期刊文献+

基于混合贝叶斯网的空域目标威胁评估方法 被引量:36

Threat assessment of aerial targets based on hybrid Bayesian network
在线阅读 下载PDF
导出
摘要 针对空域目标威胁评估既需要综合考虑离散型变量和连续型变量影响,又需要具有不确定性推理能力的特点,建立了一种基于混合贝叶斯网的空域目标威胁评估模型。提出了结合主观经验和客观历史数据进行连续型网络参数学习的方法,提高了决策模型定量描述问题域中变量间依赖关系的准确性。运用团树传播算法进行空域目标威胁评估模型推理,仿真结果验证了该方法的有效性。 Aiming at the characteristic that a threat assessment of aerial targets requires to have the ability of an uncertain inference,as well as consider the influence of both discrete variables and continuous variables comprehensively,a Bayesian network model for a threat assessment of aerial targets is constructed.The learning method of continuous parameters with subjective knowledge and historical data is proposed to promote the accuracy for describing the dependency relationship among variables.The clique tree algorithm is used to make an inference of the threat assessment model of aerial targets.Simulation results verify the validity of the proposed method.
出处 《系统工程与电子技术》 EI CSCD 北大核心 2010年第11期2398-2401,共4页 Systems Engineering and Electronics
基金 总装备部装备预研重点基金(9140A04040106HT0801)资助课题
关键词 智能决策 威胁评估 混合贝叶斯网 空域目标 intelligent decision making threat assessment hybrid Bayesian network aerial target
  • 相关文献

参考文献11

  • 1冯卉,邢清华,宋乃华.一种基于区间数的空中目标威胁评估技术[J].系统工程与电子技术,2006,28(8):1201-1203. 被引量:35
  • 2武传玉,刘付显.基于模糊评判的新防空威胁评估模型[J].系统工程与电子技术,2004,26(8):1069-1071. 被引量:21
  • 3周林.基于MADM的威胁评估排序模型.系统工程与电子技术,2001,23(1):18-18.
  • 4Howard R,Matheson J E.Readings on theprinciples and applications of decision analysis[R].Menlo Park:Strategic Decisions Group,1984:721-762.
  • 5Pearl J.Causality[M].Cambridge:Cambridge University Press,200().
  • 6Chang K C,Fung R.Symbolic probab ilistic inference with both discrete and continuous variables[J].IEEE Trans.on Systems,Man and Cybernetics,1995,25(6):910-916.
  • 7Morellas V,Pavlidis I,Tsiamyrtzis P.Detection of events for threat evaluation and recognition[J].Association for Computing Machinery,2003,10:29-45.
  • 8Steinberg A N.Threat assessment technology development[J].Lecture Notes in Computer Science,2005,3554:490-500.
  • 9Macfarlane A M.Assessing the threat[J].Technology Review,2006,109(1):34-40.
  • 10Liang Y W.Fuzzy knowledge based approach in threat assessment[J].Journal of Information and Computational Science,2007,4(2):587-596.

二级参考文献8

共引文献86

同被引文献341

引证文献36

二级引证文献246

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部