Skip to main content

A Comparison between Two Approaches to Threat Evaluation in an Air Defense Scenario

  • Conference paper
Modeling Decisions for Artificial Intelligence (MDAI 2008)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 5285))

Abstract

Threat evaluation is a high-level information fusion problem of high importance within the military domain. This task is the foundation for weapons allocation, where assignment of blue force (own) weapon systems to red force (enemy) targets is performed. In this paper, we compare two fundamentally different approaches to threat evaluation: Bayesian networks and fuzzy inference rules. We conclude that there are pros and cons with both types of approaches, and that a hybrid of the two approaches seems both promising and viable for future research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Roux, J.N., van Vuuren, J.H.: Threat evaluation and weapon assignment decision support: A review of the state of the art. ORiON 23, 151–186 (2007)

    Article  Google Scholar 

  2. Roy, J., Paradis, S., Allouche, M.: Threat evaluation for impact assessment in situation analysis systems. In: Kadar, I. (ed.) Proceedings of SPIE: Signal Processing, Sensor Fusion, and Target Recognition XI, vol. 4729, pp. 329–341 (2002)

    Google Scholar 

  3. Paradis, S., Benaskeur, A., Oxenham, M., Cutler, P.: Threat evaluation and weapons allocation in network-centric warfare. In: Proceedings of the 8th International Conference on Information Fusion (2005)

    Google Scholar 

  4. Steinberg, A., Bowman, C., White, F.: Revisions to the JDL data fusion model. In: Proceedings of the SPIE Sensor Fusion: Architectures, Algorithms, and Applications III, pp. 430–441 (1999)

    Google Scholar 

  5. Phister, P.W., Plonisch, I.: Data fusion “cube”: A multi-dimensional perspective. In: Proceedings of the Command and Control Research and Technology Symposium (CCRTS 2002) (2002)

    Google Scholar 

  6. Johansson, F., Falkman, G.: A Bayesian network approach to threat evaluation with application to an air defense scenario. In: Proceedings of the 11th International Conference on Information Fusion (2008)

    Google Scholar 

  7. Liang, Y.: An approximate reasoning model for situation and threat assessment. In: Proceedings of the 4th International Conference on Fuzzy Systems and Knowledge Discovery (2007)

    Google Scholar 

  8. Liang, Y.: A fuzzy knowledge based system in situation and threat assessment. Journal of Systems Science & Information 4(4), 791–802 (2006)

    Google Scholar 

  9. Nguyen, X.: Threat assessment in tactical airborne environments. In: Proceedings of the Fifth International Conference on Information Fusion (2002)

    Google Scholar 

  10. Waltz, E.L., Llinas, J.: Multisensor Data Fusion. Artech House (1990)

    Google Scholar 

  11. Lauritzen, S.L., Spiegelhalter, D.J.: Local computations with probabilities on graphical structures and their application to expert systems. Journal of the Royal Statistical Society B50, 157–224 (1988)

    MathSciNet  MATH  Google Scholar 

  12. Huang, C., Darwiche, A.: Inference in belief networks: A procedural guide. International Journal of Approximate Reasoning 15(3), 225–263 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  13. Klir, G.J., Folger, T.A.: Fuzzy sets, uncertainty, and information. Prentice-Hall, Inc., Upper Saddle River (1987)

    MATH  Google Scholar 

  14. Kruse, R., Gebhardt, J.E., Klowon, F.: Foundations of Fuzzy Systems. John Wiley & Sons, Inc., New York (1994)

    Google Scholar 

  15. Kreinovich, V., Nguyen, H.T.: Which fuzzy logic is the best: Pragmatic approach (and its theoretical analysis). Fuzzy Sets and Systems 157(5), 611–614 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  16. Druzdzel, M., van der Gaag, L.: Building probabilistic networks: where do the numbers come from? IEEE Transactions on Knowledge and Data Engineering 12(4), 481–486 (2000)

    Article  Google Scholar 

  17. Chan, H., Darwiche, A.: On the revision of probabilistic beliefs using uncertain evidence. Artificial Intelligence 163(1), 67–90 (2005)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Johansson, F., Falkman, G. (2008). A Comparison between Two Approaches to Threat Evaluation in an Air Defense Scenario. In: Torra, V., Narukawa, Y. (eds) Modeling Decisions for Artificial Intelligence. MDAI 2008. Lecture Notes in Computer Science(), vol 5285. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88269-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-88269-5_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-88268-8

  • Online ISBN: 978-3-540-88269-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics