首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
网络自恢复技术的研究   总被引:1,自引:1,他引:0  
根据移动网络的特性并结合其管理方式,提出了一种新的基于移动网络并具有一定QoS保证的网络重组策略,将引入的重新划分网络边界和周界的思想,与启用备用链路、重路由等几种机制有机地结合起来。它不仅完善了现有的重组技术,而且还可以作为网络管理中的新功能,增强故障处理、性能监测能力,提高服务质量,保证信息安全可靠地传输。  相似文献   

2.
针对防空监视网络的传感器管理问题,讨论了基于多Agent技术的协作管理策略。通过对防空监视网络传感器协作行为的分析,建立了传感器的协作行为模型。结合防空监视传感器的功能,设计了传感器Agent的结构模型。依据防空监视网络传感器的使命要求和完成任务能力,提出了防空监视网络传感器Agent的协商处理策略。  相似文献   

3.
网络扩容的一个重要障碍是异构子网连接后的互连管理问题。分区域的一体化管理无疑是一种解决办法。本文提出一种基于管理协议细栈(MTS)来构造一体化的区域管理中心(RMC)的策略,这里的 RMC 可实现彼此间的管理通信和互操作,从而也解决了扩容后的互连管理问题。结合正在进行的工程实践,文章还进一步从技术角度上讨论了实现策略。  相似文献   

4.
在对具有层次的Ad Hoc网络特点分析的基础上,建立了一种基于策略的分层网络管理模型,提出了一种双群首选举机制和反馈机制,实验证明,该方法减少了网络管理员的工作强度,提高了网络管理的效率,为网络管理人员合理的选择网络管理方案提供了理论依据.  相似文献   

5.
随着计算机网络异构化程度加剧,策略冲突已成为制约基于策略的网络管理(PBNM)技术实际应用的瓶颈。策略在描述上的不一致是导致策略冲突的主要原因之一,这类冲突被称为模态冲突。文章基于Pon-derTalk网络策略,针对模态冲突的不同类型提出检测算法,并将其整合为冲突检测系统。实验证明该系统是有效、可行的。  相似文献   

6.
许健  王宝生 《国防科技》2009,30(2):5-9,60
文章针对通信网络运行质量综合管理需求,通过分析现代通信网络管理技术和现有通信网络管理系统部署情况,提出了一种基于WEB的通信网络运行质量综合管理模型。  相似文献   

7.
提出一种基于MLP网络的主动报警关联技术,这种技术不依赖于已有专家报警知识,经过初始的训练,能自动识别攻击场景,使初始报警自动关联.通过用MLP网络计算报警之间的关联概率,构建实时报警图;用遗传算法优化MLP网络;用关联矩阵存储报警之间的关联信息;用不断更新的关联矩阵来构建相应攻击策略图;描述了报警关联实时报警图和攻击策略图的构建过程;实验验证效果良好.  相似文献   

8.
作战网络的动态重构过程是其重要特征之一,从杀伤链的角度构建作战网络的动态重构过程,有利于提高作战网络的作战能力和抗毁伤能力。提出了基于杀伤链的动态重构作战网络抗毁性分析。描述了基于异质网络的作战网络模型和典型的杀伤链模型。从杀伤链角度给出了作战网络在节点失效过程中的动态重构策略,并提出了基于杀伤链的网络抗毁性指标。在方法研究基础上进行了案例分析。分析结果表明,动态重构作战网络的抗毁性高于无重构的作战网络,动态重构过程提高了作战网络的抗毁性。动态重构作战网络在度优先攻击策略下的抗毁性明显低于随机攻击策略下的抗毁性。该方法对于作战网络在动态重构下的作战能力评估和分析具有重要意义。  相似文献   

9.
针对指挥自动化网络中军用文书的权限控制和多级安全管理的问题,提出一种基于密钥管理的解决策略.采用一种可根据权限等级进行基于时空混沌的密钥递推算法实现对不同类型和不同敏感等级文档的权限控制.在RSA公钥体制基础上,设计使高等级的用户可推算出低等级用户的私钥实现了多级安全管理.  相似文献   

10.
针对大型网络其地域分布广,监测对象较多,监测周期过长,实时性较差且管理流量负载较大等问题,提出一种分布式网络设备智能轮询策略。在域内,针对轮询周期调整问题,通过构造体现管理者意志的评判矩阵和求解反映数据特征的DFT(离散傅立叶变换)确定轮询优先级和轮询周期取值范围,提出了基于变化率的轮询周期调整算法;在域间,通过触发和查询实现对特殊事件的采集。最后进行了仿真,表明该策略能够在减轻网络负载的同时,准确刻画网络的状态。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
15.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

16.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

17.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

18.
19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号