Efficiency Analysis of Command Networks with Different Cross-Level

Article Preview

Abstract:

With the increasing requirement on flattening the hierarchical structure of the military command networks, this paper studied the efficiency of the cross-level command style which is one of the most way to flatten current structure. We present a cross-level command model based on the tree network. According with it, we focused on two measurements, timeliness and invulnerability, to evaluate the command networks on different cross-level by the simulation experiments. Compared the results under two styles of attack strategies, the random attack and selecting attack, it showed that the new command networks with different cross-level are more efficient.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 1044-1045)

Pages:

1139-1144

Citation:

Online since:

October 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] X. F. Hu, Simulation Analysis and Experiments of War Complex Systems , first ed., National Defense University, Beijing, 2008, pp.223-228.

Google Scholar

[2] A. H. Dekker, Applying social network analysis concepts to military C4ISR architectures, Connections, 3 (2002) 93-103.

Google Scholar

[3] D. Y. Li, X. Z. Wang, G. F. Hu, Network Warfare and Complex Networks , China Military Science, 3 (2006) 111-119.

Google Scholar

[4] W. X. Jin, SoS-Ops M&S Based on the Complex Networks, first ed., Electronic Industry, Beijing, (2010).

Google Scholar

[5] J. Q. Li, G. G. Liu, Q. Huang, et al, Analysis Method and Model of Combat Command Architecture Based on Theory of Complex Networks, Journal of System Simulation, 17 (2008): 4712-4715.

Google Scholar

[6] L. T. Quan, Research On Network Modeling of Combat System Based on Theory of Complex Networks , Xi'an University of Electronic Science and Technology, Xi'an, (2012).

Google Scholar

[7] Y. B. Peng, H. G. Xing, Stability Analysis of Command Network Based on Bypassing Normal Chain of Command, Ship Electronic Engineering, 3 (2014) 100-106.

Google Scholar

[8] Q. John, Operational Flexibility in Complex Enterprises: Case Studies from Recent Military Operations, Massachusetts Institute of Technology, Massachusetts , (2009).

Google Scholar

[9] P. Holme, J. K. Beom, Attack vulnerability of complex networks, P. R. E, 5(2002)21-36.

Google Scholar

[10] J. Wu, S. Y. Tan, Y. J. Tan, Analysis of Invulnerability in Complex Network Based on Natural Connectivity, Complex Systems and Complexity Science, 1 (2014) 77-86.

Google Scholar