Research on key "acupoint" mining technology for special information system

Special information system is a complex information system with specific architecture, clear functional positioning, and diverse components and relationships among elements, and the key point refers to the node or component element that plays a key role in the system, and the damage of "acupunc...

Full description

Saved in:
Bibliographic Details
Main Author: ZOU Zilong, WANG Junlin, AN Shujie, LYU Changyuan, YU Minggang, NIU Yanjie
Format: Article
Language:zho
Published: Editorial Office of Command Control and Simulation 2025-02-01
Series:Zhihui kongzhi yu fangzhen
Subjects:
Online Access:https://www.zhkzyfz.cn/fileup/1673-3819/PDF/1737421278060-441260181.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832592322520416256
author ZOU Zilong, WANG Junlin, AN Shujie, LYU Changyuan, YU Minggang, NIU Yanjie
author_facet ZOU Zilong, WANG Junlin, AN Shujie, LYU Changyuan, YU Minggang, NIU Yanjie
author_sort ZOU Zilong, WANG Junlin, AN Shujie, LYU Changyuan, YU Minggang, NIU Yanjie
collection DOAJ
description Special information system is a complex information system with specific architecture, clear functional positioning, and diverse components and relationships among elements, and the key point refers to the node or component element that plays a key role in the system, and the damage of "acupuncture point" will have a huge impact on the function and utility of the whole system. It is of great scientific value and practical application significance to study how to excavate the key points of the system. In this paper, the complex network theory is used to analyze the network characteristics of special information system. On this basis, from the two dimensions of "static" and "dynamic", five indexes are proposed respectively, namely, transcendence, clustering coefficient, eigenvector centrality, network elasticity and network destruction resistance, which are used to evaluate the importance of each node. Next, YAANP decision software is used to determine the weight of each index, and then a key "acupoint" mining method for special information system is proposed. Finally, taking the special information system under the background of urban unmanned attack operation as an example, the scientific and reasonable of the proposed method is verified.
format Article
id doaj-art-eff2b018be3a419aa41af640147bfb3c
institution Kabale University
issn 1673-3819
language zho
publishDate 2025-02-01
publisher Editorial Office of Command Control and Simulation
record_format Article
series Zhihui kongzhi yu fangzhen
spelling doaj-art-eff2b018be3a419aa41af640147bfb3c2025-01-21T11:12:00ZzhoEditorial Office of Command Control and SimulationZhihui kongzhi yu fangzhen1673-38192025-02-0147110110810.3969/j.issn.1673-3819.2025.01.013Research on key "acupoint" mining technology for special information systemZOU Zilong, WANG Junlin, AN Shujie, LYU Changyuan, YU Minggang, NIU Yanjie0Institute of Command and Control Engineering, Army Engineering University of PLA, Nanjing 210007, ChinaSpecial information system is a complex information system with specific architecture, clear functional positioning, and diverse components and relationships among elements, and the key point refers to the node or component element that plays a key role in the system, and the damage of "acupuncture point" will have a huge impact on the function and utility of the whole system. It is of great scientific value and practical application significance to study how to excavate the key points of the system. In this paper, the complex network theory is used to analyze the network characteristics of special information system. On this basis, from the two dimensions of "static" and "dynamic", five indexes are proposed respectively, namely, transcendence, clustering coefficient, eigenvector centrality, network elasticity and network destruction resistance, which are used to evaluate the importance of each node. Next, YAANP decision software is used to determine the weight of each index, and then a key "acupoint" mining method for special information system is proposed. Finally, taking the special information system under the background of urban unmanned attack operation as an example, the scientific and reasonable of the proposed method is verified.https://www.zhkzyfz.cn/fileup/1673-3819/PDF/1737421278060-441260181.pdfspecial information system "acupoint" mining|node importance degree|network topology
spellingShingle ZOU Zilong, WANG Junlin, AN Shujie, LYU Changyuan, YU Minggang, NIU Yanjie
Research on key "acupoint" mining technology for special information system
Zhihui kongzhi yu fangzhen
special information system "acupoint" mining|node importance degree|network topology
title Research on key "acupoint" mining technology for special information system
title_full Research on key "acupoint" mining technology for special information system
title_fullStr Research on key "acupoint" mining technology for special information system
title_full_unstemmed Research on key "acupoint" mining technology for special information system
title_short Research on key "acupoint" mining technology for special information system
title_sort research on key acupoint mining technology for special information system
topic special information system "acupoint" mining|node importance degree|network topology
url https://www.zhkzyfz.cn/fileup/1673-3819/PDF/1737421278060-441260181.pdf
work_keys_str_mv AT zouzilongwangjunlinanshujielyuchangyuanyuminggangniuyanjie researchonkeyacupointminingtechnologyforspecialinformationsystem