期刊文献+

基于SPSO的考虑指控节点受攻击的WTA问题优化方法

An Optimizatipon for the WTA Problem with Vulnerable Command and Control Nodes Based on SPSO
下载PDF
导出
摘要 鉴于网络中心战中指挥所的重要性,根据实际作战原则,通过对传统武器目标分配(WTA)模型的分析,建立了考虑指控节点受攻击的武器目标分配(Weapon-Target Assignment with Vulnerable Command and Control Nodes,WTAVC2N)模型,并利用随机PSO算法对该模型进行仿真验证。仿真结果表明了利用随机PSO算法解决考虑指挥所被摧毁的武器目标分配问题的有效性及合理性。 According to the importance of the command post,a novel model(Weapon-Target Assignment with Vulnerable Command and Control Nodes,WTAVC2N Model) is built on analyzing the conventional Weapon-Target Assignment Model,which has been taken into account the true operational principles in Network Centric Warfare and vulnerable command and control nodes.Then an improved stochastic PSO algorithm(SPSO) is used to simulate the WTA problem.The result of simulation illustrates that SPSO can solve the WTA problem based on the destroyed probability of command posts effectively and efficiently.
机构地区 国防科技大学C
出处 《火力与指挥控制》 CSCD 北大核心 2011年第8期36-39,共4页 Fire Control & Command Control
基金 国家自然科学基金资助项目(70701038 70771109)
关键词 网络中心战 指挥所 武器目标分配 随机PSO算法 network centric warfare command post weapon-target assignment stochastic PSO algorithm
  • 相关文献

参考文献9

  • 1蔡怀平,陈英武.武器-目标分配(WTA)问题研究进展[J].火力与指挥控制,2006,31(12):11-15. 被引量:68
  • 2Marlin S. A Review of the Literature on the Missile Allocation Problem [J]. Operations Research, 1970, 18(3): 334-373.
  • 3Eitan W. A Neural Network-Based Optimization Algorithm for the Static Weapon-Target Assignment Problem [J ]. ORSA Journal on Computing, 1989,1 (4) : 232-246.
  • 4王玮,程树昌,张玉芝.基于遗传算法的一类武器目标分配方法研究[J].系统工程与电子技术,2008,30(9):1708-1711. 被引量:54
  • 5Lee Z J,Lee C Y,Su S F. An Immunity-based Ant Colony Optimization Algorithm for Solving Weapon-target Assignment Problem [J]. Applied Soft Computing, 2002,2 : 39-47.
  • 6Kennedy J, Eberhart R. Particle Swarm Optimization [C]//IEEE International Conference on Neural Networks Perth, 1995 : 1942-1948.
  • 7王小艺,刘载文,侯朝桢,原菊梅.防空武器多目标优化分配建模与决策[J].兵工学报,2007,28(2):228-231. 被引量:26
  • 8曾建潮,崔志华.一种保证全局收敛的PSO算法[J].计算机研究与发展,2004,41(8):1333-1338. 被引量:160
  • 9Patrick H, James W, Michael A. Dynamic Weapon-Target Assignment Problems with Vulnerable C2 Nodes[D]. Massachusetts: Massachusetts Institute of Technology, 1988.

二级参考文献51

共引文献288

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部