Distributed Solving of Weapon Target Assignment Problem using Learning Automata
Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 1
Abstract
This article presents a method to solve the weapon target assignment problem, which is one of the problems of distributed constraint optimization. The previous methods do not guarantee the convergence problem properly and when faced with scale increase, they do not work correctly and effectively. Also, some of these methods solve the weapon target assignment problem in a centralized manner. While the method presented in this article solves the problem in a decentralized and distributed manner with better "accuracy" and "speed".The present article solves the weapon target assignment problem by using learning automata, which is a relatively simple method and requires little information, and the results of implementations show that when the scale of the problem becomes larger, the proposed method it solves the problem with a better speed than other methods, so that the objective function is minimized. Also, this method can well address the shortcomings of previous methods without the need for other exploratory methods in real-time multi-agent environments.
Authors and Affiliations
Maryam Shokoohi,
A Trust Evaluation Model for Cloud Computing Using Bayesian Network
In recent years, cloud computing has attracted much attention as a new computing model for providing infrastructure, platform, and software as a service. There is an important challenge in trust management between cloud...
Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks
Accurate timing is one of the key features of the Global Positioning System (GPS), which is employed in many critical infrastructures. Any imprecise time measurement in GPS-based structures, such as smart power grids, an...
Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications
Nowadays, Android-based devices such as smart phones, tablets, and recently virtual reality headsets have found increasing usage in our daily lives. Along with the development of software for these devices, new malicious...
Improve the detection of dangerous objects in x-ray images in security and military inspections using image processing approaches
Detection of dangerous objects in images obtained by X-ray scanners in security inspections has played an important role in protecting the public space from security threats such as terrorism and the occurrence of danger...
The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator
Recently, the radio frequency fingerprint (RFF) has received attention in applications such as specific emiiter identification, detection of deception in navigation signals and detection of intrusion in wireless networks...