Next Article in Journal
Forward and Backward Recalling Sequences in Spatial and Verbal Memory Tasks: What Do We Measure?
Previous Article in Journal
A Secure Scheme Based on a Hybrid of Classical-Quantum Communications Protocols for Managing Classical Blockchains
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Evolutionary Method of Heterogeneous Combat Network Based on Link Prediction

Communication and Network Laboratory, Dalian University, Dalian 116622, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(5), 812; https://doi.org/10.3390/e25050812
Submission received: 4 April 2023 / Revised: 6 May 2023 / Accepted: 11 May 2023 / Published: 17 May 2023
(This article belongs to the Topic Complex Systems and Network Science)

Abstract

:
Currently, research on the evolution of heterogeneous combat networks (HCNs) mainly focuses on the modeling process, with little attention paid to the impact of changes in network topology on operational capabilities. Link prediction can provide a fair and unified comparison standard for network evolution mechanisms. This paper uses link prediction methods to study the evolution of HCNs. Firstly, according to the characteristics of HCNs, a link prediction index based on frequent subgraphs (LPFS) is proposed. LPFS have been demonstrated on a real combat network to be superior to 26 baseline methods. The main driving force of research on evolution is to improve the operational capabilities of combat networks. Adding the same number of nodes and edges, 100 iterative experiments demonstrate that the evolutionary method (HCNE) proposed in this paper outperforms random evolution and preferential evolution in improving the operational capabilities of combat networks. Furthermore, the new network generated after evolution is more consistent with the characteristics of a real network.

1. Introduction

The research on network modeling and dynamic evolution characteristics of weapons and equipment is a very important practical issue in information age warfare. Heterogeneous networks provide a suitable model for describing real combat networks. Previous research on combat networks has mainly focused on homogeneous networks, but, in reality, combat networks are composed of a large number of heterogeneous nodes and edges with different functions. So far, there has been little research on HCNs. The network motif is a subgraph pattern that appears more frequently in the network than other structures, which can help understanding of the formation principles or evolving mechanics of complex network [1]. Because of the complex nonlinear relationships and emergence among combat units in a combat network, the implicit pattern information in the combat network can be used to build combat network models and analyze these complex collaborative relationships. In combat networks, collaborative interactions abound. From a combat network perspective, only when certain specific combat units are combined to form a structure can it have higher operational capabilities. Arbitrarily removing nodes or edges from them will reduce operational performance. Multiple combat units collaborate to form an operation chain, which constitutes the combat capability of the entire combat network. Mining subgraph patterns of combat networks can help understand and explain the potential properties of combat networks, providing a new research perspective for combat network modeling, evolution, and recovery. In this paper, we first consider frequent subgraph structures in combat networks. Then, by comparing the differences between subgraphs, we predict the location of new collaborative relationships and combat units that will appear. After that the combat network evolution simulation is conducted. A standardized operational capability metric is applied to evaluate the performance changes of an HCN. The results show that, compared with traditional methods, the evolutionary method proposed in this paper can enable the combat network to evolve towards the direction of increasing operational capabilities, providing a new method for optimizing an HCN, which warrants in-depth research.
The main advantages and contributions of the method proposed in this article are: (1) A new link prediction index is designed for HCNs. The link prediction method proposed in this paper (LPFS) has higher prediction accuracy and performs better than other baseline methods on HCNs. (2) LPFS can not only predict the emergence of new collaborative relationships, but can also predict the emergence of new nodes. This is a problem that traditional link prediction has difficulty solving. (3) A new evolutionary method for combat networks is proposed, which performs better in improving operational capabilities than preferential evolution and random evolution.
The main structure of the article is as follows: Section 2 mainly introduces relevant work; Section 3 presents an HCN model and describes the link prediction algorithm in detail; Section 4 introduces the definition and calculation of combat capabilities, as well as the evolution steps of HCNs; Section 5 analyzes the experimental results and Section 6 is the conclusion and summary.

2. Related Work

Complex network theory provides a new perspective and method for the study of war systems and complex systems. Traditional complex networks mainly focus on isomorphic networks (all nodes are of the same type or have the same functionality in the network), while real-world networks, such as author citation network [2], which include papers and authors, and social network [3], which include users and items, are heterogeneous networks composed of different types of entities and relationships. Compared to homogeneous networks, heterogeneous networks contain rich structural and semantic information, which can more accurately describe the complex relationships between entities. The research approach to network evolution is to model and abstract the topological structure of a network based on its key characteristics and real data [4]. A dynamic evolution model is used to replace the real network for research and analysis, focusing on exploring various indicators of the network after evolution under different conditions and times. Finally, the characteristics of the network are recognized and applied to practical construction. This requires a full understanding of the dynamic characteristics of networks. Researchers hope to explore the rules of network evolution by analyzing the evolution and dynamic processes of networks through data analysis and other means. The rationality of the evolution rules needs to be judged by testing whether they can provide more accurate link prediction. The research on combat network evolution aims to reveal the network dynamics mechanism during the evolution process. It uses simulation networks generated by network modeling to study real combat systems, and to explore and analyze their generation and evolution mechanisms. The key lies in the fact that the constructed combat system network model must truly reflect the realistic characteristics of the combat system, such as its composition and connection rules. Care [5] first used complex network methods to establish combat models in the information age. Dekker [6] simulated and analyzed the impact of different network types, such as regular networks, small-world networks, and scale-free networks on operational capability. Then there was further study on combat networks, including the robustness of combat network [7], and operational capability analysi [8,9].
Link prediction predicts future links or missing links based on observed information [10,11]. Most traditional link prediction algorithms are based on homogeneous networks, where the nodes and links are of the same type. Directly applying these methods to complex heterogeneous networks will lose a lot of information [12]. Currently, the application of link prediction in military applications is mainly based on the obtained enemy network topology, predicting or identifying key nodes in advance. If the prediction results are accurate, it will be conducive to optimizing the organizational structure of our military and attacking the key operational forces of the other party [13]. There is the difficulty, or even the impossibility, of obtaining a completely accurate military network. This means that enemy combat networks are usually incomplete and sparse. So, using traditional methods to predict combat network topology will fail. Therefore, some scholars have proposed a meta-path-based link prediction method that can simultaneously predict multiple types of connection [14,15]. Meta-path-based methods can utilize not only the observed structural link information but also the semantic information of meta-path features. Meta-path features reflect the basic connectivity of object pairs and are key to the mining and learning process of general heterogeneous networks. The selection of path characteristics determines the effectiveness of link prediction algorithms, which requires a sufficient understanding of network connectivity characteristics. Due to the high computational complexity, it is difficult to enumerate all meta paths for a given HCN. Existing research only considers meta paths with lengths of 2 and 3, ignoring the higher-order structures in the network. Although the meta-path-based approach achieves simultaneous prediction of different types of links, it is achieved by predicting a certain type of link separately.
The main method for studying the evolution of combat networks is to directly establish evolutionary models to speculate on the factors that affect combat networks. Due to the power law distribution of node degrees in combat networks, and the priority connection based on node degrees which can generate scale-free network [16], the degree priority evolutionary model is currently the main method for generating combat networks. However, the explanation of connection mechanisms in these models is relatively simple. Real complex networks exhibit many different attribute characteristics, which indicates that the connection mechanism of a network is likely to be determined by multiple mechanisms rather than a single one. Currently, there is also a lack of unified evaluation criteria. It is also unclear how these mechanisms collectively affect the evolution and capability of combat networks. This article uses the link prediction method to study the connection mechanism of combat networks. If the principle of the link prediction algorithm is consistent with the connection mechanism of the formation and evolution of combat networks, it can provide accurate predictions and can evaluate the connection mechanism based on the prediction results. Using link prediction to reveal network evolution mechanisms has been applied in trading network [17] to study the impact of different factors. However, as far as we know, there are few related applications in heterogeneous networks.
In this paper, the method of mining frequent subgraphs is used to discover features in combat networks. In a combat network, the capabilities of the combat system are composed of multiple operational chains. The capability of a single combat unit in a combat network is difficult to measure, and multiple combat units collaborate to form an operational chain, which constitutes the capability of the entire combat network. Studying the frequent subgraphs that appear in the combat network can indicate the evolution rules of the macrostructure from the microstructure, providing a new reference for the optimization of the combat network structure. Firstly, this utilizes the known operational network structure and complete data. Secondly, subgraphs can consider more hierarchical structures. There are many classical algorithms for mining frequent subgraphs, such as Grami [18], gSpan [19], etc., which also have good operational efficiency on large networks. Another challenge for network evolution and connectivity mechanisms is how to add constraints or control factors to the acquired evolution mechanisms to achieve the desired functional performance. This paper involves the design of different experiments to add edges and nodes to the network and calculates the changes in operational capabilities of the combat network during this evolution process.

3. Link Prediction Based on Frequent Subgraphs

Modern combat cycle theory suggests that the combat process is a cyclic process composed of observation, orientation, decision, and action (OODA) [20,21]. That is, the search node discovers the enemy target and transmits information to the decision node. After detailed analysis, the decision node transmits commands to the influence node. After receiving the commands, the influence node attacks the target. Therefore, according to the functions of combat units, they are divided into the following categories: (1) Search Node(S): Weapon equipment that uses sensors to collect target and battlefield information. Its main functions include target reconnaissance, intelligence acquisition, and battlefield surveillance. (2) Decision Node(D): Refers to weapons and equipment that have the functions of information processing and analysis, assisting decision-making, and implementing command and control over interfering entities. (3) Influence Node(I): Refers to the equipment entity that mainly performs operational damage operations, with specific functions, such as precision strike, fire damage, and electronic jamming.
Define an HCN as G = { V , E , L , M } , V is a set of nodes and E is a set of edges, M = { D , I , S } is a set of node types, and L = { S D , S I , D I , I I , D D } is a set of edge types. Figure 1 is a heterogeneous combat network, with red representing search nodes, green representing decision nodes, and blue representing influence nodes.

3.1. Link Prediction Index Design

This paper proposes a link prediction method based on frequent subgraphs. Firstly, frequent subgraphs must be mined on HCN. The frequent subgraph mining algorithm can obtain all frequent subgraph patterns that meet the support threshold from the graph. gSpan [19] is currently one of the most effective frequent subgraph mining algorithms in terms of mining efficiency and scalability, so it is used in experiments. Then compare the differences between different subgraphs. If only one edge (such as g1 and g2 in Figure 2) differs between two subgraphs, record the nodes and edge type. If two subgraphs differ by one node and one edge (such as g3 and g4 in Figure 2), record the missing node type and edge type. Algorithm 1 shows the specific steps. Firstly, the gSpan algorithm is used to mine frequent subgraphs that meet the threshold. As shown in Figure 2, g1, g2, g3, and g4 are frequent subgraphs in G, and g1 and g2 are isomorphic subgraphs that differ by one link, and g3 and g4 are isomorphic subgraphs that differ by one edge and one node. If their occurrence times are 8, 6, 10, and 6, respectively, then score (edge(3, 4) = 0.75, score(edge (nodeType (3), 2)) = 0.6.
Algorithm 1 Link prediction based on frequent subgraphs (LPFS)
Input: G, m i n _ s u p , m a x _ s i z e
Output:  s c o r e s
1:  f r e q u e n t _ s u b = g S p a n ( G , m i n _ s u p , m a x _ s i z e )
2: for  s u b 1 , s u b 2 in f r e q u e n t _ s u b do
3:    if  i s o m o r p h i s m ( s u b 1 , s u b 2 , m a x _ n = 1 ) then
4:       n o d e 1 , n o d e 2 , e d g e _ t y p e = f i n d _ e d g e ( s u b 1 , s u b 2 , G )
5:       s c o r e s [ n o d e 1 , n o d e 2 , e d g e _ t y p e ] + = c o u n t ( s u b 2 ) / c o u n t ( s u b 1 )
6:    end if
7: end for
8: return   s c o r e s

3.2. Link Prediction Evaluation Indicator

AUC (area under the receiver operation characteristic curve) is an indicator that measures the accuracy of link prediction algorithms in predicting the overall network, and is also the most widely used one. For example, its main content is to divide the set E into a training set E T and test set E P according to a certain proportion. E ¯ represents a nonexistent set of edges, U = E P + E T + E ¯ . The algorithm is executed in E T to obtain a predictive value matrix, with each edge e i j E ¯ E P obtaining a predictive value s c o r e ( i , j ) . Randomly select an edge from E P and E T , compare their scores, and repeat for n times, A U C = ( n 1 + 0.5 n 2 ) / n . ( n 1 is the number of times that the score of E P is higher than the score of E ¯ , and  n 2 is the number of times when the scores are equal). The larger the AUC value, the higher the accuracy of the algorithm’s prediction.

4. Evolution of Heterogeneous Combat Networks

The purpose of the design of link prediction indicators is to reveal the mechanism of network evolution, find the evolution method that best matches the characteristics of heterogeneous combat networks, and to establish a combat network evolution model. A new combat network is created that conforms to the structural characteristics of a real combat network through the establishment of collaborative relationships between combat unit entities in the network and the addition of combat unit entities. The network can then exhibit higher operational capabilities.

4.1. Heterogeneous Combat Network Operational Capabilities

In order to accomplish a specific combat mission, combat units with different functions collaborate to form an operational chain. The basic operational process of the operational chain is described as follows: The search node transmits the collected data and information to the decision node, which processes and analyzes it, and then issues a command to the influence node. The greater the number of operational chains, the stronger the operational capabilities of the operational network. At the same time, the length of the chain affects the efficiency of information transmission, and the shorter the battle chain, the higher the efficiency of information transmission. In this paper, the operational chain is defined as a path from the search node to the influence node, and this path includes at least one decision node. Therefore, how to calculate the number and length of operational chains is a key issue for operational capabilities calculation. The detailed steps are shown in Algorithm 2. max_len represents the maximum length of the path. Because the information transmission efficiency of an overly long chain is not high, the length of the chain is limited to 5.
Algorithm 2 Calculate operational networks ability (Cal_ability)
Input: G, m a x _ l e n
Output:  a b i l i t y
  1:  I = G . n o d e ( n o d e t y p e = = 1 )
  2:  S = G . n o d e ( n o d e t y p e = = 2 )
  3:  D = G . n o d e ( n o d e t y p e = = 3 )
  4: for s in S do
  5:    for i in I do
  6:      for  p a t h i n a l l _ s i m p l e _ p a t h ( G , s , i , c u t o f f = m a x _ l e n ) do
  7:         if  s i z e ( D . i n t e r s e c t i o n ( p a t h ) ) > = 1 a n d s i z e ( I . i n t e r s e c t i o n ( p a t h ) ) = = 1 then
  8:            a b i l i t y + = 1 / l e n ( p a t h )
  9:         end if
10:      end for
11:    end for
12: end for
13: return   a b i l i t y

4.2. Evolution of Heterogeneous Combat Networks

In order to study which evolutionary method can improve the operational capability of the combat network most rapidly, we designed two experiments, one involving only the establishment of collaborative relationships between combat unit entities, and the other involving the addition of new combat units. The specific experimental steps are shown in Algorithms 3 and 4. The establishment of cooperative relationships in combat networks is manifested as the increase in edges. The  e d g e _ n u m is the number of edges to be added. First, run LPFS on a combat network, and some unobserved connections in the network will receive a score. The larger the score, the more likely or necessary the connection is to be generated. Each time the LPFS is run, an edge with the largest score is added to the network. Finally, we obtain a new network and its operational capability after adding each new edge.
Algorithm 3 Heterogeneous Combat Networks Evolution (HCNE) add_edge
Input:  G , e d g e _ n u m , m a x _ l e n
Output:  n e w _ G , A b i l i t y
  1:  s c o r e s = L P F S ( G , m i n _ s u p , m a x _ s i z e )
  2:  s o r t ( s c o r e s , a s c e n d i n g = F a l s e )
  3: for i in e d g e _ n u m do
  4:    for  s c o r e in s c o r e s do
  5:      node1,node2,edge_type= scores.key()
  6:      if  ! G . h a s _ e d g e ( e d g e ( n o d e 1 , n o d e 2 , e d g e _ t y p e ) ) then
  7:           G . a d d _ e d g e ( e d g e )
  8:           C a l _ a b i l i t y ( G , m a x _ l e n )
  9:           s c o r e s = L P F S ( G , m i n _ s u p , m a x _ s i z e )
10:          s o r t ( s c o r e s , a s c e n d i n g = F a l s e )
11:         break
12:      end if
13:    end for
14: end for
15: return   n e w _ G , A b i l i t y
Algorithm 4 Heterogeneous Combat Networks Evolution (HCNE) add_node
Input:  G , n o d e s , m a x _ l e n
Output:  n e w _ G , A b i l i t y
  1:  s c o r e s = L P F S ( G , m i n _ s u p , m a x _ s i z e )
  2:  s o r t ( s c o r e s , a s c e n d i n g = F a l s e )
  3: for  n o d e in n o d e s do
  4:     d e g r e e ( n o d e ) = D e g r e e ( G , n o d e t y p e ( n o d e ) )
  5:    for i in d e g r e e ( n o d e ) do
  6:      for  s c o r e in s c o r e s do
  7:          n o d e 1 , n o d e 2 , e d g e _ t y p e = s c o r e s . k e y ( )
  8:         if  n o d e 1 = = n o d e t y p e ( n o d e ) then
  9:             G . a d d _ e d g e ( n o d e , n o d e 2 , e d g e _ t y p e )
10:            A b i l i t y . a p p e n d ( C a l _ a b i l i t y ( G , m a x _ l e n ) )
11:           break
12:         end if
13:         if  n o d e 2 = = n o d e t y p e ( n o d e ) then
14:            G . a d d _ e d g e ( n o d e 1 , n o d e , e d g e _ t y p e )
15:            A b i l i t y . a p p e n d ( C a l _ a b i l i t y ( G , m a x _ l e n ) )
16:           break
17:         end if
18:          s c o r e s = L P F S ( G , m i n _ s u p , m a x _ s i z e )
19:          s o r t ( s c o r e s , a s c e n d i n g = F a l s e )
20:      end for
21:    end for
22:  end for
23:  return   n e w _ G , A b i l i t y
If a new combat unit needs to be added to the combat network, it is first necessary to calculate the average degree of this type of node and determine how many nodes in the network should be connected to this node. Then run LPFS and find the most likely location in the network where this type of node is missing. The n o d e s is the set of nodes to be added. We then obtain a new network and its operational capability at each step of the evolution process. Finally, we obtain a new network and the operational capability value after adding each new node.

5. Experiments

The data set selected in this article is from [13,22]. The main topological characteristics of the data are shown in Table 1. |V| and |E| represent the total number of nodes and edges in the network, respectively. |S|, |D| and |I| represent the number of search nodes, decision nodes, and influence nodes, respectively. <k> is the average degree of the network, and <d> is the average shortest path of the network.

5.1. Link Prediction

Table 2 lists the AUC average and variance for 100 random partitions of different link prediction algorithms [10,13] when the test set ratio is 10%. These algorithms include similarity based on local information considering common neighbors and node degrees, such as CN, PA; path-based similarity indicators, such as LocalP and Katz; and similarity index based on random walk, such as RWR, SRW. The largest AUC value and the smallest variance value are in bold. It can be seen that the AUC value of LPFS has reached 0.86, which is higher than other methods, and is about 0.09 higher than the optimal LR [13], with a smaller variance. This indicates that the prediction accuracy of LPFS is higher and more stable.
As shown in Figure 3, LPFS outperforms almost all other link prediction algorithms when the proportion of test sets varies. The parameter set in the experiment is max_sup = 6, max_size = 4. When the test set proportion gradually increases and is greater than 30%, the AUC value of LPFS gradually decreases but remains high. When the test set proportion is greater than 30%, the AUC value of LPFS is slightly lower than LR. This is because, as there are more missing edges in the network, frequent subgraphs gradually decrease, and the information utilized by LPFS gradually decreases.

Parameter Discussion

Figure 4 shows the impact of min_sup and max_size changes on AUC (the training set ratio is 10%). Each polyline displays the effect of max_size on AUC when min_sup is the same. As can be seen from the figure, when max_ size = 3 or 4, the AUC value is the highest, with max_size gradually increasing and the AUC value gradually decreasing. However, when min_sup = 14, max_size ≤ 7, the AUC value is not high and remains around 0.65–0.7. However, when max_size > 7, AUC has increased and reached around 0.8. It can be concluded that, in a combat network, the pattern formed by 3–4 combat units occupies the dominant position, including most of the information in the combat network. At the same time, higher-order structures in operational networks can also express certain characteristics of operational networks. Therefore, when the LPFS utilizes subgraphs with fewer nodes, max_sup should be set to be smaller to avoid missing information and causing inaccurate prediction results. When using subgraphs with fewer nodes, the max_sup should be set higher, which can filter out much interference information.

5.2. Evolution of Heterogeneous Combat Networks

For comparison, random evolution and preferential evolution experiments were designed. When only adding edges, random evolution randomly selects two nodes to connect each time. Preferred evolution considers the node degree when selecting nodes. The greater the degree, the greater the probability of being selected. Figure 5 shows the changes in operational capabilities during the evolution process. In two experiments, we added 100 edges and 100 nodes to the network, respectively. The nodes are selected based on the proportion of different types of nodes in the original combat network. The order in which nodes are added is random. In the case of only adding edges without adding nodes, each additional edge improves the operational capability of the combat network to a certain extent. HCNE has the fastest and largest increase in operational capability, which is superior to preferential evolution and random evolution. When adding a new node to the network, how many old nodes should be connected depends on the average degree d of the type of node. Therefore, when randomly evolving to add nodes, the new node is randomly connected to d nodes in the network. During the preferential evolution, the probability of a new node selecting an old node is positively correlated with the degree of the old node. As shown in Figure 5, when the number of new nodes is less than 20, the impact of the three evolution methods on operational capabilities is not significantly different. However, when the number of nodes is greater than 20, the advantages of preferential evolution and HCNE gradually emerge, and HCNE is superior to preferential evolution. This advantage is even more evident when the number of new nodes is greater than 50.
Figure 6 shows the node degree distribution of the evolved new combat network. As can be seen, the node degree of the original combat network follows the power law distribution. The new network degree distribution generated by the HCNE is more consistent with the original network degree distribution, with the largest number of nodes having a degree of 4. In addition, the number of nodes with a degree greater than 13 in the network generated by HCNE is more than in other networks, which is also in line with the characteristics of combat networks. After the number of nodes and edges in the network increases, some decision nodes need to command and communicate with more nodes, becoming large-degree nodes in the network.
From the results of link prediction, the proposed method has the highest prediction accuracy. This suggests that our evolutionary model is plausible. In the process of evolution, we have selected the edge with the highest prediction score for connection every time, so each step is in line with the evolution of the combat network. It can also be seen from the changes in combat network combat capability that the evolution method proposed by us shows the greatest improvement in combat capability.

6. Summary and Analysis

Studying the evolution of HCNs has important practical significance. Currently, the research on the evolution of HCNs mainly focuses on directly establishing evolutionary models to speculate on the factors affecting network evolution, and it is difficult to quantitatively compare different models. This paper uses link prediction methods to study the evolution of combat networks and proposes a link prediction index based on frequent subgraphs. Considering the high-level interactions and rich node attribute information in combat networks, it provides a new method and perspective for revealing the evolution mechanism of combat networks. Firstly, the prediction accuracy of LPFS is better than that of other baseline methods. Secondly, applying this method to the evolution of combat networks, experiments have shown that adding the same number of nodes and edges can improve combat capabilities. Moreover, the final evolved combat network has the same degree distribution as the original network, which conforms to the characteristics of scale-free networks. This is of great significance for the simulation of real-world networks. Since combat networks are heterogeneous, the method is also applicable to citation networks, social networks and so on. It can also be used to solve cold start problems in recommended systems. In the future, the method should be validated in more datasets.
In addition, we can study more capabilities in the same combat network, such as overall capabilities, command capabilities, and logistics capabilities. However, how to define these capabilities is an important issue that needs to be solved urgently. We also need more real data. The key idea of this article is applicable to the study of network evolution. For example, we can also select a link prediction algorithm suitable for co-authored networks, and study the innovative changes of co-authored networks during evolution.

Author Contributions

Conceptualization, S.Q.; methodology, F.C.; software, F.C.; validation, Y.W. and J.Z.; formal analysis, F.C.; investigation, Y.W., J.Z.; resources, Y.W. and J.Z.; data curation, Y.W. and J.Z.; writing—original draft preparation, F.C.; writing—review and editing, F.C.; visualization, F.C.; supervision, S.Q.; project administration, S.Q.; funding acquisition, S.Q. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the fund project of the Equipment Development Department of the Central Military Commission grant number [No.6140002010101, No.6140001030111], and the APC was funded by Dalian University.

Data Availability Statement

The data presented in this study are available in [13].

Acknowledgments

We are very grateful for the combat network data provided by Changjun Fan of the National University of Defense Technology.

Conflicts of Interest

We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence the work reported in this paper.

References

  1. AbuOda, G.; De Francisci Morales, G.; Aboulnaga, A. Link prediction via higher-order motif features. In Proceedings of the Machine Learning and Knowledge Discovery in Databases: European Conference, Würzburg, Germany, 16–20 September 2019; Part I. Springer International Publishing: Cham, Switzerland, 2020; pp. 412–429. [Google Scholar]
  2. Zhao, F.; Zhang, Y.; Lu, J.; Shai, O. Measuring academic influence using heterogeneous author-citation networks. Scientometrics 2019, 118, 1119–1140. [Google Scholar] [CrossRef]
  3. Weng, L.; Zhang, Q.; Lin, Z.; Wu, L. Harnessing heterogeneous social networks for better recommendations: A grey relational analysis approach. Expert Syst. Appl. 2021, 174, 114771. [Google Scholar] [CrossRef]
  4. Zañudo, J.G.T.; Yang, G.; Albert, R. Structure-based control of complex networks with nonlinear dynamics. Proc. Natl. Acad. Sci. USA 2017, 114, 7234–7239. [Google Scholar] [CrossRef] [PubMed]
  5. Cares, J.R. An Information Age Combat Model; Alidade Incorporated: Newport, RI, USA, 2005. [Google Scholar]
  6. Dekker, A.H. Network topology and military performance. In MODSIM 2005 International Congress on Modelling and Simulation; Modelling and Simulation Society of Australia and New Zealand Inc.: Wageningen, The Netherlands, 2005; pp. 2174–2180. [Google Scholar]
  7. Li, J.; Tan, Y.; Yang, K.; Zhang, X.; Ge, B. Structural robustness of combat networks of weapon system-of-systems based on the operation loop. Int. J. Syst. Sci. 2017, 48, 659–674. [Google Scholar] [CrossRef]
  8. Li, J.; Zhao, D.; Jiang, J.; Yang, K.; Chen, Y. Capability oriented equipment contribution analysis in temporal combat networks. IEEE Trans. Syst. Man Cybern. Syst. 2018, 51, 696–704. [Google Scholar] [CrossRef]
  9. Chen, K.; Lu, Y.; Guo, L.; Zheng, X.; Wu, J.; Zhao, L. A Genetic Algorithm-Based Methodology for Analyzing the Characteristics of High-Operational-Capability Combat Networks. IEEE Access 2022, 10, 14717–14730. [Google Scholar] [CrossRef]
  10. Lü, L.; Zhou, T. Link prediction in complex networks: A survey. Phys. A Stat. Mech. Appl. 2011, 390, 1150–1170. [Google Scholar] [CrossRef]
  11. Kumar, A.; Singh, S.S.; Singh, K.; Biswas, B. Link prediction techniques, applications, and performance: A survey. Phys. A Stat. Mech. Appl. 2020, 553, 124289. [Google Scholar] [CrossRef]
  12. Wang, X.; Chai, Y.; Li, H.; Wu, D. Link prediction in heterogeneous information networks: An improved deep graph convolution approach. Decis. Support Syst. 2021, 141, 113448. [Google Scholar] [CrossRef]
  13. Fan, C.; Liu, Z.; Lu, X.; Xiu, B.; Chen, Q. An efficient link prediction index for complex military organization. Phys. A Stat. Mech. Appl. 2017, 469, 572–587. [Google Scholar] [CrossRef]
  14. Li, J.; Ge, B.; Yang, K.; Chen, Y.; Tan, Y. Meta-path based heterogeneous combat network link prediction. Phys. A Stat. Mech. Appl. 2017, 482, 507–523. [Google Scholar] [CrossRef]
  15. Li, J.; Zhao, D.; Ge, B.; Yang, K.; Chen, Y. A link prediction method for heterogeneous networks based on BP neural network. Phys. A Stat. Mech. Appl. 2018, 495, 1–17. [Google Scholar] [CrossRef]
  16. Dorogovtsev, S.N.; Mendes, J.F.F. Evolution of networks. Adv. Phys. 2002, 51, 1079–1187. [Google Scholar] [CrossRef]
  17. Lin, D.; Wu, J.; Xuan, Q.; Tse, C.K. Ethereum transaction tracking: Inferring evolution of transaction networks via link prediction. Phys. A Stat. Mech. Appl. 2022, 600, 127504. [Google Scholar] [CrossRef]
  18. Elseidy, M.; Abdelhamid, E.; Skiadopoulos, S.; Kalnis, P. Grami: Frequent subgraph and pattern mining in a single large graph. Proc. VLDB Endow. 2014, 7, 517–528. [Google Scholar] [CrossRef]
  19. Yan, X.; Han, J. gSpan: Graph-based substructure pattern mining. In Proceedings of the IEEE International Conference on Data Mining, Maebashi City, Japan, 9–12 December 2002; pp. 721–724. [Google Scholar]
  20. Richards, C. Boyd’s OODA loop. Necesse 2020, 5, 142–165. [Google Scholar]
  21. Dekker, A.H. Measuring the agility of networked military forces. J. Battlef. Technol. 2006, 9, 19–24. [Google Scholar]
  22. Chen, L.; Wang, C.; Zeng, C.; Wang, L.; Liu, H.; Chen, J. A novel method of heterogeneous combat network disintegration based on deep reinforcement learning. Front. Phys. 2022, 10, 1021245. [Google Scholar] [CrossRef]
Figure 1. Heterogeneous warfare network (HCN). Red representing search nodes, green representing decision nodes, and blue representing influence nodes.
Figure 1. Heterogeneous warfare network (HCN). Red representing search nodes, green representing decision nodes, and blue representing influence nodes.
Entropy 25 00812 g001
Figure 2. Example of frequent subgraphs with one edge apart.
Figure 2. Example of frequent subgraphs with one edge apart.
Entropy 25 00812 g002
Figure 3. AUC value changes of each link prediction algorithm with different test set proportions. The x-axis represents the proportion of the test set, the y-axis represents the AUC, and each line represents the AUC change of an index at different proportions of the test set.
Figure 3. AUC value changes of each link prediction algorithm with different test set proportions. The x-axis represents the proportion of the test set, the y-axis represents the AUC, and each line represents the AUC change of an index at different proportions of the test set.
Entropy 25 00812 g003
Figure 4. The effect of min_sup and max_size on AUC (when the training set ratio is 10%).
Figure 4. The effect of min_sup and max_size on AUC (when the training set ratio is 10%).
Entropy 25 00812 g004
Figure 5. Combat network capability changes using different evolutionary methods. The x-axis represents the evolution steps (adding a new connection or a new node at each step), and the y-axis represents operational capabilities.
Figure 5. Combat network capability changes using different evolutionary methods. The x-axis represents the evolution steps (adding a new connection or a new node at each step), and the y-axis represents operational capabilities.
Entropy 25 00812 g005
Figure 6. Combat network degree distribution. The x-axis represents the node degree, and the y-axis represents the number of nodes.
Figure 6. Combat network degree distribution. The x-axis represents the node degree, and the y-axis represents the number of nodes.
Entropy 25 00812 g006
Table 1. Topological Characteristics of Combat Networks.
Table 1. Topological Characteristics of Combat Networks.
|V||E||S||D||I|<k><d>
891502651123.4838.113
Table 2. AUC of link prediction.
Table 2. AUC of link prediction.
IndexLRCNSaltonJaccardSorensHPIHDILHNAA
AUC0.77710.61290.61180.60930.60930.6150.60790.61050.613
Var0.00250.00380.00380.00360.00360.00390.00360.00370.0038
Index RAPALNBCNLNBAALNBRALocalPKatzLHNIIACT
AUC0.6130.51440.60910.60910.60910.63240.62350.56320.4942
Var0.00380.00370.00390.00390.0040.00460.00540.00490.0053
IndexCosPlusRWRSimRLRW5SRWMFITSCNTSAALPFS
AUC0.76860.75490.73550.70270.69950.69440.6060.63750.86135
Var0.00200.00300.00280.00360.00400.00330.00570.00540.00037
The best parameters for some indexes are: Katz(0.001), LHNII(0.9), LRW(5), SRW(5), SimR(0.8)
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Qiu, S.; Chen, F.; Wang, Y.; Zhao, J. Evolutionary Method of Heterogeneous Combat Network Based on Link Prediction. Entropy 2023, 25, 812. https://doi.org/10.3390/e25050812

AMA Style

Qiu S, Chen F, Wang Y, Zhao J. Evolutionary Method of Heterogeneous Combat Network Based on Link Prediction. Entropy. 2023; 25(5):812. https://doi.org/10.3390/e25050812

Chicago/Turabian Style

Qiu, Shaoming, Fen Chen, Yahui Wang, and Jiancheng Zhao. 2023. "Evolutionary Method of Heterogeneous Combat Network Based on Link Prediction" Entropy 25, no. 5: 812. https://doi.org/10.3390/e25050812

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop