threat evaluation
Recently Published Documents


TOTAL DOCUMENTS

107
(FIVE YEARS 21)

H-INDEX

12
(FIVE YEARS 2)

2021 ◽  
pp. 100048
Author(s):  
Ehizemhen Christopher Igibah ◽  
Olugbenga Oludolapo Amu ◽  
Lucia Omolayo Agashua ◽  
Adetayo Oluwaseun Adedapo

2021 ◽  
pp. 1-17
Author(s):  
Chen Xiang ◽  
Wang Xing ◽  
Zhang Hubiao ◽  
Xu Yuheng ◽  
Chen You ◽  
...  

Threat evaluation (TE) is essential in battlefield situation awareness and military decision-making. The current processing methods for uncertain information are not effective enough for their excessive subjectivity and difficulty to obtain detailed information about enemy weapons. In order to optimize TE on uncertain information, an approach based on interval Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) and the interval SD-G1 (SD standard deviation) method is proposed in this article. By interval SD-G1 method, interval number comprehensive weights can be calculated by combining subjective and objective weights. Specifically, the subjective weight is calculated by interval G1 method, which is an extension of G1 method into interval numbers. And the objective weight is calculated by interval SD method, which is an extension of SD method with the mean and SD of the interval array defined in this paper. Sample evaluation results show that with the interval SD-G1 method, weights of target threat attributes can be better calculated, and the approach combining interval TOPSIS and interval SD-G1 can lead to more reasonable results. Additionally, the mean and SD of interval arrays can provide a reference for other fields such as interval analysis and decision-making.


Aerospace ◽  
2021 ◽  
Vol 8 (5) ◽  
pp. 144
Author(s):  
Xiaoma Liu ◽  
Jishuai Yao ◽  
Xingju Lu ◽  
Hongwu Guo ◽  
Wenqi Wu

Fast and accurate threat evaluation (TE) of incoming air targets has a great influence on air defense. In this paper, two new generalized intuitionistic fuzzy soft set (GIFSS) methods are proposed for threat evaluation of air targets. Firstly, the threat evaluation index system is reasonably constructed by analyzing the relative kinematics between the targets and assets, apart from that between the targets and interceptors, which is more reasonable and practical. Secondly, after the threat indexes (TI) are properly obtained, two new aggregation operators for GIFSS are put forward based on the generalized λ-Shapley Choquet integral. The proposed operators not only depict the correlations among the evaluation index but also consider the importance of them globally. Finally, the effectiveness and superiority of the proposed methods are verified through a numerical simulation including four air targets in different index systems.


2021 ◽  
Author(s):  
Abdolreza Asadi Ghanbari ◽  
Mousa Mohammadnia ◽  
S. Abbas Sadatinejad ◽  
Hossein Alaei

In Command and Control (C2), Threat Evaluation (TE) and Weapon Target Allocation (WTA) are two key components. To build an automated system in this area after modeling Threat Evaluation and Weapon Target Allocation processes, solving these models and finding the optimal solution are further important issues. This setting demands instantaneous operational planning and decision making under inherent severe stress conditions. The associated responsibilities are usually divided among a number of operators and also computerized decision support systems that aid these operators during the decision making process. In this Chapter, the literature in the area of WTA system with the emphasis on the modeling and solving methods are surveyed.


2021 ◽  
pp. 1-10
Author(s):  
Yu-Heng Xu ◽  
Si-Yi Cheng ◽  
Hu-Biao Zhang

To solve the problem of the missing data of radiator during the aerial war, and to address the problem that traditional algorithms rely on prior knowledge and specialized systems too much, an algorithm for radiator threat evaluation with missing data based on improved Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) has been proposed. The null estimation algorithm based on Induced Ordered Weighted Averaging (IOWA) is adopted to calculate the aggregate value for predicting missing data. The attribute reduction is realized by using the Rough Sets (RS) theory, and the attribute weights are reasonably allocated with the theory of Shapley. Threat degrees can be achieved through quantization and ranking of radiators by constructing a TOPSIS decision space. Experiment results show that this algorithm can solve the incompleteness of radiator threat evaluation, and the ranking result is in line with the actual situation. Moreover, the proposed algorithm is highly automated and does not rely on prior knowledge and expert systems.


Author(s):  
Katherine Labonté ◽  
Daniel Lafond ◽  
Aren Hunter ◽  
Heather F. Neyedli ◽  
Sébastien Tremblay

The Cognitive Shadow is a prototype tool intended to support decision making by autonomously modeling human operators’ response pattern and providing online notifications to the operators about the decision they are expected to make in new situations. Since the system can be configured either in a reactive “shadowing” or a proactive “recommendation” mode, this study aimed to determine its most effective mode in terms of human and model accuracy, workload, and trust. Subjects participated in an aircraft threat evaluation simulation without decision support or while using either mode of the Cognitive Shadow. Whereas the recommendation mode had no advantage over the control condition, the shadowing mode led to higher human and model accuracy. These benefits were maintained even when the tool was unexpectedly removed. Neither mode influenced workload, and the initial lower trust rating in the shadowing mode faded quickly, making it the best overall configuration for the cognitive assistant.


2020 ◽  
Vol 14 (7) ◽  
pp. 1039-1045 ◽  
Author(s):  
Lu Han ◽  
Qian Ning ◽  
Bingcai Chen ◽  
Yinjie Lei ◽  
Xinzhi Zhou

Sign in / Sign up

Export Citation Format

Share Document