Check patentability & draft patents in minutes with Patsnap Eureka AI!

Structural hole oriented key node identification method for command and control network

A key node and identification method technology, applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problems of high algorithm complexity, high complexity, and strong topology dependence, etc., and achieve low algorithm complexity and improved The effect of precision

Inactive Publication Date: 2017-03-15
DALIAN UNIV
View PDF1 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing identification methods for key nodes in complex networks mainly include degree, proximity, eigenvector, betweenness, information flow betweenness and structural holes, etc., but these algorithms have their limitations.
The degree is a local index of the network. The key node identification method based on the degree has a simple algorithm and poor accuracy; the proximity is measured according to the topological position of the node, and the key node identification method based on the proximity has a strong dependence on the network topology. It is difficult to adapt to the demand of dynamic changes in the network topology; the calculation process of the eigenvector key node identification method needs to solve the eigenvector of the adjacency matrix. Accusing the network; betweenness is a global indicator of the network, and the key node identification method based on betweenness is also restricted by the complexity of the algorithm; the improved key node identification method based on betweenness has overcome the shortcomings of traditional betweenness calculations, but the shortcomings of low efficiency The generality of the algorithm is poor; while the key node identification algorithm based on the betweenness of information flow has enhanced the applicability of the algorithm to the complex accusation network, but the complexity of the algorithm has not been solved; the existing "structural hole" theory has been introduced into the The algorithm in the identification of key nodes only considers the local information of the network and fails to accurately reflect the global state of the network
[0004] Due to the problems of low precision, high complexity and algorithm applicability in the existing key node identification algorithms, the above algorithms cannot be directly applied to the key node identification of the command and control network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Structural hole oriented key node identification method for command and control network
  • Structural hole oriented key node identification method for command and control network
  • Structural hole oriented key node identification method for command and control network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] Example 1: First, the structure hole theory and the calculation method of the hierarchical flow betweenness to which the present invention is applied are introduced, secondly, the algorithm flow of the key node identification algorithm of the command and control network oriented to the structure hole is introduced, and finally the key node identification method of the present invention and the existing method are given. comparison.

[0043] 1. Structural Hole Theory and Hierarchical Flow Betweenness

[0044] Before describing in detail the method for identifying key nodes in the command and control network oriented to structural holes, it is necessary to introduce the structural hole theory and the calculation method of hierarchical flow betweenness adopted in the present invention.

[0045] Structural Hole Theory

[0046] The neighbor vertices of a vertex in the network are connected to each other, but sometimes the expected connection between neighbor vertices does n...

Embodiment 2

[0113] Embodiment 2: A structural hole-oriented command and control network key node identification algorithm steps:

[0114] Step1: Build the accusation network model

[0115] The command entity is abstracted into nodes, the relationship between entities is abstracted into edges, the command network model is established, and the network topology diagram is obtained, as shown in the attached figure 1 shown, and described by the graph G=(V, E), there are n nodes, m edges, V={v 1 ,v 2 ,v 3 ,…,v n} represents the node set, E={e 1 ,e 2 ,e 3 ,…,e m} represents the set of edges. The adjacency matrix of G is A=[a ij ], element a in A ij defined as:

[0116]

[0117] Step2: Calculate the betweenness of the hierarchical flow of the nodes in the accusation network.

[0118] The information amount of each node in the initialized network is unit 1. At any time, only a single node in the network sends information, and other nodes receive information. The sending node distrib...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a structural hole oriented key node identification method for a command and control network, belongs to the field of military command and control science and is used for solving the problem that an existing algorithm cannot be directly applied to key node identification of the command and control network. The technical key point comprises the steps of S1, establishing a command and control network model; S2, calculating hierarchical flow betweenness of command and control network nodes; S3, calculating adjacent hierarchical flow betweenness through the hierarchical flow betweenness of the command and control network nodes; S4, calculating node restraint indexes through the adjacent hierarchical flow betweenness; and S5, sorting the key degree of the nodes according to the node restraint indexes, thereby identifying key nodes. The method has the beneficial effect that the key node identification precision is improved, and the algorithm complexity is relatively lower than that of the betweenness.

Description

technical field [0001] The invention relates to the field of military command and control, in particular to a method for identifying key nodes of an accusation network. Background technique [0002] The ever-changing and complex battlefield environment puts forward higher requirements for the invulnerability of the command and control network. When the network is accused of being deliberately attacked, the network appears very vulnerable, especially when the key nodes of the network are attacked, which can easily cause the paralysis of the entire network. Therefore, how to identify and protect key nodes makes the accusation network more resistant to attacks. Structural hole theory holds that firms occupying structural holes in the social structure will gain more competitive advantages, thereby enabling firms to obtain cumulative benefits, including information benefits and control benefits. In the accusation network, nodes in the position of structural holes can obtain mor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24
CPCH04L41/142H04L41/145H04L43/091
Inventor 陈波潘成胜王运明张多平
Owner DALIAN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More