Journal of Systems Engineering and Electronics ›› 2020, Vol. 31 ›› Issue (3): 551-566.doi: 10.23919/JSEE.2020.000034
• Systems Engineering • Previous Articles Next Articles
Ziyi CHEN(), Yajie DOU*(), Xiangqian XU(), Yuejin TAN()
Received:
2019-05-13
Online:
2020-06-30
Published:
2020-06-30
Contact:
Yajie DOU
E-mail:chenziyi_nudt@163.com;yajiedou_nudt@163.com;xuxiangqian18@163.com;yjtan@nudt.edu.cn
About author:
CHEN Ziyi was born in 1995. He is a Ph.D. student in National University of Defense Technology. His research interests are complex systems and system portfolio selection and optimization. E-mail: Supported by:
Ziyi CHEN, Yajie DOU, Xiangqian XU, Yuejin TAN. Service-oriented weapon systems of system portfolio selection method[J]. Journal of Systems Engineering and Electronics, 2020, 31(3): 551-566.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
Table 1
Mapping relation between system portfolio and service portfolio"
Weapon system portfolio | Relation | Service portfolio |
Weapons (equipped, developed, or to be developed) | Construct | Elements of the bottom level in the service portfolio |
Weapon portfolio (all, feasible or optimal) | Provide | Service |
Multi-task combat | Correspond | Multi-scenario |
Objective | Correspond | Objective |
Selection | Determine | Availability of the elements |
Collaboration between weapons | Correspond | Interconnection between elements |
Scale of weapons | Determine | Number of elements |
Table 5
Service-weapon system mapping matrix in terms of service quality"
System | Ser1 | Ser2 | Ser3 | Ser4 | Ser5 | Ser6 | Ser7 | Ser8 | Ser9 | Ser10 | Ser11 | Ser12 |
Sys1 | 0.00 | 0.00 | 0.91 | 0.00 | 0.28 | 0.00 | 0.00 | 0.00 | 0.97 | 0.00 | 0.00 | 0.00 |
Sys2 | 0.42 | 0.00 | 0.00 | 0.00 | 0.00 | 0.85 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 |
Sys3 | 0.71 | 0.28 | 0.10 | 0.00 | 0.00 | 0.00 | 0.00 | 0.44 | 0.00 | 0.00 | 0.00 | 0.49 |
Sys4 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | 0.12 | 0.00 | 0.00 | 0.00 | 0.00 |
Sys5 | 0.75 | 0.51 | 0.00 | 0.00 | 0.00 | 0.00 | 0.15 | 0.84 | 0.81 | 0.93 | 0.00 | 0.25 |
Table 6
Service-weapon system mapping matrix in terms of response time"
System | Ser1 | Ser2 | Ser3 | Ser4 | Ser5 | Ser6 | Ser7 | Ser8 | Ser9 | Ser10 | Ser11 | Ser12 |
Sys1 | 0.0 | 0.0 | 5.7 | 0.0 | 9.8 | 0.0 | 0.0 | 0.0 | 6.8 | 0.0 | 0.0 | 0.0 |
Sys2 | 8.2 | 0.0 | 0.0 | 0.0 | 0.0 | 5.1 | 0.0 | 0.0 | 0.0 | 0.0 | 0.0 | 0.0 |
Sys3 | 4.9 | 8.4 | 1.8 | 0.0 | 0.0 | 0.0 | 0.0 | 2.2 | 0.0 | 0.0 | 0.0 | 2.6 |
Sys4 | 0.0 | 0.0 | 0.0 | 0.0 | 0.0 | 0.0 | 0.0 | 4.5 | 0.0 | 0.0 | 0.0 | 0.0 |
Sys5 | 8.5 | 8.2 | 0.0 | 0.0 | 0.0 | 0.0 | 1.5 | 4.6 | 5.7 | 4.8 | 0.0 | 6.9 |
Table 7
Service portfolio computing result"
No. | Service portfolio | Number of portfolios | Connectivity | Flexibility |
1 | {Ser1, Ser2, Ser3, Ser4, Ser5, Ser6, Ser7, Ser8, Ser9, Ser10, Ser11, Ser12} | 1 | 1.761 4 | 0.000 0 |
2 | {Ser10, Ser11, Ser12} | 12 | 1.619 9 | 0.379 4 |
{Ser6, Ser7, Ser8, Ser9, Ser12} | ||||
{Ser5, Ser6, Ser7, Ser8, Ser9, Ser10, Ser11, Ser12} | ||||
{Ser4, Ser5, Ser7, Ser8, Ser9, Ser11} | ||||
{Ser3, Ser4, Ser5, Ser6, Ser7, Ser8, Ser9, Ser10, Ser11, Ser12} | ||||
{Ser3, Ser4, Ser5, Ser6, Ser7, Ser8, Ser9, Ser10, Ser11, Ser12} | ||||
{Ser2, Ser3, Ser5, Ser6, Ser9, Ser11} | ||||
{Ser2, Ser3, Ser4, Ser5, Ser6, Ser8, Ser9, Ser10, } | ||||
{Ser2, Ser3, Ser4, Ser5, Ser6, Ser7, Ser8, Ser9, Ser11, Ser12} | ||||
{Ser1, Ser2, Ser3, Ser5, Ser6, Ser7, Ser8, Ser9, Ser11, Ser12} | ||||
{Ser1, Ser3, Ser4, Ser5, Ser6, Ser9, Ser10} | ||||
{Ser1, Ser2, Ser3, Ser5, Ser6, Ser8, Ser9, Ser10} | ||||
3 | / | 12 | 1.313 0 | 0.676 3 |
4 | 12 | 1.592 7 | 0.542 4 | |
5 | / | 12 | 1.611 3 | 0.493 2 |
6 | / | 12 | 1.451 3 | 0.602 7 |
7 | / | 12 | 1.564 4 | 0.549 1 |
8 | / | 12 | 1.362 3 | 0.664 4 |
9 | / | 12 | 1.213 1 | 0.719 9 |
10 | / | 12 | 1.525 6 | 0.586 4 |
11 | / | 12 | 1.396 5 | 0.634 3 |
12 | / | 12 | 1.479 7 | 0.599 5 |
13 | / | 12 | 1.218 1 | 0.704 3 |
14 | / | 12 | 1.614 8 | 0.464 3 |
15 | / | 12 | 1.613 5 | 0.491 1 |
16 | / | 12 | 1.523 0 | 0.596 0 |
17 | / | 12 | 1.262 7 | 0.688 7 |
18 | / | 12 | 1.269 8 | 0.678 9 |
19 | / | 12 | 1.465 1 | 0.601 9 |
20 | / | 12 | 1.446 0 | 0.631 8 |
21 | / | 12 | 1.104 4 | 0.727 3 |
22 | / | 12 | 1.253 0 | 0.694 4 |
23 | / | 12 | 1.365 7 | 0.641 2 |
24 | / | 12 | 1.538 9 | 0.553 6 |
25 | {Ser10, Ser11, Ser12} | 12 | 1.393 5 | 0.636 0 |
{Ser6, Ser7, Ser8, Ser9} | ||||
{Ser5, Ser7, Ser8, Ser9, Ser11, Ser12} | ||||
{Ser5, Ser6, Ser9} | ||||
{Ser4, Ser5, Ser6, Ser8, Ser9, Ser12} | ||||
{Ser3, Ser4, Ser5, Ser6, Ser9, Ser10, Ser11} | ||||
{Ser2, Ser5, Ser6, Ser9} | ||||
{Ser2, Ser4, Ser6, Ser9} | ||||
{Ser2, Ser3, Ser4, Ser5, Ser6, Ser7, Ser8, Ser9, Ser10, Ser12} | ||||
{Ser1, Ser6, Ser9} | ||||
{Ser1, Ser5, Ser6, Ser9} | ||||
{Ser1, Ser2, Ser3, Ser6, Ser9} |
Table 8
System portfolio computing result"
No. | Connectivity | Flexibility |
2 | 4.974 8 | 4.303 5 |
3 | 5.054 2 | 4.505 0 |
4 | 5.582 5 | 5.056 7 |
5 | 5.331 2 | 4.722 5 |
6 | 5.679 7 | 5.125 4 |
7 | 5.909 6 | 5.406 5 |
8 | 5.439 7 | 4.829 8 |
9 | 5.776 8 | 5.196 5 |
10 | 5.943 3 | 5.429 9 |
11 | 5.550 5 | 4.950 1 |
12 | 5.332 1 | 4.736 8 |
13 | 5.312 0 | 4.697 9 |
14 | 5.157 2 | 4.512 5 |
15 | 5.007 6 | 4.414 7 |
16 | 5.247 1 | 4.609 0 |
17 | 4.266 7 | 3.497 5 |
18 | 5.559 0 | 5.031 2 |
19 | 4.798 3 | 4.133 0 |
20 | 5.688 4 | 5.125 7 |
21 | 5.301 2 | 4.661 6 |
22 | 5.168 1 | 4.598 1 |
23 | 5.167 6 | 4.517 3 |
24 | 4.849 1 | 4.144 2 |
25 | 4.877 8 | 4.219 1 |
26 | 5.473 3 | 4.920 2 |
27 | 5.257 7 | 4.650 7 |
28 | 5.792 1 | 5.265 1 |
29 | 5.442 7 | 4.846 3 |
30 | 5.556 7 | 4.989 6 |
31 | 5.865 0 | 5.363 1 |
32 | 4.779 4 | 4.038 2 |
33 | 5.357 7 | 4.779 3 |
34 | 5.358 1 | 4.796 5 |
35 | 5.371 6 | 4.827 4 |
36 | 5.841 7 | 5.316 9 |
37 | 5.776 0 | 5.149 0 |
38 | 5.521 3 | 4.948 6 |
39 | 5.466 0 | 4.886 1 |
40 | 5.603 8 | 5.107 7 |
Table 9
Service portfolio-weapon systems decoding"
Service portfolio | Weapon system selection |
{Ser10, Ser11, Ser12}+{Ser7, Ser8, Ser9}+{Ser4, Ser5, Ser6, Ser7, Ser8, Ser9, Ser11, Ser12}+{Ser3, Ser5, Ser6, Ser8, Ser9, Ser10}+{Ser3, Ser5, Ser6, Ser8, Ser9, Ser12}+{Ser3, Ser4, Ser5, Ser6, Ser7, Ser8, Ser9, Ser11, Ser12}+{Ser2, Ser3, Ser4, Ser5, Ser6, Ser9}+{Ser2, Ser3, Ser4, Ser5, Ser6, Ser8}+{Ser2, Ser3, Ser4, Ser5, Ser6, Ser7, Ser8, Ser9, Ser10, Ser11, Ser12}+{Ser1, Ser3, Ser6, Ser9}+{Ser1, Ser3, Ser4, Ser5, Ser6, Ser9}+ {Ser1, Ser2, Ser3, Ser4, Ser5, Ser6, Ser9} | {Sys5, Sys3, Sys3}+{Sys3, Sys5, Sys5}+{Sys2, Sys1, Sys2, Sys5, Sys4, Sys5, Sys3, Sys3}+{Sys3, Sys1, Sys2, Sys4, Sys5, Sys5}+{Sys3, Sys1, Sys2, Sys4, Sys1, Sys3}+{Sys3, Sys4, Sys1, Sys2, Sys5, Sys3, Sys5, Sys3, Sys5}+{Sys3, Sys3, Sys2, Sys1, Sys2, Sys1}+{Sys3, Sys3, Sys2, Sys1, Sys2, Sys5}+{Sys3, Sys3, Sys2, Sys1, Sys2, Sys5, Sys3, Sys1, Sys5, Sys3, Sys5}+{Sys3, Sys1, Sys2, Sys5}+{Sys3, Sys3, Sys4, Sys1, Sys2, Sys5}+{Sys3, Sys3, Sys3, Sys2, Sys1, Sys2, Sys5} |
1 | MARKOWITZ H. Portfolio selection. Journal of Finance, 2012, 7 (1): 77- 91. |
2 |
A C X, LI Z F, WANG F. Optimal investment strategy under time-inconsistent preferences and high-water mark contract. Operations Research Letters, 2016, 44 (2): 212- 218.
doi: 10.1016/j.orl.2015.12.013 |
3 |
MÜLLER S, HAASE K. On the product portfolio planning problem with customer-engineering interaction. Operations Research Letters, 2016, 44 (3): 390- 393.
doi: 10.1016/j.orl.2016.03.013 |
4 | NATH P, RAMANATHAN R. Environmental management practices, environmental technology portfolio, and environmental commitment: a content analytic approach for UK manufacturing firms. International Journal of Production Economics, 2015, 171 (1/3): 427- 437. |
5 |
KANGASPUNTA J. Cost-efficiency analysis of weapon system portfolios. European Journal of Operational Research, 2012, 223 (1): 264- 275.
doi: 10.1016/j.ejor.2012.05.042 |
6 | LEE J, KANG S H, ROSENBERGER J, et al. A hybrid approach of goal programming for weapon systems selection. Computers & Industrial Engineering, 2010, 58 (3): 521- 527. |
7 | ZHOU D Y, HUANG H L, TENG C Y, et al. Project selection of robust portfolio models with incomplete information. Journal of Finance and Investment Analysis, 2012, 1 (2): 157- 199. |
8 | KARVETSKI C W, LAMBERT J H, LINKOV I. Scenario and multiple criteria decision analysis for energy and environmental security of military and industrial installations. Integrated Environmental Assessment & Management, 2011, 7 (2): 228- 236. |
9 | MANE M, DAVENDRALINGAM N, DELAURENTIS D. Capability and development risk management in system-of-systems architectures: a portfolio approach to decision-making. Proc. of the 9th Annual Acquisition Research Symposium, 2012, 1, 62- 73. |
10 |
GOROD A, SAUSER B, BOARDMAN J. System-of-systems engineering management: a review of modern history and a path forward. IEEE Systems Journal, 2008, 2 (4): 484- 499.
doi: 10.1109/JSYST.2008.2007163 |
11 | LEE S K, MOGI G, HUI K S. A fuzzy analytic hierarchy process (AHP)/data envelopment analysis (DEA) hybrid model for efficiently allocating energy R & D resources: in the case of energy technologies against high oil prices. Renewable & Sustainable Energy Reviews, 2013, 21, 347- 355. |
12 | CHENG B, JIANG J, TAN Y J, et al. A novel approach for WSoS capability requirement satisfactory degree evaluation using evidential reasoning. Systems EngineeringjjTheory & Practice, 2011, 31 (11): 2210- 2216. |
13 | GUAN Q B, YU X H. Research on evaluation of equipment's contribution to system warfighting. Journal of Equipment Academy, 2015, 26 (3): 1- 5. |
14 | DoD Architecture Framework Working Group. DoD architecture framework version 1.5. Washington, DC: Department of Defense, 2007. |
15 | DoD Architecture Framework Working Group. DoD architecture framework version 2.0. Washington, DC: Department of Defense, 2009. |
16 | MoD Partners. MOD architecture framework version 1.2. London: Ministry of Defence, 2005. |
17 | NATO Consultation, Command and Control Board. NATO architecture framework version 3.0. Brussels: NATO Consultation, Command and Control Board, 2007. |
18 | WU J, TAN S Y, TAN Y J, et al. Invulnerability analysis of complex networks based on natural connectivity. Complex Systems and Complexity Science, 2014, 11 (1): 77- 86. |
19 |
WU J, BARAHONA M, TAN Y J, et al. Natural connectivity of complex networks. Chinese Physics Letters, 2010, 27 (7): 078902.
doi: 10.1088/0256-307X/27/7/078902 |
20 |
WU J, BARAHONA M, TAN Y J, et al. Spectral measure of structural robustness in complex networks. IEEE Trans. on Systems Man and CyberneticsjjPart A: Systems and Humans, 2011, 41 (6): 1244- 1252.
doi: 10.1109/TSMCA.2011.2116117 |
21 | MKAOUER W, KESSENTINI M, SHAOUT A, et al. Many-objective software remodularization using NSGA-Ⅲ. ACM Trans. on Software Engineering and Methodology, 2015, 24 (3): 1- 45. |
22 |
DEB K, JAIN H. An evolutionary many-objective optimization algorithm using reference-point-based nondominated sorting approach, part Ⅰ: solving problems with box constraints. IEEE Trans. on Evolutionary Computation, 2014, 18 (4): 577- 601.
doi: 10.1109/TEVC.2013.2281535 |
[1] | Yun SUN, Ying WANG, Xiangfei MENG, Chaoqi FU, Chengkun LUO. New approach for uncertain random multi-objective programming problems based on CESD criterion [J]. Journal of Systems Engineering and Electronics, 2021, 32(3): 619-630. |
[2] | Jiuyao JIANG, Jichao LI, Kewei YANG. Weapon system portfolio selection based on structural robustness [J]. Journal of Systems Engineering and Electronics, 2020, 31(6): 1216-1229. |
[3] | Xiangfei MENG, Ying WANG, Chao LI, Xiaoyang WANG, Maolong LYU. Approach for uncertain multi-objective programming problems with correlated objective functions under CEV criterion [J]. Journal of Systems Engineering and Electronics, 2018, 29(6): 1197-1208. |
[4] | Feng Yang, Chenchen Yang, Liang Liang, and Shaofu Du. New approach to determine common weights in DEA efficiency evaluation model [J]. Journal of Systems Engineering and Electronics, 2010, 21(4): 609-615. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||