Open Access Paper
28 December 2022 Exponential correlation dynamic threat assessment under multi-type heterogeneous data
Meishan Chen, Ying Liu, Yao Lv, Tianyu Li
Author Affiliations +
Proceedings Volume 12506, Third International Conference on Computer Science and Communication Technology (ICCSCT 2022); 125064U (2022) https://doi.org/10.1117/12.2662796
Event: International Conference on Computer Science and Communication Technology (ICCSCT 2022), 2022, Beijing, China
Abstract
In view of the existing air combat target threat assessment methods mainly deal with data of the same structure type, the discrimination of target threat value is not high, and the time weight allocation is not rigorous in the process of dynamic assessment, this paper proposes an exponential correlation dynamic threat assessment method for multi-type heterogeneous data. First, the heterogeneous data is mapped to D-U space to obtain the isomer data, then the attribute weight is solved based on the index correlation degree, and the time weight is solved based on the deviation and grey entropy method. Finally, the comprehensive evaluation value and relative proximity of the target are obtained according to the above calculation to complete the threat ranking. Experimental analysis shows that this method can improve the problem of small distinction between feature attributes, assign time weight more reasonably, and make isomerization of heterogeneous data, effectively deal with uncertain information, adapt to battlefield dynamics, and provide a new solution for air combat decision.

1.

INTRODUCTION

Air combat target threat assessment1-3 is a typical multi attribute decision-making problem. Decision-makers need to assess the threat from potential targets and attack the higher-threat targets.

At present, the methods used for threat assessment are mainly divided into two categories, one is to build a specific mathematical model, the other is based on artificial intelligence assessment methods. Due to measurement error, environmental noise, different equipment, enemy non-cooperation and other factors, the detection data of the incoming target is often missing, inaccurate and fuzzy, while the current threat assessment methods mostly deal with the same type of characteristic attributes. For example, multi-attribute decision making based on interval number4-7 and intuitionistic fuzzy set2, 7-10 is the current research hotspot. Han4 proposed a multi-attribute decision making method for quantum bee colonies with target attribute values of interval number and unknown weights. Dong5 proposed a GRA-TOPSIS radiation source threat assessment model based on game theory under interval conditions. Studies on different types of data generally convert them into a certain type of data and then process them. For example, Kong8 puts forward a processing method of converting the quantitative results of indicators into a unified intuitionistic fuzzy set for evaluation, aiming at the problem of diverse and difficult quantification of target threat indicators in ground combat. Chen3 proposed a new intuitionistic fuzzy multi attribute decision making model based on intuitionistic fuzzy number, right-angle triangle fuzzy number and the proposed intuitionistic fuzzy number, which transformed intuitionistic fuzzy set average operator. The research status shows that there are still technical difficulties in threat assessment processing of multi-type heterogeneous data directly at present.

At the same time, the current threat assessment methods are mostly single moment, and a few methods with time series values is to use Poisson inverse distribution7, 11, 12 to generate time series weights to fuse decision information of multiple moments, involving less factors, did not consider the possible influence of numerical change of characteristic attribute and internal law on weight at different time.

Based on the above, this paper proposes an exponential correlation dynamic threat assessment method for multi-type heterogeneous data. Firstly, referring to the theory of set pair, the D-U space mapping method for multi-type heterogeneous data is defined to keep the uncertainty of information while isomorphizing multi-type heterogeneous data from different sensors. Then the attribute weight was calculated based on the method of exponential correlation degree, and the weight of time series was calculated based on the method of combining deviation and grey entropy. Finally, the comprehensive evaluation value and proximity degree of targets were calculated, and the threat ranking results were obtained.

2.

AIR COMBAT TARGET THREAT ASSESSMENT INDEX SYSTEM

The factors affecting target threat assessment mainly include space posture, tactical intention and combat capability, which must be considered comprehensively. Space posture includes Angle, velocity, distance and altitude threat, which reflects the dynamic property of the target. Tactical intention is divided into attack, cover, interference and evasion, which reflects the behavioral characteristics of the target. Combat capability is measured by maneuvering, attack, detection, range, electronic countermeasures and so on. It reflects the static attributes of the target. The threat assessment system constructed in this paper is shown in Figure 1. The specific indicators and calculation formula are elaborated13.

Figure 1.

Two-dimensional D-U space.

00170_PSISDG12506_125064U_page_3_1.jpg

3.

HETEROGENEOUS DATA AND ISOMERIZATION

3.1

Heterogeneous data

3.1.1

Interval Number.

Let a be an interval number, which can be represented as a = [aL, aU] = {x | aLxaU and 0 ≤ aLdU}. In particular, when aL = aU, a reduces to a positive real number. If the two intervals a = [aL, aU], b = [bL, bU] are equal, if and only if aL = bL, aU = bU, note a=b.

3.1.2.

Intuitional fuzzy set.

Let X be a reference set, an intuitionistic fuzzy set on X is A = {< xi, μΑ(xi), vA(xi) >| xiX}, where μΑ(xi) denotes the membership degree of A, vA(xi) denotes the non-membership degree of A, it satisfies 0 ≤ μΑ(xi) + vA (xi) ≤ 1. Furthermore, πΑ(xi) = 1 – μΑ(xi) – vA(xi) represents the hesitation degree of A.

3.2

Isomer method

In the threat assessment problem, the use of heterogeneous data such as accurate number, interval number and intuitionistic fuzzy set as attribute values is more consistent with the operational reality. It is difficult to directly evaluate heterogeneous data, which usually requires isomerization. Currently, the commonly used method for isomerization of heterogeneous data is to directly transform different types of data into a certain type of data for aggregation evaluation14, but the uncertainty of data will be lost. In order to retain the uncertain information of data, this paper refers to set pair theory15 and comprehensively analyses the certainty and uncertainty of heterogeneous data as a whole, so as to realize the isomerization processing.

3.2.1

Set Pair Theory and D-U Space.

As a theory to solve the problem of uncertainty, the core idea of set pair theory is to construct set pair from two associated sets in the uncertain system, and to construct the set pair connection degree by analyzing the characteristics of set pair from three aspects of sameness, difference and opposition, and its mathematical expression is

00170_PSISDG12506_125064U_page_2_1.jpg

where H is the generated set pair, Q is the total number of set pair features, R is the common feature of two sets, F is neither opposite nor identical feature of two sets, P is the opposite feature of two sets, satisfying P = QRF. R / Q, R / Q and P / Q are respectively represent the degree of identity, difference and opposition of the two sets; τ and ε are the coefficient of difference and the coefficient of opposition respectively.

D-U space is a kind of mapping space of set pair theory. Among the n coordinate axes that constitute n-dimensional space, there are at least 1 dimensional coordinate to describe uncertainty. Take the two-dimensional space shown in Figure 2 as an example, the certainty of variables is represented by the X-axis and the uncertainty by the Y-axis, so the variable θ is called the complex quantity of deterministic uncertainty, and its two-dimensional coordinate system is called the two-dimensional D-U space.

Figure 2.

The target threat assessment values of the three methods

00170_PSISDG12506_125064U_page_7_8.jpg

3.2.2

Interval Number Mapping in D-U Space.

The two endpoints of interval data are determined, but the value is uncertain within the interval. In this section, uncertainty information is reserved by mapping it to D-U space.

It is assumed that the attribute value of the evaluation object Si(in) under the attribute aj(jm) is the normalized interval type value 00170_PSISDG12506_125064U_page_3_2.jpg, that is, meets 00170_PSISDG12506_125064U_page_3_3.jpg, 00170_PSISDG12506_125064U_page_3_4.jpg, and 00170_PSISDG12506_125064U_page_3_5.jpg, when 00170_PSISDG12506_125064U_page_3_6.jpg, 00170_PSISDG12506_125064U_page_3_7.jpg. degrades to a real number.

The expression of interval number 00170_PSISDG12506_125064U_page_3_8.jpg mapping to D-U space is defined as: 00170_PSISDG12506_125064U_page_3_9.jpg represents the degree of certainty about 00170_PSISDG12506_125064U_page_3_10.jpg, 00170_PSISDG12506_125064U_page_3_11.jpg represents the degree of uncertainty about 00170_PSISDG12506_125064U_page_3_12.jpg, τ is the uncertainty coefficient, represents the degree of uncertainty, this paper takes 00170_PSISDG12506_125064U_page_3_13.jpg, therefore, the binary form of interval number 00170_PSISDG12506_125064U_page_3_14.jpg mapping to D-U space is

00170_PSISDG12506_125064U_page_3_15.jpg

3.2.3

Intuitionistic Fuzzy Number Mapping in D-U Space.

Intuitionistic fuzzy number’s expression of complex uncertainty through membership degree, non-membership degree and hesitation degree is similar to the description of uncertainty in set pair theory to a certain extent. Therefore, this paper maps intuitionistic fuzzy number to d-u space by referring to the method13, 16.

It is assumed that the attribute value of the evaluation object si(in) under the attribute 00170_PSISDG12506_125064U_page_3_16.jpg is the intuitionistic fuzzy value after normalization, μij, vij is respectively the membership degree and non-membership degree of 00170_PSISDG12506_125064U_page_3_17.jpg, satisfies μij, vij ∈ [0,1] and 0 ≤ μij + vij ≤ 1, hesitation degree μij = 1 – μijvij, obviously 0 ≤ πij ≤ 1.

The expression of intuitionistic fuzzy number 00170_PSISDG12506_125064U_page_3_18.jpg mapping to D-U space is defined as: θHij, =aij + bijτ, aij = μij is the degree of certainty of representation 00170_PSISDG12506_125064U_page_3_19.jpg, bij =1 – μijvij is the degree of uncertainty of representation 00170_PSISDG12506_125064U_page_3_20.jpg, and the uncertainty coefficient τ = aij/(aij + bij) = μij/(1 – v), then the form of intuitionistic fuzzy number mapping to D-U space is:

00170_PSISDG12506_125064U_page_3_21.jpg

4.

WEIGHT DETERMINATION METHOD

To determine the attribute weight and time weight, the dynamic multi-attribute decision problem D needs to be described first. Set the evaluation objection set of D as S = (s1, s2, ⋯, sn), the attribute set as A = (a1, a2, ⋯, am), and time series set as T = (t1, t2, ⋯, tp). It can be known that at moment tk, the value of the object si on the attribute aj. is 00170_PSISDG12506_125064U_page_3_23.jpg, i = 1,2, ⋯, n, j = 1,2, ⋯·, m, k = 1,2, ⋯·, p, that is, the threat assessment matrix at moment tk is 00170_PSISDG12506_125064U_page_3_24.jpg, 00170_PSISDG12506_125064U_page_3_23a.jpg is the weight of the attribute aj at moment tk, meets 00170_PSISDG12506_125064U_page_3_22.jpg ωk is the time weight at moment tk, meets 00170_PSISDG12506_125064U_page_3_25.jpg.

4.1

Attribute weight determination method

This section refers to the attribute weight determination method based on exponential function correlation degree17 to improve the low resolution accuracy of traditional methods. The specific calculation method is as follows:

Firstly, the positive ideal solution and negative ideal solution of the threat assessment matrix are calculated.

Positive ideal solution:

00170_PSISDG12506_125064U_page_4_1.jpg

Benefit indicator: 00170_PSISDG12506_125064U_page_4_2.jpg; Cost indicator: 00170_PSISDG12506_125064U_page_4_3.jpg.

Negative ideal solution:

00170_PSISDG12506_125064U_page_4_4.jpg

Benefit indicator: 00170_PSISDG12506_125064U_page_4_5.jpg; Cost indicator: 00170_PSISDG12506_125064U_page_4_6.jpg.

The exponential correlation degree between the attribute values of the number i evaluation object and the positive ideal solution at the moment tk is defined as

00170_PSISDG12506_125064U_page_4_7.jpg

where:i = 1,2, ⋯, n, j = 1,2, ⋯, m, k = 1,2, ⋯, p.

Finally, we get the attribute weight vector at moment 00170_PSISDG12506_125064U_page_4_8.jpg.

4.2

Time weight determination method

In dynamic multi-attribute decision making problem, the importance of data at different time to the final threat assessment is different, so how to determine the time weight scientifically and reasonably is the key to the assessment. At present commonly used method for the Poisson distribution inverse form9 way to generate time weighting fusion decision-making information, but this method doesn’t consider attribute values and interconnectedness, the lack of a certain theoretical basis, this article uses the deviation combined with grey entropy weight method to determine the time, the concrete calculation method is as follows:

Define the comprehensive positive and negative deviation of the object si at time tk as

00170_PSISDG12506_125064U_page_4_8a.jpg

Then we know that the positive and negative comprehensive deviation of all objects is

00170_PSISDG12506_125064U_page_4_8b.jpg

The ideal time weight should minimize the positive ideal synthesis deviation and maximize the negative ideal synthesis deviation. Accordingly, the weight determination problem can be transformed into the following multi-objective programming problem:

00170_PSISDG12506_125064U_page_4_8c.jpg

At the same time, because the weight of decision system with incomplete information has certain uncertainty, the uncertainty of time weight sequence should be reduced as much as possible, which can be obtained by maximum entropy principle:

00170_PSISDG12506_125064U_page_5_1.jpg

By introducing the coordinated equilibrium coefficient μ, the three optimization problems above are transformed into a single minimization problem:

00170_PSISDG12506_125064U_page_5_2.jpg

In this paper, three optimization problems are considered equally important and the equilibrium coefficient is μ = 1/3.

Construct Lagrange function, according to the existence condition of extreme value, solve the above equation

00170_PSISDG12506_125064U_page_5_3.jpg

Considering 00170_PSISDG12506_125064U_page_5_4.jpg, we can get the optimal solution of the time weight vector W = ω1, ω2, ω3ωp.

On this basis, the comprehensive evaluation value of the evaluation object si is calculated as

00170_PSISDG12506_125064U_page_5_5.jpg

The closeness degree of each evaluation object 00170_PSISDG12506_125064U_page_5_6.jpg was solved. Finally, the threat ranking was completed according to the closeness degree of each evaluation object.

5.

THREAT ASSESSMENT ALGORITHM

According to the above, the dynamic threat assessment model of multi-type heterogeneous data is established, and the specific process is as follows.

Step 1. Obtain the original threat assessment matrix. According to the battlefield situation, m enemy targets constitute the combat unit set X = {X1, X2, ⋯ Xm} and n target attributes constitute the attribute set N = {N1, N2, ⋯, Nn}, where the j-th attribute value of the i-th target at the moment tk is 00170_PSISDG12506_125064U_page_5_7.jpg, and the numerical structure of different attributes of 00170_PSISDG12506_125064U_page_5_9.jpg is different, and the original target threat assessment matrix 00170_PSISDG12506_125064U_page_5_8.jpg at the moment tk is obtained.

Step 2. Isomerization and normalization. According to the isomorphic method in Section 2, the isomer threat assessment matrix 00170_PSISDG12506_125064U_page_5_10.jpg is obtained by processing the original threat assessment matrix Uk at the moment tk; Due to the different attributes and dimensions of evaluation indicators, they can be divided into benefit and cost type. The value of benefit index is positively correlated with the degree of threat, while the value of cost index is negatively correlated with the degree of threat. The following is a specification for the normalization of different attributes.

00170_PSISDG12506_125064U_page_5_11.jpg

Process the normalized target threat assessment matrix 00170_PSISDG12506_125064U_page_5_12.jpg at the time tk obtained.

Step 3. Determine the positive and negative ideal solutions 00170_PSISDG12506_125064U_page_5_13.jpg, 00170_PSISDG12506_125064U_page_5_14.jpg of each target attribute, and calculate the exponential correlation matrix.

Step 4. Calculate the optimal attribute weight 00170_PSISDG12506_125064U_page_5_15.jpg of tk time based on the method of exponential function correlation degree. Step 5. Integrate attribute weights of multiple moments to solve the optimal time weight vector W.

Step 6. Calculate the comprehensive evaluation value of each target according to attribute weight and time weight vector. Step 7. Calculate the proximity of each target and sort the threats.

6.

EXAMPLE ANALYSIS

In an air battle, our side was attacked by five enemy targets, and the enemy target set X = {x1, x2, x3, x4, x5} was set. This paper selected five threat attributes for evaluation, among which, cost index: [combat ability, anti-interference ability], and benefit index: [target speed, target height and detection distance], and the corresponding threat attribute values of the three moments t1, t2, t3 given by comprehensive combat experience are shown in Table 1. Among them, combat ability and anti-interference ability are intuitionistic fuzzy numbers, target speed is accurate number, and target height and detection distance are interval numbers.

Table 1.

Threat attribute value of target.

TimeTargetCombat abilityAnti-interference abilitySpeedHeightDetection distance
x1(0.66 0.20)(0.74 0.12)0.665(0.53 0.67)(0.575 0.705)
x2(0.76 0.12)(0.70 0.18)0.71(0.655 0.785)(0.635 0.745)
t1x3(0.67 0.19)(0.71 0.17)0.72(0.645 0.755)(0.625 0.735)
x4(0.58 0.30)(0.63 0.24)0.71(0.55 0.67)(0.565 0.695)
x5(0.54 0.32)(0.60 0.27)0.715(0.53 0.67)(0.555 0.685)
x1(0.66 0.20)(0.74 0.12)0.685(0.575 0.705)(0.635 0.765)
x2(0.76 0.17)(0.70 0.18)0.67(0.62 0.74)(0.605 0.715)
t2x3(0.67 0.19)(0.71 0.17)0.75(0.595 0.725)(0.585 0.695)
x4(0.58 0.30)(0.63 0.24)0.68(0.55 0.67)(0.53 0.67)
x5(0.54 0.32)(0.60 0.27)0.755(0.575 0.705)(0.555 0.685)
x1(0.66 0.20)(0.74 0.12)0.73(0.595 0.745)(0.68 0.80)
x2(0.76 0.17)(0.70 0.18)0.63(0.59 0.71)(0.57 0.69)
t3x3(0.67 0.19)(0.71 0.17)0.775(0.57 0.70)(0.54 0.66)
x4(0.58 0.30)(0.63 0.24)0.66(0.55 0.67)(0.505 0.635)
x5(0.54 0.32)(0.60 0.27)0.795(0.595 0.745)(0.555 0.685)

6.1

Calculation process of threat assessment

Step 1. Isomerization: The data in Table 1 have been normalized, so it only needs to be isomerized. The original threat assessment matrix is processed according to the D-U space mapping rule, and the isomerized threat assessment matrix is

00170_PSISDG12506_125064U_page_7_1.jpg

Step 2. According to Z1, the positive and negative ideal solutions of time t1 are respectively:

00170_PSISDG12506_125064U_page_7_2.jpg

Step 3. According to Formula (5), calculate the exponential correlation degree matrix at time t1.

Step 4. According to Formula (6), the optimal attribute weight of time t1 is

00170_PSISDG12506_125064U_page_7_3.jpg

Step 5. In the same way, the optimal attribute weight of t1 and t3 is respectively calculated as

00170_PSISDG12506_125064U_page_7_4.jpg

Step 6. The optimal time weight vector W

00170_PSISDG12506_125064U_page_7_5.jpg

Step 7. The comprehensive evaluation value of each target is calculated by combining the optimal time weight vector and the attribute weight of each moment

00170_PSISDG12506_125064U_page_7_6.jpg

Step 8. The proximity degree of each target was calculated and the threat ranking was carried out

00170_PSISDG12506_125064U_page_7_7.jpg

It can be concluded that the threat ordering result of targets is as follows: 3>1>2>4>5. The objective classification result of target threats is priority attack target 3. Targets 1, 2 and 4 delay decision-making due to the uncertainty of battlefield information, and sufficient data need to be obtained by further reconnaissance for confirmation. It can be seen that the threat ranking results of the method in this paper are consistent with the objective classification results, which proves the effectiveness of the method in the decision-making process of air combat.

6.2

Experimental comparison and analysis

  • (1) Method validity

    Figure 2 shows the comparison results of the method proposed in this paper, the current time t3 and the multi-criteria compromise solution sequencing method (VIKOR)18 respectively. TOPSIS is used for static evaluation at time t3, and VIKOR is used to sort multi-time target threats.

    As can be seen from Figure 2b, the result of ordering at time t3 is 3>2>1>4>5, and the closeness degree of each target is {0.498 0.499 0.684 0.492 0.351} respectively, which is roughly the same as the evaluation result of the method proposed in this paper. From Figure 2c, the ranking result using VIKOR is 3>4>2>1>5, which is quite different from the result of the method proposed in this paper.

    All three methods listed target 3 as the highest threat and target 5 as the lowest threat. By analyzing the parameters at each time, it can be seen that the speed of target 3 keeps increasing and its height keeps decreasing, that is, it is in the accelerated subduction state towards us. The combat ability and anti-interference ability of target 5 are both minimum, and they are in the state of accelerating and climbing away from our side. The ranking of the two is consistent with objective cognition.

    Target 1 has outstanding combat capability, the strongest anti-interference capability, and its speed keeps increasing. Although it is far away from our side, it does not leave the combat radius, so the possibility of launching a surprise attack cannot be ruled out.

    Target 2 has the strongest combat capability and has a trend of approaching our side obviously. Although the speed is gradually decreasing, it is possible to launch a surprise attack, and the threat value should be constantly increased.

    Although target 4 tends to approach our side, its height remains unchanged, so the attack intention is unknown. Its threat level should be lower than target 1 and 2. Obviously, there are some problems in the ranking result of VIKOR.

    At the same time, only according to the ranking results obtained at the current time, the difference between the threat values of targets 1, 2 and 4 is too small, especially that targets 1 and 2 are approximately equal, while the difference between targets 1, 2 and 4 in this method is larger than that in (b), so the differentiation degree is better. In addition, the threat value of target 2 keeps increasing and the combat capability is the strongest, the combat intention of target 4 is not obvious, and the threat value of target 4 should be significantly smaller than that of Target 2 by objective analysis. Therefore, there are also certain defects in the threat ranking only by time.

    The results show that the proposed method is consistent with objective analysis and general cognition, which verifies the effectiveness of the proposed method. At the same time, the method presented in this paper is more distinguishable than the time-only threat ranking method and more conducive to decision execution.

  • (2) Comparison of different time weight determination methods: Poisson inverse distribution

    In order to verify the validity of the time weight determination method in this paper, it is compared with poisson inverse distribution method7. Poisson inverse distribution method selects the observation data at the current (p moment) and the previous p-1 moment for comprehensive evaluation, and assigns weights to the time series, where the weight of time tk is

    00170_PSISDG12506_125064U_page_8_1.jpg

    where ϕ=1.5, then ηk = {0.200,0.267,0.533}, other parameters are unchanged, and the target closeness degree under this time weight is calculated as {0.536 0.510 0.660 0.475 0.374}, the ranking result of target threat is 3>1>2>4>5. The comparison result with the method in this paper is shown in Figure 3.

    It can be seen from Figure 3 that although the threat ranking results under the two time weight determination methods are consistent, the method presented in this paper has good discrimination. Taking target 1 and target 2 as examples, it can be seen from Figure 3 that the threat value of target 1 at moment t1 is much greater than that of target 2, and the threat value of target 1 and target 2 at moment t2, t3 is not much different from each other. However, due to the large deviation and entropy value of the threat assessment matrix at moment t1, the weight of time t1 in this paper increases when calculating the time weight. As a result, the influence of the threat value of each target at the time t1 increases, which indirectly improves the differentiation of target 1 and 2 and improves the effect of threat ranking.

  • (3) Dynamic multi-attribute threat assessment is compared with single-moment threat assessment: single-moment & multimoment.

Figure 3.

The target threat assessment value of different time weight determination methods.

00170_PSISDG12506_125064U_page_8_2.jpg

The attribute weight is determined by using the exponential correlation degree method, and the threat is sorted at different times respectively. The results are shown in Table 2.

Table 2.

Ranking results of target threats at each time.

TimeTarget threat valueRanking result
target1target 2target 3target 4target 5
t10.7200.5080.5220.5320.5011>4>3>2>5
t20.5300.4970.6860.4540.4063>1>2>4>5
t30.4890.5500.7780.4800.3973>2>1>4>5
Multi time0.5720.5210.6720.4880.4323>1>2>4>5

The analysis results show that the ranking results of target threats at different times are different, and the difference between target and other times is particularly significant. By analyzing each target separately, it can be seen that the threat value of target 1 and target 5 decreases continuously over time. The threat value of target 3 keeps increasing and the increase is significant, indicating that the threat is getting bigger and bigger. The threat value of target 2 and 4 firstly decreased and then increased with time. At the same time, it should be noted that the threat value of target 2 eventually exceeds that of target 1, which results in different results when dynamic assessment and threat sequencing are adopted.

7.

CONCLUSION

In this paper, an exponential correlation dynamic threat assessment method is proposed for multi-type heterogeneous data. Firstly, the multi-type heterogeneous data is mapped to D-U space based on set pair theory to achieve isomerization while preserving the uncertainty of information. Secondly, aiming at the problem that the resolution of correlation degree is not high when the traditional method is used to determine the attribute weight, the method of exponential function correlation degree is proposed, which can effectively improve the existing problem and improve the distinction between attributes. Finally, the time weight determination method based on deviation and grey entropy is adopted to optimize the existing Poisson inverse distribution method, and the effectiveness of the proposed method is verified by an example.

REFERENCES

[1] 

Cheng, M., Zhou, D. Y. and Zhang, K., “Threat assessment of target based on a hybrid multi-attribute decision-making method,” Electronics Optics & Control, 17 (1), 11 –13 (2010). Google Scholar

[2] 

Wang, Y., Liu, S. Y. and Zhang, W., “Threat assessment method with uncertain attribute weight based on intuitionistic fuzzy multi-attribute decision,” ACTA ELECTRONICA SINICA, 42 (12), 2509 –2514 (2014). Google Scholar

[3] 

Chen, S. M. and Chang, C. H., “Fuzzy multiattribute decision making based on transformation techniques of intuitionistic fuzzy values and intuitionistic fuzzy geometric averaging operators,” Information Sciences, 133 –149 (2016). https://doi.org/10.1016/j.ins.2016.02.049 Google Scholar

[4] 

Han, B. W., Yao, P. Y. and Zhong, Y., “Threat assessment of manned/unmanned aerial vehicle formation based on QABC-IFMADM algorithm,” ACTA ELECTRONICA SINICA, 46 (7), 1584 –1592 (2018). Google Scholar

[5] 

Dong, P. Y., Wang, H. W. and Chen, Y., “GRA-TOPSIS emitter threat assessment method based on game theory,” Journal of Beijing University of Aeronautics and Astronautics, 46 (10), 1973 –1981 (2020). Google Scholar

[6] 

Xu, K. H., Zhang, S. M. and Li, L. Z., “Cluster target threat assessment based on interval variable weight grey correlation method,” Electronics Optics & Control, 26 (12), 6 –11 (2019). Google Scholar

[7] 

Zhang, H. W., Xie, J. W. and Ge, J. A., “Intuitionistic fuzzy set threat assessment based on improved TOPSIS and multiple times fusion,” Control and Decision, 34 (4), 811 –815 (2019). Google Scholar

[8] 

Kong, D. P., Chang, T. Q. and Han, N., “Multi-attribute index processing method of target threat assessment in ground combat,” ACTA AUTOMATICA SINICA, 47 (1), 161 –172 (2021). Google Scholar

[9] 

Zhang, H. W., Xie, J. W. and Ge, J. A., “Intuitionistic fuzzy set threat assessment based on improved TOPSIS and multiple times fusion,” Systems Engineering and Electronics, 40 (10), 2263 –2269 (2019). Google Scholar

[10] 

Chang, T. Q., Kong, D. P. and Dai, W. J., “Threat assessment method based on the information fusion of target operation intention,” Control and Decision, 34 (3), 591 –601 (2019). Google Scholar

[11] 

Xu, Y. H., Cheng, Y. and Pang, M. Y., “Dynamic radiator threat assessment based on CRITIC-TOPSIS,” Beijing University of Aeronautics and Astronautics, 46 (11), 2168 –2175 (2020). Google Scholar

[12] 

Sun, Y. K., Fang, Z. G. and Chen, D., “Threat assessment model based on dynamic grey principal component analysis and multi-time fusion,” Systems Engineering and Electronics, 43 (03), 740 –746 (2021). Google Scholar

[13] 

Wei, Q., Li, P. and Di, W., “A new sorting algorithm for radar emitter recognition,” International Conference on Computer, 407-410 (2010). Google Scholar

[14] 

Xu, X. H., Cai, C. G. and Liang, D., “Complex multi-stage decision making method based on mixed multi-attribute information,” Systems Engineering and Electronics, 37 (10), 2315 –2321 (2015). Google Scholar

[15] 

Ren, H. G. and Tan, Z. Y., “Multi-attribute decision making model coupled with interval valued intuitionistic fuzzy entropy set pair analysis-technique for order preference by similarity to an ideal solution,” Control Theory & Applications, 37 (1), 176 –186 (2020). Google Scholar

[16] 

Xu, X. H., Zhao C. W. and He, J. S., “Association Variable weight space multi-attribute decision method under multi-type heterogeneous data,” Systems Engineering - Theory & Practice, 40 (7), 1895 –1905 (2020). Google Scholar

[17] 

Shen, J. M., Dang Y. G. and Zhou, W. J., “Grey dynamic multiple attribute correlation decision-making model based on exponential function,” Control and Decision, 31 (8), 1441 –45 (2016). Google Scholar

[18] 

Zhang, K., Kong, W. and Liu, P., “Assessment and sequencing of air target threat based on intuitionistic fuzzy entropy and dynamic VIKOR,” Journal of Systems Engineering and Electronics, 29 (2), 305 –310 (2018). https://doi.org/10.21629/JSEE.2018.02.11 Google Scholar
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Meishan Chen, Ying Liu, Yao Lv, and Tianyu Li "Exponential correlation dynamic threat assessment under multi-type heterogeneous data", Proc. SPIE 12506, Third International Conference on Computer Science and Communication Technology (ICCSCT 2022), 125064U (28 December 2022); https://doi.org/10.1117/12.2662796
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Fuzzy logic

Target detection

Associative arrays

Cognition

Data conversion

Data modeling

Information fusion

Back to Top