Research Article
A Threat Assessment Method for Unmanned Aerial Vehicle Based on Bayesian Networks under the Condition of Small Data Sets
Table 5
Portion of processed information.
| ā | T | Ac | Ty | Ai | Tn | As | Aac | Sp | Er | Si | V | H | A | Vl | Dis | IFF |
| 1 | 2 | 2 | 2 | 1 | 1 | 1 | 2 | 1 | 2 | 2 | 1 | 2 | 1 | 1 | 3 | 1 | 2 | 2 | 2 | 2 | 2 | 1 | 3 | 3 | 1 | 2 | 2 | 3 | 1 | 2 | 2 | 3 | 2 | 3 | 1 | 2 | 3 | 1 | 2 | 1 | 2 | 2 | 1 | 2 | 3 | 2 | 1 | 1 | 3 | 1 | 4 | 3 | 1 | 1 | 1 | 1 | 2 | 2 | 1 | 1 | 1 | 2 | 2 | 1 | 1 | 3 | 1 | 5 | 1 | 1 | 2 | 1 | 1 | 1 | 2 | 1 | 2 | 2 | 2 | 1 | 1 | 1 | 3 | 1 | 6 | 3 | 2 | 1 | 2 | 1 | 1 | 3 | 1 | 2 | 1 | 1 | 2 | 2 | 2 | 1 | 2 | 7 | 2 | 1 | 3 | 1 | 1 | 1 | 1 | 2 | 1 | 2 | 1 | 2 | 1 | 1 | 3 | 1 | 8 | 2 | 2 | 3 | 2 | 1 | 2 | 2 | 2 | 1 | 1 | 2 | 1 | 1 | 2 | 1 | 1 | 9 | 3 | 3 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 2 | 1 | 2 | 2 | 1 | 3 | 1 | 10 | 1 | 1 | 3 | 1 | 2 | 1 | 3 | 2 | 2 | 2 | 2 | 2 | 1 | 1 | 3 | 1 |
|
|