期刊文献+

基于启发式遗传算法的近距空中支援超网络结构优化 被引量:2

Optimization of close air support super-network structure based on heuristic genetic algorithm
下载PDF
导出
摘要 基于超网络理论建立集申请网、情报网、指控网、协调网和火力网于一体的CAS超网络模型;以提高网络抗毁性和网络效率为优化目标,在标准遗传算法的基础上,根据CAS超网络模型得到启发式信息,对其初始化生成初始种群,对关键节点和普通节点设置不同的变异概率,通过遗传算法求解运算;仿真分析函数的寻优性能和优化前后网络的拓扑指标。结果表明,优化后的CAS超网络结构抗毁性更强、网络流转效率更高。 A CAS super-network model was established based on the super-network theory,which integrated application network,intelligence network,command and control network,coordination network and firepower network.Improving the network anti-destroying ability and network efficiency was taken as the optimization goal.Based on the standard genetic algorithm,the heuristic information was obtained according to the CAS super-network model,and the information was initialized to generate an initial population.The key nodes and common nodes are set to different mutation probabilities,and the calculation result was solved by genetic algorithm.The optimization performance of the function and the topology indicators of the network before and after optimization were simulated and analyzed.The results show that the optimized CAS super-network structure has better anti-destroying ability and network flowing efficiency.
作者 张泽 王瑛 闫孟达 岳龙飞 胡东愿 ZHANG Ze;WANG Ying;YAN Mengda;YUE Longfei;HU Dongyuan(Air Traffic Control and Navigation College, Air Force Engineering University, Xi’an 710051, China)
出处 《兵器装备工程学报》 CSCD 北大核心 2022年第6期121-127,共7页 Journal of Ordnance Equipment Engineering
基金 国家社会科学基金军事学项目(2019-SKJJ-C-025)。
关键词 超网络 近距空中支援 遗传算法 抗毁性 网络效率 super-network close air support genetic algorithm anti-destroying ability network efficiency
  • 相关文献

参考文献8

二级参考文献74

  • 1郭峰.漫谈美军近距离空中支援[J].国防科技,2006,27(10):48-52. 被引量:3
  • 2Kalloniatis A, Maeleod I. Formalization and agility in military headquarters planning[J]. The International C2 Journal, 2010, 4(1) : 11 - 19.
  • 3Alberts D S. Agility, focus and convergence: adapting C2 to the 21 st century[J]. The International C2 Journal, 2007,1 ( 1 ) : 1 - 30.
  • 4Huang S H, Wang H, Ding F, et al. On evolution of C2 net- work topology[C]//Proc, of the Control Research and Technology 15th International Command and S3nnposium, 2009 : 82 - 87.
  • 5Manso B, Manso M. Know the network, knit the network: ap- plying SNA to N2C2 maturity model experiment[C]//Proc, of the 15th International Command and Control Research and Technology Symposium, 2009 :52 - 61.
  • 6Williams A P. Implications of operationalizing a comprehensive approach: defining what interagency interoperability really means[J]. The International C2 Journal, 2010, 4(1) : 42 - 53.
  • 7Deller S, Bell M I, Bowling S R, et al. Applying the information age combat model: quantitative analysis of network centric oper- ations[J]. The International C2 Journal, 2009, 3(1) : 8- 18.
  • 8Wu J,Deng H Z,Tan Y J,et al. Vulnerability of complex net-works under intentional attack with incomplete informatlon[J]. .Journal of Physics A, 2007, 40(11): 2665- 2671.
  • 9Tian X G, Zhu Y C, Di Y Y, et al. Study military command and control system as complex networksEC3//Proc, of IEEE Inter- national Conference on Intelligent Computing and Intelligent Systems, 2010: 870-874.
  • 10Qu Z H. Enhancement of scale-free network attack tolerance[J]. China Physics B, 2010, 19(11): 85-89.

共引文献72

同被引文献12

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部