首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 390 毫秒
1.
Windows98下基于VxD技术的中断编程与实现   总被引:9,自引:0,他引:9  
介绍了Windows98的保护模式及中断机制,阐述了在Windows98下数据采集卡驱动程序的核心技术一中断VxD编程方法,并给出了借助VtoolsD工具运用C Builder编写处理数据采集卡硬件中断的程序实例。  相似文献   

2.
介绍了一种基于CPCI总线的高速数据采集卡硬件及其WDM驱动程序设计方法,详细说明了计算机通过驱动程序与数据采集卡硬件进行高速数据交换的方法,利用DriverWorks完成了满足高速数据传输要求的WDM驱动程序设计,实现了数据采集卡与主机内存之间数据传输的DMA方法。  相似文献   

3.
数据采集是科学实验的一个重要环节,数据采集卡是数据采集系统的一个关键硬件。利用DataSocket技术能较好实现数据采集卡的共享,提高了设备的利用率和降低实验成本。  相似文献   

4.
一种在PC机上使用的多功能数据采集卡。电路采用INTEL8741作为控制单元,用8243扩充I/O线,对卡上的A/D、D/A及定时器进行控制,实现了多功能数据采集,并能对硬件作诊断  相似文献   

5.
论述了多媒体会议电视系统中的数据采集和帧结构分析的方法和实现技术。着重介绍数据采集卡的硬件工作原理、控制软件和结构分析和程序设计方法。该数据采集卡采用FIFO存储技术,通过直接写内存和多次捕获的方法,实现了会议电视系统中H.221帧的高速串行数据流的实时采集和存储功能。具有简便实用、易于实现的特点,只需插入一台386以上微机的总线扩展槽即可使用。文中还分析了硬件设计与实现中的关键技术,给出了数据采  相似文献   

6.
本文介绍了智能多串口通讯卡的硬件安装和软件安装的方法,提出利用智能卡实现数据采集和控制的编程方法。  相似文献   

7.
本文介绍了计算机通过驱动程序与数据采集卡硬件进行高速数据交换的方法,利用DriverWorks完成了满足高速数据传输要求的WDM驱动程序设计,实现了数据采集卡与主机内存之间数据传输的DMA方法.  相似文献   

8.
本文首先介绍了线扫描摄像机的工作原理,然后给出了 L C C1024 数据采集卡的硬件设计原理和应用程序开发接口。  相似文献   

9.
CPLD在过程监控系统数据采集控制中的应用   总被引:3,自引:0,他引:3  
祝银灿  卢佩  付连昆 《测控技术》2004,23(10):72-73
介绍了CPLD在过程监控系统数据采集控制中的应用.设计了以CPLD为核心的ISA总线数据采集卡,简化了系统的硬件电路,提高了系统的采集速度和可靠性.并将数据采集卡运用到中药提取过程监控系统中,取得了满意的效果.  相似文献   

10.
基于并口EPP协议的图象数据采集卡适用于笔记本电脑 ,从而使数据采集设备具有便携性。文章介绍了并口EPP协议 ,用VHDL语言实现了FIFO读写操作逻辑和EPP协议的数据读周期 ,给出了数据采集卡的硬件结构图及显示程序流程图。  相似文献   

11.
田勇    王洪光  潘新安  胡明伟   《智能系统学报》2019,14(2):217-223
针对协作机器人的构型分析研究,得出了偏置是影响机器人构型的一个重要因素。首先,对现有典型协作机器人的构型进行分析,通过构型间的内在联系与演化过程得到构型之间的差异。然后利用构型之间的差异引出了偏置的定义,并通过偏置对关节运动范围的影响将其分为S型偏置和Y型偏置。最后以全局性能指标、工作空间体积指标和灵活工作空间指标为性能评价标准,对iiwa、Sawyer、Yumi三种典型构型的性能进行了仿真。通过对比分析可知,偏置的存在使构型的全局性能和工作空间体积性能降低,但对灵活工作空间性能有提高作用。结果表明偏置是影响机器人性能的重要因素,该分析研究为协作机器人的构型设计提供了理论依据。  相似文献   

12.
启发于生物狼群群体的劳动分工行为,本文提出一种新颖的角色?匹配狼群劳动分工方法。通过剖析自然狼群的生物学行为,概括提炼出狼群劳动分工行为的个体任务的专职化、个体角色可塑性和任务分配均衡性3个典型特征,并建立了生物狼群劳动分工行为与普适性任务分配问题之间的仿生映射关系;从狼群“个体?个体”+“个体?环境”的交互方式角度出发,分析了角色?匹配的狼群劳动分工的个体角色转换和任务调整机制,研究了狼群角色?匹配的柔性劳动分工机制,提出了一种新的群智能方法,即角色?匹配的狼群劳动分工方法;将狼群的角色?匹配劳动分工与蚁群的刺激?响应劳动分工和蜂群的激发?抑制劳动分工进行了比较分析,并展示出角色?匹配狼群劳动分工方法的应用前景。  相似文献   

13.
Expert system verification and validation: a survey and tutorial   总被引:2,自引:0,他引:2  
Assuring the quality of an expert system is critical. A poor quality system may make costly errors resulting in considerable damage to the user or owner of the system, such as financial loss or human suffering. Hence verification and validation, methods and techniques aimed at ensuring quality, are fundamentally important. This paper surveys the issues, methods and techniques for verifying and validating expert systems. Approaches to defining the quality of a system are discussed, drawing upon work in both computing and the model building disciplines, which leads to definitions of verification and validation and the associated concepts of credibility, assessment and evaluation. An approach to verification based upon the detection of anomalies is presented, and related to the concepts of consistency, completeness, correctness and redundancy. Automated tools for expert system verification are reviewed. Considerable attention is then given to the issues in structuring the validation process, particularly the establishment of the criteria by which the system is judged, the need to maintain objectivity, and the concept of reliability. This is followed by a review of validation methods for validating both the components of a system and the system as a whole, and includes examples of some useful statistical methods. Management of the verification and validation process is then considered, and it is seen that the location of methods for verification and validation in the development life-cycle is of prime importance.  相似文献   

14.
The new method of defuzzification of output parameters from the base of fuzzy rules for a Mamdani fuzzy controller is given in the paper. The peculiarity of the method is the usage of the universal equation for the area computation of the geometric shapes. During the realization of fuzzy inference linguistic terms, the structure changes from the triangular into a trapezoidal shape. That is why the universal equation is used. The method is limited and can be used only for the triangular and trapezoidal membership functions. Gaussian functions can also be used while modifying the proposed method. Traditional defuzzification models such as Middle of Maxima − MoM, First of Maxima − FoM, Last of Maxima − LoM, First of Suppport − FoS, Last of Support − LoS, Middle of Support − MoS, Center of Sums − CoS, Model of Height − MoH have a number of systematic errors: curse of dimensionality, partition of unity condition and absence of additivity. The above-mentioned methods can be seen as Center of Gravity − CoG, which has the same errors. These errors lead to the fact that accuracy of fuzzy systems decreases, because during the training root mean square error increases. One of the reasons that provokes the errors is that some of the activated fuzzy rules are excluded from the fuzzy inference. It is also possible to increase the accuracy of the fuzzy system through properties of continuity. The proposed method guarantees fulfilling of the property of continuity, as the intersection point of the adjustment linguistic terms equals 0.5 when a parametrized membership function is used. The causes of errors and a way to delete them are reviewed in the paper. The proposed method excludes errors which are inherent to the traditional and non- traditional models of defuzzification. Comparative analysis of the proposed method of defuzzification with traditional and non-traditional models shows its effectiveness.  相似文献   

15.
在对氯乙烯精馏这个复杂生产过程工艺及控制的分析基础上,提出了低沸塔回流、低塔釜加热、中间过料、高塔回流、高塔釜加热、成品冷凝等回路的控制模型。并介绍了用开放的DCS进行的组态、调试过程。因其图形化组态工具的直观、灵活、功能强,使复杂的控制问题简单化,且控制对工况变化的适应性强。经生产实际运行表明,产品质量、生产能力均超过预期值。  相似文献   

16.
软件脆弱性已成为互联网安全的主要威胁来源,软件脆弱性分析技术的重要性日益突出。模糊测试是脆弱性分析的热点技术之一,通过持续生成测试用例、动态监控目标代码执行和反馈调节变异策略的方法尝试触发程序异常,具有部署便捷、适用性广和效果直观的优点。随着测试目标的复杂性增加,从业人员对模糊测试的效率提出了更高的要求。并行模糊测试通过并行执行、任务分解和共享信息等方法提高脆弱性分析的效率。首先,分析了基于覆盖反馈的模糊测试面临的主要挑战;之后,探讨了并行模糊测试的解决思路和方案,从系统结构、任务划分、语料库共享和崩溃去重等方面对并行模糊测试进行了综述;最后,总结了现有并行模糊测试的优缺点,并对未来发展方向进行了展望。  相似文献   

17.
网络安全是一门涉及计算机科学、网络技术、密码技术、信息安全技术、应用数学、教论、信论等多种学科的综合性学科,它涉及的因素主要包括物理安全、系统安全、信息安全和文化安全等范围。局域网络中人为的、非人为的,有意的、无意的;非法用户入侵、计算机病毒、黑客的不断侵袭等随时威胁局域网的安全。随着计算机网络技术迅速发展,网络安全问题也日渐突出。该文分析了威胁局域网安全的主要因素,探讨了从物理环境、网络层、应用层以及管理制度方面,运用VPN、NAT、VLAN、IDS、身份验证等技术构建安全局域网的策略。  相似文献   

18.
归纳总结了计算机用户在日常工作、生活中可能碰到的多种代表性的电脑软硬件故障和问题及解决方法。各种故障问题类型和故障排除思维习惯来编排,具体包括开关机故障、死机故障、显示故障、声音故障、存储设备故障、CPU故障、内存故障、主板故障。在碰到电脑故障时,能快速判断和解决一些有规律可循的常见故障,以及如何维护电脑、如何避免电脑故障。  相似文献   

19.
Measurements of spring phenological dates in boreal regions using NDVI can be affected by snowmelt. This impacts the analysis of interannual variations in phenology and the estimates of annual carbon fluxes. For these two objectives, snowmelt effect must be removed from the phenological detection. We propose a methodology for determining the date of onset of greening in the 1982-2004 period using SPOT-VEGETATION (VGT) and NOAA Advanced Very High Resolution Radiometer (AVHRR) data. From 1998 onwards, the date of onset of greening is taken as the date at which the Normalized Difference Water Index (NDWI), calculated from SPOT-VGT near and short-wave infrared bands, starts increasing. This index decreases with snowmelt but increases with vegetation greening. For the 1982-2001 period, the date of onset of greening is the date at which AVHRR-NDVI equals a pixel specific threshold (PST), determined using the results of the NDWI method in the years common to the two datasets. The methods are validated using in situ measurements of the dates of leaf appearance. RMSE of 6.7 and 7.8 days, respectively, is found using NDWI-VGT and PST-NOAA methodologies, and the difference between the two methodologies in the common years is small. Very importantly, the dates are not biased. The interannual variations of the 23-year spring phenology dataset on the study area in northern Eurasia are analysed. In average over the study area, an advance of 8 days and a delay of 3.6 days are, respectively, found over the periods 1982-1991 and 1993-2004. These results confirm and complete previous studies about the greening trend, remove the uncertainty due to snow, and may improve carbon budget calculations.  相似文献   

20.
强波  邱晓刚 《计算机仿真》2005,22(10):90-94
对联邦的VV&A不仅能够使每一步的工作得到跟踪和衡量,还使每一步能够减少多余的工作量,巩固需要加强的工作,明确开发人员的角色和职责,从而使人力、时间、资金等资源得到更加有效率的利用,仿真的结果变得更加可预测和准确,在很大程度上减少了编程的风险.联邦成员描述了仿真模型的各对象类、交互类、相关的属性、参数等信息,而联邦是各联邦成员的有机集成,构成具有特定功能的仿真系统.因此,联邦成员的正确性是联邦正确性的前提,决定了仿真系统的成败.在VV&A的过程中,最好采用一些自动化工具以便于工作,同时要根据具体仿真系统的实际情况来确定VV&A所需要作的工作.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号