Next Article in Journal
Hydrological Response Assessment of Land Cover Change in a Peruvian Amazonian Basin Impacted by Deforestation Using the SWAT Model
Next Article in Special Issue
Infrared–Visible Image Fusion through Feature-Based Decomposition and Domain Normalization
Previous Article in Journal
All-Weather Monitoring of Ulva prolifera in the Yellow Sea Based on Sentinel-1, Sentinel-3, and NPP Satellite Data
Previous Article in Special Issue
Comparative Analysis of Pixel-Level Fusion Algorithms and a New High-Resolution Dataset for SAR and Optical Image Fusion
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-Source T-S Target Recognition via an Intuitionistic Fuzzy Method

1
Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen University, Shenzhen 518060, China
2
College of Electronics and Information Engineering, Shenzhen University, Shenzhen 518060, China
*
Author to whom correspondence should be addressed.
Remote Sens. 2023, 15(24), 5773; https://doi.org/10.3390/rs15245773
Submission received: 9 August 2023 / Revised: 7 December 2023 / Accepted: 15 December 2023 / Published: 18 December 2023
(This article belongs to the Special Issue Multi-Sensor Systems and Data Fusion in Remote Sensing II)

Abstract

:
To realize aerial target recognition in a complex environment, we propose a multi-source Takagi–Sugeno (T-S) intuitionistic fuzzy rules method (MTS-IFRM). In the proposed method, to improve the robustness of the training process of the model, the features of the aerial targets are classified as the input results of the corresponding T-S target recognition model. The intuitionistic fuzzy approach and ridge regression method are used in the consequent identification, which constructs a regression model. To train the premise parameter and reduce the influence of data noise, novel intuitionistic fuzzy C-regression clustering based on dynamic optimization is proposed. Moreover, a modified adaptive weight algorithm is presented to obtain the final outputs, which improves the classification accuracy of the corresponding model. Finally, the experimental results show that the proposed method can effectively recognize the typical aerial targets in error-free and error-prone environments, and that its performance is better than other methods proposed for aerial target recognition.

1. Introduction

The complexity of the battlefield environment is enhanced significantly by high-tech equipment, which has introduced great difficulties to the acquisition of target information. As the battlefield expands to the five-dimensional space of sea, land, air, sky, and electromagnetics, the collection of target information will not only be affected by the accuracy and stability of sensor equipment, the influences of the climate environment, and the complex electromagnetic field environment, but also by other factors that lead to deviations or even errors in the collected target information. In addition, there will be interference and confusing equipment intentionally released by the enemy, which increases the uncertainty of the observation of the target. Therefore, it is difficult for a single information source to obtain accurate and complete intelligence information in such a complex environment, and also meet the requirements of actual aerial combat.
With the development of multi-source detection technology, a structure able to track multiple targets and realize target recognition is essential to a multi-sensor data fusion system. Information fusion can recognize a target from multiple dimensions and multiple directions, which data can then be comprehensively processed with the complementarity and redundancy of information, to eliminate the influence of inaccuracy and incompleteness of information obtained from a single information source. Moreover, multi-feature fusion processing is designed to obtain more accurate target features by data fusion of two or more sensors, thus breaking the limits of single-sensor detection, in which equipment generally collects the information of only one feature within a corresponding sensing range [1]. Target features obtained by different sensors are imprecise and conflict with the influence of complex environments, interference signals and so on; for example, impulsive noise may cause the collected data to deviate from the original range, leading to the drawing of the wrong conclusions in the target recognition system. Therefore, muti-feature fusion and improving the interpretability of target recognition are particularly important.

1.1. Literature Review and Motivation

For the recognition system, a series of methods have been presented, such as the Dempster–Shafer (D-S) [2,3,4], fuzzy set [5,6,7], probability statistics [8,9,10], the gray system [11,12], rough sets [13,14,15], and fractal theory [16,17,18]. D-S evidence theory, a general framework for information fusion, is used to combine multi-level information from multi-source environments for reasoning and dealing with uncertainty, imprecision, and incompletion [19,20]. Therefore, extended evidence theories have been well established in information fusion [21], decision analysis [22], risk assessment [23,24], pattern recognition [25], and other fields. However, traditional evidence theory has low accuracy because of the problems of constructing a basic probability assignment (BPA) and conflict management.
With regard to the framework of the BPA, some modeling approaches have been provided. Moreover, Dempster’s combination method is performed to transform the BPA into probability distribution, the quality of the BPA in evidence theory will determine whether the recognition result is reasonable. Yin et al. [26] proposed a measurement model to achieve uncertainty management of the BPA via the processing of negation and the links between uncertain data and entropy. Jiang et al. [27] constructed a correlation coefficient to describe the non-intersection and the distinctions between the focal elements. Wang et al. [28] proposed a belief divergence measurement that presented the correlation of various kinds of subsets with a belief function and an appropriate probability distribution. Kaur et al. [8] processed nonnegative and symmetric divergence measures for BPA. Hu et al. [9] proposed the cross-information to change the comprehensive BPA. However, an algorithm based on decision-level data fusion needs high data preprocessing and the decision-making methods are short of general structure after obtaining the characterized distributions of basis reliability.
When coping with highly conflicting evidence, D-S evidence theory may lead to counter-intuitionistic recognition. Therefore, many methods have been proposed including Yager’s combination rules method [29], Murphy’s arithmetically average model of bodies of evidence [30], Li’s trust-based method [31], and so on. Target recognition methods based on fuzzy set theory only need a small amount of prior knowledge to achieve more efficient and accurate recognition. Wang [32] proposed the intuitionistic fuzzy dynamic Bayesian network to transfer the outputs of intuitionistic fuzzy rules into probability. Jiang [7] established a hybrid decision-making fuzzy rough and hesitant sets model and developed a machine learning mechanism to construct the relative loss functions. Guo [33] proposed the recognition structure of UAVs based on a recurrent convolutional strategy, which influenced the degrees of super-resolution realization by setting the numbers of cycles and iterations with changes in the blur degree. Moreover, intuitionistic fuzzy sets (IFS) can conquer the inaccuracy and limitations of traditional fuzzy sets for solving specific information and eliminate the bottleneck that Bayesian models excessively rely on. Lei [34] proposed an intuitionistic fuzzy reasoning (IFR) framework to obtain the membership and non-membership degrees of the property variables of a recognition model. Dolgiy [35] combined the D-S method and Takagi–Sugeno (T-S) fuzzy system to develop the empirical process of an expert system of probability estimates based on subjective preferences of the description of typical sensors. Therefore, a novel hybrid T-S and intuitionistic fuzzy inference system are applied to target recognition in our method.

1.2. Our Contributions

In this paper, a novel MTS-IFRM is proposed for high-performance multi-target recognition in error-free and error-prone environments. The main novelties of our method include:
  • Improving the robustness of the training process of the model: the features of the aerial targets are classified as inputs to the corresponding T-S target recognition model, so that features are divided into multi-level features with the target properties;
  • In the T-S model algorithm, the study of premise and consequence parameter identification has been the key question. We apply an intuitionistic fuzzy C-means method based on the dynamic particle swarm optimization (DPSO) algorithm and the ridge regression model to identify the premise and consequence parameter of the T-S intuitionistic fuzzy model, respectively, which better realizes the parametric identification of the model;
  • High classification accuracy can be guaranteed in error-free and error-prone environments. The adaptive weight algorithm reduces the weight corresponding to the model with a low degree of discrimination and increases the weight corresponding to the model with a high degree of discrimination, which is better distinguished from the input features.

1.3. Organization of the Article

The organization of the method is described as follows: The fuzzy target recognition model is given in Section 2. Model construction and parameter identification are presented in Section 3. The simulation results and an analysis with comparable methods are given in Section 4. Finally, the conclusions are organized in Section 5. The meanings of notation in the article are listed in Table 1.

2. Preliminaries

In this section, the preliminaries of the Dempster–Shafer evidence theory and Takagi–Sugeno intuitionistic fuzzy rules method are first introduced.

2.1. Evidence Theory

Dempster–Shafer evidence theory has flexibility and effectiveness in modeling uncertainties without prior information [19]. A discriminative frame Θ consisting of all possible propositions is defined as follows:
Θ = { θ 1 , θ 2 , , θ i , , θ n }
Mass function mapping m from 2 Θ to [0, 1] is defined as BBA, which satisfies the following conditions:
m ( ) = 0 a n d θ Θ m ( θ ) = 1
If m ( θ ) > 0 , then θ is described as the focal element. Suppose two independent basic belief assignments m 1 , m 2 construct the form m 1 m 2 according to Dempster’s rule of combination, which can be expressed as follows:
m ( θ ) = 1 1 K E F = θ m 1 ( E ) m 2 ( F ) , θ 0 θ =
With
K = E F m 1 ( E ) m 2 ( F )
where E , F 2 θ and K is the conflict coefficient of m1 and m2. When the evidence is highly conflicting, the evidence fusion processing will lead to counter-intuitionistic results. For a multi-source target recognition system, a degree of conflict of the information is provided by each sensor, so dealing with the conflicts between the evidence is the key to applying various evidence-based theories for accurate target recognition.
The common features of information on aerial targets, such as flight speed, acceleration, flight height and so on, can be detected by a multi-source system. Due to the problem of various forms of signal interference and other factors, a system detecting the target information will contain a lot of uncertainty. Most methods based on decision-level data fusion, such as D-S and Yager, require a high level of data preprocessing and display low interpretability. In order to improve the interpretability of the information fusion and the process of aerial target recognition, the T-S intuitionistic fuzzy model is introduced to establish mapping between the feature space and the target space. The T-S intuitionistic fuzzy model has strong learning ability and robustness, which means it can label historically detected targets with the correct categories, and input their feature information into the T-S intuitionistic fuzzy model for training after intuitionistic fuzzification, then forming a correct mapping relationship. By continuously learning target features, the final trained model can accurately obtain the mapping relationship between the features and the targets.

2.2. Takagi–Sugeno Intuitionistic Fuzzy Rules Method

When the number of input variables increases, the number of rules of the T-S model will increase exponentially, resulting in a decrease in training performance. For typical aerial targets, we divide the features of the aerial targets into two or three groups for modeling. Figure 1 illustrates the classification and the process of target recognition.
First, the features are divided into primary features and secondary features with the target properties, and each secondary feature contains two or three primary features. Then, the model is trained by the training data to obtain the premise and consequence parameters, and the primary features are fused and judged by the trained MTS-IFRM. Finally, the identity estimation results of the target are fused with secondary features to obtain the final recognition result of the target.
The main difficulty of aerial target recognition lies in the fusion of multiple features. Achieving accurate recognition of targets from imprecise and conflicting feature data is the key. This section will mainly introduce the proposed aerial target recognition algorithm. The MTS-IFRM is designed by taking the radar graphic (RG) as an example, the inputs of the model are the feature values of aspect ratio (AR) and cross-sectional area (CA) after intuitionistic fuzzification, then we define the MTS-IFRM based on a fuzzy set:
R u l e R l :   I f z C A is   A 1 l ,   a n d z A R i s A 2 l ,   t h e n : f R G l ( z R G ) = p R G 0 l + p R G l S ( z C A ) + p R G l S ( z A R ) , l = 1 , 2 , , L R G
where the part after “if” denotes the premise and the part after “then” denotes the consequence of the rule. z C A = C A , μ ( C A ) , υ ( C A ) | C A E C A and z A R = A R , μ ( A R ) , υ ( A R ) | A R E A R denote the inputs of the CA and AR after intuitionistic fuzzification, respectively. μ ( ) and υ ( ) are the degrees of membership and the non-membership, respectively, which represent the intuitionistic fuzzy number. Then, 0 μ ( ) + υ ( ) 1 .   π ( ) = 1 μ ( ) υ ( ) denotes the intuitionistic index of the intuitionistic fuzzy number. The specific process can be referenced in [36]. E C A and E A R denote the universe of discourses of the CA and AR, respectively. A 1 l and A 2 l denote the intuitionistic fuzzy subsets corresponding to the inputs z C A and z A R of rule l , respectively. The input vector z R G = [ z C A , z A R ] denotes the premise variable of the model. p R G l = p R G 0 l , p R G 1 l , p R G 2 l denotes the consequence part. S ( ) denotes the scoring function with the abilities of sequencing and decision-making, which converts an intuitionistic fuzzy set into a definite numerical value [37]. L R G denotes the RG number of fuzzy rules. Therefore, the weighted average y R G 0 of the final outputs for each rule f R G l ( z R G ) are obtained by:
y R G 0 = l = 1 L R G μ l ( z R G ) f R G l z R G l ˜ = 1 L 1 μ l ˜ ( z R G ) = l = 1 L R G μ ˜ l ( z R G ) f R G l z R G
where μ l ( z R G ) denotes the fuzzy membership degree of fuzzy rule l to input z R G . The normalization method is defined as:
μ ˜ l ( z ) = μ l ( z R G ) l ˜ = 1 L R G μ l ˜ ( z R G )
where
μ l ( z R G ) = μ A 1 l ( z C A ) μ A 2 l ( z A R )
μ ˜ l ( z R G ) = μ l ( z R G ) l ˜ = 1 L R G μ l ˜ ( z R G )
μ A 1 l ( z CA ) = λ 1 μ A 1 l ( z C A ) + λ 2 υ A 1 l ( z C A ) + λ 3 π A 1 l ( z C A )
μ A 1 l ( z A R ) = λ 1 μ A 1 l ( z A R ) + λ 2 υ A 1 l ( z A R ) + λ 3 π A 1 l ( z A R )
Here, μ A i l ( )   , υ A i l ( ) and π A i l ( ) are calculated by the premise parameter identification. μ A i l ( ) can be expressed by using a suitable index λ (generally setting λ 1 = 1 , λ 2 = 0 , and λ 3 = 0.5 ).
Similarly, the MTS-IFRM based on the feature of motion (M) and location (L) can be established. The output results of the corresponding model are defined as follows:
y M F 0 = l = 1 L M μ l ( z M ) f M l z M l ˜ = 1 L M μ l ˜ ( z M ) = l = 1 L M μ ˜ l ( z M ) f M l z M
y L 0 = l = 1 L L μ l ( z 3 ) f L l z L l ˜ = 1 L 3 μ k ˜ ( z L ) = l = 1 L L μ ˜ l ( z L ) f L F l z L
where z M = [ z F S , z A , z V S ] , z L = [ z F H , z D D ] , z F S , z A , z V S , z F H and z D D denote flight speed, acceleration, vertical speed, flight height, and detection distance features after intuitionistic fuzzification, respectively.

3. Aerial Target Recognition Methods Based on the MTS-IFRM

According to the above analysis, parameter identification is a central role of a T-S rule-based system, which evaluates the quality of the rule modeling. Therefore, the related work of the MTS-IFRM contains the structure identification of consequent parameters based on the ridge regression method, the identification of the premise part with a novel intuitionistic fuzzy C-means (IFCM) clustering model, and the adaptive weight algorithm.

3.1. Construction of MTS-IFRM

In this section, we take the training of the RG consequence parameters as an example. First, according to Equations (5) and (6), let:
s e = 1 , s T T
where s = [ S ( z C S ) , S ( z A R ) ] denotes the scoring function set of the input z . So that:
s ˜ R G l = μ ˜ l ( z R G ) s e
s g , R G = s ˜ R G 1 T , s ˜ R G 2 T , , s ˜ R G L R G T T
p R G l = p R G l , p R G l , p R G l T
p g , R G = p R G 1 T , p R G 2 T , , p R G L R G T T
where μ ˜ l ( z R G ) is acquired in Equation (7). Next, the output of the model is denoted as:
y R G 0 = p g , R G T s g , R G
In Equation (19), we obtain the RG output of the MTS-IFRM. To solve the target recognition problem, each secondary feature needs to have the corresponding output. Therefore, the MTS-IFRM is constructed. The ridge regression method, a modified analysis of the least-squares estimation, can deal with multicollinearity by operating the unbiased estimator. To obtain a more reliable estimate of the consequent parameter, ridge regression analysis is constructed to train the model:
min p g , m , R G J p g , m , R G = 1 2 m = 1 M n = 1 N p g , m , R G T s g , n , R G y ˜ n , m 2 + γ 1 m = 1 M n = 1 N p g , m , R G T p g , m , R G
Equation (20) contains the minimization of empirical risk and structure risk. Where p g , m , R G denotes the consequent parameter of the m-th aerial target, N denotes the number of training samples, y ˜ n , m denotes the M-dimensional label vector of the n-th training sample, γ 1 represents the regularization parameter. To adjust the consequent parameter p g , m , R G , the final optimization result is calculated by the first-order necessary condition:
J p g , m , R G p g , m , R G = m = 1 M n = 1 N s g , n , R G ( s g , n , R G ) T + γ 1 I l × l p g , m , R G m = 1 M n = 1 N s g , n , R G y ˜ n , m = 0
In Equation (21), p g , m , R G is as follows:
p g , m , R G = n = 1 N γ 1 I l × l + s g , n , R G ( s g , n , R G ) T 1 m = 1 M n = 1 N s g , m , R G y ˜ n , m
Therefore, a new MTS-IFRM of RF for aerial target recognition can be expressed as follows according to Equations (5) and (22):
Rule R l :   I f z C S i s   A 1 l ,   and z A R i s A 2 l ,   t h e n : f R G l ( z R G ) = p g , j , R G 0 l + p g , j , R G 1 l S ( z C S ) + p g , j , R G 2 l S ( z A R ) , l = 1 , 2 , , L R G
where z C S and z A R are the CS features and AR features after intuitionistic fuzzification, respectively. p g , m , R G i l denotes the consequent parameter corresponding to rule l of model m , here, i = 0 , 1 , 2 and L R G denotes the number of rules. Similarly, the corresponding rules of the MTS-IFRM for the motion feature (MF) and location feature (LF) can be established in the same construction procedures.

3.2. Premise Identification

IFCM and the FCM clustering are very sensitive to the initial clustering center position and are prone to converging to the local optimal solution in a noisy environment. Moreover, the variation factors of dynamic evolution theory are introduced into the PSO algorithm to improve the clustering optimization model [38].
Suppose the position of the i-th particle is X i = ( x i , 1 , x i , 2 , , x i , d ) , the velocity is V i = ( v i , 1 , v i , 2 , , v i , d ) and P i = ( p i , 1 , p i , 2 , , p i , d ) is the optimal solution in d-dimensional space, where i = 1 , 2 , , G , G is the size of the particle swarm, then the velocity and position updated in the j-th dimension at an iteration are:
v i , j ( t + 1 ) = ω v i , j ( t ) + c 1 r 1 ( p i , j x i , j ( t ) ) + c 2 r 2 ( p g , j x i , j ( t ) )
x i , j ( t + 1 ) = x i , j ( t ) + v i , j ( t + 1 ) , j = 1 , 2 , , d
where P g = ( p g , 1 , p g , 2 , , p g , d ) denotes the current global optimal solution, w denotes the inertia weight. r 1 and r 2 are random numbers in the interval [0, 1], respectively. c 1 and c 2 denote the learning parameter of the DPSO, respectively, and are defined as follows:
c 1 = 2.5 2 × t T
c 2 = 2.5 + 2 × t T
where t denotes the number of iterations in this round, and T denotes the maximum number of iterations. c 1 and c 2 change dynamically to meet the changing rule with the increase in the number of iterations. Therefore, the algorithm can adaptively expand the local search range in the early stage of iteration and accelerate the global convergence speed in the late iteration. This learning mechanism is used to accelerate the overall convergence.
In the iterative process, the inertia weight can affect the search range of the current round according to the speed of the previous round. At the end of each round of iterations, the fitness function of the selected particle swarms should be obtained. Moreover, the inertia weights can be dynamically adjusted based on the results of the fitness values, which will make the selected particle swarms in this round of iterations have a more balanced position. The nonlinear adaptive inertia weight strategy is used to calculate the inertia weight, and the method is as follows:
w = w min + ( w max w min ) × ( f i f min ) f a v g f min , f i f a v g w max , f i > f a v g
where w max and w min are the maximum and minimum inertia weights set, respectively, and f min and f max represent the minimum and maximum fitness values of the particle swarm in this round, respectively. f a v g represents the average fitness of a particle swarm. At this point, the speed of the particle swarm mainly refers to the speed of the previous round to increase the activity of the particle swarm. Conversely, the speed of the particle swarm at this time mainly refers to the local optimal position and the global optimal position to accelerate the particle swarm to move closer to the dominant space.
Suppose Z = { z 1 , z 2 , , z N } is the dataset, where z n = [ z 1 , z 2 , , z d ] T and z i = x i , μ ( x i ) , υ ( x i ) | x i E , 1 i d . N is the number of data items. m is the number of clusters. Here, V = { v 1 , v 2 , , v m } , v m R d , is a set of M clustering centers where M 2 . Each clustering center vector can be expressed as v m = [ c 1 m , c 2 m , , c d m ] , where c i m = c i m , μ v m ( c i m ) , υ v m ( c i m ) 1 i d , 1 m M . The objective function is given below:
J m ( U , V ) = n = 1 N m = 1 M μ n m c 0 d n m 2 z n , v m μ n m [ 0 , 1 ] ,   1 m M ,   1 n N m = 1 M μ n m = 1 ,   n , m
where μ n m is the membership degree of the sample data in the m-th class. U = [ μ n m ] N × M denotes the fuzzy membership matrix of X . c 0 [ 1 , + ) denotes the fuzzification index. d n m 2 z n , v m denotes the ordinary Euclidean distance between the measurement point z n and the clustering center v m , which is defined as:
d n m 2 z n , v m = 1 2 i = 1 d p i [ μ z n ( x i ) μ v m ( c i m ) ] 2 + [ υ z n ( x i ) υ v m ( c i m ) ] 2 + [ π z n ( x i ) π v m ( c i m ) ] 2
where p i = ( 1 / p , 1 / p , , 1 / p ) , μ z n ( x i ) , υ z n ( x i ) and π z n ( x i ) are the fuzzy membership degree, non-membership degree, and intuitionistic index of input data z n , respectively. μ v k ( c i m ) , υ v k ( c i m ) and π v k ( c i m ) are the fuzzy membership degree, non-membership degree, and intuitionistic index of clustering center v m , respectively.
Therefore, to obtain the optimal objective function by DPSO, it can be considered that the smaller the result of the objective function J m U , V , the better the fitness of the particles, so the particle fitness can be expressed by the following:
f ( x i ) = λ J U , V = λ n = 1 N m = 1 M μ n m 2 d n m 2 z n , v i , m
where v i , m denotes the intuitionistic fuzzy number of the m-th dimension of particle x i and also denotes m-th clustering center. λ is a constant, which can be manually adjusted according to the specific situation. The main steps for DPSO-IFCM are summarized in Figure 2.
In Figure 2, it is shown that the proposed DPSO-IFCM clustering algorithm includes the following steps:
  • Initialization: Initialize G particles to form G first-generation particles, where each particle randomly generates M clustering centers. The fitness value is calculated by Equation (31) and determines the current optimal position of each particle i by the fitness value, and the position of the current particle swarm with the highest fitness is p g ;
  • Compute the velocity and position of each particle in the new particle swarm using Equations (24) and (25);
  • Compute the fitness value of each particle in the new particle swarm using Equation (31) and compare it with the previous generation. For the same individual, if the individual fitness in the new population is larger than the corresponding individual in the previous generation, replace the individual of the previous generation and this becomes the optimal position of particle i , otherwise, it remains unchanged;
  • Compare the fitness value of the optimal individual of the new particle swarm with the optimal individual of the previous generation, if the fitness is greater than the previous generation, update the optimal position of the population to the optimal position of the new particle swarm, otherwise, it remains unchanged, then t = t + 1 .
  • Repeat Steps 2–4 until a criterion is met that is usually of a sufficiently good fitness or a maximum number of iterations;
  • Obtain the individual position with the highest fitness value as the initial clustering center of the IFCM algorithm;
  • Compute the membership degree μ n m of each sample dataset to each clustering center and the premise parameters μ A i m ( x i ) , v A i m ( x i ) , π A i m ( x i ) of the model. A detailed method can be found in Ref. [36].
Finally, we input the intuitionistic fuzzy features into the trained MTS-IFRM. The output of the j-th model is:
y ˜ j = l = 1 L μ l ( z ) f l ( z ) i = 1 L μ i ( z ) = l = 1 L μ ˜ l ( z ) f l ( z )

3.3. Adaptive Weight Algorithm

From Equation (32), we know that every target has a corresponding MTS-IFRM, then each model is trained and obtains the corresponding label vector output. If the features of the input data are more similar to a certain class, then the value of the corresponding class in the label vector output will be closer to one, otherwise, the value will be closer to zero. When the values of more than one class are relatively close, the class cannot be well distinguished from the input features; that is, the degree of discrimination is not obvious. At this point, we can focus on other models to realize the classification and recognition of the target; that is, reduce the weight corresponding to the model with a low degree of discrimination, and increase the weight corresponding to the model with a high degree of discrimination. First, the initial weight of each model is 1 / h , h denotes the number of secondary features, the weight distribution is also related to the following two points:
1.
For a certain secondary feature, in the output result of the corresponding model, if all the values in the output vector are less than 0.5, the possibility of the feature belonging to the target being classified is too low. Therefore, the secondary feature should be reduced according to the impact of the secondary features on the classification results, the weight corresponding to the secondary features is reduced and assigned to other features. Suppose that the maximum value of the label vector output by the model is x max , the weight of the corresponding model can be expressed as:
S 1 ( x max ) = 1 1 + e h 1 ( h 2 x max )
The final output matrix can be obtained:
f 1 ( x max ) = 1 h 1 1 + e h 1 ( h 2 x max )
where h 1 and h 2 are two constants to control the speed of weight change. Figure 3 shows the weight change under h 1 = 20 , h 2 = 0.25 .
In Figure 3, when x max is less than 0.5, the weight of the corresponding model will gradually decrease. When x max = 0.25 , the weight of the corresponding model will decrease rapidly. When the weight is below 0.1, the corresponding model weight is close to 0 and the larger weight will be allocated to the model that can be better identified, which can obtain a higher recognition accuracy.
2.
For a certain secondary feature to the corresponding T-S IFM output, if the maximum value in the label vector is greater than 0.5, and the difference between the maximum value and the second large value is less than 0.3, then the classification ability of the secondary features for all of the targets to be classified is weak. However, because the maximum value in the label vector is greater than 0.5, the feature has a certain classification ability for a certain type or several types of targets, but it cannot determine which type the input feature data belongs to. Therefore, the corresponding weight can be appropriately reduced and assigned to other features.
Suppose that the difference between the maximum value and the sub-maximum value in the label vector output by the model is x d i f = x f i r s t x sec o n d , 0 x d i f 0.3 . Finally, in case 2, Figure 4 shows the weight adjustment under h 1 = 20 , h 2 = 0 . Different from case 1, case 2 cannot clearly distinguish which category the target belongs to, because there is a value in the label vector, only the weight is appropriately reduced. From Figure 4, the weight is reduced to at most half of the original.
According to the above two points of analysis, the final weight allocation method of each model is designed, and the process is as follows:
To assign the reduced weight portion of the model of cases 1 and 2 equally to the other models, first, the number of secondary features that do not satisfy the above two cases can be expressed as:
n u m = n u m , x max 0.5 o r x d i f 0.3 n u m + 1 , 0.5 < x max 1 a n d 0.3 < x d i f 1
Equation (35) denotes the number of models with obvious classification effects. Then, the final weight adjustment of each model can be expressed as:
W i = f max ( x max ) , x max 0.5 f 2 ( x d i f ) , 0.5 < x max 1 a n d x d i f 0.3 1 n + 1 n u m j = 1 , j i n ( 1 f ( x j ) ) , 0.5 < x max 1 a n d 0.3 < x d i f 1
where W i denotes the final weight of the i-th model. f ( x j ) denotes the weight of the corresponding model when case 1 or case 2 occurs. Therefore, the final fusion results are calculated as follows:
y 0 = W R F y R F 0 + W M F y M F 0 + W L F y L F 0

3.4. Computational Complexity Analysis

In the proposed MTS-IFRM, the main program includes the implementation of the DPSO-IFCM algorithm and the structure identification of consequence parameters based on the ridge regression method. The total computational complexity of the ridge regression is calculated as N( L N M 2 ), where L is the number of intuitionistic T-S fuzzy rules, N is the number of samples, and M is the number of label vector dimensions. In the DPSO-IFCM algorithm, the total computational complexity of the main loop of DPSO is N( G T d ), where G is the size of the particle swarm, T is the maximum number of iterations, d is the dimension of the solution space, and the calculation time of the IFCM is mainly used for the fuzzy membership μ n m and the computational complexity is N( L N M ). In summary, the computational cost of the proposed algorithm is determined by L, N, M, G, T , and d.

4. Simulation Results and Analysis

To evaluate the performance of the MTS-IFRM approach to the problem of recognizing aerial targets in a complex environment, two examples were used to show the recognition performance of MTS-IFRM compared to that of the standard forms of the D-S [19], Yager [29], Murphy [30], multi-sensor data fusion algorithm (MSDF) [32], Kaur [8], and Hu [9] in a complicated environment. Table 2 presents the feature ranges of five typical aerial targets (bomber (Br), fighter (Fr), helicopter (Hr), air-to-ground missile (AGM), and tactical ballistic missile (TBM)).
Table 2 shows the complete discernment frame is Θ = { Br , Fr , HG , AGM , TBM } , and the target recognition feature set is E = { E A , E B , E C , E D , E E , E F , E G } , which represents the credibility of the evidence of the flight altitude (FH), detection distance (DD), flight speed (FS), acceleration (A), vertical speed (VS), cross-section area (CA), and aspect ratio (AR), respectively. The training data is generated within the scope of feature ranges, the experiment uses 125 sets of target feature data within the appropriate range as the training phase with the rules of nine sets. Table 3 presents seven training datasets from the training datasets.
Table 3 shows that the collected 13–14 d historical feature datasets with results are obtained as the training datasets and the testing target is recognized according to the trained MTS-IFRM, then the feature datasets and model parameters of the target are updated with the recognition result.
The fuzzy membership function is very important for the initial recognition process because of the uncertainty in the feature data. By analyzing the features of aerial targets, the Gaussian membership function is used to recognize the target in Equation (38) and Table 4 presents δ and x of five typical aerial targets with difference features, showing the fuzzy membership functions corresponding to the detection distance.
μ ( x i ) = exp ( x x i δ )
Table 4 shows the appropriate membership function μ ( x i ) can be designed by adjusting δ and x with the different features of the targets x i by analyzing the various feature attributes of each target in Table 2. Then, take the feature of detection distance as an example. Figure 5 presents the fuzzy membership functions corresponding to the detection distance.
From Figure 5, the fuzzy membership degree of each target will be different with different values of primary features. When the detection distance is 450 km, the fuzzy membership degree belonging to target Br is the highest, which is 0.8226, and the fuzzy membership degree belonging to the target AGM is the lowest, approaching zero. When the target features obtained by the radar system are inaccurate and uncertain, the features are calculated by the membership function, thus effectively recognizing the target initially. Figure 6 shows the target recognition framework based on fuzzy membership degree and evidence theory.
In Figure 6, the supporting information of the target obtained by the fuzzy membership function may not be consistent. We use the recognition result of the target obtained by the fuzzy membership function as the confidence degree, and evidence theory is used to fuse the confidence degree and obtain a target recognition result.

4.1. Example 1: The Data Does Not Contain Fault Features

In this example, data without fault features is employed to show the performance of the methods, that is, all target features support a certain target. Suppose the radar detects a suspicious target, the target features are: A = 23   km ,   B = 450   km ,   C = 350   m / s ,   D = 10   m / s 2 ,   E = 40   m / s ,   F = 0.31   m 2 , and G = 1.0 . Table 5 presents the BPA example of multi-source information fusion.
Table 5 shows the corresponding BPA functions and X denotes the unknown term. The features are expressed with fuzzy membership for the unknown targets detected by radar, all the features of the unknown target have high credibility for the target Br, and no feature opposes the Br. Table 6, Table 7, Table 8 and Table 9 show the recognition results of the target with different numbers of evidence in an error-free environment.
From Table 6, Table 7, Table 8 and Table 9 when the quantity of evidence increases, the recognition accuracy of the other six methods steadily improves except for Yager. The reason is that Yager assigns all the conflicts between evidence to X, which leads to cumulative conflicts between pieces of evidence in the synthetic evidence, and the value of X will increase as the quantity of fusing conflicting evidence increases. When the quantity of evidence is small, the MTS-IFRM maintains better target recognition performance and faster convergence because it can deal with the uncertainty well. Regardless of whether fewer features or more features are available, the MTS-IFRM has higher accuracy when recognizing the targets.

4.2. Example 2: The Data Contains Fault Features

The dataset simulated in this paper contains one or more fault features obtained by the equipment, so that the multiple features do not all support a certain target. Suppose the radar detects a suspicious target, the obtained target features are: A = 23   km ,   B = 450   km ,   C = 350   m / s ,   D = 10   m / s 2 ,   E = 40   m / s ,   F = 0.31   m 2 , and G = 4.1 . Except for the target aspect ratio, other features are the same as in example 1. Due to the influence of factors such as noise and the working status of the sensor device, the target aspect ratio feature is abnormal, and the BPA of the aspect ratio can be expressed as:
E G : m G ( Br ) = 0 , m G ( Fr ) = 0.0340 , m G ( Hr ) = 0.9658 , m G ( AGM ) = 0.0001 , m G ( TBM ) = 0 , m G ( X ) = 0 .
The aspect ratio has a high degree of support for target Hr, while the support degree for Br is 0. Therefore, E G shows significant conflict with the other evidence. Table 10 and Table 11 compare the target recognition performance of the algorithms.
Table 10 and Table 11 show that because of the conflicting evidence E G , D-S finally determines that Fr is the final result, which is counter-intuitionistic. Meanwhile, the Yager is also unable to correctly recognize the target because it assigns the high-conflict part of the evidence to X. Murphy, MSDF, Kaur, Hu, and the MTS-IFRM can process the conflicting evidence and realize reasonable results. The Murphy method has lower convergence because it calculates the averages without considering the correlations between the evidence, the MSDF method modifies the entropy method to calculate the weight of the evidence, and the Kaur and Hu methods comprehensively improve the credibility of evidence by analyzing the discrepancy in different aspects. Moreover, the accuracy of the MTS-IFRM is higher compared to other methods in the case of fewer features. The MTS-IFRM establishes a higher stability and reliability structure when confronting uncertainty.
The reasons why the MTS-IFRM shows better performance for aerial target recognition can be explained as follows. First, the MTS-IFRM is constructed according to intuitionistic fuzzy theory, which deals with uncertainty data of aerial targets using DPSO-IFCM clustering. Second, the adaptive weight algorithm is used to further improve the classification accuracy of the model, which is crucial for addressing the target recognition problem in an error-free or error-prone environment.
To further verify the effectiveness of the method, a dataset of 10,000 target features is randomly generated within the range given in Table 12 as the test dataset of the simulation.
The data model for the simulation feature parameters is:
F i j = f i j ± r a n d n × δ i j
where f i j denotes the j-th feature of the target i corresponding to the deviation δ i j , r a n d n denotes a normal random number with a mean of 0 and a variance of 1. Six algorithms with higher recognition rate methods are employed in the experiment.
In Table 13, a( ) represents the recognition rate of the target “·”, which is obtained by dividing the number of correctly recognized samples by the total number of testing samples, and in bold is the best simulation result under the same conditions. After fusing the seven features, Figure 7 shows the final recognition rates of six algorithms.
In Figure 7, the MTS-IFRM algorithm has better performance than the other five methods and is slightly inferior to other algorithms for the Hr. The main reasons for this: in other methods, the preliminary recognition of the target with the fuzzy membership function will have high accuracy, and the results will be fused by the evidence theory method. Moreover, Table 2 shows that the features of flight height and speed for Hr have a large difference from those of other targets, for example, suppose the radar detects a suspicious target, the target features are: A = 1.7 km, B = 135 km, C = 75 m/s, D = 10 m/s2, E = 25 m/s, F = 0.09 m2 and G = 3.8, in our proposed method, the existing target features are used to construct the T-S intuitionistic fuzzy training model, and the feature datasets and model parameters of the target are updated with the recognition result, which has higher requirements for training data. If the number of Hr in the training data is insufficient, the suspicious target may be recognized as an AGM or TBM with E A and E B , because Hr, AGM, and TBM have the similar feature ranges of detection distance. In addition, due to the similar feature ranges of acceleration and vertical speed, the suspicious target may be recognized as a Br or Fr with E C , E D and E E . However, the final recognition rate of the MTS-IFRM is more than 99% for the Hr with abundant training datasets. Overall, if a richer and more effective training dataset can be obtained, the recognition accuracy of the proposed MTS-IFRM can be improved.

5. Conclusions

In this paper, a target recognition approach based on MTS-IFRM is proposed, which constructs a fuzzy classification model to enhance the robustness of the recognition process. The intuitionistic fuzzy theory and ridge regression method are employed in the consequent identification, the intuitionistic fuzzy C-regression clustering based on dynamic optimization can realize the premise identification. Then, the adaptive weight algorithm improves the classification accuracy of the corresponding model. The experimental results show that the MTS-IFRM can effectively recognize aerial targets in error-free and error-prone environments, and its performance is better than the methods proposed for aerial target recognition.
Although the proposed MTS-IFRM can show encouraging results for target recognition, many issues remain. For example, when fusing the outputs of multiple models, the method of the weight distribution is still relatively rough. As the features of the target increase, a more complete weight allocation algorithm needs to fuse the outputs of multiple models accurately. In the future, further methods can be proposed to improve accuracy by extending the models to adjust to different types of datasets and by developing more efficient objective functions for the MTS-IFRM using specific samples.

Author Contributions

Conceptualization, C.Z., W.X. and Z.L.; methodology, C.Z., W.X. and Z.L.; software, Y.L. and Z.L.; formal analysis, C.Z., Y.L. and Z.L.; investigation, Y.L. and Z.L. resources, Y.L. and Z.L.; data curation, C.Z.; writing—original draft preparation, C.Z.; writing—review and editing, C.Z., W.X. and Z.L.; visualization, C.Z.; supervision, C.Z.; project administration, C.Z.; funding acquisition, Z.L. All authors of the article have provided substantive comments. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (62171287, 62076165), the Science & Technology Program of Shenzhen (No.JCYJ20220818100004008), the Innovation Team Project of the Department of Education of Guangdong Province (No. 2020KCXTD004) and the Science and Technology on Information Systems Engineering Laboratory (No. 05202206).

Data Availability Statement

The data presented in this study are partly available on request from the corresponding author. The data are not publicly available due to their current restricted access.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhao, K.; Sun, R.; Li, L. An improved evidence fusion algorithm in multi-sensor systems. Appl. Intell. 2021, 51, 7614–7624. [Google Scholar] [CrossRef]
  2. Chen, A.; Tang, X.; Cheng, B.C. Multi-source monitoring information fusion method for dam health diagnosis based on Wasserstein distance. Inform. Sci. 2023, 632, 378–389. [Google Scholar] [CrossRef]
  3. Liang, Q.; Liu, Z.; Chen, Z. A networked method for multi-evidence-based information fusion. Entropy 2022, 25, 69. [Google Scholar] [CrossRef] [PubMed]
  4. Wang, Y.C.; Wang, J.; Huang, M.J. An evidence combination rule based on a new weight assignment scheme. Soft Comput. 2022, 26, 7123–7137. [Google Scholar] [CrossRef]
  5. Meng, L.Y.; Li, L.Q. Time-sequential hesitant fuzzy set and its application to multi-attribute decision making. Complex Intell. Syst. 2022, 8, 4319–4338. [Google Scholar] [CrossRef]
  6. Meng, L.Y.; Li, L.Q.; Xie, W.X. Time-sequential hesitant fuzzy entropy, cross-entropy and correlation coefficient and their application to decision making. Eng. Appl. Artif. Intell. 2023, 123, 106455. [Google Scholar] [CrossRef]
  7. Jiang, H.; Hu, B.Q. A decision-theoretic fuzzy rough set in hesitant fuzzy information systems and its application in multi-attribute decision-making. Inform. Sci. 2021, 579, 103–127. [Google Scholar] [CrossRef]
  8. Kaur, M.; Srivastava, A. A new divergence measure for belief functions and its applications. Int. J. Gen. Syst. 2023, 52, 455–472. [Google Scholar] [CrossRef]
  9. Hu, Z.; Su, Y.; Hou, W. Multi-sensor data fusion method based on divergence measure and probability transformation belief factor. Appl. Soft Comput. 2023, 145, 110603. [Google Scholar] [CrossRef]
  10. Lv, Y.W.; Yang, G.H. Centralized and distributed adaptive cubature information filters for multi-sensor systems with unknown probability of measurement loss. Inform. Sci. 2023, 630, 173–189. [Google Scholar] [CrossRef]
  11. Wang, W.; Zhang, Y. A method based on grey theory toward the multi-sensor information fusion of human centered robots. In Proceedings of the 12th International Convention on Rehabilitation Engineering and Assistive Technology, 13 July 2018; pp. 293–296. [Google Scholar]
  12. Akshaya, T.G.; Sreeja, S. Multi-sensor data fusion for aerodynamically controlled vehicle based on FGPM. IFAC—PapersOnLine 2020, 53, 591–596. [Google Scholar]
  13. Fu, C.; Qin, K.; Yang, L. Hesitant fuzzy β-covering (T, I) rough set models: An application to multi-attribute decision-making. J. Intell. Fuzzy Syst. 2023. preprint. [Google Scholar] [CrossRef]
  14. Zhang, L.; Zhan, J.; Xu, Z. Covering-based generalized IF rough sets with applications to multi-attribute decision-making. Inform. Sci. 2019, 478, 275–302. [Google Scholar] [CrossRef]
  15. Zhang, L.; Zhu, P. Asymmetric models of intuitionistic fuzzy rough sets and their applications in decision-making. Int. J. Mach. Learn. Cyb. 2023, 14, 3353–3380. [Google Scholar] [CrossRef]
  16. Zhou, Z.; Zhao, C.; Cai, X. Three-dimensional modeling and analysis of fractal characteristics of rupture source combined acoustic emission and fractal theory. Chaos Soliton. Fract. 2022, 160, 112308. [Google Scholar] [CrossRef]
  17. Lai, Y.; Zhao, K.; He, Z. Fractal characteristics of rocks and mesoscopic fractures at different loading rates. Geomech. Energy Environ. 2023, 33, 100431. [Google Scholar] [CrossRef]
  18. Wang, H.; Liu, S.V.; Qu, X. Field investigations on rock fragmentation under deep water through fractal theory. Measurement 2022, 199, 111521. [Google Scholar] [CrossRef]
  19. Dempster, A.P. Upper and lower probabilities induced by a multivalued mapping. In Classic Works of the Dempster-Shafer Theory of Belief Functions; Springer: Berlin/Heidelberg, Germany, 2008; pp. 57–72. [Google Scholar]
  20. Chen, L.; Deng, Y. A new failure mode and effects analysis model using Dempster–Shafer evidence theory and grey relational projection method. Eng. Appl. Artif. Intell. 2018, 76, 13–20. [Google Scholar] [CrossRef]
  21. He, Y.; Guo, H.; Li, X. A Collaborative Relay Tracking Method Based on Information Fusion for UAVs. IEEE Trans. Aerosp. Electron. Syst. 2023, 59, 6894–6906. [Google Scholar] [CrossRef]
  22. Xiao, F. GEJS: A generalized evidential divergence measure for multisource information fusion. IEEE Trans. Syst. Man Cybern. Syst. 2022, 53, 2246–2258. [Google Scholar] [CrossRef]
  23. Sezer, S.I.; Akyuz, E.; Arslan, O. An extended HEART Dempster–Shafer evidence theory approach to assess human reliability for the gas freeing process on chemical tankers. Reliab. Eng. Syst. Safe 2022, 220, 108275. [Google Scholar] [CrossRef]
  24. Pan, Y.; Zhang, L.; Li, Z.W. Improved fuzzy Bayesian network-based risk analysis with interval-valued fuzzy sets and D–S evidence theory. IEEE Trans. Fuzzy Syst. 2019, 28, 2063–2077. [Google Scholar] [CrossRef]
  25. Zhu, C.; Xiao, F. A belief Rényi divergence for multi-source information fusion and its application in pattern recognition. Appl. Intell. 2023, 53, 8941–8958. [Google Scholar] [CrossRef]
  26. Yin, L.; Deng, X.; Deng, Y. The negation of a basic probability assignment. IEEE Trans. Fuzzy Syst. 2018, 27, 135–143. [Google Scholar] [CrossRef]
  27. Jiang, W. A correlation coefficient for belief functions. Int. J. Approx. Reason. 2018, 103, 94–106. [Google Scholar] [CrossRef]
  28. Wang, H.; Deng, X.; Jiang, W. A new belief divergence measure for Dempster–Shafer theory based on belief and plausibility function and its application in multi-source data fusion. Appl. Artif. Intell. 2021, 97, 104030. [Google Scholar] [CrossRef]
  29. Yager, R.R. On the Dempster-Shafer framework and new combination rules. Inform. Sci. 1987, 41, 93–137. [Google Scholar] [CrossRef]
  30. Murphy, C.K. Combining belief functions when evidence conflicts. Decis. Support Syst. 2000, 29, 1–9. [Google Scholar] [CrossRef]
  31. Li, X.; Zhao, Y.; Fan, C. Multi-sensor Data Fusion Algorithm Based on Dempster-Shafer Theory. In Proceedings of the 7th International Conference on Computer and Communications (ICCC), Chengdu, China, 10–13 December 2021; pp. 288–293. [Google Scholar]
  32. Wang, L.; Yang, H.Y.; Zhang, S.W. Intuitionistic Fuzzy Dynamic Bayesian Network and its application to terminating situation assessment. Procedia Comput. Sci. 2019, 154, 238–248. [Google Scholar] [CrossRef]
  33. Guo, L.; Yang, R.; Zhong, Z. Target recognition method of small UAV remote sensing image based on fuzzy clustering. Neural Comput. Appl. 2022, 34, 12299–12315. [Google Scholar] [CrossRef]
  34. Lei, Y.; Kong, W. Technique for target recognition based on intuitionistic fuzzy reasoning. IET Signal Process. 2012, 6, 255–263. [Google Scholar] [CrossRef]
  35. Dolgiy, A.I.; Kovalev, S.M.; Kolodenkova, A.E. Processing heterogeneous diagnostic information on the basis of a hybrid neural model of Dempster-Shafer. In Proceedings of the Artificial Intelligence: 16th Russian Conference, RCAI 2018, Moscow, Russia, 24–27 September 2018; Proceedings 16. pp. 79–90. [Google Scholar]
  36. Zhang, C.Y.; Li, L.Q.; Huang, S. Multiple target data-association algorithm based on Takagi-Sugeno intuitionistic fuzzy model. Neurocomputing 2023, 536, 114–124. [Google Scholar] [CrossRef]
  37. Chen, S.M.; Liu, A.Y. Multiattribute decision making based on nonlinear programming methodology, novel score function of interval-valued intuitionistic fuzzy values, and the standard deviations of the score values in the score matrix. Inform. Sci. 2023, 607, 119381. [Google Scholar] [CrossRef]
  38. Dhanachandra, N.; Chanu, Y.J. An image segmentation approach based on fuzzy c-means and dynamic particle swarm optimization algorithm. Multimed. Tools Appl. 2020, 79, 18839–18858. [Google Scholar] [CrossRef]
Figure 1. Target recognition T-S intuitionistic fuzzy model.
Figure 1. Target recognition T-S intuitionistic fuzzy model.
Remotesensing 15 05773 g001
Figure 2. DPSO-IFCM algorithm processes.
Figure 2. DPSO-IFCM algorithm processes.
Remotesensing 15 05773 g002
Figure 3. Weight adjustment in case 1.
Figure 3. Weight adjustment in case 1.
Remotesensing 15 05773 g003
Figure 4. Weight adjustment in case 2.
Figure 4. Weight adjustment in case 2.
Remotesensing 15 05773 g004
Figure 5. Fuzzy membership functions of detection distance.
Figure 5. Fuzzy membership functions of detection distance.
Remotesensing 15 05773 g005
Figure 6. The target recognition framework based on fuzzy membership and evidence theory.
Figure 6. The target recognition framework based on fuzzy membership and evidence theory.
Remotesensing 15 05773 g006
Figure 7. The recognition rates of six algorithms.
Figure 7. The recognition rates of six algorithms.
Remotesensing 15 05773 g007
Table 1. Notation list.
Table 1. Notation list.
NotationMeaning of the NotationNotationMeaning of the Notation
Θ Discriminative frame s Scoring function set
R l Fuzzy rule l N Number of training samples
z C A Inputs of CA X i , V i , P i Position, velocity, optimal solution of the i-th particle
E C A Universe of discourses
of CA
GSize of particle swarm
A 1 l Intuitionistic fuzzy subsets P g Current global optimal solution
p l Consequent parameter w min , w max Minimum, maximum inertia weights
μ ( ) , υ ( ) Membership, non-membership degree c 1 , c 2 Learning parameter
π ( ) Intuitionistic indexTNumber of iterations
L R G Number of fuzzy rulesMNumber of label vector dimensions
y R G 0 Outputs for the model f min , f max , f a v g Minimum, maximum, and average fitness of the particle swarm
Table 2. Feature ranges of five aerial targets.
Table 2. Feature ranges of five aerial targets.
BrFrHrAGMTBM
Flight height (km)25–357–131.6–2.53.8–5.255–80
Detection distance (km)350–450250–350130–180100–140130–180
Flight speed (m/s)300–500500–70070–1301000–15001700–2300
Acceleration (m/s2)0–200–500–30150–250200–400
Vertical speed (m/s)0–500–3000–50800–12001600–2300
Cross-section area (m2)0.25–0.350.17–0.230.08–0.120.05–0.080.06–0.11
Aspect ratio1.2–2.02.6–3.63.2–4.86.7–9.38.5–11.5
Table 3. The feature data of aerial targets.
Table 3. The feature data of aerial targets.
Serial
Number
FH
(km)
DD
(km)
FS
(m/s)
A
(m/s2)
VS
(m/s)
CA
(m2)
ARTarget
1 58.6135.61845.5210.41685.60.089.5TBM
2 4.2125.81250.7211.9952.20.068.4AGMM
3 8.3344612.342.6258.40.222.7Fr
4 4.5132.81252.1158.7958.80.066.9AGM
5 31.6377.4315.314.625.30.311.6Br
6 1.7136.688.611.329.30.093.8Hr
7 56.6179.12200.6365.61936.70.1011.5TBM
Table 4. Five typical aerial targets with different features.
Table 4. Five typical aerial targets with different features.
BrFrHrAGMTBM
FH (km)(30,7.5)(10,4.5)(2,1)(4.5,1)(65,15)
DD (km)(400,80)(300,80)(200,60)(120,45)(150,60)
FS (m/s)(400,150)(600,150)(100,50)(1200,500)(2000, 500)
A(m/s2)(10,10)(25,25)(15,15)(200,60)(300,100)
VS(m/s)(25,25)(150,150)(25,25)(1000,300)(1950,600)
CA (m2)(0.3,0.08)(0.2,0.06)(0.1,0.03)(0.06,0.02)(0.08,0.03)
AR(1.5,0.5)(3,0.6)(4,0.8)(8,1.3)(10,1.5)
Table 5. The BPA example of the multi-source information fusion.
Table 5. The BPA example of the multi-source information fusion.
EvidenceBrFrHrAGMTBMX
E A 0.41852.37 × 10−4003.93 × 10−40.5809
E B 0.67660.02972.88 × 10−4000.2936
E C 0.88370.029700.05491.84 × 10−50
E D 0.38570.06140.34511.70 × 10−58.59 × 10−50
E E 0.35250.26910.35251.80 × 10−52.01 × 10−50
E F 0.96600.03400000
E G 0.36791.49 × 10−57.81 × 10−5000.6321
Table 6. Comparison of algorithms with E A and E B in an error-free environment.
Table 6. Comparison of algorithms with E A and E B in an error-free environment.
Methodm(Br)m(Fr)m(Hr)m(AGM)m(TBM)m(X)Target
D-S0.80950.01760000.1728Br
Yager0.283200000.7168X
Murphy0.79050.07050.07150.004700.0627Br
MSDF0.79460.06920.06940.004700.0621Br
Kaur0.80560.08620.08910.005600.0135Br
Hu0.81340.09230.04510.002600.0466Br
MTS-IFRM0.98940.00640.0042000Br
Table 7. Comparison of algorithms with E C , E D and E E in an error-prone environment.
Table 7. Comparison of algorithms with E C , E D and E E in an error-prone environment.
Methodm(Br)m(Fr)m(Hr)m(AGM)m(TBM)m(X)Target
D-S0.96100.03900000Br
Yager0.12010.00490000.8750X
Murphy0.90200.03850.03910.002100.0183Br
MSDF0.90500.03740.03750.002100.0180Br
Kaur0.91560.03950.03570.003500.0057Br
Hu0.92650.04020.03150.001800Br
MTS-IFRM0.93420.01870.0472000Br
Table 8. Comparison of algorithms with E F and E G in an error-free environment.
Table 8. Comparison of algorithms with E F and E G in an error-free environment.
Methodm(Br)m(Fr)m(Hr)m(AGM)m(TBM)m(X)Target
D-S0.97820.02180000Br
Yager0.355400000.6446X
Murphy0.79050.07050.07150.004700.0627Br
MSDF0.79460.06920.06940.004700.0621Br
Kaur0.81650.07120.07180.005600.0349Br
Hu0.85640.05220.05590.006200.0293Br
MTS-IFRM0.97900.02100000Br
Table 9. Comparison of algorithms with E in an error-free environment.
Table 9. Comparison of algorithms with E in an error-free environment.
Methodm(Br)m(Fr)m(Hr)m(AGM)m(TBM)m(X)Target
D-S0.99981.75 × 10−40000Br
Yager0.012100000.9879X
Murphy0.99700.00140.0014000Br
MSDF0.99730.00130.0013000Br
Kaur0.99810.00109 × 10−4000Br
Hu0.99850.00080.0011000Br
MTS-IFRM0.98130.00150.0172000Br
Table 10. Comparison of algorithms with E F and E G in an error-free environment.
Table 10. Comparison of algorithms with E F and E G in an error-free environment.
Methodm(Br)m(Fr)m(Hr)m(AGM)m(TBM)m(X)Target
D-S010000Fr
Yager00.00120000.9988X
Murphy0.70600.06310.20030.003500.0270Br
MSDF0.77460.07020.12570.003700.0258Br
Kaur0.79450.06420.12540.003400.0125Br
Hu0.85630.02810.10430.002100.0092Br
MTS-IFRM0.96390.03451.23 × 10−4000Br
Table 11. Comparison of algorithms with E in an error-prone environment.
Table 11. Comparison of algorithms with E in an error-prone environment.
Methodm(Br)m(Fr)m(Hr)m(AGM)m(TBM)m(X)Target
D-S010000Fr
Yager000001X
Murphy0.98306.31 × 10−40.0163000Br
MSDF0.99655.89 × 10−40.0029000Br
Kaur0.99050.00840.0011000Br
Hu0.99420.00490.0009000Br
MTS-IFRM0.98110.01840.0019000Br
Table 12. Range of the test dataset.
Table 12. Range of the test dataset.
Br|δFr|δHr|δAGM|δTBM|δ
FH (km)30|1510|52|14.5|270|30
DD (km)400|200300|150150|75120|60150|75
FS (m/s)400|200600|300100|501200|6002000|1000
A(m/s2)10|1025|2515|15200|100300|150
VS(m/s)25|25100|10020|201000|5002000|1000
CA (m2)0.30|0.150.20|0.10.10|0.050.05|0.020.10|0.05
AR1.5|0.752.5|1.04.0|2.08.0|4.010.0|5.0
Table 13. Recognition rates for five algorithms.
Table 13. Recognition rates for five algorithms.
E A , E B E C , E D , E E E F , E G E
D-S a(Br) = 0.4970a(Br) = 0.6085a(Br) = 0.7044a(Br) = 0.8381
a(Fr) = 0.6394a(Fr) = 0.8698a(Fr) = 0.3802a(Fr) = 0.9347
a(Hr) = 0.6663a(Hr) = 0.9133a(Hr) = 0.5227a(Hr) = 0.9997
a(AGM) = 0.6102a(AGM) = 0.8389a(AGM) = 0.4165a(AGM) = 0.9160
a(TBM) = 0.4207a(TBM) = 0.7138a(TBM) = 0.2678a(TBM) = 0.9041
Murphy a(Br) = 0.5976a(Br) = 0.7861a(Br) = 0.5915a(Br) = 0.9174
a(Fr) = 0.7350a(Fr) = 0.8473a(Fr) = 0.7326a(Fr) = 0.9064
a(Hr) = 0.7956a(Hr) = 0.9602a(Hr) = 0.7904a(Hr) = 0.9990
a(AGM) = 0.6463a(AGM) = 0.7983a(AGM) = 0.6228a(AGM) = 0.9044
a(TBM) = 0.4862a(TBM) = 0.6907a(TBM) = 0.4968a(TBM) = 0.8611
MSDF a(Br) = 0.6173a(Br) = 0.7892a(Br) = 0.6141a(Br) = 0.9087
a(Fr) = 0.7709a(Fr) = 0.8557a(Fr) = 0.7776a(Fr) = 0.8951
a(Hr) = 0.8553a(Hr) = 0.9749a(Hr) = 0.8489a(Hr) = 0.9990
a(AGM) = 0.6977a(AGM) = 0.8217a(AGM) = 0.7023a(AGM) = 0.9212
a(TBM) = 0.5365a(TBM) = 0.7119a(TBM) = 0.5362a(TBM) = 0.8549
Kaur a(Br) = 0.6215a(Br) = 0.8021a(Br) = 0.6042a(Br) = 0.9213
a(Fr) = 0.7821a(Fr) = 0.8566a(Fr) = 0.7511a(Fr) = 0.9155
a(Hr) = 0.8163a(Hr) = 0.9713a(Hr) = 0.8224a(Hr) = 0.9990
a(AGM) = 0.7062a(AGM) = 0.8078a(AGM) = 0.6634a(AGM) = 0.9156
a(TBM) = 0.6035a(TBM) = 0.7256a(TBM) = 0.5264a(TBM) = 0.8744
Hu a(Br) = 0.7654a(Br) = 0.8156a(Br) = 0.6317a(Br) = 0.9315
a(Fr) = 0.7905a(Fr) = 0.8557a(Fr) = 0.7812a(Fr) = 0.9213
a(Hr) = 0.8632a(Hr) = 0.9812a(Hr) = 0.8497a(Hr) = 0.9992
a(AGM) = 0.7256a(AGM) = 0.8247a(AGM) = 0.7123a(AGM) = 0.9336
a(TBM) = 0.6636a(TBM) = 0.7311a(TBM) = 0.5546a(TBM) = 0.8639
MTS-IFRM a(Br) = 0.8834a(Br) = 0.7145a(Br) = 0.8345a(Br) = 0.9354
a(Fr) = 0.7341a(Fr) = 0.8844a(Fr) = 0.5341a(Fr) = 0.9555
a(Hr) = 0.7589a(Hr) = 0.9253a(Hr) = 0.8835a(Hr) = 0.9952
a(AGM) = 0.7954a(AGM) = 0.9051a(AGM) = 0.4954a(AGM) = 0.9862
a(TBM) = 0.8795a(TBM) = 0.9493a(TBM) = 0.7101a(TBM) = 0.9899
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, C.; Xie, W.; Li, Y.; Liu, Z. Multi-Source T-S Target Recognition via an Intuitionistic Fuzzy Method. Remote Sens. 2023, 15, 5773. https://doi.org/10.3390/rs15245773

AMA Style

Zhang C, Xie W, Li Y, Liu Z. Multi-Source T-S Target Recognition via an Intuitionistic Fuzzy Method. Remote Sensing. 2023; 15(24):5773. https://doi.org/10.3390/rs15245773

Chicago/Turabian Style

Zhang, Chuyun, Weixin Xie, Yanshan Li, and Zongxiang Liu. 2023. "Multi-Source T-S Target Recognition via an Intuitionistic Fuzzy Method" Remote Sensing 15, no. 24: 5773. https://doi.org/10.3390/rs15245773

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop