Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Machine learning-based penetration algorithm verification method and system

A machine learning and algorithm verification technology, applied in the field of verification, can solve the problems of low accuracy, inability to optimize the penetration algorithm, and many confrontation elements, so as to improve the accuracy and increase the probability of penetration.

Active Publication Date: 2022-01-28
BEIJING CHERILEAD TECH
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, it is extremely difficult to establish a mathematical analytical model describing the penetration process and the system will be very complicated
[0003] In the actual missile penetration process, the offensive and defensive process is complicated, and there are too many confrontation elements. The accuracy of the calculation of the penetration probability of the existing defense penetration algorithm is not high. In addition, the existing technology can only calculate the penetration probability based on the past data. Unable to optimize the penetration algorithm, improve the penetration probability, and give a more efficient penetration plan

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Machine learning-based penetration algorithm verification method and system
  • Machine learning-based penetration algorithm verification method and system
  • Machine learning-based penetration algorithm verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0063] The embodiment of the present invention provides a method for verifying the penetration algorithm based on machine learning, figure 1 It is a flow chart of a machine learning-based penetration algorithm verification method in an embodiment of the present invention; please refer to figure 1 , the verification method includes the following steps:

[0064] S100, obtaining a number of penetrating impact factors involving both offensive and defensive parties;

[0065] S200, setting a weight value for each penetration impact factor based on the machine learning regression model;

[0066] S300. Determine the penetration probability based on the weight value of eac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a machine learning-based defense penetration algorithm verification method and a machine learning-based defense penetration algorithm verification system. The method comprises the following steps of: obtaining a plurality of defense penetration influence factors related to attack and defense parties; setting a weight value for each defense penetration influence factor based on a machine learning regression model; determining a penetration probability based on the weight value of each penetration influence factor and the parameter of the penetration influence factor; and adjusting the parameter and the corresponding weight value of each penetration influence factor, and verifying the parameter and the corresponding weight value of the penetration influence factor when the penetration probability is higher than a preset threshold value according to different penetration probabilities corresponding to different set weight values. Various factors possibly influencing the calculation of the penetration probability are considered, and weights are set for different influence factors through a weight calculation method, so that the accuracy of the calculation of the penetration probability is improved. In addition, the penetration probability calculation system can optimize and improve the penetration probability by changing different influence factors.

Description

technical field [0001] The invention relates to the technical field of verification, in particular to a method and system for verifying a penetration algorithm based on machine learning. Background technique [0002] The missile penetration process is a complex offensive and defensive confrontation process. The offensive missile will have various penetration measures such as decoys, jammers, and multiple warheads. The defense system can only be realized by relying on the early warning, detection, identification, and interception of the system. For the successful interception of incoming missiles, there are many elements of confrontation, and rapidly changing factors exist widely and act at the same time. Therefore, it is extremely difficult to establish a mathematical analytical model describing the penetration process and the system will be very complicated. [0003] In the actual missile penetration process, the offensive and defensive process is complicated, and there ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06N20/00G06F17/18
CPCG06N20/00G06F17/18
Inventor 张凯郑应强刘春立
Owner BEIJING CHERILEAD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products