{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T05:28:20Z","timestamp":1740202100264,"version":"3.37.3"},"reference-count":0,"publisher":"IOS Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"abstract":"<jats:p>Weapon-target allocation (WTA) is a typical constrained combinatorial optimization problem, which is an important content of command and decision in air defense operation. WTA is known to be NP-complete problem, and the intelligent optimization methods are widely employed to solving it. A popular coding length is n*m corresponding to assigning n weapons to m targets. However, the coding length will increase greatly with the problem scale growing, and the computation is too heavy to meet the real-time requirements. This paper focuses on designing a new gene coding to improve computational efficiency. In our study, a sequence of weapons serves as gene coding, which is attached the two other codes, target code and capacity code respectively. This coding length is n and adapts to the constraints of WTA effectively. Then the operators of gene selection, crossover and mutation are designed. On the other hand, the maximum operational effectiveness is defined as the object function with the minimum consumption of ammunition. This model is based on multi-objective optimization, and is more realistic. An example shows that the method is feasible and can save computing time greatly.<\/jats:p>","DOI":"10.3233\/978-1-61499-722-1-260","type":"book-chapter","created":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:26:53Z","timestamp":1740133613000},"source":"Crossref","is-referenced-by-count":0,"title":["Research on Weapon-Target Allocation Based on Genetic Algorithm"],"prefix":"10.3233","author":[{"family":"Zhang Yan-Sheng","sequence":"additional","affiliation":[]},{"family":"Qiao Zhong-Tao","sequence":"additional","affiliation":[]},{"family":"Jing Jian-Hui","sequence":"additional","affiliation":[]}],"member":"7437","container-title":["Frontiers in Artificial Intelligence and Applications","Fuzzy Systems and Data Mining II"],"original-title":[],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:40:57Z","timestamp":1740138057000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospressISBN&isbn=978-1-61499-721-4&spage=260&doi=10.3233\/978-1-61499-722-1-260"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/978-1-61499-722-1-260","relation":{},"ISSN":["0922-6389"],"issn-type":[{"value":"0922-6389","type":"print"}],"subject":[],"published":{"date-parts":[[2016]]}}}