首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 515 毫秒
1.
介绍了基于VXI的通用红外成像导引头测控系统的软、硬件实现;该测试系统采用先进的虚拟仪器技术,系统硬件结构采用了先进的VXI体系结构,软件采用测控领域广为流行的LabVIEW图形化开发平台和模块化结构应用软件设计;并能充分利用流行的PC机软、硬件技术,使系统具有优良的性能和高可靠性;实验表明:该系统具有硬件可靠性高、扩充性强;软件为模块化结构、具有可移植性强等优点,整个系统具有一定的通用性,满足了用户对该测试系统的全部功能要求.  相似文献   

2.
基于LabVIEW的智能控制器自动测试系统的研制   总被引:3,自引:0,他引:3  
控制器是智能型万能式断路器的重要组成部件,需进行出厂检验合格后方能出厂。研究了采用计算机、数据采集卡等硬件和在LabVIEW虚拟仪器平台上开发的软件构成一套完整的、全自动的CW系列智能控制器测试系统,实现对控制器的保护动作特性、负载监控等功能进行自动检测。从硬件特别是软件功能方面对测试系统的实现方法及功能进行了详细的介绍。  相似文献   

3.
光纤数据通道以其高带宽、低延时、可靠性强等特点成为新一代航空电子系统的主干网络。FC协议分析仪是FC网络测试、仿真、故障诊断、协议验证的必要设备,作为其核心和基础的软件功能及架构将直接影响整个系统的性能及易用性。文中在对FC协议分析的基础上,结合FC分析仪硬件系统,提出了软件的功能与架构设计方案,重点阐述了追踪控制、性能监控、踪迹查看、专家系统功能软件的设计思路。该软件为用户提供了友好的交互界面,结合系统硬件可在线和离线测试、分析FC网络状态,满足了FC协议分析的功能及性能要求,为FC网络系统的开发提供了有力的支撑。  相似文献   

4.
光纤数据通道以其高带宽,低延时,可靠性强等特点成为新一代航空电子系统的主干网络。FC协议分析仪是FC网络测试、仿真、故障诊断、协议验证的必要设备,作为其核心和基础的软件功能及架构将直接影响整个系统的性能及易用性。本文在对FC协议分析的基础上,结合FC分析仪硬件系统,提出了软件的功能与架构设计方案,重点阐述了追踪控制、性能监控、踪迹查看、专家系统功能软件的设计思路。该软件为用户提供了友好的交互界面,结合系统硬件可在线和离线测试、分析FC网络状态,满足了FC协议分析的功能及性能要求,为FC网络系统的开发提供了有力的支撑。  相似文献   

5.
薛燕红 《传感器世界》2006,12(12):21-24
为提高应变计的检测精度和检测效率,本文介绍了如何利用微计算机的硬件和软件改造老式应变计检测系统,实现了应变计的性能检测、检测路数扩展和性能检测数据可视化等功能,并根据实际应用方面的需求,对程序进行了优化设计和改进,保证了应变计测试系统的功能实现和应用,以及探讨了应变计检测系统的精度提高方法.  相似文献   

6.
崔浩  汪激  刘寅 《微计算机信息》2007,23(29):206-207
针对某引进车型CAN总线轿车仪表,采用工控机、基于单片机的数据采集器等硬件,与VB6.0平台上开发的软件构成了一套完整的性能校验系统。经实际应用表明,该系统具有测试精度高、开发成本低、抗干扰能力强、检测效率高、操作简单等优点。从硬件和软件两方面对测试系统的实现方法及功能进行了详细的介绍。  相似文献   

7.
介绍了空调器焓差测试台计算机测控系统的硬件组成和结构.测控软件采用基于Delphi平台的多线程模式,并实现相应的功能.运行结果表明,检测系统的测试精度达到了国家标准的要求,测控软件的性能完善,工作可靠.  相似文献   

8.
郝贵欣 《测控技术》2011,30(6):102-106
针对航天发动机对其内部减压阀性能要求越来越高的现状,提出了以LabVIEW为平台的性能测试方案.首先简述了性能试验台的组成原理,然后说明了系统结构及硬件设计,最后重点阐述了软件功能及实现方法.该系统满足了不同型号减压阀在不同工作状态下的动态工作性能测试,并具有高实时性、高稳定性及良好的通用性等特点.  相似文献   

9.
《测控技术》2012,(8):98
海泰电子自主研发的电磁兼容自动测试通用软件平台(简称HTEMC-ATS),主要应用于军用设备级、系统级,以及民用工科医设备、信息技术设备、通信系统、集成电路和汽车设备等军民用产品的电磁兼容性测试。HTEMC-ATS具有测试项可扩展、硬件可互换、系统可配置、界面可视化、综合测试报表可自动生成等功能,操作方便、灵活。而且,该软件平台已通过西安软件评测中心的第三方软件测评,运行稳定、可靠。HTEMC-ATS功能强大,在测试项扩展方面:可根据用户测试需求扩展测试项,目前支持7大类39个测试项的扩展;在硬件可互换方面:支持基于功能的仪器互换,最大程度保护了用户的硬件投资。目前集成的仪器功能组件涵盖市场上主流的仪器型号,包括接收机、信  相似文献   

10.
塔顶放大器中嵌入式控制单元的设计与实现   总被引:3,自引:0,他引:3  
提出了遵循AISG2.0协议的塔顶放大器(TMA)嵌入式控制单元的设计及实现方法.给出了OOK电路、信号采集电路以及电源模块的硬件设计思路,该硬件设计符合AISG2.0协议在防雷、浪涌、OOK性能参数等方面的要求.软件部分阐述了AISG协议栈的设计、故障检测以及波特率自适应功能的实现.经测试证明,本系统的电气性能和软件...  相似文献   

11.
信息物理融合系统综合安全威胁与防御研究   总被引:10,自引:0,他引:10  
信息物理融合系统(Cyber-physical system,CPS)是计算单元与物理对象在网络空间中高度集成交互形成的智能系统.信息系统与物理系统的融合在提升系统性能的同时,信息系统的信息安全威胁(Security)与物理系统的工程安全问题(Safety)相互影响,产生了新的综合安全问题,引入严重的安全隐患.本文介绍了CPS的概念与安全现状,给出了CPS综合安全的定义;在对现有安全事件进行分析的基础上,提出了CPS的综合安全威胁模型;从时间关联性和空间关联性的角度,对现有CPS攻击和防御方法进行了分类和总结,并探讨CPS综合安全的研究方向.  相似文献   

12.
信息物理融合系统(cyber-physical systems, CPS)是集计算、通信和控制于一体的智能系统,实现网络和物理的深度协作和有机融合.目前CPS在关键的基础设施、政府机构等领域发挥着越来越重要的作用.由于物理限制,计算机和网络产生的安全漏洞会导致CPS遭受巨大的破坏,同时还会引起经济损失、社会动乱等连锁反应,所以研究CPS的安全问题对于确保系统安全运行具有重要意义.本文结合国内外的研究现状,概述了CPS安全控制和攻击检测的最新进展.首先本文总结了CPS典型的系统建模以满足对系统性能分析的需要.然后介绍了3种典型的网络攻击,即拒绝服务攻击、重放攻击和欺骗攻击.根据检测方法的类别,对CPS攻击检测的发展进行的概述.此外还讨论了系统的安全控制和状态估计.最后总结和展望了CPS网络安全面临的挑战和未来的研究方向.  相似文献   

13.
With the recent proliferation of different types of Cyber Physical Systems (CPS), it is critically important to investigate the predictability of such systems. Along with functional correctness of the components, these systems must also ensure that timing and delay constraints of components are properly for the entire system to behave in a predictable manner in presence of various kinds of uncertainties. While the functional correctness of the CPS components has been investigated in the past, very little is available about the timing issues. The objective of this paper is to conduct an investigation of key issues involved to ensure the predictability of the system, introduce rigorous definitions of performance parameters, and propose metrics for their evaluation and analyze their suitability to be used in the presence of uncertainties in which CPS operate. The results are expected to provide greater insight into the time critical behavior of CPS components.  相似文献   

14.
信息物理系统(CPS)是一个集成计算、通信和物理过程的混成系统,在智慧城市中占据至关重要的地位,其安全问题面临许多挑战.本文首先建立信息物理系统安全威胁分析模型,给出CPS各个组成部件的安全威胁,然后提出了信息物理系统的威胁关联分析方法,并以智能电网为例给出实验测试结果.结果表明,该方法能实现快速大规模安全威胁建模和自动化分析,为智慧城市中的关键信息基础设施提供技术支撑.最后,本文总结了智慧城市中信息物理系统的安全威胁研究进展和未来研究方向.  相似文献   

15.
时间Petri网在经典Petri网的基础上引入了时间因素,不仅能分析逻辑层次的系统性能,还能分析时间层次的系统性能,然而包含空间因素的信息物理融合系统(cyber-physical system,CPS)的产生需要对时间Petri网进行拓展。CPS集成计算系统和物理系统,不仅能够实时感知物理环境信息,并且能够通过物理实体改变物理环境。对CPS的物理层面特点进行了深入分析,研究了CPS物理实体的属性及其位置变迁过程,提出了一种CPS物理实体的形式化建模方法。在时间Petri网的基础上引入了空间因素,构造了时空Petri网模型,使其不仅能够描述物理实体逻辑及时间层次的行为,并且能够描述物理实体位置变迁所引起的状态变化。最后以机器人控制系统为例,进一步阐述了时空Petri网模型的有效性。  相似文献   

16.
Virtualization technology has the potential to notably advance the automation process in the domain of cyber-physical systems (CPS). It can improve both dependability and availability as well as significantly reduce the procurement, operation and maintenance costs of such systems. However, in the context of virtualization, research has put the most emphasis on topics of hardware utilization and fault-tolerance. There is little literature on how to model, integrate and consolidate a CPS by means of virtualization. In this paper we present a methodology for planning safe and efficient virtualized cyber-physical compute and control clusters – execution platforms for time-constrained virtual machines (VMs) that encapsulate CPS applications. We discuss the used methods, describe the corresponding models and the required system architecture. In contrast to typical resource allocation problems from other domains (e.g. cloud computing), in this case, the planning process must take real-time requirements of applications into account. In order to achieve this, we combine evolutionary algorithms with formal system performance analysis – in particular algorithms considered in classical scheduling theory. Such an approach allows not only to optimally dimension the compute and control clusters, but also provides strict guarantees regarding the timing predictability of the integrated CPS. Further, the embedment of a formal performance analysis technique notably eases the modeling of a system. As a consequence, the modeling process is fast, flexible and accessible not only to experts but also to system designers as they do not have to struggle with complex and time consuming mathematical formulations. Finally, our approach also provides answers to several practical questions that arise when integrating a CPS by means of virtualization.  相似文献   

17.
针对在特殊地区连续导航和组合导航冗余技术的问题,提出基于信息物理融合系统架构的BDS/GPS/SINS组合导航的旋翼无人机定位方案。以六旋翼为运载体,采用超紧组合导航结构和联邦式滤波结构建立模型,通过Simulink虚拟定位仿真,得到较为精确的位置信息。进一步搭建旋翼无人机物理融合定位系统实验平台,该平台的BDS/GPS接收机接收由NSS8000多星群模拟器提供的虚拟卫星导航电文信号,方便用户对CPS虚拟和现实环境的人机交互界面进行操作。通过定位信息融合进行基于BDS/GPS/SINS超紧组合导航的室内飞行实验,失星下定位精度都能达到2.0?m±0.5?m。仿真和实验结果表明,该定位系统具有信息物理融合的鲁棒性和安全可靠性。  相似文献   

18.
Recently, with the growth of cyber physical systems (CPS), several applications have begun to deploy in the CPS for connecting the cyber space with the physical scale effectively. Besides, the cloud computing (CC) enabled CPS offers huge processing and storage resources for CPS that finds helpful for a range of application areas. At the same time, with the massive development of applications that exist in the CPS environment, the energy utilization of the cloud enabled CPS has gained significant interest. For improving the energy effectiveness of the CC platform, virtualization technologies have been employed for resource management and the applications are executed via virtual machines (VMs). Since effective scheduling of resources acts as an important role in the design of cloud enabled CPS, this paper focuses on the design of chaotic sandpiper optimization based VM scheduling (CSPO-VMS) technique for energy efficient CPS. The CSPO-VMS technique is utilized for searching for the optimum VM migration solution and it helps to choose an effective scheduling strategy. The CSPO algorithm integrates the concepts of traditional SPO algorithm with the chaos theory, which substitutes the main parameter and combines it with the chaos. In order to improve the process of determining the global optimum solutions and convergence rate of the SPO algorithm, the chaotic concept is included in the SPO algorithm. The CSPO-VMS technique also derives a fitness function to choose optimal scheduling strategy in the CPS environment. In order to demonstrate the enhanced performance of the CSPO-VMS technique, a wide range of simulations were carried out and the results are examined under varying aspects. The simulation results ensured the improved performance of the CSPO-VMS technique over the recent methods interms of different measures.  相似文献   

19.
With the booming of cyber attacks and cyber criminals against cyber-physical systems(CPSs),detecting these attacks remains challenging.It might be the worst of times,but it might be the best of times because of opportunities brought by machine learning(ML),in particular deep learning(DL).In general,DL delivers superior performance to ML because of its layered setting and its effective algorithm for extract useful information from training data.DL models are adopted quickly to cyber attacks against CPS systems.In this survey,a holistic view of recently proposed DL solutions is provided to cyber attack detection in the CPS context.A six-step DL driven methodology is provided to summarize and analyze the surveyed literature for applying DL methods to detect cyber attacks against CPS systems.The methodology includes CPS scenario analysis,cyber attack identification,ML problem formulation,DL model customization,data acquisition for training,and performance evaluation.The reviewed works indicate great potential to detect cyber attacks against CPS through DL modules.Moreover,excellent performance is achieved partly because of several highquality datasets that are readily available for public use.Furthermore,challenges,opportunities,and research trends are pointed out for future research.  相似文献   

20.
Recent years have witnessed increasing cyber and physical attacks against encrypted cyber‐physical system (CPS) and the ensuing catastrophic consequences. A modified security signaling game (MSSG) model is proposed for capturing attack‐defense interactions and analyzing the cross‐layer security of encrypted CPS. Cyber real‐time performance and physical control performance are both considered in cross‐layer utility function. Theorems concerning the existence of pure‐strategy and mixed‐strategy perfect Bayesian Nash equilibrium (PBNE) are provided, based on which a cross‐layer security design algorithm is proposed for defender's optimal strategy against potential attacks. A numerical case is studied with the effectiveness of our method being proved.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号