Next Article in Journal
Quality-Related Process Monitoring and Diagnosis of Hot-Rolled Strip Based on Weighted Statistical Feature KPLS
Next Article in Special Issue
Machine-Learning Algorithms for Process Condition Data-Based Inclusion Prediction in Continuous-Casting Process: A Case Study
Previous Article in Journal
A Trusted Reputation Management Scheme for Cross-Chain Transactions
Previous Article in Special Issue
The Remaining Useful Life Prediction Method of a Hydraulic Pump under Unknown Degradation Model with Limited Data
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Characterization Method of Damage Information Based on Heterogeneous Network

National Key Discipline Laboratory of Armament Launch Theory & Technology, Rocket Force University of Engineering, Xi’an 710025, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(13), 6035; https://doi.org/10.3390/s23136035
Submission received: 25 May 2023 / Revised: 7 June 2023 / Accepted: 12 June 2023 / Published: 29 June 2023
(This article belongs to the Special Issue Advanced Sensing for Mechanical Vibration and Fault Diagnosis)

Abstract

:
Damage is the main form of conflict, and the characterization of damage information is an important component of conflict evaluation. In the existing research, damage mainly refers to the damage effect of a damage load on the target structure. However, in the actual conflict environment, damage is a complex process that includes the entire process from the initial introduction of the damage load to the target function. Therefore, in this paper, the transfer logic of the damage process is analyzed, and the damage process is sequentially divided into being discovered, being attacked, being hit, and being destroyed in succession. Specifically, first considering the multiple types of each process, the transmission of damage is likened to the flow of damage, a network model to characterize damage information based on heterogeneous network meta-path and network flow theory (HF-MCDI) is established. Then, the characteristics of damage information are analyzed based on the capacity of the damage network, the correlation of the damage path, and the importance of the damage node. In addition, HF-MCDI can not only represent the complete damage information and the transmission characteristics of the damage load but also the structural characteristics of the target. Finally, the feasibility and effectiveness of the established HF-MCDI method are fully demonstrated by the example analysis of the launch platform.

1. Introduction

In the existing research, damage mainly refers to the damage effect of a damage load on the target structure. For example, the damage response of structures under damage loads, such as shock waves or fragments [1], damage effect of energetic fragments on a target plate [2], and other structural damage characteristics in the conflict environment [3]. However, in the actual conflict environment, damage is a complicated transmission process that includes the whole process from the launch of the damage load to the target function. This process includes: (1) After reconnaissance finds the target, determining whether or not to attack; (2) After determining the target value, initiating the damage charge to the target; (3) After the target evades protection, the damage charge begins to impact the target structure; (4) Until the core structure is destroyed, determining the target is destroyed. Therefore, how to systematically characterize this logical process becomes the key to operational assessment.
At present, the characterization of damage information mainly includes test methods and model methods. Among them, the reliability of the results of the experimental method is high [4], but the research cost is also relatively high, and for some complex systems, it is even difficult to conduct experimental studies. Model methods are divided into two categories according to the underlying theory: evaluation methods based on mathematical statistics [5,6] and knowledge inference [7,8], among which the evaluation methods based on mathematical statistics have a simple model-building process and easy calculation and are widely used for the characterization of destructive information in areas such as vulnerability and conflict effectiveness [9]. The evaluation method based on knowledge inference is relatively higher than the evaluation method based on mathematical statistics in terms of evaluation accuracy and credibility [10], but it relies on prior knowledge and subjective judgment of experience, therefore, the calculation process is more complicated. In summary, the current method of representing damage information is influenced by subjective empowerment and probability statistics, and suffers from a lack of objectivity and physical interpretation, and has a poor correlation between the representation process and reality.
Network analysis is one of the research hotspots in the field of information representation. Most of the current information network analysis work is on homogeneous information networks, i.e., the same type of nodes and network link relationships [11]. Homogeneous information networks mainly extract part of the information of the interactive systems without distinguishing the differences between the interactive systems, which easily leads to the loss of semantic information extraction. Therefore, researchers have proposed heterogeneous information networks with multi-type nodes [12]. In addition, meta-path is an important concept defined in heterogeneous information networks to extract semantic information from heterogeneous networks [13,14]. Compared to homogeneous information networks, heterogeneous information networks contain more comprehensive structural information and rich semantic information.
Based on the above description, this paper first proposes a network model to characterize damage information based on heterogeneous network meta-path and network flow theory. This network model is divided into an efficiency attribute sub-network, an avoidance attribute sub-network, a structure attribute sub-network, and a function attribute sub-network according to the transmission logic of the damage process. Each sub-network is connected based on the network flow theory, and the damage process is represented by the damage network flow. The comparison between the proposed damage information characterization method and the existing damage information characterization method is illustrated in Figure 1. Then, the characteristics of the damage information are analyzed in terms of damage network capacity, damage path correlation, and damage node significance. HF-MCDI can represent not only the complete damage information and the transmission characteristics of the damage load, but also the structural characteristics of the target. The innovations and contributions of this research can be summarized as follows:
  • The proposed network model can represent the damage process more completely and is more a in line with the actual conflict environment;
  • The proposed network model is no longer attacker-centered, but defender-centered, which can analyze the structure–function characteristics of the defender in more detail, and the probability representation is no longer required.
  • The established damage capacity model, damage path model, and damage node model can evaluate the damage process more objectively.
The remainder of this article begins with network model building in Section 2. In Section 3, the analysis method of network model is constructed. The example analysis is carried out in Section 4. Section 5 provides general conclusions.

2. Network Model

2.1. Conceptions

Definition 1.
Heterogeneous network [15]. In the digraph G = ( V , E ) , V represents a set of nodes and E represents a set of edges. There is a node-type mapping function Ψ : V , and an edge-type mapping function Φ : E , where is node-type, is edge-type, and if there is | | + | | > 2 , this type of network is defined as a heterogeneous network, and S = { , } is defined as network mode.
Definition 2.
Meta-path [15]. A meta-path is a path defined on a network mode S = { , } as:
V 1 R 1 V 2 R 2 R l V l + 1
This path describes a composite relationship between specific nodes V l :
R = R 1 R 2 R l
where represents the composition operator on the composite relation R l .
Definition 3.
Network capacity [16]. c ( e ) is a non-negative function defined on the set E of connected edges, and if there are connected edges e = v i v j , then defined c ( e ) is the capacity on the connected edges e . Similarly, c ( v ) is defined as the capacity on the node v .
Definition 4.
Network flow [16]. f ( e ) is a function defined on a connected edge set E ; if there is an edge e = v i v j , f i j = f ( e ) is defined as a flow on a connected edge e .
Based on the above theoretical conceptions and the transfer logic of the damage process, the conceptions of the network model are defined as follows.
Definition 5.
Damage node. This refers to the conditions that affect the load transfer between the failure load and the target function. The tolerance of each condition is defined as the damage capacity of the damaged node.
Definition 6.
Damage path. This refers to the connection edge of the damaged node through which the damage load is transferred to the target function. The load that can pass through each edge is defined as the damage flow.
Definition 7.
Damage information. This refers to all the contents contained in the directed heterogeneous network formed by the combination of damage load, damage node, and damage path.
Based on the above definition, the framework of HF-MCDI is shown in Figure 2. According to the attributes of damaged nodes, HF-MCDI is divided into four sub-networks. The efficiency attribute sub-network is composed of virtual nodes and logical associations that affect load transfer. The avoidance attribute sub-network consists of protection nodes and logical associations that affect load transfer. The structural attribute sub-network consists of structural nodes and installation associations that affect load transfer. The functional attribute sub-network consists of functional nodes that represent the results of load transfer. Additionally, the four sub-networks are elaborated in the following sections.

2.2. Efficiency Attribute Sub-Network

The efficiency attribute sub-network is defined as G e . It can be seen from Figure 2 that the transmission of damage load in G e is tandem in nature and does not weaken. Therefore, G e has the following two characteristics:
  • There is only one path for the damage load to be transmitted in G e , and the damage flow on the path was f i j = D , where D is the damage load.
  • The damage capacity c ( v i ) of damaged nodes is determined by node performance, and c ( v i ) obeys 0 D step function distribution.
In addition, the framework of G e is shown in Figure 3. For G e there is:
{ f e i j = D c e ( v i ) = { 0 , p < p 0 D , p p 0
where f e i j is damage flow of G e , c e ( v i ) is damage capacity of G e , p is the conditional degree value of the damaged node, and p 0 is the critical point of the conditional degree value of the damaged node.

2.3. Avoidance Attribute Sub-Network

The efficiency attribute sub-network is defined as G a . The damaged node in G a is determined by the subjective judgment of the damage load avoidance amount. After the judgment, the damaged path will be divided into multiple paths according to the target structure. Therefore, G a has the following two characteristics:
  • The damage load avoidance amount D ( v i ) is related to the target avoidance degree q , and obeys the logistic function distribution, which can be described as [17]:
    d D ( v i ) d q = Q D ( v i ) [ 1 D ( v i ) D ]
    D ( v i ) = 1 1 + e Q ( q q 0 ) D
    where Q is the coefficient of the avoidance degree and q 0 is the midpoint of the avoidance degree.
  • The damage flow on the damage path is related to the exposed area of the target structure. If the number of exposed parts of the target is k , and S k is the exposed area of part k , then the path coefficient is μ k = S k / k = 1 k S k .
    In addition, the framework of G a is shown in Figure 4. For G a there is:
    { f a i j = μ k D c a ( v i ) = D ( v i )
    where f a i j is damage flow of G a and c a ( v i ) is damage capacity of G a .

2.4. Structural Attribute Sub-Network

The structural attribute sub-network is defined as G s . The modular arrangement of the structure makes G s hierarchical and clustered, and in G s , the transmission of damage loads is a failure-resistant process of each node, and G s has the following characteristics.
  • The damage flow f i j along the damage path is the blocking effect of the structure on the damage load, and the smaller the blocking effect, the greater the damage flow.
  • Damage capacity c ( v i ) is the extreme limit of deformation of a structure under a damage load. When the damage load transferred to the node is greater than the damage capacity of the node, the damage load overflows, and the remaining damage load continues to be transferred to the next node.
Therefore, assume that the structure is composed of a number of structural element units, the energy method is used to calculate the structural element deformation as [18]:
{ U 1 = 1 2 ( σ x x ε x x + σ y y ε y y + σ x y ε x y ) d x d y d z U 2 = 1 2 ( N x ε x + N y ε y + N x y ε x y ) d x d y
where U 1 and U 2 are bending strain energy and midplane strain energy. For rigid plastic materials: σ x x = σ y y = 3 σ x y = σ s , σ s is the yield limits of materials. The mask force N x , N y and N z are equal to h σ x , h σ y and h σ x y . h is the material thickness.
The strain energy of structural element is calculated as:
U = U 1 + U 2       = f 1 ( a , b , h ) σ s W 0 + f 2 ( a , b , h ) σ s W 0 2       = f 1 ( a , b , h ) σ s [ 1 , f 2 ( a , b , h ) f 1 ( a , b , h ) ] [ W 0 W 0 2 ]
where f i ( a , b , h ) is the size function, and W 0 is the deformation deflection of the structural center.
When the damage load transferred to the structural element unit is D 0 ( v i ) , let Ψ = 1 / f 1 ( a , b , h ) σ s represent the blocking effect of the structural element unit on the damage load, and Ζ = [ W 0 , W 0 2 ] T is the response state of the structural element.
Taking the structural unit as the reference, the displacement at the boundary is 0 and the angle is 0. In this paper, the bit triangular function is utilized to simulate the equations of flexural lines as:
W = W 0 4 ( 1 + cos π x a ) ( 1 + cos π y b )
where a is the size of the material in direction x , and b is the size of the material in direction y .
According to the maximum deformation W 0 lim and maximum deformation volume V lim of the material and based on the following formula, the maximum strain energy of structural element U lim can be calculated.
{ W 0 W 0 lim W 0 4 ( 1 + cos π x a ) ( 1 + cos π y b ) d x d y V lim
In addition, the framework of G s is shown in Figure 5. For G s there is:
{ f s i j = Ψ μ k D c s ( v i ) = U l i m
where f s i j is damage flow of G s , c s ( v i ) is damage capacity of G s .

2.5. Functional Attribute Sub-Network

The structural attribute sub-network is defined as G f . The functional attribute sub-network consists of functional nodes that display the results of load transfer. Since function is the display of structure, G f is the display of the running state of G s . Therefore, for G f there is:
{ f f i j = D c f ( v i ) = 0
In summary, a heterogeneous network model can be obtained to fully characterize the damage information, and a meta-path can also be obtained to characterize the transfer process of a damage load. The path ρ = ( V e , V a , V s , V f ) is defined as the meta-path of the damaged information heterogeneous network, where V e , V a , V s , V f is the node set of G e , G a , G s , G f . This meta-path is represented as:
V e ( c e ) ( 0 , D ) V a ( c a ) μ k D V s ( c s ) Ψ V f ( c f )

3. Characteristics

3.1. Damage Capacity

The damage path is shown in Figure 6; the starting point of the damage path of HF-MCDI is the damage load in G e , which is defined as V e 0 . The ending point is any functional node in G f , which is defined as V f λ . λ is the number of functional nodes. Then, there is:
V f λ , ρ λ l ( V e 0 V f λ ) .
where ρ λ l is the damage path of Article l .
The damage capacity of each damage path is the sum of the damage capacities of nodes in different subnetworks on this damage path. That is, the damage capacity of ρ λ l is c λ l = [ c e , c a , c s , c f ] , where c e , c a , c s , c f are the damage capacity vectors of nodes of the damage paths in different subnetworks. When the damage capacity coefficient is defined as the ratio of damage capacity to damage load, c l = c ( v i ) / D , the damage capacity coefficient matrix of the damage path can be established as C = [ c 1 ; c 2 ; ; c l ] .
Then, the residual damage load coefficient transfer to the function on the damage path is:
Δ D = 1 s u m ( C , 2 )
where s u m ( C , 2 ) is the sum of the row vectors of C .
Obviously, when Δ D = 0 appears, it means that the damage capacity of the damage path is filled by the damage load, and the function of the target is in a critical state of damage. When Δ D < 0 appears, the damage load exceeds the damage capacity, and the target function is damaged. When Δ D > 0 appears, the damage load is blocked by the damage capacity, and the function of the target is not damaged.

3.2. Correlation of Damage Path

The correlation of the damage path can be used to measure the similarity of the damage load to the function; the higher the correlation of a damage path, the more dangerous this damage path is. In network flow theory, the damage flow on the damage path f i j is the weight of the connecting edges between nodes, and the weight matrix can be defined as f l * = [ f e , f a , f s , f f ] . When the weight matrix is mapped to the same space, according to the subnetwork, it can be obtained by:
f τ l = f τ l * τ ( e , a , s , f ) f τ l *
where f τ l is the weight value after f τ l * mapping, and f τ l * f l * .
Assume that s i ( i = 0 , 1 , , S ) is the node number on the damage path, and N s i ρ is the neighbor node of node s i on the damage path ρ λ l . The WsRel method is a typical path measurement method [19], which is suitable for obtaining accurate information between the source node and the target node. Based on the WsRel method, the correlation of damage paths is defined as:
W s R e l ( s 0 , s S   |   f 1 l f 2 l f τ l ) = 1 | N s i ρ | s 1 N s i ρ f 1 l W s R e l ( s 1 , s S   |   f 2 l f 3 l f τ l )
Since the HF-MCDI has many damage paths, the correlation of the HF-MCDI is:
R = l = 1 l θ l W s R e l ( s 0 , s S   |   ρ λ l )
where θ l is the weight of the damage path in Article l , and θ l is related to the connection strength ε . According to the Shi algorithm, ε in Article l is calculated as:
ε l = i = 0 S 1 o u t deg ( s i ) i n deg ( s i + 1 )
where o u t deg ( ) is out degree and i n deg ( ) is in degree. Additionally, the connection strength of the damaged path can be defined by the Softmax function as:
θ l = s o f t max ( ε l ) = ε l l = 1 l ε l

3.3. Importance of Damaged Nodes

The importance of the damaged node lies in its influence on the network model. Considering the heterogeneity of HF-MCDI, this paper selects the node shrinkage method to calculate the importance of the damaged nodes [20] and improves the node shrinkage method according to the correlation attributes of HF-MCDI. Considering the heterogeneity and rapidity of convergence of HF-MCDI, this paper selects the node shrinkage method to calculate the importance of the damaged nodes, improves the node shrinkage method according to the correlation attributes of HF-MCDI, and makes HF-MCDI more comprehensive.
The cohesion degree of HF-MCDI is defined as [ G ] , and [ G ] = 1 / n L , where n is the number of nodes in the network, L is the average path length, L = i j V d i j / n ( n 1 ) , and d i j is the distance between node i and node j . The cohesion degree of HF-MCDI can be updated as:
[ G ] = { n 1 / i j V d i j n 2 1 n = 1
In addition, the importance of the damaged node is defined as:
I M C * ( V i ) = 1 [ G ] [ G V i ]
where [ G V i ] is the network after node V i was shrunk.
Based on the above formula, there is:
I M C ( V i ) = 1 1 n L [ G ] / 1 ( n k i ) L [ G V i ] = n L [ G ] ( n k i ) L [ G * V i ] n L [ G ]
where k i is the number of neighbor nodes of V i .
Due to the connectivity between neighboring nodes in HF-MCDI, it is not sufficient to consider only the number of neighboring nodes; the importance of neighboring nodes should also be considered. Therefore, the improved importance of damaged nodes is defined as:
I M C ( V i ) = η I M C * ( V i ) + k N e μ k I M C * ( V N e k )
where V N e k is the neighboring node of V i , η and μ k are the proportional relationship of importance, η + k N e μ k = 1 , which can be allocated based on damage capacity according to the following formula:
{ η = c ( V i ) / [ c ( V i ) + k N e c ( V N e k ) ] μ k = c ( V N e k i ) / [ c ( V i ) + k N e c ( V N e k ) ]

4. Analysis

4.1. Illustrative Example

In order to demonstrate the effectiveness of the proposed method in this paper, a special equipment platform was taken as the research object. The special equipment platform is a complex body combining structure and function. According to the establishment method of HF-MCDI in Section 2, a special equipment platform HF-MCDI with 4 node types, 40 network nodes, and 121 directed edges was established, as shown in Figure 7.

4.2. Basic Features of HF-MCDI

In this paper, MATLAB is used to calculate the model shown in Figure 7, where the nodes are numbered from 1 to 40, from left to right, and from top to bottom, and the visual description in MATLAB is shown in Figure 8. The basic characteristics of HF-MCDI are then analyzed in terms of degree distribution, clustering coefficients, and node centrality according to complex network theory.

4.2.1. Degree Distribution

The degree distribution of HF-MCDI of the special equipment platform is shown in Figure 9.
Figure 9 shows that:
(1)
The node degree of the network is mainly distributed in two parts: k > 5 and k 5 . The proportion of k 5 is 65%. Among them, k = 4 has the largest proportion, which is 22.5%, and the nodes of k = 5 and k = 3 are 20% and 15%, respectively. The results show that there are 3–5 connecting edges in most nodes of this network, which accords with the characteristics of four-sided adjacency of structural components in space. The proportion of k > 5 is 35%, indicating that there are some nodes with high passing frequencies in the network, which are the key to damage flow, and they are mainly distributed in the front of G s and G f .
(2)
The maximum indegree of the nodes in this network is in G f , max ( k i n ) = 16 . The maximum outdegree of the nodes in this network is in G s , max ( k o u t ) = 10 . k i n = 5 has the largest ratio, which is 55%, while k o u t < 5 has 85%. This shows that the transmission of damage information in this launch platform is mainly stratified and dispersed, which is determined by the integration and modularity of the launch platform.

4.2.2. Clustering Coefficient

The clustering coefficient of HF-MCDI of the special equipment platform is shown in Figure 10.
Figure 10 shows that:
(1)
The clustering coefficient of the network is 0 at nodes 1, 2, 3, and 28 to 40. The clustering coefficients of other nodes, especially those in G s , all fluctuate around 0.25. The results show that there is a local aggregation phenomenon in the structure attribute subnetwork of the launching platform, and it is relatively uniform. When a node is damaged, it is easy to spread to the neighboring nodes, which is determined by the structural characteristics of the launching platform.
(2)
The clustering coefficient is 0 in G e . The result shows that the nodes in G e are not tightly connected because the concealment of the target and the value of the target don’t affect each other but are only logically connected, and this result is in line with reality.
(3)
The clustering coefficient is 0 in G f . Because the nodes in G f are connected to the nodes in G e , and the nodes in G f are not related to each other, the aggregation of function is reflected in the aggregation of structure.

4.2.3. Node Centrality

The node centrality of HF-MCDI of the special equipment platform is shown in Figure 11.
Figure 11 shows that:
(1)
From the centrality of degree: The node with the highest centrality of degree of the launch platform is the total function (0.2196), followed by the mobility function (0.1502) and the launch function (0.0834). This indicates that the node of G f has greater influence because the centrality of degree describes the centrality of nodes in the network, indicating that the launch platform operates according to the function. Therefore, the center of the network is concentrated in G f .
(2)
From the centrality of betweenness: The centrality of betweenness is distributed in three levels. ① There are 5 nodes with a centrality value greater than 0.05, including avoidance (0.1420), value (0.0973), tube (0.0798), concealment (0.0534), and cabin (0.0506); ② There are 3 nodes with a centrality value greater than 0.02 and less than 0.05, which are the exposed nodes of G s ; ③ The centrality value of the remaining 80% of the nodes is less than 0.02. This suggests that the avoidance node has the greatest impact due to the fact that mesoscopic centrality describes the role of damage paths, and avoidance is a critical node in the damage path of the special equipment platform.

4.3. Damage Capacity for HF-MCDI

Following the calculation process in Section 3.1, it can be calculated that there are 15 damage paths for launch function, 17 damage paths for mobility function, and 3 damage paths for communicate function, and the damage path of the mobility function accounts for the largest proportion. The residual damage load coefficient Δ D calculated on each damage path is shown in Figure 12, Figure 13 and Figure 14.
Figure 12, Figure 13 and Figure 14 shows that:
(1)
When the target is discovered, and has a high value, and does not avoid direct damage, the launch function has 1 damage path with a residual damage load factor less than 0. The maneuver function has 5 damage paths with a residual damage load factor less than 0, and 0 damage paths with a residual damage load factor less than 0 for the communication function. It can be seen that the launch platform relies only on structural protection, which has little deterrent effect on damage loads, and the percentage of safe paths is 17.14%. Among these safe paths, the safe path for the launch function is 2.86%; the safe path for the mobility function is 14.28%; and the safe path for the communication function is 0, reflecting the poor protection of the launch platform.
(2)
When the target is discovered and has a high value and some avoidance, that is, 1 / [ 1 + e Q ( q q 0 ) ] = 30 % , 60 % , the value of the residual damage load coefficient begins to decrease. When the degree of avoidance is 30%, the proportion of safe paths is 42.86%; when the degree of avoidance is 60%, the proportion of safe paths is 91.43%. When the target is not discovered or the value is low, that is, Δ D < 0 , showing that reducing the discovery probability of the target can fundamentally block the transmission of damage load.
(3)
There are 29 damage paths of Δ D 0 when the target is discovered, and has a high value, and does not avoid direct damage, among which the damage path of the launch function accounts for the highest proportion (48.28%), which indicates that the launch function is the most likely to be damaged. In the damage path of Δ D 0 , the damage path through the cabin accounts for the highest proportion, which indicates that the damage of the launch platform is mainly from the cabin.

4.4. Correlation of Damage Path for HF-MCDI

Following the calculation process in Section 3.2, the correlation of the damage path is shown in Figure 15.
Figure 15 shows that:
(1)
On the whole, the correlation distribution between the damage and the emission function is large. The damage path of Damage load–Concealment–Value–Avoidance–Tube–Launch function has the greatest correlation, WsRel = 0.8450 , which indicates that damage load is most likely to destroy the function from this path.
(2)
The damage path of Damage load–Concealment–Value–Avoidance–Tube–Launch function has the greatest correlation, WsRel = 0.8450 , which indicates that damage load is most likely to destroy the launch function from this path. The average WsRel value of launch function is 0.4901, and the correlation of the HF-MCDI of launch function is R = 0.4867 , which indicates that the correlation between launch function and damage load is highest, which is consistent with the damage capacity analysis results in Section 4.3.
(3)
The damage path of Damage load–Concealment–Value–Avoidance–type–Mobility function has the greatest correlation in the damage path of mobility function, WsRel = 0.7268 , which indicates that damage load is most likely to destroy the mobility function from this path. The average WsRel value of mobility function is 0.3589, and the correlation of the HF-MCDI of mobility function is R = 0.4652 , which indicates that the correlation between mobility function and damage load is higher.
(4)
Damage load and communication function have few damage paths, the average WsRel value of communication function is 0.4647, and the correlation of the HF-MCDI of communication function is R = 0.3614 .

4.5. Importance of Damaged Node for HF-MCDI

Following the calculation process in Section 3.3, the importance of the damaged node is shown in Figure 16.
Figure 16 shows that:
(1)
The importance of damaged nodes is divided into three levels: ① There are 4 nodes with IMC values greater than 0.875, which are: Mobility function (1), Launch function (0.9681), Frame (0.9504), and Oil pipe (0.8965). This shows that these nodes are most important to the HF-MCDI of the launch platform. At the same time, it reflects that the launch platform takes the mobility function as the core function and the frame as the main structure; ② There are 6 nodes with IMC values greater than 0.725 and less than 0.875, in descending order of the largest to smallest, including the Missile, Compartment, Tube, Tyre, Cab, and Avoidance nodes, indicating that these nodes are of high importance to the HF-MCDI of the launch platform, that is, the exposed portion and avoidance have significant impact on transferring damage load; therefore, these nodes can be used in the optimization of protection; ③ For the remaining 30 nodes, the IMC value is less than 0.725 and greater than 0.6, and the importance of these nodes is small.
(2)
The importance of nodes based on IMC values, which integrate the centrality of degree to measure the structure of the HF-MCDI and the centrality of betweenness to measure the transmission of the HF-MCDI, provides a more comprehensive measure of the importance of the HF-MCDI.

5. Conclusions

The logic of the transfer process of a damage load is analyzed, and a damage information characterization method based on heterogeneous network theory and network flow theory is established. From the obtained results, the following conclusions could be drawn.
(1)
Compared with the existing methods, the proposed method can describe the damage process more completely from the viewpoint of damage transfer, and is more consistent with the actual conflict evaluation.
(2)
By analyzing the basic features of the HF-MCDI, the degree distribution can indicate the structural characteristics of the damage target, the clustering coefficient can indicate the correlation characteristics of the damage information, and the node centrality can indicate the nodes with a strong influence on the damage process. The digital characterization of these fundamental features can make the study of the damage process more objective.
(3)
HF-MCDI establishes the damage process in the form of a network from the initiation of the damage load to the impact on the target. The correlation of damage capacity and damage path can be used to analyze the critical links of damage information, and the importance of damage nodes can be used to analyze the critical nodes of damage information. These analyses can point out the direction for the protection of the target.

Author Contributions

T.H. proposed the main idea and finished the draft manuscript; Q.G. and Z.L. participated in the discussion of diagnostic thinking and provided correction of English grammar; D.W. and D.M. drew the figures and tables; and L.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lai, E.; Zhao, J.; Li, X.; Hu, K.; Chen, G. Dynamic responses and damage of storage tanks under the coupling effect of blast wave and fragment impact. J. Loss Prev. Process Ind. 2021, 73, 104617. [Google Scholar] [CrossRef]
  2. Tian, S.; Du, X.; Yan, Q.; Wu, J.; Zhuang, T. Damage effect of pile wharf under underwater explosion load. Mech. Adv. Mater. Struct. 2023, 30, 29–47. [Google Scholar] [CrossRef]
  3. Guo, Y.; Han, Z.; Guo, H.; Wang, T.; Liu, B.; Wang, D. Numerical simulation damage analysis of pipe-cement-rock combination due to the underwater explosion. Eng. Fail. Anal. 2019, 105, 584–596. [Google Scholar] [CrossRef]
  4. Yang, F.; Li, Z.; Zhuang, Z.; Liu, Z. Evaluating the blast mitigation performance of hard/soft composite structures through field explosion experiment and numerical analysis. Acta Mech. Sin. 2022, 38, 27–36. [Google Scholar] [CrossRef]
  5. Zhao, K.; Jia, F.; Shao, H. A novel conditional weighting transfer Wasserstein auto-encoder for rolling bearing fault diagnosis with multi-source domains. Knowl.-Based Syst. 2023, 262, 110203. [Google Scholar] [CrossRef]
  6. Zhao, K.; Hu, J.; Shao, H.; Hu, J. Federated multi-source domain adversarial adaptation framework for machinery fault diagnosis with data privacy. Reliab. Eng. Syst. Saf. 2023, 236, 109246. [Google Scholar] [CrossRef]
  7. Yao, T.; Miao, R.; Wang, W.; Li, Z.; Dong, J.; Gu, Y.; Yan, X. Synthetic damage effect assessment through evidential reasoning approach and neural fuzzy inference: Application in ship target. Chin. J. Aeronaut. 2022, 35, 143–157. [Google Scholar] [CrossRef]
  8. Jin, B.; Cruz, L.; Gonçalves, N. Deep Facial Diagnosis: Deep Transfer Learning from Face Recognition to Facial Diagnosis. IEEE Access 2020, 8, 123649–123661. [Google Scholar] [CrossRef]
  9. Jin, B.; Cruz, L.; Gonçalves, N. Pseudo RGB-D Face Recognition. IEEE Sens. J. 2022, 22, 21780–21794. [Google Scholar] [CrossRef]
  10. Zhao, K.; Jiang, H.; Wang, K.; Pei, Z. Joint distribution adaptation network with adversarial learning for rolling bearing fault diagnosis. Knowl.-Based Syst. 2021, 222, 106974. [Google Scholar] [CrossRef]
  11. Triana, J.; Delgado, C.A.; Martinez-Mendoza, K.L. Whale optimization algorithm guided by complex networks. Int. J. Artif. Intell. 2023, 21, 55–66. [Google Scholar]
  12. Nasser, A.M.; Chiang, T.S.; Ping, C.W. Distributed parallel deep learning with a hybrid backpropagation-particle swarm optimization for community detection in large complex networks. Inf. Sci. 2022, 600, 94–117. [Google Scholar] [CrossRef]
  13. Luo, J.; Bao, Y.; Chen, X.; Shen, C. Metapath-based deep convolutional neural network for predicting miRNA-Target association on heterogeneous network. Interdiscip. Sci. Comput. Life Sci. 2021, 13, 547–558. [Google Scholar] [CrossRef] [PubMed]
  14. Tan, L.; Gong, D.; Xu, J.; Li, Z.; Liu, F. Meta-path fusion based neural recommendation in heterogeneous information networks. Neurocomputing 2023, 529, 236–248. [Google Scholar] [CrossRef]
  15. Liu, Q.; Tan, H.S.; Zhang, Y.M.; Wang, G.Y. Dynamic heterogeneous network representation method based on meta-path. Acta Electron. Sin. 2022, 50, 1830–1839. [Google Scholar]
  16. Wang, L.F.; Li, H.; Zhao, G.T. Improved load re-allocation strategy based on maximum residual capacity of node. J. Northeast. Univ. (Nat. Sci.) 2020, 41, 1223–1230. [Google Scholar]
  17. Dong, Y.; Ma, S.; Zhang, H.; Yang, G. Wind power prediction based on multi-class autoregressive moving average model with logistic function. J. Mod. Power Syst. Clean Energy 2022, 10, 1184–1193. [Google Scholar] [CrossRef]
  18. Huang, X.; Liu, X.; Li, J.; Chen, Y.; Wei, D.; Ding, G. Machining deformation analysis of aircraft monolithic components based on the energy method. Int. J. Adv. Manuf. Technol. 2022, 119, 5797–5805. [Google Scholar] [CrossRef]
  19. Symeonidis, P.; Tiaksa, E. Transitive node similarity: Predicting and recommending links in signed social networks. World Wide Web 2014, 17, 743–776. [Google Scholar] [CrossRef] [Green Version]
  20. Liu, N.; Shen, J.; Yu, K.P. Weighted supply chain network node importance assessment based on improved node contraction method. J. Tianjin Univ. (Sci. Technol.) 2018, 51, 1056–1064. [Google Scholar]
Figure 1. The comparison of the characterization method between proposed and existing.
Figure 1. The comparison of the characterization method between proposed and existing.
Sensors 23 06035 g001
Figure 2. The framework of HF-MCDI.
Figure 2. The framework of HF-MCDI.
Sensors 23 06035 g002
Figure 3. The framework of G e .
Figure 3. The framework of G e .
Sensors 23 06035 g003
Figure 4. The framework of G a .
Figure 4. The framework of G a .
Sensors 23 06035 g004
Figure 5. The framework of G s .
Figure 5. The framework of G s .
Sensors 23 06035 g005
Figure 6. The damage path.
Figure 6. The damage path.
Sensors 23 06035 g006
Figure 7. HF-MCDI of the special equipment platform.
Figure 7. HF-MCDI of the special equipment platform.
Sensors 23 06035 g007
Figure 8. The visual description of HF-MCDI of the special equipment platform in MATLAB.
Figure 8. The visual description of HF-MCDI of the special equipment platform in MATLAB.
Sensors 23 06035 g008
Figure 9. The degree distribution of HF-MCDI of the special equipment platform.
Figure 9. The degree distribution of HF-MCDI of the special equipment platform.
Sensors 23 06035 g009
Figure 10. The clustering coefficient of HF-MCDI of the special equipment platform.
Figure 10. The clustering coefficient of HF-MCDI of the special equipment platform.
Sensors 23 06035 g010
Figure 11. The node centrality of HF-MCDI of the special equipment platform.
Figure 11. The node centrality of HF-MCDI of the special equipment platform.
Sensors 23 06035 g011
Figure 12. Residual damage load coefficient of launch function.
Figure 12. Residual damage load coefficient of launch function.
Sensors 23 06035 g012
Figure 13. Residual damage load coefficient of mobility function.
Figure 13. Residual damage load coefficient of mobility function.
Sensors 23 06035 g013
Figure 14. Residual damage load coefficient of communicate function.
Figure 14. Residual damage load coefficient of communicate function.
Sensors 23 06035 g014
Figure 15. The correlation of damage path.
Figure 15. The correlation of damage path.
Sensors 23 06035 g015
Figure 16. Importance of damaged node.
Figure 16. Importance of damaged node.
Sensors 23 06035 g016
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Huang, T.; Gao, Q.; Liu, Z.; Wang, D.; Ma, D.; Gao, L. Characterization Method of Damage Information Based on Heterogeneous Network. Sensors 2023, 23, 6035. https://doi.org/10.3390/s23136035

AMA Style

Huang T, Gao Q, Liu Z, Wang D, Ma D, Gao L. Characterization Method of Damage Information Based on Heterogeneous Network. Sensors. 2023; 23(13):6035. https://doi.org/10.3390/s23136035

Chicago/Turabian Style

Huang, Tong, Qinhe Gao, Zhihao Liu, Dong Wang, Dong Ma, and Lei Gao. 2023. "Characterization Method of Damage Information Based on Heterogeneous Network" Sensors 23, no. 13: 6035. https://doi.org/10.3390/s23136035

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop