系统工程与电子技术 ›› 2023, Vol. 45 ›› Issue (5): 1399-1408.doi: 10.12305/j.issn.1001-506X.2023.05.16
• 系统工程 • 上一篇
余晓洁1, 魏嵩1, 盛佳恋2, 张磊1,*
收稿日期:
2022-02-17
出版日期:
2023-04-21
发布日期:
2023-04-28
通讯作者:
张磊
作者简介:
余晓洁 (1998—),女,硕士研究生,主要研究方向为智能决策Xiaojie YU1, Song WEI1, Jialian SHENG2, Lei ZHANG1,*
Received:
2022-02-17
Online:
2023-04-21
Published:
2023-04-28
Contact:
Lei ZHANG
摘要:
稳健的低空目标威胁识别是低空域安全防护的重要任务。传统的多属性决策方法对目标运动参数的量测精度要求较高,忽略了目标运动的时序关联信息,在实际应用中缺乏噪声稳健性和动态分析能力。因此,在多属性决策方法的基础上引入了隐马尔可夫模型,提出了一种动态稳健的低空目标威胁等级识别方法。通过建立隐状态与威胁等级、威胁数值之间的内在联系,将威胁识别问题转化为隐马尔可夫模型的状态解码问题。相比于常规算法,所提方法能够有效地抑制量测噪声干扰并具有一定的威胁预测能力。仿真实验验证了所提方法的有效性和稳健性。
中图分类号:
余晓洁, 魏嵩, 盛佳恋, 张磊. 基于HMM的低空目标航迹威胁识别[J]. 系统工程与电子技术, 2023, 45(5): 1399-1408.
Xiaojie YU, Song WEI, Jialian SHENG, Lei ZHANG. Threat identification for low-altitude target track based on HMM[J]. Systems Engineering and Electronics, 2023, 45(5): 1399-1408.
1 |
YANG G , DONG S L , HUA Z . A novel target threat assessment method based on three-way decisions under intuitionistic fuzzy multi-attribute decision making environment[J]. Engineering Applications of Artificial Intelligence, 2020, 87, 103276.
doi: 10.1016/j.engappai.2019.103276 |
2 | CAO Y , KOU Y X , XU A , et al. Target threat assessment in air combat based on improved glowworm swarm optimization and ELM neural network[J]. International Journal of Aerospace Engineering, 2021, 4687167. |
3 | 李春立. 陆战场低空作战问题研究[J]. 中国军事科学, 2016, (2): 113- 120. |
LI C L . A study of low-altitude operations on land battlefield[J]. China Military Science, 2016, (2): 113- 120. | |
4 |
KALEEM Z , REHMANI M H . Amateur drone monitoring: state-of-the-art architectures, key enabling technologies, and future research directions[J]. IEEE Wireless Communications, 2018, 25 (2): 150- 159.
doi: 10.1109/MWC.2018.1700152 |
5 | 刘佳, 徐群玉, 陈唯实. 无人机雷达航迹运动特征提取及组合分类方法[J]. 系统工程与电子技术, https://kns.cnki.net/kcms/detail/11.2422.TN.20220223.1138.004.html. |
LIU J, XU Q Y, CHEN W S. Dynamic feature modelling and ensemble classification method based on radar track characters for drone targets[J]. Systems Engineering and Electronics, https://kns.cnki.net/kcms/detail/11.2422.TN.20220223.1138.004.html. | |
6 |
LINAS J , HALL D L . An introduction to multi-sensor data fusion[J]. Proceedings of the IEEE, 1997, 85 (1): 6- 23.
doi: 10.1109/5.554205 |
7 |
XU Y J , WANG Y C , MIAO X D . Multi-attribute decision making method for air target threat evaluation based on intuitionistic fuzzy sets[J]. Journal of Systems Engineering and Electronics, 2012, 23 (6): 891- 897.
doi: 10.1109/JSEE.2012.00109 |
8 | 孔德鹏, 常天庆, 郝娜, 等. 地面作战目标威胁评估多属性指标处理方法[J]. 自动化学报, 2021, 47 (1): 161- 172. |
KONG D P , CHANG T Q , HAO N , et al. Multi-attribute index processing method of target threat assessment in ground combat[J]. Acta Automatica Sinica, 2021, 47 (1): 161- 172. | |
9 | 汪汝根, 李为民, 罗骁, 等. 基于新距离测度的直觉模糊VIKOR多属性决策方法[J]. 系统工程与电子技术, 2019, 41 (11): 2524- 2532. |
WANG R G , LI W M , LUO X . Extended VIKOR method of multi-attribute decision making under intuitionistic fuzzy environment based on a new distance measure[J]. Systems Engineering and Electronics, 2019, 41 (11): 2524- 2532. | |
10 |
曲长文, 何友, 马强. 应用多属性决策的威胁评估方法[J]. 系统工程与电子技术, 2000, 22 (5): 26- 29.
doi: 10.3321/j.issn:1001-506X.2000.05.010 |
QU C W , HE Y , MA Q . Threat assessment using multiple attribute decision making[J]. Systems Engineering and Electronics, 2000, 22 (5): 26- 29.
doi: 10.3321/j.issn:1001-506X.2000.05.010 |
|
11 | LIU X M, HAN Y, QIU H Z, et al. Threat evaluation in air defense based on improved KPCA-TOPSIS[C]//Proc. of the IEEE Guidance, Navigation and Control Conference, 2018. |
12 | CHEN J, GAO X D, ZHONG L H. Using fuzzy grey cognitive maps to model threat assessment for UAVs[C]//Proc. of the IEEE 14th International Conference on Control and Automation, 2018: 594-599. |
13 | QU S, LIU J X. Improved grey correlation analysis for ballistic missile threat assessment[C]//Proc. of the 6th International Conference on Information Science and Control Engineering, 2019: 338-342. |
14 | DENG J L . Introduction to grey system theory[J]. The Journal Grey System, 1989, 1 (1): 1- 24. |
15 | 夏春林, 周德云, 冯琦. 基于变权灰色关联法的目标威胁评估[J]. 火力与指挥控制, 2014, 39 (4): 54- 57. |
XIA C L , ZHOU D Y , FENG Q . Target threat assessment based on the method of variable weight grey incidence[J]. Fire Control and Command Control, 2014, 39 (4): 54- 57. | |
16 | OKELLO N, THORNS G. Threat assessment using Bayesian networks[C]//Proc. of the 6th International Conference of Information Fusion, 2003: 1102-1109. |
17 | DI R H , GAO X G , GUO Z G , et al. A threat assessment method for unmanned aerial vehicle based on Bayesian networks under the condition of small data sets[J]. Mathematical Problems in Engineering, 2018, 2018, 8484358. |
18 | LI D Y, LIU M Q, ZHANG S L. Underwater target threat assessment method based on Bayesian network[C]//Proc. of the 40th Chinese Control Conference, 2021: 3363-3367. |
19 | WANG X , ZUO J L , YANG R N , et al. Target threat assessment based on dynamic Bayesian network[J]. Journal of Physics: Conference Series, 2019, 1302 (4): 42023. |
20 | WANG J, HAN M G, WEI S M. Discrete dynamic Bayesian network threat assessment method based on cloud parameter learning[C]//Proc. of the IEEE International Conference on Signal, Information and Data Processing, 2019. |
21 | GONG H, YU X Y, ZHANG Y, et al. Dynamic threat assessment of air multi-target based on DBN-TOPSIS method[C]//Proc. of the China Automation Congress, 2021: 6902-6907. |
22 | LI J X, YUAN L, ZHANG C, et al. Fuzzy dynamic Bayesian network based threat assessment model for space targets[C]//Proc. of the 5th International Conference on Pattern Recognition and Artificial Intelligence, 2022: 1176-1181. |
23 | ZHAO J, GUO Q, TENG L, et al. Application of deep neural network in air target threat assessment[C]//Proc. of the IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference, 2019: 1633-1637. |
24 | XU X M, YANG R N, YU Y. Threat assessment in air combat based on ELM neural network[C]//Proc. of the IEEE International Conference on Artificial Intelligence and Computer Applications, 2019: 114-120. |
25 | 翟翔宇, 杨风暴, 吉琳娜, 等. 标准化全连接残差网络空战目标威胁评估[J]. 火力与指挥控制, 2020, 45 (6): 39- 44. |
ZHAI X Y , YANG F B , JI L N , et al. Air combat targets threat assessment based on standardized fully connected network and residual network[J]. Fire Control and Command Control, 2020, 45 (6): 39- 44. | |
26 | WANG G G , GUO L H , DUAN H . Wavelet neural network using multiple wavelet functions in target threat assessment[J]. Scientific World Journal, 2013, 632437. |
27 | ZHAO X H, WANG H X, CAI Y C. Analysis and comparison of some threat assessment methods[C]//Proc. of the 25th Chinese Control and Decision Conference, 2013: 1703-1705. |
28 | VISNEVSKI N, HAYKIN S, KRISHNAMURTHY V, et al. Hidden Markov models for radar pulse train analysis in electronic warfare[C]//Proc. of the International Conference on Acoustics, Speech, and Signal Processing, 2005: 597-600. |
29 | CROUSE M S , NOWAK R D , BARANIUK R G . Wavelet-based statistical signal processing using hidden Markov models[J]. IEEE Trans.on Signal Processing, 1998, 46 (4): 886- 902. |
30 | SATTY T L . The analytic hierarchy process[M]. New York: McGraw-Hill, 1980. |
31 | YU D, WANG H J, YUAN J Y. Method of unknown target risk analysis and threat assessment for UUVs[C]//Proc. of the 39th Chinese Control Conference, 2020: 2888-2893. |
32 | YIN J, HAN L, MA L B, et al. Evaluation of terminal signal quality based on entropy weight method[C]//Proc. of the 4th International Conference on Intelligent Control, Measurement and Signal Processing, 2022: 855-858. |
33 | LI Z W , QU L D , ZHANG G Q , et al. Attribute selection for heterogeneous data based on information entropy[J]. International Journal of General Systems, 2021, 50 (5): 548- 566. |
34 | LUO R N , HUANG S C , ZHAO Y , et al. Threat assessment method of low altitude slow small targets based on information entropy and AHP[J]. Entropy, 2021, 23 (10): 1292. |
35 | SONG T D, WANG J, WANG C C. TOPSIS threat assessment based on the coefficient of variation[C]//Proc. of the 39th Chinese Control Conference, 2020: 175-179. |
36 | GOURAV D , RAJIV K S , SAMIR K S . A generalised fuzzy TOPSIS with improved closeness coefficient[J]. Expert Systems with Applications, 2018, 96, 185- 195. |
37 | MOHD Y M I, MOHAMED I, ABU B M R. Hidden Markov models: an insight[C]//Proc. of the 6th International Conference on Information Technology and Multimedia, 2014: 259-264. |
38 | RABINER L , JUANG B . An introduction to hidden Markov models[J]. IEEE ASSP Magazine, 1986, 3 (1): 4- 16. |
39 | YOON B J , VAIDYANATHAN P P . Context-sensitive hidden Markov models for modeling long-range dependencies in symbol sequences[J]. IEEE Trans.on Signal Processing, 2006, 54 (11): 4169- 4184. |
40 | ZHAO J, BOSE B K. Evaluation of membership functions for fuzzy logic controlled induction motor drive[C]//Proc. of the 28th Annual Conference of the Industrial Electronics Society, 2002: 229-234. |
41 | 孔尚萍. 基于多源信息融合的目标航迹估计与威胁评估[D]. 北京: 中国航天科技集团公司第一研究院, 2017. |
KONG S P. Target track estimation and threat assessment based on multi-source information fusion[D]. Beijing: The First Research Institute of China Aerospace Science and Technology Corporation, 2017. | |
42 | 翟贵敏, 董龙明, 邱瑞波, 等. 基于贝叶斯网络的空中目标威胁估计算法[J]. 火力与指挥控制, 2016, 41 (11): 90- 93.90-93, 97 |
ZHAI G M , DONG L M , QIU R B , et al. Air threat assessment algorithm based on Bayesian networks[J]. Fire Control and Command Control, 2016, 41 (11): 90- 93.90-93, 97 | |
43 | ZHANG K, LIU P P, KE L, et al. Multi-target threat assessment in air combat based on entropy and VIKOR[C]//Proc. of the 9th International Conference on Advanced Computational Intelligence, 2017: 175-179. |
44 | RABINER L R . A tutorial on hidden Markov models and selected applications in speech recognition[J]. Proceedings of the IEEE, 1989, 77 (2): 257- 286. |
45 | HEI X B, DONG F, CUI Z F. Intelligent fuzzy comprehensive evaluation of quality of public phys ical education based on HMM and AHP[C]//Proc. of the 3rd International Conference on Intelligent Sustainable Systems, 2020: 100-103. |
46 | YUAN J W, ZHU R G, HE J L. On a new threat assessment method in information fusion processing[C]//Proc. of the 33rd Chinese Control Conference, 2014: 7226-7231. |
[1] | 王坚浩, 王龙, 张亮, 崔利杰. 灰色群组聚类和改进CRITIC赋权的供应商选择VIKOR多属性决策[J]. 系统工程与电子技术, 2023, 45(1): 155-164. |
[2] | 郑诺希, 李武, 周小强, 刘钢. 多属性相似度一致性投影决策法[J]. 系统工程与电子技术, 2022, 44(9): 2869-2877. |
[3] | 黄林, 龚立, 姜伟, 王康勃. 基于多源信息融合与HMM的剩余寿命预测[J]. 系统工程与电子技术, 2022, 44(5): 1747-1756. |
[4] | 尹东亮, 崔国恒, 黄晓颖, 张欢. 基于改进得分函数和前景理论的区间值毕达哥拉斯模糊多属性决策[J]. 系统工程与电子技术, 2022, 44(11): 3463-3469. |
[5] | 任耀军, 袁修久, 黄林. q阶三角犹豫模糊BM算子及其多属性决策应用[J]. 系统工程与电子技术, 2022, 44(1): 181-191. |
[6] | 白静, 陈业华, 石蕊, 张亚明. 基于概率语言赋权交叉熵信度分配的应急决策[J]. 系统工程与电子技术, 2021, 43(2): 476-486. |
[7] | 杜鑫, 刘巍, 孙应飞. 针对低空目标的分布式组网探测[J]. 系统工程与电子技术, 2020, 42(5): 1057-1062. |
[8] | 李岩, 陈云翔, 罗承昆, 蔡忠义. 基于概率犹豫-直觉模糊熵和证据推理的多属性决策方法[J]. 系统工程与电子技术, 2020, 42(5): 1116-1123. |
[9] | 苗成林, 李彤, 吕军, 常成. 基于隐马尔可夫模型的动态跳频信道接入算法[J]. 系统工程与电子技术, 2019, 41(8): 1873-1880. |
[10] | 杜镇宇, 刘方正, 李翼宏. 基于HMM的APT攻击路径预测[J]. 系统工程与电子技术, 2019, 41(4): 826-834. |
[11] | 陈波, 郭圆圆, 高秀娥, 王运明, 杜秀丽. 区间直觉模糊幂加权算子的动态多属性决策[J]. 系统工程与电子技术, 2019, 41(4): 850-855. |
[12] | 李贺, 江登英. 基于改进符号距离的犹豫模糊前景理论决策方法[J]. 系统工程与电子技术, 2019, 41(12): 2820-2826. |
[13] | 张袁鹏, 郑岱堃, 李昕哲, 孙永健. 基于隐马尔可夫模型的动态规划检测前跟踪算法[J]. 系统工程与电子技术, 2019, 41(11): 2479-2487. |
[14] | 汪汝根, 李为民, 罗骁, 吕诚中. 基于新距离测度的直觉模糊VIKOR多属性决策方法[J]. 系统工程与电子技术, 2019, 41(11): 2524-2532. |
[15] | 孙贵东, 关欣, 衣晓, 赵静. 基于Normative算子的HFS数值延拓方法及多属性决策应用[J]. 系统工程与电子技术, 2018, 40(7): 1530-1538. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||