首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
文章介绍了语音拨号器的性能与特点 ,给出了该系统的硬件设计方案 ;讨论了MCU与DSP、DSP与CODEC的接口技术 ;也给出了MCU与DSP通信的接收和发送时序图以及DSP实现的语音识别算法的流程图。  相似文献   

2.
段炜  张霞 《电子世界》2012,(1):78-79
在当前我国电网调度与运行管理系统中,SVG可以使用浏览器直接查看,可作为Web发布实时监视的图形。本文为此首先阐述了SVG的含义与优势,接着论述了电网调度的要求与SVG设计特点,重点探讨了基于SVG的电网企业调度与运行管理系统的要求,并通过实例分析了其实现过程与效果。  相似文献   

3.
本文分析了故障电弧导致火灾的可能性与严重性,简述了目前国内外相关保护装置的发展与现状。详细介绍了故障电弧保护装置的设计流程与技术关键点。  相似文献   

4.
刘铭光 《电子测试》2016,(17):158-159
基于对航空可靠性、安全性和经济性方面的需求,对航空电气设备的故障预测与健康管理技术越来越多地得到了重视与应用,在国外的航空设备检测技术中,故障检测与健康管理技术已经成为了核心技术.介绍了航空电气设备故障预测与健康管理(PHM)技术,针对航空典型电气设备的故障预测与健康管理系统建模的重点内容,分析了航空电气设备的故障预测与健康管理技术的整体预测过程、相应应用策略.  相似文献   

5.
以容抗为例回顾了电抗的定义与实质,指出了容抗与电阻不同,容抗是电容的电压与电流的有效值(或幅值)之比,而不是电压与电流的瞬时值之比。文章着重指出了在激励频率为定值时,给定电容的容抗为常数,而其u(t)/i(t)却是时间的正切函数。该文指出了电阻与电抗、阻抗的区别,对正确理解和使用阻抗有帮助。  相似文献   

6.
邢志强 《科普研究》2013,8(3):87-93
晋察冀边区是中共创建的第一块抗日模范根据地,在这块红色的土地上,边区政府结合当时情况开展了轰轰烈烈的科普教育,形成了科普教育与政治教育、与战争需要、与多种传媒、与农业生产、与百姓生活、与学校教育、与职业教育以及与社会教育紧密结合的鲜明特点,创造了中国近代科普教育的辉煌。  相似文献   

7.
基于B/S架构的数据挖掘原型系统的设计与实现   总被引:1,自引:0,他引:1  
对C/S架构与B/S架构的基本概念与优劣进行了介绍与比较,提出了一个基于B/S架构的数据挖掘原型系统.然后介绍了该系统的需求分析、总体设计与技术路线,展示了系统实现界面,并着重介绍了关联规则算法在本系统中的实现.  相似文献   

8.
指出了目标的理论RCS与其实测RCS的差别,并导出了其关系式;在poincare球上表征了极化匹配因子ρ与目标PCS的理论值σ的大小,便于从几何学直观地了解极化匹配情况与最佳RCS大小。  相似文献   

9.
一种基于DSP的语音录放系统的设计   总被引:3,自引:0,他引:3  
陈明义  夏玥 《电子技术》2002,29(8):56-58
文章介绍了TMS32 0C5 4x与PC组成的语音录放系统 ,阐述了系统的软、硬件设计 ,解决了DSP与PC间建立握手信号及进行数据通信的问题 ,并介绍了PC音频文件的格式与生成  相似文献   

10.
本文主要介绍基于ASP.NET的人事管理系统的设计与开发过程。分析了该系统的需求,描述了系统的功能设计与实现,并对系统的功能与性能进行了测试。  相似文献   

11.
The relation between the power of the Brillouin signal and the strain is one of the bases of the distributed fiber sensors of temperature and strain. The coefficient of the Bfillouin gain can be changed by the temperature and the strain that will affect the power of the Brillouin scattering. The relation between the change of the Brillouin gain coefficient and the strain is thought to be linear by many researchers. However, it is not always linear based on the theoretical analysis and numerical simulation. Therefore, errors will be caused if the relation between the change of the Brillouin gain coefficient and the strain is regarded as to be linear approximately for measuring the temperature and the strain. For this reason, the influence of the parameters on the Brillouin gain coefficient is proposed through theoretical analysis and numerical simulation.  相似文献   

12.
李峰 《长江信息通信》2021,34(2):167-171
数字经济时代,企业面临更加激烈的市场竞争环境,传统的供应链管理模式的问题日趋显现,亟需进行数字化转型。企业的发展需要更加智能、高效的数字化供应链的支撑。针对这一现状和需求,文章着力于研究如何解决传统企业供应链数字化转型的问题,设计了一套基于SAP ERP和EWM系统为核心的企业数字化供应链的解决方案:通过SAP ERP和EWM系统的无缝对接实现了企业物流相关业务的自动流转;通过EWM与WCS系统的无缝对接以及WCS系统与自动化立体仓库硬件设备的集成实现了仓库所有出入库作业的自动传递和执行;通过引入条码技术以及与RF设备的集成实现了全流程作业的自动识别和准确高效的处理。该解决方案的设计与实现,帮助企业极大地提高了供应链各个环节的作业效率,提高了整个供应链的透明度,进而提升了企业的整体运营效率和管理水平,使得企业能在日趋激烈的市场竞争环境中保持竞争优势,并取得长足发展。  相似文献   

13.
空间互联网技术是人类进行航天测控、导航定位、远洋航行等空间应用的基础支撑,是实现全球互联互通的关键手段。首先介绍了空间互联网的概念及内涵、组成及结构、特点及优势等相关基础知识,接着总结了空间互联网的关键技术,然后阐述了空间互联网的发展现状和面临的问题,最后结合互联网技术发展趋势和航天应用的发展要求,对空间互联网技术的发展趋势进行了展望和预测。  相似文献   

14.
姜凯  仲剂生 《激光与红外》1994,24(3):17-19,22
本文在概述红外热象技术应用于石化设备检测的基本原理和方法的同时,着重介绍了对石化重点装置催化再生器的检测及其衬时故障诊断,以及热管道、阀门外保温效果评估等方面的应用情况。并对此项技术在石化企业的应用前景和研究方向做了一定的介绍。  相似文献   

15.
近年来,随着网络的普及和信息化水平的不断提高,越来越多的公司把重要信息和机密文件存储在连接着网络的计算机上。但是,由于网络攻击的手段层出不穷,威胁狩猎的思想和理念孕育而生并且逐渐成熟。由此,首先对网络空间威胁的定义和攻击流程模型进行介绍,再阐述了威胁狩猎的定义和核心技术,然后描述了威胁狩猎使用的工具;最后,概括总结现有的主流威胁狩猎的框架,比较各个框架的优缺点,并阐明了下一步的发展方向。  相似文献   

