Greedy algorithms best for multiple targets

December 9, 2010

What algorithms should an air defense system work with? Particle swarm algorithms if there are ten targets to be hit. If there are more than ten targets, greedy algorithms work best. These findings are presented by researcher Fredrik Johansson at the Informatics Research Centre, University of Skovde, in Sweden.

So-called TEWA systems (Threat Evaluation & Weapon Allocation) are used to protect strategic targets from enemy attacks, such as an airfield that needs to be protected from incoming missiles.

The systems discover threats, evaluates the threats, and aims the defender's weapons system to be able to knock out the threat. The final decision to fire is then made by an operator.

Researcher Fredrik Johansson at the Informatics Research Centre, University of Skövde, in Sweden, recently defended his doctoral thesis on algorithms for TEWA systems.

"In the existing research literature there are proposals regarding what algorithms may be appropriate to use in TEWA systems. I have developed methods to test which algorithms work best in practice," explains Fredrik Johansson.

Fredrik Johansson's study shows that what determines the choice of algorithm is the number of weapons in the TEWA system and the number of targets the system has to deal with.

"So-called particle swarm algorithms are effective if it's a matter of up to about ten targets and ten weapons. If the TEWA system needs to keep track of more targets and weapons, we should use what are called greedy algorithms instead," says Fredrik Johansson.

A greedy algorithm – simply put – is fast but not perfect. The algorithm works under broad guidelines and does not test all the alternatives necessary to obtain an optimal solution. The fact that it doesn't need to test certain solutions makes it a rapid algorithm, a property that is crucial in a TEWA system.

"You can't let it take many seconds between the system discovering a threat and the operator deciding whether or not to fire," says Fredrik Johansson.

In previous studies TEWA systems have nearly always been treated as two parts: threat evaluation and weapon allocation separately. Fredrik Johansson's study is one of the first to see the system as a unit. But to claim that you are the first to study something may be difficult when it comes to TEWA systems.

"Those conducting research in this field don't always know what knowledge there is beneath the surface. There's probably some research about TEWA systems that is secret and not available to us ordinary researchers," concludes Fredrik Johansson.

Explore further: Researchers investigate tracking, sensors to assist Air Force

Related Stories

Researchers investigate tracking, sensors to assist Air Force

September 10, 2007

Two Louisiana Tech faculty members, Dr. Sumeet Dua, an assistant professor of computer science, and Dr. Rastko Selmic, an assistant professor of electrical engineering, are using their skills and technical knowledge to help ...

Secure radio signal for central locking

February 1, 2010

(PhysOrg.com) -- Remote central locking is among the most convenient aspects of modern motoring. Transmission of the radio signal that activates the system is not particularly secure, however. A new encryption technique increases ...

A new way to help computers recognize patterns

January 25, 2006

Researchers at Ohio State University have found a way to boost the development of pattern recognition software by taking a different approach from that used by most experts in the field. This work may impact research in areas ...

A new method for developing safer drugs

May 10, 2010

Amodiaquine was introduced as an antimalarial drug, but was withdrawn when serious adverse effects were observed. Scientists at the University of Gothenburg, Sweden, have now developed a method that can be used to develop ...

Recommended for you

Your (social media) votes matter

January 24, 2017

When Tim Weninger conducted two large-scale experiments on Reddit - otherwise known as "the front page of the internet" - back in 2014, the goal was to better understand the ripple effects of malicious voting behavior and ...

Protective wear inspired by fish scales

January 24, 2017

They started with striped bass. Over a two-year period the researchers went through about 50 bass, puncturing or fracturing hundreds of fish scales under the microscope, to try to understand their properties and mechanics ...

'Droneboarding' takes off in Latvia

January 22, 2017

Skirted on all sides by snow-clad pine forests, Latvia's remote Lake Ninieris would be the perfect picture of winter tranquility—were it not for the huge drone buzzing like a swarm of angry bees as it zooms above the solid ...

Singapore 2G switchoff highlights digital divide

January 22, 2017

When Singapore pulls the plug on its 2G mobile phone network this year, thousands of people could be stuck without a signal—digital have-nots left behind by the relentless march of technology.

Making AI systems that see the world as humans do

January 19, 2017

A Northwestern University team developed a new computational model that performs at human levels on a standard intelligence test. This work is an important step toward making artificial intelligence systems that see and understand ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.