Computer Science ›› 2016, Vol. 43 ›› Issue (2): 13-18.doi: 10.11896/j.issn.1002-137X.2016.02.003

Previous Articles     Next Articles

Operational Architecture Modeling Based on Information Flow

YANG Ying-hui, LI Jian-hua, NAN Ming-li and TIAN Yan-tao   

  • Online:2018-12-01 Published:2018-12-01

Abstract: To depict information flow structure of systematic operations synthetically and describe complex dynamic information disposal and alternation situation among operational activities and units carefully,this paper introduced information flow analysis method.Three information flow factors of entity,relationship and attribute were defined,relationships among entities were analyzed and four information mapping rules of activity→activity,activity→node,node→activity and node→node were given with information flow as main line.According to basic modeling flows,models of ope-rational activity,node and information alternation were built.Finally,an example of aerial assault operation was taken for validation as simulation.The results show that the method and models proposed are feasible and effective,and can describe complex information alternation relationship in operational systems and present dynamic process of information flow impenetrating operational activities,which provide a new method for operational architecture modeling and information requirement analysis.

Key words: Information flow,Operation,Architecture,Mapping rule,Model

[1] DoD Acrhitecture Framework Working Group.DoD architecture framework version 2.0 [R].U.S.:Department of defense,2009
[2] UK Ministry of Defense.UK ministry of defense architecturalframework (MODAF) v1.2.004[R].UK Ministry of Defense,2010
[3] Shi Wei-lai,Lu Min.Development,application and enlighten-ment of foreign military architecture[J].Communication Technology,2010,43(2):169-172(in Chinese) 施未来,陆敏.外军体系结构的发展应用及启示[J].通信技术,2010,43(2):169-172
[4] Zhang Qiang,Li Jian-hua,Shen Di,et al.Research on networkmodeling and optimization of operation system of systems based on complex network [J].Systems Engineering and Electronics,2015,7(5):1066-1071(in Chinese) 张强,李建华,沈迪,等.基于复杂网络的作战体系网络建模与优化研究[J].系统工程与电子技术,2015,7(5):1066-1071
[5] Zou Zhi-gang,Liu Fu-xian,Sun Shi-man,et al.Extended granular computing-based supernetwork model for auti-air operationalarchitecture[J].Complex Systems and Complexity Science,2014,11(2):24-35(in Chinese) 邹志刚,刘付显,孙施曼,等.基于扩展粒度计算的防空体系结构超网络模型[J].复杂系统与复杂性科学,2014,11(2):24-35
[6] Pan Xing,Huang Yuan-xing,Yin Bao-shi.Equipment system of systems architecture based on function and connection[J].Systems Engineering and Electronics,2012,34(10):2052-2057(in Chinese) 潘星,黄元星,尹宝石.基于功能和联接的装备体系结构[J].系统工程与电子技术,2012,34(10):2052-2057
[7] Xie Wen-cai,Luo Xue-shan,Luo Ai-min.Meta-model basedmodeling of military information system architecture[J].Journal of National University of Defense Technology,2012,34(1):82-87(in Chinese) 谢文才,罗雪山,罗爱民.基于元模型的军事信息系统体系结构建模方法[J].国防科技大学学报,2012,34(1):82-87
[8] Du Wei,Wu Cong-hui,Du Zheng-jun,et al.Operational system network modeling and analysis research based on C2_link[J].Fire Control & command control,2014,39(11):93-96(in Chinese) 杜伟,吴从晖,杜正军,等.基于指控链的作战体系网络建模分析[J].火力与指挥控制,2014,39(11):93-96
[9] Zhang Feng-qin,Liang Dong,Guan Hua,et al.Research of consturction algorithm of weapons and equipment operation model based on ability of node[J].Application Research of Computers,2015,32(5):1322-1325(in Chinese) 张凤琴,梁栋,管桦,等.基于能力优先的作战体系模型构建方法研究[J].计算机应用研究,2015,32(5):1322-1325
[10] Waters J,Ceruti M G.Modeling and simulation of information flow:a study of infodynamic quantities[C]∥The 15th International Command and Control Research and Technology Symposium (ICCRTS 2010).2010:178-183
[11] Xu Bing-qing,Zhang Li-chen.Muti-dimensional architecturemodeling for cyber physical systems [C]∥Advances in computer science and its applications 2013(CSA 2013).2014:101-105
[12] Kaufmann J R,Hand J R.Integrating Renewable Engrgy Re-quirements into Building Energy Codes[R].National Laboratory,2011
[13] Thakor S,Chen T,Grant A.Bounds for network information flow with correlated Sources[C]∥12th Annual Australian Communications Theory Workshop (AusCTW 2011).2011:43-48
[14] Cai Feng-zhen,Tian An-ping.Operational theory of air-sky integration [M].Beijing:PLA press,2006(in Chinese) 蔡凤震,田安平.空天一体作战学[M].北京:解放军出版社,2006
[15] Alexander M G.Requirement Assurance:A Verification Process[R].Langley Research Center,Hampton,Virginia,2011

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .