Research and Development in Intelligent Systems XXVI 2009
DOI: 10.1007/978-1-84882-983-1_34
|View full text |Cite
|
Sign up to set email alerts
|

An Optimal Dynamic Threat Evaluation and Weapon Scheduling Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…29 A closed-loop WTA process is not only NP-Complete but also it is discrete, dynamic, non-linear, stochastic, and of a large scale in terms of increased number of WS and targets 30 and it is difficult to solve it optimally when the number of threats and weapons is large, as computation time of the solution increases rapidly with the size of problem. 31 An asset-based Dynamic Weapon Target Assignment (DWTA) problem is formulated and a rule-based heuristic to solve it is proposed by Xin et al 32 Despite its study to decrease the computational time, the problem was still treated in exponential complexity. 33 A non-linear goal programming solution is developed by Hocaoğlu.…”
Section: Brief Literature Reviewmentioning
confidence: 99%
“…29 A closed-loop WTA process is not only NP-Complete but also it is discrete, dynamic, non-linear, stochastic, and of a large scale in terms of increased number of WS and targets 30 and it is difficult to solve it optimally when the number of threats and weapons is large, as computation time of the solution increases rapidly with the size of problem. 31 An asset-based Dynamic Weapon Target Assignment (DWTA) problem is formulated and a rule-based heuristic to solve it is proposed by Xin et al 32 Despite its study to decrease the computational time, the problem was still treated in exponential complexity. 33 A non-linear goal programming solution is developed by Hocaoğlu.…”
Section: Brief Literature Reviewmentioning
confidence: 99%
“…Unlike other applications, they observed chaotic behavior of LP-based solutions in dynamic-systems not observed in stable solutions, noting that changes may not be desirable when "adopting a plan already under execution" (Hill et al, 2003). More recently, Naeem and Masood (2010) of the Pakistani Military College of Signals explored the use of the SMA to model detected threats and assign to them a probable target among a set of defended assets. This model enabled a larger threat evaluation and weapon assignment process by quickly providing a robust estimate of likely threat behavior.…”
Section: Introductionmentioning
confidence: 99%