Adaptive attack occupancy maneuver decision of UUV attack-defense game

被引:0
|
作者
Wang, Zhao [1 ]
Wang, Hong-Jian [1 ]
Zhang, Hong-Han [1 ]
Yu, Dan [1 ]
Ren, Jing-Fei [1 ]
机构
[1] College of Intelligent Systems Science and Engineering, Harbin Engineering University, Harbin,150001, China
来源
Kongzhi yu Juece/Control and Decision | 2024年 / 39卷 / 11期
关键词
D O I
10.13195/j.kzyjc.2023.1347
中图分类号
学科分类号
摘要
The existing methods for the decision-making of unmanned underwater vehicle (UUV) occupancy in attack-defense games are found to be insufficient and incomplete in addressing practical occupancy attack problems. This study analyzes and establishes a mathematical model for attack occupancy maneuvers, proposes the use of vector analysis to determine the UUV’s maximum range circle and the attackable area, develops the concept of occupancy determination rules, and comprehensively analyzes the methods for solving the shortest time attack occupancy maneuvers under different speed conditions with or without obstacles. Additionally, a parameter-adaptive occupancy maneuver decision-making method is proposed to address the issue of target motion state changes. This decision-making method can adapt to the changes in the target’s position, heading, and speed parameters, autonomously select the nearest reachable occupancy point, and solve for the maneuver parameters to reach that point. Simulation results validate the effectiveness and efficiency of the occupancy attack determination rules and the maneuver decision-making methods, as well as the parameter adaptability of the proposed approach in dynamic attack-defense games. © 2024 Northeast University. All rights reserved.
引用
收藏
页码:3819 / 3828
相关论文
共 50 条
  • [1] AN ATTACK-DEFENSE GAME WITH MATRIX STRATEGIES
    COHEN, ND
    NAVAL RESEARCH LOGISTICS QUARTERLY, 1966, 13 (04): : 391 - &
  • [2] An attack-defense game on interdependent networks
    Peng, Rui
    Wu, Di
    Sun, Mengyao
    Wu, Shaomin
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2021, 72 (10) : 2331 - 2341
  • [3] A Simplified Attack-Defense Game Model for NSSA
    Sun, Xueyan
    Liu, Xiaowu
    Zhang, Shuwen
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2015, 9204 : 820 - 828
  • [4] Cyber Attack-Defense Game Strategy Solving Based on Reinforcement Learning and Self-play Cyber Attack-Defense Game Solver
    Zhang, Jie
    Luo, Yunfeng
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 135 - 141
  • [5] Attack-defense trees
    Kordy, Barbara
    Mauw, Sjouke
    Radomirovic, Sasa
    Schweitzer, Patrick
    JOURNAL OF LOGIC AND COMPUTATION, 2014, 24 (01) : 55 - 87
  • [6] Attack-Defense Game in Interdependent Networks: A Functional Perspective
    Sun, Jingya
    Wang, Shuliang
    Zhang, Jianhua
    Dong, Qiqi
    JOURNAL OF INFRASTRUCTURE SYSTEMS, 2023, 29 (03)
  • [7] Deployment Optimization of Defense Stations in an Attack-Defense Aerial War Game
    Jia, Zhi-Xiang
    Kiang, Jean-Fu
    APPLIED SCIENCES-BASEL, 2022, 12 (21):
  • [8] Attack-Defense Differential Game Model for Network Defense Strategy Selection
    Zhang, Hengwei
    Jiang, Lv
    Huang, Shirui
    Wang, Jindong
    Zhang, Yuchen
    IEEE ACCESS, 2019, 7 : 50618 - 50629
  • [9] Foundations of Attack-Defense Trees
    Kordy, Barbara
    Mauw, Sjouke
    Radomirovic, Sasa
    Schweitzer, Patrick
    FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 80 - +
  • [10] Attack-defense differential game to strength allocation strategies generation
    Li, Lingwei
    Xiao, Bing
    Su, Shihong
    Zhang, Haichao
    Wu, Xiwei
    Guo, Yiming
    OPTIMAL CONTROL APPLICATIONS & METHODS, 2023, 44 (06): : 3219 - 3236