Next Article in Journal
An Improved Residual Network for Pork Freshness Detection Using Near-Infrared Spectroscopy
Previous Article in Journal
Adaptive Event-Triggered Synchronization of Uncertain Fractional Order Neural Networks with Double Deception Attacks and Time-Varying Delay
Previous Article in Special Issue
Uncertainty of Interval Type-2 Fuzzy Sets Based on Fuzzy Belief Entropy
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Threat Assessment Method of Low Altitude Slow Small (LSS) Targets Based on Information Entropy and AHP

Air and Missile Defense College, Air Force Engineering University, Xi’an 710051, China
*
Author to whom correspondence should be addressed.
Submission received: 23 August 2021 / Revised: 26 September 2021 / Accepted: 26 September 2021 / Published: 30 September 2021
(This article belongs to the Special Issue Recent Progress of Deng Entropy)

Abstract

:
In order to deal with the new threat of low altitude slow small (LSS) targets in air defense operations and provide support for LSS target interception decision, we propose a simple and reliable LSS target threat assessment method. Based on the detection capability of LSS targets and their threat characteristics, this paper proposes a threat evaluation factor and threat degree quantization function in line with the characteristics of LSS targets. LSS targets not only have the same threat characteristics as traditional air targets but also have the unique characteristics of flexible mobility and dynamic mission planning. Therefore, we use analytic hierarchy process (AHP) and information entropy to determine the subjective and objective threat factor weights of LSS targets and use the optimization model to combine them to obtain more reliable evaluation weights. Finally, the effectiveness and credibility of the proposed method are verified by experimental simulation.

1. Introduction

Threat assessment is an estimate of the lethality of enemy forces and the degree of threat to us [1]. The construction of target threat assessment model usually includes two key contents: one is to reasonably select target threat assessment factors and form quantitative evaluation indicators; the other is to determine the weight of each assessment factor.
In the field of air defense, LSS targets have the characteristics of low altitude flight and slow speed, and they are not easy to be found, which brings great threats and challenges to key protection targets. It is of great significance to judge the incoming targets in time for low altitude air defense. Taking the typical LSS target of an unmanned aerial vehicle (UAV) swarm as an example, it can be seen from the UAV combat concept, development planning and research projects published in recent years [2,3,4,5,6], that a UAV swarm is composed of dozens to hundreds of UAVs with low cost, small size and limited functions equipped with a variety of mission loads. The single UAV platform constituting the UAV swarm can be isomorphic or heterogeneous UAVs, and the types and number of UAVs in the swarm are also different. Therefore, the future battlefield will be faced with large-scale drone swarms with different types and threats. In the anti-swarm operation, it is important be able to accurately evaluate the threat value of each UAV. While studying the methods and means of anti-UAV, we should also pay attention to how to identify and evaluate the threat degree of UAVs of different types and states on the basis of existing detection means, so as to provide auxiliary decision support for anti-UAV operations and UAV cluster confrontation.
At present, there are many methods that can be used to determine the weight of evaluation factors. According to the data sources used in determining the weight, it can be divided into subjective weighting method, objective weighting method and combined weighting method.
Subjective weighting methods are an older and more mature weighting method, such as Delphi Method, Best-Worst Method, AHP, Analytic Network Process, etc., which have been widely used in many fields. In the latest research results, the authors of [7] improved the Best-Worst Method and proposed a linear Best-Worst Method and Euclidean Best-Worst Method. Reference [8] is based on AHP and adopts consistent fuzzy preference relations to construct the decision matrix. Both documents improve the quality of expert decision-making in multi-criteria decision-making. Reference [9] introduced the D number theory into ANP to better adapt to the uncertainty of expert judgment. Reference [10] proposed a Bayesian cosine maximization method to modify the comparison matrix to obtain more accurate estimates of the priority vectors. Among them, AHP is still the most concise and practical decision-making method, although there are problems in rank reversal, comparison scale, priorities derivation method, and so on [11,12]. However, when there are fewer decision variables, such problems are not prominent, and eigenvalues and eigenvectors can still be obtained accurately. In addition, many new improved methods are also based on AHP. Therefore, in this new application direction of LSS target threat assessment, this article still applies AHP to explore the applicability of AHP and improved methods based on this in the field of LSS target threat assessment.
Different from the traditional air target, the LSS target represented by UAV swarm has the problems of difficult detection and incomplete information. In addition, the UAV swarm has flexible maneuverability and dynamic mission planning capabilities. It is difficult to make accurate judgments on its combat capabilities and attempts using traditional experience and knowledge. The subjective weighting methods commonly used in target threat estimation need large-scale auxiliary systems and a priori knowledge base. At present, the research on UAV swarm warfare is still in the preliminary stage, and it is difficult to obtain accurate evaluation results based on such methods. Therefore, we hope to find an effective objective weighting method to assist in order to obtain more reliable evaluation results. Among them, the entropy method determines the weight according to the index variability, and the weight is adjusted in real-time, which can sensitively find the “dissimilarity” in the cluster, highlight the high threat targets that need to be paid attention to in the cluster, and can be suitable for the threat assessment of LSS targets.
In this paper, the detection capability of LSS targets is analyzed and the threat characteristics of LSS targets are discussed. Based on these, the threat assessment factors and quantification methods suitable for LSS targets are proposed. AHP and entropy method are introduced into LSS target threat assessment, and an optimization model is established to optimize and fuse the weights determined by them to obtain a more reliable assessment weight. The method proposed in this paper can simply and reliably complete the LSS target threat assessment, provide a reference for the interception decision of LSS target and provide a new reference for the research of LSS target threat assessment.
The structure of this paper is as follows. In Section 2, we select the LSS target threat assessment factors and the quantitative function of each assessment factor. In Section 3, an LSS target threat assessment model is proposed. In Section 4, the LSS target threat assessment process is introduced. In the fifth section, we simulate and verify the method in this paper. In Section 6, we conclude the paper and show future directions.

2. Selection and Quantification of Threat Assessment Factors for LSS Targets

The selection of LSS target threat assessment factors needs to fully consider the current detection technology and capability and the ability of different characteristic factors to reflect the degree of target threat.
Through extensive access to data, the detection capabilities of the current two mainstream detection methods of radar and infrared to LSS targets [13,14,15,16,17,18] are obtained, as shown in Table 1.
It can be seen that both radar and infrared can effectively detect LSS targets. Although it is difficult for a single technical means to achieve stable tracking of weak and small targets in complex battlefield environments, it can be considered that it is capable of all-weather autonomous detection of LSS targets within a certain distance under the condition of multi-sensor fusion based on the two methods supplemented by radio spectrum detection and laser detection.
When the target space status information can be obtained, the traditional threat factors such as target speed, entry angle, height and distance from our defense position can be selected. These factors can well reflect the target mobility, interception urgency and other information, which is also applicable to LSS targets.
Heterogeneity is a typical feature of UAV swarm. Different UAVs in the swarm perform different tasks. Large UAVs usually have a greater load, stronger attack, detection, communication, decision-making or interference capabilities, and pose a greater threat to our targets. Therefore, the imaging area of the target on the radar can better reflect the threat degree of the target.
LSS target recognition is also the focus of target detection. Target recognition mainly collects UAV images through imaging technology for comparative analysis and feature extraction to realize target recognition. A target detection algorithm based on deep learning is the focus of current research. Many scholars have used a neural network algorithm to effectively identify the type of LSS targets platform [15,19], and the maximum recognition distance based on visible light imaging can reach about 0.8 km [13].
To sum up, the angle, speed, height and distance threat factors that can reflect the target’s dynamic threat capability are selected as the threat evaluation indicators of LSS targets together with RCS and target type threat factors that can reflect the target’s static threat capability. The above six impact factors have different impacts on the target threat degree, so it is necessary to quantify the indicators system as follows.
  • Speed threat factor
The faster the target speed, the stronger the maneuverability, the shorter the time to fly to our defense position, and the greater the threat to us. Therefore, we propose the threat function of the velocity factor, as shown in Figure 1.
The corresponding mathematical expression is:
S v = { 0.2 v < 0.2 M a ( v 0.2 ) 2 0.5 × ( 0.6 0.2 ) + 0.2   0.2 M a v < 0.6 M a 1 v > 0.6 M a
2.
Angle threat factor
The target angle threat can be described by the target entry angle. The target entry angle refers to the angle between the connecting line between the target and our array and the target flight direction. The smaller the entry angle is, the more obvious the target attack intention is and the greater the threat to us. Therefore, we propose the threat function of the angle factor, as shown in Figure 2.
The corresponding mathematical expression is:
S α = { 1 ( α 90 ) 2 90 α 90 0 α > 90 α < 90
3.
Height threat factor
The lower the target height, the easier it is to avoid radar detection, which is not conducive to the shooting of air defense weapons. At the same time, the target with a lower height can act on our position faster. On the contrary, the target in too high airspace is difficult to directly perform the established mission, that is, the target threat degree increases with the decrease in target height. Therefore, we propose the threat function of the height factor, as shown in Figure 3.
The corresponding mathematical expression is:
S h = { 1 h < 100 e 100 h 500 h 100
4.
Distance threat factor
The closer the target is to our array, the easier it is to carry out direct action, and the shorter the response time left to our defense system. Therefore, we propose the threat function of the distance factor, as shown in Figure 4.
The corresponding mathematical expression is:
S r = { 1 h < 100 e 2 r 20 h 100
5.
RCS threat factor
The target RCS value fluctuates with the change of motion state, but it is usually proportional to the target size. The larger the RCS, the stronger the load and maneuverability, and the greater the threat to our array. Therefore, we propose the threat function of the RCS factor, as shown in Figure 5.
The corresponding mathematical expression is:
S R = { 0.2 R C S < 0.01 0.2 + ( R C S 0.01 ) 2 1.25 × 0.09 2 0.01 R C S < 0.1 1 R C S 0.1
6.
Type threat factor
At present, the types of UAV platforms for UAV swarm operations are mainly divided into rotor platforms and fixed-wing platforms. The type of target platform is closely related to its operational tasks. For example, the rotor UAV flies slowly and mainly performs reconnaissance and jamming tasks. The fixed-wing UAV flies faster and can perform more critical reconnaissance, communication and fire attack tasks. Therefore, it is considered that the threat degree of the fixed-wing UAV is higher than that of the rotor UAV. The quantitative method of threat degree according to the type of target platform is:
S c = { 0.5 Rotor   UAV 1 Fixed   wing   UAV

3. LSS Target Threat Assessment Model

3.1. Determination of Subjective Weight by AHP

An analytic hierarchy process is a multi-objective decision-making analysis method combining qualitative and quantitative analysis. It uses expert experience to compare the importance of the participating factors, constructs a comparison matrix, determines the relative importance of each factor in the hierarchy, and then constructs a judgment matrix to quantitatively determine the weight of each threat factor.
The determination steps of each index weight based on AHP are as follows [1,14,20,21,22].
Step 1:
According to the selected threat factors, establish the analytic hierarchy process model diagram, as shown in Figure 6.
Step 2:
Build a comparison matrix. The 9-level proportional scaling method is used to compare the factors in the same layer and construct the judgment matrix A = ( a i j ) 6 × 6 , The basic evaluation criteria include “equally important”, “slightly important”, “quite important”, “extremely important” and “absolutely important”, which correspond to 1, 3, 5, 7 and 9 in the 9-level scale respectively, and the compromise values of each scale are represented by 2, 4, 6 and 8.
In order to obtain expert knowledge, draw an expert scoring table for the pairwise comparison of the six indicators of target speed, target entry angle, target height, target distance, target RCS and target type. Three teachers of the subject of the college are invited to score, using three scoring tables; in addition, extract the expert knowledge from the literature [20,21] to produce two scoring tables. Synthesize five expert quantitative score tables, average and round them to produce the judgment matrix as shown in Table 2.
Step 3:
Calculate indicators of weight value and consistency test. The weight value of each indicator can be obtained by normalizing the eigenvector corresponding to the maximum eigenvalue of judgment matrix A. In practical engineering applications, the comparison matrix is required to approximately meet the basic consistency, and the judgment matrix is obtained according to people’s subjective judgment, which inevitably has estimation error. Therefore, the consistency test of ranking should be carried out.
Using the consistency indicators C . I . = ( λ max n ) / ( n 1 ) , and the consistency ratio C . R . = C . I . / R . I . for consistency test, when the number of indicators is six, C . I . = ( λ max n ) / ( n 1 ) is generally selected. When C . R . = 0 , it shows that the comparison matrix strictly satisfies the basic consistency; When C . R . < 0.1 , it can be considered that the comparison matrix approximately satisfies the basic consistency.
The maximum eigenvalue of the comparison matrix is λ max = 6.0271 and the consistency ratio is C . R . = 0.004 < 0.1 , so the comparison matrix approximately meets the basic consistency. The eigenvector corresponding to the maximum eigenvalue λ max of the comparison matrix is [ 0.4022     0.0813     0.2078     0.7639     0.4022     0.2078 ] , which is normalized to obtain the weight value of each indicator as W A = [ 0.194     0.039     0.101     0.370     0.195     0.101 ] T .

3.2. Determination of Objective Weight by Entropy Method

After determining the subjective weight based on expert experience, the information entropy theory is introduced into the determination of target attribute weight of air target threat assessment, which can make the determination of weight more objective and reflect the impact of each attribute on target threat assessment.
In order to introduce the concept of information entropy and establish the threat assessment model of cluster targets, the definition of information entropy is given as follows:
Definition 1
([23]). The mathematical expectation of self-information is defined as the average self-information of the source. If an object may have  n states and the probability of each state is  ( p 1 , p 2 , , p n ) , the information entropy of the object is defined as:
H ( X ) = E [ log 1 P ( a i ) ] = i = 1 q P ( a i ) log P ( a i )
The determination steps of each indicator weight based on information entropy are as follows [23,24,25,26,27,28,29,30].
Step 1:
Construct decision matrix. Assuming that there are m air raid targets, n threat factors are selected as the evaluation indicator, and the decision matrix A = ( a i j ) m × n is constructed according to the threat degree quantification method of each factor, where aij is the quantitative value of the i-th target under the j-th threat factor.
Normalize the decision matrix A to obtain A ˜ = ( a ˜ i j ) m × n , where
a ˜ i j = a i j / i = 1 m a i j
Step 2:
Calculate the information entropy of each indicator. Information entropy is a measure of the disorder degree of the system. The smaller the information entropy of an attribute indicator, the greater the variation degree of the indicator value, the greater the amount of information, and the greater the weight in the evaluation [25]. Therefore, the information entropy H j of the j - th evaluation indicator to the target is defined as:
H j = 1 ln m i = 1 m a ˜ i j ln a ˜ i j
Step 3:
Calculate the weight of each indicator. According to the information entropy H j of each indicator, the weight value W E = [ w 1 , w 2 , , w m ] T of each indicator is obtained, where
w j = 1 H j k = 1 m ( 1 H k )

3.3. Determination of Final Indicators Weight and Calculation of Target Threat Value

The AHP based on expert experience and the entropy method based on objective information reflect the weight of target attributes in threat estimation from different angles. Therefore, based on the above two weight schemes, it is expected to find an optimized weight W = [ w 1 , w 2 , , w m ] T to take values between subjective and objective weights in an optimal way, so as to obtain maximum reliability.
The core idea of the optimization model is: in order to fully extract the reasonable part of the subjective and objective weights and realize the organic unity of the objective characteristics of expert experience and battlefield data, the deviation between the combined weight vector and the evaluation value vector corresponding to each weight vector should be as small as possible. Thus, the following optimization model is constructed [31]:
min   z = j = 1 n [ α ( w j w A j ) 2 + ( 1 α ) ( w j w E j ) 2 ] s . t .       j = 1 n w j = 1 ,   w j 0       ( j = 1 , 2 , , n )
where: w A j and w E j are the subjective and objective weights of the j - th indicator obtained by analytic hierarchy process and entropy method, respectively, and w j is the final weight of the j - th indicator obtained by optimization. α is the partiality coefficient. When the expert experience is more accurate and reliable, α takes the larger value, on the contrary, α takes the smaller value.
According to the optimized weight obtained, the threat degree F of LSS target can be obtained by multiplying the normalized target threat degree matrix A ˜ and the weight vector W of each evaluation indicator, as:
F = A ˜ W = [ a ˜ 11 a ˜ 12 a ˜ 1 n a ˜ 21 a ˜ 22 a ˜ 2 n a ˜ m 1 a ˜ m 2 a ˜ m n ] [ w 1 w 2 w n ] = ( f 1 , f 2 , , f n ) T

4. Threat Assessment Process

The information entropy method is combined with AHP to build a method model for threat assessment of LSS targets, as shown in Figure 7.
The LSS target threat assessment process based on AHP and information entropy is mainly divided into two modules. The first is the air information acquisition module. Relying on the target detection and tracking system based on radar and infrared detection means, the four dynamic attributes of target speed, entry angle, height and distance are obtained in real-time. Relying on the detection and identification system based on radar and photoelectric detection means, the two static attribute information of target RCS and platform type are obtained. Then, according to the threat degree calculation function of each attribute, the quantitative threat degree value of each attribute is obtained, and it is normalized to obtain the decision matrix. The second is the weight determination module of each threat evaluation indicator. Based on expert experience and knowledge, the importance of the six selected threat assessment factors is compared and analyzed by analytic hierarchy process, and the corresponding subjective weight vector is obtained. Based on the real-time target feature information, the objective weight vector of each evaluation indicator is calculated by using the method of information entropy. The final weight vector with more credibility is obtained by optimizing the combination of the two. Finally, the decision matrix is multiplied by the corresponding weight vector to obtain the threat assessment results of each target.

5. Experiment

Scenario of battlefield environment: assuming that there are five UAVs near our defense position, and all of them are within the action range of our comprehensive detection system, the target characteristic information can be obtained at a certain time, as shown in Table 3.
It is required to conduct threat assessment on the target according to the obtained target characteristic information, so as to provide reference for subsequent interception operations.
Calculate the six threat factors of the target’s speed, entry angle, height, distance, RCS and type according to formulas (1)~(6), and obtain the threat degree matrix of the target:
A = [ 0.200 0.849 0.819 0.317 0.684 0.500 0.250 0.627 0.497 0.670 0.289 0.500 0.313 0.988 0.333 0.407 0.556 1 0.513 0.927 0.670 0.861 0.358 1 0.213 0.951 0.905 0.192 0.210 0.500 ]
Normalize matrix A to obtain matrix A ˜ :
A ˜ = [ 0.134 0.193 0.254 0.130 0.326 0.143 0.168 0.143 0.154 0.274 0.138 0.143 0.210 0.225 0.103 0.166 0.265 0.286 0.345 0.222 0.208 0.352 0.171 0.286 0.143 0.217 0.281 0.078 0.100 0.143 ]
Firstly, the objective weight is calculated based on the method of information entropy, and the information entropy of evaluation indexes is calculated according to formula (9), and the following is obtained:
H = [ 0.958     0.992     0.955     0.923     0.946     0.963 ]
Then, use formula (10) to calculate the objective weight, and the following is obtained:
W E = [ 0.165     0.031     0.137     0.307     0.214     0.147 ] T
The subjective weight obtained based on AHP has been given in Section 3.1. The weight fusion is carried out by using the optimization model given in Section 3.3. In order to verify the influence of the value of partiality coefficient α on the results, this paper takes α = 0.3 and α = 0.7 , respectively for simulation verification.
When α = 0.3 , the obtained results are shown in Figure 8.
The final weight obtained after optimization is
W = [ 0.174     0.033     0.126     0.326     0.208     0.133 ] T
According to formula (12), the quantitative value of threat degree of each target is:
F = [ 0.191     0.190     0.204     0.282     0.133 ] T
The order of target threats is:
target   4 > target   3 > target   1 > target   2 > target   5
when α = 0.7 , the obtained results are shown in Figure 9.
The final weight obtained after optimization is
W = [ 0.185     0.037     0.119     0.351     0.201     0.115 ] T
The quantitative value of threat degree of each target is:
F = [ 0.190     0.195     0.204     0.287     0.132 ] T
The order of target threats is:
target   4 > target   3 > target   2 > target   1 > target   5
It can be seen that the adjustment of partiality coefficient α changes the threat estimation value of each target and the ranking results of target 1 and target 2. The larger α is, the closer the result is to AHP, and the smaller α is, the closer the result is to the result obtained by information entropy method.
From the simulation results, it can be seen that the results obtained by AHP and entropy method are essentially the same, which shows that the two methods have certain rationality and credibility in LSS target threat assessment. The weight obtained after the optimized combination is more neutral, which can absorb the reasonable part of the two methods at the same time, and avoid large deviation caused by the irrationality of one of them. The selection of partiality coefficient α can directly affect the final weight value, and its value can be determined according to the completeness and reliability of the established expert system. To sum up, the analysis can prove that the model has credibility and effectiveness in LSS target threat assessment and has the advantages of being a simple method requiring a small amount of calculation.

6. Conclusions and Future Work

Based on expert experience, AHP can make a reasonable evaluation of conventional target attributes and tactical actions. The information entropy method can effectively reflect the variability of target attributes and can quickly respond to target dynamic task planning and maneuver, which is especially suitable for threat estimation when target information is not comprehensive. The model established in this paper comprehensively considers the subjective and objective weights given by the two and fuses them in an optimal way to obtain a more reliable evaluation result. Finally, the credibility and effectiveness of the model are verified by simulation analysis. The target threat degree obtained by this method can provide reference for LSS target interception decision.
Nevertheless, the method proposed in this paper has its limitations: when the evaluation criteria increase, the result of AHP may become worse; when the established expert knowledge base is incomplete, the reliability of the evaluation will decline.
As for future work, with the deepening of LSS target operation research and the enrichment of expert knowledge base, we can further select new threat assessment factors, further expand the structure of threat assessment factor quantization function and optimize its parameters. We can further improve AHP to better adapt to the increase in evaluation factors.

Author Contributions

Conceptualization, R.L. and Y.Z.; methodology, R.L. and S.H.; software, Y.S.; validation, R.L.; data curation, R.L., S.H. and Y.Z.; writing—original draft preparation, R.L. and Y.Z.; writing—review and editing, R.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Steinberg, A. An approach to threat assessment. In Proceedings of the 8th International Conference on Information Fusion, Philadelphia, PA, USA, 25–29 July 2005. [Google Scholar]
  2. Dickerson, B.; Sanders, J.; Pham, L.V.; Casserly, M.; Maldonado, V. UAV Swarm Attack: Protection System Alternatives for Destroyers; Systems Engineering Project Report; Naval Postgraduate School: Monterey, CA, USA, 2012. [Google Scholar]
  3. Yang, L.N.; Cao, Z.Y.; Li, Y.X. Research on UAV swarm combat composition and combat concept. Mod. Def. Technol. 2020, 48, 44–51. [Google Scholar]
  4. Zhang, C.L.; Chen, X.F. Drone swarm may change the form of future war. Mil. Dig. 2021, 09, 26–31. [Google Scholar]
  5. Liu, L.Z.; Zhang, J.; Zhao, Z.H. Operational conception and key technology of UAV swarm interception system. Command. Control Simul. 2021, 43, 48–54. [Google Scholar]
  6. Jiang, J.X. Threats and countermeatures of unmanned aerial vehicle swarm to aerial defense. Natl. Def. Technol. 2019, 40, 108–113. [Google Scholar]
  7. Faizi, S.; Saabun, W.; Nawaz, S.; Rehman, A.U.; Atróbski, J.W. Best-Worst method and Hamacher aggregation operations for intuitionistic 2-tuple linguistic sets. Expert Syst. Appl. 2021, 181, 115088. [Google Scholar] [CrossRef]
  8. Rehman, A.; Shekhovtsov, A.; Rehman, N.; Faizi, S.; Sałabun, W. On the Analytic Hierarchy Process Structure in Group Decision-Making Using Incomplete Fuzzy Information with Applications. Symmetry 2021, 13, 609. [Google Scholar] [CrossRef]
  9. Fei, L.G. D-ANP: A multiple criteria decision making method for supplier selection. Appl. Intell. 2020, 50, 2537–2554. [Google Scholar] [CrossRef]
  10. Lin, C.S.; Kou, G. A heuristic method to rank the alternatives in the AHP synthesis. Appl. Soft Comput. 2020, 100, 106916. [Google Scholar] [CrossRef]
  11. Ishizaka, A.; Lusti, M. How to derive priorities in AHP: A comparative study. Cent. Eur. J. Oper. Res. 2006, 14, 387–400. [Google Scholar] [CrossRef] [Green Version]
  12. Ziemba, P.; Wątróbski, J.; Jankowski, J.; Piwowarski, M. Research on the Properties of the AHP in the Environment of Inaccurate Expert Evaluations. In Selected Issues in Experimental Economics; Springer Proceedings in Business and, Economics; Nermend, K., Łatuszyńska, M., Eds.; Springer: Cham, Switzerland, 2016. [Google Scholar]
  13. Jiang, R.Q.; Bai, R.K.; Peng, Y.P. Overview of target detection technology for low slow small UAV. Winged Missile 2020, 4, 100–105. [Google Scholar]
  14. Saaty, T.L. The Analytic Hierarchy Process; McGraw-Hill: New York, NY, USA, 1980. [Google Scholar]
  15. Girshick, R.; Donahue, J.; Darrell, T.; Malil, J. Rich feature hierarchies for accurate object detection and semantic segmentation. In Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition, Columbus, OH, USA, 23–28 June 2014. [Google Scholar]
  16. Qu, X.T. Overview of Detection Technology and Methods of “Low, Slow and Small” UAV. Available online: http://www.ctctw.com/page.aspx?node=12&id=456 (accessed on 8 June 2020).
  17. Qu, X.T.; Zhuang, D.Y.; Xie, H.B. Detection method for low-slow-small (LSS) UAV. Command. Control Simul. 2020, 42, 128–135. [Google Scholar]
  18. Wang, J. Present situation and prospect of low-slow-small target surveillance technologies. Radar Sci. Technol. 2020, 18, 274–278. [Google Scholar]
  19. Bian, W.W.; Qiu, X.Y.; Xin, Z.F.; Yan, X.J. Multi feature based BP neural network LSS target recognition method. Comput. Simul. 2021, 38, 338–342. [Google Scholar]
  20. Fu, T.; Wang, J. Research on air target threat assessment method in air defense system. Command. Control Simul. 2016, 38, 63–69. [Google Scholar]
  21. Xin, Z.F.; Huang, K.H.; He, J.J.; Jia, Y.X.; Qiu, X.Y. Threat assessment method of “low, slow and small” targets based on Bayesian network. J. Command. Control 2019, 5, 288–294. [Google Scholar]
  22. Yin, G.Y.; Zhou, X.L.; Zhang, W.J. A Threat Assessment Algorithm Based on AHP and Principal Components Analysis. Procedia Eng. 2011, 15, 4590–4596. [Google Scholar] [CrossRef] [Green Version]
  23. Fu, Z.Y. Basic Theory and Application of Information Theory, 4th ed.; Electronic Industry Press: Beijing, China, 2015; pp. 22–27. [Google Scholar]
  24. Li, Z.W.; Qu, L.; Zhang, G.; Xie, N. Attribute selection for heterogeneous data based on information entropy. Int. J. Gen. Syst. 2021, 50, 548–566. [Google Scholar] [CrossRef]
  25. Zhang, T.; Zhou, Z.L.; Gou, X.Y.; Yu, L. Target threat assessment and ranking based on information entropy and TOPSIS. Electron. Opt. Control 2012, 19, 35–38. [Google Scholar]
  26. Xu, G.; Zhao, L. Analysis of Fluvial Process Based on Information Entropy. J. Tianjin Univ. 2013, 46, 347–353. [Google Scholar]
  27. Gao, Y.Y.; Yu, M.J. Target threat assessment method based on cloud model and entropy weight. In Proceedings of the 2nd International Conference on Innovation in Artificial Intelligence, Shanghai, China, 9–12 March 2018. [Google Scholar]
  28. He, D.Y.; Xu, J.Q.; Chen, X.L.; Giffin, A. Information-Theoretic-Entropy Based Weight Aggregation Method in Multiple-Attribute Group Decision-Making. Entropy 2016, 18, 171. [Google Scholar] [CrossRef] [Green Version]
  29. Cui, Y.; Feng, P.; Jin, J.; Liu, L. Water Resources Carrying Capacity Evaluation and Diagnosis Based on Set Pair Analysis and Improved the Entropy Weight Method. Entropy 2018, 20, 359. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  30. Zhao, M.; Shen, X.Y.; He, Y.F.; Bai, Y.M. Probabilistic linguistic entropy and cross-entroy measures for multiple criteria decision making. Syst. Eng. Theory Pract. 2018, 38, 2679–2689. [Google Scholar]
  31. Wang, Z.X.; Li, Q.X. A method of integrating final weights according to subjective and objective weights. J. Appl. Math. Comput. Math. 2006, 01, 87–92. [Google Scholar]
Figure 1. Speed threat function.
Figure 1. Speed threat function.
Entropy 23 01292 g001
Figure 2. Angle threat function.
Figure 2. Angle threat function.
Entropy 23 01292 g002
Figure 3. Height threat function.
Figure 3. Height threat function.
Entropy 23 01292 g003
Figure 4. Distance threat function.
Figure 4. Distance threat function.
Entropy 23 01292 g004
Figure 5. RCS threat function.
Figure 5. RCS threat function.
Entropy 23 01292 g005
Figure 6. Analytic hierarchy process model diagram.
Figure 6. Analytic hierarchy process model diagram.
Entropy 23 01292 g006
Figure 7. Threat assessment model.
Figure 7. Threat assessment model.
Entropy 23 01292 g007
Figure 8. Threat assessment results when partiality coefficient α = 0.3 . (a) Weight value of each evaluation indicator; (b) Threat value of targets.
Figure 8. Threat assessment results when partiality coefficient α = 0.3 . (a) Weight value of each evaluation indicator; (b) Threat value of targets.
Entropy 23 01292 g008
Figure 9. Threat assessment results when partiality coefficient α = 0.7 . (a) Weight value of each evaluation indicator; (b) Threat value of targets.
Figure 9. Threat assessment results when partiality coefficient α = 0.7 . (a) Weight value of each evaluation indicator; (b) Threat value of targets.
Entropy 23 01292 g009
Table 1. Analysis of LSS target detection capability.
Table 1. Analysis of LSS target detection capability.
Detection MeansRadar DetectionInfrared Acquisition
Detection CapabilityThe detection speed is fast, and it can detect all-weather and long-distance. The effective detection distance is about 5 km. According to the target size and structural characteristics, the reliable detection distance is 1~8 km.It can detect all weather, but it is difficult to identify weak and small targets, and the detection distance is affected by atmospheric visibility. Under the condition of visibility of 15 km, the maximum detection distance can reach 3.6 km.
Table 2. Target attribute comparison matrix.
Table 2. Target attribute comparison matrix.
SpeedEntry AngleHeightDistanceRCSType
Speed1521/212
Entry Angle1/511/31/71/51/3
Height1/2311/41/21
Distance274124
RCS1521/212
Type1/2311/41/21
Table 3. Target feature information.
Table 3. Target feature information.
TargetEvaluation Indicators
Speed / M a Entry
Angle/(°)
Height/(m)Distance/
(km)
RCS/(m2)Type
Target 10.2−2020020.02rotor
Target 20.415500200.05fixed-wing
Target 30.545400350.15fixed-wing
Target 40.3−55800400.05rotor
Target 50.26035050.04rotor
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Luo, R.; Huang, S.; Zhao, Y.; Song, Y. Threat Assessment Method of Low Altitude Slow Small (LSS) Targets Based on Information Entropy and AHP. Entropy 2021, 23, 1292. https://0-doi-org.brum.beds.ac.uk/10.3390/e23101292

AMA Style

Luo R, Huang S, Zhao Y, Song Y. Threat Assessment Method of Low Altitude Slow Small (LSS) Targets Based on Information Entropy and AHP. Entropy. 2021; 23(10):1292. https://0-doi-org.brum.beds.ac.uk/10.3390/e23101292

Chicago/Turabian Style

Luo, Ruining, Shucai Huang, Yan Zhao, and Yafei Song. 2021. "Threat Assessment Method of Low Altitude Slow Small (LSS) Targets Based on Information Entropy and AHP" Entropy 23, no. 10: 1292. https://0-doi-org.brum.beds.ac.uk/10.3390/e23101292

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop