[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN118071161B - Method and system for evaluating threat of air cluster target under small sample condition - Google Patents

Method and system for evaluating threat of air cluster target under small sample condition Download PDF

Info

Publication number
CN118071161B
CN118071161B CN202410503863.4A CN202410503863A CN118071161B CN 118071161 B CN118071161 B CN 118071161B CN 202410503863 A CN202410503863 A CN 202410503863A CN 118071161 B CN118071161 B CN 118071161B
Authority
CN
China
Prior art keywords
threat
target
constraint
parameters
fireflies
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410503863.4A
Other languages
Chinese (zh)
Other versions
CN118071161A (en
Inventor
杨力
龚辰涛
黄琦龙
李洋军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Science and Technology
Original Assignee
Nanjing University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Science and Technology filed Critical Nanjing University of Science and Technology
Priority to CN202410503863.4A priority Critical patent/CN118071161B/en
Publication of CN118071161A publication Critical patent/CN118071161A/en
Application granted granted Critical
Publication of CN118071161B publication Critical patent/CN118071161B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/213Feature extraction, e.g. by transforming the feature space; Summarisation; Mappings, e.g. subspace methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • G06F18/2415Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on parametric or probabilistic models, e.g. based on likelihood ratio or false acceptance rate versus a false rejection rate
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/004Artificial life, i.e. computing arrangements simulating life
    • G06N3/006Artificial life, i.e. computing arrangements simulating life based on simulated virtual individual or collective life forms, e.g. social simulations or particle swarm optimisation [PSO]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/12Computing arrangements based on biological models using genetic models
    • G06N3/126Evolutionary algorithms, e.g. genetic algorithms or genetic programming
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • General Physics & Mathematics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Biophysics (AREA)
  • Tourism & Hospitality (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • Educational Administration (AREA)
  • Development Economics (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • General Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Evolutionary Biology (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Marketing (AREA)
  • General Health & Medical Sciences (AREA)
  • Mathematical Physics (AREA)
  • Game Theory and Decision Science (AREA)
  • Computing Systems (AREA)
  • Molecular Biology (AREA)
  • Software Systems (AREA)
  • Computational Linguistics (AREA)
  • Biomedical Technology (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Primary Health Care (AREA)
  • Physiology (AREA)
  • Probability & Statistics with Applications (AREA)
  • Genetics & Genomics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an air cluster target threat assessment method and system under a small sample condition, wherein the method comprises the following steps: combining expert experience and a discrete firefly algorithm, establishing a dynamic Bayesian network based on the air cluster target characteristics, and determining the structure of a threat assessment model; the parameters of the threat assessment model are learned by adopting a small sample parameter learning method based on data expansion, so that the construction of the threat assessment model is completed; and discretizing the enemy target information, inputting the discretized enemy target information into an established dynamic Bayesian network to obtain threat level probability distribution, and obtaining a specific threat value through a good-bad solution distance method. The threat assessment method provided by the invention can be used for carrying out threat assessment on the air cluster target in real time, and still has higher assessment accuracy under the condition of lack of sample information.

Description

小样本条件下的空中集群目标威胁评估方法及系统Aerial cluster target threat assessment method and system under small sample conditions

技术领域Technical Field

本发明涉及空中集群目标态势感知领域,具体涉及一种小样本条件下的空中集群目标威胁评估方法及系统。The present invention relates to the field of situation awareness of aerial cluster targets, and in particular to a threat assessment method and system for aerial cluster targets under small sample conditions.

背景技术Background technique

随着群体智能技术和通信技术的快速发展,集群目标开始被广泛应用于侦察、突防等各类空中作战场景,相较于单个空中目标,空中集群目标具有抗毁性强、功能分布化等优势,可以更加高效地协同完成火力打击等各类作战任务。因此,未来的空中作战将会是集群之间的作战,在这样的大背景下,对敌方集群目标进行准确的态势评估是我方制定合理作战决策的前提,威胁评估作为态势评估的重要环节,是火力分配的基础。With the rapid development of swarm intelligence technology and communication technology, cluster targets have begun to be widely used in various aerial combat scenarios such as reconnaissance and penetration. Compared with single aerial targets, aerial cluster targets have advantages such as strong anti-destruction and distributed functions, and can more efficiently coordinate and complete various combat tasks such as fire strikes. Therefore, future aerial combat will be combat between clusters. In this context, accurate situation assessment of enemy cluster targets is the premise for us to make reasonable combat decisions. Threat assessment, as an important part of situation assessment, is the basis for firepower allocation.

然而,威胁评估过程中面临着许多难题。首先,敌方空中集群目标强大的敏捷协同能力使得作战行动更加灵活,增加了战场态势的多变性,具体表现为敌方目标的速度、位置等信息快速变化,这对认知模型的实时性和准确性提出了较高要求。其次,目前大部分威胁评估方法的模型结构都是完全基于专家经验构建的,然而这样的做法完全忽视了战场样本数据包含的信息,过于主观。最后,威胁评估模型的构建需要大量样本数据作为支撑,然而真实战场的敌方信息难以获得,因此用于模型构建的数据在作战初期通常较少,这对小样本下模型构建的能力提出了较高要求。However, there are many difficulties in the threat assessment process. First, the powerful agile coordination capability of enemy air cluster targets makes combat operations more flexible and increases the variability of battlefield situations. Specifically, the speed, position and other information of enemy targets change rapidly, which places high demands on the real-time and accuracy of cognitive models. Secondly, the model structure of most current threat assessment methods is built entirely based on expert experience. However, this approach completely ignores the information contained in battlefield sample data and is too subjective. Finally, the construction of threat assessment models requires a large amount of sample data as support. However, enemy information on the real battlefield is difficult to obtain. Therefore, the data used for model construction is usually less in the early stages of combat, which places high demands on the ability to build models with small samples.

发明内容Summary of the invention

针对空中集群目标威胁评估面临的上述难点,本发明提出一种小样本条件下的空中集群目标威胁评估方法及系统,通过动态贝叶斯网络、基于离散萤火虫算法的结构学习以及基于数据扩充的小样本参数学习算法等方法,克服该问题面临的实时性要求高、模型过于主观、样本数量少等难点。In view of the above-mentioned difficulties faced by aerial cluster target threat assessment, the present invention proposes a method and system for aerial cluster target threat assessment under small sample conditions, which overcomes the difficulties faced by the problem, such as high real-time requirements, overly subjective models, and small number of samples, through methods such as dynamic Bayesian networks, structural learning based on discrete firefly algorithm, and small sample parameter learning algorithm based on data expansion.

实现本发明目的的技术方案为:一种小样本条件下的空中集群目标威胁评估方法,包括如下步骤:The technical solution to achieve the purpose of the present invention is: a method for assessing the threat of aerial cluster targets under small sample conditions, comprising the following steps:

步骤1,获取敌方空中集群目标的基本信息,包括目标位置、目标速度、目标类型、目标数量、集群队形;Step 1: Obtain basic information of enemy air cluster targets, including target position, target speed, target type, target quantity, and cluster formation;

步骤2,对空中集群目标的特征进行选取,通过离散萤火虫算法学习威胁评估的动态贝叶斯网络模型结构;Step 2: Select the features of the aerial cluster targets and learn the dynamic Bayesian network model structure of threat assessment through the discrete firefly algorithm;

步骤3,以步骤2中的模型结构为基础,使用基于数据扩充的小样本参数学习算法确定模型参数;Step 3, based on the model structure in step 2, determine the model parameters using a small sample parameter learning algorithm based on data expansion;

步骤4,将步骤1中的敌方目标信息输入到威胁评估模型中推理,得到威胁等级概率分布,再通过优劣解距离法处理得到最终的威胁评估数值;Step 4: Input the enemy target information in step 1 into the threat assessment model for inference to obtain the threat level probability distribution, and then process it through the superior and inferior solution distance method to obtain the final threat assessment value;

步骤5:输出所有空中集群目标在当前时间片的威胁值与排序。Step 5: Output the threat value and ranking of all air cluster targets in the current time slice.

一种小样本条件下的空中集群目标威胁评估系统,包括:An air cluster target threat assessment system under small sample conditions, comprising:

第一模块,用于获取敌方空中集群目标的基本信息,包括目标位置、目标速度、目标类型、目标数量、集群队形;The first module is used to obtain basic information about enemy air cluster targets, including target position, target speed, target type, target quantity, and cluster formation;

第二模块,基于专家经验对空中集群目标的特征进行选取,通过离散萤火虫算法学习威胁评估的动态贝叶斯网络模型结构;The second module selects the features of aerial cluster targets based on expert experience and learns the dynamic Bayesian network model structure of threat assessment through the discrete firefly algorithm;

第三模块,以第二模块中的模型结构为基础,使用基于数据扩充的小样本参数学习算法确定模型参数;The third module, based on the model structure in the second module, uses a small sample parameter learning algorithm based on data expansion to determine the model parameters;

第四模块,用于将第一模块中的敌方目标信息输入到威胁评估模型中推理,得到威胁等级概率分布,再通过优劣解距离法处理得到最终的威胁评估数值;The fourth module is used to input the enemy target information in the first module into the threat assessment model for inference, obtain the threat level probability distribution, and then obtain the final threat assessment value through the superior and inferior solution distance method;

第五模块,用于输出所有空中集群目标在当前时间片的威胁值与排序。The fifth module is used to output the threat value and ranking of all air cluster targets in the current time slice.

一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现上述的小样本条件下空中集群目标的威胁评估方法。An electronic device includes a memory, a processor, and a computer program stored in the memory and executable on the processor. When the processor executes the program, the threat assessment method for aerial cluster targets under small sample conditions is implemented.

一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现上述的小样本条件下的空中集群目标威胁评估方法。A computer-readable storage medium stores a computer program, which, when executed by a processor, implements the above-mentioned method for assessing the threat of aerial cluster targets under small sample conditions.

本发明由于采用以上技术方案,能够取得如下的技术效果:The present invention adopts the above technical solution, and can achieve the following technical effects:

根据专家经验选择威胁因素,并通过离散萤火虫算法学习动态贝叶斯网络(DBN)结构,在此基础上通过基于数据扩充的小样本参数学习算法确定DBN参数,得到的模型能够有效地实时对空中集群目标进行威胁概率值的推理,基于上述威胁评估模型的推理结果,采用优劣解距离法将概率值转换为具体威胁值,提升结果的直观性,便于威胁度排序。Threat factors are selected according to expert experience, and the dynamic Bayesian network (DBN) structure is learned through the discrete firefly algorithm. On this basis, the DBN parameters are determined through a small sample parameter learning algorithm based on data expansion. The obtained model can effectively infer the threat probability value of aerial cluster targets in real time. Based on the reasoning results of the above threat assessment model, the superior and inferior solution distance method is used to convert the probability value into a specific threat value, which improves the intuitiveness of the result and facilitates the threat degree sorting.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

图1是本发明的空中集群目标威胁评估方法原理框图。FIG1 is a block diagram showing the principle of the aerial cluster target threat assessment method of the present invention.

图2是空中集群目标威胁评估模型结构图。Figure 2 is a structural diagram of the aerial cluster target threat assessment model.

图3是本发明提出的威胁评估方法与传统方法的评估准确度对比示意图。FIG3 is a schematic diagram showing a comparison of the assessment accuracy of the threat assessment method proposed by the present invention and the traditional method.

具体实施方式Detailed ways

下面结合附图和实施例对本发明的技术方案作进一步详述。The technical solution of the present invention is further described in detail below in conjunction with the accompanying drawings and embodiments.

如图1所示,本发明主要包括:初始化模块、基于动态贝叶斯网络(DBN)的威胁评估模型构建模块、基于优劣解距离法的威胁概率分布数值化模块、集群目标威胁值输出模块。结合流程图说明具体实现步骤为:As shown in Figure 1, the present invention mainly includes: an initialization module, a threat assessment model construction module based on a dynamic Bayesian network (DBN), a threat probability distribution numerical module based on the superior and inferior solution distance method, and a cluster target threat value output module. The specific implementation steps are as follows in conjunction with the flowchart:

步骤1:初始化。通过操作人员输入若干空中集群目标在一段时间内的特征信息,例如:目标数量、目标类型、目标位置、目标携带载荷。Step 1: Initialization: The operator inputs the characteristic information of several air cluster targets within a period of time, such as the number of targets, target type, target location, and target carrying load.

步骤2:结合专家经验和历史样本信息制定DBN结构。在开始学习结构之前,需要根据专家经验综合考虑空中集群目标的特征,分别从态势指标、能力指标以及集群指标三部分选择威胁评估指标,其中,态势指标反映了目标在威胁评估时的所处的状态,例如速度、位置信息等;能力指标反映了目标所具有的作战能力,例如电子干扰能力、携带载荷类型;集群指标指集群目标相较于单目标所特有的指标,例如集群队形、集群中目标数量等,在确定了威胁评估所需考虑的特征后,根据离散萤火虫算法对网络的具体连接进行学习,在贝叶斯网络中,连接代表节点之间存在因果关系。具体步骤如下:Step 2: Formulate the DBN structure by combining expert experience and historical sample information. Before starting to learn the structure, it is necessary to comprehensively consider the characteristics of aerial cluster targets based on expert experience, and select threat assessment indicators from three parts: situation indicators, capability indicators, and cluster indicators. Among them, situation indicators reflect the state of the target during threat assessment, such as speed, location information, etc.; capability indicators reflect the combat capability of the target, such as electronic jamming capability and the type of payload carried; cluster indicators refer to indicators that are unique to cluster targets compared to single targets, such as cluster formation, the number of targets in the cluster, etc. After determining the features that need to be considered for threat assessment, the specific connections of the network are learned according to the discrete firefly algorithm. In the Bayesian network, connections represent causal relationships between nodes. The specific steps are as follows:

首先,初始化参数:—初始吸引力系数,—光吸收系数,—迭代次数,—萤火虫种群大小。基于上文中提到的威胁评估指标随机生成个贝叶斯网络结构,并将结构转换为字符串作为萤火虫的初始种群,计算种群中所有萤火虫的适应度,用表示,指萤火虫所代表的结构的BIC评分。First, initialize the parameters: — initial attraction coefficient, — light absorption coefficient, — number of iterations, —Firefly population size. Randomly generated based on the threat assessment indicators mentioned above A Bayesian network structure is constructed and converted into a string as the initial population of fireflies. The fitness of all fireflies in the population is calculated and used express, , Firefly BIC scores of the structures represented.

接着,开始迭代,遍历所有的萤火虫,设第只萤火虫为,如果的适应度为种群中最大值,为避免陷入局部最优解,对它进行变异操作,即随机翻转的结构矩阵中的一个元素。若的适应度不是最大值,则再次遍历所有萤火虫,设遍历到的萤火虫为,若,则的位置移动,公式如下:Next, start iterating, traversing all fireflies, and set Fireflies ,if The fitness of is the maximum value in the population. In order to avoid falling into the local optimal solution, it is mutated, that is, randomly flipped is an element in the structure matrix of If the fitness is not the maximum value, then traverse all fireflies again, and set the traversed fireflies to ,like ,but Towards The position of is moved, the formula is as follows:

(1) (1)

(2) (2)

(3) (3)

其中,分别代表第个和第个萤火虫对应的贝叶斯网络结构转化得到的字符串,字符串中均含有个元素,为网络节点数量,是一个长度为的向量,表示移动的距离,表示其中的第个元素,分别表示中的第个元素,为吸引力系数,为萤火虫位置之间的欧式距离的平方,移动一次后,若适应度优于移动前,则个体保留移动的结果,否则个体不变。in, and Respectively represent and The string obtained by transforming the Bayesian network structure corresponding to each firefly contains elements, is the number of network nodes, is a length of A vector representing the distance moved, Indicates the elements, Respectively and The elements, is the attraction coefficient, is the square of the Euclidean distance between the positions of fireflies. After moving once, if the fitness is better than before the move, the individual retains the result of the move, otherwise the individual remains unchanged.

当完成了所有萤火虫的移动后,将移动后的种群作为下一次迭代的初始种群。When all fireflies have finished moving, the population after the move is used as the initial population for the next iteration.

最后,检查是否达到迭代次数,若达到则输出历史最优适应度对应的威胁评估模型结构,否则继续迭代。Finally, check whether the number of iterations has been reached. If so, output the threat assessment model structure corresponding to the historical optimal fitness, otherwise continue to iterate.

步骤3:学习DBN的参数。考虑到战场初期学习样本不足的问题,通过数据扩充的方式对参数进行学习,首先,根据专家经验对DBN参数制定约束集,根据参数对于不同约束的符合度对原始和扩充数据集进行评分,评分越高,数据集学习的效果就越好。下面列举本算法使用的约束和对应的评分公式,设为节点取第个状态,且父节点集合取第个状态下的网络参数,即该情况发生的概率,分别代表对应约束类型的评分。公式如下:Step 3: Learn DBN parameters. Considering the problem of insufficient learning samples in the early stage of the battlefield, the parameters are learned through data expansion. First, a constraint set is formulated for DBN parameters based on expert experience. , the original and expanded data sets are scored according to the degree of compliance of the parameters with different constraints. The higher the score, the better the learning effect of the data set. The constraints used in this algorithm and the corresponding scoring formula are listed below. For Node Take the first state, and the parent node set is the The network parameters in the state, that is, the probability of this situation occurring, Represent the scores of the corresponding constraint types. The formula is as follows:

(1)范围约束:该约束定义了一个参数的约束区域,设分别为区间的左右端点,公式如下:(1) Range constraint: This constraint defines the constraint area of a parameter. and are the left and right endpoints of the interval respectively, and the formula is as follows:

(4) (4)

评分计算公式:Rating calculation formula:

(5) (5)

(2)不等式约束:该约束定义了两个参数间的关系,设为与不同的另一个参数,公式如下:(2) Inequality constraint: This constraint defines the relationship between two parameters. For Different another parameter, the formula is as follows:

(6) (6)

评分计算公式:Rating calculation formula:

(7) (7)

(3)近似相等约束:该约束定义了参数间的近似相等关系,设为置信区间,取0.1,公式如下:(3) Approximate equality constraint: This constraint defines the approximate equality relationship between parameters. is the confidence interval, take 0.1, and the formula is as follows:

(8) (8)

评分计算公式:Rating calculation formula:

(9) (9)

完成DBN参数约束制定后,以最大似然估计为基础参数学习算法,原始数据集为样本进行参数学习,公式如下:After completing the DBN parameter constraints, the maximum likelihood estimation is used as the basic parameter learning algorithm, and the original data set Parameter learning is performed for samples, and the formula is as follows:

(10) (10)

其中,是数据集中满足给出的节点取值状态组合的样本数据总数,表示共有个取值。完成参数学习后,根据约束集,计算所得评分,设为in, The data set satisfies The total number of sample data for the given node value state combination, express middle Total After completing parameter learning, according to the constraint set , calculate the score, set as .

接着,通过bootstrap法对原始数据集进行M次有放回的随机采样,得到扩展数据集,分别使用中的M组样本数据进行参数学习并计算评分,并取其中评分最高的数据集,评分设为。若,则保留扩展数据集,否则丢弃扩展数据集,重新采样,直到出现满足的数据集为止。Next, the original data set is randomly sampled M times with replacement using the bootstrap method to obtain the extended data set , respectively use The M groups of sample data in the above example are used for parameter learning and score calculation, and the dataset with the highest score is selected. , the rating is set to .like , then keep the extended data set, otherwise discard the extended data set and resample until a satisfying data set so far.

最后,将分别基于数据集参数学习得到的参数通过下式进行加权求和得到最终的网络参数,其中分别代表数据集中的样本数量。Finally, based on the data set and Parameters learned The final network parameters are obtained by weighted summation using the following formula ,in and Represents the data sets and The number of samples in .

(11) (11)

步骤4:在确定了DBN的结构和参数后,需要根据步骤1得到的目标信息进行威胁值推理,推理采用常见的接口算法作为推理算法,该方法具有推理速度快、结果准确等优势。威胁评估的最终目的是对目标的威胁度进行排序,然而DBN推理的结果是概率分布,难以直接进行排序。故使用优劣解距离法将威胁概率分布量化为0-1的一个具体的数值,便于后续排序,设DBN推理结果为分别代表目标威胁度属于低、中、高三个等级的概率值,设威胁概率分布的正、负理想解分别为,代表目标完全属于高威胁目标或低威胁目标,威胁值计算公式如下:Step 4: After determining the structure and parameters of DBN, it is necessary to perform threat value inference based on the target information obtained in step 1. The inference uses a common interface algorithm as the inference algorithm. This method has the advantages of fast inference speed and accurate results. The ultimate goal of threat assessment is to rank the threat level of the target. However, the result of DBN inference is a probability distribution, which is difficult to rank directly. Therefore, the superiority and inferiority distance method is used to quantify the threat probability distribution into a specific value of 0-1, which is convenient for subsequent sorting. Suppose the DBN inference result is , They represent the probability values of the target threat level belonging to low, medium and high levels respectively. Assume that the positive and negative ideal solutions of the threat probability distribution are , , which means the target is completely a high threat target or a low threat target. The threat value calculation formula is as follows:

(12) (12)

其中分布表示目标威胁概率分布的欧氏距离,为目标的威胁值,取值越大代表目标对我方的威胁越大。in and Distribution represents the target threat probability distribution and and The Euclidean distance of It is the threat value of the target. The larger the value, the greater the threat the target poses to us.

步骤5:输出所有空中集群目标在当前时间片的威胁值与排序。Step 5: Output the threat value and ranking of all air cluster targets in the current time slice.

本发明的威胁评估模型结构如图2所示,实验结果如图3所示。其中,硬件环境为:CPU i7-12700H @ 2.30 GHz,内存24G,一共对5个空中集群目标进行实时的威胁评估,为模拟小样本情况,分别在样本量为50、200、400、600、800、1000的情况下进行威胁评估。图3展示了本发明提出方法与传统方法在不同样本量情况下的威胁评估准确度对比,评估准确度指威胁排序与按照专家经验给出结果的相似程度,越高代表评估结果越接近人为评估,其中传统方法指不依靠数据完全基于专家经验构建威胁评估DBN模型。从图3的结果可以看出,相比于传统方法,本发明提出的威胁评估方法可以在样本匮乏的情况下得出较为准确的威胁评估结果。The structure of the threat assessment model of the present invention is shown in Figure 2, and the experimental results are shown in Figure 3. Among them, the hardware environment is: CPU i7-12700H @ 2.30 GHz, memory 24G, a total of 5 air cluster targets are subjected to real-time threat assessment, and in order to simulate the small sample situation, threat assessment is performed when the sample size is 50, 200, 400, 600, 800, and 1000 respectively. Figure 3 shows the comparison of the threat assessment accuracy of the method proposed by the present invention and the traditional method under different sample sizes. The assessment accuracy refers to the similarity between the threat ranking and the result given according to expert experience. The higher the accuracy, the closer the assessment result is to the human assessment. The traditional method refers to the threat assessment DBN model constructed based entirely on expert experience without relying on data. It can be seen from the results of Figure 3 that compared with the traditional method, the threat assessment method proposed by the present invention can obtain more accurate threat assessment results when samples are scarce.

建立的小样本条件下的空中集群目标威胁评估模型,能在样本匮乏的情况下构建出较为合理的威胁评估模型,从而提升小样本条件下空中集群目标威胁评估的准确性。在进行威胁评估模型的构建时,基于专家经验通过离散萤火虫算法对模型结构进行学习,并通过基于数据扩充的参数学习算法提升小样本下参数学习的准确度。The established threat assessment model for aerial cluster targets under small sample conditions can build a more reasonable threat assessment model when samples are scarce, thereby improving the accuracy of threat assessment for aerial cluster targets under small sample conditions. When constructing the threat assessment model, the discrete firefly algorithm is used to learn the model structure based on expert experience, and the parameter learning algorithm based on data expansion is used to improve the accuracy of parameter learning under small sample conditions.

本发明提供了一种小样本条件下的空中集群目标威胁评估方法,具体实现该技术方案的方法和途径很多,以上所述仅是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。本实施例中未明确的各组成部分均可用现有技术加以实现。The present invention provides a method for assessing the threat of air cluster targets under small sample conditions. There are many methods and ways to implement the technical solution. The above is only a preferred implementation of the present invention. It should be pointed out that for ordinary technicians in this technical field, several improvements and modifications can be made without departing from the principle of the present invention. These improvements and modifications should also be regarded as the protection scope of the present invention. All components not specified in this embodiment can be implemented by existing technologies.

Claims (6)

1.一种小样本条件下的空中集群目标威胁评估方法,其特征在于,包括如下步骤:1. A method for assessing the threat of aerial cluster targets under small sample conditions, characterized in that it comprises the following steps: 步骤1,获取敌方空中集群目标的基本信息,包括目标位置、目标速度、目标类型、目标数量、集群队形;Step 1: Obtain basic information of enemy air cluster targets, including target position, target speed, target type, target quantity, and cluster formation; 步骤2,对空中集群目标的特征进行选取,通过离散萤火虫算法学习威胁评估的动态贝叶斯网络模型结构,具体步骤如下:Step 2: Select the features of the aerial cluster targets and learn the dynamic Bayesian network model structure of threat assessment through the discrete firefly algorithm. The specific steps are as follows: 步骤2-1,制定DBN结构,分别从态势指标、能力指标以及集群特有指标三部分选择威胁评估指标;Step 2-1, formulate the DBN structure, and select threat assessment indicators from three parts: situation indicators, capability indicators, and cluster-specific indicators; 步骤2-2,使用离散萤火虫算法学习结构;初始化参数:—初始吸引力系数,—光吸收系数,—迭代次数,—萤火虫种群大小;随机生成个贝叶斯网络结构,并将结构转换为字符串作为萤火虫的初始种群,计算种群中所有萤火虫的适应度,用表示,指萤火虫所代表的结构的BIC评分;Step 2-2, use discrete firefly algorithm to learn the structure; initialization parameters: — initial attraction coefficient, — light absorption coefficient, — number of iterations, —Firefly population size; randomly generated A Bayesian network structure is constructed and converted into a string as the initial population of fireflies. The fitness of all fireflies in the population is calculated and used express, , Firefly BIC score of the structure represented; 步骤2-3,开始迭代,遍历所有的萤火虫,设第只萤火虫为,如果的适应度为种群中最大值,为避免陷入局部最优解,对它进行变异操作,即随机翻转的结构矩阵中的一个元素;若的适应度不是最大值,则再次遍历所有萤火虫,设遍历到的萤火虫为,若,则的位置移动,公式如下:Step 2-3, start iteration, traverse all fireflies, set Fireflies ,if The fitness of is the maximum value in the population. In order to avoid falling into the local optimal solution, it is mutated, that is, randomly flipped An element in the structure matrix of If the fitness is not the maximum value, then traverse all fireflies again, and set the traversed fireflies to ,like ,but Towards The position of is moved, the formula is as follows: (1) (1) (2) (2) (3) (3) 其中,分别代表第个和第个萤火虫对应的贝叶斯网络结构转化得到的字符串,字符串中均含有个元素,为网络节点数量,是一个长度为的向量,表示移动的距离,表示其中的第个元素,分别表示中的第个元素,为吸引力系数,为萤火虫位置之间的欧式距离的平方,移动一次后,若适应度优于移动前,则个体保留移动的结果,否则个体不变;in, and Respectively represent and The string obtained by transforming the Bayesian network structure corresponding to each firefly contains elements, is the number of network nodes, is a length of A vector representing the distance moved, Indicates the elements, Respectively and The elements, is the attraction coefficient, is the square of the Euclidean distance between the positions of fireflies. After moving once, if the fitness is better than before the move, the individual retains the result of the move, otherwise the individual remains unchanged; 当完成了所有萤火虫的移动后,将移动后种群作为下一次迭代的初始种群;When all fireflies have finished moving, the population after the move is used as the initial population for the next iteration; 步骤2-4,检查是否达到迭代次数,若达到则输出历史最优适应度对应的威胁评估模型结构,否则继续迭代;Step 2-4, check whether the number of iterations has been reached. If so, output the threat assessment model structure corresponding to the historical optimal fitness, otherwise continue to iterate; 步骤3,以步骤2中的模型结构为基础,使用基于数据扩充的小样本参数学习算法确定模型参数,具体步骤如下:Step 3: Based on the model structure in step 2, the model parameters are determined using a small sample parameter learning algorithm based on data expansion. The specific steps are as follows: 步骤3-1,对DBN参数制定约束集,根据参数对于不同约束的符合度对原始和扩充数据集进行评分;Step 3-1: Set constraints on DBN parameters , the original and augmented datasets are scored based on how well the parameters conform to different constraints; 为节点取第个状态,且父节点集合取第个状态下的网络参数,即该情况发生的概率,分别代表对应约束类型的评分;约束种类如下:set up For Node Take the first state, and the parent node set is the The network parameters in the state, that is, the probability of this situation occurring, They represent the scores of the corresponding constraint types respectively; the constraint types are as follows: (1)范围约束:该约束定义了一个参数的约束区域,设分别为区间的左右端点,公式如下:(1) Range constraint: This constraint defines the constraint area of a parameter. and are the left and right endpoints of the interval respectively, and the formula is as follows: (4) (4) 评分计算公式:Rating calculation formula: (5) (5) (2)不等式约束:该约束定义了两个参数间的关系,设为与不同的另一个参数,公式如下:(2) Inequality constraint: This constraint defines the relationship between two parameters. For Different another parameter, the formula is as follows: (6) (6) 评分计算公式:Rating calculation formula: (7) (7) (3)近似相等约束:该约束定义了参数间的近似相等关系,设为置信区间,公式如下:(3) Approximate equality constraint: This constraint defines the approximate equality relationship between parameters. is the confidence interval, and the formula is as follows: (8) (8) 评分计算公式:Rating calculation formula: (9) (9) 步骤3-2,以最大似然估计为基础参数学习算法,原始数据集为样本进行参数学习,公式如下:Step 3-2, based on maximum likelihood estimation, the original data set Parameter learning is performed for samples, and the formula is as follows: (10) (10) 其中,是数据集中满足给出的节点取值状态组合的样本数据总数,表示共有个取值,完成参数学习后,根据约束集,计算所得评分,设为in, The data set satisfies The total number of sample data for the given node value state combination, express middle Total After completing parameter learning, according to the constraint set , calculate the score, set as ; 步骤3-3,通过bootstrap法对原始数据集进行M次有放回的随机采样,得到扩展数据集,分别使用中的M组样本数据进行参数学习并计算评分,并取其中评分最高的数据集,评分设为;若,则保留扩展数据集,否则丢弃扩展数据集,重新采样,直到出现满足的数据集为止;Step 3-3: Perform M random samplings with replacement on the original data set using the bootstrap method to obtain the extended data set. , respectively use The M groups of sample data in the above example are used for parameter learning and score calculation, and the dataset with the highest score is selected. , the rating is set to ;like , then keep the extended data set, otherwise discard the extended data set and resample until a satisfying So far, 步骤3-4,将分别基于数据集参数学习得到的参数通过下式进行加权求和得到最终的网络参数,其中分别代表数据集中的样本数量:Steps 3-4 will be based on the data set and Parameters learned The final network parameters are obtained by weighted summation using the following formula ,in and Represents the data sets and The number of samples in : (11) (11) 步骤4,将步骤1中的敌方目标信息输入到威胁评估模型中推理,得到威胁等级概率分布,再通过优劣解距离法处理得到最终的威胁评估数值;Step 4: Input the enemy target information in step 1 into the threat assessment model for inference to obtain the threat level probability distribution, and then process it through the superior and inferior solution distance method to obtain the final threat assessment value; 步骤5,输出所有空中集群目标在当前时间片的威胁值与排序。Step 5: Output the threat value and ranking of all air cluster targets in the current time slice. 2.根据权利要求1所述的小样本条件下的空中集群目标威胁评估方法,其特征在于,步骤4包括:2. The method for assessing air cluster target threats under small sample conditions according to claim 1, wherein step 4 comprises: 步骤4-1,根据步骤1得到的目标信息进行威胁值推理,采用接口算法作为推理算法;Step 4-1, performing threat value inference based on the target information obtained in step 1, using the interface algorithm as the inference algorithm; 步骤4-2,使用优劣解距离法将威胁概率分布量化为0-1的一个具体的数值,便于后续排序,设DBN推理结果为,代表目标威胁度分别属于低、中、高三个等级的概率值,威胁度的正、负理想解分别为,代表目标完全属于高威胁目标或低威胁目标,威胁值计算公式如下:Step 4-2: Use the superior-inferior solution distance method to quantify the threat probability distribution into a specific value of 0-1 for subsequent sorting. Suppose the DBN inference result is , representing the probability of the target threat level belonging to low, medium and high levels respectively. The positive and negative ideal solutions of the threat level are , , which means the target is completely a high threat target or a low threat target. The threat value calculation formula is as follows: (12) (12) 其中分布表示目标威胁概率分布与的欧氏距离,为目标的威胁值,取值越大代表目标对我方的威胁越大;in and Distribution represents the target threat probability distribution and and The Euclidean distance of The threat value of the target. The larger the value, the greater the threat of the target to us. 步骤4-3,若有多个目标进行威胁评估,则依照步骤4-2的结果对目标威胁程度进行排序。Step 4-3: If there are multiple targets for threat assessment, the threat levels of the targets are ranked according to the results of step 4-2. 3.一种小样本条件下的空中集群目标威胁评估系统,其特征在于,包括:3. A threat assessment system for air cluster targets under small sample conditions, characterized by comprising: 第一模块,用于获取敌方空中集群目标的基本信息,包括目标位置、目标速度、目标类型、目标数量、集群队形;The first module is used to obtain basic information about enemy air cluster targets, including target position, target speed, target type, target quantity, and cluster formation; 第二模块,用于对空中集群目标的特征进行选取,通过离散萤火虫算法学习威胁评估的动态贝叶斯网络模型结构,具体为:The second module is used to select the features of aerial cluster targets and learn the dynamic Bayesian network model structure of threat assessment through the discrete firefly algorithm. Specifically: 1)制定DBN结构,分别从态势指标、能力指标以及集群特有指标三部分选择威胁评估指标;1) Formulate the DBN structure and select threat assessment indicators from three parts: situation indicators, capability indicators, and cluster-specific indicators; 2)使用离散萤火虫算法学习结构;初始化参数:—初始吸引力系数,—光吸收系数,—迭代次数,—萤火虫种群大小;随机生成个贝叶斯网络结构,并将结构转换为字符串作为萤火虫的初始种群,计算种群中所有萤火虫的适应度,用表示,指萤火虫所代表的结构的BIC评分;2) Use discrete firefly algorithm to learn the structure; initialization parameters: — initial attraction coefficient, — light absorption coefficient, — number of iterations, —Firefly population size; randomly generated A Bayesian network structure is constructed and converted into a string as the initial population of fireflies. The fitness of all fireflies in the population is calculated and used express, , Firefly BIC score of the structure represented; 3)开始迭代,遍历所有的萤火虫,设第只萤火虫为,如果的适应度为种群中最大值,为避免陷入局部最优解,对它进行变异操作,即随机翻转的结构矩阵中的一个元素;若的适应度不是最大值,则再次遍历所有萤火虫,设遍历到的萤火虫为,若,则的位置移动,公式如下:3) Start iteration, traverse all fireflies, set Fireflies ,if The fitness of is the maximum value in the population. In order to avoid falling into the local optimal solution, it is mutated, that is, randomly flipped An element in the structure matrix of If the fitness is not the maximum value, then traverse all fireflies again, and set the traversed fireflies to ,like ,but Towards The position of is moved, the formula is as follows: (1) (1) (2) (2) (3) (3) 其中,分别代表第个和第个萤火虫对应的贝叶斯网络结构转化得到的字符串,字符串中均含有个元素,为网络节点数量,是一个长度为的向量,表示移动的距离,表示其中的第个元素,分别表示中的第个元素,为吸引力系数,为萤火虫位置之间的欧式距离的平方,移动一次后,若适应度优于移动前,则个体保留移动的结果,否则个体不变;in, and Respectively represent and The string obtained by transforming the Bayesian network structure corresponding to each firefly contains elements, is the number of network nodes, is a length of A vector representing the distance moved, Indicates the elements, Respectively and The elements, is the attraction coefficient, is the square of the Euclidean distance between the positions of fireflies. After moving once, if the fitness is better than before the move, the individual retains the result of the move, otherwise the individual remains unchanged; 当完成了所有萤火虫的移动后,将移动后种群作为下一次迭代的初始种群;When all fireflies have finished moving, the population after the move is used as the initial population for the next iteration; 4)检查是否达到迭代次数,若达到则输出历史最优适应度对应的威胁评估模型结构,否则继续迭代;4) Check whether the number of iterations has been reached. If so, output the threat assessment model structure corresponding to the historical optimal fitness, otherwise continue to iterate; 第三模块,以第二模块中的模型结构为基础,使用基于数据扩充的小样本参数学习算法确定模型参数,具体为:The third module, based on the model structure in the second module, uses a small sample parameter learning algorithm based on data expansion to determine the model parameters, specifically: (1)对DBN参数制定约束集,根据参数对于不同约束的符合度对原始和扩充数据集进行评分;(1) Establishing constraints on DBN parameters , the original and augmented datasets are scored based on how well the parameters conform to different constraints; 为节点取第个状态,且父节点集合取第个状态下的网络参数,即该情况发生的概率,分别代表对应约束类型的评分;约束种类如下:set up For Node Take the first state, and the parent node set is the The network parameters in the state, that is, the probability of this situation occurring, They represent the scores of the corresponding constraint types respectively; the constraint types are as follows: 1)范围约束:该约束定义了一个参数的约束区域,设分别为区间的左右端点,公式如下:1) Range constraint: This constraint defines the constraint area of a parameter. and are the left and right endpoints of the interval respectively, and the formula is as follows: (4) (4) 评分计算公式:Rating calculation formula: (5) (5) 2)不等式约束:该约束定义了两个参数间的关系,设为与不同的另一个参数,公式如下:2) Inequality constraint: This constraint defines the relationship between two parameters. For Different another parameter, the formula is as follows: (6) (6) 评分计算公式:Rating calculation formula: (7) (7) 3)近似相等约束:该约束定义了参数间的近似相等关系,设为置信区间,公式如下:3) Approximate equality constraint: This constraint defines the approximate equality relationship between parameters. is the confidence interval, and the formula is as follows: (8) (8) 评分计算公式:Rating calculation formula: (9) (9) (2)以最大似然估计为基础参数学习算法,原始数据集为样本进行参数学习,公式如下:(2) Based on the maximum likelihood estimation parameter learning algorithm, the original data set Parameter learning is performed for samples, and the formula is as follows: (10) (10) 其中,是数据集中满足给出的节点取值状态组合的样本数据总数,表示共有个取值,完成参数学习后,根据约束集,计算所得评分,设为in, The data set satisfies The total number of sample data for the given node value state combination, express middle Total After completing parameter learning, according to the constraint set , calculate the score, set as ; (3)通过bootstrap法对原始数据集进行M次有放回的随机采样,得到扩展数据集,分别使用中的M组样本数据进行参数学习并计算评分,并取其中评分最高的数据集,评分设为;若,则保留扩展数据集,否则丢弃扩展数据集,重新采样,直到出现满足的数据集为止;(3) The original data set is randomly sampled M times with replacement using the bootstrap method to obtain the extended data set , respectively use The M groups of sample data in the above example are used for parameter learning and score calculation, and the dataset with the highest score is selected. , the rating is set to ;like , then keep the extended data set, otherwise discard the extended data set and resample until a satisfying So far, (4)将分别基于数据集参数学习得到的参数通过下式进行加权求和得到最终的网络参数,其中分别代表数据集中的样本数量:(4) Based on the data sets and Parameters learned The final network parameters are obtained by weighted summation using the following formula ,in and Represents the data sets and The number of samples in : (11) (11) 第四模块,用于将第一模块中的敌方目标信息输入到威胁评估模型中推理,得到威胁等级概率分布,再通过优劣解距离法处理得到最终的威胁评估数值;The fourth module is used to input the enemy target information in the first module into the threat assessment model for inference, obtain the threat level probability distribution, and then obtain the final threat assessment value through the superior and inferior solution distance method; 第五模块,用于输出所有空中集群目标在当前时间片的威胁值与排序。The fifth module is used to output the threat value and ranking of all air cluster targets in the current time slice. 4.根据权利要求3所述的小样本条件下的空中集群目标威胁评估系统,其特征在于,第四模块的具体实现方法为:4. The air cluster target threat assessment system under small sample conditions according to claim 3 is characterized in that the specific implementation method of the fourth module is: (1)根据第一模块得到的目标信息进行威胁值推理,采用接口算法作为推理算法;(1) Perform threat value inference based on the target information obtained in the first module, using the interface algorithm as the inference algorithm; (2)使用优劣解距离法将威胁概率分布量化为0-1的一个具体的数值,便于后续排序,设DBN推理结果为,代表目标威胁度分别属于低、中、高三个等级的概率值,威胁度的正、负理想解分别为,代表目标完全属于高威胁目标或低威胁目标,威胁值计算公式如下:(2) Use the superior-inferior solution distance method to quantify the threat probability distribution into a specific value between 0 and 1, which is convenient for subsequent sorting. Suppose the DBN inference result is , representing the probability of the target threat level belonging to low, medium and high levels respectively. The positive and negative ideal solutions of the threat level are , , which means the target is completely a high threat target or a low threat target. The threat value calculation formula is as follows: (12) (12) 其中分布表示目标威胁概率分布与的欧氏距离,为目标的威胁值,取值越大代表目标对我方的威胁越大;in and Distribution represents the target threat probability distribution and and The Euclidean distance of The threat value of the target. The larger the value, the greater the threat of the target to us. (3)若有多个目标进行威胁评估,则依照上一步的结果对目标威胁程度进行排序。(3) If there are multiple targets for threat assessment, the threat levels of the targets are ranked according to the results of the previous step. 5.一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其特征在于,所述处理器执行所述程序时实现如权利要求1-2中任一所述的小样本条件下的空中集群目标威胁评估方法。5. An electronic device, comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein when the processor executes the program, the method for assessing the threat of aerial cluster targets under small sample conditions as described in any one of claims 1 to 2 is implemented. 6.一种计算机可读存储介质,其上存储有计算机程序,其特征在于,该程序被处理器执行时实现如权利要求1-2中任一所述的小样本条件下的空中集群目标威胁评估方法。6. A computer-readable storage medium having a computer program stored thereon, characterized in that when the program is executed by a processor, the method for assessing the threat of aerial cluster targets under small sample conditions as described in any one of claims 1-2 is implemented.
CN202410503863.4A 2024-04-25 2024-04-25 Method and system for evaluating threat of air cluster target under small sample condition Active CN118071161B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410503863.4A CN118071161B (en) 2024-04-25 2024-04-25 Method and system for evaluating threat of air cluster target under small sample condition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410503863.4A CN118071161B (en) 2024-04-25 2024-04-25 Method and system for evaluating threat of air cluster target under small sample condition

Publications (2)

Publication Number Publication Date
CN118071161A CN118071161A (en) 2024-05-24
CN118071161B true CN118071161B (en) 2024-07-09

Family

ID=91102485

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410503863.4A Active CN118071161B (en) 2024-04-25 2024-04-25 Method and system for evaluating threat of air cluster target under small sample condition

Country Status (1)

Country Link
CN (1) CN118071161B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107194155A (en) * 2017-05-02 2017-09-22 西北工业大学 A kind of threat assessment modeling method based on small data set and Bayesian network
CN116738334A (en) * 2023-06-12 2023-09-12 中国电子科技集团公司第五十四研究所 Air multi-target threat assessment method based on DBN and TOPSIS method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005124580A1 (en) * 2004-06-15 2005-12-29 The University Of Melbourne A threat assessment system and process
KR101235149B1 (en) * 2011-05-12 2013-02-20 국방과학연구소 Threat evaluation system and method against antiair target and computer-readerable storage medium having a program recorded thereon where the program is to carry out its method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107194155A (en) * 2017-05-02 2017-09-22 西北工业大学 A kind of threat assessment modeling method based on small data set and Bayesian network
CN116738334A (en) * 2023-06-12 2023-09-12 中国电子科技集团公司第五十四研究所 Air multi-target threat assessment method based on DBN and TOPSIS method

Also Published As

Publication number Publication date
CN118071161A (en) 2024-05-24

Similar Documents

Publication Publication Date Title
CN109948029B (en) Neural network self-adaptive depth Hash image searching method
CN111461226A (en) Adversarial sample generation method, device, terminal and readable storage medium
CN109617888B (en) Abnormal flow detection method and system based on neural network
CN107480774A (en) Dynamic neural network model training method and device based on integrated study
CN112052936A (en) Reinforced learning exploration method and device based on generation countermeasure mechanism
CN108805268A (en) Deeply learning strategy network training method based on evolution algorithm
WO2023071592A1 (en) Network structure search method for ultra-large search space, system and medium
CN109740106A (en) Large-scale network betweenness approximation method, storage device and storage medium based on graph convolutional neural network
CN110738362A (en) method for constructing prediction model based on improved multivariate cosmic algorithm
CN109101721B (en) Multi-unmanned aerial vehicle task allocation method based on interval intuitionistic blurring in uncertain environment
CN114781692B (en) Short-term power load forecasting method, device and electronic equipment
CN112612903A (en) Interpretable knowledge graph embedding expression learning method capable of generating rules
CN113722980A (en) Ocean wave height prediction method, system, computer equipment, storage medium and terminal
CN116523001A (en) Method, device and computer equipment for constructing weak line identification model of power grid
CN110222824B (en) Intelligent algorithm model autonomous generation and evolution method, system and device
CN114861917A (en) Knowledge graph inference model, system and inference method for Bayesian small sample learning
CN118071161B (en) Method and system for evaluating threat of air cluster target under small sample condition
CN117077737B (en) Knowledge tracking system for dynamic collaboration of knowledge points
CN117727178A (en) A large-scale traffic prediction method and system integrating long-distance spatio-temporal correlation
CN108924196B (en) Industrial Internet Green Energy Management System
CN110516599A (en) Group Behavior Recognition Model and Its Training Method Based on Progressive Relational Learning
CN116721327A (en) Neural network architecture searching method based on generalization boundary
CN116524316A (en) Scene Graph Skeleton Construction Method under Reinforcement Learning Framework
CN115984025A (en) Influence propagation estimation method and system based on deep learning graph network model
CN110263906B (en) Asymmetric negative correlation search method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant