IDEAS home Printed from https://ideas.repec.org/a/pal/jorsoc/v68y2017i6d10.1057_s41274-016-0139-6.html
   My bibliography  Save this article

A real-time man-in-loop threat evaluation and resource assignment in defense

Author

Listed:
  • Afshan Naseem

    (University of Engineering and Technology (UET)
    National University of Sciences and Technology (NUST))

  • Shoab Ahmed Khan

    (University of Engineering and Technology (UET)
    National University of Sciences and Technology (NUST))

  • Asad Waqar Malik

    (National University of Sciences and Technology (NUST))

Abstract

Efficient weapon threat assignment reflects military proficiency and requires prompt decision while managing the available resources. An important problem which commanders/decision makers face is to optimally utilize the resources in complex and time constraints situations. Several solutions have been proposed in the literature. In this paper, an innovative approach is proposed for threat evaluation and weapon assignment (TEWA) by following 3-dimensional stable marriage algorithm (3-D SMA). This proposed model incorporates new parameters and constraints i.e. supply chain, inventory of resources and multiple threats-weapons assignments that outperforms the previous techniques. This suggested model is based on threat perception followed by an integration of parametric based automatic threat evaluation technique for further weapon scheduling and assignment problem keeping in view that the threat with greater threat index has higher priority to be intercepted and weapons’ kill probability. The experimental section shows that our proposed approach has greatly improved in comparison with other approaches. The results showed that the threat neutralization is improved up to 25% reducing the usage of ammunition till 31.1%. The damage of assets abridged to 28.5% in comparison with existing approaches. The proposed approach elucidates that TEWA is an efficient real-time threat perception and optimal multi-threat scheduling problem at weapons’ resolution. It is a three-stage process, where the first stage perceives the threat, the second stage works on threat evaluation and the final stage focuses on weapon scheduling and assignment problem. The addition of new parameters and constraints in the new proposed model makes it a unique approach in which more accurate results, in neutralizing the threats, are obtained with less use of ammunition and damage of assets that makes TEWA more effective and efficient tool for optimum decision making in time critical situations.

Suggested Citation

  • Afshan Naseem & Shoab Ahmed Khan & Asad Waqar Malik, 2017. "A real-time man-in-loop threat evaluation and resource assignment in defense," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 68(6), pages 725-738, June.
  • Handle: RePEc:pal:jorsoc:v:68:y:2017:i:6:d:10.1057_s41274-016-0139-6
    DOI: 10.1057/s41274-016-0139-6
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1057/s41274-016-0139-6
    File Function: Abstract
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1057/s41274-016-0139-6?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. M A J Smith & R Dekker & J Kos & J A M Hontelez, 2001. "The availability of unmanned air vehicles: a post-case study," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 52(2), pages 161-168, February.
    2. Xiaojun Shan & Jun Zhuang, 2014. "Subsidizing to disrupt a terrorism supply chain—a four-player game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 65(7), pages 1108-1119, July.
    3. Phillips-Wren, G. & Mora, M. & Forgionne, G.A. & Gupta, J.N.D., 2009. "An integrative evaluation framework for intelligent decision support systems," European Journal of Operational Research, Elsevier, vol. 195(3), pages 642-652, June.
    4. Govindan, Kannan & Soleimani, Hamed & Kannan, Devika, 2015. "Reverse logistics and closed-loop supply chain: A comprehensive review to explore the future," European Journal of Operational Research, Elsevier, vol. 240(3), pages 603-626.
    5. Onur Onay, 2016. "A Mathematical Approach to Neuromarketing: A Weapon – Target Assignment Model," International Journal of Academic Research in Business and Social Sciences, Human Resource Management Academic Research Society, International Journal of Academic Research in Business and Social Sciences, vol. 6(1), pages 164-173, January.
    6. Simon French, 2015. "Cynefin: uncertainty, small worlds and scenarios," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 66(10), pages 1635-1645, October.
    7. Masud, Abu S. M. & Metcalf, Paul & Hommertzheim, Don, 1995. "A knowledge-based model management system for aircraft survivability analysis," European Journal of Operational Research, Elsevier, vol. 84(1), pages 47-59, July.
    8. Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
    9. F He & J Zhuang, 2012. "Modelling ‘contracts’ between a terrorist group and a government in a sequential game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 790-809, June.
    10. K Hausken & J Zhuang, 2012. "The timing and deterrence of terrorist attacks due to exogenous dynamics," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 726-735, June.
    11. Liao, Shu-hsien, 2000. "Case-based decision support system: Architecture for simulating military command and control," European Journal of Operational Research, Elsevier, vol. 123(3), pages 558-567, June.
    12. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Afshan Naseem & Yasir Ahmad, 2020. "Critical Success Factors for Neutralization of Airborne Threats," SAGE Open, , vol. 10(3), pages 21582440209, September.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Afshan Naseem & Yasir Ahmad, 2020. "Critical Success Factors for Neutralization of Airborne Threats," SAGE Open, , vol. 10(3), pages 21582440209, September.
    2. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    3. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    4. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    5. Lv, Haitao & Yin, Chao & Cui, Zongmin & Zhan, Qin & Zhou, Hongbo, 2015. "Risk assessment of security systems based on entropy theory and the Neyman–Pearson criterion," Reliability Engineering and System Safety, Elsevier, vol. 142(C), pages 68-77.
    6. Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
    7. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    8. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    9. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    10. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    11. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    12. Zhang, Xiaoxiong & Ye, Yanqing & Tan, Yuejin, 2020. "How to protect a genuine target against an attacker trying to detect false targets," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 553(C).
    13. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    14. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    15. Mathews, Timothy & Paul, Jomon A., 2022. "Natural disasters and their impact on cooperation against a common enemy," European Journal of Operational Research, Elsevier, vol. 303(3), pages 1417-1428.
    16. Nageswara S. V. Rao & Stephen W. Poole & Chris Y. T. Ma & Fei He & Jun Zhuang & David K. Y. Yau, 2016. "Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 694-710, April.
    17. Assarzadegan, Parisa & Rasti-Barzoki, Morteza, 2020. "A game theoretic approach for pricing under a return policy and a money back guarantee in a closed loop supply chain," International Journal of Production Economics, Elsevier, vol. 222(C).
    18. Huihui Liu & Xiaohang Yue & Hui Ding & G. Keong Leong, 2017. "Optimal Remanufacturing Certification Contracts in the Electrical and Electronic Industry," Sustainability, MDPI, vol. 9(4), pages 1-17, March.
    19. Yang, Hui & Chen, Jing & Chen, Xu & Chen, Bintong, 2017. "The impact of customer returns in a supply chain with a common retailer," European Journal of Operational Research, Elsevier, vol. 256(1), pages 139-150.
    20. Bo Wang & Ning Wang, 2022. "Decision Models for a Dual-Recycling Channel Reverse Supply Chain with Consumer Strategic Behavior," Sustainability, MDPI, vol. 14(17), pages 1-18, August.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:pal:jorsoc:v:68:y:2017:i:6:d:10.1057_s41274-016-0139-6. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.palgrave-journals.com/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.