CN112417377B - Efficiency evaluation method for military reconnaissance system - Google Patents
Efficiency evaluation method for military reconnaissance system Download PDFInfo
- Publication number
- CN112417377B CN112417377B CN202011298467.0A CN202011298467A CN112417377B CN 112417377 B CN112417377 B CN 112417377B CN 202011298467 A CN202011298467 A CN 202011298467A CN 112417377 B CN112417377 B CN 112417377B
- Authority
- CN
- China
- Prior art keywords
- information
- probability
- sacc
- entropy
- model
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000011156 evaluation Methods 0.000 title abstract description 8
- 238000013210 evaluation model Methods 0.000 claims abstract description 12
- 230000032683 aging Effects 0.000 claims abstract description 11
- 238000001514 detection method Methods 0.000 claims description 26
- 238000009826 distribution Methods 0.000 claims description 12
- 238000000034 method Methods 0.000 claims description 12
- 239000011159 matrix material Substances 0.000 claims description 9
- 238000009827 uniform distribution Methods 0.000 claims description 6
- 230000008569 process Effects 0.000 claims description 5
- 230000009467 reduction Effects 0.000 claims description 4
- 238000000528 statistical test Methods 0.000 claims description 3
- 238000011161 development Methods 0.000 abstract description 2
- 230000018109 developmental process Effects 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/18—Complex mathematical operations for evaluating statistical data, e.g. average values, frequency distributions, probability functions, regression analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/16—Matrix or vector computation, e.g. matrix-matrix or matrix-vector multiplication, matrix factorization
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Optimization (AREA)
- Mathematical Analysis (AREA)
- Computational Mathematics (AREA)
- Business, Economics & Management (AREA)
- Algebra (AREA)
- Tourism & Hospitality (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Development Economics (AREA)
- Strategic Management (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Educational Administration (AREA)
- General Business, Economics & Management (AREA)
- Life Sciences & Earth Sciences (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Evolutionary Biology (AREA)
- Operations Research (AREA)
- Probability & Statistics with Applications (AREA)
- Complex Calculations (AREA)
- Image Analysis (AREA)
Abstract
The invention provides a performance evaluation method of a military reconnaissance system, which comprises the steps of establishing a performance evaluation model based on an information theory, wherein the establishment of the performance evaluation model comprises the establishment of an information integrity model, an information accuracy model and an information timeliness model, and the performance evaluation model comprises an accuracy Q Sacc Integrity Q Scomp And the ageing degree Q Scurr Composition, overall efficacy E, can be expressed as: e=w Sacc Q Sacc +W Scomp Q Scomp +W Scurr Q Scurr Wherein W is Sacc 、W Scomp And W is Scurr Accuracy Q respectively Sacc Integrity Q Scomp And the ageing degree Q Scurr Is a weight of (a). The invention establishes the information integrity model, the information accuracy model and the information timeliness model of the military reconnaissance system, achieves the aim of evaluating the comprehensive combat effectiveness of the military reconnaissance system, has complete theory and advanced technology, has strong operability, is suitable for evaluating the combat effectiveness of various military reconnaissance systems, and can provide technical support for equipment development, combat planning and other works.
Description
Technical Field
The invention relates to the field of military reconnaissance, in particular to a performance evaluation method of a military reconnaissance system.
Background
The military reconnaissance system mainly carries out reconnaissance on key areas on a battlefield, then processes and synthesizes the reconnaissance data to generate corresponding information, provides information support for a command decision system or a combat unit, measures the size of the information support function, mainly monitors whether the reconnaissance system can timely, accurately and reliably provide support information, and does not have a method for evaluating the effectiveness of the military reconnaissance system in the prior art.
Disclosure of Invention
The invention aims to provide a performance evaluation method of a military reconnaissance system, so as to solve the technical problems.
The invention aims to solve the technical problems, and is realized by adopting the following technical scheme: a performance evaluation method of a military reconnaissance system comprises the steps of establishing a performance evaluation model based on an information theory, wherein the establishment of the performance evaluation model comprises the establishment of an information integrity model, an information accuracy model and an information timeliness model, and the performance evaluation model consists of an accuracy Q Sacc Integrity Q Scomp And the ageing degree Q Scurr Composition, overall efficacy E, can be expressed as: e=w Sacc Q Sacc +W Scomp Q Scomp +W Scurr Q Scurr Wherein W is Sacc 、W Scomp And W is Scurr Accuracy Q respectively Sacc Integrity Q Scomp And the ageing degree Q Scurr Is a weight of (a).
Preferably, the information is a state description of the system or the event or a message about the state, let m= { x 1 ,x 2 ,…,x n The system X is a set of all possible states, p= { P 1 ,p 2 ,…,p n The probability of occurrence of each state is set, and according to the concept of shannon entropy, if the probability of occurrence of a state of a system or event can be represented mathematically, the entropy of information describing the system is:
H(x)=-∑xlog[p(x)]
if the system state set is a continuous interval [ a, b ], and there is a probability distribution density function f (x), then the information entropy is:
preferably, the information integrity model establishment includes a target detection process, provided with n signals to be detected, and letting H 0 Indicating "no target signal present", H 1 Indicating "target signal present", D 0 Indicating "decision as target", D 1 Indicating "decision as no target" for H 0 :z(t)、H 1 Z (t) is used for carrying out statistical test to judge which hypothesis is established, z (t) is an observation signal, and H is compared 0 And H 1 The magnitude of the probability of occurrence, i.e. the comparison of the posterior probability P (H 0 Z) and P (H) 1 I z), which probability is large decides which is true, expressed by a decision formula as P (H) 1 |z)>P(H 0 Z) is established, it is determined as H 1 ,P(H 1 |z)<P(H 0 Z) is established, it is determined as H 0 The posterior probability can be expressed as follows, according to the bayesian formula:wherein, P (z) is the probability density of z, and P (zH) 0 )、P(zH 1 ) Is a conditional probability density, when->When established, judge as H 1 The method comprises the steps of carrying out a first treatment on the surface of the When->When established, judge as H 0 ;P(H 0 )、P(H 1 ) Respectively H 0 Hypothesis sum H 1 The a priori probabilities of the hypotheses, generally known as a priori knowledge,/, are assumed>Is a decision threshold;
the binary detection problem decision makes four cases that describe the performance of the binary detection device, which can be expressed in terms of conditional probabilities as follows:
(1) Set H 0 Assuming true, the decision is D 0 Represents selection H 0 For true correct decisions, the conditional probability P (D 0 |H 0 ) The representation is made of a combination of a first and a second color,
(2) Set H 1 Assuming true, the decision is D 1 Represents selection H 1 For true correct decisions, the conditional probability P (D 1 |H 1 ) The representation is made of a combination of a first and a second color,in signal detection, the signal is the target signal and the target is judged, also called detection probability, P is used d The representation is made of a combination of a first and a second color,
(3) Set H 0 Assuming true, the decision is D 1 Represents selection H 0 For false first type erroneous decisions, the conditional probability P (D 1 |H 1 ) The representation is made of a combination of a first and a second color,in the signal detection, no target signal is judged to be a target, also called false alarm probability, P is used f The representation is made of a combination of a first and a second color,
(4) Set H 1 Assuming true, the decision is D 0 Represents selection H 1 For false decisions of the second type, the conditional probability P (D 0 |H 1 ) The representation is made of a combination of a first and a second color,in signal detection, the signal is the target signal and the signal is judged to be the target-free signal, which is also called as the probability of alarm leakage, P is used m A representation;
according to the Bayes formula and the full probability formula, the corresponding posterior probability can be obtained:
from the basic principle of the information theory, it is known that H (X) represents the degree of loss of information amount caused by false alarm and missed alarm, the greater the false alarm and missed alarm probability, the greater the loss of information,
the information acquisition integrity model is as follows
In the middle of
H max (X) -entropy at maximum uncertainty, reached when both false alarm probability and false alarm probability are 0.5;
H min (X) -entropy with minimum uncertainty, reached when both false alarm probability and false alarm probability are 0;
the result of the enemy disturbance reduces my correct decision P (D 0 |H 0 ) And P (D) 1 |H 1 ) (probability of detection) thereby increasing H (X), Q Scomp (X) decrease.
Preferably, the information accuracy model building step is as follows:
is provided with aThe dimensional random variable is [ -delta, delta]The interval obeys the uniform distribution of equal probability, delta is the maximum range of uncertainty of random variables, is generally known as priori knowledge, and the probability density function isIts information entropy is->If the one-dimensional continuous random variable is subjected to normal distribution, the probability density function is +.>Its entropy is
Then the difference of the information entropy of the two is the reduction degree of the uncertainty rangeGeneralizing this conclusion to the N-dimensional case, N-dimensional continuous random vector x= (X) 1 ,x 2 ,…,x n ) T Is defined as the joint entropy of (2)If the N-dimensional continuous random vector X obeys a normal distribution, its probability density function is
Wherein μ= [ μ ] 1 ,μ 2 ,…,μ N ]Is the mean and has covariance matrix
The non-diagonal elements being random variablesx i And x j Is formed by sigma i,j =(x i -μ i )(x j -μ j ) Obtained, random variable x i And x j The correlation of (2) is expressed asSigma when i=j i,j The variance of the covariance matrix;
the joint entropy of the N-dimensional continuous random vector X is
Where Sigma is the modulus of the determinant of the covariance matrix Sigma, and since n is a constant, H (X) is simplified to obtain the relative entropy H r (X) =log|Σ|, i.e. only with respect to covariance,
for a normal distribution of multiple variables, it is first assumed that the maximum joint entropy exists, i.e. that a uniform distribution is achieved
H max (X)=log|∑| max
Definition Q Sacc (X) is interval [0,1 ]]A value in between, and has
The information entropy can be used to obtain a representation Q of the accuracy of information acquisition Sacc (X),0≤Q Sacc (X). Ltoreq.1 reflects the accuracy of information acquisition, i.e. for the information element { a } 1 ,a 2 ,…,a C The values and the degree of mastery of the relationship between them are determined as Q Sacc (X) →1, represents the highest accuracy, and Q Sacc (X) →0 means that the accuracy is the lowest.
Preferably, the information aging model building step is as follows: the degree of freshness of the obtained information described by the time of the information can be expressed as
t i Indicating the current time, i.e. the time when the combat unit puts forward the information demand, t l Refers to the latest update time of the information, t 0 The time when the information actually starts to exist is defined as η, which is a coefficient related to the importance of the information. .
The beneficial effects of the invention are as follows:
the information theory method is adopted in the invention, the information integrity model, the information accuracy model and the information timeliness model of the military reconnaissance system are established, the aim of evaluating the comprehensive combat effectiveness of the military reconnaissance system is achieved, the evaluation method is complete in theory and advanced in technology, has strong operability, is suitable for evaluating the combat effectiveness of various military reconnaissance systems, and can provide technical support for equipment development, combat planning and other works.
Drawings
FIG. 1 is a schematic diagram of the object detection process of the present invention;
FIG. 2 is a graph of the probability of transition of target detection according to the present invention;
FIG. 3 is a schematic diagram of the time efficiency of information acquisition according to the present invention.
Detailed Description
In order that the manner in which the above recited features, objects and advantages of the present invention are obtained, a more particular description of the invention will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. Based on the examples in the embodiments, those skilled in the art can obtain other examples without making any inventive effort, which fall within the scope of the invention.
Specific embodiments of the present invention are described below with reference to the accompanying drawings.
Example 1
As shown in FIG. 1, a performance evaluation method of a military reconnaissance system comprises the steps of establishing a performance evaluation model based on an information theory, wherein the establishment of the performance evaluation model comprises the establishment of an information integrity model, an information accuracy model and an information timeliness model, and the performance evaluation model consists of an accuracy Q Sacc Integrity Q Scomp And the ageing degree Q Scurr Composition, overall efficacy E, can be expressed as: e=w Sacc Q Sacc +W Scomp Q Scomp +W Scurr Q Scurr Wherein W is Sacc 、W Scomp And W is Scurr Accuracy Q respectively Sacc Integrity Q Scomp And the ageing degree Q Scurr Is a weight of (a).
The information theory is a state description of the system or the event or a message about the state, let M= { x 1 ,x 2 ,…,x n The system X is a set of all possible states, p= { P 1 ,p 2 ,…,p n The probability of occurrence of each state is set, and according to the concept of shannon entropy, if the probability of occurrence of a state of a system or event can be represented mathematically, the entropy of information describing the system is:
H(x)=-∑xlog[p(x)]
if the system state set is a continuous interval [ a, b ], and there is a probability distribution density function f (x), then the information entropy is:
the information integrity model establishment comprises a target detection process, wherein n signals to be detected are arranged, so that H is 0 Indicating "no target signal present", H 1 Indicating "target signal present", D 0 Indicating "decision as target", D 1 Indicating "decision as no target" for H 0 :z(t)、H 1 Z (t) is used for carrying out statistical test to judge which hypothesis is established, z (t) is an observation signal, and H is compared 0 And H 1 The magnitude of the probability of occurrence, i.e. the comparison of the posterior probability P (H 0 Z) and P (H) 1 I z), which probability is large decides which is true, expressed by a decision formula as P (H) 1 |z)>P(H 0 Z) is established, it is determined as H 1 ,P(H 1 |z)<P(H 0 Z) is established, it is determined as H 0 The posterior probability can be expressed as follows, according to the bayesian formula:wherein, P (z) is the probability density of z, and P (zH) 0 )、P(zH 1 ) Is a conditional probability density, when->When established, judge as H 1 The method comprises the steps of carrying out a first treatment on the surface of the When (when)When established, judge as H 0 ;P(H 0 )、P(H 1 ) Respectively H 0 Hypothesis sum H 1 The a priori probabilities of the hypotheses, generally known as a priori knowledge,/, are assumed>Is a decision threshold;
the binary detection problem decision makes four cases that describe the performance of the binary detection device, which can be expressed in terms of conditional probabilities as follows:
(1) Set H 0 Assuming true, the decision is D 0 Represents selection H 0 For true correct decisions, the conditional probability P (D 0 |H 0 ) The representation is made of a combination of a first and a second color,
(2) Set H 1 Assuming true, the decision is D 1 Represents selection H 1 For true correct decisions, the conditional probability P (D 1 |H 1 ) The representation is made of a combination of a first and a second color,in signal detection, the signal is the target signal and the target is judged, also called detection probability, P is used d The representation is made of a combination of a first and a second color,
(3) Set H 0 Assuming true, the decision is D 1 Represents selection H 0 For false first type erroneous decisions, the conditional probability P (D 1 |H 1 ) The representation is made of a combination of a first and a second color,in the signal detection, no target signal is judged to be a target, also called false alarm probability, P is used f The representation is made of a combination of a first and a second color,
(4) Set H 1 Assuming true, the decision is D 0 Represents selection H 1 For false decisions of the second type, the conditional probability P (D 0 |H 1 ) The representation is made of a combination of a first and a second color,in signal detection, the signal is the target signal and the signal is judged to be the target-free signal, which is also called as the probability of alarm leakage, P is used m A representation;
according to the Bayes formula and the full probability formula, the corresponding posterior probability can be obtained:
from the basic principle of the information theory, it is known that H (X) represents the degree of loss of information amount caused by false alarm and missed alarm, the greater the false alarm and missed alarm probability, the greater the loss of information,
the information acquisition integrity model is as follows
In the middle of
H max (X) -entropy at maximum uncertainty, reached when both false alarm probability and false alarm probability are 0.5;
H min (X) -entropy with minimum uncertainty, reached when both false alarm probability and false alarm probability are 0;
the result of the enemy disturbance reduces my correct decision P (D 0 |H 0 ) And P (D) 1 |H 1 ) (probability of detection) thereby increasing H (X), Q Scomp (X) decrease.
The information accuracy model building steps are as follows:
setting one-dimensional random variable at [ -delta, delta]The interval obeys the uniform distribution of equal probability, delta is the maximum range of uncertainty of random variables, is generally known as priori knowledge, and the probability density function isIts information entropy is->If the one-dimensional continuous random variable is subjected to normal distribution, the probability density function is +.>Its entropy is
Then the difference of the information entropy of the two is the reduction degree of the uncertainty rangeGeneralizing this conclusion to the N-dimensional case, N-dimensional continuous random vector x= (X) 1 ,x 2 ,…,x n ) T Is defined as the joint entropy of (2)If the N-dimensional continuous random vector X obeys a normal distribution, its probability density function is
Wherein μ= [ μ ] 1 ,μ 2 ,…,μ N ]Is the mean and has covariance matrix
The non-diagonal elements being random variables x i And x j Is formed by sigma i,j =(x i -μ i )(x j -μ j ) Obtained, random variable x i And x j The correlation of (2) is expressed asSigma when i=j i,j The variance of the covariance matrix;
the joint entropy of the N-dimensional continuous random vector X is
Where Sigma is the modulus of the determinant of the covariance matrix Sigma, and since n is a constant, H (X) is simplified to obtain the relative entropy H r (X) =log|Σ|, i.e. only with respect to covariance,
for a normal distribution of multiple variables, it is first assumed that the maximum joint entropy exists, i.e. that a uniform distribution is achieved
H max (X)=log|∑| max
Definition Q Sacc (X) is interval [0,1 ]]A value in between, and has
The information entropy can be used to obtain a representation Q of the accuracy of information acquisition Sacc (X),0≤Q Sacc (X). Ltoreq.1 reflects the accuracy of information acquisition, i.e. for the information element { a } 1 ,a 2 ,…,a C The values and the degree of mastery of the relationship between them are determined as Q Sacc (X) →1, represents the highest accuracy, and Q Sacc (X) →0 means that the accuracy is the lowest.
The information aging model is established as follows: the degree of freshness of the obtained information described by the time of the information can be expressed as
t i Indicating the current time, i.e. the time when the combat unit puts forward the information demand, t l Refers to the latest update time of the information, t 0 The time when the information actually starts to exist is defined as η, which is a coefficient related to the importance of the information.
The foregoing has shown and described the basic principles, principal features and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the above-described embodiments, and that the above-described embodiments and descriptions are only preferred embodiments of the present invention, and are not intended to limit the invention, and that various changes and modifications may be made therein without departing from the spirit and scope of the invention as claimed. The scope of the invention is defined by the appended claims and equivalents thereof.
Claims (2)
1. The method for evaluating the efficiency of the military reconnaissance system is characterized by comprising the steps of establishing an efficiency evaluation model based on an information theory, wherein the establishment of the efficiency evaluation model comprises the establishment of an information integrity model, an information accuracy model and an information timeliness model, and the efficiency evaluation model consists of an accuracy Q Sacc Integrity Q Scomp And the ageing degree Q Scurr Composition, overall efficacy E, can be expressed as: e=w Sacc Q Sacc +W Scomp Q Scomp +W Scurr Q Scurr Wherein W is Sacc 、W Scomp And W is Scurr Accuracy Q respectively Sacc Integrity Q Scomp And the ageing degree Q Scurr Weight of (2);
the information integrity model establishment comprises a target detection process, wherein n signals to be detected are arranged, so that H is 0 Indicating "no target signal present", H 1 Indicating "target signal present", D 0 Indicating "decision as target", D 1 Indicating "decision as no target" for H 0 :z(t)、H 1 Z (t) is used for carrying out statistical test to judge which hypothesis is established, z (t) is an observation signal, and H is compared 0 And H 1 The magnitude of the probability of occurrence, i.e. the comparison of the posterior probability P (H 0 Z) and P (H) 1 I z), which probability is large decides which is true, expressed by a decision formula as P (H) 1 |z)>P(H 0 Z) is established, it is determined as H 1 ,P(H 1 |z)<P(H 0 Z) is established, it is determined as H 0 According to the She Beisi formula, the posterior probability can be expressed as:wherein, P (z) is the probability density of z, and P (z|H 0 )、P(z|H 1 ) Is a conditional probability density, when->When established, judge as H 1 The method comprises the steps of carrying out a first treatment on the surface of the When (when)When established, judge as H 0 ;P(H 0 )、P(H 1 ) Respectively H 0 Hypothesis sum H 1 The a priori probabilities of the hypotheses, generally known as a priori knowledge,/, are assumed>Is a decision threshold;
the binary detection problem decision makes four cases that describe the performance of the binary detection device, which can be expressed in terms of conditional probabilities as follows:
(1) Set H 0 Assuming true, the decision is D 0 Represents selection H 0 For true correct decisions, the conditional probability P (D 0 |H 0 ) The representation is made of a combination of a first and a second color,
(2) Set H 1 Assuming true, the decision is D 1 Represents selection H 1 For true correct decisions, the conditional probability P (D 1 |H 1 ) The representation is made of a combination of a first and a second color,in signal detection, the signal is the target signal and the target is judged, also called detection probability, P is used d The representation is made of a combination of a first and a second color,
(3) Set H 0 Assuming true, the decision is D 1 Represents selection H 0 For false first type erroneous decisions, the conditional probability P (D 1 |H 1 ) The representation is made of a combination of a first and a second color,in the signal detection, no target signal is judged to be a target, also called false alarm probability, P is used f The representation is made of a combination of a first and a second color,
(4) Set H 1 Assuming true, the decision is D 0 Represents selection H 1 For false decisions of the second type, the conditional probability P (D 0 |H 1 ) The representation is made of a combination of a first and a second color,in signal detection, the signal is the target signal and the signal is judged to be the target-free signal, which is also called as the probability of alarm leakage, P is used m A representation;
according to the Bayes formula and the full probability formula, the corresponding posterior probability can be obtained:
from the basic principle of the information theory, it is known that H (X) represents the degree of loss of information amount caused by false alarm and missed alarm, the greater the false alarm and missed alarm probability, the greater the loss of information,
the information acquisition integrity model is as follows
In the middle of
H max (X) -entropy at maximum uncertainty, reached when both false alarm probability and false alarm probability are 0.5;
H min (X) -entropy with minimum uncertainty, reached when both false alarm probability and false alarm probability are 0;
the result of the enemy disturbance reduces my correct decision P (D 0 |H 0 ) And P (D) 1 |H 1 ) (probability of detection) thereby increasing H (X), Q Scomp (X) reduction;
the information accuracy model building steps are as follows:
setting one-dimensional random variable at [ -delta, delta]The interval obeys the uniform distribution of equal probability, delta is the maximum range of uncertainty of random variables, is generally known as priori knowledge, and the probability density function isIts entropy isIf the one-dimensional continuous random variable is subjected to normal distribution, the probability density function is thatIts entropy is
Then the difference of the information entropy of the two is the reduction degree of the uncertainty rangeGeneralizing this conclusion to the N-dimensional case, N-dimensional continuous random vector x= (X) 1 ,x 2 ,…,x n ) T Is defined as the joint entropy of (2)If the N-dimensional continuous random vector X obeys a normal distribution, its probability density function is
Wherein μ= [ μ ] 1 ,μ 2 ,…,μ N ]Is the mean and has covariance matrix
The non-diagonal elements being random variables x i And x j Is formed by sigma i,j =(x i -μ i )(x j -μ j ) Obtained, random variable x i And x j The correlation of (2) is expressed asSigma when i=j i,j The variance of the covariance matrix;
the joint entropy of the N-dimensional continuous random vector X is
Where Sigma is the modulus of the determinant of the covariance matrix Sigma, and since n is a constant, H (X) is simplified to obtain the relative entropy H r (X) =log|Σ|, i.e. only with respect to covariance,
for a normal distribution of multiple variables, it is first assumed that the maximum joint entropy exists, i.e. that a uniform distribution is achieved
H max (X)=log|∑| max
Definition Q Sacc (X) is interval [0,1 ]]A value in between, and has
The information entropy can be used to obtain a representation Q of the accuracy of information acquisition Sacc (X),0≤Q Sacc (X). Ltoreq.1 reflects the accuracy of information acquisition, i.e. for the information element { a } 1 ,a 2 ,…,a C The values and the degree of mastery of the relationship between them are determined as Q Sacc (X) →1, represents the highest accuracy, and Q Sacc (X) →0 represents the lowest accuracy;
the information aging model is established as follows: the degree of freshness of the obtained information described by the time of the information can be expressed as
t i Indicating the current time, i.e. the time when the combat unit puts forward the information demand, t l Refers to the latest update time of the information, t 0 The time when the information actually starts to exist is defined as η, which is a coefficient related to the importance of the information.
2. The method for evaluating the performance of a military reconnaissance system according to claim 1, wherein: the information theory is a state description of a system or an event or a message related to the state, and M= { x 1 ,x 2 ,…,x n The system X is a set of all possible states, p= { P 1 ,p 2 ,…,p n The probability of occurrence of each state is set, and according to the concept of shannon entropy, if the probability of occurrence of a state of a system or event can be represented mathematically, the entropy of information describing the system is:
H(x)=-∑xlog[p(x)]
if the system state set is a continuous interval [ a, b ], and there is a probability distribution density function f (x), then the information entropy is:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011298467.0A CN112417377B (en) | 2020-11-19 | 2020-11-19 | Efficiency evaluation method for military reconnaissance system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011298467.0A CN112417377B (en) | 2020-11-19 | 2020-11-19 | Efficiency evaluation method for military reconnaissance system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112417377A CN112417377A (en) | 2021-02-26 |
CN112417377B true CN112417377B (en) | 2023-09-12 |
Family
ID=74773516
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011298467.0A Active CN112417377B (en) | 2020-11-19 | 2020-11-19 | Efficiency evaluation method for military reconnaissance system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112417377B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114089033B (en) * | 2022-01-24 | 2022-04-26 | 天津安力信通讯科技有限公司 | Abnormal signal detection method and system based on spectrum analysis |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110519218A (en) * | 2019-07-05 | 2019-11-29 | 中国科学院信息工程研究所 | A kind of method for protecting privacy and system based on privacy leakage assessment |
CN110602009A (en) * | 2019-09-16 | 2019-12-20 | 金陵科技学院 | BPSK blind analysis result credibility evaluation method based on CFAR criterion |
CN110880071A (en) * | 2019-11-15 | 2020-03-13 | 中国人民解放军空军预警学院 | Operator-based passive radar combat effectiveness flexible evaluation modeling method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7149652B2 (en) * | 2004-12-21 | 2006-12-12 | The United States Of America As Represented By The Secretary Of The Army | Method for modeling detection of camouflaged targets |
-
2020
- 2020-11-19 CN CN202011298467.0A patent/CN112417377B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110519218A (en) * | 2019-07-05 | 2019-11-29 | 中国科学院信息工程研究所 | A kind of method for protecting privacy and system based on privacy leakage assessment |
CN110602009A (en) * | 2019-09-16 | 2019-12-20 | 金陵科技学院 | BPSK blind analysis result credibility evaluation method based on CFAR criterion |
CN110880071A (en) * | 2019-11-15 | 2020-03-13 | 中国人民解放军空军预警学院 | Operator-based passive radar combat effectiveness flexible evaluation modeling method |
Non-Patent Citations (1)
Title |
---|
基于PFT的航天电子侦察***作战效能指标体系构建;范鹏程;祝利;安永旺;杨常波;;航天电子对抗(第04期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN112417377A (en) | 2021-02-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Thrun et al. | Monte carlo localization with mixture proposal distribution | |
US7082379B1 (en) | Surveillance system and method having an adaptive sequential probability fault detection test | |
US5581490A (en) | Contact management model assessment system for contact tracking in the presence of model uncertainty and noise | |
US5373456A (en) | Expert system for assessing accuracy of models of physical phenomena and for selecting alternate models in the presence of noise | |
EP0590846B1 (en) | Image processor for target detection and tracking | |
Grossi et al. | Track-before-detect for multiframe detection with censored observations | |
US5703906A (en) | System for assessing stochastic properties of signals representing three items of mutually orthogonal measurement information | |
CN113702979B (en) | Cross-region target tracking track segment space-time splicing method | |
CN112417377B (en) | Efficiency evaluation method for military reconnaissance system | |
CN107274410B (en) | Self-adaptive artificial target constant false alarm rate detection method | |
Amrouche et al. | Multiple target tracking using track before detect algorithm | |
Lee et al. | Adaptive fuzzy filter and its application to image enhancement | |
CN114615143A (en) | Elastic distributed safety monitoring method under multi-sensor-observation network | |
Schorn et al. | Facer: A universal framework for detecting anomalous operation of deep neural networks | |
CN113267758B (en) | Target detection method and system in presence of interference in composite Gaussian environment | |
Davey | Probabilistic multihypothesis trackerwith an evolving poisson prior | |
Williams | Experiments with graphical model implementations of multiple target multiple Bernoulli filters | |
CN108834043B (en) | Priori knowledge-based compressed sensing multi-target passive positioning method | |
CN116842410A (en) | Intelligent helmet antitheft management method and system based on dynamic perception | |
CN110208808B (en) | Passive sonar non-cooperative target line spectrum information fusion method | |
Van Hecke | Fuzzy parameter estimation of the Rayleigh distribution | |
US7263208B1 (en) | Automated threshold selection for a tractable alarm rate | |
CN115856819A (en) | Radar target constant false alarm detection method based on stationary Gaussian process | |
CN115130523A (en) | Flight target behavior intention prediction method based on hidden Markov model | |
Saha et al. | Robust Maximum Correntropy Kalman Filter |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |