skip to main content
10.1145/3178212.3178227acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicsebConference Proceedingsconference-collections
research-article

Targeting Algorithm Based on ITSM

Published: 28 December 2017 Publication History

Abstract

In this paper, the tactical significance map (TSM) is introduced at first, and then a novel prioritizing method based on improved TSM (ITSM) is proposed. a prioritizing model based on multi-attribute linear weighting is established; and then, through improving the tactical significance map (TSM), a novel targets prioritizing algorithm is proposed, which is extended to multi-asset attack scenario. The simulations executed in single-asset attack and multi-asset attack indicate that the proposed algorithm definitely reflects the relationship between the attributes and the priority. As a result, the proposed algorithm canadapt to the real battlefield more easily than the multi-attribute linear weighting and tactical significance map. The application scope is extended from two-dimension to three-dimension, and the assets needed to protect are extended from single asset to multi-asset. Simulation results indicate that the proposed method can adapt to the real battlefield situation.

References

[1]
Y.C. Wang. Research on Airborne Multi-sensor Information Fusion. Doctoral Dissertation, Nanjing University of Science and Technology, Nanjing, China, 2005.
[2]
A. El-Fallah, A. Zatezalo, R. Mahler, et al. Unified Bayesian Situation Assessment Sensor Management. Proceedings of the SPIE Signal Processing, Sensor Fusion, and Target Recognition. Bellingham, WA USA: Society of Photo-Optical Instrumentation Engineers, Vol. 5809, 2005: 253--264.
[3]
Xiong N, Svensson P. Multi-sensor management for informationfusion: issues and approaches{J}. In formation Fusion, 2002,3(2):163--186.
[4]
Chhetri A, Morrell D, Papandreou-suppappola A. Efficient search strategies for non-Myopic sensor scheduling in target tracking{C}// Proc. o f the 38th IEEE Annual Asilomar Conference on Signal, Systems, and Computers, 2004: 2106--2110.
[5]
Chen Dongfeng,Lei Yingjie. Synthetic evaluation and sorting of the air tatgets threat{J}. Systems Engineering and Electronics, 2005, 27(9):1597--1599.
[6]
El-Fallah A,Zatezalo A,Mahler R,et al. Unified Bayesian situationassessment sensor management{C}. Proc. o f SPIE Signal Pro-cessing, Sensor Fusion, and Target Recognition, 2005:253--264.
[7]
Meng G L,Gong G H. Algorithm of battlefield situation assessment based on Bayesian network and rough set theory{C}. Proc. o fthe 7th International Con ference on System Simulation and Scientific Computing, 2008:776--779.
[8]
Mirmoeini F, Krishnamurthy V. An adaptive situation assessment based decision making system{C}. Proc. of the 9th International Conference on Information Fusion, 2006:1--8.
[9]
Xiang Y P,Zeng Y F,Zhu W, et al. An intelligent design system for military situation assessment{C}. Proc. of the IEEE 3rd International Conference on Intelligent System and Knowledge Engineering, 2008: 158--163.

Cited By

View all
  • (2021)Artificial Intelligence Based Predictive Threat Hunting In The Field of Cyber Security2021 2nd Global Conference for Advancement in Technology (GCAT)10.1109/GCAT52182.2021.9587507(1-6)Online publication date: 1-Oct-2021

Index Terms

  1. Targeting Algorithm Based on ITSM

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICSEB '17: Proceedings of the 2017 International Conference on Software and e-Business
    December 2017
    141 pages
    ISBN:9781450354882
    DOI:10.1145/3178212
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Wuhan Univ.: Wuhan University, China

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 December 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. ITSM
    2. Priority
    3. Tactical Significance Map
    4. Tracking

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICSEB 2017

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 22 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Artificial Intelligence Based Predictive Threat Hunting In The Field of Cyber Security2021 2nd Global Conference for Advancement in Technology (GCAT)10.1109/GCAT52182.2021.9587507(1-6)Online publication date: 1-Oct-2021

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media