The traditional Tactical Internet (TI) simulative training didnt consider the terrain environment and maneuver simulation, so its fidelity was low. The paper aimed to resolve it. Firstly, the paper gave the modeling process of TI terrain environment, and put forward the corresponding ways to some parts of the modeling process. Secondly, the paper gave the optimization steps of TI terrain model, it improved the simulation running efficiency; and then the paper utilized the large area database management technique to solve dynamic loading and rendering problem of large terrain model. Lastly, the paper gave the maneuver simulation way to the communication vehicles of TI, it solved the problems of maneuver collision and precise maneuvering along the road. The paper presented the realization results in each part, and it proved the effectiveness of the given ways.
Advanced persistent threat (APT) has become a serious chanllenge to network security in recent yeas. Characteristics of this kind of network attack involve purposiveness,concealment,sustainability and variability, and it is hard to protect for critical infrastructure, financial systems, elements of national power, etc. These threats range from unwitting hackers to nation-states, each at various levels of competence. For performing security protection, five typical cases of APT including Night Dragon attack, Google Operation Aurora, RSA SecurID attack, Stuxnet attack and Shady Rat attack were analyzed. Its commonly attack process and technology characteristics are summarized. Finally, some suggestions and opinions on secrutiy protection were presented.
Due to specific requirement of command business in command information system, reliability and excution efficiency of command business are put particular emphasis. So the two factors had been seen as primary consideration conditions when command business services selection methods were researched. In view of reliability of multiple command business redundancy, a method for command business services selection based on execution efficiency and reliability restraint was put forward by introducing idea of software fault-tolerant in services selection stage. Within this method, the reliability computation method of command business composite services was given and the selection model of command business adding execution efficiency restraint was presented. Finally, the services selection algorithm and experiments were designed to confirm the method.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.