C | ¬C | |
ap | λpp | λPN |
aB | λBP | λBN |
aN | λNP | λNN |
In this paper, the classical coot optimization algorithm (COA) is modified to improve its overall performance in the exploration phase by adding an adaptive sigmoid inertia weight-based method. The modified coot optimization algorithm (mCOA) was successfully assessed using 13 standard benchmark test functions, which are frequently used to evaluate metaheuristic optimization algorithms. The MATLAB software was utilized to conduct simulation tests, and the outcome was compared with the performance of the original COA, the particle swarm optimization, and the genetic algorithm reported in the literature. The findings showed that the proposed algorithm outperformed the other algorithms on ten (10) of the 13 benchmark functions, while it maintained a competitive performance on the remaining three benchmark test functions. This indicates that mCOA provides a significant improvement to the original COA, thus making it suitable for resolving optimization problems in diverse fields. As a result, the proposed algorithm is recommended for adoption to solve real-life engineering optimization problems.
Citation: Elvis Twumasi, Ebenezer Archer, Emmanuel O. Addo, Emmanuel A. Frimpong. Modification of coot optimization algorithm (COA) with adaptive sigmoid increasing inertia weight for global optimization[J]. Applied Computing and Intelligence, 2024, 4(1): 93-106. doi: 10.3934/aci.2024006
[1] | Qiwen Wang, Guibao Song, Xiuxia Yang . Mixed-attitude three-way decision model for aerial targets: Threat assessment based on IF-VIKOR-GRA method. Mathematical Biosciences and Engineering, 2023, 20(12): 21514-21536. doi: 10.3934/mbe.2023952 |
[2] | Haiping Ren, Laijun Luo . A novel distance of intuitionistic trapezoidal fuzzy numbers and its-based prospect theory algorithm in multi-attribute decision making model. Mathematical Biosciences and Engineering, 2020, 17(4): 2905-2922. doi: 10.3934/mbe.2020163 |
[3] | Han Wu, Junwu Wang, Sen Liu, Tingyou Yang . Research on decision-making of emergency plan for waterlogging disaster in subway station project based on linguistic intuitionistic fuzzy set and TOPSIS. Mathematical Biosciences and Engineering, 2020, 17(5): 4825-4851. doi: 10.3934/mbe.2020263 |
[4] | Fankang Bu, Jun He, Haorun Li, Qiang Fu . Interval-valued intuitionistic fuzzy MADM method based on TOPSIS and grey correlation analysis. Mathematical Biosciences and Engineering, 2020, 17(5): 5584-5603. doi: 10.3934/mbe.2020300 |
[5] | Yefu Zheng, Jun Xu, Hongzhang Chen . TOPSIS-based entropy measure for intuitionistic trapezoidal fuzzy sets and application to multi-attribute decision making. Mathematical Biosciences and Engineering, 2020, 17(5): 5604-5617. doi: 10.3934/mbe.2020301 |
[6] | Bo Sun, Ming Wei, Wei Wu, Binbin Jing . A novel group decision making method for airport operational risk management. Mathematical Biosciences and Engineering, 2020, 17(3): 2402-2417. doi: 10.3934/mbe.2020130 |
[7] | Muhammad Akram, G. Muhiuddin, Gustavo Santos-García . An enhanced VIKOR method for multi-criteria group decision-making with complex Fermatean fuzzy sets. Mathematical Biosciences and Engineering, 2022, 19(7): 7201-7231. doi: 10.3934/mbe.2022340 |
[8] | Shiyun Wang, Xiaonan Liang, Jiaoyue Wang . Parameter assignment for InVEST habitat quality module based on principal component analysis and grey coefficient analysis. Mathematical Biosciences and Engineering, 2022, 19(12): 13928-13948. doi: 10.3934/mbe.2022649 |
[9] | Yunhui Zhang, Yongquan Zhou, Shuangxi Chen, Wenhong Xiao, Mingyu Wu . Bald eagle search algorithm for solving a three-dimensional path planning problem. Mathematical Biosciences and Engineering, 2024, 21(2): 2856-2878. doi: 10.3934/mbe.2024127 |
[10] | Yuting Zhu, Wenyu Zhang, Junjie Hou, Hainan Wang, Tingting Wang, Haining Wang . The large-scale group consensus multi-attribute decision-making method based on probabilistic dual hesitant fuzzy sets. Mathematical Biosciences and Engineering, 2024, 21(3): 3944-3966. doi: 10.3934/mbe.2024175 |
In this paper, the classical coot optimization algorithm (COA) is modified to improve its overall performance in the exploration phase by adding an adaptive sigmoid inertia weight-based method. The modified coot optimization algorithm (mCOA) was successfully assessed using 13 standard benchmark test functions, which are frequently used to evaluate metaheuristic optimization algorithms. The MATLAB software was utilized to conduct simulation tests, and the outcome was compared with the performance of the original COA, the particle swarm optimization, and the genetic algorithm reported in the literature. The findings showed that the proposed algorithm outperformed the other algorithms on ten (10) of the 13 benchmark functions, while it maintained a competitive performance on the remaining three benchmark test functions. This indicates that mCOA provides a significant improvement to the original COA, thus making it suitable for resolving optimization problems in diverse fields. As a result, the proposed algorithm is recommended for adoption to solve real-life engineering optimization problems.
In modern combat, large-scale, intelligent weapons equipment and systems are becoming increasingly vital, and intelligent decision-making has become the core of the battle. Threat assessment (TA) is a critical element in military decisions. With the advancement of battle theory and enhanced combat equipment, troops' combat effectiveness has dramatically improved, defining modern warfare as adversarial and timely [1]. As a result, it establishes more stringent criteria for enemy target threat assessment procedures. Threat assessment forecasts the threat level of enemy targets based on information fusion and aids in battlefield command and decision-making [2]. Therefore, intelligent threat assessment in air combat has significant research implications as well as vast application prospects.
Recently, threat assessment methods have mainly included multi-attribute decision theory [3,4], intuitionistic fuzzy sets (IFS) [5,6,7], grey theory [8,9,10], Bayesian network [11,12], technique for ordering preference by similarity to an ideal solution (TOPSIS) [13,14], adaptive network based fuzzy inference inference system (ANFIS) [15,16] and so on. A threat assessment model with respect to small data sets based on a Bayesian network was proposed [11]. The model was obtained by the modeling method based on the improved Bayesian Information Criterion (BIC) score. The intelligent situation awareness (SA) modeling method was based on the Fuzzy Grey Cognitive Map (FGCM) [17], which can better deal with complex battlefield situations and handle uncertain information. A threat assessment model of attribute reduction and back propagation (BP) neural network [18] was established to assess and judge threat degree of the target. The assessment method based on Grey Relational Analysis (GRA)-TOPSIS was proposed in [19]. An improved adaptive network was proposed in [1] based on fuzzy inference system model. Although the above methods can effectively carry out threat assessment, they still have the following problems: Bayesian network and neural network methods need a lot of prior information, which makes it difficult to meet the dynamic and real-time characteristics of threat assessment; the fuzzy cognitive map model cannot solve the uncertainty problem of experts in the initial setting of the model; grey theory relies on expert experience and there are many subjective factors.
With the uncertainty and variability of battlefield situation information, threat assessment needs to effectively handle dynamic battlefield environments. Many scholars have studied threat assessment in a fuzzy decision-making environment. Intuitive fuzzy sets [20] can more accurately represent uncertain information. The method based on IFS and multi-attribute decision theory has been widely used in threat assessment problems [21,22,23,24]. However, this method still has limitations: Traditional threat assessment methods often only rank threat targets, requiring decision-makers to further judge threat levels and choose priority combat targets, making it difficult to deal with complex and ever-changing environments. Moreover, a target is either accepted or rejected in two-way decision-making method, which can easily result in erroneous judgments. Yao et al. [25,26] proposed three-way decisions, which can give reasonable explanations to three regions of rough sets and linked them with three decision actions. Applying three-way decision-making (TWD) to multi-attribute decision-making (MADM) problems can effectively handle uncertain information and better classify targets.
To fully utilize uncertain situation information and obtain more objective and reasonable evaluation results, we propose a dynamic threat assessment method based on the improved GRA-TOPSIS and three-way decisions. There are three main contributions of our work:
1) The cosine intuitionistic fuzzy entropy is introduced to calculate weights of target attributes, combined with a dynamic data fusion method to generate time series weights for dynamic matching of attribute parameters and weights.
2) A new intuitionistic fuzzy distance measure is used to calculate the distance between intuitionistic fuzzy numbers, and grey incidence analysis and TOPSIS are used to build the conditional probability for TWD.
3) Three-way decisions under the MADM model are used to classify threats against aerial targets.
TWD have been extensively studied to solve realistic MADM problems since they can minimize decision risks by adding the non-commitment option[27,28]. The improved TOPSIS method, combined with entropy weights, was used for optimal granularity selection[29]. A novel intuitionistic fuzzy (IF) large-scale group decision-making (LSGDM) method was constructed based on adjustable multi-granularity (MG)-IF probabilistic rough sets (PRSs) and the evidence reasoning (ER) method[30]. A new TWD model based on prospect theory (PT) on multi-scale information systems (MS-ISs) was revealed for pursuing MADM problems[31]. The intuitionistic fuzzy TOPSIS method[32] was used to obtain the conditional probability for the target and intuitionistic fuzzy evaluation value to construct the decision threshold for each target. However, the above threat assessment methods cannot make full use of uncertain situation information, the determination of conditional probability obtained has certain subjectivity and limitations, and it is difficult to get perfect results when dealing with the problem of "poor information".
IFMADM has been widely used as an extension of MADM under intuitionistic fuzzy information [21]. For the assessment of target attribute values with unknown intervals and weights, a Quantum Bee Group Threat Assessment Method for Intuitive Vague Multi-Attribute Decision (IFMADM) with Optimized Attribute Weighting was proposed [22]. To address the uncertainty and imprecision of experts' opinions, an improved hierarchical fuzzy TOPSIS method was used to aggregate the factors that affect the exposure rates of buildings in the two different scenarios [23]. A new intuitionistic fuzzy decision-making model was developed based on decision field theory [24]. The model stresses the contrasts regarding competition and influence of each attribute in different schemes in order to provide a dynamic evolution of preferences for various schemes and obtain optimum results.
Threat assessment is an essential part of modern warfare. With battlefield environments and situation information becoming more dynamic and uncertain, many scholars have studied threat assessment in a fuzzy intuitionistic environment. Jin et al. [33] proposed an intuitionistic fuzzy TOPSIS model and a multi-criteria optimization compromise decision-making (VIKOR) model with variable weights for static attribute and dynamic attribute threat assessment, but only the current situation was considered, and the dynamic threat assessment could not be conducted. The TOPSIS ranking method [34] based on improved relative entropy was proposed to dynamically evaluate incoming targets, but the method can only rank threats and cannot achieve threat classification. Thus, we study threat assessment in the IFMADM environment based on the current trend.
Definition 1 [35] Let X be a finite universal set. An intuitionistic fuzzy set (IFS) A in X can be mathematically described as
A = {⟨x,μA(x),νA(x)⟩ | x∈X} | (3.1) |
where μA(x),νA(x):X→[0,1] are the membership and non-membership degrees of element x in X belonging to A, and conditions of 0≤μA(x)+νA(x)≤1 and x∈X are met; πA(x)=1−μA(x)−νA(x), which shows the hesitation degree and uncertainty of element x, and the condition of πA(x)∈[0,1] is met.
Definition 2 [25,26] Based on minimum risk Bayesian theory, Yao proposed decision-theoretic rough sets which are composed of 2 states and 3 actions. Given two states Ω={C,¬C}, which mean a target belongs to C or not. Let A={ap,aB,aN} be actions set, and ap,aB,aN describe x∈POS(C),x∈BND(X),x∈NEG(C) respectively. For the above two states and three actions, Table 1 shows the loss functions of TWD. The {λPP,λBP,λNP} and {λPN,λBN,λNN} describe the loss function of ap,aB,aN respectively, when the target belongs to C and ¬C. In addition, Pr(C|[x]) and Pr(¬C|[x]) represent conditional probabilities when targets belong to C and ¬C respectively.
C | ¬C | |
ap | λpp | λPN |
aB | λBP | λBN |
aN | λNP | λNN |
The method can fully utilize uncertain battlefield information and apply three-way decisions to multi-target dynamic threat assessment. Figure 1 shows the assessment process of the improved GRA-TOPSIS method and three-way decisions. A specific description of the method is given in the pseudocode below.
The battlefield situation is dynamic. Gathering multi-time information is a vital step in conducting a comprehensive and reasonable threat assessment of aerial targets. The closer to the current moment, the more significant the target information is. Therefore, we can calculate the series weight vector η=(η1,η2,...,ηk) of k times by using the inverse form of the Poisson distribution. Through the weighted aggregation of threat assessment information at each time by the intuitionistic fuzzy weighted average (IFWA) operator, a comprehensive intuitionistic fuzzy decision matrix R can be obtained:
R=(⟨μij,νij⟩)m×n | (4.1) |
where ⟨μij,νij⟩=⟨1−K∏k=1(1−μij(tk))ηk,K∏k=1νij(tk)ηk⟩ and t={t1,t2,...,tk} is a set of moments.
Algorithm 1: The multi-target dynamic threat assessment algorithm |
input: The multi-time information data D output: The ranking and classification of targets ![]() |
The calculation of objective attribute weights is a key problem in MADM. The larger the intuitionistic fuzzy entropy, the fuzzier the information given by attributes for judgment; the lower the effectiveness of the evaluation information and the lower the corresponding attribute weight. Thus, weights of target attributes can be calculated according to cosine intuitionistic fuzzy entropy. The specific steps are as follows:
1) Calculate the cosine intuitionistic fuzzy entropy [36] Ej of the target attribute:
Ej=1nn∑i=1cos(μij−νij)(1−πij)2π | (4.2) |
where π describes the hesitation degree and uncertainty of the element.
2) A nonlinear programming model for target attribute weights is established by:
{minm∑j=1(wj)2 × Ejs.t.m∑j=1wj=1 | (4.3) |
where Wj describes the weight of attribute j.
3) Calculate the target attribute weights. The Lagrange function is expressed as:
L(w,λ)=m∑j=1(wj)2⋅Ej+2λ(m∑j=1wj−1) | (4.4) |
where λ is Lagrange factor;
Finally, the target attribute weights are obtained by:
wj=(Ej)−1m∑j=1(Ej)−1 | (4.5) |
The intuitionistic fuzzy TOPSIS method [32] is used to calculate the conditional probabilities of targets, but it is difficult to get perfect results when dealing with the problem of "poor information". Since the grey correlation analysis can not only make full use of the existing information but also reflect the consistency of dynamic change trend [37], and effectively deal with "poor information", we can use the improved GRA-TOPSIS method to calculate conditional probabilities of threat targets. There are main calculation steps:
1) Determining the positive and negative ideal solutions
Z+=(Z+1,Z+2,...,Z+n)=(⟨μ+1,ν+1⟩,⟨μ+2,ν+2⟩,...,⟨μ+n,ν+n⟩) | (4.6) |
Z−=(Z−1,Z−2,...,Z−n)=(⟨μ−1,ν−1⟩,⟨μ−2,ν−2⟩,...,⟨μ−n,ν−n⟩) | (4.7) |
2) Calculating the distance of intuitionistic fuzzy numbers
We introduce a novel distance measure method to obtain the distance of intuitionistic fuzzy numbers to effectively reflect the characteristics of intuitionistic fuzzy information. The distance measure [38] of two intuitionistic fuzzy numbers α=(μα,να),β=(μβ,νβ) is expressed as:
d(α,β)=√(˜μα−˜μβ)+(˜να−˜νβ)2 | (4.8) |
where ˜μα=μα(1+23πα(1+πα)),˜να=να(1+23πα(1+πα)),˜μβ=μβ(1+23πβ(1+πβ)),˜νβ=νβ(1+23πβ(1+πβ)).
The distances between targets and positive, negative ideal solutions are calculated by:
d(zi,z+)=n∑j=1wjd(zij,z+) | (4.9) |
d(zi,z−)=n∑j=1wjd(zij,z−) | (4.10) |
3) Calculating the grey correlation degree
The distance measure only represents the relationship between the target and the ideal solution in position and cannot reflect the difference in trend. So, we can use the positive and negative grey correlation degrees ε(zi,z+), ε(zi,z−) to represent change trend of the indicator series. We can calculate the grey correlation degree:
ε(zi,z+)=n∑j=1wjminiminjd(zij,z+)+εmaximaxjd(zij,z+)d(zij,z+)+εmaximaxjd(zij,z+) | (4.11) |
ε(zi,z−)=n∑j=1wjminiminjd(zij,z−)+εmaximaxjd(zij,z−)d(zij,z−)+εmaximaxjd(zij,z−) | (4.12) |
where ε is the discrimination coefficient, ε∈[0,1], generally taken as ε=0.5.
4) Calculating the conditional probability
The distance and grey correlation degree are normalized as follows:
d+i=d(zi,z+)√n∑i=1(d(zi,z+))2,d−i=d(zi,z−)√n∑i=1(d(zi,z−))2 | (4.13) |
ε+i=ε(zi,z+)√n∑i=1(ε(zi,z+))2,ε−i=ε(zi,z−)√n∑i=1(ε(zi,z−))2 | (4.14) |
The bigger d−i and ε+i, the closer the target is to the positive ideal solution. Conversely, the bigger d+i and ε−i, the closer it is to the negative one. So, the following hybrid formulas are established by combining the distance measure and grey correlation degree to obtain the positive and negative comprehensive similarities cs(zi,z+), cs(zi,z−).
cs(zi,z−)=ηd−i+(1−η)ε+i | (4.15) |
cs(zi,z+)=ηd+i+(1−η)ε−i | (4.16) |
where η∈[0,1] is the preference coefficient for distance and grey incidence degree in decision-making. According to the TOPSIS decision method, comprehensive relative degree of position and shape similarity between the threat target and we can obtain the positive ideal solution:
Rc(Ti)=cs(zi,z−)cs(zi,z+)+cs(zi,z−) | (4.17) |
Noticeably, Rc(Ti) describes the probability that the target Ti belongs to a positive ideal solution state and 1−Rc(Ti) describes the probability that the target Ti belongs to a negative one. Thus, the conditional probability of TWD can be expressed as:
Pr(C|[x])=Rc(Ti) | (4.18) |
1) Constructing the loss function matrix
The target attributes are intuitionistic fuzzy numbers. So, the loss function matrix of each target based on each attribute can be expressed as:
λ(zij)=(λijPPλijBPλijNPλijPNλijBNλijNN)=(0σd(zij,zjmin)d(zij,zjmin)d(zij,zjmax)σd(zij,zjmax)0) | (4.19) |
where σ is the risk avoidance coefficient and 0≤σ<0.5. The more fully the battlefield situation information is perceived, the greater the value.
2) Determining the comprehensive loss function matrix
We can gather multiple attributes of the target Ti and build the comprehensive loss function matrix as follows:
λi=(∑jwjλijPP∑jwjλijBP∑jwjλijNP∑jwjλijPN∑jwjλijBN∑jwjλijNN) | (4.20) |
\newpage 3) Calculating the decision thresholds
According to comprehensive loss function matrix, the decision thresholds can be obtained by:
αi=(1−σ)∑jwjd(zij,zjmax)(1−σ)∑jwjd(zij,zjmax)+∑jσwjd(zij,zjmin) | (4.21) |
βi=∑jσwjd(zij,zjmax)∑jσwjd(zij,zjmax)+(1−σ)∑jwjd(zij,zjmin) | (4.22) |
4) Classifying the targets
After obtaining the categories of threat level, the corresponding tactic for each level can be provided, as shown in Table 2.
Conditional probability | Categories | Tactic |
Pr(C|[x])≥α | POS(C): threat level | attacking |
β<Pr(C|[x])<α | BND(C): potential threat level | further observation |
β≥Pr(C|[x]) | NEG(C): non-threat level | no attacking |
If Pr(C|[x])≥α, X∈POS(C), which indicates that the target is a necessary strike target; if β<Pr(C|[x])<α, X∈BND(C), which indicates that the necessity of strike cannot be determined and further observation is needed for decision analysis; in addition, x∈NEG(C), which indicates that the target is an unnecessary strike target.
We assume that there are four enemy targets T={T1,T2,T3,T4}. A={A1,A2,A3,A4} denotes four threat factors: combat capability, speed, distance and angle, of which the first two are benefit attributes and the last two are cost attributes. Three consecutive moments t={t1,t2,t3} are selected for threat assessment, of which t3 is the current moment. Table 3 shows the multi-time information data of the target [32].
t | T | A1 | A2 | A3 | A4 |
T1 | (0.76, 0.10) | (0.68, 0.15) | (0.75, 0.15) | (0.80, 0.15) | |
t1 | T2 | (0.80, 0.15) | (0.70, 0.15) | (0.60, 0.20) | (0.90, 0.10) |
T3 | (0.78, 0.15) | (0.72, 0.13) | (0.65, 0.15) | (0.75, 0.15) | |
T4 | (0.65, 0.28) | (0.80, 0.20) | (0.55, 0.30) | (0.80, 0.11) | |
T1 | (0.78, 0.10) | (0.65, 0.20) | (0.70, 0.20) | (0.80, 0.11) | |
t2 | T2 | (0.83, 0.10) | (0.65, 0.20) | (0.70, 0.15) | (0.85, 0.10) |
T3 | (0.75, 0.20) | (0.85, 0.15) | (0.82, 0.18) | (0.73, 0.19) | |
T4 | (0.70, 0.20) | (0.64, 0.21) | (0.76, 0.15) | (0.75, 0.15) | |
T1 | (0.76, 0.13) | (0.70, 0.15) | (0.60, 0.25) | (0.75, 0.18) | |
t3 | T2 | (0.85, 0.10) | (0.75, 0.15) | (0.75, 0.10) | (0.85, 0.05) |
T3 | (0.75, 0.25) | (0.70, 0.15) | (0.75, 0.25) | (0.70, 0.15) | |
T4 | (0.75, 0.15) | (0.68, 0.20) | (0.70, 0.18) | (0.60, 0.20) |
According to Eq (4.1), we can fuse dynamic data to obtain weighted dynamic decision matrix:
Z=((0.7655,0.1150)(0.6834,0.1620)(0.6628,0.2127)(0.7747,0.1522)(0.8357,0.1084)(0.7164,0.1620)(0.7117,0.1280)(0.8617,0.0691)(0.7563,0.2127)(0.7540,0.1458)(0.7550,0.2068)(0.7188,0.1598)(0.7193,0.1835)(0.6994,0.2026)(0.6935,0.1899)(0.6928,0.1644)) | (5.1) |
According to Eqs (4.2)–(4.5), we can obtain the attribute weights of each time and comprehensive objective:
w(t1)=(0.2484,0.2351,0.2005,0.3161),w(t2)=(0.2592,0.2215,0.2431,0.2762),w(t3)=(0.2821,0.2348,0.2297,0.2535),w=(0.2703,0.2321,0.2268,0.2708). | (5.2) |
According to Eqs (4.6) and (4.7), we can obtain positive and negative ideal solutions of target set:
R+=(<0.8357,0.1084><0.7540,0.1458><0.6628,0.2127><0.6928,0.1644>),R−=(<0.7193,0.2127><0.6834,0.2026><0.7550,0.1280><0.8617,0.0691>). | (5.3) |
According to Eqs (4.8)–(4.10) and (4.13), we can obtain the normalized distance from targets to positive and negative ideal solutions:
d+=(0.2926,0.6653,0.4518,0.5173),d−=(0.6298,0.3561,0.5154,0.4592). | (5.4) |
According to Eqs (4.11), (4.12) and (4.14), we can obtain the normalized positive and negative grey correlation degree of targets:
ε+=(0.5396,0.4596,0.5154,0.4816),ε−=(0.3990,0.5902,0.4677,0.5231). | (5.5) |
According to Eqs (4.15)–(4.18), we can obtain the conditional probabilities: [0.6284 0.3938 0.5285 0.4749].
Obviously, the threat ranking of targets is T1>T3>T4>T2. Based on decision rules, the classification results of three-way decisions can be obtained: POS(A)={T1},BND(A)={T3,T4},NEG(A)={T2}.
According to Eqs (4.19)–(4.22), we can calculate the thresholds of TWD. Combining the conditional probabilities of targets, the results are shown in Table 4. Hence, we should give priority to attacking or intervening in target T1, not attack T2 first and obtain more information for T3,T4.
threshold | T1 | T2 | T3 | T4 |
α | 0.5314 | 0.5643 | 0.5456 | 0.5519 |
β | 0.4315 | 0.4644 | 0.4456 | 0.4519 |
Pr(A|T) | 0.6284 | 0.3938 | 0.5285 | 0.4749 |
We set up δ = 0.05–0.5. The influence of the risk avoidance coefficient on the comprehensive threshold is shown in Figure 2 and the impact on threat classification is shown in Figure 3. It can be seen that with δ increasing, α gradually reduces, β gradually increases, the positive and negative regions become larger, the boundary regions gradually shrink or even become empty, and the classification results become clearer. Compared with the method in reference [32] and the GRA method, the effectiveness and advantages of the proposed method can be described. Figure 4 shows the result.
As we can see, the threat values of targets are [0.5856 0.4249 0.5821 0.5685] and the threat ranking result is T1>T3>T4>T2 based on the method in [32]. The threat values of targets are [0.5749, 0.4378, 0.5243, 0.4793] based on the GRA method. We get the same ranking results, which verifies the effectiveness of our method. The TOPSIS method only focuses on the difference in absolute distance among targets. The proposed method considers both the difference in distance and the difference in sequence curve shape, which can produce more reasonable ranking results. So, the proposed method has the advantages of these two methods.
As an important parameter, the preference coefficient reflects the preference for distance and grey correlation, that is, the preference of decision-makers for absolute and trend differences. So, the preference coefficient can influence conditional probabilities. Assuming that the preference coefficient changes from 0.00 to 1.00 and the step size is 0.10, Figure 5 shows the change result of the target threat degree from 0 to 1.
With the increase of the preference coefficient, the threat degrees of target 1 and target 2 gradually increase, and threat degrees of target 2 and target 4 gradually decrease. The comprehensive closeness of target 1 and target 3 is directly proportional to the preference of location, and these two targets tend to the maximum rational solution in distance; the comprehensive closeness of target 2 and target 4 is in inverse proportion to the preference of location, and these two targets are closer to the positive ideal solution in shape than in distance. The proposed model can reflect different decision-making schemes by changing the preference coefficient according to the subjective tendencies of decision-makers. If the absolute difference is more obvious, a larger preference coefficient can be used; if the trend is more obvious, a smaller preference coefficient can be used. The battlefield situation is changing rapidly. The difference between different target threat degrees in a method mainly determines the accuracy of the method. The more obvious the difference, the more conducive it is to decision-making, what's more, the stronger superiority of the method [39]. In order to better reflect the target differentiation, the superiority of the target i over j is expressed as:
SDij=(ζi−ζjζi)×100 | (5.6) |
where ζi and ζj(i=1,2,...,m;j=1,2,...,m;i≠j) are threat values of targets.
As shown in Figure 6, the average superiority of the method proposed is 1.529 times that of the method in reference [32] and 1.656 times that of the GRA method. In the process of threat assessment, the larger the superiority difference, the better the target threat can be distinguished and the threat ranking and decision-making are more reasonable. So, the method proposed in this article can better distinguish targets for decision-making.
To further illustrate the dynamic assessment ability of this method in the battlefield situation, the above simulation example is used to calculate only the data at the current time t3 and the result is [0.6459 0.3965 0.4384 0.5428], which is ranked as T1>T4>T3>T2. At time t2, if the distance of target T3 changes from <0.85,0.15> to <0.10,0.15>, the threat ranking of each target obtained by the dynamic method considering multi-time information is T1>T4>T3>T2, and the threat degree of T3 becomes smaller. However, the result obtained only at the current time remains unchanged, which cannot reflect the impact of distance change. It shows that the method proposed can reflect the dynamic changes of the battlefield situation and get more reasonable and effective ranking results.
To handle the uncertain battlefield situation information, a new threat assessment method based on TWD is proposed. The multi-time threat assessment data is aggregated, and a cosine intuitionistic fuzzy entropy is established to calculate attribute weights. The improved intuitionistic fuzzy TOPSIS method and grey correlation analysis are used to obtain the conditional probability of TWD, with both the development trend difference of the data and the location difference being considered. The decision thresholds are obtained based on the comprehensive loss function matrix, and a TWD model is established for objective classification of targets. The results obtained are closer to the reality of the battlefield. Our next research work is mainly to explore advanced optimization algorithms to optimize target dynamic threat assessment.
This work was partly supported by the Foundation of Key Laboratory of Reliability and Environmental Engineering Technology (Grant No. 6142004180504).
The authors declare there is no conflict of interest.
[1] |
V. Soni, A. Sharma, V. Singh, A critical review on nature inspired optimization algorithms, IOP Conf. Ser.: Mater. Sci. Eng., 1099 (2021), 012055. https://doi.org/10.1088/1757-899x/1099/1/012055 doi: 10.1088/1757-899x/1099/1/012055
![]() |
[2] | A. F. Seini Yussif, T. Seini, Improved F-parameter mountain gazelle optimizer (IFMGO): a comparative analysis on engineering design problems, IRJET, 10 (2023), 810–816. |
[3] |
N. Khodadadi, E. S. M. El-Kenawy, F. De Caso, A. H. Alharbi, D. S. Khafaga, A. Nanni, The mountain gazelle optimizer for truss structures optimization, Appl. Comput. Intell., 3 (2023), 116–144. https://doi.org/10.3934/aci.2023007 doi: 10.3934/aci.2023007
![]() |
[4] |
R. Rani, S. Jain, H. Garg, A review of nature-inspired algorithms on single-objective optimization problems from 2019 to 2023, Artif. Intell. Rev., 57 (2024), 126. https://doi.org/10.1007/s10462-024-10747-w doi: 10.1007/s10462-024-10747-w
![]() |
[5] |
P. Agarwal, S. Mehta, Nature-inspired algorithms: state-of-art, problems and prospects, International Journal of Computer Applications, 100 (2014), 14–21. https://doi.org/10.5120/17593-8331 doi: 10.5120/17593-8331
![]() |
[6] |
I. Naruei, F. Keynia, A new optimization method based on COOT bird natural life model, Expert Syst. Appl., 183 (2021), 115352. https://doi.org/10.1016/j.eswa.2021.115352 doi: 10.1016/j.eswa.2021.115352
![]() |
[7] |
R. R. Mostafa, A. G. Hussien, M. A. Khan, S. Kadry, F. A. Hashim, Enhanced COOT optimization algorithm for dimensionality reduction, Proceedings of Fifth International Conference of Women in Data Science at Prince Sultan University, 2022, 43–48. https://doi.org/10.1109/WiDS-PSU54548.2022.00020 doi: 10.1109/WiDS-PSU54548.2022.00020
![]() |
[8] |
P. K. Mandal, A review of classical methods and nature-inspired algorithms (NIAs) for optimization problems, Results in Control and Optimization, 13 (2023), 100315. https://doi.org/10.1016/j.rico.2023.100315 doi: 10.1016/j.rico.2023.100315
![]() |
[9] |
M. Jain, V. Saihjpal, N. Singh, S. B. Singh, An overview of variants and advancements of PSO algorithm, Appl. Sci., 12 (2022), 8392. https://doi.org/10.3390/app12178392 doi: 10.3390/app12178392
![]() |
[10] | A. F. Seini Yussif, E. Twumasi, E. A. Frimpong, Modified mountain gazelle optimizer based on logistic chaotic mapping and truncation selection, IRJET, 10 (2023), 1769–1776. |
[11] |
A. F. Seini Yussif, E. Twumasi, E. A. Frimpong, Performance enhancement of elephant herding optimization algorithm using modified update operators, Jurnal Nasional Teknik Elektro, 2 (2023), 109–118. https://doi.org/10.25077/jnte.v12n2.1124.2023 doi: 10.25077/jnte.v12n2.1124.2023
![]() |
[12] | N. K. Prah Ⅱ, E. A. Frimpong, E. Twumasi, Modified individual experience mayfly algorithm, Carpathian Journal of Electrical Engineering, 16 (2022), 62–74. |
[13] | A. Bright, A. K. Emmanuel, T. Elvis, F. A. Emmanuel, Enhanced adaptive simulated based artificial gorilla troop optimizer for global optimisation, IJEEAS, 6 (2023), 63–76. |
[14] |
M. Aslan, İ. Koç, Modified coot bird optimization algorithm for solving community detection problem in social networks, Neural Comput. Appl., 36 (2024), 5595–5619. https://doi.org/10.1007/s00521-024-09567-4 doi: 10.1007/s00521-024-09567-4
![]() |
[15] |
E. H. Houssein, F. A. Hashim, S. Ferahtia, H. Rezk, Battery parameter identification strategy based on modified coot optimization algorithm, J. Energy Storage, 46 (2022), 103848. https://doi.org/10.1016/j.est.2021.103848 doi: 10.1016/j.est.2021.103848
![]() |
[16] |
Z. Chen, Y. Wang, T. H. T. Chan, X. Li, S. Zhao, A particle swarm optimization algorithm with sigmoid increasing inertia weight for structural damage identification, Appl. Sci., 12 (2022), 3429. https://doi.org/10.3390/app12073429 doi: 10.3390/app12073429
![]() |
[17] | T. Seini, A. F. S. Yussif, I. M. Katali, Enhancing mountain gazelle optimizer (MGO) with an improved F-parameter for global optimization, IRJET, 10 (2023), 921–930. |
[18] |
N. Moniz, H. Monteiro, No free lunch in imbalanced learning, Knowl.-Based Syst., 227 (2021), 107222. https://doi.org/10.1016/j.knosys.2021.107222 doi: 10.1016/j.knosys.2021.107222
![]() |
1. | Abdul Hamid Ganie, Humaira Yasmin, A A Alderremy, Rasool Shah, Shaban Aly, An efficient semi-analytical techniques for the fractional-order system of Drinfeld-Sokolov-Wilson equation, 2024, 99, 0031-8949, 015253, 10.1088/1402-4896/ad1796 | |
2. | Qihong Chen, Qingsong Zhao, Zhigang Zou, Qunyou Qian, Junuo Zhou, Renpeng Yuan, A novel air combat target threat assessment method based on three-way decision and game theory under multi-criteria decision-making environment, 2025, 259, 09574174, 125322, 10.1016/j.eswa.2024.125322 | |
3. | Humaira Yasmin, A. A. Alderremy, Rasool Shah, Abdul Hamid Ganie, Shaban Aly, Iterative solution of the fractional Wu-Zhang equation under Caputo derivative operator, 2024, 12, 2296-424X, 10.3389/fphy.2024.1333990 | |
4. | Melika Hamian, Karim Faez, Soheila Nazari, Malihe Sabeti, A Novel Training Approach in Deep Spiking Neural Network Based on Fuzzy Weighting and Meta-heuristic Algorithm, 2024, 17, 1875-6883, 10.1007/s44196-024-00425-8 | |
5. | Saima Noor, Homogeneous–heterogeneous reactions in the colloidal investigation of Casson fluid, 2024, 22, 2391-5471, 10.1515/phys-2023-0174 | |
6. | Jalil Manafian, Baharak Eslami, Gurpreet Singh, Anjan Kumar, Naief Alabed Alkader, Freddy Ajila, Qurbanova Afat Qahraman Qizi, Investigating the irrotational gravity waves along the surface of an inviscid incompressible fluid model by modified nonlinear Schrödinger equation, 2024, 56, 1572-817X, 10.1007/s11082-024-06377-9 | |
7. | Dong liang Zhang, Zhiyong Jiang, Fallah Mohammadzadeh, Seyed Majid Hasani Azhdari, Laith Abualigah, Taher M. Ghazal, FUZ-SMO: A fuzzy slime mould optimizer for mitigating false alarm rates in the classification of underwater datasets using deep convolutional neural networks, 2024, 10, 24058440, e28681, 10.1016/j.heliyon.2024.e28681 | |
8. | Tayyab Naseer, M Sharif, Decoupled anisotropic Buchdahl’s relativistic models in f( R,T ) theory, 2024, 99, 0031-8949, 035001, 10.1088/1402-4896/ad1c28 | |
9. | Qiwen Wang, Guibao Song, Xiuxia Yang, Mixed-attitude three-way decision model for aerial targets: Threat assessment based on IF-VIKOR-GRA method, 2023, 20, 1551-0018, 21514, 10.3934/mbe.2023952 | |
10. | Xiaoyan Qian, Helen Huifen Cai, Nisreen Innab, Danni Wang, Tiziana Ciano, Ali Ahmadian, A novel deep learning approach to enhance creditworthiness evaluation and ethical lending practices in the economy, 2024, 0254-5330, 10.1007/s10479-024-05849-1 | |
11. | Qian Pan, Peng He, JiaPeng Li, Xiaoyang Li, 2024, Chapter 37, 978-981-97-1082-9, 394, 10.1007/978-981-97-1083-6_37 | |
12. | Khaista Rahman, Some new types induced complex intuitionistic fuzzy Einstein geometric aggregation operators and their application to decision-making problem, 2024, 0941-0643, 10.1007/s00521-024-10214-1 | |
13. | Azzh Saad Alshehry, Humaira Yasmin, Rasool Shah, Amjid Ali, Imran Khan, Fractional-order view analysis of Fisher’s and foam drainage equations within Aboodh transform, 2024, 41, 0264-4401, 489, 10.1108/EC-08-2023-0475 | |
14. | Walla Rahim Juadih, Murat Candan, Gurpreet Singh, Baharak Eslami, Jalil Manafian, Irwanjot Kaur, Naief Alabed Alkader, On traveling wave solutions for the transmission line model of nano-ionic currents along MTs arising in nanobiosciences, 2024, 56, 1572-817X, 10.1007/s11082-024-06277-y | |
15. | Shams Ul Haq, Erfan Abbasian, Vijay Kumar Sharma, Tabassum Khurshid, Hanaa Fathi, Energy-Efficient High-Speed dynamic logic-based One-Trit multiplier in CNTFET technology, 2024, 175, 14348411, 155088, 10.1016/j.aeue.2023.155088 | |
16. | Shikai Li, Xin Long, Yaoyuan Zeng, Xueying Wang, Target Threat Level Classification Based on Improved Three-way Decisions, 2024, 2832, 1742-6588, 012010, 10.1088/1742-6596/2832/1/012010 | |
17. | Humberto Baldessarini Pires, Lamartine Nogueira Frutuoso Guimarães, Dynamic Multi-Target Three-Way Threat Assessment in the Context of Air Defense, 2024, 12, 2169-3536, 141397, 10.1109/ACCESS.2024.3468248 | |
18. | Toqeer Jameel, Muhammad Riaz, Naveed Yaqoob, Muhammad Aslam, T-spherical fuzzy interactive Dubois–Prade information aggregation approach for evaluating low-carbon technology impact and environmental mitigation, 2024, 10, 24058440, e28963, 10.1016/j.heliyon.2024.e28963 | |
19. | Henghe Zheng, Haitao Zhao, Gholamreza Ahmadi, Towards improving community detection in complex networks using influential nodes, 2023, 12, 2051-1329, 10.1093/comnet/cnae001 | |
20. | Noureddine Elboughdiri, Faisal Sultan, Muhammad Shoaib Ishaq, Yasser Elmasry, Amjad Iqbal, Novel reduction schemes for a dissipative dynamical system: A study on slow invariant manifolds in chemical kinetics, 2024, 15, 20904479, 102751, 10.1016/j.asej.2024.102751 | |
21. | Yang Gao, Na Lyu, A New Multi-Target Three-Way Threat Assessment Method with Heterogeneous Information and Attribute Relevance, 2024, 12, 2227-7390, 691, 10.3390/math12050691 | |
22. | Weinan Li, Weiguo Zhang, Baoning Liu, Yicong Guo, The Situation Assessment of UAVs Based on an Improved Whale Optimization Bayesian Network Parameter-Learning Algorithm, 2023, 7, 2504-446X, 655, 10.3390/drones7110655 | |
23. | Ronke Seyi Babatunde, Akinbowale Nathaniel Babatunde, Roseline Oluwaseun Ogundokun, Obiwusi Kolawole Yusuf, Peter O. Sadiku, Mohd Asif Shah, A novel smartphone application for early detection of habanero disease, 2024, 14, 2045-2322, 10.1038/s41598-024-52038-y | |
24. | Riaz Ur Rahman, Muhammad Bilal Riaz, Jan Martinovic, Osman Tunç, Exploring analytical solutions and modulation instability for the nonlinear fractional Gilson–Pickering equation, 2024, 57, 22113797, 107385, 10.1016/j.rinp.2024.107385 | |
25. | Yiyuan Li, Weiyi Chen, Shukan Liu, Guang Yang, Fan He, Multi-UAV Cooperative Air Combat Target Assignment Method Based on VNS-IBPSO in Complex Dynamic Environment, 2024, 2024, 1687-5966, 1, 10.1155/2024/9980746 | |
26. | Pavan Kumar Gudavalleti, Sanjeet Singh, Omkarprasad S. Vaidya, Pure output model-based context-dependent DEA: Tool for analyzing index published by assessing bodies, 2024, 244, 09574174, 122843, 10.1016/j.eswa.2023.122843 | |
27. | Alireza Aghili, Vahid Arabli, Amir Hossein Shabani, Rational approximations of the Arrhenius and general temperature integrals, expansion of the incomplete gamma function, 2024, 211, 0098-6445, 844, 10.1080/00986445.2023.2300791 | |
28. | Chaoyang Zhu, Mawaheb Al-Dossari, S. Rezapour, S. Shateyi, B. Gunay, Analytical optical solutions to the nonlinear Zakharov system via logarithmic transformation, 2024, 56, 22113797, 107298, 10.1016/j.rinp.2023.107298 | |
29. | Humberto Baldessarini Pires, Lamartine Nogueira Frutuoso Guimarães, Sergio Rebouças, A Multi-Target Threat Assessment Method Based on Objective Three-Way Decision, 2025, 13, 2169-3536, 681, 10.1109/ACCESS.2024.3523817 | |
30. | Yiqun Dong, Shanshan He, Yunmei Zhao, Jianliang Ai, Can Wang, Development and Evaluation of Transformer-Based Basic Fighter Maneuver Decision-Support Scheme for Piloting During Within-Visual-Range Air Combat, 2025, 12, 2226-4310, 73, 10.3390/aerospace12020073 | |
31. | Shuaiyu Zhou, Xuan Zhou, Jun Ju, Jiangqi Long, 2024, Multi-objective optimization design of passenger car driver’s seat based on multi-criteria decision making approach, 979-8-3315-0623-0, 1649, 10.1109/ICEMCE64157.2024.10862908 | |
32. | Li Leyan, Lv Maolong, Wu Ao, Guo Anxin, Song Qi, Yin Qixuan, 2025, Chapter 4, 978-981-96-2263-4, 34, 10.1007/978-981-96-2264-1_4 | |
33. | Rui Li, Chao Zhang, Deyu Li, Wentao Li, Jianming Zhan, Improved Evidential Three-Way Decisions in Incomplete Multi-Scale Information Systems, 2025, 0888613X, 109417, 10.1016/j.ijar.2025.109417 |
C | ¬C | |
ap | λpp | λPN |
aB | λBP | λBN |
aN | λNP | λNN |
Conditional probability | Categories | Tactic |
Pr(C|[x])≥α | POS(C): threat level | attacking |
β<Pr(C|[x])<α | BND(C): potential threat level | further observation |
β≥Pr(C|[x]) | NEG(C): non-threat level | no attacking |
t | T | A1 | A2 | A3 | A4 |
T1 | (0.76, 0.10) | (0.68, 0.15) | (0.75, 0.15) | (0.80, 0.15) | |
t1 | T2 | (0.80, 0.15) | (0.70, 0.15) | (0.60, 0.20) | (0.90, 0.10) |
T3 | (0.78, 0.15) | (0.72, 0.13) | (0.65, 0.15) | (0.75, 0.15) | |
T4 | (0.65, 0.28) | (0.80, 0.20) | (0.55, 0.30) | (0.80, 0.11) | |
T1 | (0.78, 0.10) | (0.65, 0.20) | (0.70, 0.20) | (0.80, 0.11) | |
t2 | T2 | (0.83, 0.10) | (0.65, 0.20) | (0.70, 0.15) | (0.85, 0.10) |
T3 | (0.75, 0.20) | (0.85, 0.15) | (0.82, 0.18) | (0.73, 0.19) | |
T4 | (0.70, 0.20) | (0.64, 0.21) | (0.76, 0.15) | (0.75, 0.15) | |
T1 | (0.76, 0.13) | (0.70, 0.15) | (0.60, 0.25) | (0.75, 0.18) | |
t3 | T2 | (0.85, 0.10) | (0.75, 0.15) | (0.75, 0.10) | (0.85, 0.05) |
T3 | (0.75, 0.25) | (0.70, 0.15) | (0.75, 0.25) | (0.70, 0.15) | |
T4 | (0.75, 0.15) | (0.68, 0.20) | (0.70, 0.18) | (0.60, 0.20) |
threshold | T1 | T2 | T3 | T4 |
α | 0.5314 | 0.5643 | 0.5456 | 0.5519 |
β | 0.4315 | 0.4644 | 0.4456 | 0.4519 |
Pr(A|T) | 0.6284 | 0.3938 | 0.5285 | 0.4749 |
C | ¬C | |
ap | λpp | λPN |
aB | λBP | λBN |
aN | λNP | λNN |
Conditional probability | Categories | Tactic |
Pr(C|[x])≥α | POS(C): threat level | attacking |
β<Pr(C|[x])<α | BND(C): potential threat level | further observation |
β≥Pr(C|[x]) | NEG(C): non-threat level | no attacking |
t | T | A1 | A2 | A3 | A4 |
T1 | (0.76, 0.10) | (0.68, 0.15) | (0.75, 0.15) | (0.80, 0.15) | |
t1 | T2 | (0.80, 0.15) | (0.70, 0.15) | (0.60, 0.20) | (0.90, 0.10) |
T3 | (0.78, 0.15) | (0.72, 0.13) | (0.65, 0.15) | (0.75, 0.15) | |
T4 | (0.65, 0.28) | (0.80, 0.20) | (0.55, 0.30) | (0.80, 0.11) | |
T1 | (0.78, 0.10) | (0.65, 0.20) | (0.70, 0.20) | (0.80, 0.11) | |
t2 | T2 | (0.83, 0.10) | (0.65, 0.20) | (0.70, 0.15) | (0.85, 0.10) |
T3 | (0.75, 0.20) | (0.85, 0.15) | (0.82, 0.18) | (0.73, 0.19) | |
T4 | (0.70, 0.20) | (0.64, 0.21) | (0.76, 0.15) | (0.75, 0.15) | |
T1 | (0.76, 0.13) | (0.70, 0.15) | (0.60, 0.25) | (0.75, 0.18) | |
t3 | T2 | (0.85, 0.10) | (0.75, 0.15) | (0.75, 0.10) | (0.85, 0.05) |
T3 | (0.75, 0.25) | (0.70, 0.15) | (0.75, 0.25) | (0.70, 0.15) | |
T4 | (0.75, 0.15) | (0.68, 0.20) | (0.70, 0.18) | (0.60, 0.20) |
threshold | T1 | T2 | T3 | T4 |
α | 0.5314 | 0.5643 | 0.5456 | 0.5519 |
β | 0.4315 | 0.4644 | 0.4456 | 0.4519 |
Pr(A|T) | 0.6284 | 0.3938 | 0.5285 | 0.4749 |