DOI QR코드

DOI QR Code

A Threat Assessment Algorithm for Multiple Ground Targets

다수의 대지표적을 위한 위협 평가 알고리즘

  • Received : 2018.06.29
  • Accepted : 2018.07.11
  • Published : 2018.07.28

Abstract

As a basic information to implement the fire plan that dominates multiple targets effectively under the battle environment with limited resources, such a process is mandatory that gives a priority order to a target with the high level of threat by quantitatively computing the threat level of an individual target through the analysis on the target. However, the study has still remained in the initial level on an evaluation algorithm for the threat level of the ground target. Considering this fact, the present paper proposes the evaluation algorithm for the threat by multiple ground targets. The proposed algorithm has a core point to consider the type of target and protected asset to implement the computation of proximity; set the additional value based on the weights indicating the significance of weapon and protected asset; and compute the threat level of a target that considers the characteristics of the target. The evaluation and verification of performances have been implemented through the simulation and visualization of an algorithm proposed in the present paper. From the performance result, as the proposed algorithm has been able to perform effectively the threat assessment according to the weights indicating the significance of weapons and protected assets under diverse environments where weapons and protected assets are located, high utility and effect are expected when applied to an actual ground weapon system.

한정된 자원을 가진 전장 환경에서 다수의 표적을 효과적으로 제압하는 사격 계획을 수행하기 위한 기반정보로써, 표적에 대한 분석을 통해 표적의 위협도를 정량적으로 산출하여 높은 위협도를 가지는 표적에 대해 우선순위를 부여하는 과정이 필수적이다. 그러나 대지표적에 대한 위협 평가 알고리즘에 대한 연구는 아직 초기 수준에 머무르고 있다. 이를 고려하여, 본 논문에서는 다수의 대지표적을 위한 위협 평가 알고리즘을 제안한다. 제안하는 알고리즘에서는 표적 및 보호자산의 형태를 고려하여 근접도 연산을 수행한 후, 무장 및 보호 자산의 중요도에 따른 가중치를 설정하여 표적 성질을 고려한 표적의 위협도를 산출하는 것을 핵심으로 한다. 본 논문에서는 제안하는 알고리즘의 시뮬레이션 및 가시화를 통해 성능 평가 및 검증을 수행하였다. 성능 평가 결과 제안하는 알고리즘은 무장 및 보호자산의 위치가 다양한 환경에서 무장 및 보호자산의 중요도를 나타내는 가중치에 따라서 위협도 평가를 효과적으로 수행함으로써, 실제 대지 무기 체계에 적용할 시에 높은 효용성 및 효과가 기대된다.

Keywords

References

  1. S. Paradis, A. Benaskeur, M. Oxenham, and P. Cutler, "Threat Evaluation and Weapons Allocation in Network-Centric Warfare," In Proc. of the International Conference on Information Fusion, Vol.2, pp.1078-1085, 2005.
  2. J. Roux and J. Vuuren, "Threat Evaluation and Weapon Assignment Decision Support: A Review of the State of the Art," ORiON, Vol.23, No.2, pp.151-187, 2007.
  3. M. Azak and A. Bayrak, "A New Approach for Threat Evaluation and Weapon Assignment Problem, Hybrid Learning with Multi-Agent Coordination," In Proc. of the International Symposium on Computer and Information Sciences, pp.1-6, 2008.
  4. A. Steinberg, "An Approach to Threat Assessment," In Proc. of the International Conference on Information Fusion, Vol.2, pp.1256-1263, 2005.
  5. X. Nguyen, "Threat Assessment in Tactical Airborne Environments," In Proc. of the International Conference on Information Fusion, Vol.2, pp.1300-1307, 2002.
  6. E. Waltz, Multisensor Data Fusion, Artech House, 1990.
  7. J. Roy, S. Paradis, and M. Allouche, "Threat Evaluation for Impact Assessment in Situation Analysis Systems," In Proc. of the Signal Processing, Sensor Fusion, and Target Recognition XI, Vol.4729, pp.329-341, 2002.
  8. T. Jan, "Neural Network Based Threat Assessment for Automated Visual Surveillance," In Proc. of the International Joint Conference on Neural Network, pp.1309-1312, 2004.
  9. G. Wang, L. Guo, and H. Duan, "Wavelet Neural Network using Multiple Wavelet Functions in Target Threat Assessment," The Scientific World Journal, Vol.2013, Article ID.632437, pp.1-7, 2013.
  10. F. Johansson and G. Falkman, "A Bayesian Network Approach to Threat Evaluation with Application to an Air Defense Scenario," In Proc. of the International Conference on Information Fusion, pp.1-7, 2008.
  11. N. Okello and G. Thoms, "Threat Assessment using Bayesian Networks," In Proc. of the International Conference on Information Fusion, pp.1102-1109, 2003.
  12. Y. Hou, W. Guo, and Z. Zhu, "Threat Assessment based on Variable Parameter Dynamic Bayesian Network," In Proc. of the Chinese Control Conference, pp.1230-1235, 2010.
  13. Y. Liang, "A Fuzzy Knowledge based System in Situation and Threat Assessment," Journal of Systems Science & Information, Vol.4, No.4, pp.791-802, 2006.
  14. E. Azimirad and J. Haddadnia, "Target Threat Assessment using Fuzzy Sets Theory," International Journal of Advances in Intelligent Informatics, Vol.1, No.2, pp.57-74, 2015. https://doi.org/10.26555/ijain.v1i2.18
  15. E. Azimirad and J. Haddadnia, "A New Data Fusion Instrument for Threat Evaluation Using of Fuzzy Sets Theory," International Journal of Computer Science and Information Security, Vol.13, No.4, pp.19-32, 2015.
  16. E. Azimirad and J. Haddadnia, "A Modified Model for Threat Assessment by Fuzzy Logic Approach," International Journal of Computer Science and Information Security, Vol.13, No.4, pp.12-18, 2015.
  17. M. Riveiro, T. Helldin, M. Lebram, and G. Falkman, "Towards Future Threat Evaluation Systems: User Study, Proposal and Precepts for Design," In Proc. of the International Conference on Fusion, pp.1863-1870, 2013.
  18. http://www.mathworks.com, 2018.6.27.