7th Computers in Aerospace Conference 1989
DOI: 10.2514/6.1989-3005
|View full text |Cite
|
Sign up to set email alerts
|

Artificial intelligence techniques applied to the non-cooperative identification (NCID) problem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
3
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 0 publications
1
3
0
Order By: Relevance
“…The first rule defined for this network is that all evidence updates at each node uses an evidential combination rule, of which there are multiple available [ 1 , 13 , 14 , 15 , 28 , 29 ] as shown in Figure 5 . This rule aligns with previous work [ 3 , 27 ]. The inherent drawback to using combination methods to update each node is immediately realized in that the network values are no longer consistent with each other once evidence has been propagated through a transition and combined at a node—that is, the node’s marginal probabilities no longer equal the previous node’s marginal probabilities multiplied by the transitional values, which can be clearly seen in Figure 5 .…”
Section: Transition Potentials Updates Based On Evidencesupporting
confidence: 92%
See 1 more Smart Citation
“…The first rule defined for this network is that all evidence updates at each node uses an evidential combination rule, of which there are multiple available [ 1 , 13 , 14 , 15 , 28 , 29 ] as shown in Figure 5 . This rule aligns with previous work [ 3 , 27 ]. The inherent drawback to using combination methods to update each node is immediately realized in that the network values are no longer consistent with each other once evidence has been propagated through a transition and combined at a node—that is, the node’s marginal probabilities no longer equal the previous node’s marginal probabilities multiplied by the transitional values, which can be clearly seen in Figure 5 .…”
Section: Transition Potentials Updates Based On Evidencesupporting
confidence: 92%
“…In addition, information about causality between hypotheses is obfuscated. Within a network, however, new evidence provided at each node often still includes uncertainty and should be combined with previous evidence at that node [ 3 , 27 ]. This is especially true for evidence inferred through a transition from another node, which can be considered to be less reliable than directly observed evidence.…”
Section: Transition Potentials Updates Based On Evidencementioning
confidence: 99%
“…Target intent is one of the main discriminators for classifying whether a target is friend or foe since a particular type of aircraft may be in service in both forces. For example, identification of an aircraft as a MiG-21 or F-5 in the Middle East does not automatically indicate whether the target is friend or foe [9]. Intent assessment is a critical step in a process of determining a target's lethality.…”
Section: Meanings Of Target Intentmentioning
confidence: 99%
“…A modelling concept based on problem characteristics allows synergistic matching of the Artificial Intelligence uncertainty management technique. The concept should define: (1) how to organise the knowledge for solving the intent estimation problem, (2) how to represent a state of belief in any hypotheses drawn from the current scenario, (3) how to update the state of belief given the evidence, and (4) how to make decisions given the current state of belief [9] [18].…”
Section: Rationalementioning
confidence: 99%