期刊文献+

水面舰艇作战系统的模型集研究 被引量:3

Study of model aggregate for shipborne combat system
下载PDF
导出
摘要 构建合理的水面舰艇作战系统全系统模型,将为作战系统的标准化设计提供技术支持,并为后续的水面舰艇作战系统的优化提供技术基础。通过分析未来水面舰艇作战系统在全生命周期内的设计成果,提取系统设计的关键要素,利用树型结构的功能分解方法和多视图的可视化建模方法,提出了水面舰艇的作战系统模型集(包括功能模型、信息模型、物理模型)的主要组成、相互关系等。 To construct a reasonable model of shipborne combat system sustain the normal design and will be the base of the optimizing in the future. This paper analyzes the result of product life cycle, distill the crucial point of system design, use function decomposition of tree structure and multi-view visualization model method,purposes the composition, relationship of the model aggregate, such as the funetion model, information model, physical model.
出处 《舰船科学技术》 2009年第9期141-143,共3页 Ship Science and Technology
关键词 水面舰艇作战系统 模型集 shipborne combat system model aggregate
  • 相关文献

参考文献4

二级参考文献13

  • 1燕辉.论博客在企业知识管理中的效用及存在的隐患[J].图书馆学研究,2005(8):92-95. 被引量:20
  • 2ALGIRDAS A Z, JEAN-CLAUDE L, BRIAN R, et al. Basic concepts and taxonomy of dependable and secure computing[J]. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11-33.
  • 3LOCH K D, CARR H H. Threats to information system security: an organizational perspective[J]. System Sciences, 1991, 4(8-11): 551-557.
  • 4DAN S. Threats to enterprise security[EB/OL]. [2005-04-18]. Http://www. securitydocs.corn/library/321I.
  • 5The President's Critical Infrastructure Protection Board. The national strategy to secure cyberspace for comment (draft)[EB/OL].[2002-09-18]. Http://www.bespacific.com/ mr/archives/000108.htm.
  • 6SABNIS S, CHANDRASHEKHAR U, BASTRY E Challenges of securing an enterprise and meeting regulatory mandates[C]//12th International Telecommunications Net work Strategy and Planning Symposium. [S.l.]: IEEE, 2006: 1-6.
  • 7GUO Jian-dong, QIN Zhi-guang, ZUO Lin. An approach of AIS LAN based on Intel IXP2800[C]//The 2nd International Conference on Embedded Software and Systems. [S.l.]: IEEE, 2005:551-556.
  • 8PONISZEWSKA-MARANDA A. Security constraints in access control of information system using UML language[C]//15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. [S.l.]: IEEE, 2006: 332-337.
  • 9PONISZEWSKA-MARANDA A. Role engineering of information system using extended RBAC model[C]//14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise. [S.l.]: IEEE, 2005:154-159.
  • 10BAI Y, KOBAYASHI H. Intrusion detection systems: technology and development[C]//17th International Conference on Advanced Information Networking and Applications. [S.l.]: IEEE, 2003: 710-715.

共引文献15

同被引文献26

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部