• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Swarm intelligence based clustering and localizing methods for loitering munitions in a satellite denied environment

    2023-11-10 02:16:30HaoWUZhonghongWUZhangsongSHIShiyanSUNPengfeiWUZhiWANG
    CHINESE JOURNAL OF AERONAUTICS 2023年10期

    Hao WU, Zhonghong WU, Zhangsong SHI, Shiyan SUN, Pengfei WU,Zhi WANG

    School of Ordnance Engineering, Naval University of Engineering, Wuhan 430033, China

    KEYWORDS

    Abstract In the networking of loitering munitions during a battle, clustering and localizing algorithms become a major problem because of their highly dynamic topological structure, incomplete connectivity,and limited energy.This paper proposed swarm intelligence based collaborative localizing, clustering, and routing scheme for an ad hoc network of loitering munitions in a satellite denied environment.A hybrid algorithm was first devised by integrating an improved coyote optimization algorithm with a simplified grey wolf optimizer under the sinusoidal crossover strategy.The performance of this algorithm was considerably improved thanks to integration.On this basis,a swarm intelligence based localizing algorithm was presented.Bounding cubes were created to reduce the initial search space, which effectively lowered the localizing error.Second, an energysaving clustering algorithm based on the hybrid algorithm was put forward to enhance the clustering efficiency by virtue of grey wolf hierarchy.Meanwhile, an analysis model was developed to determine the optimal number of clusters using the lowest possible number of transmissions.Ultimately,a compressed sensing routing scheme based on the hybrid algorithm was proposed to transmit data from a cluster head to a base station.This algorithm constructed an efficient routing tree from the cluster head to the base station,so as to reduce the routing delay and transmission count.As revealed in the results of simulation experiments, the proposed collaborative localizing, clustering and routing algorithms achieved better performance than other popular algorithms employed in various scenarios.

    1.Introduction

    Once the internet of things was introduced to battlefields,ammunitions became information-based, intelligent, and networked.1The most typical development can be seen in ad hoc networking of loitering munitions.As a new conceptual type of ammunitions, loitering munitions are able to cruise and stand by for a variety of operations in combat above a target area.2By virtue of networking, loitering munitions can form into an ammunition cluster, also known as networked munitions.In practical operations, networked munitions can deliver the multiplier effect of 1+1>2.For instance,a network of three KUB-BLA loitering munitions launched by Russia in the Russia-Ukraine War during 2022 instantly destroyed a troop of Ukrainian soldiers with only individual munitions,3which must be attributed to more accurate target information for munitions after networking.

    Accurate position information plays a crucial part in the collaborative control and engagement of a loitering munitions cluster.Networked munitions are characterized by a highly dynamic topological structure, incomplete connectivity, and limited resources.4Hence,localizing the nodes of ammunitions is a major problem.Under normal circumstances, the nodes can be localized by virtue of Beidou/GPS and inertial navigation.However,Beidou/GPS have signals that are vulnerable to interference or interrupted by an enemy’s attack in a battlefield.Some methods have been therefore developed to address the problem of dynamic ad hoc network localization in a satellite denied environment.Most methods are based on ranging.5Normally, bilateral or trilateral measurement is adopted for localization.Nevertheless, these methods face an inevitable problem, that is, Flap Ambiguity (FA).6Additionally, most dynamic ad hoc networks rely on Beidou or GPS in the localization of nodes for clustering,which is harmful to the continuous flight of loitering munitions because of their large energy consumption.For this reason, an energy-saving, flexible and extensible clustering and localizing protocol must be urgently devised.Above all,this paper will focus on two aspects,specifically, collaborative localization and clustering protocol of an ammunition ad hoc networking.

    1.1.Localization algorithms

    Loitering munitions are equipped with a tactical data link for data sharing.For the purpose of high-accuracy localization,some experts recommended the use of range-based localizing methods to implement the collaborative localization of ammunitions.But requires observation equipment, which increases cost and requires more room.For this reason, this paper presents an exploration of collaborative localization for the nodes in the ad hoc network of ammunitions without additional observation equipment.

    As for the range-free localizing algorithm, the DV-hop method has been widely applied in localizing the nodes of an ad hoc network.This method can estimate the location of each node based on the number of hops needed from one node to the anchor node.However, its localizing accuracy is significantly affected by observation error.In recent years, a biology-inspired optimization algorithm has been gradually applied because of its advantages such as low complexity and high accuracy.Gui et al.7put forward two improvements of DV-hop, specifically, checkout DV-hop and selective 3-anchor DV-hop.In the first improvement, the estimated location of an unknown node is adjusted to its distance from the nearest anchor node.However, more selective locations are generated for an unknown node using the number of hops needed from three optimal anchor nodes in the second improvement.According to the simulation results, selective 3-anchor DV-hop offers the best localization accuracy compared with checkout DV-hop and the original DV-hop method.Gui et al.8put forward a Distributed Connectivity based DV-hop (DCDV-hop), which could almost achieve the optimal localization for distributed networks.As revealed in the simulation results, DCDV-hop is more accurate than CCDV-hop and other methods, regardless of high complexity and if the connectivity of all nodes is ignored.Liu et al.9proposed an improved algorithm based on neural dynamics, that is,ND-DV-hop.Through error analysis,this algorithm can be used to determine the error range between an unknown node and an anchor node.Thus, the traditional localization model is transformed into algebraic equations,which are solved with a neural dynamics algorithm to obtain a solution without residual error.As revealed in the simulation, the proposed algorithm is extremely robust and accurate in the localization process.Rajakumar et al.10used the GWO algorithm for localization, and introduced the GWO-LPWSN algorithm for localizing unknown nodes.The simulation proved that this algorithm has lower computing cost and higher accuracy than Particle Swarm Optimization (PSO) and other algorithms.

    1.2.Clustering algorithms

    In recent years, bionic algorithms have been introduced to solve the clustering problem of a dynamic ad hoc network.11These algorithms are simple to implement, and efficient when resolving complicated optimization problems.12Additionally,local minimums can be avoided with these algorithms.13For instance, a Swarm Intelligent Optimization Algorithm (SIOA)is an intelligent optimization method that simulates the collective behaviors of social groups in nature,14and has been developed into Particle Swarm Optimization (PSO),15Grey Wolf Optimizer (GWO),16and Coyote Optimization Algorithms(COA).17With advantages such as simple implementation and effective global and large-scale optimization, SIOAs have been widely applied in various fields including multi-object optimization, data clustering and pattern recognition.18

    As a novel SIOA algorithm,the concept of a GWO was put forward by Mirjalili et al.19in 2014.It features simple principles, good mining capability, and few adjustable parameters,but may easily result in a local optimum or perform poorly in resolving complicated optimization problems.Consequently, this algorithm has been studied and improved by scholars, such as, hybrid improvement.Zhang et al.20for instance, put forth a hybrid algorithm of GWO and an artificial bee colony algorithm.In the process of observing bees in an artificial bee colony, GWO was adaptively integrated to enhance the mining capability and the optimization efficiency.Zhang et al.21proposed a hybrid algorithm of biogeographybased optimization and GWO.The algorithm integrates the improved biogeography-based optimization algorithm with the GWO based on back-propagation learning to maximize the optimization.Teng et al.22introduced a hybrid algorithm of PSO and GWO to deliver better searching capability and robustness.Arora et al.23described a hybrid algorithm integrating a crow search with GWO to realize more effective global optimization.In the past two years, researchers have also used GWO algorithms to resolve such problems in different types of networks as localization,24path planning,25topological control,26and clustering.27

    In 2018, Wu et al.28developed a new SIOA algorithm,COA, to simulate the life, growth, and death of coyotes in packs.With its unique search model, structure and outstanding optimization performance, COA has major advantages in resolving complicated optimization problems.However, it is still troubled by such deficiencies as low search efficiency,poor operability, and slow convergence.Additionally, COA, as a new algorithm, needs to be further improved and introduced to other fields.

    1.3.Contribution of the study

    This paper proposes three algorithms designed to effectively address the clustering and localizing problems of a loitering munitions ad hoc network in a satellite denied environment.These algorithms include a Swarm Intelligence based ammunition cluster collaborative Localizing algorithm(SIL),a Swarm Intelligence based Clustering algorithm (SIC), and a Compressed Sensing algorithm based on HCOGW (CSHCOGW).The main contributions of this study are as follows:

    (1) A hybrid, specifically a HCOGW, of the COA and GWO algorithms is proposed.First, the improved COA is introduced.In the growth process, a Gaussian global best growth operator is proposed to enhance the search capability.In the meantime, a scheme of dynamically adjusting the number of in-group coyotes is presented.At the beginning of the search, fewer groups are used to weaken the positive feedback effect of the global best solution and reinforce the search capability.At the late stage of search, more groups are employed to strengthen the positive feedback effect of the global best solution, reinforce the mining capability, and enhance the operability of the system.Subsequently, the GWO is improved to generate a Simplified GWO (SGWO), which retains its strong local search capability and improves its operability.In the end, sinusoidal crossover strategy is adopted to organically combine ICOA with SGWO.After proving a perfect balance between the exploration and mining capabilities of coyotes in a group during their growth,this strategy enables HCOGW to resolve the problem of local optimum and embrace a strong capacity of global optimization.

    (2) A localizing method, SIL, is put forward based on the HCOGW algorithm.In the HCOGW model,a lead wolf dynamically estimates the location of a prey, so that every wolf moves toward the estimated location.As revealed in the simulation results, the SIL algorithm has the best performance in terms of localization accuracy,convergence rate,computing cost,and energy consumption, compared with other algorithms such as a selective 3-anchor DV-hop,7DCDV-Hop,8ND-DVHop,9GWO-LPWSN10and DV-hop.6

    (3) A clustering method, SIC, is put forward based on the HCOGW algorithm to effectively improve the service life of the network.With the highly dynamic topological structure, the scale and quantity of clusters exert a significant effect on the quality of communications.As a result, an analysis model was constructed in this paper.The optimal number of clusters was also determined.This SIC algorithm is compared with some popular clustering algorithms such as Cluster-based Location-Aided Dynamic Source Routing (CBLADSR),29Ant Colony Optimization (ACO),30EALC,31GA,32and SOCS.33As revealed in the simulation results, the SIC algorithm can deliver a highly reliable network with the shortest cluster building time.

    (4) Based on the SIC algorithm,a novel method is proposed to select the Cluster Heads(CHs)using the fitness of loitering munitions.The key is to identify the CH nodes characterized by high residual energy,multiple neighbor nodes, and a short intra-cluster distance.These nodes are responsible for data summary and transmission.The simulation results demonstrate that SIC needs a small number of CH nodes, and performs better than several popular algorithms in terms of total energy consumption.

    (5) The CS-HCOGW algorithm is proposed for data transmission in the clustering process.In each cluster,cluster members transmit data to the corresponding CHs, but the CS-HCOGW algorithm is not used in this process.Subsequently, each CH is transmitted to the Base Station (BS) through CS-HCOGW routing.With the proposed algorithm, the least cost routing from the CHs to the BS is determined to reduce the number of transmissions and limit the delay during routing.In the simulation, CS-HCOGW routing is compared with the clustering algorithm without Compressed Sensing (CS) and the Shortest Path Tree(SPT)34algorithm.The results reveal that CSHCOGW requires the lowest number of transmissions,which effectively lowers the energy consumption of the entire network.

