{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T05:25:20Z","timestamp":1740893120236,"version":"3.38.0"},"reference-count":28,"publisher":"SAGE Publications","issue":"12","license":[{"start":{"date-parts":[[2020,3,5]],"date-time":"2020-03-05T00:00:00Z","timestamp":1583366400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"Joint Fund of the Ministry of Education of China","award":["6141A020223"],"award-info":[{"award-number":["6141A020223"]}]},{"name":"Research Project Fund","award":["17-163-11-ZT-003-018-01"],"award-info":[{"award-number":["17-163-11-ZT-003-018-01"]}]},{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["11332001"],"award-info":[{"award-number":["11332001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["61773024"],"award-info":[{"award-number":["61773024"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Transactions of the Institute of Measurement and Control"],"published-print":{"date-parts":[[2020,8]]},"abstract":"<jats:p> Based on minimizing the enclosed area around the target of multi-attackers, two novel guidance laws are created to address the issue of cooperative encirclement and simultaneous attack. The only requirement for the multi-attacker communication network is that it should contain a directed spanning tree, and does not require all attackers to observe the target information, where at least one can observe the target. To reduce the remaining relative distances between the target and attackers simultaneously, and to make the overload in direction perpendicular to the line of sight converge to zero, the multiple-attackers-single-target problem is effectively solved and can avoid collisions among attackers as well as difficulties in estimation of remaining time. Simulation results confirmed the effectiveness of the proposed guidance laws. <\/jats:p>","DOI":"10.1177\/0142331220908683","type":"journal-article","created":{"date-parts":[[2020,3,5]],"date-time":"2020-03-05T11:40:05Z","timestamp":1583408405000},"page":"2155-2165","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Design of distributed guidance laws for multiple unmanned aerial vehicles cooperative attack of a moving target based on reducing surrounding area"],"prefix":"10.1177","volume":"42","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3773-7121","authenticated-orcid":false,"given":"Xiaoqian","family":"Wei","sequence":"first","affiliation":[{"name":"Department of Mechanics and Engineering Science, Science and Technology on Aerospace Intelligent Control Laboratory, The State Key Laboratory for Turbulence and Complex Systems, College of Engineering, Peking University, People\u2019s Republic of China"}]},{"given":"Jianying","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Mechanics and Engineering Science, Science and Technology on Aerospace Intelligent Control Laboratory, The State Key Laboratory for Turbulence and Complex Systems, College of Engineering, Peking University, People\u2019s Republic of China"}]},{"given":"Xiangru","family":"Fan","sequence":"additional","affiliation":[{"name":"Clarkson University, USA"}]}],"member":"179","published-online":{"date-parts":[[2020,3,5]]},"reference":[{"key":"bibr1-0142331220908683","doi-asserted-by":"publisher","DOI":"10.2514\/1.G000205"},{"key":"bibr2-0142331220908683","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2017.2677313"},{"key":"bibr3-0142331220908683","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2714688"},{"key":"bibr4-0142331220908683","doi-asserted-by":"publisher","DOI":"10.2514\/1.G001618"},{"key":"bibr5-0142331220908683","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.3381"},{"key":"bibr6-0142331220908683","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.automatica.2016.06.024","volume":"73","author":"Dong X","year":"2016","journal-title":"Automatica"},{"key":"bibr7-0142331220908683","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cta.2014.0443"},{"key":"bibr8-0142331220908683","doi-asserted-by":"publisher","DOI":"10.2514\/3.20725"},{"key":"bibr9-0142331220908683","doi-asserted-by":"publisher","DOI":"10.2514\/1.40136"},{"key":"bibr10-0142331220908683","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2018.2816880"},{"key":"bibr11-0142331220908683","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2018.2850208"},{"key":"bibr12-0142331220908683","doi-asserted-by":"publisher","DOI":"10.2514\/1.58454"},{"key":"bibr13-0142331220908683","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2015.150163"},{"key":"bibr14-0142331220908683","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2012.6324662"},{"key":"bibr15-0142331220908683","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.12.030"},{"key":"bibr16-0142331220908683","doi-asserted-by":"publisher","DOI":"10.1080\/00207179.2012.675519"},{"key":"bibr17-0142331220908683","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2016.2573584"},{"key":"bibr18-0142331220908683","doi-asserted-by":"publisher","DOI":"10.1016\/j.ast.2015.08.002"},{"key":"bibr19-0142331220908683","doi-asserted-by":"publisher","DOI":"10.1016\/j.ast.2014.11.018"},{"journal-title":"Aerospace Science and Technology","year":"2019","author":"Wei X","key":"bibr20-0142331220908683"},{"key":"bibr21-0142331220908683","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2096-z"},{"key":"bibr22-0142331220908683","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2578-z"},{"key":"bibr23-0142331220908683","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysconle.2012.10.012"},{"key":"bibr24-0142331220908683","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2018.2872534"},{"journal-title":"IEEE Transactions on Cybernetics","year":"2019","author":"Zhao Y","key":"bibr25-0142331220908683"},{"key":"bibr26-0142331220908683","doi-asserted-by":"publisher","DOI":"10.2514\/1.G001609"},{"key":"bibr27-0142331220908683","doi-asserted-by":"publisher","DOI":"10.1007\/s11424-018-6317-7"},{"key":"bibr28-0142331220908683","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-016-9089-7"}],"container-title":["Transactions of the Institute of Measurement and Control"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0142331220908683","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/0142331220908683","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0142331220908683","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T06:13:48Z","timestamp":1740809628000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0142331220908683"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,5]]},"references-count":28,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["10.1177\/0142331220908683"],"URL":"https:\/\/doi.org\/10.1177\/0142331220908683","relation":{},"ISSN":["0142-3312","1477-0369"],"issn-type":[{"type":"print","value":"0142-3312"},{"type":"electronic","value":"1477-0369"}],"subject":[],"published":{"date-parts":[[2020,3,5]]}}}