Evaluation of Network-Based Operation Criteria Based on DEMATEL Method

Document Type : Original Article

Authors

1 imam hossein university

2 Modarres tarbiat university

3 azad meibod

Abstract

US Network Centric Warfare is one of the threats lying ahead of the Islamic Republic of Iran. To deal with such a threat, recognizing the Network Centric Warfare (NCW) and its main criteria are fundamental issues that must be examined from different perspectives. The multiplicity of interdependencies, feedbacks and direct and indirect interactions between components and criteria of network centric operations, has turned the comparison and evaluation to a complicated problem. To tackle this complex problem, in this paper we used DEMATEL's method. The level of influence, impact, degree of importance, and causal     relationship of criteria to each other are evaluated. Based on data analysis, individual sensemaking and quality of information, are the most influential criteria. The degree of shared sensemaking is the most     effective criterion and agility, individual sensemaking and synchronization follow next in rank. In terms of the importance of criteria that are somehow centroid in terms of impact, sensemaking has the highest rank and then the quality of information and interactions between the forces and their allies have the next rank. From the perspective of the cause and effect relationship, the quality of information criteria has the highest rank as a " cause"  and effectiveness and agility as " effects" .The achievements of this strategic assessment can be focused on prioritizing active and passive regions in the network centric battle scene. Confirming the cyber-electronic experts’ opinion, another important achievement is the effectiveness of the role and status of cyber-electronic capabilities in the network centric operation battle scene, which needs to be assessed accurately. Simulation and data analysis have been done in MATLAB software.
 

Keywords


   [1]      H. Tunnell, “Task Force Stryker Network-Centric Operations in Afghanistan,” National Defense University Center for Technology and National Security Policy, Washington, DC. 2011.##
   [2]      Byford (Group Captain Alistair), “Air Power Review: Network Enabled Capability, Air Power and Irregular Warfare: The Israeli Air ForceExperience in the Lebanonand Gaza,2006-2009,” Director Defence Studies (RAF), 2010.##
   [3]      R. McDermott, “Russia Tests Network-Centric Air Operations in Syria,” Eurasia Daily Monitor, vol. 12, Issue. 184, 2015.##
   [4]      R. McDermott, “Russia’s Network-Centric Warfare Experiment in Syria,” Eurasia Daily Monitor, vol. 13, Issue. 76, 2016.##
   [5]      US. DOD, “Net-Centric Environment Joint Functional Concept,” US Department of Defense, Washington, DC, 2005.##
   [6]      J.Moffat, “Complexity Theory and Network Centric Warfare,” Wishington,DC, 2003.##
   [7]      US. OFT(Office of Force Transformation), “Network Centric Operations Conceptual Framework Version 1.0,” Evidence Based Research Inc, 2003.##
   [8]      US. DoD, “Network Centric Warfare,” Department of Defense Report to Congress, Washington, DC, 2001.##
   [9]      G. Hollywood, etc, “Network-centric operations case study:  air-to-air combat with and without Link 16,” the RAND Corporation, 2005.##
[10]      US. GOV, “PUBLIC LAW 106–398,” 2001.##
[11]      L. Money (DOD), “Report on Network Centric Warfare Sense of the Report,” DOD, 2001.##
[12]      DOD, “Network Centric Operations (NCO) Case Study. U.S. Navy’s Fifth Fleet Task Force 50 in Operation Enduring Freedom,” Department of Defense Office, 2006.##
[13]      D. Gonzales, “Network-centric operations case study: the Stryker Brigade Combat Team,” the RAND Corporation, 2005.##
[14]      D. Cammons and J. B. Tisserand, “Network Centric Warfare Case Study, U.S. V. Corps and Third Infantry Division during Operation Iraqi,” United States Army War College, 2003.##
[15]      P. A. Consulting Group, “A Network Centric Operations Case Study: US/UK Coalition Combat Operations during Operation Iraqi Freedom,” Jun. 2004.##
[16]      U. S. Military and U.S.Government, “Task Force Stryker Network-Centric Operations in Afghanistan - Case Study of Real-World Application in War,” Network Components, Echeloning Command Posts, Tactical Decisionmaking, 2017.##
[17]      M. Fesharaki and A. Fetant, “An agent-based architecture based on multifaceted commitment to simulate network centric warfare,” in Fourth Conference on Command and Control of Iran, 2010. (In Persian)##
[18]      M. Fesharaki, A. Shakiba, and A. Fetanat, “Using the JDL and Sasa Reference Models in the Conceptual Development of the Intelligent Knowledge Center for Network centric Warfare,” in Fourth Conference on Command and Control of Iran, 2010. (In Persian)##
[19]      A. Shakibamanesh, J. izadi, and H. Almasian, “Comparison of Network Centric Warfare and system of systems,” in Seventh Conference on Command and Control, 2013. (In Persian)##
[20]      M. Fesharaki and A. Fetanat, “Object-Oriented Modeling of Shared Situation Awarness System in NCW                    Decision-Making,” in Fourth Conference on Command and Control of Iran, 2010. (In Persian)##
[21]      M. Howard and P. Paret, “Carl Von Clausewitz on War,” p. 556, 1976.##
[22]      E. P. O. C4ISR, “White Paper on Traning, Planing and System Development for EBO,” 2000.##
[23]      “The Advent of new Way of War: Theory and Practice of Effect Based Operations,” Institute of Defence and Strategic Studies Singapore, 2003.##
[24]      Sheng-Li and Si Hu-Chen Liuetc, “DEMATEL Technique: A Systematic Review of the State-of-the-Art Literature on Methodologies and Applications,” Mathematical Problems in Engineering, 2018.##
[25]      Y. J. Chen, H. C. Tzeng, and G. H. Shyu, “Marketing strategy based on customer behavior for the LCD-TV,” International Journal of Management and Decision Making, 2006.##
[26]      J. H. Tzeng and G. H. Liou Chang, “Airline safety measurement using a hybrid model,” Air Transport Management, 2007.##
[27]      A. Taghizadeh, et al, “Using DEMATEL – Analytic network process (ANP) hybrid algorithm approach for selecting improvement projects of Iranian excellence model in healthcare sector,” African Journal of Business Management, 2012.##
[28]      L. Abdullah and N. Zulkifi, “Integration of fuzzy AHP and interval type-2 fuzzy DEMATEL: an application to human resource management,” Expert Systems with Applications, pp. 4397–4409, 2015.##
[29]      A. Nikjoo and M. Saeedpoor, “An intuitionistic fuzzy DEMATEL methodology for prioritising the components of SWOTmatrix in the Iranian insurance industry,” International Journal, pp. 439–452, 2014.##
[30]      K. Govindan, R. Khodaverdi, and A. Vafadarnikjoo, “Intuitionistic fuzzy based DEMATEL method for developing greenpractices and performances in a green supply chain,” Expert Systems with Applications, pp. 7207–7220, 2015.##
[31]      W. Suo, B. Feng, and P. Fan, “Identifying risk factors of IT outsourcing using interdependent information: an extended DEMATEL method,” xpert Systems with Applications, pp. 3832–3840, 2012.##
[32]      H. Liu, Ch. Lu, et al, “Evaluating health-care waste treatment technologies using a hybrid multi-criteria decision making model,” Renewable & Sustainable Energy Reviews, pp.      932-942, 2015.##
[33]      X. Zhang, Y. Deng, and S. Mahadevan, “An evidential DEMATEL method to identify critical success factors in emergency management,” Applied soft Computing, pp.      504-510, 2014.##