An Effective Threat Evaluation Algorithm For Multiple Ground Targets in Multi-Target and Multi-Weapon Environments
An Effective Threat Evaluation Algorithm For Multiple Ground Targets in Multi-Target and Multi-Weapon Environments
weapon Environments
https://doi.org/10.5392/IJoC.2019.15.1.032
Moonhyung Yoon
Agency for Defense Development, Daejeon, 34186, South Korea
Junho Park
Agency for Defense Development, Daejeon, 34186, South Korea
Jeonghoon Yi
Agency for Defense Development, Daejeon, 34186, South Korea
ABSTRACT
In an environment where a large number of weapons are operated compared to a large number of ground targets, it is important to
monitor and manage the targets to set up a fire plan, and through their multilateral analysis, to equip them with a priority order
process for targets having a high threat level through the quantitative calculation of the threat level. Existing studies consider the
anti-aircraft and anti-ship targets only, hence, it is impossible to apply the existing algorithm to ground weapon system development.
Therefore, we proposed an effective threat evaluation algorithm for multiple ground targets in multi-target and multi-weapon
environments. Our algorithm optimizes to multiple ground targets by use of unique ground target features such as proximity degree,
sorts of weapons and protected assets, target types, relative importance of the weapons and protected assets, etc. Therefore, it is
possible to maximize an engagement effect by deducing an effective threat evaluation model by considering the characteristics of
ground targets comprehensively. We carried out performance evaluation and verification through simulations and visualizations,
and confirmed high utility and effect of our algorithm.
Key words: Threat Evaluation, Threat Level, Fire Plan, Multiple Ground Target and Ground Weapon System.
of targets, etc. for a proper evaluation of the threat level of degree of a target [5]-[7], [10]. The strike capability of a target
ground targets. is the ability to inflict damage on assets, and the intention of a
This paper proposes an effective threat evaluation target means a will, or determination to inflict such damage [5]-
algorithm for multiple ground targets in multi-target and multi- [7]. The strike capability of a target is represented using
weapon environments. Concretely, this paper proposes an variables such as a kind and speed of a target while the
effective threat evaluation algorithm in the light of unique intention of a target is represented using motor mechanics,
features of ground targets such as proximity degree, sorts of conduct of operation status, speed and advanced information of
weapons and protected assets, target types, and relative a target. The proximity degree of a target is represented using
importance of weapons and protected assets, etc. in the mostly the variables such as CPA(Closest Point of Approach),
proposed algorithm. This paper proposes the threat evaluation TCPA(Time to CPA), and TBH(Time before Hit), etc. [10].
algorithm for multiple ground targets with the aim of deducing The representative techniques related to a threat level
a threat level in a quantitative numerical value by reflecting evaluation includes artificial neural network-based technique
characteristics of plural objects like targets, weapons and [8], [9], Bayesian inference-based technique [10]-[12], and
protected assets, and the object variables specialized in ground Fuzzy logic-based technique [13]-[16], etc. Bayesian inference-
system development environment as base data for a fire plan based threat evaluation technique calculates the final threat
calculation for the purpose of effectively suppressing a large level by combining conditional probability using the
number of ground targets in a short time in formula modeling. occurrence probability of each threat evaluation element based
The proposed algorithm calculates a threat level of a target in on conditional probability. This technique has a merit of
the light of target type by setting up weighted value consequent comparatively higher accuracy, but it has the critical point that
on the importance of weapons and protected assets after a thorough verification process is required when defining
carrying out proximity degree operations by taking into account conditional probability between elements. Fussy logic-based
the sorts of targets and protected assets. This paper carries out a threat evaluation technique is advantageous to the expression of
threat evaluation of all targets by performing a threat level a change in a value consequent on weighted value and
calculation process like this for all targets. associative relation of each variable, and it calculates a threat
The remainder of this paper is organized as follows. In level by considering the influencing degree on a threat level
section II, this paper explains the limitations of the existing consequent on the condition of required variables for
researches, and the objective of this research. In section III, this calculation. This technique has a merit of low complexity and
paper presents the system model considered in this paper, and easy implementation, but it has the critical point that its
in section IV, this paper describes the proposed threat accuracy is lower than Bayesian inference-based threat
evaluation algorithm. In section V, this paper shows excellence evaluation technique.
of the proposed technique through the performance evaluation, However, the previously presented threat evaluation
and lastly, in section VI, this paper presents its conclusion, and algorithm is a threat evaluation method targeting anti-aircraft
the follow-up research direction. and anti-ship targets. Particularly, the aforementioned threat
evaluation methods carry out a threat evaluation based on
object variables such as probability of attacks, imminent arrival
2. RELATED WORKS degree, and flight path of the target which was deduced based
on moving speed and approach angle of a target, and
The general process of the fire plan algorithm in the characteristic of enemy air vehicles, etc., so it is difficult to
existing research is roughly comprised of two stages [1]-[3]. apply such threat evaluation techniques to the threat level
The first is the threat evaluation stage for targets, in which a analysis of multiple ground targets, in which an approach angle,
threat is evaluated based on diverse characteristics in order to imminent arrival degree, and flight path, etc. cannot be defined.
protect friendly forces assets from the threat of attacks of As mentioned above, the existing threat evaluation techniques
enemy forces assets, and a quantified threat, from which a are targeting anti-aircraft and anti-ship targets, so there is a
quantified threat level is deduced in figures. The second stage limit in applying these techniques to a ground weapon system
is the one for carrying out weapon assignment with the aim of development. Conclusively, these evaluation techniques are not
maximizing enemy forces damage by hitting enemy forces’ fit enough to effectively suppress multiple ground targets; in
assets through the minimum friendly forces weapon, and this context, this paper is conducting the research on the threat
assignment between target and weapon is deduced on the basis evaluation algorithm for multiple ground targets.
of the previously deduced threat level.
As a part of a fire plan research for effective firing at a
target, the research on a threat level evaluation technique [4]- 3. SYSTEM MODEL
[17] and weapon assignment technique(this paper leaves it out
of the question) is actively in progress. The threat level This paper is based on the following system model
evaluation is the first important stage of a fire plan as the (battlefield environment). In the earth centered earth fixed
process of evaluating the threat level of a target. Therefore, an coordinate system (ECEF; Earth Centered Earth Fixed), the
inappropriate evaluation of a threat level comes to designate a location of the entire targets can be represented as the matrix
misguided priority order in firing, weakening threat T shown in Eq. (1) when the number of the entire targets is
responsiveness [1]-[4]. Generally, a threat is evaluated by the TNm .
combination of a strike capability, intention and proximity
1 ANm 1 d ti , ak
Dti , a
ANm k 1 wak d maxt ,a
(8)
i
d max t ,a max d ti , ak
i 1 k ANm
(9)
ANm k 1 wak d maxt ,a
i
The proximity degree Dti , a between the i th target and
protected assets in the light of the weighted value The target weighted value consequent on a threat form is
wak 0 wak 1 consequent on the sort of the k th protected determined by the target striking distance, and sorts of targets,
etc., and in case the target weighted value consequent on the
asset is as in Eq. (8).
threat form of the i th target is wti , the threat level Eti of the i
LAT , LON ~ LAT , LON
1 1 2 2
th target is as in Eq. (13).
Weighted value representing the
wti
importance of weapons and protected 0 wp 1
Eti assets w p
Dti
wt Distribution form of targets, weapon
Uniform distribution
1 w p Dti , a
groups and protected assets
w p Dti ,l (13)
wt
Fig. 3 represents the distribution of high-threat targets
1 LNm 1 d ti ,l j 1 ANm 1 d ti , ak
wp 1 wp consequent on the location and weighted value of weapons and
LNm j 1 wl j d max t ,l ANm k 1 wak d max t ,a protected assets. Targets, weapon group and protected assets
i i
6. CONCLUSIONS
Fig. 3. Distribution of high-threat targets consequent on the [1] S. Paradis, A. Benaskeur, M. Oxenham, and P. Cutler,
location and weighted value of weapons and protected assets “Threat Evaluation and Weapons Allocation in Network-
Centric Warfare,” Proc. of the International Conference on
Fig. 4 represents the threat value consequent on the Information Fusion, vol. 2, 2005, pp. 1078-1085.
proximity degree and weighted value of targets. The proposed [2] J. N. Roux and J. H. Vuuren, “Threat Evaluation and Weapon
algorithm can identify that the smaller the proximity degree of Assignment Decision Support: A Review of the State of the
targets, and the bigger the target weighted value wt , the bigger Art,” ORiON, vol. 23, no. 2, Mar. 2007, pp. 151-187.
[3] M. Azak and A. E. Bayrak, “A New Approach for Threat
the threat level Et of targets, which aspects are analyzed to be Evaluation and Weapon Assignment Problem, Hybrid
attributable to the fact that the more adjacent to weapons or Learning with Multi-Agent Coordination,” Proc. of the
protected assets the targets are, the higher the weighted value International Symposium on Computer and Information
according to target type, the higher the threat level. This paper Sciences, 2008, pp. 1-6.
proves that the proposed algorithm carries out threat evaluation [4] A. N. Steinberg, “An Approach to Threat Assessment,”
for multiple ground targets specialized in the ground weapon Proc. of the International Conference on Information
system development environment by considering the Fusion, vol. 2, 2005, pp. 1256-1263.
characteristics of ground targets.
Moonhyung Yoon
She received the B.S. in department of
electronic and electrical engineering
from Ewha womans university, Korea
in 2012 and also received M.S. in
department of electrical and computer
engineering from Seoul national
university, Korea in 2014. She is now a
researcher in Agency for Defense Development(ADD),
Daejeon, Korea. Her main research interests include defense
system, real-time embedded system, wireless sensor network
and resource scheduling.