摘要 :
The electronic module is the core component of the radar. The Shell of an Digital Array Module is the carrier to realize high precision interconnection of telecommunication. With the integration of electronic components level gett...
展开
The electronic module is the core component of the radar. The Shell of an Digital Array Module is the carrier to realize high precision interconnection of telecommunication. With the integration of electronic components level getting higher, the thermal dissipation of the digital array module will reach kilowatt level and the limiting heat flux may exceed 500 W/cm~2. Therefore, the high heat flux cooling technology is urgently needed to reduce the module ambient temperature. In this paper, the structural features and processing requirements of the electric module shell were carefully analyzed. And, the key technique of the micro channel forming was systematically studied. Simultaneously, the integration manufacturing and the true application results were introduced in detail. The electronic module realized enhanced heat dissipation through micro channel supplied liquid by the main channel. So, the channels forming scheme were designed and machined to meet the needs of thermal control. The high speed cutting method was determined through detailed process design, anti-deformation clamping and machining design to achieve high accurate requirement. The electronic module manufactured according to the proposed technological method, process control and key technical points exhibit well properties in terms of accuracy, thin-wall, large size and rigidity. These properties have been verified through coordinate measurement, nondestructive testing of welding surface, the pressure test of the micro channels, electronic device assembling and electrical measurement. The first batch of 56 samples assembling in products exhibited excellent performance which was reflected by the stability of the equipment function.
收起
摘要 :
The new network based on software-defined network SDN and network function virtualization NFV will replace the traditional network, so it is urgent to study the network security architecture based on the new network environment. T...
展开
The new network based on software-defined network SDN and network function virtualization NFV will replace the traditional network, so it is urgent to study the network security architecture based on the new network environment. This paper presents a software - defined security SDS architecture. It is open and universal. It provides an open interface for security services, security devices, and security management. It enables different network security vendors to deploy security products and security solutions. It can realize the deployment, arrangement and customization of virtual security function VSFs. It implements fine-grained data flow control and security policy management. The author analyzes the different types of attacks that different parts of the system are vulnerable to. The defender can disable the network attacks by changing the server-side security configuration scheme. The future research direction of network security is put forward.
收起
摘要 :
The new network based on software-defined network SDN and network function virtualization NFV will replace the traditional network, so it is urgent to study the network security architecture based on the new network environment. T...
展开
The new network based on software-defined network SDN and network function virtualization NFV will replace the traditional network, so it is urgent to study the network security architecture based on the new network environment. This paper presents a software - defined security SDS architecture. It is open and universal. It provides an open interface for security services, security devices, and security management. It enables different network security vendors to deploy security products and security solutions. It can realize the deployment, arrangement and customization of virtual security function VSFs. It implements fine-grained data flow control and security policy management. The author analyzes the different types of attacks that different parts of the system are vulnerable to. The defender can disable the network attacks by changing the server-side security configuration scheme. The future research direction of network security is put forward.
收起
摘要 :
Most of vehicle monitoring systems based on GPS and GIS technologies use SMS as their communicating means. SMS didn't have private channel and is difficult to extend to suit other data business, could not afford stable communicati...
展开
Most of vehicle monitoring systems based on GPS and GIS technologies use SMS as their communicating means. SMS didn't have private channel and is difficult to extend to suit other data business, could not afford stable communicating in those systems in some special situations. Contrasting with SMS, GPRS is cheap, real time and is more stable, and more suitable for those systems. A vehicle monitoring system that using GPRS and GIS is introduced, including the architecture, design, and the implementing of software is emphasized, also.
收起
摘要 :
Most of vehicle monitoring systems based on GPS and GIS technologies use SMS as their communicating means. SMS didn't have private channel and is difficult to extend to suit other data business, could not afford stable communicati...
展开
Most of vehicle monitoring systems based on GPS and GIS technologies use SMS as their communicating means. SMS didn't have private channel and is difficult to extend to suit other data business, could not afford stable communicating in those systems in some special situations. Contrasting with SMS, GPRS is cheap, real time and is more stable, and more suitable for those systems. A vehicle monitoring system that using GPRS and GIS is introduced, including the architecture, design, and the implementing of software is emphasized, also.
收起
摘要 :
Nowadays most ad hoc mobile devices heavily depend on the performance of batteries. Optimizing the power consumption is a very crucial issue. To maximize the lifetime of mobile ad hoc network,the power consumption rate of each nod...
展开
Nowadays most ad hoc mobile devices heavily depend on the performance of batteries. Optimizing the power consumption is a very crucial issue. To maximize the lifetime of mobile ad hoc network,the power consumption rate of each node must be evenly distributed. In this paper we present a novel power-aware routing algorithm based on mobile agents to deal with the routing mechanism in the energy-critical environments. A few mobile agents move in the network and communicate with each node. They collect the network information to build the global information matrix of nodes. The routing algorithm chooses a shortest path if all nodes in all possible routes have sufficient battery capacity.When the battery capacity of some nodes cannot meet a predefined threshold,the corresponding routing schema through these nodes will be ignored.Additionally,we compare the performance of different types of power-relation routing algorithms in simulation environment. The results show that the network has better energy consumption balance with the less network traffic and the better load balancing.Furthermore,this approach has better robustness to ensure the survivability of Ad Hoc network.
收起
摘要 :
According to the problem on calculating the synthetic exponent characterizing the whole performance of radar engine by using the synthetic weighted method, the weights of every parameter are difficult to be determined. To solve th...
展开
According to the problem on calculating the synthetic exponent characterizing the whole performance of radar engine by using the synthetic weighted method, the weights of every parameter are difficult to be determined. To solve this problem, a method of determining the weights of every parameter by adaptive genetic algorithm is presented. The synthetic exponent gained by AGA is more sensitive and exact than the one gained by the expert investigated method in reflecting the whole performance of the engines. Mean while, this method improves the rate of identifying whether the performance of the engine is normal or not, finds the potential forepart fault of engine and prevents the spread of the fault. The validity of the method is testified by monitoring certain type of turbine-fan engine. The adaptive crossover probability and adaptive mutation probability are proposed, which consider the influence of every generation to algorithm and the effect of different individual fitness in every generation.
收起
摘要 :
According to the problem on calculating the synthetic exponent characterizing the whole performance of radar engine by using the synthetic weighted method, the weights of every parameter are difficult to be determined. To solve th...
展开
According to the problem on calculating the synthetic exponent characterizing the whole performance of radar engine by using the synthetic weighted method, the weights of every parameter are difficult to be determined. To solve this problem, a method of determining the weights of every parameter by adaptive genetic algorithm is presented. The synthetic exponent gained by AGA is more sensitive and exact than the one gained by the expert investigated method in reflecting the whole performance of the engines. Mean while, this method improves the rate of identifying whether the performance of the engine is normal or not, finds the potential forepart fault of engine and prevents the spread of the fault. The validity of the method is testified by monitoring certain type of turbine-fan engine. The adaptive crossover probability and adaptive mutation probability are proposed, which consider the influence of every generation to algorithm and the effect of different individual fitness in every generation.
收起
摘要 :
According to the problem on calculating the synthetic exponent characterizing the whole performance of radar engine by using the synthetic weighted method, the weights of every parameter are difficult to be determined. To solve th...
展开
According to the problem on calculating the synthetic exponent characterizing the whole performance of radar engine by using the synthetic weighted method, the weights of every parameter are difficult to be determined. To solve this problem, a method of determining the weights of every parameter by adaptive genetic algorithm is presented. The synthetic exponent gained by AGA is more sensitive and exact than the one gained by the expert investigated method in reflecting the whole performance of the engines. Mean while, this method improves the rate of identifying whether the performance of the engine is normal or not, finds the potential forepart fault of engine and prevents the spread of the fault. The validity of the method is testified by monitoring certain type of turbine-fan engine. The adaptive crossover probability and adaptive mutation probability are proposed, which consider the influence of every generation to algorithm and the effect of different individual fitness in every generation.
收起
摘要 :
Automation of skill fuzzy control system is an important research aspect of fuzzy control fields. It's significant for those control instances consisted in production and people's daily life. But, how to control a system not movem...
展开
Automation of skill fuzzy control system is an important research aspect of fuzzy control fields. It's significant for those control instances consisted in production and people's daily life. But, how to control a system not movement or behavior rules but only relied on movement parameters, that problem still had not be resolved. This paper proposes a new method used a genetic algorithm based on immune mechanism to learn the degree of membership, at same time, simplifying the corresponding movement equation. its efficiency will be indicated by an example.
收起