13 June 1995 Fuzzy logic approach to vulnerability assessment
Author Affiliations +
Within the context of our sensor fusion systems, we define an entity's vulnerability as the certainty with which other entities have the capability to detect and/or strike the entity; vulnerability assessment (VA) is the inference of vulnerability certainties. This investigation considers two issues: the feasibility of a fuzzy VA algorithm and the interface of a fuzzy VA algorithm into an existing sensor fusion system, including human-machine interface aspects. Relative kinematics, sensor/weapon technical capabilities, sensor/weapon system state, contextual electronic signatures, physics, terrain, atmospherics, and doctrinal bias are certainly all viable inputs to a VA algorithm. These data are traditionally characterized by a mix of continuous, discrete, and/or symbolic values with associated error bounds in various mathematical forms. Hence, the algorithmic infusion of a fuzzy VA into this systemic environment implies resolving the uncertainty information content of these representations and integrating them into a coherent fuzzy reasoning context. The information overload facing the tactical operator has necessitated the reduction of many data to prioritized simple alerts. While there is a reasonable understanding of the visual representations and implications of thresholding probabilistic data, the presentation and thresholding of fuzzy data is not well understood; some of the more critical implications on the human-machine interface are presented herein.
© (1995) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Kirk A. Dunkelberger, Kirk A. Dunkelberger, } "Fuzzy logic approach to vulnerability assessment", Proc. SPIE 2493, Applications of Fuzzy Logic Technology II, (13 June 1995); doi: 10.1117/12.211813; https://doi.org/10.1117/12.211813

Back to Top