Acta Armamentarii ›› 2024, Vol. 45 ›› Issue (S2): 105-112.doi: 10.12382/bgxb.2024.0891
Previous Articles Next Articles
TENG Zhe1,*(), LI Ye2, QIU Qianjun3
Received:
2024-09-24
Online:
2024-12-12
Contact:
TENG Zhe
TENG Zhe, LI Ye, QIU Qianjun. An Optimized Threat Assessment Method for Aerial Target Groups[J]. Acta Armamentarii, 2024, 45(S2): 105-112.
Add to citation manager EndNote|Ris|BibTeX
批号 | 距离/km | Ma | 高度/km | 进攻角/(°) | 重复频率/kHz | 脉宽/μs | 载频/GHz | 群类型/群内 目标数量 |
---|---|---|---|---|---|---|---|---|
A1 | 150 | 2.0 | 2 | 45 | 15 | 8 | 10 | 战斗机/1 |
A2 | 200 | 1.2 | 1.5 | -30 | 1.25 | 8 | 6 | 攻击机/1 |
A3 | 50 | 0.7 | 0.5 | 1 | 2 | 8 | 16 | 反舰导弹/2 |
A4 | 180 | 1.8 | 3 | 120 | 15 | 8 | 10 | 战斗机/3 |
A5 | 350 | 0.6 | 5 | 10 | 0.3 | 8 | 3 | 预警机/1 |
Table 1 Parameters of target groups
批号 | 距离/km | Ma | 高度/km | 进攻角/(°) | 重复频率/kHz | 脉宽/μs | 载频/GHz | 群类型/群内 目标数量 |
---|---|---|---|---|---|---|---|---|
A1 | 150 | 2.0 | 2 | 45 | 15 | 8 | 10 | 战斗机/1 |
A2 | 200 | 1.2 | 1.5 | -30 | 1.25 | 8 | 6 | 攻击机/1 |
A3 | 50 | 0.7 | 0.5 | 1 | 2 | 8 | 16 | 反舰导弹/2 |
A4 | 180 | 1.8 | 3 | 120 | 15 | 8 | 10 | 战斗机/3 |
A5 | 350 | 0.6 | 5 | 10 | 0.3 | 8 | 3 | 预警机/1 |
群批号 | 距离威胁 | 速度威胁 | 高度威胁 | 进攻角威胁 | 抗干扰威胁 | 重频威胁 | 脉宽威胁 | 载频威胁 | 类型威胁 | 相对接近度值 |
---|---|---|---|---|---|---|---|---|---|---|
A1 | 0.450 | 1 | 0.861 | 0.119 | 0.9 | 0.4453 | 0.4879 | 0.3247 | 0.5 | 0.688 |
A2 | 0.200 | 1 | 0.963 | 0.388 | 0.9 | 0.2647 | 0.4879 | 0.1948 | 0.6 | 0.294 |
A3 | 0.954 | 0.5 | 1 | 0.999 | 0.5 | 0.4206 | 0.4879 | 0.3247 | 0.9 | 0.916 |
A4 | 0.288 | 1 | 0.549 | 0 | 0.9 | 0.4453 | 0.4879 | 0.3247 | 0.7 | 0.458 |
A5 | 0 | 0 | 0.091 | 0.900 | 0.7 | 0 | 0.4879 | 0.1948 | 0.2 | 0.081 |
Table 2 Decision matrix andthreat assessment results
群批号 | 距离威胁 | 速度威胁 | 高度威胁 | 进攻角威胁 | 抗干扰威胁 | 重频威胁 | 脉宽威胁 | 载频威胁 | 类型威胁 | 相对接近度值 |
---|---|---|---|---|---|---|---|---|---|---|
A1 | 0.450 | 1 | 0.861 | 0.119 | 0.9 | 0.4453 | 0.4879 | 0.3247 | 0.5 | 0.688 |
A2 | 0.200 | 1 | 0.963 | 0.388 | 0.9 | 0.2647 | 0.4879 | 0.1948 | 0.6 | 0.294 |
A3 | 0.954 | 0.5 | 1 | 0.999 | 0.5 | 0.4206 | 0.4879 | 0.3247 | 0.9 | 0.916 |
A4 | 0.288 | 1 | 0.549 | 0 | 0.9 | 0.4453 | 0.4879 | 0.3247 | 0.7 | 0.458 |
A5 | 0 | 0 | 0.091 | 0.900 | 0.7 | 0 | 0.4879 | 0.1948 | 0.2 | 0.081 |
方案 | c1 | c2 | c3 |
---|---|---|---|
A1 | (0.7,0.2,0.1) | (0.9,0.1,0.0) | (0.8,0.1,0.1) |
A2 | (0.5,0.1,0.4) | (0.3,0.1,0.6) | (0.2,0.7,0.1) |
A3 | (0.6,0.2,0.2) | (0.5,0.2,0.3) | (0.9,0.1,0.0) |
A4 | (0.8,0.1,0.1) | (0.7,0.1,0.2) | (0.4,0.5,0.1) |
A5 | (0.6,0.3,0.1) | (0.6,0.2,0.2) | (0.7,0.1,0.2) |
Table 3 Intuition blur decision-making matrix D ( t 1 )
方案 | c1 | c2 | c3 |
---|---|---|---|
A1 | (0.7,0.2,0.1) | (0.9,0.1,0.0) | (0.8,0.1,0.1) |
A2 | (0.5,0.1,0.4) | (0.3,0.1,0.6) | (0.2,0.7,0.1) |
A3 | (0.6,0.2,0.2) | (0.5,0.2,0.3) | (0.9,0.1,0.0) |
A4 | (0.8,0.1,0.1) | (0.7,0.1,0.2) | (0.4,0.5,0.1) |
A5 | (0.6,0.3,0.1) | (0.6,0.2,0.2) | (0.7,0.1,0.2) |
方案 | c1 | c2 | c3 |
---|---|---|---|
A1 | (0.5,0.4,0.1) | (0.4,0.5,0.1) | (0.3,0.5,0.2) |
A2 | (0.7,0.3,0.0) | (0.6,0.1,0.3) | (0.5,0.4,0.1) |
A3 | (0.6,0.2,0.2) | (0.6,0.1,0.3) | (0.7,0.2,0.1) |
A4 | (0.8,0.1,0.1) | (0.5,0.1,0.4) | (0.6,0.1,0.3) |
A5 | (0.4,0.3,0.3) | (0.5,0.4,0.1) | (0.5,0.4,0.1) |
Table 4 Intuition blur decision-making matrix D ( t 2 )
方案 | c1 | c2 | c3 |
---|---|---|---|
A1 | (0.5,0.4,0.1) | (0.4,0.5,0.1) | (0.3,0.5,0.2) |
A2 | (0.7,0.3,0.0) | (0.6,0.1,0.3) | (0.5,0.4,0.1) |
A3 | (0.6,0.2,0.2) | (0.6,0.1,0.3) | (0.7,0.2,0.1) |
A4 | (0.8,0.1,0.1) | (0.5,0.1,0.4) | (0.6,0.1,0.3) |
A5 | (0.4,0.3,0.3) | (0.5,0.4,0.1) | (0.5,0.4,0.1) |
方案 | c1 | c2 | c3 |
---|---|---|---|
A1 | (0.5,0.3,0.2) | (0.6,0.3,0.1) | (0.3,0.5,0.2) |
A2 | (0.6,0.3,0.1) | (0.6,0.2,0.2) | (0.5,0.2,0.3) |
A3 | (0.7,0.2,0.1) | (0.8,0.2,0.0) | (0.5,0.4,0.1) |
A4 | (0.8,0.2,0.0) | (0.8,0.1,0.1) | (0.6,0.2,0.2) |
A5 | (0.6,0.2,0.2) | (0.7,0.2,0.1) | (0.4,0.5,0.1) |
Table 5 Intuition blur decision-making matrix D ( t 2 )
方案 | c1 | c2 | c3 |
---|---|---|---|
A1 | (0.5,0.3,0.2) | (0.6,0.3,0.1) | (0.3,0.5,0.2) |
A2 | (0.6,0.3,0.1) | (0.6,0.2,0.2) | (0.5,0.2,0.3) |
A3 | (0.7,0.2,0.1) | (0.8,0.2,0.0) | (0.5,0.4,0.1) |
A4 | (0.8,0.2,0.0) | (0.8,0.1,0.1) | (0.6,0.2,0.2) |
A5 | (0.6,0.2,0.2) | (0.7,0.2,0.1) | (0.4,0.5,0.1) |
[1] |
曲长文, 何友, 马强. 应用多属性决策的威胁评估方法[J]. 系统工程与电子技术, 2000, 22(5):26-28.
|
|
|
[2] |
|
[3] |
王小艺, 刘载文, 侯朝桢, 等. 基于模糊多属性决策的目标威胁估计方法[J]. 控制与决策, 2007, 22(8):859-863.
|
|
|
[4] |
程明, 周德云, 张堃. 基于混合型多属性决策方法的目标威胁评估[J]. 电光与控制, 2010, 17(1):11-13.
|
|
|
[5] |
王毅, 刘三阳, 张文, 等. 属性权重不确定的直觉模糊多属性决策的威胁评估方法[J]. 电子学报, 2014, 42(12):2509-2514.
doi: 10.3969/j.issn.0372-2112.2014.12.025 |
|
|
[6] |
郭辉, 徐浩军, 刘凌. 基于区间数 TOPSIS 法的空战目标威胁评估[J]. 系统工程与电子技术, 2009, 31(12):2914-2917.
|
|
|
[7] |
杨远志, 王红卫, 索中英, 等. 基于粗糙集-逼近理想解排序的辐射源威胁排序方法[J]. 兵工学报, 2016, 37(5):945-952.
doi: 10.3969/j.issn.1000-1093.2016.05.024 |
|
|
[8] |
张浩为, 谢军伟, 葛佳昂, 等. 改进TOPSIS的多态融合直觉模糊威胁评估[J]. 系统工程与电子技术, 2018, 40(10):2263-2269.
|
|
|
[9] |
申卯兴, 许进, 王帅. 空中目标威胁排序的灰色聚类决策方法[J]. 系统工程与电子技术, 2008, 30(9):1721-1723.
|
|
|
[10] |
李特, 冯琦, 张堃. 基于熵权灰色关联和D-S证据理论的威胁评估[J]. 计算机应用研究, 2013, 30(2):380-382.
|
|
|
[11] |
夏春林, 周德云, 冯琦. 基于变权灰色关联法的目标威胁评估[J]. 火力与指挥控制, 2014, 39(4):54-57.
|
|
|
[12] |
刘海波, 王和平, 沈立顶. 基于SAPSO优化灰色神经网络的空中目标威胁估计[J]. 西北工业大学学报, 2016, 34(1):25-32.
|
|
|
[13] |
张力, 陈伟, 刘志坚, 等. 基于综合威胁和 MADM 的超视距威胁评估研究[J]. 数学的实践与认识, 2017, 47(19):111-118.
|
|
|
[14] |
董彦非, 郭基联, 张恒喜. 多机空战目标威胁评估算法[J]. 火力与指挥控制, 2002, 27(4):73-75.
|
|
|
[15] |
高永, 向锦武. 超视距多机协同空战目标分配算法[J]. 北京航空航天大学学报, 2007, 33(3):286-289.
|
|
|
[16] |
陈强, 周先雁. 岩锚梁稳定性影响因素模糊灰色关联分析模型及其应用[J]. 中南大学学报(自然科学版), 2015, 46(9):3487-3495.
|
|
|
[17] |
于亮, 方志耕, 吴利丰, 等. 基于灰色类别差异特性的评价指标客观权重极大熵配置模型[J]. 系统工程理论与实践, 2014, 34(8):2065-2070.
doi: 10.12011/1000-6788(2014)8-2065 |
|
|
[18] |
闫书丽, 刘思峰, 方志耕, 等. 区间灰数群决策中决策者和属性权重确定方法[J]. 系统工程理论与实践, 2014, 34(9):2372-2378.
doi: 10.12011/1000-6788(2014)9-2372 |
|
[1] | LIU Ming-yong, ZHU Li, DONG Hai-xia. Research on Gyroscope Array Based on Kalman Filter [J]. Acta Armamentarii, 2016, 37(2): 272-278. |
[2] | GUO Xiao-tao, WANG Xing, ZHOU Dong-qing. Individual Communication Transmitter Identification Based on Dempster-Shafer Evidence Theory [J]. Acta Armamentarii, 2016, 37(10): 1844-1851. |
[3] | FU Xiao-wei, LI Jin-liang, GAO Xiao-guang. Modeling and Analysing of Air-defense Threat Netting [J]. Acta Armamentarii, 2013, 34(7): 904-909. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||