16.
Three alternative schemes for secure Virtual Private Network (VPN) deployment over the Universal Mobile Telecommunication System (UMTS) are proposed and analyzed. The proposed schemes enable a mobile node to voluntarily establish an IPsec-based secure channel to a private network. The alternative schemes differ in the location where the IPsec functionality is placed within the UMTS network architecture (mobile node, access network, and UMTS network border), depending on the employed security model, and whether data in transit are ever in clear-text, or available to be tapped by outsiders. The provided levels of privacy in the deployed VPN schemes, as well as the employed authentication models are examined. An analysis in terms of cost, complexity, and performance overhead that each method imposes to the underlying network architecture, as well as to the mobile devices is presented. The level of system reliability and scalability in granting security services is presented. The VPN management, usability, and trusted relations, as well as their behavior when a mobile user moves are analyzed. The use of special applications that require access to encapsulated data traffic is explored. Finally, an overall comparison of the proposed schemes from the security and operation point of view summarizes their relative performance. Christos Xenakis received his B.Sc. degree in computer science in 1993 and his M.Sc. degree in telecommunication and computer networks in 1996, both from the Department of Informatics and Telecommunications, University of Athens, Greece. In 2004 he received his Ph.D. from the University of Athens (Department of Informatics and Telecommunications). From 1998–2000 was with the Greek telecoms system development firm Teletel S.A., where was involved in the design and development of advanced telecommunications subsystems for ISDN, ATM, GSM, and GPRS. Since 1996 he has been a member of the Communication Networks Laboratory of the University of Athens. He has participated in numerous projects realized in the context of EU Programs (ACTS, ESPRIT, IST). His research interests are in the field of mobile/wireless networks, security and distributed network management. He is the author of over 15 papers in the above areas. Lazaros Merakos received the Diploma in electrical and mechanical engineering from the National Technical University of Athens, Greece, in 1978, and the M.S. and Ph.D. degrees in electrical engineering from the State University of New York, Buffalo, in 1981 and 1984, respectively. From 1983 to 1986, he was on the faculty of Electrical Engineering and Computer Science at the University of Connecticut, Storrs. From 1986 to 1994 he was on the faculty of the Electrical and Computer Engineering Department at Northeastern University, Boston, MA. During the period 1993–1994 he served as Director of the Communications and Digital Processing Research Center at Northeastern University. During the summers of 1990 and 1991, he was a Visiting Scientist at the IBM T. J. Watson Research Center, Yorktown Heights, NY. In 1994, he joined the faculty of the University of Athens, Athens, Greece, where he is presently a Professor in the Department of Informatics and Telecommunications, and Director of the Communication Networks Laboratory (UoA-CNL) and the Networks Operations and Management Center. His research interests are in the design and performance analysis of broadband networks, and wireless/mobile communication systems and services. He has authored more than 150 papers in the above areas. Since 1995, he is leading the research activities of UoA-CNL in the area of mobile communications, in the framework of the Advanced Communication Technologies & Services (ACTS) and Information Society Technologies (IST) programmes funded by the European Union (projects RAINBOW, Magic WAND, WINE, MOBIVAS, POLOS, ANWIRE). He is chairman of the board of the Greek Universities Network, the Greek Schools Network, and member of the board of the Greek Research Network. In 1994, he received the Guanella Award for the Best Paper presented at the International Zurich Seminar on Mobile Communications.  相似文献   

17.
介绍了基于CAN总线的车辆状态信息显示处理系统,分析了CAN.总线的特点及在汽车中使用CAN总线的优点,并给出了其在国内外汽车中的应用现状.首重介绍了系统的总体设计方案,系统的主节点、固定节点及活动节点的硬件组成和工作原理,以及大屏幕液晶显示器的特点及其在系统中的应用.  相似文献   

18.
5G传输网络承载方案分析   总被引:1,自引:1,他引:0       下载免费PDF全文
王丽莉  姚军 《电信科学》2019,35(7):145-151
5G时代3类典型场景的业务需求对承载网络在容量、时延和组网灵活性方面提出了更高的要求,同时针对无线网和核心网架构的变化提出了网络切片、增强路由转发功能等要求。首先分析5G的承载需求,重点考虑5G的3类典型业务场景、无线和核心网的架构变化;然后结合现网100GE PTN的实际应用情况,重点围绕容量、时延等维度完成需求与网络现状的对标;最后提出了网络回传、机房配套的演进方案。  相似文献   

19.
基于美国宇航用电感器和变压器发生失效的类型、原因、检测方法和发生频次的数据,总结了其失效特征,并给出了电感器和变压器在MIL-STD-981中各项试验重要性的认识。通过对美国和国内宇航用电感器和变压器由设计、生产产生的失效和实验中失效的对比分析。给出了此类元件的失效特征。依据国情,提出了如何通过制定标准和失效数据分析工作来提高国产宇航用电感器和变压器可靠性的建议。  相似文献   

20.
文中针对单相无刷直流电机结构设计及驱动方式展开研究,推导出电机理想工况下的基本方程,根据工程实际需求并结合无刷直流电机的设计原则确定该电机的设计方案。利用设计方案设计一台额定功率38 W,额定转速750 rpm的单相无刷直流电机,并分析了渐变气隙对电机起动性能和齿槽转矩的影响,确定了最优气隙长度。通过对比单极性绕组和双极性绕组形式的优缺点确定绕组形式,结合传统电机设计公式确定绕组匝数。文中利用有限元法初步验证了设计方案的合理性。根据电机动态数学模型在Simulink环境中搭建了电机系统的模型,仿真得到电机的转速、转矩变化曲线,结果与理论分析吻合良好,验证了电机设计方案的合理性和电机模型的有效性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号