    2.Preliminary findings

    2.1.Maneuvering scenario

    A typical engagement scenario in a satellite denied environment is illustrated in Fig.1.Munitions are automatically networked and clustered in the air.The data from Cluster Members (CMs), e.g.the images or videos collected by loitering munitions or video scout projectiles, are transmitted through transmission-efficient routing to the Base Station(BS), providing battlefield information for commanders.All the ammunition nodes (CMs) are equipped with measurement and communication units.The clustering and localizing system proposed in this paper is mainly related to two phases,known as offline and online phases(Fig.2).In the offline phase,nodes are localized to determine the topographical structure of the ad hoc network.Subsequently, the online phase starts and involves the following two subsystems: clustering and data transmission.In the clustering process, each node (CM) can identify any adjacent nodes, and select a Cluster Head (CH)node for its cluster.Data transmission aims to fulfill the communications and data aggregation between CMs,CHs and the BS.

    Fig.1 Engagement scenario showing a Cluster Head (CH), Cluster Member (CM), and Base Station (BS)in action with a compressed sensing.

    2.2.Grey wolf optimization algorithm

    The Grey Wolf Optimization (GWO) algorithm simulates the rigid leadership hierarchy and swarm predation of grey wolves.In their leadership hierarchy, grey wolves are classified into α,β, δ and ω grey wolves from higher (leader) to lower (subservient follower) class, that is, the β wolf is the pack leader,and theα wolf is the second most dominant and so on.The pack will hunt, approach, capture, encircle, attack and kill prey as a group.In the GWO algorithm, α, β, δ and ω grey wolves represent the first, second, and third best solutions,and another candidate solution, respectively.The mathematical model for grey wolf’s encirclement behavior is as follows:

    where Dis represents the distance from a grey wolf to its prey;t indicates how many iterations have been conducted so far; Xpis the location vector of the prey;X is the location vector of the grey wolf.As shown in Eqs.(3)and(4),A and C are coefficient vectors.The coefficient e decreases linearly from 2 to 0 in the iteration, as given in Eq.(5).In these equations, MaxDT represents the maximum iteration; r1and r2are the evenly distributed random vectors in [0,1]; c1is the adjustable parameter,35?stands for the multiplication of the corresponding components for two vectors.The mathematical model of the hunting behavior is as follows:

    where Disα,Disβand Disδindicate the distance from the α grey wolf to three best grey wolves,respectively.Eq.(12)defines the new position that the grey wolf ω moves to under the guidance of α,β and δ grey wolves,that is,the new solution generated by the GWO algorithm.

    Compared with the classical intelligent swarm algorithms such as PSO,the GWO algorithm has the following characteristics:(A)The GWO algorithm uses the three best grey wolves(solutions) to guide the ω grey wolves in hunting.This algorithm has strong local search capability, but may be easily trapped in a local optimum while coping with any complicated optimization problem.(B) The GWO algorithm involves only two parameters, e and c1.The former is dynamically adjusted,but the latter is usually taken following the method described in Ref.28.It is therefore, highly operable since only a few parameters are adjusted.(C) The GWO algorithm is easy to implement because of its simple principles, but it is updated with the dimensional computation including Eqs.(6)–(12).Therefore,its computation is very complicated.(D)The objective function uses parallel computing, so that the GWO algorithm can be executed very quickly.

    2.3.Coyote optimization algorithm

    A Coyote Optimization Algorithm (COA) contains initialization parameters and four major steps including creation of a coyote pack, in-group coyote growth, birth and death of coyote pups, and group expulsion and reception.

    In Step 1,the parameters are set including coyote pack size N, number of coyote groups Np, number of in-group coyotes Nc, and MaxDT, where N=Nc×Np.Subsequently, the groups in the coyote pack are randomly initialized.The randomized operation of the cthcoyote in the pthgroup in the hthdimension is defined by Eq.(13).Finally, the fitness(fit)of each coyote soc is calculated as follows:

    where ubhand lbhrepresent the upper and lower bounds of the social state factor in the hthdimension for the coyote;h=1,2,...,D, where D is the search space dimension; r is a series of random numbers evenly distributed in [0,1]; and f stands for the fitness function.

    Step 2 involves the process in which the best coyote,alpha,the group culture cult and two randomly selected coyotes cr1 and cr2 affect the coyotes in the group, that is, the impact of δ1and δ2on the in-group coyote growth.Among them, cult is calculated by Eq.(15).In other words, each factor is the median of the social factors of all the coyotes in the group(O is the sequence of ranked social factors).Therefore, cult is also known as median coyote.Moreover, δ1and δ2are calculated by Eqs.(16) and (17) respectively.The growth of coyotes is as follows:

    where new soccis the new solution obtained for the growth of the cthcoyote in the group;and r3and r4are random numbers evenly distributed in [0,1].After the growth of coyotes in the group, their social fitness is evaluated as defined by Eq.(19).The new fitness is denoted by new fitc.

    Finally, an iterative greedy algorithm is adopted for survival of the fittest as given in Eq.(20).Hence, the newly identified better coyotes take part in the growth of the other coyotes in the group, so as to speed up convergence.

    In the third step,the birth of coyote pups is affected by the genes of randomly selected coyote parents and the environmental factors, which is represented by Eq.(21):

    where rhstands for the random numbers evenly distributed in[0,1]; h1and h2indicate two randomly selected dimensions to ensure that pups can receive genes from their father coyotes;Rhrepresents the randomly generated variation in the decision variables of the hthdimension; Psand Paare dispersion and correlation probabilities, respectively, which decide the inheritance and variation of coyote pups,as defined by Eqs.(22)and(23).

    After a coyote pup is born, its social fitness is evaluated to determine its ability to live or document its death.Specifically,there are three circumstances with regard to social fitness: (A)if a coyote in the group is inferior to the coyote pup,that coyote dies.The coyote pup lives, and its age is set to 0, that is,age = 0; (B) if several coyotes in the group are inferior to the coyote pup, the weakest and oldest coyote among them dies.The coyote pup lives, and its age is set to age = 0; (C)if all coyotes in the group are superior to the coyote pup, the coyote pup dies.

    In Step 4,coyotes are expulsed and received at the probability Pein COA.The coyotes are first randomly assigned to groups, but some coyotes may leave their group and join any other group.This random expulsion and reception guarantees the diversity of coyotes in each group and the sharing of information between groups.The probability Peis calculated by Eq.(24):

    As revealed in the above description,a COA has the following advantages: a good search framework, strong local search capability and some global search capability, which can better solve complex optimization problems.

    Nevertheless, a COA has some disadvantages including the following:(A)The computation is very complicated because of its complex structure.(B) The iterative greedy algorithm used in the COA has poor stability and efficiency.(C)A large number of parameters need to be adjusted including Pe,Npand Nc,so that it is not greatly operable.(D)The multi-group structure may enhance the exploration capability, but the lack of information sharing between groups will lead to slow convergence in the later phase.

    3.Energy-efficient swarm intelligence based localization algorithm

    For loitering ammunition ad hoc networking, an energyefficient Swarm Intelligence based Localization algorithm(SIL) is put forward in this section.In the SIL algorithm, a boundary is established to improve sampling efficiency by reducing the initial search space.With lowered computation cost, rapid convergence is achieved.The initial location of nodes is estimated as defined in Algorithm 1.Subsequently,the existing swarm intelligence algorithms, that is, Grey Wolf Optimizer (GWO) and Coyote Optimization Algorithm(COA), are integrated to develop a hybrid optimization algorithm (HCOGW) based on sinusoidal crossover strategy, as defined in Algorithms 2 and 3.This hybrid algorithm further enhances the optimization.In the end, the SIL algorithm is used with HCOGW to optimize the results of initial localization as illustrated in Algorithm.As compared with the existing popular algorithms in a simulation experiment, the SIL algorithm has better localization accuracy and faster convergence.

    3.1.Localization energy consumption

    In this study,N denotes the number of patrol missile nodes,Nadenotes the number of anchor nodes,the percentage of anchor nodes is Ar=Na/N, the number of unknown nodes is Nu=N-Na, Sndenotes the set of neighboring nodes of a node within the communication range, and the node communication radius is R.There is no central node in the ad hoc network, wherein each node has the same status, and the anchor node is provided with its accurate location information at any time.

    The energy model put forth by Heinzelman et al.36has been a popular method for energy consumption.A node of unknown coordinates has its transmitted and received energy denoted by ETxand ERx,respectively.The value is represented by ψ and the transmission distance by d, so that there is:

    where Esand Eastand for the energy consumption because of the transmission in the transmitter circuit and the radio frequency amplifier, respectively.

    3.2.Sampling area

    The distance of communications between nodes is set as R.When two nodes i and j in the loitering munitions ad hoc network fall into the communication range,they can directly communicate with each other.In this case, the two nodes are onehop neighbors.If the nodes i and j are within the 2R range,they are two-hop neighbors.The maximum velocity of flight at a node is indicated by vmax.Assuming that the velocity at a node keeps at vmaxwithin the period from t-1 to t, if an anchor node is able to broadcast the scanning signal periodically, the period T is defined by Eq.(27):

    where p(lt|lt-1) stands for the probability of correctly estimating the location of the unknown node;Rmaxindicates the maximum distance the unknown node moves at the velocity vmax;d(lt|lt-1)denotes the Euclidean distance between two locations ltand lt–1of the unknown node at the time t and t–1, respectively.The sampling points are filtered for the unknown node based on the information collected from its one- and two-hop anchor nodes.At the time t,the sampling particle l is subject to the following filtering conditions:

    where a is the anchor node; l is the sampling particle; Sa1stands for a set of one-hop anchor nodes; and Sa2represents a set of two-hop anchor nodes.

    3.3.Creation of bounds

    Eq.(30) indicates the communication area of the anchor node Aki.For all 1 ≤i ≤m,any unknown node p in(BCi)has:

    For (xi, yi, zi), Eq.(31) can be constructed as:

    Thus,

    With Eqs.(34) and (35), we obtain:

    If a loitering munitions node has n one-hop anchor nodes,its bounding box can be created as:

    where xminand xmaxstand for the upper and lower bounds of x,respectively.Other coordinates can be estimated in a similar way.As for two-hop anchor nodes,R in Eq.(37)can be simply replaced by 2R.

    Let the feasible region of Nube FRuas shown in Fig.3(a).The intersection of the bounding cubes FRuis formed by the minimum upper coordinate and maximum lower coordinate of each cube:

    where Buand Blare the upper and lower bounds of Nu,respectively, and defined by:

    where diis the estimated distance from the anchor node Akito the unknown node.As shown in Fig.3(b), no intersection of the bounding cubes exists in the pseudo-intersection period.duidenotes the distance from Akito the boundary of the cube where it is located.

    Fig.3 Intersection and pseudo-intersection of bounding cubes.

