Startseite Capability Oriented Combat System of Systems Networked Modeling and Analyzing
Artikel Öffentlich zugänglich

Capability Oriented Combat System of Systems Networked Modeling and Analyzing

  • Qingsong Zhao EMAIL logo , Xiaoke Zhang und Zhiwei Yang
Veröffentlicht/Copyright: 25. Juni 2016
Veröffentlichen auch Sie bei De Gruyter Brill

Abstract

Combat modeling is an important area of military operations. System of system counterwork is an important mode of information-based war which is a mode of “network centered” instead of “platform centered” and “capability oriented” instead of “function oriented”. Under the conditions of informationization, the combat model must therefore address these challenges by properly representing the networked efficient based on mutual relations among combat entities. The implementation process of combat system of systems capability is analyzed which is the result of complex interactions between the entities in four domains through a sequence of action processes. The combat network model of combat system of systems is described which reflects the fundamental structure of combat system of systems. The entity with three types of functions and five types of relations in the combat network is analyzed. The capability loop is defined and the evaluation index of combat network of combat system of systems is proposed based on the capability loop analysis. Finally, an example is used to illustrate the methodology.

1 Introduction

Under the conditions of informationization, the combat mode is transformed from the industrial age combat to the information age combat, from “platform centered” to “network centered”, and the operation takes the behaviors of counterwork between system of systems (SoS). The results of the combat depend on the combat capability of all weapons and equipment, and the overall combat capability depends on the interaction of multiple systems rather than an individual attribute of the weapons and equipment[13].

SoS is a collection of task-oriented or dedicated systems that pool their resources and capabilities together to create a new, more complex system which offers more functionality and better performance than simply the sum of the constituent systems[4, 5]. Combat system of systems (CSoS) is a large, complex, enduring collection of interdependent weapon systems under development over time by multiple independent authorities to provide multiple, interdependent capabilities to support multiple missions[69].

Industrial age combat was characterized by limited communications, massed forces, and centralized command, control and decision making. Since the information was difficult to obtain and hard to share, commanders relied more on forces than on a deep insight into tactical intricacies. Information technology and computer networks have been introduced into military processes to improve on this brute force approach by exchanging information for physical force where appropriate. As a result of these efforts, military systems are increasingly characterized by dispersal of physical assets, information distribution and decentralized cognition. A new value system is emerging where the arrangement of distributed, networked assets is more important than mere massing of force[1012].

Network-centric warfare (NCW) is the concept developed by the United States to describe the paradigm shift central to the revolution in US military affairs. It is defined as an information superiority-enabled concept of operations that generates increased combat power by networking sensors, decision makers, and shooters to achieve shared awareness, increased speed of command, higher tempo of operations, greater lethality, increased survivability and a degree of self-synchronization[1, 13]. There are large amount of matter and energy interaction based on information interaction in each part of CSoS. The combat efficient of CSoS takes representation of networked efficient based on these mutual relationships. Therefore, combat efficient of CSoS under the conditions of informationization has to manifest the whole network emergent effect caused by the complex interactions among the entities[2, 14].

An information age CSoS model requires a transformation in military modeling philosophy and must therefore addresses these challenges by properly representing complex local behaviors, explicitly representing interdependencies and capturing the skewed distribution of networked performance. In addition, an information age CSoS model must capture both the attrition processes and the search and detection processes important to distributed, networked warfare. Such a model would be a bona fide transformation in combat modeling philosophy and constitute a true information age CSoS model[10].

The objective of this paper is to propose an information age CSoS model that satisfies the requirements of the transformation in combat modeling. The rest of the paper is organized as follows. A literature review of related work is presented in Section 2. Section 3 describes the implementation of CSoS capability. Section 4 is dedicated to the CSoS network model. Section 5 demonstrates the evaluation of CSoS network model. Section 6 shows the example of CSoS network model and evaluates the results. And finally, the work is concluded in Section 7.

2 Related Work

Although there is a great variety in the specific application of combat models[15, 16], the fundamental structure of most combat models is one of the two basic types: deterministic (closed-form) or stochastic (probability-based) combat models [10]. The most prevalent example of a deterministic combat model is the eponymous Lanchester equations[1719]. This model is the basis for most of the current attrition-based combat simulations in use today. Indeed, there are dozens of variants of Lanchesters model representing ground or air combat processes in use today[2022]. A model that explicitly includes randomness and uncertainty is called a stochastic model[23]. Stochastic models are usually created by modifying one or more of the terms in a deterministic equation with random draws from some probability distribution. Traditional stochastic combat models represent combat as a chain of independent events (each with their own probability of occurrence) or as sets of basic interaction equations (with random variables representing operational processes)[24, 25].

Those models cannot take account of relationships among the inner units of the combat system, and lack description of apperception, information interaction, command and control, cooperation in the information battlefield[14]. Thus, a description framework can reflect the incorporate and networked oppositional operation of the combat SoS. It is necessary to find out a new description method of combat efficient of SoS.

Some defense analysts continue to use traditional models to simulate new, information age operational concepts[2628]. Sometimes these models are embellished with additional C2 parameters (in the case of deterministic models) or the addition of C2 statistical terms (in the case of stochastic models)[29, 30]. However, the underlying philosophy of these models has not departed from merely modifying traditional attrition models with C2 parameters or processes. Existing models have failed to represent the impact of new forms of command and control on combat outcomes because they are all based on physical models of attrition[10]. For this reason, none of the common models discussed here are suitable candidates for an information age combat model.

