首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于功能图的作战体系关键节点分析
引用本文:龚建兴,朱雷,王华兵,丁佩元,路程昭.基于功能图的作战体系关键节点分析[J].系统工程与电子技术,2022,44(8):2515-2521.
作者姓名:龚建兴  朱雷  王华兵  丁佩元  路程昭
作者单位:1. 国防科技大学智能科学学院, 湖南 长沙 4100732. 电子信息系统复杂电磁环境效应国家重点实验室, 河南 洛阳 471003
基金项目:国家重点实验室开放课题(CEMEE2018Z0302B)
摘    要:目前大多数基于网络拓扑的作战体系关键节点分析方法只是单纯考虑作战节点的拓扑连接关系, 缺乏从实际业务角度考虑体系中各节点在功能之间的相互依赖。而多数基于作战环的作战体系关键节点分析方法又需要分析人员具有很强的专业背景知识, 且存在分析数据难以获取等问题。基于此, 提出了一种基于功能图的作战体系关键节点分析方法。首先, 介绍了基于任务、反映作战体系功能的功能图概念。然后, 提出了基于功能图的度中心性、介数中心性、接近中心性、PageRank算法、节点移除和收缩等关键节点分析方法。最后, 以某作战体系为例, 作战环为其功能图, 采用介数中心性、接近中心性、基于功能图的介数中心性、基于功能图的接近中心性、基于功能图数量的节点移除法等关键节点分析方法对作战体系中关键节点进行分析, 验证了该方法的简单性、可行性及有效性。

关 键 词:作战体系  网络拓扑  功能图  关键节点  
收稿时间:2021-06-04

Analysis of key nodes in combat system based on function graph
Jianxing GONG,Lei ZHU,Huabing WANG,Peiyuan DING,Chengzhao LU.Analysis of key nodes in combat system based on function graph[J].System Engineering and Electronics,2022,44(8):2515-2521.
Authors:Jianxing GONG  Lei ZHU  Huabing WANG  Peiyuan DING  Chengzhao LU
Institution:1. College of Intelligence Science and Engineering, National University of Defense Technology, Changsha 410073, China2. State Key Laboratory of Complex Electromagnetic Environment Effect on Electronics and Information System, Luoyang 471003, China
Abstract:At present, most of the key nodes identification methods of combat system based on network topology only consider the topological connection of operational nodes, and lack of considering the functional interdependence of each node in the network from the actual behavior. Most of the key nodes identification methods of combat system based on operation loop require analysts to have strong professional background knowledge, and the analysis data are difficult to obtain. To solve these problems, key nodes identification methods of combat system based on the function graph are proposed. Firstly, the concept of function graph based on task and reflecting the function of combat system is introduced. Then, the key nodes identification methods of combat system based on function graph, such as degree centrality, betweenness centrality, closeness centrality, PageRank algorithm, node removal and contraction are proposed. Finally, taking a combat system as an example, the operation loop as the function graph, and the nodes in the combat system are analyzed by using key nodes identification methods such as betweenness centrality, closeness centrality, betweenness centrality based on function graph, closeness centrality based on function graph and node removal method based on the number of function graphs. The simplicity, feasibility and effectiveness of the method are verified.
Keywords:combat system  network topology  function graph  key nodes  
点击此处可从《系统工程与电子技术》浏览原始摘要信息
点击此处可从《系统工程与电子技术》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号