CN109871474B - Network dynamic information flow generating method based on motif - Google Patents
Network dynamic information flow generating method based on motif Download PDFInfo
- Publication number
- CN109871474B CN109871474B CN201910026834.2A CN201910026834A CN109871474B CN 109871474 B CN109871474 B CN 109871474B CN 201910026834 A CN201910026834 A CN 201910026834A CN 109871474 B CN109871474 B CN 109871474B
- Authority
- CN
- China
- Prior art keywords
- information
- node
- nodes
- network
- intelligence
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 230000005540 biological transmission Effects 0.000 claims abstract description 37
- 239000011159 matrix material Substances 0.000 claims abstract description 15
- 238000001514 detection method Methods 0.000 claims abstract description 9
- 230000003068 static effect Effects 0.000 claims abstract description 8
- 238000004088 simulation Methods 0.000 claims abstract description 6
- 238000013075 data extraction Methods 0.000 claims abstract description 4
- 230000009471 action Effects 0.000 claims description 34
- 238000004891 communication Methods 0.000 claims description 30
- 238000012545 processing Methods 0.000 claims description 12
- 230000010365 information processing Effects 0.000 claims description 10
- 230000008447 perception Effects 0.000 claims description 7
- 238000002474 experimental method Methods 0.000 claims description 6
- 238000012546 transfer Methods 0.000 claims description 6
- 230000004927 fusion Effects 0.000 claims description 4
- 238000007499 fusion processing Methods 0.000 claims description 4
- 238000002360 preparation method Methods 0.000 claims description 3
- 238000009960 carding Methods 0.000 claims 1
- 230000000638 stimulation Effects 0.000 claims 1
- 238000010276 construction Methods 0.000 abstract description 3
- 238000010845 search algorithm Methods 0.000 abstract description 3
- 230000002457 bidirectional effect Effects 0.000 abstract 1
- 238000005111 flow chemistry technique Methods 0.000 abstract 1
- 238000011161 development Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000008685 targeting Effects 0.000 description 1
Images
Landscapes
- Arrangements For Transmission Of Measured Signals (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Complex Calculations (AREA)
Abstract
Description
技术领域technical field
本发明属于网路信息领域,具体涉及一种基于模体的网络动态信息流生成方法。The invention belongs to the field of network information, and in particular relates to a method for generating a network dynamic information flow based on a motif.
背景技术Background technique
网络是由节点和连线构成,表示诸多对象及其相互联系。在数学上,网络是一种图,一般认为专指加权图。网络除了数学定义外,还有具体的物理含义,即网络是从某种相同类型的实际问题中抽象出来的模型。在计算机领域中,网络是信息传输、接收、共享的虚拟平台,通过它把各个点、面、体的信息联系到一起,从而实现这些资源的共享。网络是人类发展史来最重要的发明,提高了科技和人类社会的发展。Networks are made up of nodes and connections that represent objects and their interconnections. Mathematically, a network is a kind of graph, which is generally considered to refer to a weighted graph . In addition to the mathematical definition, the network has a specific physical meaning, that is, the network is a model abstracted from a practical problem of the same type. In the computer field, the network is a virtual platform for information transmission , reception and sharing . Through it, the information of each point, surface and volume is linked together, so as to realize the sharing of these resources. The Internet is the most important invention in the history of human development, improving the development of science and technology and human society.
现有的对传感器感知的信息进行处理方法不够准确,为此,提出一种基于模体的网络动态信息流生成方法。Existing methods for processing information perceived by sensors are not accurate enough. Therefore, a motif-based network dynamic information flow generation method is proposed.
发明内容SUMMARY OF THE INVENTION
本发明的目的在于提供一种基于模体的网络动态信息流生成方法,以解决上述背景技术中提出的现有的对传感器感知的信息进行处理方法不够准确的问题。The purpose of the present invention is to provide a network dynamic information flow generation method based on a motif, so as to solve the problem that the existing method for processing information perceived by a sensor proposed in the above-mentioned background art is not accurate enough.
为实现上述目的,本发明采用了如下技术方案:一种基于模体的网络动态信息流生成方法,包括以下步骤:In order to achieve the above object, the present invention adopts the following technical solutions: a method for generating a network dynamic information flow based on a motif, comprising the following steps:
S1、信息情报网络中点和边的建模:假设信息情报网络可以用 G(V,E)来表示,其中V={v1,v2,L vn}为网络中的节点集,这些节点分别是感知节点、决策节点、情报节点、通信节点和行动节点五类节点;这五类节点共同组成了信息网络节点集V={S,C,D,I,A};网络中的边集可以表示为E={e1,e2,L em},两点之间有边表示节点之间存在可达的链路;同时这里为静态网络中的每条边都赋一个权值,用来表示信息在这个边及所对应的两个节点之间传递的时间延迟,用ω={ω1,ω2,Lωm}来表示,这个权值在后续的情报传递路径算法中使用;S1. Modeling of points and edges in the information intelligence network: Suppose the information intelligence network can be represented by G(V, E), where V={v 1 , v 2 , L v n } is the set of nodes in the network, these Nodes are five types of nodes: perception node, decision node, intelligence node, communication node and action node; these five types of nodes together form the information network node set V={S, C, D, I, A}; the edges in the network The set can be expressed as E={e 1 ,e 2 ,L e m }, an edge between two points indicates that there is a reachable link between nodes; at the same time, a weight is assigned to each edge in the static network. , which is used to represent the time delay of information transmission between this edge and the corresponding two nodes, represented by ω={ω 1 , ω 2 , Lω m }, this weight is used in the subsequent information transmission path algorithm ;
S2、信息情报网络信息传递模体梳理:第一步:感知节点探测到目标后,生成目标信息;第二步:感知节点将目标信息作为一次情报,通过由通信节点组成的通信网络直接发送给决策节点和行动节点;第三步:感知节点同时将目标信息发送给情报节点,由其综合信息进行融合处理;第四步:情报节点再将处理后的信息情报信息作为二次情报发送给需要的决策节点和行动节点;根据对以上信息情报业务的分析,其网络中传递的信息主要分为“一次情报”和“二次情报”两类;具体分为五个模体,五个模体共同构成了信息情报网络动态信息流中信息传递模体的集合在这些模体的基础上,通过构建情报定制关系、刺激事件和具体的信息传递生成算法,就可以在仿真模拟的环境下进行动态网络的生成;S2. Sorting out the information transmission pattern of the information intelligence network: the first step: after the sensing node detects the target, the target information is generated; the second step: the sensing node uses the target information as primary intelligence, and sends it directly to the communication network composed of communication nodes. Decision node and action node; the third step: the sensing node sends the target information to the intelligence node at the same time, and the integrated information is processed for fusion; the fourth step: the intelligence node sends the processed information intelligence information as secondary intelligence to the need According to the analysis of the above information intelligence business, the information transmitted in its network is mainly divided into two categories: "primary intelligence" and "secondary intelligence"; it is specifically divided into five motifs, five motifs Together they constitute a collection of information transfer motifs in the dynamic information flow of the information intelligence network. On the basis of these motifs, the dynamic network can be generated in the simulation environment by constructing the intelligence customization relationship, stimulus events and specific information transmission generation algorithms;
S3、信息情报网模体关系矩阵构建:一、“一次情报”应用矩阵,根据节点的不同共有三类,一类是感知节点向决策节点发送信息,这与前面的模体相对应,具体如下所示:S3. Construction of the information intelligence network motif relationship matrix: 1. The "primary intelligence" application matrix has three types according to the different nodes. One is that the sensing node sends information to the decision node, which is similar to the previous motif Correspondingly, as follows:
第二类是感知节点向行动节点发送信息,这与前面的模体相对应,具体如下所示:The second category is that the sensing node sends information to the action node, which is similar to the previous motif. Correspondingly, as follows:
第三类是感知节点向情报节点发送信息,这与前面的模体相对应,具体如下所示:The third category is that the perception node sends information to the intelligence node, which is similar to the previous motif Correspondingly, as follows:
二、“二次情报”应用矩阵,指的是情报节点经过信息处理后将融合的信息情报信息下发给决策和行动节点。也可分为两类,一类是情报节点向决策节点发送信息,这与前面的模体相对应,具体如下所示:2. "Secondary intelligence" application matrix, which means that the intelligence node sends the integrated information intelligence information to decision-making and action nodes after information processing. It can also be divided into two categories. One is that the intelligence node sends information to the decision node, which is similar to the previous motif. Correspondingly, as follows:
另一类是情报节点向行动节点发送信息。这与前面的模体相对应,具体如下所示:Another category is intelligence nodes sending information to action nodes. This is the same as the previous motif Correspondingly, as follows:
S4、相关数据提取与信息情报网生成:第一步、基础数据与实验准备:虚拟信息情报网数据与静态还原实验中基本一致,其中感知节点是各类型探测雷达,总数量为不少于三个;通信节点为各类型的通信车或者通信终端等,总数量为不少于三个;情报节点为情报融合中心,总数量为不少于两个;决策节点为抽象的各级控制单元,总数量为不少于三个;行动节点为各类处理单元,总数量为不少于两个;第二步、目标巡航设定:从单目标到多目标,从直接穿越信息情报网到绕行信息情报网,主要目的是通过不同的目标路线展现信息情报网络动态信息流的运行情况,即可能的信息情报信息传递情况;第三步、雷达探测事件与情报定制关系提取:设定雷达的情报保障范围,在这一范围内的发送一次情报;同时设定情报中心的范围,在情报中心范围内的雷达,则向其上报信息情报,否则不上报;最后设定二次情报的应用范围,利用目标进行设置,在目标一定范围内的控制单元、处理单元等节点,情报中心将融合后的二次情报进行下发,范围外的节点则不下发;通过这种方式,实际上建立的是一种动态的情报定制关系;通过这一定制关系动态的构建模体关系矩阵后,就可以生成信息情报网中相应的情报信息流。S4. Relevant data extraction and information intelligence network generation: the first step, basic data and experimental preparation: the virtual information intelligence network data is basically the same as that in the static restoration experiment. The sensing nodes are various types of detection radars, and the total number is not less than three communication nodes are various types of communication vehicles or communication terminals, with a total number of not less than three; intelligence nodes are information fusion centers, with a total number of not less than two; decision-making nodes are abstract control units at all levels, The total number is not less than three; the action nodes are various processing units, and the total number is not less than two; the second step, target cruise setting: from single target to multi-target, from directly traversing the information intelligence network to bypassing The main purpose of running the information intelligence network is to show the operation of the dynamic information flow of the information intelligence network through different target routes, that is, the possible transmission of information intelligence information; the third step, the extraction of the relationship between radar detection events and intelligence customization: setting the radar The scope of intelligence support, within this range, send primary intelligence; at the same time, set the range of the intelligence center, and the radar within the range of the intelligence center will report information and intelligence to it, otherwise it will not be reported; finally, set the application range of secondary intelligence , using the target to set, in the control unit, processing unit and other nodes within a certain range of the target, the intelligence center will issue the integrated secondary intelligence, and the nodes outside the range will not issue it; in this way, the actual establishment of It is a dynamic intelligence customization relationship; after dynamically constructing the motif relationship matrix through this customization relationship, the corresponding intelligence information flow in the information intelligence network can be generated.
优选的,S1中所述感知节点、决策节点、情报节点、通信节点和行动节点分别可以采用如下方式表示:感知节点:其中mS为感知节点数量;通信节点:其中mC为通信节点数量;决策节点:其中mD为决策节点数量;情报节点:其中mI为情报节点数量;行动节点:其中mA为行动节点数量。Preferably, the sensing nodes, decision-making nodes, intelligence nodes, communication nodes and action nodes in S1 can be respectively represented in the following ways: sensing nodes: Where m S is the number of sensing nodes; communication nodes: Where m C is the number of communication nodes; decision nodes: where m D is the number of decision-making nodes; intelligence nodes: where m I is the number of intelligence nodes; action nodes: where m A is the number of action nodes.
优选的,S2中所述五个模体分别为:一、其中C=1 说明是一次情报;ns=S说明信息发送的起始节点是感知节点(S); ne=D说明信息发送的目标节点是决策节点(D);二、这里的ne=A说明这个模体中信息发送的目标节点是行动节点(A);三、③这里的ne=I说明这个模体中信息发送的目标节点是情报节点(I);四、其中C=2说明是二次情报,指的是已经经过情报中心进行融合处理后的信息情报信息;ns=I说明信息发送的起始节点是情报节点(I);ne=D说明信息发送的目标节点是决策节点(D);五、这里的ne=A说明这个模体中信息发送的目标节点是行动节点(A)。Preferably, the five modalities described in S2 are: 1. Among them, C=1 indicates that it is an information; n s = S indicates that the starting node of information transmission is the sensing node (S); n e = D indicates that the target node of information transmission is the decision node (D); 2. Here n e =A indicates that the target node of information sending in this motif is the action node (A); 3. ③ Here n e =I indicates that the target node of information transmission in this motif is the intelligence node (I); 4. Among them, C=2 indicates that it is secondary information, which refers to the information intelligence information that has been fused by the information center; n s =I indicates that the starting node of information transmission is the intelligence node (I); The sending target node is the decision node (D); 5. Here, n e =A indicates that the target node of information transmission in this motif is the action node (A).
优选的,S2中所述“一次情报”是直接由信息采集节点获得信息后发送给相应的信息应用节点的。Preferably, the "primary information" in S2 is directly obtained by the information collection node and then sent to the corresponding information application node.
优选的,S2中所述“二次情报”则是由信息采集节点获得信息后先发送给信息处理节点,由信息处理节点经过融合处理后,再发送给相应的信息应用节点。Preferably, the "secondary information" in S2 is obtained by the information collection node and then sent to the information processing node, and then sent to the corresponding information application node after the information processing node undergoes fusion processing.
本发明的技术效果和优点:本发明提出的一种基于模体的网络动态信息流生成方法,与现有技术相比,具有以下优点:本方法在已有信息情报网静态拓扑基础上,梳理了信息情报网基本信息传递模体,并通过提取相关信息保障关系等数据,构建了相应的模体关系矩阵;最后利用仿真模拟产生的传感探测等事件基础上,通过相关事件和数据以及本方法建立的双向搜索算法,生成了相应的信息感知和处理网络动态信息流。The technical effects and advantages of the present invention: a method for generating network dynamic information flow based on motifs proposed by the present invention has the following advantages compared with the prior art. The basic information transfer motif of the information intelligence network is established, and the corresponding motif relationship matrix is constructed by extracting the relevant information guarantee relationship and other data. The two-way search algorithm established by the method generates the corresponding information perception and processing network dynamic information flow.
附图说明Description of drawings
图1为本发明的信息情报网模体结构示意图。FIG. 1 is a schematic structural diagram of an information intelligence network motif of the present invention.
具体实施方式Detailed ways
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. The specific embodiments described herein are only used to explain the present invention, and are not intended to limit the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
实施例Example
1、信息情报网络中点和边的建模1. Modeling of nodes and edges in information intelligence networks
假设信息情报网络可以用G(V,E)来表示,其中V={v1,v2,L vn}为网络中的节点集,这些节点分别是感知节点、决策节点、情报节点、通信节点和行动节点五类节点。这五类节点共同组成了信息网络节点集 V={S,C,D,I,A},分别可以采用如下方式表示:Assume that the information intelligence network can be represented by G(V, E), where V={v 1 , v 2 , L v n } is the set of nodes in the network, these nodes are perception nodes, decision nodes, intelligence nodes, communication nodes Nodes and Action Nodes There are five types of nodes. These five types of nodes together form the information network node set V={S, C, D, I, A}, which can be expressed as follows:
感知节点:其中mS为感知节点数量。Perception node: where m S is the number of sensing nodes.
通信节点:其中mC为通信节点数量。Communication node: where m C is the number of communication nodes.
决策节点:其中mD为决策节点数量。Decision node: where m D is the number of decision nodes.
情报节点:其中mI为情报节点数量。Information Node: where m I is the number of intelligence nodes.
行动节点:其中mA为行动节点数量。Action Node: where m A is the number of action nodes.
另外,E={e1,e2,L em}为网络中的边集,两点之间有边表示节点之间存在可达的链路。同时这里为静态网络中的每条边都赋一个权值,用来表示信息在这个边及所对应的两个节点之间传递的时间延迟,用ω={ω1,ω2,Lωm}来表示,这个权值在后续的情报传递路径算法中使用。In addition, E={e 1 , e 2 , Le m } is an edge set in the network, and an edge between two points indicates that there is a reachable link between the nodes. At the same time, a weight is assigned to each edge in the static network, which is used to represent the time delay of information transmission between this edge and the corresponding two nodes, with ω={ω 1 ,ω 2 ,Lω m } to indicate that this weight is used in the subsequent intelligence transfer path algorithm.
2、信息情报网络信息传递模体梳理2. Sorting out the information transmission model of information intelligence network
静态的信息情报网络是基于底层通信基础网进行构建的,主干线路一般是在通信基础光纤网中开辟专门的物理通道,主干线路到终端的形式则各有不同,有些可能是光纤,有些则是千兆或百兆的双绞线。信息情报网中的节点按照功能不同具体来说包括进行信息采集的感知节点(S)、进行信息传输的通信节点(C)、进行信息处理的情报节点(I)以及进行信息应用的决策节点(D)和行动节点(A)共五类。而动态信息情报网中的信息传递,也是在这五类节点中展开的。一次完整的信息情报信息应用流程可用如下几步来表示:The static information intelligence network is constructed based on the underlying communication infrastructure network. The trunk line is generally a dedicated physical channel in the communication infrastructure optical fiber network. The form of the trunk line to the terminal varies. Some may be optical fibers, while others Gigabit or 100M twisted pair. The nodes in the information intelligence network specifically include sensing nodes (S) for information collection, communication nodes (C) for information transmission, intelligence nodes (I) for information processing, and decision-making nodes for information application (I). D) and action nodes (A) have a total of five categories. The information transmission in the dynamic information intelligence network is also carried out in these five types of nodes. A complete information intelligence information application process can be represented by the following steps:
S1.雷达等传感器(相当于感知节点(S))探测到目标后,生成目标信息。S1. After a sensor such as a radar (equivalent to a sensing node (S)) detects a target, target information is generated.
S2.感知节点(S)将目标信息作为一次情报,通过由通信节点 (C)组成的通信网络直接发送给相关的控制单元(相当于决策节点 (D))、处理单元(相当于行动节点(A))。S2. The sensing node (S) takes the target information as primary intelligence, and directly sends it to the relevant control unit (equivalent to the decision node (D)) and processing unit (equivalent to the action node (equivalent to the action node) through the communication network composed of communication nodes (C). A)).
S3.雷达等感知节点(S)同时将目标信息发送给情报处理中心 (相当于情报节点(I)),由其综合多方信息进行融合处理。S3. Radar and other sensing nodes (S) simultaneously send target information to the intelligence processing center (equivalent to intelligence node (I)), which integrates multi-party information for fusion processing.
S4.情报节点(I)再将处理后的信息情报信息作为二次情报发送给需要的控制单元和处理单元。S4. The intelligence node (I) sends the processed information intelligence information to the required control unit and processing unit as secondary information.
因此,根据对以上信息情报业务的分析,其网络中传递的信息主要分为“一次情报”和“二次情报”两类。其中“一次情报”是直接由信息采集节点获得信息后发送给相应的信息应用节点的;“二次情报”则是由信息采集节点获得信息后先发送给信息处理节点,由信息处理节点经过融合处理后,再发送给相应的信息应用节点。具体来说可以分为五个模体,五个模体可用如下形式表示:Therefore, according to the analysis of the above information intelligence business, the information transmitted in its network is mainly divided into two categories: "primary intelligence" and "secondary intelligence". Among them, "primary information" is directly obtained by the information collection node and sent to the corresponding information application node; "secondary information" is obtained by the information collection node and then sent to the information processing node, which is fused by the information processing node. After processing, it is sent to the corresponding information application node. Specifically, it can be divided into five motifs, and the five motifs can be represented by the following forms:
第一,其中C=1说明是一次情报;ns=S说明信息发送的起始节点是感知节点(S);ne=D说明信息发送的目标节点是决策节点(D)。First, Wherein C=1 indicates that it is an information; n s =S indicates that the starting node of information transmission is a sensing node (S); n e =D indicates that the target node of information transmission is a decision node (D).
第二、这里的ne=A说明这个模体中信息发送的目标节点是行动节点(A)。second, Here n e =A indicates that the target node of information transmission in this motif is the action node (A).
第三、这里的ne=I说明这个模体中信息发送的目标节点是情报节点(I)。third, Here n e =I indicates that the target node of information transmission in this motif is the intelligence node (I).
第四、其中C=2说明是二次情报,指的是已经经过情报中心进行融合处理后的信息情报信息;ns=I说明信息发送的起始节点是情报节点(I);ne=D说明信息发送的目标节点是决策节点(D)。fourth, Among them, C=2 indicates that it is secondary intelligence, which refers to the information intelligence information that has been fused by the intelligence center; n s =I indicates that the starting node of information transmission is the intelligence node (I); The destination node of the transmission is the decision node (D).
第五、这里的ne=A说明这个模体中信息发送的目标节点是行动节点(A)。fifth, Here n e =A indicates that the target node of information transmission in this motif is the action node (A).
以上五个模体共同构成了信息情报网络动态信息流中信息传递模体的集合在这些模体的基础上,通过构建情报定制关系、刺激事件和具体的信息传递生成算法,就可以在仿真模拟的环境下进行动态网络的生成。The above five motifs together constitute a collection of information transfer motifs in the dynamic information flow of the information intelligence network On the basis of these motifs, the dynamic network can be generated in the simulated environment by constructing the intelligence customization relationship, stimulus events and specific information transmission generation algorithm.
3、信息情报网模体关系矩阵构建3. Construction of Motif Relation Matrix of Information Intelligence Network
(1)“一次情报”应用矩阵,根据节点的不同共有三类,一类是感知节点向决策节点发送信息,这与前面的模体相对应,具体如下所示:(1) The "primary intelligence" application matrix has three types according to the different nodes. One is that the sensing node sends information to the decision node, which is similar to the previous motif. Correspondingly, as follows:
第二类是感知节点向行动节点发送信息,这与前面的模体相对应,具体如下所示:The second category is that the sensing node sends information to the action node, which is similar to the previous motif. Correspondingly, as follows:
第三类是感知节点向情报节点发送信息,这与前面的模体相对应,具体如下所示:The third category is that the perception node sends information to the intelligence node, which is similar to the previous motif Correspondingly, as follows:
(2)“二次情报”应用矩阵,指的是情报节点经过信息处理后将融合的信息情报信息下发给决策和行动节点。也可分为两类,一类是情报节点向决策节点发送信息,这与前面的模体相对应,具体如下所示:(2) "Secondary intelligence" application matrix, which means that the intelligence node sends the integrated information intelligence information to decision-making and action nodes after information processing. It can also be divided into two categories. One is that the intelligence node sends information to the decision node, which is similar to the previous motif. Correspondingly, as follows:
另一类是情报节点向行动节点发送信息。这与前面的模体相对应,具体如下所示:Another category is intelligence nodes sending information to action nodes. This is the same as the previous motif Correspondingly, as follows:
以上的情报定制关系与模体不同的是,模体是从类别上将信息传递模式进行了归类,而情报定制关系则是具体的对于某类型网络中具体情报传递的描述,可以认为是针对于某具体信息传递模体的实例化。The difference between the above intelligence customization relationship and the motif is that the motif categorizes the information transmission mode in terms of categories, while the intelligence customization relationship is a specific description of the specific intelligence transmission in a certain type of network, which can be considered as targeting The instantiation of a specific information transfer motif.
4、相关数据提取与信息情报网生成4. Relevant data extraction and information intelligence network generation
为了验证以上的算法,利用仿真技术构建的虚拟信息情报网基础上,设置了单个、多个目标的巡航行动,进行了仿真模拟。提取了其中的雷达探测事件以及情报保障关系等数据,通过这些事件和数据以及本方法提出的双向搜索算法,生成了相应的信息情报网络动态信息流。In order to verify the above algorithms, on the basis of the virtual information intelligence network constructed by simulation technology, single and multiple target cruise actions are set up, and simulation simulations are carried out. The data of radar detection events and intelligence support relations are extracted. Through these events and data and the two-way search algorithm proposed by this method, the corresponding dynamic information flow of information intelligence network is generated.
(1)基础数据与实验准备(1) Basic data and experimental preparation
信息情报网数据:虚拟信息情报网数据与静态还原实验中基本一致,其中感知节点是各类型探测雷达,总数量为113个;通信节点为各类型的通信车或者通信终端等,总数量为202个;情报节点为情报融合中心,总数量为2个;决策节点为抽象的各级控制单元,总数量为212个;行动节点为各类处理单元,总数量为86个。Information intelligence network data: The virtual information intelligence network data is basically the same as that in the static restoration experiment. The sensing nodes are various types of detection radars, with a total number of 113; the communication nodes are various types of communication vehicles or communication terminals, etc., with a total number of 202 Intelligence nodes are intelligence fusion centers, with a total number of 2; decision nodes are abstract control units at all levels, with a total number of 212; action nodes are various processing units, with a total number of 86.
(2)目标巡航设定:为了充分验证本算法的有效性,本次实验设置了三类巡航事件。从单目标到多目标,从直接穿越信息情报网到绕行信息情报网,主要目的是通过不同的目标路线展现信息情报网络动态信息流的运行情况,即可能的信息情报信息传递情况。(2) Target cruise setting: In order to fully verify the effectiveness of this algorithm, three types of cruise events are set in this experiment. From single target to multi-target, from directly traversing the information intelligence network to bypassing the information intelligence network, the main purpose is to show the operation of the dynamic information flow of the information intelligence network through different target routes, that is, the possible transmission of information intelligence information.
(3)雷达探测事件与情报定制关系提取:基于时间序列的雷达探测事件,是后续信息情报网中所有一次情报信息流的起点,它们决定了每个时间点有哪些雷达发送一次情报信息,而具体每个雷达向哪些控制、行动和情报节点发送情报,以及情报节点如何下发二次情报,都由情报定制关系决定。(3) Extraction of the relationship between radar detection events and intelligence customization: radar detection events based on time series are the starting point of all intelligence information flows in the subsequent information intelligence network. They determine which radars send an intelligence information at each time point, while The specific control, action, and intelligence nodes that each radar sends information to, and how the intelligence nodes issue secondary intelligence are determined by the intelligence customization relationship.
本实验采用就近原则,即设定雷达的情报保障范围,在这一范围内的发送一次情报;同时设定情报中心的范围,在情报中心范围内的雷达,则向其上报信息情报,否则不上报;最后设定二次情报的应用范围,利用目标进行设置,在目标一定范围内的控制单元、处理单元等节点,情报中心将融合后的二次情报进行下发,范围外的节点则不下发。通过这种方式,实际上建立的是一种动态的情报定制关系。通过这一定制关系动态的构建模体关系矩阵后,就可以生成信息情报网中相应的情报信息流。This experiment adopts the principle of proximity, that is, to set the intelligence support range of the radar, and send information once within this range; at the same time, set the range of the intelligence center, and report information to the radar within the range of the intelligence center, otherwise it will not Reporting; finally, set the application scope of the secondary intelligence, and use the target to set it up. For nodes such as control units and processing units within a certain range of the target, the intelligence center will issue the integrated secondary intelligence, and the nodes outside the range will not be sent. send. In this way, a dynamic intelligence customization relationship is actually established. After dynamically constructing the motif relationship matrix through this customized relationship, the corresponding intelligence information flow in the information intelligence network can be generated.
最后应说明的是:以上所述仅为本发明的优选实施例而已,并不用于限制本发明,尽管参照前述实施例对本发明进行了详细的说明,对于本领域的技术人员来说,其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换,凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。Finally, it should be noted that the above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention. Although the present invention has been described in detail with reference to the foregoing embodiments, for those skilled in the art, the The technical solutions described in the foregoing embodiments can be modified, or some technical features thereof can be equivalently replaced, and any modifications, equivalent replacements, improvements, etc. made within the spirit and principle of the present invention shall be included. within the protection scope of the present invention.
Claims (5)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910026834.2A CN109871474B (en) | 2019-01-11 | 2019-01-11 | Network dynamic information flow generating method based on motif |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910026834.2A CN109871474B (en) | 2019-01-11 | 2019-01-11 | Network dynamic information flow generating method based on motif |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109871474A CN109871474A (en) | 2019-06-11 |
CN109871474B true CN109871474B (en) | 2022-09-13 |
Family
ID=66917577
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910026834.2A Active CN109871474B (en) | 2019-01-11 | 2019-01-11 | Network dynamic information flow generating method based on motif |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109871474B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111897997A (en) * | 2020-06-15 | 2020-11-06 | 济南浪潮高新科技投资发展有限公司 | Data processing method and system based on ROS operating system |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107423493A (en) * | 2017-07-02 | 2017-12-01 | 国电南瑞科技股份有限公司 | A kind of power information physical coupling modeling method based on incidence matrix |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7644056B2 (en) * | 2006-01-05 | 2010-01-05 | Sundri Kaur Khalsa | System and method for providing terrorism intelligence indications and warnings |
US8860602B2 (en) * | 2012-10-09 | 2014-10-14 | Accipiter Radar Technologies Inc. | Device and method for cognitive radar information network |
-
2019
- 2019-01-11 CN CN201910026834.2A patent/CN109871474B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107423493A (en) * | 2017-07-02 | 2017-12-01 | 国电南瑞科技股份有限公司 | A kind of power information physical coupling modeling method based on incidence matrix |
Non-Patent Citations (1)
Title |
---|
竞争情报研究方法体系的架构与选用;樊松林;《情报科学》;20001025(第10期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN109871474A (en) | 2019-06-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110288824B (en) | Analysis method of morning and evening peak congestion status and propagation mechanism based on Granger causality road network | |
CN101478534A (en) | Network exception detecting method based on artificial immunity principle | |
CN108696453B (en) | Lightweight power communication network SDN service flow perception method and system | |
CN105183543A (en) | Crowd-sourcing calculation online task allocation method based on mobile social network | |
CN109446434B (en) | Online social network information based on artificial neural network is propagated and public sentiment evolution comprehensive analysis method | |
CN102664744B (en) | Group-sending recommendation method in network message communication | |
CN115544873A (en) | Training efficiency and personalized effect quantitative evaluation method for personalized federal learning | |
CN102831219B (en) | A kind of be applied to community discovery can covering clustering method | |
CN109871474B (en) | Network dynamic information flow generating method based on motif | |
CN113392429A (en) | Block chain-based power distribution Internet of things data safety protection method and device | |
Tang et al. | Optimization of sports fitness management system based on internet of health things | |
CN109361556A (en) | A Key Node Awareness Method Based on Node Entropy and Structural Holes | |
CN114745288B (en) | Quantification method of complex network invulnerability model based on blockchain and dynamic weighting | |
CN115481752A (en) | Model training method and device, electronic equipment and storage medium | |
Bao et al. | Epidemic dynamics of complex networks based on information dependence | |
CN111368060B (en) | Self-learning method, device and system for conversation robot, electronic equipment and medium | |
CN104348695A (en) | Artificial immune system-based virtual network mapping method and system thereof | |
CN116132167B (en) | Multi-protocol botnet detection method oriented to Internet of things | |
CN116484113B (en) | A group opinion prediction method and system based on dynamic trust perception | |
CN118114004A (en) | A key node identification system and method suitable for multiple industrial chain enterprise relationship networks | |
CN104022937B (en) | A kind of mapping method of virtual network based on cellular type P system | |
CN103051537B (en) | IP Circuit Service transmission dispatching method and system | |
Zhang et al. | Assessment of Service Quality in Wireless Sensor Networks with Probabilistic Linguistic Term Sets. | |
CN114599043A (en) | An air-space-ground integrated network resource allocation method based on deep reinforcement learning | |
CN105260415A (en) | Hierarchical multi-granularity community discovery method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20240430 Address after: No.62, Kexue Avenue, Zhongyuan District, Zhengzhou City, Henan Province, 450000 Patentee after: Information Engineering University of Strategic Support Force,PLA Country or region after: China Address before: No. 28, Building 9, Yard 7, Jianxue Street, Jinshui District, Zhengzhou City, Henan Province, 450000 Patentee before: Duan Wenxu Country or region before: China |
|
CP03 | Change of name, title or address | ||
CP03 | Change of name, title or address |
Address after: 450000 Science Avenue 62, Zhengzhou High-tech Zone, Henan Province Patentee after: Information Engineering University of the Chinese People's Liberation Army Cyberspace Force Country or region after: China Address before: No. 62 Science Avenue, High tech Zone, Zhengzhou City, Henan Province Patentee before: Information Engineering University of Strategic Support Force,PLA Country or region before: China |