A Prospect-Theory-Based Operation Loop Decision-Making Method for Kill Web
Abstract
:1. Introduction
- In terms of intelligent decision-making, this study provided a multi-objective optimization model for determining the operational loop scheme, and designed a nondominated sorting ant colony genetic algorithm-II (NSACGA-II) to determine the optimal solutions for the multiple objectives. The compromise solution, based on the technique for order preference by similarity to an ideal solution (TOPSIS), was used to evaluate the Pareto solution set for the multiple objectives.
- In terms of human decision making, in the model of multi-objective optimization model, we considered the two conflicting objectives of operation loop damage capability and closed-loop time, and used the prospect theory to describe the preference degree of decision making for these two objectives.
- In addition, different from the traditional scheme decision, the operation loop schemes are produced by the kill web, while the kill web is a complex system. The method of complex network provides a new perspective on complex systems, so the kill web was modeled based on complex network in this study. The combination of network analysis methods and decision-making methods can enrich and improve the existing decision-making theories.
2. Modeling the Operation Loop Decision-Making Problem
2.1. Modeling of the Operation Loop
2.1.1. Node Modeling
- Common attributes
- (1)
- Side:
- (2)
- Type:
- (3)
- Location: ,
- (4)
- Closed-loop time: , in seconds
- (5)
- Number of channels: ,
- Sensor node attributes
- (1)
- Sensor distance: , in kilometers
- (2)
- Scan path width: , in meters
- C2 node attribute
- (1)
- Preference: ,
- Attack node attributes
- (1)
- Range: , in kilometers
- (2)
- Accuracy of fire: , in meters
- (3)
- Warhead effectiveness:
- Target node attributes
- (1)
- Cross-sectional area: , in square meters
- (2)
- Hiding coefficient:
- (3)
- Vulnerable area: v_area, in square meters
- (4)
- Display falsity survival probability: falsity ∈ {0,1}
- (5)
- Early warning time: t ∈ R, in seconds
- (6)
- Maneuvering speed: s ∈ R, in kilometers/hour
2.1.2. Edge Modeling
- Sensor edge
- Communication edge
- C2 edge
- Attack edge
2.2. Evaluation of the Operation Loop
2.2.1. Evaluation of the Target Value
- Step 1: Construction of the original decision matrix
- Step 2: Standardization of index value
- Step 3: Determination of the index weight
- (1)
- The entropy of the index is calculated:
- (2)
- The entropy weight of the index is determined:
- Step 4: Calculation of the dominance of each index
- (1)
- The relative weight of the index is calculated:
- (2)
- The dominance of the target relative to the target under the index , is calculated using the following expression:If , then represents “gain”;If , then represents “break even”;If , then represents “lose”.In addition, represents that when the decision-maker is faced with the same gain and loss, they are more sensitive to loss, that is, the decision-maker is loss-averse.
- Step 5: Calculation of the dominance of all indexesConsidering all of the indexes, the dominance of the target is calculated over the target :
- Step 6: Calculation of the overall dominanceIn the case of comprehensively considering all targets, the overall dominance of the target over all other targets is calculated, and the target values are ranked according to the overall dominance. The greater the dominance, the greater the target value. The equation is as follows:
2.2.2. Evaluation of the Damage Capability Value
2.2.3. Evaluation of the Closed-Loop Time Value
2.3. Definition of the Operation Loop Decision-Making Problem
2.4. Multi-Objective Optimization Model for Operation Loop Decision-Making Problem
3. Solving the Operational Loop Decision-Making Problem
3.1. NSACGA-II Algorithm
- (1)
- Constructing the initial solution based on the ant colony algorithm. There are many constraints in the operation loop decision-making problem, especially the edge connection rules of equipment nodes in the operation loop, so the randomly generated initial solution is not conducive to the efficient search of the algorithm in the feasible region. This study proposes using the ant colony algorithm to construct the initial population, letting the algorithm search directly in the feasible region, reducing the cost of the search time, and greatly improving the efficiency of the algorithm.
- (2)
- Improving the crossover and mutation operations. The traditional crossover operation randomly selects two individuals from the population, and through the exchange and combination of two chromosomes, the excellent genes are passed on to the offspring; the main purpose of the traditional mutation operation is to maintain the diversity of the population. The mutation operation randomly selects an individual from the population and selects a point of the chromosome to mutate to produce a superior individual. However, in the operation loop decision-making problem, if the traditional crossover and mutation operations are directly adopted, the loop structure of the operational loop itself may be destroyed. Therefore, this study improves the traditional crossover and mutation operations to adapt to the operational loop decision-making problem. The algorithm framework of NSACGA-II is shown in Figure 3, and the pseudocode is shown in Algorithm A1 in Appendix B. Subsequent sections will introduce the improved algorithm in detail.
- Encoding rule
- Generate initial population
- Crossover and Mutation Operations
3.2. Evaluation Index
- Hypervolume (HV)
- Spacing (SP)
3.3. TOPSIS
- Step 1: The vector norm method is used to obtain the normative decision matrix;
- Step 2: The weighted norm matrix is obtained;
- Step 3: The ideal solution and negative ideal solution are determined;
- Step 4: The distance from each scheme to the ideal solution and the negative ideal solution is calculated;
- Step 5: The approximation degree of each scheme to the ideal solution is calculated;
- Step 6: The solutions are arranged in descending order according to the approximation degree.
4. Case Study
4.1. Case Description
4.2. Result Analysis
4.3. Algorithm Comparison
5. Conclusions and Future Directions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
Capability | Index | Unit | Value Range | Meaning |
---|---|---|---|---|
Hiding capability | Hiding coefficient | / | The coefficient of the hiding capability of the target node | |
Display falsity capability | Display falsity survival probability | / | The probability that the target node will not be discovered by sensor equipment by taking display falsity | |
Vulnerability | Vulnerable area | m2 | R | The area where the target node is damaged by the attack of the attack node |
Early warning capability | Early warning time | s | R | The time required for the target node to escape before being discovered by the sensor equipment node or attacked by the attack equipment node |
Maneuvering capability | Maneuvering speed | km/h | R | The speed at which the target node escapes during the early warning process |
Threat level | Shortest distance | m | R | The shortest distance between the enemy target and our equipment |
Appendix B
Algorithm A1. Pseudocode of NSACGA-II. | |
Input: :m: population size maxite: the maximum number of iterations of the algorithm pcrossover: crossover probability pmutation: mutation probability α: pheromone importance factor β: heuristic function importance factor η: heuristic function τ: pheromone matrix q: sensor capability, communication capability, C2 capability, attack capability TIME: closed-loop time υ: target value F = (f1 (x), f2 (x),…, fm (x)) corresponds to a multi-objective optimization problem, this study sets m = 2 | |
