in the crowded cities where there are not many choi-
ces for locating missile battalions while the AMP is
necessarily tackled in sparsely populated area. On the
contrary, the IAMP is necessarily considered when
the protected target should not be fallen in any ca-
ses. Although these problems are proven as NP-hard,
the computational results show the efficient of our for-
mulations since they can be applied directly to solve
fast real-life instances to optimality. The message
is that, with the validation of experienced soldiers,
we have gained confidence that the formulations have
significant implementation in any defender’s combat
field. The rest of paper is organized as follows. In
Section 2, we state the problems, formulate them as
mixed integer programs as well as prove their hard-
ness. The experimental results are reported and ana-
lyzed in Section 3. Finally, we conclude the paper and
draw some future directions in Section 4.
The TDM has been motivated and validated for
both defensive side and offensive side in general
((Robert, 2006), (Crino and Moore, 2004), (Jackson,
1989), (Studies and Agency, 1992), (Brian, 1994),
(Seichter, 2005), (Moore, 2002), (Brown et al., 2008)
). Some of these studies have been developed into
mathematical models which are related to the AMP
can be classified as the Weapon-Target Assignment
(WTA)and the Defender- Attacker Model (DAM).
The WTA is the assignment of weapon to the hos-
tile target in order to protect assets, which can be
formulated as a nonlinear integer programming pro-
blem and is known to be NP-hard complete. Although
several heuristic methods have been propose for sol-
ving the WTA, such as genetic algorithm, tabu search,
simulated annealing, and variable neighborhood se-
arch ((Murphey, ), (Tokgoz and Bulkan, 2013)), an
integer programming and network flow-based lower
bounding method has been introduced in (Ahuja Ra-
vindra and James, 2007). An instance of DAM in a
fast theater model is introduced in (Seichter, 2005),
which is built upon the existing air model. The air
strike attacker’s main objective is maximizing target
value destroyed by killing as many targets with high
values as possible, while the ground combat wants
to minimize its own losses. The resulting model is
a Mixed Integer Program (MIP) finding an optimal,
actively defensive actions by the ground force that
can significantly reduce the air attacker’s effective-
ness. The defender-attacker problem is continued stu-
dying in (Moore, 2002), in which a new methodo-
logy for strategy optimization under uncertainty has
been proposed. The authors describe the implemen-
tation of a genetic programming algorithm to deter-
mine an optimized evasion strategy for the extended
two-dimensional pursuer-evader problem under con-
ditions of uncertainty about the type of pursuer. The
DAM model is also applied to defender’s risk asses-
sment and mitigation,(Brown et al., 2008).
2 PROBLEM FORMULATIONS
We now state and formulate the anti-aircraft mission
planning problems. The complexity of these pro-
blems is also discussed at the end of this section.
2.1 Problem Descriptions
Direction
Height (km)
π
4
π
2
3π
4
π
5π
4
3π
2
7π
4
2π
1
2
4
6
8
10
22
Oppressive fleet: F15, F16, F14
Bomb fleet: F15, F16
Diversionary fleet
Escort fighter fleet
Bomb fleet: B52, B1, B2
Radar-jamming fleet: EF111A, EC130H, EA6B
Reconnaissance fleet: TR1, U2, SR71
Figure 1: An example of an attacking plan.
Suppose that the attacker’s plan can be observed
by an intelligence system of the defender and is des-
cribed as follows. In the offensive side, the attacker
strikes the target by a group of fleets of attacking ai-
rcraft. For a sake simplicity, from now on, the term
“fleet” is used stead of “fleet of attacking aircraft”.
Each fleet is organized by a group of aircraft which
have same missions such as carrying bombs or ma-
king radar noise; enter the theater at same height, di-
rection; and fly with same velocity. Each fleet is asso-
ciated with a weight of importance depending mainly
on its mission. Figure 1 illustrates an attacking plan,
in which the horizontal axis represents the directions
of the fleets, considered as angles between attacking
directions and a predefined axis; while the vertical
axis represents the height of the fleets. There are se-
ven fleets at different heights, directions and veloci-
ties, drawn by seven arrows. The color of the arrows
reflects the fleets’ weights. For instance, the darkest
arrow describes the fleet with the highest weight, car-
rying bombs such as B52, B1, B2. Further, flying po-
sitions of aircraft in a fleet must be captured in detail,
for example, a flying position of a four-aircraft fleet is
illustrated in Figure 2.
In the defensive side, the defender’s responsibility
is engaging fleets to protect its point target. In or-
ICORES 2018 - 7th International Conference on Operations Research and Enterprise Systems
156