Systems Engineering and Electronics ›› 2022, Vol. 44 ›› Issue (8): 2515-2521.doi: 10.12305/j.issn.1001-506X.2022.08.16

• Systems Engineering • Previous Articles     Next Articles

Analysis of key nodes in combat system based on function graph

Jianxing GONG1,2, Lei ZHU1,*, Huabing WANG2, Peiyuan DING1, Chengzhao LU1   

  1. 1. College of Intelligence Science and Engineering, National University of Defense Technology, Changsha 410073, China
    2. State Key Laboratory of Complex Electromagnetic Environment Effect on Electronics and Information System, Luoyang 471003, China
  • Received:2021-06-04 Online:2022-08-01 Published:2022-08-24
  • Contact: Lei ZHU

Abstract:

At present, most of the key nodes identification methods of combat system based on network topology only consider the topological connection of operational nodes, and lack of considering the functional interdependence of each node in the network from the actual behavior. Most of the key nodes identification methods of combat system based on operation loop require analysts to have strong professional background knowledge, and the analysis data are difficult to obtain. To solve these problems, key nodes identification methods of combat system based on the function graph are proposed. Firstly, the concept of function graph based on task and reflecting the function of combat system is introduced. Then, the key nodes identification methods of combat system based on function graph, such as degree centrality, betweenness centrality, closeness centrality, PageRank algorithm, node removal and contraction are proposed. Finally, taking a combat system as an example, the operation loop as the function graph, and the nodes in the combat system are analyzed by using key nodes identification methods such as betweenness centrality, closeness centrality, betweenness centrality based on function graph, closeness centrality based on function graph and node removal method based on the number of function graphs. The simplicity, feasibility and effectiveness of the method are verified.

Key words: combat system, network topology, function graph, key nodes

CLC Number: 

[an error occurred while processing this directive]