CN103246818A - TOPSIS-method multi-target threat ordering method based on information entropy - Google Patents

TOPSIS-method multi-target threat ordering method based on information entropy Download PDF

Info

Publication number
CN103246818A
CN103246818A CN2013101807117A CN201310180711A CN103246818A CN 103246818 A CN103246818 A CN 103246818A CN 2013101807117 A CN2013101807117 A CN 2013101807117A CN 201310180711 A CN201310180711 A CN 201310180711A CN 103246818 A CN103246818 A CN 103246818A
Authority
CN
China
Prior art keywords
target
attribute
threat
formula
ideal solution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013101807117A
Other languages
Chinese (zh)
Inventor
张堃
张才坤
周德云
冯琦
马云红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northwestern Polytechnical University
Original Assignee
Northwestern Polytechnical University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northwestern Polytechnical University filed Critical Northwestern Polytechnical University
Priority to CN2013101807117A priority Critical patent/CN103246818A/en
Publication of CN103246818A publication Critical patent/CN103246818A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Radar Systems Or Details Thereof (AREA)

Abstract

The invention provides a TOPSIS-method multi-target threat ordering method based on information entropy. The method includes first building a threat assessment threat factor model, building a target attribute decision matrix according to the threat factor model, adopting an entropy weight method to calculate a target attribute weight vector according to the decision matrix, adopting a TOPSIS method to calculate relative close degree of target schemes according to the weight vector calculated through the entropy weight method and conducting threat assessment ordering on the schemes according to the close degree, namely the threat degree. By means of the method, shortcomings of the traditional ideal solution approaching ordering method in determination of weight coefficients are effectively overcome, and the target threat degree prediction accuracy is improved.

Description

TOPSIS fado method for sorting target threat based on information entropy
Technical field
The invention belongs to the data fusion technical field, particularly a kind of multiple goal threatens sort method, can be used for airborne task processor, perhaps aerial/ground control command system.
Background technology
Data fusion is an informix treatment technology, threat assessment is important component part in the information fusion model that proposes of laboratory director joint council of the U.S. army, it is the important component part of setting up advanced command automation system, its research emphasis is how the target threat degree to be carried out assessment and the ordering of reasonable science, and guide one's own side further to take action, have uncertainty usually.All bringing into play important effect no matter be at military, civil area.Under the attack of terrorism background that is becoming increasingly rampant in the world, civil aviation because have the controllability height, influence is big, present stage becomes the preferred object that the terrorist implements terrorist activity, this has just proposed acid test to enterprise of civil aviaton, the civil aviation mangement department of China.Development and large-scale application along with electronic information technology; quantity of information is increasing; also become increasingly complex; correctly realize the target threat assessment fast; help the tower man of civil aviaton, civilian pilot's rapid reaction; take measures necessary protection crew's safety, improve survival probability, avoid unnecessary life and property loss.
Have a lot of methods to be applied to target threat assessment at present, as maximum weighted degree of membership method, minimum weight degree of membership method etc., it is only consideration and ideal solution or poor with negative ideal solution all.The TOPSIS method takes into full account both, not only near ideal solution but also away from negative ideal solution, is that a kind of to find the solution multiobjectives decision very effectively also be the method for using always at present.But traditional TOPSIS method is relatively more difficult to the objective attribute target attribute Weight Determination, often needs the people for providing, and very big subjectivity and blindness are arranged.
Summary of the invention
In order to overcome the deficiencies in the prior art, the invention provides a kind of TOPSIS fado method for sorting target threat based on information entropy, use entropy theory to determine the objective attribute target attribute weight, and will calculate gained objective attribute target attribute weight and be applied to and carry out target threat ordering in the TOPSIS method and resolve, improve target threat degree prediction accuracy.
The technical solution adopted for the present invention to solve the technical problems may further comprise the steps:
Step 1: structure objective attribute target attribute decision matrix H = ( h ij ) m × n = h 11 h 12 . . . h 1 n h 21 h 22 . . . h 2 n . . . . . . . . . . . . h m 1 h m 2 . . . h mn , In the formula, h IjJ attribute representing i frame enemy plane, the attribute of enemy plane comprises following content:
(1) angle threatens the factor h i 1 = ( | q i B | + | q i R | ) / 360 , In the formula,
Figure BDA00003193826000022
Be the target angle of lead,
Figure BDA00003193826000023
Be bogey heading and score angle;
(2) distance threatens the factor h i 2 = 0.5 r i &le; rm , r i &le; rm t i 0.5 - 0.2 ( r i - rm t i ) ( rm - rm t i ) rm t i < r i < rm 1.0 rm t i > r i > rm 0.8 max ( rm , rm t i ) < r i < rr , In the formula, r iBe target range, rmt iBe the attack distance of the entrained guided missile of enemy plane, rm is my air defence missile maximum range, and rr is the maximum tracking range of our radar;
(3) speed threatens the factor h i 3 = 0.1 v i < 0.6 v z - 0.5 + v i / v z 0.6 v z &le; v i &le; 1.5 v z 1.0 v i > 1.5 v z , In the formula, v zBe my motor speed, v iBe target velocity;
Step 2: with the normalization of objective attribute target attribute decision matrix H row, obtain
Figure BDA00003193826000026
Step 3: calculate the objective attribute target attribute entropy
Figure BDA00003193826000027
J=1,2,, n, when
Figure BDA00003193826000028
The time, regulation ln h . ij = 0 ;
Step 4: calculate the objective attribute target attribute weight vectors
Figure BDA000031938260000210
In the formula, 0≤ω j≤ 1,
Figure BDA000031938260000211
Step 5: substitution objective attribute target attribute weight, calculate the weighting standard matrix
Figure BDA000031938260000212
Step 6: determine ideal solution V * = { ( max 1 &le; i &le; m v ij | j &Element; J + ) , ( min 1 &le; i &le; m v ij | j &Element; J - ) } = { v 1 * , v 2 * , . . . , v n * } With negative ideal solution V - = { ( min 1 &le; i &le; m v ij | j &Element; J + ) , ( max 1 &le; i &le; m v ij | j &Element; J - ) } = { v 1 - , v 2 - , . . . , v n - } , In the formula, J +={ benefit type index set }, J -={ cost type index set };
Step 7: the distance that calculates ideal solution
Figure BDA000031938260000215
With the distance to negative ideal solution S i - = &Sigma; j = 1 n ( v ij - v j - ) 2 ;
Step 8: the relative approach degree that calculates each scheme
Figure BDA000031938260000217
Step 9: according to the i.e. size of degree of threat of the size of relative approach degree, to the assessment ordering that impends of each scheme.
The invention has the beneficial effects as follows: the present invention weighs method and TOPSIS method with entropy and combines the target threat degree is assessed, namely use entropy theory to handle the objective information that obtains, determine each attribute weight of target, weight is applied in the TOPSIS method, calculate multiobject threaten degree.The present invention can effectively avoid tradition to approach defective and the deficiency of the ranking method of ideal solution (TOPSIS) on definite weight coefficient, improves target threat degree prediction accuracy.
Description of drawings
Fig. 1 is both sides' aircraft flight situation synoptic diagram in the intimidation estimating method of the present invention;
Fig. 2 is intimidation estimating method schematic flow sheet of the present invention.
Embodiment
The present invention is further described below in conjunction with drawings and Examples.
The present invention includes following steps:
(1) sets up threat assessment and threaten factor model;
(2) according to threatening factor model, set up the objective attribute target attribute decision matrix;
(3) according to decision matrix, adopt entropy power method to calculate the objective attribute target attribute weight vectors;
(4) weight vectors that calculates according to entropy power method adopts the TOPSIS method to calculate the relative approach degree of each target protocol, according to the i.e. size of degree of threat of the size of relative approach degree, to the assessment ordering that impends of each scheme.
For instance, both sides' aircraft flight situation as shown in Figure 1, calculation procedure of the present invention is as follows:
Step 1: structure objective attribute target attribute decision matrix H=(h Ij) M * n
H = ( h ij ) m &times; n = h 11 h 12 . . . h 1 n h 21 h 22 . . . h 2 n . . . . . . . . . . . . h m 1 h m 2 . . . h mn
In the formula, h IjJ attribute representing i frame enemy plane.
(1) angle threatens the factor
h i 1 = ( | q i B | + | q i R | ) / 360
In the formula,
Figure BDA00003193826000033
Be the target angle of lead,
Figure BDA00003193826000034
Be bogey heading and score angle (clockwise for just).
(2) distance threatens the factor
h i 2 = 0.5 r i &le; rm , r i &le; rm t i 0.5 - 0.2 ( r i - rm t i ) ( rm - rm t i ) rm t i < r i < rm 1.0 rm t i > r i > rm 0.8 max ( rm , rm t i ) < r i < rr
In the formula, r iBe target range, rmt iBe the attack distance of the entrained guided missile of enemy plane, rm is our air defence missile maximum range, and rr is the maximum tracking range of our radar.
(3) speed threatens the factor
h i 3 = 0.1 v i < 0.6 v z - 0.5 + v i / v z 0.6 v z &le; v i &le; 1.5 v z 1.0 v i > 1.5 v z
In the formula, v zBe my motor speed, v iBe target velocity.
Step 2: with the normalization of objective attribute target attribute decision matrix H row
H . = ( h . ij ) m &times; n = ( h ij / &Sigma; i = i m h ij ) m &times; n
Step 3: calculate the objective attribute target attribute entropy
E j = - 1 ln n &Sigma; i = 1 m h . ij ln h . ij , ( j = 1,2 , . . . , n ) (when h . ij = 0 The time, regulation ln h . ij = 0 );
Step 4: calculate the objective attribute target attribute weight vectors
&omega; j = ( 1 - E j ) / &Sigma; k = 1 n ( 1 - E k ) In the formula, 0≤ω j≤ 1, &Sigma; j = 1 n &omega; j = 1 .
Step 5: substitution objective attribute target attribute weight, calculate the weighting standard matrix
V = ( v ij ) m &times; n = ( &omega; j h . ij ) m &times; n
Step 6: determine ideal solution and negative ideal solution
Ideal solution is got under this attribute solution most threatening between the different target machine for each index attribute.Negative ideal solution is the solution of threat value minimum.At benefit type index, ideal solution is got the index maximal value; At cost type index, ideal solution is got the index minimum value.Otherwise can draw negative ideal solution.Its computing formula is as follows,
Ideal solution
V * = { ( max 1 &le; i &le; m v ij | j &Element; J + ) , ( min 1 &le; i &le; m v ij | j &Element; J - ) } = { v 1 * , v 2 * , . . . , v n * }
Negative ideal solution
V - = { ( min 1 &le; i &le; m v ij | j &Element; J + ) , ( max 1 &le; i &le; m v ij | j &Element; J - ) } = { v 1 - , v 2 - , . . . , v n - }
In the formula, J +={ benefit type index set }, J -={ cost type index set };
Step 7: the distance that calculates ideal solution and negative ideal solution
Distance to ideal solution
S i * = &Sigma; j = 1 n ( v ij - v j * ) 2
Distance to negative ideal solution
S i - = &Sigma; j = 1 n ( v ij - v j - ) 2
Step 8: the relative approach degree that calculates each scheme
C i = S i - / ( S i - + S i * )
Step 9: according to the i.e. size of degree of threat of the size of relative approach degree, to the assessment ordering that impends of each scheme.
Whole threat assessment process as shown in Figure 2.
The present invention is directed to traditional TOPSIS method and improve, introduce the concept of entropy, adopt entropy power method to calculate the objective attribute target attribute weight, and the weight that this resolves is brought in the TOPSIS method, avoided traditional TOPSIS method to determine subjectivity and the blindness of weight.Use method of the present invention and solve aerial target threat assessment problem, fast than the additive method computing velocity, be easy to realize, improve the accuracy of threat assessment.

Claims (1)

1. the TOPSIS fado method for sorting target threat based on information entropy is characterized in that comprising the steps:
Step 1: structure objective attribute target attribute decision matrix H = ( h ij ) m &times; n = h 11 h 12 . . . h 1 n h 21 h 22 . . . h 2 n . . . . . . . . . . . . h m 1 h m 2 . . . h mn , In the formula, h IjJ attribute representing i frame enemy plane, the attribute of enemy plane comprises following content:
(1) angle threatens the factor h i 1 = ( | q i B | + | q i R | ) / 360 , In the formula,
Figure FDA00003193825900013
Be the target angle of lead,
Figure FDA00003193825900014
Be bogey heading and score angle;
(2) distance threatens the factor h i 2 = 0.5 r i &le; rm , r i &le; rm t i 0.5 - 0.2 ( r i - rm t i ) ( rm - rm t i ) rm t i < r i < rm 1.0 rm t i > r i > rm 0.8 max ( rm , rm t i ) < r i < rr , In the formula, r iBe target range, rmt iBe the attack distance of the entrained guided missile of enemy plane, rm is my air defence missile maximum range, and rr is the maximum tracking range of our radar;
(3) speed threatens the factor h i 3 = 0.1 v i < 0.6 v z - 0.5 + v i / v z 0.6 v z &le; v i &le; 1.5 v z 1.0 v i > 1.5 v z , In the formula, v zBe my motor speed, v iBe target velocity;
Step 2: with the normalization of objective attribute target attribute decision matrix H row, obtain
Figure FDA00003193825900017
Step 3: calculate the objective attribute target attribute entropy
Figure FDA00003193825900018
J=1,2,, n, when
Figure FDA00003193825900019
The time, regulation ln h . ij = 0 ;
Step 4: calculate the objective attribute target attribute weight vectors
Figure FDA000031938259000111
In the formula, 0≤ω j≤ 1,
Figure FDA000031938259000112
Step 5: substitution objective attribute target attribute weight, calculate the weighting standard matrix
Figure FDA000031938259000113
Step 6: determine ideal solution V * = { ( max 1 &le; i &le; m v ij | j &Element; J + ) , ( min 1 &le; i &le; m v ij | j &Element; J - ) } = { v 1 * , v 2 * , . . . , v n * } With negative ideal solution V - = { ( min 1 &le; i &le; m v ij | j &Element; J + ) , ( max 1 &le; i &le; m v ij | j &Element; J - ) } = { v 1 - , v 2 - , . . . , v n - } , In the formula, J +={ benefit type index set }, J -={ cost type index set };
Step 7: the distance that calculates ideal solution
Figure FDA00003193825900021
With the distance to negative ideal solution S i - = &Sigma; j = 1 n ( v ij - v j - ) 2 ;
Step 8: the relative approach degree that calculates each scheme
Figure FDA00003193825900023
Step 9: according to the i.e. size of degree of threat of the size of relative approach degree, to the assessment ordering that impends of each scheme.
CN2013101807117A 2013-05-15 2013-05-15 TOPSIS-method multi-target threat ordering method based on information entropy Pending CN103246818A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013101807117A CN103246818A (en) 2013-05-15 2013-05-15 TOPSIS-method multi-target threat ordering method based on information entropy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013101807117A CN103246818A (en) 2013-05-15 2013-05-15 TOPSIS-method multi-target threat ordering method based on information entropy

Publications (1)

Publication Number Publication Date
CN103246818A true CN103246818A (en) 2013-08-14

Family

ID=48926334

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013101807117A Pending CN103246818A (en) 2013-05-15 2013-05-15 TOPSIS-method multi-target threat ordering method based on information entropy

Country Status (1)

Country Link
CN (1) CN103246818A (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103839115A (en) * 2014-03-17 2014-06-04 武汉科技大学 Machining process chain optimization method for energy efficiency improvement
CN104123467A (en) * 2014-07-24 2014-10-29 合肥工业大学 GRA-TOPSIS model evaluation method based on expert preferences
CN104463414A (en) * 2014-10-23 2015-03-25 湘潭大学 Hot rolling production economic load scheduling method used under time-of-use power price
CN105006846A (en) * 2015-09-02 2015-10-28 国家电网公司 Station level active power optimization method of wind power station
CN106296031A (en) * 2016-08-22 2017-01-04 北京理工大学 A kind of Air Targets Threat appraisal procedure based on dynamic TOPSIS
CN106599537A (en) * 2016-11-17 2017-04-26 西北工业大学 Mass weapon target assignment method based on multiple-target clonal evolutionary algorithm
CN106650250A (en) * 2016-12-14 2017-05-10 中国人民解放军军械工程学院 Infrared multi-target threat sequencing method based on equivalent evaluation factors
CN107103128A (en) * 2017-04-19 2017-08-29 西北工业大学 Compromised based on multiple criteria and solve the multi-object Threat appraisal procedure of sequence
CN107147520A (en) * 2017-05-07 2017-09-08 杨娟 A kind of terroristic organization's Web Mining algorithm
CN107203493A (en) * 2017-06-09 2017-09-26 西北工业大学 Multiple target battle field situation method based on complicated ratio evaluation method
CN107292090A (en) * 2017-05-31 2017-10-24 浙江大学 A kind of high speed pressure machine structure scheme integrated evaluating method
CN107483487A (en) * 2017-09-15 2017-12-15 北京理工大学 A kind of multidimensional network security measure method based on TOPSIS
CN109639283A (en) * 2018-11-26 2019-04-16 南京理工大学 Workpiece coding method based on decision tree
CN109670660A (en) * 2017-10-13 2019-04-23 南京航空航天大学 A kind of fleet dynamic air defense threat estimating method based on intuitionistic fuzzy TOPSIS
CN111079090A (en) * 2019-12-27 2020-04-28 航天南湖电子信息技术股份有限公司 Threat assessment method for' low-slow small target
CN111413681A (en) * 2020-04-30 2020-07-14 柳州达迪通信技术股份有限公司 Flight target threat degree identification method and system based on entropy weight method and storage medium
CN116308721A (en) * 2023-05-11 2023-06-23 菏泽市市场监管监测中心 Information supervision and management method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101385059A (en) * 2006-03-13 2009-03-11 波音公司 Aircraft collision sense and avoidance system and method
CN101908097A (en) * 2010-07-13 2010-12-08 北京航空航天大学 Particle swarm optimization method for air combat decision
CN102722751A (en) * 2012-05-11 2012-10-10 北京航空航天大学 Heuristic quantum genetic method of multi-target distribution in air war
KR20120126511A (en) * 2011-05-12 2012-11-21 국방과학연구소 Threat evaluation system and method against antiair target and computer-readerable storage medium having a program recorded thereon where the program is to carry out its method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101385059A (en) * 2006-03-13 2009-03-11 波音公司 Aircraft collision sense and avoidance system and method
CN101908097A (en) * 2010-07-13 2010-12-08 北京航空航天大学 Particle swarm optimization method for air combat decision
KR20120126511A (en) * 2011-05-12 2012-11-21 국방과학연구소 Threat evaluation system and method against antiair target and computer-readerable storage medium having a program recorded thereon where the program is to carry out its method
CN102722751A (en) * 2012-05-11 2012-10-10 北京航空航天大学 Heuristic quantum genetic method of multi-target distribution in air war

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张堃 等: "基于熵的TOPSIS法空战多目标威胁评估", 《系统工程与电子技术》 *

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103839115A (en) * 2014-03-17 2014-06-04 武汉科技大学 Machining process chain optimization method for energy efficiency improvement
CN103839115B (en) * 2014-03-17 2016-08-17 武汉科技大学 A kind of mechanical processing technique chain optimization method promoted towards efficiency
CN104123467A (en) * 2014-07-24 2014-10-29 合肥工业大学 GRA-TOPSIS model evaluation method based on expert preferences
CN104463414A (en) * 2014-10-23 2015-03-25 湘潭大学 Hot rolling production economic load scheduling method used under time-of-use power price
CN105006846A (en) * 2015-09-02 2015-10-28 国家电网公司 Station level active power optimization method of wind power station
CN106296031A (en) * 2016-08-22 2017-01-04 北京理工大学 A kind of Air Targets Threat appraisal procedure based on dynamic TOPSIS
CN106599537A (en) * 2016-11-17 2017-04-26 西北工业大学 Mass weapon target assignment method based on multiple-target clonal evolutionary algorithm
CN106599537B (en) * 2016-11-17 2019-03-29 西北工业大学 A kind of extensive weapon-target assignment method based on multiple target Clonal Evolutionary Algorithms
CN106650250B (en) * 2016-12-14 2019-01-15 中国人民解放军军械工程学院 Infrared Multi-Target threat sequercing method based on equivalent evaluation points
CN106650250A (en) * 2016-12-14 2017-05-10 中国人民解放军军械工程学院 Infrared multi-target threat sequencing method based on equivalent evaluation factors
CN107103128A (en) * 2017-04-19 2017-08-29 西北工业大学 Compromised based on multiple criteria and solve the multi-object Threat appraisal procedure of sequence
CN107103128B (en) * 2017-04-19 2019-11-05 西北工业大学 It is compromised based on multiple criteria and solves the multi-object Threat appraisal procedure of sequence
CN107147520A (en) * 2017-05-07 2017-09-08 杨娟 A kind of terroristic organization's Web Mining algorithm
CN107292090A (en) * 2017-05-31 2017-10-24 浙江大学 A kind of high speed pressure machine structure scheme integrated evaluating method
CN107292090B (en) * 2017-05-31 2020-07-03 浙江大学 Comprehensive evaluation method for structural scheme of high-speed press
CN107203493A (en) * 2017-06-09 2017-09-26 西北工业大学 Multiple target battle field situation method based on complicated ratio evaluation method
CN107483487A (en) * 2017-09-15 2017-12-15 北京理工大学 A kind of multidimensional network security measure method based on TOPSIS
CN107483487B (en) * 2017-09-15 2020-10-23 北京理工大学 TOPSIS-based multi-dimensional network security measurement method
CN109670660A (en) * 2017-10-13 2019-04-23 南京航空航天大学 A kind of fleet dynamic air defense threat estimating method based on intuitionistic fuzzy TOPSIS
CN109639283A (en) * 2018-11-26 2019-04-16 南京理工大学 Workpiece coding method based on decision tree
CN109639283B (en) * 2018-11-26 2022-11-04 南京理工大学 Workpiece coding method based on decision tree
CN111079090A (en) * 2019-12-27 2020-04-28 航天南湖电子信息技术股份有限公司 Threat assessment method for' low-slow small target
CN111413681A (en) * 2020-04-30 2020-07-14 柳州达迪通信技术股份有限公司 Flight target threat degree identification method and system based on entropy weight method and storage medium
CN111413681B (en) * 2020-04-30 2023-06-30 柳州达迪通信技术股份有限公司 Method, system and storage medium for identifying threat degree of flying target based on entropy weight method
CN116308721A (en) * 2023-05-11 2023-06-23 菏泽市市场监管监测中心 Information supervision and management method and device, electronic equipment and storage medium
CN116308721B (en) * 2023-05-11 2023-10-20 菏泽市市场监管监测中心 Information supervision and management method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN103246818A (en) TOPSIS-method multi-target threat ordering method based on information entropy
CN102759928B (en) Control method for flight path of airship on stratosphere
Selig Real-time flight simulation of highly maneuverable unmanned aerial vehicles
Huang et al. A method of 3D path planning for solar-powered UAV with fixed target and solar tracking
Edwards et al. Maximizing net power in circular turns for solar and autonomous soaring aircraft
CN106403948A (en) Three-dimensional flight track planning method for electric transmission line inspection unmanned aerial vehicle
CN100541372C (en) Automatic homing control method under a kind of unmanned vehicle engine involuntary stoppage
CN114200826B (en) High stability control method for supersonic speed large maneuvering target continuous large overload maneuvering
CN105138012A (en) GPS-guided unmanned aerial vehicle automatic carrier-landing adaptive control system and method
CN105467833A (en) A non-linear self-adaptive flight control method
US20220214688A1 (en) Method and system for controlling multi-unmanned surface vessel collaborative search
Gavrilovic et al. Performance improvement of small unmanned aerial vehicles through gust energy harvesting
Eubank Autonomous flight, fault, and energy management of the flying fish solar-powered seaplane
CN105372653B (en) A kind of efficient turning maneuvering target tracking method towards in bank base air traffic control radar system
CN206792838U (en) A kind of fire-fighting unmanned plane
CN102298728A (en) Method for evaluating target threat degree
CN103268410A (en) Multi-target threat degree ordering method based on rapid iteration
CN204473152U (en) A kind of integral type unmanned plane
WO2021213541A1 (en) Method for assessing personal injury risk of unmanned aerial vehicle crash in out-of-control or power-loss fault state
Tan et al. The research of air combat intention identification method based on bilstm+ attention
Andersson et al. Cooperating uavs using thermal lift to extend endurance
CN205801499U (en) Flying wing type solar powered aircraft
Wharington Heuristic control of dynamic soaring
CN105046048A (en) Solving method of takeoff performance of ground effect vehicle
Fu et al. Air combat assignment problem based on bayesian optimization algorithm

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130814