Computer Science ›› 2016, Vol. 43 ›› Issue (8): 30-35, 65.doi: 10.11896/j.issn.1002-137X.2016.08.006

Previous Articles     Next Articles

Networked Operational Information Flowing Dynamic Hypergraph Model Based on Motif

YANG Ying-hui, LI Jian-hua, NAN Ming-li, CUI Qiong and WANG Hong   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Dynamic,exact,direct and elaborate information flowing model is important guarantee for analyzing operational information alternation relationship and exploring information empowerment mechanism.Aiming at the problem of constructing information flowing model for networked operations,firstly,several correlative concepts,such as operational node and information flow,were defined.Three kinds of basic information flow motif for intelligence,command & control and striking were abstracted and different functional combinations were discussed.Secondly,correlative hypergraph theory was expatiated,and the operational task hierarchical decomposition method and hypergraph expression form were studied.And then,general flow and steps for constructing operational information flowing dynamic hypergraph model were given.Finally,taking aviation aggressive operations as an example,feasibility and validity of the model were verified.

Key words: Networked operations,Information flowing,Motif,Dynamic hypergraph

[1] Jia Jun,Wu Yuan-li,He Xiao-yuan,et al.Operation cooperative relation modeling based on hypergraphs[J].Journal of National University of Defense Technology,2015,7(3):185-190(in Chinese) 贾珺,吴元立,贺筱媛,等.作战协同关系超图模型[J].国防科技大学学报,2015,7(3):185-190
[2] Lan Yu-shi,Mao Shao-jie,Wang Heng.Theory and optimization of C4ISR system structure[M].Beijing:National Defense Industry Press,2015(in Chinese) 蓝羽石,毛少杰,王珩.指挥信息系统结构理论与优化方法[M].北京:国防工业出版社,2015
[3] Wang Chao,Chen Xing-yuan.An access control mode based on information flow graph[C]∥2011 Seventh International Confe-rence on Computational Intelligence and Security.2011:998-1000
[4] Akselrod D,Abhijit S,Kirubarajan T.Information Flow Control for Collaborative Distributed Data Fusion and Multisensor Multitarget Tracking [J].IEEE Transactions on Systems,Man,and Cybernetics-part C:Applications and Reviews,2012,2(4):501-517
[5] Wang Fei,Si Guang-ya,Rong Ming,et al.Research on network-of-networks model of armament system-of-systems[J].Systems Engineering and Electronics,2015,7(9):2052-2060(in Chinese) 王飞,司光亚,荣明,等.武器装备体系的异质超网络模型[J].系统工程与电子技术,2015,7(9):2052-2060
[6] Zhang Jie-yong,Lan Yu-shi,Yi Kan,et al.Network-centric C4ISR system structure and super-Network model[J].Command Information System and Technology,2014,5(5):1-12(in Chinese) 张杰勇,蓝羽石,易侃,等.网络中心化C4ISR系统结构与超网络模型[J].指挥信息系统与技术,2014,5(5):1-12
[7] Lempereur B,Merabti M,Qi Shi.Information Flow Monitoring: Model,Policy,and Analysis[C]∥Developments in E-systems Engineering.2011:227-232
[8] Wang Zhong-jie,Xu Xiao-fei.Service value dependency modelbased on layered hyper-graph[J].Computer Integrated Manufacturing Systems,2011,7(8):1834-1843(in Chinese) 王忠杰,徐晓飞.基于分层超图的服务价值依赖模型[J].计算机集成制造系统,2011,7(8):1834-1843
[9] Zou Zhi-gang,Liu Fu-xian,Sun Shi-man,et al.Extended granular computing-based supernetwork model for auti-air operational architecture[J].Complex Systems and Complexity Science,2014,1(2):24-35(in Chinese) 邹志刚,刘付显,孙施曼,等.基于扩展粒度计算的防空体系结构超网络模型[J].复杂系统与复杂性科学,2014,1(2):24-35

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[6] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[7] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[8] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[9] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[10] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .