ارزیابی معیارهای عملیات شبکه محور بر پایه روش دیمتل

نوع مقاله : مقاله پژوهشی

نویسندگان

1 دانشجوی دکتری، دانشگاه جامع امام حسین(ع)

2 استادیار، دانشگاه جامع امام حسین(ع)

3 استادیار، دانشکده مهندسی صنایع و سیستم‌ها، دانشگاه تربیت مدرس

4 استادیار، گروه مهندسی کامپیوتر، دانشگاه آزاد اسلامی واحد میبد، یزد

چکیده

عملیات شبکه محوری از تهدیدات پیش­روی جمهوری اسلامی ایران است؛ بنابراین، شناخت عملیات شبکه محور و معیار­های اصلی آن، مسئله‌ای اساسی است که باید از منظرهای مختلف برای مقابله با چنین تهدیدی مورد بررسی و ارزیابی قرار گیرد. ارزیابی دقیق مسئله با توجه به بازخوردها و تأثیرات غیرمستقیمی که هر یک از معیار­ها نسبت به هم دارند آن را به یک مسئله پیچیده تبدیل نموده است. در این مقاله برای حل مسئله پیچیدگی با استفاده از روش دیمتل، به ارزیابی معیارهای اساسی مفهوم عملیات شبکه محور بر اساس تأثیرات پرداخته است. این معیارها از لحاظ قلمرو درگیری در عصر اطلاعات دسته‌بندی‌شده و برای توصیف و تفسیر دقیق­تر، زیرمعیارهای بعضی از آن‌ها مشخص گردید. سپس میزان تأثیرگذاری، تأثیرپذیری، درجه اهمیت و ارتباط علی و معلولی معیارها نسبت به هم مورد ارزیابی قرارگرفته است. با استفاده از نظرات خبرگان نظامی، برمبنای تحلیل داده­ها، کیفیت حس­سازی فردی و کیفیت اطلاعات، تأثیرگذارترین معیار­ها      می­باشند. درجه حس­سازی اشتراکی تأثیرپذیرترین معیار و چابکی، حس­سازی فردی و همزمانی در رتبه­های بعدی می­باشند. از لحاظ اهمیت معیار­ها که به نوعی مراکز ثقل از منظر تاثیرمحوری می­باشند، حس­سازی دارای بالاترین رتبه و سپس کیفیت اطلاعات و تعاملات بین نیروهای آمریکا و متحدانش دارای رتبه­های بَعدی می­باشند. از منظر رابطه علت و معلولی، معیار کیفیت اطلاعات دارای بیشترین رتبه       به­عنوان «علت» و اثربخشی و چابکی به­عنوان «معلول» می­باشند. دستاوردهای این ارزیابی در سطح راهبردی را می­توان اولویت­بندی    قلمرو­های تأثیرگذار و تأثیرپذیری در صحنه نبرد شبکه محور اشاره نمود. در راستای تائید نظر خبرگان سایبرالکترونیک دستاوردِ مهم دیگر، مؤثر بودن نقش و جایگاه قابلیت­های سایبرالکترونیک در صحنه نبرد عملیات شبکه محور است که بایستی مورد ارزیابی دقیق قرار گیرد. شبیه­سازی و تحلیل داده در محیط نرم‌افزاری متلب انجام­ شده­ است.

کلیدواژه‌ها


عنوان مقاله [English]

Evaluation of Network-Based Operation Criteria Based on DEMATEL Method

نویسندگان [English]

  • M. Mollazadeh Golmahalle 1
  • H. R. Lashgarian 2
  • M. Sheikhmohammadi 3
  • K. Mirzaei 4
1 imam hossein university
2 Modarres tarbiat university
3 Modarres tarbiat university
4 azad meibod
چکیده [English]

US Network Centric Warfare is one of the threats lying ahead of the Islamic Republic of Iran. To deal with such a threat, recognizing the Network Centric Warfare (NCW) and its main criteria are fundamental issues that must be examined from different perspectives. The multiplicity of interdependencies, feedbacks and direct and indirect interactions between components and criteria of network centric operations, has turned the comparison and evaluation to a complicated problem. To tackle this complex problem, in this paper we used DEMATEL's method. The level of influence, impact, degree of importance, and causal     relationship of criteria to each other are evaluated. Based on data analysis, individual sensemaking and quality of information, are the most influential criteria. The degree of shared sensemaking is the most     effective criterion and agility, individual sensemaking and synchronization follow next in rank. In terms of the importance of criteria that are somehow centroid in terms of impact, sensemaking has the highest rank and then the quality of information and interactions between the forces and their allies have the next rank. From the perspective of the cause and effect relationship, the quality of information criteria has the highest rank as a " cause"  and effectiveness and agility as " effects" .The achievements of this strategic assessment can be focused on prioritizing active and passive regions in the network centric battle scene. Confirming the cyber-electronic experts’ opinion, another important achievement is the effectiveness of the role and status of cyber-electronic capabilities in the network centric operation battle scene, which needs to be assessed accurately. Simulation and data analysis have been done in MATLAB software.
 

کلیدواژه‌ها [English]

  • Network-centric warfare
  • cyber-electronic capabilities
  • multi-criteria decision making
  • DEMATEL method
  • Effective Base Approach
   [1]      H. Tunnell, “Task Force Stryker Network-Centric Operations in Afghanistan,” National Defense University Center for Technology and National Security Policy, Washington, DC. 2011.##
   [2]      Byford (Group Captain Alistair), “Air Power Review: Network Enabled Capability, Air Power and Irregular Warfare: The Israeli Air ForceExperience in the Lebanonand Gaza,2006-2009,” Director Defence Studies (RAF), 2010.##
   [3]      R. McDermott, “Russia Tests Network-Centric Air Operations in Syria,” Eurasia Daily Monitor, vol. 12, Issue. 184, 2015.##
   [4]      R. McDermott, “Russia’s Network-Centric Warfare Experiment in Syria,” Eurasia Daily Monitor, vol. 13, Issue. 76, 2016.##
   [5]      US. DOD, “Net-Centric Environment Joint Functional Concept,” US Department of Defense, Washington, DC, 2005.##
   [6]      J.Moffat, “Complexity Theory and Network Centric Warfare,” Wishington,DC, 2003.##
   [7]      US. OFT(Office of Force Transformation), “Network Centric Operations Conceptual Framework Version 1.0,” Evidence Based Research Inc, 2003.##
   [8]      US. DoD, “Network Centric Warfare,” Department of Defense Report to Congress, Washington, DC, 2001.##
   [9]      G. Hollywood, etc, “Network-centric operations case study:  air-to-air combat with and without Link 16,” the RAND Corporation, 2005.##
[10]      US. GOV, “PUBLIC LAW 106–398,” 2001.##
[11]      L. Money (DOD), “Report on Network Centric Warfare Sense of the Report,” DOD, 2001.##
[12]      DOD, “Network Centric Operations (NCO) Case Study. U.S. Navy’s Fifth Fleet Task Force 50 in Operation Enduring Freedom,” Department of Defense Office, 2006.##
[13]      D. Gonzales, “Network-centric operations case study: the Stryker Brigade Combat Team,” the RAND Corporation, 2005.##
[14]      D. Cammons and J. B. Tisserand, “Network Centric Warfare Case Study, U.S. V. Corps and Third Infantry Division during Operation Iraqi,” United States Army War College, 2003.##
[15]      P. A. Consulting Group, “A Network Centric Operations Case Study: US/UK Coalition Combat Operations during Operation Iraqi Freedom,” Jun. 2004.##
[16]      U. S. Military and U.S.Government, “Task Force Stryker Network-Centric Operations in Afghanistan - Case Study of Real-World Application in War,” Network Components, Echeloning Command Posts, Tactical Decisionmaking, 2017.##
[17]      M. Fesharaki and A. Fetant, “An agent-based architecture based on multifaceted commitment to simulate network centric warfare,” in Fourth Conference on Command and Control of Iran, 2010. (In Persian)##
[18]      M. Fesharaki, A. Shakiba, and A. Fetanat, “Using the JDL and Sasa Reference Models in the Conceptual Development of the Intelligent Knowledge Center for Network centric Warfare,” in Fourth Conference on Command and Control of Iran, 2010. (In Persian)##
[19]      A. Shakibamanesh, J. izadi, and H. Almasian, “Comparison of Network Centric Warfare and system of systems,” in Seventh Conference on Command and Control, 2013. (In Persian)##
[20]      M. Fesharaki and A. Fetanat, “Object-Oriented Modeling of Shared Situation Awarness System in NCW                    Decision-Making,” in Fourth Conference on Command and Control of Iran, 2010. (In Persian)##
[21]      M. Howard and P. Paret, “Carl Von Clausewitz on War,” p. 556, 1976.##
[22]      E. P. O. C4ISR, “White Paper on Traning, Planing and System Development for EBO,” 2000.##
[23]      “The Advent of new Way of War: Theory and Practice of Effect Based Operations,” Institute of Defence and Strategic Studies Singapore, 2003.##
[24]      Sheng-Li and Si Hu-Chen Liuetc, “DEMATEL Technique: A Systematic Review of the State-of-the-Art Literature on Methodologies and Applications,” Mathematical Problems in Engineering, 2018.##
[25]      Y. J. Chen, H. C. Tzeng, and G. H. Shyu, “Marketing strategy based on customer behavior for the LCD-TV,” International Journal of Management and Decision Making, 2006.##
[26]      J. H. Tzeng and G. H. Liou Chang, “Airline safety measurement using a hybrid model,” Air Transport Management, 2007.##
[27]      A. Taghizadeh, et al, “Using DEMATEL – Analytic network process (ANP) hybrid algorithm approach for selecting improvement projects of Iranian excellence model in healthcare sector,” African Journal of Business Management, 2012.##
[28]      L. Abdullah and N. Zulkifi, “Integration of fuzzy AHP and interval type-2 fuzzy DEMATEL: an application to human resource management,” Expert Systems with Applications, pp. 4397–4409, 2015.##
[29]      A. Nikjoo and M. Saeedpoor, “An intuitionistic fuzzy DEMATEL methodology for prioritising the components of SWOTmatrix in the Iranian insurance industry,” International Journal, pp. 439–452, 2014.##
[30]      K. Govindan, R. Khodaverdi, and A. Vafadarnikjoo, “Intuitionistic fuzzy based DEMATEL method for developing greenpractices and performances in a green supply chain,” Expert Systems with Applications, pp. 7207–7220, 2015.##
[31]      W. Suo, B. Feng, and P. Fan, “Identifying risk factors of IT outsourcing using interdependent information: an extended DEMATEL method,” xpert Systems with Applications, pp. 3832–3840, 2012.##
[32]      H. Liu, Ch. Lu, et al, “Evaluating health-care waste treatment technologies using a hybrid multi-criteria decision making model,” Renewable & Sustainable Energy Reviews, pp.      932-942, 2015.##
[33]      X. Zhang, Y. Deng, and S. Mahadevan, “An evidential DEMATEL method to identify critical success factors in emergency management,” Applied soft Computing, pp.      504-510, 2014.##