oru.sePublikationer
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Evaluating the performance of TEWA systems
Örebro University, School of Science and Technology.
2010 (English)Doctoral thesis, monograph (Other academic)
Abstract [en]

It is in military engagements the task of the air defense to protect valuable assets such as air bases from being destroyed by hostile aircrafts and missiles. In order to fulfill this mission, the defenders are equipped with sensors and firing units. To infer whether a target is hostile and threatening or not is far from a trivial task. This is dealt with in a threat evaluation process, in which the targets are ranked based upon their estimated level of threat posed to the defended assets. Once the degree of threat has been estimated, the problem of weapon allocation comes into the picture. Given that a number of threatening targets have been identified, the defenders need to decide on whether any firing units shall be allocated to the targets, and if so, which firing unit to engage which target. To complicate matters, the outcomes of such engagements are usually stochastic. Moreover, there are often tight time constraints on how fast the threat evaluation and weapon allocation processes need to be executed. There are already today a large number of threat evaluation and weapon allocation (TEWA) systems in use, i.e. decision support systems aiding military decision makers with the threat evaluation and weapon allocation processes. However, despite the critical role of such systems, it is not clear how to evaluate the performance of the systems and their algorithms. Hence, the work in thesis is focused on the development and evaluation of TEWA systems, and the algorithms for threat evaluation and weapon allocation being part of such systems. A number of algorithms for threat evaluation and static weapon allocation are suggested and implemented, and testbeds for facilitating the evaluation of these are developed. Experimental results show that the use of particle swarm optimization is suitable for real-time target-based weapon allocation in situations involving up to approximately ten targets and ten firing units, while it for larger problem sizes gives better results to make use of an enhanced greedy maximum marginal return algorithm, or a genetic algorithm seeded with the solution returned by the greedy algorithm.

Place, publisher, year, edition, pages
Örebro: Örebro universitet , 2010. , 177 p.
Series
Örebro Studies in Technology, ISSN 1650-8580 ; 40
Keyword [en]
air defense, information fusion, performance evaluation, threat evaluation, TEWA, weapon allocation
National Category
Engineering and Technology Computer and Information Science Computer Science
Research subject
Computer and Systems Science
Identifiers
URN: urn:nbn:se:oru:diva-11996ISBN: 978-91-7668-761-1 (print)OAI: oai:DiVA.org:oru-11996DiVA: diva2:354687
Public defence
2010-12-01, hus Portalen, konferensrum Insikten (P111), Högskolevägen, Skövde, 13:15 (English)
Opponent
Supervisors
Note
Fredrik Johansson forskar också vid Skövde Högskola, Informatics Research Centre / Fredrik Johansson also does research at the University of Skövde, Informatics Research CentreAvailable from: 2010-10-04 Created: 2010-10-04 Last updated: 2011-04-27Bibliographically approved

Open Access in DiVA

fulltext(2331 kB)3538 downloads
File information
File name FULLTEXT02.pdfFile size 2331 kBChecksum SHA-512
870814bdaa4b655041351778d6288ff4ce33c65399779a674a37527600272ea906444a7c4532399bd47983b9152f68441467d67bdf0935359cf42663c36c2afa
Type fulltextMimetype application/pdf
spikblad(125 kB)8 downloads
File information
File name SPIKBLAD01.pdfFile size 125 kBChecksum SHA-512
f25f7ed7d3ad98a9468d8429e80868134a9f97c829a120b74061a4d8a9e95694d8491e1d382f135876e3f9cbe923ff52fc0f808bec6137eda3c85f0f06b1e85f
Type spikbladMimetype application/pdf
cover(1588 kB)120 downloads
File information
File name COVER01.pdfFile size 1588 kBChecksum SHA-512
103a47531295c927f70c06d02fc6776ee01e398d6389dc0c7fc491210756c363787c881b00f379e84f67c0a3b6aa8271541db03c9cf4dbc990cdd323a120117e
Type coverMimetype application/pdf

By organisation
School of Science and Technology
Engineering and TechnologyComputer and Information ScienceComputer Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 3538 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 1634 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf