Systems Engineering and Electronics ›› 2020, Vol. 42 ›› Issue (12): 2892-2898.doi: 10.3969/j.issn.1001-506X.2020.12.27
Previous Articles Next Articles
Tonglin LIU1(), Zhirou YANG2(
), Hu ZHANG1(
), Xiangyi TENG2(
), Jing LIU2(
)
Received:
2020-04-17
Online:
2020-12-01
Published:
2020-11-27
CLC Number:
Tonglin LIU, Zhirou YANG, Hu ZHANG, Xiangyi TENG, Jing LIU. Modeling and performance analysis of military communication network[J]. Systems Engineering and Electronics, 2020, 42(12): 2892-2898.
1 | ADMIRAL V , CEBROWSKI A K , GARSTKA J J , et al. Network-centric warfare: its origin and future[J]. US Naval Institute Proceedings, 1998, 124 (1): 28- 35. |
2 | LEE Y , SHIN S W , PARK M S , et al. Agent-based simulation and its application to analyze combat effectiveness in network-centric warfare considering communication failure environments[J]. Mathe-matical Problems in Engineering, 2018, 2018 (2): 1- 9. |
3 | XIN B , WANG Y P , CHEN J . An efficient marginal-return-based constructive heuristic to solve the sensor-weapon-target assignment problem[J]. IEEE Trans.on Systems, Man and Cybernetics: Systems, 2018, 49 (12): 1- 12. |
4 | DAS S K , MUKHERJEE S . Agent based decision making for integrated air defense system[J]. Journal of Battlefield Technology, 2011, 14 (1): 1- 8. |
5 |
ZHOU J , YU X , LU J A . Node importance in controlled complex networks[J]. IEEE Trans.on Circuits and Systems Ⅱ Express Briefs, 2019, 66 (3): 437- 441.
doi: 10.1109/TCSII.2018.2845940 |
6 | LIU J X, CHEN S D, WANG Y G. Study on node importance of complex network based military command control networks[C]//Proc.of the International Conference on Machine Learning and Cybernetics 2012: 920-923. |
7 | WEN R, CHEN X Q, DONG Z B, et al. Modeling for military system by weighted complex networks[C]//Proc.of the IEEE International Conference on Control & Automation, 2010. |
8 | QI Y B , LIU Z , CHEN H D , et al. Distributed combat system of systems network modeling[J]. Journal of Networks, 2013, 8 (8): 1906- 1912. |
9 |
GUO N , GUO P , DONG H Y , et al. Modeling and analysis of cascading failures in projects: a complex network approach[J]. Computers and Industrial Engineering, 2019, 127, 1- 7.
doi: 10.1016/j.cie.2018.11.051 |
10 |
NAIMISHA K , BALAKRISHNAN N . Influence maximization from cascade information traces in complex networks in the absence of network structure[J]. IEEE Trans.on Computational Social Systems, 2019, 6 (6): 1147- 1155.
doi: 10.1109/TCSS.2019.2939841 |
11 |
PARK C , PATTIPATI K R , AN W , et al. Quantifying the impact of information and organizational structures via distributed auction algorithm: point-to-point communication structure[J]. IEEE Trans.on Systems, Man, and Cybernetics: Systems, 2012, 42 (1): 68- 85.
doi: 10.1109/TSMCA.2011.2157139 |
12 | JIANG Y, WANG Y B. Analysis of attack and defense strategies on complex network[C]//Proc.of the International Conference on Sensor Network Security Technology and Privacy Communication System, 2013: 58-62. |
13 |
TORLEIV M , RANDALL L . Network centric military communication[J]. IEEE Communication Magazine, 2007, 45 (10): 42- 44.
doi: 10.1109/MCOM.2007.4342821 |
14 | LEVCGHUK G M, YU F L, PATTIPATI K R, et al. From hierarchies to heterarchies: application of network optimization to design of organization structures[C]//Proc.of the Command and Control Research and Technology Symposium, 2003. |
15 | LIU J X . A regulative arithmetic on the contingency communication in the damaged military communication network[J]. Applied Mechanics and Materials, 2014, 571, 364- 367. |
16 | YAO F F, LIANG Q, XU R J, et al. Some key issues on modeling and simulation of military communication network[C]//Proc.of the International Conference on Computer Science and Electronics Engineering, 2012: 532-535. |
17 | 石福丽.基于超网络的军事通信网络建模、分析与重构方法研究[D].长沙:国防科技大学, 2013. |
SHI F L. Research on super network based modeling and analysis for military communication network reconfiguration[D]. Changsha: National University of Defense Technology, 2013. | |
18 | 卜广志. 武器装备体系中的信息流分析与评估研究[J]. 系统工程与电子技术, 2007, 29 (8): 1309- 1313, 1321. |
BU G Z . Study on information flow and its evaluation in armaments systems[J]. Systems Engineering and Electronics, 2007, 29 (8): 1309- 1313, 1321. | |
19 | 李尔玉, 龚建兴, 黄健, 等. 基于功能链的作战体系复杂网络节点重要性评价方法[J]. 指挥与控制学报, 2018, 4 (1): 42- 49. |
LI E Y , GONG J X , HUANG J , et al. Node importance analysis of complex networks for combat systems based on function chain[J]. Journal of Command and Control, 2018, 4 (1): 42- 49. | |
20 | 李琳, 刘雅奇. 通信网节点重要性的多指标评价方法[J]. 海军工程大学学报, 2010, 22 (5): 69- 73, 102. |
LI L , LIU Y Q . Node importance evaluation in communication network with respect to multiple network performance measures[J]. Journal of Naval University of Engineering, 2010, 22 (5): 69- 73, 102. | |
21 | TIAN H, NIE B, ZHANG W J. Military units importance evaluation based on complex network[C]//Proc.of the International Conference on Machine Vision and Human-machine Interface, 2010: 737-740. |
22 | XIONG J S , LI J H , YANG Y H , et al. Comparision of centrality measures for military communication network based on complex theory[J]. Science and Technology Review, 2011, 29 (36): 38- 41. |
23 |
LATORA V , MARCHIORI M . A measure of centrality based on network efficiency[J]. New Journal of Physics, 2007, 9 (6): 188- 188.
doi: 10.1088/1367-2630/9/6/188 |
24 |
GAO X , LI K Q , CHEN B . Invulnerability measure of a military heterogeneous network based on network structure entropy[J]. IEEE Access, 2018, 6, 6700- 6708.
doi: 10.1109/ACCESS.2017.2769964 |
25 | GUO X L, SHI F L. Survivability analysis for military communication network considering customer types and traffic association[C]//Proc.of the IEEE International Conference on Electronics Computer Society, 2012. |
26 | FRANK H , FRISCH I . Analysis and design of survivable network[J]. IEEE Trans.on Communication Technology, 1970, 18 (5): 567- 662. |
27 | SCHNEIDER C M , ANDRE A M , JOSE S , et al. Onion-like network topology enhance robustness against malicious attacks[J]. Journal of Statistical Mechanics: Theory and Experiment, 2011, 2011 (1): P01027. |
28 |
ZENG A , LIU W P . Enhancing network robustness against malicious attacks[J]. Physical Review E-Statistical, Nonlinear and Soft Matter Physics, 2012, 85 (6): 066130.
doi: 10.1103/PhysRevE.85.066130 |
29 | 陈建国. 抗毁地域综合通信网络拓扑规划算法研究[J]. 军事通信技术, 2005, 26 (2): 10- 13. |
CHEN J G . Algorithm for planning survivable topology of regional integrated communication network[J]. Journal of Military Communication Technology, 2005, 26 (2): 10- 13. | |
30 | 陈建国, 姜锋. 通信网基于业务的抗毁性分析[J]. 无线电通信技术, 1998, 24 (3): 20- 22. |
CHEN J G , JIANG F . Traffic-based survivability analysis on communication networks[J]. Radio Communications Technology, 1998, 24 (3): 20- 22. | |
31 | 孙梅, 詹武. 一种基于业务的Intranet抗毁性分析方法[J]. 计算机工程, 2007, 33 (10): 117- 119, 152. |
SUN M , ZHAN W . An analytical method of Intranet survivability performance based on traffic[J]. Computer Engineering, 2007, 33 (10): 117- 119, 152. |
[1] | Yang LI, Meng LIU, Jing GONG, Yongzhao WANG, Fujian DENG. Double-velocity inertial-frame alignment algorithm with pseudo INS modeling in polar regions [J]. Systems Engineering and Electronics, 2022, 44(5): 1677-1684. |
[2] | Yiyang LUO, Qingsong ZHAO, Huachao LI, Yong LI, Jianbin SUN. Framework and modeling method of weaponry utilization knowledge [J]. Systems Engineering and Electronics, 2022, 44(3): 841-849. |
[3] | Chunzheng WANG, Minghua HU, Lei YANG, Zheng ZHAO. Review on air traffic delay prediction [J]. Systems Engineering and Electronics, 2022, 44(3): 863-874. |
[4] | Wei ZHANG, Xihong SANG, Hui HAN, Bowen YANG. Geometry based 3D V2V MIMO channel modeling and statistical characteristic analysis [J]. Systems Engineering and Electronics, 2022, 44(11): 3537-3547. |
[5] | Hongchen JIAO, Yong LEI, Hongyu ZHANG, Guobin ZHANG, Yaodong WANG. Research on modeling and design method of spacecraft system based on MBSE [J]. Systems Engineering and Electronics, 2021, 43(9): 2516-2525. |
[6] | Jinwen LU, Hua YAN, Lei ZHANG, Hongcheng YIN. 3D-GTD model construction method using the shooting and bouncing ray technique [J]. Systems Engineering and Electronics, 2021, 43(8): 2028-2036. |
[7] | Gang LIU, Jun TANG, Chen LIU, Wu LI. Survey of cooperative behavior modeling technology forunmanned aerial vehicles clusters [J]. Systems Engineering and Electronics, 2021, 43(8): 2221-2231. |
[8] | Zhirou YANG, Hu ZHANG, Jing LIU, Tonglin LIU. Optimization algorithm of military communication network structure under node attack strategy [J]. Systems Engineering and Electronics, 2021, 43(7): 1848-1855. |
[9] | Yonglin LEI, Yan WANG, Qinzhang YU, Zhi ZHU, Wei DONG, Yifan ZHU. Design method of sequential neighbor exploratory experimental for complex simulation metamodeling [J]. Systems Engineering and Electronics, 2021, 43(5): 1232-1239. |
[10] | Yuyao ZHAI, Xianjun SHI, Jiapeng LYU, Lu HAN. Modeling and index evaluation of multi-level testability of missiles based on GSPN [J]. Systems Engineering and Electronics, 2021, 43(4): 970-979. |
[11] | Yan WANG, Kenan TENG, Ye CHENG, Jian CHEN. Importance ranking of anti-missile targets in important places based on graph theory and PageRank [J]. Systems Engineering and Electronics, 2021, 43(3): 709-715. |
[12] | Yunong WANG, Wenhao BI, An ZHANG, Chao ZHAN. DoDAF-based civil aircraft MBSE development method [J]. Systems Engineering and Electronics, 2021, 43(12): 3579-3585. |
[13] | Zhongyi CAI, Zezhou WANG, Yunxiang CHEN, Huachun XIANG, Lili WANG. Adaptive prediction of remaining useful lifetime for the single airborne equipment based on the proportional accelerated degradation modeling [J]. Systems Engineering and Electronics, 2021, 43(11): 3405-3412. |
[14] | Siyuan HE, Lingkun ZHU, Jin LIU, Zhidan BIAN, Yunhua ZHANG, Guoqiang ZHU. Research and implementation of forward automatic modeling methodfor radar target scattering center [J]. Systems Engineering and Electronics, 2021, 43(10): 2706-2717. |
[15] | Wenhao WANG, Wenhao BI, An ZHANG, Qiucen FAN. Function modeling method of civil aircraft system based on MBSE [J]. Systems Engineering and Electronics, 2021, 43(10): 2884-2892. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||