DOI QR코드

DOI QR Code

Fuzzy Rule-Based Method for Air Threat Evaluation

적기의 위협 평가 자동화를 위한 퍼지 규칙 방법론

  • Choi, Byeong Ju (Department of Information and Industrial Engineering, Yonsei University) ;
  • Kim, Ji Eun (The 1st Research and Development Institute, Agency for Defence Development) ;
  • Kim, Jin Soo (The 1st Research and Development Institute, Agency for Defence Development) ;
  • Kim, Chang Ouk (Department of Information and Industrial Engineering, Yonsei University)
  • 최병주 (연세대학교 정보산업공학과) ;
  • 김지은 (국방과학연구소 제1기술연구본부) ;
  • 김진수 (국방과학연구소 제1기술연구본부) ;
  • 김창욱 (연세대학교 정보산업공학과)
  • Received : 2015.07.13
  • Accepted : 2015.12.18
  • Published : 2016.02.05

Abstract

Threat evaluation is a process to estimate the threat score which enemy aerial threat poses to defended assets. The objective of threat evaluation is concerned with making an engagement priority list for optimal weapon allocation. Traditionally, the threat evaluation of massive air threats has been carried out by air defence experts, but the human decision making is less effective in real aerial attack situations with massive enemy fighters. Therefore, automation to enhance the speed and efficiency of the human operation is required. The automatic threat evaluation by air defense experts who will perform multi-variable judgment needs formal models to accurately quantify their linguistic evaluation of threat level. In this paper we propose a threat evaluation model by using a fuzzy rule-based inference method. Fuzzy inference is an appropriate method for quantifying threat level and integrating various threat attribute information. The performance of the model has been tested with a simulation that reflected real air threat situation and it has been verified that the proposed model was better than two conventional threat evaluation models.

Keywords

References

  1. S. Paradis, A. Benaskeur, M. Oxenham and P. Cutler, "Threat Evaluation and Weapons Allocation in Network-Centric Warfare," Proc. 8th International Conference on Information Fusion, 2005.
  2. F. Johansson and G. Falkman, "A Comparison between Two Approaches to Threat Evaluation in an Air Defense Scenario," Proc. 5th International Conference on Information Fusion, 2002.
  3. J. N. Roux and J. H. Van Vuuren, "Threat Evaluation and Weapon Assignment Decision Support: A Review of the State of the Art," ORiON: The Journal of ORRSA, Vol. 23, No. 2, pp. 151-187, 2007.
  4. D. H. Hong, J. H. Yoo, S. C. Shin, S. H. Kim and Y. W. Park, "A Threat Evaluation Method on the Air Track in Short Range Air Defense Systems," Proc. Fall Conference on Korean Institute of Communication and Information Sciences, pp. 414-415, 2011.
  5. Y. Liang, "An Approximate Reasoning Model for Situation and Threat Assessment," Proc. 4th International Conference on Fuzzy Systems and Knowledge Discovery, Vol. 4, pp. 246-250, 2007.
  6. A. X. Dong and L. G. Qing, "Application of Neural Network in the Field of Target Threat Evaluation," Proc. International Joint Conference on Neural Network, Vol. 6, pp. 4237-4240, 1999.
  7. M. Azak and A. E. Bayrak, "A New Approach for Threat Evaluation and Weapon Assignment Problem, Hybrid Learning with Multi-Agent Coordination," Proc. 23rd International Symposium on Computer and Information Sciences, pp. 1-6, 2008.
  8. N. Okello, & G. Thoms, "Threat Assessment using Bayesian Networks," Proc. 6th International Conference on Information Fusion, pp. 1102-1109, 2003.
  9. M. J. Liebhaber and B. Feher, "Air Threat Assessment: Research, Model, and Display Guidelines," Space and Naval Warfare Systems Command, San Diego, CA, 2002.
  10. X. T. Nguyen, "Threat Assessment in Tactical Airborne Environments," Proc. 15th International Conference on Information Fusion, Vol. 2, pp. 1300-1307, 2002.
  11. J. Roy, S. Paradis and M. Allouche, "Threat Evaluation for Impact Assessment in Situation Analysis Systems," Proc. SPIE: Signal Processing, Sensor Fusion, and Target Recognition XI, Vol. 4729, pp. 329-341, 2002.
  12. L. A. Zadeh, "Fuzzy Sets," Information and Control, Vol. 8, No. 3, pp. 338-353, 1965. https://doi.org/10.1016/S0019-9958(65)90241-X
  13. Andries P. Engelbrecht, "Computational Intelligence: an Introduction," John Wiley & Sons, Inc. England, pp. 211-238, 2007.
  14. B. J. Choi, J. E. Kim, J. K. Jung and C. O. Kim, "Non-centroid Clustering using Flights Adjacent Distances for Efficient Threat Evaluation," Proc. Spring Conference on Korean Institute of Industrial Engineers, pp. 175-181, 2015.