共查询到20条相似文献,搜索用时 468 毫秒
1.
2.
3.
卫星网络建模与分布式仿真 总被引:2,自引:0,他引:2
卫星网络仿真是对卫星网络进行优化设计、性能分析、效能评估的有效途径.针对卫星网络的组成结构和运行特点,建立了卫星网络的节点模型、结构模型、链路模型和通信模型.在此基础上,基于HLA/RTI体系设计并实现了分布式卫星网络仿真系统,详细给出了各联邦成员的设计.该仿真系统通过编辑想定方案可灵活部署网络结构并能仿真星间、星地链路的通信过程,为仿真验证面向应用的卫星网络理论研究成果提供了一个通用的支撑平台.最后给出了一个3GEO 15MEO想定场景下的仿真结果,验证了模型的正确性和有效性. 相似文献
4.
5.
分布式导弹攻防对抗仿真系统的设计与实现 总被引:1,自引:1,他引:0
导弹攻防对抗仿真是评估弹道导弹突防效能的重要手段,是弹道导弹作战仿真与效能评估领域研究的热点之一.针对典型弹道导弹突防过程,理顺了导弹攻防仿真的运行流程,采用UML用例视图、类视图及行为视图对基于HLA的导弹攻防对抗仿真联邦进行了可视化建模.根据UML各可视化建模视图,完成了联邦对象模型模板(OMT)开发,采用运行支撑环境(RTI)与VC 对分布式导弹攻防仿真联邦进行了软件实现.应用实践表明,采用UML工具对导弹攻防对抗仿真联邦进行可视化建模,能够大大提高分布式导弹攻防仿真系统的开发进度与质量. 相似文献
6.
使用仿真技术构建的虚拟战场环境是一个一体化的仿真环境,能够支持联合指挥人员训练、使命演习和武器系统评估,能够实现对多兵种多武器平台的分布联合训练、指挥员的作战指挥能力训练以及战术想定方案的评价.该文简要介绍了分布式虚拟战场环境和HLA/RTI的基本概念和发展过程,构建了水陆坦克模型以及相应的虚拟战场环境,运用MultiGen Creator先进的三维模型建模工具软件开发出基于HLA/RTI的水陆坦克视景仿真软件.文中给出水陆坦克类在对象模型模板文件中的定义及联邦执行数据文件中的定义,展示了部分OpenGVS程序和视景驱动程序的实现代码并介绍了其编程实现过程. 相似文献
7.
8.
为使空间任务论证仿真系统具有可重用性和扩展性,将异类运行支撑环境(runtime infrastructure,RTI)连接技术引入其中,使其能够在不同任务的论证过程中使用已有的联邦成员.通过分析高层体系结构(high level architecture,HLA)在该系统中的应用关键技术,以及基于桥接盟员和异类RTI的概念,设计并实现了桥接软件以连接采用不同RTI建立的联邦成员,从而能够快速构建针对不同任务的空间任务论证仿真系统.对桥接软件的时间推进请求响应速度进行了测试,实验结果表明该桥接软件高效且可行. 相似文献
9.
为实现多无人机编队的飞行仿真,提出了多无人机编队的飞行仿真系统设计方案。在对系统需求分析的基础上,设计了仿真系统的总体组成。以高层体系结构(High Level Architecture,HLA)作为框架,利用三维可视化建模工具Creator、视景仿真软件Vega Prime和HLA仿真支撑平台RTI,开发了基于HLA/RTI进行分布式仿真的多无人机编队飞行系统框架。RTI为通信支撑层,建立了多机实时通信的飞行仿真系统,由管理者发号施令,并将飞行结果实时存储,仿真人员可进行分析,改进飞行效果。 相似文献
10.
11.
12.
社会网络分析(Social Network Analysis,SNA)方法是指挥控制关系研究领域新近引入的一种有效的定量分析方法。研究了构建C2组织的指挥控制关系网络模型的基本方法,将组织的实体要素划分为侦察单元、决策单元和执行单元三类;从社会学的角度分析了C2组织中指挥控制权力的“影响”和“支配”两个维度,并重新定义了指挥控制关系;将实体单元和单元之间的指挥控制关系抽象为网络模型的点和边。结合想定示例,具体说明了网络模型的构建方法,并以指挥控制关系的“点度中心性”为例对模型进行了实际的计算和分析。研究表明,基于社会网络分析方法的指挥控制关系建模与分析具有现实意义和实用价值。 相似文献
13.
14.
The Multilateral Interoperability Programme (MIP) was established to promote more successful and better harmonized operational functions for international peace-keeping forces. The C2IEDM/JC3IEDM (Command and Control Information Exchange Data Model) ensures the interconnection of Command and Control Information Systems (C2ISs) throughout all levels, from the corps down to the lower ranks. The usability of C2ISs highly correlates with the capacities of data information carriers, and the need is growing for greater capacity and reliability of transmission media and cryptographic message security. Simulation of tactical networks is an important task in planning military missions. Such methodologies assure a higher probability of success during critical tactical operations. This article focuses on a new radio network modeling method for the C2IS, which is verified by the OPNET simulation environment. This modeling method can be used in tactical radio network planning and optimization processes. 相似文献
15.
Wayne Madsen 《Computer Fraud & Security》2001,2001(5):7-8
Representatives of various US Government agencies trumpeted the benefits of biometric identification at the Biometrics 2001 Conference held in Arlington, Virginia. The conference was cosponsored by AFCEA International and the Department of Defense (DoD) Biometrics Management Office (DBMO). The DBMO’s director, Phillip Loranger, announced his desire for the Pentagon’s new Biometrics Fusion Center in Bridgeport, West Virginia to become a “repository for all DoD biometric databases.” Loranger’s boss, Army lieutenant general Peter Cuviello, the Army’s director of information systems for Command, Control, Communications, Computers and Intelligence (C4I), said that although he did not see the Biometric Fusion Center growing in size to compete with the FBI’s Integrated Automated Fingerprint Identification System (IAFIS) — which is also located in West Virginia — he could see data being fused into his centre from non-DoD players like the FBI. 相似文献
16.
17.
本文利用Qt跨平台语言开发实现了一种基于透明IPC/S架构的图形协同标绘系统,解决了协同标绘访问控制、QPainter多线程冲突、多方标绘并发冲突等技术难点,并在某指控系统原型中予以具体应用。 相似文献
18.
Summary We have presented models for multitype job traffic in a simple cyclic queueing model of a multiprogramming computer system (termed MM models), and have shown how such models may yield numerical results by use of a variation of the Gauss-Seidel iteration algorithm. Lastly, we have indicated the manner in which a simple Gordon and Newell Markov model be fitted to MM data, and have shown that satisfactory predictions of some system characteristics may be obtained thereby.Research sponsored in part by the Command and Control Technical Center of the Defense Communications Agency, and in part by NSF under grant number AG476 at the Naval Postgraduate School 相似文献
19.
20.
Rome Laboratory is a U.S. Air Force laboratory within the Air Force Material Command that plans and executes an interdisciplinary program in research, development, testing, and technology transition in support of Air Force Command Control, Communications and Intelligence activities for all Air Force platforms. Rome Laboratory has conducted an extensive research and development effort into the identification and measurement of software quality characteristics for the past twenty years and is considered by most experts as the international leader in this field. The authors have built upon this foundation and their own experience as practitioners of software quality measurement via the Rome Laboratory Framework. They have successfully applied this methodology in the industrial and scientific communities for the past fifteen years. This paper describes, based on a series of lessons learned, techniques for implementing a software quality measurement (metric) program toreal software development applications in areal competitive environment. Reference is made to results obtained in past applications and to a recently released guidebook for applying the framework. Potential problem areas are defined, concerns listed, background information given, case histories discussed, and guidebook topics outlined. 相似文献