The Design and Application of Information and Communication Networking Training Needs Analysis Simulation System

Article Preview

Abstract:

Based on the designing of information and communication networking training needs analysis simulation system, this paper studies some key technology about needs analysis simulation system’s and some practical problems during designing, combining with the primary work done by self. At first, based on the summary of the basic concepts of information and communication networking training needs analysis simulation system and domestic and overseas development status, needs analysis simulation system and its modeling, the technique of simulation is studied, and the basic concept and model frame of needs analysis simulation system’s are summarized. In succession, the primary project of simulation training system is demonstrated and designed, including analyzing the requirement of the system function, putting forward the principle of system design, confirming the framework of hardware and software and the configuration of computer, as well as doing some top design on the software system of simulation training such as module partition and function describing.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

251-254

Citation:

Online since:

October 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Robert Fischer, E.H., David Walters: Introduction to Security, Ninth Edition. ELSEVIER (2012).

Google Scholar

[2] Chen, Z.: The research and practice on the evalation of effectiveness on security system. China Security. 11, 5-7 (2007).

Google Scholar

[3] M.L. Garcia: The Design and Evaluation of Physical Protection Systems. Butterworth-Heinemann: Boston (2001).

Google Scholar

[4] Pollet, J.; Cummins, J.: In All hazards approach for assessing readiness of critical infrastructure. Technologies for Homeland Security, 2009. pp.366-372. IEEE Press, New York (2009).

DOI: 10.1109/ths.2009.5168060

Google Scholar

[5] Xu, P.; Su, X.; Wu, J.; Sun, X.; Zhang, Y.; Deng, Y.: Risk analysis of physical protection system based on evidence theory. Journal of Information and Computational Science. 7, 2871-2878(2010).

Google Scholar

[6] Nikoofal, M.E.; Zhuang, J.: Robust Allocation of a Defensive Budget Considering an Attacker's Private Information. Risk Analysis. 32, 930—943 (2012).

DOI: 10.1111/j.1539-6924.2011.01702.x

Google Scholar

[7] Hausken, K.; Zhuang, J.: The timing and deterrence of terrorist attacks due to exogenous dynamics. Journal of the Operational Research Society. 63, 726-735 (2012).

DOI: 10.1057/jors.2011.79

Google Scholar

[8] Golalikhani, M.; Zhuang, J.: Modeling Arbitrary Layers of Continuous-Level Defenses in Facing with Strategic Attackers. Risk Analysis, 31, 533-547 (2011).

DOI: 10.1111/j.1539-6924.2010.01531.x

Google Scholar

[9] Zhuang, J.; Bier, V.M.; Alagoz, O.: Modeling secrecy and deception in a multiple-period attacker-defender signaling game. European Journal of Operational Research. 203, 409-418 (2010).

DOI: 10.1016/j.ejor.2009.07.028

Google Scholar