首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
首都机场航站区地面信息管理系统是航站区各电子系统的核心。系统建有强大的中心数据库,负责采集、处理、存储、发布航站区内航班信息、地面站坪、气象、设备运行状态、商务的客、货、邮、行等等大量信息。通过计算机网络把相关的电子系统联网实现系统集成。  相似文献   

2.
In the summer of 2000, the National Safe Skies Alliance awarded a project to the Applied Visualization Center at the University of Tennessee to develop a 3D computer tool to assist the US Federal Aviation Administration security group, now the Transportation Security Administration, in evaluating new equipment and procedures to improve airport checkpoint security. At the time of this writing, numerous detection equipment models, three specific airports, and a placement and passenger flow simulation tool for airport security planners have been developed. Similar tools have been constructed for simulating cargo/baggage inspection and other airport security operations. An extension of the original effort to consolidate the tools is currently underway.  相似文献   

3.
飞机配载方法的数学分析   总被引:1,自引:0,他引:1  
飞机配载常用的方法是平衡图表法,亦即每一种机型需要专门的平衡图表。利用旅客、行李、邮件和货物等参数,用数学方法来分析飞机的平衡,从而帮助配载人员从本质上去理解平衡图表,实现对旅客、行李、邮件和货物的合理配载。  相似文献   

4.
A number of advancements for X-ray inspection systems have recently been implemented in the image presented to the operator. Advances in the use of color and image fusion techniques have been developed to maximize the information available in the initial view shown on the monitor. Different techniques are appropriate depending upon the size of the inspection item. Inspection of checked and carry-on baggage requires imaging methods that would not be appropriate for use on larger, more complex objects such as cargo containers or whole trucks. Color-coded presentation of CT images of baggage imposes yet other demands. Comparative images and analyses are presented to support choices for imaging on L-3 Communications systems in terms of the conflicting requirements of cost, sensitivity, resolution, and penetration. A number of enhancements are available to the operator and their influence on system performance is explored. Some experimental enhancements are demonstrated and their trade-offs discussed. The imaging system is ultimately based on hardware, and the choice of detectors, amplifiers, and sampling methods plays an important role in overall performance. Image degradation can be caused by deficiencies in the imaging hardware. Effects such as detector cross-talk and afterglow will negatively impact system performance. Recognition of these factors and steps to mitigate them are discussed. The effect of X-ray source choices such as beam voltage, milliamps, and sampling rate has a direct influence on the image quality and bag dose. Results of theoretical modeling as well as results on actual systems are presented. For a given bag dose, the trade-off between sensitivity, resolution, and penetration are considered. Possibilities for future advancements in imaging for X-ray inspection systems are explored.  相似文献   

5.
Secure communication of data over public channels is one of the most important challenges. Both the activities to secure contents and to break security are very hot. In order to reduce the chances of attack, security needs to be made invisible. The needs to preserve originality, ownership information, and integrity of text documents in a way that cannot be identified by everyone is being felt badly. Watermarking of the documents is a step toward achieving these objectives. However, to watermark a plain text document (ASCII) in a way that the original text will not change (and it would be very difficult to break it), is a great challenge. We have developed a novel encoding scheme which can be used to insert information in plain text without changing the text. A system has been developed based upon this encoding scheme. This paper describes the system and demonstrates its workings  相似文献   

6.
Security requirements and capabilities have changed dramatically over the past fifty years. Personal identification and detection of illegal substances including explosives have come to the forefront. With the proliferation of computers the security of information has also become a major concern. Substantial advances have been made over the last three decades in entry control, counter-terrorism, cryptology and airport protection. The utilization of technology has become an irreversible trend. Electronic devices and systems are capable of automatically and tirelessly monitoring and reporting breaches of security. For example, airport security began with physical protection of the facility with fences and area surveillance. The most recent concern is detecting explosives in both checked and early-on baggage, Other techniques relate to monitoring passengers for weapons as they transit the terminal building, especially crowds gathered at the metal detectors and X-ray machines. The application of electronics has produced reliability improvements and cost savings in systems that protect against unauthorized entry and numerous other threats. PCs have become the heart of security command and control systems. Most PC platforms rely on the proven software stability of Windows NT and present data in human-friendly, graphic format. It is expected that in the near future security monitoring will be consolidated in a central location, possibly to be integrated with other command and control functions  相似文献   

7.
The state-of-the-art transportation management system integrates automatic vehicle location, in-vehicle systems, customer information networks, and management information systems. As advanced technologies are integrated into transportation systems, the transit system becomes more efficient and reliable, which, in turn, makes it more attractive to users. The greatest benefit will not be realized until all of these technologies are integrated. Transit agencies and system integrators who take a total systems approach to the integration of advanced technologies will have a competitive advantage. They will provide services which provide the greatest utility to prospective users, riders, and the transit agency at the lowest cost  相似文献   

8.
The 21st Century Aviation System can reduce the cost of flying, while substantially increasing the safety and security of cargo and carrier aircraft with an onboard pilot/s and a remote copilot residing in a secure ground-based simulator.  相似文献   

9.
存储在数据库中的数据必须具有安全保证.为此,DBMS提供了安全管理技术.安全性策略是DBMS实现安全管理的基本技术.文章较详细地介绍了Oracle 9i数据库管理系统的安全管理技术中的安全性策略.这些策略涉及系统安全性策略、数据安全性策略和用户安全性策略.进一步地介绍了数据库验证、外部验证、企业验证和并发许可等用户验证和许可限制.上述安全技术构成了Oracle 9i数据库安全管理技术的基础,也是DBA必须掌握的基本技术.文章最后给出Oracle 9i安全策略的优点.  相似文献   

10.
5级安检系统是机场安检、行李(自动)分拣系统中的重要组成部分,其应用大大提高了机场安全保障系数和行李分拣系统的处理效率。本研究简要介绍了5级安检系统,应用Flexsim软件对该系统进行仿真建模和结果分析。该系统可形象地展示系统各个环节之间的关系,并能直观而迅速地找到系统中的影响因素和瓶颈位置。  相似文献   

11.
综合化航空电子系统可信软件技术   总被引:5,自引:3,他引:2  
航空电子系统要求航空任务的执行具有确定性、可预测和可控性。深入分析综合化航空电子系统软件安全性、可靠性、完整性和实时性需求,提出了综合化航空电子系统软件可信性的定义。首次将可信计算引入到综合化航空电子系统中,建立综合化航空电子系统可信软件体系结构,在此基础上,提出软件可信运行环境构建方法和可靠性增强技术。这些技术能够保障综合化航空电子系统的可预测性,对保证飞机任务的执行及其安全具有重要的作用,为研制适合于中国大飞机的综合化航空电子系统可信软件奠定基础。  相似文献   

12.
为了确保油气运输管线的安全运行,全方位进行测量和监控并保证监控数据的有效传输是非常重要的一种措施.随着国内油气运输管道数量的增多、管龄年限的增长,以及人为破坏和自然灾害等因素的发生,油气运输管道存在巨大的安全风险隐患.基于我国自行研制开发的北斗卫星导航系统,使用北斗短报文、定位和授时等服务功能,结合现有的管线检测和巡检技术,设计提供一套更安全、可靠的管道测量监控及数据传输系统,有效保障国内油气管道的正常运行.  相似文献   

13.
大型民用飞机货舱哈龙替代品抑制及灭火系统研究   总被引:1,自引:1,他引:0       下载免费PDF全文
基于美国联邦航空局休斯研究中心环保型飞机货舱哈龙替代品抑制及灭火的研究,阐释了飞机货舱哈龙替代品抑制及灭火系统最低性能标准,总结了氮气、气溶胶、细水雾等三种机载灭火系统最新研究成果,剖析了大型民用飞机货舱哈龙替代品抑制及灭火系统的最新发展趋势,分析了三种哈龙替代品抑制及灭火系统用于飞机货舱的可行性,旨在为我国大型民用飞机货舱哈龙替代品抑制及灭火系统研究提供工程技术参考。  相似文献   

14.
量子保密通信是近年来逐渐发展成熟的一种新型保密通信机制,其安全性建立在量子力学基本原理上,被证明具有信息论条件下的绝对安全性。偏振编码光纤量子保密通信系统使用光子的偏振态进行信息编码。当环境变化时,光纤传输特性的改变将导致光子偏振态变化。因此,光子偏振态的补偿控制是光纤量子保密通信系统的一项关键技术,能否快速、准确的对偏振态进行补偿将直接影响系统的通信性能。本文提出一种基于光纤偏振控制器和扫描控制算法的偏振补偿方案。该方案通过控制光纤偏振控制器的电压大小,将量子误码率最小化,实现偏振光的补偿控制,满足量子通信系统自动控制的要求。  相似文献   

15.
随着航天技术的发展,各种卫星如综合侦察卫星、气象与海洋监视卫星、数据与中继卫星等,其数据的信息速率存储、处理的数据量越来越大,对卫星测控应用中心大容量、高速率数据的安全性、可靠性要求也越来越高。在自然灾害,如地震、洪水;人为破坏,如恐怖活动、战争等条件下,确保卫星测控应用中心的安全与快速恢复能力,将非常重要。本文从原理上设计了一套远程数据容灾系统方案,以保证卫星测控应用中心在自然灾害或人为破坏后能够快速恢复其基本功能。分析表明,该方案具有很好的可靠性、安全性。  相似文献   

16.
罗其俊  曹志芬  牛国臣 《航空学报》2020,41(z2):724333-724333
在自助行李托运系统拍摄的行李图像库中检索错误运输的行李时,图像背景会严重影响检索精度。针对该问题提出了一种加强模糊聚类算法(EnFCM)的超像素分割方法,实现了行李目标区域的提取。通过多尺度形态学重建梯度图像,设计了自适应上限尺度的分水岭超像素预分割算法,得到多个独立的超像素区域。对超像素图像进行直方图统计,并结合分水岭分割参数和实际行李图像内容的类别数量进行超像素的加强模糊聚类,得到行李区域。通过多个实际行李图像的分割实验验证了算法的有效性,平均分割精度达到93%,超过多个典型的分割算法。  相似文献   

17.
刘东  吴家仁  周一舟  刘振祥  李瑜  王铭泽 《航空学报》2021,42(8):525802-525802
随着舰载机批量服役,中国突破了舰载机研制关键技术,但由于舰载机机型种类多,保障工作复杂且强度大,加之舰基空间及资源有限、保障压力大,舰载机面临着舰面保障规模大等难题,为此开展了舰载机多机种综合保障技术实践。本文较为全面地总结了舰载机研制采用的保障一体化论证方法、基于模型的可靠性/安全性分析方法、面向机舰适配维修性设计、腐蚀防护与控制、岸舰一体通用化保障系统研制等工程实践做法。结合对新作战概念、保障发展需求研究,展望了新一代舰载机保障模式,提出了一种从"保障战斗力"跨越到"释放战斗力"的新保障概念和保障模式。  相似文献   

18.
19.
曹宗杰  鲍海利  韩丰波 《飞机设计》2011,31(5):26-31,35
运输机在使用过程中,货物的装载方案是一个必须解决好的实际问题。货舱内货物质量与安放位置等会发生变化,货物质量分布对机体结构振动特性影响较大,不同的装载方案对飞机的动态特性影响不同。本文从运输机使用安全角度出发,基于结构动力学对不同装载条件下运输机振动特性进行了分析,最后以某航空兵团空运转场过程中不同装载方案为例,讨论了...  相似文献   

20.
空间网络安全的研究是天地一体化网络研究的重要组成部分,日益受到研究人员的重视。本文根据空间网络面临的安全威胁,分析需要采用的安全机制,构建了空间网络的安全体系结构。深入分析基于身份的密码体制(IBC),在空间网络中应用IBC提供安全服务框架,以此为基础,提出了一种密钥交换协议,并详细描述了安全通信的建立过程。分析表明,同传统的基于公钥基础设施(PKI)体制的安全解决方案相比,IBC具有较低的存储、通信和计算开销,是适合空间网络的有效安全方案。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号