系统仿真学报 ›› 2024, Vol. 36 ›› Issue (12): 2741-2754.doi: 10.16182/j.issn1004731x.joss.24-FZ0735

• 论文 •    

一种不确定性动态环境下的威胁评估方法

杨妹1, 王秉坤1,2, 张中杰1, 曾焱1, 黄健1   

  1. 1.国防科技大学 智能科学学院,湖南 长沙 410073
    2.西北机电工程研究所,陕西 咸阳 712099
  • 收稿日期:2024-07-09 修回日期:2024-10-01 出版日期:2024-12-20 发布日期:2024-12-20
  • 第一作者简介:杨妹(1985-),女,副研究员,博士,研究方向为并行与分布式仿真、作战建模与仿真、任务规划。
  • 基金资助:
    国防科技重点实验室基金(6142003202311);国家自然科学基金青年基金(62103425);湖南省自然科学基金(2022JJ40559)

A Threat Assessment Method in Uncertain Dynamic Environments

Yang Mei1, Wang Bingkun1,2, Zhang Zhongjie1, Zeng Yan1, Huang Jian1   

  1. 1.College of Intelligence Science and Technology, National University of Defense Technology, Changsha 410073, China
    2.Northwest Institute of Mechanical & Electrical Engineering, Xianyang 712099, China
  • Received:2024-07-09 Revised:2024-10-01 Online:2024-12-20 Published:2024-12-20

摘要:

针对战争复杂系统存在动态不确定性,提出一种基于先验信息和动态观测结果的威胁评估方法。对先验信息进行数据挖掘获得战场态势先验知识并构建装备关联置信矩阵;构建传感器模型,综合考虑先验知识和观测结果的情况下使用贝叶斯方法动态更新当前态势情况下蓝方实体的数量;确定威胁评价指标和指标权重,使用TOPSIS法完成威胁评估。该方法能较好地描述复杂多变的动态战场环境,并充分利用先验信息和动态观测结果对探测区域或探测位置附近探测盲区进行威胁评估。通过案例仿真分析验证了该方法的可行性。

关键词: 威胁评估, 数据挖掘, 贝叶斯, TOPSIS法, 不确定性

Abstract:

A threat assessment method based on priori information and dynamic observation results is studied for the existence of dynamic uncertainty in complex war systems. The data mining is applied to obtain prior knowledge on the battlefield situation and construct an equipment-related confidence matrix. The sensor model is constructed to dynamically update the number of blue-side entities under the current situation by using the Bayesian method and considering both intelligence and observation results. The threat evaluation indicators and their weights are determined, and the TOPSIS method is used to finish the threat assessment. This method can well describe the complex and changing dynamic battlefield environment and make full use of priori information and dynamic observation results for threat assessment of the detection area or the undetectable location nearby. The feasibility of this method is verified through case simulation analysis.

Key words: threat assessment, data mining, Bayesian, TOPSIS, uncertainty

中图分类号: