• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Unmanned aerial vehicle swarm mission reliability modeling and evaluation method oriented to systematic and networked mission

    2021-04-06 10:25:00LizhiWANGXujiaoZHAOYuanZHANGXiaohongWANGTilinMAXiaGAO
    CHINESE JOURNAL OF AERONAUTICS 2021年2期

    Lizhi WANG, Xujiao ZHAO, Yuan ZHANG, Xiaohong WANG,c,*,Tilin MA, Xia GAO

    a Unmanned System Institute, Beihang University, Beijing 100083, China

    b School of Reliability and Systems Engineering, Beihang University, Beijing 100083, China

    c Digital Twinning and System Engineering Research Center,Yunnan Innovation Institute,Beihang University,Beijing 650233,China

    d Key Laboratory of Advanced Technology of Intelligent Unmanned Flight System of Ministry of Industry and Information Technology, Beijing 100083, China

    e School of Astronautics, Beihang University, Beijing 100083, China

    KEYWORDS Complex networks;Connectivity;Mission reliability;Unmanned Aerial Vehicles(UAV);Vulnerability

    Abstract With the development of Unmanned Aerial Vehicle (UAV) system autonomy, network communication technology and group intelligence theory,mission execution in the form of a UAV swarm will be an important realization of future applications.Traditional single-UAV mission reliability modeling methods have been unable to meet the requirements of UAV swarm mission reliability modeling.Therefore,the UAV swarm mission reliability modeling and evaluation method is proposed. First, aimed at the interdependence among the multiple layers, a multi-layer network model of a UAV swarm is established.At the same time,based on the system having the following characteristics—using a mission chain to complete the mission and applying the connectivity of the mission network—the mission network model of a UAV swarm is established.Second,vulnerability and connectivity are selected as two indicators to reflect the reliability of the mission,and aimed at random attack and deliberate attack, vulnerability and connectivity evaluation methods are proposed.Finally,the validity and accuracy of the constructed model are verified through simulations,

    1. Introduction

    With the development of aviation technology, the types and mission types of Unmanned Aerial Vehicle (UAV) systems are becoming increasingly more diverse, showing a trend of rapid development and diffusion in various civilian and military fields,such as rescue,exploration,counter-terrorism,warfare, etc. Furthermore, UAV systems have the advantages of low casualty rate,low cost,low use restrictions,good concealment, and the ability to perform missions in harsh environments.1However, single UAV is often limited by factors such as its survivability and mission capability, and it is difficult to meet the needs of complex missions.Through the communication among UAVs, information sharing and collaborating to complete missions are important means of solving the above problems, which can enhance the elasticity and flexibility of the mission.2With the development of UAV system autonomy, network communication technology and group intelligence theory, mission execution in the form of a UAV swarm will be an important realization of future applications.3

    The UAV swarm is a technology that can simulate biological bee colony; it adopts the cooperative mode of multiple UAVs, and the information is shared among multiple UAVs through data networking. Thus, it can expand the perception of an environmental situation,and can complete missions such as collaborative mission assignment,4collaborative search,reconnaissance and attack. On the one hand,the UAV swarm performs the mission by distributing the mission’s various submissions and steps to a large number of communicable single UAVs with different loads, and then completing the mission systematically. Therefore, compared with other complex systems, the mission of the UAV swarm has the characteristics of vulnerability. On the other hand, the UAV swarm has certain redundancy and robustness,5,6and when it comes to multi-dimensional threats, complex environments and dynamically changing multiple collaborative missions, the success rate of the mission can be guaranteed even if some of the UAVs are lost. In view of the above characteristics, in order to make the success rate of the UAV swarm mission meet the requirements of complex missions and provide an accurate and effective quantitative basis for its design, mission planning,mission assignment,mission decision,maintenance guarantee,etc.,it is urgent to model the mission process of a UAV swarm and put forward a set of effective mission reliability indicators.

    At present, a significant amount of research has been carried out in the fields of multi-UAV cooperative mission7,8and target allocation optimization9,10, swarm flight formation and control,11track planning12and UAV swarm communication.13,14The studies on mission reliability of the UAV swarm are still rarity. Traditional modeling method of single UAV mission reliability can provide certain reference, a single UAV can usually be modeled by the methods such as reliability block diagram, Bayesian network,15,16Markov model, binary decision graph, the Petri-net method,17,18etc. However, the UAV swarm is not a simple combination of single UAVs, in the process of mission implementation, the UAV swarm will emerge some new characteristics, and these characteristics are difficult to be described by traditional mission reliability modeling methods. As a mission system, it has a multidimensional hierarchical structure, such as physical system layer, communication layer and mission layer,19and there are complex logical cross-linking relationships. At the same time,the organizational form is constantly evolving and reconstructing at any time and space, and the transmission form of failure and risk in the system and its impact on missions are also different from those in single-UAV systems.20–23

    In the field of UAV swarm reliability research, We19conducted an in-depth study that models the reliability method of UAV swarms by using complex network methods.Although the work is mainly focused on basic reliability and robustness characteristics,it can be used as the basis for UAV swarm reliability research. The UAV swarm system includes multiple UAV systems, payloads and a data communication network composed of multiple UAVs; at the same time, the network layers are not independent of each other, and there are dynamic interactions and related relationships. These characteristics are similar to critical infrastructure networks, so the current work on mission reliability in the field of infrastructure can provide some theoretical support for the research on mission reliability modeling of UAV swarms. Based on the complex network method, certain results about mission reliability have been proved effective in the field of critical infrastructure such as power grid,24traffic network,25and communication network.Thacker et al.26abstracted key urban infrastructures such as natural gas networks, transportation networks, power grids and water supply networks into multi-level complex network models to analyze network fault propagation and then to evaluate network reliability. Chen27applied a scale-free network model to model a power grid and analyzed its vulnerability. Aldrich et al.28and Xu and Sui29used the small world network model to characterize transportation networks.However, the UAV swarm is different from infrastructure such as transportation networks. For example, a UAV swarm is a multi-dimensional space operation and dynamic reconfiguration system, and the way a mission executes in complex networks is different from an infrastructure system, so the existing mission reliability modeling methods cannot be utilized directly.

    Therefore, based on the existing theoretical methods and research foundations, aimed at the characteristics of UAV swarm mission operation,this paper uses the complex network method to model the UAV swarm mission process and proposes a set of effective mission reliability indicators. In this way, this study provides quantitative reference for UAVswarm-related decision-making work, and supports the development of UAV-swarm-related work.

    The rest of this paper is organized as follows: In Section 2,the mission characteristics of UAV swarm are analyzed, and based on the complex network method, the mission network is modeled based on connectivity and the interlayer relationship is modeled based on interlayer dependencies.In Section 3,aimed at random attack and deliberate attack,according to the mission characteristics of a UAV swarm, vulnerability and connectivity are selected to evaluate the mission reliability of a UAV-swarm mission network.In Section 4,the effectiveness of the method is illustrated by a case study.In Section 5,some conclusions and planned future work are given.

    2. Modeling UAV swarm system

    2.1. Mission characteristics of UAV swarm

    The UAV swarm system refers to a complex system in which multiple UAVs cooperate, and UAVs share information through data networking, so it can expand the perception of environmental situation and cooperate to accomplish missions such as mission allocation,cooperative search, reconnaissance and attack30. In general, the basic components of the UAV swarm system include vehicles, payloads and communication datalinks,31and its composition is shown in Fig. 1.

    The UAV swarm is usually in motion, and the distance between vehicles in the UAV swarm is constantly changing;however, in order to facilitate the control of the swarm or to complete specific missions, a UAV swarm will be in a certain structure.In general,its structure is related to the control strategy, and we chose three structures of a UAV swarm based on three types of control algorithms, namely a control structure based on the behavior-based method (Structure 1), on leader–follower strategy (Structure 2) and on autonomous control (Structure 3).19

    Complex network has the good model description ability,32,33and in order to study the complex interaction and dynamic relationship in the UAV swarm system,the compositions of the UAV swarm system are mapped to the nodes of a multi-layer complex network.First,the UAV swarm system is divided into three layers according to its system composition and function, which are UAV swarm communication layer,structural layer and mission layer. The three layers of the network correspond to the communication datalink, vehicle and payload of the UAV swarm.In the network,both the communication layer and the mission layer nodes are based on the nodes in the UAV structure network.

    If H is used to denote edges between the UAV swarm layers,then H = { Hi} (i = 1,2,...,n),where n is used to denote the number of nodes in each layer, and H mainly refers to the connection between the structural layer node and the communication layer node, the structural layer node and the mission layer node. The structure diagram of the established UAV swarming network is shown in Fig. 2. The standardized description of the network is shown in Table 1.

    It can be seen that: (A) there is a bidirectional connection between layers,for example,the layer Gadepends on the layer Gbthrough some connections, and the layer Gbalso depends on the layer Gathrough these same connections or other connections. The three layers of networks are interconnected and interdependent, and they form a system. The mission network is affected by the multi-layer network nodes, and each layer has an impact on it;therefore,the mission of the UAV swarm is characterized by its vulnerability.(B)Since the UAV swarm completes the mission in one system, the related payloads are distributed on different single UAVs, and the missions represented by the mission network can be divided into different types of sub-missions according to the order of execution of the missions; different sub-missions correspond to different payloads. As shown in Fig. 3, the connection order of submissions is Sub-mission 1 →Sub-mission 2 →Sub-mission 3 →Sub-mission 4 →Sub-mission 5, if each type of payload exists in the mission network, and they are connected in the specified order,as indicated by the red dotted line(this connection is called the mission chain).As long as the mission chain is connected, the mission network is connected, and the mission network has the ability to complete missions. Therefore, the mission network has the characteristics of connectivity. At the same time, the payload in the mission network is redundant,and the mission network is robust.Therefore,the swarm system can still guarantee the ability to complete the mission even if it is attacked during the mission.19

    By considering the above characteristics of the UAV swarm mission process, the algorithm that models the mission network by considering connectivity is introduced in Section 2.2.Based on this, a modeling algorithm that considers inter-level dependencies is introduced in Section 2.3.

    Fig. 1 Schematic diagram of composition of UAV swarm system.

    Fig. 2 Schematic diagram of interdependence among three layers of network of UAV swarm.

    2.2. Modeling mission network by considering connectivity

    According to the connectivity characteristics of the mission network,the model of the UAV swarm mission network is carried out as follows:

    (1) Initialization.The mission network consists of payloads.According to the complex network theory, the mission payload is mapped to the nodes of the swarm mission network. Determine the number of nodes and location distribution of the mission network according to the system load configuration and mission order.Suppose that n nodes are generated for the mission network,the number of mission payload types is m, and the number of nodes under each payload is ni(i=1,2,...,m), where n1+n2+···+nm=n.

    (2) Connection.

    (A) Specify the connection order of different kinds of payloads. If it is assumed that there are four payloads (A, B, C, D) in the mission network, the connection order is specified as A →B →C →D.

    (B) Only the two adjacent nodes in the specified connection order can be connected, that is, only the payloads between A, B, C, D are connected to each other.

    Fig. 4 Schematic diagram of payload topology relationship.

    Fig. 5 Modeling algorithm for mission layer.

    (C) Different kinds of payloads are connected according to the free combination algorithm, that is, if the number of payloads corresponding to the four payloads are n1, n2, n3, n4,respectively,there are a total of n1n2n3n4connection methods.

    (D) When connecting, there can be no repeated edge between the two nodes, and there can be no selfloop.

    (E) The topology structure of the payload relationship in the mission network is shown in Fig. 4.

    (3) Weight. The edges in the mission layer have no specific weight,and the weights can be randomly assigned within a certain range to simulate the dynamic changes of the network.

    (4) Ending. When all nodes, edges, and weights in the network are generated, the constructed network is output.

    When different kinds of payloads are connected in a prescribed order to form a mission chain (i.e.,A →B →C →D,as shown in Fig.4 red chain),and any payload on the mission chain is destroyed,indicating that the connectivity of the mission chain is destroyed, then the mission chain cannot complete the specified missions. Regardless of its multiple states (i.e., only good and bad states), when there is no complete mission chain in the mission network, the mission network fails.

    The pseudo code for the process is shown in Fig. 5.

    2.3. Inter-level modeling considering dependencies

    The three-layer network of the UAV swarm is interconnected and interdependent.The mission network is a network affected by the multi-layer network nodes, and each layer has an impact on it. There are two interdependent relationships.One is the communication node and the mission node attached to the structure point.When the structure node is removed,the communication node and the mission node connected to it are also removed correspondingly.The process is shown in Fig.6.The other depends on the mission node of the communication node. When the communication node fails, the mission node will be disabled, and the network mission layer node will be removed accordingly. The process is shown in Fig. 7.

    According to the interdependence characteristics of the three-layer network,the modeling of the interlayer relationship is carried out. Specifically, the interlayer relationships can be described as follows:

    (1) The node Vaiof the communication network is connected to the node Vbiof the structural network in one-to-one correspondence.

    (2) The node Vbiin the structural network arbitrarily chooses a connection to the unselected nodes Vci, Vcj,... in the mission network.

    Fig. 6 Schematic diagram of interdependence 1.

    Fig. 7 Schematic diagram of interdependence 2.

    Fig. 8 Modeling algorithm for interlayer relationship.

    (3) When connecting, there can be no repeated edge between the two nodes, and there can be no self-loop.Based on the above description, a multi-level, differentiated,and interrelated UAV swarming network model is established. The pseudo code for the process is shown in Fig. 8.

    These algorithms are modular and scalable,since the UAV swarm system can change or reconstruct as necessary based on the mission or modeling objectives. Moreover, they can be guidelines for modeling a UAV swarming network with programming or other computer tools.

    3. Evaluating mission reliability

    The architecture of the UAV swarm has a mission-oriented feature, that is, its strategy and architecture are formed and developed according to missions. To ensure the mission completion rate,and to ensure that the UAV swarm has high mission reliability, reasonable indicators for evaluating mission reliability need to be put forward. This paper focuses on the impact of topology and attack strategies on the reliability of complex networks.

    3.1. Topological properties of complex networks

    3.2. Mission reliability indicator

    For a complex network of the UAV swarm, a single UAV crash has little effect on the entire UAV swarm and can be corrected by mission reconstruction; therefore, from the perspective of mission completion,it is not the focus of attention.The focus is on how many UAVs crash and how that will affect mission completion; that is, we need to pay attention to the reliability of the system mission. The reliability of the mission refers to the possibility of completing the mission as required.Based on the analysis of the mission characteristics of the UAV swarm in Section 2.1,we select vulnerability and connectivity as two indicators to reflect the reliability of the mission.

    (1) Vulnerability. Vulnerability refers to whether a system can easily lose its ability to accomplish a specified mission due to external factors.35It has been studied in infrastructure systems such as power systems,36water resources systems,37and grid systems.38For the UAV swarm system, it is very sensitive to external influence,and small fluctuations sometimes can have a marked impact on the system, which makes the whole system lose the ability to complete the specified mission. This is an important feature of the UAV swarm system.Therefore, according to the definition of vulnerability,the vulnerability is chosen as the indicator of the UAV swarm’s mission reliability.

    (2) Connectivity. Connectivity is an important indicator of network performance and determines the quality of the entire network. The UAV swarm mission network can complete missions only if each type of payload exists and they are connected in the specified order, different types of payload form a complete mission chain, and missions are accomplished in the form of chains. Due to redundancy, there are multiple mission chains in the network.And the greater the number of connected mission chains, the higher the success rate of the mission.Therefore, the connectivity of the mission network can be characterized by the change in the number of mission chains and the connectivity is chosen as the indicator of the UAV swarm’s mission reliability.

    3.3. Evaluation methods and evaluation strategies

    When evaluating the impact of an attack strategy on the reliability of a complex network, the attack strategy is usually classified into a random attack and a deliberate attack.A random attack is a complete random removal of a certain percentage of nodes from the network; deliberate attacks are the removal of a certain percentage of nodes39,40in a defined order(for example, by the number of connected nodes). The completely random removal method can be mainly related to the random failure of the nodes in the network system in the UAV swarm system. The node removal method according to the importance degree of the node is suitable to reflect the deliberate external attack of the nodes in the UAV swarming network.

    3.3.1. Vulnerability

    Vulnerability of the mission network is the ability to complete the specified missions when the mission network is attacked.Seepage theory is commonly used to study the situation of complex networks being attacked. Generally, the attack strategy is divided into two methods: node attack and edge attack.The seepage model is a model abstracted from many practical problems41and uses graph theory and phase transition theory to analyze changes in complex network structures.42,43For a network,seepage usually includes both point and side seepage.Point seepage refers to removing a certain proportion of vertices and edges connected to these vertices in a certain way in the network.Side seepage refers to the removal of a portion of the edge in a certain way in the network.Both types can be described by a parameter (occupation probability p): p represents the probability that a vertex or edge still exists.44

    As the number of deleted points or edges increases,the network changes from a connected state (functional state) to a non-connected state (non-functional state), and the connectivity of the network changes. For a point seepage or edge seepage of a given network45(see Fig. 9), when the occupancy probability p becomes larger than zero, the largest subgroup of the network will appear at a certain critical probability value Pc. Its proportion in the entire network will continue to grow with the growth of occupation probability. This critical value Pccan be obtained by theoretical calculation of seepage theory or computer simulation.

    The size of Pccan be used as an indicator to measure the vulnerability of the original network to an attack or failure.The smaller the value of Pc, the more vertices (or edges) need to be removed to make the largest subgroup disappear, which can resist a large number of node failures without crashing,indicating that the network is not vulnerable.For random networks and scale-free networks,Pchas different performance in the face of random attacks and deliberate attacks.40

    (1) For random attacks

    The seepage threshold of the network is

    Fig. 9 Schematic diagram of network seepage.

    The random ER network degree distribution obeys the Poisson distribution, so we can obtain

    As can be seen from the above formula,

    Fig. 10 Vulnerability evaluation flowchart.

    (A) When γ>3, the ratio k0is limited,

    (B) When γ<3,the ratio k0diverges with K.When K →∞or N →∞, Pc→0; when the network size is limited(N ?∞), the phase change value k0≈K1/2≈N1/3can always be observed.

