Research Article  Open Access
Chao Wang, Guangyuan Fu, Daqiao Zhang, Hongqiao Wang, Jiufen Zhao, "Genetic AlgorithmBased Variable Value Control Method for Solving the Ground Target Attacking WeaponTarget Allocation Problem", Mathematical Problems in Engineering, vol. 2019, Article ID 6761073, 9 pages, 2019. https://doi.org/10.1155/2019/6761073
Genetic AlgorithmBased Variable Value Control Method for Solving the Ground Target Attacking WeaponTarget Allocation Problem
Abstract
Key ground targets and ground target attacking weapon types are complex and diverse; thus, the weapontarget allocation (WTA) problem has long been a great challenge but has not yet been adequately addressed. A timely and reasonable WTA scheme not only helps to seize a fleeting combat opportunity but also optimizes the use of weaponry resources to achieve maximum battlefield benefits at the lowest cost. In this study, we constructed a ground target attacking WTA (GTAWTA) model and designed a genetic algorithmbased variable value control method to address the issue that some intelligent algorithms are too slow in resolving the problem of GTAWTA due to the large scale of the problem or are unable to obtain a feasible solution. The proposed method narrows the search space and improves the search efficiency by constraining and controlling the variable value range of the individuals in the initial population and ensures the quality of the solution by improving the mutation strategy to expand the range of variables. The simulation results show that the improved genetic algorithm (GA) can effectively solve the largescale GTAWTA problem with good performance.
1. Introduction
WTA [1–5] is a critical link in the operational command that directly affects the operational process and outcome and is thus an important military issue that has attracted the attention of military powers worldwide. Many achievements have been made in the study of WTA, mostly regarding the study of air defense WTA (ADWTA), which addresses air defense interception [3–15], whereas the GTAWTA problem, which addresses ground targets, has rarely been studied [16–18]. Compared with air defense interception, ground targets are diverse and suitable for many weaponry types, so the scale and complexity of the WTA problem are greater, requiring the use of more efficient algorithms. The use of superior firepower against key enemy ground targets is an important means to quickly win a war. In recent local wars, the US military greatly weakened the enemy combat forces and quickly won the war by attacking and destroying numerous key enemy ground targets. The combating opportunity is fleeting, and weaponry resources are limited, so the failure to quickly and appropriately allocate weaponry resources may cause not only a waste of weapons but also missed combat opportunity. Therefore, it is necessary and imperative to study the GTAWTA problem and design a highly efficient optimization algorithm.
Regarding the study of the algorithm, based on the genetic algorithm, Yang Shanliang [9] solved the ADWTA problem very well by optimizing the initial population coding mechanism and adopting elite selection and the improved algorithm of dynamic genetic operators. Zhang Jiao [12] proposed a particle coding scheme that specifically addresses the multiconstraint ADWTA problem and the fitness function of the model, solved the problem of initializing the integer domain of the particles, and improved the iteration efficiency and the optimization capability of the particle swarm optimization (PSO) algorithm. Liu Shuangshuang [17] proposed an improved bat algorithm that integrates the thinking of niche elimination for the GTAWTA problem, which improved the quality of the solution but failed to effectively improve the computational efficiency. Wang Shunhong [18] improved the particle initialization and weight coefficient selection methods of the PSO algorithm, which improved the computational efficiency and the solution quality, but used a fixed number of iterations as a stage when decreasing the weighting coefficient while not considering the scale of the problem and the quality of the solution at each stage, making the method suitable only for the GTAWTA problem on a specific scale.
The GTAWTA problem is vastly different from the ADWTA problem. In the latter case, the types and quantities of the weapons used to intercept air targets are limited, as are those of the target, and the number of weapons used to intercept a single airborne target is usually one or two. Thus, the destruction of the target by the weapon belongs to the 01 destruction; it is unnecessary to consider the cumulative damage effect on the target by each weapon, and the optimization principle is that the lower the loss of weaponry resources or the lower the number of remaining enemy targets is, the better [3]. However, in the GTAWTA problem, the types and number of ground targets are plentiful, and the types and quantities of the attacking weapons are also plentiful; because of the complexity of ground targets, a large weaponry quantity is often used to strike a single ground target, and as the weapons are hitting the target, the cumulative damage effect needs to be considered, in which the optimization principle is to meet the expected target destruction requirement with the minimum weapon consumption value. Thus, the computational scale and the solution space of the GTAWTA problem are much greater than those of the ADWTA problem, making it difficult for the existing methods for solving the ADWTA problem to meet the needs of solving the GTAWTA problem. The existing solutions to the GTAWTA problem have an array of issues, such as a too long algorithm search time or a solution meeting the constraints being unobtainable because the number of dimensions is too large, which are not allowed in the actual combat plan and decision. Therefore, it is necessary to design a new method to solve the GTAWTA problem.
In this study, to obtain the solution to the GTAWTA problem, we constructed an GTAWTA model and proposed a genetic algorithmbased variable value control method in which the concept of damage contribution is first defined; then, the damage contribution is used to restrain the amount of each type of weapon when striking each target, and the total weapon amount when striking a single target is minimized to decrease the variable initialization space and rationalize the variable value to expedite the search for feasible solutions. Then, the variation range of the variables is expanded, and the mutation strategy is changed to eliminate the problem of missing solution space caused by the narrowing of the variable value range and expedite the convergence of the algorithm. Finally, a simulation and a comparison of examples were performed to verify the correctness and superiority of the proposed method.
The remainder of this paper is organized as follows. In Section 2, the process of the GTAWTA is analyzed and the GTAWTA mode is constructed based on some assumptions. In Section 3, a variable control method for GA is proposed and its feasibility is analyzed. The results of employing different algorithms to solve the GTAWTA problems are presented and analyzed in Section 4. Section 5 concludes this paper.
2. GTAWTA Problem
2.1. Process of GTAWTA
The GTAWTA mainly includes two stages. The first stage is the weapon and target matching, that is, analyzing whether the damage mechanism and guidance of weapons are applicable, and the targets can be covered under the attack distance of weapons, and the environment around the target meets the attack conditions of weapons, then selecting weapons suitable for combating targets. The second stage is allocation optimization, that is, comprehensively considering the total amount of weapons and then assigning appropriate weapons to the targets in an optimal costeffective ratio to achieve the desired damage for all targets.
2.2. GTAWTA Model
There are many factors involved in the weapon and target matching stage, and the analysis is very complicated, but the results are only “suitable” or “not suitable” which is no need to optimize. Therefore, the GTAWTA model is mainly designed for the allocation optimization stage. To correctly construct the GTAWTA model, the following assumptions are made:(1)The damage probability of a weapon for the target is a comprehensive damage probability, considering the weapon’s penetration probability, target hit probability, target damage probability, etc.(2)The comprehensive damage probabilities of weapons of the same type are identical.(3)The sequence of a target strike and the maximum projection ability of a wave of strikes are not considered.
Based on the above assumptions, the GTAWTA problem can be described as follows: types of weapons are used to attack types of ground targets, and the damage coefficients of the types of ground targets are . The quantities of the types of weapons are , with values of , respectively; the quantities of the types of ground targets are , respectively, and the comprehensive damage probability of the type of weapon against the type of target is ==. The optimal WTA scheme is to use a minimal weapon consumption value to meet the target damage requirement. Assuming that the number of the type of weapon against the target of the type of target is =, and the weapon consumption value is , the GTAWTA model is as follows:
3. Variable Value Control Method of GA
The basic idea of GA is derived from genetic evolution of biology, simulating the evolution process of the survival of the fittest in natural biological group which can effectively deal with various optimization problems [19], and its improved algorithm has been widely used in WTA problem. The genetic evolution of biological population begins with the initial population whose pros and cons directly affect the speed and direction of individual evolution, and the initial population of GA will soon evolve into the optimal individual if it is relatively close to the optimal individual. Therefore, we can design a variable value control method for GA which effectively improves the quality and computational efficiency of the solution by controlling the value range of variables to let initial population individuals be generated in the feasible solution space.
3.1. Significance of the Variable Value Control
The GTAWTA problem is an NPcomplete problem [20] in which the algorithm search space increases exponentially with the number of variables or the expansion of the range of variable values. In the GTAWTA problem, the number of variables is fixed and unchangeable, with a value of the product of the number of weapon types and the number of targets; however, the value range of the variables is uncertain because the GTAWTA generally does not limit the amount of each type of weapon used on each target but only limits the available amount of each type of weapon. Thus, in solving the problem, the weapon usage range, which is used as the value range of the variables, is uncertain and changeable. If the value range of the variables is not controlled, i.e., the quantity of each weapon type is taken as the upper bound of the value range of the variables, then the number of WTA schemes generated within the search space will be extremely large.
We assume that there are types of weapons, with quantities of , and types of targets, with quantities of . If the quantity of each weapon type is taken as the upper bound of the variables, then the weapon amount () of the type of weapon used to strike any target of the type of target isAs shown in formula (3), when striking the type of target with the type of weapon, the variables can have +1 possible values.
For the type of target, when the types of weapons strike the target, there are variables, which can be viewed as a vector, and, then, in the search space formed by the value range of the variables, the number of vectors () that can be generated isWhen the types of weapons strike all the targets of the type of target, there are NM_{j} variables, and, then, in the search space formed by the value range of the variables, the number of vectors () that can be generated isWhen the types of weapons strike all the targets of types of targets, there are variables, and, then, in the search space formed by the value range of the variables, the number of vectors () that can be generated isIn formula (6), the value of (the number of vectors) is the number of all possible WTA schemes when types of weapons strike all the targets of types of targets.
As shown in formula (6), as the value range of the variables expands, the number of GTAWTA schemes increases drastically. However, the number of feasible solutions for the GTAWTA problem is fixed and only accounts for a small portion of the total WTA schemes. In addition, most of the feasible solutions are distributed in a certain region of the search space, and the distribution region and the number of feasible solutions are not affected by the value range of the variables. Therefore, if the search space can be sharply reduced while still containing the space in which the feasible solutions are located, then a fast search of feasible solutions is then ensured.
For example, if 49 weapons of the same type strike 10 targets of the same type and if the total amount of weapons is taken as the upper bound of the value range of the variables, then =49 and =10, and, based on formula (6), the number of WTA schemes () isIf the value range of the variables is controlled and the upper value limit of the variables is 9, then =9 and =10, and, based on formula (6), the number of WTA schemes () isFrom the number of WTA schemes ( and ) solved using formulas (7) and (8), the ratio (α) of WTA schemes within the search space without the control of the value range of the variables to that within the search space with the control of the value range of the variables isObviously, after reducing the upper bound of the value range of the variables, the search space is sharply reduced, and the number of WTA schemes within the search space is also drastically reduced. In addition, the value range of the variables after the reduction is generally reasonable, and the search space formed by the value range of the variables can contain the space of the vast majority of feasible solutions, indicating that the reasonable control of the value range of the variables can ensure a fast search for feasible solutions.
3.2. Determining the Value Range Based on the Damage Contribution
Variable value control method improves the search efficiency by performing a series of operations on the variable value range, that is, narrowing the algorithm search space in the initialization process of GA to shorten the calculating time and amplifying the variable value range in the mutation process to ensure have a reasonable result. For GA to solve the GTAWTA problem, the variable is the number of each type of weapon acting on each target, and the variable value range is the number of intervals that each type of weapon may act on each target. Variable value control method consists of three parts: one is to constrain the maximum number of weapons acting on each target; the other is to limit the total amount of weapons acting on each target; the third is to expand the variable variation interval and change the mutation strategy.
For the same target, ammunitions are usually used for striking to achieve the expected damage effectiveness. For the same type of ammunition, as the target is being damaged, each ammunition contributes different damage values, which can be called the damage contribution, denoted . If the damage probability of the type of ammunition against the type of target is , then the damage contribution of the ammunition () isThe ratio of the damage contribution of the ammunition to the value of the ammunition is defined as the damage contribution per unit value, denoted as . If the value of the type of ammunition is , thenObviously, for the same target, when choosing ammunition, the higher the damage contribution per unit value is, the more appropriate the ammunition type is.
3.2.1. Constraining the Quantity of Each Type of Weapon against Each Target
When striking the same target, the quantity of weapons is limited, and the use of a large quantity of weapons to strike the same target is generally avoided. According to formula (10), the greater the quantity () of weapons used in the strike is, the lower its damage contribution () will be, which gradually approaches 0. When approaches 0, it indicates that the strike with the weapon on the target essentially causes no damage, and the strike with the type of weapon against the type of target should be stopped; at this time, the quantity of weapons consumed can be viewed as the upper bound of the weapon quantity range of the type of weapon against each of the type of target. Assuming that when the value of is less than the preset minimal damage contribution () of a given weapon for the type of target, the strike on the target is stopped and then must satisfyThus, under the constraint of the damage contribution, the upper bound () of the weapon quantity range of the type of weapon against the type of target isThe value of depends on the damage contribution value ; the lower the value of is, the higher the value of will be, which can even be higher than the weapon quantity () required for the type of weapon to destroy the type single target. Moreover, if the weapon quantity exceeds , it is deemed excessive use, and the value needs to be decreased. If the damage requirement for the type of target is , then satisfiesTo prevent the value of from exceeding due to an undersized , under the constraint of , the value of is
3.2.2. Constraining the Total Number of Weapons against Each Target
Different types of weapons lead to varying damage probabilities, but there is the situation in which multiple types of weapons are suitable for attacking the same target. In this case, in the population initialization of GA, each type of applicable weapon is randomly given a quantity to be used to strike against the target, which is very unlikely to be 0, so the number of weapons used to strike the target may be too large, resulting in the expenditure of a large amount of time in the subsequent optimization process to lower the number into a reasonable range. Obviously, the total number of weapons for a certain target of the type of target should not exceed the upper bound of the weapon usage range that causes the minimal damage probability on the type of target. If there are types of ammunition suitable for striking the type of target, then the maximum value () of the total number of weapons used to strike the type of target isAfter the maximum value () of the total number of the weapons for striking the target is determined, it is necessary to process the quantities of types of weapon used to strike the target () in the algorithm to make it satisfy
3.3. Amplifying the Value Range of Variables through Directional Variation
The value range of individual variable in the population becomes smaller by constraining the number of weapons acting on each target and the total number of weapons acting on each target, and this variable value range constraint is generally reasonable. But when the damage probability of a certain type of weapon for a certain type of target is low, the number of weapons used to strike a single target of that target type under the constraint may not be sufficient to achieve the required level of damage, resulting in no feasible solutions within the constrained value range. Assuming that the type of weapon is used to strike against the type of target, the maximum number () of the type of weapon for each type of target can be calculated using formula (15), and, then, the maximum degree of damage () on the type of target by the weapon isWhen 0 < < 1, from formulas (10) and (12), we have That is,Through simultaneous use of formulas (18) and (20), we haveTherefore,In formula (19), 0 < < 1 represents the fact that the type of weapon can be used to strike the type of target, and given that the damage requirement for the type of target is , then when , indicating that the maximum number of the type of weapon () cannot meet the requirement on the damage to the type of target, and no feasible solutions are present within the constrained value range of the variables; thus, it is necessary to expand the value range of the variables.
The expansion on the value range of the variables in the mutation process allows the variables to take any value within the actual number of weapons of each type in the process to ensure that a feasible solution is found, which increases the search space and prolongs the search for a feasible solution. To avoid this situation, we adopted the dynamic directional mutation. Assuming the required damage level for a certain type of target is , the actual damage level of this type of target among the individuals in the population is , the value of a variable that belongs to this type of target is , and the actual amount of the type of the weapon corresponding to the variable is bound, then the operation in the mutation process is as shown in Figure 1.
3.4. GA Flow Based on the Variable Value Control Method
The procedure for the application of the variable value range control method to GA to solve the GTAWTA problem is as follows.
(1) Constrain the number of weapons of each type used on each target. The contribution of each weapon is used to constrain the number of weapons of each type used on each target to control the value range of the variables in the initial population.
(2) Generate the initial population, which is initialized in the set value range of the variables.
(3) Constrain the total number of weapons used on each target, in which the quantity of the single type of weapon that has the maximum number for a certain target () is used as the maximum quantity of all weapons for the given target, designated .
(4) Control the value of the variables in the initial population. The total number of types of weapons used to strike the same target () is calculated. If < , then the quantity () of a type of weapon used to strike the target is randomly chosen, and if > 0, = 1. If < , go to step (4); otherwise, go to step (5).
(5) Calculate the fitness value of the individuals of the population, and perform replication and crossover operations.
(6) Perform the directional mutation operation, as shown in Figure 1.
(7) Terminate the iteration. Determine whether the requirement on the number of iterations is met and whether the requirement on the target damage is met, and if both requirements are met, the iteration is terminated; otherwise, go to step (5).
3.5. Feasibility Analysis
The variable control method includes two aspects: in the initialization phase, the variable value range is narrowed, so the search space is reduced to improve the search efficiency; in the mutation iteration process, the weapon usage amount is finetuned if necessary to ensure the quality of the solution and avoid the premature convergence issue.
Because in striking a certain ground target, an optimal combination of multitype weapons can be used to make the comprehensive damage value meet the expected damage requirement, in the process of population initialization, the appropriate constraint on the number of a particular type of weapon and the total number of all types of weapons for a given target according to the expected damage requirement and the damage contribution of each type of weapon can effectively narrow the search space and improve the search efficiency.
In the mutation process, the difference between the actual comprehensive damage value of the weapons on the target and the expected damage requirement is used to randomly determine whether it is necessary to increase or decrease the quantity of weapon usage. At this time, the quantity of weapon usage is no longer constrained by the damage contribution. A difference greater than 0 means that the weapon usage is too high and it is necessary to randomly decrease the usage amount of a certain type of weapon; a difference less than 0 means that the weapon usage is too low and it is necessary to randomly increase the usage amount of a certain type of weapon. Thus, it is ensured that, for each target, the expected damage requirement is met; i.e., the solution is feasible; if the total weapon value consumption is minimized, a better solution is obtained.
Because real number encoding is adopted, in the mutation process, whether it is to increase or decrease the usage amount of a certain type of weapon, only one type of weapon is increased by 1 or decreased by 1, rather than randomly changing the value of weapon usage, which avoids the issue of prematurity very well through repeated trials and appropriate control of the mutation probability.
4. Calculation Example
4.1. GTAWTA Problem Example
For the typical GTAWTA problem, we describe four different cases under the same background, based on which we make comparisons.
Case Background. A total of five different types of weapons are used, and the value coefficient (unit: million) of each type of weapon and the total investment amount in each case are shown in Table 1. Six types of ground targets are to be attacked, and the number of targets in each case is listed in Table 2. The damage probability of each type of weapon to each type of target is shown in Table 3. It is required that the average damage coefficient on each type of target be 0.8, 0.8, 0.9, 0.85, 0.8, and 0.9. Based on the above conditions, we try to solve the best weapon allocation scheme.



4.2. Simulation and Analysis of the GTAWTA Problem
For the above case, under the same hardware and software condition (win7 x64, Intel (R) Xeon (R) CPU E31240 v3 @3.4 GHz, RAM 16 GB), we used MATLAB software to program and simulate the AGWTA problem using the improved bat algorithm of [17], the improved PSO method of [18], and the method proposed in this study to compare the weapon consumption values and the time consumptions (unit: second) of the three methods. The results are shown in Table 4, in which “number of variables” is the product of the number of weapon types and the number of targets, “minimal weapon consumption value” is the weapon value required to meet the specified damage requirement, “weapon consumption value” is the mean of the weapon consumption values of 20 simulations, and “time consumption” is the mean of the run times of 20 simulations.

Table 4 shows that, compared with the improved bat algorithm or the improved PSO method, the proposed optimization method has a lower weapon consumption value and shorter time consumption, and as the number of variables increases, the advantages of the proposed method become more profound.
To present and analyze the superiority of the proposed method more visually, the weapon consumption value and the time consumption in Table 4 are plotted in Figures 2 and 3, respectively.
Figure 2 shows that the weapon consumption value optimized using the proposed method is always less than that of the other two methods; as the number of variables increases, the weapon consumption value difference between the proposed method and each of the other two methods also increases. Figure 3 shows that, as the number of variables increases, the time consumption of each of the three methods also increases, and the slope of the curve becomes steeper; however, the time consumption of the proposed method is always shorter than that of each of the other two methods, and the slope of the proposed method is always smaller than that of each of the other two methods. These results indicate that the optimization performance of the proposed method is better than that of the literature methods [17, 18], and the larger the scale of the problem is, the more profound the superiority is.
In short, the proposed method can further improve the computational efficiency and solution quality of the GTAWTA problem, and the larger the scale of the problem is, the more profound the superiority is.
Robustness is another criterion for measuring the pros and cons of an algorithm. The better the robustness of the algorithm, the more reliable the algorithm. Table 4 shows the weapon consumption value and time consumption optimized by the three methods, but the robustness of the three methods cannot be verified and demonstrated. The robustness of the three methods can be measured by the standard deviation of weapon consumption value and time consumption. The smaller the standard deviation of weapon consumption value and time consumption, the better the robustness of the method. For a set of variables (), the standard deviation () is According to formula (23), the standard deviation of weapon consumption value and time consumption optimized by the three methods for the 20 simulations of the 4 cases can be calculated. The results are shown in Table 5. The “” and “” in Table 5 represent “the standard deviation of weapon consumption value” and “the standard deviation of time consumption”, respectively.

Table 5 shows that, compared with the improved bat algorithm or the improved PSO method, the proposed optimization method has a lower standard deviation of weapon consumption value and time consumption, indicating that the proposed optimization method has better robustness and is more suitable to optimize the GTAWTA problem.
5. Conclusion
In this study, we propose a variable control method to improve the genetic algorithm to address the GTAWTA problem. The proposed method has two advantages. First, it reasonably narrows the search space, thus improving the computational efficiency; second, it improves the mutation strategy to ensure the quality of the solution and effectively avoids the issue of prematurity. Simulations, comparisons and analyses indicate that the proposed method exhibits superiority in terms of solution quality and computational efficiency when addressing the largescale GTAWTA problem, and the larger the scale of the problem is, the more profound the superiority is. And the proposed method has better robustness.
Notably, the proposed method has obvious advantages in solving the GTAWTA problem but is not suitable for solving the ADWTA problem. Further investigation is needed to determine whether it is effective in addressing other complex optimization problems.
Data Availability
The data used to support the findings of this study are included within the article.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
This work was jointly supported by the National Natural Science Foundation for Young Scientists of China (Grant nos. 61403397 and 61202332), and the Natural Science Foundation of Shanxi Province, China (Grant no. 2015JM6313).
References
 J. Zhang, “Research on weapon target assignment problem,” in Proceedings of the 3rd China Conference on Command and Control, pp. 762–764, 2015. View at: Google Scholar
 J. Huang, Research on the Model of Weapon Target Assignment, Huazhong University of Science & Technology, Wuhan, China, 2016.
 Z. J. Lee, S. F. Su, and Y. L. Chou, “Efficiently solving general weapontarget assignment problem by genetic algorithms with greed eugenics,” IEEE Journal on Systems, Man, and CyberneticsPart B: Cybernetics, vol. 33, no. 1, pp. 119120, 2003. View at: Google Scholar
 M. Azad and A. Mircea, “Efficient heuristic approach to the weapontarget assignment problem,” AIAA Journal of Aerospace Computing, Information, and Communication, vol. 6, no. 6, pp. 405–414, 2009. View at: Publisher Site  Google Scholar
 X. Bin, C. Jie, Z. Juan et al., “Efficient decision makings for dynamic weapontarget assignment by virtual permutation and tabu search heuristics,” IEEE Transactions on Systems, Man, and CyberneticsPart C: Applications and Reviews, vol. 40, no. 6, pp. 649–662, 2010. View at: Publisher Site  Google Scholar
 C. C. Coello, G. T. Pulido, and M. S. Lechuga, “Handling multiple objectives with particle swarm optimization,” IEEE Transactions on Evolutionary Computation, vol. 8, no. 3, pp. 256–279, 2004. View at: Publisher Site  Google Scholar
 L. L. Cui, Ant Colony Algorithm for Solving the WeaponTarget Assignment Problem, Shanghai Jiao Tong University, Shanghai, China, 2011.
 X. L. Yang, D. S. Qiu, L. Peng et al., “Application of modified electromagnetismlike algorithm in weapontarget assignment problem,” Journal of National University of Defense Technology, vol. 33, no. 6, pp. 150–153, 2011. View at: Google Scholar
 S. L. Yang, J. Huang, Y. Liu et al., “Analysis of weapon target assignment problem in joint fire strike solving by genetic algorithm,” Computer Simulation, vol. 3, no. 3, pp. 61–63, 2012. View at: Google Scholar
 Y. Zhang, X. X. Yang, and S. L. Zhou, “Fire assignment based on quantuminspired estimation of distribution algorithm,” Electronics Optics & Control, vol. 20, no. 12, pp. 18–21, 2013. View at: Google Scholar
 A. Tokgöz and S. Bulkan, “Weapon target assignment with combinatorial optimization techniques,” International Journal of Advanced Research in Artificial Intelligence, vol. 2, no. 7, pp. 39–50, 2013. View at: Publisher Site  Google Scholar
 J. Zhang, Z. X. Wang, L. Chen et al., “Modeling and optimization on antiaircraft weapontarget assignment at multiple interception opportunity,” Acta Armamentarii, vol. 35, no. 10, pp. 1644–1650, 2014. View at: Google Scholar
 H. H. Liu, Study on MultiPopulations for MultiObjective Optimization PSO Algorithm and Its Application, Nanjing University of Posts and Telecommunications, Nanjing, China, 2014.
 C. W. Xie, K. Li, J. Xu et al., “An improved multiobjective particle swarm optimization algorithm MOPSOII,” Journal of Wuhan University: Natural Science Edition, vol. 60, no. 2, pp. 144–150, 2014. View at: Publisher Site  Google Scholar
 W. Xia, X. X. Liu, Y. T. Fan et al., “Weapontarget assignment with an improved multiobjective particle swarm optimization algorithm,” Acta Armamentarii, vol. 37, no. 11, pp. 2085–2093, 2016. View at: Google Scholar
 X. Hu and R. Eberhart, “Multiobjective optimization using dynamic neighborhood particle swarm optimization,” 2013, http://www.swarmintelligence.org/papers/CEC2002Multiobjective. View at: Google Scholar
 S. S. Liu, R. M. Xu, and J. J. Pan, “Research on the modeling and solving of the joint longrange strike weapon target assignment problem based on the niche bat algorithm,” Journal of Equipment Academy, vol. 28, no. 2, pp. 93–98, 2017. View at: Google Scholar
 S. H. Wang, Q. S. Yang, R. H. Wang et al., “Particle swarm optimization based weapontarget assignment for attacking ground targets,” Electronics Optics & Control, vol. 24, no. 3, pp. 36–40, 2017. View at: Google Scholar
 H. Aytug, M. Khouja, and F. E. Vergara, “Use of genetic algorithms to solve production and operations management problems,” International Journal of Production Research, vol. 41, no. 55, pp. 3955–4009, 2003. View at: Publisher Site  Google Scholar
 S. P. Lloyd and H. S. Witsenhause, “Weapon allocations is NPcomplete,” in Proceedings of the IEEE Summer Conference on Simulation, pp. 88–95, IEEE, Reno, Nevada, 1986. View at: Google Scholar
Copyright
Copyright © 2019 Chao Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.