Greedy algorithms best for multiple targets

Dec 09, 2010

What algorithms should an air defense system work with? Particle swarm algorithms if there are ten targets to be hit. If there are more than ten targets, greedy algorithms work best. These findings are presented by researcher Fredrik Johansson at the Informatics Research Centre, University of Skovde, in Sweden.

So-called TEWA systems (Threat Evaluation & Weapon Allocation) are used to protect strategic targets from enemy attacks, such as an airfield that needs to be protected from incoming missiles.

The systems discover threats, evaluates the threats, and aims the defender's weapons system to be able to knock out the threat. The final decision to fire is then made by an operator.

Researcher Fredrik Johansson at the Informatics Research Centre, University of Skövde, in Sweden, recently defended his doctoral thesis on algorithms for TEWA systems.

"In the existing research literature there are proposals regarding what algorithms may be appropriate to use in TEWA systems. I have developed methods to test which algorithms work best in practice," explains Fredrik Johansson.

Fredrik Johansson's study shows that what determines the choice of algorithm is the number of weapons in the TEWA system and the number of targets the system has to deal with.

"So-called particle swarm algorithms are effective if it's a matter of up to about ten targets and ten weapons. If the TEWA system needs to keep track of more targets and weapons, we should use what are called greedy algorithms instead," says Fredrik Johansson.

A greedy algorithm – simply put – is fast but not perfect. The algorithm works under broad guidelines and does not test all the alternatives necessary to obtain an optimal solution. The fact that it doesn't need to test certain solutions makes it a rapid algorithm, a property that is crucial in a TEWA system.

"You can't let it take many seconds between the system discovering a threat and the operator deciding whether or not to fire," says Fredrik Johansson.

In previous studies TEWA systems have nearly always been treated as two parts: threat evaluation and weapon allocation separately. Fredrik Johansson's study is one of the first to see the system as a unit. But to claim that you are the first to study something may be difficult when it comes to TEWA systems.

"Those conducting research in this field don't always know what knowledge there is beneath the surface. There's probably some research about TEWA systems that is secret and not available to us ordinary researchers," concludes Fredrik Johansson.

Explore further: Who drives Alibaba's Taobao traffic—buyers or sellers?

add to favorites email to friend print save as pdf

Related Stories

Secure radio signal for central locking

Feb 01, 2010

(PhysOrg.com) -- Remote central locking is among the most convenient aspects of modern motoring. Transmission of the radio signal that activates the system is not particularly secure, however. A new encryption ...

A new way to help computers recognize patterns

Jan 25, 2006

Researchers at Ohio State University have found a way to boost the development of pattern recognition software by taking a different approach from that used by most experts in the field. This work may impact research in areas ...

A new method for developing safer drugs

May 10, 2010

Amodiaquine was introduced as an antimalarial drug, but was withdrawn when serious adverse effects were observed. Scientists at the University of Gothenburg, Sweden, have now developed a method that can be used to develop ...

Recommended for you

Who drives Alibaba's Taobao traffic—buyers or sellers?

4 hours ago

As Chinese e-commerce firm Alibaba prepares for what could be the biggest IPO in history, University of Michigan professor Puneet Manchanda dug into its Taobao website data to help solve a lingering chicken-and-egg question.

Computerized emotion detector

Sep 16, 2014

Face recognition software measures various parameters in a mug shot, such as the distance between the person's eyes, the height from lip to top of their nose and various other metrics and then compares it with photos of people ...

Cutting the cloud computing carbon cost

Sep 12, 2014

Cloud computing involves displacing data storage and processing from the user's computer on to remote servers. It can provide users with more storage space and computing power that they can then access from anywhere in the ...

Teaching computers the nuances of human conversation

Sep 12, 2014

Computer scientists have successfully developed programs to recognize spoken language, as in automated phone systems that respond to voice prompts and voice-activated assistants like Apple's Siri.

User comments : 0