Advanced Search
Volume 28 Issue 3
Sep.  2010
Turn off MathJax
Article Contents
MAO Kefei, CHEN Jie, LIU Jianwei. Security Analysis and Improvements of Hierarchical IdentityBased Authenticated Key Agreement Scheme[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2619-2626. doi: 10.11999/JEIT151443
Citation: Li Wei-sheng, Wang San-min, Wang Bao-Shu. Study of Situation Assessment Method Based on Plan Recognition Theory[J]. Journal of Electronics & Information Technology, 2006, 28(3): 532-536.

Study of Situation Assessment Method Based on Plan Recognition Theory

  • Received Date: 2004-08-01
  • Rev Recd Date: 2004-12-16
  • Publish Date: 2006-03-19
  • For the shortage of plan recognition method presented by Kautz(1987) in controlling mechanism, a plan recognition method based on planning knowledge graph is discussed in detail. Using first-order predicate logic as formal language, an instance of tactical intelligent planning is analyzed and a situation assessment model combined tactical intelligent planning system and a tactical plan recognition system are proposed. The plan library, which is dynamic set up, could break through the limit of closed world hypothesis in Kautzs plan recognition method. The model is capable of supplying reasonable hypothesis for enemys action goal and plan and projecting enemys future action, which is helpful to command decision.
  • Cited by

    Periodical cited type(2)

    1. 董鹏鹏,曹瑞,张光明,丁卓航. 载波频偏和相关信道对二维索引调制的影响. 信息技术与信息化. 2024(04): 138-141+145 .
    2. 王红星 ,张力凡 ,陆发平 ,康家方 ,刘传辉 ,张磊 . 基于优化多重索引的椭圆球面波函数多载波索引调制解调方法. 电子与信息学报. 2022(12): 4185-4193 . 本站查看

    Other cited types(0)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2075) PDF downloads(772) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return