• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    UAVs cooperative task assignment and trajectory optimization with safety and time constraints

    2023-02-25 13:42:30DuoZhengYunfeiZhngFnLiPengCheng
    Defence Technology 2023年2期

    Duo Zheng , Yun-fei Zhng , Fn Li , Peng Cheng

    a UAV Autonomous Control Institute, Beijing Institute of Technology, Beijing,100081, China

    b Shanghai Institute of Mechanical and Electrical Engineering, Shanghai, 201100, China

    c CASIC Research Institute of Intelligent Decision Engineering, Wuhan,100074, China

    Keywords:Multi-UAV Cooperative attacks Task assignment Trajectory optimization Safety constraints

    ABSTRACT This paper proposes new methods and strategies for Multi-UAVs cooperative attacks with safety and time constraints in a complex environment.Delaunay triangle is designed to construct a map of the complex flight environment for aerial vehicles.Delaunay-Map, Safe Flight Corridor (SFC), and Relative Safe Flight Corridor (RSFC) are applied to ensure each UAV flight trajectory's safety.By using such techniques,it is possible to avoid the collision with obstacles and collision between UAVs.Bezier-curve is further developed to ensure that multi-UAVs can simultaneously reach the target at the specified time,and the trajectory is within the flight corridor.The trajectory tracking controller is also designed based on model predictive control to track the planned trajectory accurately.The simulation and experiment results are presented to verifying developed strategies of Multi-UAV cooperative attacks.

    1.Introduction

    UAVs are designed as an intelligent body of independent decision-making ability where multi-UAVs can perform complex tasks in coordination-this way of UAVs design is considered as the development trend of future UAVs.Simultaneously, breaking the limitations of traditional single-plane missions and using several UAVs to attack multiple targets in concert can effectively improve the damage efficiency and penetration probability, which will become an important combat mode in future wars.UAVs in complex environments(such as cities)have the advantages of hovering,reconnaissance, and flexibility.Rotor-wing drones (Loitering munition) have received widespread attention because a drone attack is quick, clean, and bloodless [1-4].For instance, Israel's“Firefly” and “Rotem” (shown in Fig.1) loitering munition, European GLMAV New concept loitering munition, Polish” dragonfly”loitering munition, are some examples of rotor-wing drones.Therefore, it is practical to study the cooperative attack of rotarywing UAVs in the complex combat environment.

    To improve combat effectiveness, UAVs require to simultaneously attack several known targets from multiple directions in the premise of ensuring safety.Also, the complexity of the urban environment exacerbates the difficulty of realization[5-7].Therefore,the original cooperative attack issues are divided into two sub-problems, which are multi-task assignment and cooperative trajectory planning.

    For task assignments, there is a large number of articles introduced in the literature.For UAVs search scenarios, the traveling salesman problem is often used to solve the problem realizing the traversal search of the target point by the UAV [8-10].For multimachine task allocation problems, mixed-integer optimization solutions are used for processing [11].Further, contract network solutions can effectively deal with task search and distribution problems according to different allocation costs[12,13].In addition,the problem of task allocation is the prerequisite of dealing with tasks in complex environments, and the problem of trajectory optimization is carried out on this basis.In this paper, instead of only considering the relationship between UAVs and the target, it opts to allocate the target based on the path planning result.

    Fig.1. Rotary-wing UAVs: (a) Rotem; (b) firefly.

    The problem of trajectory planning is to plan an optimal trajectory from the initial position to the end position with the safety and dynamic constraints [14].It is often carried out after the task assignment.An essential aspect of UAV autonomy is its ability to resolve encounters, which increases the difficulty of the solution[15].The classic UAVs trajectory problem commonly used a mixedinteger solver (MIQP).In Ref.[16], MIQP is utilized to enforce avoidance of both obstacles and other agents, at the expense of a long solution time;even the offline solution is also very difficult.In Ref.[17], Sequential Convex Programming (SCP) is adopted to convert nonconvex constraints into convex constraints.The optimal result is obtained by the iterative solution of the initial state.The result of this algorithm depends on the selection of the initial state,so it is more suitable as a local solver and is not suitable for complex environments.In Ref.[18], the artificial potential field method is used to establish the relationship between UAVs,and avoidance of other UAVs is carried out through repulsion.However,there was no solution that considered complex scenarios.Trajectory generation assisted by differential flatness property and geometric constrains has been becoming popular.Usually, a continuous convex SFC is established to constrain the trajectory of the UAVs so as to ensure that the constraint is a quadratic problem and solution time is finite[19-21].For the trajectory planning of multiple UAVs,the nature of the Bezier curve and the constraints of SFC are the best fit.Besides,the authors of Ref.[22]segmented the Bezier curve and increased the relative position constraints between the UAVs.A Relatively Safe Flight Corridor (RSFC) is utilized in Ref.[23]to achieve avoidance of the other UAVs based on a grid map; however, this method has disadvantages in a large map.In this paper, the property of RSFC and the design a novel method for generating collisionfree smooth multi-trajectory in Delaunay map are utilized.

    The contributions of this paper are as follows:

    (1) A path-based allocation method combined with an improved A* path search for finding the minimum cost function of multi-path.

    (2) A Delaunay-based SFC algorithm utilizes the convex hull of the Bezier curve that guarantees the avoidance of obstacles.

    (3) A Delaunay-based RSFC approach is based on the relative curve belonging to the Bezier curve to set the constraint to avoid collision of UAVs.

    (4) An impact time control strategy to realize the UAVs cooperatively attack the target at a specified time.

    The paper roadmap is as follows: Section 3 introduces the problem description and the mathematical formulation.Multiconstrain trajectory optimization and tracking control are described in section 4.The Delaunay-based SRF and Delaunaybased RSFC are detailed in section 5.In section 6, the simulation results and experiment are presented.The paper concludes in section 7.

    2.Problem description

    It is assumed that in a complex urban environment, there are multiple no-fly zones in a typical combat area (such as obstacles,enemy detection radars, firepower points, etc.).To implement the penetration as much as possible and increase the damage efficiency, it is necessary to attack targets simultaneously and avoid collision of obstacles and other UAVs.

    As can be seen in Fig.2,there are multiple UAVs,UAV1UAV2,…UAVnU,and multiple mission target points,TA1TA2,…TAnTA,in the mission scenario.Considering the mission success probability and improving the damaging effect under actual conditions, the number of UAVs should be more than the target points.

    2.1.Problem decomposition

    According to Fig.2, to simplify the problem's difficulty, the entire task can be divided into two core tasks:task assignment and trajectory optimization.

    Task 1: Multi-target task assignment.

    Multi-task target allocation uses UAV resources to complete multi-target attacks at the lowest possible cost.Its mathematical expression can be expressed in the form of mixed-integer optimization, as stated in Eq.(1):

    whereiurepresents theith UAV,itrepresents theith target point,Liu,itrepresents the length between theith UAV and theith target,ηiu,itrepresent the allocation array between UAV and target, andf(x)represents the cost between the UAViuand the target pointit.Eq.(1) aims to achieve the optimal cost function by assigning a corresponding target point to each UAV.

    Fig.2. Multi-UAVs attack task scenario.

    Task 2: Trajectory planning with a safety constraint.

    To ensure the feasibility of executing the task, the planned trajectory needs to meet the constraints of obstacle avoidance and collision avoidance,time,and dynamics.The constraints of obstacle avoidance and collision avoidance,shown in Fig.2,are expressed by the following Eq.(2):

    wherer1is the safe distance ofUAV1,r2is the safe distance ofUAV2,r3is the assumed obstacle threat distance,d1is the distance betweenUAV1andUAV2,andd2is the distance between obstacle and UAV.

    2.2.Dynamic modeling

    Considering quadrotor UAV as the research object, its dynamic model can be described by 12 state quantities,ωx,ωy,ωz].Following the footsteps of Ref.[15],state variables of the UAV are simplified.Some of them are selected;all other state variables are expressed through partial state variables and partial state variable derivatives.The flat output of the UAV system can be obtained using Eq.(3):

    3.Map building and multi-targets attack task allocation

    3.1.Map building and path search

    Due to the complex and changeable presence of the battlefield environment, including radar detection, electromagnetic interference, enemy firepower, and many other threats, it poses severe challenges to the UAVs' mission.Moreover, these threats often cover irregular areas.The smallest circle is used to cover these danger factors,and the circular area is completely avoided through the path search algorithm.Furthermore,the absolute safety of the UAV flight path is ensured.Therefore, this paper chooses the Delaunay triangle method to divide the map.The construction method is as follows:

    Step 1: Construct a super triangle, including all no-fly zones.

    Step 2:Insert the scattered points in the no-fly zone one by one.

    (1) Find the triangle whose circumcircle contains the insertion point in the triangle list (called the influence triangle of the point).

    (2) Delete the common side of the influence triangle.

    (3) Set the insertion point and all of the influence triangle.The vertices are connected to complete the insertion of a point in the Delaunay triangle linked list.

    Step 3: Repeat step 2 until all the scattered points are inserted.

    The Delaunay triangle takes the centers of various threats as nodes, divides the map according to the concept of maximum and minimum angles, and constructs the smallest triangle with the threat center as the vertex.The Delaunay triangle is described in Fig.3.Finally, the UAV position node is connected to the nearest node.Besides, the target position node is connected to the closest three nodes.On this basis,the path is searched with the midpoint of the triangle edge as the feasible path node.The waypoints obtained through the above construction method have the largest distance to the nearest threat node, ensuring the safety of the path.

    Fig.3. Search map.

    Since the map is constructed through the Delaunay triangle,the number of nodes on the map is limited.The path search can be performed by heuristic algorithms such as A* algorithm.The construction method of A* algorithm includes the cost function and heuristic function of node transfer, as given in Eq.(4) and Eq.(5)

    whereg(n)is the cost function of the distance between nodes,andh(n) is the heuristic function.

    wheredn,n+1is the distance between the path node n and path nodesn+ 1, which represents the node transfer cost and is normalized by the scale factor α.

    On the one hand,the Delaunay map guarantees the safety of the node at the midpoint of the triangle edge.On the other hand, it omits safety on the connecting line.So, the connecting line from node n to noden+1 is divided intoNparts and provide a cost function to value the relative safety and absolute safety.Then, the minimum distance betweenNnodes to the nearest obstacle is calculated, and make a judgment.If the minimum distance is less than the safety distance,r3,the minimum distance is set to 0.1 m to guarantee absolute safety.The relative safety function is calculated by Eq.(6)

    To test the path safety,the map is established,and the test result is computed, as shown in Fig.4.

    An optimal path can be searched through the above method in which the path cost and the threat cost are comprehensively considered.The optimal path is described in Fig.5.

    3.2.Multi-targets attack task allocation with multi-angle constrains

    To achieve multi-target coordinated attacks with little energy consumption, multiple targets need to be optimally allocated.Taking energy loss, threat factors, attack strength, and UAV distribution into account for target allocation, the cost functionf({Ui},{TAj},{Obsk}) is constructed, given by Eq.(7).

    where[γ1,…,γit]represents the mapping between UAVsU1,…,Unuand target pointsTA1,…,TAnt, μforce[γ1,…,γit] represents the coordinated attack force, and μspread[γ1,…,γit] represents the distribution of UAVs.The function form is represented by Eq.(8)and Eq.(9).

    wherem(it) represents the number of UAVs attacking the same target.

    Fig.4. Safety test.

    wheren(TA) represents the number of targets that are attacked.

    In order to comprehensively consider these factors,the optimal cost function is obtained by optimizing the allocation of UAVs,and the optimization model can be expressed as the following form:

    In order to increase the attack force and the success rate of combat missions to target points, the path of UAVs with the same mission and attack direction will be re-planned.Utilizing the end position node's connection method,we select other nodes with the same son-node (endpoint) as a new attack direction.

    4.Multi-constrain trajectory optimization and tracking control

    According to the above-mentioned path search method, the path of each UAV can be generated.Then,on this basis,a trajectory optimization algorithm is used to generate a flyable trajectory for minimum Jerk with obstacle avoidance and other UAVs constraints.The convex hull properties and the initial endpoint of the Beizer curve are used to optimize the trajectory.

    Fig.5. Search path.

    4.1.Delaunay-based SFC for obstacle avoidance

    UAVs cannot traverse every point on the original path to achieve collision avoidance between UAVs and satisfy UAVs' dynamic constraints.This is due to the coincident points on the original planned path are more likely to cause collisions between UAVs.Also, the flyable range of UAVs is expanded on the premise of safety.Moreover, expanding the flying area of UAVs establishes safe flight corridors for UAVs.Here,we utilize Berstein's convex hull property to constrain the optimal trajectory into the safety flight corridor to guarantee the UAV's safety.Then, a rectangular safety flight corridor (SFC) is established to meet the following constraints:

    Among them, F represents free space and⊕is the sum of Minkowski.Besides, constraint (1) ensures the safety of SFC, and constraint (2) guarantees the continuity of SFC, which means that the intersection part connects the generated multiple trajectories.Each UAV path is obtained through the above map construction mode,task allocation,and search algorithm.To establish Delaunaybased SFC,the corridor along the axis direction is expanded,and it must be expanded in the direction of the vertical axis.The generated SFC is described in Fig.6.

    The expression of constraint conditions is as follows:

    Coupled with the initial position,velocity,and acceleration,the Inequality constraints are further increased.

    Since the flight corridor is not expanded along the map axis direction but along the waypoints, the trajectory in thexorydirection cannot be planned independently but optimized by coupling.

    4.2.Delaunay-based RSFC for collision avoidance

    By establishing the above safe flight corridor,collision avoidance can be achieved as long as the path is in the safe flight corridor.Furthermore,the flight corridor's relative path is also established to ensure collision avoidance between UAVs.Assuming a relatively safe flight corridor for UAVsiandj,and this corridor is a relatively safe flight corridor that does not include the collision area,then the relative flight corridor (RSFC)satisfies the following constraints:

    Fig.6. SFC for obstacle avoidance.

    Among these constraints,Ci,jrepresents the relative collision model generated by the safety distance.Also,it is assumed that the safety radius of the UAViisri,and the safety radius of the UAVjisrj.Then, the relative collision model is considered as a square with a side length 2(ri+rj).Therefore,constraint(1)ensures the safety of the relative corridor, and constraint (2) ensures the continuity of the relatively safe corridor.

    Since the map is constructed by the Delaunay triangle method,and the midpoint of the triangle is used as the path point,there are more overlapping nodes, which will cause the RSFC to be constructed unreasonably.Delaunay-based RSFC is constructed as follows:

    Firstly,SFC constraints are applied to the UAV,and the optimized trajectory is obtained.

    Secondly,the characteristic points on the trajectory are selected according to a certain time step,and the RSFC is constructed by the relative position relationship of the nodes corresponding to the optimized path.This step will increase the solution time but improve the feasibility of the solution.

    Next, the way to build the flight corridor is considered.In the two-dimensional plane, μ∈{+x,-x,+y,-y} represents the axis direction,nμrepresents the unit vector, and the relative positionsatisfies constraint given in Eq.(12).

    Fig.7. RSFC for collision avoidance.

    Fig.8. Situation of discontinuous RSFC situation: (a) Dispute node; (b) opposite node.

    Fig.9. Control loop of trajectory tracking.

    4.3.Time management

    Simultaneously reaching multi-target UAV attacks is the key.Simultaneous attacks on a single target and multiple UAVs can increase the final attack strength.To achieve the required tasks, the first step is to obtain the total planning time.Since UAVs are required to arrive simultaneously, each UAV's timeTis the same.The longest path of all UAVs is selected as the reference path length.The total length of time is calculated based on the average speed of the UAV.Next, time distribution is performed according to the proportion of the segmented path to the respective path of the UAV,and the timeon each node path is obtained.Therefore, the collision avoidance algorithm is introduced in this article.The trajectory of the UAV must be limited to the safe flight corridor.Also,it is necessary to determine the constraint time of different RSFCs on the trajectory, allocate a reasonable time node, and realize the conversion of RSFC.(t) is the waypoint ofmtrajectory,t∈Then the time of theith UAV is expressed in Eq.(13).

    In algorithm 2, the generation method of segment time is introduced.The inputs of the algorithm are the RSFC and the originally generated trajectory of each UAV.The algorithm establishes the relationship between the previous RSFC and the next RSFC by counting the number of original path points at the intersection of the two flight corridors (line 8 in the algorithm).However, there may be cases where the relative path is not on the intersection of RSFC (line 11 in the algorithm).In this case, we do not use the above method because the simultaneous conversion of SFC and RSFC will generate infeasible constraints.Instead,we use a heuristic method to set a delay to ensure that SFC and RSFC will not change simultaneously.This will increase the number of variables that need to be optimized,but this algorithm will ensure providing a feasible solution.

    After generating local time trajectories, we integrate the trajectories of the relevant UAVs.Remove duplicate time elements and reorder.The total time segment generated is applied to the trajectory of the associated UAV.

    4.4.Trajectory optimization based on Bezier curve

    Trajectory optimization is to smooth the generated path points and meet the previously set time constraints for obstacle avoidance, collision avoidance, and simultaneous arrival.Coupled with UAVs'differential flatness,it is best to use the Bezier curve as UAVs'optimal trajectory.The Bezier curve is constructed based on the Bernstein polynomial:

    The expression of the Bezier curve is stated in Eq.(14).

    where the target is the λ th trajectory expression ofUAVi,is the weight function,bλ,k(t) is also called Bernstein polynomial,irepresents theith UAV, λ represents the λ th segmented curve.The expressionbλ,ib(t) is given by Eq.(15).

    Among them,Nmeans that there areNcontrol points in this segment curve of UAV.In order to meet the time constraints of different periods, the time is mapped to τλ∈[0,1].

    The Bezier curve has a convex hull property, which means that the curve is restricted to the convex hull formed by the control points,which can fit the safe flight corridor well and ensure that the UAV generates the trajectory is constrained in the safe corridor.

    On the relative path, suppose one segment is the trajectory ofUAVi, and the other is the trajectory ofUAVj.By the integration of the above methods, the two UAVs are divided into the same number of segments, and the time for each segment of the two UAVs is also the same.Therefore, the relative trajectory is expressed, as stated in Eq.(17).

    From the above equation, it can be seen that the relative trajectory between UAVs also fits the Bezier curve.Besides,the relative trajectory satisfies the convex hull property.Consequently, the control points of the corresponding segment of the original trajectory can be constrained to achieve the constraint on the relative trajectory and avoid collisions.

    The cost function of the polynomial is as follows:

    where λ is the λ th segment ofM.tλ is the time of λ th segment.Minimum target is theJerk.This minimizes the maneuvering of the UAV.

    The smoothing constraints of the initial location point, the end location point, and the path point can be summarized as equation constraints.Therefore, our trajectory generation problem can be summarized as a linear quadratic programming problem.

    where Q is the Hessian matrix,and Q is the Hessian matrix of each UAV formed by diagonal connections.We only need one QP problem to solve all smooth trajectories.

    4.5.Model prediction tracking

    To achieve engineering applications, we provide a trajectory method to test the flyable of optimal trajectory.This paper uses model predictive control to track the generated trajectory.Model predictive control mainly has three aspects, predictive model,rolling optimization, and feedback correction.

    Since the system’s real-time state is measurable, a model predictive controller based on the state equation is established.The UAV needs to track the position, speed, and acceleration of the tracking design curve.The state equation is described using the following equations.

    where x = [p,v,a]T,u=Jerk,

    Suppose that the system input changes inMsteps from the momentk, and it acts on the system state at the nextP(P=M)moments.

    Converted into vector description form:

    where,

    Table 1Environment information in the simulation.

    Fig.10. Multi-target allocation and optimal trajectory.

    Consider determining theMcontrol variables fromkso that the predicted output value of the controlled object atPin the future is as close as possible to the expected value.We approximately write out the vector form of performance indicators as

    Since the state quantity x(k)is measurable,the prediction made at each moment can be optimized.Besides, the measurement x(k)can be used as the initial position,which means that the prediction and optimization are all based on the system's real-time feedback information.Because of realizing feedback correction, no need to introduce additional correction measures.

    Fig.11. Simulation results:(a)Trajectory optimization and tracking;(b)Tracking result of px;(c)Tracking result of py;(d)Tracking result of vx;(e)Tracking result of vy;(f)Relative distance between UAVs.

    Table 2UAVs impact time in the simulation.

    Table 3Environment information in the experiment.

    Fig.12. Multi-target allocation and optimal trajectory in the actual environment.

    5.Simulation and experiment

    In order to verify the feasibility of the developed strategy for the multi-target cooperative attack,a test in the DJI simulation and the actual environment is performed.

    Fig.13. Experimental platform.

    Table 4M210 parameters.

    5.1.Simulation validate

    The developed method in this paper is first tested in DJI simulation environment,DJI Assistant 2 For Matrice.A virtual map of 800×800 m2is created,in which there are 5 UAVs,3 target points,and several obstacles.The map information is shown in Table 1.

    According to the proposed strategies, a search map is established in the simulation environment, and trajectory planning is performed to obtain the coordinated multi-directional attack path.The safety distanced1=6 m is set; also, the constraints of SFC,RSFC, and attack angle are added.The results of target allocation and optimal trajectory is given in Fig.10.

    The simulation test to the trajectory is set as follows:

    The gains of the tracking controller are set to ω1= 5,ω2= 0.1,ω3=0.01.To avoid the collision among drones at the endpoint,the stop condition s is set in which the miss distance is less than 4.2 m.

    The result of the simulation is shown in Fig.11.

    As can be seen in Fig.11, the results are shown in different charts.Fig.11(a)shows that the UAVs can accurately track the preplanned trajectory, avoid the obstacle, and reach the target position.Fig.11(b) and Fig.(c) show that in any axis direction position tracking, the position tracking error is within 2 m.Fig.11(d) and Fig.11(e) show that UAVs can track the predetermined velocity within the error of 0.3 m/s in any axis direction.We can see that the trajectory ofUAV5has a safety distance from other UAVs.Therefore, we only need to pay more attention to the relative distance betweenUAV3andUAV4,UAV1andUAV2.The results are confirmed in Fig.11(f).We can argue that when the relative distances are all greater than the required safety distance, UAVs can ensure that they avoid collisions with each other due to the task requirementUAV1andUAV2are allocated to attack targetTA2,UAV3andUAV4attack targetTA1.Therefore, they end up in the same target position,and the relative distance between UAVs is no longer restricted by the safety distance, shown as a circle in Fig.11(f).

    In order to obtain the effectiveness of cooperation attack,UAVs are required to arrive at the target as possible at the same time;the results of the impact time for each UAV are shown in Table 2.

    It can be concluded from Table 2 that the error between tracking results and pre-planned trajectory results is less than 1 s.The deviation of impact time of all UAVs is within 0.5 s,so we can say that all UAVs almost reach the target at the same time.

    5.2.Experiment result

    To verify the cooperation attack's actual performance, the preplanned trajectory was tracked and tested in the actual environment.We set virtual no-fly-zones in the actual environment,and its parameters are shown in Table 3.

    The experiment platform is given in Fig.13,which uses the M210 drone, firmware version 01.00.0590, and NUC8i7BEH onboard computer (see Fig.12).The key parameters of M210 are shown in Table 4.

    We set the gain of the trajectory tracking controller ω1=5,ω2=0.1, ω3= 0.01.The experimental result of trajectory tracking is shown in Fi.14.Also, the single direction of the position and the velocity following results are given in Fig.14(b) and Fig.14(c),Fig.14(d) and Fig.14(e), respectively.

    According to Fig.14(a),Fig.14(b),and Fig.14(c),it is shown that the UAVs can follow the pre-planned trajectory within the error of 2 m avoiding the virtual obstacle and reaching the allocated target position.Fig.14 (d) and 14(e) show that the UAVs follow the predetermined velocity within the error of 0.5 m/s.We show the relative distance result in Fig.14(f).From the experiment, we can see that both relative distances betweenUAV1andUAV5,UAV3andUAV4satisfy the safety distance constraints, and the relative distance is greater thand1.

    Table 5 shows the statistical results of the UAVs’ impact time.We could see that the impact time error between each UAV is less than 0.6 s,which means that the UAVs simultaneously attack three targets.The table also shows that the error of impact time between pre-planned trajectory and tracking result is less than 0.3 s.This proves that the UAVs can attack three targets at the specified time.

    Fig.14. Experiment results:(a)Trajectory tracking;(b)Tracking result of px;(c)Tracking result of py;(d)Tracking result of vx;(e)Tracking result of vy;(f)Relative distance between UAVs.

    Table 5UAVs impact time in the experiment.

    6.Conclusions

    This paper develops a novel strategy for task assignment and cooperation trajectory optimization of a UAVs group in a complex environment.The original problem is transformed into two subproblems, multi-target task assignments, and cooperation trajectory optimization.For UAVs task allocation, the proposed method utilized the multi-target allocation based on a search path to ensure that the task assignment's result has a feasible solution for planning trajectory.A Delaunay map for path planning was formed, taking the UAV path into account to enforce safety and minimum energy consumption.In cooperation trajectory optimization, UAV’s maneuverability, safety, and impact time constraints were considered.Compared with previous work, Delaunay-based SFC and Delaunay-based RSFC have been adapted to avoid obstacles collision and collision with other UAVs.The time scale factor is also to ensure the UAVs impact at the same time.In future work, the constraints of Delaunay-based RSFC will be further optimized,or a more efficient method will be studied to improve the success rate of an algorithm solution.

    Funding information

    National Natural Science Foundation of China (No.61903350),Beijing Institute of Technology Research Fund Program for Young Scholars.

    Declaration of competing interest

    The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

    性色avwww在线观看| 色哟哟·www| 久久久国产成人精品二区| 日韩欧美三级三区| 亚洲欧美日韩东京热| 亚洲成人一二三区av| 美女cb高潮喷水在线观看| av又黄又爽大尺度在线免费看| 日日啪夜夜撸| 黑丝袜美女国产一区| 99久久人妻综合| 久久青草综合色| 国产亚洲欧美精品永久| 日本色播在线视频| 日本免费在线观看一区| 久久久久国产网址| 在线观看免费视频网站a站| 国产乱来视频区| 18禁裸乳无遮挡免费网站照片| 一级a做视频免费观看| 亚洲美女黄色视频免费看| 日韩,欧美,国产一区二区三区| 少妇人妻精品综合一区二区| 91狼人影院| 狂野欧美激情性bbbbbb| 国产免费视频播放在线视频| 日本猛色少妇xxxxx猛交久久| 少妇被粗大猛烈的视频| 三级国产精品欧美在线观看| 亚洲成色77777| 男女无遮挡免费网站观看| 如何舔出高潮| 在现免费观看毛片| 99九九线精品视频在线观看视频| 国产一区亚洲一区在线观看| 美女国产视频在线观看| 街头女战士在线观看网站| 亚洲,欧美,日韩| 联通29元200g的流量卡| 国产精品久久久久久精品古装| 中文乱码字字幕精品一区二区三区| 色视频在线一区二区三区| 国产一区亚洲一区在线观看| 久久精品久久久久久噜噜老黄| 这个男人来自地球电影免费观看 | 日韩av免费高清视频| 午夜福利网站1000一区二区三区| 日日摸夜夜添夜夜添av毛片| 中文字幕亚洲精品专区| 亚洲色图综合在线观看| 各种免费的搞黄视频| 深夜a级毛片| 高清午夜精品一区二区三区| 中国美白少妇内射xxxbb| 涩涩av久久男人的天堂| 亚洲欧美日韩卡通动漫| 男女边吃奶边做爰视频| 久久久久精品久久久久真实原创| 免费人妻精品一区二区三区视频| www.av在线官网国产| a级一级毛片免费在线观看| 国产欧美日韩一区二区三区在线 | 国产高清三级在线| 日本欧美国产在线视频| 久久久精品94久久精品| 久久久久久久久大av| 日韩一本色道免费dvd| 免费观看在线日韩| 久久久久久久久久成人| 夜夜爽夜夜爽视频| 干丝袜人妻中文字幕| 国产老妇伦熟女老妇高清| 美女内射精品一级片tv| 人人妻人人添人人爽欧美一区卜 | 欧美zozozo另类| 激情 狠狠 欧美| 一边亲一边摸免费视频| 亚洲伊人久久精品综合| 国产午夜精品久久久久久一区二区三区| 制服丝袜香蕉在线| 国产精品一区二区在线观看99| 高清视频免费观看一区二区| 赤兔流量卡办理| 美女中出高潮动态图| 最近最新中文字幕大全电影3| 妹子高潮喷水视频| 婷婷色av中文字幕| 中文字幕制服av| 亚洲国产av新网站| 日本与韩国留学比较| www.av在线官网国产| 国产成人精品一,二区| 97在线人人人人妻| 亚洲图色成人| 如何舔出高潮| 午夜激情福利司机影院| 51国产日韩欧美| 王馨瑶露胸无遮挡在线观看| 天美传媒精品一区二区| 黑人猛操日本美女一级片| av一本久久久久| 亚洲av男天堂| 国产精品爽爽va在线观看网站| 在线观看国产h片| 日本猛色少妇xxxxx猛交久久| 日韩三级伦理在线观看| 久久99精品国语久久久| 日韩一本色道免费dvd| 亚洲综合色惰| 男女边摸边吃奶| 我的老师免费观看完整版| 欧美区成人在线视频| 在线天堂最新版资源| 国产成人精品久久久久久| 男的添女的下面高潮视频| 人妻制服诱惑在线中文字幕| 尾随美女入室| 在线观看一区二区三区激情| 亚洲第一av免费看| 在线观看一区二区三区激情| av在线app专区| 女的被弄到高潮叫床怎么办| 特大巨黑吊av在线直播| 嘟嘟电影网在线观看| 国产视频内射| 免费黄网站久久成人精品| 在线亚洲精品国产二区图片欧美 | 五月开心婷婷网| 欧美人与善性xxx| 日日摸夜夜添夜夜添av毛片| 人妻一区二区av| 日韩国内少妇激情av| 中文资源天堂在线| 国产成人午夜福利电影在线观看| 亚洲精华国产精华液的使用体验| 精品少妇黑人巨大在线播放| 99re6热这里在线精品视频| 日韩在线高清观看一区二区三区| 嘟嘟电影网在线观看| 高清毛片免费看| 国产深夜福利视频在线观看| 亚洲精品一区蜜桃| 欧美日韩亚洲高清精品| 国产精品久久久久久精品电影小说 | 日本爱情动作片www.在线观看| 少妇猛男粗大的猛烈进出视频| 一级毛片久久久久久久久女| 一级毛片久久久久久久久女| 97热精品久久久久久| 亚洲国产色片| 久久久久网色| 秋霞在线观看毛片| 韩国高清视频一区二区三区| 99热全是精品| 青春草国产在线视频| 亚洲精品中文字幕在线视频 | 国产精品一及| 亚洲av福利一区| 亚洲内射少妇av| 亚洲欧洲国产日韩| 视频区图区小说| 蜜臀久久99精品久久宅男| 日本黄色日本黄色录像| 大香蕉久久网| 国产女主播在线喷水免费视频网站| 欧美亚洲 丝袜 人妻 在线| 婷婷色综合大香蕉| 26uuu在线亚洲综合色| 亚洲熟女精品中文字幕| 一区二区三区精品91| 中文字幕av成人在线电影| 婷婷色麻豆天堂久久| 亚洲第一区二区三区不卡| 黑丝袜美女国产一区| 美女脱内裤让男人舔精品视频| h日本视频在线播放| 久久婷婷青草| 男女无遮挡免费网站观看| 国产av一区二区精品久久 | 内射极品少妇av片p| 人体艺术视频欧美日本| 久久这里有精品视频免费| 欧美日本视频| 久久亚洲国产成人精品v| 国产伦在线观看视频一区| 亚洲国产高清在线一区二区三| 日本黄大片高清| 婷婷色麻豆天堂久久| 欧美日韩在线观看h| 欧美精品一区二区免费开放| 成人国产麻豆网| av一本久久久久| 丰满乱子伦码专区| 美女内射精品一级片tv| 午夜激情福利司机影院| 成年av动漫网址| 性色av一级| 欧美丝袜亚洲另类| 秋霞在线观看毛片| av在线老鸭窝| 色5月婷婷丁香| 亚洲av欧美aⅴ国产| 亚洲欧美成人综合另类久久久| 九色成人免费人妻av| 国产91av在线免费观看| av在线app专区| 国产成人一区二区在线| 国产av精品麻豆| 国产永久视频网站| 国产伦精品一区二区三区视频9| 大片电影免费在线观看免费| 青青草视频在线视频观看| 午夜福利影视在线免费观看| 美女高潮的动态| 久久久精品免费免费高清| 成人免费观看视频高清| 免费人妻精品一区二区三区视频| 国产男女内射视频| 精品久久久精品久久久| 日本黄色片子视频| 一个人免费看片子| 亚洲最大成人中文| 国产精品偷伦视频观看了| 亚洲一级一片aⅴ在线观看| 九色成人免费人妻av| 99久久综合免费| 超碰97精品在线观看| 成年女人在线观看亚洲视频| 日韩国内少妇激情av| 亚洲激情五月婷婷啪啪| 久久久久久久久大av| 久久精品久久精品一区二区三区| 欧美xxxx性猛交bbbb| 精品亚洲成国产av| 少妇的逼水好多| 波野结衣二区三区在线| 国产精品成人在线| 大码成人一级视频| 嫩草影院新地址| 日韩一区二区三区影片| 久久精品熟女亚洲av麻豆精品| 日韩,欧美,国产一区二区三区| 欧美日韩视频精品一区| 一边亲一边摸免费视频| 在线观看美女被高潮喷水网站| 久久久久国产精品人妻一区二区| 直男gayav资源| 国产精品国产av在线观看| 插逼视频在线观看| 深夜a级毛片| 久久ye,这里只有精品| 女性被躁到高潮视频| 国产精品蜜桃在线观看| 久久久久久久亚洲中文字幕| 国产一区二区三区综合在线观看 | 亚洲人成网站在线观看播放| 黄色日韩在线| 国产高潮美女av| 2022亚洲国产成人精品| 亚洲欧美成人综合另类久久久| 97在线视频观看| 久久青草综合色| 日韩一区二区三区影片| 最近最新中文字幕大全电影3| 亚洲最大成人中文| 你懂的网址亚洲精品在线观看| 日日啪夜夜撸| 亚洲国产精品专区欧美| 夫妻午夜视频| 国产精品一区www在线观看| 欧美 日韩 精品 国产| 国产成人一区二区在线| 亚洲av欧美aⅴ国产| 亚洲国产精品专区欧美| 亚洲高清免费不卡视频| 久热久热在线精品观看| 精品少妇黑人巨大在线播放| 久久热精品热| 国产成人91sexporn| 免费观看无遮挡的男女| 国产一级毛片在线| 在线观看一区二区三区激情| 人体艺术视频欧美日本| 七月丁香在线播放| 少妇猛男粗大的猛烈进出视频| 麻豆乱淫一区二区| 久久婷婷青草| 老司机影院毛片| 国内揄拍国产精品人妻在线| 亚洲色图综合在线观看| 国产亚洲一区二区精品| 国产淫语在线视频| 国产欧美亚洲国产| 91aial.com中文字幕在线观看| 久久青草综合色| 嘟嘟电影网在线观看| 国产成人freesex在线| 欧美精品一区二区免费开放| 青春草亚洲视频在线观看| 国产人妻一区二区三区在| 蜜桃亚洲精品一区二区三区| 人妻一区二区av| 日产精品乱码卡一卡2卡三| 一本色道久久久久久精品综合| 午夜免费鲁丝| 欧美日韩亚洲高清精品| 99re6热这里在线精品视频| 在线观看av片永久免费下载| 亚洲国产欧美在线一区| 亚洲四区av| 在线观看一区二区三区激情| 天堂中文最新版在线下载| 亚洲精品日韩av片在线观看| 亚洲色图综合在线观看| 在线亚洲精品国产二区图片欧美 | 国产成人精品婷婷| 免费观看的影片在线观看| 妹子高潮喷水视频| 黄色一级大片看看| 国产熟女欧美一区二区| 精品午夜福利在线看| av不卡在线播放| 久久久a久久爽久久v久久| 熟女电影av网| 国产欧美另类精品又又久久亚洲欧美| 在线观看免费高清a一片| 超碰97精品在线观看| 亚洲精品中文字幕在线视频 | 欧美一区二区亚洲| 女人十人毛片免费观看3o分钟| 中文字幕制服av| 久久久久久久久久成人| 午夜福利高清视频| 99久久中文字幕三级久久日本| 六月丁香七月| 免费黄网站久久成人精品| 看免费成人av毛片| 国产成人免费观看mmmm| 精品久久久久久久末码| 极品教师在线视频| 伦精品一区二区三区| 国产一区二区三区av在线| 嫩草影院新地址| 国产中年淑女户外野战色| 久久久精品免费免费高清| freevideosex欧美| 狂野欧美激情性xxxx在线观看| 晚上一个人看的免费电影| 高清视频免费观看一区二区| 免费人妻精品一区二区三区视频| 我要看日韩黄色一级片| 久久人人爽人人片av| 蜜桃在线观看..| 91aial.com中文字幕在线观看| 在线观看国产h片| 日韩 亚洲 欧美在线| 免费人成在线观看视频色| 三级国产精品欧美在线观看| 欧美精品国产亚洲| 狂野欧美激情性bbbbbb| 欧美激情国产日韩精品一区| 日本wwww免费看| 老司机影院成人| a级一级毛片免费在线观看| 日韩av在线免费看完整版不卡| 97在线视频观看| 色婷婷久久久亚洲欧美| 国产亚洲av片在线观看秒播厂| 国产黄片美女视频| 亚洲国产av新网站| 插阴视频在线观看视频| 国产高清三级在线| 久久99蜜桃精品久久| 18禁在线无遮挡免费观看视频| videos熟女内射| 久久人妻熟女aⅴ| 99热网站在线观看| 久久久国产一区二区| 欧美激情极品国产一区二区三区 | av又黄又爽大尺度在线免费看| 男的添女的下面高潮视频| 久久久国产一区二区| 老司机影院成人| 久久毛片免费看一区二区三区| 精品久久久久久久久亚洲| av不卡在线播放| 免费看日本二区| 国产av码专区亚洲av| 国产成人免费观看mmmm| 久久久久性生活片| 色综合色国产| 各种免费的搞黄视频| 国产精品99久久99久久久不卡 | 80岁老熟妇乱子伦牲交| 国产免费福利视频在线观看| 爱豆传媒免费全集在线观看| 久久人人爽人人片av| 成人高潮视频无遮挡免费网站| 少妇人妻 视频| 春色校园在线视频观看| 80岁老熟妇乱子伦牲交| 在线观看一区二区三区| 性色avwww在线观看| 99热这里只有是精品50| 免费高清在线观看视频在线观看| 卡戴珊不雅视频在线播放| av专区在线播放| 精品久久久久久久久亚洲| 中文字幕精品免费在线观看视频 | 久久久欧美国产精品| 免费观看a级毛片全部| 日本一二三区视频观看| 精品视频人人做人人爽| 一区二区三区精品91| 一本久久精品| 色5月婷婷丁香| 日韩不卡一区二区三区视频在线| 性色avwww在线观看| 欧美一级a爱片免费观看看| 亚洲美女黄色视频免费看| 亚洲欧美日韩卡通动漫| 久久这里有精品视频免费| 视频区图区小说| 久久精品夜色国产| 色网站视频免费| 国产高清国产精品国产三级 | 自拍偷自拍亚洲精品老妇| 丰满少妇做爰视频| 中文字幕久久专区| 亚洲成人中文字幕在线播放| av国产久精品久网站免费入址| 人人妻人人看人人澡| 免费播放大片免费观看视频在线观看| 春色校园在线视频观看| 日韩,欧美,国产一区二区三区| 欧美精品国产亚洲| 久久久久久久国产电影| 日韩人妻高清精品专区| 亚洲高清免费不卡视频| 日韩成人伦理影院| 日本vs欧美在线观看视频 | 中国美白少妇内射xxxbb| 亚州av有码| 纯流量卡能插随身wifi吗| 汤姆久久久久久久影院中文字幕| 亚洲av免费高清在线观看| 久久鲁丝午夜福利片| 十分钟在线观看高清视频www | 久久韩国三级中文字幕| 日韩电影二区| 成人国产麻豆网| 人妻少妇偷人精品九色| 在线精品无人区一区二区三 | 伊人久久国产一区二区| 只有这里有精品99| 老司机影院成人| 国产在线免费精品| 国产精品一区二区在线不卡| 久久精品国产亚洲av天美| 亚洲一区二区三区欧美精品| av国产久精品久网站免费入址| 国产白丝娇喘喷水9色精品| 成人无遮挡网站| 国产伦理片在线播放av一区| 精品国产三级普通话版| 亚洲精品中文字幕在线视频 | 中文在线观看免费www的网站| 婷婷色综合大香蕉| 亚洲av免费高清在线观看| 老司机影院毛片| 91久久精品国产一区二区成人| 国产av一区二区精品久久 | 99久国产av精品国产电影| 五月开心婷婷网| 欧美性感艳星| 国产欧美日韩精品一区二区| 日韩大片免费观看网站| 男人狂女人下面高潮的视频| 亚洲精品自拍成人| 精品久久久久久久末码| 成人高潮视频无遮挡免费网站| 精品一区在线观看国产| 国产日韩欧美在线精品| 91aial.com中文字幕在线观看| 乱系列少妇在线播放| 国产av码专区亚洲av| 视频中文字幕在线观看| 亚洲精华国产精华液的使用体验| 在线观看三级黄色| 亚洲美女搞黄在线观看| 欧美日韩在线观看h| 国产中年淑女户外野战色| 免费观看在线日韩| 一级二级三级毛片免费看| 国产亚洲av片在线观看秒播厂| 最新中文字幕久久久久| 性色av一级| 亚洲精品久久久久久婷婷小说| 中文乱码字字幕精品一区二区三区| 国产av精品麻豆| 91久久精品国产一区二区成人| 秋霞伦理黄片| 又粗又硬又长又爽又黄的视频| av在线老鸭窝| 美女国产视频在线观看| 欧美成人午夜免费资源| 亚洲欧美精品专区久久| 午夜激情福利司机影院| 国产免费一级a男人的天堂| 日韩欧美精品免费久久| 国产在线视频一区二区| 天美传媒精品一区二区| 国产精品人妻久久久久久| 精品久久国产蜜桃| 又黄又爽又刺激的免费视频.| 日韩精品有码人妻一区| 最近2019中文字幕mv第一页| 永久网站在线| 午夜老司机福利剧场| 色综合色国产| 免费观看性生交大片5| 亚洲国产精品999| 噜噜噜噜噜久久久久久91| 精品一品国产午夜福利视频| 18禁裸乳无遮挡动漫免费视频| 纯流量卡能插随身wifi吗| 一区二区三区精品91| 免费黄色在线免费观看| 亚洲激情五月婷婷啪啪| 国内精品宾馆在线| 精品酒店卫生间| 亚洲欧美日韩卡通动漫| 国产精品麻豆人妻色哟哟久久| 久久久成人免费电影| 蜜桃亚洲精品一区二区三区| av播播在线观看一区| 黄色视频在线播放观看不卡| 久久热精品热| 久久久久网色| 国产精品一区二区性色av| 免费观看的影片在线观看| 波野结衣二区三区在线| 91精品国产国语对白视频| 日韩国内少妇激情av| 91在线精品国自产拍蜜月| 久久精品国产亚洲av涩爱| 国产精品精品国产色婷婷| 亚洲三级黄色毛片| 久久久久视频综合| 日韩电影二区| 国产亚洲午夜精品一区二区久久| 男人添女人高潮全过程视频| 大片电影免费在线观看免费| 亚洲丝袜综合中文字幕| 亚洲内射少妇av| 亚洲国产毛片av蜜桃av| 亚洲国产av新网站| 亚洲精品一区蜜桃| 高清日韩中文字幕在线| 亚洲av在线观看美女高潮| 日本wwww免费看| 内地一区二区视频在线| 成人国产麻豆网| 国产在线一区二区三区精| 一区二区av电影网| 精品人妻一区二区三区麻豆| 亚洲自偷自拍三级| 精品视频人人做人人爽| 国产精品免费大片| 少妇的逼水好多| 有码 亚洲区| 日韩在线高清观看一区二区三区| 在线观看国产h片| 精品人妻一区二区三区麻豆| 日韩中文字幕视频在线看片 | 丰满人妻一区二区三区视频av| 99热这里只有是精品50| 有码 亚洲区| 国产精品人妻久久久久久| 成人漫画全彩无遮挡| 免费看光身美女| 男男h啪啪无遮挡| 亚洲成色77777| 美女福利国产在线 | 久久久久久九九精品二区国产| 国产老妇伦熟女老妇高清| 国产成人精品久久久久久| 狂野欧美激情性bbbbbb| 国产黄色免费在线视频| 色视频www国产| 亚洲美女黄色视频免费看| 精品99又大又爽又粗少妇毛片| 日韩精品有码人妻一区| 乱码一卡2卡4卡精品| 成人亚洲精品一区在线观看 | 亚洲av在线观看美女高潮| 99久久中文字幕三级久久日本| videos熟女内射| 一级片'在线观看视频| 亚洲欧美成人精品一区二区| 啦啦啦中文免费视频观看日本| h日本视频在线播放| 国产精品精品国产色婷婷| 看免费成人av毛片| 精品久久久久久久末码| 国产免费一级a男人的天堂| 国产亚洲一区二区精品| av免费观看日本| 久久精品国产亚洲av天美| 国产精品人妻久久久影院| 久久久精品免费免费高清| 欧美性感艳星| h日本视频在线播放| 亚洲精品日本国产第一区| 只有这里有精品99|