    (2) For deliberate attacks

    In a homogeneous network,such as an ER network,the degree of difference between a node with a higher degree and a node that is randomly selected is not very large.Therefore,although the thresholds are different, there is no significant difference between the deliberate attack process and the random attack process in the random network.

    However, in scale-free networks, deliberate attacks cause more severe damage than random attacks, and seepage phase transitions (for limited Pc) occur for all γ>2. As γ increases,Pcdecreases. When γ>2, the decrease of Pccauses only a few nodes to have a large degree,and their removal will affect the entire network. Note that for an infinite system, when γ →2, Pc→0 (see Fig. 10).

    3.3.2. Connectivity

    According to the network built in Section 2, when the UAV swarm is subjected to random attacks or deliberate attacks,as shown in Fig.11,the corresponding payload fails,the number of payloads in the mission network changes,and the number of mission chains changes. Correspondingly, the connectivity of the mission network is reduced. Therefore,the connectivity of the mission network can be characterized by the change in the number of mission chains and used as an indicator to measure the reliability of the mission network.

    The process is as follows:

    (1) In the initial state,it is assumed that the number of payloads of each type is ni(i=1,2,...,n),and the number of initial total mission chains is M =n1n2···nnaccording to the principle of free combination.

    Fig. 11 Mission network connectivity changes.

    Fig. 12 Connectivity evaluation flowchart.

    4. Case study

    To illustrate the network modeling process of a UAV swarm system, a case study with the characteristics described in Section 2 is presented. Python NetworkX is used to program the modeling algorithm to present the network structure and conduct further analysis of the statistical feature of the network. Note that the network is built through the properties of the UAV swarm system and three types of control structure,so it can be applied in many mission scenarios. However, the validity of a modeling network using complex-network theory is unknown.Therefore,in Section 4.2,the statistical characteristics of the proposed network are compared with real-world networks to test its validity.

    4.1. Model description

    Suppose a UAV swarm system consisting of 55 small UAVs in which each UAV carries two payloads to execute a certain mission and there are five types of loads in the mission network.Based on the description in Section 2, three scenarios corresponding to the three structures are considered. The nodes of the communication layer, the structure layer, and the mission layer in these complex networks are expressed as blue, red,and yellow dots, respectively. The black lines in Fig. 13 represent the edges.

    The network for the control structure of behavior-based methods is depicted in Fig. 13(a). In this structure, the topology of the UAV swarm system is set to be a classic pigeon flock with one ‘‘leader”.

    For Structure 2,suppose there are five leaders and each one has eleven followers in the UAV swarm system.The entire network of Structure 2 is shown in Fig. 13(b).

    For Structure 3, let each vehicle connected to four to five adjacent ones consist of a swarm system with random topology. The network of Structure 3 can be seen in Fig. 13(c).

    Among them, the complex network model of the mission network is shown in Fig. 13(d).

    4.2. Topology analysis

    We obtain the indicator values, such as the degree of the network mode, the clustering coefficient, and network efficiency through a topology analysis of the three kinds of UAV mission networks to determine whether the network has any scale characteristics.

    To identify the features of scale-free networks, the degree distribution of nodes is estimated to check whether it follows a power-law distribution, i.e.,

    where P(k) denotes the proportion of nodes with a node degree of k, c is the coefficient, and λ is the power-law value.

    The distribution of degree is calculated with Eq. (10) and then we use a linear fitting method to fit these data and depict their logarithmic relationship. The results are illustrated in Fig. 14. Based on the results and from the perspective of a complex network, the node distributions of all of the three structures generally conform to a power-law decay function with R2greater than 0.8. Thus, the UAV swarming networks have the topological properties of the scale-free network.One can know from the characteristic of the scale-free network that this network may be highly resistant to random attacks and be quite sensitive to a targeted attacky.46

    4.3. Mission reliability evaluation

    According to the seepage theory, the reliability analysis of the mission network of the UAV swarm is carried out.For the two attack strategies of random attack and deliberate attack, vulnerability indicators and connectivity indicators reflecting mission reliability are analyzed separately.

    Fig. 13 Network of UAV swarm system.

    Fig. 14 Cumulative distribution of degree of Structure1, Structure 2 and Structure 3.

    4.3.1. Vulnerability

    According to the analysis in Section 4.2, the mission network satisfies the scale-free characteristics,and the ER network theory Pcis

    where k〈 〉 is the average node degree.

    To express more intuitively the changes in the UAV swarm mission network as the node attacks,normalizing the data can still highlight the essential meaning of physical quantities.

    According to the seepage theory, the random attack and deliberate attack of the mission network of the UAV swarm are simulated,and the vulnerability change of the mission network is observed. For random attacks, see Fig. 15(a). For deliberate attacks, see Fig. 15(b).

    It can be seen that as the number of nodes being attacked increases, the mission network becomes more and more vulnerable. For random attacks, nodes are randomly removed until all nodes in the mission layer are removed, and the vulnerability after removing the nodes is calculated. When the attacked node is controlled within 100 nodes, the network is relatively stable. Once it exceeds 100 nodes, the vulnerability of mission network increases sharply and the corresponding P value decreases sharply. For deliberate attacks, nodes are removed in order according to the node degree until all nodes in the mission layer are removed, and the vulnerability after removing nodes is calculated. When the attacked node is controlled within 80 nodes,the network is relatively stable.Once it exceeds 80 nodes, the vulnerability of mission network increases sharply and the corresponding P value decreases sharply.It can be seen that the constructed mission network is more resistant to random attacks and less resistant to deliberate attacks. This is also a good proof that the scale-free network is highly resistant to random damage, but it is very vulnerable to deliberate attacks,which verifies the effectiveness of the model.

    Fig. 15 Vulnerability with random and deliberate attacks.

    4.3.2. Connectivity

    Taking the autonomous control structure as an example, the mission network is composed of five types of mission payloads,and each of the same types has 22 identical payloads. By analyzing the information in Section 3.3, it can be concluded that

    Therefore, the total number of mission chains in the initial state is

    By using seepage theory, the random attack and deliberate attack of the mission network of the UAV swarm are simulated, and the connectivity change of the mission network is observed. For random attacks, see Fig. 16(a). For deliberate attacks, see Fig. 16(b).

    Fig. 16 Connectivity with random and deliberate attacks.

    It can be seen that as the number of nodes being attacked increases, the connectivity of the mission network becomes worse and worse. As the number of nodes decreases, the connectivity change of random attacks remains relatively flat with respect to deliberate attacks. For random attacks, the nodes are randomly removed until all nodes in the mission layer are removed, and the connectivity is then calculated. When the attacked node reaches 60, the connectivity of the mission network is reduced to zero;that is,the mission network cannot complete the specified mission. For deliberate attacks, nodes are removed in order according to the node degree until all nodes in the mission layer are removed, and the connectivity is then calculated. When the attack node reaches 40, the connectivity of the mission network is reduced to zero, that is,the mission network cannot complete the specified mission.

    5. Conclusions and future work

    The UAV swarm performs the mission by distributing the mission’s various sub-missions and steps to a large number of communicable single UAVs with different loads, and then completing the mission systematically. Mission reliability assessment is very important and challenging. Traditional single-UAV mission reliability modeling methods have been unable to meet the requirements of UAV swarm mission reliability modeling. Therefore, the research of mission reliability modeling and evaluation method for UAV swarms is conducted.

    (1) We combine complex network theory with a UAV swarm system, aiming at the interdependence among the communication layer, the structure layer and the mission layer of the UAV swarm,and a multi-layer network model of UAV swarm is established. Three structures of a UAV swarm based on three types of control algorithms are presented, namely a control structure based on the behavior-based method (Structure 1), on leader–follower strategy (Structure 2) and on autonomous control (Structure 3). At the same time, based on the system having the following characteristics—using a mission chain to complete the missions and applying the connectivity of the mission network—the mission network model of the UAV swarm is established.

    (2) According to the interdependent and interconnected mission characteristics of the UAV swarm,vulnerability and connectivity are selected as two indicators to reflect the reliability of the mission. Based on seepage theory,the mission network of UAV swarm is analyzed, and aimed at random attack and deliberate attack, vulnerability and connectivity evaluation methods are proposed.

    (3) The typical control structure of the UAV swarm is analyzed through a case study. The static and dynamic topology analysis of the mission network is carried out.The static analysis shows that the UAV swarm network meets the scale-free characteristics, and the accuracy and effectiveness of the model are verified. At the same time, dynamic analysis shows that the established UAV swarming network can provide a theoretical basis for further analysis of the network(such as vulnerability or connectivity). The UAV swarm system can meet the requirements of complex missions, providing an accurate and effective quantitative basis for their design,mission planning, mission assignment, mission decision,maintenance support, and other aspects, and can support the development of the UAV swarm-related work.

    In the future,real data of the UAV swarm will be collected to verify the proposed method, the weight of the mission network will be given,and more indicators to evaluate the mission reliability of UAV swarm will be proposed. Therefore, it will provide guidance for decision-making of UAV swarms.

    Acknowledgements

    This study was co-supported by the Fundamental Research Funds for the Central Universities, China (No. YWF-19-BJJ-340) and Field Foundation of China (No.JZX7Y20190242012001).

    黄色片一级片一级黄色片| 久久久精品国产亚洲av高清涩受| 国产在线精品亚洲第一网站| 少妇 在线观看| 搡老岳熟女国产| 亚洲精品美女久久久久99蜜臀| 久久久久久久精品吃奶| 两人在一起打扑克的视频| 91老司机精品| 757午夜福利合集在线观看| 99国产极品粉嫩在线观看| 亚洲第一青青草原| 欧美激情高清一区二区三区| 欧美精品一区二区大全| 麻豆av在线久日| 日韩大码丰满熟妇| 中亚洲国语对白在线视频| 国产福利在线免费观看视频| av超薄肉色丝袜交足视频| 在线观看免费日韩欧美大片| 亚洲人成电影免费在线| 99热网站在线观看| 国产成人啪精品午夜网站| 国产成人av激情在线播放| 一区二区三区国产精品乱码| 亚洲av成人一区二区三| 精品福利观看| 成人av一区二区三区在线看| 波多野结衣av一区二区av| 国产不卡av网站在线观看| 久久人妻福利社区极品人妻图片| 麻豆av在线久日| 51午夜福利影视在线观看| 成人永久免费在线观看视频 | 欧美人与性动交α欧美软件| 免费在线观看影片大全网站| 亚洲精品在线观看二区| 十八禁网站网址无遮挡| 久久精品成人免费网站| 国产熟女午夜一区二区三区| 伦理电影免费视频| 日日爽夜夜爽网站| 亚洲欧美精品综合一区二区三区| 免费黄频网站在线观看国产| 欧美老熟妇乱子伦牲交| 久久国产精品大桥未久av| 国产精品成人在线| 成人18禁在线播放| 亚洲国产欧美网| 国产精品98久久久久久宅男小说| 新久久久久国产一级毛片| 中文字幕人妻丝袜一区二区| 国产黄色免费在线视频| 十分钟在线观看高清视频www| 亚洲成人手机| 悠悠久久av| 另类亚洲欧美激情| 国产一区二区激情短视频| 亚洲人成电影观看| 久久久久久亚洲精品国产蜜桃av| 亚洲国产欧美在线一区| av一本久久久久| 一本大道久久a久久精品| 好男人电影高清在线观看| 日韩欧美一区二区三区在线观看 | 啦啦啦免费观看视频1| 欧美午夜高清在线| 国产精品九九99| 亚洲av欧美aⅴ国产| 一本—道久久a久久精品蜜桃钙片| 我的亚洲天堂| 777久久人妻少妇嫩草av网站| 欧美亚洲日本最大视频资源| 国产精品久久久人人做人人爽| 日韩欧美免费精品| 丝袜人妻中文字幕| 日韩人妻精品一区2区三区| 国产成人精品无人区| 成人手机av| 十分钟在线观看高清视频www| 制服人妻中文乱码| 午夜91福利影院| 亚洲三区欧美一区| 丁香六月天网| 99re6热这里在线精品视频| 精品国产一区二区三区久久久樱花| 久久久久国内视频| 99久久国产精品久久久| 午夜久久久在线观看| 欧美人与性动交α欧美软件| kizo精华| 欧美日韩一级在线毛片| 一区二区三区国产精品乱码| 亚洲第一av免费看| 汤姆久久久久久久影院中文字幕| 亚洲精品乱久久久久久| 亚洲专区字幕在线| 欧美变态另类bdsm刘玥| 99香蕉大伊视频| 成人精品一区二区免费| 亚洲第一av免费看| 大香蕉久久成人网| 在线观看舔阴道视频| 亚洲美女黄片视频| 纵有疾风起免费观看全集完整版| 久久久久久久久免费视频了| 男女午夜视频在线观看| 色精品久久人妻99蜜桃| 日日摸夜夜添夜夜添小说| av线在线观看网站| 欧美激情高清一区二区三区| 欧美中文综合在线视频| 午夜精品国产一区二区电影| 中文字幕另类日韩欧美亚洲嫩草| 亚洲avbb在线观看| 丰满饥渴人妻一区二区三| 天堂动漫精品| 欧美黄色淫秽网站| 女同久久另类99精品国产91| 五月开心婷婷网| 国产97色在线日韩免费| 国产精品亚洲一级av第二区| 美女高潮到喷水免费观看| 99久久精品国产亚洲精品| 亚洲自偷自拍图片 自拍| 国产淫语在线视频| 后天国语完整版免费观看| 精品高清国产在线一区| 亚洲第一av免费看| 国产精品成人在线| 亚洲午夜理论影院| 日韩 欧美 亚洲 中文字幕| 国产黄色免费在线视频| 亚洲午夜理论影院| 亚洲视频免费观看视频| 夜夜夜夜夜久久久久| 在线观看免费高清a一片| 极品少妇高潮喷水抽搐| 夜夜爽天天搞| av国产精品久久久久影院| 国产在线一区二区三区精| 久久人妻熟女aⅴ| www.熟女人妻精品国产| 飞空精品影院首页| 69av精品久久久久久 | 大香蕉久久网| 成人三级做爰电影| 欧美 日韩 精品 国产| 免费高清在线观看日韩| 中文字幕最新亚洲高清| 国产野战对白在线观看| 欧美成狂野欧美在线观看| 在线观看免费高清a一片| 在线观看一区二区三区激情| 久久午夜亚洲精品久久| 日日摸夜夜添夜夜添小说| 999久久久精品免费观看国产| 亚洲va日本ⅴa欧美va伊人久久| 无人区码免费观看不卡 | 女人爽到高潮嗷嗷叫在线视频| 热re99久久精品国产66热6| 精品国产超薄肉色丝袜足j| 午夜福利视频在线观看免费| 99国产精品免费福利视频| 男女下面插进去视频免费观看| 日本撒尿小便嘘嘘汇集6| 真人做人爱边吃奶动态| 亚洲国产欧美日韩在线播放| 欧美激情 高清一区二区三区| 大型av网站在线播放| 热99re8久久精品国产| 亚洲精品av麻豆狂野| 国产亚洲一区二区精品| 日韩欧美一区视频在线观看| 亚洲av第一区精品v没综合| 日韩大片免费观看网站| 免费在线观看视频国产中文字幕亚洲| 男人舔女人的私密视频| www.999成人在线观看| 日本vs欧美在线观看视频| 水蜜桃什么品种好| 日韩视频一区二区在线观看| 青青草视频在线视频观看| 97在线人人人人妻| 欧美成狂野欧美在线观看| 91九色精品人成在线观看| 一区二区日韩欧美中文字幕| 日本vs欧美在线观看视频| 国产精品1区2区在线观看. | 18禁美女被吸乳视频| 国产男女内射视频| av线在线观看网站| 香蕉国产在线看| 丰满少妇做爰视频| 99在线人妻在线中文字幕 | 欧美国产精品va在线观看不卡| 国产免费av片在线观看野外av| 视频区图区小说| 亚洲一区中文字幕在线| 成在线人永久免费视频| 午夜免费鲁丝| 两个人免费观看高清视频| 99热国产这里只有精品6| 老熟妇乱子伦视频在线观看| 人人妻人人澡人人爽人人夜夜| www.精华液| 91字幕亚洲| 久久99一区二区三区| 国产成人av激情在线播放| 国产精品麻豆人妻色哟哟久久| 欧美精品一区二区免费开放| 曰老女人黄片| 99国产综合亚洲精品| 国产高清videossex| 自线自在国产av| 色精品久久人妻99蜜桃| 丝袜美足系列| 中文字幕人妻丝袜一区二区| 久久久精品94久久精品| 国产成人系列免费观看| 一进一出抽搐动态| 超碰97精品在线观看| 一夜夜www| 久久人妻av系列| 精品亚洲成a人片在线观看| 日韩大码丰满熟妇| 曰老女人黄片| 狠狠婷婷综合久久久久久88av| 久久久久久久久免费视频了| 人妻 亚洲 视频| 亚洲伊人久久精品综合| 国产日韩欧美视频二区| 69av精品久久久久久 | 国产成人精品久久二区二区91| 国精品久久久久久国模美| h视频一区二区三区| 热99re8久久精品国产| 亚洲欧美日韩另类电影网站| 叶爱在线成人免费视频播放| 久久99热这里只频精品6学生| 日韩 欧美 亚洲 中文字幕| 欧美乱妇无乱码| 真人做人爱边吃奶动态| 国产成人系列免费观看| 这个男人来自地球电影免费观看| 国产av国产精品国产| 女人高潮潮喷娇喘18禁视频| 国产伦人伦偷精品视频| 国产成人啪精品午夜网站| 曰老女人黄片| 亚洲成av片中文字幕在线观看| 国产国语露脸激情在线看| 久久精品亚洲精品国产色婷小说| 国产免费av片在线观看野外av| 香蕉国产在线看| 国产极品粉嫩免费观看在线| 免费在线观看视频国产中文字幕亚洲| 亚洲视频免费观看视频| 在线观看免费午夜福利视频| 午夜福利影视在线免费观看| 人人妻,人人澡人人爽秒播| 久久人妻福利社区极品人妻图片| 国产男女内射视频| 99国产精品99久久久久| 丝瓜视频免费看黄片| 精品久久久久久久毛片微露脸| 亚洲人成伊人成综合网2020| 咕卡用的链子| 日韩 欧美 亚洲 中文字幕| 久久精品亚洲av国产电影网| 一级毛片精品| 亚洲精品在线观看二区| 国产成人精品久久二区二区91| 在线播放国产精品三级| 999久久久精品免费观看国产| 女人久久www免费人成看片| 日本撒尿小便嘘嘘汇集6| 亚洲色图av天堂| 91精品三级在线观看| 久久这里只有精品19| www日本在线高清视频| 日韩欧美三级三区| 在线观看免费午夜福利视频| 999精品在线视频| 日韩人妻精品一区2区三区| 日韩免费高清中文字幕av| 捣出白浆h1v1| 最新美女视频免费是黄的| 久久久国产欧美日韩av| 热99re8久久精品国产| 国产无遮挡羞羞视频在线观看| 交换朋友夫妻互换小说| 一边摸一边抽搐一进一出视频| 免费高清在线观看日韩| xxxhd国产人妻xxx| 老汉色av国产亚洲站长工具| 久久久久久久久免费视频了| 免费在线观看完整版高清| 欧美中文综合在线视频| 成年动漫av网址| 久久久久久亚洲精品国产蜜桃av| 新久久久久国产一级毛片| 久久久国产成人免费| 中文亚洲av片在线观看爽 | 欧美另类亚洲清纯唯美| 精品视频人人做人人爽| 欧美日韩亚洲国产一区二区在线观看 | 亚洲美女黄片视频| 亚洲av日韩精品久久久久久密| 欧美亚洲 丝袜 人妻 在线| 国产单亲对白刺激| 精品国产乱子伦一区二区三区| 亚洲va日本ⅴa欧美va伊人久久| 精品一区二区三区视频在线观看免费 | 少妇裸体淫交视频免费看高清 | 热99re8久久精品国产| 午夜日韩欧美国产| av线在线观看网站| 亚洲黑人精品在线| 成人18禁在线播放| 三上悠亚av全集在线观看| 极品教师在线免费播放| 高清在线国产一区| 国产高清视频在线播放一区| 日韩熟女老妇一区二区性免费视频| 无人区码免费观看不卡 | 国产一区二区三区综合在线观看| 一区二区三区精品91| 黑人欧美特级aaaaaa片| 飞空精品影院首页| 亚洲视频免费观看视频| 一边摸一边抽搐一进一小说 | 久久这里只有精品19| 欧美日韩国产mv在线观看视频| 悠悠久久av| 亚洲成人国产一区在线观看| 这个男人来自地球电影免费观看| 中文字幕色久视频| 在线 av 中文字幕| 免费看a级黄色片| 国产精品自产拍在线观看55亚洲 | 精品熟女少妇八av免费久了| 丰满迷人的少妇在线观看| 亚洲熟女毛片儿| 欧美变态另类bdsm刘玥| 后天国语完整版免费观看| 夜夜骑夜夜射夜夜干| 国产精品国产av在线观看| 美女主播在线视频| 亚洲精品一卡2卡三卡4卡5卡| 啦啦啦 在线观看视频| 91麻豆av在线| 亚洲精品国产区一区二| 亚洲一码二码三码区别大吗| av天堂久久9| 日本五十路高清| 亚洲av国产av综合av卡| 一本大道久久a久久精品| 啦啦啦 在线观看视频| av网站在线播放免费| 老汉色∧v一级毛片| 国产精品一区二区在线观看99| 国产精品秋霞免费鲁丝片| 搡老熟女国产l中国老女人| 一进一出好大好爽视频| 一进一出抽搐动态| 亚洲欧美一区二区三区久久| 国产免费av片在线观看野外av| 超色免费av| 欧美日韩国产mv在线观看视频| 在线观看人妻少妇| 少妇猛男粗大的猛烈进出视频| 999久久久国产精品视频| 国产在线视频一区二区| 免费不卡黄色视频| 午夜成年电影在线免费观看| 国产精品一区二区精品视频观看| 日韩欧美一区二区三区在线观看 | 精品少妇一区二区三区视频日本电影| 搡老岳熟女国产| 国产福利在线免费观看视频| 一本—道久久a久久精品蜜桃钙片| 变态另类成人亚洲欧美熟女 | 午夜福利乱码中文字幕| 欧美日韩亚洲综合一区二区三区_| 视频区图区小说| 大片免费播放器 马上看| 十八禁高潮呻吟视频| 岛国毛片在线播放| 成人黄色视频免费在线看| 两个人看的免费小视频| 妹子高潮喷水视频| 99re6热这里在线精品视频| 波多野结衣一区麻豆| 国产1区2区3区精品| 老熟妇仑乱视频hdxx| 啦啦啦 在线观看视频| 国产国语露脸激情在线看| 久久精品国产综合久久久| 精品人妻1区二区| 叶爱在线成人免费视频播放| 菩萨蛮人人尽说江南好唐韦庄| 久久 成人 亚洲| 午夜福利视频在线观看免费| a在线观看视频网站| 9色porny在线观看| 亚洲国产毛片av蜜桃av| 久久久久久久久久久久大奶| 女人爽到高潮嗷嗷叫在线视频| 亚洲精品美女久久av网站| 亚洲欧洲日产国产| 精品亚洲成a人片在线观看| 男人操女人黄网站| 国产精品久久久久久精品电影小说| 99国产精品免费福利视频| 一本—道久久a久久精品蜜桃钙片| 日韩一区二区三区影片| 国产福利在线免费观看视频| 亚洲国产欧美网| 中文字幕人妻丝袜一区二区| 久久久久视频综合| 久热爱精品视频在线9| 亚洲熟妇熟女久久| 首页视频小说图片口味搜索| 12—13女人毛片做爰片一| 欧美精品人与动牲交sv欧美| 久久99热这里只频精品6学生| 亚洲少妇的诱惑av| 欧美精品一区二区免费开放| 欧美精品啪啪一区二区三区| 精品少妇黑人巨大在线播放| 国产区一区二久久| 国产精品一区二区精品视频观看| 日本精品一区二区三区蜜桃| 十八禁高潮呻吟视频| 日韩欧美三级三区| 国产国语露脸激情在线看| 麻豆乱淫一区二区| 亚洲七黄色美女视频| av国产精品久久久久影院| tube8黄色片| 精品一区二区三区四区五区乱码| 精品国产超薄肉色丝袜足j| 精品国产一区二区三区久久久樱花| 久久99热这里只频精品6学生| avwww免费| 三级毛片av免费| 精品少妇一区二区三区视频日本电影| 国产有黄有色有爽视频| 正在播放国产对白刺激| 天天影视国产精品| 国产精品亚洲av一区麻豆| 伊人久久大香线蕉亚洲五| 中文欧美无线码| 曰老女人黄片| av有码第一页| 青青草视频在线视频观看| 欧美精品高潮呻吟av久久| 三级毛片av免费| 国产无遮挡羞羞视频在线观看| 亚洲精品中文字幕一二三四区 | 色在线成人网| 波多野结衣一区麻豆| 国产精品99久久99久久久不卡| 99精国产麻豆久久婷婷| 久久99热这里只频精品6学生| 一区二区日韩欧美中文字幕| e午夜精品久久久久久久| 一边摸一边做爽爽视频免费| 肉色欧美久久久久久久蜜桃| 日日摸夜夜添夜夜添小说| av视频免费观看在线观看| aaaaa片日本免费| 每晚都被弄得嗷嗷叫到高潮| 麻豆av在线久日| www日本在线高清视频| 黄色视频,在线免费观看| 亚洲 欧美一区二区三区| av欧美777| 菩萨蛮人人尽说江南好唐韦庄| 999精品在线视频| 1024视频免费在线观看| 久久久久网色| 90打野战视频偷拍视频| 国产精品电影一区二区三区 | 国产高清激情床上av| 成人国语在线视频| 伊人久久大香线蕉亚洲五| 中文字幕人妻熟女乱码| 中文亚洲av片在线观看爽 | 亚洲国产欧美一区二区综合| 91精品国产国语对白视频| 亚洲成av片中文字幕在线观看| 成人18禁高潮啪啪吃奶动态图| 少妇精品久久久久久久| 国产麻豆69| 18禁观看日本| 两性夫妻黄色片| 中文亚洲av片在线观看爽 | 满18在线观看网站| 欧美 亚洲 国产 日韩一| 女人久久www免费人成看片| 怎么达到女性高潮| 国产不卡av网站在线观看| 亚洲精品国产色婷婷电影| kizo精华| 国产成人啪精品午夜网站| 国产精品久久久av美女十八| av片东京热男人的天堂| 三上悠亚av全集在线观看| 两性夫妻黄色片| 欧美成人午夜精品| 久久久久久久精品吃奶| 无限看片的www在线观看| 亚洲人成77777在线视频| 国产精品电影一区二区三区 | 99精品欧美一区二区三区四区| 欧美中文综合在线视频| 国产精品香港三级国产av潘金莲| 老司机福利观看| 欧美av亚洲av综合av国产av| 操美女的视频在线观看| 大型黄色视频在线免费观看| 在线观看免费午夜福利视频| 国产精品久久久久久精品古装| 免费人妻精品一区二区三区视频| 亚洲成人免费电影在线观看| 一边摸一边抽搐一进一小说 | 大片免费播放器 马上看| 日本黄色日本黄色录像| 制服人妻中文乱码| 亚洲成av片中文字幕在线观看| 啦啦啦中文免费视频观看日本| 亚洲av日韩精品久久久久久密| 99九九在线精品视频| 免费观看人在逋| 手机成人av网站| 亚洲精品自拍成人| 激情视频va一区二区三区| 欧美人与性动交α欧美精品济南到| 成人国产一区最新在线观看| 成人国语在线视频| h视频一区二区三区| 久久影院123| 亚洲精品粉嫩美女一区| 精品国产国语对白av| 天堂中文最新版在线下载| 国产精品一区二区精品视频观看| 桃红色精品国产亚洲av| 欧美日韩亚洲高清精品| 后天国语完整版免费观看| 亚洲专区中文字幕在线| 欧美黄色淫秽网站| 久久亚洲精品不卡| 亚洲情色 制服丝袜| 国产精品.久久久| 精品国产国语对白av| 成在线人永久免费视频| 窝窝影院91人妻| 99精品欧美一区二区三区四区| 久久99热这里只频精品6学生| 男女床上黄色一级片免费看| 人人妻人人添人人爽欧美一区卜| 十八禁网站免费在线| 黄色毛片三级朝国网站| 亚洲人成77777在线视频| 王馨瑶露胸无遮挡在线观看| 一个人免费在线观看的高清视频| 久久精品国产综合久久久| 黄色视频,在线免费观看| 夜夜骑夜夜射夜夜干| 国产成人精品无人区| 一二三四在线观看免费中文在| 1024视频免费在线观看| 欧美日韩av久久| 人成视频在线观看免费观看| 一级a爱视频在线免费观看| 久久性视频一级片| 日韩制服丝袜自拍偷拍| 日韩大片免费观看网站| 美女午夜性视频免费| 国产人伦9x9x在线观看| 欧美老熟妇乱子伦牲交| 欧美中文综合在线视频| 热99久久久久精品小说推荐| 欧美中文综合在线视频| 免费在线观看完整版高清| 淫妇啪啪啪对白视频| 精品少妇黑人巨大在线播放| 久久 成人 亚洲| 99国产综合亚洲精品| 高清欧美精品videossex| 在线看a的网站| 久久精品亚洲熟妇少妇任你| 日本a在线网址| 一边摸一边抽搐一进一出视频| 亚洲精品中文字幕一二三四区 | 男女床上黄色一级片免费看| 久久人人爽av亚洲精品天堂| 亚洲,欧美精品.| 人人妻人人添人人爽欧美一区卜| 成在线人永久免费视频| 国产精品98久久久久久宅男小说| 国产欧美日韩一区二区精品| 嫩草影视91久久| 亚洲国产中文字幕在线视频| 亚洲精品美女久久av网站| 香蕉久久夜色| 一级,二级,三级黄色视频| 国产高清视频在线播放一区| 久久精品国产99精品国产亚洲性色 | 水蜜桃什么品种好| 成年人免费黄色播放视频| 国产成+人综合+亚洲专区| 久久精品91无色码中文字幕|