首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
基于排队论的JTIDS网络接入算法   总被引:1,自引:0,他引:1  
刘强 《火力与指挥控制》2011,36(11):141-146,150
研究了JTIDS网络时分多址技术及4种接人模式的算法,并基于通信网络排队论对揍人算法延时进行了理论推导,提出了一种简单且高效的时隙重分配接入算法RPD-TDMA,对推导的延时性能公式进行了性能仿真,验证了推导的正确性,并且得出了4种接人算法的关键影响因素、性能特点以及适用战术环境等一系列结论.  相似文献   

2.
刘强 《火力与指挥控制》2011,36(7):57-60,64
深入研究了JTIDS网络3种中继模式的原理、延时计算、优缺点及应用环境.基于网络仿真软件OPNET对3种中继模式进行了延时性能及中继路径的仿真.结果表明,3种中继模式各有所长,应根据实际环境进行灵活的配置和综合应用才能实现JTIDS网络最好的中继效能.  相似文献   

3.
联合战术信息分发系统JTIDS(Joint Tactical Information Distribution System)系统是无中心的移动通信系统,采用时分多址(TDMA)的网络接入协议.TDMA网络是一种同步网络,必须有统一的时间基准,各终端的时隙必须与时间基准同步,因此时隙同步技术是确保该网络正常工作的关键技术.基于HLA/RTI仿真平台,对网络延迟进行了测试,针对RTI中联邦成员的时间延迟很不稳定的问题提出并实现了一种简单高精度的软件时钟同步方法.  相似文献   

4.
在深入研究Link 16战术数据链技术特点的基础上,对Link 16网络规划要素进行了描述,详细介绍了战术任务、网络参与群、网络成员、网络结构和时隙资源等要素在Link 16网络规划中所扮演的角色;依据这些要素设计了相应的网络规划流程,进一步根据该流程搭建Link 16网络规划平台。该平台可以让设计人员利用图形化方式规划复杂的Link 16网络,包括选择网络形式,确定网络成员和网络参与群,进行网络时隙资源分配;提高了网络设计效率,并能够通过多种方式展示规划结果。  相似文献   

5.
联合战术信息分发系统JTIDS(Joint Tactical Information Distribution System)系统采用无中心节点的时分多址(TDMA)的网络接入协议,针对TDMA网络时隙同步的要求,各终端必须有统一的时间基准的特点。基于HLA/RTI仿真平台,对网络延迟进行了测试,针对RTI中联邦成员的时间延迟很不稳定的问题提出并实现了一种简单高精度的软件时钟同步方法。该方法既可以降低网络延迟不确定性的影响,又考虑了时钟漂移的影响,具有很好的精度。  相似文献   

6.
联合战术信息分发系统(JTIDS)作为Link-16的核心部分,具有良好的信息传输性能,可以容忍比较高的信息错误率.以Simulink软件为仿真平台,根据JTIDS的基本原理,对JTIDS数据传输过程中的关键技术进行介绍,并对系统的误码性能进行仿真分析.通过系统的仿真与分析可以看出,JTIDS几种关键技术的运用,提高了系统的传输性能,具有很好的抗干扰效果.  相似文献   

7.
首先介绍了联合战术信息分发系统(JTIDS)的一般概念,进而针对它的抗干扰措施———直接序列扩频的扩频码的优选及扩频图案的设计,提出了合适的算法,并用C语言在微机上仿真实现。实验结果证明优选的码字质量高,生成速度快,此方面的仿真实现逼近JTIDS,有利于对JTIDS进行深入研究,从而对它实施有效干扰。  相似文献   

8.
战术数据链的建设与发展   总被引:24,自引:5,他引:19  
通过回顾战术数据链的建设与发展历程 ,提出了战术数据链定义、类型。介绍了战术数据链的国际现状 ,给出了欧美国家现有战术数据链。分析了美军战术数据链建设情况 ,着重研究了 16号链及 JTIDS的特点、运用和发展情况 ,就JTIDS的相对导航原理和对作战效能的影响进行了分析。指出了俄军战术数据链状况 ,说明了某型俄制飞机空空战术数据链的应用方法。最后依据本国实际提出了我军战术数据链建设和发展的意见和建议 ,提供了研究与开发的技术途径。  相似文献   

9.
以移动计算系统的网络传输为背景,提出了系统多途径自适应信息传输设计.此设计根据传输信息类型和网络传输途径的状态,按照一定的规则,自动选择一种传输途径进行传输.用户只需简单地参与或者无需参与,即可完成多途径传输任务.与全人工的多途径选择传输相比,此设计提高系统传送信息的效率.  相似文献   

10.
依据迫击炮分队的战术使用规则,构建了简单的迫击炮分队CGF系统.设计并实现了迫击炮分队的任务初始化模型,目标搜索发现模型,目标跟踪模型,火力压制模型,火力转移模型等基本战术功能.  相似文献   

11.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

12.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

13.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

14.
15.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

16.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

17.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

18.
19.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

20.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号