AIAA Guidance, Navigation, and Control Conference 2011
DOI: 10.2514/6.2011-6241
|View full text |Cite
|
Sign up to set email alerts
|

Situation and Threat Assessment in BVR Combat

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…The convolutional layer and the pooling layer are used to compress the data to reduce the calculation amount of cluster center optimization, and the LSHADE-Means algorithm is used for clustering, where K=4 [13], and the specific process is shown in Fig. 12.…”
Section: Ucav Air Combat Situation Knowledge Extractionmentioning
confidence: 99%
See 1 more Smart Citation
“…The convolutional layer and the pooling layer are used to compress the data to reduce the calculation amount of cluster center optimization, and the LSHADE-Means algorithm is used for clustering, where K=4 [13], and the specific process is shown in Fig. 12.…”
Section: Ucav Air Combat Situation Knowledge Extractionmentioning
confidence: 99%
“…The uncertain knowledge of grey fuzzy theory is introduced into the uncertain reasoning of Bayesian network. Sun et al infered the purpose of enemy fighter pilots by constructing Bayesian networks [13]. Narayana et al used Bayesian formula, which is combined with maximum posterior probability and relevant situation judgment rules to infer the current situation [14].…”
Section: Introductionmentioning
confidence: 99%
“…Many of them use game theory to model air combat [7], [8], [9], [10]. Other approaches found in the literature are as follows: Bayesian Networks [11], [12], [13], [14], fuzzy logic [15], [16], agent-based modeling [17], influence diagrams [18], reinforcement learning [19], [20], [21], [22], artificial neural networks [23], [24], evolutionary algorithms [25], [26], minimax method [27], and behavior trees [28].…”
Section: Introductionmentioning
confidence: 99%