Share Email Print
cover

Proceedings Paper

Multi-domain evaluation method for RF stealth performance based on IFA-TOPSIS with hesitant fuzzy sets
Author(s): Chengxiu Yang; Qianzhe Wang; Weidong Peng; Shaoting Pei
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

With the development of airborne passive detection equipment, radio frequency (RF) stealth performance evaluation becomes more and more important. This is a comprehensive and complex problem. Firstly, RF stealth performance evaluation is not the optimization of a few indices but a comprehensive evaluation model. Secondly, it is a combination of technology and military tactics, which also needs to be integrated with practical application. In views of this problem, this paper proposes an evaluation method for RF stealth performance based on improved firefly algorithm (IFA) and technique for order preference by similarity to ideal solution (TOPSIS) with hesitant fuzzy sets. From the perspective of the radar radiating, a multi-domain evaluation system is established, which divided into four sub-indicators. Then the optimal attribute weights are obtained based on analyzing attributes and solutions. According to the closeness between different solutions and ideal solutions, the radar RF stealth performance ranking is obtained. Finally, numerical simulations demonstrate the effectiveness of the proposed new approach.

Paper Details

Date Published: 18 December 2019
PDF: 8 pages
Proc. SPIE 11334, AOPC 2019: Optoelectronic Devices and Integration; and Terahertz Technology and Applications, 1133409 (18 December 2019); doi: 10.1117/12.2540058
Show Author Affiliations
Chengxiu Yang, Air Force Engineering Univ. (China)
Qianzhe Wang, Air Force Engineering Univ. (China)
Weidong Peng, Air Force Engineering Univ. (China)
Shaoting Pei, Air Force Engineering Univ. (China)


Published in SPIE Proceedings Vol. 11334:
AOPC 2019: Optoelectronic Devices and Integration; and Terahertz Technology and Applications
Zhiping Zhou; Xiao-Cong Yuan; Daoxin Dai, Editor(s)

© SPIE. Terms of Use
Back to Top
PREMIUM CONTENT
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?
close_icon_gray