计算机与控制工程 |
|
|
|
|
军事通信网络修复策略 |
陈冠宇1,2( ),孙鹏1,3,*( ),张杰勇1,武君胜4 |
1. 空军工程大学 信息与导航学院,陕西 西安 710077 2. 中国人民解放军95816部队,湖北 广水432700 3. 西北工业大学 计算机学院,陕西 西安 710072 4. 西北工业大学 软件与微电子学院,陕西 西安 710072 |
|
Repair strategy of military communication network |
Guan-yu CHEN1,2( ),Peng SUN1,3,*( ),Jie-yong ZHANG1,Jun-sheng WU4 |
1. College of Information and Navigation, Air Force Engineering University, Xi’an 710077, China 2. Unit 95816 of People’s Liberation Army, Hubei 432700, China 3. Department of Computer Science, Northwestern Polytechnical University, Xi’an 710072, China 4. Department of Software Micro-electronics, Northwestern Polytechnical University, Xi’an 710072, China |
引用本文:
陈冠宇,孙鹏,张杰勇,武君胜. 军事通信网络修复策略[J]. 浙江大学学报(工学版), 2019, 53(8): 1536-1545.
Guan-yu CHEN,Peng SUN,Jie-yong ZHANG,Jun-sheng WU. Repair strategy of military communication network. Journal of ZheJiang University (Engineering Science), 2019, 53(8): 1536-1545.
链接本文:
http://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2019.08.012
或
http://www.zjujournals.com/eng/CN/Y2019/V53/I8/1536
|
1 |
LEVCGHUK G M, YU F L, PATTIPATI K R, et al. From hierarchies to heterarchies: application of network optimization to design of organization structures [C]// Command and Control Research and Technology Symposium. Monterey: Dodccrp, 2003: 1-11.
|
2 |
PARK C, PATTIPATI K R, AN W, et al Quantifying the impact of information and organizational structures via distributed auction algorithm: point-to-point communication structure[J]. IEEE Transactions on Systems, Man, and Cybernetics, 2012, 42 (1): 68- 85
doi: 10.1109/TSMCA.2011.2157139
|
3 |
JIANG Y, WANG Y B. Analysis of attack and defense strategies on complex networks[C]// International Conference on Sensor Network Security Technology and Privacy Communication System. Harbin: IEEE, 2013: 58-62.
|
4 |
TORLEIV M, RANDALL L Network centric military communications[J]. IEEE Communications Magazine, 2006, 46 (11): 36
|
5 |
CHI L P, YANG C B, CAI X Stability of random networks under evolution of attack and repair[J]. Chinese Physics Letters, 2006, 23 (1): 263- 266
doi: 10.1088/0256-307X/23/1/076
|
6 |
缪志敏, 丁力, 赵陆文, 等 基于拓扑信息的网络修复[J]. 计算机工程, 2008, 34 (5): 25- 27 MIAO Zhi-min, DING Li, ZHAO Lu-wen, et al Network restoration based on topological information[J]. Computer Engineering, 2008, 34 (5): 25- 27
doi: 10.3778/j.issn.1002-8331.2008.05.007
|
7 |
胡斌, 黎放 多种攻击策略下无标度网络修复策略[J]. 系统工程与电子技术, 2010, 32 (1): 43- 47 HU Bin, LI Fang Repair strategies of scale-free networks under multifold attack strategies[J]. Systems Engineering and Electronics, 2010, 32 (1): 43- 47
|
8 |
蒋勇, 赵作鹏, 吴荣华 多属性加权模糊贝叶斯的复杂网络故障自修复技术[J]. 计算机应用研究, 2015, 32 (8): 2378- 2381 JIANG Yong, ZHAO Zuo-peng, WU Rong-hua Complex network fault self-repair mechanism with multi-attribute weighted fuzzy Bayesian[J]. Application Research of Computers, 2015, 32 (8): 2378- 2381
doi: 10.3969/j.issn.1001-3695.2015.08.033
|
9 |
王甲生, 吴晓平, 陈泽茂, 等 修复策略下典型拓扑结构复杂网络抗毁性研究[J]. 海军工程大学学报, 2015, 27 (4): 75- 79 WANG Jia-sheng, WU Xiao-ping, CHEN Ze-mao, et al Invulnerability analysis of complex networks with typical topologies by repair strategies[J]. Journal of Naval University of Engineering, 2015, 27 (4): 75- 79
|
10 |
GHOSH A, BOYD A. Growing well-connected graphs [C]// 45th IEEE Conference on Decision and Control. San Diego: IEEE, 2006, 7(14): 593-599.
|
11 |
KIM Y Bisection algorithm of increasing algebraic connectivity by adding an edge[J]. IEEE Transactions on Automatic Control, 2010, 55 (1): 170- 174
doi: 10.1109/TAC.2009.2033763
|
12 |
CHEN P Y, HERO A Assessing and safeguarding network resilience to nodal attacks[J]. Communications Magazine IEEE, 2014, 52 (11): 138- 143
doi: 10.1109/MCOM.2014.6957154
|
13 |
JIANG Z Y, LIANG M G, GUO D C Enhancing network performance by edge addition[J]. International Journal of Modern Physics C, 2011, 22 (11): 1211- 1226
doi: 10.1142/S0129183111016841
|
14 |
CAO X B, HONG C, WU W B, et al Improving the network robustness against cascading failures by adding links[J]. Chaos, Solitons and Fractals, 2013, 57 (4): 35- 40
|
15 |
SHI C, PENG Y, ZHUO Y, et al A new way to improve the robustness of complex communication networks by allocating redundancy links[J]. Physica Scripta, 2012, 85 (3): 035803
doi: 10.1088/0031-8949/85/03/035803
|
16 |
ZHUO Y, PENG Y, LIU C, et al Improving the attack tolerance of scale-free networks by adding and hiding edges[J]. Physica Scripta, 2011, 83 (2): 025801
doi: 10.1088/0031-8949/83/02/025801
|
17 |
ZHAO K, KUMAR A, YEN J Achieving high robustness in supply distribution networks by rewiring[J]. IEEE Transactions on Engineering Management, 2011, 58 (2): 347- 362
doi: 10.1109/TEM.2010.2095503
|
18 |
DENG Y, WU J, TAN Y J Optimal attack strategy of complex networks based on tabu search[J]. Physica A, 2016, 442: 74- 81
doi: 10.1016/j.physa.2015.08.043
|
19 |
谭跃进, 吴俊, 邓宏钟 复杂网络抗毁性研究进展[J]. 上海理工大学学报, 2011, 33 (6): 653- 668 TAN Yue-jin, WU Jun, DENG Hong-zhong Progress in invulnerability of complex networks[J]. Journal of University of Shanghai for Science and Technology, 2011, 33 (6): 653- 668
doi: 10.3969/j.issn.1007-6735.2011.06.022
|
20 |
杨志才, 裘杭萍, 雷智朋, 等 军事通信网抗毁性研究[J]. 军事通信技术, 2014, 35 (1): 31- 36 YANG Zhi-cai, QIU hang-ping, LEI Zhi-peng, et al Survivability studies for military communication network[J]. Journal of Military Communications Technology, 2014, 35 (1): 31- 36
|
21 |
LEVCHUK G M, LEVCHUK Y N, MEIRINA C, et al Normative design of organizations-part III: modeling congruent, robust, and adaptive organizations[J]. IEEE Transactions on Systems, Man, and Cybernetics, 2004, 34 (3): 337- 350
doi: 10.1109/TSMCA.2003.822268
|
22 |
周漩, 杨帆, 张凤鸣, 等 复杂网络系统拓扑连接优化控制方法[J]. 物理学报, 2013, 62 (15): 150201 ZHOU Xuan, YANG Fan, ZHANG Feng-ming, et al Control method for complex network topological connection optimization[J]. Acta Physica Sinica, 2013, 62 (15): 150201
|
23 |
KARABOGA D. An idea based on honey bee swarm for numerical optimization [R]. Kayseri: Erciyes University, 2005.
|
24 |
KARABOGA D, AKAY B. Artificial bee colony algorithm on training artificial neural networks [C]// Signal Processing and Communications Applications. Eskisehir: IEEE, 2007: 1-4.
|
25 |
OZTURK C, KARABOGA D, GORKEMLI B Artificial bee colony algorithm for dynamic deployment of wireless sensor networks[J]. Turkish Journal of Electrical Engineering and Computer Sciences, 2012, 20 (2): 255- 262
|
26 |
ZHONG Y W, LIN J, WANG L J, et al Hybrid discrete artificial bee colony algorithm with threshold acceptance criterion for traveling salesman problem[J]. Information Sciences, 2017, 421: 70- 84
doi: 10.1016/j.ins.2017.08.067
|
27 |
LI X T, MA S J Multiobjective discrete artificial bee colony algorithm for multiobjective permutation flow shop scheduling problem with sequence dependent setup times[J]. IEEE Transactions on Engineering Management, 2017, 64 (2): 149- 165
|
28 |
OZKAN O, TURGAY B, TOLGAN O, et al Optimum assembly sequence planning system using discrete artificial bee colony algorithm[J]. Mathematical Problems in Engineering, 2018, (1): 1- 14
|
29 |
朱冰莲, 朱方方, 苏红宏, 等 基于逻辑运算的离散人工蜂群算法[J]. 电子学报, 2015, 43 (11): 2161- 2166 ZHU Bing-lian, ZHU Fang-fang, SU Hong-hong, et al Discrete artificial bee colony algorithm based on logic operation[J]. Acta Electronic Sinica, 2015, 43 (11): 2161- 2166
doi: 10.3969/j.issn.0372-2112.2015.11.004
|
30 |
孙昱, 姚佩阳, 申健, 等 基于信息流的军事通信网络抗毁性优化设计[J]. 华中科技大学学报: 自然科学版, 2016, 44 (12): 114- 120 SUN Yu, YAO Pei-yang, SHEN Jian, et al Military communication network design for invulnerability optimization based on information flow[J]. Journal of Huazhong University of Science and Technology: Natural Science Edition, 2016, 44 (12): 114- 120
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|