期刊文献+

目标威胁估计的决策树方法 被引量:1

Target Threat Assessment Based on Decision Tree Method
下载PDF
导出
摘要 讨论了目标威胁估计问题。通过分析目标属性与威胁的关系,建立了评估目标威胁的目标属性列表。根据军事背景知识把目标属性值转换为离散化的威胁效用值,结合战术目标威胁估计的经验值,提出了一个基于决策树的目标威胁估计新方法,实例证明了该方法的有效性。 Target threat assessment is discussed in this paper. A threat attribute list is built about the relation between target attributes and threat level. Based on military knowledge and tactical experience, the threat attribute values can be changed into utility values, and a new algorithm for target threat assessment based on decision tree is proposed, and numerical examples demonstrate the effectiveness of the algorithm.
出处 《江南大学学报(自然科学版)》 CAS 2009年第5期513-515,共3页 Joural of Jiangnan University (Natural Science Edition) 
基金 总装"十一五"装备预研基金项目(513060302)
关键词 效用函数 威胁估计 决策树 utility function, threat assessment, decision tree
  • 相关文献

参考文献4

二级参考文献18

  • 1武传玉,刘付显.基于模糊评判的新防空威胁评估模型[J].系统工程与电子技术,2004,26(8):1069-1071. 被引量:20
  • 2王卫平,田志学,陈选社.威胁判断的层次——效用模型在防空雷达中的运用[J].现代雷达,2005,27(2):8-10. 被引量:8
  • 3周林.基于MADM的威胁评估排序模型.系统工程与电子技术,2001,23(1):18-18.
  • 4张金槐 唐雪梅.Bayes方法[M].长沙:国防科技大学出版社,1989..
  • 5贺正洪 王睿.防空指挥自动化信息处理[M].西安:空军工程大学,1999..
  • 6Nguyen X T.Threat assessment in tactical airborne environments[J].Proceedings of the Fifth International Conference on,2002,2(8-11):1 300-1 307
  • 7Dall I W.Threat assessment without situation assessment[J].Information,Decision and Control Proceedings.1999,(8-10):365 -370
  • 8Hamed Essam M,Graham Jame H.An agent-based intrusion detection system using fuzzy logic computer system threat evaluation[J].Association for Computing Machinery,2001,1:42-46.
  • 9Morellas V,Pavlidis I,Tsiamyrtzis P.Detection of evens for threat evaluation and recognition[J].Association for Computing Machinery,2003,10:29-45.
  • 10Pearl J.Probabilistic reasoning in intelligent systems:Networks of plausible inference[M].Morgan Kaufmann,San Mateo,CA,1988.

共引文献60

同被引文献16

  • 1吴金平,陆铭华,黄文斌,史扬.水面舰艇编队对反舰导弹的威胁判断研究[J].系统仿真学报,2004,16(5):879-882. 被引量:11
  • 2温羡峤,刘谭军.反战术弹道导弹(ATBM)攻防对抗过程有关参数计算模型研究[J].现代防御技术,1996,24(4):11-23. 被引量:6
  • 3温羡峤,刘谭军.反战术弹道导弹(ATBM)防御系统指挥决策模型研究[J].现代防御技术,1997,25(2):9-20. 被引量:15
  • 4Wang B H, Huang J G, Qin X S, et al. Research on FTOPSIS moeld of threat synthetic evaluation in multi target tracing sys- tem[C]//Proc, of the IEEE International Conference on In dastrial Engineering and Engineering Management, 2007:35 -39.
  • 5Yin G Y, Zhou S L, Zhang W G. A threat assessment algorithm based on AHP and principal components analysis[J]. Procedia Engineering, 2011, 15: 4590-4596.
  • 6Fu L, Wang Q, Xu J, et al. Target assignment and sorting for multi-target attack in multi-aircraft coordinated based on RBF[C]//Proc. of the ence, 2012:1935.
  • 724th Chinese Control and Decision ConJ)r 1938. Feng L Y, Xue Q, Liu M X. Threat evaluation model of targets based on information entropy and fuzzy optimization theory[C]// Proc. of the IEEE Internatiotl nference on Industrial Engi- neering and Engineering Management, 2011 : 1789 - 1793.
  • 8Johansson F, Falkman G. A Bayesian network approach to threat evaluation with application to an air defense scenario[C]//Proc, o/' the l l th International Conference on Information Fusion, 2008: 1-7.
  • 9Li Y X, Wang K Z. Index weight technology in threat evalua- tion based on improved grey theory[C]//Proc, of the Interna- tional Symposium on Intelligent Information Technology Ap- plication Workshops, 2008 : 307 - 310.
  • 10Roux J N, Van Vuurent J H. Real-time threat evaluation in a ground based air defence environment[J]. ORION, 2008, 24 (1): 75-101.

引证文献1

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部