Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 231000038-7.doi: 10.11896/jsjkx.231000038
• Interdiscipline & Application • Previous Articles Next Articles
ZHANG Yinling1, SHANG Tao1, LI Zhaokun 1,2
CLC Number:
[1]TANG Z L,ZHANG A.Survey of methods and theory for battlefield threat assessment[J].Fire Control & Command Control,2011,36(9):1617-1620. [2]WANG W,SHI H Q,WANG L,et al.Aerial target threat assessment method of warship formation collaborative combat[J].Modern Defence Technology,2014,42(6):79-83. [3]SHI J Y,SUN Y C,Y T,et al.Battlefield radar target threat assessment based on AHP-TOPSIS[J].Journal of Ordnance Equipment Engineering,2022,43(S2):29-34. [4]ZHANG K,LIU P P,KONG W R,et al.Multi-target threat assessment in aircombat based on entropy and VIKOR[C]//2017 Ninth ICACI.Doha,2017. [5]XU Y H,CHENG S Y,PANG M Y.Dynamic radiator threat assessment based on CRITIC-TOPSIS[J].Journal of Beijing University of Aeronautics and Astronautics,2020,46(11):2168-2175. [6]ZHANG K,ZHOU D Y.Application of TOPSIS based on entropy and GD-AHP in evaluating sequence of air target threat[J].Journal of System Simulation,2008,20(7):1661-1664. [7]NIE X Q,YAN P,WANG B Q,et al.A target threat assessment method for low-altitude aircraft[C]//Journal of Physics:Conference Series.2020. [8]LUO R N,HUANG S C,ZHAO Y,et,al.Threat Assessment Method of Low Altitude Slow Small(LSS) Targets Based on Information Entropy and AHP[J]Entropy,2021,23(10):1292. [9]YU D,WANG H J,LI B Y et,al.PROMETHEE-Based Multi-AUV Threat Assessment Method Using Combinational Weights[J].Journal of Marine Science and Engineering,2023,11(1422):1422. [10]ZHANG Y,WANG H W,GUOX T,et al.Emitter Threat Evaluating Method Based on GIFSS and TOPSIS[J].Fire Control & Command Control,2018,43(4):37-41. [11]YANG L Z,HU S L,FENG S M.Dynamic Evaluation and Simulation of Targets Threat Based on Entropy and TOPSIS Method[J].Ordnance Industry Automation,2020,39(3):53-56. [12]JIN Z,LIU H L,LIU D W,et al.Analysis and Assessment of Radar-Countermeasure Target Threaten in Electronic Air-Defense Operation[J].Fire Control & Command Control,2015,40(5):108-111. [13]JIN C,SUN J,WANG Y J,et al.Threat comprehensive assessment for air defense targets based on intuitionistic fuzzy TOPSIS and variable weight VIKOR[J].System Engineering and Electronics,2022,44(1):172-180. [14]YAO C C,SU T L,Evaluation Method of Radar Emitter Threat Based on Fuzzy MAGDM[J].Shipboard Electronic Countermeasure,2012,35(4):34-38. |
[1] | ZHAO Xuefeng, HOU Xiao, SUN Zhe, LI Mengxuan. Multidimensional Evaluation Method for Domestic Building Information Modeling Software Based on Entropy-Weight-AHP and Cloud Model [J]. Computer Science, 2023, 50(6A): 220400216-9. |
[2] | YU Ben-gong, ZHANG Zi-wei, WANG Hui-ling. TS-AC-EWM Online Product Ranking Method Based on Multi-level Emotion and Topic Information [J]. Computer Science, 2022, 49(6A): 165-171. |
[3] | LUO Chang-yin, CHEN Xue-bin, MA Chun-di, ZHANG Shu-fen. Improved Federated Average Algorithm Based on Tomographic Analysis [J]. Computer Science, 2021, 48(8): 32-40. |
[4] | PENG Da-chuan, YANG Xi-min, TANG Wan, ZHANG Xiao, FAN Lei. Dual-NIC Mutual Backup Scheme for Access Point Handoff in Software Defined Wireless Networks [J]. Computer Science, 2021, 48(6A): 427-431. |
[5] | CHEN Hai-biao, HUANG Sheng-yong, CAI Jie-rui. Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid [J]. Computer Science, 2021, 48(6A): 491-497. |
[6] | SUN Ming-wei, SI Wei-chao, DONG Qi. Research on Comprehensive Evaluation of Network Quality of Service Based on Multidimensional Data [J]. Computer Science, 2021, 48(6A): 246-249. |
[7] | SHI Chao-wei, MENG Xiang-ru, MA Zhi-qiang, HAN Xiao-yang. Virtual Network Embedding Algorithm Based on Topology Comprehensive Evaluation and Weight Adaptation [J]. Computer Science, 2020, 47(7): 236-242. |
[8] | YUE Chuan, PENG Xiao-hong. Evaluation Model of Software Quality with Interval Data [J]. Computer Science, 2019, 46(10): 209-214. |
[9] | CEHN Jun-hua, BIAN Zhai-an, LI Hui-jia, GUAN Run-dan. Measuring Method of Node Influence Based on Relative Entropy [J]. Computer Science, 2018, 45(11A): 292-298. |
[10] | WAN Xue-lian and ZHANG Jing-he. Research on Comprehensive Assessment Method of Information System Security Based on System Attack and Defense [J]. Computer Science, 2016, 43(Z6): 322-327. |
[11] | LI Yun-ting, XIA Zhong-ping and XIONG Jing. Study on Evaluation Method of Multi-layer Hybrid Intrusion Detection System [J]. Computer Science, 2015, 42(Z6): 425-428. |
[12] | ZHANG Cui-ping, GUO Zhen-zhou and GONG Chang-qing. Study on Strategy of Replica Selection in Cloud Storage Environment [J]. Computer Science, 2015, 42(Z11): 408-412. |
[13] | ZHANG Yu and LIU Sheng-mei. Network Selection Algorithm Based on Multi-attribute Decision [J]. Computer Science, 2015, 42(6): 120-124. |
[14] | ZHANG Hua-wei and LI Zhi-hua. Research on Data Distribution Strategy in Cloud Storage System Based on Multi-objective Optimization [J]. Computer Science, 2015, 42(4): 44-50. |
[15] | QIN Li, YANG Zi-long and HUANG Shu-guang. Synthesis Evaluation Method for Node Importance in Complex Networks [J]. Computer Science, 2015, 42(2): 60-64. |
|