A Comparison between Two Approaches to Threat Evaluation in an Air Defense Scenario

Threat evaluation is a high-level information fusion problem of high importance within the military domain. This task is the foundation for weapons allocation, where assignment of blue force (own) weapon systems to red force (enemy) targets is performed. In this paper, we compare two fundamentally different approaches to threat evaluation: Bayesian networks and fuzzy inference rules. We conclude that there are pros and cons with both types of approaches, and that a hybrid of the two approaches seems both promising and viable for future research.

[1]  Liang,et al.  A Fuzzy Knowledge Based System in Situation and Threat Assessment , 2006 .

[2]  L. C. van der Gaag,et al.  Building probabilistic networks: Where do the numbers come from? - a guide to the literature , 2000 .

[3]  David J. Spiegelhalter,et al.  Local computations with probabilities on graphical structures and their application to expert systems , 1990 .

[4]  Alan N. Steinberg,et al.  Revisions to the JDL data fusion model , 1999, Defense, Security, and Sensing.

[5]  Yawei Liang,et al.  An Approximate Reasoning Model for Situation and Threat Assessment , 2007, Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007).

[6]  Frank Klawonn,et al.  Foundations of fuzzy systems , 1994 .

[7]  Vladik Kreinovich,et al.  Which fuzzy logic is the best: Pragmatic approach (and its theoretical analysis) , 2006, Fuzzy Sets Syst..

[8]  A. Benaskeur,et al.  Threat evaluation and weapons allocation in network-centric warfare , 2005, 2005 7th International Conference on Information Fusion.

[9]  Adnan Darwiche,et al.  Inference in belief networks: A procedural guide , 1996, Int. J. Approx. Reason..

[10]  Fredrik Johansson,et al.  A Bayesian network approach to threat evaluation with application to an air defense scenario , 2008, 2008 11th International Conference on Information Fusion.

[11]  Marek J. Druzdzel,et al.  Building Probabilistic Networks: "Where Do the Numbers Come From?" Guest Editors Introduction , 2000, IEEE Trans. Knowl. Data Eng..

[12]  Felix Naumann,et al.  Data fusion , 2009, CSUR.

[13]  James Llinas,et al.  Multisensor Data Fusion , 1990 .

[14]  George J. Klir,et al.  Fuzzy sets, uncertainty and information , 1988 .

[15]  Jean Roy,et al.  Threat evaluation for impact assessment in situation analysis systems , 2002, SPIE Defense + Commercial Sensing.

[16]  Jh van Vuuren,et al.  Threat evaluation and weapon assignment decision support: A review of the state of the art , 2007 .

[17]  X. T. Nguyen Threat assessment in tactical airborne environments , 2002, Proceedings of the Fifth International Conference on Information Fusion. FUSION 2002. (IEEE Cat.No.02EX5997).

[18]  Adnan Darwiche,et al.  On the Revision of Probabilistic Beliefs using Uncertain Evidence , 2003, IJCAI.

[19]  Paul W. Phister,et al.  Data Fusion "Cube": A Multi-Dimensional Perspective , 2002 .