Modeling and optimization of multi-stage sensor-weapon-target assignment

被引:2
|
作者
Wang Y.-P. [1 ]
Xin B. [1 ,2 ,3 ]
Chen J. [1 ,2 ,3 ]
机构
[1] School of Automation, Beijing Institute of Technology, Beijing
[2] Key Laboratory of Intelligent Control and Decision of Complex Systems, Beijing Institute of Technology, Beijing
[3] Beijing Advanced Innovation Center for Intelligent Robots and Systems, Beijing Institute of Technology, Beijing
基金
中国国家自然科学基金;
关键词
Co-allocation; Cooperative engagement; Heuristic algorithms; Sensor-weapon-target assignment;
D O I
10.7641/CTA.2019.90507
中图分类号
学科分类号
摘要
Based on the static variant of the sensor-weapon-target assignment (S-WTA) problem, we built a mathematical model for the multi-stage S-WTA problem, with the objective of minimizing the expected remaining threat value of the incoming targets, by dividing the operational process into several interception stages. In order to solve this problem, the multi-stage S-WTA problem was decomposed into two combat resource assignment subproblems. Firstly, a knowledge-based incremental constructive heuristic was proposed to solve the multi-stage weapon-target assignment subproblem. With the obtained weapon-target assignment scheme, a marginal-loss-based constructive heuristic was proposed to solve the multi-stage sensor-target assignment subproblem. Thus, we can obtain valid solutions of the multi-stage S- WTA problem by incorporating the proposed two fast constructive heuristic algorithms with low complexity. A random sampling method based on random permutations (RP) was employed as the competitor, and some simulation experiments were carried out to validate the effectiveness of the proposed heuristic. The computational result indicates that the proposed heuristic outperforms its competitor for most of the test instances, in terms of both solution quality and time cost. © 2019, Editorial Department of Control Theory & Applications South China University of Technology. All right reserved.
引用
收藏
页码:1886 / 1895
页数:9
相关论文
共 20 条
  • [1] Cebrowsk A.K., Garstka J.J., Network-centric warfare: its origins and future, Proceedings of the U. S. Naval Institute, 124, 1, pp. 28-35, (1998)
  • [2] Alberts D.S., Garstka J.J., Stein F.P., Network centric warfare: Developing and leveraging information superiority, Assistant Secretary of Defense (C3I/Command Control Research Program), (2000)
  • [3] Paradis S., Benaskeur A., Oxenham M., Et al., Threat evaluation and weapons allocation in network-centric warfare, Proceedings of the 8th International Conference on Information Fusion, 2, pp. 1078-1085, (2005)
  • [4] Ahuja R.K., Kumar A., Jha K.C., Et al., Exact and heuristic algorithms for the weapon-target assignment problem, Operations Research, 55, 6, pp. 1136-1146, (2007)
  • [5] Bogdanowicz Z.R., Coleman N.P., Sensor-target and weapontarget pairings based on auction algorithm, Proceedings of the 11th WSEAS International Conference on Applied Mathematics, 3, pp. 92-96, (2007)
  • [6] Bogdanowicz Z.R., A new efficient algorithm for optimal assignment of smart weapons to targets, Computers and Mathematics with Applications, 6, 6, pp. 730-735, (2007)
  • [7] Yang X., Qiu D., Huang W., Et al., Two planning models and solving method of sensor/weapon-target assignment problem, Fire Control & Command Control, 37, 9, pp. 18-23, (2012)
  • [8] Li Z., Li X., Dai J., Et al., Swt-opt algorithm for solving formation air to ground joint fire distribution problem, Modern Defence Technology, 40, 4, pp. 113-118, (2012)
  • [9] Li Z., Li X., Dai J., Et al., Research of modeling and simulation on formation attack to ground dynamic joint fire distribution, Journal of System Simulation, 25, 12, pp. 2900-2905, (2013)
  • [10] Wang J., Chen C., Sensor-weapon joint management based on improved genetic algorithm, Proceedings of the 34th Chinese Control Conference, 6, pp. 2738-2742, (2015)