Output:ND = []: used to store the Pareto solution set | |
1 | //Step 1 Initialization |
2 | Step 1.1 Generate initial population based on ant colony algorithm |
3 | for i =1 to m do |
4 | Ant i forms an operation loop scheme for all targets |
5 | end for |
6 | Step 1.2 Fast nondominated sorting |
7 | [pop, F] = NonDominatedSorting (pop) |
8 | Step 1.3 Calculate crowding distance |
9 | pop = CalcCrowdingDistance (pop, F) |
10 | Step 1.4 Select the parent individuals |
11 | [pop, F] = SortPopulation (pop) |
12 | //Step 2 Iterative optimization |
13 | while iter < maxiter do |
14 | Step 2.1 Population optimization based on genetic operator |
15 | for i =1 to m/2 do |
16 | Randomly select individuals, perform crossover and mutation operations, get the offspring individuals popc and popm |
17 | end for |
18 | Step 2.2 Merge individuals |
19 | pop = [pop popc popm] |
20 | Step 2.4 Fast nondominated sorting |
21 | [pop, F] = NonDominatedSorting (pop) |
22 | Step 2.5 Calculate crowding distance |
23 | pop = CalcCrowdingDistance (pop, F) |
24 | Step 2.6 Screening individuals to generate a new population |
25 | pop = SortPopulation (pop) |
26 | iter = iter+1 |
27 | end while |
28 | Return ND |
Algorithm A2. Pseudocode of generating an initial population. | ||
1 | for all ants do: | |
2 | for all targets do: | |
3 | allow 1 = [], allow 2 = [], allow 3 = [], allow = [] | Find sensor equipment |
4 | allow 1 = {red side’s equipment | sensor capability to target j > 0} | |
5 | allow 2 = {red side’s equipment | sensor channel number > 0} | |
6 | allow 3 = {red side’s equipment | communication channel number > 0} | |
7 | allow = allow 1 ∩ allow 2 ∩ allow 3 | |
8 | Based on allow and pheromone to find sensor equipment x1 | |
9 | Sensor channel number of x1-1 | |
10 | Number of communication channels of x1-1 | |
11 | allow 1 = [], allow 2 = [], allow = [] | Find C2 equipment |
12 | allow 1 = {red side’s equipment | communication capability with x1 > 0} | |
13 | allow 2 = {red side’s equipment | C2 channel number > 0} | |
14 | allow = allow 1 ∩ allow 2 | |
15 | Based on allow and pheromone to find C2 equipment x2 | |
16 | Number of communication channels of x2-1 | |
17 | allow = allow 1 ∩ allow 2 ∩ allow 3, allow = [] | Find attack equipment |
18 | allow 1 = {red side’s equipment | C2 capability with x2 > 0} | |
19 | allow 2 = {red side’s equipment | attack channel number > 0} | |
20 | allow 3 = {red side’s equipment | attack capability to target j > 0 } | |
21 | allow = allow 1 ∩ allow 2 ∩ allow 3 | |
22 | Based on allow and pheromone to find attack equipment x3 | |
23 | Number of attack channels of x3-1 | |
24 | The operation loop formed by the current ant to attack the target is j→x1→x2→x3→j | |
25 | end for | |
26 | A set of operation loops formed by the current ants against all targets | |
27 | end for |
References
- Deptula, D.A.; Penney, H.R. Restoring America’ s Military Competitiveness: Mosaic Warfare; Mitchell Institute for Aerospace Studies: Arlington, VA, USA, 2019. [Google Scholar]
- Clark, B.; Patt, D.; Schramm, H. Mosaic Warfare: Exploiting Artificial Intelligence and Autonomous Systems to Implement Decision-Centric Operations; Center for Strategy and Budgetary Assessments: Washington, DC, USA, 2020. [Google Scholar]
- Junqiang, Y.; Jia, D. Development of intelligent command and control under the operational concept of “mosaic warfare”. In Proceedings of the International Conference on Robots & Intelligent System, Sanya, China, 7–8 November 2020; pp. 13–15. [Google Scholar]
- Tan, Y.; Zhang, X.; Yang, K. Research on networked description and modeling methods of armament system-of-systems. J. Syst. Manag. 2012, 21, 781–786. [Google Scholar]
- Deveci, M.; Pamucar, D.; Gokasar, I.; Delen, D.; Martínez, L. A fuzzy Einstein-based decision support system for public transportation management at times of pandemic. Knowl.-Based Syst. 2022, 252, 109414. [Google Scholar] [CrossRef]
- Deveci, M.; Mishra, A.R.; Gokasar, I.; Rani, P.; Pamucar, D.; Ozcan, E. A Decision Support System for Assessing and Prioritizing Sustainable Urban Transportation in Metaverse. IEEE Trans. Fuzzy Syst. 2022, 1–10. [Google Scholar] [CrossRef]
- Jiang, J.; Li, J.; Yang, K. Weapon system portfolio selection based on structural robustness. J. Syst. Eng. Electron. 2020, 31, 1216–1229. [Google Scholar]
- Chunqi, W.; Xiaoxiong, Z.; Qingsong, Z.; Kewei, Y. Operation loop-based optimization model for resource allocation to military countermeasures versus probabilistic threat. Appl. Sci. 2018, 8, 214. [Google Scholar]
- Chi, Y.; Li, J.-C.; Yang, K.-W.; Tan, Y.-J. An equipment offering degree evaluation method for weapon system-of-systems combat network based on operation loop. In Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), Singapore, 6–9 December 2015. [Google Scholar]
- Xia, B. A Study of Operation Loop Recommendation Methods Facing Kill Web in the Mosaic War. Ph.D. Thesis, National University of Defense Technology, Changsha, China, 2021. [Google Scholar]
- Chen, G.; Xia, B.; Yang, Z.; Yang, K.; Hou, S.; Yang, C. Research on operation loop recommendation method based on DQN. In Proceedings of the 33rd Chinese Control and Decision Conference (CCDC), Kunming, China, 22–24 May 2021. [Google Scholar]
- Barna, T.; Neumann, J.V.; Morgenstern, O. Theory of games and economic behaviour. Economica 1946, 13, 136. [Google Scholar] [CrossRef]
- Jiang, X.; Li, Y.; Yu, S.; Lin, Z.; Ji, C.; Zhang, Z. Power purchasing optimization of electricity retailers considering load uncertainties based on information gap decision theory. Energy Rep. 2022, 8, 693–700. [Google Scholar] [CrossRef]
- Xu, X.; Chan, F.T.; Chan, C.K. Optimal option purchase decision of a loss-averse retailer under emergent replenishment. Int. J. Prod. Res. 2019, 57, 4594–4620. [Google Scholar] [CrossRef]
- Yao, K.; Ji, X. Uncertain Decision Making and Its Application to Portfolio Selection Problem. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 2014, 22, 113–123. [Google Scholar] [CrossRef]
- Hengjie, Z.; Sihai, Z.; Gang, K.; Cong-Cong, L.; Yucheng, D.; Francisco, H. An overview on feedback mechanisms with minimum adjustment or cost in consensus reaching in group decision making: Research paradigms and challenges. Inform. Fusion 2020, 60, 65–79. [Google Scholar]
- Wenqi, L.; Yucheng, D.; Francisco, C.; Francisco, J.C.; Enrique, H. Group decision-making based on heterogeneous preference relations with self-confidence. Fuzzy Optim. Decis. Mak. 2017, 16, 429–447. [Google Scholar]
- Xia, M.; Xu, Z.; Liao, H. Preference relations based on intuitionistic multiplicative information. IEEE Transact. Fuzzy Syst. 2013, 21, 113–133. [Google Scholar]
- Tversky, A.; Kahneman, D. Judgment under uncertainty: Heuristics and biases. Science 1974, 185, 1124–1131. [Google Scholar] [CrossRef] [PubMed]
- Tversky, A.; Kahneman, D. Advances in prospect theory: Cumulative representation of uncertainty. J. Risk Uncertain. 1992, 5, 297–323. [Google Scholar] [CrossRef]
- Xiaowei, L.; Wei, W.; Chengcheng, X.; Zhibin, L.; Baojie, W. Multi-objective optimization of urban bus network using cumulative prospect theory. J. Syst. Sci. Complex. 2015, 28, 661–678. [Google Scholar]
- Zhu, C.F.; Zhang, Z.K.; Wang, Q.R. Path choice of emergency logistics based on cumulative prospect theory. J. Adv. Transp. 2019, 2019, 8512423. [Google Scholar] [CrossRef]
- Gu, L.; Wang, S.; Zhao, F. Weapon system of systems capability planning model based on expected effectiveness. Syst. Eng. Electron. 2017, 39, 329–334. [Google Scholar]
- Jiang, X. Research on Analyzing, Modeling and Applications of Military Conflict Decision-making Oriented to Human-caused Complexity. Ph.D. Thesis, National University of Defense Technology, Changsha, China, 2011. [Google Scholar]
- Bazin, A.A. Boyd’s OODA loop and the infantry company commander. Infantry Mag. 2005, 94, 17–19. [Google Scholar]
- Li, J.; Yang, K.; Zhang, X.; Jiang, J.; Qing, D. Equipment contribution degree evaluation method based on combat network of weapon system-of-systems. Complex Syst. Complex. Sci. 2016, 13, 1–7. [Google Scholar]
- Meng, J. Research on Probability of Target’s Demage for Weapon System of Systems based on Operation Loop. Masters’ Thesis, National University of Defense Technology, Changsha, China, 2016. [Google Scholar]
- Meng, J.; Zhang, M.; Shen, C. Analysis of kill probability of single target based on operation loop. Fire Control Command Control 2017, 42, 48–51. [Google Scholar]
- Duan, W. Research on Target Value Evaluation in Joint Operations Based on Hyper-Network Theory. Masters’ Thesis, National University of Defense Technology, Changsha, China, 2018. [Google Scholar]
- Zhang, X.; Li, Y.; Zhao, J.; Yang, X.; Wang, Z. Evaluation method of military target based on complex network theory and entropy method. Command Control Simul. 2021, 43, 53–57. [Google Scholar]
- Gomes, L.F.A.M.; Lima, M. Todim: Basic and application to multicriteria ranking of projects with environmental impacts. Found. Comput. Decis. Sci. 1991, 16, 113–127. [Google Scholar]
- Zhao, D.; Tan, Y.; Li, J.; Xia, B.; Dou, Y.; Ji, S. Research on structural robustness of weapon system-of-systems based on heterogeneous network. Syst. Eng.-Theory Pract. 2017, 39, 2239–2247. [Google Scholar]
- Ma, J.; Sun, X. Modified value function in prospect theory based on utility curve. Inf. Control 2011, 40, 501–506. [Google Scholar]
- Bernoulli, D. Exposition of a new theory on the measurement of risk. Econometrica 1954, 22, 11–24. [Google Scholar] [CrossRef] [Green Version]
- Deb, K.; Pratap, A.; Agarwal, S.; Meyarivan, T. A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Transact. Evolut. Comput. 2002, 6, 182–197. [Google Scholar] [CrossRef]
- Marco, D.; Luca, M.G. Ant colonies for the travelling salesman problem. Biosystems 1997, 43, 73–81. [Google Scholar]
- Chen, C.T. Extensions of the TOPSIS for group decision-making under fuzzy environment. Fuzzy Sets Syst. 2000, 114, 1–9. [Google Scholar] [CrossRef]
- Shih, H.S.; Shyur, H.J.; Lee, E.S. An extension of TOPSIS for group decision making. Math. Comput. Model. 2007, 45, 801–813. [Google Scholar] [CrossRef]
- Bleuler, S.; Brack, M.; Thiele, L.; Zitzler, E. Multiobjective genetic programming: Reducing bloat using SPEA2. In Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No. 01TH8546), Seoul, Korea, 27–30 May 2001. [Google Scholar]
- Deb, K.; Jain, H. An evolutionary many-objective optimization algorithm using reference-point-based nondominated sorting approach, part I: Solving problems with box constraints. IEEE Transact. Evol. Comput. 2014, 18, 577–601. [Google Scholar] [CrossRef]
Edge Type | S | C | A | T |
---|---|---|---|---|
S | Communication edge | Communication edge | / | / |
C | Communication edge | Communication edge | C2 edge | / |
A | / | / | / | Attack edge |
T | Sensor edge | / | / | / |
Equipment Name | Number of Equipment | Equipment Type | Closed-Loop Time/s | Number of Sensor Channels | Number of Communication Channels | Number of C2 Channels | Number of Attack Channels |
---|---|---|---|---|---|---|---|
R1 | 16 | C/A | 13 | 0 | 3 | 3 | 2 |
R2 | 1 | S/C | 9 | 15 | 12 | 12 | 0 |
R3 | 12 | S/C/A | 10 | 3 | 4 | 4 | 6 |
R4 | 2 | S/C/A | 12 | 9 | 12 | 12 | 36 |
R5 | 1 | S | 6 | 8 | 10 | 0 | 0 |
R6 | 3 | S | 5 | 8 | 3 | 0 | 0 |
R7 | 25 | S | 3 | 6 | 5 | 0 | 0 |
Equipment Name | Number of Equipment | Equipment Type |
---|---|---|
B1 | 8 | T |
B2 | 1 | |
B3 | 20 | |
B4 | 1 | |
B5 | 2 | |
B6 | 3 | |
B7 | 2 |
Equipment Name | Sensor Distance/km | Scan Path Width/m | K |
---|---|---|---|
R2 | 200 | 200 | 20,000 |
R3 | 120 | 120 | 11,000 |
R4 | 220 | 220 | 19,000 |
R5 | 130 | 130 | 15,000 |
R6 | 250 | 250 | 15,000 |
R7 | 100 | 100 | 10,000 |
Equipment Name | Preference | |||
---|---|---|---|---|
α | β | ξ | λ | |
R1 | 0.88 | 0.88 | 1 | 2.25 |
R2 | 1.00 | 1.00 | 1 | 2.25 |
R3 | 1.21 | 1.02 | 1 | 2.25 |
R4 | 0.88 | 0.88 | 1 | 2.25 |
Equipment Name | Range/km | CEP/m | Warhead Effectiveness |
---|---|---|---|
R1 | 400 | 8 | 0.6 |
R3 | 6000 | 5 | 0.8 |
R4 | 3000 | 6 | 0.7 |
Equipment Name | Cross-Sectional Area/m2 | Hiding Coefficient | Vulnerable Area | Display False Survival Probability | Early Warning Time/s | Maneuvering Speed/km/h |
---|---|---|---|---|---|---|
B1 | 150 | 1.5 | 1.0 × F | 0.3 | 24 | 200 |
B2 | 200 | 2 | 1.0 × F | 0.45 | 25 | 300 |
B3 | 100 | 2 | 0.8 × F | 0.68 | 35 | 220 |
B4 | 200 | 3 | 1.5 × F | 0.55 | 22 | 50 |
B5 | 150 | 3 | 1.5 × F | 0.4 | 0 | 0 |
B6 | 170 | 1 | 0.8 × F | 0.7 | 0 | 0 |
B7 | 130 | 1.5 | 2.0 × F | 0.42 | 0 | 0 |
Communication Distance/km | R1 | R2 | R3 | R4 | R5 | R6 | R7 |
---|---|---|---|---|---|---|---|
R1 | / | 30 | 28 | 0 | 0 | 25 | 25 |
R2 | 45 | / | 40 | 50 | 50 | 30 | 35 |
R3 | 25 | 30 | / | 0 | 0 | 22 | 22 |
R4 | 0 | 40 | 0 | / | 0 | 25 | 25 |
R5 | 0 | 40 | 0 | 0 | / | 25 | 25 |
R6 | 23 | 25 | 22 | 25 | 25 | / | 20 |
R7 | 35 | 35 | 30 | 33 | 33 | 28 | / |
Number | Target | Operation Loop Scheme | Number | Target | Operation Loop Scheme |
---|---|---|---|---|---|
1 | ′B104′ | ′B104″R602″R104″R105″B104′ | 20 | ′B314′ | ′B314″R310″R308″R309″B314′ |
2 | ′B103′ | ′B103″R312″R111″R310″B103′ | 21 | ′B312′ | ′B312″R312″R312″R312″B312′ |
3 | ′B108′ | ′B108″R602″R102″R104″B108′ | 22 | ′B316′ | ′B316″R309″R308″R308″B316′ |
4 | ′B107′ | ′B107″R602″R101″R105″B107′ | 23 | ′B319′ | ′B319″R309″R310″R310″B319′ |
5 | ′B105′ | ′B105″R603″R109″R312″B105′ | 24 | ′B304′ | ′B304″R302″R302″R301″B304′ |
6 | ′B106′ | ′B106″R312″R109″R312″B106′ | 25 | ′B320′ | ′B320″R302″R301″R302″B320′ |
7 | ′B201′ | ′B201″R201″R304″R104″B201′ | 26 | ′B305′ | ′B305″R303″R303″R302″B305′ |
8 | ′B307′ | ′B307″R309″R309″R308″B307′ | 27 | ′B301′ | ′B301″R603″R109″R114″B301′ |
9 | ′B101′ | ′B101″R201″R201″R304″B101′ | 28 | ′B317′ | ′B317″R302″R302″R301″B317′ |
10 | ′B102′ | ′B102″R301″R301″R301″B102′ | 29 | ′B701′ | ′B701″R301″R301″R301″B701′ |
11 | ′B306′ | ′B306″R305″R305″R305″B306′ | 30 | ′B318′ | ′B318″R603″R308″R312″B318′ |
12 | ′B702′ | ′B702″R302″R301″R301″B702′ | 31 | ′B302′ | ′B302″R603″R114″R110″B302′ |
13 | ′B309′ | ′B309″R302″R301″R301″B309′ | 32 | ′B601′ | ′B601″R304″R303″R303″B601′ |
14 | ′B308′ | ′B308″R309″R310″R312″B308′ | 33 | ′B502′ | ′B502″R201″R305″R305″B502′ |
15 | ′B310′ | ′B310″R308″R109″R312″B310′ | 34 | ′B401′ | ′B401″R305″R305″R304″B401′ |
16 | ′B311′ | ′B311″R309″R308″R308″B311′ | 35 | ′B602′ | ′B602″R603″R110″R114″B602′ |
17 | ′B303′ | ′B303″R603″R109″R111″B303′ | 36 | ′B603′ | ′B603″R302″R302″R303″B603′ |
18 | ′B315′ | ′B315″R309″R309″R309″B315′ | 37 | ′B501′ | ′B501″R303″R201″R304″B501′ |
19 | ′B313′ | ′B313″R201″R201″R302″B313′ |
Index | Algorithm | Minimum | Maximum | Average | Variance |
---|---|---|---|---|---|
HV | NSACGA-II | 0.778 | 0.894 | 0.8453 | 0.001596 |
SPEA-II | 0.781 | 0.873 | 0.8304 | 0.001086 | |
NSGA-III | 0.715 | 0.843 | 0.7769 | 0.002445 | |
SP | NSACGA-II | 0.93263 | 2.5092 | 1.496493 | 0.243332 |
SPEA-II | 0.79896 | 3.1368 | 1.924286 | 0.480957 | |
NSGA-III | 1.7224 | 3.0746 | 2.34323 | 0.260036 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wang, L.; Chen, L.; Yang, Z.; Li, M.; Yang, K.; Li, M. A Prospect-Theory-Based Operation Loop Decision-Making Method for Kill Web. Mathematics 2022, 10, 3486. https://doi.org/10.3390/math10193486
Wang L, Chen L, Yang Z, Li M, Yang K, Li M. A Prospect-Theory-Based Operation Loop Decision-Making Method for Kill Web. Mathematics. 2022; 10(19):3486. https://doi.org/10.3390/math10193486
Chicago/Turabian StyleWang, Luyao, Libin Chen, Zhiwei Yang, Minghao Li, Kewei Yang, and Mengjun Li. 2022. "A Prospect-Theory-Based Operation Loop Decision-Making Method for Kill Web" Mathematics 10, no. 19: 3486. https://doi.org/10.3390/math10193486
APA StyleWang, L., Chen, L., Yang, Z., Li, M., Yang, K., & Li, M. (2022). A Prospect-Theory-Based Operation Loop Decision-Making Method for Kill Web. Mathematics, 10(19), 3486. https://doi.org/10.3390/math10193486