2017
DOI: 10.14429/dsj.67.10441
|View full text |Cite
|
Sign up to set email alerts
|

Constrained Target Clustering for Military Targeting Process

Abstract: Constrained target clustering (CTC) is proposed to support the targeting decision-making in the network centric warfare environment. When area targets are detected by sensors, it is required to decide the points at which a missile or bomb is aimed to achieve operational goals. CTC can determine the optimal numbers and positions of aiming points by transforming the targeting problem into clustering-based optimisation problems. The CTC formulations include objective functions and constraints in consideration of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 8 publications
(14 reference statements)
0
2
0
Order By: Relevance
“…where f 1 is the objective that denotes the expected kill probability of the targets; f 2 is the objective that denotes the weapon consumption; m is the number of weapons and n is the number of targets; v j is the survival value of target j which is evaluated by threat evaluation; {p 1 , p 2 , • • • , p n } is the position set of detected hostile targets; A = {a 1 , a 2 , • • • , a m } is the position set of aiming points of weapons; X = (x 1 , x 2 , • • • , x m ) is the decision vector; D(•) is the function of damage effect by the distance between blast points and targets. Based on research involving collateral damage estimate [38], [39], [55]- [58], we assume no firing error and approximate the conditional damage law of target coordinate as…”
Section: B Objectives Of Cmwtamentioning
confidence: 99%
See 1 more Smart Citation
“…where f 1 is the objective that denotes the expected kill probability of the targets; f 2 is the objective that denotes the weapon consumption; m is the number of weapons and n is the number of targets; v j is the survival value of target j which is evaluated by threat evaluation; {p 1 , p 2 , • • • , p n } is the position set of detected hostile targets; A = {a 1 , a 2 , • • • , a m } is the position set of aiming points of weapons; X = (x 1 , x 2 , • • • , x m ) is the decision vector; D(•) is the function of damage effect by the distance between blast points and targets. Based on research involving collateral damage estimate [38], [39], [55]- [58], we assume no firing error and approximate the conditional damage law of target coordinate as…”
Section: B Objectives Of Cmwtamentioning
confidence: 99%
“…Bogdanowicz and Patel [38] designed a quick collateral damage estimate (QCDE) algorithm to support WTA capabilities with collateral damage consideration. Ma [39] established the principle of Constrained Target Clustering (CTC), but the number of clusters is set artificially and there is no overlap. Inspired by the above analysis, we formulate a constrained multi-objective weapon target assignment model.…”
Section: Introductionmentioning
confidence: 99%