首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
美国陆军战术互联网的现状与发展   总被引:1,自引:0,他引:1  
随着通讯网络技术的迅速发展,军用互联网技术也得到了重大的发展,本文从无线电通讯网络和计算机通讯网络两方面讲述了美国现役战术互联网的情况。  相似文献   

2.
战术互联网技术是未来信息战争的主要支撑技术。本文基于战术互联网研究现状,详细讨论了战术互联网在技术应用、战术安全方面存在的不足以及缺陷。  相似文献   

3.
冯广友  王海 《电讯技术》2007,47(6):84-89
战术互联网是AdHoc网络技术在军事领域的重要应用,广播是战术互联网中基本的信息发布方式,也是AdHoc网络技术研究的一个重要问题。首先把AdHoc网络广播算法分为邻居决定转发和自身决定转发,然后仿真分析几种典型的广播算法;最后根据战术互联网的特点,结合现有的AdHoc网络广播,提出一种新的战术互联网广播协议(TIBP)。仿真结果表明:TIBP在战术互联网环境下具有较高的效率。  相似文献   

4.
战术互联网是互联的战术无线电台的集合,在战术通信方面有着广阔的应用前景。本文阐述了战术互联网的概念和组成;介绍了战术联网的主要装备和业务需求,并阐述了战术互联网的信道接入控制、路由、组网以及信息处理方式。最后,探讨了战术互联网的发展趋势。  相似文献   

5.
战术互联网浅述   总被引:1,自引:0,他引:1  
互联网技术在战场上的应用与发展,产生了现代信息战中一个重要的战场信息传输网络——战术互联网。现代战场上部队机动性很强,信息传输主要依靠无线电台,将这些无线电台通过互联网技术互联起来,就形成了战术互联网。战术互联网是互联的战术无线电台的集合,它的作用是加强指挥员、参谋、部队、士兵和武器平台对指挥数据的共享,井能提供接近实时的态势感知,从而提高部队与武器系统的杀伤力,加快作战节奏,并提高生存能力。  相似文献   

6.
战术互联网是美国陆军通信系统的重要组成部分,可为战术通信与指挥控制系统提供可靠的、无缝的、安全的通信链路和通用数据通信平台。在我军通信对抗训练领域,模拟美军战术互联网并为受训部队提供“靶标”成为亟待解决的问题。在分析美军战术互联网体系结构与运用模式的基础上,提出了美军战术互联网“精简式”与“典型式”的构建方法,深入研究了模拟战术互联网的运用方法。对提升基地训练中的蓝军扮演能力有重要意义,有助于形成通信对抗部队的实战能力。  相似文献   

7.
战术互联网建模与仿真   总被引:10,自引:0,他引:10  
万永乐  张剑 《通信技术》2002,(10):49-53
战术互联网(TI-TacticalInternet)是移动通信环境下的战术通信网络,是实现战场前沿态势感知(SA-SituationalAwareness)数据和指挥控制(C2-CommandandControl)数据传输的主要通道,也是战术通信的骨干网络。在简单介绍美军战术互联网系统功能与构成的基础上,重点剖析了战术互联网系统建模与仿真的多种设计方案与实现技术,最后,针对我军未来战术通信系统的仿真研究和应用问题,提出了几点思考和建议。  相似文献   

8.
为了解决战术互联网拓扑模型生成问题,分析了现有的拓扑构建方法的不足,从拓扑模型建立、约束条件、拓扑分析等几方面对战术互联网网络模型进行了研究.通过构建多约束下的节点模型、边模型,进而构建网络拓扑模型,并从节点度、平均路径长度、网络效率等方面对拓扑模型进行了特性分析.仿真结果表明,提出的多约束的战术互联网拓扑模型生成方法能够很好地满足新一代战术互联网的拓扑结构.  相似文献   

9.
战术互联网(Tactical Internet)是军队指挥信息系统的重要组成部分,目前对于战术互联网的作战效能评估主要是针对装备或技术层面的,对于网络整体效能的评估比较少。战术互联网是作为一个复杂系统,其系统效能用普通的方法难以全面描述。而网络层次分析法(ANP)是一种非常适合复杂系统评估的方法,因此非常适合用来构建战术互联网系统效能评估指标体系,从而完成对其系统效能的评估。  相似文献   

10.
分析了战术互联网的体系架构、特点及组成,基于EXata仿真框架引入半实物仿真思想,构建了虚实结合的战术互联网仿真场景,实现了真实信息流在仿真网络中的传输,验证了存在干扰时对网络节点信息传输的影响.仿真结果表明,基于EXata构建的半实物仿真平台可有效模拟战术互联网作战场景,为研究战术互联网网络性能提供了试验平台,提高了...  相似文献   

11.

针对现有的虚拟网络重构算法对物理网络中产生的碎片资源考虑不够周到,导致其对在线虚拟网络映射算法的性能改善不够显著的问题,该文定义了一种网络资源碎片度度量方法,并提出一种碎片感知的安全虚拟网络重构算法。该算法通过周期性考虑物理网络中节点的碎片度,选择出待迁移虚拟节点集合;通过综合考虑物理网络的碎片度减小量和虚拟网络的映射开销减少量,选择出最佳的虚拟节点迁移方案。仿真结果表明,该算法的请求接受率和收益开销比均优于当前的重构算法,特别是在收益开销比方面的优势更加明显。

  相似文献   

12.
现有蜂窝移动通信系统支持的业务量相对稳定,不能很好地满足密集用户应急突发业务的需求,在资源综合优化利用方面还存在局限性。无线网络逻辑重构是一种在已有蜂窝系统物理架构上,通过调整或重新配置资源的组织运用方式,以最大限度地提升系统容量的方法。本文首先分析了无线网络重构对于提升蜂窝系统容量的重要性,接着设计了基于SAE的无线网络重构体系架构,在此基础上给出了网络重构的控制方式以及信令实现流程。  相似文献   

13.
赵靓  汪斌强  张鹏 《电信科学》2012,28(2):133-137
下一代网络应该是一个可以满足用户个性化需求的网络,可重构技术在满足系统对环境和应用对象变化的适应性要求方面有着很好的表现,因此将可重构技术引入网络体系设计,提出了可重构柔性网络的概念,给出了可重构柔性网络参考模型,并进行形式化描述。最后,介绍了可重构柔性网络的应用前景及优势。  相似文献   

14.
Many state-of-the-art wireless sensor networks have been equipped with reprogramming modules, e.g., those for software/firmware updates. System migration tasks such as software reprogramming, however, will interrupt normal sensing and data processing operations of a sensor node. Although such tasks are occasionally invoked, the long time of such tasks may disable the network from detecting critical events, posing a severe threat to many sensitive applications. In this paper, we present the first formal study on the problem of downtime-free migration. We demonstrate that the downtime can be effectively eliminated, by partitioning the sensors into subsets, and let them perform migration tasks successively with the rest still performing normal services. We then present a series of effective algorithms, and further extend our solution to a practical distributed and localized implementation. The performance of these algorithms have been evaluated through extensive simulations, and the results demonstrate that our algorithms achieve good balance between the sensing quality and system migration time.
Jiangchuan LiuEmail:

Yangfan Zhou   is a PhD student in the Computer Science and Engineering Department at The Chinese University of Hong Kong. He received the B.Sc. (2000) degree in electronics from Peking University and the M.Phil (2005) degree in computer science and engineering from the Chinese University of Hong Kong. He also worked in industrial area as hardware engineer and later software engineer in China from 2000 to 2003. His research interests are in wireless ad hoc and sensor networks. Michael R. Lyu   received the B.S. (1981) in electrical engineering from National Taiwan University, the M.S. (1985) in computer engineering from University of California, Santa Barbara, and the Ph.D. (1988) in computer science from University of California, Los Angeles. He is a Professor in the Computer Science and Engineering Department of the Chinese University of Hong Kong. He worked at the Jet Propulsion Laboratory, Bellcore, and Bell Labs; and taught at the University of Iowa. His research interests include software reliability engineering, software fault tolerance, distributed systems, image and video processing, multimedia technologies, and mobile networks. He has published over 200 papers in these areas. He has participated in more than 30 industrial projects, and helped to develop many commercial systems and software tools. Professor Lyu was frequently invited as a keynote or tutorial speaker to conferences and workshops in U.S., Europe, and Asia. He initiated the International Symposium on Software Reliability Engineering (ISSRE), and was Program Chair for ISSRE’1996, Program Co-Chair for WWW10 and SRDS’2005, and General Chair for ISSRE’2001 and PRDC’2005. He also received Best Paper Awards in ISSRE’98 and in ISSRE’2003. He is the editor-in-chief for two book volumes: Software Fault Tolerance (Wiley, 1995), and the Handbook of Software Reliability Engineering (IEEE and McGraw-Hill, 1996). He has been an Associate Editor of IEEE Transactions on Reliability, IEEE Transactions on Knowledge and Data Engineering, and Journal of Information Science and Engineering. Professor Lyu was elected to IEEE Fellow (2004) and AAAS Fellow (2007) for his contributions to software reliability engineering and software fault tolerance. He was also named Croucher Senior Research Fellow in 2008. Jiangchuan Liu   received the BEng degree (cum laude) from Tsinghua University, Beijing, China, in 1999, and the PhD degree from The Hong Kong University of Science and Technology in 2003, both in computer science. He was a recipient of Microsoft Research Fellowship (2000), a recipient of Hong Kong Young Scientist Award (2003), and a co-inventor of one European patent and two US patents. He co-authored the Best Student Paper of IWQoS’08. He is currently an Assistant Professor in the School of Computing Science, Simon Fraser University, British Columbia, Canada, and was an Assistant Professor in the Department of Computer Science and Engineering at The Chinese University of Hong Kong from 2003 to 2004. His research interests include multimedia systems and networks, wireless ad hoc and sensor networks, and peer-to-peer and overlay networks. He is an Associate Editor of IEEE Transactions on Multimedia, and an editor of IEEE Communications Surveys and Tutorials. He is a Senior Member of IEEE and a member of Sigma Xi.   相似文献   

15.
提高供电的质量,保证其在供电过程中的稳定性以及运行的安全,就需要进行配电网络重构。解决这个问题所涉及的方面非常复杂,需要一系列的非线性优化组合,并且这些组合的优化过程也是一个非常庞大的工程。本文对配电网重构的相关问题进行了介绍,同时对智能优化算法在配电网重构中的相关运用也进行了详细介绍,提出了在对电网进行重构过程中需要注意的一些问题。  相似文献   

16.
针对传统数据中心电互连网络在应对业务动态流量时存在适应性差的问题,文章提出并验证了一种可以根据网络流量波动进行网络拓扑自优化重构的机制.文章所提机制通过网络仿真系统与深度强化学习模型的迭代交互,实现了对拓扑结构与业务流量分布关系的持续训练,进而在实际系统中,深度强化学习模型,根据软件定义网络控制器实时收集的业务流量分布...  相似文献   

17.
Presented is a global dynamic reconfiguration design of an artificial neural network based on field programmable gate array (FPGA). Discussed are the dynamic reconfiguration principles and methods. Proposed is a global dynamic reconfiguration scheme using Xilinx FPGA and platform flash. Using the revision capabilities of Xilinx XCF32P platform flash, an artificial neural network based on Xilinx XC2V30P Virtex-Ⅱ can be reconfigured dynamically from back propagation (BP) learning algorithms to BP network testing algorithms. The experimental results indicate that the scheme is feasible, and that, using dynamic reconfiguration technology, FPGA resource utilization can be reduced remarkably.  相似文献   

18.
针对战术数据链无线网络典型入侵事件,基于演化算法和神经网络提出了一种基于演化神经网络的入侵检测方法。通过仿真实验和性能对比验证了该方法的有效性,对战术数据链系统的安全设计有一定的指导意义。  相似文献   

19.
赵鹏  谷京朝 《舰船电子对抗》2011,34(6):113-115,120
在动态局部可重构设计过程中,系统级设计到现场可编程门阵列(FPGA)硬件实现,还需要大量的寄存器传输级(RTL)硬件语言编写,导致设计效率下降的问题。针对该问题,以Xilinx公司最新提出的动态局部重构设计流程———早期获取部分可重构(EAPR)为基础,利用System Generator软件,提出一种动态局部重构的设...  相似文献   

20.
野战地域通信网可靠性的评价方法   总被引:36,自引:1,他引:35  
郭伟 《电子学报》2000,28(1):3-6
本文针对野战地域通信网网络拓扑复杂并随战场环境发生变化的特点,提出了一种快速评价野战地域通信网可靠性的方法,给出了可靠性定量计算的数学解析式,该方法简单、直观,能反映网络拓扑的可靠性和抗毁性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号