Method and Application of Operational Architecture Modeling Based on Information Flow Analysis

Yinghui YANG, Jianhua LI, Qingwei MENG, Mingli NAN

Journal of Systems Science and Information ›› 2016, Vol. 4 ›› Issue (1) : 40-55.

PDF(444 KB)
PDF(444 KB)
Journal of Systems Science and Information ›› 2016, Vol. 4 ›› Issue (1) : 40-55.
Article

Method and Application of Operational Architecture Modeling Based on Information Flow Analysis

  • Yinghui YANG1, Jianhua LI1, Qingwei MENG2
Author information +
History +

Abstract

To strengthen operational process analysis and normalize information requirements description in systemic operations based on information systems, a new operational architecture modeling method is proposed from the perspective of information flow analysis. An operational architecture modeling framework based on information flow analysis is established by referring to American department of defense architecture framework (DoDAF V2.0). Concepts of entities, relationships, attributes and mapping rules are defined. Operational activity model, operational nod model and information alternation model are constructed. Finally, aerial assault operation is taken as an example to demonstrate the modeling process. Simulation results show that operational process analysis is more refined and information requirement descriptions are more visible, normal and clear, which validate the feasibility and validity of the method and models.

Key words

information flow analysis / operations / architecture / modeling / mapping rule

Cite this article

Download Citations
Yinghui YANG, Jianhua LI, Qingwei MENG, Mingli NAN. Method and Application of Operational Architecture Modeling Based on Information Flow Analysis. Journal of Systems Science and Information, 2016, 4(1): 40-55

References

[1] Waters J, Ceruti M G. Modeling and simulation of information flow: A study of infodynamic quantities. The 15th International Command and Control Research and Technology Symposium (ICCRTS 2010), 2010: 178-183.
[2] Dajsuren Y. DAutomotive architecture description and its quality. ESEC/FSE'13, 2013: 727-730.
[3] Suter B W. Wireless computational networking architectures. Rome: Air Force Research Laboratory, 2013.
[4] DoD Acrhitecture Framework Working Group. DoD architecture framework version 2.0. US: Department of Defense, 2009.
[5] UK Ministry of Defense. UK ministry of defense architectural framework (MUUAF) v1.2.004.UK Ministry of Defense, 2010.
[6] Xie W C, Luo X S, Luo A M. Meta-model based modeling of military information system architecture. Journal of National University of Defense Technology, 2012, 34(1): 82-87.
[7] Zhang J Y, Liu J X, Luo X S. System modeling simulation based on architecture analysis. Military Operations Research and System Engineering, 2011, 25(3): 47-51.
[8] Xu B Q, Zhang L C. Muti-dimensional architecture modeling for cyber physical systems. Advances in Computer Science and Its Applications, 2013 (CSA 2013), 2014: 101-105.
[9] Wang B Y, Zhao X Z,Wang J. Optimizing the combat network on the anti-ship of vessel formation. Systems Engineering — Theory & Practice, 2013, 33(9): 2354-2361.
[10] Lewis G. Architecture and design of service-oriented systems: Goals. Pittsburgh: Carnegie Mellon University, 2013.
[11] Kaufmann J R, Hand J R. Integrating renewable engrgy requirements into building energy codes. National Laboratory, 2011.
[12] Yang Y H, Li J H. Campaign information requirement analysis based on architecture modeling. Military Operations Research and System Engineering, 2012, 26(4): 21-24.
[13] Keen T R, Dykes J D. Model verification and validation using graphical information systems tools. Arlington: Naval Research Laboratory, 2013.
[14] Li Z H, Tan X S, Wang H, et al. Data consistency verification of architecture based on DM2. Systems Engineering and Electronics, 2013, 35(2): 357-361.
[15] Jepperson D B. Using model based systems engineering and the systems modeling language to develop space mission area architectures. Monterey: Naval Postgraduate School, 2013.
[16] Alexander M G. Requirement assurance: A verification process. Langley Research Center, Hampton, Virginia, 2011.
[17] Thakor S, Chen T, Grant A. Bounds for network information flow with correlated Sources. The 12th Annual Australian Communications Theory Workshop, 2011: 43-48.

PDF(444 KB)

132

Accesses

0

Citation

Detail

Sections
Recommended

/