Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Next Article in Journal
Image Captioning with Word Gate and Adaptive Self-Critical Learning
Next Article in Special Issue
Modeling Properties with Artificial Neural Networks and Multilinear Least-Squares Regression: Advantages and Drawbacks of the Two Methods
Previous Article in Journal
Spontaneous Brillouin Scattering Spectrum and Coherent Brillouin Gain in Optical Fibers
Previous Article in Special Issue
Small Object Detection in Optical Remote Sensing Images via Modified Faster R-CNN
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Roadmap Modeling and Assessment Approach for Defense Technology System of Systems

1
College of Systems Engineering, National University of Defense Technology, Hunan 410073, China
2
Center for Assessment and Demonstration Research, Academy of Military Sciences, Beijing 100091, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2018, 8(6), 908; https://doi.org/10.3390/app8060908
Submission received: 11 April 2018 / Revised: 22 May 2018 / Accepted: 22 May 2018 / Published: 1 June 2018

Abstract

:
Advanced defense technology plays a crucial role in safeguarding national safety and development interests. Aiming to handle the problems of current research and development (R&D) management approaches faced with the rocketing complexities of system of systems, the authors propose a novel roadmap modeling and assessment methodology through studying the driving forces of general technology development and analyzing realistic requirements of defense technology management in this article. First, a requirement decomposition framework is designed based on multi-view theories and text-mining tools are used to construct a multi-layer knowledge-flow network model. Second, the contribution rates of requirement elements at different levels are evaluated using a multi-criteria decision-making approach and the node importance is assessed based on the topological structure of multi-layer network. Third, it is utilized to demonstrate the effectiveness of the proposed approaches that illustrative examples of the technology requirements in maritime security strategy investigating and a dual-layer knowledge-flow network consists of patents that belong to the “Coherent Light Generator (CLC)” classification from the United States Patent and Trademark Office (USPTO) database and the related academic papers from Web of Science. Finally, the contributions, potential applications, and drawbacks of this work are discussed and research outlooks are provided.

1. Introduction

The development of science and technology is a fundamental driving force for the evolution of civilization and social change. A typical example is the reformation of combat patterns originating from the emergence and application of advanced defense technologies. Nowadays, military transformation is drawing massive attentions of all superpowers. As a symbolic feature of warfare in the information age, a critical factor determining the outcomes of battles is the integration of the combat system of systems, which assembles different kinds of interrelated and interactive operational units systematically [1]. Furthermore, disruptive innovations of defense technologies trigger the revolutions of warfare game rules and initiate the transformation of international political structures. The administration of the United States launched the Third Offset Strategy, of which the main objective is to defeat potential adversaries in a long-term competition [2]. Consequently, the research and development (R&D) management of defense technologies plays a critical role in both military force building and national security [2,3,4].
Generally speaking, there are three principle benefits/objectives that are infused in advanced defense technologies. First, it will improve the tactical performance of weapon systems and reinforce the capability of combat system of systems. Second, it will accelerate the structural reformation of command and control (C2) systems as well as the organization of combat units. Third, it will build and strengthen technology deterrence, which contributes to the discourse power in the negotiations of focal international security issues, such as arms control and conflict mediation. On the other hand, the strategies of national security and military modernization provide the requirements for development planning of defense technology. Based on the research achievements of technology roadmaps aiming at maintaining the technical competitiveness for commercial enterprises [5,6,7,8], it is proposed that a novel roadmap modeling and assessment approach for defense technology system of systems in this article. The authors combine two significant driving forces of technology development in the proposed framework, namely requirement-pull and innovation-drive, through surveying the elements in the lifecycle of R&D and their relationships. The approaches can be used to offer an effective support to decision-making in the R&D management of defense technologies.
The remaining components are organized as follows. Section 2 reviews the related literatures and summarizes the advantages and deficiencies of the mentioned research studies. Section 3 demonstrates the framework of roadmap modeling using multi-view theories. Moreover, the authors propose the assessment approaches of the contribution rate and the importance from the perspectives of requirement satisfaction and knowledge diffusion, respectively. In Section 4, two illustrative examples discussing the contribution rates to satisfy requirements and the importance of knowledge diffusion of focused technologies are used to demonstrate the proposed approach. Finally, Section 5 concludes the contributions and drawbacks of this work and notes possible improvements in future research.

2. Literature Review

The traditional methodology of R&D management is now confronted with rocketing complexities stemming from the rapid emergence of novel innovations. The focal problem consists of two main components. The first originates from the diversity of basic scientific fields relating to applied technologies and the pluralism of technology interrelations, which are considered complexities of the nature of technology and the scale of system of systems, respectively. The second concerns the interactions among the significant stakeholders in the lifecycle procedure of R&D [8]. Drawing lessons from commercial enterprise management, the Department of Defense (DoD) developed a requisition management framework of weapon systems based on the multi-view theory [9]. Through collecting and integrating data, information, and expertise from different stakeholders, this framework can be used to calibrated comprehensive and accurate requirement models of defense requisition. Following this research methodology, other scholars discussed “division and integration” approaches for system of systems modeling. Moreover, these methods have been applied and validated in the requirement analyses of military capability [10], weapon systems [11], and defense technology [12].
Patent text is one of the focal data sources in R&D study due to its availability and semi-structured storage format. With text-mining tools, semantic and citation analysis [13,14,15,16,17,18] can be used to measure technology relations through calculating the similarities among abstracted keyword vectors. Differing from the methods processing polysemous keyword vectors, citation analysis focuses on the accumulation and diffusion of innovation knowledge. In addition, it has the advantage of eliminating the ambiguities from authors’ word choices and writing styles to measure the technology relations more objectively [19]. The centrality indices [16] were applied to identify core patents based on citation networks with the analytic network process (ANP) method [15]. Moreover, the division of technology areas in dynamic citation networks and the detection of those focal ones with higher development potential has been discussed through the integration of network analysis, time series models, and cluster analysis [17,18].
Technology roadmaps have been widely applied in different domains of R&D planning, providing flexible information exchange platforms for the stakeholders including researchers, engineers, product managers, suppliers, and consumers [5]. This methodology can be used to identify vital information, including current and future customers’ requirements and technology development opportunities, as well as to support decision-making in programing, executing, and inspecting the R&D schedules [5,20]. Roadmap models involve various elements, such as technologies, products, services, and business/markets [6]. According to the related survey [5], the roadmaps drawing methods can be classified into expertise-based, computer/algorithm-based, and a hybrid category. Furthermore, different approaches of data analysis have been infused into and consummated this modeling framework. Fenwick et al. [21] investigated a value-driven technology roadmap process focusing on customers’ requirements, through integrating multiple related approaches, and demonstrated this methodology using the case study of software service business application. Geum et al. [7] proposed an integrative approach combining technology roadmap and system dynamic simulation to improve the effectiveness of scenario planning. Aiming to cope with the rocketing data volume in drawing technology roadmaps, approaches of association rule mining (ARM) were used to abstract the relations among different elements [8]. In addition, the implementing process of a technology roadmap was demonstrated using applications in the energy service sector [22]. This empirical research was extended through discussing the differences of objectives in national, industry/sector, and organizational levels [20].
As mentioned above, various interactive elements, such as knowledge, technologies, products, and businesses, are required to investigate R&D planning. Consequently, one can use the multi-layer network model to depict technology roadmaps [8]. Wang et al. [23] constructed a dual-layer citation network model involving scientific papers and patents based on open access data. Through analyzing the network structure, one can identify focal knowledge sources and technology fronts. Fang et al. [24] investigated a triple-layer weighted network involving domains, researchers, and knowledge, and a novel method was designed to predict the potential links based on structural similarities between pairs of nodes. Meanwhile, the structure and dynamics of multi-layer networks has become a highlighted research area. Scholars have published many achievements on the theories and approaches on the node centralities, clustering, spreading process, and synchronization [25], which will promote the development of technology roadmap research.
The foregoing literature provides theoretical guidance and useful tools for the research of defense technology roadmaps. Nevertheless, practical modeling and assessment approaches are still insufficient to identify the requirements from various sources and investigate the evolution mechanisms of the focal system of systems accurately. Therefore, this article will focus on three interrelated objectives, including model framework integrating data analysis and expertise, the contribution rate to satisfy external requirements, and the importance of knowledge diffusion. In particular, this article proposes a framework to collect expertise, taking into consideration the viewpoints of different stakeholders to reinforce the quantitative system evaluation based on data analysis of the roadmap model. Thus, the assessment results can be utilized to support decision-making with the assistance of practical experience of R&D managers. The corresponding approaches are proposed in the next section.

3. Roadmap Modeling and Assessment Approaches

As mentioned in Section 1, the effects of requirement-pull and innovation-drive driving forces in the evolution of general technologies have been discussed. More specifically, the former factor emphasizes the economic activities that R&D projects require to input various resources while the outputs can be used to improve production efficiency and create social wealth. Besides, the latter concentrates on the discovery and diffusion of scientific and experiential knowledge, which is considered the basis of innovations. Technologies are created and ameliorated in the process of combining and applying the available knowledge to solve realistic problems.
Figure 1 demonstrates that technologies, stemming from the evolution and organization of knowledges, have been evolving in different routes determined by their application objective. The development of civilian innovation is defined as the “products-service-business/market” path driven by economic interests. In detail, novel technologies are applied to improve the performance of products and to offer better services to clients; meanwhile, corporations can occupy more market shares and obtain business profits with such R&D achievements. On the other hand, the requirements of defense technologies concern with the strategic objectives of national security, which are defined by the “strategies-capabilities-weapons” structure. Similar to their application in a civilian area, defense technologies are expected to enhance/develop advanced weapons and strengthen/create military capabilities in order to reach the strategy objectives. Besides, it is also obvious that applied R&D projects depend on basic research. The knowledge acquired from logical reasoning and experimental observations which are discovered, recorded, and proliferated by scientists, and then selected and organized to cope with problems and obstacles by engineers. Additionally, knowledge can be accumulated, propagated, and reused for new innovations through theoretical discovery and engineering experience from past R&D projects. Consequently, the authors plan to design the model framework and assessment approaches for defense technologies with the viewpoints of requirement analysis and knowledge diffusion. The multi-view theory is utilized to guide the model framework by identifying core stakeholders and collecting related information to their viewpoints, with which one can extract the requirement elements and their interactions with defense technologies. Furthermore, the multi-layer network is used to depict the knowledge diffusion among different kinds of innovation units. With those mentioned models, the appropriate algorithms can be discussed and applied to assess the contribution rate of requirement elements and the importance of innovation units.

3.1. Requirement Model Framework Based on Multi-View Theory

The model framework based on multi-view theory has been validated as an effective tool to collect and integrate the requirement information of defense technologies [12]. Moreover, it is a critical intelligence input for requirement modeling to identify and select various stakeholders of the focal R&D projects. Through integrating the data and intelligence collected from the selected stakeholders, one can calibrate a comprehensive system model that consists of requirement elements at different levels. According to the elements of the defense technology roadmap, as shown in Figure 1, the authors focus on the interactive requirements from the viewpoints of technology researchers, weapon engineers, military officers, and strategic deciders.
The requirement model framework is displayed in Table 1. The strategic game model focuses on the holistic requirements of national security. Based on qualitative analysis with related expertise, one can calibrate the graph model for conflict resolution (GMCR) including decision-makers (DMs), options, game state, feasible transitions, and relative preferences. Moreover, the potential compromises represented as different types of equilibriums can be identified and the impacts of DMs’ tactics and capabilities can be measured using the proposed approaches in Reference [26]. Then, the authors introduce the combat network model using the concepts of operation loops, in which the involved weapons are decomposed into functional nodes and their interactions are abstracted as different edges linking node pairs [1,27]. By analyzing the combat network model, one can not only survey the interrelations among relevant combat units with the given missions/scenarios, but also quantify the impacts of weapons’ performances on the military capabilities of the focal combat system of systems. The technology impact matrix is an effective tool to measure the benefits to weapons’ performances through infusing new technologies [28]. In this model, the core functional indices are listed in the column heading and the technology alternatives are displayed in the array heading. Furthermore, one can evaluate the expected impact values through integrating the related expertise, prior knowledge, and simulation experimental results [28].

3.2. Multi-Layer Knowledge-Flow Network Models

As the other basic driving force of defense technology development, knowledge diffusion focuses on the features of technology as the carrier and transmitter of detected scientific principles and engineering experience, which differ from the solving-problem oriented attributions in requirement analysis. Besides, the focal technologies are arranged in a fine-grained hierarchy. Based on the data source and modeling approach in References [19,23], the authors selected academic papers to represent basic knowledge and patent documents to indicate applied technologies. Moreover, the citations were used to measure the inner and intra knowledge-flows among the two kinds of elements.
The open access data from the United States Patent and Trademark Office (USPTO) and Web of Science were collected and processed to abstracted the nodes representing papers and patents and edges referring to citations using text-mining tools. Furthermore, the dynamic evolution of the dual-layer citation network was recorded to depict the information of the granted data of patents and the published date of papers. Based on the citation network model, this article proposes a novel approach to assess the importance of focal nodes from the perspective of spreading property in the knowledge-flow network.

3.3. Assessment Approaches

Based on the foregoing models, two assessment approaches, focusing on the contribution rate to satisfy the requirements and the importance of knowledge diffusion, are proposed. First, the analytic hierarchy processes (AHP) method was introduced to evaluate the contribution rate of technology alternatives using the requirement decomposed structure mentioned above [29]. The detail process is displayed as follows.
Step 1:
Investigate the judgement matrix A n × n i j involving n elements which stay in the i th layer and belong to the j th father node. By comparing the element pairs with related support intelligence and calibrated expertise, one can measure the relative importance using the 1–9 score rank.
Step 2:
Compute the maximum eigenvalue and its corresponding eigenvector e i j of the judgement matrix A n × n i j .
Step 3:
Calculate the assessment result of the contribute rates. The contribute rate of the l th element is defined as C l i = C l i + e l i j × C j i 1 when the value of its father node is C j i 1 .
In the algorithm above, the assessment of root node C 0 is initialized as 1 and others are set as 0. Additionally, one should not update the values of the elements in the i th layer until the assessment of their father nodes has been completed.
Second, the authors investigated the knowledge diffusion among the dual-layer citation network. Based on the network topological structure, an approach to assess the node importance of spreading property combining the eigenvector centrality [30] and PageRank value [31] is put forth. The detail process is displayed as follows.
Step 1:
Compute the eigenvector centrality vector x : x = λ 1 A a x of the sub-network in the article layer. The A a refers to the adjacency matrix of the mentioned network and the λ is its maximum eigenvalue.
Step 2:
Assign the values of two parameters, namely the inter-layer and intra-layer diffusion strength factors α and β . Then, one can construct the universal citation network A u , where A i j u = α ( A i j a + A i j p ) + β A i j a p , by extending and integrating the article-layer sub-network A a , article-patent inter-layer sub-network A a p , and patent-layer sub-network A p .
Step 3:
Initialize the node importance values. The initial value of the i th article node is set as P R i ( 0 ) = x i / j = 1 n x j and the patent nodes’ values are assigned as 0.
Step 4:
Calculate the elements of the revised row stochastic matrix R i j u using the algorithm below.
R i j u = { 1 / k i o u t ,   i f   k i o u t > 0 A i j u > 0 0 ,   i f   k i o u t > 0 A i j u = 0 1 / n ,   i f   k i o u t = 0 .
where the k i o u t represents the out-degree of the i th node in A u while n refers to its node count.
Step 5:
Select a parameter s to measure the randomness in knowledge diffusion. Then, compute the assessment values of node importance using the following iterative algorithm, where k is the given iteration number.
P R i ( k ) = s j = 1 n R j i u P R j ( k 1 ) + ( 1 s ) / n .

4. Illustrative Examples

Two illustrative examples are demonstrated to validate the proposed modeling and assessment approaches. In the first case, the authors investigated the maritime security strategy and related combat system of systems. Based on the hierarchical decomposition structure of military requirements, the contribution rates of focal defense technologies were evaluated. Then, a dual-layer knowledge-flow network model was constructed using the patent documents belonging to the “Coherent Light Generator (CLC)” classification which are collected from the USPTO database and the related academic papers from Web of Science. Then, the node important in knowledge diffusion was computed in the second example.
Maritime security is a highlighted component in the system of national security, which plays a key role in exploiting natural resources and maintaining trade routes. Through summarizing research achievements in the related literature [32,33], the authors abstracted three focused objectives at the strategy level, including a fast response to potential invasions, patrolling in territorial water/airspaces, and maritime search and rescue, as outlined in Table 2.
Based on the identified strategic requirements mentioned above, the related elements were decomposed layer by layer including seven military capabilities, 10 weapon systems, and nine defense technologies. Using the multi-view model framework in Section 3.1, the requirement mapping model was constructed; the outline information of the elements in each layer of the model are displayed in Table 3 and the interrelations among them are demonstrated in Figure 2.
According to the assessment approach for the contribution rate in Section 3.3, the authors constructed the judgement matrices using the element mapping relations and computed the scores of relative importance with collected objective data and relevant expertise. Through updating the contribution rates layer by layer, the nondimensionalized values of focal defense technologies in satisfying military requirements were evaluated; they are demonstrated on the vertical axis of Figure 3.
The knowledge-flow network model consists of patents representing applied technologies and articles referring to basic scientific research achievements. First, the authors collected 21417 patent documents belonging to the CLC classification from USPTO database. The patent-layer network model was constructed through abstracting the citation information using text-mining tools. Then, the highlighted nodes of which the in-degree or out-degree are among the top 1% highest were selected. Third, the authors selected365 articles cited by the patents corresponding to the highlighted nodes and integrated the two kinds of elements to complete the dual-layer citation network. The network model is demonstrated in Figure 4, where the red nodes represent articles and blue ones indicate patents.
According to the assessment process of node importance in Section 3.3, the eigenvector centrality vector of the sub-network in the article layer x was calculated. Then, the authors assigned the values of two diffusion strength factors α = β = 1 and integrated the adjacency matrix of the universal citation network A u . Finally, the assessment results were computed with the parameter conditions of s = 0.85 and k = 100 using the proposed algorithm. The top 10 articles and patents with the highest importance values are displayed in Table 4. The nodes with higher scores in knowledge diffusion analysis can be considered as innovation sources and the knowledge chunks which contain more innovation sources should be paid more attention in assessing development potential [18].

5. Conclusions

This work investigates the driving forces of general technology development and proposes roadmap modeling and assessment approaches for defense technology system of systems. Additionally, two illustrative examples, focusing on requirement satisfaction and knowledge diffusion, are utilized to demonstrate and validate the proposed approaches. Through analyzing the assessment results in the abovementioned examples, one can observe the technology alternatives and knowledge chunks which should be paid more attention in R&D management from the perspectives of both the contribution rate and node importance. The accumulation and diffusion of innovation knowledge is used to measure the development potential and the contributions to the realistic problems are selected to qualify the benefits for R&D project/portfolio alternatives. Furthermore, the integration of the benefits, intelligence, and expertise of the stakeholders using a model framework based on multi-view theory is considered as a data basis for better decision-making in R&D planning. Specifically, the calibrated expertise in this model framework can be used to not only reinforce the quantitative assessment process, but also to support R&D decision-making in combination with the analysis results of the technology roadmap.
The authors only provide a conceptual modeling framework for a defense technology system of systems in this research. The proposed assessment approaches seem a little naïve and the illustrative examples were not discussed comprehensively to simulate realistic R&D issues. Accordingly, some notes are given for the future research. First, the information of the expected budget and duration will be involved in the roadmap model, which will be used to examine the cost resource constraints of R&D project portfolio alternatives. Second, the assessment approach for the contribution rate of defense technology portfolios will be investigated by analyzing the structure evolution of the dynamic combat network for specific warfare scenarios. Third, the development potential of focal applied technology/basic research areas will be discussed using the trend forecasting approaches based on multi-layer citation network analysis. Finally, the authors plan to develop a more effective methodology for examining and scheduling R&D projects using the multi-objective optimization algorithm, with the aim of providing high-value supporting intelligence for R&D decision-making.

Author Contributions

H.L. and H.Y. conceived the initial idea of this research. H.L. designed the framework of this article. H.L. and H.Y. wrote the draft. Both authors gave critical revisions and approved the submission.

Acknowledgments

This work was supported in part by the National Science Foundation of China under grant No. 71501182 and No. 71671186, and the Research Project of National University of Defense Technology under grant No. JS16-03-08 and No. JS16-03-16. Moreover, the authors greatly appreciate the thoughtful comments and constructive suggestions put forward by three anonymous referees for improving the quality of their paper.

Conflicts of Interest

The authors declare no conflict of interests.

References

  1. Deller, S.; Bowling, S.R.; Rabadi, G.A.; Tolk, A. Applying the Information Age Combat Model: Quantitative Analysis of Network Centric Operations. Int. C2 J. 2009, 3, 1–25. [Google Scholar]
  2. Martinage, R. Toward a New Offset Strategy: Exploiting U.S. Long-Term Advantages to Restore U.S. Global Power Projection Capability; Center for Strategic and Budgetary Assessments (CSBA): Washington, DC, USA, 2014. [Google Scholar]
  3. Liu, X. A Methodology for Impact Evaluation of Technology Infusion on the Capability of Weapon System of Systems; National University of Defense Technology: Changsha, China, 2009. [Google Scholar]
  4. Chang, L. Readiness and Satisfaction Assessment Approaches for Technology System of Systems; National University of Defense Technology: Changsha, China, 2014. [Google Scholar]
  5. Kostoff, R.N.; Schaller, R.R. Science and Technology Roadmaps. IEEE Trans. Eng. Manag. 2001, 48, 132–143. [Google Scholar] [CrossRef]
  6. Phaal, R.; Farrukh, C.J.P.; Probert, D.R. Technology roadmapping—A planning framework for evolution and revolution. Technol. Forecast. Soc. Chang. 2004, 71, 5–26. [Google Scholar] [CrossRef]
  7. Geum, Y.; Lee, S.; Park, Y. Combining technology roadmap and system dynamics simulation to support scenario-planning: A case of car-sharing service. Comput. Ind. Eng. 2014, 71, 37–49. [Google Scholar] [CrossRef]
  8. Geum, Y.; Lee, H.J.; Lee, Y.; Park, Y. Development of data-driven technology roadmap considering dependency: An ARM-based technology roadmapping. Technol. Forecast. Soc. Chang. 2015, 91, 264–279. [Google Scholar] [CrossRef]
  9. United States Department of Defense; Department of Defense Architecture Framework 2.0.: Washington, DC, USA, 2009.
  10. Cheng, B.; Lu, Y.; Ge, B.; Tan, X. Capability Views Model for Wiping System-of-systems. J. Nat. Univ. Def. Technol. 2011, 33, 163–168. [Google Scholar]
  11. Ge, B.; Chen, Y.; Shu, Y. Multi-Views based Architecture Description Approach for Weapons System-of-Systems. Fire Control Command Control 2010, 35, 102–105. [Google Scholar]
  12. You, H.; Li, M.; Yang, K.; Jiang, J.; Ge, B.; Luo, J. Description Models for Technology System of Systems. In Proceedings of the 2nd International Conference on Complex Science Management and Education Science, Changsha, China, 12–13 September 2015. [Google Scholar]
  13. Chang, P.; Wu, C.; Leu, H. Using patent analyses to monitor the technological trends in an emerging field of technology: A case of carbon nanotube field emission display. Scientometrics 2010, 82, 5–19. [Google Scholar] [CrossRef]
  14. Yoon, J.; Park, H.; Kim, K. Identifying technological competition trends for R&D planning using dynamic patent maps: SAO-based content analysis. Scientometrics 2013, 94, 313–331. [Google Scholar]
  15. Lee, H.; Kim, C.; Cho, H.; Park, Y. An ANP-based technology network for identification of core technologies: A case of telecommunication technologies. Expert Syst. Appl. 2009, 36, 894–908. [Google Scholar] [CrossRef]
  16. Kim, E.; Cho, Y.; Kim, W. Dynamic patterns of technological convergence in printed electronics technologies: Patent citation network. Scientometrics 2014, 98, 975–998. [Google Scholar] [CrossRef]
  17. You, H.; Li, M.; Hipel, K.W.; Jiang, J.; Ge, B.; Duan, H. Development trend forecasting for coherent light generator technology based on patent citation network analysis. Scientometrics 2017, 111, 297–315. [Google Scholar] [CrossRef]
  18. You, H.; Li, M.; Jiang, J.; Ge, B.; Zhang, X. Evolution monitoring for innovation sources using patent cluster analysis. Scientometrics 2017, 111, 693–715. [Google Scholar] [CrossRef]
  19. Rodriguez, A.; Kim, B.; Turkoz, M.; Lee, J.; Coh, B.; Jeong, M. New multi-stage similarity measure for calculation of pairwise patent similarity in a patent citation network. Scientometrics 2015, 103, 565–581. [Google Scholar] [CrossRef]
  20. Amer, M.; Daim, T.U. Application of technology roadmaps for renewable energy sector. Technol. Forecast. Soc. Chang. 2010, 77, 1355–1370. [Google Scholar] [CrossRef]
  21. Fenwick, D.; Daim, T.U.; Gerdsri, N. Value Driven Technology Road Mapping (VTRM) process integrating decision making and marketing tools: Case of Internet security technologies. Technol. Forecast. Soc. Chang. 2009, 76, 1055–1077. [Google Scholar] [CrossRef]
  22. Daim, T.U.; Oliver, T. Implementing technology roadmap process in the energy services sector: A case study of a government agency. Technol. Forecast. Soc. Chang. 2008, 75, 687–720. [Google Scholar] [CrossRef]
  23. Wang, X.; Zhao, Y.; Liu, R.; Zhang, J. Knowledge-transfer analysis based on co-citation clustering. Scientometrics 2013, 97, 859–869. [Google Scholar] [CrossRef]
  24. Fang, Z.; You, H.; Xue, F.; Geng, W.; Gao, Q. A research on the weighted expert knowledge collaboration super-network model and super-link prediction method. Sci. Res. Manag. 2017, 38, 251–258. [Google Scholar]
  25. Boccaletti, S.; Bianconi, G.; Griado, R.; Del Genio, C.I.; Gómez-Gardenes, J.; Romance, M.; Sendina-Nadal, I.; Wang, Z.; Zanin, M. The structure and dynamics of multilayer networks. Phys. Rep. 2014, 544, 1–122. [Google Scholar] [CrossRef] [Green Version]
  26. You, H.; Li, M.; Jiang, J.; Ge, B.; Zhang, X.; Xu, J. Game analysis for nuclear crisis using the graph model for conflict resolution. J. Nat. Univ. Def. Technol. 2017, 39, 193–198. [Google Scholar]
  27. Li, J.; Tan, Y.; Yang, K.; Zhang, X.; Ge, B. Structural Robustness of Combat Networks of Weapon System-of-Systems based on the Operation Loop. Int. J. Syst. Sci. 2017, 48, 659–674. [Google Scholar] [CrossRef]
  28. Kirby, M.R. A Methodology for Technology Identification, Evaluation, and Selection in Conceptual and Preliminary Aircraft Design; School of Aerospace Engineering, Georgia Institute of Technology: Atlanta, GA, USA, 2001. [Google Scholar]
  29. Satty, T.L. Decision making—The Analytic Hierarchy and Network Processes (AHP/ANP). J. Syst. Sci. Syst. Eng. 2004, 13, 1–35. [Google Scholar] [CrossRef]
  30. Freeman, L.C. Centrality in social networks conceptual clarification. Soc. Netw. 1978, 1, 215–239. [Google Scholar] [CrossRef] [Green Version]
  31. Page, L. The PageRank citation ranking: Bringing order to the web. Stanf. Digit. Libr. Work. Paper 1998, 9, 1–14. [Google Scholar]
  32. Ge, X. Research on Countermeasures to Improve Maritime Cruise in the South. Sea of China in China MSA; Dalian Maritime University: Dalian, China, 2016. [Google Scholar]
  33. Li, G. Application in the South. China Sea of Aided Decision System for Salvage and Rescue at Sea; Ocean University of China: Qingdao, China, 2015. [Google Scholar]
Figure 1. Evolution routes of technology development.
Figure 1. Evolution routes of technology development.
Applsci 08 00908 g001
Figure 2. Requirement mapping model of defense technologies in the area of maritime security.
Figure 2. Requirement mapping model of defense technologies in the area of maritime security.
Applsci 08 00908 g002
Figure 3. Assessment results of contribution rates.
Figure 3. Assessment results of contribution rates.
Applsci 08 00908 g003
Figure 4. “Article-patent” dual-layer knowledge-flow network model.
Figure 4. “Article-patent” dual-layer knowledge-flow network model.
Applsci 08 00908 g004
Table 1. Requirement analysis models for defense technologies.
Table 1. Requirement analysis models for defense technologies.
StakeholdersRelated ElementsRequirement ModelsOutline
Strategic deciderSecurity strategyStrategic game modelsThis model focuses on hotspot security issues, including strategic objectives, tactics, and capabilities
Military officerMilitary capability
Military officerMilitary capabilityCombat network modelsThis model consists of different types of nodes representing weapons function and edges referring to their interrelations
Weapons engineerWeapons
Weapons engineerWeaponsTechnology impact matricesThis model collects the core functional indices of weapons, and measures the impacts of technology on those selected indices
Technology researcherTechnology
Table 2. Requirement elements at the strategy level.
Table 2. Requirement elements at the strategy level.
IDRequirement NameOutlines
ST-1Fast response to potential invasionsIntercepting, tracking, monitoring, and evicting the military objectives invading into the territorial water/airspaces
ST-2Patrolling in territorial water/airspacesMaintaining the normal operation of resource exploitation and commercial transportation in the target area
ST-3Maritime search and rescueMaintaining the risk monitoring and information communication, locating and rescuing persons, watercrafts, and aircrafts in distress
Table 3. Information of elements in the requirement mapping model.
Table 3. Information of elements in the requirement mapping model.
Military CapabilitiesWeapon SystemDefense Technology
IDNameIDNameIDName
MC-1Information acquisitionWS-1Destroyer-052CDT-1C2 technology
MC-2Command and control (C2)WS-2Coast Guard-31DT-2Vertical launching equipment technology
MC-3CommunicationWS-3Destroyer-052DDT-3Sonar system technology
MC-4Fast responseWS-4Medium-Sized Coast Guard BoatDT-4Radar system technology
MC-5AttackWS-5Kilo-Class Diesel Attack SubmarineDT-5Reconnaissance system technology
MC-6Patrolling coverage areaWS-6Maritime HelicopterDT-6Inshore defense system technology
MC-7Patrolling enduranceWS-7J-11 FighterDT-7Combat system technology
--WS-8Maritime Geographic Information System PlatformDT-8Torpedo launching equipment technology
--WS-9KJ-500 Airborne Early Warning PlaneDT-9High-quality engine technology
--WS-10Command & Control Center--
Table 4. Assessment results of node importance in the dual-layer knowledge-flow network.
Table 4. Assessment results of node importance in the dual-layer knowledge-flow network.
Patent IDNode Importance ScoreRankArticle Index No. (Web of Science)Node Importance ScoreRank
86935172.5831 × 10−410002466255000031.7036 × 10−51
85427131.2497 × 10−420002591704000098.7287 × 10−62
88781191.0491 × 10−430001729608000078.2545 × 10−63
79492150.8403 × 10−440002991344000067.1009 × 10−64
89087270.8099 × 10−450002386698000126.8828 × 10−65
77941590.8062 × 10−460002653729000156.7064 × 10−66
82795170.7722 × 10−470002522842000586.4555 × 10−67
85480170.7669 × 10−480002277344000016.3947 × 10−68
88675860.7625 × 10−490002463458000286.1771 × 10−69
85095750.7594 × 10−4100002311844000036.1709 × 10−610

Share and Cite

MDPI and ACS Style

Lu, H.; You, H. Roadmap Modeling and Assessment Approach for Defense Technology System of Systems. Appl. Sci. 2018, 8, 908. https://doi.org/10.3390/app8060908

AMA Style

Lu H, You H. Roadmap Modeling and Assessment Approach for Defense Technology System of Systems. Applied Sciences. 2018; 8(6):908. https://doi.org/10.3390/app8060908

Chicago/Turabian Style

Lu, Hui, and Hanlin You. 2018. "Roadmap Modeling and Assessment Approach for Defense Technology System of Systems" Applied Sciences 8, no. 6: 908. https://doi.org/10.3390/app8060908

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop