[1] WANG H F,YAO Z S,YANG C W.A model for threat assessment based on Lanchester equation[J].Fire Control & Command Control,2003,28(1):47-50.
[2] BLADON P,HALL R J,WRIGHT W A.Situation assessment using graphical models[C]//Proceedings of the 5th International Conference on Information Fusion,2002:886-893.
[3] OKELLO N,THORNS G.Threat assessment using Baye-sian networks[C]//Proceedings of the 6th International Conference of Information Fusion,2003:1102-1109.
[4] CAI J,HU J,HUANG C Q.A consistent dominance rough sets method and its application in threat assessment of UCAV's targets[J].Systems Engineering-Theory & Practice,2012,32(6):1377-1584.
[6] LUO D L,SHEN C L.Decision-making for air combat dogflight[J].Journal of Applied Sciences,2006,24(1):89-93.
[8] FENG L,GAO X G.An application of analytic hierarchy process to the multi-target attacking decision[J].Journal of Northwestern Polytechnical University,1999,17(4):515-519.
[9] QIU W H.Management decision-making study and application of entropy[M].Beijing:China Machine Press,2002.
[10] CHENG Q Y.Structure entropy weight method to confirm the weight of evaluating index[J].Systems Engineering-Theory & Practice,2010,30(7):1225-1228.
[11] GAO J,BAI J L.Evaluation of the C4ISR system based on structure entropy[J].Electronics Optics & Control, 2007,14(2):85-88.
[12] CHEN J Y,QIN Z,JIA J.A PSO-based subtractive clustering technique for designing RBF neural networks[C]// IEEE Congress on Evolutionary Computation,2008:2047-2052.
[13] XIA X,XU W M.Improved particle swarm optimization on RBF neural network[J].Computer Engineering and Applications,2012,48(5):37-40.