CN101937486A - Information support capability evaluation analysis method of complex system - Google Patents

Information support capability evaluation analysis method of complex system Download PDF

Info

Publication number
CN101937486A
CN101937486A CN2010101648047A CN201010164804A CN101937486A CN 101937486 A CN101937486 A CN 101937486A CN 2010101648047 A CN2010101648047 A CN 2010101648047A CN 201010164804 A CN201010164804 A CN 201010164804A CN 101937486 A CN101937486 A CN 101937486A
Authority
CN
China
Prior art keywords
information
node
analysis
tenability
model
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010101648047A
Other languages
Chinese (zh)
Inventor
刘晓明
裘杭萍
权翼川
陈彬
董庆超
鲍广宇
刘勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PLA University of Science and Technology
Original Assignee
PLA University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PLA University of Science and Technology filed Critical PLA University of Science and Technology
Priority to CN2010101648047A priority Critical patent/CN101937486A/en
Publication of CN101937486A publication Critical patent/CN101937486A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an information support ability evaluation analysis method of a complex system. The method comprises the following steps of: establishing a system capability requirement model, establishing an information advantage support capability evaluation model, and evaluating the information advantage support capability. The method performs modeling analysis to the integrity, the correctness, the updatability, the importance, the authenticity and the reliability of information based on information quality, a quantitative evaluation method for information advantages is provided, the information advantages are comprehensively evaluated by a radar map method, so that the analysis is more scientific, and the pertinence is more strong. The method can be used for guiding the architecture design of military information systems and the organization application of the systems in battles.

Description

The information tenability analysis and assessment method of complication system
Technical field
The present invention relates to a kind of information tenability analysis and assessment method of complication system, especially relate to architecture Design, the system integration and the tissue utilization of military class catenet infosystem.
Background technology
On information-based battlefield, can obtain Information Superiority most important.The effect of Information Superiority mainly shows three aspects: the one, effectively use the ability of strength.Under the guarantee of Information Superiority, the commanding officer can control each stage and each link of operation, can distribute according to formulation, rehearsal and the weapon of task scheduling, dynamically command and assemble information, supervision, the scouting resource of tactics, fight and decrease assessment and be used to guarantee that precision strike weapon and army optimize the combat assessment that uses.The 2nd, the situation of battlefield perception.Comprise: wartime is to enemy, my (containing friend side), position of neutral each side and the acquisition capability of motion and geographical environment of living in each side information such as (as landform, weather, depth conditions); To all combat troops and support unit, from the joint force command to individual soldier, provide the ability of shared battlefield picture; In the hostile environment condition with suffer to improve the ability of identification and location situation of battlefield feature under the situation that the enemy disturbs.The 3rd, reliable network service capabilities.Have global UNICOM, flexibly, can organize the network service of structure rapidly, auxiliary automatically domestic consumer is visit information and in case of emergency the guaranteeing ability of serving easily.
At present, research in this regard both at home and abroad still is in the theory study stage, to the quantitative evaluation of Complex Information System Information Superiority tenability concentrate on mainly that information is obtained, the research of index analysis, quantification and the assessment models method of information processing and message transmitting procedure, but these evaluation indexes are more single, index system is set up perfect inadequately, and can't or be difficult for obtaining the relevant rudimentary data in the Design ﹠ Analysis of System stage, also can't embody the degree of support of Complex Information System in addition dynamic concrete mission task.
Summary of the invention
In order to overcome the deficiencies in the prior art, the object of the present invention is to provide a kind of tradition and effective standard and make things convenient for the analytical approach of complication system information tenability assessment of breaking through.
The present invention is achieved through the following technical solutions:
1, a kind of Information Superiority tenability analysis and assessment method of complication system may further comprise the steps:
(1) sets up the ability need model
Ability is meant that main body is for finishing mission or task should possess basic quality and condition, the step that ability need is analyzed comprises: mission task analysis, activity analysis, node/entity analysis and capability analysis, node relationships model, operation information model and operation motility model, i.e. ability demand model finally obtain fighting;
(2) set up Information Superiority tenability assessment models
At first utilize various kinds of sensors to collect the relevant representation of data and the characteristic of the battlefield fact in the physical domain by the information gathering in the information field; Information processing in the information field is merged the various kinds of sensors information of collecting then, generates situation of battlefield, promptly public operation picture CROP according to the result who merges; The public operation picture that utilizes distribution of information in the information field to merge then to generate sends to each combat unit, makes whole combat units can share the situation of battlefield that perceives, and generates Information Superiority tenability assessment models;
(3) appreciation information advantage tenability
Around information quality, from a plurality of angles of information integrity, correctness, renewal, importance, authenticity and reliability the operation information of systematic collection, processing and distribution is analyzed and assessed, be i.e. appreciation information advantage tenability;
(4) based on the key node searching algorithm of Information Superiority
Connect network chart G by the draw operation node of system of given ability need structure of models; Connect the connective matrix R that network chart is derived meshed network by the operation node; Find the solution the in-degree and the out-degree of each node in the network respectively, and calculate the interconnectedness of each node; In-degree and out-degree according to node sort respectively to node from big to small, form two Q1 of node queue and Q2; Determine the relative importance of node according to the sequence number of node in two formations; According to precedence from the relative importance formation before the selected parts formation of plurality of nodes as object queue; Determine local optimum key node collection based on Information Superiority; Determine the key node collection N of global optimum ObjAnd corresponding I Obj, N ObjBe the operation node set that to lay special stress on protecting.
The described mission task analysis of step (1) key is evaluating objects, and target is decomposed refinement, obtains the target analysis tree, and finds out the conflict relationship between the target.
Activity analysis is after hard objectives, and activity flow process and the state variation of finishing target are analysed in depth, and message exchange is to the influence of development of the activity between the resource constraint of description node and the node.
Node/entity analysis is for describing the node of participation task, interactive relation between the analysis node, determine internodal message exchange, the role who comprises in the analysis entities, organizational resources and physical resource, set up comparatively integrated entity conceptual model, set up the Target Assignment model of target simultaneously to node.
Capability analysis is based on above analysis and model, and the mutual relationship between recognition capability, ability is set up and improved capability model,
The battlefield fact in the described physical domain of step (2) comprises: the attribute of the combat unit that both sides at war are all, type, quantity, the various sensory devices that both sides have, both sides' operation intention, plan.
The invention has the beneficial effects as follows: effective standard of method of the present invention and the assessment that has made things convenient for complication system information tenability, on theoretical method system, having broken through the notion that traditional single index is estimated, is the important support means of complication system integrated analysis of new generation and design.
Description of drawings
Fig. 1 is the process flow diagram of one embodiment of the invention;
Fig. 2 is an ability need analytical framework synoptic diagram of the present invention;
Fig. 3 is an Information Superiority tenability assessment models of the present invention;
Fig. 4 is an Information Superiority evaluation index system synoptic diagram of the present invention;
Fig. 5 is an information tenability comprehensive assessment result schematic diagram of the present invention;
Fig. 6 is that operation node of the present invention connects network diagram.
Embodiment
Below in conjunction with accompanying drawing, describe the specific embodiment of the present invention in detail:
1, overall implementation
The present invention proposes a kind of new complication system information tenability analysis and assessment method, realization is driving with the ability need model, integrated information tenability assessment models and key node heuristic search algorithm, the Information Superiority of analysis and assessment complication system and information tenability.Fig. 1 is a process flow diagram of the invention process.
As shown in Figure 1, said process by set up the ability need model, generate the information distribution network model, set up information tenability assessment models and Information Superiority, the assessment of information tenability forms.
2, specific implementation step
(1) sets up the ability need model
Ability is meant function and the usefulness performance that system (infosystem, weaponry system and army) is integrated, is the important embodiment of troop operation ability.The fundamental of formation ability notion comprises ability itself, mission task, activity, node and the ability configuration that is made of entity etc.
Capability-based system requirement analysis thinking is: start with from operation mission and task, analyze Operation Target, surrounding target makes up operation use-case and motility model, and then obtains ability need.It is a process model top-down, all linked with one another that ability need is analyzed with obtaining, and comprising: mission task analysis, activity analysis, node/entity analysis and capability analysis.Ability need analytical framework synoptic diagram as shown in Figure 2.
The first step: the mission task analysis is basic point and the starting point that operational need is analyzed.Mission task analysis key is evaluating objects, and target is decomposed refinement, obtains the target analysis tree, and finds out the conflict relationship between the target.
Second step: activity analysis, after hard objectives, activity flow process and the state variation of finishing target are analysed in depth, message exchange is to the influence of development of the activity between the resource constraint of description node and the node, and the careful degree and the order of accuarcy key of the ability need of obtaining depend on this step.
The 3rd step: node/entity analysis, the node of description participation task, the interactive relation between the analysis node is determined internodal message exchange, the role who comprises in the analysis entities, organizational resources and physical resource are set up comparatively integrated entity conceptual model.Can set up simultaneously the Target Assignment model of target to node.
The 4th step: capability analysis, based on above analysis and model, the mutual relationship between recognition capability, ability is set up and is improved capability model.
The whole process that ability need is analyzed is the iterative process of a complexity, and finally the form with the ability need model provides the information system architecture design, comprises node relationships model, information model and motility model etc.
Operation node relationships model: the operation node is an elementary cell of finishing operation mission and task, is logic node.If constitute conspiracy relation between the operation node, then there is message exchange, represent with the demand line.Operation node relationships model description the message exchange between all the operation nodes in the system, the node, and the operation entity of forming node.
The operation information model: described the message exchange between the operation node in the operation node relationships model, the operation information model then is the detailed description to exchange message.The attribute of operation information mainly comprises key, information element, the information content, sending node, transmission activity, receiving node, reception activity, urgency level, importance and weight etc.
The operation motility model: it is to finish the operation activity that combat duty is carried out that the operation motility model has been described the operation node, and the input/output information that exchanges between operation activity stream.The operation motility model has been described fight capability, and has set up between ability and combat duty and got in touch.Information that having comprised in the operation motility model partly fights exchanges between the node and mutual logical relation can be used for improving the information distribution network that is derived by operation node relationships model.Simultaneously,, can classify from the angle of information processing, as collector node, the processing node that can be divided into information, utilize node etc. to the operation node by the dissimilar activity that takes place on the operation node.This helps the feature of node in the information distribution network is discerned, thereby the branch of analytical information is distributed as effectively.
(2) set up Information Superiority tenability assessment models
Information Superiority on the battlefield is presented as can be in time, exactly the battlefield fact in the physical domain is collected, handled, be converted to the Useful Information that can be used by the commander, and can be distributed to each combat unit in good time, swimmingly, to share situation of battlefield.The battlefield fact in the physical domain comprises: information such as the attribute of the combat unit that both sides at war are all, type, quantity, the various sensory devices that both sides have, both sides' operation intention, plan etc.According to the treatment scheme of battle field information, the operating process in the information field can be divided into three phases: information gathering, information processing, distribution of information.Information gathering refers to utilize various kinds of sensors to collect contents such as the relevant representation of data of the battlefield fact, characteristic, stresses the characteristic attributes such as detection probability, measuring accuracy, area coverage of sensor during quantitative test.Information processing mainly refers to the various kinds of sensors information of collecting is merged, and generates situation of battlefield, promptly public operation picture CROP according to the result who merges.When being carried out quantitative test, the process of information fusion pays attention to outstanding information fusion for the improvement of information quality and the time that generates public operation picture.Fig. 3 is above-mentioned Information Superiority tenability assessment models.
Generally speaking, various kinds of sensors belongs to the information gathering node, and information center or fusion center belong to information processing node, and various weapon platform, belligerent army can think that information utilizes node.Typical distribution of information flow process is that information flows to information processing node from the information gathering node, utilizes the node distribution from information processing node to each information then.In particular cases, may comprise the distribution of information node, the center of for example accusing just has the effect of distribution of information, and information is utilized also might mutual forwarding information between the node.The node of only bearing distribution function also as information processing node.
(3) appreciation information advantage tenability
At first set up the index system of Information Superiority assessment, Fig. 4 is an Information Superiority evaluation index system synoptic diagram of the present invention.
1) single index analysis
At first respectively each quality indicator message is analyzed, and then carried out comprehensive assessment.
Integrality comprises the integrality of destination number and the integrality of target type.
Correctness is mainly weighed and is surveyed the degree of consistency about battlefield clarification of objective and realistic objective feature that obtains, and generally estimates with both deviations.Deviation is more little, and then the correctness index is good more.Clarification of objective generally comprises position, speed, type etc.
The property upgraded has reflected the refresh rate of information in the system, can weigh with producing the public required time of operation picture.The property upgraded analysis occurs in the information processing stage in the information field.The cycle or the frequency that have comprised message exchange in the operation information model also contain identical information in the information exchange matrix.The cycle of message exchange directly affects the time that generates public operation picture.According to the size in message exchange cycle, can define two kinds of times that generate public operation picture.
The importance of information and operation mission and combat duty are closely related.The full detail kind that exchanges in can the acquisition system from operation information model or information exchange matrix, can provide its importance degree at every kind of information, judge the correlation degree of each information and current operation mission, task, more all judged results are carried out the importance index that overall treatment obtains information.The general method that adopts to expert's survey promptly asks the expert to fill in the expert judging questionnaire.
The authenticity index has reflected the objective degree of the information content.Be difficult in the operation process guarantee that the information that obtains all is outwardness.Because the influence of the not enough and complicated battlefield surroundings of sensor itself, the situation of collecting deceptive information very likely takes place.The false content that comprises in the information is many more, and the authenticity of information is poor more.
The authenticity analysis of information is corresponding to the collection phase of information in the information field.Various sensors all provide a parameter that is called false alarm rate, and the expression sensor may be reported the probability of deceptive information.It is the major influence factors of authenticity, can utilize the false alarm rate parameter that the authenticity of information is analyzed.The attribute of node can obtain the false-alarm probability parameter of sensor report from the operation nodal analysis method.
Fail-safe analysis is primarily aimed at the distribution phase of information in the information field, and the reliability of the distributing network of information has determined the reliability of information.From operation node relationships model can derived information the distributing network structure, utilize the operation motility model to replenish and perfect.Can judge the information processing feature of operation node from the type of the activity of fighting, distinguish the different kinds of information processing node, thereby can form complete information distribution network.Utilize reliability theory that the reliability of information distribution network is analyzed, just obtained the reliability index of information.The logic that operation node relationships model has embodied between each operation node of system connects.Also can derive logic connecting relation between the different operation entities from the operation motility model.There is logic to connect between two nodes or the entity, just implys and have physical connection (may be many physical links or multistage physical link etc.) between them.Then we have obtained the network of an abstract distribution of information, the node of network fight exactly node or operation entity, and the limit of network is exactly the physical connection between these nodes or the entity.If each physical connection all has the reliability of its transmission, then can analyze the reliability of whole distributing network, the reliability of this result as information.
2) comprehensive assessment
Adopt the radar map method to carry out comprehensive assessment.This method belongs to the figure assessment, and its maximum characteristics are directly perceived, can show the strong point and the weakness of evaluated system, and these advantages are that other appraisal procedures are not available, relatively are suitable for the assessment of Information Superiority.Fig. 5 is an information tenability comprehensive assessment result schematic diagram.
When using the radar map assessment, generally can follow following step:
(a) create classification
At first create the primary categories of the system performance that will draw, a radar map generally can comprise 5-10 classification.In the report six classifications have been created in the assessment of Information Superiority: integrality, correctness, renewal, importance, authenticity and reliability.
(b) standardization of performance definition
The peak performance value of each classification and lowest performance value are all adopted standardized definition, its ratio is consistent.This report has been mapped to [0,1] interval to each desired value, and promptly the lowest performance value is 0, and the peak performance value is 1.
(c) calculate the value of each performance class
According to the different classes of standardized method that provides, calculate the value of each evaluation index, thereby obtain the relative value of each classification.
(d) processing graphics
Draw a polygon, insert corresponding coordinate axis, the title of mark classification on every axle and polygonal intersection point at each performance class.Then, be every axle reference mark according to the ratio scale of determining, central point is 0, outer vertically increase successively, the edge is labeled as 1.Connect the scale value that equates on each bar axle and form a plurality of concentric polygons, whole figure is seemed more as an arachnoid figure.
(e) desired value of drawing
For each performance class, its corresponding desired value of on corresponding coordinate axis, drawing, with a kind of specific symbol as data markers.And the point that draws on all is connected into the figure of a closure.
(f) explain and use assessment result
The radar map that obtains has shown the strengths and weaknesses that evaluated system is relative in patterned mode, has also provided a kind of expression of general overall performance.
(4) based on the key node searching algorithm of Information Superiority
1) connects network chart G by the draw operation node of system of the structure of given capability model.
The logic that operation node relationships model that capability model comprised and operation motility model have embodied between each operation node of system connects, and therefrom can derive the logic connecting relation between the different operation nodes.Determine the direction (oriented or undirected) that each logic connects according to the flow direction of operation information between the operation node, node and connection therebetween are drawn as network chart.Oriented connection represents with the oriented arrow that starts from start node, ends at terminal node, and undirected connection represents with the line segment that connects start node and terminal node, near connection (above or below) indicate its connective numerical value.With different geometirc graphical presentation operation nodes, in figure, can write out the title or the expression symbol of this node.For each operation node unify the numbering, represent with arabic numeral, be shown in operation node figure above or below.The result of above-mentioned work just obtains an abstract node and connects network chart.Operation node as shown in Figure 6 connects network diagram.
Connect in the network chart, with different geometirc graphical presentations three category nodes: information gathering node, information processing node, information are utilized node.The node that also has a class to have the information forwarding capability also can be regarded as special information processing node.Generally speaking, the various kinds of sensors platform belongs to the information gathering node, and information center or fusion center belong to information processing node, and various weapon platform, belligerent army can think that information utilizes node.Certainly, information utilizes node also may have the effect that information is transmitted.
2) connect the connective matrix R that network chart is derived meshed network by the operation node.
Arrange the row and the row of connective matrix according to the number order that connects operation node in the network chart, the connective numerical value of correspondence is inserted the relevant position of matrix, promptly obtain connective matrix.
3) find the solution the in-degree and the out-degree of each node in the network respectively, and calculate the interconnectedness of each node.
4) according to the in-degree and the out-degree of node, from big to small node is sorted respectively, form two Q1 of node queue and Q2.
5) determine the relative importance of node according to the sequence number of node in two formations.
With the sequence number addition of each node in two formations, obtain a relative sequence number.From small to large to the node rearrangement, its result is the formation from big to small of node relative importance according to relative sequence number.
If there is the relative sequence number of a plurality of nodes identical, then compare its interconnectedness size.The node that interconnectedness is big comes the front.If the interconnectedness of node is also identical, then relatively its in-degree and out-degree sum, according to size sort.
If in-degree equates with the out-degree sum, then compare the close degree of its out-degree and in-degree.
The relative sequence number of supposing two nodes of A and B is identical, and interconnectedness is also identical, and its in-degree is respectively d In, AAnd d In, B, out-degree is respectively d Out, AAnd d Out, BBecause in-degree and out-degree sum equate, thus the in-degree of A and B and out-degree or identical, otherwise different fully.Discuss in two kinds of situation:
1. the in-degree of A and B is identical, and out-degree is also identical.Then the relative importance of two nodes of A and B is identical, selects a node to come the front of another node at random;
2. the in-degree of A and B is different, and out-degree is also different.Calculate the ratio of the in-degree and the out-degree of each node, ratio comes the front near 1 node.Suppose that its ratio is respectively s AAnd s B,
s A = d in , A d out , A d out , A ≠ 0 ∞ d out , A = 0 , s B = d in , B d out , B d out , B ≠ 0 ∞ d out , B = 0
Because d Out, A≠ d Out, B, and d In, A+ d Out, A=d In, B+ d Out, BSo,, can not make by the mode of reduction of a fraction
Figure GSA00000110093500093
With
Figure GSA00000110093500094
Equate, more impossible directly equal, i.e. s A≠ s BSimultaneously, s AAnd s BAlso can not equate with 1 distance.
If | 1-s A|<| 1-s B|, then the A node should come B node front;
If | 1-s A|>| 1-s B|, then the A node should come B node back.
At last, can access the relative importance formation of a node, suppose that formation is n (1), n (2)..., n (m)
6) according to precedence from the relative importance formation before the selected parts formation of plurality of nodes as object queue.
This mainly is for reducing the measure that complexity of calculation is taked.According to the theory of complicacy network, the node of only a few ratio may controlled most Internet resources in the complex network, and the ratio of this part of nodes generally accounts for 10%~20%.The interconnectedness of this part node is far longer than the interconnectedness of other node.This is the scope at our the key node place that will seek just.Therefore, there is no need to search for whole node spaces, as long as search for, unless given protection cost is not enough to protect in these nodes any one at these nodes.
The number of nodes of supposing the object queue of selected parts is M, determines the value of M according to the methods below:
The proportional numerical value of a given object queue number of nodes is assumed to be R n, span generally between 10%~20%, is assumed to be 15% here.The predetermined minimum value of a given again object queue number of nodes is assumed to be M Min, generally can be made as 10.This predetermined value mainly is provided with for preventing that the search volume is too small.For example, if the total quantity of network node is not very big, can search for according to the inferior ordered pair whole node space of relative importance formation.Simultaneously, the predetermined maximum of an object queue number of nodes can be set also again, be assumed to be M Max, generally be taken as the integer between 100 to 200.This is provided with for further reducing computational complexity.In the actual conditions, have only the network that surpasses 1000 operation nodes just to be necessary to be provided with this predetermined maximum.And so large-scale capability model is also rare.
M=min{M max,max[Round(m×R n),min(m,M min)]}
The then final object queue of determining is n (1), n (2)..., n (M)
7) determine local optimum key node collection based on Information Superiority.
At above-mentioned object queue, the combining information advantage calculate determine respectively key node quantity be 1,2 ..., M each rank on the local optimum key node set.This search procedure is the process of a loop iteration, and the search volume of each new search all is to be determined by the result that the last time searches for, and supposes to use variable N OriginRepresent every start node collection when taking turns iterative search.Use variable N (i)The local optimum key node set that obtains when representing i wheel search (the key node quantity that promptly will search for is i), I (i)Removal subgraph G for its correspondence (i)The Information Superiority of back rest network, i.e. the maximum situation of the loss of Information Superiority after this takes turns being hit of accessing in the search.Wherein, G (i)={ N (i), E (i), E (i)Be set of node N (i)The set of all connections that had, promptly start node or terminal node belong to N (i)The set of connection, E (i)Be by set of node N (i)Decision.
Iterative process is as follows:
N origin={n (1),n (2),…,n (M)};
For i all numerical value from 1 to M, carry out following circulation:
{
N (i)=Φ,I (i)=1;
From N OriginMiddle search meets protection cost C MaxThe all node set that comprise i node, remember that its complete or collected works are S i(" algorithm 1 " that specific algorithm is seen below);
For S iIn each element N S(N SBe the node set that comprises i node) carry out following circular treatment:
{
Determine N SCorresponding subgraph G S={ N S, E S;
Calculate and remove subgraph G SInformation Superiority I (the G-G of back rest network S) (" algorithm 2 " that specific algorithm is seen below);
If I (i)>I (G-G S), I then (i)=I (G-G S), and N (i)=N S
}
N Origin=S iThe set that the node that middle element is comprised constitutes.
If S i=Φ or | N Origin|<i+1, loop termination; Otherwise, continue the next round circulation.
}
Algorithm 1:
From N OriginMiddle search meets protection cost C MaxThe algorithm of all node set that comprise i node as follows:
①i=1
Order according to the object queue of determining is searched for N one by one OriginIn node (this moment N OriginBe all set of node in the object queue).If certain node n (j)Protection cost c (j)≤ C Max, then gather { n (j)Be exactly S iAn element.If S i<Φ, then skip following step.
If above-mentioned search procedure finishes back S i=Φ, then the order according to the relative importance formation continues ferret out formation each node n in addition (M+1), n (M+2)..., n (m)If certain node n (k)Protection cost c (k)≤ C Max, then gather { n (k)Be exactly S iAn element.But in such cases, no longer carry out follow-up search procedures such as i=2 and i>2.
②i=2
Search N OriginIn all combination (n that comprises 2 nodes (j), n (k)), if c (j)+ c (k)≤ C Max, then gather { n (j), n (k)Be exactly S iAn element.
③i=K(2<K≤M)
At first according to the order of the object queue of determining from N OriginIn select K-2 node and form fundamental node set N Basic, all node set of the determined i of comprising of an epicycle node all must comprise the node in this fundamental node set.So except that the fundamental node set, each node set undetermined also has two nodes to replenish.Suppose N BasicThe protection cost sum of middle node is C Basic
Because N OriginFrom the result who meets the last round of search of protecting cost requirement, so C Basic<C Max
If N Remain=N Arigin-N Basic, search N RemainIn all combination (n that comprises 2 nodes (j), n (k)), if C Basic+ c (j)+ c (k)≤ C Max, then gather N Basic∪ { n (j), n (k)Be exactly S iAn element.
Algorithm 2:
In the loop iteration process of the optimum key node collection of the above-mentioned portion of foregone conclusion really, need to calculate removal subgraph G SInformation Superiority I (the G-G of back rest network S), and the Information Superiority of a plurality of rest network compared.
In this step, still adopt these six evaluation indexes that the Information Superiority of rest network is analyzed.And to carry out the comparison of Information Superiority, just must become an assessment result numerical value to these six index comprehensives.Here adopt weighted-average method, promptly provide the relative weighting { w of each evaluation index by the expert 1, w 2, w 3, w 4, w 5, w 6, this weight satisfies
Figure GSA00000110093500121
Each desired value is carried out the aggregative weighted summation, obtain the assessment result numerical value of Information Superiority at last.
Suppose that each evaluation index numerical value is v l(G-G S), l=1,2,3,4,5,6, calculate the assessment result numerical value of the Information Superiority of each rest network according to following formula.
I ( G - G S ) = Σ l = 1 6 w l × v l ( G - G S )
8) determine the key node collection N of global optimum ObjAnd corresponding I Obj
I obj=min{I (1),I (2),…,I (M)}
N obj=N (i),I (i)=min{I (1),I (2),…,I (M)}
N ObjBe the operation node set that to lay special stress on protecting.
Below disclose the present invention with preferred embodiment, so it is not in order to restriction the present invention, and all employings are equal to replaces or technical scheme that the equivalent transformation mode is obtained, all drops within protection scope of the present invention.

Claims (6)

1. the Information Superiority tenability analysis and assessment method of a complication system may further comprise the steps:
(1) sets up the ability need model
Ability is meant that main body is for finishing mission or task should possess basic quality and condition, the step that ability need is analyzed comprises: mission task analysis, activity analysis, node/entity analysis and capability analysis, node relationships model, operation information model and operation motility model, i.e. ability demand model finally obtain fighting;
(2) set up Information Superiority tenability assessment models
At first utilize various kinds of sensors to collect the relevant representation of data and the characteristic of the battlefield fact in the physical domain by the information gathering in the information field; Information processing in the information field is merged the various kinds of sensors information of collecting then, generates situation of battlefield, promptly public operation picture CROP according to the result who merges; The public operation picture that utilizes distribution of information in the information field to merge then to generate sends to each combat unit, makes whole combat units can share the situation of battlefield that perceives, and generates Information Superiority tenability assessment models;
(3) appreciation information advantage tenability
Around information quality, from a plurality of angles of information integrity, correctness, renewal, importance, authenticity and reliability the operation information of systematic collection, processing and distribution is analyzed and assessed, be i.e. appreciation information advantage tenability;
(4) based on the key node searching algorithm of Information Superiority
Connect network chart G by the draw operation node of system of given ability need structure of models; Connect the connective matrix R that network chart is derived meshed network by the operation node; Find the solution the in-degree and the out-degree of each node in the network respectively, and calculate the interconnectedness of each node; In-degree and out-degree according to node sort respectively to node from big to small, form two Q1 of node queue and Q2; Determine the relative importance of node according to the sequence number of node in two formations; According to precedence from the relative importance formation before the selected parts formation of plurality of nodes as object queue; Determine local optimum key node collection based on Information Superiority; Determine the key node collection N of global optimum ObjAnd corresponding I Obj, N ObjBe the operation node set that to lay special stress on protecting.
2. the Information Superiority tenability analysis and assessment method of complication system according to claim 1, it is characterized in that: the described mission task analysis of step (1) key is evaluating objects, target is decomposed refinement, obtain the target analysis tree, and find out the conflict relationship between the target.
3. the Information Superiority tenability analysis and assessment method of complication system according to claim 1, it is characterized in that: the described activity analysis of step (1) is for after hard objectives, activity flow process and the state variation of finishing target are analysed in depth, and message exchange is to the influence of development of the activity between the resource constraint of description node and the node.
4. the Information Superiority tenability analysis and assessment method of complication system according to claim 1, it is characterized in that: the described node/entity analysis of step (1) is for describing the node of participation task, interactive relation between the analysis node, determine internodal message exchange, the role who comprises in the analysis entities, organizational resources and physical resource, set up comparatively integrated entity conceptual model, set up the Target Assignment model of target simultaneously to node.
5. the Information Superiority tenability analysis and assessment method of complication system according to claim 1, it is characterized in that: the described capability analysis of step (1) is based on above analysis and model, mutual relationship between recognition capability, ability is set up and is improved capability model
6. the Information Superiority tenability analysis and assessment method of complication system according to claim 1, it is characterized in that: the battlefield fact in the described physical domain of step (2) comprises: the attribute of the combat unit that both sides at war are all, type, quantity, the various sensory devices that both sides have, both sides' operation intention, plan.
CN2010101648047A 2010-05-06 2010-05-06 Information support capability evaluation analysis method of complex system Pending CN101937486A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010101648047A CN101937486A (en) 2010-05-06 2010-05-06 Information support capability evaluation analysis method of complex system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010101648047A CN101937486A (en) 2010-05-06 2010-05-06 Information support capability evaluation analysis method of complex system

Publications (1)

Publication Number Publication Date
CN101937486A true CN101937486A (en) 2011-01-05

Family

ID=43390811

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101648047A Pending CN101937486A (en) 2010-05-06 2010-05-06 Information support capability evaluation analysis method of complex system

Country Status (1)

Country Link
CN (1) CN101937486A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104406606A (en) * 2014-11-11 2015-03-11 南京航空航天大学 Time-varying window length dynamic Allan variance analysis method on the basis of fuzzy control
CN110688754A (en) * 2019-09-25 2020-01-14 中国人民解放军国防科技大学 Combat system architecture modeling and optimal search method
CN112131755A (en) * 2020-09-30 2020-12-25 中国人民解放军国防科技大学 Method and device for designing architecture capability evaluation test scheme
CN112184182A (en) * 2020-10-21 2021-01-05 中国人民解放军海军航空大学青岛校区 Large-scale battle aviation equipment project logic decision analysis method
CN112422353A (en) * 2021-01-25 2021-02-26 中国人民解放军国防科技大学 Military force distribution network generation method based on effectiveness
CN113342524A (en) * 2021-06-04 2021-09-03 中国人民解放军军事科学院评估论证研究中心 Method, device, equipment and medium for analyzing reliability of combat system structure
CN113489755A (en) * 2021-04-30 2021-10-08 陈晓楠 Method for improving synchronization capability of complex combat network comprising joint service support system

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104406606A (en) * 2014-11-11 2015-03-11 南京航空航天大学 Time-varying window length dynamic Allan variance analysis method on the basis of fuzzy control
CN104406606B (en) * 2014-11-11 2017-09-15 南京航空航天大学 A kind of time-varying window length dynamic Allan variance analysis methods based on fuzzy control
CN110688754A (en) * 2019-09-25 2020-01-14 中国人民解放军国防科技大学 Combat system architecture modeling and optimal search method
CN112131755A (en) * 2020-09-30 2020-12-25 中国人民解放军国防科技大学 Method and device for designing architecture capability evaluation test scheme
CN112184182A (en) * 2020-10-21 2021-01-05 中国人民解放军海军航空大学青岛校区 Large-scale battle aviation equipment project logic decision analysis method
CN112422353A (en) * 2021-01-25 2021-02-26 中国人民解放军国防科技大学 Military force distribution network generation method based on effectiveness
CN113489755A (en) * 2021-04-30 2021-10-08 陈晓楠 Method for improving synchronization capability of complex combat network comprising joint service support system
CN113489755B (en) * 2021-04-30 2024-02-06 陈晓楠 Method for improving synchronization capability of complex combat network containing combined service support system
CN113342524A (en) * 2021-06-04 2021-09-03 中国人民解放军军事科学院评估论证研究中心 Method, device, equipment and medium for analyzing reliability of combat system structure
CN113342524B (en) * 2021-06-04 2023-10-24 中国人民解放军军事科学院评估论证研究中心 Operational architecture reliability analysis method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN101937486A (en) Information support capability evaluation analysis method of complex system
CN101819661A (en) Method for analyzing and evaluating decision supporting capability of complex system
CN110168520A (en) A kind of intelligence road traffic method for detecting abnormality
CN106656308B (en) The planning method and device of task in Information Network
CN110111025B (en) Weapon equipment system evaluation method and device
CN109982287B (en) Forestry multi-sensor fire alarm system based on zigbee wireless sensor network
Yajie et al. Weapons system portfolio selection based on the contribution rate evaluation of system of systems
CN108369682A (en) Method and system for the stroke performance for evaluating driver
Deng et al. A two-phase coordinated planning approach for heterogeneous earth-observation resources to monitor area targets
CN101893441A (en) Unmanned aerial vehicle flight path optimization method based on deviation maximization and grey correlation analysis
CN108431837A (en) Method and system for the stroke performance for evaluating driver
CN108475359A (en) Method and system for the stroke performance for evaluating driver
Pęciak Megatrends and their implications in the globalised world
CN103810382A (en) Method for choosing two-level data fusion strategy of airborne distributed multi-sensor
CN107146061A (en) A kind of ship Guakao event method for digging and system based on harbour multi-layer area
Radovanović et al. Application of hybrid DIBR-FUCOM-LMAW-Bonferroni-grey-EDAS model in multicriteria decision-making
CN108369683A (en) Method and system for the stroke performance for evaluating driver
CN114326827A (en) Unmanned aerial vehicle cluster multi-task dynamic allocation method and system
CN108369681A (en) Method and system for the stroke performance for evaluating driver
Tehrim et al. An interval-valued bipolar fuzzy linguistic VIKOR method using connection numbers of SPA theory and its application to decision support system
CN108475357A (en) Method and system for the stroke performance for evaluating driver
Fan et al. Single-value neutrosophic cosine measure for evaluation of port logistics competitiveness
CN113111441B (en) Method for constructing cluster unmanned aerial vehicle task model based on adjacency relation
CN106851689B (en) Multifactor method for allocating tasks in wireless sensor and actor network
Yu et al. Screening of effectiveness evaluation index and construction of network index system of command and control system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110105