Research Article

Rapid Penetration Path Planning Method for Stealth UAV in Complex Environment with BB Threats

Table 6

The geographical location and types of threat sources in the third threat scenario.

ThreatGeographic locations (km)Type

Threat module 1(7,22)Known threat
Threat module 2(15,30)Known threat
Threat module 3(40,20)Known threat
Threat module 4(26,35)Known threat
Threat module 5(37,40)Known threat
Threat module 6(44,30)Known threat
Threat module 7(12,40)Known threat
Threat module 8(42,12)Known threat
Threat module 9T (33,13), R (15,13)Known threat
Threat module 10(30,25)BB threat
Threat module 11(20,42)BB threat
Threat module 12(33,43)BB threat