Research Article
Rapid Penetration Path Planning Method for Stealth UAV in Complex Environment with BB Threats
Table 4
The geographical location and types of threat sources in the second threat scenario.
| Threat | Geographic locations (km) | Type |
| Threat module 1 | (15,10) | Known threat | Threat module 2 | (15,20) | Known threat | Threat module 3 | (40,25) | Known threat | Threat module 4 | (30,35) | Known threat | Threat module 5 | T (38,15), R (23,15) | Known threat | Threat module 6 | (20,30) | BB threat | Threat module 7 | (37,40) | BB threat |
|
|