Adaptive weapon-target assignment for multi-target interception

Ziyan Chen, Zixuan Liang*, Xiwang Dong, Qingdong Li, Zhang Ren

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Citations (Scopus)

Abstract

In this paper, an adaptive weapon-target assignment (WTA) model is proposed for multi-to-multi interception by taking the normal overload of missiles as the benefit factor and the uniform distribution of resources as the main constraint. Firstly, the total demand normal overload is considered as the basis of WTA, and an allocation strategy based on the attenuation model of target value for a variety of constraints to model the WTA problem is proposed. Secondly, in order to reduce the acceleration cost, an analytical expression of the whole-course overload is derived under the proportional navigation guidance, so that the overload of the whole combat process can be estimated at the initial moment according to the initial information of the missile and target. Then, based on the genetic algorithm, the WTA method is designed. Finally, the assignment method is verified in a multi-to-multi interception mission.

Original languageEnglish
Title of host publicationProceedings of the 38th Chinese Control Conference, CCC 2019
EditorsMinyue Fu, Jian Sun
PublisherIEEE Computer Society
Pages4218-4223
Number of pages6
ISBN (Electronic)9789881563972
DOIs
Publication statusPublished - Jul 2019
Event38th Chinese Control Conference, CCC 2019 - Guangzhou, China
Duration: 27 Jul 201930 Jul 2019

Publication series

NameChinese Control Conference, CCC
Volume2019-July
ISSN (Print)1934-1768
ISSN (Electronic)2161-2927

Conference

Conference38th Chinese Control Conference, CCC 2019
Country/TerritoryChina
CityGuangzhou
Period27/07/1930/07/19

Keywords

  • Genetic algorithm
  • Interception
  • Normal overload
  • Uniform distribution
  • Weapon-target assignment

Fingerprint

Dive into the research topics of 'Adaptive weapon-target assignment for multi-target interception'. Together they form a unique fingerprint.

Cite this