• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A cooperative interference resource allocation method based on improved fire fly algorithm

    2021-09-02 11:35:38HuixiXingHuWuYouChenKunWng
    Defence Technology 2021年4期

    Hui-xi Xing ,Hu Wu ,You Chen ,,Kun Wng

    a Aeronautics Engineering College,Air Force Engineering University,Xi’an,710038,China

    b School of Energy and Power Engineering,Shandong University,Jinan,250061,China

    Keywords: Radar countermeasure Adaptive heuristics Adversarial effectiveness Fuzzy comprehensive evaluation Mutation operator

    ABSTRACT To deal with the radio frequency threat posed by modern complex radar networks to aircraft,we researched the unmanned aerial vehicle(UAV)formations radar countermeasures,aiming at the solution of radar jamming resource allocation under system countermeasures.A jamming resource allocation method based on an improved fire fly algorithm(FA)is proposed.Firstly,the comprehensive factors affecting the level of threat and interference ef ficiency of radiation source are quanti fied by a fuzzy comprehensive evaluation.Besides,the interference ef ficiency matrix and the objective function of the allocation model are determined to establish the interference resource allocation model.Finally,A mutation operator and an adaptive heuristic are integtated into the FA algorithm,which searches an interference resource allocation scheme.The simulation results show that the improved FA algorithm can compensate for the de ficiencies of the FA algorithm.The improved FA algorithm provides a more scienti fic and reasonable decision-making plan for aircraft mission allocation and can effectively deal with the battle field threats of the enemy radar network.Moreover,in terms of convergence accuracy and speed as well as algorithm stability,the improved FA algorithm is superior to the simulated annealing algorithm(SA),the niche genetic algorithm(NGA),the improved discrete cuckoo algorithm(IDCS),the mutant fire fly algorithm(MFA),the cuckoo search and fire flies algorithm(CSFA),and the best neighbor fire fly algorithm(BNFA).

    1.Introduction

    With the advances in the mine field network technology,the effectiveness of the electronic countermeasures of a single platform in the air is limited.Combat capabilities can be effectively enhanced by the cooperative jamming radar network of unmanned aerial vehicle(UAV)formations.The effective usage of jammers in formations to signi ficantly reduce the target exposure is a top priority for cooperative interference.The distribution of jamming aircraft directly affects combat power.As for the improvement of radar confrontation in modern warfare,the method to quickly form an effective interference resource allocation plan or decision based on the battle field environment situation,the existing interference resources and tactical requirements[1,2]is of great practical signi ficance.For combination optimization of interference resource allocation,this investigation aims at the selection and design of optimization algorithms because the interference resource allocation scheme is implicit in a multi-parameter,multi-constrained,and non-deterministic polynomia(NP),so that the limited interference resources can be utilized scienti fically,reasonably,and ef ficiently.

    Traditional methods of allocating interference resources are mostly combinational optimization methods[3,4],including the 0-1 planning method,similarity method,and dynamic programming.These approaches are suitable for addressing small-scale resource allocation issues.However,with the increasing scale of radar emitter sources and interference resources,the number of jamming combination scheme expands dramatically.These methods have inadequate real-time performance because the difficulties in obtaining better results in a short time.

    Recent research indicates that the heuristic optimization methods excel in solving optimization problems.Liu Xiang et al.[5]used an improved genetic algorithm to address the problem of cooperative interference resource allocation.The two-dimensional integer coding was applied to determine the correspondence between the jammer and the radar network.The algorithm converges quickly,but it is easy to premature.In the study conducted by Xiang et al.[6],a modi fied binary particle swarm algorithm was used to solve the problem of dynamic resource allocation with the following formation interference.TheS-type function converts the particle velocity,and the particle position is updated.However,the algorithm has a complicated coding form,and high computation,leading to low search ef ficiency.Considering the impact of different power allocation schemes on the bit error rate,Shao et al.[7]utilized a simulated annealing(SA)algorithm to achieve the jamming resources allocation.However,the algorithm received inadequate solutions with a certain probability,and the convergence speed was slow.

    The Fire fly Algorithm(FA)is an intelligent optimization algorithm inspired by the Cambridge scholar Xin-She Yang.His inspiration was attracted by the glow of fire flies[8-10].The FA algorithm not only has no requirements on objective function and constraints,but also has simple operation,few parameters,and strong robustness[11].Its research has been successfully applied to image recognition[12],path planning[13],fleet operations[14],and many other fields.However,like many other intelligent algorithms,the standard FA algorithm is combined with a slow convergence rate and low convergence accuracy at the same time.Besides,the fire fly’s movement strategy does not guarantee the diversity of the decomposition space,and it is prone to fall into a local optimum state,resulting in large deviation and weak stability in the optimization process.Lu[15]alternately used the two crossover operations and proposed a disturbance resource optimization allocation technique based on the niche genetic algorithm(NGA).Li et al.[16]added the crossover and mutation operations of the genetic algorithm into the discrete cuckoo algorithm(DCS),and proposed an improved discrete cuckoo algorithm(IDCS)to implement the interference resource allocation of the enemy-friend identi fication system.To a certain extent,both of the methods improved the optimization ability of the algorithm.

    Therefore,in this study,the author draws on the ideas of the genetic algorithm and particle swarm algorithm to improve the standard FA algorithm from two aspects.Firstly,we added a mutation operator to enable individuals to achieve gene communication in different dimensions.This strategy allows for individual fire flies to retain their excellent information and update bad information in a certain dimension.Therefore,it can enhance the ability of fire flies to jump out of local optimums.As a result,the search performance of the algorithm is improved.Second,we added an adaptive heuristic guidance strategy,which regards the overall optimal position as the heuristic information and dynamically adjusts the guidance coef ficient according to the individual fire flies’position.In the early stage of the search,it has a high convergence speed and a strong global searching ability.In the later stage of the search,the change of the guidance coef ficient weakens the guidance effect of the heuristic information.It leads to the enhancement of the local re fined search capability of the algorithm.Compared with the FA algorithm,the improved FA algorithm not only increases the convergence accuracy of the optimal solution and the overall average solution,but also shortens the iteration time.

    In this study,first of all,we untilized the fuzzy comprehensive evaluation based on the comprehensive factors of interfering parties.By constructing membership function,different indexes are represented.Then the threat level of the radiation source and the jamming effectiveness are evaluated,and the jamming resource allocation model is built.Finally,the improved FA algorithm is used to search for the optimal allocation scheme.The experimental results show that the improved FA algorithm achieves faster calculation speed and better interference effectiveness compared with the original algorithm.Compared with other algorithms,the quality of the overall average solution has raised,and the algorithm has a better optimization ability and stability.The improved FA algorithm provides a better allocation scheme with more excellent reliability that can inform tactical decisions of battle field commanders.Besides,this algorithm inherits the characteristics of the original one,which has fewer parameters and simple principle that is easy to implement in engineering.

    The rest of the paper is organized as follows:

    Section 2 presents the assessment of radiation source threat level and interference effectiveness.An improved FA is proposed to solve the interference resource allocation model.Section 3 is about simulations concerning the attribute values of the radiation source and jammer.Finally,conclusions are drawn in Section 4.

    The researchers use the following notations throughout the paper.Bold lowercases and bold uppercases stand for vectors and matrices,respectively.Letters with the inferior characters refer to the element of vectors or matrices.For example,aidenotes thei-th element of the vectora,andaistands for the i-th vector of matrixA.x(t)stands for the vector at thet-th iteration.For typical combat scenarios,the researchers assume that the jamming party is a mission formation consisting ofMaircraft with jamming capabilities{R1,R2,…,RM},and the enemy is a radar network consisting ofNradars{J1,J2,…,J10}.[·]ijindicates that thej-th jammerJjcorresponds to thei-th radiation sourceRi.

    2.Material and methods

    2.1.Jamming resource distribution model

    2.1.1.Radar emitter threat assessment

    Radar emitter threat assessment is an essential prerequisite for the optimal allocation of radar jamming sources.Fuzzy multiattribute decision-making has been used to analyse the threat level of the battle field emitters[17,18].According to the characteristics of practical application,there are three prioritized factors,including the types of radar emitter,working status,and platform information[19].

    Radar emitter can be classi fied into seeker radar,fire control radar,airborne early warning radar and long-range warning radar.The working status generally includes search,tracking,and guidance according to the level of threat.The platform information consists of distance,speed,and azimuth,which are obtained by the active or passive detection system.

    Supposing there isNradar emitter in the battle field,the threat level of radar emitteri(i=1,2,…,N)is expressed by Eq.(1):

    In Eq.(1):Tirepresents the threat of thei-th radar emitter type.Sirepresents the threat to the operating state of thei-th radar emitter.Piis the platform information of thei-th radar emitter.αi(i=1,2,3)is the weight of the indicator,and satis fies∑αi=1.The researchers recorded the threat level ofNradar emitter as.Ω=[ω1,ω2,…,ωN].

    2.1.2.Jamming effectiveness evaluation

    Jamming must be implemented accurately in timing,frequency alignment,airspace coverage,appropriate power,and pattern matching.The jamming effect has been considered from the following aspects:time domain,frequency domain,and energy domain,as well as the jamming patterns and radar antiinterference measures.The five factors that affect the jamming ef ficiency are selected as the evaluation indexes:jamming time,jamming frequency band,jamming power,jamming pattern,and radar anti-interference measures.The fuzzy comprehensive evaluation is used to determine the jamming effectiveness matrix.There areMjammers,and thej-th(j=1,2,…,M)jammer’s interference ef ficiency on thei-th radiation source is defined as Eq.(2).

    In Eq.(2),theiandjin the index indicate that thej-th jammer interferes with thei-th radar.Itijis the interference time factor,Ifijis the interference band factor,Ipijis the interference power factor andImijis the interference pattern factor.Iaijis the factor of radar antijamming measure.βi(i=1,2,…,5)is the weight values occupied by each factor,and∑βi=1.

    According to the evaluation indexes mentioned above,the fuzzy comprehensive evaluation value of the interference effectiveness of each jammer on each radiation source can be determined.Thus,the interference ef ficiency matrix ofMjammers to interfere withNradiation sources can be determined,as defined in Eq.(3).

    2.1.3.Objective function

    After the threat level of radar emitterΩand interference ef ficiency matrixEare obtained,the focus of the interference resource optimization is to select the best interference combination fromthe interference ef ficiency matrix so as to improve the total interference bene fit under the interference combination.Eq.(4)is the optimum allocation objective function:

    Thefeff(x)is the objective optimization function andxijis a decision variable.Ifxij=1,it indicates that thej-th jammer interferes with thei-th radar emitter,and ifxij=0,it indicates that thej-th jammer does not interfere with thei-th radar emitter.

    The limitations are:one jammer can only interfere with one radar emitter at a time.However,one radar emitter can be interfered with by multiple jammers,as shown in Eq.(5):

    2.2.Model solving

    2.2.1.Standardfirefly algorithm

    The fire fly algorithm(FA)contains two parameters:brightness and attraction.Brightness refers to the current position of the individual fire fly.The distance the individual fire flies move depends on the degree of attraction In the beginning,fire flies are randomly distributed in the solution space.The fire flies in the brighter position attract the fire fly individuals around through fluorescence signals and constantly updates the position of the fire fly group to achieve the optimization goal.The speci fic mathematical optimization mechanism[20]is as follows:

    The fire fly population is represented byP={x1,…,xi,…xN},and every fire fly individual represents a solution in theD-dimensional solution space.

    The relative fluorescence brightness of individual fire flies is shown in Eq.(6):

    In Eq.(6),I0is the maximum fluorescent brightness of fi re fl ies,γ is the light absorption coef ficient,which is generally a constant,andis the Euclidean distance between fi re fl iesxiandxj.

    The attractiveness of light is shown as Eq.(7):

    In Eq.(7),β0represents the degree of attraction whenr=0.

    After being attracted by the brighter fire flies,the fire fly‘s position is updated.Eq.(8)represents the mathematical expression of the location update.

    In Eq.(8),the step factorα∈[0,1]is a constant andRandis a uniformly distributed random factor from 0 to 1.Whenβ=0,the individual moves randomly,which means there are no other individuals around thei-th fire fly.

    Because of the shortcomings of the standard FA and its limitations in solving optimization problems,domestic and foreign scholars have carried out many studies on this filed[21-27].In this paper,the FA algorithm is improved in the convergence speed and global search ability.

    2.2.2.Firefly algorithm improvement

    I.Mutation Operation

    This paper draws on the genetic mutation operation idea of genetic algorithm.A mutation factorηis added to the FA algorithm to update the position information of some fire fly individuals during the iteration process.The roulette selection method is used to select individuals that need to be mutated.Individualxiis selected according to the probability of Eq.(9).

    In terms of evolutionary fitness,individuals with higher fitness values are more likely to be selected.The researchers mutate the selected fire fly individuals according to Eq.(10).

    In Eq.(10):ci(t)is the mutation intermediate ofxi(t);the variation factorη∈[0,1].

    The researchers compared the fitness values ofci(t)andxi(t)to determine whether mutation produces new individuals.Eq.(11)shows the generation of new individuals

    The mutation operation can increase the diversity of the fire fly population.When the algorithm search near the neighborhood of the optimal solution,the mutation operator will enhance the partial random search ability,thus accelerating the convergence of the population to the optimal solution.

    II.Adaptive Heuristic Guidance

    The individuals of the standard FA are memoryless,and move only based on the brightness information.Therefore,it is easy to lose the information of the optimal solution obtained in the iteration,and extend the iteration time,thereby reducing the search speed,or even deviating from the optimal solution.Hence,it is necessary to improve the movement mechanism of fire flies.Unlike the FA algorithm,the particles in the particle swarm algorithm[28]have memory.The historical best position of the population and the particle itself determine the speed update of the particle,so that the particle swarm quickly converges to the global optimal position.The fire fly position update equation is modi fied by adding an adaptive heuristic algorithm,which is described as Eq.(12).

    In Eq.(12),ωi(t)is the adaptive guidance coef ficient,defined as Eq.(13).

    tmaxis the maximum iteration time,pbest(t)andpworst(t)are the optimal and worst positions of the population at the t-th iteration,respectively.ωmaxis the maximum value of the adaptive guidance coef ficient.

    The increase of the adaptive heuristics makes the fire fly individuals move toward the overall optimal position while approaching the brightest fire flies in the neighborhood.The selfadaptive dynamic adjustment of the guide coef ficientωi(t)has two main advantages.First,the initial guide coef ficient is large,and fire flies quickly move to the overall optimal position.During the iteration,as the guide coef ficient decreases,the attractiveness of the brightest fire fly gradually weakens.The fire flies move to the brightest location in the neighborhood,which enhances the accurate partial search capability.Second,the changes in the guide coef ficient are associated with the location information of fire fly individuals.Individuals with lower fitness values(The higher the value of‖pbest(t)-xi(t)‖)results in larger guide coef ficients,which accelerate them to move closer to the optimal position of the population and increase the global searching ability.

    2.3.Algorithm implementation

    2.3.1.Coding method

    Aiming at interference resource allocation,the individuals of the population should be coded to establish a mapping relationship between jammers and radar emitters.Compared with binary coding,the real vector coding method proposed in this paper can make full use of individual characteristics and reduce the dimension problem effectively.SupposeMjammers can interfere withNradar emitter.The dimensionDof the individual fire fly represents the number of the radar emitterN.The integer part of each dimension represents the number of the radar emitter,and the decimal part is arranged in descending order.The sequence value represents the number of jammer that is interfering with the radar emitter.Individual positions are represented by random numbers in the interval[1,N+1].Because each jammer can interfere with at most one radar emitter,there is usually an inequalityM≥Nto ensure that each radar emitter is interfered with a jammer.There is an example of 6 jammers interfering with 4 radar emitters.The position of the fire fly is a random numbers in the interval[1,4+1],as shown in Fig.1,which intuitively re flects the corresponding interference relationship between the jammer and the radar.

    Fig.1.Schematic diagram of encoding mapping relationship.

    2.3.2.Algorithmflow

    After the fire fly individual coding,the interference resource allocation can be achieved.Fig.2 is the flowchart of the interference resource allocation algorithm based on the improved FA and the speci fic implementation steps.

    Step 1Objective function determination:The researchers calculate radar emitter threat assessment levels and interference effectiveness matrices.

    Step 2Basic parameters initialization:The number of fire flies is NP,the maximum number of iterations isH,the maximum attraction isβ0,the light absorption coef ficient isγ,the step factor isα,the number of enemy radar emitter isN,and the number of jammers isM,M≥N.On the premise of satisfying the constraint conditions,the correspondence between the jammer and the radar emitter is initialized according to the real vector coding guidelines.

    Step 3Population Initialization.At the initial moment,the fire flies are distributed randomly,and the fitness value and maximum fluorescent brightness of each fire fly individual are determined.

    Step 4Crossover and mutation.After calculating the relative brightness and attraction between individuals,the current optimal fire fly is selected to generate new fire fly individuals through a cross mutation operation,and make a comparison of the two bodies.If the evolved fire fly individual has higher brightness,it replaces the original one.

    Step 5Individual fire fly positions update.The direction of the movement of each fire fly is determined by comparing the brightness of each fire fly with other individuals in the neighborhood.The population position is updated according to Equation(12).The individual with the best position moves randomly.The algorithm return toStep 4.

    Step6Termination conditions determination:When the maximum number of iterations or the search accuracy is reached,the fire fly position of the optimal individual is recorded as the current optimal solution,and the interference resource allocation scheme is determined.Otherwise,the algorithm returns toStep 5.

    3.Discussion

    3.1.Environment simulation

    The simulation experiments were performed on the MATLAB R2016b platform with Intel Core i5-4210H CPU@2.90GHz,4 GB memory,and 64-bit operating system.

    Fig.2.Algorithm flowchart.

    According to the parameter settings of reference[5],The researchers assumed that there were 10 radar emitters{R1,R2,…,R10}and 10 jammers{J1,J2,…,J10}in the battle field environment.The parameters of each radar emitter obtained through preliminary investigation are shown in Table 1.Letα1=0.5,α2=0.4,α3=0.1,λ1=0.4,λ2=0.2,λ3=0.2,the threat of each radar emitters is calculated asΩ=[0.223,0.199,0.481,0.540,0.522,0.348,0.456,0.282,0.302,0.355].

    The properties of the jammer are shown in Table 2.Letβ1=0.1,β2=0.2,β3=0.2,β4=0.3,β5=0.2,The authors calculated the interference ef ficiency matrix when 10 jammers interfere with 10 radar emitters,as shown in Table 3.

    3.2.Simulation analysis

    3.2.1.Solutions of interference resource allocation

    The number of fire flies isNP=40.The iterations areT=100,the light absorption coef ficientγ=1,the maximum attraction degree β0=1,and the step size factorα=0.3.

    The standard FA algorithm and the improved FA algorithm are used to optimize the interference resource allocation model,maximizing the interference ef ficiency as the optimization objective.Fig.3 shows the update of the objective function value under a single optimization experiment.The objective function of interference resource allocation mentioned in this paper is a discontinuous multimodal function,and the stepped convergence curve shows the effectiveness of the FA.Both the standard FA algorithm and the improved FA algorithm can eventually converge,but the latter has a signi ficantly faster convergence speed than the former.Because in the FA algorithm,each fire fly represents an independent solution,the mutation operation and the adaptive heuristic guidance can improve the whole and the partial search capabilities.Searchability allows individuals in a population to move quickly to optimal locations and obtain better solutions earlier.

    More conclusions can be drawn from Fig.3.The improved FA algorithm converges faster than the standard FA(the improved FA algorithm converges when the iteration reaches about 60 times,while the standard FA algorithm iterates to 80 times),and the latter solution can achieve better interference performance.Table 4 is the jammer allocation scheme solved by the improved fire fly algorithm.

    Table 1 Emitter property sheet.

    Table 2 Jammer property sheet.

    Table 3 10×10 jamming effectiveness matrix.

    Table 4 Jammer allocation scheme.

    3.2.2.Comparison of different types of intelligent optimization methods

    The traditional simulated annealing(SA)algorithm[29]was used to solve the UAV allocation scheme in this study.The simulation parameters are set as follows:initial temperatureT0=150,termination temperatureTmin=0.01,temperature drop coef ficient α=0.8,and the number of iterations is 8 times the number of jammers.Fig.4 indicates the change of the objective function value.According to Fig.4,when the SA algorithm iterates to about 80 times,the objective function value can stabilize around 2.85,and the objective function value fluctuates greatly.The SA algorithm accepts inferior solutions with a certain probability.Even if it can avoid converging to a local extremum,it tend to cause the algorithm to converge slowly and the final result is not the optimal solution.

    To compare the performance differences with other improved optimization algorithms,the authors applied NGA,IDCS and the improved FA algorithm to the interference resource allocation model in this paper.

    Parameter settings:

    NGA:population size 100 and mutation probability 0.05.

    IDCS:number of bird nests 20 and drop probability 0.5.

    Improved FA:population size 50,light absorption coef ficient γ=1,maximum attractionβ0=1 and step size factorα=0.02.

    The number of iterations is 100,and repeating 20 times.Fig.5 shows the average convergence curve.

    The average number of iterations of the NGA algorithm and the IDCS algorithm is about 95,while the average number of iterations of the improved FA algorithm is 75,indicating that the improved FA algorithm has faster convergence speed.Compared with the average objective function value calculated by several algorithms,the improved FA is more ef ficient and has better optimization ability.

    Fig.3.Comparison chart of changes in objective function values.

    Fig.4.Simulated annealing algorithms for solving object function values.

    Fig.5.Convergence curves of three types of intelligent optimization algorithms.

    3.2.3.Comparison of different improvedfirefly algorithms

    Fan et al.[30]designed a mutant fire fly algorithm(MFA)by combining ef ficient coding methods of external and internal coding systems to solve the flow shop scheduling problem.An improved cuckoo search and fire flies algorithm(CSFA)[31]was proposed,in which cuckoo search was used to optimize the initial population of the fire fly algorithm to accelerate the algorithm’s convergence.The performance of the CSFA algorithm was tested with standard test functions.Wu et al.[32]proposed a new fire fly algorithm,which is called the best neighbor fire fly algorithm(BNFA).It employs the best neighbor guidance strategy,where each fire fly is attracted to the optimal fire fly randomly selected in the neighborhood.Thus,the improvement measures reduce the fire fly oscillations in every attraction-induced migration stage,while increasing the probability of the guidance in a new better direction.In this paper,the above three methods including MFA,CSFA and BNFAwere applied to solve the problem model and compared with the improved FA.The population number of fire flies is 50,and the maximum number of iterations is 100.The authors conducted 20 independent repeated experiments and compared the convergence results,as shown in Fig.6.

    Fig.6.Convergence curves of several improved FA.

    The average fitness value of the solution obtained by the MFA algorithm is only 2.739,which is lower than other algorithms.Therefore,the special encoding method of the algorithm is dif ficult to apply to the many-to-many interference resource allocation problem.The early convergence speed of the CSFA is very fast,because it optimizes the fire fly population at the beginning,which signi ficantly improved the quality of the initial population,thus accelerating the convergence speed of fire fly to the optimal solution.However,the partial search ability is insufficient in the later stage.Therefore,the convergence accuracy is low,and it may not be able to get the best distribution solution.The interference resource allocation scheme obtained by the BNFA algorithm and the improved FA algorithm can achieve the ideal interference ef ficiency,indicating that they are equivalent in their optimization capabilities.For the former,the best neighbor fire fly individuals can overcome the shortcomings of early maturity of the algorithm,but the increase of population tend to make it more complex.In contrast,the latter converges earlier,because the fire fly’s individual mutation mechanism is added to the algorithm,which enhances the global searching ability without increasing the number of calculations.Besides,the improved FA algorithm accelerates the convergence to the optimal solution under the guidance of heuristic information in the early stage of iteration.It focuses more on the partial search in the later stage of iteration.

    In this paper,to more directly re flect the performance of the algorithm,after 100 Monte Carlo simulations,different algorithms are applied to the interference resource allocation model,and each indicator of the objective function value is calculated.The averages values obtained by several algorithms are 93.9%,92.5%,87.8%,93.5%,93.5%,92.2%,93.2%and 93.9%of the maximum objective function,respectively.Because interference resource allocation is an NP-hard problem,the algorithm cannot guarantee an optimal solution every time,but can only find a better solution in a relatively short time.The objective function of the improved FA algorithm has a higher average value and smaller variance,which indicates that the algorithm’s optimization results have higher credibility and stronger stability.Table 5 lists detailed information.

    Table 5 Algorithmic comparison.

    3.2.4.Adaptability verification of improved FA algorithm

    In the paper,the authors simulated a collaborative confrontation scenario.In the collaborative confrontation scenario,an attribute table of 3 radar emitters and 3 jammers are given by Ref.[33],the radar threat coef ficient and jamming effectiveness matrix of 5-to-5 are given by Ref.[34],and the attribute table and jamming ef ficiency matrix of 7 jammers against 7 radar emitters are given by Ref.[35].The FA algorithm and the improved FA algorithm were used to search for the interference resource allocation schemes at different scales.Fig.7(a),Fig.8(a),Fig.9(a)shows the convergence curve of the running objective function.

    According to the simulation results,the improved FA algorithm is superior to the FA algorithm in convergence speed and accuracy.Also,with the increasing of radar networking scale,the improved FA algorithm shows higher adaptability.

    Then,the difference between the convergence optimal value and the global optimal value is calculated through 100 independent experiments.Fig.7(b),Fig.8(b),Fig.9(b)give the error statistics of the FA algorithm,and Fig.7(c),Fig.8(c),Fig.9(c)provide the error statistics of the improved FA algorithm.It is evident that the improved FA algorithm has less convergence errors and stronger stability.The information in Table 6 shows a more intuitive comparison of the algorithm performance.With higher complexity of the problem,the optimization ability of both algorithms declines.In three cases,the improved FA algorithm has a higher optimal convergence probability.Especially when there are 7 radar emitters,the optimal convergence probability can still be maintained at 52%.In addition,With the increase of the radar confrontation scale,the search time of the improved FA algorithm is shorter than the standard FA algorithm.When there are 7 radar emitters,the search time of the standard FA algorithm is close to 20s,while the improved one is always around 10s.

    Fig.7.Simulation of 3 jammers against 3 radiation sources.

    Fig.8.Simulation of 5 jammers against 5 radiation sources.

    Fig.9.Simulation of 7 jammers against 7 radiation sources.

    Table 6Comparison of adaptability of FA algorithm and improved FA algorithm.

    4.Conclusions

    This paper focuses on the radar jamming decision methods of formation UAV against radar network systems.Based on a fuzzy comprehensive evaluation,a threat level evaluation model is established with the radar emitter type,working status,and platform information as indicators.The interference ef ficiency matrix is further determined from the perspective of time,frequency,energy,interference patterns,and radar anti-jamming measures.The optimization of interference resources is also transformed into the optimization of allocation schemes to obtain the maximum overall interference ef ficiency.The improved FA can make up for the shortcomings of the standard FA algorithm.On the premise of the random movement of individuals,performing mutation operation on good individuals effectively improves the possibility of the algorithm to jump out of the partial optimal solution.Besides,the guidance of heuristic information overcomes the disadvantage of the random movement direction without contribution to the optimal solution,which leads to the slow convergence speed.The results show that the authors’method has certain advantages in search ef ficiency and convergence accuracy.Therefore,the interference resource allocation strategy formed in the system countermeasures is more credible.

    This study explores the cooperative jamming method of UAV formation from the perspective of group operations.Based on the theory and practice,this paper evaluates the threat level of enemy radar emitters through multiple indicators.It establishes a scienti fic interference resource optimization model,which overcomes the subjectivity and hysteresis of arti ficial experience and has certain reference value.

    Intelligent electronic interference decision-making can provide a guarantee for the aircraft to effectively attack the enemy and gain the initiative on the battle field.The improved adaptive interference resource allocation method proposed by the authors is still worth exploring in the future application research.

    Declaration of competing interest

    The authors declare that they have no known competing financial interests or personal relationships that could have appeared to in fluence the work reported in this paper.

    Acknowledgements

    The authors express sincere appreciation to the anonymous referees for their helpful comments to improve the quality of the paper.

    国产人伦9x9x在线观看| 99久久人妻综合| av欧美777| 国产av精品麻豆| 久久久久久久精品吃奶| 欧美中文日本在线观看视频| 9191精品国产免费久久| 亚洲精品国产区一区二| 亚洲,欧美精品.| 精品福利永久在线观看| 成熟少妇高潮喷水视频| 国产精品国产高清国产av| 日韩免费av在线播放| av在线播放免费不卡| 极品教师在线免费播放| 女人精品久久久久毛片| av电影中文网址| 热re99久久精品国产66热6| 国产高清激情床上av| 欧美激情高清一区二区三区| 在线观看免费午夜福利视频| 免费观看精品视频网站| 久久久久久人人人人人| 国产一卡二卡三卡精品| 在线观看免费日韩欧美大片| 国产成人av激情在线播放| 777久久人妻少妇嫩草av网站| 男人舔女人的私密视频| 露出奶头的视频| 午夜精品在线福利| 脱女人内裤的视频| 一进一出抽搐gif免费好疼 | 国产精品久久久久成人av| 97碰自拍视频| 亚洲狠狠婷婷综合久久图片| 无人区码免费观看不卡| 真人做人爱边吃奶动态| 大型黄色视频在线免费观看| 亚洲av电影在线进入| 久久久国产成人免费| 黄色a级毛片大全视频| 黑人巨大精品欧美一区二区mp4| 亚洲欧美日韩无卡精品| 久久99一区二区三区| 亚洲欧美激情综合另类| 丝袜美足系列| 亚洲美女黄片视频| 亚洲七黄色美女视频| 国产97色在线日韩免费| 看黄色毛片网站| 国产精品综合久久久久久久免费 | 午夜福利免费观看在线| 99精品久久久久人妻精品| 淫妇啪啪啪对白视频| 亚洲三区欧美一区| 老汉色av国产亚洲站长工具| 18禁黄网站禁片午夜丰满| 日日摸夜夜添夜夜添小说| 欧美亚洲日本最大视频资源| 国产成年人精品一区二区 | 精品电影一区二区在线| 午夜福利免费观看在线| 成人国语在线视频| 美国免费a级毛片| 国产精品影院久久| 中文字幕另类日韩欧美亚洲嫩草| 91麻豆av在线| 一级黄色大片毛片| 99热只有精品国产| 欧美人与性动交α欧美精品济南到| xxx96com| 国产高清视频在线播放一区| 一个人免费在线观看的高清视频| 桃色一区二区三区在线观看| 又黄又爽又免费观看的视频| 日韩欧美一区视频在线观看| 高清黄色对白视频在线免费看| 欧美精品一区二区免费开放| 国产97色在线日韩免费| 一区福利在线观看| 韩国av一区二区三区四区| 日日摸夜夜添夜夜添小说| 久久亚洲精品不卡| 精品无人区乱码1区二区| cao死你这个sao货| 亚洲视频免费观看视频| 亚洲全国av大片| 97人妻天天添夜夜摸| 免费久久久久久久精品成人欧美视频| 欧美激情极品国产一区二区三区| 久久国产乱子伦精品免费另类| 老汉色∧v一级毛片| 亚洲欧美激情在线| 亚洲熟女毛片儿| 精品卡一卡二卡四卡免费| 99国产精品99久久久久| 成人亚洲精品av一区二区 | 窝窝影院91人妻| 亚洲成国产人片在线观看| 国产麻豆69| 国产熟女午夜一区二区三区| 成年人黄色毛片网站| 大香蕉久久成人网| 久久久国产精品麻豆| 深夜精品福利| 男人舔女人下体高潮全视频| 日本 av在线| 搡老岳熟女国产| 欧美老熟妇乱子伦牲交| 国产精品98久久久久久宅男小说| 50天的宝宝边吃奶边哭怎么回事| 欧美中文综合在线视频| 亚洲欧美激情综合另类| 久久精品国产99精品国产亚洲性色 | 午夜精品在线福利| 亚洲国产精品一区二区三区在线| 人成视频在线观看免费观看| 国产欧美日韩精品亚洲av| 波多野结衣av一区二区av| 成人国产一区最新在线观看| 麻豆成人av在线观看| 午夜视频精品福利| 亚洲精品一卡2卡三卡4卡5卡| 久久久久久免费高清国产稀缺| 亚洲一区中文字幕在线| 精品福利观看| 亚洲av五月六月丁香网| 亚洲精品在线美女| 夜夜看夜夜爽夜夜摸 | 国产野战对白在线观看| 亚洲美女黄片视频| 神马国产精品三级电影在线观看 | 国产成+人综合+亚洲专区| 一本综合久久免费| 日日摸夜夜添夜夜添小说| 亚洲国产欧美网| 国内久久婷婷六月综合欲色啪| 亚洲在线自拍视频| 久久青草综合色| 欧美中文日本在线观看视频| 99热国产这里只有精品6| 免费在线观看亚洲国产| 欧美色视频一区免费| 久久久精品国产亚洲av高清涩受| 在线av久久热| 亚洲成国产人片在线观看| 免费不卡黄色视频| 欧美日韩视频精品一区| 视频在线观看一区二区三区| 久久精品国产亚洲av高清一级| av在线天堂中文字幕 | 亚洲aⅴ乱码一区二区在线播放 | 国产成年人精品一区二区 | 亚洲精品国产色婷婷电影| 欧美久久黑人一区二区| 搡老乐熟女国产| av天堂久久9| 级片在线观看| www日本在线高清视频| 亚洲色图av天堂| 精品电影一区二区在线| www.自偷自拍.com| 热re99久久精品国产66热6| 精品国产亚洲在线| 精品少妇一区二区三区视频日本电影| 三上悠亚av全集在线观看| 精品国产超薄肉色丝袜足j| 999久久久国产精品视频| 欧美+亚洲+日韩+国产| 久久国产乱子伦精品免费另类| 亚洲国产毛片av蜜桃av| 搡老岳熟女国产| 男人舔女人下体高潮全视频| 少妇被粗大的猛进出69影院| 丁香欧美五月| 亚洲男人天堂网一区| 国产一区二区在线av高清观看| 国产午夜精品久久久久久| 19禁男女啪啪无遮挡网站| 精品国产乱码久久久久久男人| 亚洲人成77777在线视频| 男女之事视频高清在线观看| 女生性感内裤真人,穿戴方法视频| 欧美日韩乱码在线| 国产精品爽爽va在线观看网站 | 极品人妻少妇av视频| 视频区图区小说| 桃色一区二区三区在线观看| 性欧美人与动物交配| 亚洲欧洲精品一区二区精品久久久| 我的亚洲天堂| 国产成+人综合+亚洲专区| av电影中文网址| 午夜精品国产一区二区电影| 亚洲美女黄片视频| 一a级毛片在线观看| 一a级毛片在线观看| 新久久久久国产一级毛片| 少妇被粗大的猛进出69影院| 长腿黑丝高跟| 在线免费观看的www视频| 19禁男女啪啪无遮挡网站| 亚洲av电影在线进入| 母亲3免费完整高清在线观看| a在线观看视频网站| 国产极品粉嫩免费观看在线| 亚洲成国产人片在线观看| 欧美另类亚洲清纯唯美| www.熟女人妻精品国产| 9191精品国产免费久久| 久热爱精品视频在线9| 中文亚洲av片在线观看爽| 亚洲成人免费av在线播放| 巨乳人妻的诱惑在线观看| 日韩三级视频一区二区三区| 黄片大片在线免费观看| 欧美色视频一区免费| 日本撒尿小便嘘嘘汇集6| 日本vs欧美在线观看视频| 国产精品永久免费网站| 两个人看的免费小视频| 一边摸一边抽搐一进一出视频| 在线观看66精品国产| 久久久久亚洲av毛片大全| 久久精品国产清高在天天线| 欧美激情极品国产一区二区三区| 国产伦人伦偷精品视频| 免费在线观看黄色视频的| 制服人妻中文乱码| 99国产精品一区二区三区| 超碰97精品在线观看| 男人舔女人下体高潮全视频| 亚洲av美国av| 日韩大码丰满熟妇| 亚洲国产中文字幕在线视频| 亚洲在线自拍视频| 亚洲自偷自拍图片 自拍| 侵犯人妻中文字幕一二三四区| 国产精品久久久av美女十八| 亚洲av成人不卡在线观看播放网| 日韩免费高清中文字幕av| 午夜激情av网站| 国产精品久久久av美女十八| 午夜福利,免费看| 久久精品国产亚洲av高清一级| 国产精品成人在线| 老司机午夜福利在线观看视频| 成人18禁高潮啪啪吃奶动态图| 亚洲av成人一区二区三| 久久久久久免费高清国产稀缺| 男女午夜视频在线观看| 在线天堂中文资源库| 亚洲国产欧美一区二区综合| 午夜精品久久久久久毛片777| 亚洲成国产人片在线观看| 黄片播放在线免费| 又黄又爽又免费观看的视频| 亚洲国产欧美日韩在线播放| 男女做爰动态图高潮gif福利片 | 手机成人av网站| 精品电影一区二区在线| 成年人免费黄色播放视频| 国产亚洲精品久久久久5区| 亚洲一区二区三区欧美精品| 久久香蕉激情| 50天的宝宝边吃奶边哭怎么回事| 一边摸一边抽搐一进一出视频| 精品电影一区二区在线| 久久香蕉国产精品| 日韩大码丰满熟妇| 亚洲精品国产一区二区精华液| 欧美乱色亚洲激情| 精品国产亚洲在线| 久久狼人影院| 亚洲人成77777在线视频| 青草久久国产| 久久影院123| 亚洲专区字幕在线| 每晚都被弄得嗷嗷叫到高潮| 亚洲精品久久成人aⅴ小说| 国产欧美日韩精品亚洲av| 亚洲欧美激情综合另类| 欧美日韩国产mv在线观看视频| 一区二区三区激情视频| av视频免费观看在线观看| 露出奶头的视频| 日韩大码丰满熟妇| 搡老乐熟女国产| 99国产精品一区二区三区| 国产男靠女视频免费网站| 天堂√8在线中文| 一级,二级,三级黄色视频| 亚洲精品国产一区二区精华液| 亚洲av成人一区二区三| 亚洲 国产 在线| 91麻豆精品激情在线观看国产 | 免费日韩欧美在线观看| 免费看a级黄色片| 亚洲久久久国产精品| 99香蕉大伊视频| av天堂久久9| 水蜜桃什么品种好| 亚洲国产精品sss在线观看 | 18禁黄网站禁片午夜丰满| 国产片内射在线| 岛国在线观看网站| 女人高潮潮喷娇喘18禁视频| 啦啦啦 在线观看视频| 操出白浆在线播放| 黑人欧美特级aaaaaa片| 久热爱精品视频在线9| 免费av毛片视频| 大陆偷拍与自拍| 亚洲精品国产一区二区精华液| 国产乱人伦免费视频| 两个人免费观看高清视频| 天堂中文最新版在线下载| 亚洲一卡2卡3卡4卡5卡精品中文| av网站在线播放免费| 热99国产精品久久久久久7| 纯流量卡能插随身wifi吗| 国产一区二区三区综合在线观看| 在线观看午夜福利视频| 精品久久久久久成人av| 高清欧美精品videossex| 久久久久久人人人人人| 久久精品人人爽人人爽视色| 中文欧美无线码| 国产精品一区二区在线不卡| 欧美一区二区精品小视频在线| 十八禁网站免费在线| 真人一进一出gif抽搐免费| 黄片播放在线免费| 在线观看免费视频日本深夜| 日韩欧美一区二区三区在线观看| 亚洲aⅴ乱码一区二区在线播放 | 日本wwww免费看| 欧美乱色亚洲激情| 在线观看一区二区三区| 欧美激情高清一区二区三区| av网站免费在线观看视频| 麻豆国产av国片精品| 午夜免费鲁丝| 精品国产亚洲在线| 国产一区在线观看成人免费| 99国产精品免费福利视频| 露出奶头的视频| 欧美精品一区二区免费开放| 欧美另类亚洲清纯唯美| 久热爱精品视频在线9| 亚洲男人天堂网一区| 18禁裸乳无遮挡免费网站照片 | 午夜激情av网站| 99热只有精品国产| 欧美成狂野欧美在线观看| 97碰自拍视频| 国产一区二区激情短视频| 精品一区二区三区四区五区乱码| 一级毛片女人18水好多| 欧美一区二区精品小视频在线| 日本免费a在线| www国产在线视频色| 欧美成人午夜精品| 国产精品久久久人人做人人爽| 亚洲精华国产精华精| 精品国内亚洲2022精品成人| 欧美亚洲日本最大视频资源| 国产精品一区二区三区四区久久 | 免费观看精品视频网站| 欧美成人午夜精品| 欧美黄色片欧美黄色片| 久久久精品国产亚洲av高清涩受| 亚洲欧美精品综合一区二区三区| 99re在线观看精品视频| 亚洲欧美一区二区三区黑人| 亚洲avbb在线观看| 亚洲av五月六月丁香网| 岛国视频午夜一区免费看| 国产精品偷伦视频观看了| 久久人妻av系列| 女人被躁到高潮嗷嗷叫费观| 久久久久久久午夜电影 | 亚洲精品成人av观看孕妇| 丰满的人妻完整版| 亚洲五月婷婷丁香| 看黄色毛片网站| 成人国产一区最新在线观看| 91成年电影在线观看| 99久久精品国产亚洲精品| 亚洲专区字幕在线| 美女午夜性视频免费| 又大又爽又粗| 国产人伦9x9x在线观看| 国产精品综合久久久久久久免费 | 欧美日韩黄片免| 久久香蕉国产精品| 精品久久久久久电影网| 侵犯人妻中文字幕一二三四区| 国产精品国产av在线观看| 99久久国产精品久久久| 成人永久免费在线观看视频| 免费av毛片视频| 香蕉国产在线看| 久久国产亚洲av麻豆专区| 最好的美女福利视频网| 极品教师在线免费播放| 制服人妻中文乱码| 12—13女人毛片做爰片一| 免费高清在线观看日韩| 久久影院123| 成人av一区二区三区在线看| 久久精品影院6| 老司机福利观看| 国产精品99久久99久久久不卡| 国产黄a三级三级三级人| 免费在线观看黄色视频的| 欧美人与性动交α欧美软件| 日本 av在线| 69精品国产乱码久久久| 9191精品国产免费久久| 免费少妇av软件| 亚洲人成电影免费在线| 久久久久久久久中文| 搡老岳熟女国产| 女警被强在线播放| 在线观看66精品国产| 琪琪午夜伦伦电影理论片6080| 国产区一区二久久| 变态另类成人亚洲欧美熟女 | 国产蜜桃级精品一区二区三区| 在线观看日韩欧美| 一级毛片女人18水好多| 成人三级黄色视频| 久久精品成人免费网站| 我的亚洲天堂| 91成人精品电影| 成人手机av| 一边摸一边抽搐一进一出视频| 国产一区二区三区在线臀色熟女 | 超碰97精品在线观看| 久久久久久大精品| 老司机福利观看| 精品国产超薄肉色丝袜足j| 伊人久久大香线蕉亚洲五| 日本 av在线| 很黄的视频免费| 黑人操中国人逼视频| 精品国产亚洲在线| 一个人免费在线观看的高清视频| 成熟少妇高潮喷水视频| ponron亚洲| 欧美成人性av电影在线观看| 搡老熟女国产l中国老女人| 亚洲熟妇中文字幕五十中出 | 黄色成人免费大全| 亚洲av日韩精品久久久久久密| 欧美丝袜亚洲另类 | 天天躁夜夜躁狠狠躁躁| 在线看a的网站| 91大片在线观看| 婷婷精品国产亚洲av在线| 亚洲精品一区av在线观看| 久久久精品欧美日韩精品| 精品一区二区三区av网在线观看| 村上凉子中文字幕在线| 一级片免费观看大全| 黄色毛片三级朝国网站| 欧美黑人精品巨大| 日本一区二区免费在线视频| 亚洲午夜精品一区,二区,三区| 美女高潮到喷水免费观看| 成人影院久久| 女人高潮潮喷娇喘18禁视频| 又大又爽又粗| 手机成人av网站| 美女高潮到喷水免费观看| 亚洲男人的天堂狠狠| 亚洲伊人色综图| 午夜福利在线观看吧| 在线观看免费高清a一片| 亚洲熟妇中文字幕五十中出 | 久久国产乱子伦精品免费另类| 亚洲人成电影观看| 777久久人妻少妇嫩草av网站| 亚洲av日韩精品久久久久久密| 久久伊人香网站| 男女午夜视频在线观看| bbb黄色大片| 国产精品一区二区精品视频观看| 黑丝袜美女国产一区| 亚洲情色 制服丝袜| 搡老岳熟女国产| 99热国产这里只有精品6| 一级a爱视频在线免费观看| 久久久精品欧美日韩精品| 丰满迷人的少妇在线观看| 美女午夜性视频免费| 18禁黄网站禁片午夜丰满| 国产99白浆流出| cao死你这个sao货| 丝袜美足系列| 1024香蕉在线观看| 亚洲免费av在线视频| 每晚都被弄得嗷嗷叫到高潮| 一边摸一边抽搐一进一小说| 欧美乱色亚洲激情| 日韩三级视频一区二区三区| 高潮久久久久久久久久久不卡| av视频免费观看在线观看| 亚洲欧洲精品一区二区精品久久久| 搡老岳熟女国产| 日本wwww免费看| 天堂俺去俺来也www色官网| 一边摸一边抽搐一进一小说| 中文字幕精品免费在线观看视频| 成年人免费黄色播放视频| 黑人欧美特级aaaaaa片| 国产在线观看jvid| 一级作爱视频免费观看| 麻豆成人av在线观看| 69av精品久久久久久| 亚洲av片天天在线观看| 亚洲久久久国产精品| 亚洲情色 制服丝袜| 日韩精品免费视频一区二区三区| x7x7x7水蜜桃| 男人舔女人的私密视频| 中国美女看黄片| 黄色成人免费大全| 一夜夜www| 香蕉久久夜色| 亚洲中文av在线| 最近最新中文字幕大全电影3 | 国产成人精品在线电影| 国产激情欧美一区二区| 欧美老熟妇乱子伦牲交| 美女扒开内裤让男人捅视频| 成人三级黄色视频| 日本wwww免费看| 欧美日韩亚洲高清精品| 大香蕉久久成人网| 在线观看免费视频日本深夜| 亚洲黑人精品在线| 9热在线视频观看99| 欧美日韩乱码在线| 又黄又粗又硬又大视频| 90打野战视频偷拍视频| 看免费av毛片| 在线天堂中文资源库| 一级毛片女人18水好多| 国产一卡二卡三卡精品| 亚洲国产中文字幕在线视频| 亚洲片人在线观看| 婷婷丁香在线五月| 巨乳人妻的诱惑在线观看| 操美女的视频在线观看| 亚洲伊人色综图| 精品久久久久久电影网| 亚洲 国产 在线| 在线观看免费午夜福利视频| 少妇粗大呻吟视频| 国产av又大| 999久久久精品免费观看国产| www.www免费av| 黑人巨大精品欧美一区二区mp4| 欧美在线一区亚洲| 老司机亚洲免费影院| 夜夜爽天天搞| 亚洲五月色婷婷综合| 99riav亚洲国产免费| 777久久人妻少妇嫩草av网站| 一个人观看的视频www高清免费观看 | 人人妻人人添人人爽欧美一区卜| 国产一区二区激情短视频| 99精品在免费线老司机午夜| 国产一区二区激情短视频| 91精品国产国语对白视频| 在线天堂中文资源库| 亚洲 欧美一区二区三区| 国产精品九九99| 在线观看免费高清a一片| 国产精品日韩av在线免费观看 | 看免费av毛片| 99国产精品免费福利视频| 久久久久久久久免费视频了| 日本精品一区二区三区蜜桃| 国产在线精品亚洲第一网站| 深夜精品福利| 99精品在免费线老司机午夜| 亚洲熟妇熟女久久| 啦啦啦在线免费观看视频4| 99国产精品免费福利视频| 人妻丰满熟妇av一区二区三区| 久久久水蜜桃国产精品网| 亚洲 欧美一区二区三区| 国产一区二区在线av高清观看| 精品国内亚洲2022精品成人| 亚洲熟妇熟女久久| 在线观看舔阴道视频| 国产一区二区三区在线臀色熟女 | 中文字幕人妻丝袜一区二区| 人人妻人人添人人爽欧美一区卜| 99在线人妻在线中文字幕| 一区二区三区国产精品乱码| 女性生殖器流出的白浆| 国产精品野战在线观看 | 高潮久久久久久久久久久不卡| 欧美激情极品国产一区二区三区| 免费一级毛片在线播放高清视频 | av有码第一页| 黑人操中国人逼视频| 一夜夜www| 激情在线观看视频在线高清| 亚洲人成电影观看| 热re99久久精品国产66热6|