共查询到19条相似文献,搜索用时 109 毫秒
1.
网络中心战是未来战争的主要作战样式,网络复杂性也是需要研究的重要问题之一.提出基于复杂网络的防空反导系统网络模型,并对网络模型的拓扑结构、统计特征和中心度进行了研究.针对防空反导体系结构问题,复杂网络理论是一种有效揭示网络内部特性的分析工具,对于网络模型的建立和优化具有很好的理论指导意义. 相似文献
2.
网络之间的关联依赖关系能使某一网络内的级联失效扩散至其他网络,其本质是位于不同网络的关联节点之间基于功能依赖的相关失效.以两个关联的网络为对象,建立关联网络模型,提出了一种关联网络的级联失效模型.模型将关联网络中的级联失效分解为网络内级联失效和网络间级联失效,并采用了基于度的级联规模评价方法.利用模型研究了两个关联无标... 相似文献
3.
4.
作为生物信息学的重要研究内容,近年来代谢网络结构特征方面的研究取得了许多成果。回顾了代谢网络的重构和表示方法,重点综述了代谢网络宏观结构特征所蕴含的生物学意义,以及拓扑特征所揭示的网络演化过程和网络稳健性信息,提出了目前研究中仍然存在的问题及可能的解决思路,并对将来的研究趋势进行了阐述。 相似文献
5.
6.
军用计算机通信网作为军事指挥的中枢神经已成为不争的事实。随着网络规模的扩展拓扑结构日趋复杂 ,通信活动纷繁交织 ,对网络进行全面的分析评估显得愈发重要。采用网络仿真技术不仅可以了解通信活动规律、评估现有网络的通信承载能力 ,还能预测网络扩容所能提高的通信容量 ,增强网络规划设计正确性 ,为网络管理和发展规划提供科学量化依据。 相似文献
7.
8.
在复杂网络中发现和刻画社区结构是近年来复杂网络研究的重点方向之一。提出了一种社区挖掘的新思路,即根据力导向模型的原理,通过计算社区与节点之间的作用力来决定节点的社区归属。根据该思路设计了基于力导向模型的算法框架FDCD(Force-directed Community Detect),并利用FR模型、KK模型、LL模型和Q模型进行了验证。实验表明,基于FDCD算法框架的多种不同算法不仅能较好地识别社区结构,而且基于LL模型的FDCD算法达到了线性计算复杂度,能适用于大规模网络的社区挖掘。 相似文献
9.
社团结构是复杂网络普遍存在的拓扑特性之一,发现复杂网络中的社团结构是复杂网络研究的基础性问题.针对非重叠社团发现和重叠社团发现两类问题,全面综述了当前复杂网络社团发现算法研究的新进展,分析了每类社团发现算法的特点,指出该领域值得进一步探索的研究方向. 相似文献
10.
本文介绍一种对新型的非等级制通信网络可靠性结构模型的分析方法,从而为设计结构简单、使用灵活、呼损率低、可靠性高的非等级制网络提供一个较为完善的分析途径。 相似文献
11.
Matthew Crosston 《Defense & Security Analysis》2017,33(2):94-105
This work is about how the United States military has become dependent on networked technology. As arguably the largest contributor to national security, it has become so dependent that its chief doctrine integrates networked technology into nearly every specialty, with particularly intense focus on Network Centric Warfare. As the military’s old guard is replaced by the highly technical Millenial Generation, there is cause to pause when assuming this techno-acuity brings nothing but advantage and success. Vulnerabilities stemming from such extensive dependence offer opportunities for exploitation that have not gone unnoticed. The first step to moving forward from this point is to fully understand the extent to which the military has become dependent on computer networks. It might be the Millenials’ war today, but it would be quite unwise for the United States military to think about it and fight it in a purely Millenial way. 相似文献
12.
13.
To meet customer demand, delivery companies are offering an increasing number of time‐definite services. In this article, we examine the strategic design of delivery networks which can efficiently provide these services. Because of the high cost of direct connections, we focus on tree‐structured networks. As it may not be possible to identify a tree‐structured network that satisfies all of the delivery guarantees, we allow these guarantees to be violated but seek to minimize the sum of the violations. We establish the complexity of the problem and exploit an empirically identified solution structure to create new neighborhoods which improve solution values over more general neighborhood structures. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008 相似文献
14.
搜索交互网络中的最短路径是研究网络结构的重要内容,在常见的Dijkstr和Floyd算法中,只能获取一条最短路径.在交互网络上任意节点对之间的最短路径不止一条的情况下,运用Floyd算法对已知加权交互网络的最短路径进行求解,对获得最短路径后的每一个节点对,在其中插入已知交互网络中的其余所有节点,并计算此时的节点对之间的... 相似文献
15.
一、引言1.1 研究目标、方式和结果目标:并行推理机系统结构。方式:自顶向下。 相似文献
16.
17.
During the last decade telecommunication operators have been deploying WDM (Wavelength Division Multiplexing) technology to satisfy the exponential growth in global communication. While facilitating the advanced information society of today, this has also led to a higher dependency on the networks, and furthermore the high capacity utilization of optical fibers means that a single link failure will influence many users and enterprises. For these reasons, protection of network connections has become a major competitive parameter for the operators. Currently, the most popular protection method is ring protection, due to its simplicity, requiring only basic management functionality and operating with local restoration control. While many optical rings have been deployed, little work has been published on exactly what the cost of ring networks are, compared to general mesh networks. In this article we perform a quantitative comparison between ring protection and mesh protection, using real world network data and realistic prices for network components. Extending classic LP flow models to take rings and node costs into account, and using a link‐path based mesh network LP model, we are able to perform a total cost comparison of the two architectures, and of manual ring network design. The results suggest that the price of mesh network components must be reduced significantly to be competitive with ring based networks, and also that manual network design does not necessarily lead to the most cost‐efficient designs. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2005 相似文献
18.
计算机网络日益复杂和异构化,迫切需要提高可靠、跨平台的网络管理系统保证网络稳定、高效运行。分析了传统网络管理系统的不足,提出了一层次分布式网络管理系统故障管理算法,并讨论了算法的性能。最后采用CORBA,Web和Java技术实现了该算法。 相似文献
19.
视觉细胞之间存在的侧抑制机制能够对接收到的视觉信息进行选择性的提取。运用数学方法模拟视觉细胞之间存在的这种生理机制,提出了一种具有分流型抑制机制的视网膜细胞神经网络模型(SIRCNN),分析了该模型的稳定性,给出了等价电路图,并且基于此模型提出了一种边缘检测算法。将该算法应用于图像边缘检测中,试验结果表明,这种以生物视觉感知机理为基础的神经计算方法可有效地增强图像反差,检测图像边缘。由于细胞神经网络具有高速并行运算、便于硬件实现等特点,因此这种方法在图像实时处理中也具有很大的潜力和应用前景。 相似文献