首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
为直观准确地对TDMA战术局域网络性能进行评价,基于排队论建立了TDMA战术局域网广谱性能分析模型,并利用该模型对网络吞吐量和平均时延进行分析。从仿真结果可以看出,该模型不仅能对网络性能进行准确的分析,而且能为网络优化提供有力的科学依据。  相似文献   

2.
无线Mesh网络是新近出现的一种无线多跳网状拓扑网络,在多领域被广泛的应用。简要介绍了无线Mesh网络的结构、特点及应用,并重点分析了影响无线Mesh网性能的主要技术因素。  相似文献   

3.
针对无线传感器网络中距离无关类节点定位算法定位误差较大的问题,提出了一种改进型DV-Hop节点定位算法。通过设置待定位节点到信标节点间的最小跳数门限,降低了定位累积误差;改进了平均每跳距离估计方法,并利用信标节点测量的位置误差作为修正值,对每跳距离的估计值进行修正;待定位节点仅选取与之较近的信标节点计算位置,降低了距离误差。仿真结果显示,在信标节点比例和网络节点总数相同的条件下,改进算法性能明显优于DV-Hop算法。  相似文献   

4.
基于跳频通信的多址干扰性能分析,有独立碰撞和四碰撞态Markov模型,提出采用m序列和L-G模型生成的实际跳频序列对同步、异步组网中的用户干扰性能进行研究.在对不同跳频序列族的碰撞性能进行分析的基础上,通过对跳频码的碰撞过程、碰撞结果、以及编码方法的详细探讨,建立了分析模型,并对模型的收敛性进行了验证.误字率的仿真结果表明,独立碰撞模型和四碰撞态Markov模型与实际跳频序列的碰撞结果有着较好的一致性,其精度足以满足工程需求.  相似文献   

5.
针对从链路层对Link16研究的片面性,利用Opnet设计了Link16的网络仿真模型,并对关键部分进行说明。仿真中,利用EMA把专用链路仿真软件得到的Link16链路性能曲线与Opnet的无线管道模型结合起来,弥补了Opnet在链路仿真方面的不足。最后,基于所建立的Link16网络仿真模型构建了仿真场景,并对仿真结果进行了分析,为优化Link16的网络配置提供了一定的参考。  相似文献   

6.
空间信息网络具有节点异质和拓扑结构动态变化等特点,为此提出了基于时效网络的空间信息网络结构脆弱性分析方法.以卫星通信网络、卫星导航网络和卫星传感网络为例,将空间信息网络抽象为四类网络节点和三类网络连接关系,引入时效网络,构建了多层空间信息时效网络模型.针对传统网络效率计算中部分路径无效等问题,建立三类供需流关系,提出了基于供需流的网络效率指标,并以此构建脆弱性分析模型.构建仿真想定,进行脆弱性分析,实验结果验证了所提方法的有效性.  相似文献   

7.
无线传感器网络的快速发展,对于其路由协议有了更高的要求,关键是在节省能耗的情况下提高数据传输效率.提出了一种基于多蚁群无线传感器网络路由算法,采用多种群并行搜索,并在种群中采用基于目标函数值得启发式信息素分配策略和根据目标函数自动调整蚂蚁搜索路径,利用蚁群的分布式特点,通过有限寿命蚂蚁的协作在源节点与目的节点之间的运动获取主路径和备选路径,然后根据节点信息适时更新路由表.仿真结果显示MACRA降低了能耗,延长了网络寿命.  相似文献   

8.
针对无线传感网中结点能量受限,提出了一种基于动态流能量高效的路由算法DFEERA(Dynamic Flow-based Energy-Efficient Routing Algorithm)。该算法通过在无线传感网内设置多个基站收集区域内传感器结点的数据流拓扑结构建立数据传输能量消耗模型,将该模型转换为最大流问题求解最优传输路径,作为某时期内结点数据传输路径。随着结点能量的消耗,动态调整该能量消耗模型重新规划路径,作为新的传输路径,从而平衡结点间的能量消耗,提高网络结点的存活率。仿真结果表明,与其他典型的路由算法相比,DFEERA能够更好地平衡结点的能耗,获得更高的能量消耗率和更长的网络生存期。  相似文献   

9.
本文重点研究了蓝牙无线传输协议的跳频算法,从均匀性、相关性、复杂性、频隙滞留等方面利用χ^2统计检测对信道跳频序列进行了初步的性能测试并对测试结果作了简要的分析。结果表明该序列具有良好的一维均匀性.复杂度和频隙滞留都通过了检测.相关性则很不符合检测指标。  相似文献   

10.
车载自组织网络作为一种新型的移动自组织网络,是智能交通系统的关键组成部分。近年来,社会各界对车载自组织网络的拥堵性进行了广泛研究,但却忽略了车载自组织网络中移动节点缓存空间有限的现实问题。因此,针对节点缓存受限场景下车载自组织网络的拥堵性问题进行了研究,通过设计来优化网络中数据包的传递过程。仿真实验的结果表明,提出的多跳路由策略可以有效降低网络通信过程的时延和丢包率;节点缓存在一定范围内增加可以提高网络的通信能力;节点通信半径或数据包传递能力的增加可使网络处理数据包的数量提高1.1倍。所建立的研究方法和得到的研究结论可为设计和优化车载自组织网络提供科学依据。研究表明,车载自组织网络的拥堵性研究还存在许多关键技术未突破,节点缓存受限场景下的多跳路由策略优化了网络中数据包传递过程,提高了网络通信效率和可靠性。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

16.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号