• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Air Defense Weapon Target Assignment Method Based on Multi-Objective Artificial Bee Colony Algorithm

    2023-10-26 13:13:02HuaixiXingandQinghuaXing
    Computers Materials&Continua 2023年9期

    Huaixi Xingand Qinghua Xing

    Air and Missile Defense College,Air Force Engineering University,Xi’an,710051,China

    ABSTRACT With the advancement of combat equipment technology and combat concepts,new requirements have been put forward for air defense operations during a group target attack.To achieve high-efficiency and lowloss defensive operations,a reasonable air defense weapon assignment strategy is a key step.In this paper,a multi-objective and multi-constraints weapon target assignment (WTA) model is established that aims to minimize the defensive resource loss,minimize total weapon consumption,and minimize the target residual effectiveness.An optimization framework of air defense weapon mission scheduling based on the multiobjective artificial bee colony (MOABC) algorithm is proposed.The solution for point-to-point saturated attack targets at different operational scales is achieved by encoding the nectar with real numbers.Simulations are performed for an imagined air defense scenario,where air defense weapons are saturated.The non-dominated solution sets are obtained by the MOABC algorithm to meet the operational demand.In the case where there are more weapons than targets,more diverse assignment schemes can be selected.According to the inverse generation distance (IGD) index,the convergence and diversity for the solutions of the non-dominated sorting genetic algorithm III(NSGA-III)algorithm and the MOABC algorithm are compared and analyzed.The results prove that the MOABC algorithm has better convergence and the solutions are more evenly distributed among the solution space.

    KEYWORDS Weapon target assignment;multi-objective artificial bee colony;air defense;defensive resource loss;total weapon consumption;target residual effectiveness

    1 Introduction

    In the modern complex battlefield environment,with the emergence of high-tech and high-speed aerial weapon platforms,intelligent decision-making and scheduling of air defense weapon resources are particularly important.In air defense and anti-missile operations,weapon target assignment(WTA) is an important issue that needs to be resolved in the battlefield fire attack decision [1–4].Our maximum effectiveness is the target of air defense operations.Developing a rational air defense WTA planning by determining the threat of target attack is an important topic in the field of military combat research.The design of WTA models and the selection of accurate and efficient intelligent optimization algorithms in a given situation is the focus and difficulty.Based on the destruction area of multiple target passage numbers for ground-to-air missile defense systems,Liu et al.[3] studied the WTA problem of maximizing the interception of enemy targets and satisfying the time constraint,space constraint,and resource constraint.Davis et al.[4]studied the ballistic missile defense problem based on a dynamic perspective with an uncertainty of multiple rounds of flanking fire to maximize the protection of own resources.The single-objective WTA model suffers from the obvious shortcomings of resource wastage and inconsistency,and the current mainstream studies are generally multiobjective WTA models.Given the new characteristics of defense strategies during group target attacks,Nie et al.[5]established a WTA model with principles that aim at the maximum attack effectiveness,the maximum own remaining effectiveness,and the minimum total weapon consumption.Based on the above research,we design the air defense weapon target assignment as a multi-objective optimization model,taking defensive resource loss,total weapon consumption,and target residual effectiveness as optimization objectives.

    The intelligent optimization algorithm is an effective method to solve the NP-hard problems,such as the immune-based ant colony optimization (ACO) algorithm [6,7],genetic algorithm (GA)[8],discrete particle swarm optimization(DPSO)[9],etc.All belong to the meta-heuristic algorithm,which can simulate the foraging and reproduction of biological populations.However,these methods can only deal with single-objective WTA issues and cannot be applied to multi-objective optimization models.Nie et al.[5]proposed an optimization framework and specific process based on the NSGAIII algorithm and conducted simulation experiments under specific combat missions.Zhou et al.[10]proposed a D-NSGA-III algorithm to achieve high-dimensional multi-target task assignment for UAV swarms.Long et al.[11] used the data set to train a decision-making neural network to realize air defense weapons intelligent scheduling.As mentioned above,an important issue in air defense weapon target assignment is the selection of an appropriate performance metric.In the modeling that follows,we should optimize the performance metric for the mission WTA scenario under a set of operational constraints.

    The targets move fast and can only be destroyed in a short time window.For air defense operations,the requirement of timeliness is high.Considering the short time window of the weapon’s striking,it is still necessary to further improve the real-time performance.The computational efficiency and global convergence of NSGA-III algorithm for WTA solving are insufficient.In addition,the actual data samples for combat are small,and it is difficult to obtain an effective decision model through neural network training.The rationality of input simulated data training cannot be verified.

    The artificial bee colony (ABC) algorithm,proposed by Turkey scholar Karaboga in 2005,is a swarm intelligence optimization method simulating bees’ foraging behaviors [12].It completes a series of optimization processes by simulating bees foraging.Compared with the above algorithms,it has fewer parameters and is easy to implement.It is widely used in production scheduling,path planning,system optimization,and other fields,and its algorithm research is relatively mature.The multi-objective bee colony algorithm first proposed in the reference [13] is a milestone.It further extends the ability of the algorithm to achieve multi-objective optimization by constructing an external file on the standard ABC algorithm and using better individuals to guide the evolution.The MOABC algorithm has great adaptability to high-dimensional multi-objective optimization,and has significant advantages in improving operating efficiency,increasing the diversity of solution spaces,and reducing computational complexity,effectively compensating for many shortcomings.

    To summarize,the contributions of this work are presented in the following list:

    The effectiveness of air defense operations is evaluated through indicators including defensive resource loss,total weapon consumption,and target residual effectiveness based on the characteristics of the battlefield environment and operational tasks.A 0–1 integer-constrained multi-objective WTA optimization model is developed.

    The MOABC algorithm for air defense weapon target assignment is presented.One-to-one and many-to-one scenarios weapon and target mapping relationships are established by cleverly designed coding rules,respectively.The effectiveness of the algorithm is verified by establishing Archive update non-dominated solutions.

    2 Related Work

    Recently,as one type of the most effective algorithms for solving non-deterministic polynomial hard(NP-hard)problems like MOPs,multi-objective artificial bee colony(MOABC)algorithm have been proved successfully in practice and demonstrated powerful competitiveness.due to its ease of implementation,it has been successfully applied to many real-world problems,such as industrial systems,image processing,and so on.Compared with other evolutionary algorithms,such as particle swarm optimization (PSO) and NSGA,ABC shows strong global search ability.Zhao et al.[14]used the MOABC algorithm based on the limit search strategy.With the bees searching according to individual limits,the search radius is dynamically adjusted to improve the search accuracy and convergence speed,which improves the search accuracy and convergence speed.The proposed algorithm performs well in convergence and distribution.To reduce the number of casualties and damages in disaster management,Niyomubyeyi et al.[15]used the MOABC algorithm for evacuation planning and provided a better evacuation solution.In addition,they compared and studied four meta-heuristic algorithms,AMOSA,MOABC,MSPSO,and NSGA-II,and found that the MOABC algorithm achieves higher quality solutions and a higher level of repeatability [16].Zhang et al.[17]proposed a multi-objective artificial bee colony optimization (MOABCO) algorithm and applied it to solve the Multi-Objective Test Case Prioritization(MOTCP)problem to improve the efficiency of regression testing.

    The MOABC algorithm has unique advantages for solving mission planning and intelligent decision-making in the military field,but its related research in the air defense combat WTA problem is rare.Mao et al.[18]used the ABC algorithm to solve the weapon target assignment problem,but their optimization objective considered only one optimization objective,i.e.,the maximum mathematical expectation of all weapon system destruction targets.Gu et al.[19] used the MOABC algorithm to optimize the UAV formation topology based on the formation communication chain length,considering the network delay influence factor and the residual energy imbalance degree,etc.The study showed that the optimization result of MOABC algorithm can improve the formation range.In order to solve the problem of troop deployment and firepower coordination of tank detachments in offensive combat,Chu et al.[20]first put forward the model of tank position deployment and the model of tank firepower allocation.Then,the two-layer iteration strategy was adopted and the bottom iteration was used to solve the firepower allocation model.Finally,the ABC algorithm was used to optimize the tank position deployment scheme.The experimental results show that the convergence speed and convergence accuracy of the ABC algorithm on a specific model are significantly improved.Under the same fitness evaluation,it can significantly improve the timeliness and scientificity of command decision-making in combat.

    At present,there is no research on solving multi-objective air defense WTA with MOABC.Inspired by the above research,we design multi-objective-driven WTA models and use the MOABC algorithm for the optimization of air defense WTA schemes to meet the requirements of rapidity and accuracy.

    3 System Model and Problem Description

    3.1 Descriptions of Multi-Objective Programming

    The multi-objective programming (MOP) is composed of multiple objective functions,decision variables,and constraints,and there are generally conflicting relationships between objective functions.The model can be described as Eq.(1).

    In Eq.(1),xis a feasible solution,f(x)is an objective function,g(x)andh(x)are inequality constraints and equality constraints,respectively.

    The solution of multi-objective optimization is not unique,but a set of solutions.Pareto dominance is the most common multi-objective solving mechanism.In the case of multiple objective functions,there may be conflicts and incomparable phenomena between objective functions.For example,a solution that is best for one objective function may be the worst for another.While improving any objective function,these solutions called the Pareto solutions will inevitably weaken at least one other objective function,which is also called non-dominated solutions.The set of optimal solutions for multi-objective functions is called the Pareto optimal set.The optimal set forms a Pareto front in the solution space.Pareto proposed the concept of a non-dominated set of multi-objective solutions in 1986,whose basic definition is as follows.

    For a multi-objective programming problem,its variable feasible region is denoted byS,and the corresponding objective function feasible region isZ=f(S).Given a feasible pointx?∈S,for?x∈S,iff(x?)

    3.2 A Multi-Objective Programming WTA Model

    3.2.1 Model Assumptions

    In this paper,the optimization goal is to minimize the target residual effectiveness,minimize the defensive resource loss,and minimize the weapon resource consumption,which is also in line with the experience of battlefield commanders.Then the air defense WTA model is constructed to quickly form a strike decision plan.The specific combat scenario is an air defense combat mission.Suppose we haveKimportant ground defensive resources (D={d1,d2,...,dn}),and the enemy has a task formation composed ofNpotential aerial targets(T={t1,t2,...,tn}).We deployMavailable weapons to strike the targets(W={w1,w2,...,wm}).The cost of firing a weapon to strike a target isC={c1,c2,...,cm},the target unit value vector isV={v1,v2,...,vn},and the value vector of our defense resources isL={l1,l2,...,lk}.

    The deployed firepower resources ofMdefense weapons toNair targets are allocated by setting a Boolean variablexij,whichxij=1 means that the weaponwistrikes the targettj,andxij=0 means that the weaponwidoes not strike the targettj.Therefore,it can be represented by the“0–1”integer programming model.

    3.2.2 Objective Functions

    (1) Defensive resource loss

    The purpose of air defense weapons is to destroy aerial targets to secure defense resources from attack.However,in actual air defense operations,the enemy air combat units will attack or even destroy important defense resources,so combat losses are inevitable.Assuming that each aerial target has penetration capability,the target’s ability to strike and destroy is positively correlated to the weapon’s damage probability and the target’s threat level.

    In Eq.(2):pij(0≤pij≤1)is the damage probability of thei-th weapon against thej-th target,qjkis the threat of thej-th target to thek-th one’s defense resource,andlkis the value of thek-th defense resource(task contribution).

    (2) Total weapon consumption

    Assuming that each surface-to-air weapon can only hit one target when weapons attack the opponent’s targets,the total weapon consumption is shown in Eq.(3).

    (3) Target residual effectiveness

    The target residual effectiveness is an important indicator to measure the strike and destroy the capability of surface-to-air weapons.The higher the damage probability of the surface-to-air weapon,the lower the target’s residual effectiveness.In the adversarial battlefield scenario,the damage probability of air defense weapons is used to characterize the damage capability,and the target residual effectiveness function is designed as Eq.(4).

    To efficiently destroy enemy targets,protect our battlefield defensive resources from attacks,and reduce weapon consumption,the MOP model of WTA shown in Eq.(5)is obtained.

    4 A Multi-Objective Artificial Bee Colony Algorithm for WTA

    4.1 The Mechanism of Seeking Nectar

    The multi-objective artificial bee colony algorithm (ABC) is a swarm intelligence optimization algorithm based on the nectar-collecting mechanism of bees.The ABC algorithm has the advantages of few parameters,fast convergence,and simple operation.The description of the ABC algorithm is as follows:The candidate solution of the problem is regarded as a nectar source,and bees are divided into three types according to the division of labor,including employed bees,onlooker bees,and scout bees.Employed bees are responsible for the initial search for nectar source and sharing information.Onlooker bees are responsible for staying in the hive to collect nectar according to the information provided by the employed bees.After the original nectar source is abandoned,the scout bees randomly search for a new nectar source to replace the original one.After initializing the bee colony and nectar source,the three operations,including the phase of employed bees,onlooker bees,and scout bees,are performed repeatedly to find the optimal solution.

    (1) Initialize the bee colony

    Initialize the algorithm parameters and randomly generate a certain amount of nectar sourceX=(x1,x2,...,xN)as feasible solutions within the feasible region,wherexi=.Dis the dimension of the solution vector,and Eq.(7)represents randomly generated nectar source.

    (2) Employed bees phase

    Employed bees find new nectar source according to Eq.(8).The value of the nectar source is evaluated by comparing the nectar quality(fitness value)of each nectar source.The larger the value,the better the quality of the feasible solution.The greedy mechanism is used to select the nectar source and retain the better nectar source.

    In Eq.(8),xk(k={1,2,...,N})is the nectar in the neighborhood ofxi.is a random number from-1 to 1,which affects the convergence speed of the algorithm.

    (3) Onlooker bees phase

    After the employed bees find a new source of nectar,the employed bees select onlooker bees to follow based on a roulette strategy and then track and develop the nectar source.Like employed bees,a new nectar source location is locally searched according to Eq.(9),and the better nectar source is retained following the principle of the greedy mechanism.If the quality of the nectar source is better than the original nectar source,the existing nectar source is replaced with a count of thetrial(i)=0,otherwisetrial(i)=trial(i) +1.The selection probability of onlooker bees is shown in Eq.(10)andFiis the fitness value of thei-th nectar source.

    (4) Scout bees phase

    If the nectar source has not been updated when the number of searches reaches the upper limit ofGmax,the current nectar source is discarded.The corresponding employed bees and onlooker bees act as scout bees.In the scout bees phase,the scout bees randomly search for new nectar source to replace the current nectar source according to Eq.(7).The scout bees phase effectively avoids falling into the local optimum prematurely and improves the global search capability of the algorithm.

    4.2 Archive Update

    In order to apply the artificial bee colony algorithm to multi-objective optimization,it is necessary to improve the original algorithm and set up an external file-handling mechanism.The high-quality solutions generated in each iteration are stored in the Archive[15],and the internal nectar source is constantly updated during the iteration.The detailed steps are as follows:

    1.The solution generated during the iteration is discarded if it is dominated by the solution in the Archive.

    2.If the new solution dominates one or more solutions in the Archive,the solutions dominated in the Archive are replaced by the new solution.

    3.All the solutions in the Archive are independent of each other,and a new solution is added to the Archive.

    The addition of new non-dominated solutions to the Archive can effectively maintain group diversity.When the number of solutions in the Archive reaches the limit,similar individuals need to be eliminated according to the dominance level and crowdedness distance to satisfy the Archive space.

    1.Calculate the objective functionf(f1,f2,...,fn)of all solutions,and find the maximumfimaxand minimumfiminof each objective function.

    2.Calculate the crowdedness distanceDc(i)of each solution according to Eq.(11).

    In Eq.(11) and Fig.1,fi(j+1) andfi(j-1) are the values of thei-th objective function corresponding to the two adjacent nectar source of thej-th nectar source.

    3.If the number of solutions in the Archive exceeds the limit,the solution with a higher degree of congestion is preferred,that is,the solution with a smallerDcis removed from the Archive.

    Figure 1:Congestion diagram

    4.3 Encoding and Constraint Processing

    In this paper,real number vectors are used to encode individuals in the population.For a scenario whereMair defense weapons strikeNaerial targets,the dimensionD=M.Each dimension is represented by a random real number in the interval (0,N+1).The integer represents the target number (except when the integer part is 0),and the order of decimals represents the weapon serial number of the corresponding target.Mair defense weapons are numbered in descending order.Each weapon strike at most one opponent’s target,so not all weapons are assigned.When the integral part of a dimension is 0,the corresponding air defense weapon is not assigned.For example,it is supposed that 5 air defense weapons strike 4 aerial targets in a combat scenario,and the individual positions of the population are represented by random real numbers in[0,5].In Fig.2,x1=2.91,x3=2.46,the integer part is 2,and the decimal part in descending order is 1st and 5th,which means thatw1andw5jointly attack the second target.Compared with binary encoding,real number encoding effectively utilizes the characteristics of the bee colony and greatly reduces the dimensionality of the computation.

    Figure 2:An example diagram of correspondence between coding and weapon target assignment scheme

    Generally,multi-objective optimization algorithms only focus on the domain of variables,in other words,all dimensions of the solution are within the boundary.However,in the process of searching for new nectar source,infeasible solutions that do not meet the constraints may be generated.In this regard,it is necessary to adopt a repair strategy for individuals who do not meet the constraints to ensure the feasibility of the solution.There are two principles of repair.1.The decimals of each dimension are different.2.The integers contain the number of all targets.

    For example,the position of the nectar source after one update is represented by the vector in Eq.(12).

    If the integers of two or more elements inJare equal,there must be some integers in the interval(0,N+1) that do not exist,which means that these solutions do not satisfy the second constraint.Because there are unassigned targets,these solutions are infeasible and must be fixed.

    1.If there are as many weapons as targets,select elements with the equivalent integer,and change the integers of these elements to the serial numbers of unassigned targets.

    2.If there are more weapons than targets and there are unassigned targets,the repairing strategy is the same as 1,otherwise,no repair is required.

    4.4 The Pseudo-Code of MOABC Algorithm

    Based on the above principle,the pseudo-code of the MOABC algorithm is as follows.

    5 Simulation and Discussion

    The experiment in this paper is conducted on the Windows 10 operating system with the main frequency of 2.9 GHz,and 8 GB of memory.Suppose that several enemy targets attack our important ground defensive resources.To implement effective defensive measures,we deploy several air defense weapons to strike and destroy opponents’ targets.Target types include bombers,fighter planes,electronic jammers,unmanned jammers,air-to-surface missiles,etc.Due to the confidentiality of real battlefield data,we simulated the data based on operational scenarios.For the construction of the WTA model,two operational scenarios are designed in the experiment.Weapon-target one-to-one assignment.Weapon-target many-to-one assignment.

    Algorithm parameter settings:Population size 2N=100,Archive sizeIm=100,maximum repetition numberLimit=N?D,and maximum fitness evaluationsGmax=200D.

    5.1 Operational Scenario 1:Weapon-Target One-to-One Assignment

    It is supposed that there are 10 enemy assault targets,10 air defense weapons,and 6 important ground resources on the battlefield.The target damage probability,target threat level,defensive resource value,target value,and weapon consumption are shown in Tables 1–5.

    Table 1:10×10 damage probability matrix

    The distribution plan is solved by the MOABC algorithm.In Fig.3,the three coordinate axes represent three objective function values.The scattered marks are non-dominated solutions.It can be seen that the distribution of the entire non-dominated solution set is relatively scattered.Because,during the iteration,similar solutions with smaller crowding distances will be continuously eliminated,making the solution set more diverse.It is for decision-makers to consider and choose an assignment plan from different requirements.

    Figure 3:Weapon-target one-to-one distribution of non-dominated solutions

    The MOABC algorithm has good convergence.Since the non-dominated sorting algorithm has a strict selection principle,the Archive has a forced ability to reserve better solutions.In Fig.4,the defensive resource loss converges to about 46,the target residual effectiveness converges to approximately 12.3,and the total weapon consumption is always the same at 4.90.Since the number of targets is the same as the weapons,all weapons are involved in the strike.

    Figure 4:Mean values of the objective function value obtained by solving scenario 1 over 20 independent runs in 1 to 100 generations

    Table 6 shows each objective function value corresponding to the non-dominated solution.It can be seen that the non-dominated solutions sought are independent of each other.The decision-maker further selects the best plan from the alternatives based on the operational needs.Table 7 shows the WTA plan optimized corresponding to each non-dominated solution.

    Table 6:10×10 the value of the objective function of the non-dominated solutions

    5.2 Operational Scenario 2:Weapon-Target Many-to-One Assignment

    It is supposed that there are 7 enemy assault targets.Other settings are consistent with operational scenario 1.The enemy’s target damage probability,target threat degree,and target value are shown in Tables 8–10.

    Table 8:10×7 damage probability matrix

    Fig.5 shows the 15 non-dominated solutions obtained after running.Table 11 shows the objective function values corresponding to the solutions.Compared with operation scenario 1,more nondominated solutions are obtained,demonstrating that the Pareto solution space is larger and the solution set is more diverse when the weapons are more than enemy targets.Table 12 shows the WTA plan optimized corresponding to each non-dominated solution.

    Figure 5:Weapon-target many-to-one distribution of non-dominated solutions

    Table 11:The objective function value corresponding to the non-dominated solutions

    In Fig.6,each objective function value of scenario 2 is converged,the defensive resource loss converges to about 25,and the target residual effectiveness converges to about 6.2.Unlike scenario 1,some weapons are not assigned targets due to the surplus of weapons.The total weapon consumption decreases while searching for a better solution,eventually converging to about 3.62.Overall,the convergence values of all three metrics are better than the results of scenario 1,indicating that the assignment plan not only improves operational effectiveness but also reduces total weapon consumption when increasing the number of air defense weapons.

    Figure 6:Mean values of the objective function value obtained by solving scenario 2 over 20 independent runs in 1 to 100 generations

    5.3 Algorithm Performance Comparison

    Nie et al.[5]proposed firepower strike assignment for cluster UAV targets based on the NSGAIII algorithm.As a typical representative of multi-objective optimization algorithms,NSGA-III has a wide range of applications and strong practicability.In reference[5],WTA optimization model and framework are close to the current research solution.To better verify the effectiveness of the MOABC algorithm,the global optimization capabilities of the NSGA-III algorithm and the MOABC algorithm are compared.The initial parameter settings of both algorithms are as follows.

    NSGA-III algorithm:population size 2N=100,Archive sizeIm=50,maximum repetition numberLimit=N?D,and maximum fitness evaluationsGmax=200D,the crossover probability is 0.8,and the mutation probability is 0.05.

    MOABC algorithm:population size 2N=100,Archive sizeIm=50,maximum repetition numberLimit=N?D,and maximum fitness evaluationsGmax=200D.

    The performance is evaluated by inverse generation distance (IGD) [21] and running time.IGDis a comprehensive performance evaluation index that assesses the convergence and diversity of the solutions.IGDcan calculate the sum of the minimum distance between each solution on the real Pareto frontier and the solution set obtained.IGDis defined as Eq.(13).

    In Eq.(13),Pis the solution set uniformly distributed on the real Pareto frontier.|P|is the number of solutions distributed on the real Pareto frontier.Qis the obtained Pareto optimal solution set.d(v,Q)is the minimum Euclidean distance from the solutionvto the solution setQ.IGDevaluates the convergence and distribution uniformity of the algorithm by calculating the average minimum distance from the solution set on the real Pareto frontier to the solution set obtained.From Eq.(13),the smallerd(v,Q)indicates that the closer the solutionvis to solution setQ,the better the convergence performance of the algorithm.However,the largerd(v,Q)indicates that most of the solutions obtained are concentrated in a narrow region,and the worse the distribution performance of the algorithm.In this paper,some non-dominated solutions with uniform distribution are selected from the solution sets obtained by multiple experiments,and their objective function values are approximated to the real Pareto frontier.The real Pareto frontier is filtered.Next,the solution set obtained by the algorithm is compared with the real Pareto frontier.The results ofIGDvalues and average running time after 30 runs are summarized in Table 13.NSGA-III algorithm can not obtain the feedback information of the population in time,so its search speed is relatively slow,and more time is required to obtain more accurate solutions.For the two scenarios,the search efficiency of MOABC algorithm is better than that of NSGA-III algorithm,which reflects the advantages of the algorithm for solving the model in this paper.

    Figs.7a and 7b are theIGDbox diagrams of the two operational scenarios,respectively.Comparing the results of both algorithms,theIGDvalue of the MOABC algorithm is superior to that of the NSGA-III algorithm,which shows that the approximate Pareto optimal solution obtained by the MOABC algorithm has better convergence and the solutions are more uniformly distributed in the solution space.

    Figure 7:IGD box diagrams of NSGA-III and MOABC algorithm

    6 Conclusion

    It is of great military significance to study the issue of WTA in air defense operations.From the perspective of both opposing sides,we evaluated the results of air defense WTA with three indicators,including defensive resource loss,total weapon consumption,and target residual effectiveness.A multiobjective and multi-constrained air defense WTA model is constructed.The MOABC algorithm is used to realize the optimal solution of air defense weapon scheduling at different countermeasure scales,and the efficiency of the algorithm is verified.The performance of MOABC algorithm and NSGA-III algorithm is compared.The former has a lower IGD value of the Pareto solution set than the latter,and the overall quality of the solutions is higher and more uniformly distributed.The running time of the former is less than that of the latter,and the search efficiency of the algorithm is higher.This work provides certain ideas and means for air defense for group targets.Firstly,the applicability of the model has been improved.Multi-objective programming is established to objectively select the optimal assignment scheme,avoiding the commander’s personal preference affecting the decisionmaking results.Secondly,the scientific and reasonable evaluation indicators are designed to compare and verify the optimization results,and closed-loop research is realized.Finally,the Pareto optimal solution set can be regarded as an important reference to assist decision-making,which may also provide the best plan for decision-making commanders.

    Acknowledgement:The authors are very grateful to the referees for their valuable remarks,which improved the presentation of the paper.

    Funding Statement:This work was supported by the National Natural Science Foundation of China(71771216).

    Author Contributions:The authors confirm contribution to the paper as follows:study conception and design:H.Xing,Q.Xing;data collection:H.Xing;analysis and interpretation of results:H.Xing,Q.Xing;draft manuscript preparation:H.Xing.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The authors confirm that the data supporting the findings of this study are available within the paper.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    久久女婷五月综合色啪小说| 热re99久久精品国产66热6| 亚洲伊人色综图| 伦精品一区二区三区| 麻豆av在线久日| 精品午夜福利在线看| 久久97久久精品| av一本久久久久| 天美传媒精品一区二区| 9191精品国产免费久久| 国产乱人偷精品视频| 亚洲精品美女久久av网站| 国产黄频视频在线观看| 久久99热这里只频精品6学生| 在线免费观看不下载黄p国产| 日韩电影二区| 亚洲一区二区三区欧美精品| 国产精品女同一区二区软件| 丝袜在线中文字幕| 伦理电影大哥的女人| 亚洲熟女精品中文字幕| 啦啦啦视频在线资源免费观看| 黄色 视频免费看| 欧美激情 高清一区二区三区| 男女边摸边吃奶| 在线观看三级黄色| av天堂久久9| 精品久久久精品久久久| 欧美97在线视频| 制服丝袜香蕉在线| 日韩av免费高清视频| 观看美女的网站| 久久97久久精品| 欧美日韩精品网址| 亚洲欧美色中文字幕在线| 在线天堂最新版资源| 日日撸夜夜添| 亚洲国产色片| 国产午夜精品一二区理论片| av在线观看视频网站免费| 一级毛片电影观看| 少妇人妻精品综合一区二区| 欧美变态另类bdsm刘玥| 日韩av不卡免费在线播放| 国产亚洲欧美精品永久| 狂野欧美激情性bbbbbb| 亚洲久久久国产精品| 成人手机av| 国产一区二区 视频在线| 最近的中文字幕免费完整| h视频一区二区三区| 国产福利在线免费观看视频| 亚洲欧洲日产国产| 亚洲五月色婷婷综合| 少妇被粗大的猛进出69影院| 亚洲成色77777| 成人毛片a级毛片在线播放| 国产精品国产三级专区第一集| 亚洲精品视频女| 久久精品久久久久久噜噜老黄| 各种免费的搞黄视频| 国产精品一区二区在线不卡| 中文字幕av电影在线播放| 超碰成人久久| 午夜精品国产一区二区电影| 欧美在线黄色| 岛国毛片在线播放| 日韩一本色道免费dvd| 人人妻人人澡人人看| 亚洲国产欧美在线一区| 最近中文字幕高清免费大全6| 老司机亚洲免费影院| 精品少妇一区二区三区视频日本电影 | 熟女av电影| 亚洲欧美一区二区三区黑人 | 美国免费a级毛片| 美女高潮到喷水免费观看| 精品福利永久在线观看| 街头女战士在线观看网站| 午夜激情久久久久久久| 人妻人人澡人人爽人人| 成年av动漫网址| 欧美人与善性xxx| 久久久久久久久久久久大奶| 精品福利永久在线观看| 日韩一卡2卡3卡4卡2021年| 久久ye,这里只有精品| 精品久久久精品久久久| 国产精品久久久久久精品电影小说| 晚上一个人看的免费电影| 日韩欧美一区视频在线观看| 看免费成人av毛片| 老司机影院毛片| 天天操日日干夜夜撸| 婷婷色麻豆天堂久久| 午夜久久久在线观看| 9色porny在线观看| 精品国产国语对白av| 少妇 在线观看| 伊人久久大香线蕉亚洲五| 欧美老熟妇乱子伦牲交| videosex国产| 日产精品乱码卡一卡2卡三| 亚洲综合色惰| 国产精品三级大全| 丰满少妇做爰视频| 青春草国产在线视频| 久久久久久人人人人人| 国产日韩欧美亚洲二区| 精品一品国产午夜福利视频| 一区二区日韩欧美中文字幕| 大香蕉久久网| 99香蕉大伊视频| 黄色怎么调成土黄色| 水蜜桃什么品种好| 老女人水多毛片| 80岁老熟妇乱子伦牲交| 欧美最新免费一区二区三区| 成人国产麻豆网| 高清不卡的av网站| 国产成人欧美| 九草在线视频观看| 日本av免费视频播放| 伦理电影免费视频| 久久人人爽人人片av| 欧美变态另类bdsm刘玥| 色94色欧美一区二区| 美女主播在线视频| 亚洲精品av麻豆狂野| 丝袜在线中文字幕| 欧美老熟妇乱子伦牲交| 亚洲av欧美aⅴ国产| 亚洲国产欧美在线一区| 亚洲欧美一区二区三区久久| 极品少妇高潮喷水抽搐| 波野结衣二区三区在线| 少妇人妻 视频| 日日摸夜夜添夜夜爱| 国产精品国产三级国产专区5o| 欧美av亚洲av综合av国产av | 中文字幕制服av| 黄片小视频在线播放| 91久久精品国产一区二区三区| 多毛熟女@视频| 夜夜骑夜夜射夜夜干| 亚洲精品中文字幕在线视频| 18禁观看日本| 午夜福利,免费看| 日产精品乱码卡一卡2卡三| 亚洲一级一片aⅴ在线观看| 日本av手机在线免费观看| av电影中文网址| 久久久久久久大尺度免费视频| 赤兔流量卡办理| 制服丝袜香蕉在线| 亚洲欧洲国产日韩| 成人18禁高潮啪啪吃奶动态图| 日本欧美国产在线视频| 国产精品蜜桃在线观看| h视频一区二区三区| 香蕉丝袜av| 五月伊人婷婷丁香| 伦理电影免费视频| 在线 av 中文字幕| 国产日韩欧美在线精品| 国产精品偷伦视频观看了| 国产精品久久久久久av不卡| 热99久久久久精品小说推荐| 色吧在线观看| 婷婷色综合www| 久久精品久久久久久久性| 美女国产视频在线观看| 国产日韩一区二区三区精品不卡| 9191精品国产免费久久| 另类精品久久| 日韩欧美一区视频在线观看| 你懂的网址亚洲精品在线观看| 欧美bdsm另类| 9色porny在线观看| 777久久人妻少妇嫩草av网站| 一个人免费看片子| 精品国产露脸久久av麻豆| 国产国语露脸激情在线看| 久久久久久久精品精品| 麻豆乱淫一区二区| 尾随美女入室| 亚洲欧美成人综合另类久久久| 欧美国产精品va在线观看不卡| 久久av网站| 桃花免费在线播放| 黄色 视频免费看| 午夜福利在线免费观看网站| 美女xxoo啪啪120秒动态图| 亚洲国产精品国产精品| 香蕉国产在线看| 王馨瑶露胸无遮挡在线观看| 免费在线观看完整版高清| 精品久久久久久电影网| 成人二区视频| av网站免费在线观看视频| 一区二区三区四区激情视频| 少妇的逼水好多| 久久久精品国产亚洲av高清涩受| 性色av一级| 香蕉丝袜av| 国产日韩一区二区三区精品不卡| 欧美av亚洲av综合av国产av | 这个男人来自地球电影免费观看 | 亚洲国产欧美日韩在线播放| 午夜福利网站1000一区二区三区| 嫩草影院入口| 深夜精品福利| 国产精品欧美亚洲77777| 亚洲美女搞黄在线观看| 久久久亚洲精品成人影院| 日本爱情动作片www.在线观看| 国产精品麻豆人妻色哟哟久久| 免费人妻精品一区二区三区视频| 亚洲精品日本国产第一区| 亚洲精品美女久久av网站| 亚洲国产欧美在线一区| 18禁观看日本| 免费高清在线观看视频在线观看| 亚洲国产色片| 一级毛片黄色毛片免费观看视频| 一二三四中文在线观看免费高清| 在线观看免费视频网站a站| 日韩精品有码人妻一区| 秋霞在线观看毛片| 永久网站在线| 午夜日韩欧美国产| 精品少妇黑人巨大在线播放| 男女高潮啪啪啪动态图| 新久久久久国产一级毛片| 大香蕉久久成人网| 欧美国产精品va在线观看不卡| 熟女av电影| 亚洲精品乱久久久久久| 黄色 视频免费看| 亚洲第一区二区三区不卡| 91在线精品国自产拍蜜月| 精品视频人人做人人爽| 国产精品亚洲av一区麻豆 | 亚洲久久久国产精品| 久久久久国产一级毛片高清牌| 亚洲精品中文字幕在线视频| 视频在线观看一区二区三区| 国产片特级美女逼逼视频| 女性生殖器流出的白浆| 两个人看的免费小视频| 午夜免费观看性视频| 久久这里只有精品19| 国产日韩欧美视频二区| 永久免费av网站大全| 美女福利国产在线| 伦精品一区二区三区| av网站在线播放免费| 久久人人97超碰香蕉20202| 国产黄色免费在线视频| 9热在线视频观看99| 午夜福利在线免费观看网站| 高清不卡的av网站| 99国产精品免费福利视频| 自拍欧美九色日韩亚洲蝌蚪91| 欧美 日韩 精品 国产| 美女大奶头黄色视频| 99九九在线精品视频| 伦精品一区二区三区| 免费久久久久久久精品成人欧美视频| 乱人伦中国视频| 欧美日韩成人在线一区二区| 五月天丁香电影| 免费高清在线观看日韩| 日本av手机在线免费观看| 成人午夜精彩视频在线观看| 一边亲一边摸免费视频| 国产一区有黄有色的免费视频| 美女主播在线视频| 999精品在线视频| 亚洲精品视频女| av不卡在线播放| 国产免费现黄频在线看| 校园人妻丝袜中文字幕| 欧美人与善性xxx| 97在线视频观看| 国产一区有黄有色的免费视频| 又大又黄又爽视频免费| 亚洲精品国产av蜜桃| av在线观看视频网站免费| 2021少妇久久久久久久久久久| 婷婷色综合www| 99国产精品免费福利视频| 欧美国产精品一级二级三级| 青春草视频在线免费观看| 日日撸夜夜添| 三上悠亚av全集在线观看| 亚洲精品,欧美精品| 欧美日韩av久久| 一级毛片黄色毛片免费观看视频| 丝袜美足系列| 久久精品人人爽人人爽视色| 91精品国产国语对白视频| 人人妻人人爽人人添夜夜欢视频| 成人18禁高潮啪啪吃奶动态图| 欧美97在线视频| 美女国产视频在线观看| 狠狠精品人妻久久久久久综合| freevideosex欧美| 亚洲欧美日韩另类电影网站| 精品国产乱码久久久久久男人| 啦啦啦视频在线资源免费观看| 国产伦理片在线播放av一区| 亚洲av电影在线观看一区二区三区| 日韩精品免费视频一区二区三区| 成人国语在线视频| 亚洲国产精品国产精品| 亚洲欧美成人综合另类久久久| 蜜桃国产av成人99| 国产精品国产三级专区第一集| 欧美国产精品va在线观看不卡| 欧美最新免费一区二区三区| av国产精品久久久久影院| 欧美黄色片欧美黄色片| 97在线视频观看| 精品一区二区三卡| 国产一区亚洲一区在线观看| 一级爰片在线观看| av又黄又爽大尺度在线免费看| 三上悠亚av全集在线观看| 天堂中文最新版在线下载| 久久综合国产亚洲精品| 韩国精品一区二区三区| 永久网站在线| 中文字幕最新亚洲高清| 国产 精品1| 欧美激情 高清一区二区三区| 免费观看a级毛片全部| 我要看黄色一级片免费的| 1024香蕉在线观看| 人人妻人人澡人人看| 欧美 亚洲 国产 日韩一| 久久久欧美国产精品| 欧美日韩一级在线毛片| av不卡在线播放| 深夜精品福利| 各种免费的搞黄视频| 久久久精品区二区三区| 叶爱在线成人免费视频播放| 伦理电影免费视频| 亚洲伊人色综图| 亚洲精品久久久久久婷婷小说| 国产免费一区二区三区四区乱码| 精品人妻在线不人妻| 少妇被粗大猛烈的视频| 欧美日韩精品网址| 十八禁网站网址无遮挡| 91在线精品国自产拍蜜月| 国产成人一区二区在线| 亚洲色图综合在线观看| 成人免费观看视频高清| 美女福利国产在线| 午夜福利在线免费观看网站| 一级毛片我不卡| 99精国产麻豆久久婷婷| 一本大道久久a久久精品| 国产av精品麻豆| 精品久久久精品久久久| 久久人妻熟女aⅴ| 中文字幕精品免费在线观看视频| 日本免费在线观看一区| 老司机影院成人| 在线看a的网站| 色婷婷久久久亚洲欧美| 欧美精品人与动牲交sv欧美| 97人妻天天添夜夜摸| 永久免费av网站大全| 免费日韩欧美在线观看| 天天操日日干夜夜撸| 曰老女人黄片| 视频在线观看一区二区三区| 97精品久久久久久久久久精品| 男女啪啪激烈高潮av片| 99热全是精品| 国产精品一国产av| 999久久久国产精品视频| 久久精品久久久久久噜噜老黄| 999久久久国产精品视频| 久久精品国产自在天天线| 亚洲国产成人一精品久久久| 国产欧美日韩综合在线一区二区| 久久精品国产鲁丝片午夜精品| 日韩一卡2卡3卡4卡2021年| 十八禁高潮呻吟视频| 七月丁香在线播放| 亚洲欧美色中文字幕在线| av又黄又爽大尺度在线免费看| 久久国产精品男人的天堂亚洲| 中文精品一卡2卡3卡4更新| 亚洲国产看品久久| av一本久久久久| 国产精品不卡视频一区二区| 久久99热这里只频精品6学生| 在线天堂中文资源库| 久久 成人 亚洲| 色94色欧美一区二区| 精品国产国语对白av| 国产有黄有色有爽视频| av不卡在线播放| 国产成人精品无人区| a 毛片基地| 视频在线观看一区二区三区| 成人二区视频| 久久精品国产自在天天线| 久久久久久免费高清国产稀缺| 寂寞人妻少妇视频99o| av国产久精品久网站免费入址| 免费高清在线观看日韩| 啦啦啦在线免费观看视频4| 赤兔流量卡办理| 多毛熟女@视频| 18+在线观看网站| 天堂8中文在线网| 久久鲁丝午夜福利片| 国产免费视频播放在线视频| 熟女电影av网| 久久久久精品性色| 亚洲av国产av综合av卡| 妹子高潮喷水视频| 久久久久精品久久久久真实原创| 在线观看人妻少妇| 色哟哟·www| 18禁国产床啪视频网站| 啦啦啦在线免费观看视频4| 国产一区二区激情短视频 | 亚洲第一区二区三区不卡| 女性被躁到高潮视频| 中文天堂在线官网| 久久久精品区二区三区| 国产极品粉嫩免费观看在线| 久久久a久久爽久久v久久| 免费久久久久久久精品成人欧美视频| 尾随美女入室| 国产成人a∨麻豆精品| 香蕉丝袜av| 亚洲国产色片| 中文欧美无线码| 天天躁夜夜躁狠狠躁躁| 成年女人毛片免费观看观看9 | 久久热在线av| 国产片内射在线| 亚洲三级黄色毛片| 亚洲一级一片aⅴ在线观看| 日韩制服丝袜自拍偷拍| 国产极品粉嫩免费观看在线| 老汉色∧v一级毛片| 欧美精品一区二区免费开放| 国产精品嫩草影院av在线观看| 午夜福利在线免费观看网站| 国产成人a∨麻豆精品| 午夜福利视频在线观看免费| 一级毛片 在线播放| 午夜福利视频在线观看免费| 成年女人毛片免费观看观看9 | 亚洲av综合色区一区| av网站免费在线观看视频| 久久久久精品性色| 亚洲欧美一区二区三区黑人 | 黄片小视频在线播放| 国产97色在线日韩免费| videos熟女内射| av免费在线看不卡| 精品亚洲成国产av| 成人国语在线视频| 国产精品麻豆人妻色哟哟久久| 亚洲一级一片aⅴ在线观看| 日日啪夜夜爽| 美女国产视频在线观看| 精品亚洲成国产av| 亚洲伊人久久精品综合| 激情视频va一区二区三区| 亚洲欧美精品自产自拍| 亚洲av电影在线观看一区二区三区| 97精品久久久久久久久久精品| 制服丝袜香蕉在线| av不卡在线播放| 免费大片黄手机在线观看| 色哟哟·www| 亚洲国产毛片av蜜桃av| 午夜av观看不卡| 另类精品久久| 成人手机av| 国语对白做爰xxxⅹ性视频网站| 热99久久久久精品小说推荐| 免费少妇av软件| 国产av精品麻豆| 亚洲国产最新在线播放| 久久久久久久久久人人人人人人| 青青草视频在线视频观看| 国产午夜精品一二区理论片| 久久久国产一区二区| 久久久久国产精品人妻一区二区| 欧美精品高潮呻吟av久久| 精品国产一区二区久久| 熟妇人妻不卡中文字幕| 99热国产这里只有精品6| 国产一级毛片在线| 午夜av观看不卡| 热re99久久精品国产66热6| 亚洲人成电影观看| 亚洲欧美日韩另类电影网站| a级毛片在线看网站| 久久久久精品性色| 最近中文字幕2019免费版| 91精品伊人久久大香线蕉| 在线精品无人区一区二区三| av天堂久久9| 国产成人午夜福利电影在线观看| 国产精品免费大片| 成年动漫av网址| 一边亲一边摸免费视频| 精品一区二区三卡| 亚洲av.av天堂| 精品亚洲乱码少妇综合久久| 精品一区二区免费观看| 九九爱精品视频在线观看| 日本色播在线视频| 建设人人有责人人尽责人人享有的| 亚洲精品久久久久久婷婷小说| 亚洲五月色婷婷综合| 日韩人妻精品一区2区三区| 下体分泌物呈黄色| 亚洲av日韩在线播放| 超碰成人久久| 国产福利在线免费观看视频| 在现免费观看毛片| 亚洲一码二码三码区别大吗| 在线 av 中文字幕| 中文字幕色久视频| 亚洲欧美一区二区三区久久| 十八禁网站网址无遮挡| 国产日韩一区二区三区精品不卡| 一区福利在线观看| 可以免费在线观看a视频的电影网站 | 国产黄色免费在线视频| a级毛片黄视频| 午夜福利在线观看免费完整高清在| 好男人视频免费观看在线| 九草在线视频观看| 色视频在线一区二区三区| 欧美老熟妇乱子伦牲交| 伦理电影免费视频| 精品人妻在线不人妻| 日韩av免费高清视频| 国产色婷婷99| av又黄又爽大尺度在线免费看| 午夜福利视频在线观看免费| 色婷婷av一区二区三区视频| 韩国精品一区二区三区| 免费在线观看黄色视频的| 久热久热在线精品观看| 波多野结衣一区麻豆| 久久久精品区二区三区| 汤姆久久久久久久影院中文字幕| 九色亚洲精品在线播放| 天天操日日干夜夜撸| 国产老妇伦熟女老妇高清| 亚洲欧美精品自产自拍| 一本大道久久a久久精品| 精品国产一区二区三区久久久樱花| 男男h啪啪无遮挡| 成人免费观看视频高清| 高清不卡的av网站| www.av在线官网国产| 免费观看无遮挡的男女| 岛国毛片在线播放| 亚洲,一卡二卡三卡| 成年人免费黄色播放视频| 久久久久久久精品精品| 国产白丝娇喘喷水9色精品| 欧美 亚洲 国产 日韩一| 成年美女黄网站色视频大全免费| 婷婷色综合www| 永久网站在线| 男人爽女人下面视频在线观看| 国产成人精品无人区| 丝袜脚勾引网站| a级毛片在线看网站| 久久精品夜色国产| 这个男人来自地球电影免费观看 | 国产 精品1| 一级,二级,三级黄色视频| 侵犯人妻中文字幕一二三四区| 这个男人来自地球电影免费观看 | 97人妻天天添夜夜摸| 精品人妻偷拍中文字幕| 少妇 在线观看| 只有这里有精品99| 999精品在线视频| 丝袜在线中文字幕| 亚洲欧美成人综合另类久久久| 国产亚洲av片在线观看秒播厂| 久久久久国产一级毛片高清牌| 日韩欧美一区视频在线观看| 丰满乱子伦码专区| 人妻 亚洲 视频| 成人影院久久| 深夜精品福利| 两个人看的免费小视频| 欧美97在线视频| 少妇的丰满在线观看| 久久狼人影院| 国产视频首页在线观看| 高清视频免费观看一区二区| 久久99热这里只频精品6学生| 亚洲中文av在线|