• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Distributed intelligent self-organized mission planning of multi-UAV for dynamic targets cooperative search-attack

    2020-01-09 01:04:40ZiyangZHENPingZHUYixuanXUEYuxuanJI
    CHINESE JOURNAL OF AERONAUTICS 2019年12期

    Ziyang ZHEN, Ping ZHU, Yixuan XUE, Yuxuan JI

    College of Automation Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China

    Abstract This article studies the cooperative search-attack mission problem with dynamic targets and threats, and presents a Distributed Intelligent Self-Organized Mission Planning (DISOMP)algorithm for multiple Unmanned Aerial Vehicles (multi-UAV). The DISOMP algorithm can be divided into four modules: a search module designed based on the distributed Ant Colony Optimization (ACO) algorithm, an attack module designed based on the Parallel Approach (PA)scheme, a threat avoidance module designed based on the Dubins Curve (DC) and a communication module designed for information exchange among the multi-UAV system and the dynamic environment. A series of simulations of multi-UAV searching and attacking the moving targets are carried out, in which the search-attack mission completeness, execution efficiency and system suitability of the DISOMP algorithm are analyzed.The simulation results exhibit that the DISOMP algorithm based on online distributed down-top strategy is characterized by good flexibility, scalability and adaptability, in the dynamic targets searching and attacking problem.

    KEYWORDS Ant Colony Optimization(ACO);Cooperative control;Mission planning;Search-attack integration;Self-organized;Unmanned Aerial Vehicle(UAV)

    1. Introduction

    With the development of the automation technology, the Unmanned Aerial Vehicle (UAV) system is becoming increasingly complex and powerful. The UAVs are expected to gradually enter the air force’s main battle weapon and will partly replace some of the jet fighters and bomber, to account for most of the air defense and strike missions. According to the observe-orient-decide-act model, the Air Force Research Laboratory divided the UAV’s autonomy capability into 10 levels.1Nowadays, the UAVs gradually rose from the tactical level to the strategic level.The multi-UAV cooperative control techniques play an important role, which include the task assignment,2path planning and replanning,3mission planning,4formation and reconfiguration,5communication network6and so on. In addition, the development of multi-UAV cooperative control techniques was investigated to promote further research.7

    The centralized control architecture and the distributed control architecture are two types of the cooperative control architectures for multi-UAV.8Along with the improvement of UAV’s performance, the distributed control architecture with superiorities of higher reliability, less computation and communication has been a research focus.4-6Therefore, the distributed control architecture is utilized in this paper. The specific strategies for the cooperative mission planning problem are mainly divided into two kinds: top-down scheme and down-top scheme. Although the top-down scheme based on the hierarchical decomposition strategy can effectively reduce the difficulty and complexity of the problem, it will consume large computation and communication costs when the battlefield situation changes dynamically. In contrast, the downtop scheme based on the self-organized strategy emphasizes each individual’s dynamic response to the environment, and thus is more reliable and flexible. Several self-organized down-top schemes with simple calculation and good robustness have been presented based on the swarm intelligence.Ref.9surveyed the heterogeneous flying self-organized networks structure, and presented a variety of distributed gateway-selection algorithms. Ref.10proposed a fast and coupled solution for cooperative mission planning of multi-UAV with a distributed genetic algorithm.

    Therefore, this work aims to solve the cooperative searchattack mission planning problem of multi-UAV in the dynamic environment with moving targets, and a novel self-organized down-top method is proposed. Different from the results in the literature, the main contributions are as follows.

    (1) The multi-UAV cooperative search-attack integration problem for the dynamic targets in an uncertain environment is investigated, which has not been well addressed in the literature. Refs.11-18investigated the multi-UAV cooperative search-attack problem with stationary targets. Ref.19studied the cooperative search planning and task allocation of the multi-UAV for the moving targets. Ref.20and Ref.21mainly focused on the search task for moving targets. Ref.22developed a new cooperative network platform of multi-UAV surveillance,and carried out some experiments of recognition and tracking of multiple moving targets.Furthermore,thepracticalconstraintsofUAV’s maneuverability, collision avoidance and threat avoidance are considered in this search-attack integration problem, and this is what many references ignore or do not research thoroughly.

    (2) For the cooperative search-attack mission planning problem, a Distributed Intelligent Self-Organized Mission Planning (DISOMP) algorithm is originally presented in this paper. For the cooperative search problem, there are some algorithms presented, such as optimal search theory,15, grid based search algorithm,16probabilistic decision making scheme,12,17,19heuristic algorithm,11,13,18,20-22and predictive algorithm.14The proposed DISOMP algorithm is constituted by a search module designed by the distributed Ant Colony Optimization (ACO) algorithm, an attack module designed by the Parallel Approach (PA) guidance method, a threat avoidance module designed based on the Dubins Curve (DC) scheme, and a communication module for information exchange among the multi-UAV system.This combinatorial optimization scheme can effectively solve the search-attack integration mission planning problem in the uncertain dynamic environment. Furthermore, the mission completeness, mission execution efficiency and multi-UAV system suitability of the DISOMP algorithm are deeply investigated. All above contribute to the practical applications of the DISOMP algorithm.

    The rest of this paper is organized as follows. In Section 2,the multi-UAV cooperative search-attack mission planning problem is described. In Section 3, the DISOMP algorithm composed of a search module, an attack module, a threat avoidance module and a communication module is proposed.In Section 4, simulations are conducted to verify the effectiveness of the DISOMP. Finally, a conclusion is given in Section 5.

    2. Cooperative search-attack problem description

    In this section,the search-attack mission in uncertain environment will be modeled, the search-attack mission planning problem will be defined, and the constraints of search-attack mission planning model will be given.

    2.1. Search-attack mission in uncertain environment

    The illustration of the search-attack mission in uncertain environment is given in Fig. 1.

    (1) Mission area discretization

    Discretize and rasterize the mission area L×W in a twodimensional plane. There is a cooperative multi-UAV system including some isomorphic UAVs, targets (such as moving ground or air vehicles) and threats (such as environmental obstacles, enemy radars and fire points) in the mission area.The UAVs move between the grids in the discrete space with the constraints of maneuverability, collision avoidance and threat avoidance.

    (2) UAV’s property and motion parameters

    Fig.1 Illustration of search-attack mission area.

    Assume that the UAVs in a multi-UAV system are isomorphic, and each UAV takes the same search sensors and attack weapons, and can execute the search and attack missions.There are NuUAVs. Let the projection radius of UAV detection range in the mission area be RS,the maximal turning angle of UAV be φmax, the speed of UAV be Vu, and the step displacement of UAV be d. The detection range and the next possible positions of the UAV are illustrated in Fig. 1, noted by a semi-circle and some deep color grids.

    (3) Dynamic targets and threats There are NTdynamic moving targets and Ntthreats in the mission area, noted by the triangles and the circles in Fig. 1, respectively (Labelled as 1,2,...,Nt/NT). The targets move in straight lines or curves with random directions, with the speed of VT. The radius of the threat is Rt. All above information is unknown in advance for the multi-UAV system. The task of the multi-UAV system is to search and attack these targets and guarantee that UAVs do not enter the threatened area.

    2.2. Search-attack mission planning problem

    The multi-UAV cooperative search-attack integration mission for dynamic targets can be transformed to be a mission planning problem.

    Definition 1(Target search mission).When a target is in the detection range of UAV, the target is considered to be searched, which is described as where RSis the detection range, and r is the distance between the UAV and the target. The surveillance coverage rate is calculated as the ratio of grids which have been searched to all the grids in mission area, and is expressed by

    where nodex,y=0 means that the grid (x,y) has not been searched,while nodex,y=1 means that the grid(x,y)has been searched.The search mission goal is to increase the coverage of the mission area in order to find more targets, and therefore,the surveillance coverage rate is taken as the search benefit JS, that is

    Definition 2(Target attack mission).When a UAV seeks out a target, it will fly to track the target. When the target is in its attack range, the target is considered to be attacked, which is described as

    where RAis the attack range. The attack benefit is calculated as the total value of the targets which have been attacked,and is calculated by

    where NT0is the total number of targets which have been attacked and valuelis the value of the l-th target. The attack mission goal is to maximize the attack benefit, that is

    Definition 3 (Centralized search-attack mission planning model).Suppose that there is a central processor to make decision for the search-attack mission, then the mission planning model can be defined as deciding the UAVs’ flight paths to search and attack the moving targets, by maximizing the following performance index function:

    where ω ∈ {0 ,1},ω=1 indicates that the UAV is performing a search mission, ω=0 indicates that the UAV is performing an attack mission,U is the decision input which represents the UAV’s position at the next time instant, and C is a constraint set of the mission planning model.

    Definition 4 (Distributed search-attack mission planning model). Suppose that each UAV is an independent individual with a separate processor to build its own solution, then the centralized search-attack mission planning model can be transformed to be a distributed model.The distributed search index Eq.(3)and attack index Eq.(6)are respectively decomposed as

    where μiis the weight coefficient of the i-th UAV. Then the centralized optimization model Eq. (7) can be decomposed as

    where Xiis the state vector of the i-th UAV,Tiadjoinis the set of UAVs which communicate with the i-th UAV, and Ciis the constraint set of the i-th UAV, which will be given in the next subsection.

    2.3. Constraints of search-attack mission planning model

    The constraints of the mission planning model for multi-UAV mainly include the maneuverability constraints Cm, collision avoidance constraints Ccand threat avoidance constraints Ct. Then the constraints set Ciin Eq. (9) can be expressed as Ci={Cm, Cc, Ct}.

    (1) Maneuverability constraints. The maximum turning angle φmaxof each UAV which limits its turning radius and rate is considered and expressed by

    where φi(k) is the turning angle of the i-th UAV at time k.

    (2) Collision avoidance constraints. A safe distance dminbetween two UAVs is considered to avoid the collision, which is expressed by

    where dij(k) is the distance between the i-th UAV and the j-th UAV at time k.

    (3)Threat avoidance constraints.A safe distance Rminfrom the threat(such as obstacle,fire and radar)to the UAV is considered.The distance between the UAV and the threat’s center should not be shorter than the radius of the threat, which is expressed by

    where dil(k) is the distance between the i-th UAV and the l-th threat.

    3. Design of DISOMP for cooperative search-attack problem

    The mission will be accomplished by online planning the flight paths of multi-UAV through the information interaction between the UAVs and the battlefield environment. This section will design the DISOMP algorithm for the dynamic targets cooperative search-attack problem.

    3.1. Configuration of DISOMP

    Each UAV in the multi-UAV system is equipped with a separate processor to deal with its local tasks,which contain targets search mission, attack mission and communication with other adjacent UAVs. The configuration of the DISOMP algorithm is shown in Fig. 2, which is composed of a search module, an attack module, a threat avoidance module and a communication module. Design details of the modules are given in the following.

    3.2. Search module based on ACO

    All UAVs take the same search sensors to search the mission area, according to Definition 1. When a target is in the detection range of UAV, the target is considered to be discovered.ACO is an intelligent optimization algorithm with global optimization performance, versatility characteristics.23Based on the ACO algorithm, the waypoint of each UAV is online generated by maximizing the distributed search-attack mission planning performance index Eq. (9) with the constraints Eqs. (10)-(12).

    (1) Simulative relation between ant agent and UAV. In the search module,an UAV is simulated as an ant agent,and thus the ant agent is assumed to have the positioning, perception,memory, movement, combat, communication and selfrenewal capabilities as the UAV platform, while being subject to the UAV’s performance constraints. The UAV flying is simulated as the ant agent moving. An iteration of the ACO algorithm is equal to a decision of the UAV for mission planning, and also equal to a flight step of the UAV. The cooperative search mission problem is simulated as the distributed optimal path searching problem.

    Fig.2 Configuration of DISOMP algorithm.

    (2) Local pheromone update mechanism. When the ant agent completes a state transition,it needs to update the pheromone concentration according to the position distribution of the whole ant colony. The pheromone concentration of grids which have been searched should be reduced to avoid excessive search of a certain area. The information of the j-th ant agent at time kjas is known to the i-th ant agent can be expressed as

    Then the local pheromone update mechanism of the i-th ant agent is described by

    (3) Global pheromone update mechanism. Due to the uncertainty of the environment, such as new target appearing in the area which has been searched, a global enhancement of the pheromone is needed after some intervals. The global pheromone update mechanism is described by

    where F ∈ (0 ,1) is the uncertainty coefficient and Δτg0is the global pheromone update coefficient.

    (4)State transition rule.The transition rule of the ant agent is designed as

    where α and β denote the importance factors of pheromone concentration and heuristic visibility, respectively. The heuristic is represented as the surveillance coverage rate, and hence η=P. GRID(k+1) is the set of candidate grids at the next time, and grid*(k+1) is the decided grid from the candidate grid set according to the transition rule.

    (5) Optimal path generation procedure. The movement of the ant agent is influenced by its own state and the states of the adjacent ant agents. First, the ACO parameters and the mission area are initialized. Second, the local pheromone of the searched area is updated according to Eqs. (13)-(16), and the global pheromone of the mission area is updated according to Eq. (17). Third, the ant agent moves according to the state transition rule Eq.(18),and the optimal flight path is obtained by the ACO algorithm.

    (6) Convergence analysis. Different from the convergence definition of the classical ACO algorithm, the convergence of the DISOMP is defined as the ant’s surveillance coverage rate.If the surveillance coverage rate can finally reach a stable level with certain iterations,the distributed ACO algorithm is considered to be convergent.11If the ant agent is surrounded by the searched grids,it will fall into excessive local searching.Correspondingly,for the DISOMP algorithm,when the coverage rate keeps invariant for the iteration threshold It, the ant agent should move to the nearest unsearched area. This scheme ensures that the coverage rate of the mission area can always reach to 100%. Therefore, the DISOMP algorithm is convergent.

    3.3. Attack module based on PA

    Based on the PA guidance method, the UAV can track and strike the moving target,according to Definition 2.The attack mission is divided into two steps: target tracking and target striking.

    (1) Target tracking. As shown in Fig. 3, the target line azimuth q is the angle of target line and the baseline, σuis the angle between UAV’s velocity vector and the baseline, σTis the angle between the target’s velocity vector and the baseline,ψu(yù)is the angle between the target line and the UAV’s velocity vector,and ψTis the angle between the target line and the target’s velocity vector. The PA guidance method requires that the target line of sight should be kept moving in parallel along the given direction during the guidance process, and thus the azimuth velocity of the target line is controlled to be zero.Therefore, the PA guidance method is expressed by

    Then the guide command of the UAV is computed by

    Fig.3 Illustration of parallel approach scheme.

    (2) Target striking. From the PA guidance law Eq. (20), it is found that when the target is in a linear motion, the UAV can attack the target in any direction and the straight trajectory can be obtained as long as the velocity ratio Vu/VTis constant.When the target is in a complex maneuver, ψu(yù)needs dynamic change.

    3.4. Threat avoidance module based on DC

    When a threat is detected by the UAV,the UAV performs the mission to avoid the threat, which includes two steps: one is the threat judgment and the other is the safe path generation based on DC.

    (1) Threat judgment. When the threat is discovered by the UAV, the UAV will judge whether it is necessary to avoid the threat, according to the relative distance and direction between the UAV and the threat. The UAV moves forward and simultaneously detects the environment to continue the mission. Judge whether the candidate grid can successfully avoid the threat. If it is possible to enter the threatened area in the next step, that is d ≥dil-λRT, then the UAV will generate a safe path based on the DC, as shown in Fig. 4.

    (2) Safe path generation based on DC. The Dubins Curve was originally proposed by Dubins in 1961 and has been widely used in aircraft path planning.24There are normally four types of paths generated by the DC: two circumscribed paths and two inscribed paths.The shortest one will be chosen as the optimal path.As shown in Fig.5,PS(xs,ys)is the initial position with velocity Vs, PF(xf,yf) is the final position with velocity Vf,Rsis the radius of the initial circle,Rfis the radius of the final circle, the dotted line is the inscribed path and the solid line is the circumscribed path.Then the solution γ of DC scheme can be expressed as PS(xs,ys,ψs)→γPF(xf,yf,ψf).According to the Euclidean geometry method, the safe path can be obtained by the following steps8: (A) Figure out the center coordinates of the initial circle Os(xcs,ycs) and the final circle Of(xcf,ycf); (B) Draw a circle, when it is the inscribed DC, the radius of the cycle is Rf+Rs; when it is the circumscribed DC,the radius of the cycle is|Rf-Rs|;(C)The tangent point on the final circle is the exit point PNof the optimal path,and the tangent point on the initial circle is the entry point PX;(D)Finally draw an arc from PSto PXwith the center Os,connect PXand PN,draw an arc from PNto PFwith the center Of,and then the safe optimal path is generated.

    3.5. Communication module

    The communication module runs throughout the entire mission process,which is responsible for the information exchange of the UAV’s moving positions and directions. Each UAV needs to communicate with the adjacent UAVs at set intervals,as shown in Eqs. (15) and (16). The exchanged information mainly includes its own state information used for the collision avoidance and the cooperative control. Moreover, there also exits information exchange between the dynamic environment and the UAVs, as shown in Eq. (17).

    Fig.4 UAV threat detection diagram.

    Fig.5 Circumscribed and inscribed DC.

    4. Simulation study

    In order to verify the effectiveness of the DISOMP algorithm for the dynamic target cooperative search-attack problem, the numerical simulations are carried out based on the MATLAB R2014b software with the computer processor Intel(R)Xeon(R)CPU E3-1230 v5@3.40 GHz, RAM 8.00 GB, and 64-bit WINDOWS 10 operating system.

    4.1. Search-attack mission scene and parameters

    (1)Mission area and target information.Divide the mission area 20 km×20 km into the discrete grids 1000×1000.There are 9 targets moving in the area,whose initial positions,values and moving directions are given in Table 1 and Fig.6,and the moving speeds of the targets are 20 m/s (1 grid distance per unit time).However,the information of the targets is unknown in advance for the UAVs.

    (2) UAV motion parameters. Two homogenous UAVs are sent to the mission area. The first UAV (UAV1) is initially located at position (8, 12) km and the second UAV (UAV2)is initially located at position (8, 8) km, respectively. The UAV’s maximum turning angle φmax=45°, the moving speed Vu=200 m/s(10 grids per unit time),and the detection radius Rs=600 m (30 grids).

    (3) ACO algorithm parameters. The number of the ant agent is equal to the number of the UAVs. The description and value of important system parameters are given in Table 2.

    (4) DISOMP algorithm steps. According to the configuration of DISOMP algorithm shown in Fig. 2, the steps are described in the following:

    Table 1 Target information.

    Fig.6 Target movement diagram.

    Table 2 Description and value of system parameters.

    Step 1. Initialize the multi-UAV system and the mission area.

    Step 2. Based on the exchange information among the multi-UAV system and the dynamic environment, the UAV moves along the optimal path obtained by the ACO algorithm,computes the surveillance coverage rate and detects the mission area.

    Step 3.If there is a target detected,the UAV tracks the target based on the PA guidance method, strikes the target and computes the attack benefit, and then the algorithm goes to Step 5.

    Step 4. If there is a threat detected and it is necessary to avoid the threat after judgment, the UAV avoids the threat based on the DC scheme,and then the algorithm goes to Step 5.

    Step 5.Judge whether the mission is finished.If it is not finished, go back to Step 2, otherwise the mission is finished.

    (5) Complexity analysis. According to the DISOMP algorithm,each UAV has a separate processor to solve its own local optimization problem.The information of other UAVs can be obtained through communication. Therefore, each local optimization problem is mainly related to the state and decision input of the local UAV, which greatly reduces the complexity of the problem. Based on the distribution strategy, the local pheromone update mechanism combined with global pheromone update mechanism is proposed,which avoids the problem of reducing the algorithm efficiency due to excessive communication and pheromone update. Therefore, the DISOMP algorithm takes less time consumption than traditional ACO.

    4.2. Mission completeness analysis of DISOMP

    In order to analyze the mission completeness of DISOMP for the dynamic targets search-attack problem, the mission is divided into the following six sub-missions. The simulation results are shown in Fig. 7(a)-(f), where the dotted (solid) triangle represents the starting (ending) position of the target,and the hexagonal star represents the target that has been destroyed.

    Sub-mission 1. the goal is to search and attack the first target. Fig. 7(a) shows that UAV2 discovers target 3 after flying 21 steps, attacks and successfully destroys the moving target after flying 25 steps.

    Sub-mission 2. the goal is to search and attack the second target. Fig. 7(b) shows that UAV1 discovers target 5 after flying 93 steps, attacks and successfully destroys the moving target after flying 97 steps.

    Sub-mission 3.the goal is to search and attack the third target. Fig. 7(c) shows that UAV1 discovers target 6 after flying 161 steps, attacks and successfully destroys the moving target after flying 165 steps.

    Sub-mission 4. the goal is to search and attack the fourth target. Fig. 7(d) shows that UAV2 discovers target 7 after flying 172 steps,attacks and successfully destroys the moving target after flying 175 steps.

    Sub-mission 5.the goal is to search and attack the fifth target. Fig. 7(e) shows that UAV2 discovers target 8 after flying 491 steps, attacks and successfully destroys the moving target after flying 495 steps.

    Sub-mission 6.the goal is to search and attack all the targets until the UAV reaches its flying range.Fig.7(f)shows that the two UAVs discover 6 targets until they reach their flying range(1000 steps limited).

    Above all, the DISOMP algorithm can search and attack most of the dynamic targets. The mission completeness is mainly determined by the number of the UAVs, the performance(including the flight,detection and attack performance)of the UAV and the motion performance of the dynamic targets.

    4.3. Mission execution efficiency analysis of DISOMP

    In order to analyze the efficiency of the DISOMP algorithm for the dynamic targets search-attack problem, the Scan-Search (SS) algorithm25as a traditional searching method is compared with the DISOMP algorithm. Two algorithms’ iteration numbers are 500.

    (1) Algorithm 1 (SS algorithm). The cooperative searchattack mission response results based on the SS algorithm are shown in Fig. 8(a). UAV1 discovers and attacks the moving targets 4, while UAV2 discovers and attacks the moving targets 4.

    (2) Algorithm 2 (DISOMP algorithm). The cooperative search-attack mission response results based on DISOMP algorithm are shown in Fig.8(b).UAV1 discovers and attacks the moving target 6 and target 8, while UAV2 discovers and attacks the moving target 3, target 5 and target 7.

    (3) Comparison results. The simulation of DISOMP algorithm is carried out 20 times, the comparison results of which are given in Fig. 9. It is found that the UAVs with SS algorithm can search and attack 2 targets, while the UAVs with DISOMP algorithm can search and attack 2.5 targets on average. Therefore, the average efficiency of the DISOMP algorithm is much greater than that of the SS algorithm.Furthermore, the SS algorithm is an ergodic algorithm, and thus the efficiency will be degraded when the targets are far from the UAVs. However, as an optimization algorithm, the DISOMP algorithm is operated by minimizing a performance index Eq.(9),which guides the UAVs directly to the area with higher surveillance coverage rate and attack benefit.Therefore,the efficiency of the DISOMP algorithm will not be influenced by the positions of the targets.

    Fig.7 Cooperative search-attack mission response results of DISOMP.

    (4) Real-time performance. The DISOMP algorithm is an online decision-making algorithm, and therefore the real-time performance is very important.However,there is little uniform quantitative criterion to evaluate the time consumption performance of the mission planning algorithm. The time consumptions under different iterations of the DISOMP algorithm are calculated as given in Table 3.It is found that one iteration of the DISOMP algorithm for an UAV takes 90 ms on average.The mission planning belongs to the decision making (upper level) so that its cycle is definitely greater than the navigation and control (lower level). Theoretically, if the interval time between two decisions is greater than the time consumption of each decision, the real-time requirement can be satisfied.Therefore, the time consumption 90 ms for each iteration is reasonable for online applications.results of performing 20 times. It shows that two UAVs can search and attack 2.5 targets on average, while three UAVs can search and attack 3.3 targets on average. Therefore, the new UAV can fast adapt to the multi-UAV system and will improve the mission execution speed.

    Fig.8 Cooperative search-attack mission response results.

    Fig.9 Mission execution efficiency comparison between DISOMP and SS.

    Table 3 Time consumption analysis.

    Case 2. New UAV enters during mission process. Assume that a new UAV (UAV3) is initially located at the position(14, 12) km and joins into the multi-UAV system at the 172th iteration. The search-attack mission response results are shown in Fig.12.The black dashed line indicates the flight path of new UAV during the mission.The fifth target(target 8)is quickly detected after 253 iterations,which is faster than the

    Table 4 Mission response results of Case 1.

    4.4. Multi-UAV system suitability analysis of DISOMP

    In order to further verify the multi-UAV system suitability of the DISOMP algorithm, four cases are considered, including adding a new UAV at the beginning, adding a new UAV during the process of mission execution,considering the randomly moving targets and considering the threats.

    Case 1. New UAV enters at the beginning. A new UAV(UAV3) entering to the multi-UAV system needs to establish a new communication topology.Assume that the UAV3 is initially located at the coordinate (14, 12) km, and the mission execution results are given in Table 4 and Fig. 10, where it is found that six targets sorted by the order are detected and attacked by UAV3 and UAV2. However, UAV1 does not detect any target and there are still three targets which have not been detected, mainly because the targets are moving and the mission area is large. Fig. 11 shows the simulation case of two UAVs(493 iterations).It can be seen that the DISOMP algorithm based multi-UAV system is flexible and scalable.

    Fig.10 Mission response results of Case 1.

    Fig.11 Comparison results of Case 1.

    Case 3.Targets move randomly.Assume that target 1,target 4, target 6 and target 8 are moving randomly, while the other targets are moving straightly. The cooperative search-attack mission response results are shown in Fig. 13, where target 2 is attacked by UAV1 at the 391th iteration and target 1 is attacked by UAV2 at the 458th iteration.These results exhibit the good mission adaptability of the DISOMP algorithm for the cooperative search-attack mission in the presence of randomness.

    Case 4. Threats appear in mission area. Assume that there are three threats in the mission area, which should be avoided by the UAVs for safety. The threats can be considered as the circular areas. The center coordinates of threat 1, threat 2 and threat 3 are(12,6)km,(4,14)km and(16,16)km,respectively. The radii of threat 1, threat 2 and threat 3 are 3.6 km,3 km and 1 km, respectively. The cooperative search-attack mission response results are shown in Fig.14.Target 1 and target 3 are searched and attacked by UAV2 at the 37th iteration and 158th iteration,respectively.It can be seen that the UAVs can effectively avoid the threats and continue to execute the search and attack mission,which shows the good environmental adaptability of the DISOMP algorithm for the cooperative search-attack mission in the presence of threats.

    Fig.12 Mission response results of Case 2.

    Fig.13 Mission response results of Case 3.

    Fig.14 Mission response results of Case 4.

    5. Conclusions

    A novel distributed down-top scheme for the cooperative search-attack integration mission problem with dynamic targets and threats is developed for the multi-UAV system. The DISOMP algorithm is composed of search, attack, avoidance and communication modules.The thorough simulation results show that the DISOMP algorithm has high mission completeness, execution efficiency and system suitability. It contributes to making the multi-UAV system flexible, scalable and adaptive to the environment and mission changes. In a word, it is an online mission planning algorithm which is suitable for the practical applications.

    Moreover, the DISOMP algorithm can be extended to the cooperative search-attack mission problem of the UAV swarm or the heterogeneous multi-UAV system.For the UAV swarm,a reliable and flexible communication topology needs to be designed.For the heterogeneous multi-UAV system,a cooperative task allocation strategy is very important.

    Acknowledgements

    This work was supported in part by National Natural Science Foundation of China (Nos. 61741313, 61673209, and 61533008), Jiangsu Six Peak of Talents Program, China (No.KTHY-027), Postgraduate Research & Practice Innovation Program of Jiangsu Province, China (No. KYCX18_0303).

    欧美一区二区亚洲| 亚洲国产精品成人久久小说 | 我的老师免费观看完整版| 国产亚洲5aaaaa淫片| 五月玫瑰六月丁香| 国产淫片久久久久久久久| 蜜桃亚洲精品一区二区三区| 黄色一级大片看看| 亚洲自拍偷在线| 久久久久久久久大av| 一个人免费在线观看电影| 热99re8久久精品国产| 亚洲在线自拍视频| 12—13女人毛片做爰片一| 爱豆传媒免费全集在线观看| 久久久久九九精品影院| 国产日韩欧美在线精品| 国产女主播在线喷水免费视频网站 | 中国国产av一级| 亚洲国产精品成人久久小说 | 一级毛片久久久久久久久女| 欧美色欧美亚洲另类二区| 日韩一区二区视频免费看| 寂寞人妻少妇视频99o| 久久精品国产亚洲av香蕉五月| 亚洲av第一区精品v没综合| 欧美色欧美亚洲另类二区| 欧美变态另类bdsm刘玥| 国产爱豆传媒在线观看| 国产亚洲91精品色在线| 国产麻豆成人av免费视频| 成人综合一区亚洲| 大型黄色视频在线免费观看| 听说在线观看完整版免费高清| 少妇人妻精品综合一区二区 | 久久久午夜欧美精品| 麻豆久久精品国产亚洲av| 亚洲中文字幕日韩| 熟女电影av网| 国产午夜精品久久久久久一区二区三区| 国产午夜精品久久久久久一区二区三区| 色哟哟哟哟哟哟| 男的添女的下面高潮视频| 日本与韩国留学比较| 丰满人妻一区二区三区视频av| 亚洲av成人av| 亚洲av第一区精品v没综合| 亚洲欧美清纯卡通| 国产黄色视频一区二区在线观看 | 99久国产av精品| 最近最新中文字幕大全电影3| 成人综合一区亚洲| 22中文网久久字幕| av在线天堂中文字幕| 日韩一区二区三区影片| 国产成人freesex在线| 国产真实伦视频高清在线观看| 免费大片18禁| 美女高潮的动态| 成人永久免费在线观看视频| 日韩中字成人| 最近手机中文字幕大全| 中文在线观看免费www的网站| 熟女电影av网| a级毛片免费高清观看在线播放| 可以在线观看的亚洲视频| av专区在线播放| 国内少妇人妻偷人精品xxx网站| 精品久久国产蜜桃| 国产单亲对白刺激| .国产精品久久| av免费在线看不卡| 可以在线观看的亚洲视频| 亚洲人成网站在线观看播放| 午夜福利在线在线| 亚洲国产精品成人综合色| 蜜桃久久精品国产亚洲av| 三级经典国产精品| 国产成年人精品一区二区| 欧美色视频一区免费| 免费观看精品视频网站| 日韩欧美精品v在线| 免费观看人在逋| 老司机福利观看| 黄色日韩在线| 亚洲熟妇中文字幕五十中出| 免费在线观看成人毛片| 免费看光身美女| 日韩中字成人| 午夜福利视频1000在线观看| 欧美最黄视频在线播放免费| 欧美日本亚洲视频在线播放| 少妇猛男粗大的猛烈进出视频 | 国产黄a三级三级三级人| 国产真实乱freesex| 国产午夜精品一二区理论片| 男人舔女人下体高潮全视频| 在现免费观看毛片| 日韩成人伦理影院| 黄片wwwwww| 最近视频中文字幕2019在线8| 一本一本综合久久| 乱系列少妇在线播放| 老师上课跳d突然被开到最大视频| 不卡视频在线观看欧美| 亚洲经典国产精华液单| 夜夜看夜夜爽夜夜摸| 99久久久亚洲精品蜜臀av| 12—13女人毛片做爰片一| 2022亚洲国产成人精品| 少妇被粗大猛烈的视频| 色哟哟·www| videossex国产| 男人狂女人下面高潮的视频| 联通29元200g的流量卡| h日本视频在线播放| 一进一出抽搐gif免费好疼| 久久精品国产亚洲av香蕉五月| 亚洲国产欧美人成| 毛片女人毛片| 日本在线视频免费播放| 精品国内亚洲2022精品成人| 久久精品人妻少妇| 岛国在线免费视频观看| 国产色婷婷99| 亚洲精品成人久久久久久| 亚洲五月天丁香| 国产 一区 欧美 日韩| 两个人的视频大全免费| 69人妻影院| 亚洲国产精品久久男人天堂| 国产高潮美女av| 中国国产av一级| 人妻久久中文字幕网| 亚洲经典国产精华液单| 亚洲国产欧美人成| 午夜亚洲福利在线播放| 久久久国产成人精品二区| 99久久九九国产精品国产免费| 91麻豆精品激情在线观看国产| 久久九九热精品免费| 波多野结衣巨乳人妻| 日韩欧美精品v在线| 一级黄色大片毛片| or卡值多少钱| 午夜久久久久精精品| 色哟哟哟哟哟哟| 久久久精品欧美日韩精品| 成人亚洲精品av一区二区| 亚洲人成网站在线播放欧美日韩| 深爱激情五月婷婷| 99热6这里只有精品| 日韩欧美在线乱码| 亚洲色图av天堂| 男插女下体视频免费在线播放| 别揉我奶头 嗯啊视频| 日韩av在线大香蕉| 午夜福利成人在线免费观看| 高清在线视频一区二区三区 | 亚洲精品久久国产高清桃花| 桃色一区二区三区在线观看| 内地一区二区视频在线| 国产av麻豆久久久久久久| 在线观看66精品国产| 久久久久久久久大av| 久久午夜福利片| 免费黄网站久久成人精品| 一个人看的www免费观看视频| 18禁黄网站禁片免费观看直播| 美女xxoo啪啪120秒动态图| 久久午夜亚洲精品久久| 欧美另类亚洲清纯唯美| 伊人久久精品亚洲午夜| 久久久午夜欧美精品| 久久久久久国产a免费观看| 亚洲欧美日韩高清专用| 高清在线视频一区二区三区 | 国产伦精品一区二区三区四那| av.在线天堂| 99久久中文字幕三级久久日本| 一区二区三区免费毛片| 亚洲av电影不卡..在线观看| 久久精品国产亚洲av涩爱 | 又爽又黄无遮挡网站| 国产成人一区二区在线| 日本五十路高清| 国产男人的电影天堂91| 欧美另类亚洲清纯唯美| 亚洲真实伦在线观看| 国产精品久久视频播放| 91狼人影院| 国产精品免费一区二区三区在线| 国产v大片淫在线免费观看| 国语自产精品视频在线第100页| eeuss影院久久| 亚洲国产精品成人综合色| 少妇猛男粗大的猛烈进出视频 | 午夜免费激情av| 久久久精品大字幕| 一进一出抽搐gif免费好疼| 国产精品日韩av在线免费观看| 国产黄色视频一区二区在线观看 | 伊人久久精品亚洲午夜| 久久国产乱子免费精品| 免费人成视频x8x8入口观看| 色视频www国产| 免费无遮挡裸体视频| 国产一区亚洲一区在线观看| 秋霞在线观看毛片| 久久久久免费精品人妻一区二区| 91aial.com中文字幕在线观看| 一级毛片久久久久久久久女| 国产精品久久久久久精品电影小说 | 亚洲精品色激情综合| 老司机影院成人| 青春草视频在线免费观看| 色哟哟哟哟哟哟| 有码 亚洲区| 少妇熟女欧美另类| 两个人视频免费观看高清| 秋霞在线观看毛片| 国内久久婷婷六月综合欲色啪| 午夜免费激情av| 亚洲成人久久爱视频| 国产日韩欧美在线精品| 成年女人看的毛片在线观看| 国国产精品蜜臀av免费| 亚洲国产色片| 青春草国产在线视频 | 国产高潮美女av| 久久久久久大精品| 99热全是精品| 91精品一卡2卡3卡4卡| 亚洲精品自拍成人| 精品久久国产蜜桃| 一级黄片播放器| 久久久久免费精品人妻一区二区| 少妇人妻一区二区三区视频| 亚洲av第一区精品v没综合| 国产91av在线免费观看| 一个人看的www免费观看视频| 99热网站在线观看| 18禁裸乳无遮挡免费网站照片| 亚洲天堂国产精品一区在线| 夜夜看夜夜爽夜夜摸| 欧美精品国产亚洲| 亚洲成人久久爱视频| 国产精品人妻久久久久久| 国产午夜精品久久久久久一区二区三区| 日本爱情动作片www.在线观看| 别揉我奶头 嗯啊视频| 中文亚洲av片在线观看爽| 一个人免费在线观看电影| 联通29元200g的流量卡| 深夜精品福利| 午夜久久久久精精品| 日本色播在线视频| 成人性生交大片免费视频hd| 免费观看在线日韩| 18禁裸乳无遮挡免费网站照片| 日本熟妇午夜| 欧美性感艳星| 久久久久久久久中文| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 三级国产精品欧美在线观看| а√天堂www在线а√下载| 中文字幕制服av| 色哟哟哟哟哟哟| 国产黄色小视频在线观看| 欧美另类亚洲清纯唯美| 2021天堂中文幕一二区在线观| 在现免费观看毛片| 日本-黄色视频高清免费观看| 69av精品久久久久久| 日韩成人伦理影院| 激情 狠狠 欧美| 成人美女网站在线观看视频| 国产私拍福利视频在线观看| av黄色大香蕉| 99久久精品热视频| 别揉我奶头 嗯啊视频| 国产 一区精品| 欧美xxxx性猛交bbbb| 欧美三级亚洲精品| 能在线免费看毛片的网站| 日本熟妇午夜| 日本爱情动作片www.在线观看| 小蜜桃在线观看免费完整版高清| 亚洲国产欧洲综合997久久,| 男女那种视频在线观看| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 国产三级在线视频| 麻豆乱淫一区二区| 日韩欧美 国产精品| 亚洲精品国产av成人精品| 国产精品.久久久| 综合色丁香网| av在线亚洲专区| 成人特级av手机在线观看| 欧美一级a爱片免费观看看| 99热网站在线观看| 午夜久久久久精精品| 男人舔女人下体高潮全视频| 校园春色视频在线观看| 少妇被粗大猛烈的视频| 午夜精品国产一区二区电影 | 亚洲成人久久爱视频| 亚洲电影在线观看av| 少妇猛男粗大的猛烈进出视频 | 一本一本综合久久| 日本黄大片高清| 18禁在线无遮挡免费观看视频| 日韩,欧美,国产一区二区三区 | 免费看av在线观看网站| 免费看a级黄色片| 日韩 亚洲 欧美在线| 日本-黄色视频高清免费观看| 欧美xxxx黑人xx丫x性爽| 成人高潮视频无遮挡免费网站| 欧美性猛交╳xxx乱大交人| 看片在线看免费视频| 欧美精品国产亚洲| 久久久欧美国产精品| 菩萨蛮人人尽说江南好唐韦庄 | 精品久久久久久久久久免费视频| 国产精品,欧美在线| 亚洲国产精品久久男人天堂| 在线观看一区二区三区| 一卡2卡三卡四卡精品乱码亚洲| 国产真实伦视频高清在线观看| a级毛色黄片| 身体一侧抽搐| 国产人妻一区二区三区在| 亚洲电影在线观看av| 99riav亚洲国产免费| 在线观看66精品国产| 国产成人a∨麻豆精品| 亚洲欧美日韩东京热| 观看美女的网站| 91精品一卡2卡3卡4卡| 亚洲精品国产成人久久av| 国产激情偷乱视频一区二区| 成人特级av手机在线观看| 亚洲丝袜综合中文字幕| 国产精品日韩av在线免费观看| 美女cb高潮喷水在线观看| 国产精品国产高清国产av| 青春草亚洲视频在线观看| 中文字幕av在线有码专区| 麻豆国产97在线/欧美| 成人一区二区视频在线观看| 国产黄a三级三级三级人| 精品国内亚洲2022精品成人| 久久精品综合一区二区三区| 可以在线观看毛片的网站| 中文精品一卡2卡3卡4更新| 日本一本二区三区精品| 哪里可以看免费的av片| 国产精品野战在线观看| 国产一区二区三区在线臀色熟女| 国产伦一二天堂av在线观看| 国产高清有码在线观看视频| 国内精品一区二区在线观看| 亚洲高清免费不卡视频| 国产精品国产三级国产av玫瑰| 尤物成人国产欧美一区二区三区| 久久精品国产清高在天天线| 亚洲在线观看片| 亚洲av免费在线观看| 精品久久久久久成人av| 国产精品av视频在线免费观看| 国产精品久久电影中文字幕| 久久婷婷人人爽人人干人人爱| 99热这里只有精品一区| 亚洲美女视频黄频| av在线老鸭窝| 有码 亚洲区| 午夜视频国产福利| 美女xxoo啪啪120秒动态图| 亚洲性久久影院| 一个人免费在线观看电影| 两性午夜刺激爽爽歪歪视频在线观看| 色播亚洲综合网| 三级经典国产精品| 春色校园在线视频观看| 悠悠久久av| 精品人妻熟女av久视频| 神马国产精品三级电影在线观看| 一级av片app| 少妇丰满av| 国产v大片淫在线免费观看| 亚洲精品成人久久久久久| 欧美另类亚洲清纯唯美| 免费电影在线观看免费观看| 亚洲三级黄色毛片| 嫩草影院精品99| 国产成人一区二区在线| 99久久无色码亚洲精品果冻| 欧美区成人在线视频| 18禁裸乳无遮挡免费网站照片| 成年女人看的毛片在线观看| 最近2019中文字幕mv第一页| 亚洲乱码一区二区免费版| 成人二区视频| 亚洲欧洲国产日韩| 十八禁国产超污无遮挡网站| 成年女人永久免费观看视频| 亚洲,欧美,日韩| 一区二区三区四区激情视频 | 久久久久网色| 91午夜精品亚洲一区二区三区| a级毛色黄片| 免费观看a级毛片全部| 国产精品久久电影中文字幕| 久久久久久久久久黄片| a级一级毛片免费在线观看| 亚洲最大成人av| 欧美人与善性xxx| 欧美激情在线99| 成人亚洲欧美一区二区av| 免费观看的影片在线观看| 三级国产精品欧美在线观看| 韩国av在线不卡| 成人三级黄色视频| 欧美极品一区二区三区四区| 99热网站在线观看| 啦啦啦韩国在线观看视频| 亚洲国产欧美人成| 欧美高清成人免费视频www| 观看美女的网站| 免费无遮挡裸体视频| 国产精品久久视频播放| 悠悠久久av| 99热全是精品| avwww免费| 国产综合懂色| 国产成人福利小说| 18+在线观看网站| av在线天堂中文字幕| 国产精品不卡视频一区二区| 亚洲七黄色美女视频| 三级男女做爰猛烈吃奶摸视频| 男人的好看免费观看在线视频| 两个人的视频大全免费| 99热全是精品| 黄片wwwwww| 亚洲第一电影网av| 又粗又硬又长又爽又黄的视频 | 成人国产麻豆网| 欧美另类亚洲清纯唯美| 老师上课跳d突然被开到最大视频| 美女黄网站色视频| 亚洲人成网站在线观看播放| 一区二区三区四区激情视频 | 中文字幕精品亚洲无线码一区| 日韩欧美精品v在线| 别揉我奶头 嗯啊视频| 亚洲国产欧洲综合997久久,| 中国美白少妇内射xxxbb| 99国产精品一区二区蜜桃av| 成年女人看的毛片在线观看| 日本撒尿小便嘘嘘汇集6| 少妇丰满av| 国产在线精品亚洲第一网站| or卡值多少钱| 亚洲av二区三区四区| 老司机影院成人| av在线观看视频网站免费| 精品99又大又爽又粗少妇毛片| 99热只有精品国产| 日韩欧美在线乱码| 欧美成人a在线观看| 日本黄色视频三级网站网址| 非洲黑人性xxxx精品又粗又长| 精品久久久久久久久亚洲| 国产大屁股一区二区在线视频| 久久精品综合一区二区三区| 国产毛片a区久久久久| 午夜免费激情av| 亚洲精品自拍成人| 高清毛片免费看| 欧美精品国产亚洲| 亚洲性久久影院| 成人无遮挡网站| 欧美一区二区精品小视频在线| 婷婷色av中文字幕| 国产精品一及| 亚洲精华国产精华液的使用体验 | 男的添女的下面高潮视频| 国产单亲对白刺激| 久久久久久久久久黄片| 久久久久免费精品人妻一区二区| 午夜老司机福利剧场| 日韩人妻高清精品专区| 亚洲欧美精品综合久久99| 日韩欧美三级三区| 国产伦一二天堂av在线观看| 最近手机中文字幕大全| 人人妻人人澡欧美一区二区| 尤物成人国产欧美一区二区三区| 国产视频首页在线观看| 黄色日韩在线| 午夜激情欧美在线| 菩萨蛮人人尽说江南好唐韦庄 | 大香蕉久久网| 老司机影院成人| 少妇人妻一区二区三区视频| 日本一本二区三区精品| 观看美女的网站| 日本黄色视频三级网站网址| 久久精品久久久久久久性| 丰满的人妻完整版| 18+在线观看网站| 精品久久久久久久末码| 亚洲av中文av极速乱| 欧洲精品卡2卡3卡4卡5卡区| АⅤ资源中文在线天堂| 国产成人freesex在线| 男人的好看免费观看在线视频| 国产亚洲5aaaaa淫片| 又爽又黄a免费视频| 狂野欧美激情性xxxx在线观看| 黄色日韩在线| 韩国av在线不卡| 亚洲综合色惰| 日日摸夜夜添夜夜添av毛片| 美女cb高潮喷水在线观看| 久久人人精品亚洲av| av在线老鸭窝| 搡老妇女老女人老熟妇| 亚洲成人久久性| 欧美成人精品欧美一级黄| 99热网站在线观看| 亚洲无线观看免费| 亚洲va在线va天堂va国产| 国产三级在线视频| 精品久久久久久久久久免费视频| 搡老妇女老女人老熟妇| 国产女主播在线喷水免费视频网站 | 成人漫画全彩无遮挡| 三级男女做爰猛烈吃奶摸视频| 秋霞在线观看毛片| 免费电影在线观看免费观看| 国内精品久久久久精免费| 男女边吃奶边做爰视频| 在线播放无遮挡| 一个人免费在线观看电影| 不卡视频在线观看欧美| 91久久精品国产一区二区成人| 色综合色国产| 性色avwww在线观看| 日本-黄色视频高清免费观看| 亚洲四区av| ponron亚洲| 国产视频内射| 在线观看一区二区三区| 一本精品99久久精品77| 亚洲av成人av| 久久久久久久久中文| 免费观看人在逋| 久久久久久久久久久免费av| 欧美成人一区二区免费高清观看| 免费av不卡在线播放| 免费搜索国产男女视频| 一卡2卡三卡四卡精品乱码亚洲| 免费观看a级毛片全部| 日本在线视频免费播放| 亚洲av.av天堂| 男女那种视频在线观看| 亚洲精品粉嫩美女一区| 小蜜桃在线观看免费完整版高清| 美女xxoo啪啪120秒动态图| 九草在线视频观看| 日韩欧美精品免费久久| 日本黄大片高清| 一级黄片播放器| 精华霜和精华液先用哪个| 内地一区二区视频在线| 日韩欧美三级三区| 看片在线看免费视频| 一级毛片久久久久久久久女| 欧美不卡视频在线免费观看| 亚洲va在线va天堂va国产| 91久久精品电影网| 成年免费大片在线观看| 成人国产麻豆网| 天堂网av新在线| 我要看日韩黄色一级片| 国产精品国产高清国产av| 一本久久中文字幕| 97人妻精品一区二区三区麻豆| 国产探花在线观看一区二区| 亚洲婷婷狠狠爱综合网| 欧美日韩在线观看h| 国产色爽女视频免费观看| 一个人免费在线观看电影| 22中文网久久字幕| 老女人水多毛片| 两个人视频免费观看高清| 亚洲精品自拍成人| 久久久久久久亚洲中文字幕| 国产黄色小视频在线观看| 中文字幕av成人在线电影| 真实男女啪啪啪动态图| 日日干狠狠操夜夜爽| 亚洲av中文av极速乱| 国产日韩欧美在线精品| 天天躁日日操中文字幕| 亚洲精品自拍成人| 国产乱人偷精品视频| 日本av手机在线免费观看| ponron亚洲| 十八禁国产超污无遮挡网站| 免费搜索国产男女视频| 中文欧美无线码|