WO2005124580A1 - Systeme et procede d'evaluation de la menace - Google Patents

Systeme et procede d'evaluation de la menace Download PDF

Info

Publication number
WO2005124580A1
WO2005124580A1 PCT/AU2005/000857 AU2005000857W WO2005124580A1 WO 2005124580 A1 WO2005124580 A1 WO 2005124580A1 AU 2005000857 W AU2005000857 W AU 2005000857W WO 2005124580 A1 WO2005124580 A1 WO 2005124580A1
Authority
WO
WIPO (PCT)
Prior art keywords
entity
threatening
threat
asset
representing
Prior art date
Application number
PCT/AU2005/000857
Other languages
English (en)
Inventor
Nickens Okello
Gavin Alfred Thoms
Darko Musicki
Subhash Challa
Tuyet Pham
Iven Mareels
Robin John Evans
Xuezhi Wang
Original Assignee
The University Of Melbourne
The University Of Adelaide
The University Of South Australia
The Flinders University Of South Australia
The University Of Queensland
Commonwealth Of Australia Represented By The Defence Department's Defence Science And Technology Organisation
Telstra Corporation Limited
Compaq Computer Australia Pty. Limited
Rlm Systems Pty Limited
Cea Technologies Pty Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2004903251A external-priority patent/AU2004903251A0/en
Application filed by The University Of Melbourne, The University Of Adelaide, The University Of South Australia, The Flinders University Of South Australia, The University Of Queensland, Commonwealth Of Australia Represented By The Defence Department's Defence Science And Technology Organisation, Telstra Corporation Limited, Compaq Computer Australia Pty. Limited, Rlm Systems Pty Limited, Cea Technologies Pty Limited filed Critical The University Of Melbourne
Publication of WO2005124580A1 publication Critical patent/WO2005124580A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computing arrangements based on specific mathematical models
    • G06N7/01Probabilistic graphical models, e.g. probabilistic networks

Definitions

  • the present invention relates to a threat assessment system and process.
  • Bayesian networks can be used to predict or infer outcomes in the physical world represented by one or more variables whose values are unknown (referred to herein as 'unknown variables') based on observations of other variables having some causal relationship with the unknown variables.
  • inference is a process of generating probabilities for the unknown variables based upon predetermined causal relationships between those variables and other variables whose values are known or at least estimated with some uncertainty.
  • Bayesian belief networks can support backward propagation of evidence, (e.g., where an outcome is known and it is desired to update the causal relationships in the network), the computational requirements of prior art methods increase exponentially with the complexity of the Bayesian network, making backward propagation infeasible in situations of practical complexity. Consequently, the Bayesian networks that have been developed are undesirably limited in the number of variables that can be included.
  • a threat assessment system including: one or more linearisation modules for generating by linear approximation a conditional probability distribution of a first continuous variable on the basis of a non-linear causal relationship between said first continuous variable and a continuous state variable representing a state of a threatening entity, and for generating by linear approximation a conditional probability distribution of a second continuous variable representing a threat posed by said threatening entity to an asset on the basis of a non-linear causal relationship between said second continuous variable, said first continuous variable, and a discrete state variable representing a state of said threatening entity; a multiplier module for generating, on the basis of said conditional probability distributions, a joint belief function for assessing said threat; and a belief function generator for generating a belief function for said second continuous variable on the basis of said joint belief function.
  • the present invention also provides a threat assessment system, including: a causal network module representing causal relationships between variables for assessing a threat posed by a threatening entity to an asset, said causal relationships including one or more non-linear relationships; one or more parameterisation modules for generating conditional probability distributions for said variables, including generating by linear approximation one or more conditional probability distributions representing said one or more non-linear relationships; and a multiplier module for generating a joint belief function for assessing said threat on the basis of the conditional probability distributions for said variables.
  • the present invention also provides a threat assessment system for assessing at least one threat posed at least one threatening entity to at least one asset, the system including a capability generator for generating one or more capability values representing respective capabilities of one or more threatening entities to threaten one or more assets; an intent generator for generating one or more intent values representing intent of said one or more threatening entities to threaten said one or more assets; and a threat assessment module for generating one or more threat values representing respective threats posed by said one or more threatening entities to said one or more assets on the basis of said capability values and said intent values.
  • the present invention also provides a threat assessment system for assessing at least one threat posed at least one threatening entity to at least one asset, the system being adapted to generate conditional probability distributions representing relationships between nodes of a causal network representing said at least one threat, said nodes including at least one entity state node representing a state of a corresponding threatening entity, criteria nodes representing variables dependent on said state and being child nodes of said at least one entity node, and at least one threat node being a child node of said criteria nodes, said at least one threat node representing a threat posed by said at least one threatening entity to a corresponding asset.
  • the present invention also provides a threat assessment system for assessing at least one threat posed at least one threatening entity to at least one asset, the system being adapted to generate conditional probability distributions representing relationships between nodes of a causal network, said causal network including: at least one entity node representing a state of a corresponding threatening entity; a capability node for each entity-asset pair representing the capability of a corresponding threatening entity to threaten a corresponding asset, the capability node being a child node of the entity node of the corresponding threatening entity; an intent node for each entity-asset pair representing the intent of the corresponding threatening entity to attack the corresponding asset, the intent node being a child node of the entity node of the corresponding threatening entity; and at least one threat node representing a threat posed by a corresponding threatening entity to a corresponding asset, said at least one threat node being a child node of the corresponding capability node and the corresponding intent node.
  • the present invention also provides a threat assessment system, including: a causal network module representing causal relationships between variables for assessing a threat posed by a threatening entity to an asset; one or more parameterisation modules for generating conditional probability distributions representing linear relationships of said causal relationships one or more linearisation modules for generating by linear approximation conditional probability distributions representing non-linear relationships of said causal relationships; and a multiplier for generating a joint belief function for assessing said threat by multiplying the conditional probability distributions representing said relationships.
  • a causal network module representing causal relationships between variables for assessing a threat posed by a threatening entity to an asset
  • one or more parameterisation modules for generating conditional probability distributions representing linear relationships of said causal relationships
  • one or more linearisation modules for generating by linear approximation conditional probability distributions representing non-linear relationships of said causal relationships
  • a multiplier for generating a joint belief function for assessing said threat by multiplying the conditional probability distributions representing said relationships.
  • the present invention also provides a threat assessment process, including: generating by linear approximation a conditional probability distribution of a first continuous variable on the basis of a non-linear causal relationship between said first continuous variable and a continuous state variable representing a state of a threatening entity; generating by linear approximation a conditional probability distribution of a second continuous variable representing a threat posed by said threatening entity to an asset on the basis of a non-linear causal relationship between said second continuous variable, said first continuous variable, and a discrete state variable representing a state of said threatening entity; generating, on the basis of said conditional probability distributions, a joint belief function for assessing said threat; and generating a belief function for said second continuous variable on the basis of said joint belief function to assess said threat.
  • the present invention also provides a threat assessment process, including: generating one or more capability values representing respective capabilities of one or more threatening entities to threaten one or more assets; generating one or more intent values representing intent of said one or more threatening entities to threaten said one or more assets; and generating one or more threat values representing respective threats posed by said one or more threatening entities to said one or more assets on the basis of said capability values and said intent values.
  • the present invention also provides a threat assessment process, including: determining causal relationships between variables for assessing a threat posed by a threatening entity to an asset, said causal relationships including one or more non-linear relationships; generating conditional probability distributions for said variables, including generating by linear approximation one or more conditional probability distributions representing said one or more non-linear relationships; and generating a joint belief function for assessing said threat on the basis of the' conditional probability distributions for said variables.
  • the present invention also provides a threat assessment process, including: receiving tracking and- identification data including conditional probability distributions of kinematic data and type data of a threatening entity, said kinematic data representing a location and velocity of the threatening entity, and said type data representing a type of said threatening entity selected from a plurality of entity types; generating, on the basis of the conditional probability distributions of kinematic data and a location of an asset, conditional probability distributions of entity-asset data representing separation of the threatening entity and the asset and an angle between the velocity vector of the threatening entity and a vector joining the threatening entity and the asset; generating, on the basis of the conditional probability distributions of entity-asset data, a conditional probability distribution of threat data with respect to the entity-asset data and the type data of the threatening entity; multiplying the conditional probability distributions of entity-asset data, the conditional probability distribution of threat data, the conditional probability distributions of kinetic data, and the conditional probability distribution of type data to generate a joint belief function
  • Figure 1 is a criteria based causal network for assessing threat in accordance with a preferred embodiment of the present invention
  • Figure 2 is a Bayesian belief network for assessing threat in accordance with a preferred embodiment of the present invention, illustrating the contributions of continuous and discrete nodes to threat
  • Figure 3 is a block diagram of a preferred embodiment of a threat assessment system
  • Figure 4 is a flow diagram of a threat assessment process of the system
  • Figure 5 is a flow diagram of a threat estimation process of the threat assessment process
  • Figure 6 is a schematic diagram of a threat scenario wherein a threatening entity or intruder U, approaches an asset Ay
  • Figure 7 is a causal model used by the threat assessment system to represent the relationships between data from sensors, capabilities of one or more intruders with respect to one or more assets, intents of those intruders with respect to those assets, and the resulting threats to each asset
  • Figure 8 is an image of a
  • the threat posed by an entity to one or more assets can be estimated using a causal network, as shown in Figure 1.
  • the state of the entity, represented by node X is determined from independent sources of information or measurement nodes Si, S" 2 , ..., S m that are parents to node X.
  • threat variables zj, Z2, ..., z n represent the level of threat to assets A ⁇ , A2, .... A grasp respectively.
  • the threat variables are determined using criteria variables cj, C 2 , .... c r applied to the entity state
  • the causal relationships between the entity state, criteria, and threat variables are in general non-linear.
  • the entity state X includes continuous and discrete components that can be represented by one or more continuous variables X ⁇ and one or more discrete variables Xp, as shown for a single entity and asset pair in Figure 2.
  • a continuous variable is a variable whose value is real (i.e., X K e 5K) and continuous, whereas a discrete variable is a variable whose value is restricted to one of a limited number of possible values.
  • the continuous variables typically include one or more variables representing respective rates of change of one or more other continuous state variables.
  • Corresponding continuous and discrete criteria nodes Y K and YD are generated from XK and XD, respectively, and are also referred to as intermediate nodes.
  • the threat Z posed by the entity to the asset is determined from the intermediate nodes Y K and Y D .
  • a threat assessment system based on the networks of Figures 1 and 2 includes threat assessment modules 302 to 314, including a causal network module 302, two linearisation modules 304, 306, a discrete parameterisation module 308, a multiplier 310, a selective marginalisation module 312, and a belief propagation module 314.
  • a threat assessment process allows the threat assessment system to generate probability distributions for one or more variables representing respective threats posed by one or more threatening entities to one or more assets from probability distributions for variables representing the state of the threatening entities received from information sources 316.
  • the threat assessment system is a standard computer system such as an Intel IA-32 or IA-64 based computer system executing a Windows operating system, and the processes executed by the system are implemented by software modules, being the threat assessment modules 302 to 314, stored on non- volatile (e.g., magnetic disk) storage associated with the computer system and executed by one or more processors of the system.
  • the system also includes the Matlab software application, available from http://www.mathworks.com/products/matlab/. and Mu ⁇ hy's Bayes Net Toolbox for Matlab (BNT), as described at http://www.ai.mit.edu/ ⁇ mu ⁇ hvk Software BNT/bnt.html.
  • the threat assessment modules 302 to 314 are based on matrix functions provided by Matlab and BNT.
  • the processes can alternatively be implemented entirely by dedicated software modules written in a programming language such as Fortran and omitting the BNT and Matlab components.
  • the components of the threat assessment system can be distributed over a variety of locations, and that at least parts of the processes executed by the system can alternatively be implemented by dedicated hardware components, such as application-specific integrated circuits (ASICs).
  • ASICs application-specific integrated circuits
  • the threat assessment process and system are described below with reference to application of the system and process to air defence, wherein the threat posed to one or more physical assets by one or more intruding aircraft is assessed.
  • the threat assessment process and system are not limited to an air defence scenario, but can be applied equally to threat assessment for land and sea scenarios with minimal adaptation.
  • the threat assessment process and system can also be used in non-defence related fields.
  • a network with the structure represented in Figures 1 and 2 can be used to monitor the health of an economy by estimating values for economic variables such as interest rates, building activities, employment rates, currency exchange rates, cost and availability of energy and other resources, climatic factors, etc.
  • the threat assessment process can be used to monitor specific variables that can affect the health or output capacity of the plant through the use of sensors that are deployed within the plant.
  • the threat assessment process can be applied to assess and control threats to the health of a vital environmental region by identifying and tracking health indicators through the use of environmental data from a wide range of sensors and/or other sources of information. Accordingly, the threat assessment system and process are described below, both in general terms, and also with reference to application.
  • the first step is to identify the variables relevant, at step 402 of the threat assessment process, as shown in Figure 4.
  • a geographical area contains a distribution of assets that are to be defended against intruder aircraft of different types equipped to launch various types of weapons.
  • An air defence commander has at his or her disposal a number of interceptors of varying capabilities that can be launched to intercept the intruding aircraft on the basis of knowledge of the asset locations and an assessment of the level of threat posed by the intruding aircraft.
  • the information sources 316 includes a tracking and data fusion system that continually generates track and identification data providing a comprehensive description of each aircraft in the surveillance region, based on input from a network of sensors Si, S 2 , ⁇ , S m and possibly other sources of information, as described in N. N. Okello and D. W. McMichael, "Capabilities and limitations of data fusion in AEW&C," Tech. Rep. 26/98, CSSIP (The Cooperative Research Centre for Sensor Signal and Information Processing), September 1998 ("Okello 1998"), and N. Okello, P. Scoullar, and S. Challa, "Association and Identity Inference for the Air Picture Compilation Problem," Tech. Rep. CR 16/00, CSSIP, July 2000 (“Okello2000”).
  • the sensors themselves may be included in the assets being protected.
  • the track and identification data generated by the tracking and data fusion system includes observable kinematic and discrete state estimates and associated uncertainties.
  • T q T q e ⁇ Ty, ..., T ⁇ r T A ⁇ - I ⁇ represents the discrete component of target state:
  • Figure 5 is a schematic illustration of a surveillance region with an intruder (7, approaching a number of assets, illustrating the geometrical relationship between a stationary asset A j with a known location, and the intruder U t travelling at velocity v t and equipped with a weapon system whose range envelope is semicircular with radius r L .
  • the relevant variables - have been determined, the causal relationships between these variables is determined at step 404.
  • the level of threat posed to the asset A j by the intruder U depends on the intruder-to-asset ⁇ range r y , its rate of change r — d r tJ I dt and the maximum range r ⁇ of the intruder's weapon system. This dependence is non-linear. Intuitively, the threat to an asset posed by a very distant intruder is essentially non-existent or very low, and should increase as the intruder approaches the asset. The threat level should then reach a maximum when the asset falls within the range of the intruder's weapon system, i.e., when the intruder is able to overlay its weapon range envelope over the asset.
  • An intruder with a semi-circular frontal weapon envelope of radius r ⁇ is deemed to pose no threat if it is receding with respect to the stationary asset, i.e., if r > 0.
  • the threat level is considered to be proportional to cos ⁇ , where ⁇ v is the angle between the intruder velocity vector and the intruder-to-asset range vector r ⁇ . Accordingly, the intruder's intent to threaten the asset A ⁇ is defined as:
  • the threat level I tJ e [0, 1] is a non-linear discontinuous function of the variables r ⁇ , Q ⁇ , and rx.
  • this node may be one of several possible criteria nodes, and in the general case there will be one or more continuous nodes and one or more discrete nodes.
  • variable y ⁇ is the intermediate vector that links the kinematic component of the intruder state vector to the threat variable.
  • the causal network 302 is configured by defining the above functions for y & z, and XD at step 406.
  • y -f(x ⁇ ) is defined as a vector function that depends on the continuous component of intruder state, of which the function components are the range of the intruder from the asset, and the angle between the intruder velocity vector and the bearing of the asset with respect to the intruder;
  • A.XD ⁇ y ⁇ is a matrix that maps target type information to weapons systems;
  • z g(y ⁇ ,y ⁇ ) is a scalar function of the target type (the aircraft type X D determines the weapon launch range) and the intermediate variable y .
  • the intermediate variable y K is one of two dependent variables of the threat.
  • the second dependent variable, yo represents the weapon system type, which is discrete.
  • any non-linear relationships i.e., the causal network functions defined at step 406) of the casual relationships determined at step 404 are identified.
  • the relationships defining the continuous variables y and z are both non-linear.
  • the intermediate node YK is a child of node XK based on a non-linear relationship.
  • the system is configured to linearise those relationships by applying first-order Taylor series approximations to them, as described below.
  • the threat assessment system the system is now ready to generate estimates for threat by executing a threat estimation process 412, as shown in Figure 5.
  • the threat estimation process 412 begins at step 502 by receiving the probability distributions for the continuous variables XK and the discrete variables X from the information sources 316, being in this military application, a level 1 tracking and data fusion system.
  • the threat assessment system approximates each continuous node by a Gaussian probability distribution, ensuring that the results will be conservative in the sense that a Gaussian distribution represents the worst possible case and will produce the least accurate results. If more information subsequently becomes known, such as the actual probability distribution of one or more variables, then the results will be more accurate.
  • Nodes X and X representing the state vector of intruder U Titan have no parents and their priors are obtained from the output of the level 1 data fusion system, as described in D.L. Hall and J. Llinas, "An Introduction to Multisensor Data Fusion," Proceedings of the IEEE, vol. 85, No. 1, pp. 6-23, Jan. 1997.
  • the output of the level 1 data fusion system is:
  • the input node prior for XK is a Gaussian distribution with mean x ⁇ (k ⁇ k) and covariance matrix , where the notation (k ⁇ k) indicates that the value of the corresponding variable is for time k and taking into account all known information up to time k, and the notation N(x; ⁇ ⁇ ) represents a Normal or Gaussian distribution of variable C with mean ⁇ and standard deviation ⁇ , and ⁇ denotes the set of all sensor measurements up to time k.
  • the tracking and data fusion system provides the data, represented by equation (10), (11) and (12) as described in Okellol998 and Okello2000.
  • an approximate conditional probability distribution (CPD) for nodes Y and Z is determined, based on the linear Gaussian approximation.
  • CPD conditional probability distribution
  • conditional probability density function between the continuous nodes X and Y ⁇ can therefore be approximated by a conditional Gaussian distribution and takes on the form
  • step 508 the conditional probability distribution of any discrete intermediate variables is generated. As described above, in this military application, this distribution is represented by a delta function. However, other applications of the system will in general use alternative mappings from input discrete variables to intermediate discrete variables.
  • belief functions for individual variables are generated from the joint belief function, as described below.
  • the belief functions are generated by either the selective marginalisation module 312 or the belief propagation module 314, depending upon the variables in the threat assessment network.
  • Selective marginalisation as described below, is preferred under all conditions. Selective marginalisation is computationally more direct and more economical than Pearl's belief propagation. Either process can be used if evidence is inserted at nodes other than the root (i.e., initial continuous and discrete) nodes.
  • the selective marginalisation module 312 generates a closed form expression of the belief function of each node variable by summing out any other discrete variables and integrating out any other continuous variables from the joint belief function of the network given by equation (37). This process of selective marginalisation is referred to herein as the direct integration process.
  • the belief functions can be generated by the belief propagation module 314, which applies belief propagation, as described in Pearl, to the Bayesian belief network of Figure 2, as described below.
  • the output node Z is a childless continuous node that cannot be instantiated but whose value lies in [0, 1].
  • the backward propagation message ⁇ (z) ⁇ U[0, 1] i.e., has a uniform distribution over [0,1], and this appropriately expresses the level of knowledge available on the variable Z.
  • Equation (63) and (64) are then integrated, after which equation (64) is substituted into equation (63).
  • equation (64) is substituted into equation (63).
  • equation (64) ot ⁇ z(y ⁇ ) ⁇ exp [ - - ⁇ y ⁇ - ⁇ Y ⁇ - W ⁇ ⁇ x) ⁇ ⁇ l X ⁇ (y ⁇ - ⁇ Y ⁇ - W ⁇ ⁇ x ⁇ ) ⁇ exp [ - - (x ⁇ - x) T ⁇ X ⁇ (XK - x)]
  • dx ⁇ j a ⁇ z (y ⁇ ) ⁇ exp [ - [-B ⁇ A 1 B 1 + ⁇ ⁇ ⁇ 1 x + ( ⁇ - ⁇ Yl ⁇ ) ⁇ ⁇ ⁇ 1 lX ⁇ (y ⁇ - ⁇ Y ⁇ )] (65)
  • equation (65) ot ⁇ z(y ⁇ ) ⁇ exp [ - - ⁇ y ⁇ - ⁇ Y
  • T +1 a ⁇ ⁇ exp ⁇ - - [(y ⁇ - A BS) T MVK ⁇ A 3 X B 3 ) - B ⁇ A ⁇ B 3 +x ⁇ ⁇ x ⁇ ⁇ x + + ⁇ rj Vo) + ⁇ z (i) T ⁇ z l Y ⁇ ⁇ z(i) + ⁇ rT ⁇ o Vo] ⁇ P(T, ⁇ W k ) (73)
  • Any node within a Bayesian network can be instantiated with evidence.
  • the variable Y K has a value y ⁇
  • This piece of information can be injected as evidence e ⁇ ⁇ v by inserting an auxiliary child node V] that directs this evidence backwards towards node Y K .
  • child nodes 2 and V 3 can be inserted to direct evidence e l ⁇ v and e ⁇ ⁇ v towards nodes Z and Y , respectively.
  • the Belief function for v # can be written as: P(x ⁇ , xp,y ⁇ , yp, z, v ⁇ ,v , ⁇ 3 , e X ⁇ Y ⁇ . e x D ⁇ ⁇ ⁇ e ⁇ ⁇ v 1 » e ⁇ ⁇ v ⁇ e ⁇ ⁇ v 3 ) P( e X K YK ' ⁇ D YD ' ⁇ Y ⁇ Vi ' ⁇ Y ⁇ V 2 ' e Y K V 3 ) ⁇ a v ⁇ e ⁇ ⁇ v ⁇ ) i.
  • Equation (81) follows from (80) because the evidence at node YD is known with probability 1 and therefore forces its value onto the node variable.
  • the second term in equation (80) drops out because evaluation of the belief function fory ⁇ implies that no hard evidence is available fo ⁇ ⁇ ; otherwise, the node variable takes on the value of the hard evidence.
  • Bel(z) Bel(x ⁇ , XD,y ⁇ ,yD,z,v ⁇ , ⁇ ,v 3 )dx ⁇ y ⁇ d ⁇ - L d ⁇ 2 ( e ⁇ D v 3 ⁇ ⁇ 3p ⁇ 3 ⁇ yD)pyD ⁇ xD)p(x ⁇ e X ⁇ Y ⁇ )px D ⁇ % ' DYD )dx ⁇ dy ⁇ dv 1 d ⁇ 2
  • equation (84) follows from (83) because the evidence at node Y D is dominant and therefore forces its value onto the node variable. Furthermore, it is assumed that the evidence at node Z does not exist; otherwise, it takes on the value of the evidence. Similarly, for node Y D ,
  • the threat assessment process described above generates inferred values that do not require further human inte ⁇ retation to estimate threat, due to the inclusion of the relevant inferential criteria, including those previously reserved for 'human judgement,' in the process via the criteria based causal networks of Figures 1 and 7.
  • the threat assessment process is able to generate inferred values using both continuous and mixed nodes with greatly reduced computational complexity, particularly in back-propagation of evidence.
  • the functions representing causal relationships can be discontinuous, as in the military applications described herein, and the distributions of input variables do not have to be Gaussian distributions.
  • the threat relationships are represented by a full Bayesian belief network that is instantiated in real time with data from a real-time data base (in the above defence scenario, populated by a level 1 tracking and data fusion system). All relationships within the operational space are represented dynamically in real-time.
  • the processing load associated with the threat assessment process scales linearly with the number of threatening entities and assets.
  • a level 1 fusion surveillance picture was generated from data supplied by a network of sensors, trackers, and data fusion processes, as described in Okello 1998 and Okello2000. This level 1 fusion surveillance picture was then used as input to the threat assessment system.
  • Figure 8 shows the actual movements or 'ground-truths' in two dimensions of two intruders (targets 1 and 2) of known type in the vicinity of two stationary assets 802, 804.
  • the intruder of type 1 has a constant speed of 600 km/hr and maintains a constant altitude of 10000 m over a spherical earth while continuously emitting a signal that categorizes it as a type 1 target.
  • the intruder of type 3 has a constant speed of 1000 km/hr and maintains a constant altitude of 9000 m while continuously emitting a signal that categorizes it as a type 3 target. This provides a simple multi-intruder multi-asset threat scenario.
  • the numbers on the intruder ground-truths are target birth and death times in seconds measured from radar and electronic support measure (ESM) activation time.
  • ESM electronic support measure
  • Figure 8 The scenario of Figure 8 was used to generate radar and ESM measurements at separate locations within the surveillance area. These were then processed by local trackers and the resulting sensor-level tracks were then fused to obtain a surveillance picture in which each tracked entity is comprehensively described in terms of its continuous kinematic and discrete type estimates.
  • Figure 9 shows the resulting track estimates generated by a Cartesian-based multitarget IMM-tracker that processes measurements from Radar 1. The Figure shows a first track 900 taken by one aircraft referred to as "target 1 ", and a second path taken by the other aircraft, referred to as "target 2".
  • Figure 10 is a graph of the corresponding height estimates, with a first solid line 1002 representing the height or altitude of target 1 estimated at around 9,000 m, and a second solid line 1004 representing the height of target 2, estimated at around 10,000 m.
  • Figure 11 is a graph of the corresponding speed estimates with the speed 1102 of target 1 estimated at 1,000 km h "1 , and the speed 1104 of target 2 estimated at around 600 km h "1 .
  • Figures 12 and 13 are graphs of the corresponding location and speed variances for targets 1 and 2, respectively.
  • P T p ⁇ Jf ⁇
  • p 1, ..., N ⁇ + 1
  • W the set of all measurements up to time k.
  • Figures 10 and 11 show target type probabilities for tracks 1 and 4, respectively. These plots were generated by a Bayesian filter following the processing of ESM type measurements, as described in Okello 1998 and Okello2000. It was assumed that the target types differ only in the size of their weapon envelopes, and that the target types 77, T2, 7 ⁇ , and T 4 have semi-circular weapon envelopes with radii of 50 km, 40 km, 60 km, and 2 km, respectively.
  • Figure 16 includes four graphs of the two components of the intermediate node y for each of the two possible target types, as determined from the level 1 tracking data and fusion input data of Figures 9 to 15.
  • the top left graph 1602 presents, as a function of time step k, the mean value of the first component of the intermediate variable y (refer to Equations 5 and 8), being the length of the intruder-to-asset range vector r y for the first intruder target 1
  • the top right graph 1604 presents the second component of y, being the angle between the intruder velocity vector and the intruder-to-asset range vector r ⁇ .
  • the bottom left graph 1606 and bottom right graph 1608 are equivalent graphs for the second intruder, target 2.
  • Figure 17 includes four graphs showing the mean and covariances of the threat to each of the two stationary assets 802,804 .
  • the top left graph shows that the threat 1702 to the first asset rises to a first peak 1700 having a value of around 0.5 near time step 80 as a consequence of target 1 approaching asset 1 , the threat 1702 rapidly decreasing as target 1 passes asset 1.
  • a second peak 1704 at around time step 500 is due to target 2 approaching and then passing asset 1.
  • the bottom left graph shows that the threat 1706 to asset 2 is initially high due to the close proximity and orientation of target 1, rapidly decreasing as target 1 passes asset 2.
  • the threat due to the approach of target 2 increases gradually to a peak at around time step 300 due to the approach of target 2, and rapidly decreases to zero as target 2 heads away from asset 2.
  • the threat assessment process thus allows the threat posed by one or more threatening entities to one or more assets to be automatically assessed in real-time without requiring human judgement or involvement.
  • the threat values thus generated by the threat assessment system can be used to prepare a suitable response to these threats.
  • the observation that the belief propagation process and the direct integration process give identical results suggests that these processes are sufficiently versatile to handle a wide range of complex problems.
  • these processes can be used to solve Bayesian network problems having a mixture of continuous and discrete nodes; in cases where the continuous nodes are not Gaussian, conservative results based on a Gaussian approximation are easily obtainable.
  • non-linearities and discontinuities in the conditional dependence between connected nodes is not an obstacle when using any of the processes described herein.

Abstract

L'invention porte sur un système d'évaluation de la menace comprenant un ou plusieurs modules de linéarisation afin de générer par approximation linéaire une répartition de probabilité conditionnelle d'une première variable continue sur la base d'une relation causale non linéaire entre la première variable continue et une variable d'état continue représentant un état d'une entité de menace, et afin de générer par approximation linéaire une répartition de probabilité conditionnelle d'une seconde variable continue représentant une menace constituée par l'entité de menace à un article sur la base d'une relation causale non linéaire entre la seconde variable continue, la première variable continue et une variable d'état discret représentant un état de l'entité de menace. Ce système comprend un module multiplicateur afin de générer, sur la base de la répartition de probabilité conditionnelle, une fonction de croyance commune permettant d'évaluer la menace, et un générateur de fonction de croyance permettant de générer une fonction de croyance pour la seconde variable continue en fonction de la fonction de croyance commune.
PCT/AU2005/000857 2004-06-15 2005-06-15 Systeme et procede d'evaluation de la menace WO2005124580A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2004903251 2004-06-15
AU2004903251A AU2004903251A0 (en) 2004-06-15 A threat assessment system and process

Publications (1)

Publication Number Publication Date
WO2005124580A1 true WO2005124580A1 (fr) 2005-12-29

Family

ID=35509901

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2005/000857 WO2005124580A1 (fr) 2004-06-15 2005-06-15 Systeme et procede d'evaluation de la menace

Country Status (1)

Country Link
WO (1) WO2005124580A1 (fr)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007112639A1 (fr) * 2006-04-04 2007-10-11 Huawei Technologies Co., Ltd. Procédé et appareil de détermination de la relation réciproque entre variables
US8170135B2 (en) 2007-03-06 2012-05-01 Lockheed Martin Corporation Methods and apparatus for emitter detection
CN107016464A (zh) * 2017-04-10 2017-08-04 中国电子科技集团公司第五十四研究所 基于动态贝叶斯网络的威胁估计方法
CN109063940A (zh) * 2018-02-05 2018-12-21 重庆邮电大学 基于变结构贝叶斯网络的智能车辆威胁估计系统及方法
CN110163519A (zh) * 2019-05-29 2019-08-23 哈尔滨工程大学 面向基地攻防任务的uuv红蓝方威胁评估方法
WO2019201081A1 (fr) * 2018-04-16 2019-10-24 日本电气株式会社 Procédé, dispositif et système d'estimation de causalité entre des variables d'observation
CN110532398A (zh) * 2019-07-24 2019-12-03 西安交通大学 基于多任务联合神经网络模型的家族图谱自动构建方法
WO2020190327A1 (fr) * 2019-03-15 2020-09-24 3M Innovative Properties Company Détermination des modèles causales permettant de commander des environnements
CN114444203A (zh) * 2022-01-25 2022-05-06 中国人民解放军空军工程大学 基于战场态势变权的空中集群威胁评估方法

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
BUEDE DM ET AL: "A target identification comparison of Bayesian and Dempster-Shafer multisensor fusion.", IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS., vol. 27, no. 5, September 1997 (1997-09-01), pages 569 - 577, XP011056118 *
COBB BR ET AL: "On Transforming Belief Function Models to Probability Models.", SCHOOL OF BUSINESS WORKING PAPER NO. 293, February 2004 (2004-02-01), Retrieved from the Internet <URL:http://hdl.handle.net/1808/156> *
NGUYEN XT ET AL: "Target Mission Estimation.", PROC 3RD INT CONF ON KNOWLEDGE-BASED INTELLIGENT INFORMATION ENGINEERING SYSTEMS., September 1999 (1999-09-01), pages 66 - 69 *
NGUYEN XT ET AL: "Threat Assessment in Tactical Airborne Environments.", PROCEEDINGS OF THE 5TH INT CONF ON INF FUSION., July 2002 (2002-07-01), pages 1300 - 1307, XP010594343 *

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007112639A1 (fr) * 2006-04-04 2007-10-11 Huawei Technologies Co., Ltd. Procédé et appareil de détermination de la relation réciproque entre variables
US7752149B2 (en) 2006-04-04 2010-07-06 Huawei Technologies Co., Ltd. Method and apparatus for determining the variable dependency
US8170135B2 (en) 2007-03-06 2012-05-01 Lockheed Martin Corporation Methods and apparatus for emitter detection
CN107016464A (zh) * 2017-04-10 2017-08-04 中国电子科技集团公司第五十四研究所 基于动态贝叶斯网络的威胁估计方法
CN107016464B (zh) * 2017-04-10 2019-12-10 中国电子科技集团公司第五十四研究所 基于动态贝叶斯网络的威胁估计方法
CN109063940A (zh) * 2018-02-05 2018-12-21 重庆邮电大学 基于变结构贝叶斯网络的智能车辆威胁估计系统及方法
CN109063940B (zh) * 2018-02-05 2024-01-26 重庆邮电大学 基于变结构贝叶斯网络的智能车辆威胁估计系统及方法
CN110390396B (zh) * 2018-04-16 2024-03-19 日本电气株式会社 用于估计观测变量之间的因果关系的方法、装置和系统
WO2019201081A1 (fr) * 2018-04-16 2019-10-24 日本电气株式会社 Procédé, dispositif et système d'estimation de causalité entre des variables d'observation
CN110390396A (zh) * 2018-04-16 2019-10-29 日本电气株式会社 用于估计观测变量之间的因果关系的方法、装置和系统
US11853018B2 (en) 2019-03-15 2023-12-26 3M Innovative Properties Company Determining causal models for controlling environments
US11720070B2 (en) 2019-03-15 2023-08-08 3M Innovative Properties Company Determining causal models for controlling environments
WO2020190327A1 (fr) * 2019-03-15 2020-09-24 3M Innovative Properties Company Détermination des modèles causales permettant de commander des environnements
US11927926B2 (en) 2019-03-15 2024-03-12 3M Innovative Properties Company Determining causal models for controlling environments
US11966204B2 (en) 2019-03-15 2024-04-23 3M Innovative Properties Company Determining causal models for controlling environments
CN110163519B (zh) * 2019-05-29 2023-08-18 哈尔滨工程大学 面向基地攻防任务的uuv红蓝方威胁评估方法
CN110163519A (zh) * 2019-05-29 2019-08-23 哈尔滨工程大学 面向基地攻防任务的uuv红蓝方威胁评估方法
CN110532398B (zh) * 2019-07-24 2023-03-31 西安交通大学 基于多任务联合神经网络模型的家族图谱自动构建方法
CN110532398A (zh) * 2019-07-24 2019-12-03 西安交通大学 基于多任务联合神经网络模型的家族图谱自动构建方法
CN114444203A (zh) * 2022-01-25 2022-05-06 中国人民解放军空军工程大学 基于战场态势变权的空中集群威胁评估方法
CN114444203B (zh) * 2022-01-25 2024-04-05 中国人民解放军空军工程大学 基于战场态势变权的空中集群威胁评估方法

Similar Documents

Publication Publication Date Title
WO2005124580A1 (fr) Systeme et procede d&#39;evaluation de la menace
Kim et al. Probabilistic vehicle trajectory prediction over occupancy grid map via recurrent neural network
Kumar et al. Modelling of threat evaluation for dynamic targets using Bayesian network approach
Aziz A novel all-neighbor fuzzy association approach for multitarget tracking in a cluttered environment
Chen et al. Extended target probability hypothesis density filter based on cubature Kalman filter
Kreucher et al. Adaptive multi-modality sensor scheduling for detection and tracking of smart targets
Radhakrishnan et al. Continuous‐discrete filters for bearings‐only underwater target tracking problems
Sundareshan et al. Neural network fusion capabilities for efficient implementation of tracking algorithms
Kim et al. Airborne multisensor management for multitarget tracking
Wong et al. Square root Gaussian mixture PHD filter for multi-target bearings only tracking
Chung et al. Coordinated pursuer control using particle filters for autonomous search-and-capture
Nicholson Defence applications of agent-based information fusion
Chen et al. Sensor scheduling for space object tracking and collision alert
El-Fallah et al. Advancements in situation assessment sensor management
Chung et al. Coordinated search-and-capture using particle filters
Goldfrank et al. Risk Reduction in Target Motion Analysis Using Approximate Dynamic Programming
Bhattacharya et al. Analysis of signaling time of community model
Jia et al. High-degree cubature joint probabilistic data association information filter for multiple sensor multiple target tracking
Di et al. Fusion Estimation for Nonlinear Systems with Heavy-tailed Noises
Brigham et al. On state fusers over long-haul sensor networks
Sendhil et al. SEEE DIGIBOOK ON ENGINEERING & TECHNOLOGY ENGINEERING AND TECHNOLOGY
Imam et al. Optimum sensors integration for multi-sensor multi-target environment for ballistic missile defense applications
de Rochechouart et al. Resources Allocation for Drones Tracking Utilizing Agent-Based Proximity Policy Optimization
Jilkov et al. On fusion of multiple objectives for UAV search & track path optimization.
Liu et al. Human tracking using improved sample-based joint probabilistic data association filter

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

122 Ep: pct application non-entry in european phase