• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ÇÐȸÁö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ÇÐȸÁö > µ¥ÀÌÅͺ£À̽º ¿¬±¸È¸Áö(SIGDB)

µ¥ÀÌÅͺ£À̽º ¿¬±¸È¸Áö(SIGDB)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ÀüÀå¿¡¼­ÀÇ Àû´ëÀû ´ë»ó¿¡ ´ëÇÑ ÇàÀ§ ÀÎ½Ä ¹× À§Çù ¼öÁØ ºÐ¼® ¾Ë°í¸®Áò ¸®ºä
¿µ¹®Á¦¸ñ(English Title) Review of Algorithms for Behavior Detection and Threat Evaluation of Hostile Targets in Combat Situations
ÀúÀÚ(Author) À̼ö¿ë   ±èÁÖ¿ø   ½É»óÈç   ·ùµ¿±¹   ¹Ú±â¿õ   ½Å±âÁ¤   Soo Yong Lee   Juwon Kim   Sangheun Shim   Dong Kuk Ryu   Kiwoong Park   Kijung Shin  
¿ø¹®¼ö·Ïó(Citation) VOL 38 NO. 02 PP. 0029 ~ 0041 (2022. 08)
Çѱ۳»¿ë
(Korean Abstract)
Àû´ëÀû ´ë»ó¿¡ ´ëÇÑ ÇàÀ§ ½Äº°°ú À§Çù ¼öÁØ ºÐ¼®Àº ÀüÀå¿¡¼­ÀÇ ÁöÈÖ °á½É¿¡ À־ ¸Å¿ì Áß¿äÇÑ ¿ä¼ÒÀ̳ª µ¿½Ã¿¡ ³­µµ°¡ ³ôÀº °úÁ¦ÀÌ´Ù. Àû ÇàÀ§ ½Äº°°ú À§Çù ¼öÁØ ºÐ¼®À» ÀÚµ¿È­Çϱâ À§ÇÏ¿© ÆÛÁö ·ÎÁ÷, º£ÀÌÁö¾È ³×Æ®¿öÅ©, ½Å°æ¸Á ±â¹Ý ¹æ¹ý·ÐÀÌ ÁÖ·Î ¿¬±¸µÇ¾ú´Ù. º» ¸®ºä¿¡¼­´Â °¢ ¹æ¹ý·ÐÀÇ °³³ä, Àû¿ë »ç·Ê °³¿ä, ¸ðÇü Àû¿ë¿¹½Ã, ÀԷº¯¼ö¿Í Ãâ·Â µ¥ÀÌÅÍÀÇ ÇüÅÂ, Àå´ÜÁ¡ µîÀ» ´Ù·é´Ù. °¢ ¹æ¹ý·ÐÀº ´Ù¼öÀÇ °´Ã¼ °£ »óÈ£ÀÛ¿ëÀ» °í·ÁÇÏÁö ¸øÇÑ´Ù´Â °øÅëÀûÀÎ ÇѰ踦 °®´Â´Ù. ÀÌ ÇѰ踦 ±Øº¹Çϱâ À§ÇÑ ÇâÈÄ ¿¬±¸ ¹æÇâÀ¸·Î, µ¿Àû ±×·¡ÇÁ ½Å°æ¸Á ±â¹ÝÀû ÇàÀ§ ½Äº° ¹× À§Çù ¼öÁØ ºÐ¼® ¹æ¹ý·ÐÀ» Á¦½ÃÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
In combat situations, behavior detection and threat evaluation of hostile targets is of significant value and challenge. Fuzzy logic, Bayesian network, and neural network are widely studied classes of approaches developed for automated behavior detection and threat evaluation in combat situations. In this review, for each approach, we overview its concept, current status of the application research, algorithm variants designed for application, input variables and output format, and their strengths and weaknesses. We find that the up-to-date approaches for behavior detection and threat evaluation are limited in considering interaction among a large number of entities. As a future research direction, we suggest developing dynamic graph neural network-based behavior detection and threat evaluation method.
Å°¿öµå(Keyword) À§Çù ¼öÁØ ºÐ¼®   ÇàÀ§ ½Äº°   ½Å°æ¸Á   º£ÀÌÁö¾È ³×Æ®¿öÅ©   ÆÛÁö ·ÎÁ÷   ±×·¡ÇÁ ½Å°æ¸Á   Threat evaluation   Behavior detection   Neural network   Bayesian network   Fuzzy logic   Graph Neural Network  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå