-
32141.混合DSRC-PCMS信息系统扫雪作业和施工区的发展
[信息传输、软件和信息技术服务业,计算机、通信和其他电子设备制造业] [2014-07-28]
Congestion and hazardous traffic situations for the drivers on the road can occur around work zones and snowplow operation during the winter season due to low visibility. An information warning system for such environments can improve traffic mobility and thereby driver safety. Intelligent transportation systems (ITS) and other related technologies are being aggressively pursued to devise such automated traffic-information systems. Dedicated short-range communication (DSRC) has been considered as a key enabling wireless communication technology to realize such automated traffic warning systems. DSRC-based traffic-information systems use vehicle-to-vehicle (V2V) and/or vehicle-to-infrastructure (V2I) communication using DSRC technology to acquire and disseminate travel safety information. To take advantage of the disseminated information messages, a vehicle needs to be equipped with DSRC technology.
关键词:车安全;通信系统;信息系统;无线通信
-
32142.商用车安全应用的性能要求进展—最终报告201006-201103
[计算机、通信和其他电子设备制造业,信息传输、软件和信息技术服务业] [2014-07-28]
The U.S. Department of Transportation is conducting research to accelerate the widespread adoption of vehicle-to-vehicle (V2V) technology in commercial vehicles such as heavy trucks and buses. The widespread deployment of V2V safety is dependent on understanding the effectiveness of safety applications. The objective of this study was to determine the high-level performance requirements for potential V2V safety applications that are appropriate for commercial vehicles. This objective was accomplished via a 9-month project that involved reviewing literature covering collision avoidance systems currently available on heavy commercial vehicles, interviewing commercial vehicle industry representatives (manufacturers, suppliers, and fleet operators) to determine suitable crash avoidance technologies for the V2V communication, and identifying and developing high-level performance requirements for the selected commercial vehicle safety applications.
关键词:通信;商业车辆安全;碰撞避免技术性能要求;防撞系统
-
32143.移动自组网的有效通讯:战术通信移动自组织网络路由方案的分析
[信息传输、软件和信息技术服务业,计算机、通信和其他电子设备制造业] [2014-07-28]
Warfighting based on Commander s Intent and Mission Tactics will remain the foundation of command and control, but the information structure that supports Marine Corps tactical units will continuously undergo changes based on developments in information technology. Mobile Ad Hoc Networking is one of the information technology developments that the Marine Corps is currently studying. Mobile Ad Hoc Network s (MANETs) are infrastructureless, highly mobile communications and their multi-hop routing capabilities have the potential to reliably and robustly extend existing networks to the tactical edge. There are many challenges to MANET implementation however, including management of the dynamic physical topology, and the efficient use of limited spectral and energy resources. One platform being tested by the Marine Corps utilizes a time-division multiple access (TDMA) scheme combined with Barrage Relaying to ensure robust communications. Other schemes for MANETs employ intelligent-routing protocols. This thesis examines those protocols and identifies the parameters needed to implement a tactical MANET routing scheme. The findings of this research advance understanding of MANETs and the elements necessary to enable their use in support of tactical communications; bringing the Marine Corps closer to its goal of lightweight and efficient tactical communications.
关键词:网络;路由;战术通信;通信和无线电系统;基础(结构)
-
32144.QR分解与列主的避免通信排名揭示
[信息传输、软件和信息技术服务业,计算机、通信和其他电子设备制造业] [2014-07-28]
In this paper we introduce CARRQR, a communication avoiding rank revealing QR factorization with tournament pivoting. We show that CARRQR reveals the numerical rank of a matrix in an analogous way to QR factorization with column pivoting (QRCP). Although the upper bound of a quantity involved in the characterization of a rank revealing factorization is worse for CARRQR than for QRCP, our numerical experiments on a set of challenging matrices show that this upper bound is very pessimistic, and CARRQR is an effective tool in revealing the rank in practical problems. Our main motivation for introducing CARRQR is that it minimizes data transfer, modulo poly- logarithmic factors, on both sequential and parallel machines, while previous factorizations as QRCP are communication sub-optimal and require asymptotically more communication than CARRQR. Hence CARRQR is expected to have a better performance on current and future computers, where communication is a major bottleneck that highly impacts the performance of an algorithm.
关键词:通信;数据传输;QR分解;通信优化算法
-
32145.9/11事件后总统府通讯分析
[信息传输、软件和信息技术服务业,计算机、通信和其他电子设备制造业] [2014-07-28]
The use of public diplomacy is an essential component of counterterrorism efforts, but, to date, the United States has not been as effective in its attempts to utilize strategic communication against the threat of violent Islamic extremism as it has been in its utilization of military, intelligence, and law enforcement resources. Based upon the idea that a retrospective analysis of previous presidential speeches could provide guidance for future strategic communications of U.S. government officials, this thesis identifies the nature of the messages delivered by U.S. Presidents to foreign audiences since the 9/11 attacks through a qualitative analysis of a purposeful sampling of 50 speeches and statements. The analysis examines the position of the United States government in the ideological debate with violent Islamic extremists to determine whether the United States has taken a largely defensive stance, in which the United States constantly strives to counter the narrative of violent extremist adversaries, or a more forward-leaning posture, in which the United States remains primarily concerned with presenting its own narrative based on its values and ideals. The results of this analysis are then utilized to offer recommendations on modifying the message to better support U.S. efforts to combat violent Islamic extremism.
关键词:战略沟通;意识形态;知觉(心理学);通信
-
32146.陆军团司令部通信网时间序列建模:事件驱动分析
[信息传输、软件和信息技术服务业,计算机、通信和其他电子设备制造业] [2014-07-28]
We examine the communication time series of a fully-networked Army coalition command and control organization. The communications and scenario- event data described in this paper were collected at a two-week U.S. Army simulation-based training event. The Mission Command Battle Laboratory at Fort Leavenworth, Kansas, conducted a joint experiment/training exercise focused on the operations of the mission command staff composed of a U.S. Division headquarters (n=51) and subordinate U.K. Brigade headquarters (n=28). The network architecture and digitized nature of the event allowed examination of staff communications in a distributed, network-enabled coalition environment. The participants were active duty Soldiers and officers, organic to their military unit. We used time series analysis to predict the communications record based on an external work variable of the number of important scenario events occurring across time. After taking into account structural features of the time series, we examined the remaining variability in email and phone communications. We found that the exercise scenario events were not a significant predictor of the Divisional communications, which were best fit by an auto-regressive model of order 1. The occurrence of scenario events, however, did predict the Brigade communications time series, which were well fit by a lag dependent variable model. These results demonstrate that Brigade communications responded to and could be predicted by battlefield events, whereas the Division communications were only predicted by their own past values. These results highlight the importance of modeling environmental work events to predict organizational communication time series and suggest that network communications are perhaps increasingly dependent upon battlefield events for lower echelons of command closer to the tactical edge.
关键词:指挥和控制系统;通信网络;联合军事活动;时间序列分析
-
32147.重叠的计算和通信:阻隔算法和的ConnectX-2核心直销能力
[计算机、通信和其他电子设备制造业,信息传输、软件和信息技术服务业] [2014-07-28]
This paper explores the computation and communication overlap capabilities enabled by the new CORE-Direct hardware capabilities introduced in the InfiniBand (IB) Host Channel Adapter (HCA) ConnectX-2. These capabilities enable the progression and completi
关键词:计算;计算机通讯;算法;障碍;电脑硬件
-
32148.基于P2P对木马的混合通信模式的研究
[信息传输、软件和信息技术服务业,计算机、通信和其他电子设备制造业] [2014-07-28]
Direct connection and reflective connection are commonly used in traditional Trojan's communication model,which have some significant deficiencies in hiding,anti-tracking,and efficiency.To improve the aspects above in traditional Trojan horse communication model,the author proposed a hybrid communication model based on P2P technology.The model uses P2P intranet penetration protocol to build the channel between the controlled station and the control station,and uses P2P node servers for saving the Trojan's status and transferring some data between the controlled and the control.The topology of networks for controller will be very flexible.Using the IP traceback technology will be difficult to track the controllers.Using UDP protocol in the hybrid communication model for data transmission will hide the network status.Control sites can work in distributed mode.By using the model,the hiding-ability,anti-traceability and communication efficiency will be greatly improved.
关键词:木马;通信模型;P2P;UDP穿透;内联网外显
-
32149.美国宽带测量:美国二月份消费者有线宽带性能报告
[信息传输、软件和信息技术服务业,计算机、通信和其他电子设备制造业] [2014-07-28]
This 2013 Measuring Broadband America February Report contains the most recent results from the Federal Communication Commissions (FCC) Measuring Broadband America program. This program, whose first results were published in August 2011, is an ongoing, rigorous, nationwide study of residential broadband performance in the United States. This study, like those conducted before, involves actual performance tests for thousands of subscribers of Internet Service Providers (ISPs) serving well over 80 percent of the residential market. Our initial Measuring Broadband America Report presented the first broad-scale study of actual consumer broadband performance throughout the United States. This effort was followed approximately a year later by a second report, released in July 2012, and now the present report. As explained in the accompanying Technical Appendix, each report in this series is based on measurements taken during a single reference month that has been chosen to represent a typical usage period for the average consumer. The reference month for the first report was March 2011, and the collection period for the second report, initially set for March 2011, was shifted to April 2012 to ensure collection of a sufficient amount of valid data. The reference month for this report is September 2012, five months after the previous testing period. As such, we present this as a supplemental report, noting that substantive network change is best measured in years, not months. Going forward, we plan to repeat testing each year in the month of September, and transition to annual reporting. In this report, we are pleased to include results on satellite technology for the first time, based on test results collected from ViaSat, a major satellite services provider. While in the past we have collected and released raw data on satellite performance, we have not reported on test results from this technology, as we recognized that the industry was on the verge of a major transition. In 2011, the satellite industry began launching a new generation of satellites offering performance as much as 100 times superior to the previous generation, leading to the entry of new satellite-based broadband providers. Consequently, we are now able to include comparisons between satellite and wireline technologies in this report.
关键词:电信;宽带;通信;互联网服务提供商(ISP)
-
32150.信任对战术网络安全性和性能的影响
[计算机、通信和其他电子设备制造业,信息传输、软件和信息技术服务业] [2014-07-28]
Traditional approaches to networking and security operate with static metrics and a black-and-white approach to decision-making. With the advent of network-centric environments and the emerging consideration of the impact of social networks on communications networks, we are forced to better understand how these additional factors can be used to improve networking services without assuming an unacceptable amount of risk. In this paper, we consider the implementation of trust metrics into various network protocols and security services. Our trust metric considers the impact of parameters of communication, information, and social networks. Using these parameters, we have developed composite trust metrics and applied them to the decision-making process within these protocols to replace the traditional approaches. The goal is to allow these trust-based protocols to operate in the gray area to improve performance and the range of operating conditions. We have studied tradeoffs between performance and security and trust and risk to identify optimal operating conditions of networks to maximize performance in several networking applications.
关键词:指挥和控制系统;通信网络;通信协议;计算机网络安全