Method and Application of Operational Architecture Modeling Based on Information Flow Analysis

Yinghui YANG, Jianhua LI, Qingwei MENG, Mingli NAN

系统科学与信息学报(英文) ›› 2016, Vol. 4 ›› Issue (1) : 40-55.

PDF(444 KB)
PDF(444 KB)
系统科学与信息学报(英文) ›› 2016, Vol. 4 ›› Issue (1) : 40-55.

Method and Application of Operational Architecture Modeling Based on Information Flow Analysis

    Yinghui YANG1, Jianhua LI1, Qingwei MENG2
作者信息 +

Method and Application of Operational Architecture Modeling Based on Information Flow Analysis

    Yinghui YANG1, Jianhua LI1, Qingwei MENG2
Author information +
文章历史 +

摘要

To strengthen operational process analysis and normalize information requirements description in systemic operations based on information systems, a new operational architecture modeling method is proposed from the perspective of information flow analysis. An operational architecture modeling framework based on information flow analysis is established by referring to American department of defense architecture framework (DoDAF V2.0). Concepts of entities, relationships, attributes and mapping rules are defined. Operational activity model, operational nod model and information alternation model are constructed. Finally, aerial assault operation is taken as an example to demonstrate the modeling process. Simulation results show that operational process analysis is more refined and information requirement descriptions are more visible, normal and clear, which validate the feasibility and validity of the method and models.

Abstract

To strengthen operational process analysis and normalize information requirements description in systemic operations based on information systems, a new operational architecture modeling method is proposed from the perspective of information flow analysis. An operational architecture modeling framework based on information flow analysis is established by referring to American department of defense architecture framework (DoDAF V2.0). Concepts of entities, relationships, attributes and mapping rules are defined. Operational activity model, operational nod model and information alternation model are constructed. Finally, aerial assault operation is taken as an example to demonstrate the modeling process. Simulation results show that operational process analysis is more refined and information requirement descriptions are more visible, normal and clear, which validate the feasibility and validity of the method and models.

关键词

information flow analysis / operations / architecture / modeling / mapping rule

Key words

information flow analysis / operations / architecture / modeling / mapping rule

引用本文

导出引用
Yinghui YANG, Jianhua LI, Qingwei MENG, Mingli NAN. Method and Application of Operational Architecture Modeling Based on Information Flow Analysis. 系统科学与信息学报(英文), 2016, 4(1): 40-55
Yinghui YANG, Jianhua LI, Qingwei MENG, Mingli NAN. Method and Application of Operational Architecture Modeling Based on Information Flow Analysis. Journal of Systems Science and Information, 2016, 4(1): 40-55

参考文献

[1] Waters J, Ceruti M G. Modeling and simulation of information flow: A study of infodynamic quantities. The 15th International Command and Control Research and Technology Symposium (ICCRTS 2010), 2010: 178-183.
[2] Dajsuren Y. DAutomotive architecture description and its quality. ESEC/FSE'13, 2013: 727-730.
[3] Suter B W. Wireless computational networking architectures. Rome: Air Force Research Laboratory, 2013.
[4] DoD Acrhitecture Framework Working Group. DoD architecture framework version 2.0. US: Department of Defense, 2009.
[5] UK Ministry of Defense. UK ministry of defense architectural framework (MUUAF) v1.2.004.UK Ministry of Defense, 2010.
[6] Xie W C, Luo X S, Luo A M. Meta-model based modeling of military information system architecture. Journal of National University of Defense Technology, 2012, 34(1): 82-87.
[7] Zhang J Y, Liu J X, Luo X S. System modeling simulation based on architecture analysis. Military Operations Research and System Engineering, 2011, 25(3): 47-51.
[8] Xu B Q, Zhang L C. Muti-dimensional architecture modeling for cyber physical systems. Advances in Computer Science and Its Applications, 2013 (CSA 2013), 2014: 101-105.
[9] Wang B Y, Zhao X Z,Wang J. Optimizing the combat network on the anti-ship of vessel formation. Systems Engineering — Theory & Practice, 2013, 33(9): 2354-2361.
[10] Lewis G. Architecture and design of service-oriented systems: Goals. Pittsburgh: Carnegie Mellon University, 2013.
[11] Kaufmann J R, Hand J R. Integrating renewable engrgy requirements into building energy codes. National Laboratory, 2011.
[12] Yang Y H, Li J H. Campaign information requirement analysis based on architecture modeling. Military Operations Research and System Engineering, 2012, 26(4): 21-24.
[13] Keen T R, Dykes J D. Model verification and validation using graphical information systems tools. Arlington: Naval Research Laboratory, 2013.
[14] Li Z H, Tan X S, Wang H, et al. Data consistency verification of architecture based on DM2. Systems Engineering and Electronics, 2013, 35(2): 357-361.
[15] Jepperson D B. Using model based systems engineering and the systems modeling language to develop space mission area architectures. Monterey: Naval Postgraduate School, 2013.
[16] Alexander M G. Requirement assurance: A verification process. Langley Research Center, Hampton, Virginia, 2011.
[17] Thakor S, Chen T, Grant A. Bounds for network information flow with correlated Sources. The 12th Annual Australian Communications Theory Workshop, 2011: 43-48.

PDF(444 KB)

133

Accesses

0

Citation

Detail

段落导航
相关文章

/