skip to main content
10.1145/3178212.3178227acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicsebConference Proceedingsconference-collections
research-article

Targeting Algorithm Based on ITSM

Authors Info & Claims
Published:28 December 2017Publication History

ABSTRACT

In this paper, the tactical significance map (TSM) is introduced at first, and then a novel prioritizing method based on improved TSM (ITSM) is proposed. a prioritizing model based on multi-attribute linear weighting is established; and then, through improving the tactical significance map (TSM), a novel targets prioritizing algorithm is proposed, which is extended to multi-asset attack scenario. The simulations executed in single-asset attack and multi-asset attack indicate that the proposed algorithm definitely reflects the relationship between the attributes and the priority. As a result, the proposed algorithm canadapt to the real battlefield more easily than the multi-attribute linear weighting and tactical significance map. The application scope is extended from two-dimension to three-dimension, and the assets needed to protect are extended from single asset to multi-asset. Simulation results indicate that the proposed method can adapt to the real battlefield situation.

References

  1. Y.C. Wang. Research on Airborne Multi-sensor Information Fusion. Doctoral Dissertation, Nanjing University of Science and Technology, Nanjing, China, 2005.Google ScholarGoogle Scholar
  2. A. El-Fallah, A. Zatezalo, R. Mahler, et al. Unified Bayesian Situation Assessment Sensor Management. Proceedings of the SPIE Signal Processing, Sensor Fusion, and Target Recognition. Bellingham, WA USA: Society of Photo-Optical Instrumentation Engineers, Vol. 5809, 2005: 253--264.Google ScholarGoogle ScholarCross RefCross Ref
  3. Xiong N, Svensson P. Multi-sensor management for informationfusion: issues and approaches{J}. In formation Fusion, 2002,3(2):163--186.Google ScholarGoogle Scholar
  4. Chhetri A, Morrell D, Papandreou-suppappola A. Efficient search strategies for non-Myopic sensor scheduling in target tracking{C}// Proc. o f the 38th IEEE Annual Asilomar Conference on Signal, Systems, and Computers, 2004: 2106--2110.Google ScholarGoogle Scholar
  5. Chen Dongfeng,Lei Yingjie. Synthetic evaluation and sorting of the air tatgets threat{J}. Systems Engineering and Electronics, 2005, 27(9):1597--1599.Google ScholarGoogle Scholar
  6. El-Fallah A,Zatezalo A,Mahler R,et al. Unified Bayesian situationassessment sensor management{C}. Proc. o f SPIE Signal Pro-cessing, Sensor Fusion, and Target Recognition, 2005:253--264.Google ScholarGoogle Scholar
  7. Meng G L,Gong G H. Algorithm of battlefield situation assessment based on Bayesian network and rough set theory{C}. Proc. o fthe 7th International Con ference on System Simulation and Scientific Computing, 2008:776--779.Google ScholarGoogle Scholar
  8. Mirmoeini F, Krishnamurthy V. An adaptive situation assessment based decision making system{C}. Proc. of the 9th International Conference on Information Fusion, 2006:1--8.Google ScholarGoogle Scholar
  9. Xiang Y P,Zeng Y F,Zhu W, et al. An intelligent design system for military situation assessment{C}. Proc. of the IEEE 3rd International Conference on Intelligent System and Knowledge Engineering, 2008: 158--163.Google ScholarGoogle Scholar

Index Terms

  1. Targeting Algorithm Based on ITSM

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICSEB '17: Proceedings of the 2017 International Conference on Software and e-Business
      December 2017
      141 pages
      ISBN:9781450354882
      DOI:10.1145/3178212

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 December 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader