Multiple ballistic flight vehicles' launch time planning for collision avoidance based on time constraint set

Siyu Zhang, Jianqiao Yu*, Pinlei Li

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

4 Citations (Scopus)

Abstract

An algorithm framework is presented to solve multiple ballistic flight vehicles' collision avoidance problem by adjusting their launch time. A collision detection algorithm is proposed in the framework for detecting whether there is flight collision or not in multiple ballistic flight vehicles' cooperative attack, and a launch time constraint set model is built in order to solve the collision avoidance problem. The constraint set is constituted by the launch time interval constraints of the flight vehicles in collision. On the foundation of this time constraint set, an optimization problem which regards multiple ballistic flight vehicles' arriving simultaneously as the optimization goals and includes the expression with the sign of inequality constraints is built, and then the “Big-M” method is improved to transform the problem to standard form of nonlinear programming problem which can be solved by sequential quadratic programming (SQP). The method framework transforms the launch time adjusting problem to an optimization planning problem and has reduced the computational complexity compared with the traditional ergodic launch time planning algorithms. With MATLAB platform, simulations have proved the rationality and effectiveness of the proposed method and the method has high computation efficiency.

Original languageEnglish
Pages (from-to)2391-2399
Number of pages9
JournalHangkong Xuebao/Acta Aeronautica et Astronautica Sinica
Volume36
Issue number7
DOIs
Publication statusPublished - 25 Jul 2015

Keywords

  • Collision avoidance
  • Cooperative attack
  • Launch time optimization
  • Nonlinear planning
  • Time constraint set

Fingerprint

Dive into the research topics of 'Multiple ballistic flight vehicles' launch time planning for collision avoidance based on time constraint set'. Together they form a unique fingerprint.

Cite this