Send Orders for Reprints to [email protected] 422 The Open Cybernetics & Systemics Journal, 2015, 9, 422-427 Open Access Evolutionary Model of Equipment Maintenance Support Force Networks with Partial Information Lu Yu1, Han Zhen2,*, Gu Ping2 and Chen Liyun1 1 Department of Information Engineering, Mechanical Engineering College, Shijiazhuang, Hebei, 050003, P.R. China; Department of Equipment Command and Management, Mechanical Engineering College, Shijiazhuang, Hebei, 050003, P.R. China 2 Abstract: The paper draws on the theory of complex networks, puts forward an evolutionary model to solve the evolutionary problem of equipment maintenance support force systems, whose partial information are only known in the reality. Firstly, we abstract equipment maintenance support force systems into complex networks, and then define six network parameters. Secondly, we describe the network evolutionary steps. Finally, a dynamic evolutionary model whose parameters can be flexibly set, is used as the test object. We discuss various network parameters under three kinds of selection probability. The parameter values demonstrate the feasibility of the evolutionary model, and illustrate the model can provide auxiliary decision for commanders to develop support programs in the pre-war. Keywords: Complex networks, equipment maintenance support force, evolutionary model and partial information. 1. INTRODUCTION In the information battlefield, equipment maintenance support tasks and support conditions are uncertain and changeable [1], which bring high uncertainty for support activities. At the same time, with the emergence of perception and response support theory, the timeliness, adaptability, distribution and synergy of equipment maintenance support are facing new challenges [2]. These objectively require the transition from the equipment maintenance support force systems to complex networks. At present, the complex networks’ theory has widely used in the industrial production systems, national power systems, urban transport systems and community management systems, etc [3-7]. With the development of science and technology, its advantages will become increasingly apparent. In wartime, the partial information of our equipment maintenance support force systems are often grasped by the enemy [8]. At the same time, their evolutionary problems have not been studied yet from the perspective of complex networks. Therefore, the paper introduces the theory of complex networks and builds the evolutionary model of equipment maintenance support force networks with partial information. structures, maintenance materials, and so on. They are constructed in accordance with the principles of comprehensive and integrated structure, interrelated function and complementary performance. It can be considered as an organic whole, which is composed of the maintenance entities, such as maintenance units, and the relationships between maintenance entities together. Therefore, there are many similarities between equipment maintenance support force systems and complex networks, such as many entities, complex relationships and evolutionary function, etc. The complex networks’ theory is introduced to equipment maintenance support force systems in the paper, revealing their evolution characteristics in wartime and providing auxiliary decision for commanders to develop support programs in the pre-war. According to the description of complex networks, we abstract the maintenance entities into nodes, the relationships between these entities into edges. Which constitute equipment maintenance support force networks. At the same time, because of the warfare demands of interconnection, interoperability (non-directional edges) and quick action (time restriction of the edges), the paper focuses on the nondirectional and weighted complex networks. 3. THE DEFINITION OF NETWORK PARAMETER Degree distribution 2. SIMILARITY ANALYSIS Equipment maintenance support force systems are composed of maintenance units, maintenance command The node degree k(i) is the number of nodes that directly connect node i. The degree distribution reflects the probability distribution of all the node degree in the network. Center degree and node capability The center degree characterizes the degree of each node from the network center. The center degree h(i) is [9]: 1874-110X/15 2015 Bentham Open Evolutionary Model of Equipment Maintenance Support Force Networks h(i) = k(i) N 1 (1) The k(i) represents the degree of node i, and N-1 represents the maximum possible number of neighbour nodes of node i. The center degree can not characterize the capability of node i [2]. So the capability weight (i) is introduced to characterize node capability. Average time of network path The time weight wij characterizes the shortest distance between node i and j. The average time of network path is the average value of shortest distance between any two nodes. The average time dijw is: dijw = 2 w N (N 1) i, j N ,i j ij (2) Network clustering coefficient The node i have k(i) edges that connect other nodes. Actually the number of interconnected edges between the k(i) nodes is Ei. The clustering coefficient of node i can define ci [10] ci = 2Ei k(i)[k(i) 1] (3) The clustering coefficient of the entire network is: C= 1 c N i i (4) The clustering coefficient reflects the link degree between neighbour nodes. The ratio of the number of nodes in the network giant component The network giant component is a local area that contains most of the nodes. The ratio of the number of nodes in a network giant component is the ratio of the number of nodes between a period of time after and before in the giant component, which reflects the continued capability to maintain network connectivity. The ratio R1 is: m n The Open Cybernetics & Systemics Journal, 2015, Volume 9 N N d 2 = h(i)d3 = μ (i) i=1 i=1 N h(i) h(i) log 2 d d2 i=1 2 r1 = 1 log 2 d2 N μ (i) μ (i) log 2 d d3 r2 = 1 i=1 3 log 2 d3 R2 = r1 r2 423 (6) The quality performance indicates the flow accuracy degree of material, information and energy among the nodes. At the same time, it reflects network performance from the perspective of the accuracy of network operation. 4. NETWORK EVOLUTIONARY MODEL UNDER PARTIAL INFORMATION Network evolutionary model has four main forms, such as nodes increase or decrease, and edges increase or decrease. At present, many literatures have done a lot of studies about the evolution of complex networks [11-13], which mainly include network evolutionary model under deliberate and random attacks. Deliberate attack is an attack mode in which enemy grasps all the information of our troops. Random attack is an attack mode in which enemy does not grasp our information. Deliberate and random attacks are two attack modes in extreme situation. In reality battlefield, most ways of attacks are to take the attack mode of partial information grasped by the enemy [14, 15]. Suppose our equipment maintenance support force networks have N nodes, the probability of information to be grasped by the enemy is a (0a). The a=0 is that enemy can not obtain information, and then enemy takes random attack. The a=1 is that enemy obtains all the information. Enemy takes deliberate attack at this case. The most is the a(0,1) At this point, the networks divide into a known area (0, a]that enemy selectively attacks the area based on the importance of nodes, and an unknown area (a, 1) that enemy randomly attacks the area. Which are the attack modes under partial information. The denominator is the number of the nodes of m giant components before a period of time, and the molecule is the number of the nodes of m giant components after a period of time. In information warfare, in addition to the two sides of the contest against each other in combat units, more are to destroy each other’s logistical support networks. Equipment maintenance support force networks are a part of the logistical support networks. So they are the objects which enemy focuses on the fight against. In wartime they are attacked that lead to the reduction of nodes and edges. At the same time, they obtain external support which lead to the increase of nodes and edges. The ratio reflects network performance from the perspective of the number of nodes in the local area. Enemy gets our partial information, and performs the following evolutionary steps: R1 = ' i i=1 m n (5) i i=1 Network quality performance According to the theory of entropy and the particular operation of equipment maintenance support force networks, network quality performance R2 can be defined as follows: Step 1 The initial networks are the non-directional and weighted networks which has m0 nodes and e0 edges. Step 2 Enemy attacks firstly the networks’ known area. At each time step equal, the networks perform the following 424 The Open Cybernetics & Systemics Journal, 2015, Volume 9 Yu et al. one of four different conditions in accordance with a certain probability. Case 1 According to the information obtained, enemy selectively attacks the networks, disconnect ma edges. The disconnect probability q1 is: Case 2 The ngnodes are deleted with probability p2. The networks disconnect mh edges that connect ng nodes. The probability p2 is: p2 = k(i) q1 = N (7) wij The k(i) is the degree of node i, and wij is path time between node i and j. Case 2 Support functions of nb nodes are disabled with probability q2. The networks disconnect mc edges that connect nb nodes. The probability q2 is: h(i) μ (i) The denominator is the total number of network nodes at time t. Case 3 The nr nodes vj(j=1,2,…,r) are increased with probability p3. The newly added nodes are arranged in the specified area, and given appropriate node capability weight (j)(j=1,2,…,r). The ms edges are established between each new node vj and existing node vi. The probability p3 is: p3 = The h(i) is center degree of node i, and (i) is capability weight of node i. Case 3 Support institutions increase nd nodes vj(j=1,2,…,d) for the established networks with probability q3. The newly added nodes are arranged in the specified area, and given appropriate maintenance capability weight(j)(j=1,2,…,d). The me edges are established between each new node vj and existing node vi. The probability q3 is: h(i) μ (i) / wij N {h(i) μ(i) / w } (9) μ (i) N k (i)μ (i) (13) t (8) N h(i) μ(i) i=1 q3 = (12) i=1 k(i) i=1 j=1 q2 = k (i) t wij N 1 N i=1 Case 4 The established networks increase mu new edge with probability p4. The probability p4 is: p4 = ht (i) N e (i)h (i) t (14) t i=1 5. SIMULATION EXAMPLE We take firstly a traditional equipment maintenance support force network as an example, followed by the calculation of evolutionary parameters. Secondly, we set a dynamic network that is used as the network with partial information. Finally, we simulate its evolutionary parameters. ij i=1 Case 4 The established networks increase mf new edges. One end of new edge randomly connects one node, and the other end connects another node with probability q4. The probability q4 is: q4 = k(i) N k(i) (10) i=1 Step 3 Secondly, enemy attacks the unknown area. At each time step equal, the networks perform the following one of four different conditions in accordance with a certain probability. Case 1 The mkedges are deleted with probability p1. The probability p1 is: p1 = 1 N e (i) (11) t i=1 The denominator is the number of network edges at time t. 0. 18 0. 17 0. 18 0. 2 0. 2 0. 21 0. 15 0 . 2 0. 16 0. 17 0. 17 0. 18 0. 52 0. 18 0. 19 0. 15 0. 2 0. 5 0. 2 0. 47 0. 16 0. 39 0. 48 0. 16 0. 19 0. 41 0. 44 0. 22 0. 15 0. 43 0. 75 0. 47 0. 2 0. 2 0. 72 0. 17 0. 17 0. 76 0. 35 0. 0. 22 0. 38 0. 17 0. 65 8 0. 4 0. 17 0. 0 . 41 0. 16 0. 19 0. 7 0. 45 9 0. 85 0. 16 0. 13 0. 73 0. 44 0. 17 0. 75 0. 14 0. 5 0. 18 0. 48 0. 8 0. 76 0. 18 0. 45 0. 17 0. 16 0. 48 0. 4 0. 23 0. 2 0. 39 0. 2 0 . 46 0. 43 0. 51 0. 17 0. 19 0. 18 0. 22 0. 19 0. 17 0. 2 0. 21 0. 2 0. 21 0. 2 0. 2 0. 19 0. 2 0. 2 Fig. (1). The network topology. As shown in Fig. (1), we abstract the maintenance entities into nodes, the relationships among maintenance entities into edges, the sizes of nodes reflect the capability of the entities, the value on an edge reflects the path time between Evolutionary Model of Equipment Maintenance Support Force Networks Table 1. The Open Cybernetics & Systemics Journal, 2015, Volume 9 Evolutionary parameters of the traditional network. Number of Nodes Number of Edges Average Time of Network Path Network Clustering Coefficient Network Quality Performance 94 93 0.5474 0 0.108 Table 2. 425 Values of selection probability and evolutionary values of edges and nodes. Unknown area under random attack Selection Probability Evolutionary Values reducing edges q1 = 0.6 ~ 0.8 ma = 5 reducing nodes q 2 = 0.4 ~ 0.5 nb = 2 mc = 5 increasing nodes q3 = 0.1 ~ 0.4 nd = 1 me = 4 increasing edges q 4 = 0.4 ~ 0.6 mf = 3 reducing edges p1 = 0.2 ~ 0.3 mk = 3 reducing nodes p 2 = 0.1 ~ 0.15 ng = 1 mh = 4 increasing nodes p3 = 0.1 ~ 0.2 nr = 2 ms = 7 increasing edges p 4 = 0.2 ~ 0.3 mu = 9 Distribution Probability of Node Degree Known area under deliberate attack Evolution 0. 2 0. 19 0. 18 0. 17 0. 16 0. 15 0. 14 0. 13 0. 12 0. 11 0. 1 0. 09 0. 08 0. 07 0. 06 0. 05 0. 04 0. 03 0. 02 0. 01 0 P(k)[q1=0.6,q2=0.4,q3=0.1,q4=0.4, p1=0.2,p2=0.1,p3=0.1,p4=0.2] P(k)[q1=0.7,q2=0.4,q3=0.2,q4=0.5, p1=0.2,p2=0.1,p3=0.2,p4=0.3] P(k)[q1=0.8,q2=0.5,q3=0.4,q4=0.6, p1=0.3,p2=0.15,p3=0.2,p4=0.3] k^-2.3 0 20 40 60 Node Degree 80 100 Fig. (2). Degree distribution statistics of the network. two nodes, which constitute an equipment maintenance support force network. According to the above definition of network parameters, we use Lingo software to calculate the parameters. The results are shown in Table 1. Enemy takes deliberate attacks against the known area. The network has a certain capability to defend and camouflage, so the probability of being attacked will not be 100%. Enemy takes random attacks against the unknown area. Because of the commander’s capability and high-performance weapon, the probability of being attacked is not too low. Considering the above situations, the paper set the values of selection probability and evolutionary values of edges and nodes, which are shown in Table 2. Assuming the simulation time is 100 steps. In order to eliminate the influence of random factors in the simulation, we have carried out 10 separate simulations for each simulation, and then these results are the average. 6. THE ANALYSIS OF SIMULATION RESULTS Degree distribution is statistical at the end of the simulation, the results are shown in Fig. (2). These results are close to the curve P(k)=k-a(a=2.3) under three kinds of selection probability. Therefore, degree distribution of the network follows a a2.3 power-law distribution, and the network has the scale-free characteristic. As shown in Fig. (3), the average time of the network path experiences the reduction after the first increase under three kinds of selection probability. It illustrates that the network, from deliberate attacks to random attacks, experiences the reduction number of edges and nodes from greater to less than the increase number of edges and nodes. As the increase rate of decreasing edges and nodes, it is gradually increasing for the increase rate of the average time of the network path and its maximum value. At the same time, as the increase rate of increasing edges and nodes, the reduction The Open Cybernetics & Systemics Journal, 2015, Volume 9 Average Time of Network Path 426 1 0. 9 0. 8 0. 7 0. 6 0. 5 0. 4 0. 3 Yu et al. q1=0.6,q2=0.4,q3=0.1,q4=0.4, p1=0.2,p2=0.1,p3=0.1,p4=0.2 q1=0.7,q2=0.4,q3=0.2,q4=0.5, p1=0.2,p2=0.1,p3=0.2,p2=0.3 q1=0.8,q2=0.5,q3=0.4,q4=0.6, p1=0.3,p2=0.15,p3=0.2,p2=0.3 0 20 40 60 Simulation Step 80 100 Clustering Coefficien Fig. (3). Average time of network path. 0. 3 0. 25 0. 2 0. 15 0. 1 0. 05 0 0 q1=0.6,q2=0.4,q3=0.1,q4=0.4, p1=0.2,p2=0.1,p3=0.1,p4=0.2 q1=0.7,q2=0.4,q3=0.2,q4=0.5, p1=0.2,p2=0.1,p3=0.2,p4=0.3 q1=0.8,q2=0.5,q3=0.4,q4=0.6, p1=0.3,p2=0.15,p3=0.2,p4=0.3 20 40 60 80 100 Simulation Step Fig. (4). Network clustering coefficient. q1=0.6,q2=0.4,q3=0.1,q4=0.4, p1=0.2,p2=0.1,p3=0.1,p4=0.2 in the Networks Giant Component The Ratio of the Number of Nodes of the Number of Node s inThe theRatio Networks Giant Component 3 q1=0.7,q2=0.2,q3=0.2,q4=0.5, p1=0.2,p2=0.1,p3=0.2,p4=0.3 2 q1=0.8,q2=0.5,q3=0.4,q4=0.6, p1=0.3,p2=0.15,p3=0.2,p4=0.3 1 0 0 0 20 40 Simulation Step 60 80 100 Fig. (5). The ratio of the number of nodes in the network giant component. rate of the average time of the network path gradually increased. The average time of the network path is less than its initial value at the end of the simulation. So the dynamic network is faster compared to the traditional network in terms of support speed. As shown in Fig. (4), the initial value of clustering coefficient is zero in the traditional network. With the simulation progress, network clustering coefficient remains at near zero. The reason is that the number of network nodes and edges is in the reduce state. Later network clustering coefficient increases rapidly due to nodes and edges added constantly. Finally, the network clustering coefficient stabilizes, and then the network maintains the balance on the number of nodes and edges entering and exiting. The network has a short average time of network path from Fig. (3), and has a large clustering coefficient from Fig. (4). So the network has the ‘small-world’ characteristic. As shown in Fig. (5), the ratio of the number of nodes in the network giant component is to steadily reduce in the beginning of a period of time under three kinds of selection probability. The reason is that a large number of nodes and edges constantly exit the network. When the simulation step is 38, the ratio value of the number of nodes in the giant component occur transition in the q1=0.8. Then the number of nodes and edges entering the network is greater than the number of exiting the network. Secondly the ratio values begin to gradually reduce, but they are more than 1. Finally, these ratio values fluctuate in the vicinity of 1, at the moment the network maintain the balance on the number of nodes and edges entering and exiting, and connectivity of the network is in a steady state. Because of deliberate attacks from enemy, a large number of nodes and edges exit the network. With the advent of random attacks, the number of nodes and edges entering the Evolutionary Model of Equipment Maintenance Support Force Networks Network Quality Performance 0. 5 0. 45 0. 4 0. 35 0. 3 0. 25 0. 2 0. 15 0. 1 0. 05 0 0 The Open Cybernetics & Systemics Journal, 2015, Volume 9 427 q1=0.6,q2=0.4,q3=0.1,q4=0.4, p1=0.2,p2=0.1,p3=0.1,p4=0.2 q1=0.7,q2=0.4,q3=0.2,q4=0.5, p1=0.2,p2=0.1,p3=0.2,p4=0.3 q1=0.8,q2=0.5,q3=0.4,q4=0.6, p1=0.3,p2=0.15,p3=0.2,p4=0.3 20 40 60 Simulation Step 80 100 Fig. (6). Network quality performance. network is greater than the number of exiting the network. As can be seen from Fig. (6), network quality performance is to reduce in the beginning of a period of time. When reduced to a certain extent, it is in a steady state. After a certain time it gradually increase. This work was financially supported by the National Natural Science Foundation of China under Grant No.61271152. As can be seen from Figs. (5 and 6), network performance experiences a gradual reduction at the beginning. To a certain extent, it fluctuates in the vicinity of its minimum value. It gradually increases after a certain simulation step, then the fluctuation in the vicinity of a stable performance value. [1] From the above analysis, we can achieve a more realistic evolutionary model by way of flexible set-up parameters. So the proposed evolutionary method is feasible. CONCLUSION CONFLICT OF INTEREST [3] [4] [5] [7] [8] [9] [10] [11] [12] [13] The authors confirm that this article content has no conflict of interest. Received: September 16, 2014 [2] [6] In reality, it is only known for partial information of equipment maintenance support force networks, how to analyze their evolution. The paper puts forward an evolutionary model with partial information. It can show the evolutionary law of the networks under different conditions by adjusting parameters, and reveal the evolutionary characteristics in wartime. The above simulation results prove the feasibility of the evolutionary model, and illustrate that the model can provide auxiliary decision for commanders to develop support programs in the pre-war. For the next stage, we are going to do a lot of work to improve the evolutionary model. ACKNOWLEDGEMENTS REFERENCES [14] [15] H. Xu, W. P. Wang and C. L. Chen, “State space modelling of materiel maintenance support systems in wartime,” Journal of System Simulation, vol. 20, pp. 1139-1142, 2008. Y. G. Xu, J Qiu and G. J. Liu, “Dynamic evolution model of equipment maintenance organizational structure based on multielement-weighted network,” Acta Armamentaria, vol. 33, pp. 488-496, 2012. H. Okhravi and D. M. Nicol, “Application of trusted network technology to industrial control networks,” International Journal of Critical Infrastructure Protection, vol. 2, pp. 84-94, 2009. M. Jalili, “Social power and opinion formation in complex networks,” Physica A, vol. 392, pp. 959-966, 2013. O. Mulken and A. Blumenan, “Continuous-time quantum walks: Models for coherent transport on complex networks,” Physics Reports, vol. 502, pp. 37-87, 2011. S. Gourley and N. F. Johnson, “Effects of decision-making on the transport costs across complex networks,” Physica A, vol. 363, pp. 82-88, 2006. X. F. Wang, X. Li and G. R. Chen, “Complex network theory and its application,” In: Proceedings of Qing Hua University, pp. 1-8, 2006. B. Lopez, A. Pla and D. Daroca, “Medical equipment maintenance support with service-oriented multi-agent services,” Lecture Notes in Computer Science, vol. 7057, pp. 487-498, 2012. R. Albert and A. L. Barabasi, “Statistical mechanics of complex networks,” Reviews Modern Physics, vol. 74, pp. 47-97, 2002. M. Annunziato, I. Bertini and S. Pizzuti, “Evolving complex neural networks,” Lecture Notes in Computer Science, vol.4733, pp. 194205, 2007. R. Albert, H. Jeong and A. L. Barabasi, “Error and attack tolerance of complex networks,” Nature, vol. 406, pp. 378-382, 2000. R. Cohen, K. Erez and D. Ben-avraham, “Breakdown of the internet under intentional attack,” Physical Review Letters, vol. 86, pp. 3682-3685, 2001. M. Jalili, “Error and attack tolerance of small-worldness in complex networks,” Journal of Informetrics, vol. 5, pp. 422-430, 2011. P. Chen, X. F. Wu and Y. Li, “Attack strategy for uncertain topology of complex networks,” Application Research of Computers, vol. 27, pp. 4622-4623, 4629, 2010. J. Wu, Y. J. Tan and H. Z. Deng, “Model for invulnerability of complex networks with incomplete information based on unequal probability sampling,” Systems Engineering-Theory & Practice, vol. 30, pp. 1207-1217, 2010. Revised: December 23, 2014 Accepted: December 31, 2014 © Yu et al.; Licensee Bentham Open. This is an open access article licensed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/) which permits unrestricted, non-commercial use, distribution and reproduction in any medium, provided the work is properly cited. 428 The Open Cybernetics & Systemics Journal, 2015, Volume 9 Yu et al.
© Copyright 2026 Paperzz