J. KIMS Technol Search

CLOSE


J. KIMS Technol > Volume 19(1); 2016 > Article
Journal of the Korea Institute of Military Science and Technology 2016;19(1):57-65.
DOI: https://doi.org/10.9766/KIMST.2016.19.1.057   
Fuzzy Rule-Based Method for Air Threat Evaluation
Byeong Ju Choi, Ji Eun Kim, Jin Soo Kim, Chang Ouk Kim
1Department of Information and Industrial Engineering, Yonsei University
2The 1st Research and Development Institute, Agency for Defence Development
적기의 위협 평가 자동화를 위한 퍼지 규칙 방법론
최병주, 김지은, 김진수, 김창욱
1연세대학교 정보산업공학과
2국방과학연구소 제1기술연구본부
Abstract
Threat evaluation is a process to estimate the threat score which enemy aerial threat poses to defended assets. The objective of threat evaluation is concerned with making an engagement priority list for optimal weapon allocation. Traditionally, the threat evaluation of massive air threats has been carried out by air defence experts, but the human decision making is less effective in real aerial attack situations with massive enemy fighters. Therefore, automation to enhance the speed and efficiency of the human operation is required. The automatic threat evaluation by air defense experts who will perform multi-variable judgment needs formal models to accurately quantify their linguistic evaluation of threat level. In this paper we propose a threat evaluation model by using a fuzzy rule-based inference method. Fuzzy inference is an appropriate method for quantifying threat level and integrating various threat attribute information. The performance of the model has been tested with a simulation that reflected real air threat situation and it has been verified that the proposed model was better than two conventional threat evaluation models.
Key Words: Air Defence, Threat Evaluation, Fuzzy Inference


ABOUT
ARTICLE CATEGORY

Browse all articles >

BROWSE ARTICLES
FOR CONTRIBUTORS
Editorial Office
160 Bugyuseong-daero 488beon-gil, Yuseong-gu, Daejeon 34060, Korea
Tel: +82-42-823-4603    Fax: +82-42-823-4605    E-mail: kimst@kimst.or.kr                

Copyright © 2023 by The Korea Institute of Military Science and Technology.

Developed in M2PI

Close layer
prev next