JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Fuzzy Rule-Based Method for Air Threat Evaluation
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Fuzzy Rule-Based Method for Air Threat Evaluation
Choi, Byeong Ju; Kim, Ji Eun; Kim, Jin Soo; Kim, Chang Ouk;
  PDF(new window)
 Abstract
Threat evaluation is a process to estimate the threat score which enemy aerial threat poses to defended assets. The objective of threat evaluation is concerned with making an engagement priority list for optimal weapon allocation. Traditionally, the threat evaluation of massive air threats has been carried out by air defence experts, but the human decision making is less effective in real aerial attack situations with massive enemy fighters. Therefore, automation to enhance the speed and efficiency of the human operation is required. The automatic threat evaluation by air defense experts who will perform multi-variable judgment needs formal models to accurately quantify their linguistic evaluation of threat level. In this paper we propose a threat evaluation model by using a fuzzy rule-based inference method. Fuzzy inference is an appropriate method for quantifying threat level and integrating various threat attribute information. The performance of the model has been tested with a simulation that reflected real air threat situation and it has been verified that the proposed model was better than two conventional threat evaluation models.
 Keywords
Air Defence;Threat Evaluation;Fuzzy Inference;
 Language
Korean
 Cited by
 References
1.
S. Paradis, A. Benaskeur, M. Oxenham and P. Cutler, "Threat Evaluation and Weapons Allocation in Network-Centric Warfare," Proc. 8th International Conference on Information Fusion, 2005.

2.
F. Johansson and G. Falkman, "A Comparison between Two Approaches to Threat Evaluation in an Air Defense Scenario," Proc. 5th International Conference on Information Fusion, 2002.

3.
J. N. Roux and J. H. Van Vuuren, "Threat Evaluation and Weapon Assignment Decision Support: A Review of the State of the Art," ORiON: The Journal of ORRSA, Vol. 23, No. 2, pp. 151-187, 2007.

4.
D. H. Hong, J. H. Yoo, S. C. Shin, S. H. Kim and Y. W. Park, "A Threat Evaluation Method on the Air Track in Short Range Air Defense Systems," Proc. Fall Conference on Korean Institute of Communication and Information Sciences, pp. 414-415, 2011.

5.
Y. Liang, "An Approximate Reasoning Model for Situation and Threat Assessment," Proc. 4th International Conference on Fuzzy Systems and Knowledge Discovery, Vol. 4, pp. 246-250, 2007.

6.
A. X. Dong and L. G. Qing, "Application of Neural Network in the Field of Target Threat Evaluation," Proc. International Joint Conference on Neural Network, Vol. 6, pp. 4237-4240, 1999.

7.
M. Azak and A. E. Bayrak, "A New Approach for Threat Evaluation and Weapon Assignment Problem, Hybrid Learning with Multi-Agent Coordination," Proc. 23rd International Symposium on Computer and Information Sciences, pp. 1-6, 2008.

8.
N. Okello, & G. Thoms, "Threat Assessment using Bayesian Networks," Proc. 6th International Conference on Information Fusion, pp. 1102-1109, 2003.

9.
M. J. Liebhaber and B. Feher, "Air Threat Assessment: Research, Model, and Display Guidelines," Space and Naval Warfare Systems Command, San Diego, CA, 2002.

10.
X. T. Nguyen, "Threat Assessment in Tactical Airborne Environments," Proc. 15th International Conference on Information Fusion, Vol. 2, pp. 1300-1307, 2002.

11.
J. Roy, S. Paradis and M. Allouche, "Threat Evaluation for Impact Assessment in Situation Analysis Systems," Proc. SPIE: Signal Processing, Sensor Fusion, and Target Recognition XI, Vol. 4729, pp. 329-341, 2002.

12.
L. A. Zadeh, "Fuzzy Sets," Information and Control, Vol. 8, No. 3, pp. 338-353, 1965. crossref(new window)

13.
Andries P. Engelbrecht, "Computational Intelligence: an Introduction," John Wiley & Sons, Inc. England, pp. 211-238, 2007.

14.
B. J. Choi, J. E. Kim, J. K. Jung and C. O. Kim, "Non-centroid Clustering using Flights Adjacent Distances for Efficient Threat Evaluation," Proc. Spring Conference on Korean Institute of Industrial Engineers, pp. 175-181, 2015.