C4ISR(Command、Control、Communication、ComputerI、ntelligence、Surveillance and Reconnaissance)系统开发的仿真模型涉及多个应用领域,具有多粒度、阶段相关性等的特性。本文提出了C4ISR系统开发的仿真模型体系,给出了仿真模型的...C4ISR(Command、Control、Communication、ComputerI、ntelligence、Surveillance and Reconnaissance)系统开发的仿真模型涉及多个应用领域,具有多粒度、阶段相关性等的特性。本文提出了C4ISR系统开发的仿真模型体系,给出了仿真模型的规范化描述。建立了C4ISR系统开发的仿真概念模型,包括仿真实体、仿真实体的组织结构、接口连接关系、信息交互、功能、活动和动态行为,抽象地反映了C4ISR系统的组织结构、接口连接、信息交互、功能、活动等静态特征和动态特性;对C4ISR系统开发的仿真组件模型采用层次化设计的思想,分为原子仿真组件和复合仿真组件两类,每一仿真组件分为组件描述和组件实现两部分,组件描述部分采用格式化形式对组件模型进行全面的描述;对C4ISR系统开发的仿真组件模型进行Web服务封装,转换为以服务形式对外发布的仿真模型服务,定义了仿真模型服务的形式化描述。通过C4ISR系统开发的仿真模型体系和模型规范化描述,使各个开发阶段的仿真模型之间有机关联,促进了仿真模型的重用性和互操作性,提高了系统开发的仿真效率。展开更多
In wireless sensor networks,node localization is a fundamental middleware service.In this paper,a robust and accurate localization algorithm is proposed,which uses a novel iterative clustering model to obtain the most...In wireless sensor networks,node localization is a fundamental middleware service.In this paper,a robust and accurate localization algorithm is proposed,which uses a novel iterative clustering model to obtain the most representative intersection points between every two circles and use them to estimate the position of unknown nodes.Simulation results demonstrate that the proposed algorithm outperforms other localization schemes (such as Min-Max,etc.) in accuracy,scalability and gross error tolerance.展开更多
The filter-based reactive packet filtering is a key technology in attack traffic filtering for defending against the Denial-of- Service (DOS) attacks. Two kinds of relevant schemes have been proposed as victim- end ...The filter-based reactive packet filtering is a key technology in attack traffic filtering for defending against the Denial-of- Service (DOS) attacks. Two kinds of relevant schemes have been proposed as victim- end filtering and source-end filtering. The first scheme prevents attack traffic from reaching the victim, but causes the huge loss of legitimate flows due to the scarce filters (termed as collateral damages); the other extreme scheme can obtain the sufficient filters, but severely degrades the network transmission performance due to the abused filtering routers. In this paper, we propose a router based packet filtering scheme, which provides relatively more filters while reducing the quantity of filtering touters. We implement this scheme on the emulated DoS scenarios based on the synthetic and real-world Internet topologies. Our evaluation results show that compared to the previous work, our scheme just uses 20% of its filtering routers, but only increasing less than 15 percent of its collateral damage.展开更多
文摘C4ISR(Command、Control、Communication、ComputerI、ntelligence、Surveillance and Reconnaissance)系统开发的仿真模型涉及多个应用领域,具有多粒度、阶段相关性等的特性。本文提出了C4ISR系统开发的仿真模型体系,给出了仿真模型的规范化描述。建立了C4ISR系统开发的仿真概念模型,包括仿真实体、仿真实体的组织结构、接口连接关系、信息交互、功能、活动和动态行为,抽象地反映了C4ISR系统的组织结构、接口连接、信息交互、功能、活动等静态特征和动态特性;对C4ISR系统开发的仿真组件模型采用层次化设计的思想,分为原子仿真组件和复合仿真组件两类,每一仿真组件分为组件描述和组件实现两部分,组件描述部分采用格式化形式对组件模型进行全面的描述;对C4ISR系统开发的仿真组件模型进行Web服务封装,转换为以服务形式对外发布的仿真模型服务,定义了仿真模型服务的形式化描述。通过C4ISR系统开发的仿真模型体系和模型规范化描述,使各个开发阶段的仿真模型之间有机关联,促进了仿真模型的重用性和互操作性,提高了系统开发的仿真效率。
基金supported in part by the Key Program of National Natural Science Foundation of China(Grant No.60873244,60973110,61003307)the Beijing Municipal Natural Science Foundation(Grant No.4102059)
文摘In wireless sensor networks,node localization is a fundamental middleware service.In this paper,a robust and accurate localization algorithm is proposed,which uses a novel iterative clustering model to obtain the most representative intersection points between every two circles and use them to estimate the position of unknown nodes.Simulation results demonstrate that the proposed algorithm outperforms other localization schemes (such as Min-Max,etc.) in accuracy,scalability and gross error tolerance.
基金supported in part by the funding agencies of china:the Doctoral Fund of Northeastern University of Qinhuangdao(Grant No.XNB201410)the Fundamental Research Funds for the Central Universities(Grant No.N130323005)
文摘The filter-based reactive packet filtering is a key technology in attack traffic filtering for defending against the Denial-of- Service (DOS) attacks. Two kinds of relevant schemes have been proposed as victim- end filtering and source-end filtering. The first scheme prevents attack traffic from reaching the victim, but causes the huge loss of legitimate flows due to the scarce filters (termed as collateral damages); the other extreme scheme can obtain the sufficient filters, but severely degrades the network transmission performance due to the abused filtering routers. In this paper, we propose a router based packet filtering scheme, which provides relatively more filters while reducing the quantity of filtering touters. We implement this scheme on the emulated DoS scenarios based on the synthetic and real-world Internet topologies. Our evaluation results show that compared to the previous work, our scheme just uses 20% of its filtering routers, but only increasing less than 15 percent of its collateral damage.