ArticlePDF Available

Air Defense Planning from an Impact of a Group of Unmanned Aerial Vehicles based on Multi-Agent Modeling

Authors:
  • The National Defence University of Ukraine named after Ivan Cherniakhovskyi

Abstract and Figures

The paper discusses the methodology of forming an air defense plan to counteract a group of drones based on multiagent modeling. It is shown that the application of traditional planning methods does not take into account the peculiarities of the defense of objects against largegroups of air targets in case of their simultaneous application. The use of a multiagent paradigm for modeling is considered, which considers the defense process as an interaction of two groups of agents: attack and defense. The air situation model is based on the application of agents with simple control methods and the use of cohesive and repulsive functions. The air defense model includes adequate air defense agents' response to air targets. The conclusion about the possibility of multi-agent air defense planning was confirmed by modeling of an infrastructure object defense from attack of a group of drones.
Content may be subject to copyright.
Pavlo Shchypanskyi et al.,International Journal of Emerging Trends in Engineering Research, 8(4), April 2020, 1302 - 1308
1302
ABSTRACT
The paper discusses the methodology of forming an air
defense plan to counteract a group of drones based on
multiagent modeling. It is shown that the application of
traditional planning methods does not take into account the
peculiarities of the defense of objects against large groups of
air targets in case of their simultaneous application. The use
of a multiagent paradigm for modeling is considered, which
considers the defense process as an interaction of two groups
of agents: attack and defense. The air situation model is based
on the application of agents with simple control methods and
the use of cohesive and repulsive functions. The air defense
model includes adequate air defense agents' response to air
targets. The conclusion about the possibility of multi-agent air
defense planning was confirmed by modeling of an
infrastructure object defense from attack of a group of drones.
Key words : Air Defense, Drone, Group Behavior,
Multi-Agent, Planning, Unmanned Aerial Vehicle.
1. INTRODUCTION
Over the last decade the number of small drones (UAVs)
applications has increased rapidly. At the same time, the
smallest UAVs (drones) are becoming more intelligent and
technically sophisticated. Not surprisingly, in this case, they
can increasingly be used not only with good intentions but
also for terrorist attacks. Drones, simple and cheap, are now
available to a variety of armed groups. The largest-scale drone
attack was launched in September 2019. Its target was large
oil refineries in Saudi Arabia. As a result of the attack, oil
production has fallen by 5.7 million barrels a day, which is
5% of world production, and its price has jumped by 10% [1].
Network coordination technologies now allow terrorists to use
not only single drones, but also their groups, consisting of
dozens of units coordinated across time and space. This
further complicates the task of counteracting such UAV
groups in protecting critical infrastructure as it requires the
concerted management of a large number of forces and
resources.
1.1 Problem Statement
Various mathematical methods can be used for air defense
planning of an infrastructure object: operations research,
probability theory methods, scheduling theories,
mathematical analysis, game theory, statistical analysis,
statistical modeling, etc. [2]. However, the main disadvantage
of such methods is the overly generalized presentation of the
entire “UAV Group - Air Defense” system, which negates the
final result and renders the plan inappropriate. Therefore,
there is a need to use more detailed “multi-agent” game
modeling methods. Submission of individual elements of the
system in the form of independent “agents” allow to analyze
the behavior of each of the studied objects in more detail and
to plan the “defense agents” application more rationally.
A common problem of air defense planning for an important
infrastructure object is the need to forecast UAV group
actions. The specific variant of the air defense counteraction
to a group of drones will depend on the possible location of
individual UAVs in the space above the infrastructure object.
Therefore, it is obvious that the overall planning task will be
based on two models: 1) the model of the air situation
forecast, and 2) the model of air defense counteraction.
1.2 Related Works Overview
In order to develop a model of the air situation forecast, the
UAV team should be considered as a set of agents that
coordinate their actions to fulfill a common goal. By
interacting locally, intellectual agents UAVs create
so-called collective intelligence that is capable of
self-organization and complex behavior, even if each agent's
Air Defense Planning from an Impact of a Group of Unmanned Aerial Vehicles
based on Multi-Agent Modeling
Pavlo Shchypanskyi
1
, Vitalii Savchenko
2
, Oleksii Martyniuk
3
, Ihor Kostiuk
4
1Deputy Head of Ivan Cherniakhovskyi National Defense University of Ukraine, Kyiv, Ukraine,
info@nuou.org.ua
2Director of Cybersecurity Institute, State University of Telecommunication, Kyiv, Ukraine, savitan@ukr.net
3Associated Professor, Aviation and Air Defense Department of Ivan Cherniakhovskyi National Defense
University of Ukraine, Kyiv, Ukraine, o.r.martyniuk@gmail.com
4Postgraduate Student, Aviation and Air Defense Department of Ivan Cherniakhovskyi National Defense
University of Ukraine, Kyiv, Ukraine, kostiuk1306@ukr.net
ISSN 2347 - 3983
Volume 8. No. 4, April 2020
International Journal of Emerging Trends in Engineering Research
Available Online at http://www.warse.org/IJETER/static/pdf/file/ijeter59842020.pdf
https://doi.org/10.30534/ijeter/2020/59842020
Pavlo Shchypanskyi et al.,International Journal of Emerging Trends in Engineering Research, 8(4), April 2020, 1302 - 1308
1303
strategy is simple enough. The first publications in this field
refer to the research of Craig Reynolds. Observing bird’s
behavior, he proved that the interaction of birds in a flock
requires only a few simple rules of behavior [3]. In [4]
theoretical bases of application of robotic groups are stated.
Studies [5]–[7] describe some particular cases of constructing
spatial group formations based on information about a limited
range of neighbors. Model [8] describes the movement of
search agents in the decision support system. The “Diffusion
Bomb Task” [9] gives an idea of how to defeat an enemy air
defense system (air defense system) by an autonomous group.
[10] describes the UAV group motion model, which most
fully complies with the principles of decentralized
management, is easily scalable and, at the same time, easy to
apply.
The main approaches to air defense organization are laid
down in guidance documents such as ATP 3-01.8 Techniques
for Combined Arms for Air Defense [11] and Joint
Publication 3-01 Countering Air and Missile Threats [12].
However, these documents do not disclose options for
modeling of the air defense counteraction, leaving these
issues for the decision of commanders. In turn, individual
counteraction models are reported in [13], although without
the possibility of numerical estimation of counteraction
parameters. More detailed models can be seen in [14], which
include Tracking models and Bayesian models for target
recognition. At the same time, such approach is not sufficient
to plan the defense of an object in the case of a group UAV
strike. [15] discusses a multi-agent approach to missile
defense planning. At the same time, agent activities are only
implemented for planning procedures without taking into
account the UAV group parameters. The procedures for
planning air defense in real time are well modeled in [16]. At
the same time, the main criterion for such planning is only the
“non-conflict of the plan”, which is inaccessible when
protecting important objects. The best method for combining
with the multi-agent planning model of the air situation in
terms of planning is the method described in [17], which
provides for the deployment of an air defense system
depending on the variant of actions of the group of aircraft. At
the same time, some elements of this model need to be refined.
The purpose of the article is to develop a methodology for
forming an air defense plan for a critical infrastructure object
from a group of unmanned aerial vehicles based on
multi-agent modeling.
2. THE MODEL FOR AIR SITUATION FORECAST
2.1 Multi-Agent Approach to Air Situation Modeling
UAV group application leads to the proportional growth of
information transmitted through the control channels in
dependence from the UAVs number. Therefore, developers
use decentralized control methods, which minimize the
transmission of information in the control channels and
manage the group as the only “integrated” UAV. Group
control consists of two independent tasks: the decomposition
of a group task into individual performers and the concerted
execution of a group task in space and time. From the point of
view of defense, the spatial position of individual drones is the
most significant factor in the planning of defense actions.
Therefore, to form a defense plan based on multi-agent
modeling, it is most appropriate to take as a basis the problem
of the spatial position of the UAV group.
The group R consisting of N UAVs is considered. Each UAV
ri R (i=1…N) must be capable of performing the following
functions: determining its location (absolute or relative);
keeping in touch with its neighbors in the local group within
the low-power transmitter range dadj; dynamic (re-)planning
of its own route based on the information received.
The task of the group, within the scope of this article, is to
move from the start point with Xbase coordinates to the Xaim
destination, and each UAV must be informationally
connected to the group and be able to avoid interference of
neighbor UAVs and enemy active objects.
2.2 UAV Group Movement
The coherent group motion model is based on the potential
method, which determines that each UAV is drawn to its
destination and to the neighbors of the local group (which are
recognized by onboard sensors). In addition, each UAV repels
obstacles and neighbors to ensure flight safety. In general, the
model can be represented in vector form:
i i i i i
aim coh rep AAD
V V V V V   
 
, (1)
where
i
V
the resulting velocity vector of UAV ri;
aim coh
V ,V
 
– velocity vectors of approaching to the target and
neighbors respectively; i i
rep AAD
V ,V
 
velocity repulsion
vectors from neighbors and obstacles, respectively.
Let's look in detail at the first component
i
aim
V
of model (1),
which is responsible for moving the UAV to the target. Fig. 1
shows two UAVs and their trajectories from the start point to
the destination point with coordinates (30,10).
Figure 1: The trajectories of the movement of two UAVs
to the target
Pavlo Shchypanskyi et al.,International Journal of Emerging Trends in Engineering Research, 8(4), April 2020, 1302 - 1308
1304
The motion of each UAV in this case is described by a system
of equations:
 
 
 
 
 
1
1
0
0
i
aim aim
i
ii
aim
aim aim
i
i base
i base
x t k d
t x t
z t k d
Vt z t
x x
z z
 
 
 
 
(2)
where
base base base
X x ,zcoordinates of the starting
point;
i i i
X t x t ,z t
current UAV coordinates;
aim aim aim
X x ,z target point
coordinates;
 
 
 
 
2 2
2aim aim i aim i aim
d k x t x z t z   the
current distance between the і-th UAV and point
aim
X;
1 2
aim aim
k ,k the model parameters responsible for the
speed-of-destination module and the deceleration when the
target is reached, respectively.
Dependencies of velocity projections on time according to the
parameters
1 2
aim aim
k ,k are shown in Fig. 2-4.
Figure 2: 5.0k,1k 2aim1aim
Figure 3: 10k,1k 2aim1aim
Figure 4: 10k,2k 2aim1aim
2.3 UAVs Action Forecast
UAV action in a group involves a role distribution. So today,
more and more actions of drone groups are reminiscent of the
actions of groups of people or military formations. Such
groups have their own intelligence, radio-electronic
jamming, impact forces, and others. In this case, the agents
which perform the main task will have sufficient information
about the forces that opposes them. Thus, UAVs will know in
advance the location of the air defense facilities and will be
able to bypass them.
Therefore, we include in the model (1) a fourth component
i
AAD
V
, describing the circumvention of the area of damage by
air defense. Jointly the first and fourth components of the
model give the result shown in Fig. 5. Two UAVs go to the
target bypassing the enemy air defense zones.
Figure 5: The trajectories of the movement of two UAVs to
the target, taking into account the circumvention of enemy air
defense zones
In this case, the model of the UAV movement will look like
i i i
aim AAD
V V V 
 
. The vector of the velocity of repulsion of
UAV ri from the set of zones of enemy air defenses is supplied
by the system of equations:
Pavlo Shchypanskyi et al.,International Journal of Emerging Trends in Engineering Research, 8(4), April 2020, 1302 - 1308
1305
 
nAAD
1
nAAD
1
AAD
AAD
iAAD
P
i
iaia
AAD iAAD
P
i
aia
dx t k
dt
dt x d
Vdz t k
dt
dt z d
 
 
(3)
where nAAD the number of enemy air defense zones;
a a a
X x ,z
– coordinates of the center of the impact area;
 
 
 
 
2 2
a aia i i
d x t x z t z   current distance
between UAV ri and the impact area
a
X
;
AAD AAD
k ,P
model parameters that are responsible for the radius of the
impact area and the rate of repulsion from it.
Components two and three
i i
coh rep
V ,V
 
models (1) provide
flight safety and information coherence for the group at the
same time. The attraction to neighbors does not allow UAV to
exceed the distance of the transmitter dadj, and repulsion –
ensures flight safety by preventing dangerous distance
between neighboring UAVs.
The results of simulation of motion of two UAVs with respect
to joint attraction and repulsion are shown in Fig. 6-8.
Figure 6: The trajectories of motion of two UAVs (r1, r2) to
the target with regard to information coherence dadj <12 and
bypassing obstacles
Figure 7: Projections of UAV velocities r2
Figure 8: The current distance between UAVs r1 and r2
The cohesion and repulsion in model (1) is described by the
following systems of differential equations:
nUAV
1
nUAV
1
coh
coh
i coh
P
i
jijicoh i coh
P
i
jij
dx (t ) k
dt
dt x d
Vdz (t ) k
dt
dt z d
, (4)
nUAV
1
nUAV
1
rep
rep
rep
iP
i
jij
irep rep
iP
i
jij
k
dx (t )
dt
dt x d
Vk
dz (t )
dt
dt z d
 
 
, (5)
where nUAV – number of neighbors;
i j
X ,X
coordinates
of interacting UAVs;
coh coh
k ,P
model parameters
responsible for the distance and speed of cohesion to
neighbors;
rep rep
k ,P
model parameters responsible for
distance and repulsion rate from neighbors;
   
 
   
 
2 2
ij cr i j i j
d k x t x t z t z t
 
    – the
current distance between the i-th and the j-th UAV;
cr
k
model parameter responsible for acceleration in repulsion and
deceleration in cohesion to neighbors;
accidental
measuring error of distances between UAVs ri and rj.
The ability to scale the model is confirmed by the simulation.
The results of application of the group with N = 20 UAVs are
shown in Fig. 9. The start of the UAVs is in the square
(0,0)-(5,5), the target point has coordinates (20,20). At the
30th step of model time, there is a distribution of the group
around the target point, which is approaching to equal
distribution.
Pavlo Shchypanskyi et al.,International Journal of Emerging Trends in Engineering Research, 8(4), April 2020, 1302 - 1308
1306
Figure 9: The trajectories of the movement of twenty UAVs
3. THE MODEL OF MULTI-AGENT AIR DEFENSE
Planning of the air defense deployment is a process that
requires consideration of many factors, including terrain, type
of enemy attack, enemy purposes, air raids, trajectory of
enemy's flight and air defense tactics, intelligence capabilities
etc. In the case of counteracting a group of small UAVs for air
defense of an important infrastructural object, the topology of
the air defense fascilities on the terrain will be extremely
important. The specific position of every counter mean must
take into account the particularities of the object itself and the
surrounding area.
In short, the problem of planning the air defense of an
infrastructure object is the correct deployment of a certain
amount of air defense fascilities in optimally selected
locations around the designated area on the ground. Attack
and defense are two aspects of one problem, this is why the
multiagent attack model should provide a similar multiagent
air defense model.
The article assumes that the object is protected by a system
that includes:
- air defense missile and artillery complexes including fully
automated turrets with motion detection [18];
- radar stations;
- control point of the air defense system.
In this case, each element of the air defense system can be
characterized by different performance indicators, in
particular:
- effective range of impact dt, wherein t is the number of the
type of a separate air defense system;
- the average probability of impact for the defense system st.
3.1 Model of Deployment of Air Defense System
Facilities
Elements of an object's air defense system can be placed at
several predefined deployment points. The set of possible
deployment points is determined in advance based on prior
information (reconnaissance). The following features are
taken into account in this process:
- parameters of the terrain around each deployment point;
- engineering infrastructure of the area.
Only one element of air defense system can be deployed at any
single deployment point from D set of all possible
deployment points.
3.2 Model of Interaction of UAV Agents with Air Defense
Agents
The content of the air defense plan for an infrastructure object
should include measures to counteract the UAV group air
raid. Applying a multi-agent approach, let's determine that a
separate air defense (missile or artillery) unit must be
assigned to each unit of attack (UAV). Thus, the overall
operation of the system can be described as the interaction of
UAV agents with agents of the air defense system.
Choosing the best deployment points for a defined number of
air defense means selecting pairs that include:
(1) the deployment point number of the air defense facility
from the set of valid deployment points and
(2) the number of air defense facility type assigned to that
deployment point that maximizes a specific function of the
performance criterion (evaluation).
To evaluate the effectiveness of the assignment, it is assumed
that this evaluation function must consider two factors:
- potential air defense deployment points should be selected so
that the distance from the point to the center of the object
being defended is maximized (the earlier the enemy's air
target is impacted, the less likely the mission's success is for
that air target; moreover, it is possible to hit the air target
repeatedly);
- the choice of the specific point of deployment of the air
defense facility must take into account the effectiveness of the
air target hit by the air defense facility;
- the choice of deployment points for air defense facilities
should take into account the expected distribution of the
attack probability, that is, the uneven appearance of UAVs in
different areas on the approaches to the object.
The following function, which selects a pair (the point of
deployment of the air defense facility and the specific air
defense facility), meets these requirements:
Pavlo Shchypanskyi et al.,International Journal of Emerging Trends in Engineering Research, 8(4), April 2020, 1302 - 1308
1307
 
 
1
; ; 0; 1 ;
; 1 ;
1
N
t n jnt jnt n
n
jnt
s p z z p n ,N
d j,t
n ,N z .
j D, t ,T .
 
  
 
(6)
where zjnt indicator of combat ability (zjnt = 1, if there is a
possibility of targets impact in a certain area and zjnt= –
otherwise); pn – the probability of hitting by the enemy from п
direction (the UAV agent is in the zone п); stefficiency
(probability of impact) of the system t; Nthe total number of
impact areas by UAVs.
The choice of the best points for the deployment of air defense
facilities, is based on optimization by the matrix of
assignments jt
J T
V v
 
  , the elements of which have the
following meaning:
0 air defense mean is not assigned to point
1 air defensemean is assignedto point
jt
, t j;
v, t j.
(7)
The solution to the problem is to find some matrix
*jt
J T
V v
 
  , which maximizes function
 
 
1
T
* *
jt
j Dt
f V v d j,t
 
  . (8)
3.3 An Algorithm for Selecting the Best Points to Deploy
To solve the optimization problem (8), we propose the
following algorithm for deploying air defense facilities to
cover an important infrastructure object.
1. Determining the center of the defense area of an important
object S.
2. Modeling UAV routes and identifying the most vulnerable
areas of attack (formulas (2)–(5)).
3. Identification of potential UAV meeting areas by means of
air defense.
4. Determination of allowable deployment points for air
defense equipment.
5. Determination of effective defeat points for air targets by
air defense means of specific types deployed at those points
where impact of air targets is possible (zjnt = 1).
6. Determining the value of the evaluation function d(j,t) for
the following admissible pairs: the admissible points of
deployment of the means and the number of the type of means
of air defense in accordance with formula (6).
7. Selecting the best deployment points according to the
formula (8).
3.4 An Example of Multi-Agent Interaction of Air Defense
with UAVs
To evaluate the capabilities of the multi-agent approach, we
will perform simulations according to the already considered
example (Fig. 9). The results of the application of the group of
N = 20 UAVs and T = 8 air defense systems for an object
defense are shown in Fig. 10.
Figure 10: Results of air defense modeling
The start of the UAV is still in the square (0,0) (5,5), the
target point has the coordinates (20,20). At the 30th step of
model time, there is a distribution of a group around a target
surrounded by air defenses located at points with coordinates:
(18,18), (18,20), (18,21), (20,22), (22, 21), (20,18), (21,21),
selected by the optimization algorithm.
This demonstrates the possibility of a multi-agent approach to
planning the air defense of infrastructure. The advantage of
the method is that iterations can investigate a significant
number of attack options and, accordingly, choose the optimal
distribution of air defense to repel the attack.
4. CONCLUSION
Increasing complexity of modern UAVs has led them to be
increasingly used by terrorist groups for illegal activities. The
general problem of planning the air cover of an important
infrastructure object is the need to anticipate the actions of the
UAV group in the area of the object. Air defense planning is
based on the optimal deployment of air strikes against terrain.
The use of a multi-agent approach makes it possible to
determine the most feasible option for deploying air defense
in pre-selected potential positions. Thus, on the basis of the
multi-agent approach, the technique of forming a plan for air
cover of a critical infrastructure object from a group of
unmanned aerial vehicles is implemented.
Pavlo Shchypanskyi et al.,International Journal of Emerging Trends in Engineering Research, 8(4), April 2020, 1302 - 1308
1308
REFERENCES
1. K. Wigglesworth. Combat drones: from the fight against
terrorism to strikes at oil plants, RTVi, September 2019.
https://rtvi.com/stories/boevye-drony-uzhe-povsyudu/
2. N. S. Volgin. Research of operations. Part 1;
St. Petersburg, Naval Academy: 1999. 366 р.
3. C. W. Reynolds. Flocks, herds and schools: A
distributed behavioral model, ACM SIGGRAPH
Computer Graphics, Vol. 21 (4), pp. 25-34, 1987.
https://doi.org/10.1145/37402.37406
4. I. A. Kalyaev, A. R. Gayduk, S. G. Kapustyan. Models
and Algorithms of Collective Control in Robotic Groups,
Moscow: Fizmatlit, 2009. 280 p.
5. V. Savchenko, V. Akhramovych, A. Tushych, I. Sribna,
I. Vlasov. Analysis of Social Network Parameters and
the Likelihood of its Construction. International
Journal of Emerging Trends in Engineering Research.
Volume 8, No. 2 February 2020. 271-276.
https://doi.org/10.30534/ijeter/2020/05822020
6. P. Madhuravani, K. Yamini, T. Nirmala. Large Scale
Community Discovery of Complex Networks Based
On Approximate Optimization. International Journal
of Emerging Trends in Engineering Research. Volume 7,
No. 9 September 2019. 306-310.
https://doi.org/10.30534/ijeter/2019/13792019
7. Ya. I. Petrikevich. Linear control Algorithms of
Multyagent Group Geometric Structure, Upravlenie
bolshimi sistemami. Spetsialnyiy vyipusk 30.1 “Setevyie
modeli v upravlenii”. Moscow: IPU RAN, 2010. pp.
665-680.
8. V. O. Korepanov, D. A. Novikov. Diffuse Bomb Task,
Problemyi upravleniya. Upravlenie podvizhnyimi
ob'ektami i navigatsiya. Moscow: SenSiDat-Kontrol,
2011. Vol. 5. pp. 66-73.
9. V. A. Savchenko. Model of Search Agent Motion at
Coordinated Control, Sistemi obrobki informatsiyi.
Harkiv: HU PS, 2011. Vol. 4 (94). pp. 278-280.
10. O. Martyniuk. The Model of Group Coordinated
Motion of Unmanned Aerial Vehicles, Modern
Information Technologies in the Sphere of Security and
Defence. № 1 (25), 2016. pp. 78-81.
11. Techniques for Combined Arms for Air Defense. Field
Manual ATP 3-01.8. Headquarters Department of the
Army Washington, DC, 29 July, 2016. 68 p.
12. Countering Air and Missile Threats. Joint Publication
3-01. 21 April 2017, Validated 02 May 2018. 169 р.
13. J. Bronk. Modern Russian and Chinese Integrated Air
Defence Systems The Nature of the Threat, Growth
Trajectory and Western Options. RUSI Occasional
Paper, January 2020. Royal United Services Institute.
2020. 40 р.
14. B. Ozkan, N. C. Rowe, S. H. Calfee, E. H. John. Three
Simulation Models of Naval Air Defense.
http://www.dodccrp.org/events/10th_ICCRTS/CD/papers
/194.pdf
15. C. J. Lynch, S. Y. Diallo, A. Tolk. Representing the
ballistic missile defense system using agent-based
modeling, SCS Spring Simulation Multi-Conference
2013, Military Modeling and Simulation (MMS). San
Diego, CA, April 8-10, 2013.
https://www.researchgate.net/publication/262355023_Re
presenting_the_ballistic_missile_defense_system_using_
agent-based_modeling
16. A. R. Benaskeur, F. Kabanza, E. Beaudry. CORALS: A
Real-Time Planner for Anti-Air Defence Operations,
ACM Transactions on Computational Logic, Vol. X, No.
Y, N, 2010, pp. 1-20.
https://doi.org/10.1145/1869397.1869402
17. T. Pietkiewicz, A. Kawalec, B. Wajszczyk, M. Szugajew.
Air defense planning for an area with the use of very
short range air defense sets. Biuletyn Wat, Vol. lXVi, nr
4, 2017. рp. 121-141.
https://doi.org/10.5604/01.3001.0010.8227
18. H. M. A. Adriano, D. A. Reyes, K. J. B. Tan, D. D.
Zagada, R. C. Gustilo. Defensive Turret with Fully
Automated Motion Detection Using Infrared
Technology. International Journal of Emerging Trends in
Engineering Research. Volume 7, No. 9 September 2019.
pp. 239-246.
https://doi.org/10.30534/ijeter/2019/05792019
... It is known from the experience of last local wars and the anti-terrorist operation and the Joint Forces operation that small UAVs in most cases were not detected by the available means of radar of the radar troops [2]- [5], [9], which form the basis of the air defence information subsystem. The following problems significantly reduce the effectiveness of the using of radar troops [10]- [16]: -the radar air surveillance system is not able to provide guaranteed detection and maintenance of the air object in general and inconspicuous objects in particular; -deficiency of sufficient number of new and modernized samples of electronic equipment, means of automation of collection, processing and issuance of radar information in radio engineering units to provide information about the air object at low and extremely low altitudes, and others. ...
... At the same time, the radio engineering units are armed with a large number of two-coordinate survey radars of the "old" P-18 fleet. These radars are not able to detect modern inconspicuous air object with the specified quality indicators [2]- [3], [5]. ...
... Це вимагає перепланування польоту БПЛА в автоматичному режимі, що є складним завданням. Результати робіт [11,12] вимагають створення відповідної методики визначення оптимального маршруту польоту БПЛА з урахуванням наявності на маршруті "зон небезпеки". ...
Chapter
Full-text available
У колективній наукові й монографіı̈ дослідники розглядають методи рішення багатовимірних задач оптимального синтезу та застосування паралельних обчислювальних структур; оптимальні маршрути польоту безпілотного літального апарату та області й ого застосування; аналізують шляхи удосконалення системи логістичного забезпечення повітряних сил Зброй них Сил Украı̈ни; досліджують методи підтримки прий няття управлінських рішень при проведенні земельно-кадастрових робіт та автоматизовану систему моніторингу міського середовища; здійснюють аналіз методів підвищення довговічності деталей насосів та проведення ремонтних робіт на автомагістралях; аналізують перспективи удосконалення фізично ı̈ підготовки майбутніх офіцерів.
... The age of Lamongan Gresik roads decreased to 4.93 years. Another impact of overloaded vehicles is the tensile strain of 292.4 and compressive strain of 322.2 micro strains (based program KENPAVE) that can reduce pavement design life of up to 96.78% to 96.85% and the cracking criterion to criterion groove.Extending the reference, the interaction on vehicle and impact and impact itself can be found in [7], [8], and [9]. ...
... The main approach in this case was to maintain a given topology of the agent group. The problem of agent connectivity is also considered in [10], where the problem of planning the work of a group of autonomous agents in the protection of an important object is solved. In addition, in [11] a group of connected agents solves the problem of finding hidden transmitters. ...
... Thus, in the article of O. Permyakov et al. [6] investigates a model of drone group motion for formation of a sertain structure with local self-coordination between agents. In articles of Chenxi Huang et al. [7] and P. Shchypansky et al. [8] the coordinated movement of drones to a specific object, which is given by the probability field is considered. The approach based on probabilistic fields is developed in the work of Steven R. Hansen [9] and is quite effective. ...
... According to an analysis of network-centred wars, local military conflicts and operations in the eastern part of Ukraine, the main trends in the development of new means of air attack are the growing intensity of the use of small-sized aircrafts, usually unmanned aerial vehicles (UAVs) [1]- [2], [9]- [10]. ...
Article
Визначаються і обґрунтовуються способи і тактичні прийоми застосування безпілотних авіаційних комплексів першого класу на основі аналізу досвіду сучасних збройних конфліктів та з урахуванням досвіду ведення бойових дій на території України. Розробляються рекомендації органам управління військових формувань тактичного рівня, які безпосередньо ведуть бойові дії, щодо вибору способів та тактичних прийомів застосування екіпажів (підрозділів) безпілотних авіаційних комплексів в залежності від ситуації, що склалася або прогнозується. Визначається роль і місце повітряної розвідки безпілотними літальними апаратами в системі повітряної розвідки “космічні засоби розвідки – пілотована авіація – безпілотна авіація” та аналізуються її особливості. Досліджуються можливості трансформації відомих способів бойових дій пілотованої авіації в умовах виконання завдань безпілотними літальними апаратами першого класу при сучасному стані середовища збройних конфліктів і війн. Аналізуються можливі сценарії дій сторін збройного протистояння, обґрунтовуються пріоритетні завдання повітряної розвідки за сценаріями, оцінюються можливості щодо виконання завдань безпілотними авіаційними комплексами першого класу, які стоять на озброєнні Збройних Сил України. Розробляються рекомендації щодо розподілу повноважень між командирами військових формувань і командирами екіпажів безпілотних авіаційних комплексів при плануванні застосування комплексів. Визначаються умови, за яких безпілотні авіаційні комплекси першого класу можуть виконувати завдання вогневого ураження об’єктів противника в тактичній глибині.
Chapter
This paper presents the model of reconnaissance of the area of interest performed by a swarm of cooperative Unmanned Aerial Vehicles. The reconnaissance operation of the area may be conducted in a complex environment in which obstacles and/or terrain may block the line of sight from sensors and, thus, occlude some parts of the area. Also, the no-fly zones can be defined where no vehicle is permitted at any time of the operation. The model focuses on planning trajectories of all the vehicles in the swarm in such a way that the vehicles avoid the no-fly zones, the sensors of the vehicles explore as large area as possible during the operation and, at the same time, the operation is performed as quickly as possible. Exact and stochastic (metaheuristic) algorithms are proposed to find a solution to the task at hand. A set of experimental tasks, based on the real military reconnaissance scenarios, is proposed to verify the presented model and algorithms.
Article
Full-text available
У статті проведений аналіз застосування безпілотних літальних апаратів у Вірмено-Азербайджанському конфлікті. Розглянуто співвідношення безпілотних літальних апаратів сторін конфлікту. Визначено основні об’єкти ударів, які призначалися ударним безпілотним літальним апаратам та дронам-камікадзе, а також тактичні прийоми і способи їх застосування. Проведено аналіз ефективності застосування безпілотних літальних апаратів Bayraktar TB2. Проаналізовано слабкі та сильні сторони застосування безпілотних літальних апаратів у сучасних збройних конфліктах, їх роль і місце у сучасних операціях. Виділено основні напрями удосконалення форм і способів бойового застосування повітряної компоненти, які необхідно вивчати та впроваджувати у діяльність Повітряних Сил Збройних Сил України. Ключові слова: безпілотні літальні апарати, дрони-камікадзе, Нагірний Карабах, симбіотичне застосування, рій безпілотників, спільне застосування пілотованої та безпілотної авіації.
Article
Full-text available
The article represents the model of coordinated motion of unmanned aerial vehicles (UAV), which describes the laws of individual UAV motion built on systems of the first order differential equations. The movement of the UAV takes place in a potential field formed by the attraction-repulsion. The potential field makes each agent go to goals and repel obstacles. Assumed that each UAV receives information from onboard sensors about the location of the nearest neighbors, obstacles and goals. Based on this information, the UAV plans its own trajectory, thereby realizing the idea of decentralized management. The model allows to maintain the assigned distance between adjacent UAV that will provide information connectivity within the operating range of onboard low-power transmitters. The model takes into account the enemy resistance and can be detailed with extra submodels, such us model of wind gusts or leader-following motion.
Article
Full-text available
This paper presents a heuristic method of planning the deployment of very short-range anti-air missile and artillery sets (VSHORAD) around an area ('protected area') in order to protect it. A function dependent on the distance between the earliest feasible points of destroying targets and the centre of the protected area was taken as an objective function. This is a different indicator from those commonly used in the literature, and based on the likelihood of a defense zone penetration by means of an air attack (MAA): the kill probability of the MAA and the probability of area losses. The model constraints resulted directly from the restrictions imposed by real air defense systems and the nature of the area being defended. This paper assumes that the VSHORAD system operates as a part of a general, superordinate air defense command and control system based on the idea of network-centric warfare, which provides the VSHORAD system with air intelligence, air defense plans, and combat mission specifications. The presented method has been implemented. The final part of the paper presents the computational results. Keywords: optimal planning, air defense system, area installation protection, deployment of very short range anti-air missile and artillery sets (VSHORAD)
Article
Full-text available
Forces involved in modern conflicts may be exposed to a variety of threats, including coordinated raids of advanced ballistic and cruise missiles. To respond to these, a defending force will rely on a set of combat resources. Determining an efficient allocation and coordinated use of these resources, particularly in the case of multiple simultaneous attacks, is a very complex decision-making process in which a huge amount of data must be dealt with under uncertainty and time pressure. This article presents CORALS (COmbat Resource ALlocation Support), a real-time planner developed to support the command team of a naval force defending against multiple simultaneous threats. In response to such multiple threats, CORALS uses a local planner to generate a set of local plans, one for each threat considered apart, and then combines and coordinates them into a single optimized, conflict-free global plan. The coordination is performed through an iterative process of plan merging and conflict detection and resolution, which acts as a plan repair mechanism. Such an incremental plan repair approach also allows adapting previously generated plans to account for dynamic changes in the tactical situation.
Combat drones: from the fight against terrorism to strikes at oil plants, RTVi
  • K Wigglesworth
K. Wigglesworth. Combat drones: from the fight against terrorism to strikes at oil plants, RTVi, September 2019. https://rtvi.com/stories/boevye-drony-uzhe-povsyudu/
Research of operations
  • N S Volgin
N. S. Volgin. Research of operations. Part 1;
Models and Algorithms of Collective Control in Robotic Groups
  • I A Kalyaev
  • A R Gayduk
  • S G Kapustyan
I. A. Kalyaev, A. R. Gayduk, S. G. Kapustyan. Models and Algorithms of Collective Control in Robotic Groups, Moscow: Fizmatlit, 2009. 280 p.
Linear control Algorithms of Multyagent Group Geometric Structure, Upravlenie bolshimi sistemami. Spetsialnyiy vyipusk 30.1 "Setevyie modeli v upravlenii
  • . I Ya
  • Petrikevich
Ya. I. Petrikevich. Linear control Algorithms of Multyagent Group Geometric Structure, Upravlenie bolshimi sistemami. Spetsialnyiy vyipusk 30.1 "Setevyie modeli v upravlenii". Moscow: IPU RAN, 2010. pp. 665-680.