首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Ad Hoc网络技术是战术互联网的重要组网技术。在众多的自组织路由协议中,选择适用于战术互联网的协议是一个关键问题。简要介绍自组网路由协议,对战术互联网的网络特点、业务特性及主要网络指标进行了分析,结合运筹学原理提出了对适用于战术互联网的各种路由协议进行选择的最优化方案。  相似文献   

2.
战术互联网子网干扰效果评估   总被引:2,自引:0,他引:2  
目前对Ad hoc网络攻击的研究大多是针对网络各层协议弱点所设计,战术互联网通信设备运用了许多先进的抗干扰传输技术,协议攻击很难奏效,直接对战术互联网受扰后的网络性能评估很有必要。文章的主要工作是对战术互联网子网进行建模分析,通过设置节点接包时以概率出错来模拟节点受扰情况,分析受扰节点数、节点受扰程度不同时整个战术互联网子网的性能变化。  相似文献   

3.
随着移动Ad Hoc网络逐渐成为实现复杂战场环境信息传递的重要方式,网络安全逐渐引起重视。针对Ad hoc网络易遭受恶意节点攻击而造成大量丢包现象的安全问题,分析了目前针对移动Ad hoc网络AODV协议的几种典型的攻击模型,运用简单的缓存概念,提出了一种基于AODV的安全路由协议AODVCA,并以黑洞攻击为例,对各种性能指标进行了仿真和分析。结果表明此协议能够很好地预防和解决Ad hoc网络中恶意节点的路由攻击。  相似文献   

4.
战术通信是数字化部队和战场建设的重要组成部分。本文重点介绍了美军战术通信系统现役装备进行改进的情况以及围绕数字化计划正在实施的战术互连网、战场信息传输系统、战斗部队信息网的发展动态。  相似文献   

5.
通过分析现代战场通信环境的复杂性、通信节点的异构性,提出了一种基于战场环境的多频分级Ad Hoc网络结构。并通过仿真验证,这种结构的路由控制开销小,报文投递成功率提高,在今后对战术通信网抗毁能力的研究中具有很高的实用价值。  相似文献   

6.
分析了通用Ad hoc网络分簇算法在实际战场环境下的不适应性,重点研究了任务编成和隶属关系等因素对战术互联网(Tactical Internet,TI)性能的影响。针对战术互联网的应用环境,提出了考虑节点作战任务编成进行分簇的算法(Operational Formation Node cluster algorithm,OFN)思想,利用战术演习的部分数据进行了模拟实验,结果表明OFN算法能够减少簇的重构开销,增加战术互联网拓扑结构的稳定性。最后说明该算法能够为军队野战指挥系统建立提供一定的借鉴作用。  相似文献   

7.
C4ISR通信分系统信息优势评估指标研究   总被引:1,自引:1,他引:0  
战术互联网信息优势评估指标确定和量化是其效能评估体系中的重要环节。针对战术互联网提供战场态势感知,获取信息优势的重要特征,在分析信息优势定义的基础上,给出了信息优势的数学描述和评估指标的定义。同时结合战术互联网的具体业务需求,深入分析了基于态势感知信息传输的完整性、精确性和网络传输时效性的信息优势评估指标,根据所确定的指标,给出了战术互联网信息优势基本的定量描述方法。  相似文献   

8.
数据链”是采用无线网络通信技术和应用协议,实现机载、陆基和舰载战术数据系统之间的数据信息交换,从而最大限度地发挥战术系统效能的系统。“数据链”不是什么神秘武器,而是将数字化战场上的指挥中心、作战部队、武器平台链接到一起,并提供一种信息处理、交换和分发的系统。它并不只是像我们平常看到的互联网或区域网,通俗地说,它是网络、在网络上跑的数据以及处理这些数据的软件系统的总称。目前,一些国家和地区军队装备的“标准密码数字链”、“战术数字情报链”、“联合战术信息分发系统”、“多功能信息分配系统”等,都属于“数据链”…  相似文献   

9.
郑博  任清华 《国防科技》2006,(11):22-24
近年来,移动Ad Hoc网络(Mobile Ad Hoc Network,MANET)以其组网灵活性强、支持移动性、易于迅速展开、系统整体抗毁能力强、系统成本低等优点,成为通信领域中的一个热点。移动Ad Hoc网络的应用领域非常广泛,如搜寻与营救、灾难重建、移动办公、虚拟教室、传感器网络等。同时,移动Ad Hoc网络的诸多特性也符合现代战争对军事战术通信提出的许多新要求。若将移动Ad Hoc网络应用于军事战术通信建设中,无疑将会大大提升军队的信息化程度和整体战斗力水平。一、移动Ad Hoc网络概述(一)移动Ad Hoc网络的概念移动Ad Hoc网络是由一组无线移…  相似文献   

10.
16号数据链(Link-16)是美国各军兵种共同使用的一种战术数据信息传输系统,是美军实施联合作战的重要物质基础,主要由“联合战术信息分发系统”(JTIDS)/“多功能信息分发系统”(MIDS)终端、指挥控制处理器以及战术数据管理系统组成。其中,JTIDS 为第一代16号数据链终端,能在作战环境下提供导航、相对定位、作战识别和指挥控制功能。MIDS 为第二代16号数据链终端,能提供抗干扰的数字化语音与数据保密通信。在不久的将来,MIDS 将逐步取代 JTIDS,成为美军战场信息传输的新纽带。  相似文献   

11.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

12.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

13.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

14.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

15.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

16.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

17.
18.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

19.

The Soviet Union was able to develop a large military-industrial complex and become the world's second superpower despite deficiencies in its centrally planned economy because defence was given high priority status and special planning, rationing and administrative mechanisms were used to attain national security objectives. However, in the period 1976-85 the effectiveness of priority protection diminished and defence institutions experienced more of the problems typical of the shortage economic system. The heavy defence burden also created growing difficulties for the civilian economy. The attempts by the Gorbachev government to reform the defence sector and improve defence-economic relationships during perestroika (1985-91) uniformly failed. For most of the transition period, the Russian military-industrial complex has been adversely affected by its low priority status, cuts in defence spending, instability of the hybrid politico-economic system, and negative growth of the economy. The armed forces and defence industry have been reduced in size and their outputs of military services and equipment have fallen to low levels. Nevertheless, the Russian armed forces still have over one million troops, significant stocks of sophisticated conventional weapons, and a large nuclear arsenal. The government of President Putin has raised the priority of the defence sector, increased real defence spending, and adopted ambitious plans to revive Russian military power. It is likely, though, that tight resource constraints will hamper efforts to reform the armed forces and to upgrade weapons. By 2010 Russia will be an important, but not dominant, military power in Eurasia.  相似文献   

20.
The collapse of the Soviet Union precipitated the massive expansion of drug use and trade in Russia. The country now has one of the largest populations of injecting drug users in the world and has become the largest single-country market for Afghan heroin. In 2003 the Federal Service for the Control of the Drugs Trade was created to coordinate a comprehensive counternarcotics strategy appropriate to the scale of this threat. The service continues to face a number of challenges in its early stages of development. However, it has made considerable advances in improving responses to large-scale organised crime and in building international cooperation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号