首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
在目标跟踪WSN网络中,引入移动代理技术,选择性地访问传感器节点和融合数据,能极大地提高WSN网络的性能。提出了一种基于移动代理的WSN目标跟踪网络体系结构,对网络中的移动代理进行了分类,定义了各类移动代理的功能和结构,建立了基于移动代理的目标跟踪工作流程。最后通过仿真实验,验证了随着网络节点数量的增加,提出的目标跟踪WSN结构的与传统的C/S模式目标跟踪WSN结构相比,单位负载量等性能指标上具有较大的优势。  相似文献   

2.
网络学习模式识别移动代理因素提取方法研究   总被引:1,自引:0,他引:1  
从分析网络学习因素的角度出发,提出了利用数据融合理论和使用移动代理技术解决网络学习模式识别的问题。详细分析了网络学习模式中的主要因素,针对网络学习模式识别提出了使用移动代理(MA)进行因素提取的方法。同时运用数据融合技术中分布式缠绕判决模型进行描述,从而使有效地获取网络学习者的学习状态变为可能。也对网络学习因素提取MA的执行环境进行了具体阐述。设计了因素提取MA体系结构,分析了因素提取的执行过程,采用ATP层代理传输协议作为移动代理系统的应用层协议,负责学习模式识别的因素提取。  相似文献   

3.
网格中资源发现机制是把资源提供者和资源请求者联系起来的重要环节.在分析分层分布式分群监控体系结构和现有资源发现机制的基础上,提出将集中式目录服务、资源路由表和移动代理三种机制相结合的网格资源发现机制.实验验证该机制在小范围内查找具有性能高效的特点,而在大范围内查找减少了资源发现代理的分发数量,降低了系统消息的负载,进而降低了网络资源的占用.  相似文献   

4.
Ad Hoc网络是一种没有固定设施的无线移动自组织网络,动态变化的拓扑结构对路由协议的性能有着重要影响。研究了DSR,AODV和OLSR 3种传统路由协议,以OPNET软件为仿真工具,设计了空中飞行平台网络拓扑结构背景的高动态仿真方案,采用随机恒定速度移动模型(RCS),使得仿真场景更加贴近高动态移动节点动态性能。通过比较网络时延、归一化网络吞吐量、路由负载和数据传送成功率等参数,分析了它们的性能。仿真结果表明,OLSR协议的综合性能优于其他协议,更适合于节点高速移动且网络拓扑结构频繁变化的Ad Hoc网络,并为下一步研究打下基础。  相似文献   

5.
为了满足用户对移动IP服务的安全性、低时延方面的要求,弥补现有移动IPv4协议中切换方案的不足,在移动IP/AAA模型的基础上,提出了一种基于VMN(虚拟移动节点)的移动IP快速切换方法。该方法增强了移动IP联合AAA的基本模型,并在MA(移动代理)上构建了一种新的数据结构;通过在NFA和OFA之间建立一个新的双向隧道,将VMN中的数据报文进行快速转移,在没有数据报文丢失的情况下,实现了快速低时延的切换;通过分发新的临时安全关联以及认证票据,有效地提高了移动IP在注册和切换过程中的安全,同时有效地降低了AAAH和AAAF之间的网络负载;通过对该方法进行安全性分析和仿真试验表明,我们提交的方法是安全有效的。  相似文献   

6.
在对移动代理进行研究的基础上 ,提出了一种基于移动代理技术的入侵检测系统结构模型 ,该模型充分利用了移动代理技术的特点和软件代理技术的优势 ,能够解决目前入侵检测系统设计和实现中存在的某些缺陷[1] 。  相似文献   

7.
分析现有网络管理模式的基础上,针对军事移动自组网的特点,提出了一种基于动态代理群的网络管理模式,并实现了动态代理群网络管理模式的网络拓扑结构搜索算法,最后对该拓扑搜索算法的有效性、正确性及复杂度进行分析论证.实验证明该算法可以很好地解决节点频繁移动带来的需要实时反映网络拓扑结构的问题.  相似文献   

8.
将移动代理技术引入电子商务具有很多的优势,同时也对电子商务的安全性问题提出了新的挑战。文中构建了一个基于移动代理的电子商务模型,分析了模型中存在的安全问题,提出了一个改进的电子商务安全方案.改进方案采取分层的结构,从不同的层次保证移动代理的安全和电子商务信息流和资金流的安全.实验结果表明,该方案是切实可行的。  相似文献   

9.
随着通信网络不断向各领域延伸,飞行自组网作为一种新型移动自组织网络,以飞行器作为空中无线通信节点建立网络,实现网络层高效通信.首先,通过考虑链路质量、流量负载和空间距离构建多路径路由模型,并设计抗干扰的多路径路由算法;其次,构建基于源节点路由回复包接收速率的解析模型;然后,对模型进行分析与评价;最后,通过仿真实验验证所...  相似文献   

10.
在大规模数据中心和P2P覆盖网络等复杂网络负载平衡分配中,前人提出了多种多样的负载分配方法,但许多方法为了达到更好的平衡负载指标,追求越来越复杂的算法,使得时间复杂度和算法复杂度很难控制在合理的范围之内。本文在研究了经典balls-into-bins、Azar balls-into-bins和balls into non-uniformbins等模型的基础上,提出了一种新颖高效的非对称balls-into-bins平衡负载分配模型,该模型具有异构的balls、异构的bins,以及不同的bin选择概率,能以很高的概率将最大负载均衡地控制在合理的范围内,通信负载很小,且具有很好的可扩展性,通过拓展,该模型在负载平衡的诸多领域都将有广阔的应用空间。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号