Target threat assessment using fuzzy sets theory

(1) * Ehsan Azimirad Mail (Hakim Sabzevari University, Iran, Islamic Republic of)
(2) Javad Haddadnia Mail (Hakim Sabzevari University, Sabzevar, Iran, Islamic Republic of)
*corresponding author

Abstract


The threat evaluation is significant component in target classification process and is significant in military and non military applications. Small errors or mistakes in threat evaluation and target classification especial in military applications can result in huge damage of life and property. Threat evaluation helps in case of weapon assignment, and intelligence sensor support system. It is very important factor to analyze the behavior of enemy tactics as well as our surveillance. This paper represented a precise description of the threat evaluation process using fuzzy sets theory. A review has been carried out regarding which parameters that have been suggested for threat value calculation. For the first time in this paper, eleven parameters are introduced for threat evaluation so that this parameters increase the accuracy in designed system. The implemented threat evaluation system has been applied to a synthetic air defense scenario and four real time dynamic air defense scenarios. The simulation results show the correctness, accuracy, reliability and minimum errors in designing of threat evaluation system

Keywords


Threat assessment; Military applications; Fuzzy sets theory; Dynamic air targets; Multi sensor data fusion

   

DOI

https://doi.org/10.26555/ijain.v1i2.18
      

Article metrics

Abstract views : 1123 | PDF views : 566

   

Cite

   

Full Text

Download

References


Y. Deng, X. Y. Su, D. Wang, Q. Li, Target Recognition Based on Fuzzy Dempster Data Fusion Method, Defence Science Journal, 2010, 60 (5): 525 – 530.

H. Durrant-Whyte, “Multi Sensor Data Fusion”, Australian Centre for Field Robotics the University of Sydney, January 2001.

J. N. Roux, J. H. Van Vuuren, “Threat evaluation and wea-pon assignment decision support: A review of the state of the art, Orion”, vol. 23, pp. 151–186, 2007.

J. Roy, S. Paradis, M. Allouche, “Threat evaluation for impact assessment in situation analysis systems”, In: Kadar, I. (ed.) Proceedings of SPIE: Signal Processing, Sensor Fusion, and Target Recognition XI, vol. 4729, pp. 329–341, 2002.

S. Kumar, A. M. Dixit, “Threat Evaluation Modelling for Dynamic Targets Using Fuzzy Logic Approach”, International Conference on Computer Science and Engineering, 2012.

S. Paradis, A. Benaskeur, M. Oxenham, P. Cutler, “Threat evaluation and weapons allocation in network-centric warfare”, In: Proceedings of the 8th International Conference on Information Fusion, 2005.

G. A. McIntyre, K. J. Hintz, “A Comprehensive Approach to Sensor Management, Part I: A Survey of Modern Sensor Management Systems”, IEEE Transactions on SMC, April 1999.

J. Roy, S. Paradis, M. Allouche, “Threat evaluation for impact assessment in situation analysis systems”, in Proceedings of SPIE: Signal Processing, Sensor Fusion, and Target Recognition XI (I. Kadar, ed.), vol. 4729, pp. 329–341, July 2002.

Visibility Sensor Model 6000, “The Standard of Measure-ment”, Belfort Instrument Company, USA.

P. Valin, E. Bosse, A. Jouan, “Airborne application of information fusion algorithms to classification”, Technical Report TR 2004-282, Defense Research and Development Canada – Valcartier, May 2006.

A. Steinberg, “An approach to threat assessment”, in Proceedings of the 8th International Conference on Information Fusion, 2005.

X. Nguyen, “Threat assessment in tactical airborne environ-ments”, in Proceedings of the Fifth International Conference on Information Fusion, 2002.

E. L. Waltz, J. Llinas, “Multisensor Data Fusion”, Artech House, 1990.

Kehe Wu, Shichao, “An Information Security Threat Assessment Model based on Bayesian Network and OWA Operator”, Applied Mathematics & Information Sciences, Vol. 8, No. 2, pp. 833-838, 2014.

Haixin ZHANG, Bingyi KANG, Ya LI, Yajuan ZHANG, Yong DENG, “Target Threat Assessment Based on Interval Data Fusion”, Journal of Computational Information Systems 8: 6 2609–2616, 2012.

G. S. Malik, S. K. Das, “A METHOD OF RISK ANALYSIS AND THREAT MANAGEMENT USING ANALYTIC HIERARCHY PROCESS: AN APPLICATION TO AIR DEFENSE”, International Symposium of the Analytic Hierarchy Process 2014, Washington, U.S.A, 2014.

S. Paradis, A. Benaskeur, M. Oxenham, P. Cutler, “Threat evaluation and weapons allocation in network-centric warfare”, in Proceedings of the 8th International Conference on Information Fusion, 2005.

E. Little, G. Rogova, “An ontological analysis of threat and vulnerability”, in Proceedings of the 9th International Conference on Information Fusion, 2006.

S.J. Yang, J. Holsopple, M. Sudit, “Evaluating Threat Assessment for Multi-Stage Cyber Attacks”, In Proceedings of the 2006 Military Communications Conference, Washington, DC. Oct. 23-25, 2006.

R. Chinchani, A. Iyer, H.Q. Ngo, S. Upadhyaya, “Towards a theory of insider threat assessment”, In Proceedings of the 2005 International Conference on Dependable Systems and Networks, 2005.

F. BOLDERHEIJ, PHD thesis, “Mission Driven”, Netherlands Defense Academy and the Centre for Automation of Mission Critical Systems (CAMS), Force Vision, 2007.

F. Johansson, “Evaluating the performance of TEWA Sys-tem”, Orebro University, 2010.

F. White, “A Model for Data Fusion”, Proceedings 1st National Symposium on Sensor Fusion, 1988.

A. Steinberg, C. Bowman, F. White, “Revisions to the JDL Data Fusion Model”, SPIE, Vol. 3719, pp. 430-441, 1999.

L. Klein, “Sensor and Data Fusion Concepts and Applications”, SPIE Volume TT14, 1993.

M. Bedworth, J. O’Brien, “The Omnibus Model: A New Model of Data Fusion?”, 1999.

F. Johansson, G. Falkman, “A Bayesian network approach to threat evaluation with application to an air defense scenario”, 11th International Conference on Information Fusion, 2008.

F. Johansson, G. Falkman, “A Bayesian network approach to threat evaluation with application to an air defense scenario”, In: Proceedings of the 11th International Conference on Information Fusion, 2008.

T. Lampinen, J. Ropponen, T. T. Laitinen, “Joint Threat Assessment with Asset Profiling and Entity Bayes Net”, In Proceeding of the 12th International Conference on Information Fusion, Seattle, WA, USA, 2009.

Y. Liang, “A fuzzy knowledge based system in situation and threat assessment”, Journal of Systems Science & Information, 4, 791–802, 2006.

M. Liebhaber, B. Feher, “Air threat assessment: Research, model, and display guidelines”, in Proceedings of the Command and Control Research and Technology Symposium, 2002.

Y. Liang, “An approximate reasoning model for situation and threat assessment”, in Proceedings of the 4th International Conference on Fuzzy Systems and Knowledge Discovery, 2007.

X. Nguyen, “Threat assessment in tactical airborne environ-ments”, in Proceedings of the Fifth International Conference on Information Fusion, 2002.

T. J. Ross, “Fuzzy Logic with Engineering Applications”, Second Edition, John Wiley and Sons, 628.

M. Oxenham, “Enhancing situation awareness for air defence via automated threat analysis”, in Proceedings of the Sixth International Conference on Information Fusion, vol. 2, pp. 1086–1093, 2003.

M. Liebhaber, B. Feher, “Air threat assessment: Research, model, and display guidelines”, in Proceedings of the 2002 Command and Control Research and Technology Symposium, 2002.

Chen Dongfenga, Feng Yua, Liu Yongxuea, “Threat Assessment for Air Defense Operations Based on Intuitionistic Fuzzy Logic”, International Workshop on Information and Electronics Engineering (IWIEE), 2012, pp. 3302-3306.

A. Berrached M. Beheshti A. de Korvin R. Aló, “Applying Fuzzy Relation Equations to Threat Analysis”, Proceedings of the 35th Hawaii International Conference on System Sciences – 2002.

Athar Kharal, “Predicting Suicide Attacks: A Fuzzy Soft Set Approach”, 2010.

S.H Nasaruddin, Lily Marlia Abdul Latif, “Information System Risk Analysis Using Fuzzy Techniques”, International Symposium on Mathematical Sciences and Computing Research 2013 (iSMSC 2013) 6-7 December 2013, Perak, MALAYSIA.

Rahul Choudhary, Abhishek Raghuvanshi, “Fuzzy Based Evaluation Model of a Systems Security”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, No. 9, September 2012, pp. 413-416




Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

___________________________________________________________
International Journal of Advances in Intelligent Informatics
ISSN 2442-6571  (print) | 2548-3161 (online)
Organized by Informatics Department - Universitas Ahmad Dahlan , and UTM Big Data Centre - Universiti Teknologi Malaysia
Published by Universitas Ahmad Dahlan
W : http://ijain.org
E : info@ijain.org, andri.pranolo@tif.uad.ac.id (paper handling issues)
     ijain@uad.ac.id, andri.pranolo.id@ieee.org (publication issues)

View IJAIN Stats

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0