1 异常空情威胁等级评估框架
表1 威胁等级表 |
威胁等级 | 高 | 较高 | 中 | 低 |
---|---|---|---|---|
评估值 | (0.8,1] | (0.6,0.8] | (0.3,0.6] | [0,0.3] |
2 基于动态贝叶斯的目标威胁程度估计
2.1 目标威胁程度评估动态贝叶斯网络构建
2.2 威胁程度评估网络参数设定
表2 动态贝叶斯网络状态转移概率 |
TT+1 | H | E | G | L |
---|---|---|---|---|
H | 0.5 | 0.3 | 0.1 | 0.1 |
E | 0.3 | 0.35 | 0.3 | 0.2 |
G | 0.15 | 0.3 | 0.4 | 0.3 |
L | 0.05 | 0.05 | 0.2 | 0.4 |
表3 威胁程度评估条件概率 |
TH | IN | DE | |||||
---|---|---|---|---|---|---|---|
[A | S | T | C] | [S | M | W] | |
H | 0.85 | 0.05 | 0.1 | 0 | 0.85 | 0.15 | 0 |
E | 0.3 | 0.5 | 0.2 | 0 | 0.3 | 0.6 | 0.1 |
G | 0.1 | 0.3 | 0.6 | 0 | 0.2 | 0.4 | 0.4 |
L | 0 | 0.1 | 0.2 | 0.7 | 0.05 | 0.15 | 0.8 |
表4 目标意图评估条件概率 |
IN | P | C | ||||
---|---|---|---|---|---|---|
[I | R | O | W] | [E | L] | |
A | 0.4 | 0.3 | 0.2 | 0.1 | 0.7 | 0.3 |
S | 0.5 | 0.3 | 0.15 | 0.05 | 0.6 | 0.4 |
T | 0.1 | 0.1 | 0.3 | 0.5 | 0.8 | 0.2 |
C | 0.25 | 0.25 | 0.25 | 0.25 | 0.5 | 0.5 |
表5 目标意图及毁伤能力联合条件概率 |
IN | DE | ID | IFF | |||||||
---|---|---|---|---|---|---|---|---|---|---|
[M | B | S | C | G] | [A | C | N | S] | ||
A | S | 0.8 | 0.15 | 0.05 | 0 | 0 | 0.1 | 0 | 0.9 | 0 |
A | M | 0.3 | 0.6 | 0.1 | 0 | 0 | 0.35 | 0 | 0.65 | 0 |
A | W | 0.1 | 0.2 | 0.7 | 0 | 0 | 0.6 | 0 | 0.4 | 0 |
S | S | 0 | 0.2 | 0.8 | 0 | 0 | 0.05 | 0 | 0.95 | 0 |
S | M | 0 | 0.3 | 0.7 | 0 | 0 | 0.1 | 0 | 0.9 | 0 |
S | W | 0 | 0.4 | 0.6 | 0 | 0 | 0.2 | 0 | 0.8 | 0 |
IN | DE | ID | IFF | |||||||
[M | B | S | C | G] | [A | C | N | S] | ||
T | S | 0 | 0 | 0 | 0.95 | 0.05 | 0 | 0.01 | 0.01 | 0.98 |
T | M | 0 | 0 | 0 | 0.9 | 0.1 | 0 | 0.05 | 0.05 | 0.9 |
T | W | 0 | 0 | 0 | 0.85 | 0.15 | 0 | 0.05 | 0.1 | 0.85 |
C | S | 0 | 0 | 0 | 0.9 | 0.1 | 0 | 0.98 | 0.02 | 0 |
C | M | 0 | 0 | 0 | 0.6 | 0.4 | 0 | 0.95 | 0.05 | 0 |
C | W | 0 | 0 | 0 | 0.4 | 0.6 | 0 | 0.9 | 0.1 | 0 |
表6 目标类型评估条件概率 |
ID | A | V | L | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
[H | M | L | S] | [S | H | M | L] | [I | O] | ||||||||||||||||||
M | 0 | 0.2 | 0.6 | 0.2 | 0.1 | 0.2 | 0.6 | 0.1 | 0 | 1 | |||||||||||||||||
B | 0.3 | 0.4 | 0.2 | 0.1 | 0.05 | 0.6 | 0.35 | 0 | 0.1 | 0.9 | |||||||||||||||||
S | 0.2 | 0.7 | 0.1 | 0 | 0 | 0.2 | 0.7 | 0.1 | 0.2 | 0.8 | |||||||||||||||||
C | 0.8 | 0.15 | 0.05 | 0 | 0 | 0.1 | 0.8 | 0.1 | 0.95 | 0.05 | |||||||||||||||||
G | 0 | 0.3 | 0.5 | 0.2 | 0 | 0 | 0.2 | 0.8 | 0 | 1 | |||||||||||||||||
ID | N | J | σ | ||||||||||||||||||||||||
[O | T] | [H | M | L] | [B | M | S] | ||||||||||||||||||||
M | 0.6 | 0.4 | 0 | 0.2 | 0.8 | 0.4 | 0.1 | 0.2 | |||||||||||||||||||
B | 0.3 | 0.7 | 0.3 | 0.4 | 0.3 | 0.7 | 0.1 | 0.35 | |||||||||||||||||||
S | 0.9 | 0.1 | 0.5 | 0.3 | 0.2 | 0.1 | 0.4 | 0.4 | |||||||||||||||||||
C | 1 | 0 | 0 | 0 | 1 | 0 | 0.7 | 0.2 | |||||||||||||||||||
G | 0.9 | 0.1 | 0 | 0 | 1 | 0.1 | 0.2 | 0.3 |
2.3 基于动态贝叶斯网络目标威胁程度评估的推理
3 基于模糊神经网络的异常空情处置能力评估
3.1 异常空情处置能力评估网络构建
3.2 异常空情处置能力评估网络训练
4 仿真算例
表7 不同时刻证据信息概率表 |
P | C | J | L | ||||
---|---|---|---|---|---|---|---|
1 | (0.188,0.171,0.245,0.396) | (0.617,0.383) | (0,0.036,0.964) | (0,0.368,0.632) | (0,1) | ||
2 | (0.263,0.219,0.224,0.294) | (0.644,0.356) | (0,0.021,0.979) | (0,0.271,0.729) | (0,1) | ||
3 | (0.315,0.245,0.224,0.216) | (0.669,0.331) | (0,0.019,0.981) | (0,0.186,0.814) | (0,1) | ||
4 | (0.339,0.267,0.204,0.190) | (0.671,0.328) | (0,0.022,0.978) | (0,0.251,0.749) | (0,1) | ||
5 | (0.389,0.294,0.201,0.116) | (0.695,0.305) | (0,0.017,0.983) | (0,0.199,0.801) | (0,1) | ||
T | IFF | A | V | N | |||
1 | (0,0,1,0) | (0.143,0.423,0.298,0.136)) | (0,0.179,0.607,0.214) | (1,0) | |||
2 | (0,0,1,0) | (0.131,0.375,0.326,0.168)) | (0,0.228,0.573,0.199) | (1,0) | |||
3 | (0,0,1,0) | (0.118,0.360,0.341,0.181) | (0,0.234,0.578,0.188) | (1,0) | |||
4 | (0,0,1,0) | (0.117,0.310,0.373,0.200) | (0,0.273,0.544,0.182) | (1,0) | |||
5 | (0,0,1,0) | (0.107,0.288,0.391,0.214) | (0,0.287,0.539,0.174) | (1,0) |