Comparative Performance Analysis of Two Multi-Aerial Threat Evaluation Algorithms
DOI:
https://doi.org/10.55972/spectrum.v26i1.418Keywords:
Threat evaluation, Air defense operations, Real-time, Machine learning, Artificial neural networkAbstract
In modern aerial defense operation, the evaluation of potential threats is of paramount importance for effective response strategies, particularly when such assessment is performed in real-time. This study presents a comparative analysis of an algorithm developed by the authors, and referred to as DM, and a Markov chain-based approach (MC) in terms of prediction accuracy, execution time, and processing capacity. Notably, DM consistently achieved higher accuracy until simulation time 1350, despite both methods utilizing the same Artificial Neural Network architecture. Additionally, DM exhibited superior execution time and processing capacity, handling a maximum of 89 threats within a one-second timeframe, while MC processed 10 threats. Based on this, it can be asserted that DM meets the requirements for real-time threat evaluation. The results can be attributed to DM's simplified methodology, enabling more accurate and distinct predictions.}
References
J. Roux and J. V. Vuuren, “Real-time threat evaluation in a ground based air defence environment,” ORiON, vol. 24, pp. 75–101, 6 2008. [Online]. Available: http://orion.journals.ac.za/pub/article/view/60.
U. J. C. of Staff, “Jp 3-01: Countering air and missile threats,” Joint Publication 3-01, 2017.
J. Roux and J. V. Vuuren, “Threat evaluation and weapon assignment decision support: A review of the state of the art,” ORiON, vol. 23, pp. 151–187, 12 2007. [Online]. Available: http://orion.journals.ac.za/pub/article/view/54.
Y. Cao, Y. X. Kou, A. Xu, and Z. F. Xi, “Target threat assessment in air combat based on improved glowworm swarm optimization and elm neural network,” International Journal of Aerospace Engineering, vol. 2021, 2021.
H. Lee, B. J. Choi, C. O. Kim, J. S. Kim, and J. E. Kim, “Threat evaluation of enemy air fighters via neural network-based Markov chain modeling,” Knowledge-Based Systems, vol. 116, pp. 49–57, 1 2017.
A. Kline, D. Ahner, and R. Hill, “The weapon-target assignment problem,” pp. 226–236, 5 2019.
T. Zhou, M. Chen, Y. Wang, J. He, and C. Yang, “Information entropy-based intention prediction of aerial targets under uncertain and incomplete information,” Entropy, vol. 22, 3 2020.
Y. Gao, D. S. Li, and H. Zhong, “A novel target threat assessment method based on three-way decisions under intuitionistic fuzzy multi-attribute decision making environment,” Engineering Applications of Artificial Intelligence, vol. 87, 2020.
L. Yue, R. Yang, J. Zuo, H. Luo, and Q. Li, “Air target threat assessment based on improved moth flame optimization-gray neural network model,” Mathematical Problems in Engineering, vol. 2019, 2019.
F. Rosenblatt, “The perceptron: A probabilistic model for information storage and organization in the brain,” Psychological Review, vol. 65, 1958.
J. Roy, S. Paradis, and M. Allouche, “Threat evaluation for impact assessment in situation analysis systems,” in Signal Processing, Sensor Fusion, and Target Recognition XI, I. Kadar, Ed., vol. 4729, 7 2002, pp. 329–341. [Online]. Available: doi:10.1117/12.477618.
D. H. Hong, J. H. Yoo, S. C. Shin, S. H. Kim, and Y. W. Park, “A threat evaluation method on the air track in short range air defense systems,” in Proc. Fall Conference on Korean Institute of Communication and Information Sciences, 2011, pp. 414–415.
L. Jianwei, T. Songjie, G. Qi, and C. Yanbin, “Model of large area air-defence operation efficiency evaluation based on lanchester equation,” Command Control & Simulation, vol. A247, pp. 11–13, 1 2006.
W. Wei, S. Hongquan, W. Lei, and Z. Jianhua, “Research on formation aerial target threat assessment based on risky multi-attribute decision-making,” Ship Science and Technology, vol. 36, pp. 146–149, 9 2014.
R. Zhao, F. Yang, L. Ji, and Y. Bai, “Dynamic air target threat assessment based on interval-valued intuitionistic fuzzy sets, game theory, and evidential reasoning methodology,” Mathematical Problems in Engineering, vol. 2021, 2021.
M. Liebhaber and B. Feher, “Air threat assessment: Research, model, and display guidelines,” Pacific Science, 2002.
Y. Liang, “An approximate reasoning model for situation and threat assessment,” in Proceedings - Fourth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2007, vol. 4, 2007.
F. Johansson and G. Falkman, A Comparison between Two Approaches to Threat Evaluation in an Air Defense Scenario.
Springer, 2008, vol. 5285 LNAI, pp. 110–121. [Online]. Available: doi:10.1007/978-3-540-88269-5 11.
X. Ximeng, Y. Rennong, and Y. Yang, “Threat assessment in air combat based on elm neural network,” in 2019 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA). IEEE, 3 2019, pp. 114–120. [Online]. Available: doi:10.1109/ICAICA.2019.8873461.
M. Guanglei, Z. Runnan, W. Biao, Z. Mingzhe, W. Yu, and L. Xiao, “Target tactical intention recognition in multiaircraft cooperative air combat,” International Journal of Aerospace Engineering, vol. 2021, 2021.
P. Yu, G. Liu, W. Wei, and Z. Tang, “Research on airspace target threat assessment model in sea battlefield based on ga-rbf,” in 2019 IEEE 2nd International Conference on Automation, Electronics and Electrical Engineering (AUTEEE). IEEE, 11 2019, pp. 428–432. [Online]. Available: doi:10.1109/AUTEEE48671.2019.9033371.
P. J. Werbos, “Backpropagation through time: What it does and how to do it,” Proceedings of the IEEE, vol. 78, 1990.
S. S. Shapiro and M. B. Wilk, “An analysis of variance test for normality (complete samples),” Biometrika, vol. 52, 1965.
H. Levene, “Robust tests for equality of variances,” Contributions to probability and statistics: Essays in Honor of Harold Hotelling, vol. 69, 1960.
W. H. Kruskal and W. A. Wallis, “Use of ranks in one-criterion variance analysis,” Journal of the American Statistical Association, vol. 47, 1952.
Downloads
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2025 Humberto Baldessarini Pires

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
