transmission data, small data volume, short
transmission time and encryption
(Wu Jinghua, Hao
Xiaolong and Wang Haifeng, Gao He, 2018)
.
2.2.3 Algorithm Module
The DBN reasoning algorithm based on wireless
intelligent nodes is written by MATLAB and saved
as ".dll" format for C# calls.
3 DBN-BASED DICISION MODEL
The DBN theory overcomes the time dependence
and computational difficulties of the rule-based
system, and the networked ammunition attack
decision process can be regarded as a discrete
stochastic process. The DBN consists of observation
variables and hidden variables, and uses probability
distribution to describe causality
(Yao Hongfei, Wang
Hongjian, Lyu Hongli and Wang Ying, 2018). The attack
decision model is constructed according to the
DBN’s characteristics and the tasks’ characteristics.
The battlefield’s environment is complicated and
changeable
(Hunkar Toyoghu, Oya Ekin Karasan and
Bahar Yetis Kara, 2011)
, to solve the attack problem,
some assumptions need to be given.
3.1 Assumptions
The information transmission between nodes is
smooth, and the central node can obtain global
information.
The number of targets is less than the number of
nodes, and each target is assigned at least one node
for attack.
The detector’s performance is so excellent that
can get all the information of the targets in the
detection distance.
Once the target is found, it is destroyed
immediately.
3.2 Observation Variables
Multi-node fusion sound detection can calculate the
number of targets, the angle between the target and
the node, the target speed, and judge the target type
according to its noise characteristics. The node can
transport its working status through its own sensor,
such as network status, battery power, and the
remaining number of the warhead. The network
status means that the node is a central node, a parent
node or a child node, and the battery power
represents the remaining capacity of the lithium
battery, and the remaining number of the warhead
represents the remaining number of the warhead
under the angle corresponding to the target. In
addition, the detection distance constraint and the
attack distance constraint are also direct evidence.
The observation variables of the attack decision
model are shown in Table 1.
Table 1. Observation variables.
Variables
Meaning Collection
TA Target angel
AS1, AS2,
AS3, AS4
TS Target speed
HS, MS, LS
TT Target type
TA, VE,
NP Node battery power
EN, LO
NNS
Node network
status
CE, PA, SU
NWR
Node warhead
remain
0, 1
NWS
Node working
status
N, I
DDC
Detect distance
constraint
0, 1
ADC
Attack distance
constraint
0, 1
TA = {AS1, AS2, AS3, AS4} indicates target
angel. In order to speed up the calculation, four
regions according to the warhead installation
position are divided. The division of TA is shown in
Figure 4. TS = {HS, MS, LS} represents the speed
of targets which are discovered by the detector. TT =
{TA, VE} is the type of ground targets, vehicle and
tank are the mainly types currently. TP = {EN, LO}
is the nodes’ power, low condition means less than
10% of the capacity of the lithium battery. NNS =
{CE, PA, SU} indicates the network status, such as
central node, parent node and sub node. Regardless
of the network status of the node, it is assigned a
unique number. NWR = {0, 1} means the remaining
number of warheads corresponding to TA. NWS =
{N, I} means whether the node can work according
to the feedback of each module. DDC = {0, 1}
means whether the target is within the detection
distance. ADC = {0, 1} means whether the target is
within the attack distance. In the current situation,
the detection distance is longer than the attack
distance.
3.3 Hidden Variables
The hidden variables, which are the intermediate
layer of logical reasoning and constructed according