CN108897752A - Method is described towards intelligentized electronic information system architecture - Google Patents

Method is described towards intelligentized electronic information system architecture Download PDF

Info

Publication number
CN108897752A
CN108897752A CN201810424992.9A CN201810424992A CN108897752A CN 108897752 A CN108897752 A CN 108897752A CN 201810424992 A CN201810424992 A CN 201810424992A CN 108897752 A CN108897752 A CN 108897752A
Authority
CN
China
Prior art keywords
description
knowledge
service
matrix
ability
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810424992.9A
Other languages
Chinese (zh)
Other versions
CN108897752B (en
Inventor
马雪峰
黄辰
周丽娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Electronics Technology Group Corp CETC
Original Assignee
China Electronics Technology Group Corp CETC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Electronics Technology Group Corp CETC filed Critical China Electronics Technology Group Corp CETC
Priority to CN201810424992.9A priority Critical patent/CN108897752B/en
Publication of CN108897752A publication Critical patent/CN108897752A/en
Application granted granted Critical
Publication of CN108897752B publication Critical patent/CN108897752B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses one kind to describe method towards intelligentized electronic information system architecture, the present invention is for future network information systems in depth networking, highly intelligentized development trend and requirement, focused web pushes the demand for emerging in large numbers intelligent capability, analysis can evolution Knowledge Center network information system concept connotation, morphological feature and the mechanism of action, by reinforcing in architecture view to intelligent thinking, information management, network security, service support, the description of the tissue of data and information etc., propose the architecture describing framework for adapting to the following intelligent network information systems design, the architecture products towards multiple applications can be supported to recombinate and be multiplexed, and it can be used for instructing the exploitation of future system architecture structure, it describes and integrated.

Description

Method is described towards intelligentized electronic information system architecture
Technical field
The present invention relates to electronic information technical fields, more particularly to one kind towards intelligentized electronic information system Structure describes method.
Background technique
DoDAF 2.0 editions have turned to architectural data from architecture products focus, it is specific as shown in Figure 1, with Organizational form of the meta-model as data emphasizes the collection to data needed for efficient decision, storage and maintenance, supports US Department of Defense Network center's strategy, the solution of description guiding service, convenient for the creation and maintenance of network center's environment.But this method is not The development trends such as Future Information system intelligent, configurable, adaptivity are paid close attention to, to limit 2.0 system of DoDAF It promotes and applies.
Summary of the invention
The present invention provides one kind to describe method towards intelligentized electronic information system architecture, to solve existing skill Art does not pay close attention to the problem of development trends such as Future Information system intelligent, configurable, adaptivity.
The present invention provides one kind to describe method towards intelligentized electronic information system architecture, including:It fights and regards Figure from the combat duty angle that carries out, carry out exploitation warfighting concepts, operating resources stream description, operating resources stream matrix, membership credentials, Operational activity decomposition tree, operational activity model, rule of engagement model, operational state transformation description and operation event tracking are retouched It states, and carries out the display of operational view;Ability view is connected with system requirement analysis, from Integrative Joint Operations Simulation task support and Operational support ability need angle, carries out development ability conception and Capability Categories, acquisition capability class relationship, ability are subordinate to pass System, the mapping relations and ability of ability and organization development and operational activity mapping relations, and carry out the display of ability view;Clothes Be engaged in view from support cross-system, it is trans-departmental, across services, it is even cross-cutting between service interoperation angle, description supports to fight Service composition, function and the correlation of business carry out exploitation service interface description, Service Source stream description, system-service square Battle array, the description of service-service matrix, service function, ability retrospect service matrix, operational activity retrospect service matrix, Service Source Flow matrix, service measure matrix, service evolution description, service technology and technical ability prediction, the transformation of service regulation model, service state Description and service event tracking description, and carry out service view and show;System view follows ability need in ability view, makees Operation intention in war view and the service function in service view, description information system component and deployment relationship, are opened Hair system interface description, system resource stream description, system-sytem matrix, system function description, operational activity and system function chase after Matrix, operational activity and the system of tracing back trace matrix, system resource stream matrix, system metrics matrix, system evolved description, system skill Art and technical ability prediction, the description of system convention model, system state transition and system event tracking description, and it is aobvious to carry out system view Show.
Further, this method further includes:Normal view is from the angle of management, design and development system, and description is related Operation, routine work, technology, industrial standard, engineering construction agreement, regular criterion and Further Development angle, exploitation standard match File and normative forecast are set, and carries out normal view and shows.
Further, this method further includes:View is equipped from construction and management view, describes the dress required in system view Back-up class, index, system and development course, it is desirable that the description of exploitation equipment configuration, equipment and ability corresponding relationship, equipment and work War task corresponding relationship, the description of equipment tactical and technical norms and equipment Development.
Further, this method further includes:Knowledge View to tissue the integration, processing of knowledge resource and apply angle Degree, supports to realize knowledge resource integration on demand and shared, and Knowledge based engineering indicates, generates, tissue, fusion, reasoning and collaboration fortune Row description knowledge Operational Mechanisms, it is desirable that exploitation knowledge interface description, knowledge resource stream description, knowledge-service matrix, knowledge-are known Know matrix, knowledge function description, ability retrospect knowledge matrix, operational activity retrospect knowledge matrix, knowledge resource stream matrix, knowledge Metric matrix, knowledge evolution description, knowledge technology and technical ability prediction, knowledge rule model, the state of knowledge transformation description and knowledge Event tracking description.
Further, this method further includes:Secured views are from supporting unified match to win security system building angle, to data Confidentiality, integrality, availability, trackability and non-repudiation in storage, transmission, processing and issuing process and right Attack, prevention, detection, control, management, the assessment of information security environment, exploitation safe interface description, secure resources stream description, Safety-service matrix, safety-security matrix, security function description, ability retrospect security matrix, operational activity trace safe square Battle array, secure resources stream matrix, security measure matrix, safe evolution description, safe practice and technical ability prediction, safety regulation model, Safe condition transition description and Security incident follow-up description, and carry out secured views and show.
Further, this method further includes:Data and information view description are fought and the demand of business information and therein Attribute, grammer, the semanteme of the information/data of management rule, definition system operation and business demand, with Unify legislation business procedure In information requirement, flow rules, it is desirable that exploitation conceptual data model, logic data model and Physical data model and information view Figure.
Further, this method further includes:Intelligent view carries out exploitation intelligence from Campaign Process intelligent Application demand angle It can interface description, intelligent resource stream description, intelligent resource flow matrix, intelligency activity decomposition tree, intelligency activity model, intelligent rules Model, intellectual status transformation description and intelligent event tracking description, and carry out the display of intelligent view.
The present invention has the beneficial effect that:
The present invention, in depth networking, the intelligentized development trend of height and requirement, gathers for future network information systems Burnt network pushes the demand for emerging in large numbers intelligent capability, analysis can the concept connotation of evolution Knowledge Center network information system, form it is special It seeks peace the mechanism of action, by reinforcing in architecture view to intelligent thinking, information management, network security, service support, data With the description of the tissue of information etc., the architecture for proposing the following intelligent network information systems design of adaptation describes frame Frame can support the architecture products towards multiple applications to recombinate and be multiplexed, and can be used for instructing future system architecture structure Exploitation, description and integrated.
Detailed description of the invention
Fig. 1 is existing 2.0 architectural schematic of DoDAF;
Fig. 2 is the electronic information system architecture schematic diagram of the embodiment of the present invention.
Specific embodiment
The embodiment of the invention provides one kind to describe method towards intelligentized electronic information system architecture, referring to figure 2, this method includes:
Operational view carries out exploitation warfighting concepts, operating resources stream description, operating resources stream from the combat duty angle that carries out Matrix, membership credentials, operational activity decomposition tree, operational activity model, rule of engagement model, operational state transformation description and work Event tracking of fighting describes, and carries out the display of operational view;Ability view is connected with system requirement analysis, makees from integration joint The support of war task and operational support ability need angle, progress development ability conception and Capability Categories, acquisition capability class relationship, The mapping relations of ability membership, ability and the mapping relations of organization development and ability and operational activity, and carry out ability view The display of figure;Service view from support cross-system, it is trans-departmental, across services, it is even cross-cutting between service interoperation angle, retouch State support operation business service composition, function and correlation, carry out exploitation service interface description, Service Source stream description, System-service matrix, service-service matrix, service function description, ability retrospect service matrix, operational activity retrospect service square Battle array, Service Source stream matrix, service measure matrix, service evolution description, service technology and technical ability prediction, service regulation model, Service state transformation description and service event tracking description, and carry out service view and show;System view follows in ability view Ability need, the operation in operational view be intended to and service view in service function, description information system component And deployment relationship, the description of development system interface, system resource stream description, system-sytem matrix, system function description fight and live It is dynamic to trace matrix, system resource stream matrix, system metrics matrix, system with system function retrospect matrix, operational activity and system Evolution description, systems technology and technical ability prediction, the description of system convention model, system state transition and system event tracking description, And it carries out system view and shows.
The present invention is to adapt to Integrative Joint Operations Simulation to require lower future military electronic information in function, structure, application The transformation of mode, security mechanism, under the joint fighting capability demand of oriented mission, from description system function, to description towards The service interoperation of task changes;It is shared from description information under battle application intelligence demand, to description knowledge organization, know Change based on knowledge reasoning;It in the case where matching rich demand for security, matches to win threatening from description, matches the task guarantee under rich Antagonistic Environment to description Ability transformation.
Further, system described in the embodiment of the present invention is additionally provided with:Normal view is from management, design and development system Angle describes relevant operation, routine work, technology, industrial standard, engineering construction agreement, regular criterion and Further Development angle Degree develops standard configuration file and normative forecast, and carries out normal view and show.
View is equipped from construction and management view, describes equipment classification, index, system and the hair required in system view Open up route, it is desirable that the description of exploitation equipment configuration, equipment and ability corresponding relationship, equipment and combat duty corresponding relationship, equipment are fought The description of art technical indicator and equipment Development.
Knowledge View to tissue the integration, processing of knowledge resource and apply angle, support realize knowledge resource it is on-demand Integrated and shared, Knowledge based engineering is indicated, is generated, tissue, merging, reasoning and synthetic operation describe knowledge Operational Mechanisms, it is desirable that Develop knowledge interface description, the description of knowledge resource stream description, knowledge-service matrix, knowledge-knowledge matrix, knowledge function, ability Retrospect knowledge matrix, knowledge resource stream matrix, Knowledge Measurement matrix, knowledge evolution description, is known operational activity retrospect knowledge matrix Knowledge technology and technical ability prediction, knowledge rule model, the state of knowledge transformation description and knowledge event tracking description.
Secured views are from supporting unified match to win security system building angle, to data in storage, transmission, processing and publication Confidentiality, integrality, availability, trackability and non-repudiation in the process, and to the attack of information security environment, anti- Safe interface description, secure resources stream description, safety-service matrix, safety-peace are developed in model, detection, control, management, assessment Complete matrix, security function description, ability retrospect security matrix, operational activity trace security matrix, secure resources stream matrix, safety Metric matrix, safe evolution description, safe practice and technical ability prediction, safety regulation model, safe condition transition description and safety Event tracking description, and carry out secured views and show.
Data and information view description are fought and the demand and management rule therein of business information, definition system operation with Attribute, grammer, the semanteme of the information/data of business demand, with the information requirement in Unify legislation business procedure, flow rules, It is required that exploitation conceptual data model, logic data model and Physical data model and information view.
Intelligent view carries out the description of developing intellectual resource interface, intelligent resource flow from Campaign Process intelligent Application demand angle Description, intelligent resource flow matrix, intelligency activity decomposition tree, intelligency activity model, intelligent rules model, intellectual status transformation description It is described with intelligent event tracking, and carries out the display of intelligent view.
Detailed explanation and illustration will be carried out to system of the present invention by a specific example below:
The architecture products of the system that faces the future amount to 90, including 2 full view products, 6 ability view products, 9 operational view products, 8 intelligent view products, 14 Knowledge View products, 14 secured views products, 14 service views Figure product, 13 system view products, 5 equipment view products, 3 data and information view product, 2 normal views produce Product, catalogue and each product summary description are as shown in table 1.
Architecture products definition and description:1) full view product:I. it summarizes:The main description architecture of full view product The abstract aspect such as range, background and term content, be basis and the foundation of system structure exploitation.Full view includes two kinds of productions Product are summarized and summary info (AV-1) and general dictionary (AV-2).
Ii. it summarizes and summary info (AV-1):1. Product Definition:AV-1 provides general introduction and the abstract of architecture Design Information.The product was mainly used for providing planning guide information in the initial stage of system structure exploitation;It is completed in architecture The conclusion information of the architecture Design is provided afterwards.AV-1 is able to use family and architecture is understood quickly, and therefrom chooses institute The content needed.
2. product description:It is basic that AV-1 mainly describes purpose and meaning, project background, development organizations of Development System structure etc. Situation, the product will be helpful to decision of the senior level process.It summarizes and is believed with summary info (AV-1) by the abstract and background of architecture The contents such as breath composition, including architecture item purpose mark, background, project basic condition, exploitation requirement and conclusion.
(1) Question background:The background information of description architecture, including mission, regulations, target and imagination, warfighting concepts, The contents such as scenario, information security requirement, other threat condition, geographic ranges, also need to determine what architecture Design must comply with The source of rule, standard or convention etc..(2) project situation:Mainly include project name, project label, project prove unit and Demonstration is passed through, project holds relationship, development teams for grinding unit and user, project and sundry item or mechanism etc., further includes project Deadline and required cost.(3) design requirement:To the basic demand that system structure exploitation proposes, including need to develop Tool, architectural data file format used by view and product, development progress plan, exploitation etc..4) conclusion:It illustrates logical Cross the conclusion and suggestion that architecture works.Conclusion part further includes the deficiency having been acknowledged, the system realization side of recommendation Case etc..
Iii. general dictionary (AV-2):1. Product Definition:Whole terms for being used in AV-2 definition system mechanical development, contracting Abbreviation records all design elements and attribute in system structure exploitation.AV-2 reads convenient for user and designer, understands Complete the architecture of exploitation.AV-2 is the supplement of other products, can be used as the reference of designer and user.
2. product description:AV-2 is equivalent to the data dictionary of architecture, includes all design element and its attribute, art Language and abbreviation.All proprietary terms used in AV-2 definition system structure, but its than one simple term is more detailed, it can Include the contents such as Chinese, English name, specific definition and metadata.Abbreviation description mainly comprising abbreviation, whole-word, Chinese abbreviation etc..Design element and its attribute derive from each product design data, these data use the shape of table in AV-2 Formula description.
2) ability view product:I. it summarizes:The requirement that ability view product develops system capability from Top-layer Design Method determines The planning of the support military capabilities such as system capability demand, ability structure and ability relationship determines combat mission and task, and Plan as a whole the development of equipment and system.Ability view includes 6 kinds of products:Ability conceives (CV-1), Capability Categories (CV-2), energy Mapping relations (CV-5), ability and the operation of power divided stages (CV-3), ability membership (CV-4), ability and organization development Movable mapping relations (CV-6).
Ii. ability conception (CV-1):1. Product Definition:CV-1 describes main strategic development idea, the operational support of system Ability need etc..CV-1 is mainly that System Architecture Design provides macro-capability demand, embodies the top level goal of system Construction, A high level overview is provided for various abilities involved in architecture.
2. product description:CV-1 synoptically describes the conception of top layer ability.Ability conception is generally opened from analysis top layer conception Begin, then describes the ability need of combat mission and top layer combat duty, further supplement related notion.Information in CV-1 can From warfighting concepts or quoted from research report.These information will provide guidance to the following capability analysis, keep equipment capability research special Family can determine tomorrow requirement.In the reverse-engineering that systematic self organization, upgrading are implemented, ability conception is mainly used for really Determine the conception of system initial ability and the ability by integrating or upgrading realization.
Iii. Capability Categories (CV-2):1. Product Definition:CV-2 is provided in some specific time, needed for an areas of capacity The structured list of the various abilities and sub- ability wanted, the ability of describing defines, the classification of ability, the division of sub- ability and subordinate Relationship.CV-2 is used for Capability Categories, decomposition, analysis and examination.In addition, also acting as electronic information equipment construction plan and system The top layer application case of master-plan and the source document of key user's demand.
2. product description:The definition of the main descriptive power of CV-2 is retouched with composition, classification, the division of sub- ability and subordinate relation State the concrete ability that (root node is that ability, branch node or leaf node are sub- ability) obtains and organizational capacity conception is required, shape At a structuring capabilities list.The structured list of CV-2 is in some period, and system needs the complete list of delivery capability. For the granularity of clarity and appropriate grade needed for improving later period Capacity Management, every kind of ability can be decomposed into as needed Several sub- abilities.Ability structure description is generally designed in the incipient stage, but can also be developed in any stage.It is various in CV-2 Element is not equipped for individual system or single-piece, and a system is altogether the same as the effect reached, some equipment or system More than one ability can be able to satisfy.It include as far as possible qualitative attribute and module in ability definition, if you need to processing to be achieved Speed, forward speed, maximum detectable range etc..The magnitude of expression current value related with special time period or the following mesh Mark.
Iv. capable phase divides (CV-3):1. Product Definition:CV-3 description is in different time points in fiery special time period (i.e. in capable phase division), the level that capabilities plan reaches.
2. product description:CV-3 provides obtainable ability in different time points or in specific time period.Capable phase is drawn Point aid in determining whether capacity gap, deficiency or ability repeat with it is overlapping.Capable phase is divided and can be indicated with table, the row of table Indicate the ability for being originated from Capability Categories model, and the column of table then indicate the time phase for being originated from conception model, capable phase is drawn Divide the ability increment in table on the crosspoint (i.e. cell) of row and column, may be displayed on the variation of ability in the period. If ability cross-domain multiple periods can be indicated with a rectangle colour bar.If in a period of time, the ability of division is not It is able to satisfy ability need, this grid is then blank.
V. ability membership (CV-4):1. Product Definition:CV-4 describes the relationship between various abilities, determines ability Logic groups.CV-4 is used to analyze the dependence between various abilities and various ability groups.These dependences and logic Grouping can illustrate the connection to obtain system capability, between different construction projects, be the design of system, purchase and stage ability Development provides information.
2. product description:CV-4 is for capabilities list defined in CV-2, between descriptive power in addition to subordinate relation Dependence, support relationship between other relationships, such as ability.Ability subordinate relation generally defines in CV-2.Sometimes it is Relationship between detailed description ability, can also show ability subordinate relation in CV-4.CV-4 is described from bottom ability Based on, emphasis describes the relationship between leaf ability.Relationship between the ability of upper layer can be embodied by the relationship between leaf ability.
Vi. ability and the mapping relations of organization development (CV-5):1. Product Definition:CV-5 describes the reality of processing capability requirements Existing, which has planned the deployment and its interconnected relationship of ability in moment.
2. product description:CV-5 explanation is deployed to specific organization's institutional capability, and each model of CV-5 is for specific Stage.In some stage, if as soon as a certain capabilities are used or will be used by specific organization, then CV-5 should be detailed Illustrate the mapping relations of ability and tissue.CV-5 can also illustrate the interactive relation between them, these interactive relations both can be It defines, can also be defined in service interface in system interface description.CV-5 usually indicates that an axis indicates to close in a tabular form Suitable institutional framework, another axis indicate that ability, two axis intersection locations indicate ability or resource object.
Vii. the mapping relations (CV-6) of ability and operational activity:1. Product Definition:CV-6 is for descriptive power and fights Movable retrospect relationship, determines the ability need of operational activity, is convenient for decision-maker and user's fast browsing, quickly determines and fight Activity and ability need between gap, can be used as analysis ability define or structure divide, verifying ability planning or design it is reasonable Property with integrality, examine planning or projected capacity whether meet the foundations such as operational need.
2. product description:CV-6 is the bridge between operational view and ability view, it describes to complete undertaken operation Which ability activity needs support.This corresponding relationship reflection operational activity needs the support of certain ability to reach expected mesh Mark.CV-6 describes ability to the corresponding relationship of operational activity with matrix form, and ability and operational activity are respectively as matrix Columns and rows are identified each cell with symbol, to indicate some task to a certain Capability Requirement.To distinguish different branch Relationship is held, different identification icon can be used to distinguish different relationships.
3) operational view product
I. it summarizes:Operational view is described in detail required for combat duty or activity, operation element and support Campaign Process Information exchange, pure operational view is unrelated with system.But the relationship between operational activity and operational activity may be by It should be with document to illustrate that system may promote the improvement of Campaign Process to the influence of certain systems using nascent technology Form illustrates that operational implementation will receive the limitation of existing system in the process.Operational view should mark the system view number of some top layers According to, or increase on operational view product the explanation of some pairs of related contents.Operational view includes 9 kinds of products:Advanced operation Concept map (OV-1), operating resources stream matrix (OV-3), membership credentials figure (OV-4), is fought at operating resources stream description (OV-2) Activity decomposition tree (OV-5a), operational activity model (OV-5b), rule of engagement model (OV-6a), operational state transformation description (OV-6b), operation event-tracking description (OV-6c).
Ii. advanced warfighting concepts figure (OV-1)
1. Product Definition:It is what that OV-1, which briefly describes main combat mission, who completes these combat missions, how complete At, the contents such as where complete.It is mainly used for for decision of the senior level personnel (such as commander) provide about mission it is direct, Macroscopic description is to support decision.
2. product description:OV-1 synoptically provides the macroscopic information of architecture project to be developed, describes this project Commanders at different levels, main staff officer organ and other associated support tissues of the project are paid close attention in the mission/field covered, description The viewpoint of equal departments and personnel.OV-1 has sketched out warfighting concepts, such as completes what task, whom is completed the task by, completing to appoint The contents such as the sequence of business and the purpose reached further include the interactive relation with environment and other external systems.OV-1 is system Most terse product in infrastructure product, the call format that do not fix, since the description to combat mission task is very abstract , with one or more figure and explanatory note can be subject to.
Iii. operating resources stream description (OV-2)
1. Product Definition:OV-2 describes the specific operational node to play a significant role in the architecture, what they were completed Main operational activity, the details of existing information exchange relationship and information exchange between operational node.Its purposes is figure and text Operational node and the therebetween logic connecting relation of Battle Information Exchange are sketched out, but does not describe the pass of the physical connection between node System.Wherein, resource flow is the simplification expression of path or network mode, it is usually graphically expressed as to a connection Device has the lines of bulk information.
2. product description:OV-2 determined its key effect operational node and for complete OV-5 in operational activity and Required information exchange, there are the abstract comprehensive demand lines between node of Battle Information Exchange relationship between operational node.It fights and saves Point had both included the operational node in this architecture, also included being not belonging to this architecture range but relative outside Node, such as the important information source of operational node inside present architecture or the node of important information destination, but often A operational node should belong to some organization in OV-4.Demand line illustrate between operational node there are information exchange relationship with And need the information of interaction.
It as needed, can be with hierarchical description OV-2, it can delineate OV-2 with the figure of multiple different levels.It is describing It when OV-2, should avoid as far as possible using actual physical facility as operational node, and logic should be established according to combat duty or mission Operational node.
When delineating demand line, directions of information flow indicated by an arrow, and it is named with special identifier or phrase.Demand line On the information for needing to exchange between node and the requirement to exchanged information are given with written form, but do not need to illustrate How information exchange is realized.Relationship between demand line and information exchange is the relationship of multi-to-multi, i.e. may deposit on a demand line In a plurality of information exchange, an information exchange may occur on a plurality of demand line.When delineating demand line, in addition to providing ontology Demand line inside architecture between operational node should also provide the demand line between external operational node.Indicating external node It, should be with the area of the demand line between internal operational node and internal operational node and when demand line between external operational node Not.
When necessary, the operational activity that each operational node is completed should be provided on the diagram, these activities and the operation in OV-5 It is movable consistent.
Iv. operating resources stream matrix (OV-3)
1. Product Definition:OV-3 with form summarize operational view in operational activity, operational node and information flow this three The details of information exchange is described in detail in relationship between a basic architecture data element, including what information whom who exchange with, The information exchanges feature such as main contents, necessity and security of the information.It can be traced by the information exchange in OV-3 Information of interest.
2. product description:OV-3 should clearly describe the association attributes of information exchange, and by its with generate or use information Operational node and operational activity are associated while also associated with demand line.Information exchange describes the friendship between operational node The movement and its feature for changing certain information generally include information element name and mark, content description, the operational node for sending information The operational activity title and mark, use information of title and mark, the operational node title and mark, generation information that receive information Operational activity title and mark, information format, information exchange frequency/period, the time limit require etc., also include interoperability grade want It asks, information availability requirement, reliability requirement, integrity demands, the features such as level of confidentiality and precedence.Wherein, information element table What is shown is the content of the information exchanged between operational node, these information elements can correspond to the entity in OV-7.In OV-3 Each information exchange is all related to demand line, while also related to operational activity.In information exchange and OV-2 in OV-3 Demand line is the relationship of multi-to-multi, and information element and operational activity are also not one-to-one relationship, information input and output for OV- Flexible connection in 5c is got up, but OV-3 does not need to illustrate the information input and output between the completed activity of the same node. OV-3 is not intended to the attribute that every information exchange of each operational node relevant to architecture is included to have no to lose Leakage ground is listed one by one, and emphasis is the feature for providing the information exchange of user or designer's concern.
V. membership credentials figure (OV-4)
1. Product Definition:Between the organisational level being related in OV-4 description architecture, interior tissue and outside organization Between various relationships that may be present, between the combatant mainly to play a crucial role in the architecture, tissue or combat unit Command structure and command relation, cooperation or conspiracy relation between them.
2. product description:OV-4 graphically illustrates a variety of relationships that may be present between the tissue in an architecture.For Meet the purpose of architecture Design, designer's class can define any desired and important relationship on demand.In OV-4 Membership credentials illustrate basic role and administrative relationships in combat system-of-systems, the operational node from the angle of commander reflection OV-2 How can connect.In order to preferably portray commander's organizational framework, the tissue and its relationship of three types are usually described.First is that with Combat duty and operational activity execution are corresponding, and directly with the associated organizational unit of operational node in OV-2 and its relationship, this is The major part of the product design;Second is that composed structure and relationship in these organizational units inside the essential elements of part, such as one The component units (all kinds of centers or parlour) of grade combat unit (such as trip, battalion) command post, these contents are designed as the first kind Supplement;Third is that the group in description first kind design is woven in more higher level or higher command system and positions, these design contents Understand that operational view provides auxiliary information for user.
Vi. mission Task-decomposing figure (OV-5a)
1. Product Definition:OV-5a briefly describes the hierarchical relationship between the task and task that main combat mission is resolved into.
2. product description:OV-5a decomposes combat mission described in OV-1, forms task hierarchical tree, and to institute Some tasks carry out summary description, purpose, main process and the Measure Indexes of tasks clear.
Vii. operational activity decomposes (OV-5b)
1. Product Definition:Layer between OV-5a briefly describes main combat duty or activity is resolved into activity and activity Secondary relationship.
2. product description:OV-5a decomposes combat duty described in OV-1 or activity, forms hierarchy of activity Tree, and summary description is carried out to all activities, specify movable purpose, main process and Measure Indexes.It fights to refine Movable description can decompose operational activity, until meeting the analysis needs of designer.Operational activity shape after decomposition At operational activity decomposition tree.User can quickly check movable composition and subordinate relation by operational activity decomposition tree.
Viii. operational activity model (OV-5b)
1. Product Definition:OV-5b mainly describes to complete the hierachical decomposition between operational activity performed by a combat duty Information flow is output and input between relationship and operational activity.OV-5b can specify the executing agency of operational activity, follow Criterion, and necessary precedence constraint is provided for the design of subsequent OV-6a, OV-6b and OV-6c.
2. product description:OV-5b can use procedure chart (such as IDEF0 comprising information flow input/output relationship between activity Figure) it describes.It is considered as completing the operational node of operational activity when describing OV-5b, it is complete that emphasis describes different operational node institutes At information flow relation existing between activity.The operational activity in OV-5b can be annotated when necessary, such as in order to illustrate some Operational activity be by " who " " when " execute, can with complete the operational activity operational node and a sequence Number the operational activity is annotated.
Ix. rule of engagement model (OV-6a)
1. Product Definition:OV-6a mainly provides the rule of engagement or business rule of constraint enterprises finishing service method. Top, these rules should at least embody the warfighting concepts that OV-1 is defined, and be more detailed rule and behavior exploitation Guide is provided with definition, these behaviors will occur in subsequent architecture definition procedure.
2. product description:OV-6a defines the rule of engagement and business rule that constraint intra-enterprise business is completed.In mission Layer, should be based on the business rule that regulations, guide and rules of engagement are included.In lower level, OV-6a is described in spy The code of conduct of architecture under fixed condition.These criterion can indicate with written form, for example, if (these conditions) exists, And (certain event) occurs, and that (is carried out these activities).
X. state transformation description (OV-6b)
1. Product Definition:OV-6b describes how operational activity by changing oneself state responds various events.The model The sequence of events of a response action is described, some movement is such as taken, is then converted to another new state, every time Transformation will specify an event and a movement.
It is told 2. product is retouched:OV-6b has reacted the clear sequence of the movable inside and outside portion's event of response, and OV-5a or OV-5b cannot The such sequence of reflection completely.It can also reflect the internal act response sequence to single operational activity, or reflection pair with OV-6b The sequence of multiple operational activity responses.For OV-6b based on state diagram, state machine is defined as that " a kind of specification, the specification describe one All probable behaviors of a little dynamic products elements.Behavior can regard the round-trip connected with one or more transformation arcs as State diagram, transformation arc are to be excited by the example of sequence of events and formed.During round-trip, state machine completes one Action, it is associated that these act elements different from state machine." state diagram figure can clearly, with do not lose appoint The mode of what information is transformed into the text rule of structuring, these regular specified in more detail time sequencing of operation event and to this The response of a little operation events.
Xi. event tracking description (OV-6c)
1. Product Definition:OV-6c is according to special scenario as a result, providing the Log-Rank test to resource flow.Every event tracking Figure is all with the description to defined special scenario or to the description of situation.Sometimes OV-6c is known as precedence diagram, event scenario figure Or timing diagram, the model can track the action in scenario or critical event sequence.
2. product description:OV-6c model helps to define reciprocation and operational flowchart, it helps ensures each operation Activity and place can obtain necessary information in the correct time, complete the combat duty for being assigned to it.OV-6c can be in scenario Action or event critical order tracked.The model both can be used alone, and can also be used together with OV-6b, to describe Dynamic behaviour in the dynamic behaviour of business activity, or description mission plot, operation plot.
4) intelligent view product
I. it summarizes:Intelligent view describes the reasoning of system, study, association, understanding, determines from operation intelligent Application angle The thinking activities such as plan, emotion.Intelligent view includes 8 intelligent view products:Intelligence interface description (IV-1), intelligent resource flow are retouched State (IV-2), intelligent resource flow matrix (IV-3), intelligency activity decomposition tree (IV-4), intelligency activity model (IV-5), intelligence rule Then model (IV-6a), intellectual status transformation description (IV-6b) and intelligent event tracking description (IV-6c) etc..
Ii. intelligence interface description (IV-1)
1. Product Definition:IV-1 mainly describes intelligent distinguishing hierarchy and its relationship.The model can be used for intelligent progress Classification Management, determines whether the intelligence for repeating, lacking, and intelligence need to refine, and opening for subsequent IV-2, IV-3, IV-4 Hair provides constraint and reference.
2. product description:The level of IV-1 specified in more detail intelligence divides, and simple arborescence description can be used.It utilizes IV-1 can describe intelligent and sub- grade intelligence, and determine the intelligent resource flow between intelligence.The model is for describing intelligent resource Structure, that is, determine main sub- grade intelligence, executor and intelligency activity (function) and the interaction between them.
Iii. intelligent resource stream description (IV-2)
1. Product Definition:IV-2 describes the specific intelligence node to play a significant role in the architecture, what they were completed Main intelligency activity, existing Knowledge interaction relationship and the details of knowledge exchange between intelligent node.Its purposes is figure and text Intelligent node and the therebetween logic connecting relation of knowledge exchange are sketched out, but does not describe the physical couplings between node.Its In, resource flow is the simplification expression of path or network mode, it is usually graphically expressed as to a connector, i.e. band There are the lines of bulk information.
2. product description:IV-2 is made of the intelligent resource flow between intelligent node and different intelligent node, and with IV-1, IV-3 is consistent.Related content includes intelligent resource summary description, intelligent function, intelligent function constraint etc..Wherein intelligence Energy resource summary description is the brief description to intelligent background, demand, classification etc.;Intelligent function refers to that intelligent resource is provided out Concrete intelligence resource;Intelligent function constraint is the constraint to indexs such as intelligent function execution performances.IV-2 can be used table and take It is described with text.IV-2 determined its key effect intelligent node and for complete IV-4 in intelligency activity and it is required Knowledge exchange, there are the abstract comprehensive demand lines between node of knowledge exchange relationship between intelligent node.Intelligent node both included Intelligent node in this architecture also includes being not belonging to this architecture range but relative external node, such as As the important information source of intelligent node inside present architecture or the node of important information destination.Demand line illustrates intelligence There are Knowledge interaction relationship and the knowledge of needs interaction between energy node.
It as needed, can be with hierarchical description IV-2, it can delineate IV-2 with the figure of multiple different levels.It is describing When IV-2, and logic and intelligent node should be established according to intelligent task or mission.
When delineating demand line, knowledge flow direction indicated by an arrow, and it is named with special identifier or phrase.Demand line On the knowledge for needing to exchange between node and the requirement to institute's exchange knowledge are given with written form, but do not need to illustrate How knowledge exchange is realized.Relationship between demand line and knowledge exchange is the relationship of multi-to-multi, i.e. may deposit on a demand line In a plurality of knowledge exchange, a knowledge exchange may occur on a plurality of demand line.When delineating demand line, in addition to providing ontology Demand line inside architecture between intelligent node, should also provide the demand line between external smart node.Indicating external node It, should be with the area of the demand line between internal intelligent node and internal intelligent node and when demand line between external smart node Not.
When necessary, the intelligency activity that each intelligent node is completed should be provided on the diagram, these activities and the intelligence in OV-4 It is movable consistent.
Iv. intelligent resource flow matrix (IV-3)
1. Product Definition:IV-3 with form summarize intelligent view in intelligency activity, intelligent node and knowledge flow this three The details of knowledge exchange is described in detail in relationship between a basic architecture data element, including what knowledge whom who exchange with, The knowledge exchanges feature such as main contents, necessity and security of the knowledge.It can be traced by the knowledge exchange in IV-3 Knowledge of interest.
2. product description:IV-3 should clearly describe the association attributes of knowledge exchange, and by its with generate or use knowledge Intelligent node and intelligency activity are associated while also associated with demand line.Knowledge exchange describes the friendship between intelligent node The movement and its feature for changing certain knowledge generally include knowledge element title and mark, content description, the intelligent node for sending knowledge Title and mark, the intelligent node title for receiving knowledge and mark, the intelligency activity title for generating knowledge and mark, using knowledge Intelligency activity title and mark, knowledge format, knowledge exchange frequency/period, the time limit require etc., also include interoperability grade want It asks, knowledge availability requirement, reliability requirement, integrity demands, the features such as level of confidentiality and precedence.Wherein, knowledge element table What is shown is the content of the knowledge exchanged between intelligent node, these knowledge elements can correspond to the entity in DIV-2.In IV-3 Each knowledge exchange is all related to demand line, while also related to intelligency activity.In knowledge exchange and IV-2 in IV-3 Demand line is the relationship of multi-to-multi, and knowledge element and intelligency activity are also not one-to-one relationship, and knowledge is output and input IV- Flexible connection in 4 is got up, but IV-3 does not need to illustrate that the knowledge between the completed activity of the same node is output and input. IV-3 is not intended to the attribute that every knowledge exchange of each intelligent node relevant to architecture is included to have no to lose Leakage ground is listed one by one, and emphasis is the feature for providing the knowledge exchange of user or designer's concern.
Vii. (IV-4) is decomposed in intelligency activity
1. Product Definition:Level between IV-4 briefly describes main intelligent task or activity is resolved into activity and activity Relationship.
2. product description:IV-4 decomposes intelligent task described in IV-1 or activity, forms hierarchy of activity tree, And summary description is carried out to all activities, specify movable purpose, main process and Measure Indexes.In order to refine intelligency activity Description, intelligency activity can be decomposed, until meeting the analysis needs of designer.Intelligency activity after decomposition forms intelligence It can activity decomposition tree.User can quickly check movable composition and subordinate relation by intelligency activity decomposition tree.
Viii. 1. Product Definition of intelligency activity model (IV-5):IV-5 mainly describes to complete performed by an intelligent task Intelligency activity between hierachical decomposition relationship and intelligency activity between output and input knowledge flow.IV-5 can specify intelligence Movable executor, the criterion followed, and necessary precedence constraint is provided for the design of subsequent IV-6a, IV-6b and IV-6c.
2. product description:IV-5 can use procedure chart (such as IDEF0 comprising knowledge flow input/output relationship between activity Figure) it describes.It is considered as completing the intelligent node of intelligency activity when describing IV-5, emphasis describes different intelligent node and completed Existing knowledge flow relation between activity.The intelligency activity in IV-5 can be annotated when necessary, such as in order to illustrate some intelligence Can activity be by " who " " when " execute, can with complete the intelligency activity intelligent node and a serial number The intelligency activity is annotated.
Ix. 1. Product Definition of intelligent rules model (IV-6a):IV-6a mainly provides that the intelligence of intelligent thinking is completed in constraint Rule and thinking rule.Top, these rules should at least embody the intelligence interface that IV-1 is defined, and be more detailed Rule and behavior exploitation and definition offer guide, these behaviors will occur in subsequent architecture definition procedure.
2. product description:IV-6a defines intelligent rules and thinking rule.It, should be with regulations, guide and belligerent in mission layer Based on the business rule that rule is included.In lower level, IV-6a describes the behavior of architecture under given conditions Criterion.These criterion can indicate with written form, for example, if (these conditions) exists, and (certain event) occurs, and that is (just Execute these activities).
X. state transformation description (IV-6b) 1. Product Definition:IV-6b describes how intelligency activity passes through change oneself state To respond various events.The model describe the sequence of events of a response action, such as take some movement, then change The state new to another, transformation will specify an event and a movement every time.
It is told 2. product is retouched:IV-6b has reacted the clear sequence of the movable inside and outside portion's event of response, and IV-5a or IV-5b cannot The such sequence of reflection completely.It can also reflect the internal act response sequence to single intelligency activity, or reflection pair with IV-6b The sequence of multiple intelligency activity responses.For IV-6b based on state diagram, state machine is defined as that " a kind of specification, the specification describe one All probable behaviors of a little dynamic products elements.Behavior can regard the round-trip connected with one or more transformation arcs as State diagram, transformation arc are to be excited by the example of sequence of events and formed.During round-trip, state machine completes one Action, it is associated that these act elements different from state machine." state diagram figure can clearly, with do not lose appoint The mode of what information is transformed into the text rule of structuring, these regular specified in more detail time sequencing of intelligent event and to this The response of a little intelligence events.
Xi. intelligent event tracking describes (IV-6c) 1. Product Definition:IV-6c is according to special scenario as a result, providing to intelligence The Log-Rank test of resource flow.Every intelligent event tracking figure all with the description to defined special scenario or is retouched situation It states.Sometimes IV-6c is known as precedence diagram, event scenario figure or timing diagram, which can be suitable to scenario or crucial intelligent event Intelligence action in sequence is tracked.
2. product description:IV-6c model helps to define reciprocation and IN process, it helps ensures each intelligence Activity and place can obtain necessary knowledge in the correct time, complete the intelligent task for being assigned to it.IV-6c can be in scenario Intelligence action or event critical order tracked.The model both can be used alone, and can also be used together with IV-6b, come Dynamic and intelligent behavior in the dynamic behaviour of intelligency activity, or description mission plot, intelligent plot is described.
5) Knowledge View product
I. it summarizes:Knowledge View from the angle of knowledge resources management and knowledge services, describe system relevant knowledge composition, Function and its relationship.Knowledge View includes 14 kinds of products:Knowledge interface description (KV-1), is known knowledge resource stream description (KV-2) Knowledge-service matrix (KV-3a), knowledge-knowledge matrix (KV-3b), knowledge function description (KV-4), ability trace knowledge matrix (KV-5a), operational activity retrospect knowledge matrix (KV-5b), knowledge resource stream matrix (KV-6), Knowledge Measurement matrix (KV-7), Knowledge evolution describes (KV-8), knowledge technology and technical ability prediction (KV-9), knowledge rule model (KV-10a), state of knowledge transformation (KV-10b), knowledge event tracking description (KV-10c) are described.
Ii. knowledge interface describes (KV-1) 1. Product Definition:KV-1 is mainly described between the distinguishing hierarchy and knowledge of knowledge Relationship.The model can be used for carrying out Classification Management to knowledge, determine whether repetition, the knowledge of missing and knowledge need to refine, And the exploitation for subsequent KV-2, KV-3, KV-4 provides constraint and reference.
2. product description:The level of KV-1 specified in more detail knowledge divides, and simple arborescence description can be used.It utilizes KV-1 can describe knowledge and sub- grade knowledge, and determine the resource flow between knowledge.The model can be used for describing knowledge resource knot Structure, that is, determine main sub- grade knowledge, executor and activity (function) and the interaction between them.
Iii. 1. Product Definition of knowledge resource stream description (KV-2):Resource flow between KV-2 specification of a model knowledge, and can The protocol stack of connection is listed, to support knowledge to be published, find and call.KV-2 model accurately connects rule between providing knowledge Model is also possible to either existing connection standardizes for the following connection and newly-built connection specification.
2. product description:KV-2 is made of the knowledge resource stream between knowledge base and different knowledge base, and with KV-1, KV-3 It is consistent.Related content includes knowledge base summary description, knowledge function, knowledge function constraint etc..Wherein knowledge summary Description is the brief description to knowledge background, demand, classification etc.;Knowledge function refers to the concrete knowledge money that knowledge base is provided out Source;Knowledge function constraint is the constraint to indexs such as knowledge function execution performances.KV-2 can be used table collocation text and be retouched It states.
Iv. knowledge -1. Product Definition of service matrix (KV-3a):KV-3a mainly describes all knowledge-clothes that KV-1 is determined Resource of being engaged in interaction, by knowledge resource, perhaps demand is integrated in, is encapsulated as a series of various mission requirements of adaptations and is known The form of the service of knowledge demand.
2. product description:KV-3a can provide the summary table of the knowledge and service interaction that determine in KV-1, shield different flat Platform, not homologous ray, different language, the difference between different model, so that the knowledge resource in system and tissue be enable to obtain Preferably shared and reuse achievees the purpose that the exchange of knowledge, shared and knowledge based carry out task cooperative and problem solving.
V. 1. Product Definition of knowledge-knowledge matrix (KV-3b):KV-3b can be with institute determining in the multiple KV-1 of fast browsing Have the interaction of knowledge resource, be described mainly as realizing the same knowledge function jointly, multiple knowledge resources be how cooperation interaction , including multiple knowledge resources be complete same knowledge function and interacting of carrying out and with external knowledge module/sub- grade The exchange that knowledge carries out also includes the interaction that multiple knowledge fusions are carried out at a more top knowledge.
2. product description:KV-3b mainly describes the interactive process of knowledge resource, i.e. interaction between knowledge is suitable by what What sequence carried out, interaction every time is triggered by what knowledge event.Here knowledge event be between knowledge interbehavior it is detailed Illustrate, including trigger condition, relevant interface, interaction data etc..Multiple scenes, institute can be divided as needed to the description of Knowledge interaction The knowledge of description need to be consistent with KV-3a.KV-3b is usually indicated in the matrix form.
Vi. knowledge function describes (KV-4) 1. Product Definition:KV-4 mainly describes the function of various knowledge resources, and ensures The connection of knowledge function is complete (i.e. input needed for knowledge resource can be fully met).
2. product description:The function of various knowledge resources in architecture is illustrated using KV-4.Description KV-4 have with Lower two kinds of basic modes:
1. the knowledge function hierarchical fashion classified, the decomposition of knowledge function is described with tree structure, task be collaboration but Interrelated situation, often in this way.
2. data flow diagram, for illustrating the knowledge function connected with data flow arrow and data repository.
Vii. ability traces knowledge matrix (KV-5a) 1. Product Definition:KV-5a describes required ability and fulfillment capability Mapping relations between knowledge, it is ensured that knowledge is matched with required ability.KV-5a carries out capability analysis and benefit in Utilization ability product It is carried out having erected a bridge block between knowledge analysis with knowledge-product.
2. product description:KV-5a is for the pass between the required capability set and knowledge function collection of Specification Architecture description System.KV-5a illustrates that Utilization ability element supports specific knowledge function by way of mapping matrix.It says in principle, each Capability development stage or in the different ability scenario stages, different KV-5a can be created.
Viii. operational activity traces knowledge matrix (KV-5b) 1. Product Definition:KV-5b mainly describes knowledge function and makees Relationship between war activity.Knowledge function describes in KV-4, and operational activity is determined in OV-5a and OV-5b.
2. product description:Between operational activity set and knowledge function collection of the KV-5b for Specification Architecture description Relationship.Relationship between operational activity and knowledge function also can be regarded as the mapping relations of multi-to-multi, in general, KV-5b is with knowing The relational matrix between function and operational activity is known to indicate.Another format of KV-5b is list, to show each knowledge function The execution state of energy.
Ix. 1. Product Definition of knowledge resource stream matrix (KV-6):KV-6 mainly describes the knowledge exchanged between knowledge resource The characteristic of resource flow focuses primarily on the characteristic of knowledge resource stream and the content of knowledge resource stream.
2. product description:The characteristic of the knowledge resource stream exchanged between knowledge resource is described in detail in KV-6.KV-6 is equal to OV-3 provides details for the connection of knowledge resource stream.In general, KV-6 is indicated in a tabular form.
X. 1. Product Definition of Knowledge Measurement matrix (KV-7):KV-7 describes the Measure Indexes of knowledge resource.
2. product description:KV-7 matrix illustrates the qualitative measure index and quantitative measurement index of knowledge resource.It should Model defines all measures of use.Performance parameter includes all performance characteristics, develops demand, system with these features Set pattern model.In general, KV-7 matrix is a table, user-defined Knowledge Measurement index relevant to the period is listed.
Xi. knowledge evolution describes (KV-8) 1. Product Definition:KV-8 gives drilling for the entire life cycle of knowledge resource Into situation, describe how they change over time.
2. product description:KV-8 can describe the knowledge energy of the different periods such as past, current and future according to time schedule Power.The model use the modeling element similar with KV-1, can describe each knowledge resource structure and these knowledge resources it Between interaction.When KV-8 is in conjunction with other evolution models, such as when with CV-2, CV-3, normative forecast (StdV-2) models coupling, By the details of the ability that provides how at any time evolution.By means of which, KV-8 can be with the evolution of support system structure Plan or interim plan.
Xii. knowledge technology and technical ability prediction (KV-9)
1. Product Definition:KV-9 defines the possible support technology of current and future ken and technical ability.Future knowledge Field support technology and technical ability refer to those can from current techniques and technical ability, and it is expected that improvement and development trend in pass through The technology that reasonable prediction is drawn.There is the speciality to face the future in view of KV-9, classic predictive is divided into short-term, medium and long term, Such as 6 months, 12 months, 18 months.
2. product description:The prediction to knowledge technology development trend is described in detail in KV-9.Architect can be directed to knowledge Technical resource develops different KV-9 models respectively.Whether the selection of period should be consistent with architecture transition plan, i.e., Increase new ability or upgrades the availability for depending on new technology and associative skills to existing resource.The content of prediction includes to existing There are a potential impact of architecture and the influence to transition architecture and target architecture, the focus of prediction is to opening The architecture purpose of hair is in relation to and to its knowledge technology resource for having an impact.In general, using one or more in the incipient stage The top layer reference model or standard configuration file that a suitable architecture uses.By using these reference models or standard configuration File, architect can choose ken relevant to architecture and knowledge technology.
Xiii. 1. Product Definition of knowledge rule model (KV-10a):KV-10a mainly describes the structure and row of knowledge model For element, for determine architecture realize in functionality and non-functional constraint.Model description composition knowledge model Constraint on the knowledge resource of architecture, knowledge function and knowledge base.These constraints provide in a text form, can be Functional or structural (being non-functional).
2. product description:The knowledge rule of KV-10a description is mainly used to control, constrain or instruct knowledge system construction real It is existing.Knowledge rule is the instruction in terms of defining and constraining certain business, these rules are suitable for:
1. executor;2. knowledge resource stream;3. knowledge function;4. knowledge base;5. data element.
Xiv. state of knowledge transformation description (KV-10b) 1. Product Definition:KV-10b graphically illustrate knowledge resource (or Knowledge function) to change its state different event response.These figures can substantially indicate various knowledge moneys in activity (a kind of action is taken to be transferred to a kind of new state of knowledge, every time transformation all corresponding one a series of response of knowledge events in source A knowledge event and an action).
2. product description:KV-10b together with knowledge resource combinations of states, knowledge event is described from a kind of knowledge State is changed into another state of knowledge.KV-10b is simulated based on state of knowledge figure from the angle of building knowledge resource The state of knowledge change, focus be knowledge resource how responsing excitation (such as trigger and knowledge event).It is similar with OV-6b, this A little responses may not only depend on regular collection or service condition, also depend on knowledge resource state when receiving instruction.State Each variation be known as one transformation.Based on particular event and current state, a kind of response is specified in each transformation.
Xv. knowledge event tracking describes (KV-10c) 1. Product Definition:KV-10c is provided to interaction between knowledge resource Timing inspection.The model is used for the knowledge resource event of analyzing influence operational activity, and each knowledge event tracking chart should Subsidiary one defines the description of special scenario or situation.
2. product description:KV-10c defines the sequence in knowledge resource or the exchange of knowledge in knowledge base resource flow element. KV-10c provides the knowledge resource stream for participating in exchanging between knowledge resource (external and internal knowledge resource) or knowledge base Log-Rank test.It, can when knowledge resource stream flows to another secure resources or secure port from a knowledge resource or knowledge base To stamp the label of knowledge event and its time.
6) secured views product
I. it summarizes:Secured views match the angle of rich security system from building, and the rich confrontation of description match is lower to match rich situation sense in real time Know and support the command and control and dynamic adjustment of matching rich situation the building of security system.Secured views include 14 kinds of products:Peace Full interface description (SecV-1), secure resources stream description (SecV-2), safety-service matrix (SecV-3a), safety-safe square Battle array (SecV-3b), security function description (SecV-4), ability retrospect security matrix (SecV-5a), operational activity trace safe square Battle array (SecV-5b), secure resources stream matrix (SecV-6), security measure matrix (SecV-7), safe evolution description (SecV-8), Safe practice and technical ability prediction (SecV-9), safety regulation model (SecV-10a), safe condition transformation description (SecV-10b), Security incident follow-up describes (SecV-10c).
Ii. safe interface description (SecV-1)
1. Product Definition:Interaction between SecV-1 description safety composition and safety.SecV-1 passes through description secure resources How to construct and interact, operational architecture together with Security Architecture models coupling.
2. product description:The level of SecV-1 specified in more detail safety divides, and simple arborescence description can be used.It utilizes SecV-1 can easily describe safe and sub- level security, and determine the resource flow between safety.The main mesh of SecV-1 model Be description secure resources structure, that is, determine main sub- level security, executor and activity (function) and they between Interaction.
Iii. secure resources stream description (SecV-2)
1. Product Definition:SecV-2 illustrates the resource flow between safety, and can list the protocol stack of connection.SecV-2 mould Type provides between safety accurately connection specification, either existing connection standardizes, is also possible to for the following connection and creates Connection specification.
2. product description:The content of SecV-2 model includes the secure resources stream between safety, secure port and port. System Architect can create a figure to each secure resources stream, can also be described with a figure in conditions permit all Secure resources stream.Each SecV-2 model can show following information:
1. which secure port be connected to;2. the safety that secure port provides;3. using the safety of secure resources stream;4. root According to physical connection, logical connection and connection protocol, secure resources stream is defined.
Iv. safety-service matrix (SecV-3a)
1. Product Definition:SecV-3a mainly describes all safety-Service Source interaction that SecV-1 is determined, safety is provided Source perhaps demand in integrates, and is encapsulated as a series of form of services for adapting to various mission requirements and demand for security.
2. product description:SecV-3a can provide the summary table of the safety and service interaction that determine in SecV-1, and shielding is different Platform, not homologous ray, different language, the difference between different model, so that the secure resources in system and tissue be enable to obtain To preferably shared and reuse, reach safe exchange, mesh shared and that task cooperative and problem solving are carried out based on safety 's.
V. safety-security matrix (SecV-3b)
1. Product Definition:SecV-3b can be main with the interaction of all secure resources determined in the multiple SecV-1 of fast browsing Be described as realizing the same security function jointly, multiple secure resources be how cooperation interaction, including multiple secure resources What is carried out to complete same security function interacting and exchanging with what external security module/sub- level security carried out, also wraps Include the interaction that multiple security combinations are carried out at a more top safety.
2. product description:SecV-3b mainly describes the interactive process of secure resources, i.e. interaction between safety is by what What sequence carried out, interaction every time is triggered by what security incident.Here security incident be between safety interbehavior it is detailed Describe bright, including trigger condition, relevant interface, interaction data etc. in detail.Multiple scenes can be divided as needed to the description of secure interactive, Described safety need to be consistent with SecV-3a.SecV-3b is usually indicated in the matrix form.
Vi. security function description (SecV-4)
1. Product Definition:SecV-4 mainly describes the function of various secure resources.
2. product description:The function of various secure resources in architecture is illustrated using SecV-4.SecV-4 is described There is following two basic mode:It is collaboration in task 1. functional hierarchy classification describes the decomposition of security function with tree structure But interrelated situation, often in this way.2. data flow diagram indicates to pacify with data flow arrow and data repository Full Featured connection.
Vii. ability retrospect security matrix (SecV-5a)
1. Product Definition:SecV-5a describes the mapping relations between required ability and the safety of fulfillment capability, it is ensured that peace It is matched entirely with required ability.SecV-5a carries out capability analysis in Utilization ability product and carries out safety analysis with using safety product Between erected a bridge block.
2. product description:Between required capability set and security function collection of the SecV-5a for Specification Architecture description Relationship.SecV-5a illustrates that Utilization ability element supports particular security functionality by way of mapping matrix.It says in principle, Each capability development stage or in the different ability scenario stages, different SecV-5a can be created.
Viii. operational activity retrospect security matrix (SecV-5b)
1. Product Definition:SecV-5b mainly describes the relationship between security function and operational activity.Security function exists It is described in SecV-4, and operational activity is determined in OV-5a and OV-5b.
2. product description:Between operational activity set and security function collection of the SecV-5b for Specification Architecture description Relationship.Relationship between operational activity and security function also can be regarded as the mapping relations of multi-to-multi, in general, SecV-5b It is indicated with the relational matrix between security function and operational activity.Another format of SecV-5b is list, each to show The execution state of security function.
Ix. secure resources stream matrix (SecV-6)
1. Product Definition:SecV-6 mainly describes the characteristic of the knowledge resource stream exchanged between secure resources, main to focus In the characteristic of secure resources stream and the content of knowledge resource stream.
2. product description:The characteristic of the secure resources stream exchanged between secure resources is described in detail in SecV-6.SecV-6 etc. It is same as OV-3, provides details for the connection of secure resources stream.In general, SecV-6 is indicated in a tabular form.
X. security measure matrix (SecV-7)
1. Product Definition:SecV-7 describes the Measure Indexes of secure resources.
2. product description:SecV-7 matrix illustrates the qualitative measure index and quantitative measurement index of secure resources. The model defines all measures of use.Performance parameter includes all performance characteristics, develops demand with these features, Constituting criterion.In general, SecV-7 matrix is a table, user-defined security measure index relevant to the period is listed.
Xi. safe evolution description (SecV-8)
1. Product Definition:SecV-8 gives the evolution situation of the entire life cycle of secure resources, describes them such as What is changed over time.
2. product description:SecV-8 can describe the safety of the different periods such as past, current and future according to time schedule Ability.The model use the modeling element similar with SecV-1, can describe each secure resources structure and secure resources it Between interaction.When SecV-8 is in conjunction with other evolution models, such as with CV-2, CV-3, normative forecast (StdV-2) models coupling When, it will thus provide the details of ability how at any time evolution.By means of which, SecV-8 can be with support system structure Evolution plan or interim plan.
Xii. safe practice and technical ability prediction (SecV-9)
1. Product Definition:SecV-9 defines the possible support technology in current and future security fields and technical ability.Future peace Full field support technology and technical ability refer to those can from current techniques and technical ability, and it is expected that improvement and development trend in lead to Cross the technology that reasonable prediction is drawn.There is the speciality to face the future in view of SecV-9, classic predictive is divided into short-term, mid-term and length Phase, such as 6 months, 12 months, 18 months.
2. product description:The prediction to safe practice development trend is described in detail in SecV-9.Architect can be for peace Full technical resource develops different SecV-9 models respectively.The selection of period should be consistent with architecture transition plan, i.e., Whether increase new ability or upgrades the availability for depending on new technology and associative skills to existing resource.The content of prediction includes The focus of potential impact to existing architecture and the influence to transition architecture and target architecture, prediction is to just Exploitation architecture purpose in relation to and to its safe practice resource for having an impact.In general, using one in the incipient stage Or top layer reference model or standard configuration file that multiple suitable architectures use.By using these reference models or standard Configuration file, architect can choose security fields relevant to architecture and safe practice.
Xiii. safety regulation model (SecV-10a)
1. Product Definition:SecV-10a mainly describes the structure and behavior element of security model, for determining architecture Functionality and non-functional constraint in realization.The secure resources of the architecture of model description composition security model, safety Constraint on function, secure data and secure port.These constraints provide in a text form, can be it is functional or Structural (being non-functional).
2. product description:The safety regulation of SecV-10a description is mainly used to control, constrain or instruct Security Architecture It realizes.Safety regulation is the instruction in terms of defining and constraining certain business, these rules are suitable for:
1. executor;2. secure resources stream;3. security function;4. secure port;5. data element.
Xiv. safe condition transformation description (SecV-10b)
1. Product Definition:SecV-10b graphically illustrates secure resources (or security function) to the difference for changing its state The response of event.These figures can substantially indicate that various secure resources (adopt a series of response of security incidents in activity A kind of action is taken to be transferred to a kind of new safe condition, every time all corresponding security incident of transformation and an action).
2. product description:SecV-10b together with secure resources combinations of states, security incident is described from a kind of peace Total state is changed into another safe condition.SecV-10b is based on safe condition figure, from the angle mould of building secure resources Intended safe condition change, focus be secure resources how responsing excitation (such as trigger and knowledge event).With OV-6b class Seemingly, these responses may not only depend on regular collection or service condition, also depend on secure resources state when receiving instruction. Each variation of state is known as a transformation.Based on particular event and current state, a kind of response is specified in each transformation.
Xv. Security incident follow-up description (SecV-10c)
1. Product Definition:SecV-10c provides the timing inspection to interaction between secure resources.The model is for analyzing shadow The secure resources event of operational activity is rung, each Security incident follow-up chart should be attached to one and define special scenario or situation Description.
2. product description:SecV-10c defines the secure resources stream element in secure resources or secure port environment and exchanges Sequence.SecV-10c, which is provided, to be participated in exchanging between secure resources (external and inside secure resources) or secure port The Log-Rank test of secure resources stream.Secure resources stream flows to another secure resources or peace from a secure resources or secure port When full port, the label of security incident and its time can be stamped.
7) service view product
I. it summarizes:Service view describes composition, definition, behavioural characteristic, the interactive relation of system related service using chart Deng and these services how for system function to provide support.Service view includes 14 kinds of products:Service interface describes (SvcV- 1), Service Source stream description (SvcV-2), system-service matrix (SvcV-3a), service-service matrix (SvcV-3b), service Function describes (SvcV-4), ability retrospect service matrix (SvcV-5a), operational activity retrospect service matrix (SvcV-5b), service Resource flow matrix (SvcV-6), service measure matrix (SvcV-7), service evolution description (SvcV-8), service technology and technical ability are pre- Survey (SvcV-9), service regulation model (SvcV-10a), service state transformation description (SvcV-10b), Service events tracking description (SvcV-10c)。
Ii. service interface description (SvcV-1)
1. Product Definition:SvcV-1 specific definition defines the relationship between the distinguishing hierarchy and service of service, can be used for pair Service carries out Classification Management, provides support for planning service system, and mention for the exploitation of subsequent SvcV-2, SvcV-3, SvcV-4 For constraining and referring to.
2. product description:The level of SvcV-1 specified in more detail service divides, and simple arborescence description can be used.It is tree-like Node in figure is service, and the relationship between node is component relationship.Top service can be abstract service, represent a service Classification is made of underlying services.When necessary, summary description can be carried out to each service in SvcV-1, illustrates each service The service function having, it is consistent with the associated description in SvcV-2 to the description of service function.
Iii. Service Source stream description (SvcV-2)
1. Product Definition:SvcV-2 illustrates the resource flow between service, and lists connection protocol stack used.The model It is detailed description on the basis of SvcV-1 to information such as the interface of service, QoS, service function, the relevant constraints of function, with SvcV-1 together in composition system all services specific definition, provide constraint and reference for the exploitation of SvcV-3, SvcV-4.
2. product description:SvcV-2 answers the related content of service in detail, and is consistent with SvcV-1, SvcV-3. Related content includes Services Brief description, service interface, QoS, service function, service function constraint etc..Wherein service is general It describes to be the brief description to service background, demand etc.;Service interface refers to the port connected between service, and a service can To include multiple service interfaces;QoS is the explanation to the general nonfunctional spaces of one or more of service, as availability, can By property etc.;Service function refers to the specific service that service is provided out by service interface;Service function constraint is to service function The constraint of the indexs such as energy execution performance.SvcV-2 can be used table collocation text and be described.
Iv. system-service matrix (SvcV-3a)
1. Product Definition:SvcV-3a can be interactive with all systems-Service Source determined in fast browsing SvcV-1, it The summary table of the system and service interaction that determine in SvcV-1 can be provided.SvcV-3a is non-to service transformation is provided to existing system Chang Youyong.Matrix format can be used for the potential general character of rapid evaluation and redundant content.According to the background of the determination of architecture mother, It can be closely connected using various ways come organization system-service matrix to highlight system to service interaction.
2. product description:Interaction between SvcV-3a profiling system and Service Source is determined according to architecture purpose Background, can be using various ways come organization system-service matrix.SvcV-1 pays close attention to Service Source and its interaction, to this A little Service Sources and its interaction are summarized in SvcV-3a and service-service matrix (SvcV-3b).In general, SvcV-3a Indicate in a matrix fashion, the axis of matrix indicates system, and another axis indicates Service Source, the cell in matrix indicate system with Existing interactive relation between service, cell can indicate a variety of interactive information types.It can be indicated with different symbols The interaction of resource can also indicate resource with the figure (dot, triangle, square) that distinct interaction feature is described below Interaction.
V. service-service matrix (SvcV-3b)
1. Product Definition:SvcV-3b can be main with the interaction of all Service Sources determined in the multiple SvcV-1 of fast browsing Be described as realizing same system function jointly, multiple services be how cooperation interaction, including multiple services are same to complete It one system function and interacting of carrying out and is exchanged with what external system module/subsystem carried out, also includes multiple services The interaction for being combined into a more top service and carrying out.SvcV-3b both aids in determining whether service interface, while also designing for system Personnel and developer give the data of service interaction transmitting.
2. product description:SvcV-3b describes the process of service interaction, i.e., the interaction between service is to carry out in what order , interaction is triggered by what Service events every time.Here Service events are the detailed descriptions to interbehavior between service, packet Include trigger condition, relevant interface, interaction data etc..Multiple scenes can be divided as needed to the description of service interaction, it is described Service need to be consistent with SvcV-3a.SvcV-3b is usually indicated in the matrix form.
Vi. service function description (SvcV-4)
1. Product Definition:SvcV-4 model mainly describes personnel and service function.
2. product description:SvcV-4 illustrates the service function of various resources in architecture.SvcV-4 is corresponded to It is a kind of behavior on SvcV-1 (this corresponding relationship is identical as the corresponding OV-2 of OV-5b).Description SvcV-4 has following two basic Mode:1. the service function hierarchical fashion classified, the decomposition of service function is described with tree structure, task be collaboration but mutually The case where association, often in this way.2. data flow diagram, for illustrating to have been connected with data flow arrow with data repository The service function come.
Vii. ability retrospect service matrix (SvcV-5a)
1. Product Definition:SvcV-5a model describes the mapping relations between required ability and the service of fulfillment capability, really The service of guarantor is matched with required ability.SvcV-5a is carried out capability analysis in Utilization ability product and is serviced with using service product A bridge block is erected between analysis, especially the model determines how to execute clothes using various available competence elements Business.
2. product description:The relationship between service that SvcV-5a is supported for the required ability of specification and these abilities, SvcV-5a illustrates that Utilization ability element supports special services by way of mapping matrix.It says, is opened in each ability in principle Hair stage or in the different ability scenario stages, different SvcV-5a can be created.
Viii. operational activity retrospect service matrix (SvcV-5b)
1. Product Definition:SvcV-5b mainly describes the relationship between service function and operational activity.Service function exists It is described in SvcV-4, and operational activity is determined in OV-5a and OV-5b.SvcV-5b is described between service function and operational activity Mapping relations, so that it is determined that operational need is converted into the significant action executed by service solution.
2. product description:Between operational activity set and service functionality set of the SvcV-5b for Specification Architecture description Relationship.Relationship between operational activity and service function also can be regarded as the mapping relations of multi-to-multi.In general, SvcV-5b It is indicated with the relational matrix between service function and operational activity.Another format of SvcV-5b is list, each to show The execution state of function.
Ix. Service Source stream matrix (SvcV-6)
1. Product Definition:SvcV-6 mainly describes the characteristic of the Service Source stream exchanged between service, focus of attention It is the resource across service boundaries.
2. product description:The characteristic of the Service Source stream exchanged between service is described in detail in SvcV-6.SvcV-6 is equal to OV-3 provides details for service connection, and the resource flow exchange determined in OV-3 is realized between these services.No matter provide The solution of source stream exchange is automatic or nonautomatic (such as verbal order formula), can be described in detail.It is logical Often, SvcV-6 is indicated in a tabular form.
X. service measure matrix (SvcV-7)
1. Product Definition:SvcV-7 describes the Measure Indexes of Service Source.SvcV-7 is extended described in SvcV-1 Information, and give the feature of resource in the model.
2. product description:SvcV-7 matrix illustrates the qualitative measure index and quantitative measurement index of Service Source. The model defines all measures of use.Performance parameter includes all performance characteristics, develops demand with these features, Constituting criterion.In general, SvcV-7 matrix is a table, user-defined Measure Indexes relevant to the period are listed.
Xi. service evolution description (SvcV-8)
1. Product Definition:SvcV-8 gives the evolution situation of the entire life cycle of Service Source, describes them such as What is changed over time.
2. product description:SvcV-8 can describe the service of the different periods such as past, current and future according to time schedule Ability.The model uses the modeling element similar with SvcV-1, can describe between the structure of each resource and these resources Interaction.It, will when SvcV-8 is in conjunction with other evolution models, such as when with CV-2, CV-3, normative forecast (StdV-2) models coupling The details of offer ability how at any time evolution.By means of which, SvcV-8 can be with the evolution of support system structure Plan or interim plan.
Xii. service technology and technical ability prediction (SvcV-9)
1. Product Definition:SvcV-9 defines current and future and services possible support technology and technical ability.Future service branch Support technology and technical ability refer to those can from current techniques and technical ability, and it is expected that improvement and development trend in by rationally pre- The technology for measuring out.SvcV-9 is other than providing trend, ability and the inventory of service, moreover it is possible to provide these projects to system knot The assessment that structure influences.There is the speciality to face the future in view of SvcV-9, classic predictive is divided into short-term, medium and long term, such as 6 Moon, 12 months, 18 months etc..
2. product description:The prediction to service technology development trend is described in detail in SvcV-9.Architect can be for clothes Business technical resource develops different SvcV-9 models respectively.The selection of period should be consistent with architecture transition plan, i.e., Whether increase new ability or upgrades the availability for depending on new technology and associative skills to existing resource.The content of prediction includes The focus of potential impact to existing architecture and the influence to transition architecture and target architecture, prediction is to just Exploitation architecture purpose in relation to and to its service technology resource for having an impact.In general, using one in the incipient stage Or top layer reference model or standard configuration file that multiple suitable architectures use.By using these reference models or standard Configuration file, architect can choose service field relevant to architecture and service.
Xiii. service regulation model (SvcV-10a)
1. Product Definition:SvcV-10a clear stipulaties service system structure realize aspect functionality and non-functional pact Beam condition, the i.e. structural element and behavior element of service view.
2. product description:The service regulation of SvcV-10a description is mainly used to control, constrain or guidance system structure is realized. Service regulation is the instruction in terms of defining and constraining certain business, these rules are suitable for:
1. executor;2. Service Source stream;3. service function;4. system port;5. data element.
Xiv. service state transformation description (SvcV-10b)
1. Product Definition:SvcV-10b graphically illustrates Service Source (or service function) to the difference for changing its state The response of event.These figures can substantially indicate that various Service Sources (adopt a series of response of Service events in activity A kind of action is taken to be transferred to a kind of new service state, every time all corresponding event of transformation and an action).
2. product description:SvcV-10b is combined together Service events and service resource status, describes from a kind of clothes Business state is changed into another service state.SvcV-10b is based on service state figure, from the angle mould of building Service Source Intended service state change, focus be Service Source how responsing excitation (such as trigger and Service events).With OV-6b class Seemingly, these responses may not only depend on regular collection or service condition, also depend on Service Source state when receiving instruction.
Xv. Service events retrospect description (SvcV-10c)
1. Product Definition:SvcV-10c is provided chronologically between the detection of interaction service function resource.Each service thing Part retrospect figure requires the subsidiary description to special scenario or situation.
2. product description:SvcV-10c defines the Service Source stream element in Service Source or serve port environment and exchanges Sequence.The building block of SvcV-10c includes functionality resources or serve port, distinctive executor and is under the jurisdiction of life The port of line.SvcV-10c, which is provided, to be participated in exchanging between Service Source (external and internal Service Source) or serve port Service Source stream Log-Rank test.Service Source stream from a Service Source or serve port flow to another Service Source or When serve port, the label of Service events and its service time can be stamped.
8) system view product
I. it summarizes:System view product is a series of graphical representations or verbal description, these products provide for each related side (or support) illustrates that it is concerned with the specific object under specific physics (geography) position to the description of system or interconnected relationship Reason system.System view includes 14 kinds of products:System interface describes (SV-1), system resource stream description (SV-2), system-system Matrix (SV-3), system function description (SV-4), operational activity and system function trace matrix (SV-5a), operational activity and are System retrospect matrix (SV-5b), system resource stream matrix (SV-6), system metrics matrix (SV-7), system evolved description (SV-8), Systems technology and technical ability prediction (SV-9), system convention model (SV-10a), system state transition describe (SV-10b), system thing Part tracking description (SV-10c).
Ii. system interface description (SV-1)
1. Product Definition:SV-1 describes the interaction between system composition and system.How SV-1 is by describing system resource Building and interaction, operational architecture model together with system architecture models coupling, to realize in OV-2 Determining logic architecture.
2. product description:SV-1 describe support OV-2 in operational node complete operational activity system node and these The system that system node includes, and describe the resource flow between them.Wherein, system node can be to similar capabilities Or the logical division of the system of function, it is also possible to the entity with actual physical meaning.As needed, it can will integrate System, system group, dedicated system or subsystem all regard system as.When needing, it is corresponding that each system can be provided in SV-1 System function, these system functions should be consistent with the system function in SV-4.
Iii. system resource stream description (SV-2)
1. Product Definition:SV-2 is the system resource stream between description system, and can list the protocol stack of connection.
2. product description:The content of SV-2 model includes the resource flow between system, system port and port.System tray Structure teacher can create a figure to each resource flow, can also describe all system resource with a figure in conditions permit Stream.Each SV-2 model can show following information:
1. which system port is connected;2. system belonging to system port;3. utilizing physical connectivity, logical connectivity And the agreement that connection uses, define system resource stream.
Iv. system-sytem matrix (SV-3)
1. Product Definition:SV-3 is the product for describing interface relationship and interface parameters in SV-2a.
2. product description:SV-3 describes the parameter of the total interface provided in SV-2a.The simple representation of SV-3 is available The incidence relation of system is stated using " N2 " type matrix is similar to.In this matrix, system enumerate respectively matrix row and In column, each cell indicates the interface between a pair of of system, and by the mark to cell, can determine between a pair of of system is It is no that there are interfaces.It can also be by marking different color or symbol (i.e. icon) to cell in SV-3, and be aided with corresponding Explanatory note, the parameter of interface is described with this.These interface parameters may include:State, such as retired, active service, grinding; Purpose, such as be used to accuse, information;Level of confidentiality, such as National Military Standard, communication protocol;Standard, such as National Military Standard are led to Believe agreement etc.;Key interface.
V. system function description (SV-4)
1. Product Definition:SV-4 is the product for describing system function and its data flow relation.
2. product description:SV-4 describes system composition from the angle of system function and data flow, the system function in SV-4 It can be realized by the system in SV-1.The product can describe the composition of system function with hierarchical diagram, can also use data flow The form of figure describes data flow and corresponding data exchange between system function, provides basis for the design and development of system. SV-4 is corresponding product of the OV-5 in SV, and the decomposition of system function should come really with architecture purpose as needed in SV-4 It is fixed, it can be (correspondence that system and function need not be investigated) of the scope of business, be also possible to the function of some particular system.SV-4 Described in not only to consider the function of some system itself, some general utility functions should also be taken in, such as man-machine interface function Energy is equal.In addition, when with description of data stream SV-4 the function and data flow of scope inside architecture can not be confined to, also It is considered as external system data flow/receiver related with the architecture.
Vi. operational activity and system function retrospect matrix (SV-5a)
1. Product Definition:SV-5a describes the product that system function supports operational activity relationship.
2. product description:SV-5a is the connection bridge of OV and SV, it establishes operational activity and system function in architecture Corresponding relationship between energy.The form of SV-5a table describes support of the system function to operational activity, system function and work War activity can be identified each cell with symbol respectively as the columns and rows of table, and tagged cell indicates Some system function can provide support for some operational activity.
Vii. operational activity and system retrospect matrix (SV-5b)
1. Product Definition:SV-5b describes being associated between the system determined in SV-1 and the operational activity determined in OV-5a Relationship.
2. product description:SV-5b is a kind of relational norm, suitable for architecture description a series of operational activities and A series of various relationships between system functions.The retrospect relationship of the model foundation function system demand and user demand, SV-5b Matrix is expressed as relational matrix between system and operational activity.
Viii. system resource stream matrix (SV-6)
1. Product Definition:SV-6 is the system resource stream feature exchanged between description system, and emphasis is cross-system boundary Resource.
2. product description:SV-6 has determined the feature of the resource flow exchanged between system, and emphasis is that system is automatically performed Information exchange and data exchange.SV-6 and OV-3 equity provides the details for implementing the system interconnection of resource flow exchange, In resource flow exchange determined by OV-3, the exchange of the resource flow of non-automated, be also included within such as verbal order in.The focus of SV-6 The exchange of system resource stream by the influence for determining those of system detail factor, including by the period, time schedule, handling capacity, The influence of the details such as Information Assurance and Resource Exchange security feature.In addition, the format of system resource stream element, medium type, standard Exactness, linear module and system data standard etc. are also described in a matrix.
Ix. system metrics matrix (SV-7)
1. Product Definition:SV-7 is description system metrics index.It is given in the system interface description of system metrics matrix-expands Information out describes the resource characteristic in SV-1.
2. product description:The measurement of system is described to SV-7 matrix qualitative and quantitative, gives all system metrics Index.Measure Indexes select use by end user group, are described by architect.The major function of SV-7 is which is studied Measure Indexes are mostly important for satisfactorily completing undertaken mission task, and how to meet these performance parameters.Table Lattice are the typical formats of SV-7 model, mainly list user-defined Measure Indexes and relevant period in table.
X. system evolved description (SV-8)
1. Product Definition:SV-8 describes the image of the entire life cycle of system, describe they how passage at any time And constantly upgrade variation, the corresponding relationship of system structure and time schedule is also described.
2. product description:SV-8 is combined with other evolution models can provide multiple definition, it is contemplated that system capability How with time change passage continuous evolution, support formulate a system structure evolution plan or interim plan.SV-8 can be with Historical ability (ability left) is described according to time schedule, current ability and following ability can be described.SV- The modeling element of 8 uses is identical as SV-1, to illustrate the structure of each resource, the interaction occurred inside description resource.
Xi. systems technology and technical ability prediction (SV-9)
1. Product Definition:SV-9 is the product predicted new technology available in given time.
2. product description:The development trend of SV-9 model summary forecasting system technology.Architect can generate system respectively The prediction model of technology and technical ability.The selection of special time period should mutually be coordinated with architecture transition planning.That is, new energy The insertion of power and the upgrading of existing resource depend on the availability of new skill and associative skills, or by its promotion.The content packet of prediction The potential impact to existing architecture is included, further includes the influence developed to transition architecture and target architecture.Prediction Focus be systems technology relevant to system structure exploitation purpose field, prediction be also predefined to architecture being developed Influence.
Xii. system convention model (SV-10a)
1. Product Definition:SV-10a is description on system and the influential constraint condition of system function realization or operation rule Product.
2. product description:SV-10a depicts the operation of the constraint condition and system of system for restricting or system function realization Rule.Wherein, rule can be the verbal description of definition or the entire certain behaviors of field of information system of constraint, be also possible to a system The conditional statement of column.According to the rule provided in the product, system can be run under given conditions.This rule can use text Form indicate, such as can with " if (certain conditions) exists, (certain event) just generation, then (complete certain system functions) " Mode indicated.
Xiii. system state transition description (SV-10b)
1. Product Definition:SV-10b is the product for the event for describing system operation and influencing these processes.
2. product description:SV-10b describes sound of the system (or system function) to the different event for changing its state It answers, features the event for causing system or system function state change.Primary system state change occurs in it, referred to as primary to turn It moves, each transfer will specify an event and a movement.System mode and it is relevant movement determined a system or Response of the system function to event.When an event occurs, next state of system or system function depends on existing shape State, event and rule or condition.
Xiv. system event tracking description (SV-10c)
1. Product Definition:SV-10c is the product for describing system data exchange timing.
2. product description:SV-10c is described in a specific scenario, to all systems and system function being related to Between system data swap time sequence inspection.Corresponding verbal description description specified scenario or situation should be equipped with.By right The tracking of specified event, the sequence of the available exchange of the inter-system data in a scenario.SV-10c is combined with SV-10b, It can be with the behavioral characteristics of display system.SV-10c can both describe the sequence of inter-system data exchange, can also describe system function The sequence of data exchange between energy, but the two answer it is separately shown.When the data exchanged between description system or system function, it should provide Data flow.The precedence diagram of UML is generallyd use to describe SV-10c, wherein what swimming lane line indicated is the system or SV- in SV-1 System function in 4, event should be consistent with the event in SV-10b, can provide calculating thing as needed when describing event sequence The formula of part time of origin.
9) data and information view product
I. it summarizes:Data and information view describe to fight and business information from the angle of data and Information application demand Demand and management rule therein, attribute, grammer, the semanteme that definition is fought with the information/data of business demand, with Unify legislation Information requirement, flow rules in business procedure.Data and information view include 3 products:Conceptual data model (DIV-1), Logic data model (DIV-2) and Physical data model (DIV-3).
Ii. conceptual data model (DIV-1)
1. Product Definition:DIV-1 describes the high layer information concept of operational architecture.The model is commonly used to compiling system knot The business information requirements of structure and the rule of structuring business procedure.DIV-1 describes information relevant to architecture information, including Item of information, attribute or feature and its internal relations.
2. product description:The business process rules of structuring and the structuring of DIV-1 description architecture information type, Architectural elements include the description to information entity and relationship type.DIV-1 is intended to describe the information or number important to business According to such as the information and data quoted in regulations, standard operation regulation (SOP).
Iii. logic data model (DIV-2)
1. Product Definition:DIV-2 can be in the case where not considering specific implementation or product details, to architectural data Definition is analyzed.
2. product description:DIV-2 provides common data and defines dictionary, consistently to indicate model, but regardless of in description Including logical layer data element where.The model directly reflects from conceptual data model and is mapped to logical data mould The mode or theory of type.In general, DIV-2 is described with entity relationship diagram.
Iv. Physical data model (DIV-3)
1. Product Definition:DIV-3 define architecture description in use variety classes system data, service data, The data structures such as secure data.How the information that the model is used to indicate in description logic data model implements.
2. product description:DIV-3 is a kind of model of realization oriented.In system view, service view, secured views, know Know in view, describes how the information requirement indicated in DIV-2 is realized using the model.The entity of DIV-3 indicates system money Source stream, system resource element, Service Source stream, Service Source element, secure resources stream, secure resources element, knowledge resource stream, Knowledge resource element, trigger event, event and element.Entity indicates being described in detail as follows for content:1. in system function description (SV-4) the system resource stream in.2. being determined in system resource stream matrix (SV-6) and system event-tracking description (SV-10c) System resource element.3. service function describes the Service Source stream in (SvcV-4).4. Service Source stream matrix (SvcV-6) With the Service Source element determined in Service events-tracking description (SvcV-10c).3. security function describes in (SecV-4) Secure resources stream.4. the safety determined in secure resources stream matrix (SecV-6) and security incident-tracking description (SecV-10c) Resource element.5. knowledge function describes the knowledge resource stream in (KV-4).6. knowledge resource stream matrix (KV-6) and knowledge event- The knowledge resource element determined in tracking description (KV-10c).7. system state transition describes (SV-10b), service state transformation (SV-10c), safe condition transformation (SecV-10c), the state of knowledge change the trigger event in (SV-10c) description.8. system thing Part-tracking description (SV-10c), Service events-tracking description (SvcV-10c), security incident-tracking description (SecV-10c), Event in knowledge event-tracking description (KV-10c).9. element needed for the standard in standard configuration file or normative forecast.
10) normal view product
I. it summarizes:Normal view be from the angle of management, design and development system, describe relevant operation, routine work, Standard criterions and its Further Developments such as technology, industrial standard, engineering construction agreement, regular criterion.Normal view includes 2 productions Product:Standards system (StdV-1) and normative forecast (StdV-2).
Ii. standards system (StdV-1)
1. Product Definition:StdV-1 definition management, design and development sorts of systems, the various technologies for needing to follow, operation It is standardized with routine work standard and relevant guide, item of the policy etc..StdV-1 can be used for instructing the technology of system to implement, It can also be used for the standard compliance of inspection system.
2. product description:StdV-1 is made of series of standards, these standards restrict the design and implementation of architecture, Including system, service, system hardware and software, communication protocol and the adoptable standard of data format.The mark provided in StdV-1 Standard should be with OV-3, OV-5c, OV-6a, OV-7, SV-1, SV-2, SV-4, SV-6, SV-7, SV-11, SvcV-2, SvcV-4 product In information exchange, operational activity, operational flowchart, system, system function, system data, hardware and software, communication protocol, clothes Business QoS, there are incidence relations for Services Composition scheme, i.e., the element in these products should follow the standard listed in StdV-1. TdV-1 it needs to be determined that and list the relevant existing standard criterion of architecture project, while also to list the guide material of shortage Material.Similar with other products, the standards system in StdV-1 will also specify corresponding time range (such as existing, yet to be built or progress In), this helps to distinguish nascent technology.If there is multinomial newborn standard within certain time, need in StdV-2 In be described further.StdV-1 both can simply enumerate standard, and mark can also be shown in detail with form The quasi- scope of application and applicable time.
Iii. normative forecast (StdV-2)
1. Product Definition:StdV-2 is described to the technology relevant criterion, operation standard and traffic criteria listed in StdV-1 Deng expectation change, be the detailed description to system, operation and the relevant newborn standard of routine work activity.It is pre- to standard evolution The period of survey is associated with system evolution, the period of the technological prediction of SV-9 in SV-8.Energy is also wanted to the prediction of standard It is enough customized, to focus on field relevant to the purpose of architecture project, identification influences the important of architecture and asks Topic.A main purpose of StdV-2 be identify key technology standard and its fragility and these technical standard futures it is right The influence of project development and system maintenance.
2. product description:StdV-2 lists newborn standard relevant to solution in architecture scope of project and repairs Standard is ordered, the feasibility of wherein newborn standard is predicted, and the element and time of prediction result and SV-8, SV-9 product Section associates.Selected period (such as 6 months and 12 months) and the standard tracked will be with (SV-8 is supported) bodies Architecture migration plan is mutually coordinated, that is to say, that the generation of new ability and the upgrading of existing system are dependent on the feasible of new standard Property, or driven by the feasibility of new standard.Prediction specifies potential standard, thus will affect current architectural, also can shadow Ring the implementation to target architecture and its migration.
11) view product is equipped
I. it summarizes:View is equipped mainly from construction and management view, is described in Knowledge View, secured views and service view It is required that equipment classification, index, system and development course etc..Equipping view includes 4 products:Equipment configuration describes (EV- 1), equipment and capabilities map relationship (EV-2), equipment and operational activity mapping relations (EV-3), equipment tactical and technical norms description (EV-4) and equipment Development describes (EV-5).
Ii. equipment configuration description (EV-1)
1. Product Definition:EV-1 describes the taxonomic structure of electronic information equipment, can be from the function of equipment, form and technology body The classification such as system.
2. product description:Relationship between the distinguishing hierarchy and equipment of EV-1 specific definition equipment, can be used for equip into Row Classification Management provides support for planning equipment architecture.EV-1 model has determined the composed structure of electronic information equipment, exploitation EV-1 will meet electronic information equipment system, can cover the whole equipment types and important subclass of proposed adoption, and can reflect dress Standby function, form.
Iii. equipment and ability corresponding relationship (EV-2)
1. Product Definition:EV-2 describes support of the electronic information equipment to Military Information System ability need.
2. product description:EV-2 model is wanted clearly describe to equip the supporting relation to ability need, it is ensured that equipment and institute Ability is needed to match.EV-2 is the bridge of ability system structure Yu equipment architecture structure.EV-2 is illustrated by way of mapping matrix Utilization ability element supports project equipment.It says in principle, in each capability development stage or in different ability scenario ranks Section, can create different EV-2.Iv. equipment and operational activity mapping relations (EV-3)
1. Product Definition:EV-3 describes support of the electronic information equipment to the operational activity that carries out.
2. product description:EV-3 wants clearly describe to equip the supporting relation to operational activity, which is OV and EV Bridge, it establishes the corresponding relationship in architecture between operational activity and electronic information equipment.The form of EV-3 table The support equipped to operational activity is described, equipment and operational activity, can be with symbols to every respectively as the columns and rows of table A cell is identified, and tagged cell indicates that some equipment can provide support for some operational activity.
V. equipment tactical and technical norms description (EV-4), 1. Product Definitions:EV-4 describes the property of specific electronic information equipment Energy and tactical and technical norms.2. product description:EV-4 description should quantify, and the performance and tactics skill that can specifically reflect all equipments Art index.
Vi. equipment Development describes (EV-5) 1. Product Definition:EV-5 describes the rule of a certain field electronic information equipment construction It draws and plans.2. product description:EV-5 describes clearly describe the development plan of equipment, with weapon and equipment development strategy and build If planning is consistent.
Although for illustrative purposes, the preferred embodiment of the present invention has been disclosed, those skilled in the art will recognize It is various improve, increase and replace be also it is possible, therefore, the scope of the present invention should be not limited to the above embodiments.

Claims (7)

1. one kind describes method towards intelligentized electronic information system architecture, which is characterized in that including:
Operational view carries out exploitation warfighting concepts, operating resources stream description, operating resources stream square from the combat duty angle that carries out Battle array, membership credentials, operational activity decomposition tree, operational activity model, rule of engagement model, operational state transformation description and operation Event tracking description, and carry out the display of operational view;
Ability view is connected with system requirement analysis, from the support of Integrative Joint Operations Simulation task and operational support ability need angle Degree, carries out development ability conception and Capability Categories, acquisition capability class relationship, ability membership, ability and organization development The mapping relations of mapping relations and ability and operational activity, and carry out the display of ability view;
Service view from support cross-system, it is trans-departmental, across services, it is even cross-cutting between service interoperation angle, description branch Service composition, function and the correlation for holding operation business carry out the description of exploitation service interface, Service Source stream description, system- Service matrix, service-service matrix, service function description, ability retrospect service matrix, operational activity retrospect service matrix, clothes Business resource flow matrix, service measure matrix, service evolution description, service technology and technical ability prediction, service regulation model, service shape State transformation description and service event tracking description, and carry out service view and show;
System view follows the ability need in ability view, the operation intention in operational view and the service in service view Function, description information system component and deployment relationship, the description of development system interface, system resource stream description, system-system Matrix, system function description, operational activity and system function retrospect matrix, operational activity and system trace matrix, system resource Flow matrix, system metrics matrix, system evolved description, systems technology and technical ability prediction, system convention model, system state transition Description and system event tracking description, and carry out system view and show.
2. the method according to claim 1, wherein further including:
Normal view describes relevant operation, routine work, technology, industry mark from the angle of management, design and development system Quasi-, engineering construction agreement, regular criterion and Further Development angle, develop standard configuration file and normative forecast, rower standard of going forward side by side View is shown.
3. method according to claim 1 or 2, which is characterized in that further include:
View is equipped from construction and management view, describes equipment classification, index, system and the way for development required in system view Line, it is desirable that the description of exploitation equipment configuration, equipment and ability corresponding relationship, equipment and combat duty corresponding relationship, equipment tactics skill The description of art index and equipment Development.
4. method according to claim 1 or 2, which is characterized in that further include:
Knowledge View to tissue the integration, processing of knowledge resource and apply angle, support realize knowledge resource integration on demand With it is shared, Knowledge based engineering indicates, generates, tissue, fusion, reasoning and synthetic operation describe knowledge Operational Mechanisms, it is desirable that exploitation Knowledge interface description, the description of knowledge resource stream description, knowledge-service matrix, knowledge-knowledge matrix, knowledge function, ability retrospect Knowledge matrix, operational activity trace knowledge matrix, knowledge resource stream matrix, Knowledge Measurement matrix, knowledge evolution description, knowledge skill Art and technical ability prediction, knowledge rule model, the state of knowledge transformation description and knowledge event tracking description.
5. method according to claim 1 or 2, which is characterized in that further include:
Secured views are from supporting unified match to win security system building angle, to data in storage, transmission, processing and issuing process In confidentiality, integrality, availability, trackability and non-repudiation, and attack, prevention, inspection to information security environment It surveys, control, management, assessment, exploitation safe interface description, secure resources stream description, safety-service matrix, safety-safe square Battle array, security function description, ability retrospect security matrix, operational activity trace security matrix, secure resources stream matrix, security measure Matrix, safe evolution description, safe practice and technical ability prediction, safety regulation model, safe condition transition description and security incident Tracking description, and carry out secured views and show.
6. method according to claim 1 or 2, which is characterized in that further include:
The demand and management rule therein that data and information view description are fought with business information, definition system operation and business Attribute, grammer, the semanteme of the information/data of demand, with the information requirement in Unify legislation business procedure, flow rules, it is desirable that Develop conceptual data model, logic data model and Physical data model and information view.
7. method according to claim 1 or 2, which is characterized in that further include:
Intelligent view from Campaign Process intelligent Application demand angle, carry out the description of developing intellectual resource interface, intelligent resource stream description, Intelligent resource flow matrix, intelligency activity decomposition tree, intelligency activity model, intelligent rules model, intellectual status transformation description and intelligence Energy event tracking description, and carry out the display of intelligent view.
CN201810424992.9A 2018-05-07 2018-05-07 Intelligent electronic information system architecture description method Active CN108897752B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810424992.9A CN108897752B (en) 2018-05-07 2018-05-07 Intelligent electronic information system architecture description method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810424992.9A CN108897752B (en) 2018-05-07 2018-05-07 Intelligent electronic information system architecture description method

Publications (2)

Publication Number Publication Date
CN108897752A true CN108897752A (en) 2018-11-27
CN108897752B CN108897752B (en) 2022-05-20

Family

ID=64342518

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810424992.9A Active CN108897752B (en) 2018-05-07 2018-05-07 Intelligent electronic information system architecture description method

Country Status (1)

Country Link
CN (1) CN108897752B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109558114A (en) * 2018-12-04 2019-04-02 中国航空无线电电子研究所 A kind of avionics system service architecture modeling method
CN109783113A (en) * 2018-12-24 2019-05-21 中国舰船研究设计中心 A kind of Organization & Deployment's method of combat system functional application software task packet
CN111142845A (en) * 2019-12-18 2020-05-12 中国北方车辆研究所 Model-based task system demand development method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060195476A1 (en) * 2005-02-28 2006-08-31 Microsoft Corporation Platform for data services across disparate application frameworks
US20080288434A1 (en) * 2007-05-17 2008-11-20 Piali De Domain-independent architecture in a command and control system
CN103150386A (en) * 2013-03-20 2013-06-12 中国电子科技集团公司第二十八研究所 Meta-model construction method of C4ISR (Command, Control, Communication, Computer, Intelligence, Surveillance and Reconnaissance) system
CN106952039A (en) * 2017-03-22 2017-07-14 上海机电工程研究所 Weapon Equipment System effectiveness evaluation index system construction method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060195476A1 (en) * 2005-02-28 2006-08-31 Microsoft Corporation Platform for data services across disparate application frameworks
US20080288434A1 (en) * 2007-05-17 2008-11-20 Piali De Domain-independent architecture in a command and control system
CN103150386A (en) * 2013-03-20 2013-06-12 中国电子科技集团公司第二十八研究所 Meta-model construction method of C4ISR (Command, Control, Communication, Computer, Intelligence, Surveillance and Reconnaissance) system
CN106952039A (en) * 2017-03-22 2017-07-14 上海机电工程研究所 Weapon Equipment System effectiveness evaluation index system construction method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CHENJG1123: "DoDAF2.0方法论", 《百度文库》 *
初军田: "军事信息系统体系结构技术研究与应用思考", 《火力与指挥控制》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109558114A (en) * 2018-12-04 2019-04-02 中国航空无线电电子研究所 A kind of avionics system service architecture modeling method
CN109783113A (en) * 2018-12-24 2019-05-21 中国舰船研究设计中心 A kind of Organization & Deployment's method of combat system functional application software task packet
CN109783113B (en) * 2018-12-24 2022-04-12 中国舰船研究设计中心 Organization and deployment method of combat system functional application software task package
CN111142845A (en) * 2019-12-18 2020-05-12 中国北方车辆研究所 Model-based task system demand development method
CN111142845B (en) * 2019-12-18 2023-03-28 中国北方车辆研究所 Model-based task system demand development method

Also Published As

Publication number Publication date
CN108897752B (en) 2022-05-20

Similar Documents

Publication Publication Date Title
Al-Sehrawy et al. A digital twin uses classification system for urban planning & city infrastructure management
CN108897752A (en) Method is described towards intelligentized electronic information system architecture
Han et al. FAME: A UML-based framework for modeling fuzzy self-adaptive software
Cestari et al. A method to diagnose public administration interoperability capability levels based on multi-criteria decision-making
Menshenin et al. Model-based system architecting and decision-making
Handley The Human Viewpoint for System Architectures
Mostashari et al. A framework for analysis, design and management of complex large-scale interconnected open sociotechnological systems
Galli Decision-Making Tools and Strategic Planning in Project Environments: The Overlap Of The Two Concepts
Pilcher Generation of department of defense architecture framework (DODAF) models using the Monterey Phoenix behavior modeling approach
Denz Process-oriented analysis and validation of multi-agent-based simulations
Abuarafah et al. Agent Vs Object with an in-depth insight to Multi-Agent Systems
Shakya et al. Agent-based modeling and simulation for 5G and beyond networks: A comprehensive survey
Li et al. Visual modelling of complex business processes with trees, overlays and distortion-based displays
Olsson et al. Assessment and Modelling of Joint Command and Control in Aircraft Maintenance Contexts Using Enterprise Models and Knowledge Graph Representations.
Liles On the characterization and analysis of system of systems architectures
Prackwieser et al. Towards a generic hybrid simulation algorithm based on a semantic mapping and rule evaluation approach
Maheshwari et al. Minimum SysML Representations to Enable Rapid Evaluation using Agent‐Based Simulation
Simpson et al. Product family and product platform design: looking forward
Borky et al. Analyzing Requirements in an Operational Viewpoint
Hvannberg et al. Crisis management training: Techniques for eliciting and describing requirements and early designs across different incident types
Li et al. General Architecture Framework and General Modelling Framework: Interoperability of Enterprise Architecture
Irwin Operational mission architecture framework: A blended architecture methodology for enabling operational capability
Qayumi et al. A comprehensive approach for designing business-intelligence solutions with multi-agent systems in distributed environments
Molnár et al. Adaptive Case Management and Dynamic Business Process Modeling A proposal for document-centric and formal ap-proach
Denz Process-oriented analysis and validation of multi-agent-based simulations: concepts and case studies

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant