Loading [MathJax]/jax/output/SVG/jax.js
Research article Special Issues

Threat assessment of aerial targets based on improved GRA-TOPSIS method and three-way decisions


  • Target threat assessment is a critical aspect of information warfare and can offer valuable auxiliary support to combat command decision-making. Aiming to address the shortcomings of three decision-making methods in air combat target assessment, such as the inability to effectively handle uncertain situation information and quantitatively rank the decision-making targets according to their importance, a dynamic intuitionistic fuzzy decision model based on the improved GRA-TOPSIS method and three-way decisions is proposed. First, the target attribute weight is obtained by cosine intuitionistic fuzzy entropy algorithm; then, a novel intuitionistic fuzzy distance measure is introduced, and grey incidence analysis and TOPSIS are used to build the conditional probability for three-way decisions that fully utilize the existing information and reflect the consistency of dynamic change trend; finally, the comprehensive loss function matrix is constructed and the threat classification results are obtained using the decision rules. The example analysis shows that the proposed method can not only effectively handle complex battlefield situations and dynamic uncertain information, but it can also classify targets, improving the effectiveness and rationality of decision-making and providing a reference basis for scientific command decision-making.

    Citation: Yongfeng Yin, Routing Zhang, Qingran Su. Threat assessment of aerial targets based on improved GRA-TOPSIS method and three-way decisions[J]. Mathematical Biosciences and Engineering, 2023, 20(7): 13250-13266. doi: 10.3934/mbe.2023591

    Related Papers:

    [1] Qiwen Wang, Guibao Song, Xiuxia Yang . Mixed-attitude three-way decision model for aerial targets: Threat assessment based on IF-VIKOR-GRA method. Mathematical Biosciences and Engineering, 2023, 20(12): 21514-21536. doi: 10.3934/mbe.2023952
    [2] Haiping Ren, Laijun Luo . A novel distance of intuitionistic trapezoidal fuzzy numbers and its-based prospect theory algorithm in multi-attribute decision making model. Mathematical Biosciences and Engineering, 2020, 17(4): 2905-2922. doi: 10.3934/mbe.2020163
    [3] Han Wu, Junwu Wang, Sen Liu, Tingyou Yang . Research on decision-making of emergency plan for waterlogging disaster in subway station project based on linguistic intuitionistic fuzzy set and TOPSIS. Mathematical Biosciences and Engineering, 2020, 17(5): 4825-4851. doi: 10.3934/mbe.2020263
    [4] Fankang Bu, Jun He, Haorun Li, Qiang Fu . Interval-valued intuitionistic fuzzy MADM method based on TOPSIS and grey correlation analysis. Mathematical Biosciences and Engineering, 2020, 17(5): 5584-5603. doi: 10.3934/mbe.2020300
    [5] Yefu Zheng, Jun Xu, Hongzhang Chen . TOPSIS-based entropy measure for intuitionistic trapezoidal fuzzy sets and application to multi-attribute decision making. Mathematical Biosciences and Engineering, 2020, 17(5): 5604-5617. doi: 10.3934/mbe.2020301
    [6] Bo Sun, Ming Wei, Wei Wu, Binbin Jing . A novel group decision making method for airport operational risk management. Mathematical Biosciences and Engineering, 2020, 17(3): 2402-2417. doi: 10.3934/mbe.2020130
    [7] Muhammad Akram, G. Muhiuddin, Gustavo Santos-García . An enhanced VIKOR method for multi-criteria group decision-making with complex Fermatean fuzzy sets. Mathematical Biosciences and Engineering, 2022, 19(7): 7201-7231. doi: 10.3934/mbe.2022340
    [8] Shiyun Wang, Xiaonan Liang, Jiaoyue Wang . Parameter assignment for InVEST habitat quality module based on principal component analysis and grey coefficient analysis. Mathematical Biosciences and Engineering, 2022, 19(12): 13928-13948. doi: 10.3934/mbe.2022649
    [9] Yunhui Zhang, Yongquan Zhou, Shuangxi Chen, Wenhong Xiao, Mingyu Wu . Bald eagle search algorithm for solving a three-dimensional path planning problem. Mathematical Biosciences and Engineering, 2024, 21(2): 2856-2878. doi: 10.3934/mbe.2024127
    [10] Yuting Zhu, Wenyu Zhang, Junjie Hou, Hainan Wang, Tingting Wang, Haining Wang . The large-scale group consensus multi-attribute decision-making method based on probabilistic dual hesitant fuzzy sets. Mathematical Biosciences and Engineering, 2024, 21(3): 3944-3966. doi: 10.3934/mbe.2024175
  • Target threat assessment is a critical aspect of information warfare and can offer valuable auxiliary support to combat command decision-making. Aiming to address the shortcomings of three decision-making methods in air combat target assessment, such as the inability to effectively handle uncertain situation information and quantitatively rank the decision-making targets according to their importance, a dynamic intuitionistic fuzzy decision model based on the improved GRA-TOPSIS method and three-way decisions is proposed. First, the target attribute weight is obtained by cosine intuitionistic fuzzy entropy algorithm; then, a novel intuitionistic fuzzy distance measure is introduced, and grey incidence analysis and TOPSIS are used to build the conditional probability for three-way decisions that fully utilize the existing information and reflect the consistency of dynamic change trend; finally, the comprehensive loss function matrix is constructed and the threat classification results are obtained using the decision rules. The example analysis shows that the proposed method can not only effectively handle complex battlefield situations and dynamic uncertain information, but it can also classify targets, improving the effectiveness and rationality of decision-making and providing a reference basis for scientific command decision-making.



    In modern combat, large-scale, intelligent weapons equipment and systems are becoming increasingly vital, and intelligent decision-making has become the core of the battle. Threat assessment (TA) is a critical element in military decisions. With the advancement of battle theory and enhanced combat equipment, troops' combat effectiveness has dramatically improved, defining modern warfare as adversarial and timely [1]. As a result, it establishes more stringent criteria for enemy target threat assessment procedures. Threat assessment forecasts the threat level of enemy targets based on information fusion and aids in battlefield command and decision-making [2]. Therefore, intelligent threat assessment in air combat has significant research implications as well as vast application prospects.

    Recently, threat assessment methods have mainly included multi-attribute decision theory [3,4], intuitionistic fuzzy sets (IFS) [5,6,7], grey theory [8,9,10], Bayesian network [11,12], technique for ordering preference by similarity to an ideal solution (TOPSIS) [13,14], adaptive network based fuzzy inference inference system (ANFIS) [15,16] and so on. A threat assessment model with respect to small data sets based on a Bayesian network was proposed [11]. The model was obtained by the modeling method based on the improved Bayesian Information Criterion (BIC) score. The intelligent situation awareness (SA) modeling method was based on the Fuzzy Grey Cognitive Map (FGCM) [17], which can better deal with complex battlefield situations and handle uncertain information. A threat assessment model of attribute reduction and back propagation (BP) neural network [18] was established to assess and judge threat degree of the target. The assessment method based on Grey Relational Analysis (GRA)-TOPSIS was proposed in [19]. An improved adaptive network was proposed in [1] based on fuzzy inference system model. Although the above methods can effectively carry out threat assessment, they still have the following problems: Bayesian network and neural network methods need a lot of prior information, which makes it difficult to meet the dynamic and real-time characteristics of threat assessment; the fuzzy cognitive map model cannot solve the uncertainty problem of experts in the initial setting of the model; grey theory relies on expert experience and there are many subjective factors.

    With the uncertainty and variability of battlefield situation information, threat assessment needs to effectively handle dynamic battlefield environments. Many scholars have studied threat assessment in a fuzzy decision-making environment. Intuitive fuzzy sets [20] can more accurately represent uncertain information. The method based on IFS and multi-attribute decision theory has been widely used in threat assessment problems [21,22,23,24]. However, this method still has limitations: Traditional threat assessment methods often only rank threat targets, requiring decision-makers to further judge threat levels and choose priority combat targets, making it difficult to deal with complex and ever-changing environments. Moreover, a target is either accepted or rejected in two-way decision-making method, which can easily result in erroneous judgments. Yao et al. [25,26] proposed three-way decisions, which can give reasonable explanations to three regions of rough sets and linked them with three decision actions. Applying three-way decision-making (TWD) to multi-attribute decision-making (MADM) problems can effectively handle uncertain information and better classify targets.

    To fully utilize uncertain situation information and obtain more objective and reasonable evaluation results, we propose a dynamic threat assessment method based on the improved GRA-TOPSIS and three-way decisions. There are three main contributions of our work:

    1) The cosine intuitionistic fuzzy entropy is introduced to calculate weights of target attributes, combined with a dynamic data fusion method to generate time series weights for dynamic matching of attribute parameters and weights.

    2) A new intuitionistic fuzzy distance measure is used to calculate the distance between intuitionistic fuzzy numbers, and grey incidence analysis and TOPSIS are used to build the conditional probability for TWD.

    3) Three-way decisions under the MADM model are used to classify threats against aerial targets.

    TWD have been extensively studied to solve realistic MADM problems since they can minimize decision risks by adding the non-commitment option[27,28]. The improved TOPSIS method, combined with entropy weights, was used for optimal granularity selection[29]. A novel intuitionistic fuzzy (IF) large-scale group decision-making (LSGDM) method was constructed based on adjustable multi-granularity (MG)-IF probabilistic rough sets (PRSs) and the evidence reasoning (ER) method[30]. A new TWD model based on prospect theory (PT) on multi-scale information systems (MS-ISs) was revealed for pursuing MADM problems[31]. The intuitionistic fuzzy TOPSIS method[32] was used to obtain the conditional probability for the target and intuitionistic fuzzy evaluation value to construct the decision threshold for each target. However, the above threat assessment methods cannot make full use of uncertain situation information, the determination of conditional probability obtained has certain subjectivity and limitations, and it is difficult to get perfect results when dealing with the problem of "poor information".

    IFMADM has been widely used as an extension of MADM under intuitionistic fuzzy information [21]. For the assessment of target attribute values with unknown intervals and weights, a Quantum Bee Group Threat Assessment Method for Intuitive Vague Multi-Attribute Decision (IFMADM) with Optimized Attribute Weighting was proposed [22]. To address the uncertainty and imprecision of experts' opinions, an improved hierarchical fuzzy TOPSIS method was used to aggregate the factors that affect the exposure rates of buildings in the two different scenarios [23]. A new intuitionistic fuzzy decision-making model was developed based on decision field theory [24]. The model stresses the contrasts regarding competition and influence of each attribute in different schemes in order to provide a dynamic evolution of preferences for various schemes and obtain optimum results.

    Threat assessment is an essential part of modern warfare. With battlefield environments and situation information becoming more dynamic and uncertain, many scholars have studied threat assessment in a fuzzy intuitionistic environment. Jin et al. [33] proposed an intuitionistic fuzzy TOPSIS model and a multi-criteria optimization compromise decision-making (VIKOR) model with variable weights for static attribute and dynamic attribute threat assessment, but only the current situation was considered, and the dynamic threat assessment could not be conducted. The TOPSIS ranking method [34] based on improved relative entropy was proposed to dynamically evaluate incoming targets, but the method can only rank threats and cannot achieve threat classification. Thus, we study threat assessment in the IFMADM environment based on the current trend.

    Definition 1 [35] Let X be a finite universal set. An intuitionistic fuzzy set (IFS) A in X can be mathematically described as

    A = {x,μA(x),νA(x) | xX} (3.1)

    where μA(x),νA(x):X[0,1] are the membership and non-membership degrees of element x in X belonging to A, and conditions of 0μA(x)+νA(x)1 and xX are met; πA(x)=1μA(x)νA(x), which shows the hesitation degree and uncertainty of element x, and the condition of πA(x)[0,1] is met.

    Definition 2 [25,26] Based on minimum risk Bayesian theory, Yao proposed decision-theoretic rough sets which are composed of 2 states and 3 actions. Given two states Ω={C,¬C}, which mean a target belongs to C or not. Let A={ap,aB,aN} be actions set, and ap,aB,aN describe xPOS(C),xBND(X),xNEG(C) respectively. For the above two states and three actions, Table 1 shows the loss functions of TWD. The {λPP,λBP,λNP} and {λPN,λBN,λNN} describe the loss function of ap,aB,aN respectively, when the target belongs to C and ¬C. In addition, Pr(C|[x]) and Pr(¬C|[x]) represent conditional probabilities when targets belong to C and ¬C respectively.

    Table 1.  The relative loss functions of three-way decisions.
    C ¬C
    ap λpp λPN
    aB λBP λBN
    aN λNP λNN

     | Show Table
    DownLoad: CSV

    The method can fully utilize uncertain battlefield information and apply three-way decisions to multi-target dynamic threat assessment. Figure 1 shows the assessment process of the improved GRA-TOPSIS method and three-way decisions. A specific description of the method is given in the pseudocode below.

    Figure 1.  The assessment process of the proposed method.

    The battlefield situation is dynamic. Gathering multi-time information is a vital step in conducting a comprehensive and reasonable threat assessment of aerial targets. The closer to the current moment, the more significant the target information is. Therefore, we can calculate the series weight vector η=(η1,η2,...,ηk) of k times by using the inverse form of the Poisson distribution. Through the weighted aggregation of threat assessment information at each time by the intuitionistic fuzzy weighted average (IFWA) operator, a comprehensive intuitionistic fuzzy decision matrix R can be obtained:

    R=(μij,νij)m×n (4.1)

    where μij,νij=1Kk=1(1μij(tk))ηk,Kk=1νij(tk)ηk and t={t1,t2,...,tk} is a set of moments.

    Algorithm 1: The multi-target dynamic threat assessment algorithm
    input: The multi-time information data D
    output: The ranking and classification of targets

    The calculation of objective attribute weights is a key problem in MADM. The larger the intuitionistic fuzzy entropy, the fuzzier the information given by attributes for judgment; the lower the effectiveness of the evaluation information and the lower the corresponding attribute weight. Thus, weights of target attributes can be calculated according to cosine intuitionistic fuzzy entropy. The specific steps are as follows:

    1) Calculate the cosine intuitionistic fuzzy entropy [36] Ej of the target attribute:

    Ej=1nni=1cos(μijνij)(1πij)2π (4.2)

    where π describes the hesitation degree and uncertainty of the element.

    2) A nonlinear programming model for target attribute weights is established by:

    {minmj=1(wj)2 × Ejs.t.mj=1wj=1 (4.3)

    where Wj describes the weight of attribute j.

    3) Calculate the target attribute weights. The Lagrange function is expressed as:

    L(w,λ)=mj=1(wj)2Ej+2λ(mj=1wj1) (4.4)

    where λ is Lagrange factor;

    Finally, the target attribute weights are obtained by:

    wj=(Ej)1mj=1(Ej)1 (4.5)

    The intuitionistic fuzzy TOPSIS method [32] is used to calculate the conditional probabilities of targets, but it is difficult to get perfect results when dealing with the problem of "poor information". Since the grey correlation analysis can not only make full use of the existing information but also reflect the consistency of dynamic change trend [37], and effectively deal with "poor information", we can use the improved GRA-TOPSIS method to calculate conditional probabilities of threat targets. There are main calculation steps:

    1) Determining the positive and negative ideal solutions

    Z+=(Z+1,Z+2,...,Z+n)=(μ+1,ν+1,μ+2,ν+2,...,μ+n,ν+n) (4.6)
    Z=(Z1,Z2,...,Zn)=(μ1,ν1,μ2,ν2,...,μn,νn) (4.7)

    2) Calculating the distance of intuitionistic fuzzy numbers

    We introduce a novel distance measure method to obtain the distance of intuitionistic fuzzy numbers to effectively reflect the characteristics of intuitionistic fuzzy information. The distance measure [38] of two intuitionistic fuzzy numbers α=(μα,να),β=(μβ,νβ) is expressed as:

    d(α,β)=(˜μα˜μβ)+(˜να˜νβ)2 (4.8)

    where ˜μα=μα(1+23πα(1+πα)),˜να=να(1+23πα(1+πα)),˜μβ=μβ(1+23πβ(1+πβ)),˜νβ=νβ(1+23πβ(1+πβ)).

    The distances between targets and positive, negative ideal solutions are calculated by:

    d(zi,z+)=nj=1wjd(zij,z+) (4.9)
    d(zi,z)=nj=1wjd(zij,z) (4.10)

    3) Calculating the grey correlation degree

    The distance measure only represents the relationship between the target and the ideal solution in position and cannot reflect the difference in trend. So, we can use the positive and negative grey correlation degrees ε(zi,z+), ε(zi,z) to represent change trend of the indicator series. We can calculate the grey correlation degree:

    ε(zi,z+)=nj=1wjminiminjd(zij,z+)+εmaximaxjd(zij,z+)d(zij,z+)+εmaximaxjd(zij,z+) (4.11)
    ε(zi,z)=nj=1wjminiminjd(zij,z)+εmaximaxjd(zij,z)d(zij,z)+εmaximaxjd(zij,z) (4.12)

    where ε is the discrimination coefficient, ε[0,1], generally taken as ε=0.5.

    4) Calculating the conditional probability

    The distance and grey correlation degree are normalized as follows:

    d+i=d(zi,z+)ni=1(d(zi,z+))2,di=d(zi,z)ni=1(d(zi,z))2 (4.13)
    ε+i=ε(zi,z+)ni=1(ε(zi,z+))2,εi=ε(zi,z)ni=1(ε(zi,z))2 (4.14)

    The bigger di and ε+i, the closer the target is to the positive ideal solution. Conversely, the bigger d+i and εi, the closer it is to the negative one. So, the following hybrid formulas are established by combining the distance measure and grey correlation degree to obtain the positive and negative comprehensive similarities cs(zi,z+), cs(zi,z).

    cs(zi,z)=ηdi+(1η)ε+i (4.15)
    cs(zi,z+)=ηd+i+(1η)εi (4.16)

    where η[0,1] is the preference coefficient for distance and grey incidence degree in decision-making. According to the TOPSIS decision method, comprehensive relative degree of position and shape similarity between the threat target and we can obtain the positive ideal solution:

    Rc(Ti)=cs(zi,z)cs(zi,z+)+cs(zi,z) (4.17)

    Noticeably, Rc(Ti) describes the probability that the target Ti belongs to a positive ideal solution state and 1Rc(Ti) describes the probability that the target Ti belongs to a negative one. Thus, the conditional probability of TWD can be expressed as:

    Pr(C|[x])=Rc(Ti) (4.18)

    1) Constructing the loss function matrix

    The target attributes are intuitionistic fuzzy numbers. So, the loss function matrix of each target based on each attribute can be expressed as:

    λ(zij)=(λijPPλijBPλijNPλijPNλijBNλijNN)=(0σd(zij,zjmin)d(zij,zjmin)d(zij,zjmax)σd(zij,zjmax)0) (4.19)

    where σ is the risk avoidance coefficient and 0σ<0.5. The more fully the battlefield situation information is perceived, the greater the value.

    2) Determining the comprehensive loss function matrix

    We can gather multiple attributes of the target Ti and build the comprehensive loss function matrix as follows:

    λi=(jwjλijPPjwjλijBPjwjλijNPjwjλijPNjwjλijBNjwjλijNN) (4.20)

    \newpage 3) Calculating the decision thresholds

    According to comprehensive loss function matrix, the decision thresholds can be obtained by:

    αi=(1σ)jwjd(zij,zjmax)(1σ)jwjd(zij,zjmax)+jσwjd(zij,zjmin) (4.21)
    βi=jσwjd(zij,zjmax)jσwjd(zij,zjmax)+(1σ)jwjd(zij,zjmin) (4.22)

    4) Classifying the targets

    After obtaining the categories of threat level, the corresponding tactic for each level can be provided, as shown in Table 2.

    Table 2.  Three rules for threat assessment.
    Conditional probability Categories Tactic
    Pr(C|[x])α POS(C): threat level attacking
    β<Pr(C|[x])<α BND(C): potential threat level further observation
    βPr(C|[x]) NEG(C): non-threat level no attacking

     | Show Table
    DownLoad: CSV

    If Pr(C|[x])α, XPOS(C), which indicates that the target is a necessary strike target; if β<Pr(C|[x])<α, XBND(C), which indicates that the necessity of strike cannot be determined and further observation is needed for decision analysis; in addition, xNEG(C), which indicates that the target is an unnecessary strike target.

    We assume that there are four enemy targets T={T1,T2,T3,T4}. A={A1,A2,A3,A4} denotes four threat factors: combat capability, speed, distance and angle, of which the first two are benefit attributes and the last two are cost attributes. Three consecutive moments t={t1,t2,t3} are selected for threat assessment, of which t3 is the current moment. Table 3 shows the multi-time information data of the target [32].

    Table 3.  Threat information of targets at different times.
    t T A1 A2 A3 A4
    T1 (0.76, 0.10) (0.68, 0.15) (0.75, 0.15) (0.80, 0.15)
    t1 T2 (0.80, 0.15) (0.70, 0.15) (0.60, 0.20) (0.90, 0.10)
    T3 (0.78, 0.15) (0.72, 0.13) (0.65, 0.15) (0.75, 0.15)
    T4 (0.65, 0.28) (0.80, 0.20) (0.55, 0.30) (0.80, 0.11)
    T1 (0.78, 0.10) (0.65, 0.20) (0.70, 0.20) (0.80, 0.11)
    t2 T2 (0.83, 0.10) (0.65, 0.20) (0.70, 0.15) (0.85, 0.10)
    T3 (0.75, 0.20) (0.85, 0.15) (0.82, 0.18) (0.73, 0.19)
    T4 (0.70, 0.20) (0.64, 0.21) (0.76, 0.15) (0.75, 0.15)
    T1 (0.76, 0.13) (0.70, 0.15) (0.60, 0.25) (0.75, 0.18)
    t3 T2 (0.85, 0.10) (0.75, 0.15) (0.75, 0.10) (0.85, 0.05)
    T3 (0.75, 0.25) (0.70, 0.15) (0.75, 0.25) (0.70, 0.15)
    T4 (0.75, 0.15) (0.68, 0.20) (0.70, 0.18) (0.60, 0.20)

     | Show Table
    DownLoad: CSV

    According to Eq (4.1), we can fuse dynamic data to obtain weighted dynamic decision matrix:

    Z=((0.7655,0.1150)(0.6834,0.1620)(0.6628,0.2127)(0.7747,0.1522)(0.8357,0.1084)(0.7164,0.1620)(0.7117,0.1280)(0.8617,0.0691)(0.7563,0.2127)(0.7540,0.1458)(0.7550,0.2068)(0.7188,0.1598)(0.7193,0.1835)(0.6994,0.2026)(0.6935,0.1899)(0.6928,0.1644)) (5.1)

    According to Eqs (4.2)–(4.5), we can obtain the attribute weights of each time and comprehensive objective:

    w(t1)=(0.2484,0.2351,0.2005,0.3161),w(t2)=(0.2592,0.2215,0.2431,0.2762),w(t3)=(0.2821,0.2348,0.2297,0.2535),w=(0.2703,0.2321,0.2268,0.2708). (5.2)

    According to Eqs (4.6) and (4.7), we can obtain positive and negative ideal solutions of target set:

    R+=(<0.8357,0.1084><0.7540,0.1458><0.6628,0.2127><0.6928,0.1644>),R=(<0.7193,0.2127><0.6834,0.2026><0.7550,0.1280><0.8617,0.0691>). (5.3)

    According to Eqs (4.8)–(4.10) and (4.13), we can obtain the normalized distance from targets to positive and negative ideal solutions:

    d+=(0.2926,0.6653,0.4518,0.5173),d=(0.6298,0.3561,0.5154,0.4592). (5.4)

    According to Eqs (4.11), (4.12) and (4.14), we can obtain the normalized positive and negative grey correlation degree of targets:

    ε+=(0.5396,0.4596,0.5154,0.4816),ε=(0.3990,0.5902,0.4677,0.5231). (5.5)

    According to Eqs (4.15)–(4.18), we can obtain the conditional probabilities: [0.6284 0.3938 0.5285 0.4749].

    Obviously, the threat ranking of targets is T1>T3>T4>T2. Based on decision rules, the classification results of three-way decisions can be obtained: POS(A)={T1},BND(A)={T3,T4},NEG(A)={T2}.

    According to Eqs (4.19)–(4.22), we can calculate the thresholds of TWD. Combining the conditional probabilities of targets, the results are shown in Table 4. Hence, we should give priority to attacking or intervening in target T1, not attack T2 first and obtain more information for T3,T4.

    Table 4.  Conditional probabilities and synthetic thresholds of TWD.
    threshold T1 T2 T3 T4
    α 0.5314 0.5643 0.5456 0.5519
    β 0.4315 0.4644 0.4456 0.4519
    Pr(A|T) 0.6284 0.3938 0.5285 0.4749

     | Show Table
    DownLoad: CSV

    We set up δ = 0.05–0.5. The influence of the risk avoidance coefficient on the comprehensive threshold is shown in Figure 2 and the impact on threat classification is shown in Figure 3. It can be seen that with δ increasing, α gradually reduces, β gradually increases, the positive and negative regions become larger, the boundary regions gradually shrink or even become empty, and the classification results become clearer. Compared with the method in reference [32] and the GRA method, the effectiveness and advantages of the proposed method can be described. Figure 4 shows the result.

    Figure 2.  Influence of risk avoidance coefficient on the comprehensive threshold.
    Figure 3.  Influence of risk avoidance coefficient on threat classification.
    Figure 4.  The threat assessment results of three methods.

    As we can see, the threat values of targets are [0.5856 0.4249 0.5821 0.5685] and the threat ranking result is T1>T3>T4>T2 based on the method in [32]. The threat values of targets are [0.5749, 0.4378, 0.5243, 0.4793] based on the GRA method. We get the same ranking results, which verifies the effectiveness of our method. The TOPSIS method only focuses on the difference in absolute distance among targets. The proposed method considers both the difference in distance and the difference in sequence curve shape, which can produce more reasonable ranking results. So, the proposed method has the advantages of these two methods.

    As an important parameter, the preference coefficient reflects the preference for distance and grey correlation, that is, the preference of decision-makers for absolute and trend differences. So, the preference coefficient can influence conditional probabilities. Assuming that the preference coefficient changes from 0.00 to 1.00 and the step size is 0.10, Figure 5 shows the change result of the target threat degree from 0 to 1.

    Figure 5.  Preference coefficient analysis.

    With the increase of the preference coefficient, the threat degrees of target 1 and target 2 gradually increase, and threat degrees of target 2 and target 4 gradually decrease. The comprehensive closeness of target 1 and target 3 is directly proportional to the preference of location, and these two targets tend to the maximum rational solution in distance; the comprehensive closeness of target 2 and target 4 is in inverse proportion to the preference of location, and these two targets are closer to the positive ideal solution in shape than in distance. The proposed model can reflect different decision-making schemes by changing the preference coefficient according to the subjective tendencies of decision-makers. If the absolute difference is more obvious, a larger preference coefficient can be used; if the trend is more obvious, a smaller preference coefficient can be used. The battlefield situation is changing rapidly. The difference between different target threat degrees in a method mainly determines the accuracy of the method. The more obvious the difference, the more conducive it is to decision-making, what's more, the stronger superiority of the method [39]. In order to better reflect the target differentiation, the superiority of the target i over j is expressed as:

    SDij=(ζiζjζi)×100 (5.6)

    where ζi and ζj(i=1,2,...,m;j=1,2,...,m;ij) are threat values of targets.

    As shown in Figure 6, the average superiority of the method proposed is 1.529 times that of the method in reference [32] and 1.656 times that of the GRA method. In the process of threat assessment, the larger the superiority difference, the better the target threat can be distinguished and the threat ranking and decision-making are more reasonable. So, the method proposed in this article can better distinguish targets for decision-making.

    Figure 6.  Comparison of the superiorities.

    To further illustrate the dynamic assessment ability of this method in the battlefield situation, the above simulation example is used to calculate only the data at the current time t3 and the result is [0.6459 0.3965 0.4384 0.5428], which is ranked as T1>T4>T3>T2. At time t2, if the distance of target T3 changes from <0.85,0.15> to <0.10,0.15>, the threat ranking of each target obtained by the dynamic method considering multi-time information is T1>T4>T3>T2, and the threat degree of T3 becomes smaller. However, the result obtained only at the current time remains unchanged, which cannot reflect the impact of distance change. It shows that the method proposed can reflect the dynamic changes of the battlefield situation and get more reasonable and effective ranking results.

    To handle the uncertain battlefield situation information, a new threat assessment method based on TWD is proposed. The multi-time threat assessment data is aggregated, and a cosine intuitionistic fuzzy entropy is established to calculate attribute weights. The improved intuitionistic fuzzy TOPSIS method and grey correlation analysis are used to obtain the conditional probability of TWD, with both the development trend difference of the data and the location difference being considered. The decision thresholds are obtained based on the comprehensive loss function matrix, and a TWD model is established for objective classification of targets. The results obtained are closer to the reality of the battlefield. Our next research work is mainly to explore advanced optimization algorithms to optimize target dynamic threat assessment.

    This work was partly supported by the Foundation of Key Laboratory of Reliability and Environmental Engineering Technology (Grant No. 6142004180504).

    The authors declare there is no conflict of interest.



    [1] B. W. Yu, L. Yu, M. Lv, Target threat assessment model based on M-ANFIS-PNN, J. Syst. Eng. Electron., 44 (2022), 3155–3163.
    [2] L. S. Peng, T. Zhang, X. Y. Zhang, X. Zhou, Threat assessment for aerial targets based on three-way multi-criteria decision making, in 2021 IEEE International Conference on Networking, Sensing and Control (ICNSC), IEEE, 2021. https://doi.org/10.1109/ICNSC52481.2021.9702251
    [3] Y. Deng, A threat assessment model under uncertain environment, Math. Probl. Eng., 2015 (2015). https://doi.org/10.1155/2015/878024
    [4] K. Zhang, W. R. Kong, P. P. Liu, J. Shi, Y. Lei, J. Zou, Assessment and sequencing of air target threat based on intuitionistic fuzzy entropy and dynamic VIKOR, J. Syst. Eng. Electron., 29 (2018), 305–310. https://doi.org/10.21629/JSEE.2018.02.11 doi: 10.21629/JSEE.2018.02.11
    [5] C. L. Fan, Q. Fu, Y. F. Song, Y. Lu, W. Li, X. Zhu, A new model of interval-valued intuitionistic fuzzy weighted operators and their application in dynamic fusion target threat assessment, Entropy, 24 (2022), 1825. https://doi.org/10.3390/e24121825 doi: 10.3390/e24121825
    [6] C. L. Fan, Q. Fu, Y. Lu, P. S. Guo, X. W. Zhu, Variable weight target threat assessment method of air defense based on interval-valued intuitionistic fuzzy weighted operators fusion, Acta Electonica Sinica, 1 (2022).
    [7] R. Zhao, F. Yang, L. Ji, An extended fuzzy CPT-TODIM model based on possibility theory and its application to air target dynamic threat assessment, IEEE Access, 10 (2022), 21655–21669. https://doi.org/10.1109/ACCESS.2022.3153361 doi: 10.1109/ACCESS.2022.3153361
    [8] Y. K. Sun, Z. G. Fang, D. Chen, Multi-time threat assessment based on dynamic grey principal component analysis, Syst. Eng. Electron. Technol., 43 (2021), 740–746.
    [9] Z. F. Xi, A. Xu, Y. X. Kou, Z. W. Li, A. W. Yang, Threat assessment of air combat target based on grey principal component, Syst. Eng. Electron. Technol., 43 (2021), 147–155.
    [10] W. Li, Y. Q. Lu, C. L. Fan, X. W. Zhu, Air cluster threat assessment based on the Weight of Changes on the Battlefield, J. Air Force Eng. Univ. (Natural Science Edition), 23 (2022), 89–96.
    [11] R. Di, X. Gao, Z. Guo, K. Wan, A threat assessment method for unmanned aerial vehicle based on bayesian networks under the condition of small data sets, Math. Probl. Eng., 2018 (2018). https://doi.org/10.1155/2018/8484358
    [12] L. Huang, G. Cai, H. Yuan, J. Chen, A hybrid approach for identifying the structure of a Bayesian network model, Expert Syst. Appl., 131 (2019), 308–320. https://doi.org/10.1016/j.eswa.2019.04.060 doi: 10.1016/j.eswa.2019.04.060
    [13] Z. K. Chen, S. Y. Chen, Y. H. Xu, P. Y. Dong, H. P. Zhang, Threat assessment of radiation sources based on IOWA-TOPSIS under missing data, J. Air Force Eng. Univ. (Natural Science Edition), 22 (2021), 105–111.
    [14] P. Y. Dong, H. W. Wang, Y. Chen, Radiation source threat assessment based on GRA and TOPSIS under interval conditions, J. Control Decis., 36 (2021), 1516–1522.
    [15] M. Liu, M. Y. Dong, C. Wu, A new ANFIS for parameter prediction with numeric and categorical inputs, IEEE Trans. Autom. Sci. Eng., 7 (2010), 645–653. https://doi.org/10.1109/TASE.2010.2045499 doi: 10.1109/TASE.2010.2045499
    [16] J. A. Danial, H. Hooman, M. Ehsan, Load carrying capacity assessment of thin-walled foundations: An ANFIS–PNN model optimized by genetic algorithm, Eng. Comput., 38 (2021), 1–23. https://doi.org/10.1007/s00366-021-01380-0 doi: 10.1007/s00366-021-01380-0
    [17] J. Chen, Y. Zhang, X. W. Chen, Y. Tong, Modeling method of complex battlefield intelligent situation awareness based on Fuzzy Grey cognitive map, Acta Armamentarii, 43 (2022), 1093–1106.
    [18] Y. X. Sun, X. Z. Zhou, D. Di, A threat assessment method for warship targets based on attribute reduction and BP neural network, J. Command Control, 7 (2021), 397–402.
    [19] Z. F. Xi, A. Xu, Y. X. Kou, Z. W. Li, A. W. Yang, Air combat threat assessment based on improved GRA-TOPSIS, J. BeiHang Univ., 46 (2020), 388–397.
    [20] H. Garg, Novel intuitionistic fuzzy decision making method based on an improved operation laws and its application, Eng. Appl. Artif. Intell., 60 (2017), 164–174. https://doi.org/10.1016/j.engappai.2017.02.008 doi: 10.1016/j.engappai.2017.02.008
    [21] A. Memari, A. Darg, Sustainable supplier selection: A multi-criteria intuitionistic fuzzy TOPSIS method, J. Manuf. Syst., 50 (2019), 9–24. https://doi.org/10.1016/j.jmsy.2018.11.002 doi: 10.1016/j.jmsy.2018.11.002
    [22] B. W. Han, P. Y. Yao, Assessment of human/drone combat threat based on the QABC-IFMADM algorithm, Electron. J., 46 (2018), 1584–1592.
    [23] H. R. Ranjbar, M. A. Nekooie, An improved hierarchical fuzzy TOPSIS approach to identify endangered earthquake-induced buildings, Eng. Appl. Artif. Intell., 76 (2018), 21–39. https://doi.org/10.1016/j.engappai.2018.08.007 doi: 10.1016/j.engappai.2018.08.007
    [24] Z. N. Hao, Z. S. Xu, H. Zhao, R. Zhang, Novel intuitionistic fuzzy decision making models in the framework of decision field theory, Inf. Fusion, 33 (2017), 57–70. https://doi.org/10.1016/j.inffus.2016.05.001 doi: 10.1016/j.inffus.2016.05.001
    [25] Y. Yao, An outline of a theory of three-way decisions, in International Conference on Rough Sets and Current Trends in Computing, Springer, Berlin, Heidelberg, (2012), 1–17.
    [26] Y. Yao, Three-way decisions with probabilistic rough sets, Inf. Sci., 180 (2010), 341–353.
    [27] J. M. Zhan, J. J. Wang, W. P. Ding, Y. Y. Yao, Three-way behavioral decision making with hesitant fuzzy information systems: Survey and challenges, IEEE/CAA J. Autom. Sin., 10 (2023), 330–350. https://doi.org/10.1109/JAS.2022.106061 doi: 10.1109/JAS.2022.106061
    [28] C. Zhang, D. Y. Li, J. Liang, Multi-granularity three-way decisions with adjustable hesitant fuzzy linguistic multigranulation decision-theoretic rough sets over two universes, Inf. Sci., 507 (2020), 665–683. https://doi.org/10.1016/j.ins.2019.01.033 doi: 10.1016/j.ins.2019.01.033
    [29] C. Zhang, J. J. Ding, J. M. Zhan, D. Y. Li, Incomplete three-way multi-attribute group decision making based on adjustable multigranulation Pythagorean fuzzy probabilistic rough sets, Int. J. Approximate Reasoning, 147 (2022), 40–59. https://doi.org/10.1016/j.ijar.2022.05.004 doi: 10.1016/j.ijar.2022.05.004
    [30] J. J. Ding, C. Zhang, D. Y. Li. A. K. Sangaiah, Hyperautomation for air quality evaluations: A perspective of evidential three-way decision-making, Cogn. Comput., 2023 (2023). https://doi.org/10.1007/s12559-022-10101-8
    [31] J. Deng, J. M. Zhan, W. Ding, P. Liu, W. Pedrycz, A novel prospect-theory-based three-way decision methodology in multi-scale information systems, Artif. Intell. Rev. 56 (2023), 6591–6625. https://doi.org/10.1007/s10462-022-10339-6
    [32] Y. Gao, D. S. Li, H. Zhong, A novel target threat assessment method based on three-way decisions under intuitionistic fuzzy multi-attribute decision making environment, Eng. Appl. Artif. Intell., 87 (2020), 103276. https://doi.org/10.1016/j.engappai.2019.103276 doi: 10.1016/j.engappai.2019.103276
    [33] C. Jin, J. Sun, Y. J. Wang, P. S. Cai, X. Rong, Comprehensive threat assessment of air defense targets based on intuitionistic fuzzy TOPSIS and variable weight VIKOR, Syst. Eng. Electron. Technol., 44 (2022), 172–180.
    [34] Z. Qiang, J. F. Feng, Z. C. Ma, G. M. Chen, Threat assessment of air target based on dynamic relative entropy ranking method, in 2019 Chinese Control And Decision Conference (CCDC), IEEE, (2019), 3750–3754. https://doi.org/10.1109/CCDC.2019.8833283
    [35] P. A. Ejegwa, S. O. Akowe, P. M. Otene, J. M. Ikyule, An overview on intuitionistic fuzzy sets, Int. J. Sci. Technol. Res., 3 (2014), 142–145.
    [36] S. Fu, H. J. Zhou, Y. Z. Xiao, Optimum selection of energy service company based on intuitionistic fuzzy entropy and VIKOR framework, IEEE Access, 8 (2020), 186572–186584. https://doi.org/10.1109/ACCESS.2020.3030651 doi: 10.1109/ACCESS.2020.3030651
    [37] D. T. Wei, X. D. Liu, J. Deng, Group decision making method based on intuitionistic fuzzy similarity and grey correlation and its application, J. Ordnance Equip. Eng., 42 (2021), 172–177.
    [38] F. Shen, X. Ma, Z. Li, Z. Xu, D. Cai, An extended intuitionistic fuzzy TOPSIS method based on a new distance measure with an application to credit risk evaluation, Inf. Sci., 428 (2018), 105–119. https://doi.org/10.1016/j.ins.2017.10.045 doi: 10.1016/j.ins.2017.10.045
    [39] Y. Q. Lu, C. L. Fan, Q. Fu, X. W. Zhu, W. Li, Target threat assessment of anti missile warfare based on improved IFRS similarity and information entropy, Syst. Eng. Electron. Technol., 44 (2022), 1230–1238.
  • This article has been cited by:

    1. Abdul Hamid Ganie, Humaira Yasmin, A A Alderremy, Rasool Shah, Shaban Aly, An efficient semi-analytical techniques for the fractional-order system of Drinfeld-Sokolov-Wilson equation, 2024, 99, 0031-8949, 015253, 10.1088/1402-4896/ad1796
    2. Qihong Chen, Qingsong Zhao, Zhigang Zou, Qunyou Qian, Junuo Zhou, Renpeng Yuan, A novel air combat target threat assessment method based on three-way decision and game theory under multi-criteria decision-making environment, 2025, 259, 09574174, 125322, 10.1016/j.eswa.2024.125322
    3. Humaira Yasmin, A. A. Alderremy, Rasool Shah, Abdul Hamid Ganie, Shaban Aly, Iterative solution of the fractional Wu-Zhang equation under Caputo derivative operator, 2024, 12, 2296-424X, 10.3389/fphy.2024.1333990
    4. Melika Hamian, Karim Faez, Soheila Nazari, Malihe Sabeti, A Novel Training Approach in Deep Spiking Neural Network Based on Fuzzy Weighting and Meta-heuristic Algorithm, 2024, 17, 1875-6883, 10.1007/s44196-024-00425-8
    5. Saima Noor, Homogeneous–heterogeneous reactions in the colloidal investigation of Casson fluid, 2024, 22, 2391-5471, 10.1515/phys-2023-0174
    6. Jalil Manafian, Baharak Eslami, Gurpreet Singh, Anjan Kumar, Naief Alabed Alkader, Freddy Ajila, Qurbanova Afat Qahraman Qizi, Investigating the irrotational gravity waves along the surface of an inviscid incompressible fluid model by modified nonlinear Schrödinger equation, 2024, 56, 1572-817X, 10.1007/s11082-024-06377-9
    7. Dong liang Zhang, Zhiyong Jiang, Fallah Mohammadzadeh, Seyed Majid Hasani Azhdari, Laith Abualigah, Taher M. Ghazal, FUZ-SMO: A fuzzy slime mould optimizer for mitigating false alarm rates in the classification of underwater datasets using deep convolutional neural networks, 2024, 10, 24058440, e28681, 10.1016/j.heliyon.2024.e28681
    8. Tayyab Naseer, M Sharif, Decoupled anisotropic Buchdahl’s relativistic models in f( R,T ) theory, 2024, 99, 0031-8949, 035001, 10.1088/1402-4896/ad1c28
    9. Qiwen Wang, Guibao Song, Xiuxia Yang, Mixed-attitude three-way decision model for aerial targets: Threat assessment based on IF-VIKOR-GRA method, 2023, 20, 1551-0018, 21514, 10.3934/mbe.2023952
    10. Xiaoyan Qian, Helen Huifen Cai, Nisreen Innab, Danni Wang, Tiziana Ciano, Ali Ahmadian, A novel deep learning approach to enhance creditworthiness evaluation and ethical lending practices in the economy, 2024, 0254-5330, 10.1007/s10479-024-05849-1
    11. Qian Pan, Peng He, JiaPeng Li, Xiaoyang Li, 2024, Chapter 37, 978-981-97-1082-9, 394, 10.1007/978-981-97-1083-6_37
    12. Khaista Rahman, Some new types induced complex intuitionistic fuzzy Einstein geometric aggregation operators and their application to decision-making problem, 2024, 0941-0643, 10.1007/s00521-024-10214-1
    13. Azzh Saad Alshehry, Humaira Yasmin, Rasool Shah, Amjid Ali, Imran Khan, Fractional-order view analysis of Fisher’s and foam drainage equations within Aboodh transform, 2024, 41, 0264-4401, 489, 10.1108/EC-08-2023-0475
    14. Walla Rahim Juadih, Murat Candan, Gurpreet Singh, Baharak Eslami, Jalil Manafian, Irwanjot Kaur, Naief Alabed Alkader, On traveling wave solutions for the transmission line model of nano-ionic currents along MTs arising in nanobiosciences, 2024, 56, 1572-817X, 10.1007/s11082-024-06277-y
    15. Shams Ul Haq, Erfan Abbasian, Vijay Kumar Sharma, Tabassum Khurshid, Hanaa Fathi, Energy-Efficient High-Speed dynamic logic-based One-Trit multiplier in CNTFET technology, 2024, 175, 14348411, 155088, 10.1016/j.aeue.2023.155088
    16. Shikai Li, Xin Long, Yaoyuan Zeng, Xueying Wang, Target Threat Level Classification Based on Improved Three-way Decisions, 2024, 2832, 1742-6588, 012010, 10.1088/1742-6596/2832/1/012010
    17. Humberto Baldessarini Pires, Lamartine Nogueira Frutuoso Guimarães, Dynamic Multi-Target Three-Way Threat Assessment in the Context of Air Defense, 2024, 12, 2169-3536, 141397, 10.1109/ACCESS.2024.3468248
    18. Toqeer Jameel, Muhammad Riaz, Naveed Yaqoob, Muhammad Aslam, T-spherical fuzzy interactive Dubois–Prade information aggregation approach for evaluating low-carbon technology impact and environmental mitigation, 2024, 10, 24058440, e28963, 10.1016/j.heliyon.2024.e28963
    19. Henghe Zheng, Haitao Zhao, Gholamreza Ahmadi, Towards improving community detection in complex networks using influential nodes, 2023, 12, 2051-1329, 10.1093/comnet/cnae001
    20. Noureddine Elboughdiri, Faisal Sultan, Muhammad Shoaib Ishaq, Yasser Elmasry, Amjad Iqbal, Novel reduction schemes for a dissipative dynamical system: A study on slow invariant manifolds in chemical kinetics, 2024, 15, 20904479, 102751, 10.1016/j.asej.2024.102751
    21. Yang Gao, Na Lyu, A New Multi-Target Three-Way Threat Assessment Method with Heterogeneous Information and Attribute Relevance, 2024, 12, 2227-7390, 691, 10.3390/math12050691
    22. Weinan Li, Weiguo Zhang, Baoning Liu, Yicong Guo, The Situation Assessment of UAVs Based on an Improved Whale Optimization Bayesian Network Parameter-Learning Algorithm, 2023, 7, 2504-446X, 655, 10.3390/drones7110655
    23. Ronke Seyi Babatunde, Akinbowale Nathaniel Babatunde, Roseline Oluwaseun Ogundokun, Obiwusi Kolawole Yusuf, Peter O. Sadiku, Mohd Asif Shah, A novel smartphone application for early detection of habanero disease, 2024, 14, 2045-2322, 10.1038/s41598-024-52038-y
    24. Riaz Ur Rahman, Muhammad Bilal Riaz, Jan Martinovic, Osman Tunç, Exploring analytical solutions and modulation instability for the nonlinear fractional Gilson–Pickering equation, 2024, 57, 22113797, 107385, 10.1016/j.rinp.2024.107385
    25. Yiyuan Li, Weiyi Chen, Shukan Liu, Guang Yang, Fan He, Multi-UAV Cooperative Air Combat Target Assignment Method Based on VNS-IBPSO in Complex Dynamic Environment, 2024, 2024, 1687-5966, 1, 10.1155/2024/9980746
    26. Pavan Kumar Gudavalleti, Sanjeet Singh, Omkarprasad S. Vaidya, Pure output model-based context-dependent DEA: Tool for analyzing index published by assessing bodies, 2024, 244, 09574174, 122843, 10.1016/j.eswa.2023.122843
    27. Alireza Aghili, Vahid Arabli, Amir Hossein Shabani, Rational approximations of the Arrhenius and general temperature integrals, expansion of the incomplete gamma function, 2024, 211, 0098-6445, 844, 10.1080/00986445.2023.2300791
    28. Chaoyang Zhu, Mawaheb Al-Dossari, S. Rezapour, S. Shateyi, B. Gunay, Analytical optical solutions to the nonlinear Zakharov system via logarithmic transformation, 2024, 56, 22113797, 107298, 10.1016/j.rinp.2023.107298
    29. Humberto Baldessarini Pires, Lamartine Nogueira Frutuoso Guimarães, Sergio Rebouças, A Multi-Target Threat Assessment Method Based on Objective Three-Way Decision, 2025, 13, 2169-3536, 681, 10.1109/ACCESS.2024.3523817
    30. Yiqun Dong, Shanshan He, Yunmei Zhao, Jianliang Ai, Can Wang, Development and Evaluation of Transformer-Based Basic Fighter Maneuver Decision-Support Scheme for Piloting During Within-Visual-Range Air Combat, 2025, 12, 2226-4310, 73, 10.3390/aerospace12020073
    31. Shuaiyu Zhou, Xuan Zhou, Jun Ju, Jiangqi Long, 2024, Multi-objective optimization design of passenger car driver’s seat based on multi-criteria decision making approach, 979-8-3315-0623-0, 1649, 10.1109/ICEMCE64157.2024.10862908
    32. Li Leyan, Lv Maolong, Wu Ao, Guo Anxin, Song Qi, Yin Qixuan, 2025, Chapter 4, 978-981-96-2263-4, 34, 10.1007/978-981-96-2264-1_4
    33. Rui Li, Chao Zhang, Deyu Li, Wentao Li, Jianming Zhan, Improved Evidential Three-Way Decisions in Incomplete Multi-Scale Information Systems, 2025, 0888613X, 109417, 10.1016/j.ijar.2025.109417
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2191) PDF downloads(132) Cited by(33)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog