期刊文献+

基于多功能车辆总线的动车组自动化调试系统的设计与实现 被引量:2

Design and Realization of the Automatic Test System for EMU Train Based on MVB DataFlow
下载PDF
导出
摘要 在动车组调试过程中,需要实时获取车辆状态数据,但由于车内系统接口的不完善,导致车辆状态数据获取困难,难以有效地辅助调试工作,为了使调试过程中车辆数据可以得到实时的采集与分析,并结合数据采集流程制定自动化调试流程,基于多功能车辆总线的自动化调试系统可以在实现调试流程标准化的前提下,实现系统与总线数据环路的实时交互,并在调试流程自动执行的过程中,实时获取并分析车辆状态,通过验证分析,该系统可以实现车内12个分系统将近200个状态参数的实时获取与分析,并提高车辆调试效率30%以上。 In the process of EMU train test,the real time data of train is needed,but because of the interface of the data system does not meet the demand,it is difficult for the test workers to get the feedback data while testing.In order to get the status data of the train and real-ize the automatic test system,By the method of automatic test solution based on the MVB data flow,the test system can extract the useful data from MVB data flow with the standard test process,after the analysis of the data,the technical status of the EMU train can be get ex-actly and rapidly,which can improve the quality and efficiency of the EMU train test.
出处 《计算机测量与控制》 2016年第6期147-151,177,共6页 Computer Measurement &Control
关键词 多功能车辆总线 自动化调试系统 数据交换 automatic test system data exchange
  • 相关文献

参考文献3

二级参考文献29

  • 1薛静,樊蓉,郑玉山.基于回归分析的网络性能管理[J].微电子学与计算机,2005,22(2):161-163. 被引量:6
  • 2Chakraborty R S,Paul S, Bhunia S. On demand transparency for improving hardware Trojan detectability[A]//Proceedings of IEEE International Workshop on Hardware-Oriented Security and Trust[C]. 2008 : 48-50.
  • 3Stefan D, Mitchell C, Almenar C G. Trojan Attacks for Compro- mising Cryptographic Security in FPGA Encryption Systems [EB/OL]. http://199.98. 20. 129/-stefan/projects/csave38/ csaw08 cooper_submission/cooper csaw08, pdf, 2008-09-27.
  • 4Wolff F, Papachristou C, Bhunia S, et al. Towards trojan-free trusted ics: problem analysis and detection scheme[A]//Pro- ceedings of Design Automation and Test in Europe[C]. 2008: 1362-1365.
  • 5Adamov A, Saprykin A, Melnik D, et al. The Problem of Hard-ware Trojans Detection in System-on-Chip[A]//Proceedings of CADSM' 2009[C]. Polyana-Svalyava UKRAINE, 2009 : 178-179.
  • 6Kash J A, Tsang J C, Knebel D R. Method and Apparatus tor Reverse Engineering Integrated Circuits by Monitoring Optical Emission[P]. United States Patent Number 6. 2002,022 B1 : 496.
  • 7Chipworks Inc. Semiconductor Manufacturing Reverse Engi- neering of Semiconductor components, parts and process[EB/ OL]. http://www, chipworks, com.
  • 8Abramovici M, Bradley P. Integrated Circuit Security: New Threats and Solutions[A]//Proceedings of 5th Ann. Workshop Cyber Security and Information Intelligence Research:Cyber Se- curity and Information Challenges and Strategies [C]. ACM Press, 2009 : 55.
  • 9Chakraborty R S, et al. MERO: A Statistical Approach for Hardware Trojan Detection[A]//Proceedings of Workshop on Cryptographic Hardware and Embedded Systems [C]. LNCS 5747,2009:396-410.
  • 10Agarwal D, Baktir S, Karakoyunlu D, et al. Trojan detection u- sing IC fingerprinting[C]//IEEE Symp. on Security and Privacy. 2007 : 20-23.

共引文献22

同被引文献14

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部