首页 | 本学科首页   官方微博 | 高级检索  
     

基于FBNs的有人机/UCAV编队对地攻击威胁评估
引用本文:刘跃峰,陈哨东,赵振宇,张安. 基于FBNs的有人机/UCAV编队对地攻击威胁评估[J]. 系统工程与电子技术, 2012, 34(8): 1635-1639
作者姓名:刘跃峰  陈哨东  赵振宇  张安
作者单位:1. 光电控制技术重点实验室, 河南 洛阳 471009; 2. 西北工业大学电子信息学院, 陕西 西安 710072
基金项目:航空科学基金,总装重点实验室基金
摘    要:信息化环境下的编队对地攻击过程中,所获取的地面兵力威胁信息具有高度不确定性。如何采用高效的不确定性信息推理方法快速准确地完成地面兵力对空中飞行编队的威胁评估建模成为一个亟待解决的问题。提出基于模糊贝叶斯网络的有人机/无人战斗机编队对地威胁评估建模方法,综合模糊逻辑与贝叶斯网络的优势,对战场的随机、模糊威胁信息进行综合处理。仿真结果表明,模糊贝叶斯网络不仅能够有效处理战场不确定信息,而且能够综合指挥员的主观判断,适合于不确定性战场环境下的威胁评估推理。

关 键 词:系统工程  威胁评估  模糊贝叶斯网络  有人机/无人战斗机编队  对地攻击

Threat assessment of manned/unmanned combat aerial vehicle formation air-to-ground attack based on FBNs
LIU Yue-feng , CHEN Shao-dong , ZHAO Zhen-yu , ZHANG An. Threat assessment of manned/unmanned combat aerial vehicle formation air-to-ground attack based on FBNs[J]. System Engineering and Electronics, 2012, 34(8): 1635-1639
Authors:LIU Yue-feng    CHEN Shao-dong    ZHAO Zhen-yu    ZHANG An
Affiliation:1. Science and Technology on Electro optic Control Laboratory, Luoyang 471009, China; 2. School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710072, China
Abstract:During the process of air-to-ground attack under information environment,the threat information of ground entities is of high uncertainty.How to model the threat assessment of ground entities to aerial formation with an efficient uncertainty information inference method is a key issue demanding prompt solution.A threat assessment method of manned/unmanned aerial vehicle formation air-to-ground attack based on fuzzy Bayesian networks(FBNs) is proposed.This method integrates the advantages of fuzzy logic and Bayesian networks and can dispose the stochastic and fuzzy threat information.Simulation results indicate that FBNs can integrate not only the uncertainty information but also the subjective judgment of commanders,and fits the need of threat assessment inference in the uncertain combat environment.
Keywords:system engineering  threat assessment  fuzzy Bayesian network  manned/unmanned combat aerial vehicle formation  air-to-ground attack
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《系统工程与电子技术》浏览原始摘要信息
点击此处可从《系统工程与电子技术》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号