تعداد نشریات | 39 |
تعداد شمارهها | 1,171 |
تعداد مقالات | 8,438 |
تعداد مشاهده مقاله | 6,336,926 |
تعداد دریافت فایل اصل مقاله | 3,581,909 |
ارزیابی تهدید اهداف با استفاده از شبکه های فازی و احتمالاتی توام مبتنی بر قواعد | ||
پدافند الکترونیکی و سایبری | ||
مقاله 6، دوره 6، شماره 4 - شماره پیاپی 24، اسفند 1397، صفحه 61-78 اصل مقاله (1.37 M) | ||
نوع مقاله: مقاله پژوهشی | ||
نویسندگان | ||
محسن یادگاری1؛ سید علیرضا سیدین* 2 | ||
1دانشگاه فردوسی مشهد | ||
2دانشیار، گروه مهندسی برق، دانشکده مهندسی، دانشگاه فردوسی مشهد | ||
تاریخ دریافت: 27 آذر 1396، تاریخ پذیرش: 06 خرداد 1397 | ||
چکیده | ||
یکی از مهمترین ارکان یک سامانه تلفیق داده، مسئله ارزیابی تهدید اهداف است. در این مقاله برای پیادهسازی یک شبکه کامل ارزیابی تهدید از دو الگوی ترسیمی نقشه شناختی فازی و شبکه بیزین استفاده شده است. ساختار این شبکه تعداد زیاد و متنوعی از متغیرهای ارزیابی تهدید را شامل شده و بهطور مناسبی با یکدیگر مرتبط میسازد. با توجه به وجود عدمقطعیت در تمامی مسائل ارزیابی تهدید، انواع عدم قطعیت و روشهای برخورد با آن در این مقاله موردتوجه قرار میگیرد. همچنین یک بررسی جامع بر روی انواع روشهای لحاظ کردن هر دو نوع عدم قطعیت فازی و احتمالاتی انجام شده است و برای این موضوع روشی جدید ارائه میگردد. در این روش از دو شبکه فازی و بیزین مجزا برای لحاظ کردن عدم قطعیتها استفاده شده که گامبهگام روش پیشنهادی بهطور کامل تشریح میگردد. همچنین در این مقاله چالشهای بزرگ مسئله ارزیابی تهدید مطرح شده و نشان داده میشود که روش پیشنهادی قابلیت حل این مسائل را دارد. برای نشان دادن کارآمدی روش پیشنهادی مجموعهای از معیارهای اعتبارسنجی کیفی و کمی در این مقاله ارائه شده است. یک رفتار حرکتی اهداف هوایی شبیهسازی شده و نتایج روش پیشنهادی بهطور کیفی و کمی با دو روش نقشه شناختی فازی و شبکه بیزین مقایسه میشود. این نتایج بیانگر آن هستند که روش پیشنهادی ازلحاظ جذر میانگین مربعات خطا، درجه حساسیت کلی و جزئی و درجه تفکیکپذیری بهتر از دو روش دیگر عمل میکند. همچنین کارآمدی ساختار و روش پیشنهادشده مورد تأیید متخصصین حوزه مدیریت نبرد قرار گرفته است. | ||
کلیدواژهها | ||
ارزیابی تهدید؛ نقشه شناختی فازی؛ شبکه بیزین؛ قواعد؛ عدم قطعیت فازی و احتمالاتی؛ معیارهای اعتبارسنجی | ||
مراجع | ||
[1] R. Gholami and M. Okhovat, “Designing Radar and IR Sensors Data Fusion System for Target Tracking in Noise Jamming Conditions,” Journal Of Electronical & Cyber Defence, vol. 5, 2017. (In Persian).## [2] M. E. Liggins, D. L. Hall, and J. Llinas, “Handbook of multisensor data fusion: theory and practice,” ed: Taylor & Francis, 2009##. [3] V. Akbari and S. M. S. Homami, “A Framework For The Status Estimation In Distributed Denial-Of-Service Attacks By Data Fusion of Human-And-Technical Sensors Based on Fuzzy Logic,” Journal of Electronical & Cyber Defence, vol. 5, 2017. (In Persian).## [4] D. L. Hall and J. Llinas, “An introduction to multisensor data fusion,” Proceedings of the IEEE, vol. 85, pp. 6-23, 1997.## [5] J. Yun, B. Choi, M.M. Han, and S.-H. Kim, “Air Threat Evaluation System using Fuzzy-Bayesian Network based on Information Fusion,” Journal of Internet Computing and Services, vol. 13, pp. 21-31, 2012##. [6] N. P. Rao, S. K. Kashyap, and G. Girija, “Situation assessment in air-combat: A fuzzy-bayesian hybrid approach,” International Conference on Aerospace Science and Technology, 2008##. [7] J. J. Salerno, S. J. Yang, I. Kadar, M. Sudit, G. P. Tadda, and J. Holsopple, “Issues and challenges in higher level fusion: Threat/impact assessment and intent modeling (a panel summary),” 13th Conference on Information Fusion, 2010.## [8] E. Shahbazian, G. Rogova, and M. J. de Weert, “Harbour protection through data fusion technologies,” Springer Science & Business Media, 2008##. [9] E. G. Little and G. L. Rogova, “An ontological analysis of threat and vulnerability,” 9th Conference on Information Fusion, 2006##. [10] J. Llinas and R. T. Antony, “Blackboard concepts for data fusion applications,” International journal of pattern recognition and artificial intelligence, vol. 7, pp. 285-308, 1993##. [11] A. J. Rashidi, K. D. Ahmadi, and F. S. Khodadad, “Projection of Muli Stage Cyber Attack Based on Belief Model and Fuzzy Inference,” Journal of Electronical & Cyber Defence, vol. 3, 2015. (In Persian)## [12] S. Kumar and A. M. Dixit, “Threat evaluation modelling for dynamic targets using fuzzy logic approach,” International Conference on Computer Science and Engineering, 2012##. [13] L. Man and F. Xinxi, “Situation assessment based on bayesian networks,” 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008##. [14] C. M. Bishop, “Graphical models,” Pattern recognition and machine learning, vol. 4, pp. 359-422, 2006##. [15] M. I. Jordan and C. Bishop, “An introduction to graphical models,” unpublished book, 2001##. [16] E. I. Papageorgiou, “Fuzzy cognitive maps for applied sciences and engineering,” ed: Springer, 2014##. [17] A. Mittal, “Bayesian Network Technologies: Applications and Graphical Models,” IGI Global, 2007##. [18] P. P. Groumpos, “Fuzzy cognitive maps: Basic theories and their application to complex systems,” in Fuzzy cognitive maps, ed: Springer, pp. 1-22, 2010##. [19] R. Axelrod, “Structure of decision: The cognitive maps of political elites,” Princeton University Press, 1976.## [20] B. Kosko, “Fuzzy cognitive maps,” International Journal of man-machine studies, vol. 24, pp. 65-75, 1986##. [21] E. I. Papageorgiou and J. L. Salmeron, “A review of fuzzy cognitive maps research during the last decade,” IEEE Transactions on Fuzzy Systems, vol. 21, pp. 66-79, 2013##. [22] C. D. Stylios and P. P. Groumpos, “Modeling complex systems using fuzzy cognitive maps,” IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, vol. 34, pp. 155-162, 2004##. [23] J. Pearl, “Probabilistic reasoning in intelligent systems: Networks of plausible inference,” ed: Morgan Kaufmann Publishers, Los Altos, 1988##. [24] R. G. Cowell, P. Dawid, S. L. Lauritzen, and D. J. Spiegelhalter, “Probabilistic networks and expert systems: Exact computational methods for Bayesian networks,” Springer Science & Business Media, 2006##. [25] O. Pourret, P. Naïm, and B. Marcot, “Bayesian networks: a practical guide to applications,” vol. 73, John Wiley & Sons, 2008##. [26] R. Neut, “Uncertainty analysis in Bayesian networks,” Master thesis, Utrecht university, 2014##. [27] M. L. Hinman, “Some computational approaches for situation assessment and impact assessment,” 5th Conference on Information Fusion, 2002##. [28] Y. Liang, “An approximate reasoning model for situation and threat assessment,” 4th International Conference on Fuzzy Systems and Knowledge Discovery, 2007##. [29] M. J. Liebhaber and B. Feher, “Air threat assessment: Research, model, and display guidelines,” Space and Naval Warfare Systems Command San Diego CA, 2002##. [30] J. Baghmalayi and H. Sahami, “Investigation of Threat Measurement Indicators and Analysis of Ports Security Based on Vulnerability Assessment Model (Risk&Threat Analysis Matrix TRAM),” 13th Marine Industries Conference, 2011. (In Persian)## [31] M. J. Wierman, “An Introduction to the Mathematics of Uncertainty,” Creighton University, 2010##. [32] M. J. Liebhaber and C. Smith, “Naval air defense threat assessment: Cognitive factors and model,” Pacific Science And Engineering Group Inc San Diego CA, 2000##. [33] S. K. Das, “High-level data fusion,” Artech House, 2008##. [34] A. H. Meghdadi and M.-R. Akbarzadeh-T, “Probabilistic fuzzy logic and probabilistic fuzzy systems,” 10th IEEE International Conference on Fuzzy Systems, 2001##. [35] M. Laviolette and J. W. Seaman, “Unity and diversity of fuzziness-from a probability viewpoint,” IEEE Transactions on Fuzzy Systems, vol. 2, pp. 38-42, 1994##. [36] L. A. Zadeh, “Discussion: Probability theory and fuzzy logic are complementary rather than competitive,” Technometrics, vol. 37, pp. 271-276, 1995##. [37] E. Kentel and M. M. Aral, “Probabilistic-fuzzy health risk modeling,” Stochastic Environmental Research and Risk Assessment, vol. 18, pp. 324-338, 2004##. [38] H.-X. Li, X. Duan, and Z. Liu, “Three-dimensional fuzzy logic system for process modeling and control,” Journal of Control Theory and Applications, vol. 8, pp. 280-285, 2010##. [39] A. F. Shapiro, “Fuzzy random variables,” Insurance: Mathematics and Economics, vol. 44, pp. 307-314, 2009##. [40] S. Nadkarni and P. P. Shenoy, “A Bayesian network approach to making inferences in causal maps,” European Journal of Operational Research, vol. 128, pp. 479-498, 2001##. [41] Y. Y. Wee, W. P. Cheah, S. C. Tan, and K. Wee, “A method for root cause analysis with a Bayesian belief network and fuzzy cognitive map,” Expert Systems with Applications, vol. 42, pp. 468-487, 2015##. [42] W.-P. Cheah, K.-Y. Kim, H.-J. Yang, S.-H. Kim, and J.-S. Kim, “Fuzzy Cognitive Map and Bayesian Belief Network for Causal Knowledge Engineering: A Comparative Study,” The KIPS Transactions: PartB, vol. 15, pp. 147-158, 2008##. [43] W. P. Cheah, Y. S. Kim, K.-Y. Kim, and H.-J. Yang, “Systematic causal knowledge acquisition using FCM constructor for product design decision support,” Expert Systems with Applications, vol. 38, pp. 15316-15331, 2011##.
[44] H.-J. Song, Z.-Q. Shen, C.-Y. Miao, Z.-Q. Liu, and Y. Miao, “Probabilistic fuzzy cognitive map,” IEEE International Conference on Fuzzy Systems, 2006##. [45] A. Eleye‐Datubo, A. Wall, and J. Wang, “Marine and Offshore Safety Assessment by Incorporative Risk Modeling in a Fuzzy‐Bayesian Network of an Induced Mass Assignment Paradigm,” Risk Analysis, vol. 28, pp. 95-112, 2008##. [46] J. T. Brignoli, M. M. Pires, S. M. Nassar, and D. Sell, “A fuzzy-Bayesian model based on the superposition of states applied to the clinical reasoning support,” SAI Intelligent Systems Conference (IntelliSys), 2015##. [47] A. Le Dorze, B. Duval, L. Garcia, D. Genest, P. Leray, and S. Loiseau, “Probabilistic Cognitive Maps Semantics of a Cognitive Map when the Values are Assumed to be Probabilities,” International Conference on Agents and Artificial Intelligence (ICAART), 2014##. [48] Y. Deng, “A threat assessment model under uncertain environment,” Mathematical Problems in Engineering, 2015##. [49] J. Fang, J. Huang, and M. Liu, “The Research on Fuzzy Bayesian Network Model for the Network Public Opinion Situation and Threat Assessment,” Third International Conference on Networking and Distributed Computing, 2012##. [50] J. Chen, G.-h. Yu, and X.-g. Gao, “Cooperative t hreat assessment of multi-aircrafts based on synthetic fuzzy cognitive map,” Journal of Shanghai Jiaotong University (Science), vol. 17, pp. 228-232, 2012.## [51] C. Dongfeng, F. Yu, and L. Yongxue, “Threat assessment for air defense operations based on intuitionistic fuzzy logic,” Procedia Engineering, vol. 29, pp. 3302-3306, 2012##. [52] E. Azimirad and J. Haddadnia, “Target threat assessment using fuzzy sets theory,” International Journal of Advances in Intelligent Informatics, vol. 1, pp. 57-74, 2015##. [53] Y. Lu, Y. Wang, Y. Lei, and Y. Wang, “Air targets threat assessment based on fuzzy rough reasoning,” 27th Chinese Conference on Control and Decision (CCDC), 2015##. [54] M. Fatahi and s. garocy, “Threat Evaluation Using Fuzzy Logic,” 6th National Conference of Iran's Scientific on Command, Control, Communications, Computer & Intelligence, 2012. (In Persian)## [55] F. Johansson and G. Falkman, “A Bayesian network approach to threat evaluation with application to an air defense scenario,” 11th International Conference on Information Fusion, 2008##. [56] X. T. Nguyen, “Threat assessment in tactical airborne environments,” Proceedings of the Fifth International Conference on Information Fusion, 2002##. [57] N. Okello and G. Thoms, “Threat assessment using Bayesian networks,” Proceedings of the 6th International Conference on Information fusion, 2003##. [58] J. F. Brancalion, D. de Oliveira Marques, and K. H. Kienitz, “Framework for situation assessment and threat evaluation with application to an air defense scenario,” 18th International Conference on Information Fusion (Fusion), 2015##. [59] J. Aguilar, “A survey about fuzzy cognitive maps papers,” International journal of computational cognition, vol. 3, pp. 27-33, 2005##. [60] J. Carvalho and J. A. Tomè, “Rule based fuzzy cognitive maps and fuzzy cognitive maps-a comparative study,” 18th International Conference of the North American, Fuzzy Information Processing Society, 1999##. [61] J. P. Carvalho, “Rule based fuzzy cognitive maps in humanities, social sciences and economics,” Soft Computing in Humanities and Social Sciences, Springer, pp. 289-300, 2012.## [62] E. I. Papageorgiou and J. L. Salmeron, “Methods and algorithms for fuzzy cognitive map-based modeling,” Fuzzy Cognitive Maps for Applied Sciences and Engineering, Springer, pp. 1-28, 2014.## [63] K. F.-R. Liu, J.-Y. Kuo, K. Yeh, C.-W. Chen, H.-H. Liang, and Y.-H. Sun, “Using fuzzy logic to generate conditional probabilities in Bayesian belief networks: a case study of ecological assessment,” International Journal of Environmental Science and Technology, vol. 12, pp. 871-884, 2015##. [64] P. Baraldi, M. Conti, M. Librizzi, E. Zio, L. Podofillini, and V. Dang, “A Bayesian network model for dependence assessment in human reliability analysis,” Proceedings of the Annual European Safety and Reliability Conference, ESREL, 2009##. [65] P. Baraldi, L. Podofillini, L. Mkrtchyan, E. Zio, and V. N. Dang, “Comparing the treatment of uncertainty in Bayesian networks and fuzzy expert systems used for a human reliability analysis application,” Reliability Engineering & System Safety, vol. 138, pp. 176-193, 2015##. [66] W. Van Leekwijck and E. E. Kerre, “Defuzzification: criteria and classification,” Fuzzy sets and systems, vol. 108, pp. 159-178, 1999##. [67] F. Johansson and G. Falkman, “A comparison between two approaches to threat evaluation in an air defense scenario,” International Conference on Modeling Decisions for Artificial Intelligence, 2008##. [68] Q. Changwen and H. You, “A method of threat assessment using multiple attribute decision making,” 6th International Conference on Signal Processing, 2002##. [69] E. Mahboobi, M. Vahedian, and M. Hedayati, “Investigation and comparison of threat assessment methods in marine battles and suggestion of proposed model,” 15th Marine Industries Conference, 2013. (In Persian)## | ||
آمار تعداد مشاهده مقاله: 824 تعداد دریافت فایل اصل مقاله: 362 |