Fuzzy Logic-Based Threat Assessment Application In Air Defense Systems

被引:1
作者
Coskun, Muhittin [1 ]
Tasdemir, Sakir [2 ]
机构
[1] Selcuk Univ, TR-42130 Konya, Turkiye
[2] Selcuk Univ, Fac Technol, Dept Comp Engn, Konya, Turkiye
关键词
Threat assessment; Missiles; Fuzzy logic; Fuzzy sets; Radar cross-sections; Jamming; Iron; Air defense; fuzzy logic systems; threat assessment;
D O I
10.1109/TAES.2022.3212032
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
In this study, a fuzzy logic-based threat assessment application is presented. To create the application in the most accurate way, the help of air defense experts is taken. First of all, speed, distance, altitude, radar cross section, jamming signal level, and distance of the target to the closest point of approach parameters are taken as input parameters and the threat degree is taken as an output parameter to obtain the threat degrees of air targets. Then, an inference mechanism containing 133 rules is created, allowing the right threat degrees to be assigned to any kind of air target. Moreover, unlike other fuzzy logic-based threat assessment applications, air targets, which are the biggest threats to air defense systems such as ballistic missiles and cruise missiles, have been included in test scenarios and inference system foundations to ensure the system's excellence. In addition, by using the radar cross-sectional parameter, which is not used in similar studies, it is ensured that the application can distinguish between air targets with approximate speed, altitude, and distance values, and the deficiency in the literature is eliminated.
引用
收藏
页码:2245 / 2251
页数:7
相关论文
共 41 条
[1]  
Allouche M. K., 2005, Information Fusion, V6, P153, DOI 10.1016/j.inffus.2004.06.001
[2]  
Azimirad E, 2015, International Journal of Advances in Intelligent Informatics, V1, P57, DOI [10.26555/ijain.v1i2.18, 10.26555/ijain.v1i2.18, DOI 10.26555/IJAIN.V1I2.18]
[3]   An Application of Evidential Networks to Threat Assessment [J].
Benavoli, A. ;
Ristic, B. ;
Farina, A. ;
Oxenham, M. ;
Chisci, L. .
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2009, 45 (02) :620-639
[4]   Technological change in U.S. jet fighter aircraft [J].
Bongers, Aneli ;
Torres, Jose L. .
RESEARCH POLICY, 2014, 43 (09) :1570-1581
[5]  
Britt R., 2000, Aeroservoelastic characteristics of the B-2 bomber and implications for future large aircraft
[6]   Disjunctive belief rule base spreading for threat level assessment with heterogeneous, insufficient, and missing information [J].
Chang, Lei-lei ;
Jiang, Jiang ;
Sun, Jian-bin ;
Chen, Yu-wang ;
Zhou, Zhi-jie ;
Xu, Xiao-bin ;
Tan, Xu .
INFORMATION SCIENCES, 2019, 476 :106-131
[7]  
Garibaldi JM, 2005, STUD FUZZ SOFT COMP, V173, P105
[8]  
Gormley D. M., 2013, DEALING THREAT CRUIS, P8
[9]   FUZZY MULTIVARIATE RULE-BUILDING EXPERT SYSTEMS - MINIMAL NEURAL NETWORKS [J].
HARRINGTON, PB .
JOURNAL OF CHEMOMETRICS, 1991, 5 (05) :467-486
[10]  
Jaiswal R. S., 2015, INT RES J COMP SCI, V3, P29