Multi-stage attack weapon target allocation method based on defense area analysis

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Suite of Metaheuristic Algorithms for Static Weapon-Target Allocation

The problem of allocating defensive weapon resources to hostile targets is an optimization problem of high military relevance. The need for obtaining the solutions in real-time is often overlooked in existing literature. Moreover, there does not exist much research aimed at comparing the performance of different algorithms for weapon-target allocation. We have implemented a suite of metaheurist...

متن کامل

A Lagrange Relaxation Method for Solving Weapon-Target Assignment Problem

We study the weapon-target assignment WTA problem which has wide applications in the area of defense-related operations research. This problem calls for finding a proper assignment of weapons to targets such that the total expected damaged value of the targets to be maximized. The WTA problem can be formulated as a nonlinear integer programming problem which is known to be NP-complete. There do...

متن کامل

Multi-sensor Target Recognition Based on Relative Ratio Method

The aim of this study is to propose a new target recognition method for the multi-sensor with multiple characteristics indexes. Coefficient of variation is used to determine the weights of characteristic indexes. The conceptions of ideal optimal and negative ideal vectors are given first and then normalized relative ratio is used to comprehensive evaluation value. Hence the rule of target recog...

متن کامل

ADTool: Security Analysis with Attack-Defense Trees

The ADTool is free, open source software assisting graphical modeling and quantitative analysis of security, using attack–defense trees. The main features of the ADTool are easy creation, efficient editing, and automated bottom-up evaluation of security-relevant measures. The tool also supports the usage of attack trees, protection trees and defense trees, which are all particular instances of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Systems Engineering and Electronics

سال: 2020

ISSN: 1004-4132

DOI: 10.23919/jsee.2020.000033