1. Introduction
To feed the subsequent model, the section extracts the critical 3-D trajectories of five drones (FY1–FY5) and three incoming 300 m/s missiles (M1–M3) detected at the listed positions, together with the 7 m * 10 m cylindrical decoy (center 0, 200, 0) and the smoke-screen effective range/time data; it then recaps the physics of drone-launched smoke and sets the stage for optimizing release point, burst point and UAV heading/speed (70–140 m/s) in real time.
2. Problem analysis
According to the elements given in the problem, this paper will establish a mathematical model of Cartesian coordinate system containing enemy missiles, our real targets, our decoys, our drones and smoke bombs, so as to facilitate further analysis of the problem.
2.1. Analysis of question 1
Given the known flight speeds and directions of UAV FY1 and missile M1, along with specific timing parameters for smoke screen deployment and detonation, this study first substitutes the geometric center of a real target into the Line-of-Sight (LOS) model [1].This approach determines the approximate effective occlusion period, followed by precise calculation of the actual effective occlusion duration using 16 feature points.
2.2. Analysis of question 2
Building upon the first research question, this paper employs a ballistic motion model to simulate smoke screen interference munitions 'trajectory and utilizes line-of-sight (LOS) occlusion models to evaluate shielding effectiveness. For variables including FY-1's flight direction, velocity, smoke screen deployment coordinates, and detonation points, we apply genetic algorithms. By combining four key parameters as genetic components through hybridization and random mutation processes, we ultimately obtain optimal solutions [2].
3. Assumptions and justifications
Throughout the maneuver, the enemy missile consistently targeted decoys without detecting the actual target. Air resistance was neglected, and the Earth's curvature was disregarded. Assuming the Earth's gravitational acceleration at the incident location is 9.80 m/s², and considering the smoke screen projectile moves in a vertical parabolic trajectory with the drone's velocity after launch, while maintaining a constant descent speed of 3 m/s, the analysis proceeds accordingly [3].
4. Problem 1. establishment and solution of the model
M1 initially heads for the decoy; as its 300 m/s motion shifts the LOS, the screened volume moves accordingly and is tracked by coupling the UAV-smoke shell, ballistic and LOS-geometry models.
4.1. Model building
With the decoy at the origin, the real-target base centre is (0, 200, 0), M₁ at (20 000, 0, 2 000) and FY₁ at (17 800, 0, 1 800); the missile trajectory is x(t)=20 000−300 t, y(t)=0, z(t)=2 000−0.05 t:
M1’s constant 300 m s⁻¹ velocity fixes its trajectory: vM1 = (−300, 0, −0.05) m s⁻¹ throughout.:
The motion trajectory equation of the UAV flight is established by the same idea as follows:
Since the speed and direction of the UAV remain constant after the command is issued, with a speed of 120m/s, the speed of the UAV is also constrained by a set of equations:
When t is 1.5s, the smoke screen jammer is released and moves with the initial velocity of the UAV at 1.5s:
Once released, the smoke shell follows a parabola whose initial velocity equals the drone’s at separation, so its pre-detonation speed is v(t)=vF1−gt:
After detonation the smoke cloud drifts downward at 3 m s⁻¹, so its vertical coordinate becomes z(t)=zburst−3(t−tburst):
Target = 16 rim points; smoke = sphere radius R drifting at 3 m s⁻¹; LOS M1Qi is broken while |Qi(t) − C(t)| ≤ R, and the total span of this inequality is the effective screening time:
When a point on the line is a distance of r from the center of the sphere C, the point lies on the sphere:
Let the line segment direction vector be i,The vector of the missile to the center of the ball is :
Discretise time with step Δt = 0.01 s; at each tick the LOS discriminant |Qi−C|²−R² ≥ 0 is evaluated for all 16 points, and the target is judged hidden only when every inequality is non-negative; summing the successive Δt gives the total screened interval:
4.2. Determination of objective function
Maximise
4.3. Model solution
Code gives shell (17 620, 0, 1 800) and smoke sphere (17 188, 0, 1 736.5); effective screening time is the interval from the first to the last instant all 16 rim points are inside that sphere.
4.4. Results of search
It is found that under the condition given in problem 1, the actual effective shielding time is 1.381s.
5. Problem 2. establishment and solution of the model
5.1. Model building
A two-stage search first brackets (θ, vF₁) by fast bisection, then lets a GA evolve the same pair to maximise screen time, slashing runtime by shrinking the initial space.
5.2. Determination of objective function
Maximize the missile’s effective screening time by jointly optimizing the four decision variables—UAV heading, speed, launch instant and detonation instant—in a single objective function:
5.3. Model solving
This part will omit the same steps as problem 1 and focus on the application of genetic algorithm based on binary optimization parameter range in problem 2.
Physics restricts heading to 170–180°, speed to 70–140 m s⁻¹, release to 0–2 s and detonation to 1–7 s after release.
Binary search shrinks the angle interval: coarse steps locate the neighbourhood that gives the longest screen time, then the step is halved and the scan repeated; for any parameter x, the next window is centred on the previous best x* with half the former width:
Iterative bisection delivered the final tight brackets: heading 177–179°, speed 70–75 m s⁻¹, release ≈ 0.5 s, detonation ≈ 3.3 s; these bounds shrink the GA search space and cut its workload.
The genes are one real-number chromosome: θ, vF₁, tdrop, tdet.:
Fitness equals the smoke-screen concealment time returned by the simulator: longer coverage ⇒ higher F(x).
Selection probability is proportional to fitness: pi = F(xi) / Σj F(xj).:
Linear selection favours elite genes, arithmetic crossover blends them, and mutation preserves diversity to escape local optima.
The fittest individual is cloned unchanged into the next generation, and mutated offspring fill the remaining slots.
5.4. Results of search
Drone flight Angle 177.0°, drone flight speed 72.9m/s detonation time 2.5s maximum cover time 4.540s
6. Analysis and testing of the model
6.1. The sensitivity of parameters related to differential evolution is analyzed
Sensitivity analysis of population size: For differential evolution algorithm, population size N affects the exploration ability and computational cost of the algorithm. According to empirical formula:
Sensitivity analysis of variation strategy: There are many variation strategies in differential evolution algorithm, and variation has a significant impact on iteration.
6.2. Finally, the sensitivity analysis of the parameters in particle swarm optimization algorithm is carried out
Sensitivity analysis of population size: The relationship between particle swarm optimization algorithm and population size N can be expressed by the following formula:
At this time, the critical value of population size N is calculated according to the formula. When the actual N is too small: the diversity is insufficient and the population tends to mature early and converge. When the actual N is too large: the calculation cost increases significantly, but the performance improvement is limited.
6.3. Sensitivity analysis of inertial weights
Exploration of inertial weight control algorithm-development balance, its update formula is:
Mathematical expression of adaptive weight strategy:
The effects of learning factors can be analyzed by components in the velocity update formula:
When c1 dominates (c1> c2): Diversity remains well maintained, but convergence is slow. When c2 dominates (c1 <c2): Convergence is fast, but premature.
7. Conclusion
The model's strengths include:1) Employing a genetic algorithm with differential evolution for Problem 2, where fitness analysis prevents local optimization while differential mutation enhances exploration capabilities. 2) Limitations: Genetic algorithms demonstrate high complexity under multi-parameter conditions, resulting in low time efficiency even after optimization. 3) The greedy strategy improves computational efficiency but relies on empirical rules whose selectivity lacks mathematical validation. 4) The greedy approach cannot mathematically guarantee optimal or near-optimal solutions. Evaluation focuses on solution accuracy and efficiency, providing clear directions for model refinement. The model's advantages lie in its differential evolution-based genetic algorithm, which prevents local optimization through fitness analysis and enhances exploration via differential mutation. Limitations: Genetic algorithms remain computationally intensive under complex multi-parameter conditions, with optimized solutions still showing low time efficiency. The greedy strategy improves computational efficiency but lacks mathematical validation for its selectivity. The greedy approach cannot mathematically guarantee optimal or near-optimal solutions. Evaluation focuses on solution accuracy and efficiency, providing clear directions for model refinement.
References
[1]. Zhang, X., & Liu, S. (2007). An improved genetic algorithm and its application to multi-objective optimization. Journal of Systems & Management, 16(3), 315-319.
[2]. Liu, B., Wang, L., & Jin, Y. (2007). Advances in differential evolution algorithms. Control and Decision, 22(7), 721-729.
[3]. Liu, X., & Chen, T. (2007). Convergence and parameter selection of PSO algorithm. Computer Engineering and Applications, 43(9), 14-17.
Cite this article
Yang,H. (2025). Study on Smoke Screen Interference Shell Deployment Strategy under Different Circumstances. Applied and Computational Engineering,197,1-8.
Data availability
The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.
Disclaimer/Publisher's Note
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
About volume
Volume title: Proceedings of the 7th International Conference on Computing and Data Science
© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and
conditions of the Creative Commons Attribution (CC BY) license. Authors who
publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons
Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this
series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published
version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial
publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and
during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See
Open access policy for details).
References
[1]. Zhang, X., & Liu, S. (2007). An improved genetic algorithm and its application to multi-objective optimization. Journal of Systems & Management, 16(3), 315-319.
[2]. Liu, B., Wang, L., & Jin, Y. (2007). Advances in differential evolution algorithms. Control and Decision, 22(7), 721-729.
[3]. Liu, X., & Chen, T. (2007). Convergence and parameter selection of PSO algorithm. Computer Engineering and Applications, 43(9), 14-17.