DocumentCode
2931356
Title
Real time penetration of multiple moving threats
Author
Meng, Alex C C
Author_Institution
Texas Instrum. Inc., Dallas, TX, USA
fYear
1989
fDate
22-26 May 1989
Firstpage
933
Abstract
A local hill-climbing heuristic based on the weighted Voronoi diagram (WVD) is illustrated in an example of military application in simulated air-to-air scenario. For the risk measure, defined as the maximum of the ratio of lethality over distance, the WVD from computational geometry gives an intuitive suggestion of the best place to be. To find the least-cost path along the WVD, the author presents a motion-planning algorithm based on Dijkstra´s shortest path algorithm where the cost of an edge is the risk of traversing the edge. By imposing a discrete graph over the area of interest, the author reduces a continuous problem to a combinatorial problem. If the start or goal position does not lie on this graph, it is retracted by either the path of shortest distance or the path of steepest descent. A simple and easily computed path connects the disconnected components by the shortest distance or by a circular path. On the basis of this heuristic, the run-time cost of motion planning is kept to O(n2logn )
Keywords
computational geometry; graph theory; heuristic programming; radar theory; computational geometry; discrete graph; least-cost path; local hill-climbing heuristic; motion-planning algorithm; multiple moving threats; shortest distance; steepest descent; weighted Voronoi diagram; Artificial intelligence; Computational modeling; Computer science; Costs; Decision making; History; Instruments; Military computing; Predictive models; Tiles;
fLanguage
English
Publisher
ieee
Conference_Titel
Aerospace and Electronics Conference, 1989. NAECON 1989., Proceedings of the IEEE 1989 National
Conference_Location
Dayton, OH
Type
conf
DOI
10.1109/NAECON.1989.40324
Filename
40324
Link To Document