Military Communications and Information Technology: A Trusted ...
Military Communications and Information Technology: A Trusted ... Military Communications and Information Technology: A Trusted ...
300 Military Communications and Information Technology... Figure 5. Changeability of belief functions for DSmC with two-element FAKER decomposition The two-element decomposition of FAKER hypothesis is defined as follows: K = K CONF + K SPEC (1) where: K CONF – ‘conflicting’ FAKER i.e. FH, K SPEC – ‘specific’ FAKER i.e. {KK, FK, KH} Analogically, the two-element JOKER decomposition may be performed in the same manner: J = J CONF + J SPEC (2) where: J CONF – ‘conflicting’ JOKER i.e. {FS, AFH } J SPEC – ‘specific’ JOKER i.e. {JJ, FJ, JH, JU, KJ, JS, JAF } Thus the corresponding belief functions may be calculated as follows: Bel(F) = m 12 (F) + m 12 (AF) + m 12 (K) + m 12 (J) (3) Bel(H) = m 12 (H) + m 12 (S) + m 12 (K CONF ) + m 12 (J CONF ) (4) where: m 12 (.) – the resulting mass as a combination of evidence from the first sensor and second sensor. From Figure 5. it can be seen that the decision change from FAKER to FRIEND takes place at m 2 (F) @ 0.06. A relatively fast increase of FRIEND hypothesis is observable comparing to slow decrease of HOSTILE hypothesis, which in the considered case is never accepted. This disproportion is due to the fact that FRIEND hypothesis is supplied by conflicting masses and specific masses, corresponding to decomposed training classes while HOSTILE hypothesis is supplied only by the conflicting masses.
Chapter 3: Information Technology for Interoperability and Decision... 301 Figure 6. presents the changeability of belief functions for the hybrid model (see Figure 2) with application of the classic DSmC rule and three-element conflicting hypothesis decomposition mechanism. Similarly as in the previous experiment two secondary hypotheses: FAKER and JOKER are subject to decomposition. Figure 6. Changeability of belief functions for DSmC with three-element FAKER decomposition The tree-element decomposition of FAKER hypothesis is defined as follows: K = K CONF + K KK + K KF + K KH (5) where: K CONF – ‘conflicting’ FAKER i.e. FH, K KK – ‘pure’ FAKER i.e. KK K KF – ‘friendly’ FAKER i.e. FK K KH – ‘hostile’ FAKER i.e. KH Analogically, the three-element JOKER decomposition may be performed in the same manner: J = J CONF + J JJ + J JF + J JH (6) where: J CONF – ‘conflicting’ JOKER i.e. {FS, AFH } J JJ – ‘pure’ JOKER i.e. JJ J JF – ‘friendly’ JOKER {FJ, AFJ, KJ, UJ} J JH – ‘hostile’ JOKER {JH, JS, KS} Thus the corresponding belief function may be calculated as follows: Bel(F) = m 12 (F) + m 12 (AF) + m 12 (K CONF ) + m 12 (K KK ) + m 12 (K KF ) + m 12 (J CONF ) + m 12 (J JJ ) + m 12 (J JF ) (7)
- Page 249 and 250: Chapter 3: Information Technology f
- Page 251 and 252: Chapter 3: Information Technology f
- Page 253 and 254: A Robust and Scalable Peer-to-Peer
- Page 255 and 256: Chapter 3: Information Technology f
- Page 257 and 258: Chapter 3: Information Technology f
- Page 259 and 260: Chapter 3: Information Technology f
- Page 261 and 262: Chapter 3: Information Technology f
- Page 263 and 264: Chapter 3: Information Technology f
- Page 265 and 266: Automatic Exploitation of Multiling
- Page 267 and 268: Chapter 3: Information Technology f
- Page 269 and 270: Chapter 3: Information Technology f
- Page 271 and 272: Chapter 3: Information Technology f
- Page 273 and 274: Chapter 3: Information Technology f
- Page 275 and 276: Chapter 3: Information Technology f
- Page 277 and 278: Chapter 3: Information Technology f
- Page 279 and 280: Chapter 3: Information Technology f
- Page 281 and 282: Information Fusion Under Network Co
- Page 283 and 284: Chapter 3: Information Technology f
- Page 285 and 286: Chapter 3: Information Technology f
- Page 287 and 288: Chapter 3: Information Technology f
- Page 289 and 290: Chapter 3: Information Technology f
- Page 291 and 292: Chapter 3: Information Technology f
- Page 293: Chapter 3: Information Technology f
- Page 296 and 297: 296 Military Communications and Inf
- Page 298 and 299: 298 Military Communications and Inf
- Page 302 and 303: 302 Military Communications and Inf
- Page 305 and 306: Commanding Multi-Robot Systems with
- Page 307 and 308: Chapter 3: Information Technology f
- Page 309 and 310: Chapter 3: Information Technology f
- Page 311 and 312: Chapter 3: Information Technology f
- Page 313 and 314: Chapter 3: Information Technology f
- Page 315 and 316: Chapter 3: Information Technology f
- Page 317 and 318: Application of CID Server in Decisi
- Page 319 and 320: Chapter 3: Information Technology f
- Page 321 and 322: Chapter 3: Information Technology f
- Page 323 and 324: Chapter 3: Information Technology f
- Page 325 and 326: Chapter 3: Information Technology f
- Page 327 and 328: Chapter 3: Information Technology f
- Page 329 and 330: Chapter 3: Information Technology f
- Page 331 and 332: Managing Lessons Learnt from Daily
- Page 333 and 334: Chapter 3: Information Technology f
- Page 335 and 336: Chapter 3: Information Technology f
- Page 337 and 338: Chapter 3: Information Technology f
- Page 339 and 340: Chapter 3: Information Technology f
- Page 341 and 342: Chapter 3: Information Technology f
- Page 343: Chapter 3: Information Technology f
- Page 347 and 348: Federated Cyber Defence System - Ap
- Page 349 and 350: Chapter 4: Information Assurance &
300 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />
Figure 5. Changeability of belief functions for DSmC with two-element FAKER decomposition<br />
The two-element decomposition of FAKER hypothesis is defined as follows:<br />
K = K CONF + K SPEC (1)<br />
where:<br />
K CONF – ‘conflicting’ FAKER i.e. FH,<br />
K SPEC – ‘specific’ FAKER i.e. {KK, FK, KH}<br />
Analogically, the two-element JOKER decomposition may be performed<br />
in the same manner:<br />
J = J CONF + J SPEC (2)<br />
where:<br />
J CONF – ‘conflicting’ JOKER i.e. {FS, AFH }<br />
J SPEC – ‘specific’ JOKER i.e. {JJ, FJ, JH, JU, KJ, JS, JAF }<br />
Thus the corresponding belief functions may be calculated as follows:<br />
Bel(F) = m 12 (F) + m 12 (AF) + m 12 (K) + m 12 (J) (3)<br />
Bel(H) = m 12 (H) + m 12 (S) + m 12 (K CONF ) + m 12 (J CONF ) (4)<br />
where:<br />
m 12 (.) – the resulting mass as a combination of evidence from the first sensor <strong>and</strong><br />
second sensor.<br />
From Figure 5. it can be seen that the decision change from FAKER to FRIEND<br />
takes place at m 2 (F) @ 0.06. A relatively fast increase of FRIEND hypothesis is observable<br />
comparing to slow decrease of HOSTILE hypothesis, which in the considered<br />
case is never accepted. This disproportion is due to the fact that FRIEND<br />
hypothesis is supplied by conflicting masses <strong>and</strong> specific masses, corresponding<br />
to decomposed training classes while HOSTILE hypothesis is supplied only by<br />
the conflicting masses.