1 Introduction

Over the past few decades, weapon–target assignment (WTA) has been considered a crucial procedure for providing autonomous decision support in air defense systems [1, 2]. The WTA involves determining which interceptors to use and when to launch them to counter identified threats. The WTA problem has been proven to be NP-complete, according to references [3, 4]. Consequently, many previous research efforts have focused on tackling the computational complexity of the general WTA problem. Various search methods have been developed over the last few decades, including Lagrangian relaxation [5], exact and heuristic approaches [6, 7], and meta-heuristic algorithms like ant colony optimization [8], particle swarm optimization [9], genetic algorithm [10, 11], permutation and tabu search [12, 13], variable neighborhood search [14], harmony search [15], hybrid discrete gray wolf optimization [16], and greedy maximization algorithm [17,18,19,20].

The primary objective of WTA, as highlighted in the references [21,22,23], is to minimize the potential damage to friendly assets and increase the survivability of identified threat targets. The optimization model for the WTA problem focuses on a single goal, which is to minimize the survival probability of the targets. Moreover, there are additional objectives that can be considered, including optimizing resource usage, minimizing target flight duration, and refining the fire doctrine in defense site zones [24, 25]. To address the multi-objective WTA problem, various methods are employed, such as rule-based heuristics, goal programming, and evolutionary algorithms [24, 26,27,28].

There are two main categories of the WTA problem: static WTA (SWTA) and dynamic WTA (DWTA) [29]. The former, SWTA, assumes that time is not a factor, and therefore subsequent engagements are not taken into consideration. Moreover, it is typically assumed that all weapons have an equal probability of success when targeting each type of enemy. The latter, DWTA, on the other hand, takes into account the available time windows during which targets can be engaged. This approach, proposed by Leboucher et al. [30], involves calculating the time to impact for each target and identifying the earliest moment at which each weapon can intercept the target. Xin et al. [31] have proposed a model that allows for variable probabilities of success for each weapon against each target and across different time periods. Khosla [32] has formulated a mixed integer program to address some of the key considerations in the WTA problem, including the inclusion of additional time constraints such as reload time.

Recent research has highlighted the need for more realistic WTA engagement scenarios [30, 33,34,35], leading to the development of new models that reflect the characteristics of both the interceptors and targets in specific scenarios [36,37,38,39,40]. Cho and Choi [18] have proposed a time-based WTA problem that considers the interceptor’s firing time in relation to the target’s incoming direction and provides a time-dependent reward for determining the interceptor and its firing time. Leboucher and colleagues [30] have proposed a two-step approach for solving dynamic WTA problems, where the selection of weapon types and specific weapons occurs in the first step, followed by the determination of a sequence of firing times in the second step. Uhm and Lee [41] have also proposed a two-step algorithm that uses a time-based probability of success, which is a convex function of the firing time. Bogdanowicz and colleagues [37, 38] have developed a novel method for the WTA problem based on the assumption of a fixed probability of success for a given time of engagement. Guo and colleagues [39] and Na and Lee [40] have considered factors that can affect the probability of success in a realistic engagement scenario, such as the time-to-go, line-of-sight, and miss distance between the target and interceptor. By incorporating these factors into the problem formulation, the engagement performance of the WTA problem can be improved in a real environment.

In recent years, area targets, such as drone swarms and low-altitude rockets, have emerged as significant threats, leading to an increased demand for air defense systems to counter them [42,43,44,45,46]. Such air defense systems require a large number of interceptors during the engagement, each of which is typically developed using low-cost and small-sized components. Thus, these interceptors have lower maneuverability than other types of interceptors, which can lead to the varying probability of kill (PK) depending on the relative engagement geometry between the target and launcher (i.e., the heading errors between the launcher’s orientation angle and the interceptor’s flight direction). Additionally, Guo et al. [39] have pointed out that initial heading errors can negatively affect the entire course of action. To overcome this limitation of interceptor countering area targets, WTA methods should consider the degradation of PK due to heading errors. Kim and colleagues [46] have addressed the aforementioned concerns by developing a model that considers the variation in PK as a function of changes in heading errors. They compared the performance of two strategies: the rotation-fixed (RF) strategy and the rotation (R) strategy, which differ in how they manage the launcher’s orientation angle relative to the target’s approach angle. The RF strategy fixes the orientation angle at a specific value for all engagements, while the R strategy rotates the launcher’s orientation angle to align with the target’s approach angle. The authors analyzed the trade-off between reaction time and PK degradation for each strategy. To achieve a more effective balance between PK degradation and reaction time, they extended the strategies to the clustering-based WTA (CWTA) method, where targets are clustered using a representative point that can potentially be intercepted for each target. The initial orientation angle of each launcher is then determined based on the centroid of each cluster relative to each launcher.

However, the previous study was limited because it used a single strategy, either R or RF, for all engagements without the flexibility to adjust to different engagement situations. More specifically, when the two strategies are properly mixed and used, more optimal results can be obtained by the trade-off between reaction time and PK degradation, depending on engagement situations. Based on this rationale, this study aims to propose a mixed version of R and RF strategies that allows for the selection of either R or RF strategies for each engagement based on the launcher’s orientation angle. This mixed strategy approach provides greater flexibility, allowing for the decision to maintain the current orientation angle or rotate it to some extent when using the R strategy for a particular engagement. Unlike the previous study, where the optimal orientation angle for each engagement was predetermined under the R strategy, the proposed method permits variations in the orientation angle for each engagement. Additionally, the clustering approach from the previous study can still be applied in the mixed version to further reduce the rotation angle. In this study, numerical simulations are performed to investigate the performance of the proposed method. The results will show that the proposed method (i.e., the mixed version of R and RF) is superior to using only R or RF strategies. The main contribution of this study is to establish a new WTA method for the rotation-mixed (M) strategy, which considers the launcher’s orientation angle as a decision variable for each engagement, unlike the prior R and RF strategies. The key feature of the proposed method lies in its simplicity and superiority, suitable for the interception of area targets.

The structure of the paper is as follows: In Sect. 2, the formulation of the WTA problems is presented, taking into account the mixed version of R and RF strategies. Section 3 describes the proposed WTA algorithm. The effectiveness of the proposed method is demonstrated through numerical simulations in Sect. 4. Finally, Sect. 6 summarizes the findings and draws conclusions.

2 PK Modeling

The main goal of WTA problems is to achieve the highest possible expected PK for all targets that have been identified. Therefore, when defining the objective function for WTA problems, the focus should be on maximizing the overall PK against targets that pose a threat and are being countered by interceptors. In this study, a three-dimensional (3D) engagement scenario is considered. However, the PK value is determined based on the \(X_I-Y_I\) planar engagement geometry between the launcher and the target, as illustrated in Fig. 1. This rationale stems from the similarity in the impact of PK value fluctuations resulting from vertical engagement geometry on both R strategy and RF strategy. In contrast, the variations in PK attributed to horizontal engagement geometry significantly influence both R strategy and RF strategy.

Fig. 1
figure 1

Planar engagement geometry

The PK value is calculated using the three geometric parameters. The first parameter, denoted as \(a^{\textrm{HE}}_{t,w,s}\), refers to the heading errors between the predicted intercept point (PIP) \(X^{\textrm{pip}}_{t,w,s}\) of the target t at a specific time slot s and the launcher w located at \(X_{w}\). The second parameter, denoted as \(a^{M}_{t,w,s}\), represents the predicted intercept angle between the moving direction \(M_{t,w,s}\) of the target at the time of interception and the approaching direction \(H_{t,w,s}\) of the interceptor. Finally, the third parameter is the relative distance \(r_{t,w,s}\) calculated based on the positions of the target and launcher.

More specifically, the heading error is defined as the angle between \(O_{w}\), which denotes the orientation angle of the launcher w, and \(H_{t,w,s}\), which indicates the heading angle toward the PIP of the target t, given by:

$$\begin{aligned} a^{\textrm{HE}}_{t,w,s}= \cos ^{-1} \left( \frac{O_{w}\cdot H_{t,w,s}}{||O_{w}||||H_{t,w,s}|| } \right) . \end{aligned}$$
(1)
Fig. 2
figure 2

The PK variation according to a relative distance and heading error, b expected target’s leading angle and heading error

In this context, the PIP refers to the expected location of the interception between the target t and the interceptor launched from the launcher w at a specific time s. In order to compute the PIP, it is essential to ensure that the flight time for the target to reach the PIP is equal to the flight time of the assigned interceptor to reach the PIP, starting from the moment of firing. The predicted intercept angle \(a^{M}_{t,w,s}\) can be determined by calculating the angle between the approaching angle of the target \(M_{t,w,s}\) and the opposite angle of the interceptor’s flight direction \(-H_{t,w,s}\) as follows:

$$\begin{aligned} a^{M}_{t,w,s}= \cos ^{-1}\left( \frac{M_{t,w,s}\cdot \left( -H_{t,w,s}\right) }{||M_{t,w,s}||||H_{t,w,s}|| } \right) . \end{aligned}$$
(2)

The Euclidean distance between a launcher position \(X_{w}\) and a particular PIP \(X^{\textrm{pip}}_{t,w,s}\) is established as the relative distance between the two points. This relative distance is calculated as follows:

$$\begin{aligned} r_{t,w,s}= ||X^{\textrm{pip}}_{t,w,s}-X_w||. \end{aligned}$$
(3)

The computation of the expected PK \(P_{t,w,s}\) involves the multiplication of three separate Gaussian functions, denoted as G, which depend on the geometric parameters \(a^{\textrm{HE}}_{t,w,s}\), \(a^{M}_{t,w,s}\), and \(r_{t,w,s}\) as follows:

$$\begin{aligned}{} & {} P\left( r_{t,w,s},a^{\textrm{HE}}_{t,w,s},a^{M}_{t,w,s}\right) \nonumber \\{} & {} \quad = G \left( a^{\textrm{HE}}_{t,w,s}, \mu ^{a_{\textrm{HE}}}, \sigma ^{a_{\textrm{HE}}} \right) \times G \left( a^{M}_{t,w,s}, \mu ^{a_{M}}, \sigma ^{a_{M}} \right) \nonumber \\{} & {} \qquad \times G \left( r_{t,w,s}, \mu ^{r},\sigma ^{r} \right) . \end{aligned}$$
(4)

The Gaussian function used in this study is given by

$$\begin{aligned} G \left( x, \mu , \sigma \right) = \exp \left( { - \frac{1}{2}\frac{{\left( {x - \mu } \right) ^2 }}{{\sigma ^2 }}} \right) . \end{aligned}$$
(5)

The first term on the right-hand side of Eq. (4) describes how the PK varies as a result of changes in heading errors. This variation is modeled using a Gaussian function, where \(\mu ^{a_{\textrm{HE}}}\) represents the mean and \(\sigma ^{a_{\textrm{HE}}}\) represents the standard deviation. An increase in heading errors can cause a degradation in the PK, as it requires more maneuverability to intercept the target. The second term in Eq. (4) represents the PK variation as a function of the expected angle difference between the approach direction of the interceptor and the velocity direction of the target. The mean is represented by \(\mu ^{a_{M}}\), while the standard deviation is denoted by \(\sigma ^{a_{M}}\). In Eq. (4), the third term expresses the PK variation due to changes in relative distance, where \(\mu ^{r}\) represents the mean and \(\sigma ^{r}\) represents the standard deviation. The Gaussian functions for each term have a value ranging from 0 to 1. Accordingly, the overall PK \(P_{t,w,s}\) also has a value ranging from 0 to 1.

Figure 2 illustrates the PK model used in the study, where the design parameters for heading errors, relative distance, and the expected target’s leading angle are specified. The values chosen for the parameters are \(\mu ^{a^{\textrm{HE}}}=0\;\deg \), \(\sigma ^{a^{\textrm{HE}}}=20\;\deg \), \(\mu ^{r}=20\;\textrm{km}\), \(\sigma ^{r}=10\;\textrm{km}\), \(r^{\max }=35\;\textrm{km}\), \(r^{\min }=5\;\textrm{km}\), \(\mu ^{a^{M}}=0\;\deg \), and \(\sigma ^{a^{M}}=20\;\deg \), respectively. The PK variation patterns shown in Fig. 2 are adjusted by manipulating a two-factor pair: the expected target’s leading angle versus heading error and relative distance versus heading error. This study presents two figures to illustrate this manipulation. In Fig. 2a, the PK variation is based on changes in relative distance and heading error, while the PK induced by only an expected target’s leading angle is kept constant at 1. The engagement region is limited to \(r_{t,w,s} > r^{\min }\) and \(r_{t,w,s} < r^{\max }\) in Fig. 2 (a). The PK reaches its maximum at \(r_{t,w,s}=\mu ^{r}\) and \(a^{\textrm{HE}}_{t,w,s}=\mu ^{a^{\textrm{HE}}}\), and decreases as the relative distance deviates from \(\mu ^{r}\) and heading error deviates from \(\mu ^{a^{\textrm{HE}}}\). In Fig. 2b, the PK induced by only a relative distance is fixed at 1, while the PK variation based on changes in the expected target’s leading angle and heading error is shown. The parameter \(\sigma \) (i.e., \(\sigma ^{r}\), \(\sigma ^{a^{\textrm{HE}}}\), and \(\sigma ^{a^{M}}\)) governs the rate at which the PK decreases. As the value of \(\sigma ^{a^{\textrm{HE}}}\) increases, the decreasing rate of the PK due to heading error decreases. When \(\sigma ^{a^{\textrm{HE}}}\rightarrow \infty \), the effect of PK variation due to heading errors is diminished in the model. The parameter \(\sigma \) is highly related to the interceptor’s maneuverability, and it is meaningful to examine how the PK variation changes with alterations to \(\sigma ^{a^{\textrm{HE}}}\).

Remark 1

In the comprehensive design of a fire control system, the development of a weapon–target assignment algorithm operates under the premise that a PK model is available. This PK model can either stem from a distinct computation process or be a streamlined version that captures the core attributes of the complete PK model [18, 47]. Subsequently, the accurate PK model is determined and integrated with the weapon–target assignment algorithm. In general, the discrepancy in the PK modeling would lead to a decline in the performance of the weapon–target assignment algorithm. Therefore, an exhaustive and quantitative analysis, including sensitivity assessments, becomes imperative. However, this study focuses on the development of the weapon–target assignment algorithm itself. Thus, it is assumed that the consideration of a streamlined PK model that encapsulates the fundamental features of the accurate PK model is sufficient for achieving this purpose in practice, as in the previous studies [18, 47].

Remark 2

As shown in Eqs. (4) and (5), we employ scaled Gaussian functions with uniform weighting factors to establish the PK model. This choice stems from the fact that constant scale factors within the PK model have no impact on the optimization outcomes when the objective function aims to maximize the aggregate PK value.

3 Problem Formulation

This section describes the formulations of the WTA problem for three strategies: RF, R, and M strategies, using the mixed-integer linear programming (MILP) framework. The formulation proposed by Kim and colleagues focuses on RF strategy and R strategy separately (i.e., unitary strategy), and it cannot be applied by combining RF and R [46]. A new formulation for the mixed version of the R and RF strategy is proposed in this chapter. It is worth noting that the main difference between the M strategy and the unitary strategies (R and RF) is whether the decision of a launcher’s orientation angle for each engagement is considered as a decision variable.

3.1 Formulation of Unitary Strategy

The WTA problems can be expressed by defining decision variables and constraints, as well as an objective function that takes into account the degradation of PK resulting from changes in heading errors. The constraints in this problem involve the rotation of the orientation angle of a launcher, and the choice between using the R strategy or the RF strategy depends on whether these constraints are taken into account. Under the RF strategy, the orientation angle of each launcher is fixed during engagement to reduce the delay in firing an interceptor against a target. On the other hand, the R strategy involves aligning the orientation angle of each launcher with the heading angle towards the PIP of a target in order to eliminate the heading errors. Thus, the RF strategy has a short reaction time, so it can engage a large number of targets in a given time, but the PK for each engagement is reduced. The R strategy has a relatively large reaction time, so the number of targets that can be engaged in a given time is reduced, but the PK for each engagement is high.

3.1.1 Decision Variable

The primary determinant in the WTA problem is whether a particular launcher w’s firing time slot s is designated for a specific target t, which serves as the key variable to be decided. This research defines a decision variable, denoted as \(\ominus _{t,w,s}\), for unitary strategies. The variable \(\ominus _{t,w,s}\) represents the assignment of a launcher w against a target t at firing time slot s. The variable \(\ominus _{t,w,s}\) is 1 if the launcher w is assigned to the target t at time slot s, otherwise 0.

3.1.2 Objective Function

In this context, the objective function is chosen to reflect the PK function that takes into account the factors of heading errors, relative distance, and the expected target’s leading angle, as previously mentioned. The ultimate goal of the WTA problem considered in this study is to maximize the total PK value of all identified targets as follows:

$$\begin{aligned} \max _{\ominus _{t,w,s}} f \left( r_{t,w,s}, a^{\textrm{HE}}_{t,w,s}, a^{M}_{t,w,s} \right) , \end{aligned}$$
(6)

with

$$\begin{aligned}{} & {} f\left( r_{t,w,s}, a^{\textrm{HE}}_{t,w,s}, a^{M}_{t,w,s}\right) \nonumber \\{} & {} \quad = \sum _{t \in T} \left[ 1-\Pi _{w \in W}\Pi _{s \in S}\left( 1-p\left( r_{t,w,s}, a^{\textrm{HE}}_{t,w,s}, a^{M}_{t,w,s}\right) \right. \right. \nonumber \\{} & {} \quad \left. \left. \cdot \ominus _{t,w,s}\right) \right] , \end{aligned}$$
(7)

where the function \(p\left( r_{t,w,s}, a^{\textrm{HE}}_{t,w,s}, a^{M}_{t,w,s}\right) \) indicates the probability of successful destruction of target t by the interceptor launched from launcher w.

3.1.3 Practical Constraints for General WTA Problems

Due to the limited availability of interceptors and a limited time window of opportunity to use them against targets, there are restrictions on assigning launchers to targets. In addition, the system has inherent limitations, including the time required for the launcher to prepare for firing an interceptor and the need to stabilize vibrations resulting from the launch. These conditions and limitations are considered as constraints. One of the primary constraints is that each launcher can only fire one interceptor at a time, which means that each designated time slot for a launcher should be assigned to a specific target. This limitation can be expressed as follows:

$$\begin{aligned} \sum _{t \in T}\ominus _{t,w,s} \le 1,\quad \forall w \in W, s \in S. \end{aligned}$$
(8)

In this study, it is assumed that the number of interceptors assigned to each launcher is predetermined without considering the reloading process. Furthermore, as the firing process continues, the number of interceptors available for each launcher decreases, which means that the constraint related to the number of available interceptors should be considered in the WTA problem formulation. Accordingly, the limitation pertaining to the overall number of interceptors available for each launcher can be expressed as follows:

$$\begin{aligned} \sum _{t \in T} \sum _{s \in S}\ominus _{t,w,s} \le n^{st}_w,\quad \forall w \in W, \end{aligned}$$
(9)

where the variable \(n^{st}_{w}\) represents the highest possible quantity of usable interceptors for a launcher denoted by w. “st” of \(n^{st}_{w}\) is an abbreviation for “stock”. Additionally, it is necessary to set a limit on the number of interceptors that can be assigned to a single target. This restriction is in place to avoid wastage of interceptors due to redundant allocations to a single target. This limitation on the total number of interceptors that can be assigned to a target is expressed as follows:

$$\begin{aligned} \sum _{w \in W} \sum _{s \in S}\ominus _{t,w,s} \le n^{\textrm{as}}_t,\quad \forall t \in T, \end{aligned}$$
(10)

where the variable \(n^{\textrm{as}}_{t}\) represents the upper limit on the number of interceptors assigned to the target t. “as” of \(n^{\textrm{as}}_{t}\) is an abbreviation for “assign”.

In addition to these constraints, real-world engagement systems have additional practical constraints that should be considered. For example, there is a delay between receiving a firing command and the actual firing of the interceptor. A certain amount of time is also required for the launcher to stabilize after each firing. As a result, the constraints related to the time required for the firing process and the delay between subsequent firings can be formulated as follows:

$$\begin{aligned}{} & {} \sum _{t_{1}, t_{2} \in T} \left( \ominus _{t_{1},w,s_{1}} + \ominus _{t_{2},w,s_{2}}\right) \nonumber \\{} & {} \quad \le 1, \forall w \in W, \forall s_{1}, s_{2} \in S, \text {s.t.} s_{1} \ne s_{2}, |s_{1}-s_{2}| \le \tau ^{d},\nonumber \\ \end{aligned}$$
(11)

where the parameter \(\tau ^{d}\) stands for the time required between successive firing processes of a launcher. If a weapon w is assigned to target \(t_{1}\) at time slot \(s_{1}\), then the value of \(\ominus _{t_{1},w,s_{1}}\) is set to 1; otherwise, it is set to 0. Similarly, if a weapon w is assigned to target \(t_{2}\) at time slot \(s_{2}\), then the value of \(\ominus _{t_{2},w,s_{2}}\) is set to 1; otherwise, it is set to 0. This constraint ensures that \(\ominus _{t_{1},w,s_{1}}\) and \(\ominus _{t_{2},w,s_{2}}\) cannot both be 1 at the same time, preventing any additional assignment from being made within the time required for the launch procedure.

Moreover, the available firing time slot for a launcher-target pair is determined by the flight time required to reach the PIP, which should be within the interceptor’s maneuverability range. Thus, the feasible firing time slot is defined as the time slot corresponding to the PIP within the engagement region, as given by the following constraint.

$$\begin{aligned} \sum _{t \in T} \sum _{w \in W} \sum _{s \in S \setminus L_{t,w} } \ominus _{t,w,s} \le 0, \end{aligned}$$
(12)

where the parameter \(L_{t,w}\) represents the collection of launch time slots associated with the region within which an interceptor fired from the launcher w can reach and intercept the target t. Therefore, any time slots of the launcher w, not included in \(L_{t,w}\), are unavailable for deployment against the target t.

3.1.4 Additional Constraints for Rotation Strategy

If a WTA problem for the R strategy is considered, it is essential to also take into account time limitations. These include the time needed to rotate an orientation angle of a launcher and the time required to align the launcher and interceptors after the rotation. To calculate the time needed to rotate the launcher’s orientation angle, the required rotation angle and the launcher’s rotational velocity should be considered. The necessary rotation angle for the launcher between two consecutive engagements can be determined using the following equation:

$$\begin{aligned} a^{\textrm{rot}}_{w,t_{1},s_{1},t_{2},s_{2} } = \cos ^{-1} \left( \frac{ H_{t_{1},w,s_{1}} \cdot H_{t_{2},w,s_{2}} }{||H_{t_{1},w,s_{1}}|| ||H_{t_{2},w,s_{2}}||} \right) , \end{aligned}$$
(13)

where the variable \(H_{t_{1},w,s_{1}}\) refers to the orientation angle that the launcher w needs to be directed towards the PIP of a specific target \(t_{1}\) at a particular time slot \(s_{1}\). Similarly, the variable \(H_{t_{2},w,s_{2}}\) represents the orientation angle required for the same launcher w to point towards the PIP of another target \(t_{2}\) at a different time slot \(s_{2}\). By assuming that the launcher’s rotation speed is constant, we can determine the time required to adjust the orientation angle of the launcher as follows:

$$\begin{aligned} \tau ^{\textrm{rot}}_{w,t_{1},s_{1},t_{2},s_{2}} = \frac{a^{\textrm{rot}}_{w,t_{1},s_{1},t_{2},s_{2}}}{ v^{\textrm{rot}} }, \end{aligned}$$
(14)

where the parameter \(v^{\textrm{rot}}\) represents the angular velocity required to rotate the orientation angle of a launcher, and the variable \(a^{\textrm{rot}}_{w,t{1},s_{1},t_{2},s_{2}}\) represents the extent of the angle that needs to be rotated by the launcher. Additionally, after rotating the orientation angle of a launcher, time to realign internal devices of a launcher is required for the stable fire of the next interceptor. Based on this parameter, the constraint for the required time to rotate the launcher’s orientation angle and stabilize the launcher after rotating can be written as:

$$\begin{aligned} \begin{array}{l} \sum \limits _{t_1,t_2 \in T} \left( \ominus _{t_1,w,s_1 } + \ominus _{t_2,w,s_2 } \right) \le 1,\forall w \in W,\forall s_1,s_2 \in S, \\ \text {s.t.}\quad s_1 \ne s_2,|s_1 - s_2 | \le \tau _{w,t_1,s_1,t_2,s_2 }^{\textrm{rot}} + \tau ^{\textrm{align}}, \\ \end{array} \end{aligned}$$
(15)

where the variable \(\tau ^{\textrm{rot}}_{w,t_{1},s_{1},t_{2},s_{2}}\) denotes the time that the launcher takes to rotate its orientation from the angle \(s_1\) at time \(t_1\) to the angle \(s_2\) at time \(t_2\). The parameter \(\tau ^{\textrm{align}}\) is a fixed time period required for the launcher to stabilize its orientation following a rotation. In addition, there is a requirement to restrict the range of rotation. To enforce this limitation, the condition that the launcher’s rotation should not exceed the designated angle of rotation can be expressed as follows:

$$\begin{aligned} \cos ^{-1} \left( \frac{a^{\textrm{ini}}_{w} \cdot H_{t,w,s} }{ ||a^{\textrm{ini}}_{t,w,s}|| ||H_{t,w,s}|| } \right) \le a^{\max }, \end{aligned}$$
(16)

where the variable \(a^{\textrm{ini}}_{w}\) represents the initial orientation angle of launcher w, and the parameter \(a^{\max }\) denotes the maximum allowable range of rotation for the launcher relative to its initial orientation angle.

3.2 Formulation of Mixed Strategy

If a single strategy of either R strategy or RF strategy is applied consistently throughout all engagements, it can impose limitations on its effectiveness. The R strategy aims to eliminate heading errors but incurs a time penalty due to rotation. This approach can yield the maximum predicted PK for each engagement, but it also poses a risk of missing engagement opportunities due to the time lost during rotation. On the other hand, the RF strategy eliminates time loss caused by rotation, but it may result in lower PK due to heading errors. Although this approach may not achieve the maximum predicted PK for all engagements, it eliminates the risk of missed opportunities due to time loss. Moreover, using a single strategy does not resolve the two essential limitations present in both R and RF strategies: the inability to identify the appropriate strategy and select the orientation angle against a target for each engagement.

Consequently, this research paper investigates a new WTA strategy by combining R and RF strategies with orientation angle determination for each engagement. The R strategy determines a rotation angle that aligns with the PIP and only attempts engagement if there is enough time to rotate to the objective angle. However, if there is not enough time, the system may not attempt engagement. To address missed opportunities, incorporating flexibility into the system to engage while maintaining the current angle or rotating within a limited angle range, given the time constraints, could be beneficial. Conversely, the RF strategy maintains a constant orientation angle for all engagements. This implies that even if there is enough time to rotate, the system is unable to choose an alternative to rotate the angle to reduce potential PK loss. In such situations, having flexibility in the system to decide on rotating the angle within specified time constraints could potentially prevent PK loss in some engagements.

To decide whether and how much to rotate the launcher’s orientation angle for each engagement, the decision variable should be changed from \(\ominus _{t,w,s}\) to \(\ominus _{t,w,s,o}\). However, this modification increases the search space from three to four dimensions, adding the orientation angle as a new variable alongside target, weapon, and time slots. This expansion in search space may result in longer search times and larger input data sizes, making it impractical for real-world air defense systems. To address this issue, we propose a two-level hierarchical formulation of the WTA problem that restricts the increase in search space for a decision variable. Previous studies, including those by Leboucher and colleagues [30] and Uhm and Lee [41], have also used a two-level hierarchical structure to solve the WTA problem, particularly when considering PKs that change over time. During the first level of the WTA model, pairs of targets and launchers are chosen while considering time constraints such as firing time windows. The reason why time constraints should be considered in the first level is to prevent the possibility of not being able to engage at the second level due to time constraints such as firing time window and successive launching delay. To account for these constraints, the decision variable \(\ominus _{t,w,s}\) is used. During the second level process, the firing time slot and orientation angle are established for the targets assigned to each launcher. A new decision variable, \(\zeta _{t,s,o}\), is introduced in the second level to facilitate this process. The decision variable \(\zeta _{t,s,o}\) represents the assignment of time slot s of a certain launcher against a target t at an orientation angle o, and \(\zeta _{t,s,o}\) is 1 if time slot s of a certain launcher against a target t at an orientation angle o; otherwise 0. The determination of firing time and orientation angle for targets is carried out on a per-launcher basis, meaning that it is performed independently for each launcher. The following formulation is established to address the problem of determining the appropriate firing time and orientation angle for targets assigned to a specific launcher.

The objective function in this context is to obtain the maximum overall PK against assigned targets, similar to that of the first level.

$$\begin{aligned}{} & {} \max _{\ominus _{t,s,o}} f \left( r_{t,s,o}, a^{\textrm{HE}}_{t,s,o}, a^{M}_{t,s,o} \right) \end{aligned}$$
(17)
$$\begin{aligned}{} & {} f\left( r_{t,s,o}, a^{\textrm{HE}}_{t,s,o}, a^{M}_{t,s,o} \right) \nonumber \\{} & {} \quad = \sum _{t \in T} \left[ 1-\Pi _{o \in O}\Pi _{s \in S} \left( 1-p \left( r_{t,s,o}, a^{\textrm{HE}}_{t,s,o}, a^{M}_{t,s,o} \right) \right. \right. \nonumber \\{} & {} \quad \left. \left. \cdot \ominus _{t,s,o} \right) \right] , \end{aligned}$$
(18)

where the variable \(a^{\textrm{HE}}_{t,s,o}\) represents the difference between the orientation angle o of a launcher during the firing time slot s and the approach angle of target t. The variable \(a^{M}_{t,s,o}\) denotes the leading angle of the target. The function \(p\left( r_{t,s,o}, a^{\textrm{HE}}_{t,s,o}, a^{M}_{t,s,o}\right) \) denotes the expected probability of effectively destroying the target t by the interceptor launched during the time slot s with the orientation angle o. It is important to define and take into account limitations related to time, such as the time period for firing and the need to adjust the orientation angle of a launcher. These restrictions should be incorporated into the decision variable \(\zeta _{t,s,o}\). The constraint specifying that each designated time slot of a launcher can only be assigned to a single target is written as:

$$\begin{aligned} \sum _{t \in T}\sum _{o \in O}\ominus _{t,s,o} \le 1,\quad \forall s \in S, \end{aligned}$$
(19)

where the notation \(\ominus _{t,s,o}\) indicates whether a particular time slot s and orientation angle o have been assigned to a target t. The feasible firing time window for each target is determined as the time slot that corresponds to the PIP within the engagement region, as specified by:

$$\begin{aligned} \sum _{t \in T} \sum _{o \in O} \sum _{s \in S \setminus L_{t} } \ominus _{t,s,o} \le 0, \end{aligned}$$
(20)

where the parameter \(L_{t}\) represents the set of firing time slots associated with the region in which an interceptor can reach and intercept target t. Thus, any time slots that are not included in \(L_{t}\) are not applicable for deploying against target t. The constraint for successive launches should consider the time required for firing, the time needed to rotate the orientation angle of a launcher, and the assignment of the launcher and interceptors. It can be expressed as:

$$\begin{aligned} \begin{array}{l} \sum _{t_{1},t_{2} \in T} \left( \zeta _{t_{1},s_{1},o_{1}}+\zeta _{t_{2},s_{2},o_{2}}\right) \le 1, \forall o_{1}, o_{2} \in O, {\forall } s_{1}, s_{2} \in S, \\ \text {s.t.} o_{1} \ne o_{2}, |s_{1}{-}s_{2}| {\le } \tau ^{d} {+} \tau ^{\textrm{rot}}_{o_{1},o_{2} }{+}\tau ^{\textrm{align}}, \end{array} \end{aligned}$$
(21)
$$\begin{aligned}{} & {} \sum _{t_{1},t_{2} \in T} \left( \zeta _{t_{1},s_{1},o_{1}}+\zeta _{t_{2},s_{2},o_{2}}\right) \le 1, \forall o_{1}, o_{2} \in O, \forall s_{1}\nonumber \\{} & {} , s_{2} \in S, \text {s.t.} o_{1}=o_{2}, |s_{1}-s_{2}| \le \tau ^{d}, \end{aligned}$$
(22)
figure a
figure b

where the set T represents the assigned targets for a launcher. If the orientation angles \(o_{1}\) and \(o_{2}\) are identical, the RF strategy is chosen. Conversely, if the orientation angles \(o_{1}\) and \(o_{2}\) are different, the R strategy is chosen. The limitation of the range of rotation can be expressed as follows:

$$\begin{aligned} |a^{\textrm{ini}} - o| \le a^{\max }. \end{aligned}$$
(23)

Here, the variable \(a^{\textrm{ini}}\) represents the initial orientation angle of a launcher, and the parameter \(a^{\max }\) represents the maximum allowable range of rotation for the launcher relative to its initial orientation angle as described before.

Fig. 3
figure 3

The flow of WTA under unitary strategies

4 Methods

This section delves into two WTA methods: the first one is the unitary strategies developed by Kim et al. (referred to as [46]), while the second one is a WTA method that combines the R and RF strategies proposed in this study.

Fig. 4
figure 4

The WTA under RF strategy a first engagement, b second engagement, c third engagement

Fig. 5
figure 5

The WTA under R strategy a first engagement, b second engagement, c third engagement

4.1 WTA Under Unitary Strategy

Kim et al. (referenced as [46]) introduced the RF strategy and R strategy for WTA methods, which utilize the Greedy Maximization (GM) algorithm for efficiency in terms of computation time and performance [48, 49]. In the case of WTAs utilizing unitary strategies, a selection and exclusion loop framework is employed, as illustrated in Fig. 3. The set of candidates (V) comprises all possible combinations of targets, weapons, and time slots. During the selection process, a candidate (\(\ominus ^{*}\)) is chosen from the candidate set, which maximizes the gain in the candidate set excluding the selection set (P) and the exclusion set (Q). Once selected, this candidate is added to the selection set. Any candidate that violates constraints due to the inclusion of the new candidate is placed into the exclusion set. This process of selecting and excluding candidates continues until the candidate set (excluding the selection set and the exclusion set) is empty or no further gain can be achieved. In the exclusion phase, the constraints for the stock of selected launchers and the maximum number of interceptors (\(n_{t}^{\textrm{as}}\)) for a target within a specific time interval for successive launches are taken into account. Additionally, for the R strategy, the time interval between successive launches includes the time (\(\tau ^{\textrm{rot}} + \tau ^{\textrm{align}}\)) required for rotating the orientation angle of a launcher along with the time interval (\(\tau ^{d}\)).

Figures 4 and 5 depict sequential engagement strategies used by WTA. Figure 4 employs the RF strategy, which maintains the launcher’s orientation angle at an initial angle of \(a_{\textrm{ini}}\). To achieve the desired probability of interception and avoid degradation of the PK caused by heading errors, the guided interceptor should have sufficient maneuverability to approach the PIP. The engagement region depicted in Fig. 4 represents the area where the probability of interception satisfies or exceeds a reference value, and the firing window is a constraint that ensures interception occurs within this region. In the case of the RF strategy, where the initial orientation angle is maintained, a significant loss of PK can occur when targets approach from a completely different orientation compared to the initial angle. To mitigate this PK loss, Kim et al. [46] adjust the initial orientation angle to align with the direction of the target. This adjustment aims to reduce the PK loss, but not necessarily eliminate it entirely.

4.2 WTA Under Mixed Strategy

Fig. 6
figure 6

The flow of CWTA under M strategy

Fig. 7
figure 7

The WTA under the combination of R and RF strategy a first engagement, b second engagement, and c third engagement

The proposed WTA method has been extended to a mixed strategy of RF and R in order to improve upon the unitary strategies of the previous WTA methods. Figure 6 provides an illustration of the process flow for the WTA method under the mixed strategy. This method utilizes the target–launcher assignment results obtained from the WTA method under RF strategy while also implementing an additional procedure in step 1 to determine the initial orientation angle of the launcher based on the target distribution. This step helps to reduce the difference between the launcher’s orientation angle and the target’s approaching angle. In step 2, targets are assigned to each launcher, taking into account time constraints such as the restricted firing time window and delay for successive launches. In step 3, the time slot and orientation angle are determined for each assigned target on an individual launcher basis using the newly proposed Algorithm 1, which builds on the problem formulation presented in Sect. 3. The constraints relating to the firing window and the time required to rotate the launcher’s orientation angle are inspected to select a feasible solution that satisfies the time limitation. The process of examining these constraints is described in Algorithm 2 in detail.

Sequential engagements from the WTA method under the mixed strategy are illustrated in Fig. 7. The first engagement is carried out using the RF strategy, which maintains the launcher’s initial orientation angle (i.e., \(a^{\textrm{ini}}\)). The second engagement is also accomplished using the RF strategy, but a slight loss in PK occurs due to heading errors. The proposed WTA method is capable of selecting R and RF strategies for each engagement. If the R strategy is selected, the extent of rotation is determined to align completely with the PIP or a certain proper angle. The third engagement is computed using the R strategy, but the orientation angle of the launcher rotates close to the completely aligned angle with the PIP. As a result, there is also a slight loss in PK, but the amount of PK loss is less than that of maintaining the initial orientation angle.

Fig. 8
figure 8

The trajectory demonstration of a scenario 1, b scenario 2

Algorithm 1 outlines the process of determining the appropriate pairs of target, orientation angle, and firing time slot using the greedy maximization assignment algorithm. The algorithm follows a selection and exclusion framework and selects a new solution candidate that achieves the maximum marginal gain \(\bigtriangleup f\left( \ominus | P_{w} \right) \) as shown in (lines 14–18). Feasible pairs within the time slot and target set are considered as long as they are not apart from the limit angle of \(a^{\max }\) (lines 2–13). The algorithm also takes into account constraints for the firing time window and rotation angle limit. The exclusion process described in Algorithm 2 ensures that there is no duplicated assignment of each time slot (lines 20–26) and considers the time delay \(\tau ^{d}\) of successive launch, based on the determined strategy of R and RF (lines 2–19). In the RF strategy, only the delay time for the firing process and stabilization of vibration after launch are considered (lines 7–9), while in the R strategy, the time delay for rotating the orientation angle \(\tau ^{\textrm{rot}}_{o,o^{*}}\) and time for alignment \(\tau ^{\textrm{align}}\) after rotation are also considered along with the delay time for firing (lines 11–13).

5 Simulations

This section examines the simulation results of some scenarios using four different methods, and their performance is evaluated based on the indicators recommended by Kim et al. [46]. These indicators include overall PK (\(PK^{overall}\)), PK loss (\(PK^{loss}\)), time loss due to rotation, and missed opportunities for engagement (\(E^{loss}\)). Table 1 presents a summary of the four distinct methods: WTA-RF, WTA-R, CWTA-RF, and the proposed CWTA-M. The WTA-RF is a conventional method that does not take heading error into account. The WTA-R method applies the R strategy to nullify heading error. The CWTA-RF method follows the RF strategy but initializes the orientation angle based on the target population. Lastly, the CWTA-M proposed in this paper applies both R and RF strategies depending on the situation.

Table 1 Summary of methods to be compared

During the simulation, we investigated defense scenarios against a considerable number of targets concentrated in a confined area, specifically low-altitude rocket threats in 3D space. These multiple targets, representing low-altitude rocket threats, were assumed to follow a ballistic trajectory with speeds ranging from 400 to 500 m/s during their descent phase. Additionally, we considered a situation where there are six enemy launchers, and each launcher sequentially fired 18–45 rocket threats. The minimum firing interval in this simulation was set to 0.5 s. To determine the ground target points for the low-altitude rocket threats, we employed Monte Carlo simulations to randomly select locations within a small region of approximately 9 to 12 km\(^2\). The trajectories of the enemies are illustrated in Fig. 8a, b. In Fig. 8a, the enemy launchers are evenly distributed at regular intervals. In contrast, the scenario depicted in Fig. 8b involves enemy launchers divided into two groups, attacking a specific region within the defense area. The experiment used parameters that reflect realistic weapon systems, with a defense system’s engagement region limited between \(4\;\textrm{km}\) and \(12\;\textrm{km}\). The experiment assumed two scenarios, each with 6 launchers and up to 270 targets. The time delay between the launching of each interceptor was set to 0.5 seconds, with an average speed of \(400\;\mathrm{m/s}\) assumed for the interceptor. The launcher’s alignment time after launch, rotational speed, and maximum rotation limit were set to \(\tau ^{\textrm{align}} = 1.5\) seconds, \(v^{\textrm{rot}} = 15\) degrees per second, and \(a^{\max } = 60\) degree, respectively. The experiment evaluated the effectiveness of the engagement using a randomly selected chance factor from the PK model. It is presumed that the defensive system’s area of operation for which an interceptor can intercept a target is limited by a maximum radius of \(12\;\textrm{km}\) and a minimum radius of \(4\;\textrm{km}\). The mean and standard deviation of the engagement range were set to \(\mu ^{r}=\left( r^{\max }+r^{\min }\right) /2\) and \(\sigma ^{r} = 4\;\textrm{km}\), respectively.

Fig. 9
figure 9

The result of simulation for scenario 1 according to the number of target increase a the overall PK, b the loss of PK, c the loss of time for rotation, and d the loss of engagement opportunity

Fig. 10
figure 10

The result of simulation for scenario 1 according to the standard deviation \(\sigma ^{a_{\textrm{HE}}}\) of heading error increase a the overall PK, b the loss of PK, c the loss of time for rotation, and d the loss of engagement opportunity

Fig. 11
figure 11

The result of simulation for scenario 2 according to the number of target increase, a the overall PK, b the loss of PK, c the loss of time for rotation, and d the loss of engagement opportunity

Fig. 12
figure 12

The result of simulation for scenario 2 according to the standard deviation \(\sigma ^{a_{\textrm{HE}}}\) of heading error increase a the overall PK, b the loss of PK, c the loss of time for rotation, and d the loss of engagement opportunity

The results of the simulation in Fig. 9 exhibit an increase in the number of targets in scenario 1. It is evident that WTA-R is inferior to WTA-RF since the latter nullifies the heading error by rotating the orientation angle of a launcher to the PIP direction. Additionally, CWTA-RF surpasses WTA-RF by reducing the heading error by adjusting the initial orientation angle to the region where PIP is formed. However, there are limitations to both WTA-R and CWTA-RF. While WTA-R improves the vulnerability of WTA-RF, it cannot engage certain targets due to the time required for rotating the orientation angles of launchers. Similarly, CWTA-RF cannot use the rotation strategy, even if there is time to apply it for some targets. To address these limitations, CWTA-M combines both R and RF strategies, resulting in the reduction of missed targets compared to WTA-R, as shown in Fig. 9d. Additionally, CWTA-M further alleviates PK gradation by heading errors compared to CWTA-RF by applying the R strategy for some engagements, as shown in Fig. 9b. Figure 9c demonstrates that CWTA-M reduces the rotation time of launchers compared to WTA-R by applying the RF strategy together with the R strategy. Overall, the simulation results reveal that CWTA-M shows the most dominant performance by overcoming the limitations of both WTA-R and CWTA-RF. In Fig. 10, the simulation results for scenario 1 display a comparison of the performance of the four methods according to the variable \(\sigma ^{{a_{\textrm{HE}}}}\), which determines the ratio of PK degradation by heading errors in relation to the interceptor’s characteristics.

As shown in Fig. 11a, CWTA-M outperforms WTA-R and CWTA-RF in scenario 2 simulations. Figure 11b indicates that CWTA-M mitigates PK degradation due to heading errors compared to CWTA-RF. Additionally, Fig. 11d shows that CWTA-M has fewer missed targets than CWTA-R. In Fig. 11c, there is no significant difference in the time required for rotation. However, the results presented in Fig. 11b, d suggest that the total amount of rotation is not a crucial factor. Instead, the reduction of missed targets and PK degradation due to heading errors can be achieved by selecting an appropriate rotation strategy for each target, determining when and at what angle to rotate. Figure 12 depicts the simulation results for the increasing values of \(\sigma ^{{a_{\textrm{HE}}}}\) in scenario 2. The trend of the results is similar to that observed in scenario 1. With an increase in \(\sigma ^{{a_{\textrm{HE}}}}\), the PK degradation ratio decreases due to heading errors. Therefore, if \(\sigma ^{{a_{\textrm{HE}}}}\) increases, the results of the four methods become similar. In this study, our focus is on cases where the impact of heading error on PK degradation is significant. Accordingly, the performance of CWTA-M dominates in situations where \(\sigma ^{{a_{\textrm{HE}}}}\) is less than 10. Similarly, as illustrated in Fig. 12b, d, it is evident that CWTA-M is superior in terms of the number of targets engaged in PK loss caused by heading errors.

To summarize, the R strategy is effective in mitigating PK loss caused by heading errors and improving engagement success rates. However, its unitary implementation has limitations, as it only determines the rotation angle towards the PIP direction, which may result in missed engagements if there is insufficient time to rotate to the objective orientation angle. In such cases, alternative strategies like the RF strategy or determining a rotation angle within the available time constraints could increase engagement success rates. By allowing for the selection of R and RF strategies and determining the rotation angle for each engagement, the limitation of the unitary R strategy was overcome, and the CWTA-M outperformed WTA under the unitary strategy, as demonstrated in the simulation results.

6 Conclusions

The proposed WTA algorithms aim to improve the defense against multiple targets in narrow areas, which is a challenging task due to the limited maneuverability of interceptors. The use of a rotation strategy to align the orientation angle with the target’s approach direction can significantly improve the PK against the target. However, the unitary implementation of the WTA algorithm with a rotation strategy only aligns the orientation angle toward the PIP direction, which may result in missed engagements if there is insufficient time to rotate to the objective orientation angle. To overcome this limitation, the study proposes a mixed version of the strategy that allows for the selection of R and RF strategies and the determination of the rotation angle for each engagement. This approach can reduce PK degradation and reaction time, leading to better performance against multiple targets. The proposed approach involves the inclusion of a step to determine the rotation angle to determine the R and RF strategy, alongside making modifications to the WTA formulation. Numerical simulations were then conducted to evaluate the effectiveness of these methods. Results from the simulations indicate that the proposed methods outperformed the unitary strategy when faced with multiple targets. One of the main advantages of the proposed algorithms is their ability to overcome PK degradation caused by heading errors while also achieving high performance and efficient use of resources through the flexible application of the R and RF strategy to manage the trade-off between PK degradation and reaction time.

In future research, it would be beneficial to identify additional factors and challenges that could be taken into account during a WTA process to aid decision-making for defending against area targets. Such considerations may include avoiding interference between interceptors, accounting for misidentification between debris and actual targets due to collisions, and expanding sensor–weapon–target assignment problems for cooperative engagements. Additionally, WTA simulations should be conducted using various types of area targets and interceptors, along with more realistic and diverse scenarios that incorporate target attack patterns.