Enhancing Assault Maneuvers in Simulated Scenarios of Multiple Invader Kamikaze Drones through the Utilization of a Modified Adaptive Elforce Algorithm
DOI:
https://doi.org/10.21609/jiki.v17i1.1202Abstract
The development of autonomous drone technology has led in their widespread deployment, 
especially in combat scenarios. One instance of this is the utilization of kamikaze drones, as 
seen in the Ukraine war. Autonomous defense drones have been used to counter these 
invading kamikaze drones. This study focuses on simulating scenarios involving invader vs. 
defender drones, primarily exploring invader drone maneuver motions to maximize damage 
inflicted on chosen targets. The work we conducted presents an enhanced el-force algorithm 
that employs Coulomb's Law-based maneuver techniques to improve the effectiveness of 
multiple kamikaze invader drones when engaging target defended by defender drones. We 
aim to improve traditional el-force by addressing key challenges such as siege tendencies and 
unproductive conduct. In addition, we explore various attacking formations to determine the 
most effective formation. To evaluate the performance of our proposed algorithm, we 
conducted simulation in a dynamic 3D environment, employing damage inflicted as the 
evaluation metric. Through rigorous testing, we conclusively demonstrate that our proposed 
method combining with a circular formation, outperforms alternative attacking maneuvers 
and formations. Our findings provide insights into optimal maneuver movements and 
attacking formations, improving the effectiveness of invader drones in engaging and 
damaging designated targets.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
 - Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
 - Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
 









