军械工程学院学报
軍械工程學院學報
군계공정학원학보
JOURNAL OF ORDNANCE ENGINEERING COLLEGE
2014年
5期
57-64
,共8页
田田%胡焰智%甘志春%尹才华
田田%鬍燄智%甘誌春%尹纔華
전전%호염지%감지춘%윤재화
指挥信息系统%作战环路%抗毁性%建模
指揮信息繫統%作戰環路%抗燬性%建模
지휘신식계통%작전배로%항훼성%건모
command information system%combat loop%invulnerability%modeling
在指挥信息系统抗毁性研究中,网络节点异质性和作战机理的表征与分析不足。针对该问题,基于指挥信息系统主导的观察、判断、决策和行动作战环路,区分网络中信息、指控、打击和通信4类节点,提出作战信息链的概念来反映指挥信息系统运行机理;采用平均时延来刻画作战信息链的时效性,通过转化为经过指定点的最短路径问题给出计算方法;采用链路贯通率来刻画全系统内信息节点和打击节点之间形成有效链路的程度。结合“预先规划+随遇接入”生成的指挥信息系统网络模型,进行了抗毁性仿真分析,验证了方法的有效性。仿真结果进一步表明,指挥信息系统网络在随机攻击和度优先攻击下抗毁性表现出了复杂网络的共性,但其抗毁性结果的异常变化也具有一定的特殊性,从而证实了节点异质性和系统作战机理的影响。
在指揮信息繫統抗燬性研究中,網絡節點異質性和作戰機理的錶徵與分析不足。針對該問題,基于指揮信息繫統主導的觀察、判斷、決策和行動作戰環路,區分網絡中信息、指控、打擊和通信4類節點,提齣作戰信息鏈的概唸來反映指揮信息繫統運行機理;採用平均時延來刻畫作戰信息鏈的時效性,通過轉化為經過指定點的最短路徑問題給齣計算方法;採用鏈路貫通率來刻畫全繫統內信息節點和打擊節點之間形成有效鏈路的程度。結閤“預先規劃+隨遇接入”生成的指揮信息繫統網絡模型,進行瞭抗燬性倣真分析,驗證瞭方法的有效性。倣真結果進一步錶明,指揮信息繫統網絡在隨機攻擊和度優先攻擊下抗燬性錶現齣瞭複雜網絡的共性,但其抗燬性結果的異常變化也具有一定的特殊性,從而證實瞭節點異質性和繫統作戰機理的影響。
재지휘신식계통항훼성연구중,망락절점이질성화작전궤리적표정여분석불족。침대해문제,기우지휘신식계통주도적관찰、판단、결책화행동작전배로,구분망락중신식、지공、타격화통신4류절점,제출작전신식련적개념래반영지휘신식계통운행궤리;채용평균시연래각화작전신식련적시효성,통과전화위경과지정점적최단로경문제급출계산방법;채용련로관통솔래각화전계통내신식절점화타격절점지간형성유효련로적정도。결합“예선규화+수우접입”생성적지휘신식계통망락모형,진행료항훼성방진분석,험증료방법적유효성。방진결과진일보표명,지휘신식계통망락재수궤공격화도우선공격하항훼성표현출료복잡망락적공성,단기항훼성결과적이상변화야구유일정적특수성,종이증실료절점이질성화계통작전궤리적영향。
In the study of invulnerability of command information system,the characterization and analysis of network node heterogeneity and operational mechanism is lacking.To solve this problem,this paper distinguishes four kinds of nodes such as information,command and control, strike and communication in network,and proposes the concept of operational information link to reflect the operation mechanism of command information system.The average delay is used to describe the timeliness of operational information link,and the calculation method is obtained by transforming the shortest path problem via a specified point.The link-up rate is employed to characterize the degree of the effective links formed system-wide between information nodes and strike nodes.Simulation and analysis of invulnerability are carried out by combining the network model of command information system generated by “pre-planning+random access”,and the effectiveness of the method is validated.In addition,the simulation results show that the command information system's invulnerability reflects some similarities of complex network in random attack and degree priority attack,and but some particularities also exist in the abnormal changes of the invulnerability results,thus,verifying the impact of node heterogeneity and operational mechanism.