• DocumentCode
    3254192
  • Title

    Games of Timing Theoretical Protocol Development and Performance Analysis for Missile Defense

  • Author

    Niznik, Carol

  • Author_Institution
    NW Syst., Rochester, NY, USA
  • fYear
    2013
  • fDate
    July 30 2013-Aug. 2 2013
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    The games of timing theory enforcing optimal timing intervals and two optimal strategies will be expressed as the following two software theory generated protocols. The two optimal strategy software protocols are first, the battle manager must optimally allocate sensor and weapon systems with the threat launch events. This Internal Battle Manager Decision Optimization(BMDO) Protocol requires the threat constraints of (1) perceived threat inventory, (2) threat missile, and (3) ground asset being attacked. The theoretical generation of the games of timing optimal timing intervals and the two optimal strategies are derived realizing risk management equations within the BMDO Protocol optimization constraints solutions. Invariant Imbedding is the mathematical concept required to contain the BMDO Protocol within the Kernel of the games of timing optimal strategy and optimal timing interval solution to achieve the second and final optimal strategy protocol, the Optimal Battle Manager Decision(OBMD) Protocol. The performance analysis of the OBMD Protocol for constraints and requirements on processor capability and timeliness on a Network Centric Star Topology Architecture is also described for the two Models, Model 1 Mid-course Engagement scenario, and Model 2 Ascent Phase in the Target Trajectory.
  • Keywords
    game theory; military communication; missiles; optimal systems; optimisation; protocols; resource allocation; timing; Model 1 Mid course Engagement scenario; Model 2 Ascent Phase in the Target Trajectory; internal battle manager decision optimization protocol; invariant imbedding; missile defense; network centric star topology architecture; optimal battle manager decision protocol; optimal timing intervals; perceived threat inventory; risk management equations; sensor systems; software theory generated protocols; theoretical games generation; theoretical protocol development; threat launch events; threat missile; timing theory; weapon systems; Equations; Games; Kernel; Mathematical model; Missiles; Protocols; Timing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Communications and Networks (ICCCN), 2013 22nd International Conference on
  • Conference_Location
    Nassau
  • Print_ISBN
    978-1-4673-5774-6
  • Type

    conf

  • DOI
    10.1109/ICCCN.2013.6614140
  • Filename
    6614140