Cutting off or controlling the enemy’s power supply at critical moments or strategic locations may result in a cascade failure, thus gaining an advantage in a war. However, the existing cascading failure modeling analysis of interdependent networks is insufficient for describing the load characteristics and dependencies of subnetworks, and it is difficult to use for modeling and failure analysis of power-combat (P-C) coupling networks. This paper considers the physical characteristics of the two subnetworks and studies the mechanism of fault propagation between subnetworks and across systems. Then the survivability of the coupled network is evaluated. Firstly, an integrated modeling approach for the combat system and power system is predicted based on interdependent network theory. A heterogeneous one-way interdependent network model based on probability dependence is constructed. Secondly, using the operation loop theory, a load-capacity model based on combat-loop betweenness is proposed, and the cascade failure model of the P-C coupling system is investigated from three perspectives: initial capacity, allocation strategy, and failure mechanism. Thirdly, survivability indexes based on load loss rate and network survival rate are proposed. Finally, the P-C coupling system is constructed based on the IEEE 118-bus system to demonstrate the proposed method.
The belief rule-based (BRB) system has been popular in complexity system modeling due to its good interpretability. However, the current mainstream optimization methods of the BRB systems only focus on modeling accuracy but ignore the interpretability. The single-objective optimization strategy has been applied in the interpretability-accuracy trade-off by integrating accuracy and interpretability into an optimization objective. But the integration has a greater impact on optimization results with strong subjectivity. Thus, a multi-objective optimization framework in the modeling of BRB systems with interpretability-accuracy trade-off is proposed in this paper. Firstly, complexity and accuracy are taken as two independent optimization goals, and uniformity as a constraint to give the mathematical description. Secondly, a classical multi-objective optimization algorithm, nondominated sorting genetic algorithm II (NSGA-II), is utilized as an optimization tool to give a set of BRB systems with different accuracy and complexity. Finally, a pipeline leakage detection case is studied to verify the feasibility and effectiveness of the developed multi-objective optimization. The comparison illustrates that the proposed multi-objective optimization framework can effectively avoid the subjectivity of single-objective optimization, and has capability of joint optimizing the structure and parameters of BRB systems with interpretability-accuracy trade-off.
With the popularization of social media, public opinion information on emergencies spreads rapidly on the Internet, the impact of negative public opinions on an event has become more significant. Based on the organizational form of public opinion information, the knowledge graph is used to construct the knowledge base of public opinion risk cases on the emergency network. The emotion recognition model of negative public opinion information based on the bi-directional long short-term memory (BiLSTM) network is studied in the model layer design, and a linear discriminant analysis (LDA) topic extraction method combined with association rules is proposed to extract and mine the semantics of negative public opinion topics to realize further in-depth analysis of information topics. Focusing on public health emergencies, knowledge acquisition and knowledge processing of public opinion information are conducted, and the experimental results show that the knowledge graph framework based on the construction can facilitate in-depth theme evolution analysis of public opinion events, thus demonstrating important research significance for reducing online public opinion risks.
With the rapid development of low-altitude economy and unmanned aerial vehicles (UAVs) deployment technology, aerial-ground collaborative delivery (AGCD) is emerging as a novel mode of last-mile delivery, where the vehicle and its onboard UAVs are utilized efficiently. Vehicles not only provide delivery services to customers but also function as mobile warehouses and launch/recovery platforms for UAVs. This paper addresses the vehicle routing problem with UAVs considering time window and UAV multi-delivery (VRPU-TW&MD). A mixed integer linear programming (MILP) model is developed to minimize delivery costs while incorporating constraints related to UAV energy consumption. Subsequently, a micro-evolution augmented large neighborhood search (MEALNS) algorithm incorporating adaptive large neighborhood search (ALNS) and micro-evolution mechanism is proposed. Numerical experiments demonstrate the effectiveness of both the model and algorithm in solving the VRPU-TW&MD. The impact of key parameters on delivery performance is explored by sensitivity analysis.
When performing tasks, unmanned clusters often face a variety of strategy choices. One of the key issues in unmanned cluster tasks is the method through which to design autonomous collaboration and cooperative evolution mechanisms that allow for unmanned clusters to maximize their overall task effectiveness under the condition of strategic diversity. This paper analyzes these task requirements from three perspectives: the diversity of the decision space, information network construction, and the autonomous collaboration mechanism. Then, this paper proposes a method for solving the problem of strategy selection diversity under two network structures. Next, this paper presents a Moran-rule-based evolution dynamics model for unmanned cluster strategies and a vision-driven-mechanism-based evolution dynamics model for unmanned cluster strategy in the context of strategy selection diversity according to various unmanned cluster application scenarios. Finally, this paper provides a simulation analysis of the effects of relevant parameters such as the payoff factor and cluster size on cooperative evolution in autonomous cluster collaboration for the two types of models. On this basis, this paper presents advice for effectively addressing diverse choices in unmanned cluster tasks, thereby providing decision support for practical applications of unmanned cluster tasks.
Based on the variation of discrete surface, a new grey relational analysis model, called the grey variation relational analysis (GVRA) model, is proposed in this paper. Meanwhile, the proposed model avoids the inconsistent results caused by different construction of discrete surface of panel data or the change in the order of indicators or objects in existing grey relational analysis models. Firstly, the submatrix of the sample matrix is given according to the permutation and combination theory. Secondly, the amplitude of the submatrix is calculated and the variation of discrete surface is obtained. Then, a grey relational coefficient is presented by variation difference, and the GVRA model is established. Furthermore, the properties of the proposed model, such as normality, symmetry, reflexivity, translation invariant, and number multiplication invariant, are also verified. Finally, the proposed model is used to identify the driving factors of haze in the cities along the Yellow River in Shandong Province, China. The result reveals that the proposed model can effectively measure the relationship between panel data.
To solve the problem of multi-platform collaborative use in anti-ship missile (ASM) path planning, this paper proposed multi-operator real-time constraints particle swarm optimization (MRC-PSO) algorithm. MRC-PSO algorithm utilizes a semi-rasterization environment modeling technique and integrates the geometric gradient law of ASMs which distinguishes itself from other collaborative path planning algorithms by fully considering the coupling between collaborative paths. Then, MRC-PSO algorithm conducts chunked stepwise recursive evolution of particles while incorporating circumvent, coordination, and smoothing operators which facilitates local selection optimization of paths, gradually reducing algorithmic space, accelerating convergence, and enhances path cooperativity. Simulation experiments comparing the MRC-PSO algorithm with the PSO algorithm, genetic algorithm and operational area cluster real-time restriction (OACRR)-PSO algorithm, which demonstrate that the MRC-PSO algorithm has a faster convergence speed, and the average number of iterations is reduced by approximately 75%. It also proves that it is equally effective in resolving complex scenarios involving multiple obstacles. Moreover it effectively addresses the problem of path crossing and can better satisfy the requirements of multi-platform collaborative path planning. The experiments are conducted in three collaborative operation modes, namely, three-to-two, three-to-three, and four-to-two, and the outcomes demonstrate that the algorithm possesses strong universality.
Model-based system-of-systems (SOS) engineering (MBSoSE) is becoming a promising solution for the design of SoS with increasing complexity. However, bridging the models from the design phase to the simulation phase poses significant challenges and requires an integrated approach. In this study, a unified requirement modeling approach is proposed based on unified architecture framework (UAF). Theoretical models are proposed which compose formalized descriptions from both top-down and bottom-up perspectives. Based on the description, the UAF profile is proposed to represent the SoS mission and constituent systems (CS) goal. Moreover, the agent-based simulation information is also described based on the overview, design concepts, and details (ODD) protocol as the complement part of the SoS profile, which can be transformed into different simulation platforms based on the eXtensible markup language (XML) technology and model-to-text method. In this way, the design of the SoS is simulated automatically in the early design stage. Finally, the method is implemented and an example is given to illustrate the whole process.
Delay aware routing is now widely used to provide efficient network transmission. However, for newly developing or developed mobile communication networks (MCN), only limited delay data can be obtained. In such a network, the delay is with epistemic uncertainty, which makes the traditional routing scheme based on deterministic theory or probability theory not applicable. Motivated by this problem, the MCN with epistemic uncertainty is first summarized as a dynamic uncertain network based on uncertainty theory, which is widely applied to model epistemic uncertainties. Then by modeling the uncertain end-to-end delay, a new delay bounded routing scheme is proposed to find the path with the maximum belief degree that satisfies the delay threshold for the dynamic uncertain network. Finally, a low-Earth-orbit satellite communication network (LEO-SCN) is used as a case to verify the effectiveness of our routing scheme. It is first modeled as a dynamic uncertain network, and then the delay bounded paths with the maximum belief degree are computed and compared under different delay thresholds.
Architecture framework has become an effective method recently to describe the system of systems (SoS) architecture, such as the United States (US) Department of Defense Architecture Framework Version 2.0 (DoDAF2.0). As a viewpoint in DoDAF2.0, the operational viewpoint (OV) describes operational activities, nodes, and resource flows. The OV models are important for SoS architecture development. However, as the SoS complexity increases, constructing OV models with traditional methods exposes shortcomings, such as inefficient data collection and low modeling standards. Therefore, we propose an intelligent modeling method for five OV models, including operational resource flow OV-2, organizational relationships OV-4, operational activity hierarchy OV-5a, operational activities model OV-5b, and operational activity sequences OV-6c. The main idea of the method is to extract OV architecture data from text and generate interoperable OV models. First, we construct the OV meta model based on the DoDAF2.0 meta model (DM2). Second, OV architecture named entities is recognized from text based on the bidirectional long short-term memory and conditional random field (BiLSTM-CRF) model. And OV architecture relationships are collected with relationship extraction rules. Finally, we define the generation rules for OV models and develop an OV modeling tool. We use unmanned surface vehicles (USV) swarm target defense SoS architecture as a case to verify the feasibility and effectiveness of the intelligent modeling method.
A task allocation problem for the heterogeneous unmanned aerial vehicle (UAV) swarm in unknown environments is studied in this paper. Considering that the actual mission environment information may be unknown, the UAV swarm needs to detect the environment first and then attack the detected targets. The heterogeneity of UAVs, multiple types of tasks, and the dynamic nature of task environment lead to uneven load and time sequence problems. This paper proposes an improved contract net protocol (CNP) based task allocation scheme, which effectively balances the load of UAVs and improves the task efficiency. Firstly, two types of task models are established, including regional reconnaissance tasks and target attack tasks. Secondly, for regional reconnaissance tasks, an improved CNP algorithm using the uncertain contract is developed. Through uncertain contracts, the area size of the regional reconnaissance task is determined adaptively after this task assignment, which can improve reconnaissance efficiency and resource utilization. Thirdly, for target attack tasks, an improved CNP algorithm using the fuzzy integrated evaluation and the double-layer negotiation is presented to enhance collaborative attack efficiency through adjusting the assignment sequence adaptively and multi-layer allocation. Finally, the effectiveness and advantages of the improved method are verified through comparison simulations.
Beyond-visual-range (BVR) air combat threat assessment has attracted wide attention as the support of situation awareness and autonomous decision-making. However, the traditional threat assessment method is flawed in its failure to consider the intention and event of the target, resulting in inaccurate assessment results. In view of this, an integrated threat assessment method is proposed to address the existing problems, such as overly subjective determination of index weight and imbalance of situation. The process and characteristics of BVR air combat are analyzed to establish a threat assessment model in terms of target intention, event, situation, and capability. On this basis, a distributed weight-solving algorithm is proposed to determine index and attribute weight respectively. Then, variable weight and game theory are introduced to effectively deal with the situation imbalance and achieve the combination of subjective and objective. The performance of the model and algorithm is evaluated through multiple simulation experiments. The assessment results demonstrate the accuracy of the proposed method in BVR air combat, indicating its potential practical significance in real air combat scenarios.
The rapid evolution of unmanned aerial vehicle (UAV) technology and autonomous capabilities has positioned UAV as promising last-mile delivery means. Vehicle and onboard UAV collaborative delivery is introduced as a novel delivery mode. Spatiotemporal collaboration, along with energy consumption with payload and wind conditions play important roles in delivery route planning. This paper introduces the traveling salesman problem with time window and onboard UAV (TSP-TWOUAV) and emphasizes the consideration of real-world scenarios, focusing on time collaboration and energy consumption with wind and payload. To address this, a mixed integer linear programming (MILP) model is formulated to minimize the energy consumption costs of vehicle and UAV. Furthermore, an adaptive large neighborhood search (ALNS) algorithm is applied to identify high-quality solutions efficiently. The effectiveness of the proposed model and algorithm is validated through numerical tests on real geographic instances and sensitivity analysis of key parameters is conducted.
This paper investigates the selective maintenance of systems that perform multi-mission in succession. Selective maintenance is performed on systems with limited break time to improve the success of the next mission. In general, the duration of the mission is stochastic. However, existing studies rarely take into account system availability and the repairpersons with different skill levels. To solve this problem, a new multi-mission selective maintenance and repairpersons assignment model with stochastic duration of the mission are developed. To maximize the minimum phase-mission reliability while meeting the minimum system availability, the model is transformed into an optimization problem subject to limited maintenance resources. The optimization is then realized using an analytical method based on a self-programming function and a Monte Carlo simulation method, respectively. Finally, the validity of the model and solution method approaches are verified by numerical arithmetic examples. Comparative and sensitivity analyses are made to provide proven recommendations for decision-makers.
Dempster-Shafer evidence theory is broadly employed in the research of multi-source information fusion. Nevertheless, when fusing highly conflicting evidence it may produce counterintuitive outcomes. To address this issue, a fusion approach based on a newly defined belief exponential divergence and Deng entropy is proposed. First, a belief exponential divergence is proposed as the conflict measurement between evidences. Then, the credibility of each evidence is calculated. Afterwards, the Deng entropy is used to calculate information volume to determine the uncertainty of evidence. Then, the weight of evidence is calculated by integrating the credibility and uncertainty of each evidence. Ultimately, initial evidences are amended and fused using Dempster’s rule of combination. The effectiveness of this approach in addressing the fusion of three typical conflict paradoxes is demonstrated by arithmetic examples. Additionally, the proposed approach is applied to aerial target recognition and iris dataset-based classification to validate its efficacy. Results indicate that the proposed approach can enhance the accuracy of target recognition and effectively address the issue of fusing conflicting evidences.
In order to solve the problem of uncertainty and fuzzy information in the process of weapon equipment system selection, a multi-attribute decision-making (MADM) method based on probabilistic hesitant fuzzy set (PHFS) is proposed. Firstly, we introduce the concept of probability and fuzzy entropy to measure the ambiguity, hesitation and uncertainty of probabilistic hesitant fuzzy elements (PHFEs). Sequentially, the expert trust network is constructed, and the importance of each expert in the network can be obtained by calculating the cumulative trust value under multiple trust propagation paths, so as to obtain the expert weight vector. Finally, we put forward an MADM method combining the probabilistic hesitant fuzzy entropy and grey relation analysis (GRA) model, and an illustrative case is employed to prove the feasibility and effectiveness of the method when solving the weapon system selection decision-making problem.
Aiming at the characteristics of multi-stage and (extremely) small samples of the identification problem of key effectiveness indexes of weapon equipment system-of-systems (WESoS), a Bayesian intelligent identification and inference model for system effectiveness assessment indexes based on dynamic grey incidence is proposed. The method uses multilayer Bayesian techniques, makes full use of historical statistics and empirical information, and determines the Bayesian estimation of the incidence degree of indexes, which effectively solves the difficulties of small sample size of effectiveness indexes and difficulty in obtaining incidence rules between indexes. Secondly, The method quantifies the incidence relationship between evaluation indexes and combat effectiveness based on Bayesian posterior grey incidence, and then identifies key system effectiveness evaluation indexes. Finally, the proposed method is applied to a case of screening key effectiveness indexes of a missile defensive system, and the analysis results show that the proposed method can fuse multi-moment information and extract multi-stage key indexes, and has good data extraction capability in the case of small samples.
Failure mode and effect analysis (FMEA) is a preventative risk evaluation method used to evaluate and eliminate failure modes within a system. However, the traditional FMEA method exhibits many deficiencies that pose challenges in practical applications. To improve the conventional FMEA, many modified FMEA models have been suggested. However, the majority of them inadequately address consensus issues and focus on achieving a complete ranking of failure modes. In this research, we propose a new FMEA approach that integrates a two-stage consensus reaching model and a density peak clustering algorithm for the assessment and clustering of failure modes. Firstly, we employ the interval 2-tuple linguistic variables (I2TLVs) to express the uncertain risk evaluations provided by FMEA experts. Then, a two-stage consensus reaching model is adopted to enable FMEA experts to reach a consensus. Next, failure modes are categorized into several risk clusters using a density peak clustering algorithm. Finally, the proposed FMEA is illustrated by a case study of load-bearing guidance devices of subway systems. The results show that the proposed FMEA model can more easily to describe the uncertain risk information of failure modes by using the I2TLVs; the introduction of an endogenous feedback mechanism and an exogenous feedback mechanism can accelerate the process of consensus reaching; and the density peak clustering of failure modes successfully improves the practical applicability of FMEA.
Cascading failures in infrastructure networks have serious impacts on network function. The limited capacity of network nodes provides a necessary condition for cascade failure. However, the network capacity cannot be infinite in the real network system. Therefore, how to reasonably allocate the limited capacity resources is of great significance. In this article, we put forward a capacity allocation strategy based on community structure against cascading failure. Experimental results indicate that the proposed method can reduce the scale of cascade failures with higher capacity utilization compared with Motter-Lai (ML) model. The advantage of our method is more obvious in scale-free network. Furthermore, the experiment shows that the cascade effect is more obvious when the vertex load is randomly varying. It is known to all that the growth of network capacity can make the network more resistant to destruction, but in this paper it is found that the contribution rate of unit capacity rises first and then decreases with the growth of network capacity cost.
Future unmanned battles desperately require intelligent combat policies, and multi-agent reinforcement learning offers a promising solution. However, due to the complexity of combat operations and large size of the combat group, this task suffers from credit assignment problem more than other reinforcement learning tasks. This study uses reward shaping to relieve the credit assignment problem and improve policy training for the new generation of large-scale unmanned combat operations. We first prove that multiple reward shaping functions would not change the Nash Equilibrium in stochastic games, providing theoretical support for their use. According to the characteristics of combat operations, we propose tactical reward shaping (TRS) that comprises maneuver shaping advice and threat assessment-based attack shaping advice. Then, we investigate the effects of different types and combinations of shaping advice on combat policies through experiments. The results show that TRS improves both the efficiency and attack accuracy of combat policies, with the combination of maneuver reward shaping advice and ally-focused attack shaping advice achieving the best performance compared with that of the baseline strategy.
Blockchain technology has attracted worldwide attention, and has strong application potential in complex product system supply chain and other fields. This paper focuses on the supply chain management issues of complex product systems, and combines the technical characteristics of blockchain, such as tamper resistance and strong resistance to destruction, to conduct research on the application of blockchain based supply chain management for complex product systems. The blockchain technology is integrated into functional modules such as business interaction, privacy protection, data storage, and system services. The application technology architecture of complex product system supply chain integrated with blockchain is constructed. The application practice in complex product system supply chain is carried out. The results show that the supply chain of complex product systems has the functions of traceability, cost reduction, and anti-counterfeiting protection. Finally, the future development direction and research focus of the complex product system supply chain based on blockchain are prospected, which provides a reference for the equipment manufacturing supply chain management in the military industry.
A framework that integrates planning, monitoring and replanning techniques is proposed. It can devise the best solution based on the current state according to specific objectives and properly deal with the influence of abnormity on the plan execution. The framework consists of three parts: the hierarchical task network (HTN) planner based on Monte Carlo tree search (MCTS), hybrid plan monitoring based on forward and backward and norm-based replanning method selection. The HTN planner based on MCTS selects the optimal method for HTN compound task through pre-exploration. Based on specific objectives, it can identify the best solution to the current problem. The hybrid plan monitoring has the capability to detect the influence of abnormity on the effect of an executed action and the premise of an unexecuted action, thus trigger the replanning. The norm-based replanning selection method can measure the difference between the expected state and the actual state, and then select the best replanning algorithm. The experimental results reveal that our method can effectively deal with the influence of abnormity on the implementation of the plan and achieve the target task in an optimal way.
In the aircraft control system, sensor networks are used to sample the attitude and environmental data. As a result of the external and internal factors (e.g., environmental and task complexity, inaccurate sensing and complex structure), the aircraft control system contains several uncertainties, such as imprecision, incompleteness, redundancy and randomness. The information fusion technology is usually used to solve the uncertainty issue, thus improving the sampled data reliability, which can further effectively increase the performance of the fault diagnosis decision-making in the aircraft control system. In this work, we first analyze the uncertainties in the aircraft control system, and also compare different uncertainty quantitative methods. Since the information fusion can eliminate the effects of the uncertainties, it is widely used in the fault diagnosis. Thus, this paper summarizes the recent work in this aera. Furthermore, we analyze the application of information fusion methods in the fault diagnosis of the aircraft control system. Finally, this work identifies existing problems in the use of information fusion for diagnosis and outlines future trends.
A new approach is proposed in this study for accountable capability improvement based on interpretable capability evaluation using the belief rule base (BRB). Firstly, a capability evaluation model is constructed and optimized. Then, the key sub-capabilities are identified by quantitatively calculating the contributions made by each sub-capability to the overall capability. Finally, the overall capability is improved by optimizing the identified key sub-capabilities. The theoretical contributions of the proposed approach are as follows. (i) An interpretable capability evaluation model is constructed by employing BRB which can provide complete access to decision-makers. (ii) Key sub-capabilities are identified according to the quantitative contribution analysis results. (iii) Accountable capability improvement is carried out by only optimizing the identified key sub-capabilities. Case study results show that “Surveillance”, “Positioning”, and “Identification” are identified as key sub-capabilities with a summed contribution of 75.55% in an analytical and deducible fashion based on the interpretable capability evaluation model. As a result, the overall capability is improved by optimizing only the identified key sub-capabilities. The overall capability can be greatly improved from 59.20% to 81.80% with a minimum cost of 397. Furthermore, this paper also investigates how optimizing the BRB with more collected data would affect the evaluation results: only optimizing “Surveillance” and “Positioning” can also improve the overall capability to 81.34% with a cost of 370, which thus validates the efficiency of the proposed approach.
Discrete event system (DES) models promote system engineering, including system design, verification, and assessment. The advancement in manufacturing technology has endowed us to fabricate complex industrial systems. Consequently, the adoption of advanced modeling methodologies adept at handling complexity and scalability is imperative. Moreover, industrial systems are no longer quiescent, thus the intelligent operations of the systems should be dynamically specified in the model. In this paper, the composition of the subsystem behaviors is studied to generate the complexity and scalability of the global system model, and a Boolean semantic specifying algorithm is proposed for generating dynamic intelligent operations in the model. In traditional modeling approaches, the change or addition of specifications always necessitates the complete resubmission of the system model, a resource-consuming and error-prone process. Compared with traditional approaches, our approach has three remarkable advantages: (i) an established Boolean semantic can be fitful for all kinds of systems; (ii) there is no need to resubmit the system model whenever there is a change or addition of the operations; (iii) multiple specifying tasks can be easily achieved by continuously adding a new semantic. Thus, this general modeling approach has wide potential for future complex and intelligent industrial systems.
Remote sensing data plays an important role in natural disaster management. However, with the increase of the variety and quantity of remote sensors, the problem of “knowledge barriers” arises when data users in disaster field retrieve remote sensing data. To improve this problem, this paper proposes an ontology and rule based retrieval (ORR) method to retrieve disaster remote sensing data, and this method introduces ontology technology to express earthquake disaster and remote sensing knowledge, on this basis, and realizes the task suitability reasoning of earthquake disaster remote sensing data, mining the semantic relationship between remote sensing metadata and disasters. The prototype system is built according to the ORR method, which is compared with the traditional method, using the ORR method to retrieve disaster remote sensing data can reduce the knowledge requirements of data users in the retrieval process and improve data retrieval efficiency.
To address the current problems of poor generality, low real-time, and imperfect information transmission of the battlefield target intelligence system, this paper studies the battlefield target intelligence system from the top-level perspective of multi-service joint warfare. First, an overall planning and analysis method of architecture modeling is proposed with the idea of a bionic analogy for battlefield target intelligence system architecture modeling, which reduces the difficulty of the planning and design process. The method introduces the Department of Defense architecture framework (DoDAF) modeling method, the multi-living agent (MLA) theory modeling method, and other combinations for planning and modeling. A set of rapid planning methods that can be applied to model the architecture of various types of complex systems is formed. Further, the liveness analysis of the battlefield target intelligence system is carried out, and the problems of the existing system are presented from several aspects. And the technical prediction of the development and construction is given, which provides directional ideas for the subsequent research and development of the battlefield target intelligence system. In the end, the proposed architecture model of the battlefield target intelligence system is simulated and verified by applying the colored Petri nets (CPN) simulation software. The analysis demonstrates the reasonable integrity of its logic.
With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology, the new cloud manufacturing system (NCMS) built on the connotation of cloud manufacturing 3.0 presents a new business model of “Internet of everything, intelligent leading, data driving, shared services, cross-border integration, and universal innovation”. The network boundaries are becoming increasingly blurred, NCMS is facing security risks such as equipment unauthorized use, account theft, static and extensive access control policies, unauthorized access, supply chain attacks, sensitive data leaks, and industrial control vulnerability attacks. Traditional security architectures mainly use information security technology, which cannot meet the active security protection requirements of NCMS. In order to solve the above problems, this paper proposes an integrated cloud-edge-terminal security system architecture of NCMS. It adopts the zero trust concept and effectively integrates multiple security capabilities such as network, equipment, cloud computing environment, application, identity, and data. It adopts a new access control mode of “continuous verification + dynamic authorization”, classified access control mechanisms such as attribute-based access control, role-based access control, policy-based access control, and a new data security protection system based on blockchain, achieving “trustworthy subject identity, controllable access behavior, and effective protection of subject and object resources”. This architecture provides an active security protection method for NCMS in the digital transformation of large enterprises, and can effectively enhance network security protection capabilities and cope with increasingly severe network security situations.
With the continuous development of network functions virtualization (NFV) and software-defined networking (SDN) technologies and the explosive growth of network traffic, the requirement for computing resources in the network has risen sharply. Due to the high cost of edge computing resources, coordinating the cloud and edge computing resources to improve the utilization efficiency of edge computing resources is still a considerable challenge. In this paper, we focus on optimizing the placement of network services in cloud-edge environments to maximize the efficiency. It is first proved that, in cloud-edge environments, placing one service function chain (SFC) integrally in the cloud or at the edge can improve the utilization efficiency of edge resources. Then a virtual network function (VNF) performance-resource (P-R) function is proposed to represent the relationship between the VNF instance computing performance and the allocated computing resource. To select the SFCs that are most suitable to deploy at the edge, a VNF placement and resource allocation model is built to configure each VNF with its particular P-R function. Moreover, a heuristic recursive algorithm is designed called the recursive algorithm for max edge throughput (RMET) to solve the model. Through simulations on two scenarios, it is verified that RMET can improve the utilization efficiency of edge computing resources.
To maintain the stability of the inter-satellite link for gravitational wave detection, an intelligent learning monitoring and fast warning method of the inter-satellite link control system failure is proposed. Different from the traditional fault diagnosis optimization algorithms, the fault intelligent learning method proposed in this paper is able to quickly identify the faults of inter-satellite link control system despite the existence of strong coupling nonlinearity. By constructing a two-layer learning network, the method enables efficient joint diagnosis of fault areas and fault parameters. The simulation results show that the average identification time of the system fault area and fault parameters is 0.27 s, and the fault diagnosis efficiency is improved by 99.8% compared with the traditional algorithm.