An Extended Fuzzy CPT-TODIM Model Based on Possibility Theory and its Application to Air Target Dynamic Threat Assessment

被引:11
|
作者
Zhao, Ruojing [1 ]
Yang, Fengbao [1 ]
Ji, Linna [1 ]
机构
[1] North Univ China, Sch Informat & Commun Engn, Taiyuan 030051, Shanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Threat assessment; Possibility theory; Indexes; Object detection; Decision making; Standards; Complexity theory; CPT-TODIM; possibility theory; triangular fuzzy number; CRITIC method; dynamic air target threat assessment; PROSPECT-THEORY; SELECTION; ENTROPY; SETS;
D O I
10.1109/ACCESS.2022.3153361
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dynamic target threat assessment can be regarded as a classical multiple attribute group decision-making (MAGDM) issue. Triangular fuzzy numbers (TFNs) can fully describe imprecise and fuzzy information for target threat assessment. Thus, to consider the changing trend of target detection information in a certain period and the influence of commanders' psychological factors on target threat assessment results, this study proposes an extended CPT-TODIM method based on possibility theory (PT-CPT-TODIM) to solve target threat assessment. Of note, the CRITIC method is used to determine the attribute weights of the probability mean matrix and the probability standard deviation matrix, which can make the target threat assessment result more rational. A numerical example and comparison analysis demonstrate the efficiency and feasibility of the newly proposed CPT-TODIM method.
引用
收藏
页码:21655 / 21669
页数:15
相关论文
共 50 条
  • [41] Application of the evaluation model based on comprehensive theory of fuzzy and its role in civil engineering design
    Jia, Zhao
    International Journal of Earth Sciences and Engineering, 2015, 8 (02): : 758 - 763
  • [42] Fuzzy Comprehensive Evaluation Model Based on AHP and its Application to Family Business' Risk Assessment
    Niu, Liwen
    Zheng, Juanjuan
    Luan, Pizhi
    Liu, Qinglian
    IFERA AT CHINA 2010 FAMILY BUSINESS FORUM: OPPORTUNITIES AND CHALLENGES OF FAMILY BUSINESS, 2010, : 347 - 351
  • [43] Building a type-2 fuzzy regression model based on credibility theory and its application on arbitrage pricing theory
    Wei, Yicheng
    Watada, Junzo
    IEEJ TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING, 2016, 11 (06) : 720 - 729
  • [44] Building a Type-2 Fuzzy Regression Model Based on Credibility Theory and Its Application on Arbitrage Pricing Theory
    Wei, Yicheng
    Watada, Junzo
    2014 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), 2014, : 2368 - 2375
  • [45] A framework of Multi Linear Regression based on Fuzzy Theory and Situation Awareness and its application to Beach Risk Assessment
    Shin, Gun-Yoon
    Hong, Sung-Sam
    Kim, Dong-Wook
    Hwang, Cheol-Hun
    Han, Myung-Mook
    Kim, Hwayoung
    Kim, Young jae
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (07): : 3039 - 3056
  • [46] Variable fuzzy model based on combined weights and its application to risk assessment for flood control engineering
    Liu, Ji
    Wang, Ben-De
    Dalian Ligong Daxue Xuebao/Journal of Dalian University of Technology, 2009, 49 (02): : 272 - 275
  • [47] Extended T-S Fuzzy Model based on Interval Arithmetic and Its Application to Interval Nonlinear Regression Analysis
    Sun Changping
    Xu Zhengguang
    2009 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-3, 2009, : 1773 - 1778
  • [48] An extended trust and distrust network-based dual fuzzy recommendation model and its application based on user-generated content
    Chen, Sichao
    Zhou, Shengjia
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 248
  • [49] Generalized Dynamic Fuzzy NN Model Based on Multiple Fading Factors SCKF and its Application in Integrated Navigation
    Wang, Junwei
    Ma, Zhen
    Chen, Xiyuan
    IEEE SENSORS JOURNAL, 2021, 21 (03) : 3680 - 3693
  • [50] Autoregressive model-based fuzzy clustering and its application for detecting information redundancy in air pollution monitoring networks
    D'Urso, Pierpaolo
    Di Lallo, Dario
    Maharaj, Elizabeth Ann
    SOFT COMPUTING, 2013, 17 (01) : 83 - 131