Threat Assessment of Manned/Unmanned Aerial Vehicle Formation Based on QABC-IFMADM Algorithm

被引:0
|
作者
Han B.-W. [1 ]
Yao P.-Y. [1 ]
Zhong Y. [1 ]
Ding Y.-S. [1 ]
Liu Z.-Z. [1 ]
机构
[1] Information and Navigation College, Air Force Engineering University, Xi'an, 710077, Shaanxi
来源
Tien Tzu Hsueh Pao/Acta Electronica Sinica | 2018年 / 46卷 / 07期
关键词
Air-to-ground attack; IFMADM; Manned/unmanned aerial vehicle formation; QABC; Threat assessment;
D O I
10.3969/j.issn.0372-2112.2018.07.007
中图分类号
学科分类号
摘要
Under the condition of information technology, there is a high degree of uncertainty in the combat environment of manned/unmanned aerial vehicle formation; so how to evaluate the threat of targets quickly and efficiently becomes an urgent problem to be solved. In the framework of intuitionistic fuzzy sets, researching the satiation that decision makers with preference information on alternatives, the target attribute value is interval number and weight is unknown, a threat assessment method with unknown attribute weight optimized by QABC (Quantum Artificial Bee Colony) optimization algorithm is proposed based on IFMADM (Intuitionistic Fuzzy Multi-Attribute Decision Making). Firstly, preference model is constructed; secondly, the optimization model of optimal attribute weights is established considering the objective optimization taxis and preference information of decision maker synthetically, making attribute weights more reasonably reflect the actual situation by QABC optimization algorithm. Finally, the effectiveness of the proposed method is demonstrated by an example of formation threat to ground attack. © 2018, Chinese Institute of Electronics. All right reserved.
引用
收藏
页码:1584 / 1592
页数:8
相关论文
共 15 条
  • [1] Владимир Михеев: The fighter of the 6th generation will be armed with electromagnetic cannons, 53, 3
  • [2] The U S Air Force Wants to Build Killer 'Swarms
  • [3] Llinas J., Hall D.L., An introduction to multi-sensor data fusion, Proceedings of the 1998 IEEE International Symposium on Circuits & Systems, 6, 1, pp. 537-540, (2002)
  • [4] Steinberg A.N., Bowman C.L., White F.E., Revisions to the JDL data fusion model, Proceedings of Society of Photo-Optical Instrumentation Engineers (SPIE), 37, 19, pp. 430-441, (1999)
  • [5] Wang G.-G., Guo L.-H., Duan H., Et al., The model and algorithm for target threat assessment based on Elman-AdaBoost strong predictor, Acta Electronica Sinica, 40, 5, pp. 901-906, (2012)
  • [6] Liu Y.-F., Chen S.-D., Zhao Z.-Y., Et al., Threat assessment of manned/unmanned combat aerial vehicle formation air-to-ground attack based on FBNs, Systems Engineering and Electronics, 34, 8, pp. 1636-1639, (2012)
  • [7] Chen J.-Y., Yao P.-Y., Wang B., Et al., Dynamic threat assessment based on structure entropy and IGSO-BP algorithm, Systems Engineering and Electronics, 37, 5, pp. 1076-1083, (2015)
  • [8] Yuan X.-H., Li H.-X., Yang X., Fuzzy system and fuzzy inference modeling method based on fuzzy transformation, Acta Electronica Sinica, 41, 4, pp. 674-680, (2013)
  • [9] Wang Y., Liu S.-Y., Zhang W., Et al., Threat assessment method with uncertain attribute weight based on intuitionistic fuzzy multi-attribute decision, Acta Electronica Sinica, 42, 12, pp. 2509-2514, (2014)
  • [10] Vahdani B., Mousavi S.M., Moghaddam R.T., A new design of the elimination and choice translating reality method for multi-criteria group decision in an intuitionistic fuzzy environment, Applied Mathematical Modeling, 37, 3, pp. 1781-1799, (2013)