Pran, R. H. (2023). Advancing Network Securing Strategies with Network Algorithms for Integrated Air Defense System (IADS) Missile Batteries. J Electrical Electron Eng, 2(3), 217-238.
Pran, R. H. (2023). Advancing Network Securing Strategies with Network Algorithms for Integrated Air Defense System (IADS) Missile Batteries. J Electrical Electron Eng, 2(3), 217-238.
Pran, R. H. (2023). Advancing Network Securing Strategies with Network Algorithms for Integrated Air Defense System (IADS) Missile Batteries. J Electrical Electron Eng, 2(3), 217-238.
Pran, R. H. (2023). Advancing Network Securing Strategies with Network Algorithms for Integrated Air Defense System (IADS) Missile Batteries. J Electrical Electron Eng, 2(3), 217-238.
Abstract
Recently, the Integrated Air Defense System (IADS) has become vital for the defense system as the military defense system is vital for national security. Placing Integrated Air Defense System batteries among locations to protect locations assets is a crucial problem because optimal solutions are needed for interceptor missiles to intercept attacker missiles for maximizing protection of assets across locations or places. In this research, the procedures of using network algorithms along with developing several network algorithms are going to be demonstrated to develop a model for sequential development of seven network securing strategies of placing Surface to Air Missile (SAM) batteries to maximize the protection of assets across locations (based on given asset values) by generating optimal solutions through computation to destroy maximum attacker missiles by using minimum interceptor missiles with given intercept probability. This network securing strategies can be implemented not only for Integrated Air Defense System (IADS) planning but also Counter Air (CA) planning as Integrated Air Defense System (IADS) is conducted with defensive counter air supported by attack operations in offensive counter air.
Keywords
Integrated Air Defense System (IADS); network algorithms; network clustering; network centralities; small worldness; network data generation; network analysis; big data computation; regression analysis
Subject
Engineering, Other
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.