Missing and Spurious Interactions in Heterogeneous Military Networks

As we all know, decision-makers need the high quality battlefield information to design the best operation plans, however, real intelligence data are often incomplete and noisy, where missing links prediction methods and spurious links identification algorithms can be applied. Military organizations could be modeled as heterogeneous complex networks, where nodes represent different types of functional units and edges denote different types of communication links. In this paper, we proposed a combined link prediction index considering both the nodes’ types effects and their structural similarities, and demonstrated that it is remarkably superior to all the 25 existing similarity-based methods both in predicting missing links and identifying spurious links in a real military network data; we also investigated the algorithms’ robustness under noisy environment, and showed our method maintained the best performance under the condition of small noise. In the end, as the FINC-E model, here used to describe the heterogeneous military organizations, is also suitable to many other social organizations, such as criminal networks, business organizations, etc., thus our method has its prospects in these areas for many tasks, like detecting the underground relationships between terrorists, predicting the potential business markets for decision-makers, and so on.

[1]  A. Dekker,et al.  Applying Social Network Analysis Concepts to Military C 4 ISR Architectures 1 , 2002 .

[2]  Christopher E. Hutchins,et al.  Hiding in plain sight: criminal network analysis , 2010, Comput. Math. Organ. Theory.

[3]  Christos Faloutsos,et al.  Fast Random Walk with Restart and Its Applications , 2006, Sixth International Conference on Data Mining (ICDM'06).

[4]  Tao Zhou,et al.  Relevance is more significant than correlation: Information filtering on sparse data , 2009 .

[5]  Umberto Michieli Link Prediction on Real and Synthetic Complex Networks , 2018 .

[6]  Zhong Liu,et al.  Key potential-oriented criticality analysis for complex military organization based on FINC-E model , 2014, Comput. Math. Organ. Theory.

[7]  Anthony H. Dekker,et al.  C4ISR Architectures, Social Network Analysis and the FINC Methodology: An Experiment in Military Organisational Structure , 2002 .

[8]  A. Dekker Network Topology and Military Performance , 2005 .

[9]  Yang Liu,et al.  Link Prediction , 2014, Encyclopedia of Social Network Analysis and Mining.

[10]  J. Hanley,et al.  The meaning and use of the area under a receiver operating characteristic (ROC) curve. , 1982, Radiology.

[11]  Kathryn B. Laskey,et al.  Stochastic blockmodels: First steps , 1983 .

[12]  Linyuan Lu,et al.  Link Prediction in Complex Networks: A Survey , 2010, ArXiv.

[13]  Anthony H. Dekker C4ISR, THE FINC METHODOLOGY, AND OPERATIONS IN URBAN TERRAIN , 2005 .

[14]  Richard E. Hayes,et al.  Understanding Information Age Warfare , 2001 .

[15]  Futian Wang,et al.  Measuring the robustness of link prediction algorithms under noisy environment , 2016, Scientific Reports.

[16]  Lise Getoor,et al.  Link mining: a survey , 2005, SKDD.

[17]  Alexei Sharpanskykh,et al.  An agent-based approach for structured modeling, analysis and improvement of safety culture , 2011, Comput. Math. Organ. Theory.

[18]  Kathleen M. Carley,et al.  Measuring CMOT’s intellectual structure and its development , 2011, Comput. Math. Organ. Theory.

[19]  David S Alberts,et al.  The Agility Advantage: A Survival Guide for Complex Enterprises and Endeavors , 2011 .