    Let Bl= (xl,yl,zl)Tand Bu= (xu,yu,zu)Tbe the upper and lower bounds of the region, respectively.The pseudointersection of the bounding cubes should comply with the following rules:

    3.4.Distance estimation

    The estimated and actual values of unknown nodes are assumed to be (xei,yei,zei) and (xri,yri,zri), respectively.The localization error can be expressed as:

    Estimating the location of unknown nodes can be regarded as an optimization problem, and then resolved by minimizing the objective function.The objective function of localization error is defined as:

    where dijand ^dijrepresent the actual and observed distances between the unknown node and the anchor node, and K indicates the number of neighboring nodes.

    A multi-hop algorithm does not require other observation equipment on loitering munitions, so that it is economically advantageous.As shown in Fig.3, Nustands for unknown nodes.In the feasible region of Nt, Ak1, Ak2and Ak3are three anchor nodes adjacent to Nt, while h1,Nt,h2,Nt,h3,Ntare the largest number of hops to three anchor nodes, respectively.

    The radius to construct the feasible region is R ?hi,Nt.The feasible region can be defined by the bounding cubes as follows:

    Fig.4 Comparison of hierarchies of the Grey Wolf Optimizer(GWO) and a Simplified GWO (SGWO).

    Localization is an iterative process.Localizing an unknown node will require the use of at least three anchor nodes.After being localized, the node will be used as an anchor node to localize other unknown nodes.The process is repeated until all nodes are localized.The network search process is as presented in Algorithm 1.

    3.5.A hybrid algorithm of coyote optimization with a grey wolf optimizer based on sinusoidal crossover strategy

    Three algorithms are presented in this section, specifically, an Improved Coyote Optimization Algorithm(ICOA),Simplified Grey Wolf Optimization(SGWO),and a Hybrid Coyote Optimization algorithm with Grey Wolf optimizer (HCOGW).

    Among them, ICOA involves a Gaussian global best growth operator and a scheme of dynamically adjusting the number of coyotes in groups.Enlightened by the best strategy and Gaussian distribution in the global best harmony search algorithm proposed by Omran et al.37, we make an improvement to the growth of coyotes in groups and put forward a Gaussian global best growth operator.This intends to improve the social fitness of coyotes after growing up, enhance the information sharing between groups,and speed up the convergence of the algorithm.The global best operator makes full use of the state information of the global best coyotes in the coyote pack.It helps coyotes grow toward such global best coyotes,so as to enhance the mining capability.Meanwhile, the information in each group can be shared with other groups by virtue of a global best solution.A Gaussian distribution is also known as normal distribution.Compared with the uniformly random distribution [0,1] in COA, it can widen the search range and improve the global search capability to some extent.For the growth of coyotes in groups, best operator and Gaussian distribution random factor are introduced into Eq.(18) to obtain Eqs.(44) and (45).

    In Eq.(44),GP is the current global best coyote,and δ3represents the difference between any other randomly selected coyote (cr1 ) in the group and GP.In Eq.(45), rn1and rn2are the random numbers generated by the Gaussian (normal)distribution with the mean value 0 and the variance 1, respectively.Moreover, new soc1indicates the new state (new solution) generated when every coyote grows under the joint effect of δ2and δ3.

    Based on Eqs.(44) and (45), search capability is improved at the early stage of searching compared with COA.This is attributed to the existence of greater differences between individuals and an increased range of the scaling factor(Gaussian random number).However, the search range shrinks during the late stage of searching because of reduced differences between individuals and the lower values of δ2and δ3.Regardless of the Gaussian random number, the mining capability is reinforced.Furthermore, a global best solution is adopted to enhance the mining capability.Meanwhile, the global best solution obtained in a group will exert an effect on the growth of coyotes in the next group.This information sharing can generate positive feedbacks, which greatly speeds up the convergence.In addition, the fitness and survival for the fittest coyotes are calculated in parallel for all the adult coyotes in the group, which improves the speed and stability of the algorithm.

    The COA is poorly operable since it requires the adjustment to multiple parameters.Comparatively, the improved COA involves two parameters Ncand Np, that have a major impact on the optimization process.When N is fixed, if Ncis certain, Np=N/Nc.The greater Np, the lower Nc.Then, the growth process requires few operations,but the effect of a global solution increases group by group,resulting in high mining capability.In contrast,a lower Npleads to more operations for growth,and the effect of a global solution diminishes together with a decrease in mining capability.To improve the operability of COA, the parameters Npand Ncare dynamically adjusted in this paper.If N=100,Npand Ncmust be the factors of 100.According to Ref.38, each group has no more than 14 coyotes.Hence,Nccan be only four,five or ten.Moreover,Nccannot be less than three,since the growth of coyotes in a group requires at least three coyotes, including two randomly selected coyotes and the best coyote in the group.When Nc=4,the range of coyotes available is limited.For this reason, the most likely values of Ncmust be five or ten.

    At the late stage of searching, Nc=5, so that Np= 20.Hence, there are many groups involved.This strengthens the positive feedback of the global solution, and improves the search capability.At the early stage of searching, Nc=10, so that Np=10.Because there are fewer groups,this undermines the positive feedback of the global solution, but enhances the global search capability.Consequently, dynamically adjusting the number of coyotes in a group can improve the operability and reach a better balance between exploration and mining.After dynamic adjustment, coyotes are randomly grouped, so that the expulsion and reception of coyotes by groups can be eliminated from the process.In other words,the parameter Pewill not be adjusted, resulting in better operability as well.

    Additionally, the GWO algorithm is simplified.The GWO search is introduced in this paper to further address the problems of COA including inefficient search and easily falls into the local optimum.Hence,a simplified GWO search algorithm is put forward by integrating Eqs.(6)–(12) with in-group coyotes in COA.It is further simplified as presented in Eqs.(46)–(48).

    In these equations,tempcrepresents the state of the cthcoyote in the current group; NX1, NX2and NX3indicate the growth of coyotes in the group under the guidance of GP,alpha, cult, respectively.As shown in these equations, the adjustable vector C in Eqs.(6)–(8)is removed.This can retain the advantages of GWO and overcome its limitations.In other words, removing C in the SGWO algorithm causes no adjustment to c1and no calculation of the vector.For this reason,the SGWO algorithm can improve the operability and lower the complexity of computation while guaranteeing the strong mining capability.For further simplification of calculation,SGWO searches for the best solution directly following the guidance of global best, in-group best, and median coyotes(in-group culture) in GWO.It does not require searching for the second and third best coyotes in the group.In this way,SGWO can be efficiently integrated with COA.For better understanding, the hierarchies of grey wolves in GWO and SGWO are compared as shown in Fig.4.

    At last, ICOA and SGWO are organically integrated by the sinusoidal crossover strategy, in order to achieve a balance between exploration and mining in the growth of coyotes in the group.The goal of the crossover strategy is to obtain a new solution by making two solutions cross each other at a certain probability.When the probability is zero,the dimension values of two solutions are not exchanged.When the probability is 1, all the dimensions values of two solutions are exchanged.However,no new solution is generated in both situations.Thus,the crossover of two solutions can achieve the best effect only at an appropriate probability.The sinusoidal function probability model is used to achieve the satisfying exploration and mining.In other words,the sinusoidal function is employed to adaptively control the crossover probability CR (which fluctuates around 0.5 gently in the early phase,but dramatically in the late phase),which takes into account the diversity and convergence of coyotes in a group.39The probability is calculated by

    The sinusoidal crossover strategy used in this paper is as defined in Algorithm 3.At the probability with rand

    The HCOGW algorithm under the sinusoidal crossover strategy is as given in Algorithm 3.

    Algorithm 3.Hybrid coyote optimization with grey wolf optimizer(HCOGW); GP.Input: parameter CR, pack size Output: Global best solution GP 1.Let t = 0, and randomly initialize the coyote pack and assign coyotes to different groups 2.Calculate the social fitness of coyotes, and obtain the current global best coyote GP 3.while (t = 1 to MaxDT) do 4.for t = 1to MaxDT do 5.if t>MaxDT/2 6.Nc = 5 7.else 8.Nc = 10 9.end if 10.t = t + 1 11.Dynamically adjust the parameters e and CR based on Eqs.(5) and (49)12.Group randomly 13.Calculate the in-group best coyote alpha and the group culture cult based on Eqs.(16)–(18)14.Calculate the growth of coyotes in the group based on Eqs.(44) and (45)15.Select the cth coyote in the pth group 16.for j = 1 to D do 17.if rand < CR 18.Calculate Eqs.(46), (47), and (48)19 new /3 20.else 21.Adopt Eq.(45) with Gaussian global best growth operator(continued on next page)cj = NX1,j+NX2,j+NX3,j

    * (continued)Algorithm 3.Hybrid coyote optimization with grey wolf optimizer(HCOGW); GP.22.end if 23.end for 24.Conduct the parallel control of boundaries, and the parallel computation of social fitness for each coyote 25.Make a greedy choice to keep the best coyote and update the global best coyote GP 26.Randomly select the father coyote and the variation caused by environmental impact based on Eq.(21),and give birth to a new coyote.Calculate its social fitness, compare it with the oldest coyote with the poorest social fitness,and retain the better one 27.if the newborn coyote survives 28.age = 0, and update the global best coyote GP 29.else 30.The newborn coyote dies 31.end if 32.Update the age of coyote, age = age + 1 33.end for 34.end while 35.return GP

    The sinusoidal crossover strategy organically integrates two search methods to satisfactorily balance the exploration and mining capabilities during the growth process.

    As revealed in Algorithm 3, the HCOAG algorithm is different from COA in the following aspects.(A) The sinusoidal crossover strategy is integrated with the Gaussian global best growth operator and SGWO in the growth process.(B)Parallel computation is carried out for the fitness of coyotes in a group.(C) The parameters are dynamically adjusted.(D)The process of coyotes being expulsed and received by groups is discarded.In addition,the convergence analysis of HCOGW is described in detail in the appendix.

    Fig.5 Localization flow chart of SIL algorithm.

    4.Energy-efficient swarm intelligence based clustering algorithm SIC

    As a method for breaking down a network structure,clustering is driven by multiple factors such as the task at hand,communication, calculations and resources.It is intended to balance the computational pressure among nodes, and to reasonably allocate the network resources.The nodes with better resources can undertake more computational tasks, so as to improve the stability of network.In ammunitions ad hoc network, clustering is crucial to the effective management of network topology.In this section, clustering and Cluster Head(CH)selection is a key step designed to lower energy consumption.This step is taken to balance the use of resources and extend the service life of the network.Additionally, a clustering scheme based on a coyote and grey wolf hybrid operation is proposed together with the CH selection algorithm and the efficient routing transmission algorithm.

    4.1.System model

    In the clustering scheme, loitering munitions are formed into several groups and distributed in the air.It is assumed that there are N loitering munitions in the area.The cluster set Csis defined as, where Nprepresents the number of clusters and Ncis the number of ammunition nodes in the cluster.The network diagram is defined as G(V,E) with V for the vertex set of ammunitions and E for the edge set.If the Signal-Noise Ratio (SNR) between ammunitions i and j is lower than the specified minimum threshold, i and j are neighboring nodes.

    4.2.Channel model

    This section particularly describes the channel model between ammunitions.A loitering munition is a ‘‘combination” of an Unmanned Aerial Vehicle (UAV) and a munition, so that its channel model is mainly based on the UAV to UAV (U2U)channel model for a UAV.When the ammunition node i transmits a signal to j, the power received by j from i can be expressed as

    where Pi,jrepresents the transmission energy from i to j;indicates the power gain of small fading channel;di,jis the distance between two nodes;γ stands for the average loss index on the path.The signal–noise ratio from i to j is:

    where NwGrepresents the additional Gaussian white noise.The U2U channel is normally controlled by the Line-of-Sight(LoS)link.Hence,the loss on the path from i to j may be regarded as the transmission in free space, and expressed as:

    where f0stands for the carrier frequency of the U2U channel,and csis the speed of light.

    Subsequently, a UAV to Base Station (U2BS) channel model is proposed in this paper.In this model,the channel link probably has a LoS or non-LoS (NLoS) link.The probability parameters include the height of the loitering munition and the angle of elevation between the loitering munition and the ground or ship base station.It is assumed that the height of ammunition is zi,and the distance from the estimated location of ammunition to the BS is ri,BS,so that the probability of LoS is defined by:

    where di,BSstands for the distance from i to BS; φ and ψ1are the parameters related to air conditions.The loss on the path between i and BS is expressed as:

    where ? is the loss index on the path; f0stands for the carrier frequency; csis the speed of light; ?LoSand ?NLoSare the additional path loss with LoS and NLoS, respectively.

    4.3.Energy consumption of cluster head

    The energy consumption of nodes occurs mainly in the process of transmitting and receiving signals.In this section, the same energy model as described in Ref.40 is adopted, that is, the free space multipath fading channel based on the distance d between the transmitter and the receiver.Moreover, the distance threshold for the transmission of 1-bit data is denoted by dth.Thus, energy consumption can be expressed as:

    where Eelecis the parameter of electronic energy consumption,which depends on the energy consumed per bit from the transmitter to the receiver; εfs?d2and εfs?d4are the energy of the amplifier in two situations, and their values depend on d.The energy consumption of receiving 1-bit data is:

    It is assumed that the average number of clusters in the entire munitions ad hoc network is Np;the average energy consumed by each cluster is ENp; the average number of nodes in each cluster is N/Npwith N the total number of nodes.The average energy consumed by one round of communication is defined by:

    where cgrstands for the mass parameter of the communication channel.The average energy consumption of each cluster is:

    where ECHis the energy consumption of cluster head; ECMfsand ECMmprepresent the energy consumed by Cluster Member(CM) nodes in the free space and multipath amplification model, respectively; Γ and 1-Γ stand for the fraction of member nodes transmitted by the free space and multipath models, respectively.Hence, ECHcan be expressed as:

    where dBSis the average distance from the CH node to the base station.Moreover, ECMfsand ECMmpare defined by:

    where dCHfsand dCHmprepresent the average distance from CM to its corresponding CH in the free space and multipath models,respectively.With regard to d ≥dthin Eqs.(56),(60),(61)and (62) are simultaneously solved to obtain:

    Eq.(58) is substituted into Eq.(63) to obtain:

    4.4.Optimal number of clusters

    Normally,the total energy consumption of an ad hoc network depends on the number of clusters in the network.The optimal number of clusters should be chosen to lower energy consumption and achieve a balanced network.Thus, a mathematical model will be built to determine the optimal number of clusters in this section.The volume of the cubic network area in the air is defined by:

    where M is the length of such cubic network area.The average volume occupied by each cluster is determined by:

    The cluster area can be expressed as fXYZ(x,y,z).Let the position of CH be the centroid of the cluster area.The estimated spatial distance from a node to CH is calculated by:

    Assuming that the cluster area is spherical, fRθf(wàn)(r,θ,φ) is a constant of the cluster area.The radius of such sphere and the density of nodes can be expressed as:

    Then, Eq.(67) may be rewritten into:

    Eq.(70) is substituted into Eq.(64) to obtain the optimal number of clusters Nopt

    p in the ad hoc network as follows:

    The probability of selecting the optimal number of CHs is defined by:

    4.5.Clustering algorithm

    In this section,the HCOGW algorithm is adopted for the clustering of the munitions ad hoc network.The goal is to assign N ammunition nodes to the preset or optimal number of clusters.The correlation between wolf pack and ammunition clusters is presented in Table 1.

    In the clustering process,the nodes with the shortest Euclidean distance are assigned to the same cluster.This ensures the shortest distance of data transmission and reduces the energy consumption.Nevertheless, it is very difficult to locate the nodes in a highly dynamic topological situation such as ammunition networking.To resolve such a difficulty, the HCOGW algorithm was developed to measure the distance between nodes.First,the sum of square errors in Eq.(74)is minimized to determine the geographical position of ammunition for grouping:

    Table 1 Similarity between wolf packs and ammunition clusters.

    Algorithm 5.Clustering Based on HCOGW.Input: Number of clusters Noptp and wolf pack size U Output: The final centroid position of each cluster Cg,g = 1,2,..., M 1.Initialize the position of wolf pack U= U1,...,Uw,...,UW[]2.Initialize the parameters α and CR 3.Initialize the number of clusters Cg ←?4.repeat 5.Cg ←C′g 6.for each wolf w=1,2,...,W do ■do 8.Update the wolf-to-cluster association using Table 1 9.end for 10.end for 11.while(t=1 to MaxDT)do 12.for each wolf w=1 to W do 13.for each wolf, h=1 to D do 14.Update the position of each wolf defined by Eq.(12).15.Evaluate the new position of wolf w defined by Eq.(75).16.Update the values of (α, CR)17.Calculate the in-group best wolf alpha and in-group culture cult 18.Use Eqs.(44) and (45) to calculate the growth of coyotes in each group 19.Use the Gaussian best growth operator for the growth of some coyotes, and the simplified grey wolf optimization algorithm for the other coyotes in a group, based on the sinusoidal crossover strategy 20.Calculate the social fitness of each coyote, and conduct the greedy selection to retain the best coyote and update the global best coyote GP 21.Randomly select the father coyote and the variation under environmental impact to generate a newborn coyote based on Eq.(21), calculate its social fitness, and determine its life or death 22.Update the age of coyote and the global best coyote GP 23.end for 24.end for 25.t=t+1 26.end while 27.Return GP /*the position of GP is the final centroid position*/28.until (Cg =C′g) /*no change in the cluster centroids */■7.for each cluster Noptp = C1,C2,...,Cg,...,CM

    4.6.Cluster head selection

    In this section, the HGWO algorithm is mainly adopted to select the CH of the network as given in Algorithm 3.In Algorithm 6,the best solution is GP.In the first round,the position of wolf is updated with Eqs.(46)–(48).Subsequently,the position of wolf is updated using the fitness.The fitness is determined as follows:

    Fig.6 Flowchart of SIC algorithm.

    Case 1.

    Case 2.

    Case 3.

    where k stands for the number of iterations, and fit0indicates the poorest fitness.

    Case 4.

    In the CH selection, several fitness functions are normally employed in a bid to maximize the fitness function.The fitness model mainly takes into account such functions as In-Cluster Distance (ICD), Number of Neighboring nodes (NoN), and Remaining Power of ammunition node (RP):

    where three coefficients coef1,coef2and coef3are 0.2,0.3, and 0.5, respectively, in terms of their priority.The average distance from the node of a coyote to the initial CH is the fitness function (ICD), which is defined by:

    where‖Un-CHg‖denotes the distance from the node of the coyote to the cluster head CHg,and Ngindicates the number of ammunition nodes in the cluster with CHmas its cluster head.The NoN function of fitness is expressed as:

    where ERCHgstands for the remaining power level of the current cluster head CHg, 1 ≤g ≤M.The cluster selection process is detailed in Algorithm 6.

    Algorithm 6.CH Selection Based on HGWO.Input: Cluster Cg and wolf pack size U Output: Cluster head CHg, g = 1,2,..., M 1.Initialize the position of wolf pack U= U1,...,Uw,...,UW[]2.Initialize the parameters e and CR 3.Calculate the fitness (fit) of each coyote 4.Choose the three best solutions Uhw,GP,Uhw,alpha, and Uhw,cult 5.while (t++

    4.7.Cluster maintenance

    The cluster maintenance strategy adopted in this paper is classified into intra- and inter-cluster topology maintenance.

    (1) Intra-cluster topology maintenance

    In a clustered network model, the intra-cluster topological structure may be changed by adding a new node into the network, having an interrupted link between CH and member nodes, or changing the CH node of the cluster.

    (A) Adding a new node into the network

    As shown in Fig.7, a new node continuously broadcasts a request message for joining to the network.After receiving such a message, the CH node determines whether to accept the new node according to Algorithm 5.If rejected, the new node continues to broadcast.If accepted, the new node will receive a reply message from the CH node.The new node will send a joining message to the CH node.After the new node joins the cluster, Algorithm 6 is used to judge whether the new node becomes a new CH node.If not, the CH node will renew the member list of the cluster.If yes, the new node will broadcast the Chead message of its becoming the CH node to others.

    (B) Link interruption

    If a CH node j in the network broadcasts the Chead message,but does not receive the Renew data packet from a node i in the cluster’s member list,or the member node i in the cluster does not receive the Chead packet broadcasted by the CH node j after the time t, the member node i and the CH node j conclude that their link has been interrupted.The specific maintenance strategy is as follows:

    Fig.7 Intra-cluster topology maintenance for adding a new node to the network.

    Fig.8 shows how a member node i, whose link to the CH node j is interrupted makes an attempt to join another cluster.If the node i does not receive the Chead message from the current CH node, it will broadcast a request message.Another CH node determines whether to accept the node according to the clustering algorithm.If yes, the CH node sends a reply message to the node.After the node confirms joining the cluster,it officially joins the cluster.If no reply is received from the CH node, the node will be regarded as an invalid node.

    (C) Changing CH of a cluster

    Because of different motion speeds and remaining energies of nodes in the network, some CH nodes may become incompetent after a while.The procedure of topology maintenance for changing a CH node is illustrated in Fig.9.

    As shown in Fig.9, the CH node broadcasts the Chead message to the member nodes of the cluster in periods t.After receiving the Renew data of member nodes, the CH node renews the member list.The proposed cluster selection algorithm is used to judge whether to generate a new cluster head.If yes,the node is elected as the new cluster head.Then the new cluster head begins to broadcast the Chead message and renew the member list.

    (2) Inter-cluster topology maintenance

    The inter-cluster topological structure may be changed for the following reasons: a member node moves from a cluster to another cluster, causing the structural change of both clusters; a CH node moves into the communications coverage of another CH node,resulting in the massive overlapping of both clusters.

    (A)A member node moves from a cluster to another cluster

    At this moment,the member node moves to a new position.The value from Eq.(74)is taken to find out whether it satisfies the requirements of minimization.If not, the node is guided outside the boundary of the cluster through Eq.(75).The node sends a request message for joining to another CH node.The CH node determines whether to accept the node according to the proposed clustering algorithm.If yes, the CH node replies to the node, and the node joins the cluster after giving a response.The specific maintenance procedure is given in Fig.10.

    (B) A CH node moves into the coverage of another CH node

    With the motion of CH nodes,a CH node may easily move into the communications coverage of another CH node.In this case, the cluster and CH must be renewed according to Algorithms 5 and 6.

    4.8.Transmission-efficient routing

    Transmission-efficient routing means that the routing involves the lowest number of transmissions.A wireless ad hoc network is characterized by the equality of nodes since there is not a central architecture.Therefore, any node is capable of forwarding, integrating and computing information, and will not affect the entire network if it fails.

    If two nodes are far away from and unable to communicate directly with each other, they may forward the control and data messages through a multi-hop relay to complete the entire communication process.Nevertheless, this process is troubled by long time delay and massive amounts of data transmission.Especially in a loitering munition ad hoc network,ammunition nodes need to transmit the information obtained from reconnaissance in the frontier to the ground base station, and then gather the information on the overall situation.This may drain the battery in the ammunition very quickly.Therefore,a Compressed Sensing scheme based on HCOGW (CS-HCOGW) is introduced in this paper for the ad hoc network of ammunitions.This scheme can considerably reduce the number of data transmissions to balance the load of data flow in the entire network.If CS-HCOGW is not used,the nodes of a cluster member often transmit data to their cluster head.

    A minimum cost algorithm is developed to connect all CHs to the base station.The cost is represented by the number of hops.These CHs use such backbone routing path to transmit data to the base station.

    Fig.8 Intra-cluster topology maintenance for link interruption.

    Fig.9 Topology maintenance for changing cluster head of a cluster.

    In the GWO algorithm, the backbone routing path is updated by the fitness of nodes.Enlightened by the GWO algorithm, we classify all nodes into three categories, that is,GP,alpha and cult,and use them to construct the main frame tree.The routing scheme is presented in Fig.11.

    Fig.10 Topology maintenance for moving a node between clusters.

    Fig.11 Example of transmission-efficient routing: BS, base station; CH1 to CH4, cluster heads 1 to 4; CM, cluster members.

    The CS-HCOGW routing is as shown in Algorithm 7.In Rows 1–4, the position of a wolf is assumed to be the matrix Ui×jwith i as the number of wolves, and j as the joint sparse Kl.Each matrix has a randomly selected integer [1,Nl] with Nlrepresenting the number of columns in Φ.Moreover, R stands for the support set of the column ΦT,which is initialized at the beginning of the algorithm.Three wolves with the best performance in the vector (1×Kl) are denoted by UGP,Ualpha,and Ucult.In the fourth row,the three best fitness values are initialized.Then initialization parameters are updated at all positions.For each row i in the matrix U,a search set C1is created, and.Subsequently, the submatrix ΦCis created from the CS matrix Φ in Rows 6–12.In the 13th row,the sub-matrix L is created,and L=ΦIis a column of the matrix Φ.The cost function measured by the fitness fit( L ) is as follows:

    Rows 15–23 are used to find the best wolf.Among them,are three best solutions.At last, the position of the wolf is updated by Algorithm 4.

    ?

    4.9.Computation complexity analysis

    The proposed SIL and SIC algorithms are based on the HCOGW algorithm.The computational complexity of HCOGW can be expressed by O(W ?kd?MaxDT), where W stands for population size; kdis the dimensions of space; and MaxDT indicates the largest number of iterations.The computational complexity of HCOGW varies in three phases.In the first phase of population initialization, the complexity is O(W ?kd).In the second phase, the fitness of all nodes is calculated, so that the complexity is O(W ?kd?MaxDT).In the third phase, the population location is updated in two stages,that is, crossover and variation.The complexity in the phase is O(W ?kd?MaxDT).The overall complexity is therefore O(W ?kd?(2MaxDT+1)).

    Since the SIL process is dominated by the HCOGW algorithm, its computation complexity is also O(W ?kd?(2MaxDT+1)).The SIL process has the same complexity as the CS-HCOGW process.In the phase of initialization, the algorithm complexity is O(W ?kd).Thereafter, it takes time to update three optimal positions in each iteration,so that the complexity O(W ?kd).After reaching the largest number of iterations, the overall complexity of the algorithm is O(W ?kd?MaxDT).

    5.Performance evaluation

    The proposed SIL and SIC algorithms were used in a simulation experiment with MATLAB to evaluate their performance in various scenarios.The performance of the SIL algorithm was first tested and compared with that of selective 3-anchor DV-hop, DCDV-Hop, ND-DV-Hop, GWO-LPWSN and DV-hop.Subsequently, the performance of the SIC algorithm was evaluated and compared with that of CBLADSR, ACO,EALC, GA and SOCS.

    5.1.Simulation environment

    Note: CBR, defined; IEEE, Institute of Electrical and Electronic Engineers; LoS, line-of-sight; MAC, defined; NLos,non-LOS; SINR, defined; U2U, Unmanned Aerial Vehicle(UHV) to UHV.

    The simulation environment settings in this paper is shown in Table 2.In the set network coverage area,the moving speed of the loitering munitions is 0–100 m/s, and the direction ranges between 0–360°.A simple loitering munitions motion model is established.The maximum velocity component of the nodes is denoted by vmax.At the time t, the coordinates of the node can be defined as:

    where rand is an evenly distributed random number and rand ~U(-1,1).

    In a satellite denied environment, the satellite signal receiver carried by the loitering munitions is normally unable to receive the navigation signals.The anchor nodes can only be the nodes of the munitions equipped with the additional signal receiving device.These nodes can receive the absolute position messages from the BS through the tactical data link.However,not all nodes are equipped with the additional signal receiving device for the purpose of small size and low cost.In the simulation process, a certain proportion of loitering munitions nodes with absolute coordinates (i.e.anchor nodes) are launched considering the practical environment of a battlefield.However, the cost will be dramatically increased by a large number of anchor nodes.According to Ref.41, the anchor nodes are therefore evenly distributed in the network,and take up 20% of total nodes.The goal is to reduce the localization error and achieve the reasonable cost control.

    5.2.Simulation results and discussion on localization

    Performance evaluation was conducted with some typical indicators such as Mean Location Error (MLE), localization success rate,and localization time of each node.The performance of several localizing algorithms is summarized in Table 3.Evidently, the SIL algorithm has the best localization accuracy.Its MLE is 6.52 m, which satisfies the requirements for accuracy under the massive networking conditions of loitering munitions.This algorithm can locate more nodes in the same period than other algorithms, so that it is timelier than the others.In addition, the SIL algorithm is characterized by a lower number of iterations, which reduces the complexity of computation and saves the energy of localization.

    In the localization of unknown nodes, the SIL algorithm performs better than other algorithms.This fact must beattributed to shortened localization since the bounding cubes are constructed to reduce the initial search space.Additionally,sinusoidal crossover strategy is integrated with Gaussian global best and simplified GWO in the growth process.The HCOGW algorithm facilitates the identification of unknown nodes, and optimizes their coordinates.The mining capability of COA is considerably improved while enhancing the capability of global search for coyote life and death.In other words,Gaussian best growth and GWO search in the HCOGW algorithm utilize the global best coyote as the guide to better obtain the global optimal solution.Then this global optimal solution plays a role in the growth of the next coyote group.In this way, a positive feedback mechanism is formed.

    Table 2 Simulation parameter settings.

    Meanwhile,two common network structures are selected in this paper, that is, uniformly random distribution and Ushaped distribution.Fig.12 presents the distribution of actual locations in two networks with the DV-hop and SIL algorithms.Evidently, the proposed SIL algorithm considerably improves the localization accuracy.

    (1) Mean Location Error(MLE)affected by the number of unknown nodes

    As shown in Fig.13, an increasing number of unknown nodes reduces localization error.More nodes contain more anchor nodes, which helps improve the accuracy of localization.Meanwhile,more and more unknown nodes are localized and then taken as anchor nodes in the localization of other unknown nodes.As shown in Fig.13,the SIL algorithm keeps the lowest MLE.

    (2) MLE affected by the number of anchor nodes

    Fig.14 shows the decrease of MLE with the increasing number of anchor nodes.When there are more anchor nodes,the distances from anchor nodes to unknown nodes are shortened, causing the decrease of MLE in all algorithms.Among them, the SIL algorithm has the best performance since the bounding cubes are created to improve the validity of samples.

    (3) Energy consumption of localization

    Fig.12 Localization results in two networks with DV-hop and SIL.

    Fig.13 MLE varying with the number of unknown nodes.

    In Fig.15, the proposed SIL algorithm has the lowest energy consumption in the localization of nodes compared with other algorithms.This must be attributed to two factors.First, the SIL algorithm needs fewer anchor nodes to localize more unknown nodes.In other algorithms, an anchor node can transmit its location as soon as it falls into the communication range.However, the SIL algorithm requests an anchor node to broadcast its location only, since the location update,optimization and hop count of nodes are performed at each target node.Moreover, the communication cost is calculated by the number of transmitted control data packets in the process of collaborative localization.Hence,the energy consumption of the SIL algorithm is significantly reduced.Second, the SIL algorithm converges very fast, which is a major cause for reduced energy consumption.

    5.3.Simulation results and discussion on clustering

    In this section, the performance of the clustering algorithm is comparatively analyzed.The optimized clustering algorithm based on HCOGW is compared with the common clustering algorithms based on swarm intelligence optimization including CBLADSR,29ACO,30EALC,31GA32and SOCS.33The results are then analyzed.

    (1) Number of clusters

    As for clustering algorithms, the number of clusters is highly decisive to the energy consumption of a network.Having an optimal number of clusters can effectively reduce the energy consumption.Fig.16 demonstrates the correlation between the number of clusters and the total number of nodes,revealing that the performance of the proposed algorithm SIC is noticeably better than other clustering algorithms because it can realize a small number of clusters.A model is built to analyze the optimal number of clusters for the minimum energy consumption of the network.The lower number of nodes in a cluster implies more clusters exist.More nodes in a cluster increase the data transmission within the cluster.In other words,if the number of clusters is not optimal,some nodes will not be assigned to clusters, and even a single node becomes a cluster,which increases the number of clusters significantly.To optimize the number of clusters, the proposed SIC clustering scheme can prevent a single node from becoming a cluster,and optimize the network topology.

    (2) Cluster building time

    Fig.14 MLE varying with the number of anchor nodes.

    Fig.15 Energy consumption comparison of algorithms.

    Cluster building time refers to the time needed by the clustering algorithm for CH selection and cluster generation.It exerts an effect on the computation complexity of the clustering algorithm.In the clustering process, each CH node broadcasts a message and declares itself as the CH in the network at the beginning of each round.The other nodes in the cluster broadcast their own position and remaining energy.In the SIC algorithm, the number of transmitted control packets depends on the CH selection and the distance between each node and the BS.Because it takes more time to build a cluster,cluster building will consume a tremendous amount of energy and shorten the service life of the network.The battery in a loitering munition contains limited energy, so that the cluster building time must be short.China Ordnance Academy and Xi’an Institute of Modern Control Technology released the key technical indicators of the intelligent munitions cluster network.Accordingly,the networking is similar between loitering munitions and unmanned aerial vehicles in a battlefield,so that the networking time of loitering munitions should be less than 60 s(which is needed for the cluster to form a relatively stable structure and allow the normal communications between clusters).42The proposed SIC algorithm has a cluster building time not exceeding 30 s even with the increasing number of nodes,so that it satisfies the requirement for the networking time in a battlefield.

    Fig.16 Number of clusters and total number of nodes in six algorithms.

    As shown in Fig.17, the SIC algorithm needs the shortest cluster building time with the increasing number of nodes in the network compared with the other five algorithms.This must be attributed to the improved COA in the HCOGW algorithm, which prevents the coyote pack from being trapped in local optimum.In this way, CH and relay nodes are obtained by the SIC algorithm to save more energy.As a result,the SIC algorithm features shorter cluster building time and reduced routing selection delay.

    (3) Number of living nodes

    After each round,some loitering munitions will be disabled when their batteries run out.Fig.18 shows a variation curve formed by the percentage of living nodes and the service life of the network.It is evident that the SIC algorithm keeps a larger number of living nodes than other algorithms after the same rounds, implying a more stable network.Meanwhile, it is also proved that the proposed SIC algorithm consumes the least energy among these six algorithms.

    (4) Total energy consumption

    The comparison of the SIC algorithm with the other five algorithms in terms of total energy consumption is illustrated in Fig.19.The SIC algorithm is obviously superior to other algorithms, which must be attributed to its optimal clustering and optimal number of clusters.

    (5) CH duration

    The life of a cluster is how long it takes for the cluster to form and reshuffle.Cluster life is an indicator of the cluster’s stability,and depends on the duration of the CH.After selecting a CH, the CH is responsible for its own cluster.Hence, a CH node plays a more important role than other nodes.In the meanwhile, the fitness of the CH node diminishes with the time.The CH node will be incompetent after its fitness reaches a certain threshold.As shown in Fig.20, the duration of the CH for all algorithms decreases with the increasing number of nodes.This fact must be attributed to the frequent clustering since the fast motion of nodes constantly causes the change of the network’s topological structure.Evidently, the cluster life under the SIC, SOCS and GA algorithms is much longer than that under the ACO,EALC and CBLADSR algorithms.In general,the SIC algorithm has the best performance in terms of cluster life.

    Fig.17 Correlation between cluster building time and total number of nodes.

    Fig.18 Variation of number of living nodes with rounds.

    (6) Packet loss rate

    The Packet Loss Rate(PLR)refers to the proportion of the data packets lost in the transmission in the total packets transmitted.It is normally tested within the throughput.The PLR is associated with the packet length and the transmission frequency.Fig.21 shows the variation of PLR with the number of nodes under several clustering protocols.As revealed in Fig.22,the PLR of SLC is within 5%,regardless of additional nodes in the transmitted data.With the increase of ammunition nodes, SIC has retained the best performance under the centralized routing protocol.Moreover, CBLDASR, ACO,and SOCS have similar performance,while the clustering routing based on GA performs better than EALC.

    5.4.Simulation results and discussion on routing

    This section presents a simulation experiment for the performance of CS-HCOGW routing.The loitering munitions nodes are assigned to several clusters.Each cluster has a CH.Fig.22 shows the clustering of nodes and the data transmission path under 2D conditions.In the figure, the CH and BS are represented by a red square and triangle,respectively and a red link indicates the shortest routing path from a CH to the BS for the inter-cluster transmission link.

    Fig.19 Variation of total energy consumption with rounds.

    Fig.20 Variation of cluster head duration with a change in the number of nodes.

    In most cluster routing algorithms,each CH node transmits data to the BS or the nearest CH.In a dynamic ad hoc network,the distance between CHs may be long,which consumes much energy to maintain data transmission.Meanwhile, the rapid movement of nodes makes it very difficult to maintain the link between CHs.The proposed algorithm CS-HCOGW uses relay nodes to transmit data to other CHs and the BS.It can lower the load of CHs,while extending their service life.Furthermore,the CH nodes near the BS become deceased prematurely because of‘‘shortest path routing”in the mainstream clustering methods, which leads to a routing loophole problem.In CS-HCOGW,CM nodes are taken as relay to transmit data to the BS, so as to achieve an energy balance between nodes.

    As shown in Fig.23, CS-HCOGW is compared with the clustering algorithm without CS and the Shortest Path Tree(SPT) algorithm.It is revealed that CS-HCOGW obviously needs a much lower number of transmissions than the other two algorithms.Among them, the proposed routing scheme requires a lower number of transmissions than the clustering scheme without CS.The proposed algorithm CS-HCOGW employs the CS technique for compression of CHs, reducing the number of transmissions.The inter-cluster data transmission is conducted through the main routing tree.Moreover,the proposed algorithm needs a lower number of transmissions than the SPT algorithm because of its cluster structure.In the proposed algorithm, CM nodes transmit data to the corresponding CH that is often at the center of a cluster.However,the nodes in SPT normally transmit data to the nodes adjacent to BS.

    Fig.21 Variation of PLR with the number of nodes.

    Fig.22 Data transmission path of a compressed sensing algorithm based on a hybrid coyote optimization algorithm with a grey wolf optimizer routing.

    At last, three routing algorithms are compared in terms of PLR as shown in Fig.24.The PLR of CS-HCOGW routing algorithm is noticeably lower than that of the other routing algorithms for two reasons.First, CS technology is adopted in the proposed algorithm, which reduces the quantity of data transmitted.Secondly, taking the member nodes as the information relay does not rely only on the CHs for data transmission.The PLR is therefore reduced because of lower pressure on CHs.

    6.Conclusions

    Fig.23 Variation of the number of transmissions with the number of nodes.

    Fig.24 Variation of packet loss rate with the number of nodes.

    This paper addresses the clustering and localizing problem of a loitering munitions ad hoc network in the air under satellite denied conditions.For this purpose, the SIL and SIC algorithms are proposed.In the SIL algorithm, bounding cubes are created to reduce the initial search space, so as to improve sampling efficiency and lower computational cost.Subsequently, the HCOGW algorithm is taken to solve the coordinates of unknown nodes.The proposed algorithms are compared with some popular algorithms including selective 3-Anchor DV-hop, DCDV-Hop, ND-DV-Hop, and GWOLPWSN,as well as the traditional algorithm DV-hop.In summary,the proposed algorithms deliver more accurate localization and faster convergence for large ammunition networks,and achieve better numerical stability and robustness for the networks with a highly dynamic topological structure.In the SIC context, a Hybrid Coyote Optimization algorithm with a Grey Wolf optimizer (HCOGW) based on a sinusoidal crossover strategy is proposed and applied in the clustering process of the ad hoc network.Energy consumption can be reduced since the SIC takes into account a number of problems including the number of clusters, cluster size, cluster stability, and number of transmissions.Compared with popular algorithms such as CBLADSR, ACO, EALC, GA, and SOCS, the SIC algorithm demonstrates the best performance in terms of cluster building time, number of clusters, service life of clusters,and energy consumption.In the end,the CS-HCOGW routing is proposed to reduce the number of data transmissions in the loitering munitions ad hoc network.

    The present study has some limitations.First, because the munitions nodes are far away from the base station,this paper proposes a compressed sensing method based on multi-hop communications to reduce the transmission power of the nodes.However, due to the multi-hop communication, the number of hops for data transmission from each cluster head to the base station in this method may increase, and we will improve the performance of the loitering munitions network by multiple antennas in the future.Second,this paper is mainly simulated by MATLAB,and there may be some shortcomings in the parameter setting and other aspects,so we will consider adopting network simulation software or semi-physical object to carry out the simulation in the future.

    Declaration of Competing Interest

    The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

    Appendix A.This section presents the convergence analysis of the HCOGW algorithm.

    Following the principles of random functional analysis given in Ref.43, the convergence of the HCOGW algorithm is analyzed.Based on the description of Algorithm 3 and the flow chart of the HCOGW algorithm in Fig.6,three operators are used to generate new solutions, that is, a Gaussian global best growth operator, a simplified GWO search algorithm,and a life-or-death operator.The Gaussian global best growth operator is similar to the DE/rand-to-best/1/bin mutation operator of Differential Evolution(DE),42while the simplified GWO search algorithm acts like the DE/best/1/bin mutation operator of DE.The life-or-death operator is equivalent to the mutation operator of a genetic algorithm.New solutions are processed with the greedy algorithm following the survival-of-the-fittest strategy.They are compared with the original solution to preserve the better solution.For the minimum optimization problem,the HCOGW evaluation function sequence is monotonically non-increasing.In order to prove the convergence of the HCOGW algorithm,the following definition is first given:

    Definition 1.It is assumed that Q(t) represents the intermediate group of X(t), Vc,j(t+1)?Q(t+1), so that the HCOGW search operators are defined as follows:

    The Gaussian global best growth operator and the simplified GWO search operator are defined by

    The life-or-death operator is defined by

    Assuming that f1(X)is the minimum optimization function,the solution spaceand Lj≤xj≤Uj,j=1,2,...,D} is a bounded subspace of a D-dimensional Euclidean space RD.

    Definition 2.The hybrid strategy of two operators means using the simplified GWO search operator and the Gaussian global best growth operator for each component of the individual vectors in a population at the probability CR/D and (1-CR/D), respectively.Each group is reshuffled and transformed with the life-or-death operator to identify the poorest coyote.Therefore, it is a random mapping in the solution space,ψ1:Ω×S →S2, and can be defined by:

    where(Ω,M1,μ1)is a complete probability measure space;Ω is a non-empty abstract set with its elements ω1as the basic events; M1is the σ-algebra formed by some subsets; μ1is the probability measure of M1.Moreover, Xmoddenotes that a coyote is GP or alpha or cult, and F (X, Xc, Xj, Xk, Xmod) is determined by Eqs.(A1) and (A2).

    Like DE,the HCOGW algorithm uses the greedy algorithm to update the population.In each iteration, the current population is subject to the mapping ψ′, resulting from the random mapping ψ1of the three operators and the mapping reversal ψ2of the greedy choice.Therefore, there is.Under the effect of the mapping ψ′, the fitness of GP in each iteration of the HCOGW algorithm forms a monotonically non-increasing sequence {f1(XGP(t ))}1≤t≤MaxDT.Similarly, ψ′can be further redefined as Bt+1=ψ′(ω1,Bt)=ψ2(ψ1(ω1, Bt)), where Bt+1and Btare the optimal individual of X(t+1)and X(t),respectively.Hence, the following theorem is obtained with Theorem 1 given in Ref.24:

    Theorem 1.The random mapping ψ′generated from one iteration of the HCOGW algorithm is a random compression algorithm.

    Based on Lemma 2 defined in Ref.24, it is concluded that the HCOGW algorithm is asymptotically convergent, which becomes Theorem 2.

    Theorem 2.If ψ′is a random compression operator for the HCOGW algorithm, ψ′has a unique random fixed point, so that the HCOGW algorithm is asymptotically convergent.

    While proving the asymptotic convergence of the HCOGW algorithm, a new solution is generated with three operators as specified in Ref.44.Among them, an operator similar to the mutation operator of DE has its global convergence as follows:Theorem 3.If λ1:S×S →RDis defined as the distance on S,and satisfiesis a complete separable metric space.

    In this similar way as given in Ref.44, Theorem 3 is easily proved.

    Any new group generated from each iteration of DE must be better than its father group.For the ψ′mapping generated by the HCOGW algorithm in Theorem 1, there is a variable 0 ≤K0<1,which is a non-negative real number, and makes:

    Based on Eqs.(A4)and(A5),ψ′mapping is a compression operator, which has an exclusive fixed point ξ with ψ′(ξ)=ξ.

    The sequence {Xi}(i=1,2,3 ???) is the optimal solution obtained from the HCOGW algorithm after each iteration.As discussed before, {Xi} is a monotonically non-increasing sequence, and asymptotically convergent.At any initial state X0, the sequence {Xi} obtained after mapping always converges.According to the definition of convergence, {Xi} converges at the fixed point ξ.The fixed point is exclusive, so that the mapping of the HCOGW algorithm is globally converge.Additionally, {Xi} is a monotonically non-increasing sequence, and certainly converges into the global optimal solution.

    国产在线精品亚洲第一网站| 久久欧美精品欧美久久欧美| 中文字幕av电影在线播放| 国产亚洲欧美98| 99久久国产精品久久久| 欧美激情高清一区二区三区| 88av欧美| 亚洲精品国产区一区二| 麻豆一二三区av精品| 免费av中文字幕在线| 欧美丝袜亚洲另类 | 久热这里只有精品99| 日韩免费av在线播放| 欧美精品亚洲一区二区| 精品高清国产在线一区| 成人18禁在线播放| 久久精品国产99精品国产亚洲性色 | 国产成人精品久久二区二区免费| 美女扒开内裤让男人捅视频| 真人一进一出gif抽搐免费| 欧美成人性av电影在线观看| 90打野战视频偷拍视频| 91精品三级在线观看| 午夜亚洲福利在线播放| 国产伦人伦偷精品视频| 免费女性裸体啪啪无遮挡网站| 日韩欧美一区二区三区在线观看| 村上凉子中文字幕在线| 久久精品91蜜桃| 99国产精品一区二区三区| 麻豆一二三区av精品| 亚洲中文日韩欧美视频| 中文字幕最新亚洲高清| av国产精品久久久久影院| 十分钟在线观看高清视频www| 99国产精品一区二区蜜桃av| 国产av精品麻豆| 成在线人永久免费视频| 国产成年人精品一区二区 | 如日韩欧美国产精品一区二区三区| 男女之事视频高清在线观看| 国产av精品麻豆| 午夜福利免费观看在线| 露出奶头的视频| 黄片小视频在线播放| 欧美av亚洲av综合av国产av| 麻豆久久精品国产亚洲av | 国产精品二区激情视频| 欧美黄色片欧美黄色片| 国产三级在线视频| 丰满饥渴人妻一区二区三| 亚洲色图av天堂| 欧美人与性动交α欧美软件| 黄色怎么调成土黄色| 法律面前人人平等表现在哪些方面| 国产欧美日韩一区二区精品| tocl精华| 黄色片一级片一级黄色片| 欧美中文综合在线视频| 国产精品一区二区在线不卡| 操美女的视频在线观看| 真人一进一出gif抽搐免费| 久久久久国内视频| 啪啪无遮挡十八禁网站| 国产伦人伦偷精品视频| 国产午夜精品久久久久久| 久久精品aⅴ一区二区三区四区| 精品久久久久久,| 日本免费一区二区三区高清不卡 | 中文字幕高清在线视频| 人妻丰满熟妇av一区二区三区| 久久人人爽av亚洲精品天堂| 怎么达到女性高潮| 黑人欧美特级aaaaaa片| 国产激情久久老熟女| 女警被强在线播放| 久久性视频一级片| 99国产精品一区二区蜜桃av| 亚洲性夜色夜夜综合| 国产一卡二卡三卡精品| 涩涩av久久男人的天堂| 欧美不卡视频在线免费观看 | 亚洲精品久久午夜乱码| √禁漫天堂资源中文www| 十分钟在线观看高清视频www| 人人妻人人澡人人看| 国产色视频综合| 中亚洲国语对白在线视频| 欧美激情高清一区二区三区| 大陆偷拍与自拍| 天天添夜夜摸| 亚洲精品一二三| 在线观看一区二区三区| 男人舔女人下体高潮全视频| 巨乳人妻的诱惑在线观看| 成人三级黄色视频| 91成人精品电影| 欧美日本亚洲视频在线播放| 日韩精品青青久久久久久| 超碰97精品在线观看| 午夜两性在线视频| 丰满饥渴人妻一区二区三| 亚洲精品中文字幕在线视频| 午夜精品国产一区二区电影| 国产精品乱码一区二三区的特点 | 中文字幕最新亚洲高清| 国内久久婷婷六月综合欲色啪| 很黄的视频免费| 香蕉国产在线看| 99riav亚洲国产免费| 超色免费av| 美女 人体艺术 gogo| 制服人妻中文乱码| 热re99久久国产66热| 女人被狂操c到高潮| 操出白浆在线播放| 亚洲国产欧美一区二区综合| 精品福利永久在线观看| 国产成人精品无人区| 亚洲aⅴ乱码一区二区在线播放 | 成在线人永久免费视频| 五月开心婷婷网| 国产精品免费一区二区三区在线| 一区二区日韩欧美中文字幕| 久久国产乱子伦精品免费另类| 日韩成人在线观看一区二区三区| 男女做爰动态图高潮gif福利片 | 国产免费男女视频| 老司机深夜福利视频在线观看| 国产精品乱码一区二三区的特点 | 色婷婷久久久亚洲欧美| xxxhd国产人妻xxx| 亚洲欧美日韩高清在线视频| 怎么达到女性高潮| 在线国产一区二区在线| 韩国av一区二区三区四区| 美女国产高潮福利片在线看| 不卡av一区二区三区| 欧美日韩瑟瑟在线播放| 亚洲欧美精品综合一区二区三区| 在线观看免费视频日本深夜| 亚洲精品在线美女| 精品国产超薄肉色丝袜足j| 欧美一区二区精品小视频在线| 超碰97精品在线观看| 午夜精品国产一区二区电影| 女人高潮潮喷娇喘18禁视频| 一级a爱片免费观看的视频| 亚洲国产毛片av蜜桃av| 天天躁狠狠躁夜夜躁狠狠躁| 日韩精品免费视频一区二区三区| 国产精品香港三级国产av潘金莲| 啦啦啦免费观看视频1| 日韩精品青青久久久久久| 国产男靠女视频免费网站| 色在线成人网| 啦啦啦免费观看视频1| 久久天堂一区二区三区四区| 黄片小视频在线播放| 亚洲成av片中文字幕在线观看| 久久久久久久午夜电影 | 老司机福利观看| 可以免费在线观看a视频的电影网站| 久久久国产成人精品二区 | 亚洲欧美日韩另类电影网站| 国产99白浆流出| www.自偷自拍.com| 亚洲欧美日韩无卡精品| 欧美在线黄色| 日韩欧美三级三区| 国产精品久久视频播放| 亚洲成a人片在线一区二区| 50天的宝宝边吃奶边哭怎么回事| 9色porny在线观看| 人妻丰满熟妇av一区二区三区| 在线观看免费高清a一片| 色综合婷婷激情| 无限看片的www在线观看| 9热在线视频观看99| 又紧又爽又黄一区二区| 无限看片的www在线观看| 在线十欧美十亚洲十日本专区| 国产精品1区2区在线观看.| 女同久久另类99精品国产91| 午夜精品国产一区二区电影| 国产深夜福利视频在线观看| 日韩成人在线观看一区二区三区| 免费少妇av软件| 两个人免费观看高清视频| 国产精品爽爽va在线观看网站 | 国产精品秋霞免费鲁丝片| 99久久国产精品久久久| 人妻久久中文字幕网| 精品第一国产精品| 韩国av一区二区三区四区| 亚洲精品一卡2卡三卡4卡5卡| 18禁观看日本| 午夜影院日韩av| 精品一品国产午夜福利视频| 午夜福利,免费看| 日韩视频一区二区在线观看| 亚洲五月天丁香| 久久久久国内视频| 成人国语在线视频| 99精品在免费线老司机午夜| 亚洲av片天天在线观看| 亚洲精品一卡2卡三卡4卡5卡| 亚洲一区二区三区色噜噜 | 少妇被粗大的猛进出69影院| 成人av一区二区三区在线看| 色综合婷婷激情| 欧美日韩av久久| 少妇粗大呻吟视频| 99re在线观看精品视频| 啦啦啦 在线观看视频| 久久久久久久精品吃奶| 久久九九热精品免费| 国产精品亚洲av一区麻豆| 欧美最黄视频在线播放免费 | 欧美日本亚洲视频在线播放| 巨乳人妻的诱惑在线观看| 一二三四社区在线视频社区8| 香蕉丝袜av| 国产色视频综合| 中文字幕色久视频| xxxhd国产人妻xxx| 国产乱人伦免费视频| 97碰自拍视频| 欧美老熟妇乱子伦牲交| 中文字幕另类日韩欧美亚洲嫩草| 一区二区三区精品91| 一级片'在线观看视频| 麻豆一二三区av精品| 亚洲专区国产一区二区| 成人国产一区最新在线观看| 免费av毛片视频| 亚洲九九香蕉| 国产欧美日韩一区二区精品| 日韩欧美在线二视频| 好看av亚洲va欧美ⅴa在| 18禁观看日本| 国产精品日韩av在线免费观看 | 日本一区二区免费在线视频| 黄色a级毛片大全视频| 91在线观看av| 国产亚洲av高清不卡| 国产xxxxx性猛交| 久久久久久大精品| 国产精华一区二区三区| 免费久久久久久久精品成人欧美视频| 国产成人免费无遮挡视频| 精品少妇一区二区三区视频日本电影| 久久久国产欧美日韩av| 亚洲精品国产精品久久久不卡| 1024视频免费在线观看| 国产精品亚洲av一区麻豆| 丁香六月欧美| 午夜两性在线视频| 日本 av在线| 免费女性裸体啪啪无遮挡网站| 国产精品美女特级片免费视频播放器 | 午夜日韩欧美国产| 精品国产亚洲在线| 丰满的人妻完整版| 日本免费a在线| 亚洲欧美激情综合另类| 99精品在免费线老司机午夜| 亚洲中文字幕日韩| 天天影视国产精品| 五月开心婷婷网| 欧美精品一区二区免费开放| 成人18禁在线播放| 色老头精品视频在线观看| 亚洲成人免费av在线播放| 琪琪午夜伦伦电影理论片6080| 丝袜人妻中文字幕| 亚洲avbb在线观看| 午夜日韩欧美国产| 亚洲熟女毛片儿| 18禁观看日本| 精品国产美女av久久久久小说| 性色av乱码一区二区三区2| 精品一区二区三区四区五区乱码| 一区二区三区国产精品乱码| 亚洲少妇的诱惑av| 亚洲中文av在线| 青草久久国产| 欧美成人免费av一区二区三区| 中文字幕高清在线视频| 亚洲精品中文字幕在线视频| av欧美777| 天堂中文最新版在线下载| 国产成人av教育| 免费观看精品视频网站| 亚洲成人久久性| 99在线人妻在线中文字幕| 中文字幕人妻熟女乱码| 制服人妻中文乱码| 色哟哟哟哟哟哟| 99热只有精品国产| 午夜老司机福利片| 欧美大码av| 亚洲va日本ⅴa欧美va伊人久久| 涩涩av久久男人的天堂| 亚洲人成77777在线视频| 两性夫妻黄色片| www.熟女人妻精品国产| a级毛片黄视频| 日韩欧美一区二区三区在线观看| 真人一进一出gif抽搐免费| 最新美女视频免费是黄的| 一级a爱视频在线免费观看| 午夜福利欧美成人| 中国美女看黄片| 精品久久久久久久久久免费视频 | 国产av在哪里看| 亚洲av日韩精品久久久久久密| 99精品久久久久人妻精品| xxxhd国产人妻xxx| 丝袜在线中文字幕| 18禁国产床啪视频网站| 18美女黄网站色大片免费观看| 高清在线国产一区| 一边摸一边做爽爽视频免费| 国产91精品成人一区二区三区| 国产精品免费一区二区三区在线| 一级,二级,三级黄色视频| 亚洲avbb在线观看| 欧美日韩亚洲高清精品| 午夜福利在线免费观看网站| 午夜老司机福利片| 国产1区2区3区精品| 久久婷婷成人综合色麻豆| 亚洲精品美女久久久久99蜜臀| 欧美日韩福利视频一区二区| 丝袜美足系列| 巨乳人妻的诱惑在线观看| 1024视频免费在线观看| 麻豆一二三区av精品| 波多野结衣av一区二区av| 大陆偷拍与自拍| 国产亚洲欧美98| 好看av亚洲va欧美ⅴa在| 男女午夜视频在线观看| 国产亚洲精品久久久久5区| 亚洲情色 制服丝袜| 伊人久久大香线蕉亚洲五| 99精品欧美一区二区三区四区| 亚洲色图 男人天堂 中文字幕| 看免费av毛片| 精品电影一区二区在线| 精品久久久久久久毛片微露脸| 精品国产一区二区久久| 9191精品国产免费久久| 神马国产精品三级电影在线观看 | 91麻豆精品激情在线观看国产 | 岛国在线观看网站| 午夜福利一区二区在线看| 麻豆av在线久日| 欧美久久黑人一区二区| 999精品在线视频| 国产精品日韩av在线免费观看 | 三级毛片av免费| 女人爽到高潮嗷嗷叫在线视频| 在线视频色国产色| 欧美在线一区亚洲| 天堂影院成人在线观看| 在线观看www视频免费| 国产黄a三级三级三级人| 午夜老司机福利片| 一本大道久久a久久精品| av在线播放免费不卡| 免费搜索国产男女视频| 久久热在线av| 乱人伦中国视频| 午夜免费激情av| 国产激情欧美一区二区| 纯流量卡能插随身wifi吗| 久久久国产精品麻豆| 欧美中文日本在线观看视频| 97人妻天天添夜夜摸| 欧美激情 高清一区二区三区| 99精品久久久久人妻精品| 精品国产国语对白av| 天天影视国产精品| 中亚洲国语对白在线视频| 欧美久久黑人一区二区| 国产欧美日韩一区二区三区在线| 亚洲av熟女| 久久国产亚洲av麻豆专区| 他把我摸到了高潮在线观看| 99香蕉大伊视频| 欧美乱码精品一区二区三区| 国产又色又爽无遮挡免费看| 久久久久九九精品影院| 免费一级毛片在线播放高清视频 | 成人国产一区最新在线观看| cao死你这个sao货| 亚洲欧美日韩高清在线视频| 久久欧美精品欧美久久欧美| 久久人妻熟女aⅴ| 亚洲欧洲精品一区二区精品久久久| 黄色 视频免费看| 亚洲性夜色夜夜综合| 亚洲男人的天堂狠狠| 色哟哟哟哟哟哟| 国产精品av久久久久免费| 夫妻午夜视频| 欧美日韩亚洲高清精品| 日韩欧美免费精品| 搡老乐熟女国产| 国产欧美日韩一区二区三区在线| 欧美激情高清一区二区三区| 国内久久婷婷六月综合欲色啪| 亚洲成人久久性| 欧美日韩亚洲综合一区二区三区_| 午夜久久久在线观看| 老汉色∧v一级毛片| 成在线人永久免费视频| 成人18禁在线播放| 国产欧美日韩一区二区三区在线| 国产亚洲精品久久久久5区| 男女高潮啪啪啪动态图| 纯流量卡能插随身wifi吗| 一夜夜www| 亚洲情色 制服丝袜| 丁香欧美五月| 制服诱惑二区| 九色亚洲精品在线播放| 久久久精品欧美日韩精品| 成人三级做爰电影| 亚洲人成网站在线播放欧美日韩| 亚洲中文av在线| 久久久国产成人精品二区 | 丝袜美腿诱惑在线| 中文字幕最新亚洲高清| 人人妻,人人澡人人爽秒播| 久久精品91无色码中文字幕| 超碰成人久久| 成人亚洲精品一区在线观看| 国内久久婷婷六月综合欲色啪| 国产三级在线视频| 国产麻豆69| 亚洲五月色婷婷综合| 99国产综合亚洲精品| 丰满迷人的少妇在线观看| av天堂在线播放| 一区二区三区精品91| 国产成人精品久久二区二区免费| 少妇被粗大的猛进出69影院| 国产精品秋霞免费鲁丝片| 9热在线视频观看99| av有码第一页| 高清在线国产一区| 韩国精品一区二区三区| 母亲3免费完整高清在线观看| 国产99久久九九免费精品| 丁香欧美五月| 午夜精品久久久久久毛片777| 自线自在国产av| 天堂√8在线中文| 人妻丰满熟妇av一区二区三区| 精品乱码久久久久久99久播| 国产日韩一区二区三区精品不卡| 一进一出好大好爽视频| 国产av一区在线观看免费| 国产精品久久久人人做人人爽| 美女扒开内裤让男人捅视频| 精品一区二区三卡| 校园春色视频在线观看| 男女下面进入的视频免费午夜 | 久久久久久人人人人人| 免费看十八禁软件| 免费日韩欧美在线观看| 久久香蕉国产精品| 正在播放国产对白刺激| 男人舔女人下体高潮全视频| av网站在线播放免费| av中文乱码字幕在线| 青草久久国产| 国产精品乱码一区二三区的特点 | 亚洲,欧美精品.| 大码成人一级视频| 精品一区二区三区视频在线观看免费 | 日韩视频一区二区在线观看| av国产精品久久久久影院| 男女做爰动态图高潮gif福利片 | 免费人成视频x8x8入口观看| 50天的宝宝边吃奶边哭怎么回事| 国产精品香港三级国产av潘金莲| 99热国产这里只有精品6| 黑人巨大精品欧美一区二区mp4| 叶爱在线成人免费视频播放| 一级毛片女人18水好多| 黄色女人牲交| 国产单亲对白刺激| 好男人电影高清在线观看| 久久天躁狠狠躁夜夜2o2o| 91九色精品人成在线观看| 免费高清在线观看日韩| 中文字幕高清在线视频| 国产一区二区在线av高清观看| 人人妻人人添人人爽欧美一区卜| 长腿黑丝高跟| 黄色a级毛片大全视频| 午夜福利一区二区在线看| 国产精品亚洲av一区麻豆| 精品电影一区二区在线| 男人的好看免费观看在线视频 | 国产乱人伦免费视频| 国产有黄有色有爽视频| 久久 成人 亚洲| 欧美黑人欧美精品刺激| 国产精品永久免费网站| 国产不卡一卡二| 在线av久久热| 亚洲伊人色综图| 亚洲人成电影免费在线| 一区二区三区激情视频| 日韩人妻精品一区2区三区| a级毛片黄视频| 国产精品久久视频播放| 欧美不卡视频在线免费观看 | 欧美日韩视频精品一区| 国产视频一区二区在线看| 免费人成视频x8x8入口观看| 女人爽到高潮嗷嗷叫在线视频| 国产一区二区三区在线臀色熟女 | 国产成年人精品一区二区 | 男女下面进入的视频免费午夜 | 日韩精品中文字幕看吧| 一夜夜www| av电影中文网址| 免费高清在线观看日韩| 一级毛片精品| 99在线人妻在线中文字幕| 国产在线精品亚洲第一网站| 婷婷六月久久综合丁香| 高清av免费在线| 亚洲精品在线美女| 在线观看午夜福利视频| 色婷婷久久久亚洲欧美| 51午夜福利影视在线观看| 久久精品亚洲熟妇少妇任你| 在线看a的网站| 欧美精品亚洲一区二区| 男女下面插进去视频免费观看| 国产成+人综合+亚洲专区| 一个人免费在线观看的高清视频| 99精品在免费线老司机午夜| 亚洲av成人av| 黑人欧美特级aaaaaa片| a级片在线免费高清观看视频| 欧美中文综合在线视频| 精品一品国产午夜福利视频| 精品日产1卡2卡| 啦啦啦免费观看视频1| 久久久久国产一级毛片高清牌| 日本五十路高清| 久久久精品国产亚洲av高清涩受| 国产高清视频在线播放一区| 久久香蕉激情| 少妇粗大呻吟视频| 99在线视频只有这里精品首页| 不卡一级毛片| 欧美精品一区二区免费开放| 欧美成人午夜精品| 男人操女人黄网站| 久久久久亚洲av毛片大全| 精品无人区乱码1区二区| www.自偷自拍.com| 国产成人一区二区三区免费视频网站| 18禁观看日本| 欧美日韩福利视频一区二区| 日韩精品青青久久久久久| 国产国语露脸激情在线看| 精品电影一区二区在线| 女人精品久久久久毛片| 欧美黑人精品巨大| 久久国产精品人妻蜜桃| 18禁国产床啪视频网站| 黄片播放在线免费| 亚洲av日韩精品久久久久久密| 日韩国内少妇激情av| 又大又爽又粗| 身体一侧抽搐| 久久香蕉激情| 神马国产精品三级电影在线观看 | 欧美最黄视频在线播放免费 | 免费在线观看亚洲国产| 99国产极品粉嫩在线观看| 国产精品亚洲av一区麻豆| 久久精品国产亚洲av香蕉五月| 人人澡人人妻人| 亚洲性夜色夜夜综合| 曰老女人黄片| 欧美日韩视频精品一区| 新久久久久国产一级毛片| 女人被狂操c到高潮| 亚洲国产毛片av蜜桃av| 欧美日韩亚洲国产一区二区在线观看| 午夜福利欧美成人| 亚洲欧洲精品一区二区精品久久久| 1024香蕉在线观看| 精品一区二区三区av网在线观看| 国产免费现黄频在线看| 搡老熟女国产l中国老女人| 亚洲aⅴ乱码一区二区在线播放 | 国产高清激情床上av| 精品一区二区三区av网在线观看| 国产亚洲欧美在线一区二区| 看片在线看免费视频| 久久精品国产亚洲av高清一级| 最近最新免费中文字幕在线| 动漫黄色视频在线观看|