A comprehensive risk prediction method for defense mission planning based on probabilistic reasoning and hierarchical analysis
Abstract
Most existing risk prediction methods focus on constructing risk element sets and analyzing their uncertainties but do not deeply explore the correlation types and intensities of factors, resulting in large errors in the comprehensive risk prediction results. In this paper, a new integrated risk prediction method is proposed based on the correlation types of tasks in defense task planning and execution. The approach mainly includes the following steps: First, based on the difference of the sequence and mode of action of link tasks, three correlation types (hierarchical, synergistic, and independent) are defined among them, and various correlation measurement techniques are proposed to model these abstract correlation relations and provide data basis for constructing risk decision graphs. Secondly, the rotation extraction strategy is introduced to excavate the internal correlation law between link tasks and generate their hierarchical topology to ensure the rational distribution of their hierarchy positions in defense missions. Then, the intra-layer risk weight is determined based on the centrality of each node in the topology structure, and then the comprehensive risk prediction weighting graph is constructed. Finally, the path analysis is used to assess the rationality of the hierarchical topology structure of the link tasks, and the validity of the proposed method is verified using the test sample set. The results show that compared with other approaches, the predicted results of the proposed method more closely approximate the actual outcomes.
Keywords
1. INTRODUCTION
Defense task planning[1–3] involves the comprehensive layout and detailed strategizing of specific defense measures by commanders before executing a specific task. This process mainly includes task understanding, analysis and judgment, formulation of concepts, program development, program selection, plan development, and other links. Each stage aims to achieve the overall objective with a clear purpose and specific function. The reasonableness of mission planning and the effectiveness of its execution directly determine the outcome of the entire defense mission. Therefore, risk decision-making for the specific defense mission is a necessary precondition to ensure its successful implementation.
Scholars have achieved certain research results on risk prediction in defense mission planning[4], medical system research and development[5], commercial project risk management[6], and risk assessment of construction projects[7], mainly in the methods of multi-attribute decision-making[8], decision tree analysis[9], and so on. Wu et al. analyzed various factors influencing the slope stability, including hydrological conditions of open-pit mines, the geologic formations of slopes, the internal structure[10], etc. They identified the attribute sets affecting slope stability and proposed a large-scale multi-attribute group decision-making model based on intuitionistic fuzzy sets. This kind of decision model requires relative independence among the attributes in the set. Decision tree analysis is an analytical method for systematic decision-making after a unified combination arrangement on the premise of classifying the attributes affecting the event; e.g., Ikwan et al. constructed a decision tree from the attributes of environmental impacts, management constraints, human/equipment failure factors, and risk factors of the tanks themselves and put forth a fishbone diagram-decision tree-risk matrix analysis strategy, which realized an effective prediction of the effective prediction of tank leakage risk[11]. Zheng et al. explored the composition of the mission conception risk assessment system from the levels of thoroughness, mobility, and protection by combining the conception elements and research and judgment data and solved the problem of quantifying the risk of defense conception by establishing the quantitative analysis model of each assessment index[12]. Song et al. proposed a program based on the task derivation by establishing a program index system under the background of the joint task risk analysis model[13]. Ryczyński et al. proposed a risk analysis technique integrating the Kaplan method, the Garrick method, and fuzzy theory to realize the risk management decision-making in the liquid fuel material supply program during military operations[14]. Kim et al. introduced the Risk Management Framework (RMF) and developed an assessment model of the weapon system, which offers a theoretical foundation for the mission plan formulation[15]. Most of the above research results focus on constructing risk element sets and analyzing their uncertainty; however, comprehensive prediction is needed on the premise that risk factors are independent.
Subsequently, researchers have made significant efforts in comprehensive risk prediction based on factor associations; e.g., Zhang et al.[16] proposed the project portfolio risk (PPR) evolution and response model to solve the problem of project risk interaction, which effectively reflected the real-time interaction in the evolution process of PPRs and helped decision makers quickly identify key strategic intrusion nodes[16]. Zhang et al.[16] proposed a category-based association measurement technology (the Measuring Attractiveness by a Categorical-Based Evaluation Technique (MACBETH)) to measure the associative relationships between risks and construct a risk response model for the selection of risk relationships in the medical system research and development project (Risk Response Actions (RRA)), so as to maximize the expectations of the management of medical system research and development project under budget constraints[5]. Abedzadeh et al. used fuzzy decision tree analysis to determine the possible combinatorial relationships among social, economic, environmental, and water damage index attributes to achieve an integrated risk management decision for developing water resources[17]. These methods provide a quantitative assessment of the similarity of risk associations and, to some extent, reveal the linkages and impacts between various risks. In fact, in defense mission planning, not only do the tasks adhere to a strict time sequence, but they also follow layer-by-layer refinement. Directly applying the correlation method mentioned to the defense mission planning for risk prediction will lead to large errors in the prediction results. Hierarchical directed topology lays out the nodes of a complex system according to a hierarchical structure. Inspired by this, hierarchical topology is used in the integrated risk prediction of defense tasks. This technique not only effectively highlights the inter-association relationship among link tasks but also reveals the roles of each task on the defense missions, thereby enhancing the accuracy of the integrated risk prediction.
The main contributions of this paper are as follows: (1) oriented to the task execution process in defense mission planning, the association relationship between tasks in different planning links is studied, and the normalized description of hierarchical, synergistic, and independent relationships and the measurement calculation method are defined; (2) the hierarchical topology between link tasks is generated using the rotational extraction method; (3) on the premise of clarifying the role of each link task on the whole defense mission, a new integrated risk prediction approach is proposed by constructing a weighted map of integrated risk prediction; and (4) combined with specific defense tasks, the proposed method is analyzed qualitatively and quantitatively, and its effectiveness and feasibility are verified.
The structure of this paper is outlined as follows: Section 2 gives the research idea and schematic diagram for constructing a model of the integrated risk prediction problem for defense mission planning; Section 3 defines the three association types and their quantification techniques; Section 4 describes the process of generating the hierarchical topology for link missions; Section 5 proposes a new integrated risk prediction method based on weighted mapping; Section 6 analyzes and validates the proposed approach; Section 7 provides the conclusion.
2. PROBLEM MODELING
To improve the reliability of risk prediction of defense mission planning, this paper, based on the "OODA" (Observe, Orient, Decide, and Act) ring, decomposes the tasks involved into six links and further divides them into four aspects: acquiring information about the defense mission, analyzing the composition of the execution force, evaluating the capability of the attacking entity, and assessing the execution program and plan. The paper specifically examines 15 links of task risk, such as clarifying the defense information, identifying the force of our unit, determining the scale of the attacking entity, and evaluating the resilience of the program. Aimed at the strong temporal sequence of link tasks and their complexity and intertwined relationships, this paper mainly examined the following three aspects: determining their relationships, constructing their hierarchical topology, and developing a comprehensive risk prediction model. The schematic diagram of this prediction model is shown in Figure 1.
The functions of each part are as follows:
(ⅰ) As each link follows a strict timing sequence and contains various subtasks, many complex associations may exist between different link tasks. Rationally distinguishing and describing these relationships is the basis for improving the reliability of comprehensive risk prediction. In this paper, we determine the associations by mining the relationship between their time sequences and hierarchies. We specify the association types, give a normalized description of these relationships, and outline the calculation method of the association measures to provide numerical inputs for establishing the probability association matrix between link tasks.
(ⅱ) The relationship between link tasks directly determines the mode and intensity of the role of each link to the total task, and the correlation type varies among various link tasks, which directly affects the comprehensive risk prediction. The correct construction of link task hierarchical topology is the key to improving the reliability of comprehensive risk prediction. Therefore, this paper clarifies the role and intensity of link tasks on the whole defense task based on the association measurement size of each task in (ⅰ), establishes the possibility association matrix, and introduces the rotation extraction method to determine the hierarchical position of the link tasks, which provides a theoretical basis for constructing the comprehensive risk decision-making mapping.
(ⅲ) The risk of each link task acts on the total risk of the defense task based on the topology between link tasks. However, the correlation strength between link tasks is independent, so determining the link task risk weights based on the correlation distribution is a guarantee to enhance the reliability of the comprehensive risk prediction. In this paper, a three-scale hierarchical analysis is conducted based on the centrality of each link task to determine its hierarchical weights, and then a weighted map is constructed to ensure the reliability of the comprehensive risk prediction results.
3. PERCEPTION OF THE CORRELATION BETWEEN LINK TASKS
3.1. Analysis of the correlation between the link tasks
Defense task planning needs to strictly follow the chronological order of the specific measures taken by each link to gradually refine; when a subsequent link task depends on a preceding task, there is a hierarchical relationship between them[18]; when multiple tasks converge into a single task, they share a synergistic relationship; when there is no intrinsic link between the link tasks, they have an independent relationship[19]. The specific description is as follows:
(1) Hierarchical relationship: the correlation between link tasks
(2) Synergy relationship: link tasks
(3) Independent relationship: there is no interaction of information between link tasks
In principle, the three types of relationships mentioned are unique: only one type can exist between tasks of the same link. Meanwhile, given the sequential execution of the link tasks and the gradual elaboration of the planning content, all these relationships are unidirectional, from previous to subsequent link tasks.
The schematic diagram of the correlation between the link tasks is depicted in Figure 2. The colors represent the specific link in which each task is located, such as the hierarchical relationship between
3.2. Measurement of the degree of correlation between link tasks
This study uses the degree of association to measure the relationship between link tasks. Subsequently, we determine this degree from the nature of various association relationships.
(1) Calculation of HR relevance
Since the information between the tasks of each link in HR has one-way transferability and the correlation between tasks increases with the similarity of the situational information affecting them, the number of basic situational information inputs to any two link tasks is analyzed using the ensemble similarity measure function[20–22], which measures the HR correlation between the link tasks, expressed as
where
(2) SR relevance calculation
Unlike HR, SR is more inclined to the joint impact of the execution effect of two or more link tasks on another. Fuzzy hierarchical analysis[23–25] is considered to measure the effect factor of each link task on its acted task, that is, to calculate the SR correlation between link tasks from a functional perspective.
Assuming that a total of
where
(3) IR relevance calculation
When the link task
In summary, for a particular defense task, the correlation
where
4. LINK TASK HIERARCHY TOPOLOGY GENERATION
4.1. Adjacency probability correlation matrix
Assuming that a total of
In addition, due to the temporal nature of the adjacent links in planning, for the convenience of the subsequent study, the link tasks are sorted in strict time order of execution. Thus, the adjacency correlation matrix between the link tasks is established based on the values of the degree of correlation between them. Considering that the degree of correlation takes values between 0 and 1, instead of only 0 and 1, we distinguish it from the traditional adjacency correlation matrix, which is called the adjacency possibility correlation matrix
Since the adjacency possibility association matrix
4.2. Calculation of the possibility hierarchy position for the link tasks
To ensure that the link tasks directly related to the total task are classified in the innermost layer, while the fundamental link tasks that affect the total task are classified in the outermost layer, the concept of rotational extraction[26] is used to calculate the possibility hierarchy position of each link task in the total task[27,28]; that is, the innermost and outermost layers are determined first. Subsequently, the next inner and outer layers are followed by the next-sub-inner and -outer layers until all link tasks are assigned. The implementation process is as follows:
(ⅰ) Combining the unit matrix
(ⅱ) The link tasks in each column and row corresponding to all elements in row
(ⅲ) The link tasks set as the innermost and outermost layers in Step (2) are removed from the reachable association matrix
(ⅳ) The sub-inner and sub-outer link tasks identified in Step (3) are removed from the reachable association matrix
(ⅴ) The following operations are performed on the reachable correlation matrix
The position of the possibility hierarchy for each link task is determined based on Step (4).
5. INTEGRATED RISK PREDICTION MODELING
5.1. Calculation of task risk weights and integrated risk
The process of realization is as follows:
(ⅰ) With the link task risk as the sub-node and the total task risk as the root node, the link task level position determined in Section 4 is taken as the position of each sub-node relative to the root node, and the hierarchical decision graph of the comprehensive risk is preliminarily determined. Determine the total number of layers
where
The child node centrality at layer
Then, the weight judgment matrix of the
(ⅱ) According to the weight judgment matrix
The maximum eigenvalue
where
(ⅲ) Combining the weight vectors of the child nodes within all the layers, the weight of the impact of each link's risk on the total risk is determined from the top level downwards, and the combined weight of the
(ⅳ) The weighted fusion of task risks for each segment yields a combined risk prediction of
where
5.2. Comprehensive risk prediction based on weighted mapping
The pseudo-code of the integrated risk prediction model based on weighted mapping is shown in Table 1.
Integrated risk prediction model pseudo-code
Integrated risk prediction model pseudo-code | ||
Perceived linkages between session tasks | Step 1 | Determine the types of interlinked relationships between link tasks based on the concepts of hierarchical, synergistic and independent relationships. |
Step 2 | Using Equations (1) and (2) to calculate the link inter-task correlation, respectively. | |
Hierarchical topology generation | Step 3 | Using Equations (5) and (6) to obtain the adjacency likelihood correlation matrix and the reachability correlation matrix, respectively. |
Step 4 | Use Equation (7) to determine the hierarchical position of the tasks in each session. | |
Step 5 | The general skeleton matrix is computed using Equation (8) and the hierarchical topology is generated. | |
Consolidated risk projections | Step 6 | Using Equations (9-11) to construct the weight judgment matrix of task risk for each layer of the link |
Step 7 | Calculate the weighting coefficients of each segment's task risk in the composite risk using Equations (12-14) to construct a composite risk decision weighting map. | |
Step 8 | The combined risk is predicted using Equation (15). |
6. CASE VERIFICATION AND COMPARATIVE ANALYSIS
To verify the feasibility and superiority of the proposed method, this section presents an example of defense mission planning.
Assuming that an attacking entity is expected to strike our T-area at a certain time, the commanders plan defense tasks with the acquired basic situational information. A total of 15 tasks within six planning segments are involved in this planning process. The values of risk incurred by the link tasks are shown in Table 2.
Information about the session tasks and their corresponding risk items in a given scenario
Session task | Corresponding risk items | Risk value |
Defensive message clarity | Unclear defensive information | 0.658 |
Comprehensive information on the attacking entity | Incomplete information about the attacking entity | 0.790 |
Our defense unit strength determination | Our defense unit strength was incorrectly determined | 0.566 |
Judgment of the direction of movement of the attacking entity | Inaccurate judgment of the direction of movement of the attacking entity | 0.778 |
Attack entity size determination | The size of the attacking entity was incorrectly identified | 0.721 |
Unit platform response capability | Inadequate response capability of the unitary platform | 0.618 |
Reasonable setting of task indicators | Unreasonable setting of task indicators | 0.692 |
Reasonableness of the selection of the target of fire collection | Unreasonable selection of fire target | 0.764 |
Rationalization of resource integration | Unreasonable resource integration | 0.625 |
Protective capability in conception | Insufficient conceptual protection | 0.750 |
Reasonableness of programming standards | Unreasonable standards for program development | 0.615 |
Program Resilience | Inadequate program resilience | 0.632 |
Reasonableness of the index system of program preference | The index system of program preference is not reasonable | 0.625 |
Execution of branch plans | Inadequate execution of branch plans | 0.724 |
Monitoring capabilities of the program | Insufficient monitoring power of the plan | 0.625 |
6.1. Calculation of the correlation between the link tasks
Here, the reasonableness of resource coordination
Basic situation information related to
Serial number | |||
1 | Expected means of mission defense | Expected means of mission defense | 1 |
2 | Expected Achievement Goals | Expected Achievement Goals | 1 |
3 | Destruction parameter requirements | Destruction parameter requirements | 1 |
4 | Coverage | Coverage | 1 |
5 | Duration of mission | Duration of mission | 1 |
6 | The capability of reconnaissance and early warning unit capability | The capability of reconnaissance and early warning unit capability | 1 |
7 | The capability of firepower unit capability | The capability of firepower unit capability | 1 |
8 | The capability of electronic countermeasures unit capability | The capability of electronic countermeasures unit capability | 1 |
9 | The capability of integrated assurance unit | The capability of integrated assurance unit | 1 |
10 | The capability of interceptor strike unit capability | The capability of interceptor strike unit capability | 1 |
11 | – | Attack entity equipment type | 0 |
12 | – | Number of attacking entity equipment | 0 |
13 | – | Attack entity incoming main direction | 0 |
14 | – | Attack entity incoming sub-direction | 0 |
15 | – | Attack entity incoming proximity direction | 0 |
16 | – | Attack entity incoming intent | 0 |
In addition to the hierarchical relationship between
To measure the degree of synergy between link tasks, ten experts in related fields determined the role factors of link tasks
Calculating the action factors of the link tasks
The action factors of the link tasks
Action factor | 0.283 | 0.258 | 0.459 |
Since program resilience is not associated with other link tasks, it is considered an independent relationship and acts directly on the total task. The degrees of synergy between all tasks can be calculated based on the analysis of the remaining tasks, which will not be repeated here owing to length constraints. Thus, the adjacency probability correlation matrix
The adjacency probability correlation matrix
0 | 0 | 0 | 0 | 0 | 0 | 0.275/ | 0 | 0.283/ | 0 | 0 | 0 | 0.4* | 0 | 0 | |
0 | 0 | 0.75* | 0.462* | 0 | 0 | 0.6/ | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0.913* | 0.125/ | 0 | 0.258/ | 0 | 0 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.7/ | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.3/ | 0.459/ | 0 | 0 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.606* | 0 | 0 | 0 | 0.92* | 0.467* | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.769* | 0 | 0 | 0 | 0.324* | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.64* | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.541* | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Where data followed by "*" indicates that the type of relationship between tasks in the session is hierarchical; data followed by "/" denotes that the relationship type between tasks in the session is synergistic.
In turn, the reachable correlation matrix
The reachable correlation matrix
1 | 0 | 0 | 0 | 0 | 0 | 0.275 | 0 | 0.283 | 0 | 0.283 | 0 | 0.4 | 0 | 0 | |
0 | 1 | 0 | 0.75 | 0.462 | 0 | 0.6 | 0.7 | 0.6 | 0 | 0.6 | 0 | 0.324 | 0 | 0 | |
0 | 0 | 1 | 0 | 0 | 0.913 | 0.125 | 0 | 0.258 | 0.606 | 0.258 | 0 | 0.125 | 0.913 | 0.467 | |
0 | 0 | 0 | 1 | 0 | 0 | 0 | 0.7 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 1 | 0 | 0 | 0.3 | 0.459 | 0 | 0.459 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0.606 | 0 | 0 | 0 | 0.92 | 0.467 | |
0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0.769 | 0 | 0.64 | 0 | 0.324 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0.64 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0.541 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 |
The general skeleton matrix
0 | 0 | 0 | 0 | 0 | 0 | 0.275 | 0 | 0.008 | 0 | 0 | 0 | 0.125 | 0 | 0 | |
0 | 0 | 0 | 0.75 | 0.462 | 0 | 0.6 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0.913 | 0.125 | 0 | 0.133 | 0 | 0 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.7 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.3 | 0.459 | 0 | 0 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.606 | 0 | 0 | 0 | 0.379 | 0.467 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.769 | 0 | 0 | 0 | 0.324 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.64 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0.541 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Therefore, according to the results of link task relevance calculation, the link task relevance structure model can be obtained, as given in Figure 3.
This paper adopts the path analysis method to test the accuracy and reliability of the link task association structure model. Several domain experts are invited to assess the risk value of each link task and use it as a basis for judgment, and the risk value of the corresponding risk item of each link task is imported into the path analysis model for analysis to verify the validity of the association path between each task and the total task[35–37], where the standardized coefficient specifically reflects the degree of influence between the two risks; when the p-value is
Regression coefficients for structural modeling of link task associations
Path | Standardized coefficient | P | Path | Standardized coefficient | P |
0.961 | 0.983 | ||||
0.953 | 0.147 | ||||
0.963 | 0.843 | ||||
0.447 | 0.499 | ||||
0.547 | 0.495 | ||||
0.515 | 0.974 | ||||
0.479 | 0.154 | ||||
0.201 | 0.269 | ||||
0.229 | 0.081 | ||||
0.181 | 0.127 | ||||
0.430 | 0.251 | ||||
0.976 | 0.190 |
From the results of Table 8, it can be seen that the p-value of paths
6.2. Risk hierarchy decision weighting mapping construction
Based on the general skeleton matrix
Figure 4. Decision mapping generated by the two methods. (A) Decision mapping of the possibility hierarchy determined by the rotattional extractional method; (B) Decision mapping of the possibility hierarchy determined by bottom-upextractional method.
To illustrate that the generated risk hierarchy decision weighting mapping
By comparing Figure 4A and B, we can find that in the
To visualize the aforementioned phenomenon, firstly, according to the general skeleton matrix
Taking
It can be intuitively observed from Figure 5 that in the hierarchical decision map
6.3. Forecasting methodology for integrated risk
Based on the general skeleton matrix
The centrality of the link task risk
0.4080 | 2.3650 | 0.6400 | |||
1.8120 | 2.0930 | 0.0000 | |||
1.1710 | 1.0000 | 0.4490 | |||
1.4500 | 2.0090 | 0.9200 | |||
1.2210 | 1.1470 | 0.4670 |
To illustrate the rationality of the above weight determination method, the weights obtained from the bottom-up extraction method[40] and entropy method[41] are compared for analysis, respectively, as shown in Table 10.
Table of intra-tier weights for the link tasks
Weight judgment matrix | Methodology of this study | Bottom-up extraction method | Entropy method | ||||||||||
Levels | Intra-layer weights | Composite weights | Levels | Intra-layer weights | Composite weights | ||||||||
1 | 2 | 2 | 2 | 2 | 2 | 1st Floor | 0.3278 | 0.0822 | 2nd Floor | 0.1713 | 0.0443 | 0.0480 | |
0 | 1 | 2 | 2 | 0 | 2 | 0.1684 | 0.0422 | 1st Floor | 0.7311 | 0.1887 | 0.0631 | ||
0 | 0 | 1 | 0 | 0 | 0 | 0.0619 | 0.0156 | 4th Floor | 0.1015 | 0.0262 | 0.0725 | ||
0 | 0 | 2 | 1 | 0 | 0 | 0.0864 | 0.0217 | 2nd Floor | 0.0770 | 0.0199 | 0.0674 | ||
0 | 2 | 2 | 2 | 1 | 2 | 0.2349 | 0.0589 | 1st Floor | 0.2689 | 0.0694 | 0.0343 | ||
0 | 0 | 2 | 2 | 0 | 1 | 0.1206 | 0.0303 | 2nd Floor | 0.1148 | 0.0296 | 0.0451 | ||
1 | 0 | 2 | 2nd Floor | 0.2889 | 0.0822 | 3rd Floor | 0.1674 | 0.0074 | 0.0842 | ||||
2 | 1 | 2 | 0.5628 | 0.0422 | 2nd Floor | 0.3813 | 0.1887 | 0.0654 | |||||
0 | 0 | 1 | 0.1483 | 0.0589 | 2nd Floor | 0.2556 | 0.0694 | 0.0535 | |||||
1 | 0 | 0 | 3rd Floor | 0.1483 | 0.0492 | 3rd Floor | 0.1015 | 0.0236 | 0.0631 | ||||
2 | 1 | 2 | 0.5628 | 0.1481 | 0.4551 | 0.0990 | 0.0720 | ||||||
2 | 0 | 1 | 0.2889 | 0.0339 | 0.2760 | 0.0719 | 0.0474 | ||||||
1 | 0 | 0 | 4th Floor | 0.5627 | 0.1315 | 4th Floor | 0.4551 | 0.0310 | 0.1244 | ||||
2 | 1 | 2 | 0.1484 | 0.0330 | 0.1674 | 0.0121 | 0.0642 | ||||||
2 | 0 | 1 | 0.2889 | 0.1701 | 0.2760 | 0.1188 | 0.0954 |
Compared to the bottom-up extraction method, the weight values of
Compared to the entropy method, the weight value of
In addition, compared to the scenario strain shortage capacity risk
According to the risk weight value of each link task given by the defense expert system, the link task weight value obtained by each method in Table 10 is analyzed by using the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) ideal point method[42–44], and the decision matrix[45] constructed is shown in Table 11, where the elements indicate the difference between the weights of each link task given by different methods and expert systems. Based on Table 11, the calculated TOPSIS evaluation results are shown in Table 12.
TOPSIS decision-making matrix
Segment task risk items | Methodology of this article | Bottom-up extraction method | Entropy method | Segment task risk items | Methodology of this article | Bottom-up extraction method | Entropy method |
0.0015 | 0.099 | 0.081 | 0.0578 | 0.0887 | 0.0348 | ||
0.003 | 0.0179 | 0.0404 | 0.0089 | 0.0194 | 0.0135 | ||
0.0002 | 0.0515 | 0.0995 | 0.0578 | 0.0887 | 0.0288 | ||
0.0022 | 0.0726 | 0.0219 | 0.0026 | 0.0132 | 0.0701 | ||
0.0292 | 0.0036 | 0.0336 | 0.0044 | 0.0062 | 0.0605 | ||
0.0171 | 0.032 | 0.0762 | 0.0369 | 0.0474 | 0.0387 | ||
0.0039 | 0.0419 | 0.0472 | 0.0087 | 0.008 | 0.0442 | ||
0.0062 | 0.0317 | 0.006 |
TOPSIS evaluation results
Method | Positive ideal solution distance | Negative ideal solution distance | Composite score index | Arrange in order |
Methodology of this article | 1.06422349 | 3.52206885 | 0.76795559 | 1 |
Bottom-up extraction method | 2.85681912 | 2.18487242 | 0.43336099 | 2 |
Entropy method | 2.98084338 | 2.11787522 | 0.41537402 | 3 |
As can be seen from the results in Table 12, compared with the other two methods, the comprehensive score index of the method proposed in this paper is higher and is the optimal program, indicating that the risk weight value of each link of the task obtained by our technique is most consistent with the actual situation.
Combining the link task risk values in Table 2 and the link task weights in Table 10, the risk value of the total task is obtained using Equation (15). The integrated risk value evaluated by the air defense expert system was taken as the actual integrated risk value, and was compared and analyzed with the risk values obtained by each of the aforementioned methods, as shown in Table 13.
Comparison of integrated risk forecast results
Actual combined risk value | Bottom-up extraction method | Entropy method | Methodology of this article | |
Comprehensive Risk | 0.6621 | 0.6485 | 0.6764 | 0.6676 |
Table 13 shows that the relative error rate between the integrated risk value obtained by the proposed method and the actual risk value is 0.82%, while the relative error rates of the other two approaches are 2.1% and 2.11%.
6.4. Comparative analysis of different methods
To further illustrate the overall advantages of the proposed method, the risk values of 20 test samples are predicted; the detection samples are obtained by collecting basic data of the defense side in exercise tasks in different scenarios. The real comprehensive risk values based on the expert system were 0.5327, 0.6745, 0.8871, 0.7125, 0.6265, 0.5292, 0.7715, 0.4858, 0.6142, 0.5383, 0.7627, 0.5475, 0.4965, 0.6057, 0.7322, 0.8447, 0.5737, 0.7124, 0.5325, and 0.6581. The risk values predicted by the proposed method, bottom-up extraction method, and fuzzy hierarchical analysis were compared. The validation outcomes illustrate the feasibility and reasonableness of the proposed method. The actual integrated risk values of the 20 test samples and the predicted integrated risk values obtained by different methods are shown in Figure 6. The deviation of each predicted value from the actual integrated risk value is calculated, as given in Table 14.
Deviation between the predicted value of each integrated risk and the actual integrated risk value
Bottom-up extraction method | Entropy method | Methodology of this article | |
Deviation | 13.82% | 15.83% | 6.08% |
It can be seen from Table 14 that the deviation between the proposed method and the actual comprehensive risk value is minimal. Compared with bottom-up extraction, the relative deviation is reduced by 56%. Compared with the entropy weight method, the relative deviation is reduced by 61.6%. It shows that this method can predict the comprehensive risk of defense mission planning more accurately and exhibits certain feasibility.
7. CONCLUSION
In this paper, the relation between links and tasks is systematically expounded. On the premise of considering different association types, the hierarchy determination method of the link task in the whole defense task is explored. The decision graph of link task risk level for efficient defense task planning is generated. Then, a comprehensive risk prediction model is constructed. The problem of inaccurate risk prediction results caused by non-independence between tasks is solved. Through the simulation of test samples, the feasibility and rationality of the proposed method are compared and analyzed. The work and innovation of this paper are mainly reflected in:
(ⅰ) Defining the types of link inter-task associations as hierarchical, synergistic and independent relationships, further deepening the connotation of associative relationships, and proposing a calculation method for link inter-task association measurement, which provides theoretical guidance for establishing associative relationships.
(ⅱ) Introducing the idea of hierarchical topology, a method for determining the hierarchical positions of link tasks based on rotational extraction is proposed, and the reasonableness of the generated hierarchical topology paths is analyzed based on the level of significance in the path analysis method.
(ⅲ) A hierarchical decision weighted mapping of integrated risk is constructed using the link task centrality degree. Compared with the entropy weight method, this paper considers the correlation type and intensity of tasks in weight calculation. The result is more consistent with the actual situation, and the relative deviation of risk is reduced by 61.6%. Compared with the bottom-up extraction method, the nodes in the graph constructed in this paper are more centralized to the root node, and the relative risk deviation is reduced by 56%. To some extent, the proposed method solves the problem that the existing decision-making methods are difficult to reflect the correlation strength of link tasks, which leads to unreasonable prediction results.
In summary, the integrated risk prediction method for defense mission planning with hierarchical weighted mapping proposed in this paper shows significant advantages in dealing with the complex risk environment of planning missions in the field of national defense and can provide scientific decision support for strategic deployment. At the same time, the method can also be applied to risk decision-making in financial investment, emergency management, urban planning and construction. However, the construction of risk terms proposed in this paper is not comprehensive enough, and we will further improve the accuracy of comprehensive risk prediction by refining and expanding the risk terms in the future.
DECLARATIONS
Acknowledgments
The authors would like to thank the reviewers for their thoughtful comments and efforts towards improving this manuscript.
Authors' contributions
Methodology, experiment, data analysis, and manuscript drafting: Du W
Conceptualization, manuscript edition and review, and supervision: Chen X
Availability of data and materials
Not applicable.
Financial support and sponsorship
None.
Conflicts of interest
Both authors declared that there are no conflicts of interest.
Ethical approval and consent to participate
Not applicable.
Consent for publication
Not applicable.
Copyright
© The Author(s) 2024.
REFERENCES
1. Gong J, Lu C, Liu Q, Huang J. Uncertain mission planning for earthquake rescue based on scenario. Proceedings of the 2022 IEEE 2nd international conference on electronic technology, communication and information (ICETCI), Changchun, China, 27-29 May 2022; pp. 586-92.
2. Yue L, Yang R, Zhang Y, Yu LX, Wang Z. Deep reinforcement learning for UAV intelligent mission planning. Complexity 2022;2022:3551508.
3. Kase SE, Hung CP, Krayzman T, Hare JZ, Rinderspacher BC, Su SM. The future of collaborative human-artificial intelligence decision-making for mission planning. Front Psychol 2022;13:850628.
4. Xu J, Liu T, Tian W, Wang X, Zhang J, Chen Y. Safety risk assessment based on reloading airdrop mission. E3S Web Conf 2021;257:02084.
5. Zhang Y, Zuo F. Selection of risk response actions considering risk dependency. Kybernetes 2016;45:1652-67.
6. Dixit V. Risk assessment of different sourcing contract scenarios in project procurement. Int J Constr Manag 2022;22:1537-49.
7. Lin SS, Shen SL, Zhou A, Xu YS. Risk assessment and management of excavation system based on fuzzy set theory and machine learning methods. Automat Constr 2021;122:103490.
8. Li Y, Hu Z. A review of multi-attributes decision-making models for offshore oil and gas facilities decommissioning. J Ocean Eng Sci 2022;7:58-74.
9. Duan L, He J, Li M, et al. Based on a decision tree model for exploring the risk factors of smartphone addiction among children and adolescents in China during the COVID-19 pandemic. Front Psychiatry 2021;12:652356.
10. Wu J, Gong H, Liu F, Liu Y. Risk Assessment of open-pit slope based on large-scale group decision-making method considering non-cooperative behavior. Int J Fuzzy Syst 2023;1:245-63.
11. Ikwan F, Sanders D, Hassan M. Safety evaluation of leak in a storage tank using fault tree analysis and risk matrix analysis. J Loss Prevent Proc Ind 2021;73:104597.
12. Zheng HL, Du WW, Zhao XX, Shi H. Operational conception risk assessment model. Fire Control Command Control 2021;4:110-5;121.
13. Song YB, He JL, Sun JZ, Xu T. Evaluation on joint operation determination scheme. Command Inf Syst Technol 2016;4:49-54.
14. Ryczynski J, Tubis AA. Tactical risk assessment method for resilient fuel supply chains for a military peacekeeping operation. Energies 2021;14:4679.
15. Kim I, Kim S, Kim H, Shin D. Mission-based cybersecurity test and evaluation of weapon systems in association with risk management framework. Symmetry 2022;14:2361.
16. Zhang Y, Liu J, Xie X, Wang C, Bai L. Modeling of project portfolio risk evolution and response under the influence of interactions. Mathematics 2023;11:4091.
17. Abedzadeh S, Roozbahani A, Heidari A. Risk assessment of water resources development plans using fuzzy fault tree analysis. Water Resour Manag 2020;34:2549-69.
19. Lei S, Peng XR, Li XS. Research on the evaluation of national defense science and technology strategic intelligence research capability based on QFD. Inf Stud Theory Appl 2022;2:55-60.
21. Zhang D, You X, Liu S, Yang K. Multi-colony ant colony optimization based on generalized jaccard similarity recommendation strategy. IEEE Access 2019;7:157303-17.
22. Chung NC, Miasojedow B, Startek M, Gambin A. Jaccard/Tanimoto similarity test and estimation methods for biological presence-absence data. BMC Bioinformatics 2019;20:1-11.
23. Hsu WK, Chen J, Huynh NT, Lin Y. Risk assessment of navigation safety for ferries. J Mar Sci Eng 2022;5:700.
24. Yu Y, He X, Wan F, Bai Z, Fu C. Dynamic risk assessment of karst tunnel collapse based on fuzzy-AHP: a case study of the LianHuaShan tunnel, China. Adv Civil Eng 2022;2022:4426318.
25. Li K, Xiahou X, Huang H, et al. AHP-FSE-Based risk assessment and mitigation for slurry balancing shield tunnel construction. J Environ Public Health 2022;2022:1666950.
26. Fan C, Deng B, Yin Y. Hierarchical structure and transfer mechanism to assess the scheduling-related risk in construction of prefabricated buildings: an integrated ISM–MICMAC approach. Eng Constr Archit Manag 2023;30:2991-3013.
27. Chen Y, Lou N, Liu G, Luan Y, Jiang H. Risk analysis of ship detention defects based on association rules. Mar Policy 2022;142:105123.
28. Song W, Zhu Y, Li S, Wang L, Zhang H. Risk evaluation of information technology outsourcing project: an integrated approach considering risk interactions and hierarchies. Eng Appl Artif Intell 2022;113:104938.
29. Wei DT, Liu XD, Guo R. Research on strategic consistency evaluation method of equipment system based on improved DEMATEL-ISM-FCA. Military Oper Res Assess 2021;3:29-35.
30. Mathiyazhagan K, Govindan K, NoorulHaq A, Geng Y. An ISM approach for the barrier analysis in implementing green supply chain management. J Clean Prod 2023;47:283-297.
31. Ajmera P, Jain V. A fuzzy interpretive structural modeling approach for evaluating the factors affecting lean implementation in Indian healthcare industry. Int J Lean Six Sigma 2019;2:376-97.
32. Wang M, Zhang Y, Tian Y, Zhang K. An integrated rough-fuzzy WINGS-ISM method with an application in ASSCM. Expert Syst Appl 2023;212:118843.
33. Amini A, Alimohammadlou M. Toward equation structural modeling: An integration of interpretive structural modeling and structural equation modeling. J Manag Anal 2021;4:693-714.
34. Ahmad N, Qahmash A. Smartism: implementation and assessment of interpretive structural modeling. Sustainability 2021;16:8801.
35. Niati DR, Siregar ZME, Prayoga Y. The effect of training on work performance and career development: the role of motivation as intervening variable. BIRCI J 2021;2:2385-93.
36. Heri S, Nur AY, Mohd H, Rico NI, Irada S. Relationship between budget participation, job characteristics, emotional intelligence and work motivation as mediator variables to strengthening user power performance: an emperical evidence from indonesia government. Morfai J 2021;1:36-48.
37. Hirdinis M. Capital structure and firm size on firm value moderated by profitability. Int J Econ Business Admin 2019;VⅡ:174-91.
38. Poduval PS, Pramod VR, Raj VPJ. Interpretive structural modeling (ISM) and its application in analyzing factors inhibiting implementation of total productive maintenance (TPM). Int J Qual Reliab Manag 2015;3:308-31.
39. Sarabi S, Han Q, Romme AGL, de Vries B, Valkenburg R, den Ouden B. Uptake and implementation of nature-based solutions: an analysis of barriers using interpretive structuralmodeling. J Environ Manag 2020;270:110749.
40. Sharma A, Abbas H, Siddiqui MQ. Modelling the inhibitors of cold supply chain using fuzzy interpretive structural modeling and fuzzy MICMAC analysis. Plos One 2021;16:e0249046.
41. Zhu Y, Tian D, Yan F. Effectiveness of entropy weight method in decision-making. Math Problems Eng 2020;2020:3564835.
42. Nor-Al-Din SM, Razali NK, Sukri NM, Rosli MA. Application of TOPSIS method for decision making in selecting the best new car in Malaysia. IOP Conf Ser Mater Sci Eng 2021;1176:012040.
44. Siregar VMM, Sonang S, Purba AT, Sugara H, Siagian NF. Implementation of TOPSIS algorithm for selection of prominent student class. J Phys Conf Ser 2021;1783:012038.
Cite This Article
How to Cite
Du, W. W.; Chen X. W. A comprehensive risk prediction method for defense mission planning based on probabilistic reasoning and hierarchical analysis. Complex Eng. Syst. 2024, 4, 9. http://dx.doi.org/10.20517/ces.2024.15
Download Citation
Export Citation File:
Type of Import
Tips on Downloading Citation
Citation Manager File Format
Type of Import
Direct Import: When the Direct Import option is selected (the default state), a dialogue box will give you the option to Save or Open the downloaded citation data. Choosing Open will either launch your citation manager or give you a choice of applications with which to use the metadata. The Save option saves the file locally for later use.
Indirect Import: When the Indirect Import option is selected, the metadata is displayed and may be copied and pasted as needed.
Comments
Comments must be written in English. Spam, offensive content, impersonation, and private information will not be permitted. If any comment is reported and identified as inappropriate content by OAE staff, the comment will be removed without notice. If you have any queries or need any help, please contact us at support@oaepublish.com.