Advanced Search
Volume 29 Issue 9
Jan.  2011
Turn off MathJax
Article Contents
Lei Ying-jie, Wang Bao-shu, Wang Yi . Techniques for Threat Assessment Based on Intuitionistic Fuzzy Reasoning[J]. Journal of Electronics & Information Technology, 2007, 29(9): 2077-2081. doi: 10.3724/SP.J.1146.2006.00055
Citation: Lei Ying-jie, Wang Bao-shu, Wang Yi . Techniques for Threat Assessment Based on Intuitionistic Fuzzy Reasoning[J]. Journal of Electronics & Information Technology, 2007, 29(9): 2077-2081. doi: 10.3724/SP.J.1146.2006.00055

Techniques for Threat Assessment Based on Intuitionistic Fuzzy Reasoning

doi: 10.3724/SP.J.1146.2006.00055 cstr: 32379.14.SP.J.1146.2006.00055
  • Received Date: 2006-01-12
  • Rev Recd Date: 2006-07-14
  • Publish Date: 2007-09-19
  • To the questions of Threat Assessment (TA), a technique for TA based on intuitionistic fuzzy reasoning is proposed. First, the major factors of effects of attacking targets from space or air on TA in joint air defense operations, nondeterminacy to TA, and the properties and vulnerabilities of the existing TA methods are analyzed. A model for TA measurement rank of threat degree is exposed. Then, the membership and nonmembership functions for input/output state variables are devised. The methods for quantification and measurement transformation to input variables in fuzzy strategy are addressed. The inference rules of the system are constructed with algorithms for reasoning and defuzzification devised. Subsequently, completeness and interactivity and consistency of rules contained in the rulebase are checked with a verification method to the rulebase presented. Finally, the validity is checked by providing TA instances with 20 typical targets.
  • loading
  • Llinas J and Hall D L. An introduction to multi-sensor data fusion [A]. Proceedings of the IEEE International Symposium on Circuits and Systems [C]. Monterey California USA, IEEE Press, 1998, 6: 537-540.[2]Steinberg A, Bowman C, and White F. Revisions to the JDL data fusion model [A][J].SPIE.1999, 3719:430-441[3]徐毅, 金德琨, 敬忠良. 数据融合研究的回顾与展望[J]. 信息与控制 , 2002, 31(3): 250-255.[4]Hinman M L. Some computational approaches for situation 687-693[J].assessment and impact assessment [A]. Proceedings of the Fifth International Conference on Information Fusion [C]. Annapolis Maryland USA, ISIF IEEE Press.2002, 1:687-693[5]Looney C G. Explorinfusion architecture for a commonoperational picture [J].Information Fusion.2001, 2(4):251-260[6]Looney C G and Liang L R. Cognitive situation and threat assessments of ground battlespaces [J].Information Fusion.2003, 4(4):297-308[7]Atanassov K. Intuitionistic fuzzy sets[J].Fuzzy Sets and Systems.1986, 20(1):87-96[8]Atanassov K. More on intuitionistic fuzzy sets[J].Fuzzy Sets and Systems.1989, 33(1):37-46[9]Abbas S E. On intuitionistic fuzzy compactness[J].Information Sciences.2005, 173(1-3):75-91[10]Li Deng-Feng. Multiattribute decision making models and methods using intuitionistic fuzzy sets [J].Journal of Computer and System Sciences.2005, 70(1):73-85[11]雷英杰,王宝树. 直觉模糊逻辑的语义算子研究[J]. 计算机科学, 2004, 31(11): 4-6.[12]李晓萍,王贵君. 直觉模糊集的扩张运算[J]. 模糊系统与数学, 2002, 16(1): 40-46.[13]雷英杰,王宝树. 直觉模糊关系及其合成运算[J]. 系统工程理论与实践, 2005, 25(2): 113-118.[14]雷英杰,王宝树,王晶晶. 直觉模糊条件推理与可信度传播[J].电子与信息学报.2006, 28(10):1790-1793浏览
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (4910) PDF downloads(2064) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return