Next Article in Journal
Improved Gravitational Search Algorithm Based on Adaptive Strategies
Previous Article in Journal
BPDGAN: A GAN-Based Unsupervised Back Project Dense Network for Multi-Modal Medical Image Fusion
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A New Model of Interval-Valued Intuitionistic Fuzzy Weighted Operators and Their Application in Dynamic Fusion Target Threat Assessment

Air Defense and Antimissile College, Air Force Engineering University, Xi’an 710051, China
*
Author to whom correspondence should be addressed.
Entropy 2022, 24(12), 1825; https://doi.org/10.3390/e24121825
Submission received: 28 October 2022 / Revised: 9 December 2022 / Accepted: 11 December 2022 / Published: 14 December 2022

Abstract

:
Existing missile defense target threat assessment methods ignore the target timing and battlefield changes, leading to low assessment accuracy. In order to overcome this problem, a dynamic multi-time fusion target threat assessment method is proposed. In this method, a new interval valued intuitionistic fuzzy weighted averaging operator is proposed to effectively aggregate multi-source uncertain information; an interval-valued intuitionistic fuzzy entropy based on a cosine function (IVIFECF) is designed to determine the target attribute weight; an improved interval-valued intuitionistic fuzzy number distance measurement model is constructed to improve the discrimination of assessment results. Specifically, first of all, we define new interval-valued intuitionistic fuzzy operation rules based on algebraic operations. We use these rules to provide a new model of interval-valued intuitionistic fuzzy weighted arithmetic averaging (IVIFWAA) and geometric averaging (IVIFWGA) operators, and prove a number of algebraic properties of these operators. Then, considering the subjective and objective weights of the incoming target, a comprehensive weight model of target attributes based on IVIFECF is proposed, and the Poisson distribution method is used to solve the time series weights to process multi-time situation information. On this basis, the IVIFWAA and IVIFWGA operators are used to aggregate the decision information from multiple times and multiple decision makers. Finally, based on the improved TOPSIS method, the interval-valued intuitionistic fuzzy numbers are ordered, and the weighted multi-time fusion target threat assessment result is obtained. Simulation results of comparison show that the proposed method can effectively improve the reliability and accuracy of target threat assessment in missile defense.

1. Introduction

Target threat assessment is the third level of the JDL information fusion model, and is a core issue of missile defense command decision-making. Methods to quickly and accurately evaluate the threat level of an incoming target represent a difficult technical problem that restricts the improvement of the combat effectiveness of missile defense weapon systems. Due to numerous characteristic attributes of ballistic targets and missile defense warfare being a continuous and dynamic process, the threat assessment of a target requires comprehensive consideration of multiple factors, which can be formulated as a type of uncertain dynamic multi-attribute group decision-making problem [1,2].
Commonly used threat assessment methods include Bayesian networks [3], rough set theory [4], D-S evidence theory [5], fuzzy reasoning [6], and multi-attribute decision-making [7]. Although the Bayesian networks can effectively handle uncertain information, the selection of transition probability depends on expert experience, the reliability is poor and it is only applicable to situations where there is a large amount of sample data, and the solution accuracy for small sample data is poor. Thus, it is not suitable for missile defense warfare with a lack of warfare sample data. Although rough set theory does not require prior information outside the data set, it needs to build a large knowledge base to support the construction of relevant rules, and it’s difficult to adapt to the high requirements of missile defense warfare for decision-making timeliness. The D-S evidence theory is weak in processing conflicting information, and when the problem space is large the problem of the combinatorial explosion will occur. Considering the large threat of ballistic missiles, one missed interception will cause great damage to surface defense assets and require high threat assessment accuracy. Therefore, a variety of factors need to be considered. Fuzzy set theory combined with dynamic multi-attribute group decision theory can be used to solve this problem.
Fuzzy sets have been widely used to describe and process fuzzy uncertain decision information since Zadeh [8] proposed it. Atanassov [9] extended the fuzzy set to the intuitionistic fuzzy set by removing the constraint condition that the sum of membership and non-membership is one. Intuitionistic fuzzy sets can describe the uncertainty of decision-making information in more detail, so they have been widely used in intelligence reasoning, decision-making, and other fields. In recent years, a large number of multi-attribute group decision-making methods based on intuitionistic fuzzy sets have been proposed. Pamucar [10] provided multi-criteria decision-making that combines interval grey numbers and normalized weighted geometric Dombi-Bonferroni mean operator. Shen et al. [11] proposed an extended intuitionistic fuzzy TOPSIS method. In et al. builds an intuitionistic fuzzy multi-attribute group decision-making model based on the consistency method. Jin et al. [12] proposed an intuitionistic fuzzy preference relation group decision-making method based on multiplicative consistency. Wu et al. [13] used a multi-criteria decision-making model of triangular intuitionistic fuzzy number correlation. Based on this, Kong et al. [14] proposed a quantification method of multi-attribute threat indicators that addresses the issue of threat assessment indicators of ground combat targets being diverse and difficult to quantify, and unified the quantitative results of indicators in the form of intuitionistic fuzzy sets. Wang et al. [15] considered the preferences of decision makers and studied threat assessment methods with unknown target attribute weights.
In order to overcome the problem of threat assessment methods relying too much on expert knowledge, Xiao et al. [16] proposed an air target threat assessment method based on intuitionistic fuzzy hierarchical analytic processes. In [17], Zhang et al. used intuitionistic fuzzy entropy to calculate attribute weights and constructed a target threat assessment model. In the context of intuitionistic fuzzy multi-attribute decision-making, [18] proposed a target threat assessment method based on tripartite decision-making.
The above methods are all useful attempts to combine fuzzy set theory with multi-attribute decision-making theory. However, for missile defense warfare with dynamic, time-sensitive, and strong antagonism, the existing threat assessment methods still have a number of shortcomings. First, due to the missile defense combat environment, the high complexity, and the limitations of sensor detection performance, the battlefield information present is incomplete and uncertain. The multi-attribute group decision-making method based on intuitionistic fuzzy sets uses a certain “point value” to represent the assessment data, which will lead to the excessive deviation between the assessment result and objective reality. Therefore, in the threat assessment of ballistic targets, it is necessary to expand the point value data into interval-valued intuitionistic fuzzy numbers, and to smooth the detection data parameters to control the error within a certain range in order to improve the accuracy and reliability of the threat assessment. Second, although a large number of interval-valued intuitionistic fuzzy operators [19] have been proposed in recent years, and most of them are defined in the traditional interval-valued intuitionistic fuzzy operation rules, they ignore the relationship between aggregated data when performing information fusion. Because of this, there will be results contrary to intuitive analysis and the ambiguous nature of the complex battlefield will not be meticulously and flexibly reflected. Third, most of the literature [1,2,3,4,5,6,7,14,15,16] only focuses on the information in the current moment when conducting the threat assessment, ignoring the timing of target information, making it difficult to obtain objective and comprehensive threat assessment results. Fourth, although the existing interval-valued intuitionistic fuzzy entropy has various forms [20,21,22], when the deviation of the degree of membership and the degree of non-membership is equal there is inconsistency with the intuitive facts.
Based on the above analysis, the contributions of the work in this paper are as follows: (1) Based on a new interval-valued intuitionistic fuzzy operation rules that retain the properties of classical algebra, the new interval-valued intuitionistic fuzzy arithmetic weighted average (IVIFWAA) operator and the interval-valued intuitionistic fuzzy geometric weighted average (IVIFWGA) operator are proposed to perform nonlinear aggregation operation on interval intuitionistic fuzzy numbers. (2) The threat assessment index system for typical missile defense combat elements is constructed, and the interval-valued intuitionistic fuzzy entropy based on cosine function (IVIFECF) is proposed to solve the problem of inconsistency with intuitive facts when the deviation between membership and non-membership are equal. (3) Considering the objective, subjective and time series weights, a comprehensive weight model of target attributes based on IVIFECF is constructed to process multi-time situation information. (4) An ordering method of interval-valued intuitionistic fuzzy numbers based on improved TOPSIS is proposed to improve the discrimination ability between decision-making results. (5) The evaluation model based on IVIFEC-IVIFWA-TOPSIS is constructed by aggregating the multi-target attributes and multi-expert decision-making information multiple times, which improves the reliability and accuracy of missile defense target threat evaluation.
We conclude this section by outlining the remainder of the article. Section 2 introduces the related concepts of interval-valued intuitionistic fuzzy sets(IVIFSs). Section 3 defines new interval-valued intuitionistic fuzzy operation rules. Section 4 defines new interval-valued intuitionistic fuzzy weighted average operators and proves their algebraic properties. In Section 5, we present a missile defense dynamic multi-time fusion target threat assessment method based on IVIFECF-IVIFWA-TOPSIS. Numerical examples and an analysis of the performance of the proposed algorithm are given in Section 6. We summarize the results and provide conclusions in the seventh part.

2. Preliminaries

2.1. Interval-Valued Intuitionistic Fuzzy Sets

Definition 1. [23]. 
Let X = { x 1 , x 2 , , x n } be a non-empty set. Given X, the interval-valued intuitionistic fuzzy set A ˜ can be represented as
A ˜ = < x , μ ˜ A ˜ ( x ) , v ˜ A ˜ ( x ) > x X
where μ ˜ A ˜ ( x ) [ 0 , 1 ] and v ˜ A ˜ ( x ) [ 0 , 1 ] are the A ˜ membership and non-membership intervals, respectively associated with x in X , Further, for any x X , the condition 0 sup μ ˜ A ˜ ( x ) + sup v ˜ A ˜ ( x ) 1 is satisfied. For ease of explanation, the interval-valued intuitionistic fuzzy set can be written as:
A ˜ = < x , [ μ A ˜ L ( x ) , μ A ˜ U ( x ) ] , [ v A ˜ L ( x ) , v A ˜ U ( x ) ] > x X
where μ A ˜ U ( x ) + v A ˜ U ( x ) 1 , μ A ˜ L ( x ) 0 , v A ˜ L ( x ) 0 .
The intuitionistic fuzzy interval can be expressed as
π ˜ A ˜ ( x ) = 1 μ ˜ A ˜ ( x ) v ˜ A ˜ ( x ) = [ 1 μ A ˜ U ( x ) v A ˜ U ( x ) , 1 μ A ˜ L ( x ) v A ˜ L ( x ) ]
Generally, the ordered pair ( [ μ A ˜ L ( x ) , μ A ˜ U ( x ) ] , [ v A ˜ L ( x ) , v A ˜ U ( x ) ] ) formed by the degree of membership interval [ μ A ˜ L ( x ) , μ A ˜ U ( x ) ] and non-membership interval [ v A ˜ L ( x ) , v A ˜ U ( x ) ] for x in  X of A ˜ is called an interval-valued intuitionistic fuzzy number. For convenience, let IVIFS(X) be the interval-valued intuitionistic fuzzy set on the domain, X ; ( [ a , b ] , [ c , d ] ) is the interval-valued intuitionistic fuzzy number, where [ a , b ] [ 0 , 1 ] , [ c , d ] [ 0 , 1 ] and b + d 1 .
Definition 2. [24]. 
Let A ˜ ,   B ˜ I V I F S ( X ) , then
(1)
A ˜   B ˜  if and only if  μ A ˜ L ( x ) μ B ˜ L ( x ) μ A ˜ U ( x ) μ B ˜ U ( x ) v A ˜ L ( x ) v B ˜ L ( x ) v A ˜ U ( x ) v B ˜ U ( x ) , x X
(2)
A ˜ =   B ˜  if and only if  A ˜   B ˜ and,  B ˜   A ˜ x X
(3)
A ˜ C = { < x , [ v A ˜ L ( x ) , v A ˜ U ( x ) ] , [ μ A ˜ L ( x ) , μ A ˜ U ( x ) ] > x X }
Definition 3. [24]. 
Let α ˜ i = ( [ a i , b i ] , [ c i , d i ] )     ( i = 1 , 2 , n )  be a set of interval-valued intuitionistic fuzzy numbers,  ω i  be the weight of  α ˜ i , with  ω i [ 0 , 1 ] and  i = 1 n ω i = 1 . Then, the interval-valued intuitionistic fuzzy weighted average operator IFWAA:  Θ ˜ n Θ ˜ and the interval-valued intuitionistic fuzzy weighted geometric operator IIFWG: Θ ˜ n Θ ˜ are respectively: 
IIFWA ( α ˜ 1 , α ˜ 2 , , α ˜ n ) = 1 i = 1 n ( 1 a i ) ω i , 1 i = 1 n ( 1 b i ) ω i   ,       i = 1 n c i ω i , i = 1 n d i ω i
I I F W G ( α ˜ 1 , α ˜ 2 , , α ˜ n ) = i = 1 n a i ω i , i = 1 n b i ω i ,           1 i = 1 n ( 1 c i ) ω i , 1 i = 1 n ( 1 d i ) ω i

2.2. The Order of Interval-Valued Intuitionistic Fuzzy Numbers

The aggregated result of interval-valued intuitionistic fuzzy information is still an interval-valued intuitionistic fuzzy number, so the ordering of interval-valued intuitionistic fuzzy numbers is of great significance to fuzzy decision-making. The score function and the exact function are classic methods to realize the ordering of interval-valued intuitionistic fuzzy numbers.
Definition 4. [24]. 
Let α ˜ 1 = ( [ a 1 , b 1 ] , [ c 1 , d 1 ] )  and  α ˜ 2 = ( [ a 2 , b 2 ] ,   [ c 2 , d 2 ] )  be any two interval-valued intuitionistic fuzzy numbers. The score functions of  α ˜ 1 α ˜ 2  are expressed as  s ( α ˜ 1 ) = ( a 1 c 1 + b 1 d 1 ) / 2  and  s ( α ˜ 2 ) =   ( a 2 c 2 + b 2 d 2 ) / 2 , respectively; the exact functions of  α ˜ 1 α ˜ 2  are expressed as  h ( α ˜ 1 )   h ( α ˜ 1 ) = ( a 1 + c 1 + b 1 + d 1 ) / 2  and  h ( α ˜ 2 ) = ( a 2 + c 2 + b 2 + d 2 ) / 2 , respectively, then: 
(1)
If  s ( α ˜ 1 ) < s ( α ˜ 2 ) , then  α ˜ 1 < α ˜ 2 ;
(2)
If  s ( α ˜ 1 ) = s ( α ˜ 2 ) , thenIf h ( α ˜ 1 ) < h ( α ˜ 2 ) , then  α ˜ 1 < α ˜ 2 ;If h ( α ˜ 1 ) = h ( α ˜ 2 ) , then  α ˜ 1 α ˜ 2 .

3. New Operations of Interval-Valued Intuitionistic Fuzzy Numbers

Definition 5. [23]. 
Let α ˜ = ( [ a , b ] , [ c , d ] ) α ˜ 1 = ( [ a 1 , b 1 ] , [ c 1 , d 1 ] )  and  α ˜ 2 = ( [ a 2 , b 2 ] , [ c 2 , d 2 ] )  be interval-valued intuitionistic fuzzy numbers, then 
(1) 
α ˜ 1 + α ˜ 2 = ( [ a 1 + a 2 a 1 a 2 , b 1 + b 2 b 1 b 2 ] , [ c 1 c 2 , d 1 d 2 ] )
(2) 
α ˜ 1 α ˜ 2 = ( [ a 1 a 2 , b 1 b 2 ] , [ c 1 + c 2 c 1 c 2 , d 1 + d 2 d 1 d 2 ] )
(3) 
λ α ˜ = ( [ 1 ( 1 a ) λ , 1 ( 1 b ) λ ] , [ c λ , d λ ] )
(4) 
α ˜ λ = ( [ a λ , b λ ] , [ 1 ( 1 c ) λ , 1 ( 1 d ) λ ] )
Definition 5 gives the basic rules of interval-valued intuitionistic fuzzy operations. Based on these operating rules, a large number of interval-valued intuitionistic fuzzy aggregation operations can be defined. It should be noted though that the rules for aggregation of interval-valued intuitionistic fuzzy information are not unique. At present, the operation rules based on the Einstein t-norm and the interactive operation rules based on the degree of membership and non-membership have been successively proposed [25,26,27] and used to solve the problem of interval-valued intuitionistic fuzzy multi-attribute decision-making. However, the relationship between new operations and classic operations is not clear. Some interactive operations lack the algebraic properties of classic operations, which has an impact on decision analysis. Therefore, this paper proposes a new interval-valued intuitionistic fuzzy operation rule based on algebraic operations and analyzes its operational characteristics in depth.
Definition 6. 
Let α ˜ 1 = ( [ a 1 , b 1 ] , [ c 1 , d 1 ] ) and α ˜ 2 = ( [ a 2 , b 2 ] , [ c 2 , d 2 ] ) be any two interval-valued intuitionistic fuzzy numbers and respectively define the addition operation “  ” and multiplication operation “ ” as 
α ˜ 1 α ˜ 2 = a 1 + a 2 2 a 1 a 2 1 a 1 a 2 , b 1 + b 2 2 b 1 b 2 1 b 1 b 2 ,     c 1 c 2 c 1 + c 2 c 1 c 2 , d 1 d 2 d 1 + d 2 d 1 d 2
α ˜ 1 α ˜ 2 = a 1 a 2 a 1 + a 2 a 1 a 2 , b 1 b 2 b 1 + b 2 b 1 b 2 ,           c 1 + c 2 2 c 1 c 2 1 c 1 c 2 , d 1 + d 2 2 d 1 d 2 1 d 1 d 2
Explanation 1. 
For functions f ( x , y ) = x + y 2 x y 1 x y and g ( x , y ) = x y x + y x y , we can obtain
g ( x , y ) = 1 f ( 1 x , 1 y ) f ( x , y ) = 1 g ( 1 x , 1 y )
Therefore, Definition 6 can be expressed as
α ˜ 1 α ˜ 2 = f a 1 , a 2 , f b 1 , b 2 ,       1 f 1 c 1 , 1 c 2 , 1 f 1 d 1 , 1 d 2
α ˜ 1 α ˜ 2 = g a 1 , a 2 , g b 1 , b 2 ,   1 g 1 c 1 , 1 c 2 , 1 g 1 d 1 , 1 d 2
Explanation 2. 
The behavior of the functions f ( x , y ) = x + y 2 x y 1 x y and g ( x , y ) = x y x + y x y where x = y = 1 and x = y = 0 , respectively are not significant. Because lim ( x , y ) ( 1 , 1 ) f ( x , y ) = 1 , lim ( x , y ) ( 0 , 0 ) g ( x , y ) = 0 , we can define
0 , 0 , 1 , 1 0 , 0 , 1 , 1 = 0 , 0 , 1 , 1 1 , 1 , 0 , 0 1 , 1 , 0 , 0 = 1 , 1 , 0 , 0
Theorem 1. 
Given the interval-valued intuitionistic fuzzy numbers  α ˜ 1 = ( [ a 1 , b 1 ] ,   [ c 1 , d 1 ] )  and  α ˜ 2 = ( [ a 2 , b 2 ] , [ c 2 , d 2 ] ) , we can obtain 
α ˜ 1 α ˜ 2 = α ˜ 1 C α ˜ 2 C C , α ˜ 1 α ˜ 2 = α ˜ 1 C α ˜ 2 C C
where α ˜ 1 C = ( [ c 1 , d 1 ] , [ a 1 , b 1 ] ) α ˜ 2 C = ( [ c 2 , d 2 ] , [ a 2 , b 2 ] ) .
Proof of Theorem 1: 
By Definition 6 we obtain: 
α ˜ 1 C α ˜ 2 C = c 1 + c 2 2 c 1 c 2 1 c 1 c 2 , d 1 + d 2 2 d 1 d 2 1 d 1 d 2 ,   a 1 a 2 a 1 + a 2 a 1 a 2 , b 1 b 2 b 1 + b 2 b 1 b 2
Then, it follows that:
α ˜ 1 C α ˜ 2 C C = a 1 a 2 a 1 + a 2 a 1 a 2 , b 1 b 2 b 1 + b 2 b 1 b 2 , c 1 + c 2 2 c 1 c 2 1 c 1 c 2 , d 1 + d 2 2 d 1 d 2 1 d 1 d 2 = α ˜ 1 α ˜ 2
Therefore: α ˜ 1 α ˜ 2 = α ˜ 1 C α ˜ 2 C C .
By the same logic: α ˜ 1 α ˜ 2 = α ˜ 1 C α ˜ 2 C C , which completes the proof. □
Theorem 2. 
For the interval-valued intuitionistic fuzzy number α ˜ = ( [ a , b ] , [ c , d ] ) , we can obtain
n α ˜ = α ˜ α ˜ α ˜ n = n a 1 + ( n 1 ) a , n b 1 + ( n 1 ) b ,     c n n 1 c , d n n 1 d
Proof of Theorem 2: 
We employ mathematical induction to prove the result as follows:
(1)
When n = 2
α ˜ α ˜ = 2 a ( 1 a ) 1 a 2 , 2 b ( 1 b ) 1 b 2 ,     c 2 c ( 2 c ) , d 2 d ( 2 d ) = 2 a 1 + ( 2 1 ) a , 2 b 1 + ( 2 1 ) b , c 2 ( 2 1 ) c , d 2 ( 2 1 ) d  
Hence, when n = 2 the result holds.
(2)
Let n = m, and assume
m α ˜ = α ˜ α ˜ α ˜ m = m a 1 + ( m 1 ) a , m b 1 + ( m 1 ) b ,     c m m 1 c , d m m 1 d
Then, it follows that
( m + 1 ) α ˜ = m α ˜ α ˜ = m + 1 a 1 + m a , m + 1 b 1 + m b , c m + 1 m c , d m + 1 m d = m + 1 a 1 + m + 1 1 a , m + 1 b 1 + m + 1 1 b , c m + 1 m + 1 1 c , d m + 1 m + 1 1
Letting n = m + 1 , we obtain:
n α ˜ = α ˜ α ˜ α ˜ n = n a 1 + ( n 1 ) a , n b 1 + ( n 1 ) b ,     c n n 1 c , d n n 1 d
This completes the proof. □
Theorem 3. 
For the interval-valued intuitionistic fuzzy number  α ˜ = ( [ a , b ] , [ c , d ] ) . α ˜ n = α ˜ α ˜ α ˜ n = a n ( n 1 ) a , b n ( n 1 ) b ,     n c 1 + n 1 c , n d 1 + n 1 d .
Proof of Theorem 3: 
By Theorems 1 and 2 we obtain
α ˜ n = α ˜ α ˜ α ˜ n = α ˜ C α ˜ C α ˜ C n C = n c 1 + ( n 1 ) c , n d 1 + ( n 1 ) d ,     a n n 1 a , b n n 1 b C = a n n 1 a , b n n 1 b , n c 1 + n 1 c , n d 1 + n 1 d
This completes the proof. □
By extending Theorems 2 and 3 to any non-negative real number λ 0 , a new interval-valued intuitionistic fuzzy operation rule can be obtained, as shown in Definition 7.
Definition 7. 
For interval-valued intuitionistic fuzzy numbers α ˜ = ( [ a , b ] , [ c , d ] ) and real numbers  λ 0 , we can define the following operations: 
λ α ˜ = λ a 1 + λ 1 a , λ b 1 + λ 1 b , c λ λ 1 c , d λ λ 1 d
α ˜ λ = a λ λ 1 a , a λ λ 1 a , λ c 1 + λ 1 c , λ d 1 + λ 1 d
Explanation 3. 
When λ > 1 , the denominators are not equal to 0, so the case where 0 λ 1 needs to be focused on. Define the two functions p ( x , y ) = x y 1 + ( x 1 ) y , q ( x , y ) = y x ( x 1 ) y where 0 x 1 , 0 y 1 . We note that p ( x , y ) is undefined at (0,1) and q ( x , y ) is undefined at (0,0).
Theorem 4.  
Let α ˜ = ( [ a , b ] , [ c , d ] ) be an interval-valued intuitionistic fuzzy number and λ be a non-negative real number. Then
α ˜ λ = λ α ˜ C C , λ α ˜ = α ˜ C λ C
Proof of Theorem 4: 
Since α ˜ C = ( [ c , d ] , [ a , b ] ) , we obtain
λ α ˜ C C = λ c 1 + λ 1 c , λ d 1 + λ 1 d , a λ λ 1 a , b λ λ 1 b C = a λ λ 1 a , b λ λ 1 b , λ c 1 + λ 1 c , λ d 1 + λ 1 d = α ˜ λ
Therefore, α ˜ λ = λ α ˜ C C
By the same logic, λ α ˜ = α ˜ C λ C
This completes the proof. □
Theorem 5.  
Let α ˜ 1 = ( [ a 1 , b 1 ] , [ c 1 , d 1 ] )  and  α ˜ 2 = ( [ a 2 , b 2 ] , [ c 1 , d 1 ]   be interval-valued intuitionistic fuzzy numbers, with  λ λ 1 , and  λ 2  being non-negative real numbers. Then, the following properties hold:
(1)
λ 1 α ˜ 1 λ 2 α ˜ 1 = λ 1 + λ 2 α ˜ 1
(2)
λ α ˜ 1 λ α ˜ 2 = λ α ˜ 1 α ˜ 2
(3)
α ˜ 1 λ 1 α ˜ 1 λ 2 = α ˜ 1 λ 1 + λ 2
(4)
α ˜ 1 λ α ˜ 2 λ = α ˜ 1 α ˜ 2 λ
(5)
λ 1 λ 2 α ˜ 1 = λ 1 λ 2 α ˜ 1
(6)
α ˜ 1 λ 1 λ 2 = α ˜ 1 λ 1 λ 2
Proof of Theorem 5: 
Theorem 5 follows trivially form Theorems 1–4.
Based on Theorem 5 we obtain
λ 1 α ˜ 1 λ n α ˜ 1 = i = 1 n λ i α ˜ 1 = i = 1 n λ i α ˜ 1   and
α ˜ 1 λ 1 α ˜ 1 λ n = i = 1 n α ˜ 1 λ i = α ˜ 1 i = 1 n λ i
In particular, if i = 1 n λ i = 1 , we obtain
λ 1 α ˜ 1 λ 2 α ˜ 1 λ n α ˜ 1 = α ˜ 1   and
α ˜ 1 λ 1 α ˜ 1 λ 2 α ˜ 1 λ n = α ˜ 1
It can be seen from Theorems 1–5 that the new interval-valued intuitionistic fuzzy operation satisfies idempotence, which is essential for the fusion of interval-valued intuitionistic fuzzy information. □

4. New Interval-Valued Intuitionistic Fuzzy Weighted Average Operator Model

Based on Theorems 1–5, new interval-valued intuitionistic fuzzy aggregation operations can be defined, and new models of interval-valued intuitionistic fuzzy weighted arithmetic averaging (IVIFWAA) operators and interval-valued intuitionistic fuzzy weighted geometric averaging (IVIFWGA) operators can be proposed.

4.1. Interval-Valued Intuitionistic Fuzzy Arithmetic Weighted Average Operator

Definition 8.  
Let α ˜ i = ( [ a i , b i ] , [ c i , d i ] )     ( i = 1 , 2 , n )  be a set of interval-valued intuitionistic fuzzy numbers, and  ω i  be the weight of  α ˜ i , with  ω i [ 0 , 1 ] , and  i = 1 n ω i = 1 . If the map IVIFWAA:  Θ ˜ n Θ ˜  satisfies 
IVIFWAA ( α ˜ 1 , α ˜ 2 , , α ˜ n ) = ω 1 α ˜ 1 ω 2 α ˜ 2 ω n α ˜ n
Then, IVIFWAA is an interval-valued intuitionistic fuzzy arithmetic weighted average operator.
In particular, when ω = 1 / n , 1 / n , , 1 / n T , then we obtain
IVIFWAA α ˜ 1 , α ˜ 2 , , α ˜ n = 1 n α ˜ 1 1 n α ˜ 2 1 n α ˜ n
By Theorem 5 we obtain
IVIFWAA α ˜ 1 , α ˜ 2 , , α ˜ n = 1 n α ˜ 1 α ˜ 2 α ˜ n
Theorem 6. 
Let α ˜ i = ( [ a i , b i ] , [ c i , d i ] )     ( i = 1 , 2 , n )  be a set of interval-valued intuitionistic fuzzy numbers, and  ω i  be the weight of  α ˜ i , with  ω i [ 0 , 1 ] , and  i = 1 n ω i = 1 . Then  IVIFWAA α ˜ 1 , α ˜ 2 , , α ˜ n = a A n , b A n , c A n , d A n  is an interval-valued intuitionistic fuzzy number, where 
a A n = 1 i = 1 n 1 a i j = 1 n ω j i = 1 i j n 1 a i j = 1 n ω j 1 i = 1 n 1 a i
b A n = 1 i = 1 n 1 b i j = 1 n ω j i = 1 i j n 1 b i j = 1 n ω j 1 i = 1 n 1 b i
c A n = i = 1 n c i j = 1 n ω j i = 1 i j n c i j = 1 n ω j 1 i = 1 n c i
d A n = i = 1 n d i j = 1 n ω j i = 1 i j n d i j = 1 n ω j 1 i = 1 n d i
Proof of Theorem 6: 
The result follows from Definition 6 and 7. □

4.2. Interval-Valued Intuitionistic Fuzzy Geometric Weighted Average Operator

Definition 9. 
Let  α ˜ i = ( [ a i , b i ] , [ c i , d i ] )     ( i = 1 , 2 , n )  be a set of interval-valued intuitionistic fuzzy numbers, and  ω i  be the weight of  α ˜ i , with  ω i [ 0 , 1 ] , and  i = 1 n ω i = 1 . If the map IVIFWGA:  Θ ˜ n Θ ˜  satisfies 
IVIFWGA ( α ˜ 1 , α ˜ 2 , , α ˜ n ) = α ˜ 1 ω 1 α ˜ 2 ω 2 α ˜ n ω n
Then, IVIFWGA is an interval-valued intuitionistic fuzzy geometric weighted average operator.
In particular, when ω = 1 / n , 1 / n , , 1 / n T , we obtain
IVIFWGA α ˜ 1 , α ˜ 2 , , α ˜ n = α ˜ 1 1 n α ˜ 2 1 n α ˜ n 1 n
By Theorem 5 we obtain
IVIFWGA α ˜ 1 , α ˜ 2 , , α ˜ n = α ˜ 1 α ˜ 2 α ˜ n 1 n
Theorem 7. 
Let  α ˜ i = ( [ a i , b i ] , [ c i , d i ] )     ( i = 1 , 2 , n )  be a set of interval-valued intuitionistic fuzzy numbers, and  ω i  be the weights of  α ˜ i , with  ω i [ 0 , 1 ] , and  i = 1 n ω i = 1 . Then,  IVIFWGA α ˜ 1 , α ˜ 2 , , α ˜ n = a G n , b G n , c G n , d G n  is an interval-valued intuitionistic fuzzy number, where
a G n = i = 1 n a i j = 1 n ω j i = 1 i j n a i j = 1 n ω j 1 i = 1 n a i
b G n = i = 1 n b i j = 1 n ω j i = 1 i j n b i j = 1 n ω j 1 i = 1 n b i
c G n = 1 i = 1 n 1 c i j = 1 n ω j i = 1 i j n 1 c i j = 1 n ω j 1 i = 1 n 1 c i
d G n = 1 i = 1 n 1 d i j = 1 n ω j i = 1 i j n 1 d i j = 1 n ω j 1 i = 1 n 1 d i
Proof of Theorem 7: 
The result follows directly from Theorem 6.
Based on the new interval-valued intuitionistic fuzzy operation properties defined in this document, it can be deduced that IVIFWAA and IVIFWGA operators have the following properties:
(1) Idempotence
If the interval-valued intuitionistic fuzzy numbers are all α ˜ = ( [ a , b ] , [ c , d ] ) , then
IVIFWAA α ˜ , α ˜ , , α ˜ = ω 1 α ˜ ω 2 α ˜ ω n α ˜ = i = 1 n ω i α ˜ = α ˜ ;
IVIFWGA α ˜ , α ˜ , , α ˜ = α ˜ ω 1 α ˜ ω 2 α ˜ ω n = α ˜ i = 1 n ω i = α ˜
(2) Boundedness
Let   α ˜ min = min i = 1 , 2 , , n { a } , min i = 1 , 2 , , n { b } , max i = 1 , 2 , , n { c } , max i = 1 , 2 , , n { d } ,
α ˜ max = max i = 1 , 2 , , n { a } , max i = 1 , 2 , , n { b } , min i = 1 , 2 , , n { c } , min i = 1 , 2 , , n { d }
Based on basic operations of monotonicity we obtain:
α ˜ min IVIFWAA α ˜ , α ˜ , , α ˜ α ˜ max
α ˜ min IVIFWGA α ˜ , α ˜ , , α ˜ n α ˜ max
(3) Monotonicity
For the two sets of interval-valued intuitionistic fuzzy numbers α ˜ 1 , α ˜ 2 , , α ˜ n and β ˜ 1 , β ˜ 2 , , β ˜ n , if α ˜ i β ˜ i , i { 1 , 2 , , n } , then by the basic operations of monotonicity we obtain
IVIFWAA α ˜ 1 , α ˜ 2 , , α ˜ n IVIFWAA β ˜ 1 , β ˜ 2 , , β ˜ n
IVIFWGA α ˜ 1 , α ˜ 2 , , α ˜ n IVIFWGA β ˜ 1 , β ˜ 2 , , β ˜ n
(4) Commutativity
Since the new interval-valued intuitionistic fuzzy operation defined in this paper satisfies commutativity and associativity, IVIFWAA and IVIFWGA also satisfy commutativity. □

5. Missile Defense Dynamic Multi-Time Fusion Target Threat Assessment Method Based on IVIFECF-IVIFWA-TOPSIS

5.1. IVIFECF-IVIFWA-TOPSIS Assessment Model

The IVIFEC-IVIFWA-TOPSIS assessment model is an effective combination of interval-valued intuitionistic fuzzy set theory and dynamic multiple attribute group decision-making theory. First, the factors that affect the threat assessment of missile defense targets are broken down at multiple levels to establish a threat assessment index system. Then, considering the subjective and objective weights, a comprehensive weight model of target attributes based on IVIFECF is proposed, and the Poisson distribution method is used to solve the weights of the time series to process multi-time situation information. Furthermore, in order to reflect the ambiguity of complex decision-making problems, the decision information is described by interval-valued intuitionistic fuzzy numbers, and a weighted interval-valued intuitionistic fuzzy (WIVIF) decision matrix is constructed. Next, the IVIFWAA/IVIFWGA operator is used to aggregate the decision information of multiple times and multiple decision makers, and the weight of the time series is combined to determine the dynamic multiple time fusion WIVIF decision matrix. Finally, the interval-valued intuitionistic fuzzy numbers are sorted based on the improved TOPSIS method and the threat assessment results are obtained. The flowchart of the IVIFECF-IVIFWA-TOPSIS assessment model is shown in Figure 1.

5.2. Description of the Problem

The missile defense dynamic fusion target threat assessment is based on multiple experts quantifying, evaluating, and sorting the attribute values of each incoming target at multiple moments to provide a basis for firepower allocation; that is, a typical dynamic multi-attribute group decision-making problem. Each threat target can be regarded as an alternative plan. Suppose m incoming targets form a solution set X = x i i = 1 , 2 , , m . Target information selects p time points to collect data, and we denote the time series by T = t k k = 1 , 2 , , p . Each target has n attributes, and the attribute set is denoted by C = c j j = 1 , 2 , , n . The set of decision makers is D = D s s = 1 , 2 , , q , and the weight of each decision maker is λ s , where s = 1 q λ s = 1 . The IVIF decision matrix of the decision maker D s at the moment t k is recorded as F s ( t k ) = ( f i j s ( t k ) ) m × n . That is,
F s ( t k ) = ( f i j s ( t k ) ) m × n = c 1 c 2 c n x 1 x 2 x m ( f 11 s ( t k ) f 12 s ( t k ) f 1 n s ( t k ) f 21 s ( t k ) f 22 s ( t k ) f 1 n s ( t k ) f m 1 s ( t k ) f m 2 s ( t k ) f m n s ( t k ) )
Here, f i j s ( t k ) = ( μ i j L ( s ) ( t k ) , μ i j U ( s ) ( t k ) , v i j L ( s ) ( t k ) , v i j U ( s ) ( t k ) ) is the assessment information of the decision maker D s on the target x i at the moment t k based on the attribute c j . The condition μ i j L ( s ) ( t k ) , μ i j U ( s ) ( t k ) [ 0 , 1 ] indicates that the decision maker D s determines that the target x i satisfies the membership interval of the attribute c j at the moment t k ; v i j L ( s ) ( t k ) , v i j U ( s ) ( t k ) [ 0 , 1 ] , which indicates that the decision maker D s determines that the target x i satisfies the non-membership interval of the attribute c j at the moment t k . Lastly, we note that μ i j U ( t k ) + v i j U ( t k ) 1 .

5.3. Threat Assessment Index System for Missile Defense Combat Targets

5.3.1. Construction of Threat Assessment Index System

The target characteristics of ballistic missiles can be described by a variety of indicators. Based on the detection information of the incoming ballistic target by the missile defense system sensors, this article starts with target status, target characteristics, and key characteristics, then considers the five aspects of target speed, distance, Radar Cross Section (RCS), interference intensity, and the defense capability of key areas, as secondary index threat factors to construct a missile defense combat target threat assessment index system, as shown in Figure 2.

5.3.2. Quantification of Threat Assessment Indicators

With the attribute characteristics of the target group of ballistic missiles and the types of assessment indicators in mind, this paper uses a semi-S-shaped distribution, a semi-Z-shaped distribution and the G. A. Miller 9-level theory to quantify the threat assessment indicators.
(1) Target distance, RCS attributes
The closer the distance between the target and our defense point, the shorter the time to reach the axis of the route shortcut of our position, and, therefore, the greater the threat of the target. RCS is used as an indicator of stealth performance, the smaller the target RCS, the more likely the radar will find the target, and the greater the threat of the target. Therefore, the target distance and RCS attributes obey the semi-S-shaped distribution. The solution methods of membership and non-membership are shown in Equation (9) and Equation (10), respectively.
μ ( x ) = 1 , x a b x b a , a < x b 0 , b < x
v ( x ) = 0 , x a 2     x a b a 2 , a < x a + b 2 1 2       x a b a 2 , a + b 2 < x b 1 , b < x    
(2) Target speed attribute
Flight speed is an important attribute of the target. The faster the flight speed, the smaller the interception time window, and the greater the threat to our strategic location. Thus, the target speed obeys the semi-Z-shaped distribution. Its membership and non-membership degree solution methods are shown in Equation (11) and Equation (12), respectively.
μ ( x ) = 0 , x a x a b a , a < x b 1 , b < x
v ( x ) = 1 , x a 1 2     x a b a 2 , a < x a + b 2 2       x a b a 2 , a + b 2 < x b 0 , b < x
(3) Target interference intensity, key defensive ability attributes
The stronger the target interference intensity is, the stronger its penetration capability is, the more difficult it is for the missile defense system to intercept, and the greater the threat of the target. The critical defense capability is closely related to our weapon system combat capability and operational deployment. The stronger the critical defense capability, the smaller the target threat. The above two indicators are qualitative indicators, which can be described quantitatively using G. A. Miller 9-level quantification theory [13]. The corresponding relationship between the quantification results and the interval-valued intuitionistic fuzzy number is shown in Table 1.

5.4. Integrated Weight Model of Target Attributes Based on IVIFECF

In the multi-attribute group decision-making process of dynamic multi-time fusion target threat assessment involving multiple decision makers, it is necessary to comprehensively consider the objective weights caused by the differences in the attributes of the targets and the subjective weights caused by the decision maker’s subjective experience and knowledge structure to determine the comprehensive weight of target attributes.
The decision entropy method is a typical objective weight determination method, which can indicate the relative importance of target attributes. The smaller the interval-valued intuitionistic fuzzy entropy, the greater the uncertainty of the information, and the larger the weight of the corresponding solution should be. For existing methods for measuring interval-valued intuitionistic fuzzy entropy when the deviation of the degree of membership and the degree of non-membership are equal, there is inconsistency with the intuitive facts [20,21]. To overcome this problem, this paper proposes an integrated weight model of target attributes based on IVIFECF. We define IVIFECF and verify its effectiveness below.
Definition 10. 
Let A ˜ I V I F S ( X ) , then the interval-valued intuitionistic fuzzy entropy  E A ˜  based on the cosine function can be defined as: 
E A ˜ = 1 m i = 1 m cos 1 2 μ A ˜ L ( x i ) v A ˜ L ( x i ) + μ A ˜ U ( x i ) v A ˜ U ( x i ) 2 1 + 1 2 π A ˜ L ( x i ) + π A ˜ U ( x i ) π
Theorem 8. 
Interval-valued intuitionistic fuzzy entropy E A ˜ based on the cosine function has the following properties:
(1)
E A ˜ = 0 , if and only if A ˜ is a typical set.
(2)
If x i X , μ ˜ A ( x i ) = v ˜ A ( x i ) , then E A ˜ = 1 .
(3)
x i I V I F S ( X ) , E A ˜ = E A ˜ C .
Proof of Theorem 8: 
(1)
If A ˜ is a typical set, then μ A ˜ L ( x i ) = μ A ˜ U ( x i ) = 1 , v A ˜ L ( x i ) = v A ˜ U ( x i ) = 0 and π A ˜ L ( x i ) = π A ˜ U ( x i ) = 0 ; or μ A ˜ L ( x i ) = μ A ˜ U ( x i ) = 0 , v A ˜ L ( x i ) = v A ˜ U ( x i ) = 1 and π A ˜ L ( x i ) = π A ˜ U ( x i ) = 0 . Therefore, E A ˜ = 0 .
(2)
When μ A ˜ L ( x i ) = v A ˜ L ( x i ) and μ A ˜ U ( x i ) = v A ˜ U ( x i ) , E A ˜ = 1 n i = 1 n cos 0 = 1 .
(3)
A ˜ C = v A ˜ L ( x i ) , v A ˜ U ( x i ) , μ A ˜ L ( x i ) , μ A ˜ U ( x i ) , which implies that E A ˜ = E A ˜ C . □
Example 1. 
Let A ˜ = 0.5 , 0.5 , 0.3 , 0.3 , B ˜ = 0.6 , 0.6 , 0.4 , 0.4 be two IVIFSs in the universe X . The degree of ambiguity of A ˜ is greater than that of B ˜ , which follows from Equation (13):
E A ˜ = cos 0.5 0.3 + 0.5 0.3 4 1 + 1 2 1 0.5 0.3 + 1 0.5 0.3 π = 0.966
E B ˜ = cos 0.6 0.4 + 0.6 0.4 4 1 + 1 2 1 0.6 0.4 + 1 0.6 0.4 π = 0.951
Thus, E A ˜ > E B ˜ , which is consistent with intuition.
Table 2 shows the calculation results of Example 1 with entropy of IVIFSs in reference [20] and entropy measures of IVIFSs in reference [21]. It can be seen that the interval-valued intuitionistic fuzzy entropy based on the cosine function proposed in this paper can effectively describe the uncertainty of the fuzzy set, and overcome the problem of the existing entropy method being inconsistent with intuition when the deviation of membership degree and non-membership degree is equal.
On this basis, a nonlinear programming model based on minimizing IVIFECF is established to solve the objective weights of target attributes. The steps are as follows:
Step 1: Determine the IVIF decision matrix at the moment t k :
R ( t k ) = μ i j L ( t k ) , μ i j U ( t k ) , v i j L ( t k ) , v i j U ( t k ) m × n
Step 2: Using Equation (13), calculate the target attribute interval-valued intuitionistic fuzzy entropy E j ( t k ) at the moment t k :
E j ( t k ) = 1 n i = 1 m cos 1 2 μ i j L ( t k ) v i j L ( t k ) + μ i j U ( t k ) v i j U ( t k ) 2 1 + 1 2 π i j L ( t k ) + π i j U ( t k ) π
Step 3: Establish a nonlinear programming model based on minimizing IVIFECF, as in Equation (14):
min j = 1 n ( ω j ( 1 ) ( t k ) ) 2 E j ( t k ) s . t .       j = 1 n ω j ( 1 ) ( t k ) = 1 ω j ( 1 ) ( t k ) 0
where ω j ( 1 ) ( t k ) is the weight value of the objective attribute of the target at the moment t k .
Step 4: Solve the objective attribute weight of the target ω ( 1 ) ( t k ) = ( ω 1 ( 1 ) ( t k ) , ω 2 ( 1 ) ( t k ) , , ω n ( 1 ) ( t k ) ) .
To perform this, establish a Lagrange function for Equation (14),
L ( ω , λ ) = j = 1 n ( ω j ( 1 ) ( t k ) ) 2 E j ( t k ) + 2 λ ( j = 1 n ω j ( 1 ) ( t k ) 1 )
Take the derivative with respect to ω j ( 1 ) ( t k ) and λ respectively, and set them equal to 0 to obtain
L ( ω , λ ) ω j ( 1 ) ( t k ) = 2 ω j ( 1 ) ( t k ) · E j ( t k ) + 2 λ = 0 L ( ω , λ ) λ = 2 ( j = 1 n ω j ( 1 ) ( t k ) 1 ) = 0
Solve Equation (15) to obtain the objective attribute weight of the target at the moment t k to obtain
ω j ( 1 ) ( t k ) = ( E j ( t k ) ) 1 j = 1 n ( E j ( t k ) ) 1
Step 5: Suppose the subjective attribute weight vector provided by the decision-maker D s is Ω = { ω j s ( 2 ) j = 1 , 2 , , n , s = 1 , 2 , , q } , where ω j s ( 2 ) [ 0 , 1 ] and j = 1 n ω j s ( 2 ) = 1 . We use the product rule to obtain the comprehensive weight of the target attribute of the decision-maker D s at the moment t k , as shown in Equation (17)
ω j s ( t k ) = ω j ( 1 ) ( t k ) ω j s ( 2 ) ( t k ) j = 1 m ω j ( 1 ) ( t k ) ω j s ( 2 ) ( t k )

5.5. Time Series Weight Model Based on Poisson Distribution Method

In missile defense operations, the threat level of the target will dynamically change with time and the battlefield situation. In order to improve the accuracy of target threat assessment, it is not only necessary to consider the target information at the current moment, but also to take into account different points in a time series. In actual missile defense combat, the closer to the current moment, the greater the impact of target information acquisition on the results of the threat assessment. Therefore, this paper selects the target information collected at the current time p and the previous time p 1 , and uses the Poisson distribution method to solve the time series weight η = ( η 1 , η 2 , , η p ) in the inverse form, as shown in Equation (18):
η k = k ! / φ k j = 1 m ( k ! / φ k )
where η k 0 satisfies k = 1 p η k = 0 and 0 < φ < 2 .

5.6. Multi-Source Information Aggregation Based on IVIFWAA/IVIFWGA Operators

The missile defense dynamic target threat assessment in an uncertain environment needs to be based on a comprehensive weight calculation result of the target attribute. Starting with the WIVIF decision matrix R s ( t k ) of the decision maker D s at the moment t k , we perform interval-valued intuitionistic fuzzy information aggregations on the decision information of multiple target attributes, multiple moments, and multiple experts. The IVIFWAA and IVIFWGA operators proposed in this paper have algebraic characteristics, such as idempotence, boundedness, monotonicity, and commutativity, and they have important advantages in information fusion. Therefore, this article uses IVIFWAA/IVIFWGA operators to aggregate multi-source information.
Suppose the WIVIF decision matrix of the decision maker D s at time t k is recorded as R s ( t k ) = ( r i j s ( t k ) ) m × n . That is,
R s ( t k ) = ( r i j s ( t k ) ) m × n = c 1 c 2 c n x 1 x 2 x m ( r 11 s ( t k ) r 12 s ( t k ) r 1 n s ( t k ) r 21 s ( t k ) r 22 s ( t k ) r 1 n s ( t k ) r m 1 s ( t k ) r m 2 s ( t k ) r m n s ( t k ) )
where
r i j s ( t k ) = ( [ 1 ( 1 μ i j L ( s ) ( t k ) ) ω j s ( t k ) , 1 ( 1 μ i j U ( s ) ( t k ) ) ω j s ( t k ) ] , [ v i j L ( s ) ( t k ) ω j s ( t k ) , v i j U ( s ) ( t k ) ω j s ( t k ) ] )
After determining the WIVIF decision matrix, use the IVIFWAA/IVIFWGA operator for each decision maker to aggregate the assessment results of each solution on all attributes, and then the assessment results of each decision maker for all solutions can be obtained:
R ( t k ) = ( r i s ( t k ) ) m × q = D 1 D 2 D Q x 1 x 2 x m ( r 1 1 ( t k ) r 1 2 ( t k ) r 1 q ( t k ) r 2 1 ( t k ) r 2 2 ( t k ) r 2 q ( t k ) r m 1 ( t k ) r m 2 ( t k ) r m q ( t k ) )
If we use the IVIFWAA operator for aggregation, we obtain
r i s ( t k ) = ( μ i L ( s ) ( t k ) , μ i U ( s ) ( t k ) , v i L ( s ) ( t k ) , v i U ( s ) ( t k ) ) = IVIFWAA r i 1 s ( t k ) , r i 2 s ( t k ) , , r i n s ( t k )
where
μ i L ( s ) ( t k ) = 1 j = 1 n 1 μ i j L ( s ) ( t k ) j = 1 n ω j s ( t k ) i = 1 i j n 1 μ i j L ( s ) ( t k ) j = 1 n ω j s ( t k ) 1 j = 1 n 1 μ i j L ( s ) ( t k )
μ i U ( s ) ( t k ) = 1 j = 1 n 1 μ i j U ( s ) ( t k ) j = 1 n ω j s ( t k ) i = 1 i j n 1 μ i j U ( s ) ( t k ) j = 1 n ω j s ( t k ) 1 j = 1 n 1 μ i j U ( s ) ( t k )
v i L ( s ) ( t k ) = j = 1 n v i j L ( s ) ( t k ) j = 1 n ω j s ( t k ) i = 1 i j n v i j L ( s ) ( t k ) j = 1 n ω j s ( t k ) 1 j = 1 n v i j L ( s ) ( t k )
v i U ( s ) ( t k ) = j = 1 n v i j U ( s ) ( t k ) j = 1 n ω j s ( t k ) i = 1 i j n v i j U ( s ) ( t k ) j = 1 n ω j s ( t k ) 1 j = 1 n v i j U ( s ) ( t k )
If we use the IVIFWGA operator for aggregation, we obtain:
r i s ( t k ) = ( μ i L ( s ) ( t k ) , μ i U ( s ) ( t k ) , v i L ( s ) ( t k ) , v i U ( s ) ( t k ) ) = IVIFWGA r i 1 s ( t k ) , r i 2 s ( t k ) , , r i n s ( t k )
where
μ i L ( s ) ( t k ) = j = 1 n μ i j L ( s ) ( t k ) j = 1 n ω j s ( t k ) i = 1 i j n μ i j L ( s ) ( t k ) j = 1 n ω j s ( t k ) 1 j = 1 n μ i j L ( s ) ( t k )
μ i U ( s ) ( t k ) = j = 1 n μ i j U ( s ) ( t k ) j = 1 n ω j s ( t k ) i = 1 i j n μ i j U ( s ) ( t k ) j = 1 n ω j s ( t k ) 1 j = 1 n μ i j U ( s ) ( t k )
v i L ( s ) ( t k ) = 1 j = 1 n 1 v i j L ( s ) ( t k ) j = 1 n ω j s ( t k ) i = 1 i j n 1 v i j L ( s ) ( t k ) j = 1 n ω j s ( t k ) 1 j = 1 n 1 v i j L ( s ) ( t k )
v i U ( s ) ( t k ) = 1 j = 1 n 1 v i j U ( s ) ( t k ) j = 1 n ω j s ( t k ) i = 1 i j n 1 v i j U ( s ) ( t k ) j = 1 n ω j s ( t k ) 1 j = 1 n 1 v i j U ( s ) ( t k )
Furthermore, the IVIFWAA/IVIFWGA operator is used to aggregate the assessment results of all decision makers in the same solution, and Z i ( i = 1 , 2 , , m ) is used to represent the final assessment result of the solution X i .
If we use the IVIFWAA operator for aggregation, we obtain
Z i ( t k ) = ( μ i L ( t k ) , μ i U ( t k ) , v i L ( t k ) , v i U ( t k ) ) = IVIFWAA r i 1 ( t k ) , r i 2 ( t k ) , , r i q ( t k )
where
μ i L ( t k ) = 1 s = 1 q 1 μ i L ( s ) ( t k ) j = 1 q λ j s = 1 j s q 1 μ i L ( s ) ( t k ) s = 1 q λ s 1 s = 1 q 1 μ i L ( s ) ( t k )
μ i U ( t k ) = 1 s = 1 q 1 μ i U ( s ) ( t k ) j = 1 q λ j s = 1 j s q 1 μ i U ( s ) ( t k ) s = 1 q λ s 1 s = 1 q 1 μ i U ( s ) ( t k )
v i L ( t k ) = s = 1 q v i L ( s ) ( t k ) j = 1 q λ j s = 1 s j q v i L ( s ) ( t k ) s = 1 q λ s 1 s = 1 q v i L ( s ) ( t k )
v i U ( t k ) = s = 1 q v i U ( s ) ( t k ) j = 1 q λ j s = 1 s j q v i U ( s ) ( t k ) s = 1 q λ s 1 s = 1 q v i U ( s ) ( t k )
If we use the IVIFWGA operator for aggregation, we obtain
Z i ( t k ) = ( μ i L ( t k ) , μ i U ( t k ) , v i L ( t k ) , v i U ( t k ) ) = IVIFWGA r i 1 ( t k ) , r i 2 ( t k ) , , r i q ( t k )
where
μ i L ( t k ) = s = 1 q μ i L ( s ) ( t k ) j = 1 q λ j s = 1 s j q μ i L ( s ) ( t k ) s = 1 q λ s 1 s = 1 q μ i L ( s ) ( t k )
μ i U ( t k ) = s = 1 q μ i U ( s ) ( t k ) j = 1 q λ j s = 1 s j q μ i U ( s ) ( t k ) s = 1 q λ s 1 s = 1 q μ i U ( s ) ( t k )
v i L ( t k ) = 1 s = 1 q 1 v i L ( s ) ( t k ) j = 1 q λ j s = 1 j s q 1 v i L ( s ) ( t k ) s = 1 q λ s 1 s = 1 q 1 v i L ( s ) ( t k )
v i U ( t k ) = 1 s = 1 q 1 v i U ( s ) ( t k ) j = 1 q λ j s = 1 j s q 1 v i U ( s ) ( t k ) s = 1 q λ s 1 s = 1 q 1 v i U ( s ) ( t k )
Using Equations (20)–(35), multi-target attributes, multi-decision makers, and multi-time interval-valued intuitionistic fuzzy information aggregation can be realized, laying the foundation for dynamic fusion target threat assessment.

5.7. Ordering Method of Interval-Valued Intuitionistic Fuzzy Numbers Based on Improved TOPSIS

The data obtained from aggregation using the IVIFWAA/IVIFWGA operator are still interval-valued intuitionistic fuzzy numbers. Thus, to obtain the threat ordering of the incoming target, it is necessary to compare the magnitudes of the interval-valued intuitionistic fuzzy numbers. Tan et al. [28] verifies that the interval-valued intuitionistic fuzzy number ordering method based on TOPSIS is highly useful for classification. In order to improve the ability to distinguish and differentiate between decision-making results, this paper, based on results in [28], considers the influence of hesitation on distance measurement and proposes an improved interval-valued intuitionistic fuzzy number distance measurement model.
Definition 11. 
Let α ˜ = ( [ a 1 , b 1 ] , [ c 1 , d 1 ] )     , β ˜ = ( [ a 2 , b 2 ] ,     [ c 2 , d 2 ] )  be two interval-valued intuitionistic fuzzy numbers. The improved interval-valued intuitionistic fuzzy number distance measurement model can be defined as
d ( α ˜ , β ˜ ) =   1 4 [ ( a 1 a 2 ) 2 + ( b 1 b 2 ) 2 + ( c 1 c 2 ) 2 + ( d 1 d 2 ) 2 + ( a 1 + c 1 a 2 c 2 ) 2   + ( b 1 + d 1 b 2 d 2 ) 2 ]
In the dynamic multi-time fusion WIVIF decision matrix H = ( μ i k L , μ i k U , v i k L , v i k U ) m × p , the positive ideal solution is the solution with the greatest threat degree among all targets, and the negative ideal solution is the solution with the least threat degree.
The positive ideal solution of H is
h + = ( [ μ 1 L + , μ 1 U + ] , [ v 1 L + , v 1 U + ]   ) , ( [ μ 2 L + , μ 2 U + ] ,   [ v 2 L + , v 2 U + ] ) , ,     ( [ μ p L + , μ p U + ] , [ v p L + , v p U + ]   )
where
μ k L + = max 1 i m μ i k L , μ k U + = max 1 i m μ i k U , v k L + = min 1 i m v i k L , v k U + = min 1 i m v i k U
The negative ideal solution of H is
h = ( [ μ 1 L , μ 1 U ] , [ v 1 L , v 1 U ]   ) , ( [ μ 2 L , μ 2 U ] ,   [ v 2 L , v 2 U ] ) , ,         ( [ μ p L , μ p U ] , [ v p L , v p U ]   )
where
μ k L = min 1 i m μ i k L , μ k U = min 1 i m μ i k U , v k L = max 1 i m v i k L , v k U = max 1 i m v i k U
According to Definition (11), the respective distances between each target xi and the positive and negative ideal solutions of the dynamic multi-time fusion WIVIF decision matrix are d i + = d ( h ˜ i , h + ) and d i = d ( h ˜ i , h ) , as shown below:
d i + = k = 1 p 1 4 [ ( μ i k L μ k L + ) 2 + ( μ i k U μ k U + ) 2 + ( v i k L v k L + ) 2 + ( v i k U v k U + ) 2 + ( μ i k L + v i k L μ k L + v k L + ) 2   + ( μ i k U + v i k U μ k U + v k U + ) 2 ]
d i = k = 1 p 1 4 [ ( μ i k L μ k L ) 2 + ( μ i k U μ k U ) 2 + ( v i k L v k L ) 2 + ( v i k U v k U ) 2 + ( μ i k L + v i k L μ k L v k L ) 2   + ( μ i k U + v i k U μ k U v k U ) 2 ]
Based on the TOPSIS principle, the relative closeness of the target xi is the threat of the target, as shown below:
ζ i = d i d i + d i +

5.8. Algorithm Flow

The specific steps of the missile defense dynamic fusion target threat assessment method based on IVIFECF-IVIFWA-TOPSIS are as follows:
Step 1: Construct a threat assessment index system and use Equations (9)–(12) to quantify each threat assessment index.
Step 2: Calculate the comprehensive weight ω s ( t k ) = ( ω 1 s ( t k ) , ω 2 s ( t k ) , , ω n s ( t k ) ) of the target attribute of the decision maker D s at the moment t k according to Equations (13)–(17).
Step 3: Calculate the WIVIF decision matrix R s ( t k ) = ( r i j s ( t k ) ) m × n of the decision maker D s at the moment t k according to Equation (19).
Step 4: Use the IVIFWAA/IVIFWGA operator to aggregate the assessment results of each solution for each attribute and calculate the WIVIF decision matrix R ( t k ) = ( r i s ( t k ) ) m × q of all decision makers at the moment t k according to Equations (20)–(27).
Step 5: Use the IVIFWAA/IVIFWGA operator to aggregate the decision information of q decision makers and obtain the intuitionistic fuzzy value Z i ( t k ) of the target interval at a single moment according to Equations (28)–(35).
Step 6: Determine the weight η = ( η 1 , η 2 , , η p ) of the time series according to Equation (18) and construct a dynamic multi-time fusion WIVIF matrix H = [ h i k ] m × p from time t 1 to t p , where h i k = η k Z i ( t k ) .
Step 7: Obtain H = [ h i k ] m × p positive and negative ideal solutions, and calculate the distances d i + and d i between the target x i and the H positive and negative ideal solutions, as well as the degree of threat ζ i according to Equations (36)–(38), to obtain the final threat assessment result of the target.

6. Simulation and Result Analysis

Suppose that in a certain missile defense exercise, the sensors of the missile defense system observed four batches of incoming targets x i ( i = 1 , 2 , 3 , 4 ) . After obtaining the attribute data in the form of the interval values of the target at three consecutive times t k ( k = 1 , 2 , 3 ) , three experts D s ( s = 1 , 2 , 3 ) are assigned to determine the five attributes c j = ( j = 1 , 2 , 3 , 4 , 5 ) of speed, distance, RCS, interference strength, and defense capability so that the target threat degree can be evaluated.

6.1. Algorithm Feasibility Test and Analysis

Step 1: Use Equations (9)–(12) to quantify each threat assessment index, and apply the method proposed in [29] to convert the interval value into an interval-valued intuitionistic fuzzy value, as shown in Table 3.
Step 2: Solve the comprehensive weight of the target attribute based on IVIFECF. First, the interval intuitionistic fuzzy entropy of each target speed attributes at t 1 is calculated according to Equation (13).
E 1 ( t 1 ) = cos 1 2 0.52 0.37 + 0.55 0.41 2 1 + 1 2 1 0.52 0.37 + 1 0.55 0.41 π = 0.9776
E 2 ( t 1 ) = cos 1 2 0.44 0.48 + 0.49 0.5 2 1 + 1 2 1 0.44 0.48 + 1 0.49 0.5 π = 0.9992
E 3 ( t 1 ) = cos 1 2 0.47 0.36 + 0.53 0.42 2 1 + 1 2 1 0.47 0.36 + 1 0.53 0.42 π = 0.9879
E 4 ( t 1 ) = cos 1 2 0.56 0.27 + 0.62 0.38 2 1 + 1 2 1 0.56 0.27 + 1 0.62 0.38 π = 0.9273
E ( t 1 ) = 1 4 i = 1 4 ( 0.9776 + 0.9992 + 0.9879 + 0.9273 ) = 0.9730
Then, the interval intuitionistic fuzzy entropy of each attribute of the target at t 1 t 3 is shown in Table 4.
By Equation (16), the objective weights of the target attributes at t 1 t 3 are:
ω ( 1 ) ( t 1 ) = ( 0.1784 , 0.1991 , 0.2466 , 0.1907 , 0.1852 )
ω ( 1 ) ( t 2 ) = ( 0.1642 , 0.1901 , 0.2646 , 0.2065 , 0.1746 )
ω ( 1 ) ( t 3 ) = ( 0.1483 , 0.1987 , 0.2503 , 0.2245 , 0.1782 )  
Suppose the weights of the three experts participating in decision-making D 1 , D 2 , D 3 are respectively λ = ( 0.33 , 0.34 , 0.33 ) , and the subjective weights of the target attributes given by the decision-makers D 1 , D 2 , D 3 are, respectively:
ω 1 ( 2 ) = [ 0.26 , 0.28 , 0.16 , 0.20 , 0.10 ]
ω 2 ( 2 ) = [ 0.23 , 0.30 , 0.12 , 0.17 , 0.08 ]
ω 3 ( 2 ) = [ 0.31 , 0.20 , 0.17 , 0.18 , 0.14 ]
After obtaining the objective and subjective weights of the target attributes from t 1 t 3 , the comprehensive weights of the target attributes of experts D 1 , D 2 , D 3 at t 1 t 3 can be obtained by Equation (17):
ω 1 ( t 1 ) = ( 0.2340 , 0.2812 , 0.1990 , 0.1924 , 0.0934 )
ω 2 ( t 1 ) = ( 0.2311 , 0.3363 , 0.1666 , 0.1826 , 0.0834 )
ω 3 ( t 1 ) = ( 0.2803 , 0.2018 , 0.2125 , 0.1740 , 0.1314 )
ω 1 ( t 2 ) = ( 0.2167 , 0.2702 , 0.2149 , 0.2096 , 0.0886 )
ω 2 ( t 2 ) = ( 0.2151 , 0.3247 , 0.1808 , 0.1999 , 0.0795 )
ω 3 ( t 2 ) = ( 0.2603 , 0.1945 , 0.2301 , 0.1901 , 0.1250 )
ω 1 ( t 3 ) = ( 0.1958 , 0.2825 , 0.2033 , 0.2280 , 0.0904 )
ω 2 ( t 3 ) = ( 0.1936 , 0.3384 , 0.1705 , 0.2166 , 0.0809 )
ω 3 ( t 3 ) = ( 0.2375 , 0.2052 , 0.2198 , 0.2087 , 0.1288 )
Step 3: Using Equation (19), we obtain the WIVIF decision matrix R s ( t k ) of experts D 1 , D 2 , D 3 at t 1 t 3 .
R 1 ( t 1 ) = c 1 c 2 c 3 c 4 c 5 x 1 x 2 x 3 x 4 ( ( [ 0.16 , 0.17 ] , [ 0.79 , 0.81 ] ) ( [ 0.26 , 0.28 ] , [ 0.67 , 0.70 ] ) ( [ 0.21 , 0.22 ] , [ 0.75 , 0.77 ] ) ( [ 0.21 , 0.27 ] , [ 0.73 , 0.73 ] ) ( [ 0.05 , 0.06 ] , [ 0.89 , 0.92 ] ) ( [ 0.13 , 0.15 ] , [ 0.84 , 0.85 ] ) ( [ 0.23 , 0.26 ] , [ 0.71 , 0.73 ] ) ( [ 0.22 , 0.24 ] , [ 0.73 , 0.76 ] ) ( [ 0.12 , 0.12 ] , [ 0.79 , 0.84 ] ) ( [ 0.08 , 0.11 ] , [ 0.86 , 0.89 ] ) ( [ 0.14 , 0.16 ] , [ 0.79 , 0.82 ] ) ( [ 0.22 , 0.24 ] , [ 0.74 , 0.76 ] ) ( [ 0.24 , 0.26 ] , [ 0.71 , 0.73 ] ) ( [ 0.16 , 0.21 ] , [ 0.73 , 0.79 ] ) ( [ 0.02 , 0.03 ] , [ 0.94 , 0.95 ] ) ( [ 0.17 , 0.20 ] , [ 0.74 , 0.80 ] ) ( [ 0.25 , 0.27 ] , [ 0.69 , 0.72 ] ) ( [ 0.23 , 0.27 ] , [ 0.69 , 0.72 ] ) ( [ 0.09 , 0.12 ] , [ 0.79 , 0.84 ] ) ( [ 0.03 , 0.05 ] , [ 0.92 , 0.94 ] ) )
R 2 ( t 1 ) = c 1 c 2 c 3 c 4 c 5 x 1 x 2 x 3 x 4 ( ( [ 0.16 , 0.17 ] , [ 0.79 , 0.81 ] ) ( [ 0.30 , 0.33 ] , [ 0.62 , 0.65 ] ) ( [ 0.18 , 0.19 ] , [ 0.79 , 0.80 ] ) ( [ 0.20 , 0.25 ] , [ 0.75 , 0.75 ] ) ( [ 0.04 , 0.06 ] , [ 0.90 , 0.93 ] ) ( [ 0.13 , 0.14 ] , [ 0.84 , 0.85 ] ) ( [ 0.27 , 0.30 ] , [ 0.67 , 0.68 ] ) ( [ 0.19 , 0.20 ] , [ 0.76 , 0.79 ] ) ( [ 0.12 , 0.12 ] , [ 0.80 , 0.85 ] ) ( [ 0.07 , 0.10 ] , [ 0.87 , 0.90 ] ) ( [ 0.14 , 0.16 ] , [ 0.79 , 0.82 ] ) ( [ 0.26 , 0.28 ] , [ 0.70 , 0.72 ] ) ( [ 0.20 , 0.22 ] , [ 0.75 , 0.77 ] ) ( [ 0.15 , 0.20 ] , [ 0.75 , 0.80 ] ) ( [ 0.02 , 0.03 ] , [ 0.94 , 0.96 ] ) ( [ 0.17 , 0.20 ] , [ 0.74 , 0.80 ] ) ( [ 0.29 , 0.32 ] , [ 0.64 , 0.67 ] ) ( [ 0.20 , 0.23 ] , [ 0.74 , 0.76 ] ) ( [ 0.09 , 0.12 ] , [ 0.80 , 0.85 ] ) ( [ 0.03 , 0.04 ] , [ 0.93 , 0.94 ] ) )
R 3 ( t 1 ) = c 1 c 2 c 3 c 4 c 5 x 1 x 2 x 3 x 4 ( ( [ 0.19 , 0.20 ] , [ 0.76 , 0.78 ] ) ( [ 0.19 , 0.21 ] , [ 0.75 , 0.77 ] ) ( [ 0.23 , 0.24 ] , [ 0.74 , 0.76 ] ) ( [ 0.19 , 0.24 ] , [ 0.76 , 0.76 ] ) ( [ 0.06 , 0.09 ] , [ 0.85 , 0.87 ] ) ( [ 0.15 , 0.17 ] , [ 0.81 , 0.82 ] ) ( [ 0.17 , 0.20 ] , [ 0.78 , 0.79 ] ) ( [ 0.23 , 0.25 ] , [ 0.71 , 0.74 ] ) ( [ 0.11 , 0.11 ] , [ 0.81 , 0.85 ] ) ( [ 0.11 , 0.15 ] , [ 0.81 , 0.85 ] ) ( [ 0.16 , 0.19 ] , [ 0.75 , 0.78 ] ) ( [ 0.16 , 0.18 ] , [ 0.80 , 0.82 ] ) ( [ 0.25 , 0.28 ] , [ 0.69 , 0.72 ] ) ( [ 0.15 , 0.19 ] , [ 0.76 , 0.81 ] ) ( [ 0.03 , 0.05 ] , [ 0.91 , 0.94 ] ) ( [ 0.21 , 0.24 ] , [ 0.69 , 0.76 ] ) ( [ 0.19 , 0.21 ] , [ 0.77 , 0.79 ] ) ( [ 0.24 , 0.28 ] , [ 0.68 , 0.70 ] ) ( [ 0.09 , 0.11 ] , [ 0.81 , 0.85 ] ) ( [ 0.05 , 0.09 ] , [ 0.89 , 0.91 ] ) )
R 1 ( t 2 ) = c 1 c 2 c 3 c 4 c 5 x 1 x 2 x 3 x 4 ( ( [ 0.15 , 0.16 ] , [ 0.82 , 0.83 ] ) ( [ 0.25 , 0.28 ] , [ 0.71 , 0.72 ] ) ( [ 0.24 , 0.25 ] , [ 0.72 , 0.74 ] ) ( [ 0.29 , 0.38 ] , [ 0.62 , 0.62 ] ) ( [ 0.06 , 0.06 ] , [ 0.90 , 0.92 ] ) ( [ 0.13 , 0.14 ] , [ 0.84 , 0.85 ] ) ( [ 0.25 , 0.26 ] , [ 0.69 , 0.72 ] ) ( [ 0.26 , 0.28 ] , [ 0.68 , 0.71 ] ) ( [ 0.14 , 0.14 ] , [ 0.78 , 0.83 ] ) ( [ 0.10 , 0.13 ] , [ 0.87 , 0.87 ] ) ( [ 0.12 , 0.15 ] , [ 0.82 , 0.84 ] ) ( [ 0.23 , 0.26 ] , [ 0.70 , 0.72 ] ) ( [ 0.30 , 0.32 ] , [ 0.66 , 0.77 ] ) ( [ 0.22 , 0.29 ] , [ 0.71 , 0.71 ] ) ( [ 0.03 , 0.04 ] , [ 0.92 , 0.94 ] ) ( [ 0.15 , 0.17 ] , [ 0.78 , 0.80 ] ) ( [ 0.24 , 0.25 ] , [ 0.69 , 0.74 ] ) ( [ 0.28 , 0.31 ] , [ 0.63 , 0.67 ] ) ( [ 0.14 , 0.14 ] , [ 0.77 , 0.83 ] ) ( [ 0.04 , 0.06 ] , [ 0.90 , 0.92 ] ) )
R 2 ( t 2 ) = c 1 c 2 c 3 c 4 c 5 x 1 x 2 x 3 x 4 ( ( [ 0.15 , 0.16 ] , [ 0.82 , 0.83 ] ) ( [ 0.30 , 0.32 ] , [ 0.66 , 0.68 ] ) ( [ 0.21 , 0.22 ] , [ 0.76 , 0.78 ] ) ( [ 0.28 , 0.31 ] , [ 0.63 , 0.63 ] ) ( [ 0.05 , 0.05 ] , [ 0.91 , 0.93 ] ) ( [ 0.13 , 0.14 ] , [ 0.77 , 0.79 ] ) ( [ 0.29 , 0.30 ] , [ 0.65 , 0.67 ] ) ( [ 0.22 , 0.25 ] , [ 0.73 , 0.75 ] ) ( [ 0.13 , 0.13 ] , [ 0.79 , 0.83 ] ) ( [ 0.09 , 0.12 ] , [ 0.88 , 0.88 ] ) ( [ 0.12 , 0.15 ] , [ 0.82 , 0.84 ] ) ( [ 0.27 , 0.31 ] , [ 0.65 , 0.67 ] ) ( [ 0.26 , 0.27 ] , [ 0.70 , 0.72 ] ) ( [ 0.21 , 0.28 ] , [ 0.72 , 0.72 ] ) ( [ 0.03 , 0.04 ] , [ 0.93 , 0.95 ] ) ( [ 0.15 , 0.17 ] , [ 0.78 , 0.80 ] ) ( [ 0.28 , 0.30 ] , [ 0.64 , 0.69 ] ) ( [ 0.25 , 0.27 ] , [ 0.68 , 0.71 ] ) ( [ 0.13 , 0.13 ] , [ 0.79 , 0.83 ] ) ( [ 0.04 , 0.06 ] , [ 0.91 , 0.93 ] ) )
R 3 ( t 2 ) = c 1 c 2 c 3 c 4 c 5 x 1 x 2 x 3 x 4 ( ( [ 0.18 , 0.19 ] , [ 0.78 , 0.80 ] ) ( [ 0.19 , 0.21 ] , [ 0.78 , 0.79 ] ) ( [ 0.25 , 0.27 ] , [ 0.71 , 0.73 ] ) ( [ 0.26 , 0.35 ] , [ 0.65 , 0.65 ] ) ( [ 0.08 , 0.08 ] , [ 0.86 , 0.89 ] ) ( [ 0.15 , 0.17 ] , [ 0.81 , 0.83 ] ) ( [ 0.18 , 0.19 ] , [ 0.73 , 0.79 ] ) ( [ 0.27 , 0.30 ] , [ 0.67 , 0.69 ] ) ( [ 0.12 , 0.12 ] , [ 0.80 , 0.84 ] ) ( [ 0.14 , 0.18 ] , [ 0.82 , 0.82 ] ) ( [ 0.14 , 0.18 ] , [ 0.78 , 0.81 ] ) ( [ 0.17 , 0.20 ] , [ 0.78 , 0.79 ] ) ( [ 0.32 , 0.33 ] , [ 0.64 , 0.66 ] ) ( [ 0.20 , 0.26 ] , [ 0.74 , 0.74 ] ) ( [ 0.04 , 0.06 ] , [ 0.89 , 0.92 ] ) ( [ 0.18 , 0.20 ] , [ 0.74 , 0.77 ] ) ( [ 0.18 , 0.19 ] , [ 0.76 , 0.80 ] ) ( [ 0.30 , 0.33 ] , [ 0.61 , 0.65 ] ) ( [ 0.12 , 0.12 ] , [ 0.80 , 0.84 ] ) ( [ 0.06 , 0.08 ] , [ 0.86 , 0.89 ] ) )
R 1 ( t 3 ) = c 1 c 2 c 3 c 4 c 5 x 1 x 2 x 3 x 4 ( ( [ 0.14 , 0.16 ] , [ 0.83 , 0.84 ] ) ( [ 0.29 , 0.32 ] , [ 0.63 , 0.67 ] ) ( [ 0.26 , 0.29 ] , [ 0.68 , 0.71 ] ) ( [ 0.41 , 0.41 ] , [ 0.59 , 0.59 ] ) ( [ 0.08 , 0.09 ] , [ 0.86 , 0.90 ] ) ( [ 0.11 , 0.13 ] , [ 0.84 , 0.86 ] ) ( [ 0.30 , 0.31 ] , [ 0.66 , 0.68 ] ) ( [ 0.26 , 0.27 ] , [ 0.70 , 0.72 ] ) ( [ 0.11 , 0.15 ] , [ 0.76 , 0.81 ] ) ( [ 0.14 , 0.19 ] , [ 0.81 , 0.81 ] ) ( [ 0.12 , 0.14 ] , [ 0.85 , 0.86 ] ) ( [ 0.31 , 0.33 ] , [ 0.63 , 0.66 ] ) ( [ 0.25 , 0.29 ] , [ 0.66 , 0.70 ] ) ( [ 0.31 , 0.41 ] , [ 0.59 , 0.59 ] ) ( [ 0.05 , 0.06 ] , [ 0.90 , 0.92 ] ) ( [ 0.15 , 0.17 ] , [ 0.81 , 0.83 ] ) ( [ 0.30 , 0.32 ] , [ 0.65 , 0.67 ] ) ( [ 0.28 , 0.30 ] , [ 0.65 , 0.69 ] ) ( [ 0.19 , 0.24 ] , [ 0.69 , 0.76 ] ) ( [ 0.06 , 0.06 ] , [ 0.90 , 0.92 ] ) )
R 2 ( t 3 ) = c 1 c 2 c 3 c 4 c 5 x 1 x 2 x 3 x 4 ( ( [ 0.14 , 0.16 ] , [ 0.83 , 0.84 ] ) ( [ 0.33 , 0.37 ] , [ 0.58 , 0.62 ] ) ( [ 0.23 , 0.25 ] , [ 0.72 , 0.75 ] ) ( [ 0.39 , 0.39 ] , [ 0.61 , 0.61 ] ) ( [ 0.07 , 0.09 ] , [ 0.88 , 0.91 ] ) ( [ 0.11 , 0.13 ] , [ 0.85 , 0.86 ] ) ( [ 0.34 , 0.36 ] , [ 0.61 , 0.63 ] ) ( [ 0.22 , 0.23 ] , [ 0.74 , 0.76 ] ) ( [ 0.10 , 0.14 ] , [ 0.77 , 0.82 ] ) ( [ 0.12 , 0.17 ] , [ 0.83 , 0.83 ] ) ( [ 0.12 , 0.14 ] , [ 0.85 , 0.86 ] ) ( [ 0.36 , 0.38 ] , [ 0.58 , 0.61 ] ) ( [ 0.17 , 0.25 ] , [ 0.71 , 0.74 ] ) ( [ 0.29 , 0.39 ] , [ 0.61 , 0.61 ] ) ( [ 0.04 , 0.05 ] , [ 0.91 , 0.93 ] ) ( [ 0.15 , 0.17 ] , [ 0.82 , 0.83 ] ) ( [ 0.34 , 0.37 ] , [ 0.60 , 0.62 ] ) ( [ 0.23 , 0.26 ] , [ 0.70 , 0.73 ] ) ( [ 0.18 , 0.23 ] , [ 0.71 , 0.77 ] ) ( [ 0.05 , 0.05 ] , [ 0.91 , 0.93 ] ) )
R 3 ( t 3 ) = c 1 c 2 c 3 c 4 c 5 x 1 x 2 x 3 x 4 ( ( [ 0.17 , 0.19 ] , [ 0.79 , 0.80 ] ) ( [ 0.22 , 0.24 ] , [ 0.72 , 0.75 ] ) ( [ 0.28 , 0.31 ] , [ 0.66 , 0.69 ] ) ( [ 0.38 , 0.38 ] , [ 0.62 , 0.62 ] ) ( [ 0.11 , 0.14 ] , [ 0.81 , 0.86 ] ) ( [ 0.14 , 0.15 ] , [ 0.81 , 0.84 ] ) ( [ 0.22 , 0.24 ] , [ 0.74 , 0.75 ] ) ( [ 0.28 , 0.29 ] , [ 0.68 , 0.70 ] ) ( [ 0.10 , 0.13 ] , [ 0.78 , 0.83 ] ) ( [ 0.19 , 0.26 ] , [ 0.74 , 0.74 ] ) ( [ 0.15 , 0.16 ] , [ 0.82 , 0.83 ] ) ( [ 0.24 , 0.25 ] , [ 0.72 , 0.74 ] ) ( [ 0.27 , 0.31 ] , [ 0.64 , 0.68 ] ) ( [ 0.29 , 0.38 ] , [ 0.62 , 0.62 ] ) ( [ 0.06 , 0.09 ] , [ 0.86 , 0.89 ] ) ( [ 0.18 , 0.20 ] , [ 0.78 , 0.79 ] ) ( [ 0.22 , 0.25 ] , [ 0.73 , 0.75 ] ) ( [ 0.30 , 0.32 ] , [ 0.63 , 0.67 ] ) ( [ 0.17 , 0.22 ] , [ 0.71 , 0.78 ] ) ( [ 0.09 , 0.09 ] , [ 0.86 , 0.89 ] ) )
Step 4: Use R s ( t k ) and the IVIFWAA operator to aggregate the assessment results of each solution for each attribute, and calculate the WIVIF decision matrix R ( t k ) of three experts at t 1 t 3 using Equations (20)–(23).
R ( t 1 ) = D 1 D 2 D 3 x 1 x 2 x 3 x 4 ( ( [ 0.2015 , 0.2250 ] , [ 0.7409 , 0.7610 ] ) ( [ 0.2150 , 0.2413 ] , [ 0.7237 , 0.7440 ] ) ( [ 0.1843 , 0.2057 ] , [ 0.7642 , 0.7807 ] ) ( [ 0.1732 , 0.1988 ] , [ 0.7697 , 0.7960 ] ) ( [ 0.1865 , 0.2049 ] , [ 0.7573 , 0.7783 ] ) ( [ 0.1610 , 0.1827 ] , [ 0.7806 , 0.8039 ] ) ( [ 0.1795 , 0.2045 ] , [ 0.7579 , 0.7874 ] ) ( [ 0.1879 , 0.2126 ] , [ 0.7536 , 0.7788 ] ) ( [ 0.1650 , 0.1939 ] , [ 0.7649 , 0.7966 ] ) ( [ 0.1824 , 0.2110 ] , [ 0.7407 , 0.7765 ] ) ( [ 0.1980 , 0.2274 ] , [ 0.7243 , 0.7614 ] ) ( [ 0.1757 , 0.2059 ] , [ 0.7442 , 0.7832 ] ) )
R ( t 2 ) = D 1 D 2 D 3 x 1 x 2 x 3 x 4 ( ( [ 0.2323 , 0.2603 ] , [ 0.7248 , 0.7348 ] ) ( [ 0.2349 , 0.2531 ] , [ 0.7159 , 0.7292 ] ) ( [ 0.2045 , 0.2372 ] , [ 0.7434 , 0.7578 ] ) ( [ 0.1780 , 0.2071 ] , [ 0.7485 , 0.7768 ] ) ( [ 0.2022 , 0.2158 ] , [ 0.7299 , 0.7523 ] ) ( [ 0.1804 , 0.2006 ] , [ 0.7568 , 0.7862 ] ) ( [ 0.2090 , 0.2415 ] , [ 0.7313 , 0.7582 ] ) ( [ 0.2117 , 0.2173 ] , [ 0.7229 , 0.7457 ] ) ( [ 0.1956 , 0.2272 ] , [ 0.7463 , 0.7639 ] ) ( [ 0.1919 , 0.2130 ] , [ 0.7241 , 0.7660 ] ) ( [ 0.2048 , 0.2218 ] , [ 0.6115 , 0.7573 ] ) ( [ 0.1885 , 0.2067 ] , [ 0.7310 , 0.7681 ] ) )
R ( t 3 ) = D 1 D 2 D 3 x 1 x 2 x 3 x 4 ( ( [ 0.2780 , 0.2960 ] , [ 0.6783 , 0.7003 ] ) ( [ 0.2825 , 0.3050 ] , [ 0.6664 , 0.6907 ] ) ( [ 0.2514 , 0.2692 ] , [ 0.7072 , 0.7271 ] ) ( [ 0.2062 , 0.2266 ] , [ 0.7335 , 0.7583 ] ) ( [ 0.2196 , 0.2436 ] , [ 0.7185 , 0.7418 ] ) ( [ 0.1906 , 0.2145 ] , [ 0.7488 , 0.7717 ] ) ( [ 0.2473 , 0.2949 ] , [ 0.6760 , 0.6989 ] ) ( [ 0.2557 , 0.3049 ] , [ 0.6689 , 0.6886 ] ) ( [ 0.2196 , 0.2608 ] , [ 0.7119 , 0.7309 ] ) ( [ 0.2272 , 0.2525 ] , [ 0.7042 , 0.7405 ] ) ( [ 0.2373 , 0.2686 ] , [ 0.6956 , 0.7241 ] ) ( [ 0.2062 , 0.2324 ] , [ 0.7255 , 0.7606 ] ) )
Step 5: Use the IVIFWAA and IVIFWGA operators to aggregate the assessment results of the three experts to obtain the target interval-valued intuitionistic fuzzy value at a single time from t 1 t 3 , as shown in Table 5 and Table 6.
Step 6: Using Equation (18), take φ = 1.5 and obtain the time series weight η k = [ 0.2000 , 0.2667 , 0.5333 ] . Further, using the new interval-valued intuitionistic fuzzy budget rule (Definition 7), dynamic multi-time fusion WIVIF decision matrices H IVIFWAA and H IVIFWGA based on the IVIFWAA and IVIFWGA operators are constructed.
H IVIFWAA = t 1 t 2 t 3 x 1 x 2 x 3 x 4 ( ( [ 0.0478 , 0.0547 ] , [ 0.9351 , 0.9410 ] ) ( [ 0.0716 , 0.0818 ] , [ 0.9093 , 0.9144 ] ) ( [ 0.1655 , 0.1792 ] , [ 0.8018 , 0.8179 ] ) ( [ 0.0404 , 0.0464 ] , [ 0.9433 , 0.9502 ] ) ( [ 0.0579 , 0.0655 ] , [ 0.9162 , 0.9207 ] ) ( [ 0.1214 , 0.1365 ] , [ 0.8375 , 0.8538 ] ) ( [ 0.0414 , 0.0487 ] , [ 0.9402 , 0.9488 ] ) ( [ 0.0646 , 0.0733 ] , [ 0.9115 , 0.9266 ] ) ( [ 0.1451 , 0.1771 ] , [ 0.8084 , 0.8179 ] ) ( [ 0.0436 , 0.0519 ] , [ 0.9331 , 0.9446 ] ) ( [ 0.0608 , 0.0677 ] , [ 0.8901 , 0.9238 ] ) ( [ 0.1334 , 0.1521 ] , [ 0.8197 , 0.8430 ] ) )
H IVIFWGA = t 1 t 2 t 3 x 1 x 2 x 3 x 4 ( ( [ 0.0475 , 0.0544 ] , [ 0.9356 , 0.9444 ] ) ( [ 0.0712 , 0.0816 ] , [ 0.9096 , 0.9148 ] ) ( [ 0.1648 , 0.1784 ] , [ 0.8029 , 0.8189 ] ) ( [ 0.0413 , 0.0463 ] , [ 0.9435 , 0.9505 ] ) ( [ 0.0577 , 0.0653 ] , [ 0.9165 , 0.9271 ] ) ( [ 0.1209 , 0.1359 ] , [ 0.8382 , 0.8543 ] ) ( [ 0.0403 , 0.0486 ] , [ 0.9403 , 0.9489 ] ) ( [ 0.0644 , 0.0730 ] , [ 0.9117 , 0.9207 ] ) ( [ 0.1440 , 0.1757 ] , [ 0.8042 , 0.8190 ] ) ( [ 0.0434 , 0.0517 ] , [ 0.9332 , 0.9448 ] ) ( [ 0.0607 , 0.0676 ] , [ 0.8960 , 0.9239 ] ) ( [ 0.1326 , 0.1513 ] , [ 0.8203 , 0.8438 ] ) )
Step 7: The positive ideal solutions and negative ideal solutions of H IVIFWAA and H IVIFWGA are shown in Table 7. Using Equations (36)–(38), the positive and negative ideal solutions H IVIFWAA , H IVIFWGA , distances d i + , d i of each target x i , and the target threat degree ζ i are calculated, respectively. The calculation results are shown in Table 8.
Specifically, according to Equation (36), the positive ideal distance between target x 1 and H IVIFWAA is calculated as follows:
d i + = k = 1 3 1 4 [ ( μ i k L μ k L + ) 2 + ( μ i k U μ k U + ) 2 + ( v i k L v k L + ) 2 + ( v i k U v k U + ) 2 + ( μ i k L + v i k L μ k L + v k L + ) 2 + ( μ i k U + v i k U μ k U + v k U + ) 2 ] = [ 1 4 ( 0.0478 0.0478 ) 2 + ( 0.0547 0.0547 ) 2 + ( 0.9351 0.9331 ) 2 + ( 0.9410 0.9410 ) 2 + ( 0.0478 + 0.9351 0.0478 0.9331 ) 2 + ( 0.0547 + 0.9410 0.0547 0.9410 ) 2 ] + [ 1 4 ( 0.0716 0.0716 ) 2 + ( 0.0818 0.0818 ) 2 + ( 0.9093 0.8901 ) 2 + ( 0.9144 0.9144 ) 2 + ( 0.0716 + 0.9093 0.0716 0.8901 ) 2 + ( 0.0818 + 0.9144 0.0818 0.9144 ) 2 ] + 0 = 0.0136
It can be seen from Table 8 that the target multi-time fusion threat ordering obtained by the IVIFWAA operator and the IVIFWGA operator is Target 1 > Target 3 > Target 4 > Target 2, which verifies the feasibility of this algorithm.

6.2. Algorithm Superiority Test and Analysis

In the missile defense dynamic fusion target threat assessment, time is an important factor that affects the decision result. Table 9 and Figure 3 show the target threat degree and ordering results of the single times t 1 t 3 and dynamic multi-time fusion. We see that the target threat ordering results at different moments are roughly the same, and the targets with the largest and smallest threat levels are consistent. However, even if the target threat degree order is the same, the threat degree of each target is different at different times, and Target 4 and Target 3 are more sensitive to changes in time. At t 1 and t 2 , the threat of Target 4 is higher than that of Target 3 and the opposite is true at t3. It can be seen that the static threat assessment method at a single moment cannot reflect the timing of the target and the dynamic changes of the battlefield. The method proposed in this paper not only considers the tendency of Target 4 to decrease in speed, distance, and RCS threat degree during the entire assessment process, but also considers the threat of a sudden increase in speed, RCS, interference intensity, and defense capability of Target 3 at t 3 . Therefore, we can obtain more reliable threat assessment results.
Additionally, in the ever-changing missile defense combat of the battlefield, the accuracy of the dynamic fusion target threat assessment method mainly depends on the difference between target threat degrees in the same assessment method. The more obvious the difference, the better one is able to select the optimal solution, that is, the stronger the superiority of the method. Therefore, the superior degree (SD) of target i over target j can be defined as:
S D i j ( % ) = ( ζ i - ζ j ζ i ) × 100 %
where ζ i and ζ j are the threat degree i = 1 , 2 , , m ; j = 1 , 2 , , m ; i j of different targets.
In order to verify the effectiveness of the method proposed in this paper, the method is compared with UDIFWA operator, DINFWAA operator, CIIFA operator, IVIFPWA operator, and D-S-P operator proposed in [30,31,32,33,34]. The target threat degree ordering results and superiority of different methods are shown in Figure 4 and Table 10. The target multi-time fusion threat ordering result obtained by using the IVIFWAA operator and the IVIFWGA operator in this paper is the same as in references [30,31,32,33], which shows the effectiveness of the method proposed in this paper. The ordering results are slightly different from those in reference [34] but the final decision of the optimal solution is the same.
Note that in the method proposed in this article, the superiority gap between the targets is the largest. When comparing the superiority of Target 1 and Target 3, the superiority of the algorithm in this paper (IVIFWGA) is 1.67, 1.68, 1.92, and 1.69 times that of the methods proposed in [30,31,32,33], respectively. In the superiority comparison of Target 3 and Target 4, the superiority of the algorithm in this paper (IVIFWGA) is 1.53, 1.61, 1.92, and 2.41 times that of the methods proposed in [30,31,32,33], respectively. In the superiority comparison of Target 4 and Target 2, the superiority of the algorithm in this paper (IVIFWGA) is 1.41, 1.74, 1.53, and 1.71 times that of the methods proposed in [30,31,32,33], respectively. The greater the superiority gap, the easier it is for the commander to make decisions. This demonstrates that the method in this paper, by integrating the subjective and objective weights of each attribute of the target and the weight of the time series, considers the degree of change in the relative difference of each attribute and uses the IVIFWAA/IVIFWGA operator to combine decision-making information of multiple target attributes, multiple moments, and multiple experts. This effectively avoids the problem of decision-making errors due to unclear superiority under the influence of subjective factors.

7. Conclusions

This paper combines interval-valued intuitionistic fuzzy set theory with dynamic multi-attribute group decision-making theory, the dynamic fusion target threat assessment method for missile defense is proposed. By comparison with static threat assessment and existing dynamic threat assessment methods, the feasibility and superiority of the method in this paper is verified. The main contributions of the proposed model are as follows: (1) The new interval-valued intuitionistic fuzzy weighted average operator based on the definition of new interval-valued intuitionistic fuzzy operation rules are proposed. (2) An integrated weight model of target attributes based on IVIFECF is proposed to solve the problem of inconsistency with intuitive facts when the deviation between membership and non-membership are equal. (3) Ordering method of interval-valued intuitionistic fuzzy numbers based on improved TOPSIS is proposed to improve the ability to distinguish and differentiate between decision-making results. (4) In order to improve the reliability and accuracy of missile defense target threat assessment, an assessment model based on IVIFEC-IVIFWA-TOPSIS is constructed, and the result of dynamic fusion target threat assessment considering the fusion of multi-target attributes, multiple times, and multi-expert decision information is obtained.
In this paper, the influence of the battlefield situation on target threat assessment has not been considered, and the intelligence level of target threat assessment method needs to be improved. Therefore, future research will focus on the following aspects: (1) Carefully considering the impact of the battlefield situation on target threat in complex battlefield environment. (2) Applying intelligent simulation technologies, such as reinforcement learning and deep learning, to threat assessment. (3) Research on target threat assessment method under incomplete target information.

Author Contributions

Conceptualization, C.F. and Q.F. Methodology, C.F. and Q.F. Software, C.F. Writing, original draft preparation, C.F. Writing, review and editing, Y.S. and Y.L. Supervision, W.L. and X.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the Natural Science Foundation of China under Grants 72001214, 62106283, 72071209.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Akram, M.; Ali, G.; Alcantud, J.C.R.; Riaz, A. Group decision-making with Fermatean fuzzy soft expert knowledge. Artif. Intell. Rev. 2022, 55, 5349–5389. [Google Scholar] [CrossRef] [PubMed]
  2. Lin, M.W.; Xu, Z.S.; Zhai, Y.L.; Yao, Z.Q. Multi-attribute group decision-making under probabilistic uncertain linguistic environment. Oper. Res. Soc. 2018, 60, 157–170. [Google Scholar] [CrossRef]
  3. Sun, H.W.; Xie, X.F.; Sun, T.; Zhang, L.J. Threat assessment method of warships formation air defense based on DBN under the condition of small sample data missing. J. Syst. Eng. Electron. 2019, 41, 1300–1308. [Google Scholar]
  4. Pamučar, D.; Janković, A. The application of the hybrid interval rough weighted Power-Heronian operator in multi-criteria decision making. Oper. Res. Eng. Sci. Theory Appl. 2020, 3, 54–73. [Google Scholar] [CrossRef]
  5. Song, Y.F.; Wang, X.D.; Lei, L. Combination of temporal evidence sources based on intuitionistic fuzzy sets. Acta. Auto. Sin. 2016, 42, 1322–1338. [Google Scholar]
  6. Lei, Y.J.; Wang, B.S.; Lu, Y.L. Techniques for threat assessment based on intuitionistic fuzzy reasoning. J. Electron. Inform. 2007, 29, 2805–2809. [Google Scholar]
  7. Qiang, Z.; Junhua, H.; Jinfu, F.; An, L. Air multi-target threat assessment method based on improved GGIFSS. J. Intell. Fuzzy Syst. 2019, 36, 4127–4139. [Google Scholar] [CrossRef]
  8. Zadeh, L.A. Fuzzy sets. Inform. Contr. 1965, 8, 338–353. [Google Scholar] [CrossRef] [Green Version]
  9. Atanassov, K.T. Intuitionistic fuzzy sets. Fuzzy Set. Syst. 1986, 20, 87–96. [Google Scholar] [CrossRef]
  10. Pamucar, D. Normalized weighted geometric Dombi Bonferroni mean operator with interval grey numbers: Application in multicriteria decision making. Rep. Mech. Eng. 2020, 1, 44–52. [Google Scholar] [CrossRef]
  11. Shen, F.; Ma, X.; Li, Z.; Xu, Z.; Cai, D. An extended intuitionistic fuzzy TOPSIS method based on a new distance measure with an application to credit risk assessment. Inform. Sci. 2018, 428, 105–119. [Google Scholar] [CrossRef]
  12. Jin, F.; Ni, Z.; Chen, H.; Li, Y. Approaches to group decision making with intuitionistic fuzzy preference relations based on multiplicative consistency. Knowl.-Based Syst. 2016, 97, 48–59. [Google Scholar] [CrossRef]
  13. Wu, D.; Yan, X.B.; Peng, R.; Ma, X.Y. Multi-criteria decision making based on correlation coefficient of triangular intuitionistic fuzzy numbers. J. Shanghai Jiaotong Univ. (Sci.) 2019, 24, 480–484. [Google Scholar] [CrossRef]
  14. Kong, D.P.; Chang, T.Q.; Hao, N. Multi-attribute index processing method of target threat assessment in ground combat. Acta. Auto. Sin. 2021, 47, 161–172. [Google Scholar]
  15. Wang, Y.; Liu, S.Y.; Zhang, W.; Wang, Y.N. Threat assessment method with uncertain attribute weight based on intuitionistic fuzzy multi-attribute decision. Acta. Electron. 2014, 42, 2509–2514. [Google Scholar]
  16. Xiao, L.; Qi, H.; Qu, J. Air target threat assessment based on intuitionistic fuzzy analytic hierarchy process. J. Detec. Contr. 2019, 41, 108–111. [Google Scholar]
  17. Zhang, K.; Wang, X.; Zhang, C.K.; Zhou, D.Y.; Feng, Q. Evaluating and sequencing of air target threat based on lFE and dynamic intuitionistic fuzzy sets. J. Syst. Eng. Electron. 2014, 36, 697–701. [Google Scholar]
  18. Gao, Y.; Li, D.S.; Zhong, H. A novel target threat assessment method based on three-way decisions under intuitionistic fuzzy multi-attribute decision making environment. Eng. Appl. Artif. Intel. 2020, 87, 103276–103284. [Google Scholar] [CrossRef]
  19. Anusha, G.; Ramana, P.V.; Sarkar, R. Hybridizations of Archimedean copula and generalized MSM operators and their applications in interactive decision-making with q-rung probabilistic dual hesitant fuzzy environment. Decis. Mak. Appl. Manag. Eng. 2022, 11, 1–33. [Google Scholar] [CrossRef]
  20. Vlachos, I.K.; Sergiadis, G.D. Subsethood, entropy, and cardinality for interval-valued fuzzy sets-An algebraic Derivation. Fuzzy Set. Syst. 2007, 158, 1384–1396. [Google Scholar] [CrossRef]
  21. Ye, J. Multicriteria fuzzy decision-making method using entropy weights-based correlation coefficients of interval-valued intuitionistic fuzzy sets. Appl. Math. Model. 2010, 34, 3864–3870. [Google Scholar] [CrossRef]
  22. Chen, C.H. A Novel Multi-Criteria Decision-Making Model for Building Material Supplier Selection Based on Entropy-AHP Weighted TOPSIS. Entropy 2020, 22, 259. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  23. Atanassov, K.T.; Gargov, G. Interval valued intuitionistic fuzzy sets. Fuzzy. Set. Syst. 1989, 31, 343–349. [Google Scholar] [CrossRef]
  24. Xu, Z.S. Methods for aggregating interval-valued intuitionistic fuzzy information and their application to decision making. J. Control Decis. 2007, 22, 215–219. [Google Scholar]
  25. Wang, W.; Liu, X. Intuitionistic fuzzy information aggregation using Einstein operations. IEEE Trans. Fuzzy Syst. 2012, 20, 923–938. [Google Scholar] [CrossRef]
  26. Hayat, K.; Tariq, Z.; Lughofer, E.; Aslam, M.F. New aggregation operators on group-based generalized intuitionistic fuzzy soft sets. Soft Comput. 2021, 25, 13353–13364. [Google Scholar] [CrossRef] [PubMed]
  27. Lourenzutti. R.; Krohling. R.A.; Reformat, M.Z. Choquet based TOPSIS and TODIM for dynamic and heterogeneous decision making with criteria interaction. Inform. Sci. 2017, 408, 41–69. [Google Scholar] [CrossRef]
  28. Tan, J.Y.; Zhu, C.X.; Zhang, X.Z.; Zhu, L. Ranking method of interval-valued intuitionistic fuzzy numbers based on TOPSIS. J. Control Decis. 2015, 30, 2014–2018. [Google Scholar]
  29. Yue, Z.L. An approach to aggregating interval numbers into interval-valued intuitionistic fuzzy information for group decision making. Expert. Syst. Appl. 2011, 38, 6333–6338. [Google Scholar] [CrossRef]
  30. Xu, Z.S.; Yager, R.R. Dynamic intuitionistic fuzzy multi-attribute decision-making. Int. J. Approx. Reason. 2008, 48, 246–262. [Google Scholar] [CrossRef] [Green Version]
  31. Yang, Z.; Li, J.; Huang, L.; Shi, Y. Developing dynamic intuitionistic normal fuzzy aggregation operators for multi-attribute decision-making with time sequence preference. Expert. Syst. Appl. 2017, 82, 344–356. [Google Scholar] [CrossRef]
  32. Zhou, W.; Xu, Z.S. Modeling and applying credible interval intuitionistic fuzzy reciprocal preference relations in group decision making. J. Syst. Eng. Electron. 2017, 28, 301–314. [Google Scholar]
  33. Chen, B.; Guo, Y.Y.; Gao, X.E.; Wang, Y.M.; Du, X.L. Dynamic multi-attribute decision-making method with interval-valued intuitionistic fuzzy power weighted operators. Syst. Eng. Electron. 2019, 41, 850–855. [Google Scholar]
  34. Zhang, H.W.; Xie, J.W.; Ge, J.A. Intuitionistic fuzzy set threat assessment based on improved TOPSIS and multiple times fusion. J. Control Decis. 2019, 34, 811–815. [Google Scholar]
Figure 1. Flow chart of the IVIFECF-IVIFWA-TOPSIS assessment model.
Figure 1. Flow chart of the IVIFECF-IVIFWA-TOPSIS assessment model.
Entropy 24 01825 g001
Figure 2. Target threat assessment index system for missile defense combat.
Figure 2. Target threat assessment index system for missile defense combat.
Entropy 24 01825 g002
Figure 3. Comparison of target ordering results between time points of t 1 t 3 single time and dynamic multi-time aggregation.
Figure 3. Comparison of target ordering results between time points of t 1 t 3 single time and dynamic multi-time aggregation.
Entropy 24 01825 g003
Figure 4. Comparison of superiority of different methods.
Figure 4. Comparison of superiority of different methods.
Entropy 24 01825 g004
Table 1. Correspondence between 9-level quantification results and interval-valued intuitionistic fuzzy numbers.
Table 1. Correspondence between 9-level quantification results and interval-valued intuitionistic fuzzy numbers.
Threat LevelSymbolInterval-Valued Intuitionistic Fuzzy Numbers
Extremely bigEB ( 0.9 , 0.9 , [ 0.1 , 0.1 ] )
Very bigVB ( 0.8 , 0.9 , [ 0.1 , 0.1 ] )
BigB ( 0.7 , 0.8 , 0.2 , 0.2 )
Medium bigMB ( 0.6 , 0.7 , 0.2 , 0.3 )
MediumM ( 0.5 , 0.5 , 0.3 , 0.4 )
Medium smallMS ( 0.4 , 0.5 , 0.3 , 0.4 )
SmallS ( 0.3 , 0.4 , 0.4 , 0.5 )
Very smallVS ( 0.2 , 0.3 , 0.5 , 0.6 )
Extremely smallES ( 0.1 , 0.2 , 0.6 , 0.7 )
Table 2. Calculation results of Example 1 with different entropy power methods.
Table 2. Calculation results of Example 1 with different entropy power methods.
MethodEntropyComparison Results
Entropy of IVIFSs E 1 A ˜ = 0.800 , E 1 B ˜ = 0.800 E A ˜ = E B ˜
Entropy measures of IVIFSs E 2 A ˜ = 0.958 , E 2 B ˜ = 0.958 E A ˜ = E B ˜
This paper’s method E 2 A ˜ = 0.966 , E 2 B ˜ = 0.951 E A ˜ > E B ˜
Table 3. Target attribute data at t 1 t 3 .
Table 3. Target attribute data at t 1 t 3 .
TimeTargetSpeedDistanceRCSInterferenceDefense
t 1 x 1 ([0.52,0.55], [0.37,0.41])([0.65,0.69], [0.24,0.28])([0.70,0.72], [0.24,0.27])([0.7,0.8], [0.2,0.2])([0.4,0.5], [0.3,0.4])
x 2 ([0.44,0.49], [0.48,0.50])([0.61,0.66], [0.30,0.32])([0.71,0.74], [0.20,0.25])([0.5,0.5], [0.3,0.4])[0.6,0.7], [0.2,0.3])
x 3 ([0.47,0.53], [0.36,0.42])([0.59,0.63], [0.34,0.37])([0.74,0.78], [0.18,0.21])([0.6,0.7], [0.2,0.3])[0.2,0.3], [0.5,0.6])
x 4 ([0.56,0.62], [0.27,0.38])([0.64,0.68], [0.27,0.31])([0.73,0.79], [0.16,0.19])([0.4,0.5], [0.3,0.4])[0.3,0.4], [0.4,0.5])
t 2 x 1 ([0.53,0.56], [0.39,0.43])([0.66,0.70], [0.28,0.30])([0.72,0.74], [0.22,0.25])([0.8,0.9], [0.1,0.1])([0.5,0.5], [0.3,0.4])
x 2 ([0.47,0.51], [0.45,0.48])([0.65,0.67], [0.26,0.29])([0.75,0.79], [0.17,0.20])([0.5,0.5], [0.3,0.4])([0.7,0.8], [0.2,0.2])
x 3 ([0.45,0.54], [0.39,0.44])([0.62,0.68], [0.27,0.29])([0.81,0.83], [0.14,0.16])([0.7,0.8], [0.2,0.2])[0.3,0.4], [0.4,0.5])
x 4 ([0.53,0.57], [0.31,0.36])([0.63,0.66], [0.25,0.32])([0.79,0.82], [0.12,0.15])([0.5,0.5], [0.3,0.4])([0.4,0.5], [0.3,0.4]
t 3 x 1 ([0.55,0.59], [0.38,0.40])([0.70,0.74], [0.20,0.24])([0.78,0.81], [0.15,0.18])([0.9,0.9], [0.1,0.1])([0.6,0.7], [0.2,0.3])
x 2 ([0.46,0.50], [0.42,0.47])([0.71,0.73], [0.23,0.25])([0.77,0.79], [0.17,0.20])([0.4,0.5], [0.3,0.4])([0.8,0.9], [0.1,0.1])
x 3 ([0.49,0.53], [0.43,0.46])([0.73,0.76], [0.20,0.23])([0.76,0.82], [0.13,0.17])([0.8,0.9], [0.1,0.1])([0.4,0.5], [0.3,0.4])
x 4 ([0.57,0.61], [0.35,0.38])([0.71,0.75], [0.22,0.24])([0.80,0.83], [0.12,0.16])([0.6,0.7], [0.2,0.3])([0.5,0.5], [0.3,0.4])
Table 4. Interval-valued intuitionistic fuzzy entropy of target attributes at different moments.
Table 4. Interval-valued intuitionistic fuzzy entropy of target attributes at different moments.
TimeIVIFECF Value
SpeedDistanceRCSInterference IntensityDefense Capability
t 1 0.97300.87160.70370.91010.9370
t 2 0.98170.84780.60920.78070.9232
t 3 0.97520.72770.57760.64390.8114
Table 5. IVIFWAA operator aggregation assessment results of all decision makers.
Table 5. IVIFWAA operator aggregation assessment results of all decision makers.
TargetIVIFWAA Operator Aggregation
t 1 t 2 t 3
x 1 ( [ 0.2006 , 0.2244 ] , [ 0.7423 , 0.7614 ] ) ( [ 0.2242 , 0.2504 ] , [ 0.7277 , 0.7403 ] ) ( [ 0.2711 , 0.2905 ] , [ 0.6833 , 0.7055 ] )
x 2 ( [ 0.1738 , 0.1957 ] , [ 0.7690 , 0.7924 ] ) ( [ 0.1872 , 0.2080 ] , [ 0.7447 , 0.7713 ] ) ( [ 0.2058 , 0.2286 ] , [ 0.7332 , 0.7569 ] )
x 3 ( [ 0.1777 , 0.2038 ] , [ 0.7587 , 0.7874 ] ) ( [ 0.2056 , 0.2287 ] , [ 0.7332 , 0.7557 ] ) ( [ 0.2414 , 0.2875 ] , [ 0.6923 , 0.7055 ] )
x 4 ( [ 0.1856 , 0.2149 ] , [ 0.7362 , 0.7734 ] ) ( [ 0.1953 , 0.2140 ] , [ 0.6834 , 0.7637 ] ) ( [ 0.2240 , 0.2517 ] , [ 0.7081 , 0.7412 ] )
Table 6. IVIFWGA operator aggregation assessment results of all decision makers.
Table 6. IVIFWGA operator aggregation assessment results of all decision makers.
TargetIVIFWGA Operator Aggregation
t 1 t 2 t 3
x 1 ( [ 0.1996 , 0.2234 ] , [ 0.7438 , 0.7625 ] ) ( [ 0.2232 , 0.2500 ] , [ 0.7285 , 0.7412 ] ) ( [ 0.2701 , 0.2893 ] , [ 0.6848 , 0.7069 ] )
x 2 ( [ 0.1734 , 0.1953 ] , [ 0.7695 , 0.7933 ] ) ( [ 0.1866 , 0.2075 ] , [ 0.7454 , 0.7722 ] ) ( [ 0.2050 , 0.2277 ] , [ 0.7342 , 0.7577 ] )
x 3 ( [ 0.1772 , 0.2036 ] , [ 0.7590 , 0.7879 ] ) ( [ 0.2051 , 0.2280 ] , [ 0.7336 , 0.7560 ] ) ( [ 0.2398 , 0.2856 ] , [ 0.6865 , 0.7070 ] )
x 4 ( [ 0.1850 , 0.2143 ] , [ 0.7365 , 0.7738 ] ) ( [ 0.1950 , 0.2137 ] , [ 0.6968 , 0.7640 ] ) ( [ 0.2228 , 0.2506 ] , [ 0.7089 , 0.7423 ] )
Table 7. Positive and negative ideal solutions of H IVIFWAA and H IVIFWGA .
Table 7. Positive and negative ideal solutions of H IVIFWAA and H IVIFWGA .
H IVIFWAA Positive ( [ 0.0478 , 0.0547 ] , [ 0.9331 , 0.9410 ] )   ( [ 0.0716 , 0.0818 ] , [ 0.8901 , 0.9144 ] ) ( [ 0.1655 , 0.1792 ] , [ 0.8018 , 0.8179 ] )
Negative ( [ 0.0404 , 0.0464 ] , [ 0.9433 , 0.9502 ] ) ( [ 0.0579 , 0.0655 ] , [ 0.9162 , 0.9266 ] ) ( [ 0.1214 , 0.1365 ] , [ 0.8375 , 0.8538 ] )
H IVIFWGA Positive ( [ 0.0475 , 0.0544 ] , [ 0.9332 , 0.9444 ] ) ( [ 0.0712 , 0.0816 ] , [ 0.8960 , 0.9148 ] ) ( [ 0.1648 , 0.1784 ] , [ 0.8029 , 0.8189 ] )
Negative ( [ 0.0403 , 0.0463 ] , [ 0.9435 , 0.9505 ] ) ( [ 0.0577 , 0.0653 ] , [ 0.9165 , 0.9271 ] ) ( [ 0.1209 , 0.1359 ] , [ 0.8382 , 0.8543 ] )
Table 8. The positive and negative ideal solution distance and threat degree of H N I I F W A and H N I I F G A .
Table 8. The positive and negative ideal solution distance and threat degree of H N I I F W A and H N I I F G A .
ResultHIVIFWAAHIVIFWGA
x1x2x3x4x1x2x3x4
d i + 0.01360.04530.02270.02970.00980.04390.01920.0295
d i 0.04310.00420.03930.02420.04270.00070.03490.0215
ζ i 0.76010.08480.63390.44900.81330.01570.64510.4216
Table 9. Target threat degree and ordering results at different moments.
Table 9. Target threat degree and ordering results at different moments.
Time x 1 x 2 x 3 x 4 Ordering Results
t 1 0.85490.07870.30060.69091 > 4 > 3 > 2
t 2 0.58040.00000.37500.54581 > 4 > 3 > 2
t 3 1.00000.00000.70310.35251 > 3 > 4 > 2
This paper’s method(based on IVIFWAA)0.76010.08480.63390.44901 > 3 > 4 > 2
This paper’s method(based on IVIFWGA)0.81330.01570.64510.42161 > 3 > 4 > 2
Table 10. Target threat ordering and superiority of different methods.
Table 10. Target threat ordering and superiority of different methods.
Method x 1 x 2 x 3 x 4 Ordering Results S D i j ( % )
UDIFWA operator 0.80140.17290.70260.54511 > 3 > 4 > 2SD13 = 0.1233SD34 = 0.2270SD42 = 0.6828
DINFWAA operator0.64520.19820.56590.44381 > 3 > 4 > 2SD13 = 0.1229SD34 = 0.2158SD42 = 0.5534
CIIFA operator0.92030.24890.82150.67341 > 3 > 4 > 2SD13 = 0.1074SD34 = 0.1803SD42 = 0.6304
IVIFPWA operator 0.73290.24060.64370.55131 > 3 > 4 > 2SD13 = 0.1217SD34 = 0.1435SD42 = 0.5636
D-S-P operator0.90470.31380.64920.80201 > 4 > 3 > 2SD14 = 0.1135SD43 = 0.1905SD32 = 0.5166
IVIFWAA operator0.76010.08480.63390.44901 > 3 > 4 > 2SD13 = 0.1660SD34 = 0.2917SD42 = 0.8111
IVIFWGA operator0.81330.01570.64510.42161 > 3 > 4 > 2SD13 = 0.2068SD34 = 0.3465SD42 = 0.9627
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Fan, C.; Fu, Q.; Song, Y.; Lu, Y.; Li, W.; Zhu, X. A New Model of Interval-Valued Intuitionistic Fuzzy Weighted Operators and Their Application in Dynamic Fusion Target Threat Assessment. Entropy 2022, 24, 1825. https://doi.org/10.3390/e24121825

AMA Style

Fan C, Fu Q, Song Y, Lu Y, Li W, Zhu X. A New Model of Interval-Valued Intuitionistic Fuzzy Weighted Operators and Their Application in Dynamic Fusion Target Threat Assessment. Entropy. 2022; 24(12):1825. https://doi.org/10.3390/e24121825

Chicago/Turabian Style

Fan, Chengli, Qiang Fu, Yafei Song, Yingqi Lu, Wei Li, and Xiaowen Zhu. 2022. "A New Model of Interval-Valued Intuitionistic Fuzzy Weighted Operators and Their Application in Dynamic Fusion Target Threat Assessment" Entropy 24, no. 12: 1825. https://doi.org/10.3390/e24121825

APA Style

Fan, C., Fu, Q., Song, Y., Lu, Y., Li, W., & Zhu, X. (2022). A New Model of Interval-Valued Intuitionistic Fuzzy Weighted Operators and Their Application in Dynamic Fusion Target Threat Assessment. Entropy, 24(12), 1825. https://doi.org/10.3390/e24121825

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop