• 中国科技核心期刊
  • JST收录期刊
ZHANG Hong-chao, WANG De-shi, PENG Jing-hui. Research on Target Threat Assessment and Ranking Model of Single Ship against Submarine[J]. Journal of Unmanned Undersea Systems, 2019, 27(1): 037-44. doi: 10.11993/j.issn.2096-3920.2019.01.007
Citation: ZHANG Hong-chao, WANG De-shi, PENG Jing-hui. Research on Target Threat Assessment and Ranking Model of Single Ship against Submarine[J]. Journal of Unmanned Undersea Systems, 2019, 27(1): 037-44. doi: 10.11993/j.issn.2096-3920.2019.01.007

Research on Target Threat Assessment and Ranking Model of Single Ship against Submarine

doi: 10.11993/j.issn.2096-3920.2019.01.007
  • Publish Date: 2019-02-28
  • Aiming at the threat assessment reliability and efficiency of single ship against a submarine, the threat ranking rules and threat assessment model of submarine targets are studied. According to the characteristics of anti-submarine operation, the specifications describing threat are selected and the specification system of threat assessment is established. Based on the fuzzy analytic hierarchy process(AHP) method, the attacking judgment of the target is fused, so that the model can consider the factors such as the state of the target weapon in the battlefield environment. The simulation results show that the proposed method can be used to assess underwater target threats accurately and quickly. It provides the research foundation for developing the command and decision-making system of surface warship formation anti-submarine operation.

     

  • loading
  • [1]
    Chen S J, wang C L. Fuzzy Multiple Attribute Decision Making: Methods and Applications[M]. German: Springer, 1992: 289-486.
    [2]
    Johnson W T, Dall I W. From Kinematics to Symbolics for Situation and Threat Evaluation[C]//Information, Decision and Control, 1999. IDC 99. Edmonton, Alberta, Ca- nada: IEEE, 1999: 497-502.
    [3]
    罗乐, 夏斌, 张锦春. 基于组合赋权灰色关联投影的通信目标威胁评估[J]. 火力与指挥控制, 2015, 40(11): 87-90.

    Luo Le, Xia Bin, Zhang Jin-chun. Evaluation of Communicate Targets Threat Based on Combination Weighting and Grey Relation Projection Method[J]. Fire Control & Command Control, 2015, 40(11): 87-90.
    [4]
    王海洋, 代立超, 李霖. 基于TOPSIS法的电子侦察目标威胁评估[J]. 舰船电子对抗, 2013, 36(6): 106-108, 120.

    Wang Hai-yang, Dai Li-chao, Li Lin. Threat Evaluation of Electronic Reconnaissance Target Based on TOPSIS[J]. Ship-board Electronic Countermeasure, 2013, 36(6): 106- 108, 120.
    [5]
    Yu Z, Chen Z, Zhou R. Study on Algorithm of Threat Level Evaluation Based on Bayesian Network[J]. Acta Simulate Systematical Sonica, 2005, 3(4):33-45.
    [6]
    陈云翔, 蔡忠义, 张诤敏, 等. 基于证据理论和直觉模糊集的群决策信息集结方法[J]. 系统工程与电子技术, 2015, 37(3): 594-598.

    Chen Yun-xiang, Cai Zhong-yi, Zhang Zheng-min, et al. Method for Group Decision-making Information Integration Based on Evidence Theory and Intuitionistic Fuzzy Set[J]. Systems Engineering and Electronics, 2015, 37(3): 594-598.
    [7]
    王鑫, 吴华, 赵玉. 电子战目标威胁评估的折衷排序方法[J]. 电光与控制, 2013, 20(8): 14-17.

    Wang Xin, Wu Hua, Zhao Yu, et al. A Compromise Sorting Method for Electronic Warfare Target Threat Assessment[J]. Electronics Optics & Control, 2013, 20(8): 14-17.
    [8]
    陈菁, 何心怡, 高贺, 等. 水面舰艇编队反潜武器系统架构与关键技术[J]. 指挥控制与仿真, 2016, 38(6): 12-15.

    Chen Jing, He Xin-yi, Gao He, et al. Structure and Key Technologies of Anti-submarine Weapon System for Surface Warship Formation[J]. Command Control & Simulation, 2016, 38(6):12-15.
    [9]
    李亦伟, 杨文亮. 水面舰艇火力兼容技术研究[J]. 舰船电子工程, 2009, 29(1): 21-22.

    Li Yi-wei, Yang Wen-liang. Research on Technique of Fire-power Compatible for Warship[J]. Ship Electronic Engineering, 2009, 29(1): 21-22.
    [10]
    邹侃, 郭鹏程. 潜艇伏击阵地设置优化研究[J]. 科技创新导报, 2008(12): 200-201.
    [11]
    屈也频. 反潜巡逻飞机搜潜辅助决策系统建模与仿真研究[D]. 湖南: 国防科学技术大学, 2008.
    [12]
    朱慧, 杨秀庭. 舰载声呐及作战使用[M]. 大连: 海军大连舰艇学院出版社, 2008.
    [13]
    胡方, 黄建国, 董仲臣. 鱼雷效能模糊综合评估方法研究[J]. 鱼雷技术, 2007, 15(2): 52-56.

    Hu Fang, Huang Jian-guo, Dong Zhong-chen. Comprehensive Fuzzy Evaluation of Torpedo Operational Effectiveness[J]. Torpedo Technology, 2007, 15(2): 52-56.
    [14]
    陈辉, 龚奇. 基于整体作战效能的目标威胁排序[J]. 电子科技, 2013, 28(7): 97-100.

    Chen Hui, Gong Qi. Threat Ordering Method Based on Overall Combat Effectiveness[J]. Electronic Science and Technology, 2013, 28(7): 97-100.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article Views(475) PDF Downloads(399) Cited by()
    Proportional views
    Related
    Service
    Subscribe

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return