A newer set of models has been described by researchers attempting to add more specificity to the concept of network centric warfare, the predominant theory of warfare in the information age[3133]. Modern warfare has the exhibition of counterwork between SoS based on the more and more extrusive network. So it is rational to describe the oppositional operation of the combat from the point of network science view. Network analysis has emerged as a powerful way of studying phenomena as diverse as interpersonal interaction, connections among neurons, the structure of the internet[34, 35], and military networks[36, 37]. Complex network theory is a crossed subject which combines wholeness, complexity and network organically and mines the essential characteristics of complex system through simulation, dynamics evolution and statistical physics[38]. It becomes a new theoretic method to explore complexity in the network-centric combat[39, 40]. The power network-centric warfare is the results of the increase in speed of command, self-synchronization of forces, and higher situational awareness. OODA loop is an information strategy concept from information warfare. In OODA loop, military operations are basically a sequence of decision processes or cycles. These cycles have four main points: Observe, orient, decide, and act. OODA loop shows that all decisions are based on observations of the evolving situation. These observations are the raw information on which decisions and actions are based. The observed information must be processed to be oriented for making a further decision[41, 42].

An information age combat model requires a transformation in military modeling philosophy and must therefore addresses these challenges by properly representing complex local behaviors, explicitly representing interdependencies and capturing the skewed distribution of networked performance. In addition, an information age combat model must capture both the attrition processes and the search and detection processes important to distributed, networked warfare.

3 CSoS Capability Implementation

CSoS is the large, complex, enduring collections of interdependent systems under development over time by multiple independent authorities to provide multiple, interdependent capabilities to support multiple missions. The behavior of CSoS depends not only on the constituent systems but also on the complex interactions between the constituent systems. The number of connections between constituent systems, the diversity of the constituent systems and the way of the constituent systems organized can lead to different emergent CSoS behaviors.

Capability is the ability to execute a specified course of action[43]. CSoS emphasizes the capability of CSoS rather than the function of the individual system in CSoS. CSoS capability is the ability of CSoS to achieve an effect under specified conditions through multiple combinations of means and ways to perform a set of tasks such as delivering fire on a target or delivering electronic interference on a target.

The capability implementation of CSoS is the result of a variety of combat elements in certain combat process interaction including the physical element such as the firepower, the information element such as the intelligence, the cognitive element such as the commander, and the organization element such as the cooperation. The capability implementation of CSoS is the result of complex interactions between the entities in four domains including the physical domain (PD), information domain (ID), cognitive domain (CD) and organization domain (OD). PD is composed of the entities with the function of attack or interference aiming at delivering fire or electronic interference on the target. ID is composed of the entities with the function of reconnaissance, surveillance and early warning aiming to at getting and delivering targets information. CD is composed of the entities with the function of command and control. OD is composed of the relations among the entities in PD, ID and CD concerned about the collaboration between the entities with various functions.

The capability implementation of CSoS is basically a sequence of action processes. These processes have three main actions: observation, decision and action. Observation part is a stage where surrounding information about the tasks is observed. In the decision part, deciders make decisions about the present and future arrangement of the other parts based on the information from the observation part. In the action part, the decision is executed such as delivering fire on the target by the missile or delivering electronic interference on the target by the electronic jammer.

The capability implementation of CSoS can be shown in Figure 1. At the macroscopic level, the capability implementation of CSoS is the result of the cooperation between the PD, ID, CD and OD. At the microcosmic level, the capability implementation of CSoS is the result of a combat processes including the observation, decision and action.

Figure 1 The capability implementation of CSoS
Figure 1

The capability implementation of CSoS

4 Combat Network Model of CSoS

The CSoS can be represented as a combat network described by OD. The node is the target entity and the entities in PD, ID and CD. The link is the relationships between the entities. Combat network reflects the incorporate and networked oppositional operation of CSoS.

The combat network model of CSoS can be described as G = (V′, T, E′, F, F′).

  1. V′ is the collection of entities in PD, ID and CD;

  2. T is the collection of target entities, V = V′ ⋃ T, N is the number of entities in V;

  3. E is the collection of relations between the entities in V, a relation from vi to vj, vi, vjV is denoted by eij and eijE;

  4. F is the collection of the entity attributes, F = {F1, F2, ⋯, Fi, FN}. Fi = [f(vi), f1(vi), f2(vi), f3(vi), f4(vi)] is the collection of the attribute of vi, viV. f(vi) is the function type of vi. If viV′, then f(vi) ⊆ {Sensor, Decsion, Influence}. f1(vi) is the function of vi, f2(vi) is the reaction time of vi, f3(vi) is the reliability of vi, f4(vi) is the cost of vi. Let fi(v)∈ [0, 1], i = 1, 2, 3, 4, vV. The stronger of the function is, the more f1(v) closes to 1, the greater of the entity supports the capability. The shorter of the reaction time is, the more f2(v) close to 0, the greater of the entity supports the capability. The higher of the reliability is, the more f3(v) closes to 1, the greater of the entity supports the capability. The more of the cost, the more f4(v) close to 1. If viT, then f(vi) is the value of vi and fi(vi) = ∅, i = 1, 2, 3;

  5. F′ is the collection of the relation attributes, F′ = {Fij}. Fij = [f′(eij), f1(eij),f2(eij),f3(eij),f4(eij) ] is the collection of the attributes of eijE. f′(eij) is the function type of eij. f1(eij) is the function of eij and f′(eij) ∈ {RTS, RSD, RDI, RIT, RSS, RDD, RII}. f2(eij) is the reaction time of eij, f3(eij) is the reliability of eij, f4(eij) is the cost of eij. Let fieij ∈ [0, 1], i = 1, 2, 3, 4, eijE. The stronger of the function is, the more f1(eij) close to 1, the greater of the relation supports the capability. The shorter of the reaction time is, the more f2(eij) close to 0, the greater of the relation supports the capability. The higher of the reliability is, the more f3(eij) close to 1, the greater of the relation supporting supports the capability is. The more of the cost is, the more f4(eij) close to 1, the more of the cost supports the capability.

The function of the entity in PD, ID and DC can be divided into three types: Sensor function, decision function and influence function.

  1. Senor function is the function of reconnaissance, surveillance and early warning etc. The entity with the sensor function is the sensor entity. The detection range and quality of the sensor entity decide the support degree of the sensor entity for the CSoS capability implementation.

  2. Decision function is the function of decision based on the information observed by the sensor entity. The entity with the decision function is the decision entity. The degree of the information processing and situational awareness of the decision entity decide the support degree of the decision entity for the CSoS capability implementation.

  3. Influence function is the function of fire attack or electronic interference based on the information observed by the sensor entity and the decision by the decision entity. The entity with the influence function is the influence entity. The degree of the fire attack or electronic interference of the influence entity decides the support degree of the influence entity for the CSoS capability implementation.

Let S = {x | xV′ ∧ Sensor ∈ f(x)}, D = {x | xV′ ∧ Decsion ∈ f(x)}, I = {x | xV′ ∧ Influence ∈ f(x)} is the collection of entities with the function of sensor, decision and influence.

The relationship between the entities in PD, ID and DC can be divided into five types: Sensor relation, information relation, command relation, influence relation and cooperation relation.

  1. Sensor relation is the relation between the sensor entity and the target, denoted by RTS. The direction of sensor relation is from the target to the sensor entity.

  2. Information relation is the relation between the decision entity and sensor entity, denoted by RSD. The direction of information relation is from the sensor entity to the decision entity.

  3. Command relation is the relation between the influence entity and the decision entity, denoted by RDI. The direction of command relation is from the decision entity to the influence entity.

  4. Influence relation is the relation between the influence entity and the target, denoted by RIT. The direction of sensor relation is from the influence entity to the target.

  5. Cooperation relation is the relation between the entities with the same function type. RSS is the relation between the sensor entities. RDD is the relation between the decision entities. RII is the relation between the influence entities. For example, when two sensor entities conduct reconnaissance on the same target, the reconnaissance accuracy can be improved if two sensor entities can share the reconnaissance information. The direction of cooperation relation is from the entity which starts the cooperation firstly.

    w1(eij)=ln[kijf1(vj)f3(vj)f2(vj)+kijf1(eij)f3(eij)f2(eij)],f(eij)=RTS,ln[kijf1(vi)f3(vi)f2(vi)+kijf1(eij)f3(eij)f2(eij)],f(eij)=RIT,ln[kijif1(vi)f3(vi)f2(vi)+kijjf1(vj)f3(vj)f2(vj)+kijf1(eij)f3(eij)f2(eij)],f(eij)U,whereU={RSD,RDI,RSS,RDD,RII}.(1)

For eijE, let W(eij) = [w1(eij), w2(eij)], w1(eij)∈(0, 1), w1(eij)∈(0, 1). w1(eij) is the implementation degree of the operational activity eij. w2(eij) is the cost of the implementation of the operational activity eij. kiji(0,1),kijj(0,1) is the weight of the entities and the relations in the operational activity eij for the implementation of the capability.

The CSoS capability is supported by the cooperation between the entities in the PD, ID, CD and OD in the combat network. The capability depends not only on the entities but also on the cooperative mode between the entities. The implement degree of the operational activity eij is defined as shown in equation (1). The cooperation can enhance individual entity capability and the CSoS capability is not the simple sum of the single capability proposed by the entities.

If f′(eij) = RTS, w1(eij) is the uncertainty degree of the target information obtained by the sensor entity. The more of the information obtained by the sensor entity, the lower of the uncertainty is, the closer w1(eij) to 0. If f′(eij) = RSD, w1(eij) is the uncertainty degree of the target information obtained by the decision entity. The more of the information obtained by the decision entity, the lower of the uncertainty is, the closer w1(eij) to 0 is. If f′(eij) = RDI, w1(eij) is the uncertainty degree of the decision made by the decision entity. The higher of the decision correctness is, the lower of the uncertainty is, the closer w1(eij) to 0 is. If f′(eij) = RIT, w1(eij) is the uncertainty degree of destroying the target by the influence entity. The more destroying the target, the lower of the uncertainty is, the closer w1(eij) to 0 is. If f′(eij) = RSS, w1(eij) is the uncertainty degree of the target information obtained cooperatively by two sensor entities. The higher of cooperation degree between two sensor entities is, the closer w1(eij) to 0 is. If f′(eij) = RDD, w1(eij) is the uncertainty degree of the decision made cooperatively by two decision entities. The higher of the cooperation degree between two decision entities is, the closer w1(eij) to 0 is. If f′(eij) = RII, w1(eij) is the uncertainty degree of destroying the target cooperatively by two influence entities. The higher of the cooperation degree between two influence entities, the closer w1(eij) to 0 is.

The cooperation between the PD, ID, CD and OD, denoted by eij, will decrease the cost supporting the implementation of the capability. In general, the total cost will be smaller than any cost supporting the implementation of the capability by single entity. w2(eij) is defined as:

w2(eij)=f4(vj)f4(eij)f4(vj)+f4(eij),f(eij)=RTS,f4(vj)f4(eij)f4(vi)+f4(eij),f(eij)=RIT,f4(vi)f4(vj)f4(eij)f4(vi)+f4(vj)+f4(eij),f(eij){RSD,RDI,RSS,RDD,RII}(2)

The entity in the combat network of CSoS can be described as Figure 2(a). Vnumber is the number of the entities and Type is the function type of the entity. If vV′, then Type ⊆{Sensor, Decsion, Influence}. If vT, then Type = Target. The relation in the combat network of CSoS can be described as Figure 2(b). Rnumber is the number of relations, Type is the type of the relation and Type ∈ {RTS, RSD, RDI, RIT, RSS, RDD, RII}. Figure 2(b) can be simplified to Figure 2(c).

Figure 2 The entity and relation in the combat network of CSoS
Figure 2

The entity and relation in the combat network of CSoS

The combat network of CSoS can be described as a directed network where vV is the node and eijE is the edge, shown in Figure 3. Pij = eik1, ek1k2, ⋯, ekmkn, eknj is a directed path in G from node vi to node vj. The length of the path is the number of edges in the path. Pij is the collection of paths from node vi to node vj. V(Pij) is the collection of the nodes in Pij. E(Pij) is the collection of the edges in Pij.

Figure 3 The combat network of CSoS
Figure 3

The combat network of CSoS

5 Combat Network of CSoS Evaluation

The implementation of the capability aim to attacking the target in CSoS depends not only on the cooperation among the entities in PD, CD and ID but also on the process including observe, decide, and act. The implementation of the capability can be described as a path in the combat network of CSoS.

Definition 1

Capability loop for a target in the combat network is defined as a directed path Ptt from the target to the target in the combat network of CSoS and denoted by Γ. Capability loop can be described as Ptt = etk1Pk1k2ek2k3Pk3k4ek4k5Pk5k6ek6t where f(etk1) = RTS, f(ek2k3) = RSD, f(ek4k5) = RDI, f(ek6T) = RIT, vk1S, vk2S, vk3D, vk4D, vk5I, vk6I. Obviously, Pk1k2 is the path in ID, Pk3k4 is the path in CD and Pk5k6 is the path in PD.

Γ(vt) is the collection of capability loops for the target vtT. Γi(vt) is the i-th capability loop in Γ(vt). V(Γi(vt)) is the collection of entities in Γi(vt) and E(Γi(vt)) is the collection of relations in Γi(vt).

The evaluation index of Γi(vt) includes the uncertainty degree of the implementation of the capability and denote by I(Γi(vt)), the value of the implementation of the capability and denote by Z(Γi(vt)), the cost of the implementation of the capability and denote by H(Γi(vt)), the efficiency of the implementation of the capability and denote by Ψ(Γi(vt)).

The overall uncertainty degree of the implementation of the capability supported by Γi(vt) depends on the uncertainty degree of the various relationships in Γi(vt). I(Γi(vt)) is defined as:

I(Γi(vt))=eijE(Γi(vt))w1(eij).(3)

The purpose of the implementation of the capability supported by Γivt is to destroy the target process. Therefore, the value of the implementation of the capability is the value of the target. Z(Γi(vt)) is defined as:

Z(Γi(vt))=f(vt).(4)

The cost of the implementation of the capability supported by Γi(vt) depends on the cost of the various relationships in Γi(vt). Based on the equation (1), H(Γi(vt)) is defined as:

H(Γi(vt))=eijE(Γi(vt))w2(eij),(5)
Ψ(Γi(vt))=Z(Γi(vt))I(Γi(vt))H(Γi(vt)).(6)

For two paths Pmr = emk1, ek1k2, ⋯, ekmkn, eknr and Phl=ehk1,ek1k2,,ekmkn,eknl, the joint product of the two paths is defined as Pml = PmrPhl.

Pml=PmrPhl=,rhorV(Pmr)V(Phl){vh,vl}orPmr=orPhl=,emk1,ek1k2,,ekmkn,eknr,ehk1,ek1k2,,ekmkn,eknl,r=h.

The joint matrix of G is defined as:

A=(αij)N×N=eij,exits the relation from vi to vj,,else.

The path matrix is a matrix where the element in the matrix is the collection of paths in the combat network. That is, if M = [mij]n×k is a path matrix, then mij = Pij.

For two path matrices M = [mij]n×k and N = [nij]k×q, the joint product of the two path matrices is defined as Z = MN where Z=[zij]n×q,zij=r=1kmnrnrq (1 ≤ in, 1 ≤ jq).

Let Mk = Mk−1A, k = 2, 3, ⋯, N with M1 = A. Mk has the following properties:

  1. The element mijk in Mk is the collection of the directed paths from vi to vj and the length of each path is k.

  2. mijk is the collection of the directed paths including the entity vi and the length of each path in the collection is k.

  3. mijk is the path from vi to vj, j = 1, 2, ⋯, N, and the length of the path is k.

  4. mijk is the path from vi to vj, i = 1, 2, ⋯, N, and the length of the path is k.

Based on the above properties, the algorithm to find the capability loops for target vt is given as following.

Algorithm 1

  1. Let M1 = A where A is the joint matrix of G;

  2. Let k = 2 and Mk = Mk−1A;

  3. If mijk ≠ ∅, i = 1, 2, ⋯, N, j = 1, 2, ⋯, N, then let k = k + 1 and jump to Step 2), else jump to Step 4);

  4. mttk is the collection of capability loops for target vt in G.

Based on the OODA loop, the process of attacking a target is the process of the observation, decision and action. One capability loop is a process of attacking the target including the stage of observation, decision and action. The more of the capability loops are in Γ(vt), the more of the methods of attacking the target vt are, which decrease the uncertainty degree of the implementation of the capability aim to attacking the target vt and the overall decrease of the uncertainty degree is not the simple sum of the decrease supported by the single capability loop.

The evaluation index of the capability of the command network for target vt includes the uncertainty degree of the implementation of the capability denotes by I(Γ(vt)), the value of the implementation of the capability denotes by Z(Γ(vt)), the cost of the implementation of the capability denotes by H(Γ(vt)) and the efficiency of the implementation of the capability denotes by Ψ(Γ(vt)).

I(Γ¯(vt))=i=1mI(Γi(vt))i=1mI(Γi(vt)),(7)

where m is the number of capability loops in Γ(vt).

Z(Γ¯(vt))=f(vt),(8)
H(Γ¯(vt))=i=1mH(Γi(vt)),(9)
Ψ(Γ¯(vt))=Z(Γ¯(vt))I(Γ¯(vt))H(Γ¯(vt)).(10)

Γ(vt) describes all modes of attacking target by the combat network of CSoS. But the cost of each capability loop in Γ(vt) is different. ΓC(vt, c) is the collection of capability loops which cost is not more than c and named as c-cost cut of Γ(vt). ΓI(vt, r) is the collection of capability loops which uncertainty degree is not less than r and named as r-uncertainty degree cut of Γ(vt).

Γ¯C(vt,c)={Γi(vt)|Γi(vt)Γ¯(vt) and H(Γ¯(vt))c},Γ¯I(vt,r)={Γi(vt)|Γi(vt)Γ¯(vt) and H(Γ¯(vt))r}.

The role of the entity and the relation in the different capability loop is different. CoreV(vt) is the core entities for vt and CoreE(vt) is the core relations for vt.

CoreV(vt)={v|vV,vVV(Γi(vt))},CoreE(vt)={e|eVE(Γi(vt))}.

The important of the entity in the command network can be measured by the change of the value of the evaluation index after removing the entity from the command network. The command network after removing the entity v is denoted by G. Γ′(vt, v) is the collection of capability loops to attacking the target vt in G. IInf(v, vt) is the impact degree of entity v to G on the uncertainty degree for accomplishing the capability of attacking the target vt. HInf(v, vt) is the impact degree of entity v to G on the cost for accomplishing the capability of attacking the target vt. Ψ Inf(v, vt) is the impact degree of entity v to G on the efficiency for accomplishing the capability of attacking the target vt.

IInf(v,vt)=|I(Γ¯(vt))I(Γ¯(vt,v))|maxviV|I(Γ¯(vt))I(Γ¯(vt,vi))|,(11)
HInf(v,vt)=|H(Γ¯(vt))H(Γ¯(vt,v))|maxviV|H(Γ¯(vt))H(Γ¯(vt,vi))|,(12)
ΨInf(v,vt)=|Ψ(Γ¯(vt))Ψ(Γ¯(vt,v))|maxviV|Ψ(Γ¯(vt))Ψ(Γ¯(vt,vi))|.(13)

The task of the command network is attacking all the targets instead of only one. The command network can be evaluated by the capability of attacking all targets. The evaluation index of the capability of command network includes the uncertainty degree of the implementation of the capability denotes by I(G), the value of the implementation of the capability denotes by Z(G), the cost of the implementation of the capability denotes by H(G) and the efficiency of the implementation of the capability denotes by Ψ(G).

I(G)=t=1|T|I(Γ¯(vt))t=1|T|I(Γ¯(vt)),(14)
Z(G)=t=1|T|f(vt)),(15)
H(G)=t=1|T|i=1mH(Γi(vt)),(16)
Ψ(G)=Z(G)I(G)H(G).(17)

I(v, G) is the impact degree of entity v to G on the uncertainty degree for accomplishing the capability of attacking all targets. H(v, G) is the impact degree of entity v to G on the cost for accomplishing the capability of attacking all targets. Ψ(v, G) is the impact degree of entity v to G on the efficiency for accomplishing the capability of attacking all targets.

I(v,G)=viTf(vi)viTf(vi)×IInf(v,vi),(18)
H(v,G)=viTf(vi)viTf(vi)×HInf(v,vi),(19)
Ψ(v,G)=viTf(vi)viTf(vi)×ΨInf(v,vi),(20)

where f(vi)viTf(vi)×HInf(v,vi) is the weight of different capability loop in G which is decided by the value of the target in the capability loop.

6 An Illustrative Example

A combat network of CSoS is described in Figure 4. T = {V1, V2}, V′ = {V3, V4, V5, V6, V7, V8}, S = {V3, V4, V5}, D = {V4, V6}, I = {V4, V6, V8}, f(V1) = 0.9, f(V2) = 0.8. e44 : S-D is abbreviated to e441 , e44 : D-I is abbreviated to e442.

Figure 4 A combat network of CSoS
Figure 4

A combat network of CSoS

The implement degree and the cost of the implementation of the operational activity in the combat network are given in Table 1.

Table 1

Implement degree and cost of the implementation of the operational activity

operational activity ee13e14e23e24e25e34e35e45e441e46
w1(e)0.1770.1230.1280.1250.1050.1050.0510.0830.0010.03
w2(e)0.30.40.40.30.30.30.20.50.050.6
operational activity ee56e442e47e48e67e68e41e71e72e82
w1(e)0.0730.0020.0280.0520.0730.0210.0450.0350.0240.02
w2(e)0.30.040.30.40.50.30.30.40.30.2

Based on Algorithm 1, the capability loops in the combat network are Γ(v1) = {e14e441e442e41, e14e441e47e71, e14e46e67e71, e13e34e441e442e41, e13e34e441e47e71, e13e34e46e67e71, e13e35e56e67e71, e14e45e56e67e71}, Γ(v2) = {e23e35e56e68e82, e23e34e45e56e68e82, e24e46e68e82, e24e46e67e72, e24e45e56e68e82, e25e56e68e82}.

The evaluation value of the capability loops for v1 and v2 are described in Figure 5. The uncertainty degrees of the capability loops for v1 (shown in Figure 5(a)) are not much different which is in [0.171, 0.42]. But the costs of the capability loops (shown in Figure 5(a)) are very different which is in [0.79, 2.3]. The capability loop with the max cost is Γ3(v1) and its cost is 2.3. The capability loop with the min cost is Γ1(v1) and its cost is 0.79. There are differences between the efficiencies of the capability loops shown in Figure 5(a). The capability loop with the max efficiency is Γ1(v1) and its efficiency is 6.66. The capability loop with the min efficiency is Γ6(v1) and its efficiency is 1.02. The former is 6.5 times the latter. The capability loop for v2 with the max efficiency is Γ6(v2) shown in Figure 5(b). The capability loop with the min efficiency is Γ2(v2) shown in Figure 5(b). The former is 3.6 times the latter.

Figure 5 The evaluation value of the capability loop for v1 and v2
Figure 5

The evaluation value of the capability loop for v1 and v2

It shows that there are different combat models which are denoted by the different capability loops can be chosen in the combat network of CSoS. These different combat models including different entities and cooperation between the entities can achieve the same combat task such as attacking the same target. But there are perhaps differences of the uncertainty degree, cost and efficiency between the different combat models. For example, if the task is attacking the target v1, then the max efficiency can be achieved by Γ1(v1) which includes the single entity v4. If the task is attacking the target v2, then the max efficiency can be achieved by Γ6(v2) which is the cooperation among the entities v2, v5, v6, v8. If the task is attacking the target v1 and v2, then the max efficiency and the min cost can be achieved simultaneously by the cooperation among the entities v2, v4, v5, v6, v8 and the other entities are unnecessary. The uncertainty degree of attacking v2 is 0.29 and the uncertainty degree of attacking v2 is 0.22.

The evaluation value of the capability to attacking the target v1 are I(Γ(v1)) = 0.000028, Z(Γ(v1)) = 0.9, H(Γ(v1)) = 12.44, Ψ(Γ(v1)) = 2584. The evaluation value of the capability to attacking the target v2 are I(Γ(v2)) = 0.003522, Z(Γ(v2)) = 0.8, H(Γ(v2)) = 9.2, Ψ(Γ(v2)) = 24.7. It shows that the efficiency of the combat network to attacking v1 is more than v2.

The evaluation value of the capability to attack the target v1 is changing with the changing of cost limit shown in Figure 6(a). The efficiency increases slowly before c = 1.35 and increases fast after c = 1.35. The uncertainty degree changes significantly with the changing of cost before c = 0.95 but not after c = 1.15. The impact of cost on uncertainty degree and efficiency is small where 1.15 < c < 1.35. The evaluation value of the capability to attack the target v2 are changing with the changing of cost limit shown in Figure 6(b). The impact of cost on uncertainty degree reaches maximum when c = 1.1 and becomes smaller after c = 1.1. The efficiency increases fast after c = 1.6.

Figure 6 The evaluation value change with the cost limit changing
Figure 6

The evaluation value change with the cost limit changing

The core entity is CoreV(v1) = CoreE(v1) = ∅ and the core relation is CoreV(v2) = {v6}, CoreE(v2) = ∅ in the command network, which means that the missing of v6 will cause the missing of the capability of the command network to attack v2.

The impact degree of the entity to the command network on the capability of attacking the target v1 is shown in Figure 7(a). The missing of v4 and v7 have more impact than the missing of the others on the uncertainty degree for attacking the target v1. The mission of v8 has no impact on the uncertainty degree. The removal of v3, v5, v6, v8 can reduce more cost than the removal of the other entities and increase less uncertainty degree than the removal of the other entities.

Figure 7 The impact degree of the entity on the capability of attacking a target
Figure 7

The impact degree of the entity on the capability of attacking a target

The impact degree of the entity to the command network on the capability of attacking the target v2 is shown in Figure 7(b). The missing of v6 has more impact than the missing of the others on the uncertainty degree for attacking the target v2. The missing of v7 has more impact than the missing of the others on the efficiency for attacking the target v2.

The evaluation value of the capability of the command network is I(G) = 0.0000278, Z(G) = 1.7, H(G) = 21.64, Ψ(G) = 2825.8. The impact degree of the entity on the capability of the command network for attacking all the targets is shown in Figure 8. The missing of v4 and v6 has more impact than the missing of the others on the uncertainty degree. The missing of v7 has more impact than the missing of the others on the efficiency and cost. The missing of v8 has little impact on the efficiency and the cost.

Figure 8 The impact degree of the entity on the capability of the command network
Figure 8

The impact degree of the entity on the capability of the command network

7 Conclusion

With the development of information technology, combat have increasingly reduced their reliance on weapon platforms and force concentration. Through combat network, the integration between various platforms is increasingly high while the distinction boundaries between different arms are becoming blurred. An information age CSoS model will require a transformation in military modeling philosophy and must therefore address these challenges by properly representing complex local behaviors, explicitly representing interdependencies and capturing the skewed distribution of networked performance. In addition, an information age CSoS model must capture both the attrition processes and the search and detection processes important to distributed, networked warfare. The implementation process of CSoS capability is analyzed. The process reveals the mechanism of CSoS capability implement which is the result of complex interactions between the entities in four domains through a sequence of action processes. The combat network model of CSoS is described which reflects the fundamental structure of networked combat. The capability loop is defined and the evaluation index of combat network of CSoS is proposed based on the capability loop analysis. Finally, an example is used to illustrate the methodology.

In the future, the combat model considering the CSoS conflicts will be studied which reflects more characteristics of the combat under the conditions of informationization.


Supported by National Natural Science Foundation of China (71331008, 71571185) and National Social Science Foundation of China in Military Science (15GJ003-278)


Reference

[1] Alberts D S, Garstka J J, Stein F P, et al. Network-centric warfare: Developing and leveraging information superiority. Proceeding of CCRP, 2000.10.21236/ADA406255Suche in Google Scholar

[2] Kaplan J M. A new conceptual framework for enterprise-wide, net-centric system-of-systems engineering. Proceeding of International Conference on System of Systems Engineering, Los Angeles, CA, USA, 2006.10.21236/ADA453974Suche in Google Scholar

[3] Deller S, Bell M I, Bowling S R, et al. Applying the information age combat model: Quantitative analysis of network centric operations. The International C2 Journal, 2009, 3(1): 1–25.Suche in Google Scholar

[4] Maier M W. Architecting principles for system of systems. Systems Engineering, 1998, 4(1): 267–284.10.1002/(SICI)1520-6858(1998)1:4<267::AID-SYS3>3.0.CO;2-DSuche in Google Scholar

[5] Ricardo V, Baehren T, Boehm B, et al. A research agenda for systems of systems architecting, Incose International Symposium, 2007, 17(1): 1892–1908.10.1002/j.2334-5837.2007.tb02992.xSuche in Google Scholar

[6] Yang K W, Zhao Q S, Tan Y J, et al. System of systems requirements engineering techniques and methods. Beijing: Science Press, 2011.Suche in Google Scholar

[7] Zhao Q S, Yang K W, Chen Y W, et al. System of systems engineering and system of systems modeling. Beijing: National Defense Industry Press, 2013.Suche in Google Scholar

[8] Dou Y J, L L, Zhao Q S. Research on capability requirements generation of Weapon System-of-systems based on CRTAM model. Proceeding of 7th International Conference System of Systeme Engineering, July, Genoa, ITALY, 2012: 185–190.10.1109/SYSoSE.2012.6384168Suche in Google Scholar

[9] Kilicay N, Dagli C H. Methodologies for understanding behavior of system of systems. Proceeding of 7th International Conference System Engineering, April, 2007.10.1109/SYSTEMS.2007.374658Suche in Google Scholar

[10] Cares J R. An information age combat model. Technical Report, Alidade Incorporated, produced for the Director, Net Assessment, Office of the Secretary of Defense under Contract TPD-01-C-0023, 2004.Suche in Google Scholar

[11] Cares J. Distributed networked operations: The foundations of network centric warfare. Alidade Press, Newport, RI, 2005.Suche in Google Scholar

[12] Arquilla J, Karasik T. Chechnya: A Glimpse of Future Conflict? Studies in Conflict and Terrorism, 1999, 22(3): 207–229.10.1080/105761099265739Suche in Google Scholar

[13] Cebrowski A K, Garstka J J. Network-centric warfare: Its origin and future. Proceedings of the U.S. Naval Institute, 1998 124(1): 28–35.Suche in Google Scholar

[14] Li Z H, Liu S, Peng L B. Research on description models of SoS combat efficient based on complex network theory. Proceeding of International Conference on Computer Science and Network Technology, Harbin, China, 2011.Suche in Google Scholar

[15] Washburn A, Kress M. Combat modeling. International Series in Operations Research & Management Science, 2009, 134: 133–160.10.1007/978-1-4419-0790-5Suche in Google Scholar

[16] Ancker C J, Gafarian A V. Modern combat models: A critique of their foundations. INFORMS, Catonsville, 1992.Suche in Google Scholar

[17] Engel J H. A verification of Lanchester’s law. Journal of the Operations Research Society of America, 1954, 2(2): 163–171.10.1287/opre.2.2.163Suche in Google Scholar

[18] Lepingwell J W R. The Laws of Combat?: Lanchester Reexamined. International Security, 1987, 12(1): 89–134.10.2307/2538918Suche in Google Scholar

[19] Bracken J. Lanchester models of the Ardennes campaign. Naval Research Logistics, 1995, 42(4): 559–577.10.1002/1520-6750(199506)42:4<559::AID-NAV3220420405>3.0.CO;2-RSuche in Google Scholar

[20] Lucas T W, Turkes T. Fitting Lanchester models to the battles of Kursk and Ardennes. Naval Research Logistics, 2004, 51(1): 95–116.10.1002/nav.10101Suche in Google Scholar

[21] Koyuncu B, Bostanci E. Using Lanchester combat models to aid battlefield visualization. Proceeding of 2nd International Conference on Computer Science and Information Technology, Beijing, 2009.10.1109/ICCSIT.2009.5234542Suche in Google Scholar

[22] Schramm H C, Gaver D P. Lanchester for cyber: The mixed epidemic-combat model. Naval Research Logistics, 2013, 60(7): 599–605.10.1002/nav.21555Suche in Google Scholar

[23] Howard M, Karlin T S. An introduction to stochastic modeling. 4th Edition. Elsevier, 2010.Suche in Google Scholar

[24] Gilmer J B, Sullivan F J. Assignment of probabilities to events for combat simulation. Proceeding of Winter Simulation Conference, Austin, 2008.10.1109/WSC.2008.4736200Suche in Google Scholar

[25] Khalid A, Bhatti A I, Hafiz R. A low complexity high resolution time-stepped stochastic ground combat simulation model. Proceeding of 7th International Multi Topic Conference, Islamabad, 2003.Suche in Google Scholar

[26] Protopopescu V, Santoro R T, Dockery J. Combat modeling with partial differential equations. European Journal of Operational Research, 1989, 38(2): 178–183.10.1016/0377-2217(89)90102-1Suche in Google Scholar

[27] Poropudas J, Virtanen K. Game-theoretic validation and analysis of air combat simulation models. IEEE Transactions on Systems, Man & Cybernetics — Part A: Systems & Humans, 2010, 40(5): 1057–1070.10.1109/TSMCA.2010.2044997Suche in Google Scholar

[28] Galster S M, Cummings M, Knott B, et al. Collaboration technologies for tactical command & control: Performance, workload, and situation awareness. Proceeding of 2007 International Symposium on Collaborative Technologies and Systems, Orlando, Florida, USA, 2007.10.1109/CTS.2007.4621722Suche in Google Scholar

[29] Liu J Y, Li X L. Application of colored petri net in command and control system. Proceeding of International Conference on Intelligent Human-Machine Systems and CyberneticsHangzhou, Zhejiang, China, 2009.10.1109/IHMSC.2009.89Suche in Google Scholar

[30] Jiang N, Chen X, Hou C, et al. Warfare command decision making analysis of information support based on Lanchester equation. Proceeding of Chinese Control and Decision Conference, Xuzhou, China, 2010.10.1109/CCDC.2010.5498187Suche in Google Scholar

[31] Lee Y, Lee T. Network-based metric for measuring combat effectiveness. Defence Science Journal, 2014, 64(2): 115–122.10.14429/dsj.64.5534Suche in Google Scholar

[32] Monsuur H. Assessing situation awareness in networks of cooperating entities: A mathematical approach. Military Operations Research, 2007, 12(3): 5–15.10.5711/morj.12.3.5Suche in Google Scholar

[33] Rhee S H, Kim H S. Sohn S W. The effect of decentralized resource allocation in network-centric warfare. Proceeding of The International Conference on Information Networking. Bali, Indonesia, 2012.10.1109/ICOIN.2012.6164447Suche in Google Scholar

[34] Butts C T. Revisiting the foundations of network analysis. Science, 2009, 325(5939): 414–416.10.1126/science.1171022Suche in Google Scholar PubMed

[35] Bohannon J. Investigating networks: The dark side. Science, 2009, 325: 410–411.10.1126/science.325_410Suche in Google Scholar PubMed

[36] Li H L, Cao Y Q, Jiang S Q. Research on fundamental properties of C2 system-oriented Complex Network. Proceeding of International Conference on Automatic Control and Artificial Intelligence, China, 2012.Suche in Google Scholar

[37] Qi Y B, Zhong L, Zhang L, et al. Distributed combat system of systems network modeling. Journal of Networks, 2013, 8(8): 1906–1912.10.4304/jnw.8.8.1906-1912Suche in Google Scholar

[38] Liu Y Y, Slotine J J, Barabsi A L. Controllability of complex networks. Nature, 2011, 473: 167–173.10.1038/nature10011Suche in Google Scholar PubMed

[39] Qi Y B, Zhong L, Zhang L, et al. Joint combat system of systems modeling and effectiveness analysis based on complex networks. Advanced Materials Research, 2012, 591: 1589–1592.10.4028/www.scientific.net/AMR.591-593.1589Suche in Google Scholar

[40] Grisogono A, Spaans M. Adaptive use of networks to generate an adaptive task force. Proceeding of 13th International Command and Control Research and Technology Symposium, CCRP Press, 2008.Suche in Google Scholar

[41] Rosseau R, Breton R. The M-OODA: A model incorporating control functions and teamwork in the OODA loop. Proceeding of Comma and control research and technology symposium. San Diego, Calif, 2004.Suche in Google Scholar

[42] Brehmer B. The dynamic OODA loop: Amalgamating boyd’s OODA loop and the cybernetic approach to command and control. Proceeding of 10th International Command & Control Research & Technology Symposium, Herl’any, 2005.Suche in Google Scholar

[43] United States Department of Defense. Integrated Air and Missile Defense Joint Integrating Concept Version 2.3. September 17, 2004.Suche in Google Scholar

Received: 2015-9-1
Accepted: 2015-10-30
Published Online: 2016-6-25

© 2016 Walter de Gruyter GmbH, Berlin/Boston

Heruntergeladen am 7.9.2025 von https://www.degruyterbrill.com/document/doi/10.21078/JSSI-2016-195-17/html
Button zum nach oben scrollen