Skip to main content

Node importance evaluation in multi-platform avionics architecture based on TOPSIS and PageRank

Abstract

With the development of avionics industry, it is difficult for traditional combat equipment node evaluation method to meet our requirements under complex combat system. This paper presents a method of node importance evaluation which is suitable for modern avionics field and can be used for reference in other combat fields. In order to make better use of the different features of the node itself and the different connections between nodes, we use TOPSIS algorithm to model the characteristics of the node itself, and PageRank to measure the interdependence of all nodes. Therefore, a novel node contribution evaluation algorithm based on TOPSIS and PageRank is proposed in this paper. In addition, after the evaluation of node contribution, we found that there was also a functional relationship between the operational information entropy in the whole graph and the contribution of these nodes. On this basis, information entropy evaluation algorithm of the overall combat map is further proposed. After a lot of experiments, the reliability of our algorithm is evaluated on the indexes of the node's destruction-resistant performance and information transfer efficiency. Compared with the traditional universal algorithm, our proposed algorithm shows more interpretable and robust results in the field of avionics.

1 Introduction

Due to the development of various communication equipment, problems such as low information transmission efficiency and difficult recovery of network after attack often exist in the redeployment of complex networks. In the field of wireless sensors, Yin et al. [1] proposed a multi-attribute decision-making node importance evaluation method and achieved good results. Nguyen et al. [2] discussed the network robustness algorithm based on degree in the context of social network evaluation. In addition, Singh et al. [3] proposed a nodal weighted centrality evaluation method in public transport networks, which used clever function mapping to make traditional node centrality indexes more reasonable. This work greatly inspired the method in this paper and extended a test of auxiliary experiment. More far-reaching, De Clerck et al. [4] took the view of information communication and used the index of information entropy to analyze the social network data of Twitter, and the experimental results correctly reflected the popular mode of social network. This is of great reference significance for the follow-up work of this paper after the evaluation of node importance—the establishment of a perfect combat capability index.

However, we have to realize that the traditional node evaluation is often limited to the sensor, social network, and transportation fields, and there is a gap in the node evaluation in the aviation field. More importantly, due to the particularity of the characteristics of aviation nodes and the high cost of connection, the traditional evaluation method may not be suitable for aviation scenarios. In the face of complex networks under formation, with the concept of cooperative combat system proposed, we pay more and more attention to the value of nodes in the system. Therefore, we propose a novel node evaluation method, considering the need of cooperative combat of aviation nodes, and create a comprehensive evaluation method of node importance evaluation and combat map information entropy evaluation in the combat domain.

According to the modern warfare cycle theory, a complete combat process is a set of OODA (observation, orientation, decision, action)—a circular process of integration. Based on the theory of the OODA ring, the concept of an operational ring is put forward. The standard operational ring is composed of the reconnaissance, command, and control, influence nodes abstracted from one's equipment system and the target nodes of the other side. In the process of modeling, the equipment in the system has a single function by default. Still, with the continuous progress of science and technology [5], combat aircraft usually have two or more functions, such as multi-purpose fighter aircraft with reconnaissance and strike functions; if it is simply abstracted as a certain type of node, its evaluation is not comprehensive enough.

To make the evaluation of aircraft nodes more reflective of reality, this paper evaluates the contribution of nodes according to the different functions of nodes and the various links between different nodes. We first introduce the existing evaluation methods of node importance [6]:

  1. 1.

    Methods based on the centrality of neighboring nodes This kind of method is the simplest and most intuitive, which evaluates the influence of nodes according to their position in the network. Degree centrality examines the number of direct neighbors of a node in the network, and semi-local centrality examines the information of four layers of neighbors of a node in the network, and Cluster Rank [7]. The degree and clustering coefficient of nodes in the network are also considered.

  2. 2.

    Approach based on path centrality This kind of method examines the ability of nodes to control information flow and characterizes the importance of nodes. Such methods include subgraph centrality and number centrality (some evolutionary algorithms include route betweenness centrality, flow betweenness centrality, connected betweenness, random walk betweenness center, etc.) and other path-based mining methods.

  3. 3.

    Iterative optimization sequencing method These methods not only consider the number of neighbors of nodes in the network but also consider the impact of the quality of neighbors on the importance of nodes, including the centrality of feature vectors, cumulative nomination, PageRank algorithm, and its variants.

  4. 4.

    Sorting Algorithm Based on Node Position [8] The most remarkable feature of this kind of method is that the algorithm does not define the importance of computing nodes but determines the importance of nodes by determining the location of nodes in the network. The node at the core of the network is relatively important. On the contrary, if the node is at the edge of the network, its importance will be relatively low. Recommendation algorithms based on node location and different application scenarios have important research significance.

The methods and steps of node importance evaluation used in this paper are introduced here. Firstly, (1) TOPSIS was used to evaluate the overall contribution of nodes under different indicator scales. (2) Secondly, a PageRank evaluation method combined with the overall contribution is proposed; that is, the PageRank algorithm combined with TOPSIS weight is integrated to evaluate the local contribution of nodes. (3) Finally, the information entropy method is used to evaluate the overall combat capability.

The algorithm proposed in this paper has three main contributions and purpose:

  1. 1.

    TOPSIS algorithm is used to evaluate the characteristics of the aircraft node itself, such as stealth coefficient, initial speed, firepower capability, and other indicators serving for combat. Man–machine and individual combat equipment are evaluated under a framework to measure their contributions in the system.

  2. 2.

    The PageRank algorithm was used to abstract the intricate connections between aircraft nodes into an adjacency matrix, and then, the node orientation relationship was scored to obtain the role of each node in the degree of network connectivity;

  3. 3.

    Finally, we unify the above two algorithms and combine them with linear functions, so that the evaluation of nodes can consider the characteristics of the aircraft itself and the overall aircraft combat network, which is more instructive to the current combat system and can be extended to other combat fields.

The rest of paper is organized as follows: In Sect. 2, we introduce the background and related work. Our model and novel algorithms are presented in Sect. 3, with experimental results and evaluations discussed in Sect. 4. Finally, Sect. 5 gives the conclusions and future work.

2 Research methods

2.1 Evaluation of global aircraft combat ring node contribution based on topics

In order to evaluate the importance of nodes in the field of avionics, the first part of our work starts from the indicators of nodes themselves to analyze their own local weights. To achieve this purpose, we use TOPSIS algorithm, which is mainly used to solve evaluation problems and determine the final scores of each scheme layer. The advantage [9] is that it can make full use of the information of the original data and the results can accurately reflect the gap between the evaluation schemes. This algorithm is more suitable to solve the situation where the original data are sufficient and can be used for quantitative analysis. Therefore, this method is applied to the avionics node evaluation in this paper.

TOPSIS (Technique for Order Preference by Similarity to an Ideal Solution) [10] is a ranking method based on the closeness of limited evaluation objects to the ideal goal, and it is a relative evaluation of the advantages and disadvantages of the existing objects. As a sequence optimization technique of ideal target similarity, it is a very effective method in multi-objective decision analysis. Through the normalized data matrix, the optimal target and the worst target in multiple targets were found, and the distance between each evaluation target and the positive ideal solution and negative ideal solution was calculated, respectively, to obtain the closeness degree of each target to the ideal solution. According to the closeness degree of the ideal solution, the targets were sorted, which was used as the basis for evaluating the quality of the targets. The value of closeness is between 0 and 1. The closer the value is to 1, the closer the corresponding evaluation target is to the optimal level, and vice versa.

In the evaluation of aircraft combat ring nodes, it is not difficult to know that there are the following types of nodes [11]:

  1. (1)

    Target Node (T Node) The target that needs to be attacked, destroyed, jammed, or intercepted during combat, which can be an aircraft node or an armed facility on the blue side.

  2. (2)

    Reconnaissance and early warning node (S node) equipment or facilities that collect various types of information on the battlefield, mainly referring to aircraft nodes or other entities that conduct reconnaissance, early warning, or monitor blue targets on the battlefield.

  3. (3)

    Command and control node (D node) the unit that makes decisions and commands combat equipment and personnel in the combat system, such as command posts at all levels and command and control systems.

  4. (4)

    Impact node (type I node) an entity that can directly interfere with or damage the target node, mainly referring to the strike and jamming weapon system.

For different types of nodes, there are obvious differences in their measurement indicators. Taking the following quantitative table of capability indicators as an example, we can easily find that the evaluation of these nodes should first be on the same scale, abandoning the difference in the order of magnitude. Secondly, we should reasonably evaluate the importance of different indicators, so in this paper, we use the TOPSIS method to model this multi-index evaluation task. Some typical aircraft indicators are presented in Table 1.

Table 1 Example table of multiple indicators of aircraft

In a combat ring, there are usually m evaluation nodes D1, D2…, Dm, and each target has n evaluation indexes X1, X2… Xn. Firstly, experts are invited to score the evaluation index, and then, the scoring results are expressed in the form of a mathematical matrix to establish the following characteristic matrix:

$$D = \left( {\begin{array}{*{20}c} {x_{11} } & \cdots & {x_{1n} } \\ \vdots & \ddots & \vdots \\ {x_{m1} } & \cdots & {x_{mn} } \\ \end{array} } \right)$$

In the above matrix, m row represents m nodes to be evaluated, and n column means that each node has n indicators. For the purpose of the following explanation, we abstract this matrix into a row matrix. We further write:

$$D = \left[ {X_{1} \left( {x_{1} } \right), \ldots ,X_{j} \left( {x_{i} } \right), \ldots ,X_{n} \left( {x_{m} } \right)} \right]$$

The characteristic matrix is normalized to obtain a normalized vector, and a normalized matrix about the normalized vector is established:

$$\begin{aligned} & r_{ij} = \frac{{x_{ij} }}{{\sqrt {\mathop \sum \nolimits_{i = 1}^{m} x_{ij}^{2} } }} \\ & i = 1,2, \ldots , m, j = 1,2, \ldots , n \\ \end{aligned}$$

By calculating the weight normalization value of the corresponding indicator \(l_{j}\), establishing a weight normalization matrix with respect to the weight normalization values:

$$v_{ij} = l_{j} r_{ij} ,i = 1,2, \ldots ,m,j = 1,2, \ldots ,n.$$

The ideal solution and the anti-ideal solution are determined according to the weight normalization values:

$$\begin{aligned} & A^{*} = \left. {\left( {\mathop {\max }\limits_{i} v_{ij} j \in J_{1} } \right),\left( {\mathop {\min }\limits_{i} v_{ij} j \in J_{2} } \right),} \right|i = 1,2, \ldots ,m = v_{1}^{*} ,v_{2}^{*} , \ldots ,v_{j}^{*} , \ldots ,v_{n}^{*} \\ & A^{ - } = \left. {\left( {\mathop {\min }\limits_{i} v_{ij} j \in J_{1} } \right),\left( {\mathop {\max }\limits_{i} v_{ij} j \in J_{2} } \right),} \right|i = 1,2, \ldots ,m = v_{1}^{ - } ,v_{2}^{ - } , \ldots ,v_{j}^{ - } , \ldots ,v_{n}^{ - } \\ \end{aligned}$$

Calculate the distance scale; that is, calculate the distance from each target to the ideal solution and the anti-ideal solution. The distance scale can be calculated by the n-dimensional Euclidean distance. The target is at a distance \(S^{*}\) from the ideal solution and a distance \(S^{ - }\) from the anti-ideal solution.

$$\begin{aligned} & S^{*} = \sqrt {\mathop \sum \limits_{j = 1}^{n} \left( {V_{ij} - v_{j}^{*} } \right)^{2} } \\ & S^{ - } = \sqrt {\mathop \sum \limits_{j = 1}^{n} \left( {V_{ij} - v_{j}^{ - } } \right)^{2} } \\ & i = 1,2, \ldots ,m \\ \end{aligned}$$

According to the closeness degree of the ideal solution, the higher the closeness degree of the sorting result is, the better the target is.

$$C_{i}^{*} = \frac{{S_{i}^{ - } }}{{\left( {S_{i}^{*} + S_{i}^{ - } } \right)}},\quad i = 1,2, \ldots ,m$$

Define the hierarchical weight of a node \(w_{i}^{1}\) for

$$w_{i}^{1} = \alpha_{i} C_{i}^{*}$$

2.2 Aircraft node contribution evaluation based on the TOPSIS-PageRank multi-index fusion algorithm

After we obtain the importance ranking information of the attributes of nodes through TOPSIS algorithm, we hope to naturally integrate this information into the global importance evaluation of nodes. Therefore, we use the commonly used PageRank algorithm to evaluate the role played by each node in the whole connected graph based on the pointing relation of nodes. The results of TOPSIS are linearly combined. The combination of these two results reflects the importance of the node itself and the comprehensive performance of the network in the field of avionics [12]. The local weights of the nodes are evaluated, and then, the TOPSIS hierarchical weights proposed above are used for weighted fusion. Finally, the comprehensive weight based on the TOPSIS-PageRank multi-index fusion is obtained [13].

PageRank is a common algorithm to evaluate the relevance and contribution of aircraft nodes, which can be transferred to the research of node importance. In 1998, Sergey Brin and Lawrence Page proposed PageRank to solve some problems in search engines [14]. In this paper, we proposed a new algorithm for network link analysis, which is based on the random surfer model. Specifically, if a command node follows the link for several steps of information transfer, then it turns to a random starting point, and the aircraft node follows the link again for information transfer, and then, the value of an aircraft node is determined by the frequency with which the aircraft node is visited by the command node.

A simple description of the PageRank algorithm migrating to aircraft nodes is as follows: u is an aircraft node, F(u) is the set of aircraft nodes pointed to by node u, B(u) is the set of aircraft nodes pointed to u, N(u) = F(u) is the number of links pointed out by u, and c is the normalization factor (generally 0.85).

The PR value of the importance of a node is formulated as follows; that is, the importance of a node is mainly determined by the importance that points to its node and the links that it points outward to:

$${\text{PR}}\left( u \right) = c\mathop \sum \limits_{{v \in \left( {B\left( u \right)} \right)}}^{n} \frac{{{\text{PR}}\left( v \right)}}{N\left( v \right)}$$

However, considering that there is no direct subordinate relationship between some nodes; that is, there are fewer external links, this does not mean that the combat node is not important, so in this combat system, it is necessary to introduce a new node weight evaluation method.

We add an increment to prevent the node from being too low; that is, we add a damping coefficient called d (generally normalized to 0.85), which is like the paranoia in the neural network, to avoid sinking to 0 when calculating the weight, that is, to avoid some nodes not being considered.

$${\text{PR}}\left( u \right) = \left( {1 - d} \right) + d\mathop \sum \limits_{{v \in \left( {B\left( u \right)} \right)}}^{n} \frac{{{\text{PR}}\left( v \right)}}{N\left( v \right)}$$

In the case of more data, we can improve it from the perspective of the damping coefficient. In the classical PageRank algorithm, the transition probability of the aircraft node is equally distributed to the out-link aircraft node, and the PR value of the new aircraft node is generally low due to fewer links. The classical PageRank algorithm calculates the PR value by linking without considering the practical significance of aircraft nodes, which has the problems of command weight drift and aircraft node weight equalization. Therefore, an authority degree p(vi) is introduced, which is determined by the ratio of the pointed links to the pointed links of the aircraft nodes:

$$p\left( {vi} \right) = Q\left( {\frac{{\text{ Linkin }}}{{\text{ Linkout }}}} \right)$$

After the introduction of the Ratio variable \(p\left( {vi} \right)\):

$${\text{PR}}\left( u \right) = \left( {1 - d} \right) + d\mathop \sum \limits_{{v \in \left( {B\left( u \right)} \right)}}^{n} \frac{{{\text{PR}}\left( v \right) \cdot p\left( v \right)}}{N\left( v \right)}$$

Finally, combined with the TOPSIS algorithm mentioned above, we integrate the weight meaning of the node itself with the node orientation relationship obtained by the PageRank we define the overall weight evaluation of the node as:

$$w_{u} = k_{1} *w_{u}^{1} + k_{2} *{\text{PR}}\left( u \right)$$

where \(w_{u}^{1}\) is the TOPSIS weight of the layer in which the u node is located, as represented above, and \(k_{1}\) and \(k_{2} { }\) represent normalization coefficients.

2.3 Evaluation method of combat capability based on information entropy

The ability to complete combat tasks is often uncertain, and information entropy can well describe the uncertainty of information, so the operational network capability of the weapon equipment system can be measured by information entropy [15].

The combat process can usually be decomposed into multiple nodes and edges, and each node and edge often have many factors that affect the combat capability. The smaller the uncertainty of these factors to meet the requirements of combat capability, the higher the combat capability. Conversely, the greater the uncertainty of meeting the capability requirements, the lower the combat capability. The uncertainty of various influencing factors in combat can be measured by the importance of its nodes. The greater the overall contribution of the nodes and the more distributed, it shows that the whole network has better invulnerability and better robustness in information transmission, and the more it can meet the needs of combat capability, the less uncertainty it brings to combat. Transforming the entropy function to obtain the weighted self-information quantity of the node, namely:

$$I_{u} = \frac{{w_{u} }}{N}$$

Among \(W_{u }\) represents the comprehensive contribution of nodes evaluated in Sect 2.2, and N is the number of nodes in the entire battle graph. We evaluate the amount of information of nodes in a way like K-shell, but we need to evaluate the information entropy. Further, we integrate the amount of information of other nodes about a node to obtain the information entropy function of a node:

$$e_{u} = - \mathop \sum \limits_{j \in \Gamma \left( u \right)} I_{u} \cdot \ln I_{u}$$

where J (\(j \in \Gamma \left( u \right)\)) is the set of neighbors of node Vu. The information entropy of a node considers the propagation effect of its neighbors, and the greater the information entropy of a node, the greater its influence.

Then, we define the operational capability of the operational graph u as Ku, which can be measured by the amount of self-information, and we define the operational capability as the sum of the information entropy of nodes on all operational rings in the operational graph:

$$K_{u} = \mathop \sum \limits_{i = 1}^{M} \mathop \sum \limits_{j \in \sigma \left( i \right)} e_{j}$$

Among \({\upsigma }_{i}\) is the set of nodes contained in the combat ring I, and M is the number of combat rings owned by the combat graph.

Then, the combat capability F of the joint combat system for the multi-target combat mission is

$$F = \mathop \sum \limits_{i = 1}^{M} q_{i} K_{i}$$

In the formula, qi represents the weight value of each target, and the target weight is determined mainly based on the following aspects:

  1. (1)

    The urgency of the military task (the threat level of the target to our side).

  2. (2)

    The importance of the target in the enemy equipment system (the key node in the enemy system).

3 Experimental result and discussion

3.1 Different node contribution evaluation methods are used to evaluate the operational nodes

We start from a simulated avionics network, carry out case analysis, and do relative comparative experiments and performance evaluation.

First, the practical significance of each node is explained in Table 2:

Table 2 Explanation table of figure terms

The following figure mainly includes.

  1. 1.

    LD 5.

  2. 2.

    WM 10, WM 11, WM 12.

  3. 3.

    UL 2, UL 15.

  4. 4.

    UM 6, UM 1, and UM 12, 13.

  5. 5.

    Other electronic warfare and radar warfare equipment.

To facilitate analysis, Fig. 1 shows an example of how nodes of different types are related to each other. We can see that the human aircraft in the picture are relatively few and in a lead state, and the radar and detection units will work with it to accomplish the assigned task.

Fig. 1
figure 1

Typical aircraft node battle chart

To measure the efficiency of the integrated algorithm, it combines the TOPSIS global level weight node contribution algorithm and the PageRank node local contribution algorithm. We adopt the K-Shell [16], degree centrality [17], closeness centrality, VoteRank [18] and other common node contribution evaluation methods, combined with our own algorithm to carry out experiments. For the example shown above, the algorithm importance evaluation is shown in Table 3. After the experiment, the data obtained under the evaluation of these different algorithms have been normalized and presented in the following table on a unified scale.

Table 3 Evaluation table of node contribution under different algorithms

We continue to carry out the experiment and measure the rationality of this evaluation algorithm through network survivability. After the removal of several key nodes, the network becomes several disconnected sub-networks, which greatly damages the control communication between aircraft nodes. We define that the communication performance of the network is evaluated by the connection between manned node 5 and manned wingman nodes 10, 11, and 12. When the network damage reaches 100%, it shows that after the key nodes are attacked, the information communication capability of the combat network will also be destroyed. In Table 4, the order of node importance under this algorithm is as follows:

Table 4 Top 5 nodes of importance

Next, we introduce network efficiency [19]. This index is used to evaluate the efficiency of network nodes under different rankings. Between two nodes in a network \(V_{i}\) and \(V_{j}\), a simple path with the least number of edges (different edges) is called a geodesic.

The number of edges of the geodesic \(d_{ij}\) is referred to the shortest path length between two nodes.

\(1/d_{ij}\) called the efficiency between \(V_{i}\) and \(V_{j}\), written as \(\varepsilon_{ij}\), is often used to measure the speed of information transfer between nodes. When there is no path communication between \(V_{i}\) and \(V_{j}\), \(d_{ij} = 0\), and \(\varepsilon_{ij} = 0\). Therefore, the efficiency is very suitable for measuring non-fully connected networks.

We use the cumulative node efficiency to evaluate in Table 5:

Table 5 Cumulative node efficiency

We can see that the TOPSIS-PageRank multi-index fusion approach can stand out in the degree measurement algorithm and achieve the best network efficiency.

Next, we evaluate the survivability of the network. How to evaluate the key nodes has always been a concern in the evaluation of complex networks. We delete the top three nodes one by one according to the importance of different algorithms and calculate the degree of network connectivity, to infer the significance of key nodes to the survivability of the network under different algorithms:

As can be seen in the figure below, when we delete the top three important nodes in various algorithms, these networks become fragmented. Here, we mark the branches with the number of connections greater than 1. We can see how the remaining nodes of the whole network communicate if the malicious attacks the important nodes evaluated by different algorithms.

In Fig. 2, we show the connectivity of nodes when the most critical nodes of TOPSIS-PageRank and Centrality are attacked.

Fig. 2
figure 2

TOP 3 nodes attack connectivity comparison figure a

In Fig. 3, we show the connectivity of nodes when the top three important nodes of VoteRank and K-Shell are deleted.

Fig. 3
figure 3

TOP 3 nodes attack connectivity comparison figure b

As shown in the figure above, we circle the link nodes that still exist after the attack.

As shown in Figs. 2 and 3, we can see that (1) in the TOPSIS-PageRank multi-index fusion method, after deleting nodes 2, 5, and 1, there are two connected branches left, which are the main connected subgraph of length 5 of 1–3–4–8–14 and the 6–7 connected branch; (2) in the degree cent algorithm, after deleting 2, 1, and 3, three connected branches are left, and the length of the longest connecter branch is 5. Because on the first three important nodes, the results of degree centrality and closeness centrality algorithms are node 2, node 1, and node 3, so the experiment is not repeated. (3) In the VoteRank, similarly, after deleting 2, 5, and 1, the main connected subgraph with a length of six is left; (4) in the K-shell, after deleting 2, 5, and 11, there is still a main connected subgraph of length 7 and 6–7 connected branches; below we use the average node connectivity metric [20] and analyze the four graphs after deleting the nodes.

In Table 6, we evaluated the seven average connections. Average node connectivity evaluation is after deleting the top three nodes of importance, we measure the connectivity of each node in the figure, for evaluation, which reflects the ability of information exchange to a certain extent. This also reflects the algorithm we used to evaluate the top three nodes of importance, after they were deleted, the index of Average node connectivity degradation is serious, in this evaluation scale, our algorithm is more reasonable and practical significance, let us know which nodes are the most important.

Table 6 Connectivity after a key node is delete

The connectivity performance of the TOPSIS-PageRank multi-index fusion method is relatively the worst, which also shows that the node deleted is the more critical node [21], indicating that our algorithm has some merit in identifying key nodes.

Figure 4 illustrates the network damage after key nodes are attacked under different algorithm measurement criteria.

Fig. 4
figure 4

Network performance impairment graph

We can find different algorithms to delete the top five priority nodes, which has caused a very big blow to the connectivity of the network. However, from the perspective of key nodes, we can see that the PageRank algorithm is more reasonable and more in line with our needs to measure the resilience of the network. In the last graph, we can see that after the top five important nodes of the TOPSIS-PageRank multi-index fusion ranking are destroyed one by one, the performance loss rate of the network has reached about 86%, and compared with other algorithms, the performance loss rate of the network has been reduced. After the first three nodes are destroyed, our model suffers a greater blow, which also shows that our evaluation method is conducive to the protection of key information nodes and the global network.

4 Conclusion

In this paper, we mainly propose a hybrid node contribution evaluation method based on TOPSIS and PageRank algorithm. The experimental results show that in the field of avionics, the method has proved its correctness and effectiveness in improving the anti-destruction performance of the network and maximizing the information transmission efficiency of the nodes. The main advantage is that compared with the common soft voting node contribution algorithm represented by VoteRank, the broken cycle node contribution algorithm represented by K-Shell, and other node centrality contribution algorithms, our algorithm can better measure the survivability of the network and the evaluation of key nodes and provide a new perspective for evaluating the efficiency of the network. It is also helpful to the ability of aircraft nodes to cooperate in combat, and this algorithm still has some randomness. Perhaps in the future, we can hope to add more interpretable models to make the node evaluation area of coordinated operations of wingman, leader, radar, and other combat units reasonable and consistent. Not only that, based on the above node importance assessment, we quantified the information entropy of each node and calculated the information entropy of the whole graph. Thus, a widely applicable algorithm to evaluate the information contained in the battle map was proposed, and through this information entropy evaluation algorithm, we can naturally get the evaluation method of combat capability and information transmission capability.

5 Future works

In this paper, due to time constraints, there are still some related works that can be improved, and more enlightening results can be produced on the topic of node importance evaluation:

  1. (1)

    Based on this article, perhaps we can use personalized PageRank instead of traditional PageRank. Personalized PageRank means that we can give each node some importance we think it has before PageRank gives the node weight. This initial importance will enter the iteration of random walk, making the whole evaluation method more reasonable and suitable for people's changing needs.

  2. (2)

    On the basis of node importance evaluation in this paper, considering the characteristics of the graph algorithm itself and the particularity of the avionics system itself, we believe that this node importance evaluation algorithm can be used as the basis for aviation deployment. At the same time, if various connections between nodes can be sorted out and classified into different edges, this algorithm may be more comprehensive and specific by making edge information a part of the overall importance evaluation. Meanwhile, the method of combining point and edge evaluation is also applicable to other connected graph evaluation problems.

Availability of data and materials

The datasets used and analyzed during the current study are available from the corresponding author upon reasonable request.

Abbreviations

OODA:

Observation, orientation, decision, action

TOPSIS:

Technique for Order Preference by Similarity to an Ideal Solution

PR:

PageRank weight

TOPSIS-PageRank:

An evaluation method combining TOPSIS and PageRank algorithm

UL:

Unmanned lead aircraft

WM:

A manned plane to protect the leader plane

UM:

An unmanned plane to protect the leader plane

EL:

Nodes with electronic warfare capability

RD:

Nodes equipped with a radar reconnaissance unit

LD:

Manned lead aircraft

References

  1. R. Yin, X. Yin, M. Cui et al., Node importance evaluation method based on multi-attribute decision-making model in wireless sensor networks. J. Wirel. Commun. Netw. 2019, 234 (2019). https://doi.org/10.1186/s13638-019-1563-5

    Article  Google Scholar 

  2. Q. Nguyen, T.V. Vu, H.D. Dinh et al., Modularity affects the robustness of scale-free model and real-world social networks under betweenness and degree-based node attack. Appl. Netw. Sci. 6, 82 (2021). https://doi.org/10.1007/s41109-021-00426-y

    Article  Google Scholar 

  3. A. Singh, R.R. Singh, S.R.S. Iyengar, Node-weighted centrality: a new way of centrality hybridization. Comput. Soc. Netw. 7, 6 (2020). https://doi.org/10.1186/s40649-020-00081-w

    Article  Google Scholar 

  4. B. De Clerck, L.E.C. Rocha, F. Van Utterbeeck, Maximum entropy networks for large scale social network node analysis. Appl. Netw. Sci. 7, 68 (2022). https://doi.org/10.1007/s41109-022-00506-7

    Article  Google Scholar 

  5. Yu Z, Mingzhi Z, Jingyu Y, Ye Z, Ming R. A modeling method of weapon equipment system based on OODA ring. J. Syst. Simul. 25(S1) (2013).

  6. R. Xiaolong, Lv. Linyuan, Review on ranking methods of network important nodes. Chin. Sci. Bull. 59(13), 1175–1197 (2014)

    Google Scholar 

  7. M. Kitsak, L.K. Gallos, S. Havlin, F. Liljeros, L. Muchnik, H.E. Stanley, H.A. Makes, Identification of influential spreaders in complex networks. Nat. Phys. 6, 888–893 (2010)

    Article  Google Scholar 

  8. Wu. Jian, L. Xinxue, S. Jiansheng, Y. Ting, W. Hankun, Satellite importance evaluation based on complex network. Fire Control Command Control 39(05), 60–63 (2014)

    Google Scholar 

  9. R. Chen, L.H. Qu, X. Peng, J. Yang, X. Dong, S. Liu, X. Li, Research on new energy big data service project evaluation based on improved TOPSIS. Electric Power Constr. 42(03), 126–134 (2021)

    Google Scholar 

  10. H.S. Shih, H.J. Shyur, E.S. Lee, An extension of TOPSIS for group decision making. Math. Comput. Model. 45(7), 801–813 (2007)

    Article  MATH  Google Scholar 

  11. Z. He. Simulation research of command information system based on complex network. University of Chinese Academy of Sciences (Xi 'an Institute of Optics and Fine Mechanics, Chinese Academy of Sciences) (2018).

  12. F. Cui, C. Wang, L. Lefei, A PageRank-like measure for evaluating process flexibility. IISE Trans. 55(2), 1–15 (2022)

    Google Scholar 

  13. K. Li, W. Wu, F. Liu, G. Chen, S. Chen, Critical node evaluation of weapon equipment System based on PageRank Algorithm. Fire Control Command Control 42(11), 34–37+42 (2017)

    Google Scholar 

  14. S.J. Kim, S.H. Lee, J.H. Bang, Implementation techniques to apply the PageRank algorithm. KIPS Trans. Part D 9D(5), 745–754 (2002)

    Article  Google Scholar 

  15. W. Dongtao, L. Xiaodong, L. Peng, C. Yujin, Research on effectiveness evaluation method of equipment system based on node importance and improved information entropy. Syst. Eng. Electron. 43(12), 3614–3623 (2001). ((in Chinese))

    Google Scholar 

  16. J.T. Clapp, R.C. Mancini, E.C. Harding, M.A. Schaeuble, A.J. Harvey-Thompson, Observation, and diagnostic application of Kr K-shell emission in magnetized liner inertial fusion experiments at Z. Rev. Sci. Instrum. 93(10), 103532 (2022)

    Article  Google Scholar 

  17. Q. Jun, W. Chaokun, G. Gaoyang, Dynamic network node betweenness center degree based on community update algorithm. J. Softw. 29(3), 853–868 (2018)

    MATH  Google Scholar 

  18. L. Panfeng. The influence maximization algorithm is based on voting mechanism research. Lanzhou University (2022). The DOI: 10.27204 /, dc nki. Glzhu. 2022.003229.

  19. R. Zhuoming, S. Feng, L. Jianguo, G. Qiang, W. Jinghong, Research on measurement method of network node importance based on degree and agglomeration coefficient. Acta Phys. Sin. 62(12), 522–526 (2013). ((in Chinese))

    Google Scholar 

  20. R. Yuping, L. Jingyu, Z. Dongfang, Evaluation method of network damage resistance and node importance. Comput. Eng. 35(06), 14–16 (2009)

    Google Scholar 

  21. Z. Chengcai, Q. Xiaogang, Feature measurement analysis of wireless sensor networks based on complex network theory. Computer Science 37(11), 44–46+49 (2010)

    Google Scholar 

Download references

Acknowledgements

Not applicable.

Funding

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Contributions

In this paper, CL carried out the whole node modeling part, JW carried out the local improvement and experiment, and RX was responsible for the information entropy evaluation algorithm. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Rui Xia.

Ethics declarations

Competing interests

The authors declare that they have no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, C., Wang, J. & Xia, R. Node importance evaluation in multi-platform avionics architecture based on TOPSIS and PageRank. EURASIP J. Adv. Signal Process. 2023, 27 (2023). https://doi.org/10.1186/s13634-023-00979-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13634-023-00979-3

Keywords