In order to solve the problem that previous relation researches in operational task-resource matching are hard to flexible computing for generating a new matching scheme from the existing scheme under the condition of...
详细信息
Multi-Resolution Model and simulation(MRMS) technology is an important Aspect in the complex large systemsimulation field with important value to decrease model computation complexity to increase the simulation effic...
详细信息
ISBN:
(纸本)9789811136719
Multi-Resolution Model and simulation(MRMS) technology is an important Aspect in the complex large systemsimulation field with important value to decrease model computation complexity to increase the simulation efficiency. Since the bottleneck of the MRMS at the aspect of Model consistence maintenance, aggregation-disaggregation(A/D) algorithm, chained disaggregation problem and so on, this paper proposed a non-consistence A/D MRMS method which won't seek overtop Model consistence and allows cross Resolution interaction at the accept range of caused errors. Introduced the basic idea and the Agent Model with the parameterization A/D algorithm and Battle simulation experiment of Weapon Equipment SoS was took to validate it. The result indicated the ability of performance increase and the simulation errors caused by A/D operation can be controlled, What's more, this technology is easy to realize and so threw away a brick for the development of the MRMS application.
In allusion to the three problems of conventional D-S(Dempster-Shafer) evidence theory, this paper proposes an improved Dempster fusion rule based on weight preprocessing. By comparing the fusion results with conventi...
详细信息
ISBN:
(纸本)9781510840232
In allusion to the three problems of conventional D-S(Dempster-Shafer) evidence theory, this paper proposes an improved Dempster fusion rule based on weight preprocessing. By comparing the fusion results with conventional method and other improved methods, we conclude that the method in this paper is more superior in dealing with uncertainty, and more reasonable in processing the evidence weight.
The vulnerability of network or information system is the inherent reason for the existence of security risks and security risks. External threats exploit the vulnerability of the network or information system to laun...
详细信息
The vulnerability of network or information system is the inherent reason for the existence of security risks and security risks. External threats exploit the vulnerability of the network or information system to launch attacks. Therefore, in the field of network security risk assessment technology, security vulnerability analysis takes an important position and is the basis for a network security risk assessment. This paper mainly reviews the research status of network security vulnerability analysis methods, network security quantitative evaluation method and real-time evaluation method of network security.
This paper proposed a novel attack-defend game based on failure rate and mean time to repair. The game method can exclude irrational strategies and take network availability loss into account. It can also reduce compu...
详细信息
This paper proposed a novel attack-defend game based on failure rate and mean time to repair. The game method can exclude irrational strategies and take network availability loss into account. It can also reduce computation complexity. The experiment validates the application of game model optimization and attack prediction, and discusses further expansion of the method.
With the increment of the scale of the network, the task of large-scale network data becomes more difficult. In the process of network drawing, it is difficult to fully reflect its internal structure. This study propo...
详细信息
With the increment of the scale of the network, the task of large-scale network data becomes more difficult. In the process of network drawing, it is difficult to fully reflect its internal structure. This study proposes to model the whole network as a multi-particle simulationsystem, experiment results show that the proposed method can effectively reduce the time complexity of the network layout algorithm and efficiently show the network structure characteristics.
The traditional analysis simulations are generally based on the time stepping mechanism in HLA. This method will greatly affect the simulation efficiency due to in a period of time no events occurred. This paper attem...
详细信息
ISBN:
(纸本)9781510840232
The traditional analysis simulations are generally based on the time stepping mechanism in HLA. This method will greatly affect the simulation efficiency due to in a period of time no events occurred. This paper attempts to simulate high-level missile attack and defense using discrete event simulationtechnology, avoiding the idle phenomenon. This paper modifies the state diagram modeling method's shortcomings, that is, events can not be generated from the activities and activities can not be detailed. According to this method, the radar reconnaissance and interference equipments and missiles in missile attack and defense are simulated by discrete events which prove the effectiveness of solving missile attack and defense problems.
Network visualization is a time-honored research direction, which can be traced back to the graph *** data of dynamic network is constantly updated, which brings some challenges to dynamic network visualization. Dynam...
详细信息
Network visualization is a time-honored research direction, which can be traced back to the graph *** data of dynamic network is constantly updated, which brings some challenges to dynamic network visualization. Dynamic network visualization mainly includes network layout, network property visualization and user interaction, therefore, this paper focuses on the research and review of some key technologies,including layout technology, visualization technology and interactive technology. The aim of this paper is to provide some technical support for the research of the key technology of dynamic network visualization.
Visual analysis on network security is a new area,it consists methods and technology of visualization and network security analysis,which has new *** on network security visualization have done certain extent research...
详细信息
ISBN:
(纸本)9781467399050
Visual analysis on network security is a new area,it consists methods and technology of visualization and network security analysis,which has new *** on network security visualization have done certain extent research and accumulated *** with the rapid development of visual analysis,visual network security analysis achieved rich results in recent ***,there is less study on basic research framework and principle of security visualization analysis,this dissertation summarizes concerned problems in the field of security analysis,data sources,visual analysis techniques and related overview of visual analysis *** analysis of these systems,network security visualization on the research questions can be tested and directions for future research can be provided.
On the basis of integrating each subsystem in topological structure,implementation function,operation mode and institutional mechanism,this paper has established a comprehensive service system which could manage vario...
详细信息
On the basis of integrating each subsystem in topological structure,implementation function,operation mode and institutional mechanism,this paper has established a comprehensive service system which could manage various heterogeneous resources and handle kinds of complex missions within the architecture to carry out the research of the resource scheduling architecture for service-oriented space-based information ***,this paper analyzes the characteristics of space-based information system from two aspects of diversity and *** on the research,this paper studies the organizational structure of resource scheduling of space-based information system to realize the unified management and scheduling of service-oriented diversification resources following the sequence from resources to ***,this paper has proposed a resource scheduling mode for the service-oriented space-based information system to realize the mapping from resources to missions,and it also has used that mode to block differentiated user requirements and the dynamic changes of the *** the end,the paper has put forward the implementation plan of the resource scheduling for service-oriented space-based information system,and it also provides a reference for the next construction of the space-based information system.
暂无评论