Research on UUVs Swarm Threat Assessment and Strategy Selection

被引:3
作者
Niu, Shaoyuan [1 ]
Wang, Hongjian [1 ]
Gu, Yingmin [2 ]
Gao, Wei [1 ]
Tong, Haiyan [1 ]
Wang, Haibin [1 ]
机构
[1] Harbin Engn Univ, Coll Automat, Harbin, Peoples R China
[2] Jiangsu Automat Res Inst, Lianyungang, Peoples R China
来源
GLOBAL OCEANS 2020: SINGAPORE - U.S. GULF COAST | 2020年
关键词
UUVs; threat assessment; Bayesian network; strategy selection;
D O I
10.1109/IEEECONF38699.2020.9389334
中图分类号
U6 [水路运输]; P75 [海洋工程];
学科分类号
0814 ; 081505 ; 0824 ; 082401 ;
摘要
In the context of modern underwater operations, Unmanned Underwater Vehicle (UUV) has become one of the most important tools to assist in completing high-risk underwater tasks. The key to UUV's intelligent operation is to perform a reasonable threat assessment based on the information uploaded by its own sensors, and take corresponding decisions based on the threat assessment. With the increasing complexity of underwater operations, UUVs swarm operation has become a major trend. Ensuring the safe completion of UUVs swarm operation depends on the UUVs swarm threat assessment and decision making system. The construction of this system is a problem that needs to be solved urgently. This paper will use Bayesian network method to solve the above problem. First, the UUVs swarm threat assessment is based on UUV threat assessment. Then, the UUV threat assessment is subdivided into two aspects: UUV safety assessment and UUV confrontation intent assessment. Bayesian networks are established to obtain those two assessment results. And then, decision making system using an exact matching method based on the results of UUVs swarm threat assessment. Finally, through simulation, the feasibility of the UUVs swarm threat assessment and decision making system is verified.
引用
收藏
页数:6
相关论文
共 50 条
[31]   Threat assessment in tactical airborne environments [J].
Nguyen, XT .
PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION FUSION, VOL II, 2002, :1300-1307
[32]   MADM of Threat Assessment with Attempt of Target [J].
Yao, Yueting ;
Wang, Yi ;
Zhao, Jianjun ;
Sun, Jingjie .
2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, :113-116
[33]   Referral Rates for School Threat Assessment [J].
Cornell, Dewey G. ;
Kerere, Jordan ;
Konold, Timothy ;
Maeng, Jennifer ;
Afolabi, Kelvin ;
Huang, Francis ;
Cowley, Deanne .
PSYCHOLOGY IN THE SCHOOLS, 2025, 62 (04) :1294-1305
[34]   Influences on threat assessment in a military context [J].
Bang, Martin ;
Liwang, Hans .
DEFENCE AND SECURITY ANALYSIS, 2016, 32 (03) :264-277
[35]   School Behavioral Threat Assessment and Management [J].
Melissa A. Louvar Reeves ;
Stephen E. Brock .
Contemporary School Psychology, 2018, 22 (2) :148-162
[36]   A Model of Tactic Threat Assessment in PAAIS [J].
Yu Hui ;
Wu Tian-ai .
MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 :204-+
[37]   Phenotype-Based Threat Assessment [J].
Yang, Jing ;
Eslami, Mohammed ;
Chen, Yi-Pei ;
Das, Mayukh ;
Zhang, Dongmei ;
Chen, Shaorong ;
Roberts, Alexandria-Jade ;
Weston, Mark ;
Volkova, Angelina ;
Faghihi, Kasra ;
Moore, Robbie K. ;
Alaniz, Robert C. ;
Wattam, Alice R. ;
Dickerman, Allan ;
Cucinell, Clark ;
Kendziorski, Jarred ;
Coburn, Sean ;
Paterson, Holly ;
Obanor, Osahon ;
Maples, Jason ;
Servetas, Stephanie ;
Dootz, Jennifer ;
Qin, Qing-Ming ;
Samuel, James E. ;
Han, Arum ;
van Schaik, Erin J. ;
de Figueiredo, Paul .
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2022, 119 (14)
[38]   An Information Fusion Framework for Threat Assessment [J].
Beaver, Justin M. ;
Kerekes, Ryan A. ;
Treadwell, Jim N. .
FUSION: 2009 12TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION, VOLS 1-4, 2009, :1903-+
[39]   Threat assessment using Bayesian networks [J].
Okello, N ;
Thoms, G .
FUSION 2003: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE OF INFORMATION FUSION, VOLS 1 AND 2, 2003, :1102-1109