A Threat Sorting Approach Based on the Fuzzy Beliefs

Article Preview

Abstract:

To overcome the limitations of the traditional threat assessment algorithms, a new threat sorting approach based on the fuzzy belief is proposed in this paper. In the new approach, the threat degrees described by quantitative number, interval number or linguistic label are all converted into the triangular fuzzy beliefs. The proportional conflict redistribution rule is used to combine the threat degrees of the same kind of assessment factors, the decision discounting rule is used to combine the threat degrees of different kinds of assessment factors, and the centroid method is utilized to make threat sorting. The new approach can not only deal with uncertain threat degrees, but also fuse the quantitative and qualitative threat degrees. The performance of the approach is analyzed in theory in this paper and the experimental results have certified its validity too.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

111-116

Citation:

Online since:

November 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] G. E. Yan and S. Wei, Study on algorithm of UAV threat strength assessment based on Bayesian network, Proceedings of the 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, October. (2008), pp.1-4.

DOI: 10.1109/wicom.2008.1222

Google Scholar

[2] F. Johansson, and G. Falkman, A Bayesian network approach to threat evaluation with application to an air defense scenario, Proceedings of the 2008 11th International Conference on Information Fusion, June. (2008), pp.1-7.

Google Scholar

[3] L. Zhang, W. X. Fan and Z. S. Yuan, Research on threat assessment based on intuitionistic fuzzy set theory, Proceedings of the 2009 International Conference on Intelligent Human-Machine Systems and Cybernetics, vol. 2, August. (2009), pp.494-499.

DOI: 10.1109/ihmsc.2009.246

Google Scholar

[4] J. Zhi, J. Y. Liu and C. Q. Fu, et al Evaluation of aerial target degree based on improved grey interrelated analysis method, Proceedings of the 2009 IEEE International Conference on Grey Systems and Intelligent Services, November. (2009).

DOI: 10.1109/gsis.2009.5408215

Google Scholar

[5] Z. C. Han, and S. C. Huang, Aerial targets threat valuation based on interval-number and entropy-weight analysis, Proceedings of the 2009 International Workshop on Intelligent Systems and Applications, May. (2009), pp.1-4.

DOI: 10.1109/iwisa.2009.5072696

Google Scholar

[6] M. Azak and A. E. Bayrak, A new approach for threat evalution and weapon assignment problem, hybrid learning with multi-agent coordination, Proceedings of the 2008 23rd International Symposium on Computer and Information Sciences, October. (2008).

DOI: 10.1109/iscis.2008.4717866

Google Scholar

[7] F. Smarandache and J. Dezert, Adances and applications of DSmT for information fusion (collected works), vol. 2, Rehoboth: American Research Press, (2006).

Google Scholar

[8] F. Smarandache and J. Dezert, Adances and applications of DSmT for information fusion (collected works), vol. 3, Rehoboth: American Research Press, (2009).

Google Scholar