Högskolan i Skövde

his.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • apa-cv
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A testbed based on survivability for comparing threat evaluation algorithms
University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre. (SAIL)
University of Skövde, School of Humanities and Informatics. University of Skövde, The Informatics Research Centre. (SAIL)
2009 (English)In: Intelligent Sensing, Situation Management, Impact Assessment, and Cyber-Sensing: Proceedings of SPIE Defense, Security, and Sensing 2009 -- Volume 7352 / [ed] John F Koegel Buford, SPIE , 2009, p. Article ID 73520C-Conference paper, Published paper (Refereed)
Abstract [en]

Threat evaluation is the process in which threat values are assigned to detected targets, based upon the inferred capabilities and intents of the targets to inflict damage to blue force defended assets. This is a high-level information fusion process of high importance, since the calculated threat values are used as input when blue force weapon systems are allocated to the incoming targets, a process often referred to as weapon allocation. Threat values can be calculated from a number of different parameters, such as the position of the closest point of approach (CPA) with respect to blue force defended assets, time required to reach the CPA, the target's velocity, and its type. A number of algorithms for calculating threat values have been suggested throughout literature, however, criteria to evaluate the performance of such algorithms seem to be lacking. In this paper, we discuss different ways to assess the performance of threat evaluation algorithms. In specific, we describe an implemented testbed in which threat evaluation algorithms can be compared to each other, based on a survivability criterion. Survivability is measured by running the threat evaluation algorithms on simulated scenarios and using the resulting threat values as input to a weapon allocation module. Depending on how well the threat evaluation is performed, the ability of the blue force weapon systems to eliminate the incoming targets will vary (and thereby also the survivability of the defended assets). Our obtained results for two different threat evaluation algorithms are presented and analyzed.

Place, publisher, year, edition, pages
SPIE , 2009. p. Article ID 73520C-
Series
Proceedings of SPIE--the International Society for Optical Engineering ; v. 7352.
Keywords [en]
air defense, TEWA, threat evaluation, weapon allocation. weapon assignment
National Category
Computer and Information Sciences
Research subject
Technology
Identifiers
URN: urn:nbn:se:his:diva-3222DOI: 10.1117/12.816819Scopus ID: 2-s2.0-69849106220ISBN: 9780819476180 OAI: oai:DiVA.org:his-3222DiVA, id: diva2:225420
Conference
Intelligent sensing, situation management, impact assessment, and cyber-sensing : 15-17 April 2009, Orlando, Florida, United States
Available from: 2009-06-26 Created: 2009-06-26 Last updated: 2018-01-13Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Johansson, FredrikFalkman, Göran

Search in DiVA

By author/editor
Johansson, FredrikFalkman, Göran
By organisation
School of Humanities and InformaticsThe Informatics Research Centre
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 265 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • apa-cv
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf