Study on Smoke Screen Interference Shell Deployment Strategy under Different Circumstances

Research Article
Open access

Study on Smoke Screen Interference Shell Deployment Strategy under Different Circumstances

Haochun Yang 1*
  • 1 Department of Electrical Engineering and Automation, TongJi University, Shanghai, China    
  • *corresponding author YHCH@tongji.edu.cn
Published on 22 October 2025 | https://doi.org/10.54254/2755-2721/2025.28095
ACE Vol.197
ISSN (Print): 2755-2721
ISSN (Online): 2755-273X
ISBN (Print): 978-1-80590-465-6
ISBN (Online): 978-1-80590-466-3

Abstract

This paper establishes a mathematical model based on the initial position and trajectory of enemy missiles, the positions of our real and decoy targets, the initial position of drones, the number of smoke grenades carried, deployment and detonation timing, and drone allocation. The model aims to find a global optimal solution to enhance the effective coverage duration of smoke clouds and improve drone combat effectiveness. For Problem 1, we first establish mathematical models for drone deployment of smoke interference grenades for enemy missiles M1, drones MY1, real targets, and decoy targets. Subsequently, we calculate their positions at any moment using relevant motion models. Finally, through a line-of-sight (LOS) occlusion model, real targets are abstracted into 16 test points to determine whether missile line-of-sight can be effectively occluded at any moment. The effective coverage duration is calculated by subtracting the initial and final times of effective occlusion. For Problem 2, we first define approximate ranges for four parameters: FY1's flight direction, speed, smoke interference grenade deployment point, and detonation point. We then narrow these parameter ranges using binary search and iteratively solve the objective function for these four parameters using an Evolutionary Search Genetic Algorithm (ESGA) optimized with an early termination mechanism. Genetic algorithm operations identify the maximum effective occlusion duration, with fitness analysis and patience value comparison used to determine whether early termination is necessary to avoid local optima. Finally, sensitivity analysis is conducted using differential evolution and particle swarm optimization models to verify solution accuracy after accounting for uncertain factors.

Keywords:

visual line occlusion model, genetic algorithm optimized with early stopping mechanism, differential evolution algorithm, particle swarm optimization algorithm, multi-objective optimization method, NSGA-II, greedy algorith

Yang,H. (2025). Study on Smoke Screen Interference Shell Deployment Strategy under Different Circumstances. Applied and Computational Engineering,197,1-8.
Export citation

1. Introduction

To feed the subsequent model, the section extracts the critical 3-D trajectories of five drones (FY1–FY5) and three incoming 300 m/s missiles (M1–M3) detected at the listed positions, together with the 7 m * 10 m cylindrical decoy (center 0, 200, 0) and the smoke-screen effective range/time data; it then recaps the physics of drone-launched smoke and sets the stage for optimizing release point, burst point and UAV heading/speed (70–140 m/s) in real time.

2. Problem analysis

According to the elements given in the problem, this paper will establish a mathematical model of Cartesian coordinate system containing enemy missiles, our real targets, our decoys, our drones and smoke bombs, so as to facilitate further analysis of the problem.

2.1. Analysis of question 1

Given the known flight speeds and directions of UAV FY1 and missile M1, along with specific timing parameters for smoke screen deployment and detonation, this study first substitutes the geometric center of a real target into the Line-of-Sight (LOS) model [1].This approach determines the approximate effective occlusion period, followed by precise calculation of the actual effective occlusion duration using 16 feature points.

2.2. Analysis of question 2

Building upon the first research question, this paper employs a ballistic motion model to simulate smoke screen interference munitions 'trajectory and utilizes line-of-sight (LOS) occlusion models to evaluate shielding effectiveness. For variables including FY-1's flight direction, velocity, smoke screen deployment coordinates, and detonation points, we apply genetic algorithms. By combining four key parameters as genetic components through hybridization and random mutation processes, we ultimately obtain optimal solutions [2].

3. Assumptions and justifications

Throughout the maneuver, the enemy missile consistently targeted decoys without detecting the actual target. Air resistance was neglected, and the Earth's curvature was disregarded. Assuming the Earth's gravitational acceleration at the incident location is 9.80 m/s², and considering the smoke screen projectile moves in a vertical parabolic trajectory with the drone's velocity after launch, while maintaining a constant descent speed of 3 m/s, the analysis proceeds accordingly [3].

4. Problem 1. establishment and solution of the model

M1 initially heads for the decoy; as its 300 m/s motion shifts the LOS, the screened volume moves accordingly and is tracked by coupling the UAV-smoke shell, ballistic and LOS-geometry models.

4.1. Model building

With the decoy at the origin, the real-target base centre is (0, 200, 0), M₁ at (20 000, 0, 2 000) and FY₁ at (17 800, 0, 1 800); the missile trajectory is x(t)=20 000−300 t, y(t)=0, z(t)=2 000−0.05 t:

M1(x,y,z,t)=M1(20000,0,2000,0)+vM1(x,y,z,t)

M1’s constant 300 m s⁻¹ velocity fixes its trajectory: vM1 = (−300, 0, −0.05) m s⁻¹ throughout.:

VM1{x2+y2+z2=300x20000=y20000=z20000x<0

The motion trajectory equation of the UAV flight is established by the same idea as follows:

F1(x,y,z,t)=F1(17800,0,1800,0)+vF1(x,y,z,t)

Since the speed and direction of the UAV remain constant after the command is issued, with a speed of 120m/s, the speed of the UAV is also constrained by a set of equations:

vF1{x2+y2+z2=120x17800=y0z=0

When t is 1.5s, the smoke screen jammer is released and moves with the initial velocity of the UAV at 1.5s:

P1(x,y,z,t)=F1(x,y,z,1.5)+vP(x,y,z,t)

Once released, the smoke shell follows a parabola whose initial velocity equals the drone’s at separation, so its pre-detonation speed is v(t)=vF1−gt:

vP(x,y,z,t)×z=g×t

After detonation the smoke cloud drifts downward at 3 m s⁻¹, so its vertical coordinate becomes z(t)=zburst−3(t−tburst):

B(x,y,z,0)=P1(x,y,z,1.5+3.6)

B(x,y,z,t3.61.5)=B(x,y,z,0)+v(0,0,3)(t3.61.5)

Target = 16 rim points; smoke = sphere radius R drifting at 3 m s⁻¹; LOS M1Qi is broken while |Qi(t) − C(t)| ≤ R, and the total span of this inequality is the effective screening time:

L(t)=M1+t(QiM1),t∈[0,1],i∈{i∈|1≤i≤16}

When a point on the line is a distance of r from the center of the sphere C, the point lies on the sphere:

IIL(t) - CII = r

P+t(QiM1)C2=r2,i{iZ|1i16}

Let the line segment direction vector be i,The vector of the missile to the center of the ball is :

di=QiP

l=||di||

d^i=didi

f=PC

L(s)=P+s×d^i,s[0,l],i{i|1i16}

Discretise time with step Δt = 0.01 s; at each tick the LOS discriminant |Qi−C|²−R² ≥ 0 is evaluated for all 16 points, and the target is judged hidden only when every inequality is non-negative; summing the successive Δt gives the total screened interval: Δt=0.05s 

4.2. Determination of objective function

Maximise  Tcover1=ΣΔt{i,|Qi(t)C(t)|2R20} , the cumulative time over which all 16 target points are simultaneously inside the smoke sphere.:

Tcover1=argmaxtexit1tenter1

Tcover1=t1exitt1enter

4.3. Model solution

Code gives shell (17 620, 0, 1 800) and smoke sphere (17 188, 0, 1 736.5); effective screening time is the interval from the first to the last instant all 16 rim points are inside that sphere.

4.4. Results of search

It is found that under the condition given in problem 1, the actual effective shielding time is 1.381s.

5. Problem 2. establishment and solution of the model

5.1. Model building

A two-stage search first brackets (θ, vF₁) by fast bisection, then lets a GA evolve the same pair to maximise screen time, slashing runtime by shrinking the initial space.

5.2. Determination of objective function

Maximize the missile’s effective screening time by jointly optimizing the four decision variables—UAV heading, speed, launch instant and detonation instant—in a single objective function:

Tcover2=argmax|Tcover2j[tdet1Δt,tmaxΔt]I(16i=1Δi=4(f×d^i)24(f2r2)0)Δt|

tmax=min(max(tdet1,0,0)+20,tendM1)

5.3. Model solving

This part will omit the same steps as problem 1 and focus on the application of genetic algorithm based on binary optimization parameter range in problem 2.

Physics restricts heading to 170–180°, speed to 70–140 m s⁻¹, release to 0–2 s and detonation to 1–7 s after release.

Binary search shrinks the angle interval: coarse steps locate the neighbourhood that gives the longest screen time, then the step is halved and the scan repeated; for any parameter x, the next window is centred on the previous best x* with half the former width:

x[xΔx2,x+Δx2]

Iterative bisection delivered the final tight brackets: heading 177–179°, speed 70–75 m s⁻¹, release ≈ 0.5 s, detonation ≈ 3.3 s; these bounds shrink the GA search space and cut its workload.

The genes are one real-number chromosome: θ, vF₁, tdrop, tdet.:

x=[x1,x2,x3,x4]=[θ,vF1,tdrop,tdet]

Fitness equals the smoke-screen concealment time returned by the simulator: longer coverage ⇒ higher F(x).

Selection probability is proportional to fitness: pi = F(xi) / Σj F(xj).:

pi=F(xi)j=1NF(xj)

 Xia=αXiA+(1α)XiB   Xib=(1α)XiA+αXiB   α[0,1] 

xbestever=max(xbest,xbestever)

Linear selection favours elite genes, arithmetic crossover blends them, and mutation preserves diversity to escape local optima.

The fittest individual is cloned unchanged into the next generation, and mutated offspring fill the remaining slots.

5.4. Results of search

Drone flight Angle 177.0°, drone flight speed 72.9m/s detonation time 2.5s maximum cover time 4.540s

6. Analysis and testing of the model

6.1. The sensitivity of parameters related to differential evolution is analyzed

Sensitivity analysis of population size: For differential evolution algorithm, population size N affects the exploration ability and computational cost of the algorithm. According to empirical formula:

N0=[10+2D]

Sensitivity analysis of variation strategy: There are many variation strategies in differential evolution algorithm, and variation has a significant impact on iteration.

6.2. Finally, the sensitivity analysis of the parameters in particle swarm optimization algorithm is carried out

Sensitivity analysis of population size: The relationship between particle swarm optimization algorithm and population size N can be expressed by the following formula:

dPdN=aNbN2

At this time, the critical value of population size N is calculated according to the formula. When the actual N is too small: the diversity is insufficient and the population tends to mature early and converge. When the actual N is too large: the calculation cost increases significantly, but the performance improvement is limited.

6.3. Sensitivity analysis of inertial weights

Exploration of inertial weight control algorithm-development balance, its update formula is:

vit+1=!vit+c1r1(pitxit)+c2r2(gtxit)

Mathematical expression of adaptive weight strategy:

ωt=ωmax(ωmaxωmin)tT

The effects of learning factors can be analyzed by components in the velocity update formula:

vit+1=ωvit+c1r1(pitxit)Cognitive dimensions+c2r2(gtxit)Social divisions

When c1 dominates (c1> c2): Diversity remains well maintained, but convergence is slow. When c2 dominates (c1 <c2): Convergence is fast, but premature.

7. Conclusion

The model's strengths include:1) Employing a genetic algorithm with differential evolution for Problem 2, where fitness analysis prevents local optimization while differential mutation enhances exploration capabilities. 2) Limitations: Genetic algorithms demonstrate high complexity under multi-parameter conditions, resulting in low time efficiency even after optimization. 3) The greedy strategy improves computational efficiency but relies on empirical rules whose selectivity lacks mathematical validation. 4) The greedy approach cannot mathematically guarantee optimal or near-optimal solutions. Evaluation focuses on solution accuracy and efficiency, providing clear directions for model refinement. The model's advantages lie in its differential evolution-based genetic algorithm, which prevents local optimization through fitness analysis and enhances exploration via differential mutation. Limitations: Genetic algorithms remain computationally intensive under complex multi-parameter conditions, with optimized solutions still showing low time efficiency. The greedy strategy improves computational efficiency but lacks mathematical validation for its selectivity. The greedy approach cannot mathematically guarantee optimal or near-optimal solutions. Evaluation focuses on solution accuracy and efficiency, providing clear directions for model refinement.


References

[1]. Zhang, X., & Liu, S. (2007). An improved genetic algorithm and its application to multi-objective optimization. Journal of Systems & Management, 16(3), 315-319.

[2]. Liu, B., Wang, L., & Jin, Y. (2007). Advances in differential evolution algorithms. Control and Decision, 22(7), 721-729.

[3]. Liu, X., & Chen, T. (2007). Convergence and parameter selection of PSO algorithm. Computer Engineering and Applications, 43(9), 14-17.


Cite this article

Yang,H. (2025). Study on Smoke Screen Interference Shell Deployment Strategy under Different Circumstances. Applied and Computational Engineering,197,1-8.

Data availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

Disclaimer/Publisher's Note

The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

About volume

Volume title: Proceedings of the 7th International Conference on Computing and Data Science

ISBN:978-1-80590-465-6(Print) / 978-1-80590-466-3(Online)
Editor:Marwan Omar
Conference website: https://2025.confcds.org/
Conference date: 25 September 2025
Series: Applied and Computational Engineering
Volume number: Vol.197
ISSN:2755-2721(Print) / 2755-273X(Online)

© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. Authors who publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open access policy for details).

References

[1]. Zhang, X., & Liu, S. (2007). An improved genetic algorithm and its application to multi-objective optimization. Journal of Systems & Management, 16(3), 315-319.

[2]. Liu, B., Wang, L., & Jin, Y. (2007). Advances in differential evolution algorithms. Control and Decision, 22(7), 721-729.

[3]. Liu, X., & Chen, T. (2007). Convergence and parameter selection of PSO algorithm. Computer Engineering and Applications, 43(9), 14-17.