亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        An executable modeling and analyzing approach to C4ISR architecture

        2020-02-26 14:06:32HEHongyueZHUWeixingLIRuiyangandDENGQiaoyu

        HE Hongyue,ZHU Weixing,LI Ruiyang,and DENG Qiaoyu

        Institute of Command and Control Engineering,Army Engineering University of PLA,Nanjing 210007,China

        Abstract: To analyze the behavioral model of the command,control, communication, computer, intelligence, surveillance, reconnaissance (C4ISR) architecture, we propose an executable modeling and analyzing approach to it. First, the meta concept model of the C4ISR architecture is introduced. According to the meta concept model, we construct the executable meta models of the C4ISR architecture by extending the meta models of fUML.Then, we define the concrete syntax and executable activity algebra (EAA) semantics for executable models. The semantics functions are introduced to translating the syntax description of executable models into the item of EAA. To support the execution of models, we propose the executable rules which are the structural operational semantics of EAA. Finally, an area air defense of the C4ISR system is used to illustrate the feasibility of the approach.

        Keywords: command, control, communication, computer, intelligence, surveillance, reconnaissance (C4ISR) architecture, meta model,executable model,algebraic semantics.

        1.Introduction

        Command, control, communication, computer, intelligence, surveillance, reconnaissance (C4ISR) system is a military complex system.C4ISR architecture is a blueprint of system that bridges the gap between requirements and implements in the design of the C4ISR system. The quality of the C4ISR architecture can influence the quality of the C4ISR system. Thus, in the early development of the architecture,using modeling and simulation for analysis is particularly important[1].

        Most architects design the C4ISR architecture according to Department of Defense Architecture Framework(DoDAF) and use UML to model the C4ISR architecture[2]. However, most behavioral models of the C4ISR architecture are not executable.To analyze the C4ISR architecture,these models need to be translated into some executable models.Petri Net is mainly used to describe these models [3–5]. Ni et al. [6] designed an approach which can map the productions of DoDAF into hierarchy coloured Petri Net (HCPN) to evaluate the behavior of the C4ISR architecture. These translations need the participation of an expert who masters Petri Net. ExtendSim is another method used to simulate models of the C4ISR architecture. Xiong et al. [7] used SysML to model the C4ISR architecture and map these models into the Extend-Sim model.Ge et al.[8]translated the UML models which describe the production of the C4SIR architecture into the ExtendSim model.The structure of the ExtendSim model is complex,so it is difficult to analyze the C4ISR architecture.

        Executable architecture [9] is another kind of method to analyze C4ISR architecture. The C4ISR Key Laboratory of National Defense Technology develops some theories and methods of executable architecture. Wang et al.[10] developed the C4ISR executable architecture based on service-oriented architecture (SOA). Ge et al. [11,12]made some research on the modeling and analysis of executable architecture using UML and ExetendSim.Milena Guessi et al.[13]investigated the main features that should be supported by architecture description language (ADL)for representing architects,and suggested some directions for improving the way the current ADL addresses architecture language. Judith et al. [14] provided an approach to represent an structural operational semantics(SOS) architecture based on the executable SysML model. These models of executable architecture must be translated into some executable modeling language,such as Object Petri Net or the ExtendSim model.Thus there is an argue about whether the executable architecture is needed. Hu et al.[15]proposed a generic modeling approach to executable architecture of system of systems (SoS) based on parallel discrete event system specification (P-DEVS). Cui et al.[16]proposed a domain specific language,which is interpreted through a combination of symbolic evaluation and generates executable evaluation functions, to support closed-form high-level architecture modeling.

        Touraille et al. [17] integrated single platform tools for modeling, simulation, analysis and collaboration, and then developed SimStudio which is a modeling and simulation environment based on the discrete event systems specification(DEVS)formalism.Based on DEVS,Kara et al. [18] also proposed a simulation modeling architecture(SiMA).SiMA supports hierarchical and modular composition of reusable models. Combining DEVS and modeldriven development (MDD), Cetinkaya et al. [19] developed an MDD framework for modeling and simulation(MDD4MS). MDD4MS helps the modeler to construct models faster and better. It provides the mechanism of model transformations and (semi)automatic code generation.

        UML and SysML are accepted as ADL by architects[20]. Oquendo et al. [21] presented the executable viewpoint based on SysML profile for modeling the architecture of software-intensive systems. Most models of the C4ISR architecture can be modeled by UML.Object Management Group proposed the foundational subset for executable UML models(fUML)to enable UML models execution[22,23].Based on the above research,we propose an executable modeling and analyzing approach to C4ISR architecture using fUML. First, we construct the C4ISR architecture meta concept model according to the DoDAF meta-model(DM2)[2].Then we extend the meta models of fUML to define the executable meta model of the C4SIR architecture.To describe the execution semantics of C4ISR architecture executable models,we introduce the concrete syntax and algebra semantics. Finally, we define the executing rules for model execution and use a case study to demonstrate the availability of the theory.

        2.Executable meta model of C4ISR architecture

        Most architects design the C4ISR architecture according to DoDAF.To make these data consistently used by different architects,DoDAF2.0 proposed the DM2 which is a meta model of the Department of Defense (DoD) architecture framework.DM2 makes architects easily understand these data of the C4ISR architecture, and these data can be exchanged consistently between architects.These data must be described in some models by an ADL,but the DM2 is not an ADL.

        According to the requirements of analyzing the C4ISR architecture, we extract some key classes and relations from the DM2 and use them to construct the meta concept model(MCM)of the C4ISR architecture,as shown in Fig. 1. According to these classes of the MCM, the relevant executable meta models of the C4ISR architecture are constructed. These relations of the MCM can guide the simulation process of C4ISR architecture executable models.

        Fig.1 MCM of C4ISR architecture

        UML is widely used as an ADL,and fUML makes UML behavioral models executable. Therefore, fUML can be used to model the executable models of the C4ISR architecture.Because the model of the C4ISR architecture is a special domain model,fUML is not well applicable.Thus,we extend the meta models of fUML to construct the executable meta model of the C4ISR architecture.We choose goal, capability, system, activity and information of the MCM to extend the class meta model and activity meta model of fUML.Then,we construct executable goal meta model,executable capability meta model,executable system meta model, executable activity meta model and executable information meta model.We use these meta models to construct relevant executable models of the C4ISR architecture.Due to the limitation of paper space,we only introduce the executable capability meta model and executable activity meta model.

        Executable capability meta model, as shown in Fig. 2,is extended from the class meta model of fUML.The property of capability can be divided into some measures. A father capability can be decomposed into some son capabilities.A capability clings to some performers and needs some activities to realize it.

        Executable activity meta model, as shown in Fig. 3, is extended from the action meta model of fUML.Activities can be classified into different groups according to the performers.The transition connects the activities which have an executing sequence relationship. Some activities have input or output which can be used to transfer data object.

        Fig.2 Executable meta model of capability

        Fig.3 Executable meta model of activity

        3.Formalization of executable model

        Because the activity model describes the behavior of the C4SIR system,the executable analysis of the C4ISR architecture is realized by the execution of the activity model.Other executable models supply relevant information during the execution process of the activity model.Thus, we mainly introduce the formalization of the activity model in this section.To support the execution of the activity model,we define the concrete syntax and algebra semantics for the activity model.

        3.1 Concrete syntax

        In the activity model,system is the actor of activity.Activities belong to different swimlanes according to their actors.The ControlNode and transition control the execution sequence of activities.The OutPut and InPut supply the information during the execution of activities.Based on the above introduction, extended Backus-Naur form (EBNF)is used to describe the concrete syntax of the activity model as follows.

        The black identifiers are terminal symbol.Other identifiers are nonterminal symbol,such as modelid,messageid,actor name,action name and condition.The map between the activity model and a concrete syntax is straightforward,so we omit its introduction.

        3.2 Algebra semantics

        In the execution of the activity model,objects are the main participators.The execution of the activity model is realized by the interactions between objects or the actions of objects. The object is an instance of swimlane in the activity model. It can execute one or more actions. Action is executed by the object. An action may be executed by different objects, which results in different effects, so the action must cling to one object.The behavior of the C4ISR system comprises these actions of objects. In the activity model, the behavior of the C4ISR system can be abstracted as a process, and every process contains one or more couples of actions and objects. Based on the above analysis,we define executable activity algebras(EAA)referencing performance evaluation process algebras(PEPA). EAA can be used to describe the process of the activity model.

        Definition 1Ois the set of objects which describe the swimlane of the activity model,o ∈O.Ais the set of actions of the activity model,a ∈A.Pdenotes the process.The syntax of EAA is defined using the Backus-Naur-Form(BNF)notation:

        where 0 (Empty) is the empty process; (o,a).P(Prefix)means whenohas executeda,Pis active.P1;P2(Sequence) means whenP1has been executed,P2is active.P1+c P2(Choice) means ifcis true,P1will be active;otherwise,P2will be active. [x=y]P(Condition)mean ifx=yis true,Pwill be active; otherwise,Pis waiting.P1‖P2(Fork)meansP1andP2will be executed synchronously.P1‖P P2(Join)meansP1andP2are executed synchronously.When they are all ended,Pwill be active.

        EAA supplies an algebras semantics domain for the activity model.The algebras semantics of the activity model is an instance of EAA.We need to translate the syntax description of the activity model into the item of EAA.First,we introduce two action definitions.If

        Definition 2The action definition for input message is

        in(o,m),o ∈H(

        Definition 3The action definition for output message is

        out(o,m),o ∈H(

        Then,we introduce some semantics function definitions for the main terminal syntax of the concrete syntax of the activity model.

        Definition 4The semantics function definition for the symbol

        S(

        Definition 5The semantics function definition for the symbol

        S(

        Definition 6The semantics function definition for the symbol

        S(

        Definition 7The semantics function definition for the symbol

        S(

        Definition 8The semantics function definition for the symbol

        S()S(

        Definition 9The semantics function definition for the symbol

        S()S(

        The definitions ofS(

        Definition 10The semantics function definition for the symbol

        S(

        Definition 11The semantics function definition for the symbol

        S(

        Using these semantics functions, we can translate the concrete syntax of the activity model into the item of EAA.

        4.Executable rules

        Currently, SOS is widely applied in the process algebra.SOS is a set of derivation rules to describe the behavioral evolution of process algebra.A process termPcan evolve,subject to the change of the active label(o,a),into a different term which is called the successor ofPand defined asIf the process termPevolves into another termP′,there must be a sequence of active labels0) which results inandis the trace of the termPevolved into the termP′.The trace is used to describe the execution of the activity model.To support the evolution of the process item in EAA,we define the derivation rules for any kind of syntax of EAA. In these rules,Pdenotes any process,P′is the successor ofP;P1andP2denotes some process.

        4.1 Prefix rule

        Rule Action-1 denotes that when the process (o,a) is active, ifohas executeda, process 0 will be active. Rule Action-2 denotes that when the process(o,a).Pis active,ifohas executeda,processPwill be active.□denotes that precondition of the rules is always true.The Prefix rule is used when the Prefix process item is evolved.

        4.2 Sequence rule

        Rule Sequence denotes that if processP1activates processwhenohas executeda, processP1;Pactivates processwhenohas executeda. The Sequence rule is used when the Sequence process item is evolved.

        4.3 Choice rule

        Rule Choice-1 denotes that if conditioncis true,processP1+c Pactivates processP1.Rule Choice-2 denotes that if conditioncis true,processP1+c Pactivates processP2.The Choice rule is used when the Choice process item is evolved.

        4.4 Condition rule

        Rule Condition denotes that if condition[x=y]is true,process[x=y]Pactivates processP.□denotes that precondition of the rules is always true.The Condition rule is used when the Condition process item is evolved.

        4.5 Fork rule

        Rule Fork-1 denotes that process 0‖P2activates processP2. Rule Fork-2 denotes that processP1‖0 activates processP1. Rule Fork-3 denotes that if processP1activates processwhenohas executeda,and processP1‖P2activates processwhenohas executeda.Rule Fork-4 denotes that if processP2activates processwhenohas executeda,processactivates processwhenohas executeda.The Fork rule is used when the Fork process item is evolved.

        4.6 Join rule

        Rule Join-1 denotes that process 0‖PP2activates processP2;P. Rule Join-2 denotes that processP1‖P0 activates processP1;P.Rule Join-3 denotes that if processP1activates processwhenohas executeda, and processP1‖P P2activates processwhenohas executeda.Rule Join-4 denotes that if processP2activates processwhenohas executeda,and processP1‖P P2activates processwhenohas executeda.The Join rule is used when the Join process item is evolved.

        During the evolution process of EAA, a set of labels are needed. There are four kinds of labels in the activity model. The set of input message labels is described asAi={S(

        5.Case study

        In this section, we use the threat air defense system(TADS) which is a kind of C4ISR system to demonstrate the availability of this theory. The structure and activity models of TADS are built using the meta models.Because of the limited space, we only describe the activity model and algebra semantics of the activity model.

        In TADS, there are constituent systems: radar battalion (RB), threat command center (TCC), missile battalion (MB) and anti-air gun battalion (AGB). When an unknown fight plane(UFP)flies in the area of TADS,it triggers the behaviors of constituent systems of TADS. The process of UFP interception can be described as follows.Once the UFP has flown in the area, the RB detects the target.The information of UFP will be sent in time to the TCC which will make a threat assessment on it and decide who shall undertake the task of interception.After the undertaker(MB or AGB)has accepted the interception order and has received the UFP information, it will aim at and shoot on the UFP,and the UFP modifies its state to indicate the degree of destroy.Then RB collects the interception effect and sends it to TCC.TCC assesses the interception.If the interception fails, TCC sends an order to MB or AGB to arrange another interception.The activity model is illustrated in Fig.4.

        According to the syntax of EAA and the mapping rules between activity model notations and process terms, the activity model of TADS can be expressed using the following process terms:

        Fig.4 The activity model of TADS

        0 is the empty process, and 0→P1is always true.The label transition set of this activity model isT=(0,P,Lab,→):

        When the activity model is executed,a serial of labels in the lab are given.We can use these labels to evolve these processes described in the form of the activity model,and then to analyze the behavior of TADS.For example,there are three label lists.

        UsingL1, we can observe a process trace(P1,P2,P4,P5,P7,P3,P9,P10,P11,P12,0). The process trace is ended by 0 which denotes the end of the activity model. During the activity model simulation process, we can observe that the UFP is intercepted by MB. However, usingL2, we observe a process trace(P1,P2,P4,P5,P8,P3,P9,P10,P11,P12,P6). The process trace is ended byP6.During this simulation, we can observe that the UFP is not intercepted by AGB, so that TCC must make a new order. UsingL3, we observe a process trace(P1,P2,P4,P5,P6).During this simulation,we can observe that TCC has made a threat assessment on UFP,but TCC does not make an interception order.

        Using different labels to simulate the activity model,we can observe and analyze the different behaviors of TADS.

        6.Conclusions

        Nowadays,the models of the C4ISR architecture are usually constructed by IDEF or UML, but these models are not executable.There are some inconveniences during the evaluation of the C4ISR architecture.In this paper,we propose an executable modeling and analyzing approach to the C4ISR architecture.The executable models of the C4ISR architecture are executed to analyze it.The contribution of this work is described as follows.First,the executable meta models of the C4ISR architecture are constructed by extending the meta model of fUML. Using these meta models,we can construct executable models of the C4ISR architecture.Second,the concrete syntax and algebra semantics of executable models are defined, and the semantics functions are introduced to translating the syntax description of executable models into the items of EAA.Third,to support the execution of models, the executable rules,the SOS of EAA, are proposed. Using these rules, the items which denote the behavior of executable models can be evolved to express the process of behavior.

        国产精品久久久久尤物| 麻豆国产精品久久人妻| 亚洲国产精品无码久久久| 成年无码av片完整版| 日韩五十路| 男女视频在线观看一区二区 | 亚洲国产韩国欧美在线| 手机看片国产日韩| 免费黄网站永久地址进入| 国产精品久久久天天影视| 和外国人做人爱视频| 色欲国产精品一区成人精品| 亚洲天堂免费成人av| 亚洲中文字幕精品乱码2021 | 乱码一二三入区口| AV熟妇导航网| 国产精品亚洲综合久久| 99久热在线精品视频观看| 亚洲色偷偷综合亚洲av伊人| 亚洲AV无码一区二区水蜜桃| 亚洲精品女同一区二区三区| 久久97久久97精品免视看| 国产精品区一区第一页| 又色又爽又黄的视频网站| 一区二区三区视频亚洲| 久久久久成人精品无码| 日韩区在线| 一区二区三区在线日本| av无码精品一区二区三区| 一区二区传媒有限公司| 西西人体大胆视频无码| 国产精品熟女少妇不卡| 亚洲a∨国产av综合av下载| 日韩免费一区二区三区在线| 国产麻豆一区二区三区在线播放 | 精品无码人妻一区二区三区| 无码一区二区三区在| 精品国产一区二区三区av免费| 2018国产精华国产精品| 久久国产亚洲AV无码麻豆| 在线观看亚洲视频一区二区|