Planetary Defense Operations
WTA · Network Interdiction · MCLP · Security Games · POMDP
What if the most consequential operations research problems were not about supply chains or hospital scheduling — but about defending Earth from an extraterrestrial threat? This fictional domain maps 12 canonical OR problem families onto alien defense scenarios, from weapon-target assignment to Stackelberg security games. The mathematics is real. The aliens are not.
Every problem here has a direct real-world counterpart: WTA is used in missile defense, network interdiction in counter-terrorism logistics, MCLP in sensor network design, and security games in airport protection (ARMOR, IRIS). The alien framing makes the formulations memorable while the underlying OR is academically rigorous.
OR Mapping
| Defense Domain | OR Element | Example |
|---|---|---|
| Orbital laser | Weapon i | Laser Alpha (3 shots) |
| Alien missile | Target j | Mothership Scout (V=100) |
| Hit chance | Kill probability pᵢˇ | 0.8 |
| Ammo count | Weapon capacity Wᵢ | 3 shots |
| Survival chance | ∏(1-p)ⁿ | 0.04 (two hits at p=0.8) |
3 weapons × 4 targets. Greedy assigns the highest-kill-probability weapon to the highest-value remaining target.
See Full Application → 3 algorithms including Branch & BoundOR Mapping
| Defense Domain | OR Element | Example |
|---|---|---|
| Defense drone | Agent i with position pᵢ | Drone Delta-3 |
| Alien scout pod | Goal position gᵢ | Pod at (320, 180) |
| Collision zone | Safety distance d_safe | 25 px |
| Steering force | Control input uᵢ | Reynolds weighted sum |
| Swarm behavior | Emergent coordination | No central controller |
8 drones pursue 4 alien scout pods using Reynolds flocking rules. This is a simulation, not an optimization solver.
See Full Application → adjustable flocking weights & velocity obstaclesOR Mapping
| Defense Domain | OR Element | Example |
|---|---|---|
| Alien supply base | Source node s | AlienBase |
| Earth outpost | Sink node t | EarthOutpost |
| Transit relay | Intermediate node | Relay1, Junction |
| Supply route | Arc (i,j) with cost cᵢˇ | AlienBase→Relay1 (cost 5) |
| Disruption budget | Interdiction budget k | k = 2 arcs |
6-node network. Budget k=2. Click “Find Optimal” to enumerate all C(7,2)=21 arc pairs and find the interdiction maximizing shortest path.
This toy example is designed for educational clarity. Real network interdiction problems involve orders of magnitude more complexity and are subject to strict legal and ethical review.
See Full Application → interactive arc clicking & greedy heuristicAll Planetary Defense Applications
12 interactive applications — click any to explore
Preparing for First Contact
Typically this section would encourage you to explore the GitHub repository, implement the algorithms, or contact us for collaboration opportunities. However, we find ourselves uncertain about the appropriate call to action for alien defense preparedness.
If the aliens arrive, we suspect you will not be visiting a GitHub Pages site. If they don't arrive, you have learned some excellent OR methods that transfer seamlessly to logistics optimization, sensor network design, project scheduling, and facility location — all of which are considerably more likely to be useful on a Tuesday afternoon.
We do recommend the Hungarian algorithm. It works on any planet.
Educational Fiction Disclaimer
This is a fictional educational scenario.
- All “alien invasion” content exists purely to teach Operations Research concepts in an engaging way
- All data, scenarios, and parameters are entirely fictional
- No actual military applications are intended or endorsed
- This content should NOT be used for any real-world defense planning
- The author advocates for peace and opposes militarization
- If actual extraterrestrials arrive, please consult astrophysicists and diplomats, not this website 🔭