首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 125 毫秒
1.
舰艇编队导弹航路规划仿真系统设计与实现   总被引:1,自引:0,他引:1       下载免费PDF全文
通过分析火力分配、区域划分、航路规划三者的关系,提出了舰艇编队导弹航路规划三位一体战术决策的思想.设计了一个以此为背景,基于高层体系结构(HLA)的可扩展、开放式仿真体系结构.依据HLA/RTI规范,设计开发了仿真联邦的联邦/仿真对象模型.基于系统的离散事件仿真特征,采用事件调度的仿真策略,利用Petri网建立了系统的...  相似文献   

2.
为实现以数据为中心的体系结构开发策略,更好地支持面向不同目的、不同层级决策者需求的体系结构描述开发,增强体系结构描述的灵活性、可演化性,提出了基于元模型的体系结构表现方法,将体系结构描述的视图分为传统的多视图产品和定制模型两类,分析了不同系统参与者对于体系结构描述的需求,并研究了多种体系结构数据的表现技术如定制建模方法、信息板方法及产品合成方法等,为支持多样化的体系结构决策提供了良好的基础.  相似文献   

3.
Ad hoc网络具有无中心、无基础设施等特点,其安全面临严峻挑战。对Ad hoc网络安全进行评估,可为其安全性能提升与走向实际应用提供参考。对Ad hoc网络安全进行分析,提出了基于模糊Petri网的评估模型。通过引入变迁阈值和变迁支持度的策略,可自动灵活调整指标权重与指标体系结构,提高评估模型的准确度、灵敏度和适应性;充分利用Petri网和矩阵并行运算特点,给出了模糊规则的推理算法,提高了计算速度。  相似文献   

4.
军事信息系统体系结构框架制定方法   总被引:1,自引:0,他引:1  
体系结构框架是开发体系结构的前提条件,研究、制定体系结构框架是军事信息系统体系结构技术研究的首要内容.通过总结体系结构框架的制定目的,分析现有的体系结构框架,研究IEEE标准1471-2000中建立的体系结构描述概念模型,提出了军事信息系统体系结构框架的制定方法论.基于该方法论,探讨了军事信息系统体系结构框架的制定过程...  相似文献   

5.
立足现有对高超防御的设想和未来高超防御能力的预期发展,基于美国DoDAF 2.02版体系结构框架,从作战装备能力、作战过程和任务需求出发,遵循"顶层概念设计—作战详细过程—信息流向映射"的建模思路,构建了高超防御体系结构模型,对高超防御作战体系进行了研究,为高超防御体系的顶层设计和需求分析提供了一定参考.  相似文献   

6.
为了实现不同体系结构框架方法论及体系结构工具下所开发体系结构的可理解、可比较、可交换,促进体系结构数据的共享和重用,提出了基于元模型的军事信息系统体系结构建模方法;以模型驱动体系结构(MDA)思想为基础,研究了体系结构元模型到支持体系结构建模语言的转换方法;设计了元模型规范下的体系结构建模的实现方法;以作战规则模型(OV - 6a)的IDEF0建模为例分析了转换方法所涉及核心规则的具体实现,说明了该方法的可行性和有效性.  相似文献   

7.
国际安全环境发生重大变化的新形势下,城市涉恐安全面临严峻挑战。基于风险理论,构建了城市目标遭受恐怖袭击风险描述和安防策略优化函数,提出了定量的城市目标反恐安防策略优化方法。并以某高铁站为例,通过模型分析、数据比较和优化反馈,获得其遭受恐怖袭击风险评估、现有安防措施有效性和策略优化结论,验证了方法的有效性,为解决城市涉恐安全问题提供决策和技术支撑。  相似文献   

