Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 231000038-7.doi: 10.11896/jsjkx.231000038

• Interdiscipline & Application • Previous Articles     Next Articles

Radar Emitter Target Dynamic Threat Assessment Based on Combining Weighting-TOPSIS Method

ZHANG Yinling1, SHANG Tao1, LI Zhaokun 1,2   

  1. 1 School of Telecommunication Engineering,Xidian University,Xi'an 710071,China
    2 School of Electronic Information and Electrical Engineering,Shanghai Jiao Tong University,Shanghai 200240,China
  • Online:2024-11-16 Published:2024-11-13
  • About author:ZHANG Yinling,born in 1993,Ph.D.Her main research interests include data fusion and signal processing.
  • Supported by:
    National Natural Science Foundation of China(62001286) and Natural Science Foundation of Shaanxi Province(2020ZDLGY15-05).

Abstract: Nowadays,index weights determining methods of radar emitter target threat assessment are incomplete and non-dynamic.A dynamic and combining weighting assessment method based on analytic hierarchy process(AHP),entropy weight me-thod and technique for order preference by similarity to ideal solution(TOPSIS) model is proposed.First,an index system which includes platform attributes and radar attributes is proposed.Second,the threat subordinating degree functions of qualitive and quantitative attributes are established.Third,attributes are weighted by subjective and objective weights based on AHP and EWM.Fourth,the Poisson reverse distribution is induced for fusing decision information in multiple times.Finally,the threat assessment is obtained based on TOPSIS model.The simulation results show that,the proposed combining weighting dynamic assessment method is more comprehensive,effective,reasonable and actual compared with purely subjective weighting or objective weighting and single-moment method.It can reflect the multi-target threat ranking well and provide a strong basis for the combat command decision.

Key words: Radar emitter threat assessment, AHP, Entropy weight method, Combining weighting, Poisson distribution, Dynamic threat assessment, TOPSIS

CLC Number: 

  • TP391
[1]TANG Z L,ZHANG A.Survey of methods and theory for battlefield threat assessment[J].Fire Control & Command Control,2011,36(9):1617-1620.
[2]WANG W,SHI H Q,WANG L,et al.Aerial target threat assessment method of warship formation collaborative combat[J].Modern Defence Technology,2014,42(6):79-83.
[3]SHI J Y,SUN Y C,Y T,et al.Battlefield radar target threat assessment based on AHP-TOPSIS[J].Journal of Ordnance Equipment Engineering,2022,43(S2):29-34.
[4]ZHANG K,LIU P P,KONG W R,et al.Multi-target threat assessment in aircombat based on entropy and VIKOR[C]//2017 Ninth ICACI.Doha,2017.
[5]XU Y H,CHENG S Y,PANG M Y.Dynamic radiator threat assessment based on CRITIC-TOPSIS[J].Journal of Beijing University of Aeronautics and Astronautics,2020,46(11):2168-2175.
[6]ZHANG K,ZHOU D Y.Application of TOPSIS based on entropy and GD-AHP in evaluating sequence of air target threat[J].Journal of System Simulation,2008,20(7):1661-1664.
[7]NIE X Q,YAN P,WANG B Q,et al.A target threat assessment method for low-altitude aircraft[C]//Journal of Physics:Conference Series.2020.
[8]LUO R N,HUANG S C,ZHAO Y,et,al.Threat Assessment Method of Low Altitude Slow Small(LSS) Targets Based on Information Entropy and AHP[J]Entropy,2021,23(10):1292.
[9]YU D,WANG H J,LI B Y et,al.PROMETHEE-Based Multi-AUV Threat Assessment Method Using Combinational Weights[J].Journal of Marine Science and Engineering,2023,11(1422):1422.
[10]ZHANG Y,WANG H W,GUOX T,et al.Emitter Threat Evaluating Method Based on GIFSS and TOPSIS[J].Fire Control & Command Control,2018,43(4):37-41.
[11]YANG L Z,HU S L,FENG S M.Dynamic Evaluation and Simulation of Targets Threat Based on Entropy and TOPSIS Method[J].Ordnance Industry Automation,2020,39(3):53-56.
[12]JIN Z,LIU H L,LIU D W,et al.Analysis and Assessment of Radar-Countermeasure Target Threaten in Electronic Air-Defense Operation[J].Fire Control & Command Control,2015,40(5):108-111.
[13]JIN C,SUN J,WANG Y J,et al.Threat comprehensive assessment for air defense targets based on intuitionistic fuzzy TOPSIS and variable weight VIKOR[J].System Engineering and Electronics,2022,44(1):172-180.
[14]YAO C C,SU T L,Evaluation Method of Radar Emitter Threat Based on Fuzzy MAGDM[J].Shipboard Electronic Countermeasure,2012,35(4):34-38.
[1] ZHAO Xuefeng, HOU Xiao, SUN Zhe, LI Mengxuan. Multidimensional Evaluation Method for Domestic Building Information Modeling Software Based on Entropy-Weight-AHP and Cloud Model [J]. Computer Science, 2023, 50(6A): 220400216-9.
[2] YU Ben-gong, ZHANG Zi-wei, WANG Hui-ling. TS-AC-EWM Online Product Ranking Method Based on Multi-level Emotion and Topic Information [J]. Computer Science, 2022, 49(6A): 165-171.
[3] LUO Chang-yin, CHEN Xue-bin, MA Chun-di, ZHANG Shu-fen. Improved Federated Average Algorithm Based on Tomographic Analysis [J]. Computer Science, 2021, 48(8): 32-40.
[4] PENG Da-chuan, YANG Xi-min, TANG Wan, ZHANG Xiao, FAN Lei. Dual-NIC Mutual Backup Scheme for Access Point Handoff in Software Defined Wireless Networks [J]. Computer Science, 2021, 48(6A): 427-431.
[5] CHEN Hai-biao, HUANG Sheng-yong, CAI Jie-rui. Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid [J]. Computer Science, 2021, 48(6A): 491-497.
[6] SUN Ming-wei, SI Wei-chao, DONG Qi. Research on Comprehensive Evaluation of Network Quality of Service Based on Multidimensional Data [J]. Computer Science, 2021, 48(6A): 246-249.
[7] SHI Chao-wei, MENG Xiang-ru, MA Zhi-qiang, HAN Xiao-yang. Virtual Network Embedding Algorithm Based on Topology Comprehensive Evaluation and Weight Adaptation [J]. Computer Science, 2020, 47(7): 236-242.
[8] YUE Chuan, PENG Xiao-hong. Evaluation Model of Software Quality with Interval Data [J]. Computer Science, 2019, 46(10): 209-214.
[9] CEHN Jun-hua, BIAN Zhai-an, LI Hui-jia, GUAN Run-dan. Measuring Method of Node Influence Based on Relative Entropy [J]. Computer Science, 2018, 45(11A): 292-298.
[10] WAN Xue-lian and ZHANG Jing-he. Research on Comprehensive Assessment Method of Information System Security Based on System Attack and Defense [J]. Computer Science, 2016, 43(Z6): 322-327.
[11] LI Yun-ting, XIA Zhong-ping and XIONG Jing. Study on Evaluation Method of Multi-layer Hybrid Intrusion Detection System [J]. Computer Science, 2015, 42(Z6): 425-428.
[12] ZHANG Cui-ping, GUO Zhen-zhou and GONG Chang-qing. Study on Strategy of Replica Selection in Cloud Storage Environment [J]. Computer Science, 2015, 42(Z11): 408-412.
[13] ZHANG Yu and LIU Sheng-mei. Network Selection Algorithm Based on Multi-attribute Decision [J]. Computer Science, 2015, 42(6): 120-124.
[14] ZHANG Hua-wei and LI Zhi-hua. Research on Data Distribution Strategy in Cloud Storage System Based on Multi-objective Optimization [J]. Computer Science, 2015, 42(4): 44-50.
[15] QIN Li, YANG Zi-long and HUANG Shu-guang. Synthesis Evaluation Method for Node Importance in Complex Networks [J]. Computer Science, 2015, 42(2): 60-64.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!