Proceedings of the 2001 American Control Conference. (Cat. No.01CH37148) 2001
DOI: 10.1109/acc.2001.946006
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic network flow optimization models for air vehicle resource allocation

Abstract: A weapon system consisting of a swarm of air vehicles whose mission is to search for, classify, attack, and perform battle damage assessment, is considered. It is assumed that the target field information is communicated to all the elements of the swarm as it becomes available. A network flow optimization problem is posed whose readily obtained solution yields the optimum resource allocation among the air vehicles in the swarm. Hence, the periodic reapplication of the centralized optimization algorithm yields … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
55
0

Year Published

2002
2002
2020
2020

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 108 publications
(55 citation statements)
references
References 1 publication
0
55
0
Order By: Relevance
“…Restricting these capacities to a value of one on the arcs leading to the sink, along with the integrality property, induces binary values for the decision variables Xy. Due to the special structure of the problem, there will always be an optimal solution that is all integer [1]. Solutions to this problem pose a small computational burden, making it feasible for implementation on the processors likely to be available on disposable wide area search munitions.…”
Section: Network Optimization Modelmentioning
confidence: 99%
“…Restricting these capacities to a value of one on the arcs leading to the sink, along with the integrality property, induces binary values for the decision variables Xy. Due to the special structure of the problem, there will always be an optimal solution that is all integer [1]. Solutions to this problem pose a small computational burden, making it feasible for implementation on the processors likely to be available on disposable wide area search munitions.…”
Section: Network Optimization Modelmentioning
confidence: 99%
“…However, with limited resources of MSAs, the task for each MSA often covers more than one target, which cannot be interpreted as a simple end-to-end configuration problem. Meanwhile, distinct from many traditional motion-planning applications (e.g., target search [1], [2], [8], [9] and target engagement [3], [24]), the surveillance job here does not end after each target is visited. The MSAs have to come back to the targets repetitively to update their status.…”
Section: A Related Workmentioning
confidence: 99%
“…We shall use this notion with the elements representing targets. The Stirling set number can be obtained by the following equation [41]: (8) where is a binomial coefficient. Equation (8) indicates that increases exponentially as or increases, which makes the task decomposition an NP-hard problem by itself.…”
Section: A Task Decompositionmentioning
confidence: 99%
See 1 more Smart Citation
“…A longer planning horizon is essential for good performance in highly coupled systems. Iterative network flow [4], binary linear programming, and auction [5] are addressed in the paper as algorithms for multiple task assignment.…”
Section: Introductionmentioning
confidence: 99%