2020
DOI: 10.3390/sym12050824
|View full text |Cite
|
Sign up to set email alerts
|

Swarm Intelligence Algorithms for Weapon-Target Assignment in a Multilayer Defense Scenario: A Comparative Study

Abstract: Weapon-target assignment (WTA) is a kind of NP-complete problem in military operations research. To solve the multilayer defense WTA problems when the information about enemy’s attacking plan is symmetric to the defender, we propose four heuristic algorithms based on swarm intelligence with customizations and improvements, including ant colony optimization (ACO), binary particle swarm optimization (BPSO), integer particle swarm optimization (IPSO) and sine cosine algorithm (SCA). Our objective is to assess and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 37 publications
0
9
0
Order By: Relevance
“…Finally, we would like to suggest some of the possible scopes, shortly for researcher and practitioner as a brainstorming concept: reducing the reaction time and maximizing VM's resource allocation considering the QoS factor; improving the load stability in WSN using RCNN learning; SVM-PSO based community Forensics and RNN techniques for Intrusion Detection. Feature selection from natural algorithm Koroniotis et al [133] Quality of service NF PSO and DL Enhance NF Al hawaitat et al [134] WS PNS PSO Jamming attack Shi et al [135] Anomaly detection P ADAID 1 Presented unsupervised clustering Usman et al [96] VM allocation VR EFPA 2 Energy-oriented allocation Singh et al [103] VM migration VR HBGA 3 Energy reduction Naik et al [130] VM allocation VR Fruit fly Reduce host migration Meng & Pan [136] Optimization VR FFOA solve MKP 4 Mosa & Paton [126] VM placement VR GA Reduce response time & maximize resources utilization Duan et al [137] Information leakage P DL Protect server Festag & Spreckelsen [138] Data leakage P DL Detection of protected health information Chari et al [125] Quality of service IA DL Generate password via cognitive information Li et al [139] Signal processing IA GA Feature extraction via EEG signal Saini & Kansal [127] WSN ACS SI Reduce energy consumption and increase network life time Chen et al [140] Biometric identification IA CNN Proposed GSLT-CNN using human brain EEG Cao & Fang [141] Multilayer defense scenario ACS SI Found proficient IPSO elucidating extensive WTA problem Aliyu et al [124] Resource allocation ACS Ant colony Illustrated faster convergence optimize makespan time Poonia [142] VAN ACS SI Found significant difference in VANET routing protocol and Swarm based protocol Verma et al [ [129] Feature extraction ID GA Reduce features to classify network packet Tan et al [148] Real time network attack intrusion ID NN Able to detect in network precisely…”
Section: Discussionmentioning
confidence: 99%
“…Finally, we would like to suggest some of the possible scopes, shortly for researcher and practitioner as a brainstorming concept: reducing the reaction time and maximizing VM's resource allocation considering the QoS factor; improving the load stability in WSN using RCNN learning; SVM-PSO based community Forensics and RNN techniques for Intrusion Detection. Feature selection from natural algorithm Koroniotis et al [133] Quality of service NF PSO and DL Enhance NF Al hawaitat et al [134] WS PNS PSO Jamming attack Shi et al [135] Anomaly detection P ADAID 1 Presented unsupervised clustering Usman et al [96] VM allocation VR EFPA 2 Energy-oriented allocation Singh et al [103] VM migration VR HBGA 3 Energy reduction Naik et al [130] VM allocation VR Fruit fly Reduce host migration Meng & Pan [136] Optimization VR FFOA solve MKP 4 Mosa & Paton [126] VM placement VR GA Reduce response time & maximize resources utilization Duan et al [137] Information leakage P DL Protect server Festag & Spreckelsen [138] Data leakage P DL Detection of protected health information Chari et al [125] Quality of service IA DL Generate password via cognitive information Li et al [139] Signal processing IA GA Feature extraction via EEG signal Saini & Kansal [127] WSN ACS SI Reduce energy consumption and increase network life time Chen et al [140] Biometric identification IA CNN Proposed GSLT-CNN using human brain EEG Cao & Fang [141] Multilayer defense scenario ACS SI Found proficient IPSO elucidating extensive WTA problem Aliyu et al [124] Resource allocation ACS Ant colony Illustrated faster convergence optimize makespan time Poonia [142] VAN ACS SI Found significant difference in VANET routing protocol and Swarm based protocol Verma et al [ [129] Feature extraction ID GA Reduce features to classify network packet Tan et al [148] Real time network attack intrusion ID NN Able to detect in network precisely…”
Section: Discussionmentioning
confidence: 99%
“…Based on the framework of the co-evolutionary algorithm, the ECO-AGWTA algorithm is proposed to solve the model shown in equation (17). In this algorithm, the red and blue sides are represented by two independent populations, which are evolved simultaneously.…”
Section: A the Framework Of Eco-agwtamentioning
confidence: 99%
“…Therefore, for the DWTA problem, the distribution of weapons in the previous stage will have an impact on the later stage. In addition, for different combat tasks, each type of WTA also includes resource-oriented problems [14][15][16][17] and target-oriented problems [18][19][20].…”
Section: Introductionmentioning
confidence: 99%
“…In WTA problems, model constraints are usually used as algorithm termination conditions. In the model constraints (22), the constraint of marginal return expectation of a weapon is proposed. This constraint not only optimizes the decision efficiency-cost ratio but also controls the algorithm flow adaptively.…”
Section: Constraint Handlingmentioning
confidence: 99%
“…The WTA problem is proved to be NP-complete, and the objective function is convex [20]. The exact algorithms solving the WTA model have a "dimension explosion" dilemma, which does not satisfy the real-time requirements in practical applications [21,22]. Hence, the alternate approaches, such as model transformation, heuristics algorithm, are studied to approximate the optimal solution [23][24][25].…”
Section: Introductionmentioning
confidence: 99%