Research on key "acupoint" mining technology for special information system
Special information system is a complex information system with specific architecture, clear functional positioning, and diverse components and relationships among elements, and the key point refers to the node or component element that plays a key role in the system, and the damage of "acupunc...
Saved in:
Main Author: | |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Office of Command Control and Simulation
2025-02-01
|
Series: | Zhihui kongzhi yu fangzhen |
Subjects: | |
Online Access: | https://www.zhkzyfz.cn/fileup/1673-3819/PDF/1737421278060-441260181.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832592322520416256 |
---|---|
author | ZOU Zilong, WANG Junlin, AN Shujie, LYU Changyuan, YU Minggang, NIU Yanjie |
author_facet | ZOU Zilong, WANG Junlin, AN Shujie, LYU Changyuan, YU Minggang, NIU Yanjie |
author_sort | ZOU Zilong, WANG Junlin, AN Shujie, LYU Changyuan, YU Minggang, NIU Yanjie |
collection | DOAJ |
description | Special information system is a complex information system with specific architecture, clear functional positioning, and diverse components and relationships among elements, and the key point refers to the node or component element that plays a key role in the system, and the damage of "acupuncture point" will have a huge impact on the function and utility of the whole system. It is of great scientific value and practical application significance to study how to excavate the key points of the system. In this paper, the complex network theory is used to analyze the network characteristics of special information system. On this basis, from the two dimensions of "static" and "dynamic", five indexes are proposed respectively, namely, transcendence, clustering coefficient, eigenvector centrality, network elasticity and network destruction resistance, which are used to evaluate the importance of each node. Next, YAANP decision software is used to determine the weight of each index, and then a key "acupoint" mining method for special information system is proposed. Finally, taking the special information system under the background of urban unmanned attack operation as an example, the scientific and reasonable of the proposed method is verified. |
format | Article |
id | doaj-art-eff2b018be3a419aa41af640147bfb3c |
institution | Kabale University |
issn | 1673-3819 |
language | zho |
publishDate | 2025-02-01 |
publisher | Editorial Office of Command Control and Simulation |
record_format | Article |
series | Zhihui kongzhi yu fangzhen |
spelling | doaj-art-eff2b018be3a419aa41af640147bfb3c2025-01-21T11:12:00ZzhoEditorial Office of Command Control and SimulationZhihui kongzhi yu fangzhen1673-38192025-02-0147110110810.3969/j.issn.1673-3819.2025.01.013Research on key "acupoint" mining technology for special information systemZOU Zilong, WANG Junlin, AN Shujie, LYU Changyuan, YU Minggang, NIU Yanjie0Institute of Command and Control Engineering, Army Engineering University of PLA, Nanjing 210007, ChinaSpecial information system is a complex information system with specific architecture, clear functional positioning, and diverse components and relationships among elements, and the key point refers to the node or component element that plays a key role in the system, and the damage of "acupuncture point" will have a huge impact on the function and utility of the whole system. It is of great scientific value and practical application significance to study how to excavate the key points of the system. In this paper, the complex network theory is used to analyze the network characteristics of special information system. On this basis, from the two dimensions of "static" and "dynamic", five indexes are proposed respectively, namely, transcendence, clustering coefficient, eigenvector centrality, network elasticity and network destruction resistance, which are used to evaluate the importance of each node. Next, YAANP decision software is used to determine the weight of each index, and then a key "acupoint" mining method for special information system is proposed. Finally, taking the special information system under the background of urban unmanned attack operation as an example, the scientific and reasonable of the proposed method is verified.https://www.zhkzyfz.cn/fileup/1673-3819/PDF/1737421278060-441260181.pdfspecial information system "acupoint" mining|node importance degree|network topology |
spellingShingle | ZOU Zilong, WANG Junlin, AN Shujie, LYU Changyuan, YU Minggang, NIU Yanjie Research on key "acupoint" mining technology for special information system Zhihui kongzhi yu fangzhen special information system "acupoint" mining|node importance degree|network topology |
title | Research on key "acupoint" mining technology for special information system |
title_full | Research on key "acupoint" mining technology for special information system |
title_fullStr | Research on key "acupoint" mining technology for special information system |
title_full_unstemmed | Research on key "acupoint" mining technology for special information system |
title_short | Research on key "acupoint" mining technology for special information system |
title_sort | research on key acupoint mining technology for special information system |
topic | special information system "acupoint" mining|node importance degree|network topology |
url | https://www.zhkzyfz.cn/fileup/1673-3819/PDF/1737421278060-441260181.pdf |
work_keys_str_mv | AT zouzilongwangjunlinanshujielyuchangyuanyuminggangniuyanjie researchonkeyacupointminingtechnologyforspecialinformationsystem |