首页 | 本学科首页   官方微博 | 高级检索  
   检索      

基于作战环路的指挥信息系统抗毁性建模与分析
引用本文:田田,;胡焰智,;甘志春,;尹才华.基于作战环路的指挥信息系统抗毁性建模与分析[J].军械工程学院学报,2014(5):57-64.
作者姓名:田田  ;胡焰智  ;甘志春  ;尹才华
作者单位:[1]重庆通信学院一系,重庆400035; [2]国防信息学院二系,湖北武汉430010
基金项目:国家科技重大专项子项目(2013ZX03006003-006);重庆市科技攻关项目(CSTC2012gg-yyj5840005)资助课题
摘    要:在指挥信息系统抗毁性研究中,网络节点异质性和作战机理的表征与分析不足.针对该问题,基于指挥信息系统主导的观察、判断、决策和行动作战环路,区分网络中信息、指控、打击和通信4类节点,提出作战信息链的概念来反映指挥信息系统运行机理;采用平均时延来刻画作战信息链的时效性,通过转化为经过指定点的最短路径问题给出计算方法;采用链路贯通率来刻画全系统内信息节点和打击节点之间形成有效链路的程度.结合"预先规划+随遇接入"生成的指挥信息系统网络模型,进行了抗毁性仿真分析,验证了方法的有效性.仿真结果进一步表明,指挥信息系统网络在随机攻击和度优先攻击下抗毁性表现出了复杂网络的共性,但其抗毁性结果的异常变化也具有一定的特殊性,从而证实了节点异质性和系统作战机理的影响.

关 键 词:指挥信息系统  作战环路  抗毁性  建模

Modeling and Analysis of Invulnerability for Command Information System Based on Combat Loop
Institution:TIAN Tian, HU Yan-zhi, GAN Zhi-chun, YIN Cai-hua (1. Department One of Chongqing Communication College,Chongqing 400035,China; 2. Department Two of National Defense Information Academy,Wuhan 430010,China)
Abstract:In the study of invulnerability of command information system,the characterization and analysis of network node heterogeneity and operational mechanism is lacking.To solve this problem,this paper distinguishes four kinds of nodes such as information,command and control, strike and communication in network,and proposes the concept of operational information link to reflect the operation mechanism of command information system.The average delay is used to describe the timeliness of operational information link,and the calculation method is obtained by transforming the shortest path problem via a specified point.The link-up rate is employed to characterize the degree of the effective links formed system-wide between information nodes and strike nodes.Simulation and analysis of invulnerability are carried out by combining the network model of command information system generated by “pre-planning+random access”,and the effectiveness of the method is validated.In addition,the simulation results show that the command information system's invulnerability reflects some similarities of complex network in random attack and degree priority attack,and but some particularities also exist in the abnormal changes of the invulnerability results,thus,verifying the impact of node heterogeneity and operational mechanism.
Keywords:command information system  combat loop  invulnerability  modeling
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号