CN118071161B - Method and system for evaluating threat of air cluster target under small sample condition - Google Patents
Method and system for evaluating threat of air cluster target under small sample condition Download PDFInfo
- Publication number
- CN118071161B CN118071161B CN202410503863.4A CN202410503863A CN118071161B CN 118071161 B CN118071161 B CN 118071161B CN 202410503863 A CN202410503863 A CN 202410503863A CN 118071161 B CN118071161 B CN 118071161B
- Authority
- CN
- China
- Prior art keywords
- threat
- target
- constraint
- parameters
- fireflies
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 241000254158 Lampyridae Species 0.000 claims abstract description 41
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 27
- 238000004364 calculation method Methods 0.000 claims description 15
- 230000015572 biosynthetic process Effects 0.000 claims description 5
- 238000004590 computer program Methods 0.000 claims description 4
- 238000007476 Maximum Likelihood Methods 0.000 claims description 3
- 230000031700 light absorption Effects 0.000 claims description 3
- 239000011159 matrix material Substances 0.000 claims description 3
- 230000008569 process Effects 0.000 claims description 3
- 230000001131 transforming effect Effects 0.000 claims description 3
- 230000003190 augmentative effect Effects 0.000 claims 2
- 238000005070 sampling Methods 0.000 claims 1
- 238000010276 construction Methods 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 101001121408 Homo sapiens L-amino-acid oxidase Proteins 0.000 description 1
- 102100026388 L-amino-acid oxidase Human genes 0.000 description 1
- 101100233916 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) KAR5 gene Proteins 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000001364 causal effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001149 cognitive effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000035515 penetration Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/21—Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
- G06F18/213—Feature extraction, e.g. by transforming the feature space; Summarisation; Mappings, e.g. subspace methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/24—Classification techniques
- G06F18/241—Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
- G06F18/2415—Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on parametric or probabilistic models, e.g. based on likelihood ratio or false acceptance rate versus a false rejection rate
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/004—Artificial life, i.e. computing arrangements simulating life
- G06N3/006—Artificial life, i.e. computing arrangements simulating life based on simulated virtual individual or collective life forms, e.g. social simulations or particle swarm optimisation [PSO]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/12—Computing arrangements based on biological models using genetic models
- G06N3/126—Evolutionary algorithms, e.g. genetic algorithms or genetic programming
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Human Resources & Organizations (AREA)
- General Physics & Mathematics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Data Mining & Analysis (AREA)
- Strategic Management (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- Biophysics (AREA)
- Tourism & Hospitality (AREA)
- Artificial Intelligence (AREA)
- Evolutionary Computation (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Bioinformatics & Cheminformatics (AREA)
- General Engineering & Computer Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Evolutionary Biology (AREA)
- Bioinformatics & Computational Biology (AREA)
- General Business, Economics & Management (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Marketing (AREA)
- General Health & Medical Sciences (AREA)
- Mathematical Physics (AREA)
- Game Theory and Decision Science (AREA)
- Computing Systems (AREA)
- Molecular Biology (AREA)
- Software Systems (AREA)
- Computational Linguistics (AREA)
- Biomedical Technology (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Primary Health Care (AREA)
- Physiology (AREA)
- Probability & Statistics with Applications (AREA)
- Genetics & Genomics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
技术领域Technical Field
本发明涉及空中集群目标态势感知领域,具体涉及一种小样本条件下的空中集群目标威胁评估方法及系统。The present invention relates to the field of situation awareness of aerial cluster targets, and in particular to a threat assessment method and system for aerial cluster targets under small sample conditions.
背景技术Background technique
随着群体智能技术和通信技术的快速发展,集群目标开始被广泛应用于侦察、突防等各类空中作战场景,相较于单个空中目标,空中集群目标具有抗毁性强、功能分布化等优势,可以更加高效地协同完成火力打击等各类作战任务。因此,未来的空中作战将会是集群之间的作战,在这样的大背景下,对敌方集群目标进行准确的态势评估是我方制定合理作战决策的前提,威胁评估作为态势评估的重要环节,是火力分配的基础。With the rapid development of swarm intelligence technology and communication technology, cluster targets have begun to be widely used in various aerial combat scenarios such as reconnaissance and penetration. Compared with single aerial targets, aerial cluster targets have advantages such as strong anti-destruction and distributed functions, and can more efficiently coordinate and complete various combat tasks such as fire strikes. Therefore, future aerial combat will be combat between clusters. In this context, accurate situation assessment of enemy cluster targets is the premise for us to make reasonable combat decisions. Threat assessment, as an important part of situation assessment, is the basis for firepower allocation.
然而,威胁评估过程中面临着许多难题。首先,敌方空中集群目标强大的敏捷协同能力使得作战行动更加灵活,增加了战场态势的多变性,具体表现为敌方目标的速度、位置等信息快速变化,这对认知模型的实时性和准确性提出了较高要求。其次,目前大部分威胁评估方法的模型结构都是完全基于专家经验构建的,然而这样的做法完全忽视了战场样本数据包含的信息,过于主观。最后,威胁评估模型的构建需要大量样本数据作为支撑,然而真实战场的敌方信息难以获得,因此用于模型构建的数据在作战初期通常较少,这对小样本下模型构建的能力提出了较高要求。However, there are many difficulties in the threat assessment process. First, the powerful agile coordination capability of enemy air cluster targets makes combat operations more flexible and increases the variability of battlefield situations. Specifically, the speed, position and other information of enemy targets change rapidly, which places high demands on the real-time and accuracy of cognitive models. Secondly, the model structure of most current threat assessment methods is built entirely based on expert experience. However, this approach completely ignores the information contained in battlefield sample data and is too subjective. Finally, the construction of threat assessment models requires a large amount of sample data as support. However, enemy information on the real battlefield is difficult to obtain. Therefore, the data used for model construction is usually less in the early stages of combat, which places high demands on the ability to build models with small samples.
发明内容Summary of the invention
针对空中集群目标威胁评估面临的上述难点,本发明提出一种小样本条件下的空中集群目标威胁评估方法及系统,通过动态贝叶斯网络、基于离散萤火虫算法的结构学习以及基于数据扩充的小样本参数学习算法等方法,克服该问题面临的实时性要求高、模型过于主观、样本数量少等难点。In view of the above-mentioned difficulties faced by aerial cluster target threat assessment, the present invention proposes a method and system for aerial cluster target threat assessment under small sample conditions, which overcomes the difficulties faced by the problem, such as high real-time requirements, overly subjective models, and small number of samples, through methods such as dynamic Bayesian networks, structural learning based on discrete firefly algorithm, and small sample parameter learning algorithm based on data expansion.
实现本发明目的的技术方案为:一种小样本条件下的空中集群目标威胁评估方法,包括如下步骤:The technical solution to achieve the purpose of the present invention is: a method for assessing the threat of aerial cluster targets under small sample conditions, comprising the following steps:
步骤1,获取敌方空中集群目标的基本信息,包括目标位置、目标速度、目标类型、目标数量、集群队形;Step 1: Obtain basic information of enemy air cluster targets, including target position, target speed, target type, target quantity, and cluster formation;
步骤2,对空中集群目标的特征进行选取,通过离散萤火虫算法学习威胁评估的动态贝叶斯网络模型结构;Step 2: Select the features of the aerial cluster targets and learn the dynamic Bayesian network model structure of threat assessment through the discrete firefly algorithm;
步骤3,以步骤2中的模型结构为基础,使用基于数据扩充的小样本参数学习算法确定模型参数;Step 3, based on the model structure in step 2, determine the model parameters using a small sample parameter learning algorithm based on data expansion;
步骤4,将步骤1中的敌方目标信息输入到威胁评估模型中推理,得到威胁等级概率分布,再通过优劣解距离法处理得到最终的威胁评估数值;Step 4: Input the enemy target information in step 1 into the threat assessment model for inference to obtain the threat level probability distribution, and then process it through the superior and inferior solution distance method to obtain the final threat assessment value;
步骤5:输出所有空中集群目标在当前时间片的威胁值与排序。Step 5: Output the threat value and ranking of all air cluster targets in the current time slice.
一种小样本条件下的空中集群目标威胁评估系统,包括:An air cluster target threat assessment system under small sample conditions, comprising:
第一模块,用于获取敌方空中集群目标的基本信息,包括目标位置、目标速度、目标类型、目标数量、集群队形;The first module is used to obtain basic information about enemy air cluster targets, including target position, target speed, target type, target quantity, and cluster formation;
第二模块,基于专家经验对空中集群目标的特征进行选取,通过离散萤火虫算法学习威胁评估的动态贝叶斯网络模型结构;The second module selects the features of aerial cluster targets based on expert experience and learns the dynamic Bayesian network model structure of threat assessment through the discrete firefly algorithm;
第三模块,以第二模块中的模型结构为基础,使用基于数据扩充的小样本参数学习算法确定模型参数;The third module, based on the model structure in the second module, uses a small sample parameter learning algorithm based on data expansion to determine the model parameters;
第四模块,用于将第一模块中的敌方目标信息输入到威胁评估模型中推理,得到威胁等级概率分布,再通过优劣解距离法处理得到最终的威胁评估数值;The fourth module is used to input the enemy target information in the first module into the threat assessment model for inference, obtain the threat level probability distribution, and then obtain the final threat assessment value through the superior and inferior solution distance method;
第五模块,用于输出所有空中集群目标在当前时间片的威胁值与排序。The fifth module is used to output the threat value and ranking of all air cluster targets in the current time slice.
一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现上述的小样本条件下空中集群目标的威胁评估方法。An electronic device includes a memory, a processor, and a computer program stored in the memory and executable on the processor. When the processor executes the program, the threat assessment method for aerial cluster targets under small sample conditions is implemented.
一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现上述的小样本条件下的空中集群目标威胁评估方法。A computer-readable storage medium stores a computer program, which, when executed by a processor, implements the above-mentioned method for assessing the threat of aerial cluster targets under small sample conditions.
本发明由于采用以上技术方案,能够取得如下的技术效果:The present invention adopts the above technical solution, and can achieve the following technical effects:
根据专家经验选择威胁因素,并通过离散萤火虫算法学习动态贝叶斯网络(DBN)结构,在此基础上通过基于数据扩充的小样本参数学习算法确定DBN参数,得到的模型能够有效地实时对空中集群目标进行威胁概率值的推理,基于上述威胁评估模型的推理结果,采用优劣解距离法将概率值转换为具体威胁值,提升结果的直观性,便于威胁度排序。Threat factors are selected according to expert experience, and the dynamic Bayesian network (DBN) structure is learned through the discrete firefly algorithm. On this basis, the DBN parameters are determined through a small sample parameter learning algorithm based on data expansion. The obtained model can effectively infer the threat probability value of aerial cluster targets in real time. Based on the reasoning results of the above threat assessment model, the superior and inferior solution distance method is used to convert the probability value into a specific threat value, which improves the intuitiveness of the result and facilitates the threat degree sorting.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1是本发明的空中集群目标威胁评估方法原理框图。FIG1 is a block diagram showing the principle of the aerial cluster target threat assessment method of the present invention.
图2是空中集群目标威胁评估模型结构图。Figure 2 is a structural diagram of the aerial cluster target threat assessment model.
图3是本发明提出的威胁评估方法与传统方法的评估准确度对比示意图。FIG3 is a schematic diagram showing a comparison of the assessment accuracy of the threat assessment method proposed by the present invention and the traditional method.
具体实施方式Detailed ways
下面结合附图和实施例对本发明的技术方案作进一步详述。The technical solution of the present invention is further described in detail below in conjunction with the accompanying drawings and embodiments.
如图1所示,本发明主要包括:初始化模块、基于动态贝叶斯网络(DBN)的威胁评估模型构建模块、基于优劣解距离法的威胁概率分布数值化模块、集群目标威胁值输出模块。结合流程图说明具体实现步骤为:As shown in Figure 1, the present invention mainly includes: an initialization module, a threat assessment model construction module based on a dynamic Bayesian network (DBN), a threat probability distribution numerical module based on the superior and inferior solution distance method, and a cluster target threat value output module. The specific implementation steps are as follows in conjunction with the flowchart:
步骤1:初始化。通过操作人员输入若干空中集群目标在一段时间内的特征信息,例如:目标数量、目标类型、目标位置、目标携带载荷。Step 1: Initialization: The operator inputs the characteristic information of several air cluster targets within a period of time, such as the number of targets, target type, target location, and target carrying load.
步骤2:结合专家经验和历史样本信息制定DBN结构。在开始学习结构之前,需要根据专家经验综合考虑空中集群目标的特征,分别从态势指标、能力指标以及集群指标三部分选择威胁评估指标,其中,态势指标反映了目标在威胁评估时的所处的状态,例如速度、位置信息等;能力指标反映了目标所具有的作战能力,例如电子干扰能力、携带载荷类型;集群指标指集群目标相较于单目标所特有的指标,例如集群队形、集群中目标数量等,在确定了威胁评估所需考虑的特征后,根据离散萤火虫算法对网络的具体连接进行学习,在贝叶斯网络中,连接代表节点之间存在因果关系。具体步骤如下:Step 2: Formulate the DBN structure by combining expert experience and historical sample information. Before starting to learn the structure, it is necessary to comprehensively consider the characteristics of aerial cluster targets based on expert experience, and select threat assessment indicators from three parts: situation indicators, capability indicators, and cluster indicators. Among them, situation indicators reflect the state of the target during threat assessment, such as speed, location information, etc.; capability indicators reflect the combat capability of the target, such as electronic jamming capability and the type of payload carried; cluster indicators refer to indicators that are unique to cluster targets compared to single targets, such as cluster formation, the number of targets in the cluster, etc. After determining the features that need to be considered for threat assessment, the specific connections of the network are learned according to the discrete firefly algorithm. In the Bayesian network, connections represent causal relationships between nodes. The specific steps are as follows:
首先,初始化参数:—初始吸引力系数,—光吸收系数,—迭代次数,—萤火虫种群大小。基于上文中提到的威胁评估指标随机生成个贝叶斯网络结构,并将结构转换为字符串作为萤火虫的初始种群,计算种群中所有萤火虫的适应度,用表示,,指萤火虫所代表的结构的BIC评分。First, initialize the parameters: — initial attraction coefficient, — light absorption coefficient, — number of iterations, —Firefly population size. Randomly generated based on the threat assessment indicators mentioned above A Bayesian network structure is constructed and converted into a string as the initial population of fireflies. The fitness of all fireflies in the population is calculated and used express, , Firefly BIC scores of the structures represented.
接着,开始迭代,遍历所有的萤火虫,设第只萤火虫为,如果的适应度为种群中最大值,为避免陷入局部最优解,对它进行变异操作,即随机翻转的结构矩阵中的一个元素。若的适应度不是最大值,则再次遍历所有萤火虫,设遍历到的萤火虫为,若,则向的位置移动,公式如下:Next, start iterating, traversing all fireflies, and set Fireflies ,if The fitness of is the maximum value in the population. In order to avoid falling into the local optimal solution, it is mutated, that is, randomly flipped is an element in the structure matrix of If the fitness is not the maximum value, then traverse all fireflies again, and set the traversed fireflies to ,like ,but Towards The position of is moved, the formula is as follows:
(1) (1)
(2) (2)
(3) (3)
其中,和分别代表第个和第个萤火虫对应的贝叶斯网络结构转化得到的字符串,字符串中均含有个元素,为网络节点数量,是一个长度为的向量,表示移动的距离,表示其中的第个元素,分别表示和中的第个元素,为吸引力系数,为萤火虫位置之间的欧式距离的平方,移动一次后,若适应度优于移动前,则个体保留移动的结果,否则个体不变。in, and Respectively represent and The string obtained by transforming the Bayesian network structure corresponding to each firefly contains elements, is the number of network nodes, is a length of A vector representing the distance moved, Indicates the elements, Respectively and The elements, is the attraction coefficient, is the square of the Euclidean distance between the positions of fireflies. After moving once, if the fitness is better than before the move, the individual retains the result of the move, otherwise the individual remains unchanged.
当完成了所有萤火虫的移动后,将移动后的种群作为下一次迭代的初始种群。When all fireflies have finished moving, the population after the move is used as the initial population for the next iteration.
最后,检查是否达到迭代次数,若达到则输出历史最优适应度对应的威胁评估模型结构,否则继续迭代。Finally, check whether the number of iterations has been reached. If so, output the threat assessment model structure corresponding to the historical optimal fitness, otherwise continue to iterate.
步骤3:学习DBN的参数。考虑到战场初期学习样本不足的问题,通过数据扩充的方式对参数进行学习,首先,根据专家经验对DBN参数制定约束集,根据参数对于不同约束的符合度对原始和扩充数据集进行评分,评分越高,数据集学习的效果就越好。下面列举本算法使用的约束和对应的评分公式,设为节点取第个状态,且父节点集合取第个状态下的网络参数,即该情况发生的概率,分别代表对应约束类型的评分。公式如下:Step 3: Learn DBN parameters. Considering the problem of insufficient learning samples in the early stage of the battlefield, the parameters are learned through data expansion. First, a constraint set is formulated for DBN parameters based on expert experience. , the original and expanded data sets are scored according to the degree of compliance of the parameters with different constraints. The higher the score, the better the learning effect of the data set. The constraints used in this algorithm and the corresponding scoring formula are listed below. For Node Take the first state, and the parent node set is the The network parameters in the state, that is, the probability of this situation occurring, Represent the scores of the corresponding constraint types. The formula is as follows:
(1)范围约束:该约束定义了一个参数的约束区域,设和分别为区间的左右端点,公式如下:(1) Range constraint: This constraint defines the constraint area of a parameter. and are the left and right endpoints of the interval respectively, and the formula is as follows:
(4) (4)
评分计算公式:Rating calculation formula:
(5) (5)
(2)不等式约束:该约束定义了两个参数间的关系,设为与不同的另一个参数,公式如下:(2) Inequality constraint: This constraint defines the relationship between two parameters. For Different another parameter, the formula is as follows:
(6) (6)
评分计算公式:Rating calculation formula:
(7) (7)
(3)近似相等约束:该约束定义了参数间的近似相等关系,设为置信区间,取0.1,公式如下:(3) Approximate equality constraint: This constraint defines the approximate equality relationship between parameters. is the confidence interval, take 0.1, and the formula is as follows:
(8) (8)
评分计算公式:Rating calculation formula:
(9) (9)
完成DBN参数约束制定后,以最大似然估计为基础参数学习算法,原始数据集为样本进行参数学习,公式如下:After completing the DBN parameter constraints, the maximum likelihood estimation is used as the basic parameter learning algorithm, and the original data set Parameter learning is performed for samples, and the formula is as follows:
(10) (10)
其中,是数据集中满足给出的节点取值状态组合的样本数据总数,表示中共有个取值。完成参数学习后,根据约束集,计算所得评分,设为。in, The data set satisfies The total number of sample data for the given node value state combination, express middle Total After completing parameter learning, according to the constraint set , calculate the score, set as .
接着,通过bootstrap法对原始数据集进行M次有放回的随机采样,得到扩展数据集,分别使用中的M组样本数据进行参数学习并计算评分,并取其中评分最高的数据集,评分设为。若,则保留扩展数据集,否则丢弃扩展数据集,重新采样,直到出现满足的数据集为止。Next, the original data set is randomly sampled M times with replacement using the bootstrap method to obtain the extended data set , respectively use The M groups of sample data in the above example are used for parameter learning and score calculation, and the dataset with the highest score is selected. , the rating is set to .like , then keep the extended data set, otherwise discard the extended data set and resample until a satisfying data set so far.
最后,将分别基于数据集和参数学习得到的参数通过下式进行加权求和得到最终的网络参数,其中和分别代表数据集和中的样本数量。Finally, based on the data set and Parameters learned The final network parameters are obtained by weighted summation using the following formula ,in and Represents the data sets and The number of samples in .
(11) (11)
步骤4:在确定了DBN的结构和参数后,需要根据步骤1得到的目标信息进行威胁值推理,推理采用常见的接口算法作为推理算法,该方法具有推理速度快、结果准确等优势。威胁评估的最终目的是对目标的威胁度进行排序,然而DBN推理的结果是概率分布,难以直接进行排序。故使用优劣解距离法将威胁概率分布量化为0-1的一个具体的数值,便于后续排序,设DBN推理结果为,分别代表目标威胁度属于低、中、高三个等级的概率值,设威胁概率分布的正、负理想解分别为,,代表目标完全属于高威胁目标或低威胁目标,威胁值计算公式如下:Step 4: After determining the structure and parameters of DBN, it is necessary to perform threat value inference based on the target information obtained in step 1. The inference uses a common interface algorithm as the inference algorithm. This method has the advantages of fast inference speed and accurate results. The ultimate goal of threat assessment is to rank the threat level of the target. However, the result of DBN inference is a probability distribution, which is difficult to rank directly. Therefore, the superiority and inferiority distance method is used to quantify the threat probability distribution into a specific value of 0-1, which is convenient for subsequent sorting. Suppose the DBN inference result is , They represent the probability values of the target threat level belonging to low, medium and high levels respectively. Assume that the positive and negative ideal solutions of the threat probability distribution are , , which means the target is completely a high threat target or a low threat target. The threat value calculation formula is as follows:
(12) (12)
其中和分布表示目标威胁概率分布与和的欧氏距离,为目标的威胁值,取值越大代表目标对我方的威胁越大。in and Distribution represents the target threat probability distribution and and The Euclidean distance of It is the threat value of the target. The larger the value, the greater the threat the target poses to us.
步骤5:输出所有空中集群目标在当前时间片的威胁值与排序。Step 5: Output the threat value and ranking of all air cluster targets in the current time slice.
本发明的威胁评估模型结构如图2所示,实验结果如图3所示。其中,硬件环境为:CPU i7-12700H @ 2.30 GHz,内存24G,一共对5个空中集群目标进行实时的威胁评估,为模拟小样本情况,分别在样本量为50、200、400、600、800、1000的情况下进行威胁评估。图3展示了本发明提出方法与传统方法在不同样本量情况下的威胁评估准确度对比,评估准确度指威胁排序与按照专家经验给出结果的相似程度,越高代表评估结果越接近人为评估,其中传统方法指不依靠数据完全基于专家经验构建威胁评估DBN模型。从图3的结果可以看出,相比于传统方法,本发明提出的威胁评估方法可以在样本匮乏的情况下得出较为准确的威胁评估结果。The structure of the threat assessment model of the present invention is shown in Figure 2, and the experimental results are shown in Figure 3. Among them, the hardware environment is: CPU i7-12700H @ 2.30 GHz, memory 24G, a total of 5 air cluster targets are subjected to real-time threat assessment, and in order to simulate the small sample situation, threat assessment is performed when the sample size is 50, 200, 400, 600, 800, and 1000 respectively. Figure 3 shows the comparison of the threat assessment accuracy of the method proposed by the present invention and the traditional method under different sample sizes. The assessment accuracy refers to the similarity between the threat ranking and the result given according to expert experience. The higher the accuracy, the closer the assessment result is to the human assessment. The traditional method refers to the threat assessment DBN model constructed based entirely on expert experience without relying on data. It can be seen from the results of Figure 3 that compared with the traditional method, the threat assessment method proposed by the present invention can obtain more accurate threat assessment results when samples are scarce.
建立的小样本条件下的空中集群目标威胁评估模型,能在样本匮乏的情况下构建出较为合理的威胁评估模型,从而提升小样本条件下空中集群目标威胁评估的准确性。在进行威胁评估模型的构建时,基于专家经验通过离散萤火虫算法对模型结构进行学习,并通过基于数据扩充的参数学习算法提升小样本下参数学习的准确度。The established threat assessment model for aerial cluster targets under small sample conditions can build a more reasonable threat assessment model when samples are scarce, thereby improving the accuracy of threat assessment for aerial cluster targets under small sample conditions. When constructing the threat assessment model, the discrete firefly algorithm is used to learn the model structure based on expert experience, and the parameter learning algorithm based on data expansion is used to improve the accuracy of parameter learning under small sample conditions.
本发明提供了一种小样本条件下的空中集群目标威胁评估方法,具体实现该技术方案的方法和途径很多,以上所述仅是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。本实施例中未明确的各组成部分均可用现有技术加以实现。The present invention provides a method for assessing the threat of air cluster targets under small sample conditions. There are many methods and ways to implement the technical solution. The above is only a preferred implementation of the present invention. It should be pointed out that for ordinary technicians in this technical field, several improvements and modifications can be made without departing from the principle of the present invention. These improvements and modifications should also be regarded as the protection scope of the present invention. All components not specified in this embodiment can be implemented by existing technologies.
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410503863.4A CN118071161B (en) | 2024-04-25 | 2024-04-25 | Method and system for evaluating threat of air cluster target under small sample condition |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410503863.4A CN118071161B (en) | 2024-04-25 | 2024-04-25 | Method and system for evaluating threat of air cluster target under small sample condition |
Publications (2)
Publication Number | Publication Date |
---|---|
CN118071161A CN118071161A (en) | 2024-05-24 |
CN118071161B true CN118071161B (en) | 2024-07-09 |
Family
ID=91102485
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410503863.4A Active CN118071161B (en) | 2024-04-25 | 2024-04-25 | Method and system for evaluating threat of air cluster target under small sample condition |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118071161B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107194155A (en) * | 2017-05-02 | 2017-09-22 | 西北工业大学 | A kind of threat assessment modeling method based on small data set and Bayesian network |
CN116738334A (en) * | 2023-06-12 | 2023-09-12 | 中国电子科技集团公司第五十四研究所 | Air multi-target threat assessment method based on DBN and TOPSIS method |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005124580A1 (en) * | 2004-06-15 | 2005-12-29 | The University Of Melbourne | A threat assessment system and process |
KR101235149B1 (en) * | 2011-05-12 | 2013-02-20 | 국방과학연구소 | Threat evaluation system and method against antiair target and computer-readerable storage medium having a program recorded thereon where the program is to carry out its method |
-
2024
- 2024-04-25 CN CN202410503863.4A patent/CN118071161B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107194155A (en) * | 2017-05-02 | 2017-09-22 | 西北工业大学 | A kind of threat assessment modeling method based on small data set and Bayesian network |
CN116738334A (en) * | 2023-06-12 | 2023-09-12 | 中国电子科技集团公司第五十四研究所 | Air multi-target threat assessment method based on DBN and TOPSIS method |
Also Published As
Publication number | Publication date |
---|---|
CN118071161A (en) | 2024-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109948029B (en) | Neural network self-adaptive depth Hash image searching method | |
CN111461226A (en) | Adversarial sample generation method, device, terminal and readable storage medium | |
CN109617888B (en) | Abnormal flow detection method and system based on neural network | |
CN107480774A (en) | Dynamic neural network model training method and device based on integrated study | |
CN112052936A (en) | Reinforced learning exploration method and device based on generation countermeasure mechanism | |
CN108805268A (en) | Deeply learning strategy network training method based on evolution algorithm | |
WO2023071592A1 (en) | Network structure search method for ultra-large search space, system and medium | |
CN109740106A (en) | Large-scale network betweenness approximation method, storage device and storage medium based on graph convolutional neural network | |
CN110738362A (en) | method for constructing prediction model based on improved multivariate cosmic algorithm | |
CN109101721B (en) | Multi-unmanned aerial vehicle task allocation method based on interval intuitionistic blurring in uncertain environment | |
CN114781692B (en) | Short-term power load forecasting method, device and electronic equipment | |
CN112612903A (en) | Interpretable knowledge graph embedding expression learning method capable of generating rules | |
CN113722980A (en) | Ocean wave height prediction method, system, computer equipment, storage medium and terminal | |
CN116523001A (en) | Method, device and computer equipment for constructing weak line identification model of power grid | |
CN110222824B (en) | Intelligent algorithm model autonomous generation and evolution method, system and device | |
CN114861917A (en) | Knowledge graph inference model, system and inference method for Bayesian small sample learning | |
CN118071161B (en) | Method and system for evaluating threat of air cluster target under small sample condition | |
CN117077737B (en) | Knowledge tracking system for dynamic collaboration of knowledge points | |
CN117727178A (en) | A large-scale traffic prediction method and system integrating long-distance spatio-temporal correlation | |
CN108924196B (en) | Industrial Internet Green Energy Management System | |
CN110516599A (en) | Group Behavior Recognition Model and Its Training Method Based on Progressive Relational Learning | |
CN116721327A (en) | Neural network architecture searching method based on generalization boundary | |
CN116524316A (en) | Scene Graph Skeleton Construction Method under Reinforcement Learning Framework | |
CN115984025A (en) | Influence propagation estimation method and system based on deep learning graph network model | |
CN110263906B (en) | Asymmetric negative correlation search method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |