Research Article
Rapid Penetration Path Planning Method for Stealth UAV in Complex Environment with BB Threats
Table 6
The geographical location and types of threat sources in the third threat scenario.
| Threat | Geographic locations (km) | Type |
| Threat module 1 | (7,22) | Known threat | Threat module 2 | (15,30) | Known threat | Threat module 3 | (40,20) | Known threat | Threat module 4 | (26,35) | Known threat | Threat module 5 | (37,40) | Known threat | Threat module 6 | (44,30) | Known threat | Threat module 7 | (12,40) | Known threat | Threat module 8 | (42,12) | Known threat | Threat module 9 | T (33,13), R (15,13) | Known threat | Threat module 10 | (30,25) | BB threat | Threat module 11 | (20,42) | BB threat | Threat module 12 | (33,43) | BB threat |
|
|