8.
基于元模型的体系结构设计思想和基于可执行模型的评估方法是体系结构领域研究的两个热点,但当前的研究没有将两者结合起来。文章基于DoDAF2.0提出的元模型数据(Meta-Model Data,DM2),将元模型的思想和基于可执行模型的评估方法相结合,分析了基于DM2的逻辑数据与可执行模型各构建要素的对应关系,构建了基于DM2的逻辑数据模型直接转可执行模型的过程框架,重点研究了如何直接从体系结构底层数据转可执行模型的方法,从而为进行基于元模型的体系结构可执行评估提供模型基础,也为进一步实现体系结构自动化验证评估提供技术支持。实例验证了文章提出的方法。  相似文献   

9.
本文首先分析了有关数据库安全所需要解决的几个问题,并基于 discretion 和mandatory 存取策略,以及完整性和数据库加密策略,提出了一个较完整的数据库系统的安全模型。  相似文献   

10.
可执行体系结构研究   总被引:7,自引:1,他引:6       下载免费PDF全文
体系结构是系统设计与实施的蓝图,它能否正确、合理地指导实践在很大程度上依赖于体系结构的验证与评估.可执行体系结构研究为体系结构验证与评估开辟了新的途径.为了使各体系结构产品在整体上形成一个执行体,提出了可执行体系结构执行规则描述这一个概念.执行规则描述体系结构产品的执行、调用与数据流关系,为体系结构的执行提供了特定的背景信息.它通过标准的动态可执行模型接口分别调用该模型的执行引擎,从而达到体系结构在整体上执行的目的.体系结构的正确执行为体系结构验证提供依据,同时其运行结果为体系结构的评估提供依据.  相似文献   

11.
设计安全策略模型时应考虑安全策略的时序特性和灰色特性,还应综合考虑保密性、完整性和可用性三方面的需求。已有的安全模型没有描述时序性和灰色特性,而且一般只侧重描述保密性或完整性。为此,本文提出了动态灰色时序系统(简称DGTS)。本文详细描述了DGTS,以及基于DGTS的动态语义设计的灰色时序安全策略规范语言GTSL。  相似文献   

12.
Why did the Palestinian Authority established in 1994 create 12 security forces when Eritrea, which achieved independence in 1994, made do with one conventional army? This article attempts to explain the variation in the structure of national security systems in Third World states as a function of two basic factors: the state's political and social heterogeneity and the state's relative importance to US foreign policy and security concerns. Authoritarian one-party and centralizing states tend to fragment their security forces more than states that cultivate social or political pluralism. Fragmentation is a classic exercise of divide and rule. But a tradeoff exists between fragmentation and assuring internal security on the one hand, and ensuring offensive capabilities to ward off external enemies, on the other. Hence the importance of a strong foreign ally – preferably the United States. According to this model, centralized homogenous states enjoying US protection will tend to fragment or bifurcate their security systems most.  相似文献   

13.

Perceptions of Third World nations as susceptible to communist subversion and revolutionary warfare led the Eisenhower administration to formulate a coordinated internal security strategy known simply as ‘1290d’. Later renamed the Overseas Internal Security Program (OISP), this policy initiative sought to strengthen host‐nation security forces, judicial systems, and public information media in an effort to combat indirect communist intervention strategies. Implementing OISP policy in Latin America proved difficult. In Congress, the administration was criticised for colluding with dictatorial regimes, while Latin Americans feared that the new program would be used as a ‘Trojan Horse’ to penetrate their security structures. After the Cuban Revolution, however, OISP policies developed under Eisenhower came to dominate US‐Latin American security relations for the remainder of the Cold War.  相似文献   

14.
In the ten years since the establishment of South Africa's first inclusive democratic government, an ambitious, extensive and systematic process of reform has been carried out in the governance of security. The process is widely regarded as having been successful and a model for other processes of ‘security sector reform’ in the context of transitions from authoritarian forms of governance to democratic ones.

That this been achieved with hardly a shot fired in anger is a remarkable achievement and a credit to visionary political leadership as well as organisational capacity, in other words to effective security governance.

At the same time, progress has been uneven and sometimes fragmentary, policy intentions and commitments have not always been translated into practice, the end results have not been to everyone's liking, and transformation has engendered its own pathologies. Thus several challenges remain in improving security governance.

This article provides a broad overview of the roles played by the various actors in the governance of the security sector, including the executive, parliament and civil society. It examines the main policy frameworks and touches on organisational transformation, because it is impossible to deal with governance in isolation from these issues. Policy processes and the frameworks they give rise to—in particular—are critical for effective governance. This article deals with the defence, safety and security and intelligence fields. A comprehensive overview would need to include the governance of criminal justice and foreign policy. The article does not seek to make an overall evaluation of governance, but to identify achievements, shortfalls and challenges.  相似文献   

15.
This paper analyses public policy choices in the security economy from an economic perspective. It discusses the role of public goods for national and global security and identifies the importance of the first‐ and second‐order indirect effects of insecurity on economic activity, which include the behavioural responses of agents and the government to security measures, akin to such effects in insurance economics. Furthermore, key public policy trade‐offs are outlined, in particular between security and efficiency, globalisation, equity and freedom. The analysis identifies suitable policy options for raising security in the national and international contexts and in view of these trade‐offs. A balance between market and non‐market instruments in achieving security should be aimed for in order to minimise the adverse effects of aiming for higher security. In addition, the public good nature of security implies that international coordination of security policies is important, despite this process being fraught with enforcement problems.  相似文献   

16.
In the past, national security for the majority of countries was almost exclusively associated with an external military threat emanating from a rival state(s). This was reflected in the standard models for the demand for military expenditure. The emergence of new security challenges such as terrorism, transnational crime networks, failed and rogue states, has profoundly affected the international security environment and the concept of national security. This note develops a model for the demand for national security expenditure adopting a broader, more inclusive definition of national security and includes concomitant budgetary outlets to meet the new security challenges.  相似文献   

17.
在分析基于格理论的信息流控制军用安全模型在实际应用中存在的不足的基础上,从安全类定义和信息流控制策略两个方面对原模型进行了理论扩展和安全性分析.扩展模型安全类在作为对象和主体时具有相同的表达方式,以及在保持原模型信息流关系情况下,允许同职权等级用户交流他们共知的信息,以及高职权等级用户访问低职权等级用户他们之间共知的信息.以数字文档安全管理系统为例对扩展模型应用进行了描述.实例表明扩展模型更适合实际系统对信息流控制的要求.  相似文献   

18.
Domestic factors play an important role in the formulation and evolution of a country's foreign and security policy. This is clearly seen in the case study of a Soviet successor state, Ukraine. The article brings together in seven sections theory with the key domestic factors that influence Ukrainian security policy, such as economics, energy, national identity, elites and political parties. The article provides an insight into how these domestic factors influence the course of Ukrainian security policy which is striking a balance between the twin extremes of Soviet re‐integration, which would be tantamount to the loss of independence, and nationalist maximalism which seeks to place as much distance as possible between Ukraine and Russia.  相似文献   

19.
The issue that this paper tackles is the assessment of the relative security benefits that Cyprus and Greece derive in the context of their cooperation on defence matters. This form of cooperation, known as the ‘Integrated Defence Space Doctrine’, aims at defending their interests in the Aegean Sea and the broader East Mediterranean theatre. The paper relies heavily on earlier research on this topic, which deals with the Greek–Cypriot alliance facing an arms race against Turkey, and uses a coefficient especially designed to assess the optimal levels of security and the associated defence expenditure of the two allies. A comparison of the relative security coefficient values for the two allies suggests that the security benefit that Greece derives thanks to its alliance with Cyprus exceeds the corresponding Cypriot benefit by far. Given the importance assigned to human resources by this index, in conjunction with the demographic problems of Greece, this conclusion justifies the recent Greek defence policy revision, emphasizing quality, capital equipment and flexibility of forces. This revision aims at satisfying the security requirements of the alliance and the increasing demands of an arms race against Turkey.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号