Proceedings of the Fifth International Conference on Information Fusion. FUSION 2002. (IEEE Cat.No.02EX5997)
DOI: 10.1109/icif.2002.1020963
|View full text |Cite
|
Sign up to set email alerts
|

Threat assessment in tactical airborne environments

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0
1

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(17 citation statements)
references
References 12 publications
(15 reference statements)
0
16
0
1
Order By: Relevance
“…Unlike capability (which is rather straight forward to assess), intent is generally more difficult to assess, since deciding whether a target is exhibiting intent is often very subjective (residing in the cognitive domain) [81]. However, factors that may be considered when assessing the intent of a target include its velocity, heading (course and bearing) and altitude with respect to the DA, the detection of emissions from its Fire Control (FC) radar, the estimation of its possible courses of action (attack techniques) based on its pattern of movement and the events and activities in which it has participated, as well as recognition of its use of deception or tactics to evade being detected or tracked [75,78,81,91,88].…”
mentioning
confidence: 99%
“…Unlike capability (which is rather straight forward to assess), intent is generally more difficult to assess, since deciding whether a target is exhibiting intent is often very subjective (residing in the cognitive domain) [81]. However, factors that may be considered when assessing the intent of a target include its velocity, heading (course and bearing) and altitude with respect to the DA, the detection of emissions from its Fire Control (FC) radar, the estimation of its possible courses of action (attack techniques) based on its pattern of movement and the events and activities in which it has participated, as well as recognition of its use of deception or tactics to evade being detected or tracked [75,78,81,91,88].…”
mentioning
confidence: 99%
“…Assume a(u) = a(u) +jaQ(U) (13) and n(u) = nl(u) + jnQ(u) follows zero-mean complex Gaussian distribution with variance a2 for the I and Q subchannels.…”
Section: Maximum Likelihood Algorithm For Rcs Parametermentioning
confidence: 99%
“…In [5], an intelligent threat assessment processor using genetic algorithms and fuzzy logic was proposed. In [13], threat assessment was studied in tactical airborne environments. In [6], neural network was applied to threat assessment for automated visual surveillance.…”
Section: Introductionmentioning
confidence: 99%
“…The variety of parameters are proposed and used by researchers for threat evaluation [3], [4], [6], [22], [34], [28]- [33]. These parameters have varying degree of effect on the threat value.…”
Section: Parameters For Threat Assessmentmentioning
confidence: 99%