.  相似文献   

2.
nRF903无线通讯模块在无线数据采集系统中的应用   总被引:4,自引:1,他引:4  
为了实现无线数据的采集,提出了一种基于nRF903模块的无线通信解决方案。讨论了无线收发芯片nRF903的用户接口功能及其配置,论述了利用过采样和UART两种方法实现无线数据传递的通信协议及其应注意的问题,给出了软硬件设计方法。利用无线通信模块实现无线数据采集系统中嵌入式主机和传感器节点之间的数据传输。  相似文献   

3.
一种无线射频收发模块的应用   总被引:1,自引:0,他引:1  
介绍了一种新型廉价的无线收发模块。通过这种模块可以实现无线通讯和无线控制等多种功能。首先详细地介绍了发射模块和接收模块的性能参数;接着提出几种使用方法;最后举出一个应用实例,系统地叙述了这种模块的使用方法。  相似文献   

4.
一种GSM无线固定电话设计方案   总被引:3,自引:0,他引:3  
GSM无线固话是利用GSM网络实现固定电话通话功能的设备,具有广泛的应用前景。本文介绍了一种采用手机主板为通讯模块,PIC单片机为控制模块的无线固话话机的硬件电路构成和系统软件设计。实验结果表明该话机具有良好的通话效果和完善的公话计费功能。  相似文献   

5.
叶无道 《微型计算机》2007,(5X):138-139
上一期我们报道了通过无线路由器实现wi-Fi无线打印的方法。对于PPC、PDA以及笔记本电脑来说,除了wi-Fi,之外,还有一个重要的无线功能——蓝牙。很多时候当身处没有wi-Fi设备的环境时,想要打印PPC上的文档,就要用到蓝牙无线连接了。当然,你还必须得准备一个蓝牙打印模块才行。[编者按]  相似文献   

6.
利用GSM无线模块收发短消息   总被引:12,自引:0,他引:12  
分析了利用GSM无线模块在PDU模式下收发短消息的方案,对PDU模式、编码解码方法、短消息控制方法进行了详细介绍,并给出了整个系统的实现。这对在许多领域实现自动化管理有一定的理论意义和参考价值。  相似文献   

7.
系统由单片机主控模块、无线射频收发模块、语音播报模块、显示模块等部分组成。其中,无线收发模块实现公交车与站台之间信息的发射与接收;语音芯片实现语音的录制与播放。通过编写软件控制程序进行调试,整个系统能够完成识别站点、进站时语音播报、实时显示时间和站点信息等功能。  相似文献   

8.
在分析目前无线抄表使用的主要技术基础上,结合目前规划智能电网和智能电表的大量需求,提出一种基于RF无线芯片和RS-485通信标准的无线抄表系统,在不改动传统仪表的工作方式的条件下,为传统仪表加上数据采集模块、中继模块和汇聚模块,通过RF无线传输模块构建通信网,制定了相应的通信协议,进行中继通信,扩大传输距离,实现了远程无线抄表的功能,该抄表系统硬件电路简单、成本低廉、操作简单;通过实验测试,所设计的无线抄表系统性能良好,具有广泛的应用前景。  相似文献   

9.
无线温度监测系统在焊接过程中的应用   总被引:1,自引:0,他引:1  
针对焊接工艺过程中对温度要求严格的特点,设计了一种基于无线传输技术与非接触测温技术的多点温度监测系统。详细介绍了监测系统的实现方法,重点讨论了无线传输模块的应用与通信方法的实现。通过测试,系统工作正常,传输与测量的准确性可以满足焊接生产过程的要求。系统具有可靠性高、使用简单、可方便扩展通信节点等优点。  相似文献   

10.
无线数传模块及其应用   总被引:1,自引:0,他引:1  
无线数据传输技术应用范围非常广泛,本文通过介绍FE—SD430系列无线数传模块,使读者了解无线数传模块应用方面的知识。  相似文献   

11.
讨论小型计算机控制系统智能I/O模块的设计和实现,这些模块以单片机和CPLD为核心,可与外围处理模块灵活组合成各种数据采集卡、控制卡,具有量程及通道选择、工程化处理、故障诊断等智能化功能;利用MODBUS通信协议,通过RS-485总线与系统主控单元连接。实践证实模块工作性能稳定、可靠性高、使用方便。  相似文献   

12.
基于访问控制策略,对Linux系统可加载内核模块LKM机制的安全缺陷进行了研究,对各种利用LKM的攻击方法进行了深入的综合分析,最后从监控所有的模块操作、基于capabilities能力机制的权限分解、基于加密模块的安全的LKM这3个方面,对LKM安全增强技术进行了探讨,并重点从机密模块加载过程、ELF格式文件操作等关键技术,对基于加密模块的安全LKM设计进行阐述.  相似文献   

13.
Inheritance graphs of object-oriented languages can be decomposed into independent subgraphs, or modules, which are inheritance graphs themselves. This paper is devoted to the study of efficient algorithms of decomposition into modules similar to substitution decomposition algorithms. For 2-connected inheritance graphs we search for maximal modules (under inclusion), whereas we show that the significant modules of non-2-connected graphs are the biconnected components. For the 2-connected case, a method based upon a property of greedy linear extensions is proposed. However, in both cases a linear-time complexity algorithm is provided to decompose into modules. Furthermore, the algorithm can be inserted into the inheritance mechanism (such as in CLOS [14]).  相似文献   

14.
The modular platform design, an increasingly popular method for designing vehicles, involves several unresolved problems such as the lack of effective techniques for dividing structural components into modules. This article presents a methodology for dividing a typical body-in-white structure into modules based on a modified graph-based decomposition algorithm, then selecting the shared modules based on a cost-based priority method. Structural stiffness, manufacturability, and assembling ability are three main optimization objects. Shared modules, parameterized modules, and flexible modules can be easily determined and optimized through the proposed methodology. In the case study, the proposed methodology was applied to design a car product family to validate its feasibility and effectiveness.  相似文献   

15.
This paper is presenting the efforts to implement in real time and for on-board applications a set of Driver-Vehicle-Environment (DVE) monitoring modules based on the theoretical work done in DVE modelling within the EC 6th FW co funded AIDE Integrated Project.First the need for such an implementation will be discussed. Then the basic DVE modelling principles will be introduced and analysed. Based on that and on the overview of the theoretical work performed around the DVE modelling, the real time DVE monitoring modules developed in this project will be presented and analysed. To do this the DVE parameters needed to allow the required functionalities will be discussed and analysed. Special attention will be given to the use cases and scenarios of use for the real time DVE modules. This allows the reader to understand the functionalities that these modules enable in tomorrow's vehicles that will integrate a large degree of automation supported by advanced integrated and adaptive human machine interfaces (HMIs). The paper will also present examples of the functional and technical tests and validation results for some of the DVE modules. The paper will conclude with a discussion around the lessons learned about the design and implementation of such systems. This will include also the next steps and open issues for research in order for these systems to become standard modules in tomorrow's vehicles.  相似文献   

16.
在AUTOSAR平台的软件架构中,基础软件层包含大量接口定义完整的标准模块。开发AUTOSAR应用时需要将基础软件层模块嵌入到操作系统上下文中,由操作系统来触发模块的主处理函数,并提供必要的数据同步机制。为此,提出一种基础软件调度器模块的设计及实现方案,将上述模块嵌入到指定项目的上下文中。实现结果表明,该方案能节约操作系统资源,提高模块可靠性和稳定性。  相似文献   

17.
在软件系统开发中,不同模块间需要进行信息的交互、数据的传递,并处理不同情况发生时的逻辑关系.尤其涉及多级模块协调同步时,这种协同响应机制就更为复杂.基于Java语言的属性事件协同技术能有效处理此类问题.通过构造共享的属性事件池,利用事件的触发与响应机制实现不同模块间的协同沟通.对该技术的构思、技术过程及基于Java语言的实现进行了介绍.  相似文献   

18.
Identifying change-prone modules can enable software developers to take focused preventive actions that can reduce maintenance costs and improve quality. Some researchers observed a correlation between change proneness and structural measures, such as size, coupling, cohesion, and inheritance measures. However, the modules with the highest measurement values were not found to be the most troublesome modules by some of our colleagues in industry, which was confirmed by our previous study of six large-scale industrial products. To obtain additional evidence, we identified and compared high-change modules and modules with the highest measurement values in two large-scale open-source products, Mozilla and OpenOffice, and we characterized the relationship between them. Contrary to common intuition, we found through formal hypothesis testing that the top modules in change-count rankings and the modules with the highest measurement values were different. In addition, we observed that high-change modules had fairly high places in measurement rankings, but not the highest places. The accumulated findings from these two open-source products, together with our previous similar findings for six closed-source products, should provide practitioners with additional guidance in identifying the change-prone modules.  相似文献   

19.
A timely detection of high-risk program modules in high-assurance software is critical for avoiding the high consequences of operational failures. While software risk can initiate from external sources, such as management or outsourcing, software quality is adversely affected when internal software risks are realized, such as improper practice of standard software processes or lack of a defined software quality infrastructure. Practitioners employ various techniques to identify and rectify high-risk or low-quality program modules. Effectiveness of detecting such modules is affected by the software measurements used, making feature selection an important step during software quality prediction. We use a wrapper-based feature ranking technique to select the optimal set of software metrics to build defect prediction models. We also address the adverse effects of class imbalance (very few low-quality modules compared to high-quality modules), a practical problem observed in high-assurance systems. Applying a data sampling technique followed by feature selection is a relatively unique contribution of our work. We present a comprehensive investigation on the impact of data sampling followed by attribute selection on the defect predictors built with imbalanced data. The case study data are obtained from several real-world high-assurance software projects. The key results are that attribute selection is more efficient when applied after data sampling, and defect prediction performance generally improves after applying data sampling and feature selection.  相似文献   

20.
A collection of interacting systems, such as a fleet of military vehicles, can have a life-cycle benefit from sharing interoperable modules. Defining the modules that maximize such benefits must be addressed at the early stages of system design. We present a multi-objective optimization framework for conceptual modular design. We use a functional representation of the supersystem, i.e., the interacting systems collection, to make module design decisions informed by supersystem requirements and life-cycle objectives. The resultant modules are configured into a variety of architectures and form a set of systems with distinct capabilities that meet supersystem requirements. We apply this approach on a fleet of military vehicles. Computational results quantify the intuition that designing a large number of smaller modules reduces overall fleet weight and increases required personnel resources because of larger demand for vehicle reconfiguration.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号