首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
为直观准确地对TDMA战术局域网络性能进行评价,基于排队论建立了TDMA战术局域网广谱性能分析模型,并利用该模型对网络吞吐量和平均时延进行分析。从仿真结果可以看出,该模型不仅能对网络性能进行准确的分析,而且能为网络优化提供有力的科学依据。  相似文献   

2.
无线Mesh网络是新近出现的一种无线多跳网状拓扑网络,在多领域被广泛的应用。简要介绍了无线Mesh网络的结构、特点及应用,并重点分析了影响无线Mesh网性能的主要技术因素。  相似文献   

3.
针对无线传感器网络中距离无关类节点定位算法定位误差较大的问题,提出了一种改进型DV-Hop节点定位算法。通过设置待定位节点到信标节点间的最小跳数门限,降低了定位累积误差;改进了平均每跳距离估计方法,并利用信标节点测量的位置误差作为修正值,对每跳距离的估计值进行修正;待定位节点仅选取与之较近的信标节点计算位置,降低了距离误差。仿真结果显示,在信标节点比例和网络节点总数相同的条件下,改进算法性能明显优于DV-Hop算法。  相似文献   

4.
基于跳频通信的多址干扰性能分析,有独立碰撞和四碰撞态Markov模型,提出采用m序列和L-G模型生成的实际跳频序列对同步、异步组网中的用户干扰性能进行研究.在对不同跳频序列族的碰撞性能进行分析的基础上,通过对跳频码的碰撞过程、碰撞结果、以及编码方法的详细探讨,建立了分析模型,并对模型的收敛性进行了验证.误字率的仿真结果表明,独立碰撞模型和四碰撞态Markov模型与实际跳频序列的碰撞结果有着较好的一致性,其精度足以满足工程需求.  相似文献   

5.
针对从链路层对Link16研究的片面性,利用Opnet设计了Link16的网络仿真模型,并对关键部分进行说明。仿真中,利用EMA把专用链路仿真软件得到的Link16链路性能曲线与Opnet的无线管道模型结合起来,弥补了Opnet在链路仿真方面的不足。最后,基于所建立的Link16网络仿真模型构建了仿真场景,并对仿真结果进行了分析,为优化Link16的网络配置提供了一定的参考。  相似文献   

6.
空间信息网络具有节点异质和拓扑结构动态变化等特点,为此提出了基于时效网络的空间信息网络结构脆弱性分析方法.以卫星通信网络、卫星导航网络和卫星传感网络为例,将空间信息网络抽象为四类网络节点和三类网络连接关系,引入时效网络,构建了多层空间信息时效网络模型.针对传统网络效率计算中部分路径无效等问题,建立三类供需流关系,提出了基于供需流的网络效率指标,并以此构建脆弱性分析模型.构建仿真想定,进行脆弱性分析,实验结果验证了所提方法的有效性.  相似文献   

7.
无线传感器网络的快速发展,对于其路由协议有了更高的要求,关键是在节省能耗的情况下提高数据传输效率.提出了一种基于多蚁群无线传感器网络路由算法,采用多种群并行搜索,并在种群中采用基于目标函数值得启发式信息素分配策略和根据目标函数自动调整蚂蚁搜索路径,利用蚁群的分布式特点,通过有限寿命蚂蚁的协作在源节点与目的节点之间的运动获取主路径和备选路径,然后根据节点信息适时更新路由表.仿真结果显示MACRA降低了能耗,延长了网络寿命.  相似文献   

8.
针对无线传感网中结点能量受限,提出了一种基于动态流能量高效的路由算法DFEERA(Dynamic Flow-based Energy-Efficient Routing Algorithm)。该算法通过在无线传感网内设置多个基站收集区域内传感器结点的数据流拓扑结构建立数据传输能量消耗模型,将该模型转换为最大流问题求解最优传输路径,作为某时期内结点数据传输路径。随着结点能量的消耗,动态调整该能量消耗模型重新规划路径,作为新的传输路径,从而平衡结点间的能量消耗,提高网络结点的存活率。仿真结果表明,与其他典型的路由算法相比,DFEERA能够更好地平衡结点的能耗,获得更高的能量消耗率和更长的网络生存期。  相似文献   

9.
本文重点研究了蓝牙无线传输协议的跳频算法,从均匀性、相关性、复杂性、频隙滞留等方面利用χ^2统计检测对信道跳频序列进行了初步的性能测试并对测试结果作了简要的分析。结果表明该序列具有良好的一维均匀性.复杂度和频隙滞留都通过了检测.相关性则很不符合检测指标。  相似文献   

10.
针对野外驻训或战场上的装备管理不便问题,文中设计并实现了一种基于WSID(Wireless SensorIDentification)网络的装备管理系统,该系统利用融合了RFID技术的无线传感器网络,在任何时间任何地点快速部署多个传感器节点,迅速地建立起装备临时管理系统,灵活、便捷和有效。实验结果表明,该系统能够通过WSID网络对出入库配备ID标签的装备实行有效的管理。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

15.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

16.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

17.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

18.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

19.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号