共查询到20条相似文献,搜索用时 46 毫秒
1.
2.
网络学习模式识别移动代理因素提取方法研究 总被引:1,自引:0,他引:1
从分析网络学习因素的角度出发,提出了利用数据融合理论和使用移动代理技术解决网络学习模式识别的问题。详细分析了网络学习模式中的主要因素,针对网络学习模式识别提出了使用移动代理(MA)进行因素提取的方法。同时运用数据融合技术中分布式缠绕判决模型进行描述,从而使有效地获取网络学习者的学习状态变为可能。也对网络学习因素提取MA的执行环境进行了具体阐述。设计了因素提取MA体系结构,分析了因素提取的执行过程,采用ATP层代理传输协议作为移动代理系统的应用层协议,负责学习模式识别的因素提取。 相似文献
3.
4.
5.
为了满足用户对移动IP服务的安全性、低时延方面的要求,弥补现有移动IPv4协议中切换方案的不足,在移动IP/AAA模型的基础上,提出了一种基于VMN(虚拟移动节点)的移动IP快速切换方法。该方法增强了移动IP联合AAA的基本模型,并在MA(移动代理)上构建了一种新的数据结构;通过在NFA和OFA之间建立一个新的双向隧道,将VMN中的数据报文进行快速转移,在没有数据报文丢失的情况下,实现了快速低时延的切换;通过分发新的临时安全关联以及认证票据,有效地提高了移动IP在注册和切换过程中的安全,同时有效地降低了AAAH和AAAF之间的网络负载;通过对该方法进行安全性分析和仿真试验表明,我们提交的方法是安全有效的。 相似文献
6.
在对移动代理进行研究的基础上 ,提出了一种基于移动代理技术的入侵检测系统结构模型 ,该模型充分利用了移动代理技术的特点和软件代理技术的优势 ,能够解决目前入侵检测系统设计和实现中存在的某些缺陷[1] 。 相似文献
7.
分析现有网络管理模式的基础上,针对军事移动自组网的特点,提出了一种基于动态代理群的网络管理模式,并实现了动态代理群网络管理模式的网络拓扑结构搜索算法,最后对该拓扑搜索算法的有效性、正确性及复杂度进行分析论证.实验证明该算法可以很好地解决节点频繁移动带来的需要实时反映网络拓扑结构的问题. 相似文献
8.
将移动代理技术引入电子商务具有很多的优势,同时也对电子商务的安全性问题提出了新的挑战。文中构建了一个基于移动代理的电子商务模型,分析了模型中存在的安全问题,提出了一个改进的电子商务安全方案.改进方案采取分层的结构,从不同的层次保证移动代理的安全和电子商务信息流和资金流的安全.实验结果表明,该方案是切实可行的。 相似文献
9.
随着通信网络不断向各领域延伸,飞行自组网作为一种新型移动自组织网络,以飞行器作为空中无线通信节点建立网络,实现网络层高效通信.首先,通过考虑链路质量、流量负载和空间距离构建多路径路由模型,并设计抗干扰的多路径路由算法;其次,构建基于源节点路由回复包接收速率的解析模型;然后,对模型进行分析与评价;最后,通过仿真实验验证所... 相似文献
10.
在大规模数据中心和P2P覆盖网络等复杂网络负载平衡分配中,前人提出了多种多样的负载分配方法,但许多方法为了达到更好的平衡负载指标,追求越来越复杂的算法,使得时间复杂度和算法复杂度很难控制在合理的范围之内。本文在研究了经典balls-into-bins、Azar balls-into-bins和balls into non-uniformbins等模型的基础上,提出了一种新颖高效的非对称balls-into-bins平衡负载分配模型,该模型具有异构的balls、异构的bins,以及不同的bin选择概率,能以很高的概率将最大负载均衡地控制在合理的范围内,通信负载很小,且具有很好的可扩展性,通过拓展,该模型在负载平衡的诸多领域都将有广阔的应用空间。 相似文献
11.
Douglas Mastriano 《Defense & Security Analysis》2017,33(1):68-76
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West. 相似文献
12.
Namrata Goswami 《Small Wars & Insurgencies》2013,24(1):66-86
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy. 相似文献
13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola. 相似文献
14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。 相似文献
15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period. 相似文献
16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population. 相似文献
18.
Lord Aikins Adusei 《African Security Review》2013,22(3):332-359
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD). 相似文献
19.
《战略研究杂志》2012,35(5):689-711
Abstract This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo. 相似文献
20.