Architecture for Genetic Algorithm-Based Threat Assessment

نویسندگان

  • Paul G. Gonsalves
  • Janet E. Burge
  • Karen A. Harper
چکیده

The determination and subsequent analysis of potential enemy course of actions (COAs) forms a key element within the Intelligence Preparation of the Battlespace (IPB) process. Enemy COA prediction and analysis is also key element of threat assessment data fusion processing. Here we formulate an architecture that employs genetic algorithms (GAs) to generate and evaluate enemy COAs. This formulation is derived from experience we have garnered over several research and development efforts and across different military domains. The output of this architecture is a set of enemy COAs that can be evaluated based on their potential effectiveness against friendly forces. These results can then be distributed to higher-fidelity simulations for detailed evaluation and/or to decision support systems for friendly force mission planning.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design of PID Controller for Teleopration System with Genetic Algorithm

This paper presents a novel teleoperation controller for a nonlinear master–slave robotic system with constant time delay in communication channel. The proposed controller enables the teleoperation system to compensate human and environmental disturbances, while achieving master and slave position coordination in both free motion and contact situation. The current work basically extends the pas...

متن کامل

Design of Multi-Objective Model for Disruption Risk Assessment of Supply Chain Using Combined Genetic Algorithm and Simulated Annealing

Due to the many risks involved in the supply chain, and the high costs associated with damage to the supply chain, risk identification and evaluation should be a top priority in risk management programs in organizations. Risk assessment and ratings determine the superiority of each risk based on the relevant indicators and thus provide an appropriate response to each risk. In this regard, this ...

متن کامل

Towards a quantitative assessment of security in software architectures

Software patterns are key building blocks used to construct the architecture of a software system. Patterns also have an important role during the architecture assessment phase, as they represent the design rationale, which is central to evaluation. This work presents a quantitative approach to assess the security of a pattern-based software architecture. In particular, security patterns are us...

متن کامل

MULTI-OBJECTIVE OPTIMIZATION OF TIME-COST-SAFETY USING GENETIC ALGORITHM

Safety risk management has a considerable effect on disproportionate injury rate of construction industry, project cost and both labor and public morale. On the other hand time-cost optimization (TCO) may earn a big profit for project stakeholders. This paper has addressed these issues to present a multi-objective optimization model to simultaneously optimize total time, total cost and overall ...

متن کامل

A novel ranking method for intuitionistic fuzzy set based on information fusion and application to threat assessment

A novel ranking method based on multi-time information fusion is proposed for intuitionistic fuzzy sets (IFSs) and applied to the threat assessment problem, a multi-attribute decision making (MADM) one. This method integrates a designed intuitionistic fuzzy entropy (IFE), the closeness degree of technique for order preference by similarity to ideal solution (TOPSIS), the decision maker¡¯s (DM¡¯...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003