期刊文献+

计算机生成兵力的目标选择研究 被引量:3

Study on CGF's Target Selection
在线阅读 下载PDF
导出
摘要 根据CGF目标选择的模糊性特点,介绍了一个基于模糊集理论的目标威胁分析算法和基于效用理论的目标选择算法。基于模糊集理论的威胁分析能准确反映和描述实际战场环境下信息的模糊特性,算法通过隶属度函数计算得出不同威胁因素的隶属度值,然后通过层次分析法综合各威胁因素隶属度值获得每个目标的威胁程度。基于效用理论的目标选择算法通过效用函数综合考虑了目标的威胁程度和与之交战的期望效益两方面因素,能很好地模拟实际作战兵力的目标选择过程。 According to the ambiguous features in Target Selection process of individual Computer Generated Forces (CGF), a threat analysis algorithm based on Fuzzy Set Theory and a target selection algorithm based on Utility Theory were discussed. Fuzzy Set Theory can efficiently express ambiguous and complex situations, such as those that arise in real life threat analysis. For each target the threat analysis algorithm produces a threat value by calculating a membership of each factor and aggregating the membership values of the sets through Analytic Hierarchy Processing (AHP). By using a synthesis utility function, both the target threat and the expected engaging utility have been taken into account by the target selection algorithm in target selection process. The algorithm can realistically simulate the target selection orocess of real battle forces.
出处 《系统仿真学报》 CAS CSCD 北大核心 2008年第9期2407-2411,共5页 Journal of System Simulation
关键词 CGF 威胁分析 目标选择 模糊集 效用函数 computer generated forces threat analysis target selection fuzzy set utility function
  • 相关文献

参考文献6

  • 1陈珽.决策分析[M].北京:科学出版社,1997..
  • 2钱颂迪.运筹学[M].北京:清华大学出版社,2004.
  • 3安雪滢,赵勇,杨乐平,张为华.基于模糊理论的卫星系统效能评估仿真研究[J].系统仿真学报,2006,18(8):2334-2337. 被引量:27
  • 4杨克巍,王正元,陈志诚,谭跃进.基于半自治Agent的CGF建模及应用研究[J].系统仿真学报,2005,17(4):997-999. 被引量:12
  • 5徐学云,王寿云.现代作战模拟[M].北京:科学出版社,2001.
  • 6J E Cisneros, C R Karr, P R McCauley-Bell, S Rajput. Threat Analysis using Fuzzy Set Theory [C].Proceedings of the 6th Conference on Computer Generated Forces and Behavioral Representation. Orlando, FL: University of Central Florida , July, 1996.

二级参考文献15

  • 1赵宏,常显奇.导航定位卫星作战信息支援效能评估方法研究[J].指挥技术学院学报,2001,12(2):26-28. 被引量:14
  • 2陈浩光 秦大国 李云芝.军用卫星系统效能评估的基本原则与方法研究.指挥技术学院学报,2001,12(2):27-30.
  • 3Andrew Ilachinski, Irreducible Semi-Autonomous Adaptive Combat (ISAAC): An Artificial-Life Approach to Land Warfare (U) Center for Naval Analyses 1997. http://www.nca.orf/isaac/.
  • 4Yang Kewei, Wang Zhengyuan, Tan Yuejin. Study and Application of Semiautonomous Agent Communication Model [C]. ICSSSE03 Hong Kong, 2003, 11: 288-294.
  • 5OneSAF White paper information
  • 6Ioerger T R, Volz R A, Yen J. Modeling Cooperative, Reactive Behaviors on the Battlefield Using Intelligent Agents [C]. Proceedings of the Ninth Conference on Computer Generated Forces (9th CGF), 2000, 13-23.
  • 7李洪兴 汪群 段钦治 等.工程模糊数学方法及应用[M].天津:天津科学技术出版社,1991..
  • 8王莲芬 许树柏.层次分析法引论[M].北京:中国人民大学出版社,1989.69-76.
  • 9Evangelos Triantaphyllou,Stuarth Mann.Using the Analytic Hierarch Process for Decision Making in Engineering Applications:Some Challenges[J].Inter'l Journal of Industrial Engineering:Applications and Practice (S1072-4761).1995,2(1):35-44.
  • 10Evangelos Triantaphyllou.A Sensitivity Analysis Approach for Some Deterministic Multi-criteria Decision Making Methods[J].Decision Science,1997,28(1):151-194.

共引文献61

同被引文献26

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部