Weapon Target Assignment Method with Grouping Constraints for Interception Based on Artificial Bee Colony Algorithm

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper presents a weapon-target assignment (WTA) method for multi-to-multi interception with grouping constraints based on penalty function method. Firstly, in order to evaluate the combat performance from the interception efficiency and the required energy, the interception probability function are constructed of the heading error, the time-to-go for moving targets and the line-of-sight rate. Secondly, to ensure that each target is allocated with sufficient interception resources, and meanwhile to achieve the effective interception for multiple missiles against multiple targets, an adaptive grouping strategy is presented. Then, based on the artificial bee colony algorithm, the steps for solving WTA problem with grouping constraints are given. Finally, the proposed WTA method is verified with numerical simulations. Results indicate that the proposed WTA methods can realize the optimal allocation scheme which satisfying adaptive grouping constraints.

Original languageEnglish
Title of host publication2019 IEEE 15th International Conference on Control and Automation, ICCA 2019
PublisherIEEE Computer Society
Pages1385-1390
Number of pages6
ISBN (Electronic)9781728111643
DOIs
StatePublished - Jul 2019
Event15th IEEE International Conference on Control and Automation, ICCA 2019 - Edinburgh, United Kingdom
Duration: 16 Jul 201919 Jul 2019

Publication series

NameIEEE International Conference on Control and Automation, ICCA
Volume2019-July
ISSN (Print)1948-3449
ISSN (Electronic)1948-3457

Conference

Conference15th IEEE International Conference on Control and Automation, ICCA 2019
Country/TerritoryUnited Kingdom
CityEdinburgh
Period16/07/1919/07/19

Fingerprint

Dive into the research topics of 'Weapon Target Assignment Method with Grouping Constraints for Interception Based on Artificial Bee Colony Algorithm'. Together they form a unique fingerprint.

Cite this