{"title":"导弹防御定时博弈理论协议开发与性能分析","authors":"C. Niznik","doi":"10.1109/ICCCN.2013.6614140","DOIUrl":null,"url":null,"abstract":"The games of timing theory enforcing optimal timing intervals and two optimal strategies will be expressed as the following two software theory generated protocols. The two optimal strategy software protocols are first, the battle manager must optimally allocate sensor and weapon systems with the threat launch events. This Internal Battle Manager Decision Optimization(BMDO) Protocol requires the threat constraints of (1) perceived threat inventory, (2) threat missile, and (3) ground asset being attacked. The theoretical generation of the games of timing optimal timing intervals and the two optimal strategies are derived realizing risk management equations within the BMDO Protocol optimization constraints solutions. Invariant Imbedding is the mathematical concept required to contain the BMDO Protocol within the Kernel of the games of timing optimal strategy and optimal timing interval solution to achieve the second and final optimal strategy protocol, the Optimal Battle Manager Decision(OBMD) Protocol. The performance analysis of the OBMD Protocol for constraints and requirements on processor capability and timeliness on a Network Centric Star Topology Architecture is also described for the two Models, Model 1 Mid-course Engagement scenario, and Model 2 Ascent Phase in the Target Trajectory.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Games of Timing Theoretical Protocol Development and Performance Analysis for Missile Defense\",\"authors\":\"C. Niznik\",\"doi\":\"10.1109/ICCCN.2013.6614140\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The games of timing theory enforcing optimal timing intervals and two optimal strategies will be expressed as the following two software theory generated protocols. The two optimal strategy software protocols are first, the battle manager must optimally allocate sensor and weapon systems with the threat launch events. This Internal Battle Manager Decision Optimization(BMDO) Protocol requires the threat constraints of (1) perceived threat inventory, (2) threat missile, and (3) ground asset being attacked. The theoretical generation of the games of timing optimal timing intervals and the two optimal strategies are derived realizing risk management equations within the BMDO Protocol optimization constraints solutions. Invariant Imbedding is the mathematical concept required to contain the BMDO Protocol within the Kernel of the games of timing optimal strategy and optimal timing interval solution to achieve the second and final optimal strategy protocol, the Optimal Battle Manager Decision(OBMD) Protocol. The performance analysis of the OBMD Protocol for constraints and requirements on processor capability and timeliness on a Network Centric Star Topology Architecture is also described for the two Models, Model 1 Mid-course Engagement scenario, and Model 2 Ascent Phase in the Target Trajectory.\",\"PeriodicalId\":207337,\"journal\":{\"name\":\"2013 22nd International Conference on Computer Communication and Networks (ICCCN)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 22nd International Conference on Computer Communication and Networks (ICCCN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCN.2013.6614140\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCN.2013.6614140","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Games of Timing Theoretical Protocol Development and Performance Analysis for Missile Defense
The games of timing theory enforcing optimal timing intervals and two optimal strategies will be expressed as the following two software theory generated protocols. The two optimal strategy software protocols are first, the battle manager must optimally allocate sensor and weapon systems with the threat launch events. This Internal Battle Manager Decision Optimization(BMDO) Protocol requires the threat constraints of (1) perceived threat inventory, (2) threat missile, and (3) ground asset being attacked. The theoretical generation of the games of timing optimal timing intervals and the two optimal strategies are derived realizing risk management equations within the BMDO Protocol optimization constraints solutions. Invariant Imbedding is the mathematical concept required to contain the BMDO Protocol within the Kernel of the games of timing optimal strategy and optimal timing interval solution to achieve the second and final optimal strategy protocol, the Optimal Battle Manager Decision(OBMD) Protocol. The performance analysis of the OBMD Protocol for constraints and requirements on processor capability and timeliness on a Network Centric Star Topology Architecture is also described for the two Models, Model 1 Mid-course Engagement scenario, and Model 2 Ascent Phase in the Target Trajectory.