**2. The WTA problem and its components**

There are many different functions that must be handled in an air defense system. From a high-level command perspective, these functions can be divided in two main processes: picture compilation and picture exploitation [2].

The purpose of picture compilation process is generating a representation of the volume of interest (VOI) based on data and information received from a variety of sensors/sources. This step often includes the following sub-processes: (i) The target detection, (ii) target tracking, and (iii) target identification. The picture exploitation is the subsequent process that includes the following sub-processes: (i) Threat Evaluation (TE), (ii) Engageability assessment and (iii) weapons assignment (here referred to as WTA) [2]. In a military context this set of sub-problems also are known as combat power management (CPM). The WTA component, in a CPM system can be divided into three sub-problems:


This research concentrates only on the response planning procedure of WTA process. This process is about how and when to allocate the available defensive resources. In other words, response planning procedure has two aspects: resource allocation planning and scheduling.

### **2.1 Resource allocation: planning and scheduling**

In C2 context the response planning mainly is pertained to resource allocation problem. Resource allocation is the assignment of resources to activities, where the start and end times of each activity is given [8]. This problem is concerned with optimally assigning weapons to the hostile targets so that after all engagements, the BF expectations are met as far as possible. Resource allocation scheduling is another important aspect of the response planning that consists of determining the start and end times of the activities. In pure scheduling problems, activities are already chosen (or given), leaving only the problem of determining a feasible and possibly

#### *Computational Optimization Techniques and Applications*

best order among them. In defensive operations, scheduling determines when a specific defensive action (e.g. assigning a specific weapon against a specific threat) ought to take place [9]. Therefore, the response planning determines the best assignment of the resources and specifies the start and end times of the activities. This procedure defines a joint resource allocation planning & scheduling problem. In this Chapter we focus on the response allocation planning or determining optimal assignment of weapons to the hostile targets which is referred as WTA.

It is interesting to note that, in contrast with other CPM components like TE, WTA is well documented in the literature and possible solutions have been investigated for a number of years. The WTA process is one of critical decision making, that is consistent with the related own force mission objectives and compatible with the Rules of Engagement (RoE), Weapon Systems (WSs) and environmental constraints. In the next section the basic formulations of the WTA problem and variations of modeling approaches are explained.

#### **3. WTA modeling approaches**

The WTA problem is a model of combat operations where a finite number of weapons are assigned to hostile targets (i.e. RF). The BF expectation and objective must be fulfilled after all engagements. The BF objective could be minimizing the total expected value of surviving targets, minimizing military resource costs and so on. From mathematical point of view, the purpose of the WTA solving process has been determined as weapon-target pairs. In the following, this process will be described formally, but first, we need to introduce some notations. The notations employed in this context are listed in **Table 1**.

#### **3.1 WTA basic models**

Assuming a defensive scenario consisting of j j *W* firing units and j j *T* targets, from a defensive perspective, there are three basic models for WTA [5].

**Basic model 1:** The first basic model for WTA problem, which focuses on maximizing damage to the enemy/minimizing total expected target values, can be formulated as:

$$\min \quad F = \sum\_{i=1}^{|T|} V\_i \prod\_{k=1}^{|W|} \left(1 - P\_{ik}\right)^{X\_{ik}} \tag{1}$$

max *Jt <sup>X</sup><sup>t</sup>* ð Þ¼

*<sup>I</sup>*�*<sup>K</sup>*: is a decision matrix at stage *<sup>s</sup>*.

*Ti*: the set of detected threats, *i* ¼ 1, 2, ⋯,*I*. *wk*: the set of resources, *k* ¼ 1, 2, ⋯,*K*. *A <sup>j</sup>*: the set of assets *j* ¼ 1, 2, ⋯, *J*.

*DOI: http://dx.doi.org/10.5772/intechopen.96318*

*s* ¼ 1, 2, ⋯, *S*: the set of engagement stages.

*Vij*: the threat value of the threat-asset pair *Ti*, *A <sup>j</sup>*

*Xik* <sup>¼</sup> <sup>1</sup> *if resource wk* <sup>∈</sup> *W is assigned to t*arg*et Ti* <sup>∈</sup>*<sup>T</sup>*

*ωj*: the protection value of asset *A <sup>j</sup>* ∈ *A*.

<sup>0</sup> *otherwise* �

**Sets**

**Parameters**

assigned to it.

**Variables**

*Xs ik* � �

**Table 1.** *Notations.*

**77**

**3.2 Variation of modeling approaches**

problem: static and dynamic WTA model.

j j X Að Þ*t*

*πij*: the estimated probability that threat *Ti* ∈*T* destroys the asset *A <sup>j</sup>* ∈ *A*.

*A Survey on Weapon Target Allocation Models and Applications*

*Cik*: a resource usage cost for assigning resource *wk* ∈*W* to target *Ti* ∈*T*.

*j*¼1 *ωj* j j Y *T*ð Þt

*i*¼1

*Pik*: the estimated effectiveness, i.e. probability that resource *wk* ∈*W* neutralize threat *Ti* ∈ *T* if

� �.

the other models which have been incorporated in the applications.

modeling techniques which have been proposed for these problems.

<sup>1</sup> � *<sup>π</sup>ij* <sup>Y</sup> *S*

Where *h* is an index of stages and the defender have *S* engagement opportunities which depends on the time–space conditions of the interception and weapon characteristics. Here *A t*ð Þ, *T t*ð Þ and *W t*ð Þ are sets of defended assets, hostile targets and available weapons in stage *t*, respectively. These three basic models are reference for

The WTA problem may be considered from a number of different perspectives. In this section, first a framework is provided for identifying key elements of WTA problem and then based on these characteristics we describe particular sets of

In terms of interaction with the environment and modeling of these interactions,

1.*Static WTA (SWTA),* in this approach of modeling, all weapons engage targets in a single stage and assume that the decision maker is aware of all parameters for the problem, while the outcomes of the assignments could be stochastic. Thus, the goal of SWTA is to find the optimal assignment for a temporary defense task (the basic models 1 and 2 are static models). This WTA problem was first formally posed in 1958 [1]. It is interesting to note that the majority of the literature in WTA domain have been dedicated to efficiently solving the SWTA problem formulation and few optimal methods have been presented for

there are two general formulations that are investigated in literature for WTA

*h*¼*t*

*with t*∈ f g 1, 2, … , *S*

j j *W t* Y ð Þ

" #

<sup>1</sup> � *pik*ð Þ *<sup>h</sup>* � �*xik*ð Þ *<sup>h</sup>*

(3)

*k*¼1

In this model the goal of the defender is to minimize the numbers of the surviving invading enemy, using the optimal allocation of available weapons.

**Basic model 2:** The second basic model for WTA is to allocate the available firing units to maximize the total expected protection value of surviving defended assets. This model can be formulated as follows:

$$\max \quad J = \sum\_{j=1}^{|A|} \alpha\_j \prod\_{i \in G\_j} (1 - \pi\_{ij} \prod\_{k=1}^{|W|} (1 - P\_{ik})^{X\_k}) \tag{2}$$

**Basic model 3:** If the total expected value of surviving assets after the current stage is employed as the objective of WTA for the current stage, then the formulation of the objective function for basic Dynamic WTA in stage t is well be as follows [10]:


**Table 1.** *Notations.*

best order among them. In defensive operations, scheduling determines when a specific defensive action (e.g. assigning a specific weapon against a specific threat) ought to take place [9]. Therefore, the response planning determines the best assignment of the resources and specifies the start and end times of the activities. This procedure defines a joint resource allocation planning & scheduling problem. In this Chapter we focus on the response allocation planning or determining optimal

It is interesting to note that, in contrast with other CPM components like TE, WTA is well documented in the literature and possible solutions have been investigated for a number of years. The WTA process is one of critical decision making, that is consistent with the related own force mission objectives and compatible with the Rules of Engagement (RoE), Weapon Systems (WSs) and environmental constraints. In the next section the basic formulations of the WTA problem and varia-

The WTA problem is a model of combat operations where a finite number of weapons are assigned to hostile targets (i.e. RF). The BF expectation and objective must be fulfilled after all engagements. The BF objective could be minimizing the total expected value of surviving targets, minimizing military resource costs and so on. From mathematical point of view, the purpose of the WTA solving process has been determined as weapon-target pairs. In the following, this process will be described formally, but first, we need to introduce some notations. The notations

Assuming a defensive scenario consisting of j j *W* firing units and j j *T* targets,

**Basic model 1:** The first basic model for WTA problem, which focuses on maximizing damage to the enemy/minimizing total expected target values, can be

∣*T*∣

*i*¼1 *Vi* Y ∣*W*∣

In this model the goal of the defender is to minimize the numbers of the surviving invading enemy, using the optimal allocation of available weapons. **Basic model 2:** The second basic model for WTA is to allocate the available firing units to maximize the total expected protection value of surviving defended

*k*¼1

ð1 � *πij*

**Basic model 3:** If the total expected value of surviving assets after the current

formulation of the objective function for basic Dynamic WTA in stage t is well be as

ð Þ 1 � *Pik*

Y ∣*W*∣

ð Þ 1 � *Pik*

*k*¼1

*Xik* (1)

*Xik* <sup>Þ</sup> (2)

from a defensive perspective, there are three basic models for WTA [5].

min *<sup>F</sup>* <sup>¼</sup> <sup>X</sup>

∣*A*∣

*j*¼1 *ωj* Y *i*∈ *G <sup>j</sup>*

stage is employed as the objective of WTA for the current stage, then the

assignment of weapons to the hostile targets which is referred as WTA.

tions of modeling approaches are explained.

*Computational Optimization Techniques and Applications*

employed in this context are listed in **Table 1**.

assets. This model can be formulated as follows:

max *<sup>J</sup>* <sup>¼</sup> <sup>X</sup>

**3. WTA modeling approaches**

**3.1 WTA basic models**

formulated as:

follows [10]:

**76**

$$\max \quad f\_t(\mathbf{X}^t) = \sum\_{j=1}^{|\mathbf{A}(t)|} \alpha\_j \prod\_{i=1}^{|T(t)|} \left[ \mathbf{1} - \pi\_{ij} \prod\_{h=t}^{\mathcal{S}} \prod\_{k=1}^{|W(t)|} \left( \mathbf{1} - p\_{ik}(h) \right)^{x\_{ik}(h)} \right] \tag{3}$$
 
$$with \ t \in \{1, 2, \dots, \mathcal{S}\}$$

Where *h* is an index of stages and the defender have *S* engagement opportunities which depends on the time–space conditions of the interception and weapon characteristics. Here *A t*ð Þ, *T t*ð Þ and *W t*ð Þ are sets of defended assets, hostile targets and available weapons in stage *t*, respectively. These three basic models are reference for the other models which have been incorporated in the applications.

#### **3.2 Variation of modeling approaches**

The WTA problem may be considered from a number of different perspectives. In this section, first a framework is provided for identifying key elements of WTA problem and then based on these characteristics we describe particular sets of modeling techniques which have been proposed for these problems.

In terms of interaction with the environment and modeling of these interactions, there are two general formulations that are investigated in literature for WTA problem: static and dynamic WTA model.

1.*Static WTA (SWTA),* in this approach of modeling, all weapons engage targets in a single stage and assume that the decision maker is aware of all parameters for the problem, while the outcomes of the assignments could be stochastic. Thus, the goal of SWTA is to find the optimal assignment for a temporary defense task (the basic models 1 and 2 are static models). This WTA problem was first formally posed in 1958 [1]. It is interesting to note that the majority of the literature in WTA domain have been dedicated to efficiently solving the SWTA problem formulation and few optimal methods have been presented for solving SWTA with some simplifications. For example, optimal methods have been proposed by denBroeder [11] under a homogenous weapon set assumption, known as the maximum marginal return (MMR) algorithm. Orlin [12] developed optimal algorithms under the assumption that each target can have no more than one weapon assigned to it. A survey of WTA solution methods has been provided in section 7 of present Chapter.

the identification of the most suitable armed platform to engage or counter a threat. In this case the defense and the defended property are different (likely separated) and the purpose of defense is to maximize the chance of survival of

The main objective of the invading enemy is harming the defended valuable assets, but for making these assets defenseless, they may first destroy the protective weapon platforms. So the arrangement of platforms (i.e. defense units) is one of the major issues that must be handled in this type of WTA problem. This positioning must maximize asset protection while minimizing the possible damage to them [10]. In addition to the number of deployed defensive units, the defense scenarios usually involve more than one hostile target. Therefore, when investigating the WTA modeling approach where the available WSs are assigned, two perspectives

1.*The threat-by-threat perspective,* which refers to the assignment of WSs sequentially in such a way that the best WS is essentially assigned to each

2.*The multi-threat perspective,* which refers to the assignment of WSs to the current set of threats concurrently so that the assignment is best in some

Technically, both of the above mentioned approaches employ some form of optimization techniques. What distinguishes them is the threat-by-threat assignment which usually is based on some type of greedy algorithms, whereas the multithreat assignment typically involves the optimization of a given objective function (e.g. maximize the damage to the targets/minimize the value of any remaining targets, maximize the asset protection and so on) subject to certain constraints (e.g. the target priority, the number of simultaneous engagement and so on) [10].

Furthermore, depending on the defense priorities and attitude of the modeling,

1.*Target-based (weighted subtractive) defense;* the BF allocates firing units to

optimization problem where the objective becomes to maximize the total

Target-based objectives lead to subtractive defense strategies (basic model 1). In

the WTA problem can be stated as two different optimization problems:

2.*Asset-based (preferential) defense;* the WTA problem is stated as an

other words, the defense tries to destroy as many of the most lethal targets as possible, or at least the most valuable ones. On the other hand, asset-based objectives lead to preferential defense strategies (basic models 2 for SWTA and basic models 3 for DWTA). In order to save an asset, the defense must, with high probability, destroy all of the targets aimed for it or divert them. For these purposes each of the hostile targets must be attacked with appropriate hard-kill or soft-kill weapons (e.g. jammers, decoys and etc.). In this case the defense may not have enough weapons to defend all the assets. Therefore, the defense must decide which of the assets should be protected (i.e. which one is preferred) and to assign its defensive resources to protect them. However, no weapons may be assigned to the targets aimed for the other low valued defended assets (i.e. this asset is immolated to save other valuable assets). This is known as a preferential defense strategy.

minimize the expected total target value of the RF targets.

expected survivability of the defended assets.

threat in turn (from the highest priority to the lowest priority).

the being-defended assets.

*DOI: http://dx.doi.org/10.5772/intechopen.96318*

*A Survey on Weapon Target Allocation Models and Applications*

are prevalent:

**79**

overall sense.

	- In each stage, a subset of the available weapons is selected and allocated simultaneously.
	- The outcomes of each stage are observed prior to the preceding stage (i.e. the problem re-solved at each stage using previous stage information).

The DWTA problem suffers from the curse of dimensionality. Therefore, traditional solution methods become intractable. The curse of dimensionality arises from three elements of the problem i.e. state space, decision space, outcome space, or their combination [2]. Intuitively, DWTA can be achieved by a series of SWTAs through all stages. However, although SWTA can at best, guarantee the optimality of the WTA decisions for its corresponding defense stage, the combination of all SWTA decisions may not be optimal for the whole defense process (because of its greedy nature). In a real-world situation, the decision of which weapon system to be allocated to which target needs to be complemented with scheduling of when to engage a target.

Moreover, apart from the modeling approaches being static or dynamic; the WTA problem can be formulated based on two different defense scenarios. The air defense capability may be limited to self-defense or may be extended to area defense where a set of assets within a certain range should be defended. For example, in a military task group, the individual defense units work together as a team to provide mutual support and defense against incoming threats. These units are typically arrayed into a formation, called a screen, in which the most valuable and important units (i.e. high value units (HVUs)) are surrounded and protected by the escorting units (e.g. vessels and airplanes). Within the screen, the escort units often are stationed in sectors away from the HVU. In such a situation important issues such as positioning and coordination between these units are aroused [10]. Therefore, in WTA problem the following two perspectives are usually adopted:


solving SWTA with some simplifications. For example, optimal methods have

assumption, known as the maximum marginal return (MMR) algorithm. Orlin [12] developed optimal algorithms under the assumption that each target can have no more than one weapon assigned to it. A survey of WTA solution

2.*Dynamic WTA (DWTA),* in this approach, WTA is molded as a multi-stage problem and the outcome of each engagement is assessed for subsequent decisions. This variation of WTA problem was firstly formulated by Hosein et al. in 1989 [13]. The DWTA problem has similar stochastic elements as the SWTA problem, but assignments are made in multiple stages. In other words, the time parameter is defined in dynamic models and the goal is to find a global optimal assignment for the whole defense process. The DWTA often have been presented as a sequential decision making problem. The basic

• In each stage, a subset of the available weapons is selected and allocated

• The outcomes of each stage are observed prior to the preceding stage (i.e. the problem re-solved at each stage using previous stage information).

The DWTA problem suffers from the curse of dimensionality. Therefore, traditional solution methods become intractable. The curse of dimensionality arises from three elements of the problem i.e. state space, decision space, outcome space, or their combination [2]. Intuitively, DWTA can be achieved by a series of SWTAs through all stages. However, although SWTA can at best, guarantee the optimality of the WTA decisions for its corresponding defense stage, the combination of all SWTA decisions may not be optimal for the whole defense process (because of its greedy nature). In a real-world situation, the decision of which weapon system to be allocated to which target needs to be complemented with scheduling of when to engage a target. Moreover, apart from the modeling approaches being static or dynamic; the WTA problem can be formulated based on two different defense scenarios. The air defense capability may be limited to self-defense or may be extended to area defense where a set of assets within a certain range should be defended. For example, in a military task group, the individual defense units work together as a team to provide mutual support and defense against incoming threats. These units are typically arrayed into a formation, called a screen, in which the most valuable and important units (i.e. high value units (HVUs)) are surrounded and protected by the escorting units (e.g. vessels and airplanes). Within the screen, the escort units often are stationed in sectors away from the HVU. In such a situation important issues such as positioning and coordination between these units are aroused [10]. There-

fore, in WTA problem the following two perspectives are usually adopted:

property (i.e. assets) are the same.

**78**

1.*The single platform perspective*: a single platform intends to protect an asset (may be itself) from incoming threats, where assignment relates to selecting the most suitable WS to counter a threat (e.g. a ship that intends to defend itself against invading threats). In this case often the defense and the defended

2.*The force coordination perspective:* a C2 platform providing protection (e.g. TE and WTA) for third party Defended Assets (DAs), where assessment relates to

been proposed by denBroeder [11] under a homogenous weapon set

methods has been provided in section 7 of present Chapter.

*Computational Optimization Techniques and Applications*

assumptions of the DWTA are outlined as follows [14]:

simultaneously.

the identification of the most suitable armed platform to engage or counter a threat. In this case the defense and the defended property are different (likely separated) and the purpose of defense is to maximize the chance of survival of the being-defended assets.

The main objective of the invading enemy is harming the defended valuable assets, but for making these assets defenseless, they may first destroy the protective weapon platforms. So the arrangement of platforms (i.e. defense units) is one of the major issues that must be handled in this type of WTA problem. This positioning must maximize asset protection while minimizing the possible damage to them [10].

In addition to the number of deployed defensive units, the defense scenarios usually involve more than one hostile target. Therefore, when investigating the WTA modeling approach where the available WSs are assigned, two perspectives are prevalent:


Technically, both of the above mentioned approaches employ some form of optimization techniques. What distinguishes them is the threat-by-threat assignment which usually is based on some type of greedy algorithms, whereas the multithreat assignment typically involves the optimization of a given objective function (e.g. maximize the damage to the targets/minimize the value of any remaining targets, maximize the asset protection and so on) subject to certain constraints (e.g. the target priority, the number of simultaneous engagement and so on) [10].

Furthermore, depending on the defense priorities and attitude of the modeling, the WTA problem can be stated as two different optimization problems:


Target-based objectives lead to subtractive defense strategies (basic model 1). In other words, the defense tries to destroy as many of the most lethal targets as possible, or at least the most valuable ones. On the other hand, asset-based objectives lead to preferential defense strategies (basic models 2 for SWTA and basic models 3 for DWTA). In order to save an asset, the defense must, with high probability, destroy all of the targets aimed for it or divert them. For these purposes each of the hostile targets must be attacked with appropriate hard-kill or soft-kill weapons (e.g. jammers, decoys and etc.). In this case the defense may not have enough weapons to defend all the assets. Therefore, the defense must decide which of the assets should be protected (i.e. which one is preferred) and to assign its defensive resources to protect them. However, no weapons may be assigned to the targets aimed for the other low valued defended assets (i.e. this asset is immolated to save other valuable assets). This is known as a preferential defense strategy.

The main difference between the target-based WTA problem and the assetbased WTA problem is that in the latter, the aims of the enemy are assumed to be known. In other words, the asset-based formulation demands knowledge of which hostile targets are headed for which defended assets. Therefore, the asset-based WTA problem formulation is suitable for ballistic missile defense problems (such as base camp protection against artillery and mortars) while the target-based formulation is more appropriate when the intended aims of the targets are not known for sure [15]. The target intention determination can be thought of as a data association problem [2].

In defense scenarios, the defender may look for optimizing different objectives. According to the number of goals which need to be optimized, the WTA is modeled in two ways:


The WTA problem has been designed to support human operators in real world condition. Therefore, the proposed WTA model should be able to cope with numerous and heterogeneous real-world objectives and constraints to help the operator to make appropriate decisions. This implies that WTA is required to be formulated as a multi-objective optimization (MOO) problem. However, relatively few researchers studied the WTA as a MOO problem. The research work by Ghanbari et al. [3], Newman et al. [16] and Leboucher et al. [17] applied MOO to formulate the model for the WTA problem.

A summarizing list of WTA modeling approaches from a BF perspective is given in **Table 2**. In WTA modeling miscellaneous limitations must be considered, these constraints will be discussed in the next section.

> two-person-zero-sum-game concept from game theory in the solution process. But we believe that in reality, war is not a zero-sum game and both sides have

**Game Models** Matheson [28], Soland [29], Haaland and Wigner [30], Bracken and Brooks [31],

3. solution value of the game by assuming best defensive and offensive moves. The defense wants to minimize the maximum offense's return while the offense acts to maximize the minimum expected return. This approach is more suitable when the inventories of a defender as well as the opposing sides are

This Chapter is focused on defensive scenarios. It is interesting to note that early foundation literature in the WTA field deal mainly on the offensive scenarios, while

Air defense is a vast area and defensive resource allocation or WTA is a component for which numerous scenarios, models and algorithmic approaches (i.e. techniques for computing solutions) have been proposed. However, an exhaustive categorization for WTA models can be quite large. This section will focus on those aspects that provide for distinctive characteristics of the proposed models. The

losses. They reach the

*Classification of the WTA approaches.*

**Table 2.**

**Literature category**

**models**

**Table 3.**

**81**

*The WTA modeling approaches.*

**Defense allocation**

**Reference**

and Zhuang [35].

