• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Sensor radiation interception risk control in target tracking

    2020-06-28 03:03:24CePangGanlinShanWeiningMaGongguoXu
    Defence Technology 2020年3期

    Ce Pang, Gan-lin Shan, Wei-ning Ma, Gong-guo Xu

    Army Engineering University, Shijiazhuang Campus, Shijiazhuang, Hebei, 050003, China

    Keywords:Radio frequency stealth Target tracking Interception probability Interception risk Hungary algorithm

    ABSTRACT This paper is mainly on the problem of radiation interception risk control in sensor network for target tracking. Firstly, the sensor radiation interception risk is defined as the product of the interception probability and the cost caused by the interception. Secondly, the radiation interception probability model and cost model are established,based on which the calculation method of interception risk can be obtained.Thirdly,a sensor scheduling model of radiation risk control is established,taking the minimum interception risk as the objective function. Then the Hungarian algorithm is proposed to obtain sensor scheduling scheme. Finally, simulation experiments are mad to prove the effectiveness of the methods proposed in this paper, which shows that compared with the sensor radiation interception probability control method,the interception risk control method can keep the sensor scheduling scheme in low risk as well as protect sensors of importance in the sensor network.

    1. Introduction

    With the application of anti-radiation weapons (anti-radiation missile, anti-radiation aircraft, radar warning receiver) [1,2] in the battlefield, active sensors (radars) are facing the threat of being intercepted and destroyed while emitting electromagnetic waves to detect targets. In order to improve the survival performance of sensors while undertaking the detection task, radio frequency stealth technology [3,4] was raised. In radio frequency stealth technology, the key point is to handle the contradiction between satisfying operational demands and reducing interception threat by controlling working parameters such as radiation power, emission time and emission time interval of sensors [5,6]. Therefore, it belongs to the scope of sensor management [7].

    There are mainly two kinds of methods to achieve the aim of radio frequency stealth through sensor management.

    The first method is to achieve radio frequency stealth by controlling the working parameters of sensors.At this point,reference[8,9]established the model of radiation interception probability in target tracking, and proposed the methods of controlling the minimum radiation power and the minimum emission time for controlling a single sensor.Reference[10,11]studied the problem of radio frequency stealth by designing suitable waveforms and controlling the radiation power to achieve the lowest radiation interception probability. Reference [12] achieved radio frequency steal by designing suitable radar signals, then it proposed a method of designing radar signals based on the NLFM-Costas composite signal, and the simulation proved that the signal had good results on radio frequency stealth performance.Aiming at the hardware of antenna,reference[13]designed a radar antenna with good stealth performance based on the ultra-wideband frequency selection surface.

    The second method is to reduce the threat of sensor radiation interception through effective sensor scheduling methods in the process of multi-sensor cooperative detection of targets.Compared with the first method, this method was proposed later and the related theory is not as detailed as the former.At this point,under the background of multi-sensors searching and multi-targets,reference [14] established multi-objective functions with the minimum interception probability, the maximum radiation time interval and the maximum target discovery probability, and proposed a radar radio frequency stealth algorithm under joint interception threat. Reference [15] proposed a radar radiation hybrid controlling method with the minimum difference between the target tracking accuracy demand and the actual tracking accuracy as the objective function, and the simulation results performed well. In Ref. [16], the sensor scheduling methods for targeting detection and target tracking were proposed under the constraint of radiation interception probability in the background of sensor collaborative detection.Reference[17]studied the problem of radio frequency stealth in phased array radar under the background of multi-target tracking,which could effectively reduce the radiation power while ensuring the tracking quality. In Ref. [18], radiation interception was studied in the case of interference to electromagnetic interception receiver,and a new interception probability model was established. On this basis, sensors were scheduled to effectively control the interception threat. Literature [19,20]established a radiation interception threat model based on Hidden Markov theory in the case of not-knowing working parameters of the enemy’s receivers, and controlled the radiation threat in the case of target tracking, with good simulation results.

    After studying the literature above, it can be seen that there exist the main following problems:

    (1) Although there is much study of radiation control method on a single sensor, there is lack of research on the radiation controlling method in cluster sensor networks. Compared with a single sensor, the sensor network technology and multi-sensor collaborative detection technology can obtain higher accuracy, better performance and some other significant advantages, but there seldom has methods of controlling radiation in sensor networks. Therefore, sensor networks are facing the radiation interception threat and the threat must be reduced;

    (2) The radiation control has not yet been combined with the actual operational requirements. The previous researches only control the radiation interception probability in the view of technical indicators,and they hold on the point that once the demand of target detecting precision is meet, the lower the probability of being intercepted, the better the performance is. But once it achieves the lowest limit of the interception probability, there will be no meaning of controlling it any more.At this point,it can protect the sensors of more importance at the sacrifice of the sensors of less importance from the tactical view, which means it will be a good choice that the less important sensors undertake the most radiation interception risk to protect the more important sensors in the tactical view.

    To solve the mentioned problems above, this paper proposes a sensor scheduling method in combination of the sensor radiation interception risk. The rest of this paper is organized as follows. In Section 2, the concept of sensor interception radiation risk is proposed firstly,and the radiation interception probability controlling method is compared with the sensor radiation interception risk controlling method. Section 3 proposes the sensor radiation interception probability model, the cost model, and the radiation interception risk model, based on which the sensor scheduling objective function is built, with the target tracking accuracy as constraint conditions. In section 4, the Hungarian algorithm is introduced and designed to obtain sensor scheduling scheme.Before Section 6 concludes this paper, Section 5 makes some simulation experiments, which can claim the effectiveness of the method and algorithm proposed in this paper.

    2. The analysis on sensor radiation interception risk

    In the past papers, the “radiation interception risk control” is regarded as “radiation interception probability control”. And up to now, the definition of risk has not been clearly given. This article firstly defines the“radiation interception risk”and differentiates it with “radiation interception probability".

    The risk of an event is defined as the product of the harmful event with the cost once the event occurs. Based on this concept,the definition of the sensor radiation interception risk (noted as“interception risk”) can be further obtained as the product of the sensor radiation interception probability (noted as “interception probability”) and the cost (noted as “cost”) after the sensor radiation is intercepted.

    The combat situation is taken into consideration as follow:Some reconnaissance planes (targets) equipped with radiation receivers and weapons from the enemy are moving towards our defensed center.The purpose of the enemy is to detect and destroy our radars(sensors). When the targets are flying, we also want to detect and destroy them,and our sensors emit radiation in the target detection and tacking process.Once the radiation from our sensors is received by the enemy’s radiation receivers,the positions of our sensors will be acquired by the targets and they will launch missiles to destroy our sensors. The combat situation described above is shown in Fig.1.

    The interception risk is noted as r, and its calculation method can be provided as the definition of risk as follows.

    where the variable p denotes the probability of being destroyed,and the variable c denotes the cost after the sensor is destroyed.

    There are two requirements which should be satisfied to destroy a sensor for the enemy, and they are finding the positions of the sensor and hitting the sensor after they launch missiles.Thus there is the equation p = pc1pc2, where the variable pc1denotes the radiation interception probability and the variable pc2denotes the striking probability.

    For the reason that this paper is mainly on the detection process and the striking process is not our focus, we assume the striking probability as“1”so as to simplify the calculation.Then there is the equation p≈pc1, and the variable p can be seen as the radiation probability.

    Another advantage of regarding the striking probability as“1”is that only by doing so can be give us more space to control the risk obeying the pessimistic principle.

    The“cost”can be regarded as the strategic damage caused to us after the sensor is destroyed by the strike.

    For the description above,it can be seen as follows.

    (1) Due to the“probability”factor,“risk”is an event that has not yet occurred but has a certain probability of occurrence.Due to “l(fā)oss”, “risk” is a “harmful” event, and the smaller the value of risk is, the better it is.

    (2) Compared with “probability”, “risk” takes more consideration of actual demands.If there is no“cost”,controlling the“probability” will lose its practical significance.

    (3) Compared with “cost”, “risk” is an event that has not yet occurred, and once the harmful event occurs, “risk” will be converted to“cost".

    Fig.1. The combat situation.

    The difference and connection between “interception risk control” and “interception probability control” are as follows.

    (1) When a single sensor performs the target detection task,the risk control and probability control are equivalent to each other.

    It can be seen from Eq. (1) that when a single sensor emits electromagnetic waves to obtain observations, since the cost is a constant value, the interception risk is proportional to the interception probability, and the interception risk control and interception probability control can be mutually converted.

    (2) When multiple sensors are performing the same target detection tasks in cooperation, there are some essential differences between risk control and probability control.

    Assume that there are M sensors in the networks used to detect and track targets,and the risk value of the sensor networks can be calculated by:

    where the variable Risk denotes the total interception risk of the sensor network;the variable ridenotes the interception risk valued of sensor si; the variable pidenotes the interception probability of sensor si; the variable cidenotes the cost once the sensor siis intercepted and destroyed.

    The joint interception of the sensor network can be calculated by:

    When there is M = 2, assume that there are c1=0.1 and c2= 3,and the relationship of the interception risk value and the interception probability is shown in Fig. 2.

    From Fig. 2, it can be seen that in the interception risk control method, different sensors are in the different strategic positions,and the more important sensors’destroying brings more cost than the less important sensors’destroying.It can reduce the risk values by applying the less important sensors to undertake more emission to reduce the risk value. However, in the interception probability control method, the emission is shared equally by each sensor in the sensor network, then the total risk value increases.

    Fig. 2. Comparisons of two controlling method.

    3. The radiation interception risk control model

    In this section, the general sensor radiation interception probability model in the case of target detection is established firstly;Secondly,the target tracking accuracy estimation method based on UKF is introduced;What’s more,on the basis of the models above,the radiation risk control model is put forward to serve as the basic method of sensor scheduling.

    3.1. The sensor radiation interception probability model

    It is assumed that targets detected by our sensors carry electromagnetic radiation receivers on themselves. At time instantk,when the radiation from sensor siis intercepted by target tj, there are two requirements to be satisfied as follows:

    (1) The radiation must be the same as the enemy’s receiver in frequency (pf), space (ps), and time (pt) [8];

    (2) The radiation can be acquired and detected,and that is to say,the power (pd) should be big enough [9]. Then the sensor radiation interception probability can be calculated by:

    Aiming at the first interception requirement, the analysis is as follows [8,9].

    (1) For the radiation receiver installed in target tj, the window function is noted aswhere the variableis the time spent on scanning the whole frequency fjfor the receiver, and the variable Bjis the transmission band of the receiver.

    (2) For target tj,the window function of the scanning antenna iswhere the variablesandare the rotation rate and beam width of the antenna.

    (3) For sensor si,the window function of impulse signal iswhere the variablesandrepresent the pulse repetition interval and pulse width respectively.According to the window functions defined above, it can be expressed by the Poisson distribution as follows.

    where the variable Tsis the dell time of the electromagnetic wave;there isand the variable Tijis the average coincidence period of three windows.

    For the second interception requirement,the variable pdcan be calculated by Ref. [17]:

    It is assumed that other parameters of each radiation receiver are the same except for the radiation time,radiation power and the distance between the target and the radar.In order to simplify the calculation, the signal-to-noise ratio is calculated as follows [21].

    where the variable τ is the radiation time with the power P; the variable R is the distance of the sensor and the target;the variable SNRcalis the radio of signal to noise when the distance of a target and a sensor is Rcalwith the radiation power Pcaland the radiation time τcal.

    It is assumed that the electromagnetic wave time emitted by the sensor is equal to the dwell time of the electromagnetic wave shinned on the target.At time instant k,the radiation interception probability of sensor siintercepted by target tjis as follows.

    At time instant k- 1, the cumulative radiation interception probability of sensor siis noted as,and at time instant k,after sensor siemits radiation to detect target tj,the cumulative radiation interception probability can be changed to

    3.2. The cost model

    In this paper,the cost brought to us after the sensor is destroyed is determined by the importance of the sensor in the sensor network. A sensor network is shown in Fig. 3.

    In Fig. 3, the damage of blue sensor node will not affect the connectivity of the whole sensor network, while the damage of green sensor node will prevent the gray nodes from communicating with the commanding center. Therefore,it can be seen that the damage of different sensors will cause different costs to our sensor network.

    In this paper,the cost once a sensor is destroyed can be regarded as the strategic position of the sensor in the sensor network.

    The sensor network model is noted as G(V,L),where the variable V is the set of sensor nodes,and the variable L is the set of the edges.

    The adjacency matrix is noted as, where there is aij∈{0,1}, and when aij= 1, sensor siand sensor sjcan communicate with each other, or they cannot communicate once there is aij= 0. The degree of sensor siis defined as

    Fig. 3. The sensor network.

    In this paper,sensors have the same working performances,and the importance degree of sensor sican be calculated by the following equation.

    3.3. The target tracking precision based on UKF

    At time instant k, the moving state of a target can be noted as Xk=[xk, ˙xk,yk, ˙yk]T.

    The state transition matrix is denoted aswhere the variable T is the sampling time, and there is T =1 s in this paper.

    At time instant k+1,the moving state of the target transmits as follows.

    where the variable W is the process evolution noise, and each component follows a Gaussian distribution with a mean of 0; the variable Q is the noise covariance matrix, and there isin this paper, where variables σxand σyare the power spectral density of the noise.

    At time instant k+1,the observation of sensors can be noted as follows.

    where the variable Vk+1is the observation noise, and follows a Gaussian distribution with a mean of 0; the variable

    In this paper,the target tracking precision is defined as follows.

    The target tracking accuracy is calculated by Unscented Kalman Filtering (UKF) [22]. UKF is based on Unscented Transformation(UT).

    There is the n-dimension variableand m-dimension variable.

    where the variable g( ) is the nonlinear transformation function.

    The purpose of UT is to obtain the statistical property of y according to the statistical property of x, and then the statistical property of nonlinear function propagation can be obtained.There are 2n+1 sigma points χi, and the rules of selecting sigma and their coefficients are as follows.

    where the variable λ=α2(n+κ)-n can determine the distance of sigma points andthe variable α is usually set to a small integer(104≤α<1); the variable κ is usually set to 0 or 3- n; for a Gaussian distribution, β=2 is the optimal value; there is, where[]irepresents the ith column.

    These sigma points propagate through a nonlinear function g( ),and then there is:

    The mean value and variance of y are calculated by:

    The calculation is based on UKF and the estimation of target tracking precision is as follows.

    (1) Initialization

    Step 1 Provide the initial filtering conditions:,P0,Q0,and R0.

    At time instant k = 1,2,3,…, loop from Step 2 to Step 8.

    (2) Prediction

    Step 2 According to the variablesandat time instant k- 1, select variablesand ω0,ω1, …,ω2n.

    Step 3 Carry out nonlinear transformation according to the target state model, and there is:

    Step 4 The mean value and the covariance of the state prediction are as follows.

    (3) Update

    Step 6 Carry out the nonlinear transformation according to the measurement model, and it is:

    Step 7 the mean value of measurement prediction,information covariance, mutual covariance between state and measurement and filtering gain are as follows.

    Step 8 at time instant k, the posterior state estimation mean value, covariance matrix, and target tracking precision are as follows.

    3.4. The radiation risk control model

    In this paper, there are M sensors in the network used to tracking N targets.At time instant k,the sensor scheduling scheme is noted aswhere=1 denotes that sensor siis used to tracking target tj, otherwise, it denotes not.

    At time instant k,the optimal sensor scheduling scheme can be calculated by:

    The constraints are as follows.

    where the variable ρdis the demand of target tracking precision,and the variableis the target tracking precision of target tj.

    In sensor scheduling, in order to obtain an effective solution,there are some other rules to obey as follows.

    (1) If all sensors cannot meet a target’s tracking accuracy requirement, the sensor with the best tracking accuracy is selected to track the target, and the sensor is no longer selected by other targets;

    (2) If two or more targets compete for one sensor in the first condition, the sensors shall be selected according to the principle of the minimum interception risk,and other targets will select their sub-optimal sensors.

    4. Algorithm design

    Assign M sensors to N targets, and when there is M ≥N, there arekinds of sensor scheduling schemes,which belongs to the NP (Non-deterministic Polynomial) hard problem. Optimization algorithms should be designed to obtain sensor scheduling schemes in order to adapt to the complex and varied battlefield environment.

    There are some optimization algorithms such as the traversing method, the Hungarian algorithm [23], the greedy algorithm [24],the swarm intelligence algorithm(for example,the particle swarm optimization algorithm [25]), and the distribution method (for example,the game theory method[26]).Since the latter two kinds of methods are approximately optimization algorithms, the calculation results may be different from the actual optimal value, but the greedy algorithm and the traversing algorithm have obvious deficiencies in the calculation speed, this paper adopts the Hungarian algorithm which has fast calculation speed and the optimal solution result.

    The Hungarian algorithm is based on the theory raised by the Hungarian mathematician D.Konig[27],and it can be used to solve the assignment problem. This paper regards the sensortarget allocation problem as the assignment problem,but the basic Hungarian algorithm needs to be transformed to some extent.The solving steps of the improved Hungarian algorithm matching the optimization background of this paper are as follows.

    Step 1: Construct an adjacency matrix. For target tj, when sensor sican satisfy the target tracking precision demand,there is bij=,otherwise,there is bij=∞.If there is no sensor to satisfy the target tracking precision demand,then the optimal sensor is noted as s*and there is b*j=1 in the matrix B.For the reason that there is M ≥N in this paper, the matrix B must be expanded to a M× Mmatrix and the values are set to 0 in the column N+ 1× M.

    Step 2:Each element at matrix B subtracts the smallest element at the element’s row, and the new matrix is noted as B;

    Step 3:Transform elements in row of the matrix B’.Find the row where there is only one zero, and note the zero as “○”, then note the other element in its column as “ノ”. Transform elements in column of the matrix B’.Find the column where there is only one zero, and note the zero as “○”, then note the other element in its row as “ノ”.

    Step 4:If there is zero noted as“○”at each column,then jump to Step 7, otherwise jump to Step 5;

    Step 5: If there is any free zero in the matrix, select the row where there is the fewest number of zeros which are not noted,and operate on the zeros following the rules:

    Compare the number of zeros in column where each zero is located at, and note the zeros where the number of zeros is the smallest as “○”, then note the other elements in the row and column of the zero as“ノ”.Take the actions above until all zeros are noted,then jump to Step 7, otherwise, jump to Step 6;

    Step 6: If there is no free zero in the matrix and the number of zeros noted as “○” is smaller than N, note the column, where there is no zeros marked as “○”, as “☆”. Then mark the row where there are zeros noted as“ノ”as“☆”in the column which has been marked as“☆”.Underline the rows which are marked as “☆” in horizontal lines, and underline the column which are not marked as “☆” in ordinate lines. Find the smallest values among the non-covered elements by lines and note it as Δ.Each element which is noted as “☆” in column subtracts Δ , each element which is noted as“☆”in row adds Δ,then jump to Step 2;

    Step 7:Mark the zero as 1,and the other elements are marked as 0, then the 0-1 and M×N matrix is Uk.

    End the algorithm.

    5. Simulations

    In the simulation, there are 10 sensors in the sensor network and their coordinates are as follows: s1(20,20), s2(30,30),s3(100,52), s4(58,120), s5(69,36), s6(47,117), s7(150,210),s8(180,42), s9(123,85), s10(142,100).

    The communication relationship between sensors is as the matrix A shows.

    Fig. 4. The relationship of interception probability and distance.

    Five targets are moving in straight lines.And their motion statesare as follows:

    Table 1 The cost value of sensors.

    5.1. Simulation on the radiation interception model

    The sensor radiation interception probabilities are calculated according to Eq. (10). When target t3moves, the curves of the interception probabilities of sensors s1, s3and s10are shown in Fig. 4.

    It can be seen from Fig. 4 that when target t3moves, the radiation interception probability by the target to the sensors decreases with the increase of the distance between the target and sensors.In the process of sensor scheduling, under the condition of meeting the requirement of target tracking precision,sensors which are far away from the target should be selected firstly to track the target,so as to reduce the interception probability.

    5.2. Simulation on the cost model

    The sensor cost values are calculated according to Eq. (11), and the calculation results are shown in Table 1.

    It can be seen from the matrix A and Table 1,that the more one sensors connected by one sensor,the more important the sensor is in the sensor network,and more cost are will be brought after the sensor is destroyed.

    5.3. Simulation on the calculation of sensor scheduling schemes

    The improved Hungarian algorithm proposed in this paper is used to calculate the sensor scheduling scheme.The target tracking precision is set to ρd= 100. At time instant k = 0, sensors are scheduled to track targets,and the sensor scheduling schemes are calculated by the improved Hungarian algorithm (denoted as algorithm 1),the particle swarm optimization algorithm(denoted as algorithm 2), and the traversing algorithm (denoted as algorithm 3).50 Monte Carlo experiments are carried out and the calculation result is shown in Fig. 5.

    In Fig.5,the traversing algorithm can get the optimal solution by comparing the performance of all alternative sensor scheduling schemes, but the convergence rate is slow. The particle swarm optimization algorithm has struck into the local optimization and cannot obtain the best scheme.Compared with the two algorithms,the improved Hungarian algorithm proposed in this paper can obtain the same scheduling scheme and risk value with traversing algorithm,and the convergence rate of the Hungarian algorithm is the fastest.

    Fig. 5. The comparison of algorithms.

    There are two reasons for the simulation results of Fig.5.On the one hand, the Hungarian algorithm calculates the best solution through optimization rules and the steps of analysis are finite. In contrast,the other two algorithms obtain the best scheme iteration by iteration,and if the best solution is not gotten,the iteration will not stop. So the convergence rates of them are slower than the Hungarian algorithm.On the other hand,the Hungarian algorithm can calculate the best scheme through theoretical analysis and matrix transformation. The best one must be obtained by the Hungarian algorithm,however,the other two algorithms search for the optimal scheme by comparing all solutions in each circle of iteration.If the best one is not contained in the compared solutions,it will be missed. The particle swarm optimization algorithm has struck into the local optimum as the blue curve shows in Fig. 5.

    The optimal sensor scheduling scheme is as follows:t1- s2,t2-s5, t3- s8, t4- s1, t5- s10.

    5.4. Simulation on sensor scheduling when targets move in straight lines

    In time period k:[0,25],the sensor scheduling method based on interception risk proposed in this paper (denoted as method 1) is adopted to schedule sensors to track targets. Meanwhile, it is compared with the sensor scheduling method(denoted as method 2) based on interception probability. The improved Hungarian algorithm proposed in this paper is used to calculate the sensor scheduling schemes. The comparison of calculation results is shown in Fig. 6.

    The target flight paths and sensor distribution are shown in Fig. 6(a); Curves of mean tracking precision of 5 targets changing with time are shown in Fig. 6(b); Curves of instantaneous interception risk values changing with time are shown in Fig. 6(c);Curves of cumulative value of interception risk changing with time are shown in Fig. 6(d); The curves of sensor scheduling schemes changing with time using the interception risk controlling method are shown in Fig. 6(e). The curves of sensor scheduling schemes changing with time using the interception probability controlling method are shown in Fig. 6(f).

    It can be seen from Fig.6(b)that both of the two kinds of sensor scheduling methods can meet the demands of target tracking precision, but combined with Fig. 6(c), (d), (e), and (f), some other conclusions can be obtained as follows: In the Interception risk control method,the risk values keep obviously lower,and sensor s7of the most importance in the sensor network has been scheduled for only 3 times. However, in the interception probability control method,the sensor s7has been scheduled for 10 times.The results above can illustrate that while maintaining the low risk values;the interception risk control method can protect the sensors of more importance at the sacrifice of the less important sensors by making them undertaking more radiation.

    5.5. Simulation on sensor scheduling when a target moves in

    To make further study on the proposed sensor scheduling method and illustrate its effectiveness, the method has also been applied to the scene of multiple maneuvering targets tracking.

    The simulation scene and experiment results are shown in Fig.7.

    Fig. 6. Comparison of sensor scheduling methods when targets are moving in straight lines.

    Fig. 7. Comparison of sensor scheduling methods when in multiple maneuvering targets tracking.

    The target flight paths and sensor distribution are shown in Fig. 7(a); Curves of mean tracking precision of 3 targets changing with time are shown in Fig. 7(b); Curves of instantaneous interception risk values changing with time are shown in Fig. 7(c).

    It can be seen that in the scene of multiple maneuvering targets tracking,the interception risk based sensor scheduling outperforms the interception probability based sensor scheduling method in interception risk with lower values in almost time instants from Fig.7(c),although the interception probabilities may not as good as the interception probability sensor scheduling method shown in Fig. 7(b). The probability is only one hand to increase the risk values,and if the cost is small,the risk values still keep pretty low,which means that it can protect the more important sensors with more cost in the network at the sacrifice of the sensors of less importance.

    6. Conclusion

    In this paper, the risk theory was applied to the field of radio frequency stealth and sensor management.Firstly,the definition of risk was provided, and then the sensor radiation interception risk was put forward. What’s more, the interception risk control and interception probability control were compared,and the feasibility of this method was analyzed theoretically. Secondly, to calculate the interception risk, the model of sensor radiation interception probability and the cost once the interception occurs were established. On the basis of the models above, the sensor scheduling objective function based on risk control theory was established to achieve the minimum interception risk with the constraint of target tracking accuracy.Then the Hungarian algorithm was introduced to obtain sensor schemes from the objective function. Finally simulations were made, and the results showed that the proposed interception probability model, the cost model, the sensor scheduling model based on risk control and the improved the Hungary algorithm were all effective. Especially, by using the method proposed in this paper,not only the sensor scheme with the minimum risk value could be obtained, but also the sensors of importance were effectively protected at the same time. Risk control is an important portion in combats. Besides sensor radiation interception, there are still some other kinds of risk, for example, in target detection, if there is a target but the detection result is ‘no’, the target will be missed and attack us, bringing some inevitable cost.The product of the target missing probability and the cost can be defined as the target detection risk according to the definition of the risk in this paper. Similarly, in target tracking, the risk can be called target losing risk, and in target recognition, the risk can be called target recognition risk. In the future work, all of the risk controlling methods will be studied in detail.

    Declaration of competing interest

    This paper has no conflict of interest with others.

    Acknowledgement

    This article is funded by Chinese national natural science foundation (61573374).

    亚洲五月婷婷丁香| 亚洲最大成人中文| 欧美+亚洲+日韩+国产| 国产免费av片在线观看野外av| 成年女人永久免费观看视频| 亚洲最大成人手机在线| 亚洲天堂国产精品一区在线| 国语自产精品视频在线第100页| 亚洲中文字幕一区二区三区有码在线看| 亚洲成人中文字幕在线播放| 国产高清有码在线观看视频| 色av中文字幕| 成人国产综合亚洲| av欧美777| 我要搜黄色片| bbb黄色大片| 欧美一级a爱片免费观看看| .国产精品久久| eeuss影院久久| 亚洲狠狠婷婷综合久久图片| 夜夜夜夜夜久久久久| a级一级毛片免费在线观看| 国产午夜福利久久久久久| 男女做爰动态图高潮gif福利片| 观看美女的网站| 一级黄片播放器| 免费在线观看日本一区| 亚洲一区二区三区色噜噜| 国产精品久久久久久精品电影| 亚洲av熟女| 欧美丝袜亚洲另类 | 亚洲avbb在线观看| 一个人看的www免费观看视频| 深夜a级毛片| 欧美性猛交╳xxx乱大交人| 能在线免费观看的黄片| netflix在线观看网站| 亚洲第一区二区三区不卡| 一区福利在线观看| 久久久久久久精品吃奶| 直男gayav资源| 国产毛片a区久久久久| 日韩欧美精品v在线| 丰满乱子伦码专区| 免费在线观看亚洲国产| 韩国av一区二区三区四区| 成人av一区二区三区在线看| 久久精品久久久久久噜噜老黄 | 麻豆成人午夜福利视频| 国产伦精品一区二区三区四那| 亚洲第一区二区三区不卡| 国产精品,欧美在线| 一个人观看的视频www高清免费观看| 免费看日本二区| 国产伦一二天堂av在线观看| 精品久久久久久久久亚洲 | 久久精品国产99精品国产亚洲性色| 国产激情偷乱视频一区二区| 人妻丰满熟妇av一区二区三区| 欧美不卡视频在线免费观看| 久久亚洲精品不卡| 国模一区二区三区四区视频| 久久国产精品人妻蜜桃| 亚洲 欧美 日韩 在线 免费| 成年女人永久免费观看视频| bbb黄色大片| 成人精品一区二区免费| 国产三级在线视频| 一个人观看的视频www高清免费观看| 校园春色视频在线观看| 欧美激情久久久久久爽电影| 色吧在线观看| 免费观看的影片在线观看| 日本一本二区三区精品| 亚洲av成人不卡在线观看播放网| 美女xxoo啪啪120秒动态图 | 日本精品一区二区三区蜜桃| 日韩 亚洲 欧美在线| 国产精品野战在线观看| 亚洲自拍偷在线| 少妇裸体淫交视频免费看高清| 欧美黄色淫秽网站| 亚洲一区二区三区不卡视频| 国产真实伦视频高清在线观看 | 欧美成人免费av一区二区三区| 天天一区二区日本电影三级| 久久这里只有精品中国| 美女cb高潮喷水在线观看| 又黄又爽又刺激的免费视频.| 99视频精品全部免费 在线| 国产私拍福利视频在线观看| 国产成人aa在线观看| 天堂av国产一区二区熟女人妻| 91字幕亚洲| 色综合站精品国产| 亚洲第一欧美日韩一区二区三区| 中文亚洲av片在线观看爽| 在线免费观看的www视频| 欧美成狂野欧美在线观看| 亚洲人成网站高清观看| 亚洲精品在线观看二区| 99国产综合亚洲精品| 国产精品亚洲av一区麻豆| 久久精品国产亚洲av涩爱 | 国产在线精品亚洲第一网站| 久久久久亚洲av毛片大全| 一级毛片久久久久久久久女| 蜜桃亚洲精品一区二区三区| h日本视频在线播放| 欧美午夜高清在线| 18禁黄网站禁片午夜丰满| 91九色精品人成在线观看| 村上凉子中文字幕在线| 18美女黄网站色大片免费观看| 午夜久久久久精精品| 午夜福利在线观看免费完整高清在 | 岛国在线免费视频观看| 国产精品永久免费网站| 午夜福利高清视频| 在线观看美女被高潮喷水网站 | av天堂在线播放| 国产精品女同一区二区软件 | 国产精品一区二区三区四区免费观看 | 久久久久免费精品人妻一区二区| av国产免费在线观看| 最近最新免费中文字幕在线| 99久久精品一区二区三区| 久久欧美精品欧美久久欧美| 免费人成视频x8x8入口观看| 日韩大尺度精品在线看网址| 午夜影院日韩av| 国产高清有码在线观看视频| 精品久久久久久久久久免费视频| 亚洲精品在线观看二区| 日韩高清综合在线| 韩国av一区二区三区四区| 国产一区二区在线观看日韩| 成年人黄色毛片网站| av专区在线播放| 日本五十路高清| 69人妻影院| 欧美高清性xxxxhd video| 夜夜看夜夜爽夜夜摸| 麻豆国产97在线/欧美| 97超级碰碰碰精品色视频在线观看| 伊人久久精品亚洲午夜| 国产精品免费一区二区三区在线| 国产麻豆成人av免费视频| 久久久久久久久久成人| 丰满人妻一区二区三区视频av| 最近在线观看免费完整版| 真人做人爱边吃奶动态| 亚洲美女视频黄频| 51国产日韩欧美| 99国产精品一区二区三区| 国产伦精品一区二区三区视频9| 午夜福利视频1000在线观看| 欧美乱色亚洲激情| 国产高清视频在线观看网站| 免费看日本二区| 女同久久另类99精品国产91| 国产一区二区三区在线臀色熟女| 一本精品99久久精品77| 午夜福利18| 中亚洲国语对白在线视频| 午夜精品一区二区三区免费看| 91午夜精品亚洲一区二区三区 | 欧美中文日本在线观看视频| 国产一区二区三区视频了| 露出奶头的视频| 人妻久久中文字幕网| 在线观看免费视频日本深夜| 国产精品精品国产色婷婷| 亚洲精品乱码久久久v下载方式| 久久精品91蜜桃| 午夜福利免费观看在线| 黄色丝袜av网址大全| 两个人的视频大全免费| 日韩av在线大香蕉| 国产在线男女| 色综合亚洲欧美另类图片| 简卡轻食公司| 免费av不卡在线播放| 亚洲av成人av| 色综合欧美亚洲国产小说| 午夜福利在线观看免费完整高清在 | 中文字幕人妻熟人妻熟丝袜美| 国产精品综合久久久久久久免费| 免费搜索国产男女视频| 韩国av一区二区三区四区| www.色视频.com| 可以在线观看的亚洲视频| 欧美绝顶高潮抽搐喷水| 亚洲美女视频黄频| 免费在线观看亚洲国产| 999久久久精品免费观看国产| 最近视频中文字幕2019在线8| 亚洲美女搞黄在线观看 | 变态另类成人亚洲欧美熟女| 色哟哟·www| 成人亚洲精品av一区二区| 人妻夜夜爽99麻豆av| 国产黄色小视频在线观看| 亚洲美女搞黄在线观看 | 亚洲电影在线观看av| 我要看日韩黄色一级片| 国产成人a区在线观看| 国产男靠女视频免费网站| 国产精品久久视频播放| 国产精品99久久久久久久久| 精品久久国产蜜桃| 久久人妻av系列| 久久人人精品亚洲av| 久久久久九九精品影院| 欧美精品啪啪一区二区三区| 亚洲最大成人av| 国内久久婷婷六月综合欲色啪| 好男人电影高清在线观看| 国产精品久久久久久人妻精品电影| 99热精品在线国产| 久久精品国产清高在天天线| 婷婷丁香在线五月| 久久久久亚洲av毛片大全| 亚洲精品久久国产高清桃花| 黄色配什么色好看| 中文字幕熟女人妻在线| 欧美一级a爱片免费观看看| 一级a爱片免费观看的视频| 在现免费观看毛片| 久久国产精品影院| 狠狠狠狠99中文字幕| 人妻丰满熟妇av一区二区三区| 婷婷色综合大香蕉| 18禁黄网站禁片午夜丰满| 波野结衣二区三区在线| 午夜亚洲福利在线播放| 中文字幕av在线有码专区| 草草在线视频免费看| 国产成人aa在线观看| av福利片在线观看| 久久久久久久精品吃奶| 亚洲,欧美,日韩| 亚洲一区二区三区色噜噜| 国产免费av片在线观看野外av| 很黄的视频免费| 日本成人三级电影网站| 色播亚洲综合网| 波多野结衣巨乳人妻| 高清日韩中文字幕在线| 校园春色视频在线观看| 深夜a级毛片| 午夜精品久久久久久毛片777| 国产白丝娇喘喷水9色精品| 午夜福利免费观看在线| 国产探花在线观看一区二区| 黄片小视频在线播放| 欧美中文日本在线观看视频| 午夜免费成人在线视频| 国产成人aa在线观看| 日本成人三级电影网站| 男女视频在线观看网站免费| 伊人久久精品亚洲午夜| 国内毛片毛片毛片毛片毛片| 在线国产一区二区在线| 亚洲熟妇中文字幕五十中出| 欧美国产日韩亚洲一区| 亚洲精品成人久久久久久| 亚洲av免费高清在线观看| 在线十欧美十亚洲十日本专区| 高清日韩中文字幕在线| 午夜激情欧美在线| 不卡一级毛片| 男人的好看免费观看在线视频| 亚洲最大成人中文| 观看美女的网站| 免费一级毛片在线播放高清视频| 久久精品影院6| www.熟女人妻精品国产| 国内揄拍国产精品人妻在线| 性欧美人与动物交配| 亚洲专区中文字幕在线| 99在线视频只有这里精品首页| 亚洲av二区三区四区| 美女xxoo啪啪120秒动态图 | 欧美激情在线99| 在线播放无遮挡| 亚洲18禁久久av| 高清在线国产一区| 国产高清激情床上av| 夜夜夜夜夜久久久久| 成人av一区二区三区在线看| 好男人在线观看高清免费视频| 国产乱人伦免费视频| 一级毛片久久久久久久久女| 亚洲无线观看免费| 国产精品日韩av在线免费观看| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 无人区码免费观看不卡| 日韩人妻高清精品专区| 国产淫片久久久久久久久 | 成人午夜高清在线视频| 日韩国内少妇激情av| 90打野战视频偷拍视频| 少妇的逼水好多| 男女床上黄色一级片免费看| 乱码一卡2卡4卡精品| avwww免费| 久久精品国产99精品国产亚洲性色| 又粗又爽又猛毛片免费看| 亚洲欧美日韩高清专用| 亚洲第一区二区三区不卡| 精品久久久久久久末码| .国产精品久久| 一区二区三区四区激情视频 | 日韩高清综合在线| 国产精品一区二区三区四区免费观看 | av在线观看视频网站免费| 99在线视频只有这里精品首页| 亚洲成人免费电影在线观看| 欧美成人一区二区免费高清观看| 欧美日韩瑟瑟在线播放| 亚洲七黄色美女视频| 中文资源天堂在线| 免费看美女性在线毛片视频| 特级一级黄色大片| 日本a在线网址| 中文资源天堂在线| 超碰av人人做人人爽久久| 天堂av国产一区二区熟女人妻| www.999成人在线观看| 国产又黄又爽又无遮挡在线| 美女黄网站色视频| 国产成人a区在线观看| 我的女老师完整版在线观看| 天堂影院成人在线观看| 免费电影在线观看免费观看| 中文在线观看免费www的网站| 午夜a级毛片| 亚洲精品456在线播放app | 久久久久久大精品| 在线播放无遮挡| 九九热线精品视视频播放| av专区在线播放| 国产av不卡久久| av在线老鸭窝| 欧美黑人欧美精品刺激| 人妻丰满熟妇av一区二区三区| 亚洲av免费在线观看| 每晚都被弄得嗷嗷叫到高潮| www.www免费av| 网址你懂的国产日韩在线| 欧美zozozo另类| 人妻制服诱惑在线中文字幕| av视频在线观看入口| 9191精品国产免费久久| 极品教师在线免费播放| 老司机深夜福利视频在线观看| 黄片小视频在线播放| 桃色一区二区三区在线观看| 欧美+亚洲+日韩+国产| 亚洲成人久久爱视频| 91久久精品电影网| a在线观看视频网站| 国产精品一区二区免费欧美| 色吧在线观看| 久久久久精品国产欧美久久久| 欧美区成人在线视频| 一区二区三区四区激情视频 | 给我免费播放毛片高清在线观看| 国产一级毛片七仙女欲春2| 国产亚洲精品久久久com| 99视频精品全部免费 在线| 日韩高清综合在线| 国内精品美女久久久久久| 男人的好看免费观看在线视频| 国产精品久久久久久久电影| 久久九九热精品免费| 亚洲电影在线观看av| 久久九九热精品免费| 欧美日韩黄片免| 久久午夜亚洲精品久久| 日本免费一区二区三区高清不卡| 精品无人区乱码1区二区| 日本五十路高清| 日本黄色片子视频| 亚洲成人中文字幕在线播放| 国产成人啪精品午夜网站| 草草在线视频免费看| 99久久成人亚洲精品观看| 国产欧美日韩一区二区三| 亚洲天堂国产精品一区在线| 欧美精品国产亚洲| 麻豆一二三区av精品| or卡值多少钱| 日韩国内少妇激情av| 我要搜黄色片| 欧美精品啪啪一区二区三区| 色精品久久人妻99蜜桃| 午夜福利在线观看免费完整高清在 | 国产免费男女视频| 亚洲aⅴ乱码一区二区在线播放| 欧美不卡视频在线免费观看| 99riav亚洲国产免费| 日韩中文字幕欧美一区二区| 日韩亚洲欧美综合| 波多野结衣高清无吗| 夜夜夜夜夜久久久久| 成人三级黄色视频| 免费黄网站久久成人精品 | 免费一级毛片在线播放高清视频| 亚洲性夜色夜夜综合| 欧美激情国产日韩精品一区| 日韩av在线大香蕉| 一区二区三区激情视频| 熟女人妻精品中文字幕| 免费看a级黄色片| 久久草成人影院| 精品久久久久久久久亚洲 | 小说图片视频综合网站| 欧美乱妇无乱码| 欧美一区二区精品小视频在线| 99热6这里只有精品| 国产午夜精品久久久久久一区二区三区 | 亚洲片人在线观看| 观看免费一级毛片| 国产亚洲欧美在线一区二区| 国产熟女xx| 免费看美女性在线毛片视频| h日本视频在线播放| 午夜免费激情av| 三级国产精品欧美在线观看| 日日摸夜夜添夜夜添小说| 亚洲精品日韩av片在线观看| 欧美高清性xxxxhd video| 久久久久久久久大av| av在线老鸭窝| 午夜福利免费观看在线| 成人高潮视频无遮挡免费网站| 色播亚洲综合网| 国产亚洲精品久久久久久毛片| 给我免费播放毛片高清在线观看| 97碰自拍视频| 成熟少妇高潮喷水视频| 亚洲av.av天堂| 看免费av毛片| 免费大片18禁| 又紧又爽又黄一区二区| 亚洲国产色片| 日本与韩国留学比较| 亚洲avbb在线观看| 天堂动漫精品| 亚洲无线观看免费| 性插视频无遮挡在线免费观看| 亚洲成人免费电影在线观看| 欧美日韩福利视频一区二区| 国产真实伦视频高清在线观看 | 麻豆成人av在线观看| 最近在线观看免费完整版| 国产精品影院久久| 亚洲男人的天堂狠狠| 国产91精品成人一区二区三区| 可以在线观看毛片的网站| 18禁在线播放成人免费| h日本视频在线播放| 久久性视频一级片| 亚洲av成人不卡在线观看播放网| 欧美日韩亚洲国产一区二区在线观看| 男人舔女人下体高潮全视频| 久久久精品大字幕| 欧美性感艳星| 国语自产精品视频在线第100页| 欧美成狂野欧美在线观看| 国产精品久久久久久亚洲av鲁大| 亚洲人成网站在线播| 国产精品,欧美在线| 麻豆一二三区av精品| 嫩草影院新地址| 三级男女做爰猛烈吃奶摸视频| 99在线视频只有这里精品首页| av天堂在线播放| 国产精品久久电影中文字幕| 亚洲18禁久久av| 韩国av一区二区三区四区| 夜夜爽天天搞| 成人毛片a级毛片在线播放| 性欧美人与动物交配| 国产精品久久久久久精品电影| 窝窝影院91人妻| 性色av乱码一区二区三区2| 免费av不卡在线播放| 国产真实乱freesex| 亚洲国产精品sss在线观看| 级片在线观看| 亚洲av日韩精品久久久久久密| 亚洲欧美日韩东京热| 高清毛片免费观看视频网站| 亚洲精品亚洲一区二区| 午夜福利成人在线免费观看| 免费高清视频大片| 两性午夜刺激爽爽歪歪视频在线观看| 亚洲欧美清纯卡通| av中文乱码字幕在线| 精品久久久久久成人av| www.999成人在线观看| 国产精品亚洲美女久久久| 亚洲精品久久国产高清桃花| 久久欧美精品欧美久久欧美| 久久伊人香网站| 天堂√8在线中文| 内射极品少妇av片p| 十八禁人妻一区二区| 亚洲 国产 在线| 99热这里只有精品一区| 天堂√8在线中文| 伊人久久精品亚洲午夜| 午夜精品在线福利| 91av网一区二区| 国产在线精品亚洲第一网站| 我要搜黄色片| 亚洲精品在线美女| 男人狂女人下面高潮的视频| 国产精品免费一区二区三区在线| 搡老熟女国产l中国老女人| 在线观看午夜福利视频| 99国产极品粉嫩在线观看| www.熟女人妻精品国产| 综合色av麻豆| 婷婷精品国产亚洲av| 成人av在线播放网站| www日本黄色视频网| 国产色婷婷99| 亚洲欧美日韩卡通动漫| 悠悠久久av| 亚洲av不卡在线观看| 久久人人爽人人爽人人片va | 舔av片在线| 一级黄色大片毛片| 亚洲人成伊人成综合网2020| 一进一出好大好爽视频| 在线观看舔阴道视频| 十八禁人妻一区二区| 国产男靠女视频免费网站| 乱码一卡2卡4卡精品| 亚洲av美国av| 两性午夜刺激爽爽歪歪视频在线观看| 在现免费观看毛片| eeuss影院久久| 成人一区二区视频在线观看| 亚洲av熟女| 日本免费一区二区三区高清不卡| 亚洲不卡免费看| 久久人人爽人人爽人人片va | 国产精品精品国产色婷婷| 熟女电影av网| 久久精品国产99精品国产亚洲性色| 精品午夜福利在线看| 免费看光身美女| 别揉我奶头~嗯~啊~动态视频| www日本黄色视频网| 窝窝影院91人妻| 亚洲精品影视一区二区三区av| 在线观看av片永久免费下载| 直男gayav资源| 最近视频中文字幕2019在线8| 午夜两性在线视频| 男人狂女人下面高潮的视频| 国产国拍精品亚洲av在线观看| 婷婷亚洲欧美| 好男人在线观看高清免费视频| 少妇被粗大猛烈的视频| 可以在线观看毛片的网站| 毛片一级片免费看久久久久 | 国产主播在线观看一区二区| 欧美高清成人免费视频www| 俺也久久电影网| 少妇人妻一区二区三区视频| 啦啦啦韩国在线观看视频| 欧美激情在线99| 成人国产一区最新在线观看| 99久久成人亚洲精品观看| 免费看美女性在线毛片视频| 我的老师免费观看完整版| 内地一区二区视频在线| 亚洲av电影在线进入| 亚洲电影在线观看av| 精品午夜福利视频在线观看一区| 国产一区二区亚洲精品在线观看| 精品不卡国产一区二区三区| 男人狂女人下面高潮的视频| 精品久久国产蜜桃| 欧美日韩综合久久久久久 | 国产 一区 欧美 日韩| 观看美女的网站| ponron亚洲| 天堂影院成人在线观看| 精品免费久久久久久久清纯| 在线观看av片永久免费下载| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 夜夜躁狠狠躁天天躁| 亚洲欧美日韩卡通动漫| 日韩欧美国产一区二区入口| 国产精品一区二区免费欧美| 一个人免费在线观看的高清视频| 亚洲色图av天堂| 精品一区二区三区视频在线| 午夜免费成人在线视频| 日韩欧美在线二视频| 亚洲精品粉嫩美女一区| 老司机深夜福利视频在线观看| 高清日韩中文字幕在线| 免费电影在线观看免费观看| 国产 一区 欧美 日韩| 国产亚洲欧美在线一区二区| 在线国产一区二区在线| 欧美成人性av电影在线观看|