In-flight replanning of penetration routes to avoid threat zones of circular shapes

S.J. Asseo
{"title":"In-flight replanning of penetration routes to avoid threat zones of circular shapes","authors":"S.J. Asseo","doi":"10.1109/NAECON.1998.710140","DOIUrl":null,"url":null,"abstract":"In-flight replanning of a strike mission requires the capability of generating survivable penetration routes, quickly and efficiently, with limited computer resources on board the aircraft. Although dynamic programming (DP) has been used traditionally for route generation, it requires quantization of the state space into cells of specified dimensions, and places restrictions on the route to traverse the state space from cell center to cell center along one of the prescribed headings. The algorithm developed avoids threat zones of circular shapes, and is ideal for in-flight replanning of penetration routes. The algorithm is much faster than DP, it generates flyable routes that do not require smoothing, and the run time depends strictly on the number of threats to be avoided, rather than on cell size used for state space quantization. The algorithm uses geometric construction to synthesize routes with linear segments tangent to the threat periphery and circular segments along the threat periphery, and obtains the shortest route between a starting point and a destination point, by using the principle of optimality. The algorithm is validated in a high density threat environment with overlapping threat lethality envelopes of varying sizes, and used to generate various penetration routes.","PeriodicalId":202280,"journal":{"name":"Proceedings of the IEEE 1998 National Aerospace and Electronics Conference. NAECON 1998. Celebrating 50 Years (Cat. No.98CH36185)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the IEEE 1998 National Aerospace and Electronics Conference. NAECON 1998. Celebrating 50 Years (Cat. No.98CH36185)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAECON.1998.710140","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14

Abstract

In-flight replanning of a strike mission requires the capability of generating survivable penetration routes, quickly and efficiently, with limited computer resources on board the aircraft. Although dynamic programming (DP) has been used traditionally for route generation, it requires quantization of the state space into cells of specified dimensions, and places restrictions on the route to traverse the state space from cell center to cell center along one of the prescribed headings. The algorithm developed avoids threat zones of circular shapes, and is ideal for in-flight replanning of penetration routes. The algorithm is much faster than DP, it generates flyable routes that do not require smoothing, and the run time depends strictly on the number of threats to be avoided, rather than on cell size used for state space quantization. The algorithm uses geometric construction to synthesize routes with linear segments tangent to the threat periphery and circular segments along the threat periphery, and obtains the shortest route between a starting point and a destination point, by using the principle of optimality. The algorithm is validated in a high density threat environment with overlapping threat lethality envelopes of varying sizes, and used to generate various penetration routes.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
在飞行中重新规划穿透路线以避开圆形威胁区域
在飞行中重新规划打击任务需要在飞机上有限的计算机资源下,快速有效地生成可生存的突防路线的能力。虽然动态规划(DP)传统上用于路径生成,但它需要将状态空间量化为指定维度的单元,并对路径进行限制,以沿着规定的标题之一从单元中心遍历状态空间。该算法避免了圆形的威胁区域,是飞行中重新规划突防路线的理想方法。该算法比DP算法快得多,它生成不需要平滑的可飞路由,并且运行时间严格依赖于要避免的威胁的数量,而不是用于状态空间量化的单元大小。该算法采用几何结构,综合了与威胁边缘相切的线段和沿威胁边缘的圆形线段的路径,利用最优性原理,求得起点到终点的最短路径。该算法在具有不同大小的重叠威胁杀伤力包络的高密度威胁环境中进行了验证,并用于生成各种渗透路径。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Integrating Chip Carrier Packaging Technology Into Avionic Systems Aircraft Avionics Cooling, Present And Future Aerospace Computers In The 1980s Failure Detection Without Excessive Hardware Redundancy Interface Design Considerations for F-16 Sensors and Weapons
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1