- Volume 18 Issue 7
DOI QR Code
A Threat Assessment Algorithm for Multiple Ground Targets
다수의 대지표적을 위한 위협 평가 알고리즘
- Received : 2018.06.29
- Accepted : 2018.07.11
- Published : 2018.07.28
As a basic information to implement the fire plan that dominates multiple targets effectively under the battle environment with limited resources, such a process is mandatory that gives a priority order to a target with the high level of threat by quantitatively computing the threat level of an individual target through the analysis on the target. However, the study has still remained in the initial level on an evaluation algorithm for the threat level of the ground target. Considering this fact, the present paper proposes the evaluation algorithm for the threat by multiple ground targets. The proposed algorithm has a core point to consider the type of target and protected asset to implement the computation of proximity; set the additional value based on the weights indicating the significance of weapon and protected asset; and compute the threat level of a target that considers the characteristics of the target. The evaluation and verification of performances have been implemented through the simulation and visualization of an algorithm proposed in the present paper. From the performance result, as the proposed algorithm has been able to perform effectively the threat assessment according to the weights indicating the significance of weapons and protected assets under diverse environments where weapons and protected assets are located, high utility and effect are expected when applied to an actual ground weapon system.
Threat Assessment;Threat Level;Fire Plan;Ground Target;Ground-to-Ground Weapon System
- S. Paradis, A. Benaskeur, M. Oxenham, and P. Cutler, "Threat Evaluation and Weapons Allocation in Network-Centric Warfare," In Proc. of the International Conference on Information Fusion, Vol.2, pp.1078-1085, 2005.
- J. Roux and J. Vuuren, "Threat Evaluation and Weapon Assignment Decision Support: A Review of the State of the Art," ORiON, Vol.23, No.2, pp.151-187, 2007.
- M. Azak and A. Bayrak, "A New Approach for Threat Evaluation and Weapon Assignment Problem, Hybrid Learning with Multi-Agent Coordination," In Proc. of the International Symposium on Computer and Information Sciences, pp.1-6, 2008.
- A. Steinberg, "An Approach to Threat Assessment," In Proc. of the International Conference on Information Fusion, Vol.2, pp.1256-1263, 2005.
- X. Nguyen, "Threat Assessment in Tactical Airborne Environments," In Proc. of the International Conference on Information Fusion, Vol.2, pp.1300-1307, 2002.
- E. Waltz, Multisensor Data Fusion, Artech House, 1990.
- J. Roy, S. Paradis, and M. Allouche, "Threat Evaluation for Impact Assessment in Situation Analysis Systems," In Proc. of the Signal Processing, Sensor Fusion, and Target Recognition XI, Vol.4729, pp.329-341, 2002.
- G. Wang, L. Guo, and H. Duan, "Wavelet Neural Network using Multiple Wavelet Functions in Target Threat Assessment," The Scientific World Journal, Vol.2013, Article ID.632437, pp.1-7, 2013.
- F. Johansson and G. Falkman, "A Bayesian Network Approach to Threat Evaluation with Application to an Air Defense Scenario," In Proc. of the International Conference on Information Fusion, pp.1-7, 2008.
- N. Okello and G. Thoms, "Threat Assessment using Bayesian Networks," In Proc. of the International Conference on Information Fusion, pp.1102-1109, 2003.
- Y. Hou, W. Guo, and Z. Zhu, "Threat Assessment based on Variable Parameter Dynamic Bayesian Network," In Proc. of the Chinese Control Conference, pp.1230-1235, 2010.
- Y. Liang, "A Fuzzy Knowledge based System in Situation and Threat Assessment," Journal of Systems Science & Information, Vol.4, No.4, pp.791-802, 2006.
- E. Azimirad and J. Haddadnia, "Target Threat Assessment using Fuzzy Sets Theory," International Journal of Advances in Intelligent Informatics, Vol.1, No.2, pp.57-74, 2015. https://doi.org/10.26555/ijain.v1i2.18
- E. Azimirad and J. Haddadnia, "A New Data Fusion Instrument for Threat Evaluation Using of Fuzzy Sets Theory," International Journal of Computer Science and Information Security, Vol.13, No.4, pp.19-32, 2015.
- E. Azimirad and J. Haddadnia, "A Modified Model for Threat Assessment by Fuzzy Logic Approach," International Journal of Computer Science and Information Security, Vol.13, No.4, pp.12-18, 2015.
- M. Riveiro, T. Helldin, M. Lebram, and G. Falkman, "Towards Future Threat Evaluation Systems: User Study, Proposal and Precepts for Design," In Proc. of the International Conference on Fusion, pp.1863-1870, 2013.
- http://www.mathworks.com, 2018.6.27.
- T. Jan, "Neural Network Based Threat Assessment for Automated Visual Surveillance," In Proc. of the International Joint Conference on Neural Network, pp.1309-1312, 2004.