A New Approach for Threat Evaluation and Weapon Assignment Problem, Hybrid Learning with Multi-Agent Coordination

2008-10-29
Azak, Mustafa
Bayrak, Ahmet Engin
The use of intelligent agents is one of the popular topics in defense industry. Agent usage would be beneficial for defense industry especially in decision making phase of the domain procedures. In Threat Evaluation Weapon Assignment System (TEWAS), we tried to develop learning agents working in coordination for the decision process of command and control systems. This paper describes all details of TEWAS Project in the scope of machine learning techniques.

Suggestions

Imagery intelligence technology foresight and modeling of mobile applications in the defense industry
Bilge, Başak; Çakır, Serhat; Department of Science and Technology Policy Studies (2018)
Identifying the threats and impacts of an operation field requires continuous planning and emphasizes the importance of intelligence. With the development of electronic systems that support the military decision-making process increases in number, today long- time and high- risk discovery and surveillance operations are performed faster and safer. Therefore, developing technology policies to augment defense- technology research is a crucial step. Reorganization movements, management measures and operational...
An Adaptive, energy-aware and distributed fault-tolerant topology-control algorithm for heterogeneous wireless sensor networks
Deniz, Fatih; Yazıcı, Adnan; Bağcı, Hakkı; Department of Computer Engineering (2016)
Wireless sensor networks (WSNs) are being used in numerous fields, such as battlefield surveillance, environmental monitoring and traffic control. They are typically composed of large numbers of tiny sensor nodes with limited resources. Because of their limitations and because of the environments they are being used, there are problems unique to WSNs. Due to the error-prone nature of wireless communication, especially in harsh environments, fault-tolerance emerges as an important property in WSNs. Also, bec...
Efficient implementation of TMVP-based prime field multiplication and its applications to ECC
Taşkın, Halil Kemal; Cenk, Murat; Department of Cryptography (2019)
The need for faster and practical cryptography is a research topic for decades. For elliptic curve cryptography, which is proposed independently by Koblitz and Miller in 1985 as a more efficient alternative to RSA, the applications of it in real life started after 2000s. Today, most of the popular applications and protocols like Whatsapp, Signal, iOS, Android, TLS, SSH, Bitcoin etc. make use of elliptic curve cryptography. In this thesis, we present a new representation of finite field multiplication which ...
An analytical approach for modelling unmanned aerial vehicles and base station interaction for disaster recovery scenarios
Owilla, Eugene; Ever, Enver; Computer Engineering (2022-8)
Unmanned Aerial Vehicles (UAVs) are an emerging technology with the potential to be used in various sectors for a wide array of applications and services. In wireless networking, UAVs are a vital part of supplementary infrastructure aimed at improv- ing coverage principally during public safety crises. Due to their relatively low cost and scalability of use, there has been a mushrooming focus into the roles that UAVs can play in ameliorating service provided to stranded ground devices. Following a public sa...
Theoretical investigation of tautomeric equilibria in certain explosive materials
Çelik Bayar, Çağlar; Lemi, Türker; Department of Chemistry (2012)
Explosive materials have always been attracting the attention of scientists. Various explosives either in pure bulk form or as admixtures are synthesized and investigated from different points of view. However, because of dangerous character of these materials, their syntheses and properties have to be forecasted by theoretical studies. The new research trends of explosive materials generally include the designs of novel derivatives of well–known explosives to improve their detonation performances (heats of...
Citation Formats
M. Azak and A. E. Bayrak, “A New Approach for Threat Evaluation and Weapon Assignment Problem, Hybrid Learning with Multi-Agent Coordination,” 2008, p. 70, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/65985.