Unlock instant, AI-driven research and patent intelligence for your innovation.

Multi-objective threat assessment method based on multi-criteria compromise solution ranking

A compromise solution and multi-objective technology, applied in the field of data fusion, can solve problems such as low reliability and low credibility of sorting results, and achieve the effect of improving rationality and accuracy

Active Publication Date: 2019-11-05
NORTHWESTERN POLYTECHNICAL UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, the TOPSIS method ignores the distance between the alternatives and the ideal solution and the negative ideal solution, that is, all the solutions whose distance from the positive ideal solution is less than the distance from the negative ideal solution are better than the distance from the positive ideal solution equal to Therefore, the ideal solution obtained is not necessarily the solution closest to the ideal point, so the reliability of the sorting results obtained by using the TOPSIS method is low; other existing technologies such as analytic hierarchy process, expert system, Bayesian reasoning, etc. are mostly affected by subjective factors, and the reliability is low
In addition, there are few studies on the application of multi-criteria compromise solution ranking method in threat assessment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-objective threat assessment method based on multi-criteria compromise solution ranking
  • Multi-objective threat assessment method based on multi-criteria compromise solution ranking
  • Multi-objective threat assessment method based on multi-criteria compromise solution ranking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described below in conjunction with the accompanying drawings and embodiments, and the present invention includes but not limited to the following embodiments.

[0022] The present invention provides a threat assessment method based on multi-criteria compromise solution sorting, using the entropy weight method to determine the target attribute weight, and applying the obtained target attribute weight to the multi-criteria compromise solution sorting method for sorting and solving.

[0023] The specific content that the present invention relates to is as follows:

[0024] Step 1: Construct the target attribute decision matrix

[0025] In the formula, t ij Indicates the evaluation value of the i-th (i=1,2,3...m) target under the j-th (j=1,2,3) attribute, where m is the number of targets. Target properties include the following:

[0026] (1) Angle threat factor T a

[0027] T a =[|φ k |+|θ k |] / 360°

[0028] In the formula, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a multi-target threat assessment method based on multi-criteria compromise solution sequencing. The method comprises the steps of firstly constructing a target attribute decision-making matrix, then calculating entropy values of all target attributes, and finally adopting a multi-criteria compromise solution sequencing method to calculate the target threat degree to determine a target which interferes the threat degree maximally. According to the multi-target threat assessment method based on multi-criteria compromise solution sequencing, the limitations of a TOPSIS method can be effectively overcome, the random and subjective problems of a Bayes network, an analytic hierarchy process and the like are avoided, and the rationality and accuracy of target threat degree sequencing are improved.

Description

technical field [0001] The invention belongs to the field of data fusion, in particular to a multi-objective threat assessment method. Background technique [0002] Data fusion technology is a technology in the field of information science, which is an important basis for a new generation of intelligent information technology, and threat assessment is an important part of data fusion research. When our aircraft is interfered by multiple aircraft in different situations, how to make a reasonable order of interference threat level is very important for our command decision-making. Therefore, threat assessment is a prerequisite for making reasonable command decisions, and the research is of great significance. [0003] At present, scholars have conducted some research on multi-objective threat assessment. Commonly used multi-objective threat assessment methods include AHP, intuitionistic fuzzy sets, Bayesian reasoning, expert systems, etc. In the prior art, the TOPSIS method...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/50
CPCG06F30/20
Inventor 张堃刘培培李珂孔维仁马云红徐钊侍佼雷雨
Owner NORTHWESTERN POLYTECHNICAL UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More