系统工程与电子技术 ›› 2025, Vol. 47 ›› Issue (6): 1855-1866.doi: 10.12305/j.issn.1001-506X.2025.06.14
胡崇爽, 王纪凯, 李明浩, 豆亚杰, 姜江
收稿日期:
2023-05-22
出版日期:
2025-06-25
发布日期:
2025-07-09
通讯作者:
姜江
作者简介:
胡崇爽 (2000—), 男, 博士研究生, 主要研究方向为体系优化与模糊决策基金资助:
Chongshuang HU, Jikai WANG, Minghao LI, Yajie DOU, Jiang JIANG
Received:
2023-05-22
Online:
2025-06-25
Published:
2025-07-09
Contact:
Jiang JIANG
摘要:
为应对人工智能时代作战样式的变化带来的不确定性, 提出一种基于区间值球形模糊集(interval-value spherical fuzzy set, IVSFS)的作战威胁人机协同评估框架。IVSFS通过隶属度、非隶属度、犹豫度和弃权度的区间数来更加详细地描述决策信息。首先, 提出一种将多态时序区间数融合为IVSFS的方法, 来处理目标的客观数据; 然后, 通过模糊术语集获取专家对目标主观属性的IVSFS; 针对两套数据, 通过模糊熵获取指标权重, 并建立基于灰色关联度分析-累计前景理论-逼近理想解排序法的评估框架来对目标的威胁程度进行人机协同的评估与决策。仿真结果表明, 所提方法具有可行性与有效性, 能够综合考虑目标的固有属性与动态特征, 更符合作战实际。
中图分类号:
胡崇爽, 王纪凯, 李明浩, 豆亚杰, 姜江. 基于IVSFS的作战威胁人机协同评估框架[J]. 系统工程与电子技术, 2025, 47(6): 1855-1866.
Chongshuang HU, Jikai WANG, Minghao LI, Yajie DOU, Jiang JIANG. Combat threat human-machine collaborative assessment framework based on IVSFS[J]. Systems Engineering and Electronics, 2025, 47(6): 1855-1866.
表1
球形模糊语言集与其对应的球形模糊区间数"
语言术语 | 表述(缩写) | ( |
绝对更重要 | Absolutely more importance (AMI) | ([0.85, 0.95], [0.10, 0.15], [0.05, 0.15]) |
非常重要 | Very high importance (VHI) | ([0.75, 0.85], [0.15, 0.20], [0.15, 0.20]) |
很重要 | High importance (HI) | ([0.65, 0.75], [0.20, 0.25], [0.20, 0.25]) |
稍微更重要 | Slightly more importance (SMI) | ([0.55, 0.65], [0.25, 0.30], [0.25, 0.30]) |
相等重要 | Equally importance (EI) | ([0.50, 0.55], [0.45, 0.55], [0.30, 0.40]) |
稍微不重要 | Slightly low importance (SLI) | ([0.25, 0.30], [0.55, 0.65], [0.25, 0.30]) |
不重要 | Low importance (LI) | ([0.20, 0.25], [0.65, 0.75], [0.20, 0.25]) |
非常不重要 | Very low importance (VLI) | ([0.15, 0.20], [0.75, 0.85], [0.15, 0.20]) |
绝对不重要 | Absolutely low importance (ALI) | ([0.10, 0.15], [0.85, 0.95], [0.05, 0.15]) |
表2
目标客观属性数据"
U | T | 距离/m | 空袭高度/m | 速度/(km/h) | 航向角/(°) |
u1 | t1 | [300, 320] | [700, 800] | [110, 150] | [6, 10] |
t2 | [280, 320] | [820, 850] | [320, 350] | [12, 16] | |
t3 | [150, 200] | [1 500, 1 700] | [350, 500] | [3, 6] | |
t4 | [520, 550] | [1 200, 1 300] | [280, 350] | [12, 18] | |
t5 | [800, 850] | [3 000, 3 500] | [250, 300] | [18, 25] | |
u2 | t1 | [300, 320] | [720, 820] | [100, 130] | [6, 12] |
t2 | [290, 320] | [800, 850] | [310 ,350] | [12, 16] | |
t3 | [100, 160] | [1 500, 1 800] | [340, 500] | [3, 5] | |
t4 | [510, 550] | [1 100, 1 300] | [300, 350] | [14, 20] | |
t5 | [790, 850] | [3 000, 3 600] | [260, 300] | [16, 25] | |
u3 | t1 | [310, 320] | [750, 820] | [100, 150] | [8, 10] |
t2 | [290, 300] | [800, 850] | [310, 350] | [12, 16] | |
t3 | [110, 180] | [1 600, 1 800] | [380, 500] | [3, 6] | |
t4 | [510, 540] | [1 200, 1 400] | [300, 360] | [12, 18] | |
t5 | [820, 860] | [2 800, 3 200] | [260, 300] | [16, 24] |
表3
无人集群的IVSFS决策矩阵"
T | 距离/m | 空袭高度/m | 速度(km/h) | 航向角/(°) |
t1 | < [0.28, 0.36], [0.52, 0.58], [0.04, 0.05]> | < [0.55, 0.57], [0.28, 0.31], [0.04, 0.05]> | < [0.21, 0.24], [0.86, 0.87], [0.04, 0.05]> | < [0.15, 0.27], [0.40, 0.56], [0.03, 0.06]> |
t2 | < [0.28, 0.36], [0.49, 0.57], [0.04, 0.06]> | < [0.53, 0.55], [0.36, 0.39], [0.05, 0.06]> | < [0.55, 0.57], [0.59, 0.60], [0.04, 0.05]> | < [0.11, 0.17], [0.70, 0.71], [0.04, 0.06]> |
t3 | < [0.53, 0.58], [0.05, 0.26], [0.04, 0.06]> | < [0.25, 0.27], [0.66, 0.68], [0.04, 0.07]> | < [0.78, 0.81], [0.52, 0.56], [0.04, 0.05]> | < [0.46, 0.66], [0.17, 0.80], [0.05, 0.06]> |
t4 | < [0.16, 0.21], [0.73, 0.75], [0.05, 0.07]> | < [0.34, 0.35], [0.54, 0.58], [0.05, 0.07]> | < [0.56, 0.57], [0.61, 0.64], [0.04, 0.06]> | < [0.09, 0.13], [0.70, 0.78], [0.05, 0.07]> |
t5 | < [0.10, 0.14], [0.82, 0.84], [0.05, 0.06]> | < [0.13, 0.13], [0.83, 0.83], [0.04, 0.06]> | < [0.47, 0.49], [0.66, 0.68], [0.04, 0.05]> | < [0.07, 0.11], [0.78, 0.80], [0.06, 0.06]> |
表4
专家IVSF决策矩阵"
E | T | 类型 | 侦察 | 干扰 | 打击 | 防御 |
e1 | t1 | SMI | SMI | HI | SLI | SMI |
t2 | SLI | VHI | VLI | ALI | SML | |
t3 | VHI | VLI | SLI | AMI | EI | |
t4 | EI | SMI | EI | SMI | SLI | |
t5 | HI | LI | LI | HI | VHI | |
e2 | t1 | HI | SMI | SMI | HI | EI |
t2 | SMI | AMI | EI | VLI | LI | |
t3 | VHI | VLI | VLI | VHI | AMI | |
t4 | SMI | EI | HI | EI | SMI | |
t5 | VHI | EI | HI | EI | EI | |
e3 | t1 | SMI | EI | HI | EI | EI |
t2 | EI | VHI | HI | VLI | LI | |
t3 | VHI | LI | VLI | VHI | VHI | |
t4 | SMI | SMI | HI | EI | SLI | |
t5 | HI | VHI | VHI | SMI | EI |
表5
初始决策矩阵的3种距离类型"
e | t1 | t2 | t3 | t4 | t5 | 距离类型 |
e1 | 0.06 | 0.12 | 0.07 | 0.07 | 0.15 | DGWMDik |
e2 | 0.05 | 0.06 | 0.03 | 0.05 | 0.07 | |
e3 | 0.03 | 0.07 | 0.02 | 0.04 | 0.08 | |
e1 | 0.07 | 0.14 | 0.07 | 0.09 | 0.17 | DGBDik |
e2 | 0.03 | 0.09 | 0.04 | 0.03 | 0.14 | |
e3 | 0.08 | 0.10 | 0.05 | 0.06 | 0.08 | |
e1 | 0.05 | 0.06 | 0.04 | 0.03 | 0.08 | DGWDik |
e2 | 0.08 | 0.11 | 0.06 | 0.09 | 0.11 | |
e3 | 0.04 | 0.11 | 0.05 | 0.06 | 0.17 |
表7
专家权重修复后的群体加权平均决策矩阵"
T | 类型 | 侦察 | 干扰 | 打击 | 防御 |
t1 | < [0.59, 0.69], [0.23, 0.28], [0.05, 0.08]> | < [0.53, 0.62], [0.31, 0.37], [0.07, 0.11]> | < [0.62, 0.72], [0.22, 0.27], [0.05, 0.07]> | < [0.52, 0.6], [0.36, 0.44], [0.06, 0.10]> | < [0.52, 0.58], [0.38, 0.46], [0.08, 0.14]> |
t2 | < [0.47, 0.54], [0.39, 0.47], [0.07, 0.12]> | < [0.79, 0.9], [0.13, 0.18], [0.01, 0.03]> | < [0.51, 0.59], [0.39, 0.47], [0.05, 0.10]> | < [0.14, 0.19], [0.78, 0.88], [0.02, 0.04]> | < [0.42, 0.50], [0.46, 0.54], [0.04, 0.07]> |
t3 | < [0.75, 0.85], [0.15, 0.20], [0.02, 0.04]> | < [0.17, 0.22], [0.71, 0.81], [0.03, 0.05]> | < [0.19, 0.23], [0.68, 0.78], [0.03, 0.06]> | < [0.79, 0.89], [0.13, 0.18], [0.02, 0.03]> | < [0.75, 0.86], [0.18, 0.24], [0.03, 0.05]> |
t4 | < [0.54, 0.62], [0.30, 0.36], [0.07, 0.11]> | < [0.53, 0.62], [0.31, 0.37], [0.07, 0.11]> | < [0.61, 0.71], [0.25, 0.32], [0.05, 0.08]> | < [0.52, 0.58], [0.38, 0.46], [0.08, 0.14]> | < [0.39, 0.47], [0.42, 0.50], [0.06, 0.09]> |
t5 | < [0.69, 0.79], [0.18, 0.23], [0.03, 0.05]> | < [0.58, 0.67], [0.34, 0.42], [0.05, 0.08]> | < [0.63, 0.73], [0.26, 0.32], [0.03, 0.06]> | < [0.57, 0.66], [0.29, 0.35], [0.06, 0.10]> | < [0.60, 0.69], [0.32, 0.41], [0.06, 0.11]> |
表26
不同方法的目标威胁排序及区分度"
方法 | 综合威胁度R | d1 | d2 | d3 | d4 |
文献[ | t3(1.00)>t1(0.98)>t2(0.88)>t5(0.86)>t4(0.78) | 0.02 | 0.10 | 0.02 | 0.09 |
文献[ | t3(0.64)>t1(0.59)>t2(0.53)>t5(0.52)>t4(0.50) | 0.08 | 0.10 | 0.02 | 0.04 |
文献[ | t3(0.87)>t1(0.73)>t2(0.64)>t5(0.61)>t4(0.58) | 0.16 | 0.12 | 0.05 | 0.05 |
文献[ | t3(0.43)>t1(0.37)>t2(0.30)>t5(0.28)>t4(0.27) | 0.14 | 0.19 | 0.07 | 0.04 |
本文算法 | t3(-0.49)>t1(-0.64)>t2(-0.77)>t5(-0.77)>t4(-0.78) | 0.31 | 0.20 | 0.01 | 0.01 |
1 | MICHAEL M. Effective decision-making employing human-machine teaming[R]. Newport: Naval War College, 2022. |
2 | KERBUSCH P, KEIJSER B, SMIT S. Roles of AI and simulation for military decision making[C]//Proc. of the STO Meeting Proceedings MP-IST-160, 2018. |
3 |
JOHNSON J . Automating the OODA loop in the age of intelligent machines: reaffirming the role of humans in command-and-control decision-making in the digital age[J]. Defence Studies, 2023, 23 (1): 43- 67.
doi: 10.1080/14702436.2022.2102486 |
4 | LLINAS J, HALL D L. An introduction to multi-sensor data fusion[C]//Proc. of the IEEE International Symposium on Circuits and Systems, 1998: 537-540. |
5 | LI S Y, WU Q X, CHEN M, et al. Air combat situation assessment of multiple UCAVs with incomplete information[C]//Proc. of the Chinese Intelligent Systems Conference, 2021: 18- 26. |
6 |
张浩为, 谢军伟, 葛佳昂, 等. 改进TOPSIS的多态融合直觉模糊威胁评估[J]. 系统工程与电子技术, 2018, 40 (10): 2263- 2269.
doi: 10.3969/j.issn.1001-506X.2018.10.16 |
ZHANG H W , XIE J W , GE J A , et al. Intuitionistic fuzzy set threat assessment based on improved TOPSIS and multiple times fusion[J]. Systems Engineering and Electronics, 2018, 40 (10): 2263- 2269.
doi: 10.3969/j.issn.1001-506X.2018.10.16 |
|
7 | 卢盈齐, 范成礼, 付强, 等. 基于改进IFRS相似度和信息熵的反导作战目标威胁评估[J]. 系统工程与电子技术, 2022, 44 (4): 1230- 1238. |
LU Y Q , FAN C L , FU Q , et al. Missile defense target threat assessment based on improved similarity measure and information entropy of IFRS[J]. Systems Engineering and Electronics, 2022, 44 (4): 1230- 1238. | |
8 |
KUN Z , WEIREN K , PEIPEI L , et al. Assessment and sequencing of air target threat based on intuitionistic fuzzy entropy and dynamic VIKOR[J]. Journal of Systems Engineering and Electronics, 2018, 29 (2): 305- 310.
doi: 10.21629/JSEE.2018.02.11 |
9 | 靳崇, 孙娟, 王永佳, 等. 基于直觉模糊TOPSIS和变权VIKOR的防空目标威胁综合评估[J]. 系统工程与电子技术, 2022, 44 (1): 172- 180. |
JIN C , SUN J , WANG Y J , et al. Threat comprehensive assessment for air defense targets based on intuitionistic fuzzy TOPSIS and variable weight VIKOR[J]. Systems Engineering and Electronics, 2022, 44 (1): 172- 180. | |
10 | 陈刚, 姚丽亚, 王国新, 等. 面向鲁棒决策的战场态势评估人机共识形成方法[J]. 兵工学报, 2022, 43 (11): 2953- 2964. |
CHEN G , YAO L Y , WANG G X , et al. A human-machine consensus formation method for robust decision making in battlefield situation assessment[J]. Acta Armamentarii, 2022, 43 (11): 2953- 2964. | |
11 |
ZADEH L A . Fuzzy sets[J]. Information and Control, 1965, 8 (3): 338- 353.
doi: 10.1016/S0019-9958(65)90241-X |
12 |
ATANASSOV K T . Intuitionistic fuzzy sets[J]. Fuzzy Sets and Systems, 1986, 20 (1): 87- 96.
doi: 10.1016/S0165-0114(86)80034-3 |
13 |
YAGER R R , ABBASOV A M . Pythagorean membership grades, complex numbers, and decision making[J]. International Journal of Intelligent Systems, 2013, 28 (5): 436- 452.
doi: 10.1002/int.21584 |
14 | CUONG B C . Picture fuzzy sets[J]. Journal of Computer Science and Cybernetics, 2014, 30 (4): 409. |
15 | ASHRAF S , ABDULLAH S , MAHMOOD T , et al. Spherical fuzzy sets and their applications in multi-attribute decision making problems[J]. Journal of Intelligent & Fuzzy Systems, 2019, 36 (3): 2829- 2844. |
16 |
BARUKAB O , ABDULLAH S , ASHRAF S , et al. A new approach to fuzzy TOPSIS method based on entropy measure under spherical fuzzy information[J]. Entropy, 2019, 21 (12): 1231.
doi: 10.3390/e21121231 |
17 | KUTLU GUNDOGDU F , KAHRAMAN C . Spherical fuzzy sets and spherical fuzzy TOPSIS method[J]. Journal of Intelligent & Fuzzy Systems, 2019, 36 (1): 337- 352. |
18 |
AKRAM M , SALEEM D , AL-HAWARY T . Spherical fuzzy graphs with application to decision-making[J]. Mathematical and Computational Applications, 2020, 25 (1): 8.
doi: 10.3390/mca25010008 |
19 |
MATHEW M , CHAKRABORTTY R K , RYAN M J . A novel approach integrating AHP and TOPSIS under spherical fuzzy sets for advanced manufacturing system selection[J]. Engineering Applications of Artificial Intelligence, 2020, 96, 103988.
doi: 10.1016/j.engappai.2020.103988 |
20 |
ZHANG H Y , WEI G W , CHEN X D . SF-GRA method based on cumulative prospect theory for multiple attribute group decision making and its application to emergency supplies supplier selection[J]. Engineering Applications of Artificial Intelligence, 2022, 110, 104679.
doi: 10.1016/j.engappai.2022.104679 |
21 |
RAHNAMAY B S , JAFARZADEH G S , DEVECI M , et al. Logistic autonomous vehicles assessment using decision support model under spherical fuzzy set integrated Choquet integral approach[J]. Expert Systems with Applications, 2023, 214, 119205.
doi: 10.1016/j.eswa.2022.119205 |
22 |
HASELI G , JAFARZADEH G S . Extended base-criterion method based on the spherical fuzzy sets to evaluate waste management[J]. Soft Computing, 2022, 26 (19): 9979- 9992.
doi: 10.1007/s00500-022-07366-4 |
23 |
ZADEH L A . The concept of a linguistic variable and its application to approximate reasoning[J]. Information Sciences, 1975, 8 (3): 199- 249.
doi: 10.1016/0020-0255(75)90036-5 |
24 | ATANASSOV K T. On interval valued intuitionistic fuzzy sets[M] //Cham: Springer International Publishing, 2020. |
25 | GARG H . A novel accuracy function under interval-valued Pythagorean fuzzy environment for solving multicriteria decision making problem[J]. Journal of Intelligent & Fuzzy Systems, 2016, 31 (1): 529- 540. |
26 |
KHALIL A M , LI S G , GARG H , et al. New operations on interval-valued picture fuzzy set, interval-valued picture fuzzy soft set and their applications[J]. IEEE Access, 2019, 7, 51236- 51253.
doi: 10.1109/ACCESS.2019.2910844 |
27 |
KUTLU GUNDOGDU F , KAHRAMAN C . A novel fuzzy TOPSIS method using emerging interval-valued spherical fuzzy sets[J]. Engineering Applications of Artificial Intelligence, 2019, 85, 307- 323.
doi: 10.1016/j.engappai.2019.06.003 |
28 |
韩博文, 姚佩阳, 钟赟, 等. 基于QABC-IFMADM算法的有人/无人机编队作战威胁评估[J]. 电子学报, 2018, 46 (7): 1584- 1592.
doi: 10.3969/j.issn.0372-2112.2018.07.007 |
HAN B W , YAO P Y , ZHONG Y , et al. Threat assessment of manned/unmanned aerial vehicle formation based on QABC-IFMADM algorithm[J]. Acta Electronica Sinica, 2018, 46 (7): 1584- 1592.
doi: 10.3969/j.issn.0372-2112.2018.07.007 |
|
29 |
TVERSKY A , KAHNEMAN D . Advances in prospect theory: cumulative representation of uncertainty[J]. Journal of Risk and Uncertainty, 1992, 5 (4): 297- 323.
doi: 10.1007/BF00122574 |
30 |
LIU J C , XU F Q , LIN S S . Site selection of photovoltaic power plants in a value chain based on grey cumulative prospect theory for sustainability: a case study in Northwest China[J]. Journal of Cleaner Production, 2017, 148, 386- 397.
doi: 10.1016/j.jclepro.2017.02.012 |
[1] | 杨天建, 王星, 程嗣怡, 陈游, 张曦, 张志恒. 基于IAHP-CRITIC-MARCOS的多种类目标威胁评估[J]. 系统工程与电子技术, 2025, 47(4): 1246-1254. |
[2] | 熊威, 张栋, 任智, 杨书恒. 面向有人/无人机协同打击的智能决策方法研究[J]. 系统工程与电子技术, 2025, 47(4): 1285-1299. |
[3] | 尹中杰, 侯博, 靳啸龙, 范志良, 王海洋. 面向阵列天线抗干扰无人机的隐蔽诱骗方法[J]. 系统工程与电子技术, 2025, 47(2): 633-640. |
[4] | 王紫东, 高晓光, 刘晓寒. 基于Stacking策略的集成BN网络目标威胁评估[J]. 系统工程与电子技术, 2024, 46(2): 586-598. |
[5] | 苏倩, 钟元芾, 曹志钦, 张英朝. 基于作战态势和改进CRITIC-TOPSIS的目标威胁评估模型[J]. 系统工程与电子技术, 2023, 45(8): 2343-2352. |
[6] | 刘瑶, 夏阳升, 石建迈, 陈超, 黄金才. 车载多无人机协同多区域覆盖路径规划方法[J]. 系统工程与电子技术, 2023, 45(5): 1380-1390. |
[7] | 赵文飞, 王䶮, 滕克难, 陈健, 周璐. 基于随机服务系统的海上要地防空体系目标信息处理模型[J]. 系统工程与电子技术, 2023, 45(11): 3565-3572. |
[8] | 张堃, 张振冲, 刘泽坤, 李珂, 刘培培. 基于FD-TODIM的混杂空战多目标动态威胁评估[J]. 系统工程与电子技术, 2023, 45(1): 148-154. |
[9] | 徐鑫宇, 万路军, 陈平, 戴江斌, 高志周. 防御性制空截击中警戒巡逻空域规划建模[J]. 系统工程与电子技术, 2022, 44(5): 1589-1599. |
[10] | 卢盈齐, 范成礼, 付强, 朱晓雯, 李威. 基于改进IFRS相似度和信息熵的反导作战目标威胁评估[J]. 系统工程与电子技术, 2022, 44(4): 1230-1238. |
[11] | 李洪瑶, 李小强, 韩心中, 谢学立, 席建祥. 基于决策融合的多无人机协同目标检测识别算法[J]. 系统工程与电子技术, 2022, 44(3): 746-754. |
[12] | 于博文, 于琳, 吕明, 张捷. 基于M-ANFIS-PNN的目标威胁评估模型[J]. 系统工程与电子技术, 2022, 44(10): 3155-3163. |
[13] | 靳崇, 孙娟, 王永佳, 蔡普申, 荣鑫. 基于直觉模糊TOPSIS和变权VIKOR的防空目标威胁综合评估[J]. 系统工程与电子技术, 2022, 44(1): 172-180. |
[14] | 孙云柯, 方志耕, 陈顶. 基于动态灰色主成分分析的多时刻威胁评估[J]. 系统工程与电子技术, 2021, 43(3): 740-746. |
[15] | 孟光磊, 周铭哲, 朴海音, 张慧敏. 基于协同战术识别的双机编队威胁评估方法[J]. 系统工程与电子技术, 2020, 42(10): 2285-2293. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||