首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
转发与控制分离结构的提出和网络处理器的发展对路由器的扩展性、灵活性、性能具有重要的影响,而IPv6作为下一代互联网协议的核心,是路由器研究的重要对象。简要阐述了基于转发与控制分离结构ForCES的IPv6路由器的系统结构,重点论述了基于网络处理器的IPv6路由器的转发结构、双栈转发系统的流程设计和隧道机制设计的实现,给出IPv6路由器原型系统的实际测试结果。  相似文献   

2.
协作通信是提高无线传感网络性能的有效技术.为此,针对能量采集的无线传感网络(EH-WSNs),提出多转发节点协作传输(Multi-relay Cooperative Transmitting,MRCT)方案.MRCT方案采用时隙切换/功率分配机制,优化解码信息和传输信息的功率分配;转发节点将所接收的信息进行放大——转发处理,并由将多个转发节点的信息合并后,再传输传感节点,进而提高吞吐量和安全能力.通过仿真分析了MRCT方案的吞吐量和安全中断概率性能.仿真结果表明,提出的MRCT方案的吞吐量和安全性能得到提升.  相似文献   

3.
由于低传输时延和高带宽,射频(Radio Frequency,RF)信号广泛应用于无线传感网络(Wireless Sensor Network,WSN)节点间的通信.然而,外界电磁或核辐射影响了基于RF的WSN通信.电磁或核辐射导致节点通信间歇性中断,将此类节点称为故障节点.故障节点可能能够正常感测环境,但会间歇性失去通信能力,这就形成动态的通信黑洞.为此,分析了故障节点对WSN的影响.推导了故障节点行为的数学模型,理论上分析了故障节点对网络能耗及数据包传递率的影响.仿真数据证实,故障节点的存在降低了网络性能.  相似文献   

4.
无线传感器网络由大量节点组成,网络面临的问题很难全部被仿真工具描述,因而由仿真得到的无线传感器网络应当在部署之前进行物理测试.根据无线传感器网络节点的一般架构,设计完成了一批体积小、成本低、功耗低、硬件资源丰富和代码开源的无线传感器节点,组建了一个无线传感器网络实验平台.在平台上移植了Contiki操作系统管理节点的软硬件资源,设计实现了射频芯片、串行接口和温度传感器的驱动程序.采用6LowPAN协议构建自组织网络,验证了平台的节点通信半径和组网效果.试验表明该平台完整支持6LowPAN协议,采集数据的可靠性、网络的健壮性和通信半径等指标,可以满足无线传感器网络节点定位与环境变量检测等应用的需求.  相似文献   

5.
水下无线传感网络(Underwater Wireless Sensor Networks,UWSNs)被认为是监测和开发水域环境的有效手段.相比于传统的无线传感网络,UWSNs中节点采用声通信传输数据,消耗了更多能量.而簇是管控数据流量、减少节点能耗的常用方法.为此,针对簇化的UWSNs,提出能效感知的相似数据融合(Energy efficiency-similarity Ag-gregation,EESA)算法.EESA算法利用欧式距离消除冗余数据,每个传感节点不是将感测的原始数据直接传输至簇头,而是将数据进行压缩,构建成具有代表性的数据点,再将这些数据点传输至簇头,进而控制数据流量,减少节点能耗.仿真结果表明,提出的EESA算法能够有效减少节点的能量消耗.  相似文献   

6.
利用无线传感器网络及Zigbee协议标准,对押运信息感知监测系统进行了分析;提出了基于Zigbee无线传感器网络与空间定位技术、计算机技术、数据通信技术结合的押运信息感知监测系统架构;设计了押运感知监测网络中感知节点的软硬件,并且对网络感知节点软硬件功能进行了测试。  相似文献   

7.
在无线传感器网络的研究与开发中,经常需要获得关于网络运行的各种宏观和微观信息。针对该需求,结合大部分管理节点和计算机之间的通信都是使用串口这一特点,对系统的功能通用性和硬件独立性进行了研究,设计并实现了一个这样的系统。该系统能够对来自不同传感器的数据进行存储、解析、显示和模拟,支持星形、簇树和网状网络的拓扑和路由显示,并具有节点查询功能。该系统为传感器网络的设计与开发提供了快速灵活的通用平台。  相似文献   

8.
基于OPNET的战场IPV6通信网络拓扑设计及仿真   总被引:2,自引:0,他引:2  
为了对IPv6与IPv4共存期间进行可靠通信提供技术上的参考,基于OPNET仿真平台,设计了几种不同的战场IPv6通信网络拓扑,强调了其特点和关键技术,突出了其仿真的主要参数配置,并通过分析仿真数据,对网络的有效性、实时性、可靠性等性能参数进行了评估,从而验证了所设计拓扑的可行性.  相似文献   

9.
水下传感器网络是应用于水下通信的重要传感器网络技术。提出了基于固定节点3D网格部署的水下无线传感器网络分簇算法,设计了3D网格的编址和分簇方法,实现了基于地址分配的节点定位,构建了算法的能耗分析模型。采用MATLAB完成了算法的性能仿真,对比了DS-VBF、IAR和GEDAR 3个算法的平均数据传输延迟和网络生存时间(TTL)。实验结果表明,此算法的平均数据传输延迟较短,可明显提高UWSNS的生存时间。  相似文献   

10.
针对目前绝大多数火药仓库的温度、湿度控制由于采用人工操作导致对温湿度不能实时精确监控从而导致火药失效的问题,设计了一种基于无线传感网和神经网络的火药贮存在线监测系统。该系统将无线传感网络终端节点实时收集到环境温度和水分信息传给神经网络控制器,根据神经网络控制模型实时调节火药贮存温湿度控制设备的各个参数,实现对火药贮存环境温湿度的自动化和实时精确控制,提高火药贮存的可靠性和经济效益。  相似文献   

11.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

12.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

13.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

14.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

15.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

16.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

17.
18.
The UK’s interrogation operations during the conflict in Iraq (2003–2008) are often portrayed by the media as involving significant amounts of mistreatment. This article demonstrates that these practices are not necessarily representative of the UK’s interrogation operations across this conflict. In doing so it contributes to the limited literature on the practice of interrogation and on the UK’s combat operations in Iraq. The UK’s interrogation capability, and therefore its intelligence-gathering capability, is shown to have rested primarily with the military’s Joint Forward Interrogation Team (JFIT). The JFIT suffered from limitations to the number, training and experience of its interrogators and interpreters. It is argued that maintaining a permanent, higher level of preparedness for interrogation by the British armed forces is desirable.  相似文献   

19.
ABSTRACT

While the study of organised violence is considered essential to understanding the history of the West, and accordingly imbued with various layers of meaning and remembrance, war is widely regarded as inimical to the modern nation in Africa and stable development more broadly. Using examples drawn from primarily from East Africa, this paper considers the ways in which warfare in the deeper (‘precolonial’) past has been framed and envisioned in recent decades, in particular by governments whose own roots lie in revolutionary armed struggle and who began life as guerrilla movements. While in some cases particular elements of the deeper past were indeed mobilised in pursuit of contemporary political goals, in many other scenarios histories of precolonial violence were beheld as problematic and unworthy of remembrance. This paper highlights the paradox and ambiguity which has attended the memory of key aspects of Africa’s deeper past.  相似文献   

20.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号