期刊文献+

基于粗糙集理论的威胁估计方法研究 被引量:1

Study of Threat Estimation Method Based on Rough Set Theory
下载PDF
导出
摘要 针对威胁估计中确定指标是否合理的问题,基于粗糙集理论,提出了威胁估计的步骤,研究了威胁估计条件属性集的约简方法,通过实例验证了粗糙集理论在威胁估计中指标约简的可行性。 Aiming at the problem whether the determining index is reasonable in threat estimation,this paper puts forward the processes of threat estimation based on the rough set theory,and studies the reduction methods of threat estimation condition attributes set,proves that rough set theory is feasible in threat estimation index reduction through practical examples.
机构地区 空军雷达学院
出处 《舰船电子对抗》 2009年第5期110-113,共4页 Shipboard Electronic Countermeasure
关键词 粗糙集 威胁估计 条件属性集 约简 rough set threat estimation condition attributes set reduction
  • 相关文献

参考文献9

二级参考文献38

  • 1潭跃进 陈英武 易近先.系统工程原理[M].长沙:国防科技大学出版社,1999..
  • 2史红权.舰艇编队防空威胁判断研究[D].海军大连舰艇学院,1998.
  • 3Goodman I J,Mahler R P S,Nguyen H T.Mathematics of Data Fusion[M].Kluwer,1997.
  • 4Bar-Shalom Y,Li X R.Multitarget-Multisensor Tracking:Principles and Techniques [M].YBS Publishing,Storrs,CT,1995.
  • 5徐庆,焦继文,赵建昕.模糊数学及其在军事上的应用[J].海潮出版社,1999,.
  • 6[2]Saaty T L.The Analytic Hierarchy Process[M].New York:McGraw-Hill Inc,1980.
  • 7周林.基于MADM的威胁评估排序模型.系统工程与电子技术,2001,23(1):18-18.
  • 8DAS S, LAWLESS D.Trustworthy situation assessment via belief networks[A].In: The Proceedings of the Fifth International Conference on Information Fusion[C].Annapolis:International Society of Information Fusion, 2002.
  • 9BLADON P, HALL R J, WRIGHT W A. Situation assessment using graphical models[A].In: The Proceedings of the Fifth International Conference on Information Fusion[C].Annapolis:International Society of Information Fusion, 2002.
  • 10DAS S, GREY R, GONSALVES P.Situation assessment via Bayesian belief networks[A].In: The Proceedings of the Fifth International Conference on Information Fusion[C].Annapolis:International Society of Information Fusion, 2002.

共引文献95

同被引文献18

  • 1Chen H,Zhang K.Target threat assessment based on genetic neural network[C]//2012 International Conference on Industrial Control and Electronics Engineering,Xi'an,2012:1789-1792.
  • 2Maria R,Tove H,Mikael L,et al.Towards future threat evaluation systems:user study,proposal and precepts for design[C]//16th International Conference on Information Fusion,Istanbul,Turkey,2013:1863-1870.
  • 3Heintz F,Dohety P.A knowledge processing middleware framework and its relation to the JDL data fusion model[C]//2005 8th International Conference on Information Fusion,2005:1592-1599.
  • 4Anders D,Tove H.Supporting threat evaluation through visual analytics[C]//2013 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Suppor(tCog SIMA),San Diego,2013:155-162.
  • 5Yao Y Y,Zhou B.A logic language for granular computing[C]//Proceedings of 6th IEEE International Conference on Cognitive Informatics,2007:178-185.
  • 6Han J C.Granular computing:models and applications[J].International Journal of Intelligent Systems,2010,25(2):111-117.
  • 7胡杰,赵辉,黄长强,肖树臣.优势变精度粗糙集在UCAV威胁估计中的应用[J].空军工程大学学报(自然科学版),2009,10(5):27-31. 被引量:5
  • 8陈华,张可,曹建蜀.基于PSO-BP算法的目标威胁评估[J].计算机应用研究,2012,29(3):900-901. 被引量:18
  • 9张文忠,孙永芹,杨洪立,张国贤.基于Rough集和回归型SVM的超视距空战威胁评估[J].四川兵工学报,2013,34(7):14-18. 被引量:4
  • 10雷肖剑,朱悦萌,谭乐祖.混合多类型属性威胁评估模型构建[J].舰船电子工程,2014,34(2):27-30. 被引量:2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部