By Topic

In-flight replanning of penetration routes to avoid threat zones of circular shapes

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Asseo, S.J. ; Northrop Grumman Corp., Pico Rivera, CA, USA

In-flight replanning of a strike mission requires the capability of generating survivable penetration routes, quickly and efficiently, with limited computer resources on board the aircraft. Although dynamic programming (DP) has been used traditionally for route generation, it requires quantization of the state space into cells of specified dimensions, and places restrictions on the route to traverse the state space from cell center to cell center along one of the prescribed headings. The algorithm developed avoids threat zones of circular shapes, and is ideal for in-flight replanning of penetration routes. The algorithm is much faster than DP, it generates flyable routes that do not require smoothing, and the run time depends strictly on the number of threats to be avoided, rather than on cell size used for state space quantization. The algorithm uses geometric construction to synthesize routes with linear segments tangent to the threat periphery and circular segments along the threat periphery, and obtains the shortest route between a starting point and a destination point, by using the principle of optimality. The algorithm is validated in a high density threat environment with overlapping threat lethality envelopes of varying sizes, and used to generate various penetration routes

Published in:

Aerospace and Electronics Conference, 1998. NAECON 1998. Proceedings of the IEEE 1998 National

Date of Conference:

13-17 Jul 1998