Hocaoğlu [26], Kline et al. [27].

**WTA problem Modeling variation Number of**

*DOI: http://dx.doi.org/10.5772/intechopen.96318*

*A Survey on Weapon Target Allocation Models and Applications*

**objective**

**Single-objective**

**Multi-objective**

**BF Priority**

**Asset-based**

**Target-based**

Newman et al. [16], Benaskeur et al. [18], Zhang et al. [19], Turan [20], Yuming et al. [21], Leboucher et al. [17], Tokgöz and Bulkan [22], Ahner and Parson [4], Kalyanam et al. [8], Davis et al. [23], Naseem et al. [24], Gülpınar et al. [25],

Bracken et al. [32], Golany et al. [33], Leboucher et al. [17], Parson [34], Zhang

**Multi-threat**

**Engagement policy**

**Threat-by-threat**

**Defender positioning**

**Force** 

**Single platform**

**coordination**

known to some degree.

more recent studies have been focused on defense.

From **Table 2** it can be deduced that the simplest approach for formulation the WTA problem is a static, single-objective, target-based, threat-by-threat and single platform model; while the most complex formulation is a dynamic, multi-objectives, asset-based, multi-threat and force coordination model. The assetbased formulation increases the model complicity because it demands hostile targets intention analysis. The models proposed in WTA literature are in a state between the easiest and the hardest one. While the real-world situations tend towards to the latter (i.e. the most complicated case).

Apart from the above WTA problem characteristics, the literature on WTA problem can be categorized into two general groups (see **Table 3**).


#### *A Survey on Weapon Target Allocation Models and Applications DOI: http://dx.doi.org/10.5772/intechopen.96318*


### **Table 2.**

The main difference between the target-based WTA problem and the assetbased WTA problem is that in the latter, the aims of the enemy are assumed to be known. In other words, the asset-based formulation demands knowledge of which hostile targets are headed for which defended assets. Therefore, the asset-based WTA problem formulation is suitable for ballistic missile defense problems (such as base camp protection against artillery and mortars) while the target-based formulation is more appropriate when the intended aims of the targets are not known for sure [15]. The target intention determination can be thought of as a data association

In defense scenarios, the defender may look for optimizing different objectives. According to the number of goals which need to be optimized, the WTA is modeled

1.*Single-objective WTA problem*: if the quantity to be optimized is expressed using only one objective function, the WTA problem is modeled as a singleobjective problem. The objective function might be minimizing survival probability of hostile target or maximizing protection value of surviving

2.*Multi-objective WTA problem*: if the problem concerns on many objectives simultaneously then WTA will be a multi-objective problem. These objectives cloud be minimizing the risk and cost, maximizing the effectiveness measures

The WTA problem has been designed to support human operators in real world

A summarizing list of WTA modeling approaches from a BF perspective is given in **Table 2**. In WTA modeling miscellaneous limitations must be considered, these

From **Table 2** it can be deduced that the simplest approach for formulation the WTA problem is a static, single-objective, target-based, threat-by-threat and single platform model; while the most complex formulation is a dynamic,

multi-objectives, asset-based, multi-threat and force coordination model. The assetbased formulation increases the model complicity because it demands hostile targets intention analysis. The models proposed in WTA literature are in a state between the easiest and the hardest one. While the real-world situations tend

Apart from the above WTA problem characteristics, the literature on WTA

1.The first category of approaches includes defensive allocation models where defensive weapons are allocated to targets without taking the behavior of the opposing side into account. The actions of the opposing side are presumed in

2.The second class of approaches takes the defensive allocation models into account as well as the opposing side's moves. These models often employ the

and so on. Normally these objectives are conflicting each other.

condition. Therefore, the proposed WTA model should be able to cope with numerous and heterogeneous real-world objectives and constraints to help the operator to make appropriate decisions. This implies that WTA is required to be formulated as a multi-objective optimization (MOO) problem. However, relatively few researchers studied the WTA as a MOO problem. The research work by Ghanbari et al. [3], Newman et al. [16] and Leboucher et al. [17] applied MOO to

defended assets (see e.g. Eq. 1 and 2).

*Computational Optimization Techniques and Applications*

formulate the model for the WTA problem.

constraints will be discussed in the next section.

towards to the latter (i.e. the most complicated case).

the scenarios as a given input.

**80**

problem can be categorized into two general groups (see **Table 3**).

problem [2].

in two ways:

*The WTA modeling approaches.*


#### **Table 3.**

*Classification of the WTA approaches.*

two-person-zero-sum-game concept from game theory in the solution process. But we believe that in reality, war is not a zero-sum game and both sides have losses. They reach the

3. solution value of the game by assuming best defensive and offensive moves. The defense wants to minimize the maximum offense's return while the offense acts to maximize the minimum expected return. This approach is more suitable when the inventories of a defender as well as the opposing sides are known to some degree.

This Chapter is focused on defensive scenarios. It is interesting to note that early foundation literature in the WTA field deal mainly on the offensive scenarios, while more recent studies have been focused on defense.

Air defense is a vast area and defensive resource allocation or WTA is a component for which numerous scenarios, models and algorithmic approaches (i.e. techniques for computing solutions) have been proposed. However, an exhaustive categorization for WTA models can be quite large. This section will focus on those aspects that provide for distinctive characteristics of the proposed models. The

important characteristics for the modeling and the solution process in the air defense applications are:

scenario, when using allocation algorithms to simulate and model the effectiveness of defensive resources against a given threat scenario. The real-time aspect is one of the major characteristics of real-world air defense situations. Operations research community is the flagship of this area. But despite these initiatives, in many studies

> **One/ Multiple Layers of defense**

**Bin Xin et al. [39]** AD Diff Mul S-L-S Offline **Seq Johansson [5]** AD Diff One S-L Online **Simul Bin Xin et al. [40]** AD Diff Mul S-L-S Offline **Seq Zhang et al. [41]** PD Diff One S-L Online **Simul Turan [20]** PD Diff One S-L Online **Simul Yuming et al. [21]** PD Diff One S-L Offline **Simul Leboucher et al. [17]** PD Diff Mul S-L-S Offline **Seq**

**Parson [34]** AD Diff Mul S-L-S Offline **Seq Kalyanam et al. [8]** PD Diff Mul S-L-S Offline **Seq Naseem et al. [24]** AD Diff Mul S-L-S Online **Seq**

**Kline et al. [27]** AD Diff Mul S-L-S Offline **Seq**

*Area Defense (AD), Point Defense (PD), Different Weapon Types (Diff), Identical Weapon Types (Iden), Multiple Layers of defense (Mul),One Layers of defense (One), Shot (S), Look (L), Simultaneous attack (Simul), Sequential*

**Interceptor weapon allocation policy**

AD Diff Mul S-L-S Offline **Seq**

AD Diff Mul S-L-S Offline **Seq**

**Online/ offline application** **Simultaneous/ Sequential attack**

in this field real-time aspect of the problem could not be traced.

*A Survey on Weapon Target Allocation Models and Applications*

*DOI: http://dx.doi.org/10.5772/intechopen.96318*

**Weapon Types**

**Reference Features Point/**

**Tokgöz and Bulkan**

**Zhang and Zhuang**

*The main characteristics of the WTA approaches.*

*A general categorization for WTA problem formulation approaches.*

**[22]**

**[35]**

*attack (Seq).*

**Table 4.**

**Figure 1.**

**83**

**Area Defense systems**


In order to better understand the role and importance of these aspects and how to provide a distinctive feature of WTA problem in an air defense system, we shall consider each in further details.

*Simultaneous or Sequential Attack:* A simultaneous attack is one for which the defense sees all the incoming threats to intercept. The term "known attack size" is also used synonymously for simultaneous attack [36] and is often used in air defense WTA systems on Above Water Warfare (AWW). A sequential attack is the case for which the defense does not know the number of attacking groups in a raid and the number of attackers in each attack group is often used in a ground based air defense context. A mixture of simultaneous and sequential attack may exist for real world situations.

*Weapon Types:* In a defense scenario in general, attackers and/or defenders may be identical or multiple types. In air defense scenarios in particular, the same pattern holds as well. In practice defender and attackers usually have different types and are equipped with different weapon systems. These attributes usually complicate the WTA problem.

*Layered Defense:* With reference to the significance of the defended assets, various weapon types are deployed for their protection (i.e. hard-kill and soft-kill weapons). Defense systems of different types, protecting the same targets might have different effective ranges and different functionality. This issue constitutes the layers of defense. In real-word situations, the numbers of these layers are varied and typically have overlaps.

*Interceptor Allocation Policy:* The defense's interceptor allocation policy such as salvo, shoot-look-shoot and shoot-shoot-look affects the performance and modeling of the air defense system. Defensive systems may have single or multiple engagement opportunities depending on the time–space conditions of the interception and weapon characteristics. Moreover, in WTA literature the defender's interceptors are generally organized into two categories: hard-kill and soft-kill weapons. The hardkill weapons aim at physically destroying an incoming threat by collision or explosion. The soft-kill weapons aim at diverting the threat from its target using various electronic counter measures [37]. A high volume of research pertains to consideration of hard-kill weapons; generally, this two weapon types are supervised by different control operators. The optimal combining and scheduling of these weapon types, is the responsibility of the higher level commander. This process often is a complex task and usually is studied in the planning systems designing field [37].

*Online or Offline Applications:* Optimal defensive resource allocation has two main classes of applications, these are, 1) the Online scenario, that is, deploying defensive resources in real time, during real engagements and 2) the Offline

#### *A Survey on Weapon Target Allocation Models and Applications DOI: http://dx.doi.org/10.5772/intechopen.96318*

scenario, when using allocation algorithms to simulate and model the effectiveness of defensive resources against a given threat scenario. The real-time aspect is one of the major characteristics of real-world air defense situations. Operations research community is the flagship of this area. But despite these initiatives, in many studies in this field real-time aspect of the problem could not be traced.


*Area Defense (AD), Point Defense (PD), Different Weapon Types (Diff), Identical Weapon Types (Iden), Multiple Layers of defense (Mul),One Layers of defense (One), Shot (S), Look (L), Simultaneous attack (Simul), Sequential attack (Seq).*

#### **Table 4.**

important characteristics for the modeling and the solution process in the air

In order to better understand the role and importance of these aspects and how to provide a distinctive feature of WTA problem in an air defense system, we shall

*Simultaneous or Sequential Attack:* A simultaneous attack is one for which the defense sees all the incoming threats to intercept. The term "known attack size" is also used synonymously for simultaneous attack [36] and is often used in air defense WTA systems on Above Water Warfare (AWW). A sequential attack is the case for which the defense does not know the number of attacking groups in a raid and the number of attackers in each attack group is often used in a ground based air defense context. A mixture of simultaneous and sequential attack may exist for real

*Weapon Types:* In a defense scenario in general, attackers and/or defenders may

be identical or multiple types. In air defense scenarios in particular, the same pattern holds as well. In practice defender and attackers usually have different types and are equipped with different weapon systems. These attributes usually compli-

*Layered Defense:* With reference to the significance of the defended assets, various weapon types are deployed for their protection (i.e. hard-kill and soft-kill weapons). Defense systems of different types, protecting the same targets might have different effective ranges and different functionality. This issue constitutes the layers of defense. In real-word situations, the numbers of these layers are varied and

*Interceptor Allocation Policy:* The defense's interceptor allocation policy such as salvo, shoot-look-shoot and shoot-shoot-look affects the performance and modeling of the air defense system. Defensive systems may have single or multiple engagement opportunities depending on the time–space conditions of the interception and weapon characteristics. Moreover, in WTA literature the defender's interceptors are generally organized into two categories: hard-kill and soft-kill weapons. The hardkill weapons aim at physically destroying an incoming threat by collision or explosion. The soft-kill weapons aim at diverting the threat from its target using various electronic counter measures [37]. A high volume of research pertains to consideration of hard-kill weapons; generally, this two weapon types are supervised by different control operators. The optimal combining and scheduling of these weapon types, is the responsibility of the higher level commander. This process often is a complex task and usually is studied in the planning systems designing field [37]. *Online or Offline Applications:* Optimal defensive resource allocation has two main classes of applications, these are, 1) the Online scenario, that is, deploying defensive resources in real time, during real engagements and 2) the Offline

defense applications are:

1.Simultaneous or sequential attack,

*Computational Optimization Techniques and Applications*

4.One or multiple layers of defense,

5. Interceptor WTA policy,

consider each in further details.

world situations.

cate the WTA problem.

typically have overlaps.

**82**

6.Online or Offline application.

3.Number of attacking and defending weapon types,

2.Point or area defense systems,

*The main characteristics of the WTA approaches.*

#### **Figure 1.**

*A general categorization for WTA problem formulation approaches.*

The importance of the online scenario is immediate; however, the offline scenario also has significant value and can perceivably be used to aid acquisition or to estimate a measure of preparedness. Further, a capability to consider offline scenarios will most likely enhance the development of online algorithms. This claim follows naturally from the inherent complexity in defensive resource allocation problems, which often necessitates unavoidable approximation for online applications [38].

The constraint set (7) reflects the capability of weapons for firing at multiple targets at the same time and known as capability constraints. Most of actual weapons can shoot only one target at a time. Besides, a special weapon that is capable of engaging multiple targets simultaneously can be viewed as multiple separate weapons. Therefore in most of the WTA literature *nk* ¼ 1 for ∀*k*∈ f g 1, 2, … ,*W* .

The constraint set (8) limits the weapon cost for each target at each stage, therefore, they express as strategy constraints. The setting of *mi* ð Þ *i* ¼ 1, 2, … , T usually depends on the combat performance of available weapons and defender's strategy. For missile-based defense systems and the SLS engagement policy, often *mi* ¼ 1. For artillery-based defense systems, the value of *mi* might be increased

The constraint set (9) depicts the amount of ammunition available for weapons and the constraints are known as resource constraints. In DWTA modeling often it is assumed that, the deployment of additional ammunition is not possible in a

Constraint set (10) is very important to actual dynamic WTA problems since it takes into account the influence of time windows on the engagement feasibility of weapons (In fact, it represents the difference between static and dynamic modeling). *fik*ð Þt is the indication of actual engagement feasibility for weapon *k* assigned to target *i* in stage *t*. If weapon *k* can shoot at target *i* in stage *t* with any potential reason then *fik*ðÞ¼ t 1; *fik*ðÞ¼ t 0 otherwise [5]. This set of constrains increases the complexity of DWTA problems and the difficulty of generating feasible solutions [5]. In addition to the above constraints, there are a class of technical constrains as well. Constraints such as blind zones (i.e. for fining units and hostile targets), bounds on the survival value of an asset/hostile target [42], scheduling constraints (e.g. constraints such that a weapon has to be shot at a target by a specified time or it is rendered unusable), as well as correlations and heterogeneity between different

defensive weapon types (e.g. hard-kill and soft-kill) and so on [43].

As it is evident from the available literature, a lot of different algorithmic approaches have been suggested for solving the WTA problem in air defense

**5. Algorithmic approach/solution methods**

greatly under the same demand on defense strength [40].

*A Survey on Weapon Target Allocation Models and Applications*

*DOI: http://dx.doi.org/10.5772/intechopen.96318*

X *S*

X j j *T*

*i*¼1

*xik*ð Þ*t* ≤ *fik*ð Þt , ∀*t*∈f g 1, 2, … , *S*

*t*¼1

• Engagement feasibility constraint:

*xik*ð Þ*t* ≤ *mi*, ∀*t*∈ f g 1, 2, … , *S* , ∀*i*∈ f g 1, 2, … , Tj j (8)

*xik*ð Þ*t* ≤ *Nk*, ∀*k*∈f g 1, 2, … , j j *W* (9)

<sup>∀</sup>*k*∈f g 1, 2, … , j j *<sup>W</sup>* , <sup>∀</sup>*i*∈f g 1, 2, … , Tj j (10)

• Strategy constraint:

• Resource constraint:

particular operation.

**85**

X j j *W*

*k*¼1

The classification of related literature that was discussed in preceding section is summarized in **Table 4**. This table contains only the related research which has the above-mentioned properties and those papers which do not talk on their model and their characteristics are excluded. A comprehensive categorization for WTA problem formulation approaches is illustrated in **Figure 1**.

#### **4. Constraints**

The WTA problem is subject to various limitations that must be satisfied prior to optimization process. In this section the set of constraints discussed in the WTA literature are reviewed. It is interesting to note that, duo to emergence of time parameter in dynamic mode (i.e. DWTA) the constraints are more diverse.

#### **4.1 SWTA constraints**

The following constraints are often raised in the SWTA model and here are called as general constraints:

$$\sum\_{i=1}^{|T|} X\_{ik} = \mathbf{1}, \quad \forall k \in \{1, 2, \dots, |W|\} \tag{4}$$

$$\sum\_{i=1}^{|T|} X\_{ik} \le \mathbf{1}, \quad \forall k \in \{1, 2, \dots, |W|\}\tag{5}$$

$$X\_{ik} \in \{0, 1\}, \quad \forall i \in \{1, 2, \dots, |T|\}, \quad \forall k \in \{1, 2, \dots, |W|\} \tag{6}$$

Eq. (4) means that each firing unit should be assigned to a target and Eq. (6) shows that fractional assignments of firing units to targets are not possible [5]. If the allocation of a certain firing unit to a target is not mandatory the Eq. (4) will be replaced as (5).

#### **4.2 DWTA constraints**

The DWTA often divides the total duration of a defensive operation into several discrete time steps in which information is obtained about the allocation outcomes of the previous stages. The DWTA problem aims to assign weapons optimally over time and this feature increases the diversity of constraints in dynamic mode. Therefore, in addition to the limitations listed for SWTA, the following constraints are also considered: capability constraints, strategy constraints, resource constraints, and engagement feasibility constraints.

• Capability constraint:

$$\sum\_{i=1}^{|T|} \varkappa\_{ik}(t) \le n\_k, \quad \forall t \in \{1, 2, \dots, S\}, \quad \forall k \in \{1, 2, \dots, |W|\}\tag{7}$$

*A Survey on Weapon Target Allocation Models and Applications DOI: http://dx.doi.org/10.5772/intechopen.96318*

The constraint set (7) reflects the capability of weapons for firing at multiple targets at the same time and known as capability constraints. Most of actual weapons can shoot only one target at a time. Besides, a special weapon that is capable of engaging multiple targets simultaneously can be viewed as multiple separate weapons. Therefore in most of the WTA literature *nk* ¼ 1 for ∀*k*∈ f g 1, 2, … , *W* .

• Strategy constraint:

The importance of the online scenario is immediate; however, the offline scenario also has significant value and can perceivably be used to aid acquisition or to estimate a measure of preparedness. Further, a capability to consider offline scenarios will most likely enhance the development of online algorithms. This claim follows naturally from the inherent complexity in defensive resource allocation problems, which

The classification of related literature that was discussed in preceding section is summarized in **Table 4**. This table contains only the related research which has the above-mentioned properties and those papers which do not talk on their model and their characteristics are excluded. A comprehensive categorization for WTA

The WTA problem is subject to various limitations that must be satisfied prior to optimization process. In this section the set of constraints discussed in the WTA literature are reviewed. It is interesting to note that, duo to emergence of time parameter in dynamic mode (i.e. DWTA) the constraints are more diverse.

The following constraints are often raised in the SWTA model and here are

Eq. (4) means that each firing unit should be assigned to a target and Eq. (6) shows that fractional assignments of firing units to targets are not possible [5]. If the allocation of a certain firing unit to a target is not mandatory the Eq. (4) will be

The DWTA often divides the total duration of a defensive operation into several discrete time steps in which information is obtained about the allocation outcomes of the previous stages. The DWTA problem aims to assign weapons optimally over time and this feature increases the diversity of constraints in dynamic mode. Therefore, in addition to the limitations listed for SWTA, the following constraints are also considered: capability constraints, strategy constraints, resource con-

*xik*ð Þ*t* ≤*nk*, ∀*t* ∈f g 1, 2, … , *S* , ∀*k*∈f g 1, 2, … , j j *W* (7)

*Xik* ¼ 1, ∀*k*∈f g 1, 2, … , j j *W* (4)

*Xik* ≤1, ∀*k*∈ f g 1, 2, … , j j *W* (5)

*Xik* ∈f g 0, 1 , ∀*i*∈f g 1, 2, … , j j *T* , ∀*k*∈f g 1, 2, … , j j *W* (6)

often necessitates unavoidable approximation for online applications [38].

problem formulation approaches is illustrated in **Figure 1**.

*Computational Optimization Techniques and Applications*

X j j *T*

*i*¼1

X j j *T*

*i*¼1

straints, and engagement feasibility constraints.

**4. Constraints**

**4.1 SWTA constraints**

replaced as (5).

**4.2 DWTA constraints**

• Capability constraint:

X j j *T*

*i*¼1

**84**

called as general constraints:

$$\sum\_{k=1}^{|W|} \varkappa\_{ik}(t) \le m\_i, \quad \forall t \in \{1, 2, \dots, \mathcal{S}\}, \quad \forall i \in \{1, 2, \dots, |\mathcal{T}|\} \tag{8}$$

The constraint set (8) limits the weapon cost for each target at each stage, therefore, they express as strategy constraints. The setting of *mi* ð Þ *i* ¼ 1, 2, … , T usually depends on the combat performance of available weapons and defender's strategy. For missile-based defense systems and the SLS engagement policy, often *mi* ¼ 1. For artillery-based defense systems, the value of *mi* might be increased greatly under the same demand on defense strength [40].

• Resource constraint:

$$\sum\_{t=1}^{S} \sum\_{i=1}^{|T|} \varkappa\_{ik}(t) \le \mathcal{N}\_k, \quad \forall k \in \{1, 2, \dots, |W|\} \tag{9}$$

The constraint set (9) depicts the amount of ammunition available for weapons and the constraints are known as resource constraints. In DWTA modeling often it is assumed that, the deployment of additional ammunition is not possible in a particular operation.

• Engagement feasibility constraint:

$$\begin{aligned} \left| \mathbf{x}\_{ik}(t) \leq f\_{ik}(\mathbf{t}), \quad \forall t \in \{1, 2, \dots, S\} \\ \forall k \in \{1, 2, \dots, |W|\}, \quad \forall i \in \{1, 2, \dots, |\mathbf{T}|\} \end{aligned} \tag{10}$$

Constraint set (10) is very important to actual dynamic WTA problems since it takes into account the influence of time windows on the engagement feasibility of weapons (In fact, it represents the difference between static and dynamic modeling). *fik*ð Þt is the indication of actual engagement feasibility for weapon *k* assigned to target *i* in stage *t*. If weapon *k* can shoot at target *i* in stage *t* with any potential reason then *fik*ðÞ¼ t 1; *fik*ðÞ¼ t 0 otherwise [5]. This set of constrains increases the complexity of DWTA problems and the difficulty of generating feasible solutions [5].

In addition to the above constraints, there are a class of technical constrains as well. Constraints such as blind zones (i.e. for fining units and hostile targets), bounds on the survival value of an asset/hostile target [42], scheduling constraints (e.g. constraints such that a weapon has to be shot at a target by a specified time or it is rendered unusable), as well as correlations and heterogeneity between different defensive weapon types (e.g. hard-kill and soft-kill) and so on [43].

#### **5. Algorithmic approach/solution methods**

As it is evident from the available literature, a lot of different algorithmic approaches have been suggested for solving the WTA problem in air defense systems. A review of the algorithmic approaches proposed in the literature of WTA is presented in this section and a summary of them is depicted in **Table 5**.

chromosomes and a new crossover/mutation operator called "circle swap" [68]. Sahin and Leblebicioglu applied fuzzy reasoning to approximate optimum allocations in real-time for use on a battlefield [48]. Lagrangian relaxation was proposed by Yu Z et al. to decompose the problem into two tractable sub-problems while iteratively

Similar to the SWTA, numerous methods have been employed to provide solutions for various types of DWTA problems. The DWTA divides the total duration of a defensive operation into several discrete time steps in which information is obtained about the allocation outcomes of the previous stages. Any hostile targets destroyed during a stage will be no longer targeted in subsequent stages, allowing the operator to make better use of their weapons. Hosein is an originator of the dynamic instance. He provided several results which are generalizable to the DWTA problem [13]. Murphey used stochastic decomposition for the two-stage DWTA problem [15]. Chang used a static WTA approximation scheme within an iterative linear network flow framework to efficiently provide high-quality solutions for the DWTA [70]. Wu et al. applied a modified GA to the DWTA and introduced weapon use deadlines within the problem formulation [71]. Xin et al. developed a heuristic which uses problem information (domain knowledge) and constraint programming to assign priorities to assignments [40]. Evolutionary heuristics which use a hybridized GA with memetic algorithms have also been applied by Chen et al. [72]. Other researches have been done to solve the WTA problem

Though it has not been researched to the extent of the SWTA problem, the DWTA problem provides a more practical implementation by including a temporal component. As such, the DWTA is a much more complex problem from a mathematical standpoint and has received a fair amount of attention in the literature. Due to the increasing computing power of computers and progress of science such as artificial intelligence (AI), researchers are moved towards the use of meta-heuristic

In this Chapter, the literature in the area of WTA system with the emphasis on

the modeling and solving approaches has been reviewed. Based on modeling approaches the literature has been classified into two groups. The first class of approaches allocates the defensive sources to targets without taking the behavior of the opposing side into account. The second class of approaches considers the opposing side's moves as well as the defensive moves. In the second part, the important characteristics for the WTA models and the solution process for solving the WTA problem are reviewed. The results show that solving algorithms, like many other problems, can be divided in three main categories: enumerative techniques (i.e. exact or exhaustive methods), heuristic/approximate techniques and the

algorithms to solving the WTA especially for DWTA problem.

updating the Lagrange multipliers [69].

*DOI: http://dx.doi.org/10.5772/intechopen.96318*

*A Survey on Weapon Target Allocation Models and Applications*

which are listed in **Table 5**.

**6. Conclusions**

meta-heuristic ones.

**87**

The results show that the WTA problem solving algorithms like many other problems can be divided into three main categories: enumerative techniques, heuristic/approximate techniques and meta-heuristic algorithms. Enumerative techniques are typically guaranteed to find an optimal solution in bounded time for every finite size problem instance; hence, they are referred to as exact algorithms or exhaustive search. The problem with exact algorithms is that the computation times needed often are too high for practical applications. For this reason, in solving the real-world problems with large sizes heuristic methods are commonly used. With heuristic/meta-heuristic algorithms (e.g. guided random search techniques/Genetic Algorithm (GA)), finding an optimal solution is not guaranteed, but instead we can find good solutions in a significantly reduced amount of time [2]. Hence, heuristic/meta-heuristic algorithms are used when we seek good feasible solutions for optimization problems in circumstances where the complexity of the problem or the limited available time for its solution does not allow using the exact algorithms [3]. A summary of the algorithms proposed for WTA is shown in **Table 5**; as mentioned they include exact algorithm, heuristic algorithm as well as metaheuristic algorithms.

In addition to the algorithmic approaches mentioned in **Table 5**, various variants and combinations of these algorithms also have been suggested in literature for WTA. For example, Khosla [61] developed an algorithm by merging and modifying Simulated Annealing (SA) and GA, Metler and Preston [62] used the solution returned from the MMR algorithm and applied local search on this solution. A GA combined with local search is suggested by Lee et al. [63]. In their study they used Partially Mapped Crossover (PMX), inversion mutation and simulated annealing as local search. In another study they try to resolve the WTA problem with an improved GA, they used greedy reformation scheme so as to have locally optimal offspring (greedy eugenics) which is a kind of novel crossover operator (EX) that try to inherit the good genes from the parents [64]. In the work done by Lu et al. dynamic probability of mutation and crossover in GA have been used to generate new offspring [65]. Shang et al. added an extra step to the GA, after creating new chromosomes by crossover and mutation operators. A local search is applied to create new chromosomes and then evaluates them [66]. They also used a crossover operator called an elite preserving crossover operator to enrich a more effective search. Dou et al. uses chromosomes in matrix representation and adopts the dynamically adjusting punishment gene and self-regulating punishment rates [67]. Li et al. uses matrix-type encoding for


**Table 5.** *Classification of the algorithmic approaches used to solve the WTA models.* *A Survey on Weapon Target Allocation Models and Applications DOI: http://dx.doi.org/10.5772/intechopen.96318*

chromosomes and a new crossover/mutation operator called "circle swap" [68]. Sahin and Leblebicioglu applied fuzzy reasoning to approximate optimum allocations in real-time for use on a battlefield [48]. Lagrangian relaxation was proposed by Yu Z et al. to decompose the problem into two tractable sub-problems while iteratively updating the Lagrange multipliers [69].

Similar to the SWTA, numerous methods have been employed to provide solutions for various types of DWTA problems. The DWTA divides the total duration of a defensive operation into several discrete time steps in which information is obtained about the allocation outcomes of the previous stages. Any hostile targets destroyed during a stage will be no longer targeted in subsequent stages, allowing the operator to make better use of their weapons. Hosein is an originator of the dynamic instance. He provided several results which are generalizable to the DWTA problem [13]. Murphey used stochastic decomposition for the two-stage DWTA problem [15]. Chang used a static WTA approximation scheme within an iterative linear network flow framework to efficiently provide high-quality solutions for the DWTA [70]. Wu et al. applied a modified GA to the DWTA and introduced weapon use deadlines within the problem formulation [71]. Xin et al. developed a heuristic which uses problem information (domain knowledge) and constraint programming to assign priorities to assignments [40]. Evolutionary heuristics which use a hybridized GA with memetic algorithms have also been applied by Chen et al. [72]. Other researches have been done to solve the WTA problem which are listed in **Table 5**.

Though it has not been researched to the extent of the SWTA problem, the DWTA problem provides a more practical implementation by including a temporal component. As such, the DWTA is a much more complex problem from a mathematical standpoint and has received a fair amount of attention in the literature. Due to the increasing computing power of computers and progress of science such as artificial intelligence (AI), researchers are moved towards the use of meta-heuristic algorithms to solving the WTA especially for DWTA problem.

#### **6. Conclusions**

systems. A review of the algorithmic approaches proposed in the literature of WTA

The results show that the WTA problem solving algorithms like many other problems can be divided into three main categories: enumerative techniques, heuristic/approximate techniques and meta-heuristic algorithms. Enumerative techniques are typically guaranteed to find an optimal solution in bounded time for every finite size problem instance; hence, they are referred to as exact algorithms or exhaustive search. The problem with exact algorithms is that the computation times needed often are too high for practical applications. For this reason, in solving the real-world problems with large sizes heuristic methods are commonly used. With heuristic/meta-heuristic algorithms (e.g. guided random search techniques/Genetic Algorithm (GA)), finding an optimal solution is not guaranteed, but instead we can

is presented in this section and a summary of them is depicted in **Table 5**.

*Computational Optimization Techniques and Applications*

find good solutions in a significantly reduced amount of time [2]. Hence,

self-regulating punishment rates [67]. Li et al. uses matrix-type encoding for

**Exact algorithms** Malcolm [38], Ahuja et al. [7], Sikanen [44], Karasakal [10], Johansson [5], Turan [20], Bogdanowicz [45], Ahner and Parson [4], Kline [6]

et al. [25], Zhang and Zhuang [35], Hocaoğlu [26].

[58], Xu et al. [59], Ejaz et al. [60]

*Classification of the algorithmic approaches used to solve the WTA models.*

Newman et al. [16], Tokgöz and Bulkan [22], Yuming et al. [21], Parson [34], Kalyanam et al. [8], Davis et al. [23], Kline [6], Kline et al. [46, 47], Gülpınar

Turan [20], Tokgöz and Bulkan [22], Sahin and Leblebicioglu [48], Bogdanowicz et al. [45], Yuming et al. [21], Han et al. [49, 50], Ahner and Parson [4], Pendharkar [51], Davis et al. [23], Gong et al. [52], Klinkowski et al. [53], Gülpınar et al. [25], Wang et al. [54], Ma et al. [55], Kline et al. [27], Rudek and Heppner [43], Kalaiselvi and Selvi [56], Shooli and Javidi [57], Zhu et al.

heuristic algorithms.

**Solving technique References**

**Heuristic algorithms**

**Table 5.**

**86**

**Meta-Heuristic algorithms**

heuristic/meta-heuristic algorithms are used when we seek good feasible solutions for optimization problems in circumstances where the complexity of the problem or the limited available time for its solution does not allow using the exact algorithms [3]. A summary of the algorithms proposed for WTA is shown in **Table 5**; as mentioned they include exact algorithm, heuristic algorithm as well as meta-

In addition to the algorithmic approaches mentioned in **Table 5**, various variants and combinations of these algorithms also have been suggested in literature for WTA. For example, Khosla [61] developed an algorithm by merging and modifying Simulated Annealing (SA) and GA, Metler and Preston [62] used the solution returned from the MMR algorithm and applied local search on this solution. A GA combined with local search is suggested by Lee et al. [63]. In their study they used Partially Mapped Crossover (PMX), inversion mutation and simulated annealing as local search. In another study they try to resolve the WTA problem with an improved GA, they used greedy reformation scheme so as to have locally optimal offspring (greedy eugenics) which is a kind of novel crossover operator (EX) that try to inherit the good genes from the parents [64]. In the work done by Lu et al. dynamic probability of mutation and crossover in GA have been used to generate new offspring [65]. Shang et al. added an extra step to the GA, after creating new chromosomes by crossover and mutation operators. A local search is applied to create new chromosomes and then evaluates them [66]. They also used a crossover operator called an elite preserving crossover operator to enrich a more effective search. Dou et al. uses chromosomes in matrix representation and adopts the dynamically adjusting punishment gene and

In this Chapter, the literature in the area of WTA system with the emphasis on the modeling and solving approaches has been reviewed. Based on modeling approaches the literature has been classified into two groups. The first class of approaches allocates the defensive sources to targets without taking the behavior of the opposing side into account. The second class of approaches considers the opposing side's moves as well as the defensive moves. In the second part, the important characteristics for the WTA models and the solution process for solving the WTA problem are reviewed. The results show that solving algorithms, like many other problems, can be divided in three main categories: enumerative techniques (i.e. exact or exhaustive methods), heuristic/approximate techniques and the meta-heuristic ones.

**References**

(3): 346–351.

173. (In Persian)

2015; 9(8):1689–1701.

[1] Manne AS. A Target-Assignment Problem. Operations Research. 1958; 6

*DOI: http://dx.doi.org/10.5772/intechopen.96318*

*A Survey on Weapon Target Allocation Models and Applications*

[10] Karasakal O. Air defense missiletarget allocation models for a naval task group. Computers & Operations Research. 2008; 35(6):1759–1770.

[11] DenBroader GG, Ellison RE, Emerling L. On optimum target

[12] Orlin D. Optimal Weapon Allocation Against Layered Defenses. Naval Research Logistics. 1987; 34(5):

[13] Hosein PA. A class of dynamic nonlinear resource allocation problems.

Massachusetts Inst Of Tech Cambridge Lab For Information And Decision

[14] Huaiping C, Jingxu L, Yingwu C, Hao W. Survey of the research on dynamic weapon-target assignment

Engineering and Electronics. 2006; 17

[15] Murphey RA. An approximate algorithm for a weapon target assignment stochastic program. In: Approximation and Complexity in Numerical Optimization. Springer.

[16] Newman AM, Rosenthal RE, Salmeron J, Brown GG, Price W, Rowe A, Fennemore CF, Taft RL. Optimizing Assignment of Tomahawk Cruise Missile Missions to Firing Units. Naval Research Logistics. 2011; 58(3):

[17] C Leboucher, H-S Shin, S Le Menec, A Tsourdos, A Kotenkoff ,P Siarry, R Chelouah. Novel Evolutionary Game Based Multi-Objective Optimisation for Dynamic Weapon Target Assignment. Preprints of the 19th World Congress, The International Federation of

Tech. Rep. LIDS-TH-1922,

problem. Journal of Systems

7(3):322–326.

605–617.

Systems; 1989.

(3):559–565.

2000; 406–421.

281–295.

assignments. Operations Research. 1958;

[2] Ghanbari, A. A; Alaei, H. Meta-Heuristic Algorithms for Resource Management in Crisis Based on OWA Approach. Appl Intell. 2020; https://doi. org/10.1007/s10489-020-01808-y.

[3] Ghanbari, A. A.; Alaei, H.; Mohammadnia, M. A Multi-Stage Modelling Approche for Allocation of Defense Resources to Invading Targets. Adv. Defence Sci.Technol. 2020; 2:167–

[4] Ahner DK, Parson CR. Optimal multi-stage allocation of weapons to targets using adaptive dynamic programming. Optimization Letters.

[5] Johansson F. Evaluating the

[6] Kline A. Real-time heuristic

[7] Ahuja RK, Kumar A, Jha KC, Orlin JB. Exact and Heuristic Methods for the Weapon Target Assignment Problem. Operations Research. 2007; 55

(6):1136–1146.

2016; 49(17):7–10.

**89**

Performance of TEWA Systems [thesis]. Skövde: University of Skövde; 2010.

algorithms for the static weapon-target assignment problem. Master's thesis, Air Force Institute of Technology; 2017.

[8] Kalyanam K, Rathinam S, Casbeer D, Pachter M. Optimal Threshold Policy for Sequential Weapon Target Assignment. IFAC-PapersOnLine.

[9] Fujita H, Gaeta A, Loia V, Orciuoli F. Hypotheses Analysis and Assessment in counter-terrorism activities: a method based on OWA and Fuzzy Probabilistic Rough Sets. IEEE Transactions on Fuzzy

Systems; 2019. DOI: 10.1109/ TFUZZ.2019.2955047.
