0 Introduction
Under the background of military intelligence, UAV technology has been developing vigorously, but with the increasingly complex combat environment and the increasingly diverse combat tasks, it is difficult for a single UAV to complete combat tasks alone, so the research of multi-UAV cooperative combat is becoming more and more important
[1]. As a key link of multi-UAV cooperative combat, attack route generation is an important prerequisite to ensure the survival probability of UAVs and enhance the cooperative combat capability of multi-UAVs.
In the actual combat environment, the battlefield situation is complex, and the starting points of multiple UAVs involved in combat are different, but there is often a time requirement to attack the target.As a result, the attack routes of different UAVs in the war are crisscrossed, prone to collision, and the range is uneven, so it is difficult to reach the mission point at a similar time, and then carry out coordinated attacks. Therefore, it is necessary to carry out the research on the generation of attack routes under the time/space coordination of multiple UAVs.
At present, most of the route generation algorithms focus on mathematical programming method, roadmap method, potential field method, stochastic programming method, heuristic search method and so on. In recent years, many reinforcement Learning methods such as Q-Learning have emerged, but reinforcement learning has a high computational cost in the early learning stage
[2]. Mathematical programming methods include dynamic programming, mixed integer linear programming (MILP), model predictive control (MPC)/receding horizon control (RHC), Markov decision process based methods, etc
[3][4][5][6][7]. The mathematical programming method is easy to understand, but it is difficult to solve in complex space environment and the amount of calculation is large, so it is difficult to ensure the real-time of the algorithm. The method based on landmark diagram mainly includes visual diagram method, Voronoi diagram method, etc
[8][9]. These algorithms usually divide the planning space according to the environment and obstacles, and the planning results are safer, but the planning speed is closely related to the complexity of the planning space, and the route planning results are not dominant, especially for the flight performance constraints of UAV, which need to be further improved. The potential field method guides the UAV to the target assembly point through the action of the resultant force between different force fields. The typical algorithms include the artificial potential field (APF) method and its improved methods, such as the control method combining APF with virtual structure, the stream function (SF) method, and the perturbed fluid dynamic system (IFDS) method
[10][11][12][13][14]. This kind of algorithm has small amount of calculation and high practicability, but for complex planning environment, it still needs to consider the problem of avoiding local minimum, and the algorithm is highly dependent on parameters. The stochastic programming method constructs a path set by random sampling and finds the flyable path in it. The main methods include the random landmark graph (PRM) method and the rapidly expanding random tree (RRT) method
[15][16]. Different improvements improve the utilization of time and space, and accelerate the convergence speed of the algorithm, but the planning results are difficult to apply to the multi-UAV cooperative route planning process. The path planning algorithm based on heuristic search is represented by A
* and D
* algorithm, which introduces the target information into the heuristic information, makes the search process oriented, and greatly improves the search efficiency. Especially for the A
* algorithm, as the most widely used route planning algorithm, many researchers have proposed improvements in different directions, but for multi-UAV cooperation, especially for the time/space double cooperative planning problem, further consideration and balance are needed
[17⇓⇓-20].
In order to meet the requirements of time cooperation and space anti-collision flight cooperation for multiple UAVs to reach their respective target points, a four-dimensional (time + three-dimensional space) cooperative attack route generation algorithm for multiple UAVs based on time and space double cooperative sparse A* search (T/S-SAS) algorithm is proposed.In order to improve the cooperative combat capability of multiple UAVs, the flight expansion node model is improved, the multi-UAV anti-collision constraint model is established, the time cooperation cost calculation model is established, the algorithm structure based on concurrent expansion is designed, and the multi-UAV attack route meeting the space safety constraint and the cooperative time arrival constraint is generated.
1 Multi-UAV combat environment model
1.1 Operational environment description
Suppose that the cooperative combat space range of multiple UAVs is l × w × H, and the target T space coordinate position is
The number of UAVs participating in combat is NU, and the set of UAVs U is defined as
Where: the spatial coordinate position of UAV Ui (hereinafter referred to as Ui) is ( , , ), 1≤i≤NU, a 3-Dof motion model of the UAV is established.
1.2 Operational terrain model
A widely used mathematical equation is used to establish the digital terrain, and the cone is used to simulate the mountain peak and the small fluctuation is added as the original reference terrain. The simulated mountain peak is shown in formula (3):
Where :h1(x,y) is the peak height of the point calculated by formula (3), and (X, y) is the two-dimensional coordinate of the horizontal projection plane of any point; The Np is the number of mountain peaks; The Hj is the highest height of the mountain peak; (Aj,Bj) is the coordinate of the two-dimensional center point of the mountain peak; The Kj is the slope steepness of a mountain peak.
The mathematical model of the original reference terrain is shown in Equation (4):
h2(x,y)=sin(y+a)+b(sin x)+ccos(d )+ecos(y)+fsin(f )+gcos(y)
(4)
Where :h2(x,y) is the peak height at point (X, y) calculated using equation (4); A, B, C, d, e, f, are seven different coefficients.
According to the description of formulas (3) and (4), the simulated terrain is established as shown in formula (5):
h(x,y)=max(h1(x,y),h2(x,y))
(5)
Where: H (X, y) is the terrain height.
Given the horizontal coordinates (X, y) of any point, the corresponding height H (X, y) of the point in the terrain can be calculated.
1.3 Environmental threat model
The environmental threat model includes adverse climate threat area model, radar threat area model and air defense missile threat area model, which need to be avoided when the multi-UAV coordinated attack route is generated.
1.3.1 Adverse Climate Threat Area Model
The adverse climate threat zone can be approximately modeled as a cylindrical region. The height of the threat zone is much higher than the flight altitude of the UAV, and the horizontal section at different flight altitudes of the UAV is a circular region, as shown in Figure 1. In Fig. 1, dC represents the Euclidean distance between the horizontal projection point of the current UAV and the horizontal projection center of the adverse climate threat area, OC is the two-dimensional coordinate of the central horizontal projection plane of the threat area, and dC,min is the radius of the impassable area of the adverse climate threat area respectively.dC,max is the maximum influence radius of the adverse climate threat area, PC,min is the minimum threat cost value of the adverse climate threat area to the UAV, and PC,max is the maximum threat cost value of the adverse weather threat area to the UAV.
Fig.1 Adverse climate threat zone图1 不利气候威胁区 |
Full size|PPT slide
The cost of adverse climate threat at different distances is shown in formula (6):
Where :PC represents the threat cost value of the adverse climate threat zone to the UAV.
1.3.2 Radar Threat Area Model
Radar is a kind of equipment that uses radio electromagnetic waves to detect targets. It can identify, range and even track targets according to the transmitted and recovered electromagnetic waves. Its threat model is shown in Figure 2. In Fig. 2, Δh represents the altitude difference between the current UAV and the radar center coordinate, θR is the scanning range angle of the radar threat, dR,min is the unescapeable distance of the radar threat, and dR,max is the maximum radius distance of the Radar threat.
Fig.2 Radar threat zone图2 雷达威胁区 |
Full size|PPT slide
Radar threat cost values at different positions are shown in formula (7):
Where :dR represents the 3D Euclidean distance between the current position of the UAV and the central position of the radar threat area.
1.3.3 Threat area of air defense missile
The killing zone of an air defense missile has a maximum firing height, so it can be approximated as a frustum of a cone in the vertical section, and its threat model is shown in Figure 3. In Fig. 3, the closed area of is the killing zone, the closed area of is the non-escape zone, hM,max is the maximum firing height of the air defense missile, and dM,min is the non-escape distance.dM,max is the maximum kill distance, dM is the three-dimensional Euclidean distance between the current UAV and the central position of the air defense missile threat area, and ξM is the pitch angle between the current UAV and the central position of the air defense missile threat area.
Fig.3 Air defense missile threat zone图3 防空导弹威胁区 |
Full size|PPT slide
The threat cost of air defense missile at different positions is shown in formula (8):
The two conditions in formula (8) are:
1) If the UAV is located in a enclosed area, then
2) If the UAV is located in a enclosed area, then
2 Multi-UAV Cooperative Attack Route Generation
The A
* algorithm is a typical heuristic algorithm, which plans the extended optimal solution of a single node by introducing heuristic information in the search process until the target point is searched
[21-22]. The 3D double collaborative sparse A
* search (SAS) algorithm splits the planning space sparsely and screens the planning directions according to the flight constraints of the UAV, and its node expansion mode is shown in Figure 4 and Figure 5
[23-24]. In Fig. 4, Δψ
max is the maximum angle difference of a single expansion in the horizontal direction of the UAV, P
r is the current position point of the UAV, and P
s,k is the kth waypoint that can be expanded in the horizontal direction of the UAV at the next moment. In Fig. 5, γ
max_c is the maximum lift angle difference and γ
max_d is the maximum dive angle difference of the UAV in the vertical direction.
Fig.4 Horizontal plane node expansion mode of SAS algorithm图4 SAS算法水平面内节点扩展方式 |
Full size|PPT slide
Fig.5 Vertical plane node expansion mode of SAS algorithm图5 SAS算法竖直面内节点扩展方式 |
Full size|PPT slide
2.1 Multi-UAV Four-dimensional Cooperative Attack Route Generation Algorithm Based on T/S-SAS Algorithm
2.1.1 Improved model of flight expansion node
In the SAS node expansion mode, the nodes are affected by the expansion parameter settings, especially when the number of vertical and horizontal expansion nodes is small, the planning results have insufficient directivity to the mission points, resulting in more broken lines in the attack route, which leads to a larger total range of the UAV. In order to increase the planning efficiency of the algorithm planning results (see the definition of formula (16)) and reduce some unnecessary maneuvering routes of UAVs, the following improvements are made to the flight expansion nodes: additional expandable direction selection of nodes is added to improve the expansion performance of UAV nodes. On the basis of the original node expansion of the traditional SAS algorithm based on flight constraints,Add additional candidate nodes with the current node Pr pointing to the direction of task point Pe, candidate nodes from the starting position of UAV Ps to the direction of task point Pe, and candidate nodes with the same speed direction as the previous track segment Pr-1Pr, as shown in Fig. 6.
Fig.6 Improved model of flight node expansion图6 飞行扩展节点改进模型 |
Full size|PPT slide
2.1.2 Algorithm Architecture Design Based on Concurrent Extension
In order to enhance the relevance of different UAVs in the process of attack route planning, a concurrent expansion algorithm structure is designed. The co-planning process based on concurrent extension is shown in Fig. 7.
Fig.7 Planning process of concurrent expansion algorithm图7 并发扩展算法规划过程 |
Full size|PPT slide
In Fig. 7, Ui, Uj, and Uk are three concurrently expanded UAVs respectively, the solid filled points with different colors are the planned route nodes of UAVs, the dotted unfilled points are the planning nodes abandoned in the planning process of UAVs, and the solid unfilled points are the current expandable node selection of UAVS.
In each round of planning process, multiple UAVs are planned at the same time, and the UAVs whose planned node number does not meet the requirement of the number of collaborative planning nodes are extended by the current point route, otherwise, the number of collaborative planning nodes is increased, and the next stage of collaborative expansion process is carried out. As shown in Fig. 7, currently the number of planned nodes of all UAVs is 3 (including the starting point), and the number of cooperative planning nodes is 4. Randomly select the Ui of UAVs to expand the route nodes, that is, the solid line of the Ui in the figure is not filled with points. After the expansion of the Ui is completed,Randomly selecting an unmanned aerial vehicle from the Uj and the Uk which do not meet the requirement of the cooperative planning node number for continuous expansion, and after the planned node number of all unmanned aerial vehicles is consistent with the cooperative planning node number, repeating the process until all unmanned aerial vehicles are expanded to a task point to complete the concurrent expansion planning process.
The concurrent expansion planning process is the basis of the multi-UAV cooperative attack route planning proposed in this paper. In the concurrent expansion planning process, the time cooperation cost calculation model and the multi-UAV anti-collision constraint model are added to realize the multi-UAV time and space cooperative attack route generation.
2.1.3 Time coordination cost calculation model
In the traditional expansion mode, it is difficult for UAVs to achieve the tactical target of reaching the target point at the same time to perform combat tasks. In order to balance the length of different attack routes of multiple UAVs and reduce the time difference between UAVs reaching the target, the following model is added based on the concurrent expansion planning algorithm:
1) a time coordination cost calculation model is added in the route expansion process to increase the node coordination cost value, drive the unmanned aerial vehicle to expand towards the node with low time coordination cost, and reduce the difference of the total flight range of different unmanned aerial vehicles, as shown in formula (11):
Rc,i(Ps,k,i)=| -Le_tot_l,i|
(11)
Where :Rc,i is the time synergy cost value of Ui; The Ps,k,i is a current expansion node; The is the average value of the estimated remaining route length of multiple UAVs; Le_tot_l,i is the estimated remaining route of Ui, which satisfies formula (12):
Where: ‖ · ‖ is the Euclidean distance.
2) In order to further realize the multi-UAV time cooperative attack route planning, after the planning is completed, based on the relevant speed parameters of the UAV, the suggested average flight rate vr,i is calculated in combination with the total range of different UAV attack routes, and the time cooperative secondary processing is carried out, as shown in formula (13):
Where :vmax is the maximum flight rate of the UAV; Ltot_l,i is the total length of Ui planning results.
If the vr,i satisfies Eq. (14), the proposed flight rate is valid:
Where :vmin is the minimum flight rate of UAV.
By balancing the range gap of different UAVs and solving the recommended flight rate after the planning, the cooperative solution of multi-UAV attack route planning time is realized.
2.1.4 Constraint model of multi-aircraft collision avoidance
In order to avoid the cross collision problem of multi-UAV attack route, a multi-UAV anti-collision constraint model is added based on the concurrent expansion planning algorithm.
Let the minimum separation distance between UAVs be ΔLmin_s. When node Ps,k,i is expanded at Ui, traverse other UAVs Uj(j≠i,0≤j≤NU) planned waypoints Pm,j(m=1,2,3,4), as shown in Fig. 8.
Fig.8 Realization of anti-collision constraints图8 防碰撞约束实现 |
Full size|PPT slide
If the formula (15) is not satisfied, it means that the current node Ps,k,i to be selected does not satisfy the minimum distance constraint with the planned waypoints of other UAVs, so the current node Ps,k,i to be selected is eliminated, and the node to be selected is reselected and the above process is repeated. In addition, the anti-collision with the ground is realized through the minimum height constraint of the UAV.
2.2 Multi-UAV Four-dimensional Cooperative Attack Route Generation Algorithm Based on T/S-SAS Algorithm
Combined with the improved model in Section 2.1, a multi-UAV four-dimensional cooperative attack route generation algorithm based on T/S-SAS algorithm is proposed, and the algorithm flow is shown in Figure 9.
Fig.9 Algorithm flow of the generation of multi-UAV four-dimensional cooperative attack route based on T/S-SAS algorithm图9 基于T/S-SAS算法的多无人机四维协同攻击航线生成算法流程 |
Full size|PPT slide
The specific flow of the algorithm is as follows:
1) determining the number of unmanned aerial vehicles involved in combat, initial positions, mission point positions, and the like, numbering the unmanned aerial vehicles, and taking the initial positions as initial nodes;
2) compare that planned route of the unmanned aerial vehicle, excluding the unmanned aerial vehicle which has reach the target task point, and taking the maximum number of route segments as the number of cooperative track segments;
And 3) jud whether that numb of the planned route sections of all the unmanned aerial vehicle is equal. If they are equal, jump to step 5;
4) taking the unmanned aerial vehicle with the least number of planned flight path sections as the current extended unmanned aerial vehicle, and if the number of planned flight path sections of a plurality of unmanned aerial vehicles is the same, selecting the unmanned aerial vehicle with the smallest serial number, and skipping to the step 6;
5) take that unmanned aerial vehicle with the minimum serial numb as the current extended unmanned aerial vehicle;
6) generate an item to be selected of that current expand unmanned aerial vehicle node according to the improved algorithm;
7) eliminating the node items to be selected which do not satisfy the constraint conditions according to various constraint conditions;
8) that proces of adding the candidate of the stand-alone SAS algorithm into the OPEN table;
9) excluding the unmanned aerial vehicles arriving at the target task point, judging whether the number of the cooperative track segments of each unmanned aerial vehicle is equal to the number of the cooperative track segments, and if not, jumping to the step 2;
10) Add 1 to the number of cooperative route sections;
11) judging whether each unmanned aerial vehicle reaches a target task point, and if not, jumping to the step 2;
12) All UAV routes have been planned to the mission target point, output the recommended speed and route planning results, and the planning process is over.
3 Simulation verification and analysis
3.1 Initial parameter setting
Experimental simulation platform: CPU is i7-8750H, memory is 8GB. The terrain and threat modeling method in Section 1 is used. It is assumed that the mission is executed in a three-dimensional space of 100km × 100km × 30km. There are four threats in the environment, including mountain, radar, air defense missile and no-fly zone. The planning parameters are set as follows: the planning step is 2km. It is assumed that there are four UAVs in total. The reference maximum flight speed of UAVs is 360km/H, and the minimum flight speed is 180km/H.
The number of threats and parameter information set in the simulation environment are shown in Table 1.
Table 1 Environment threat parameters表1 环境威胁参数 |
编号 | 威胁 种类 | 威胁二维中心 坐标/km | 最大威胁 高度/km | 最大威胁 半径/km |
1 | 山峰威胁 | (45.0, 72.0) | 3.0 | 15.0 |
2 | 山峰威胁 | (67.0, 40.0) | 1.5 | 10.0 |
3 | 山峰威胁 | (31.0, 28.0) | 2.0 | 10.0 |
4 | 山峰威胁 | (88.0, 26.0) | 2.5 | 12.0 |
5 | 雷达威胁 | (60.0, 52.0) | 12.0 | 12.0 |
6 | 雷达威胁 | (81.0, 55.0) | 8.0 | 8.0 |
7 | 雷达威胁 | (57.0, 86.0) | 10.0 | 10.0 |
8 | 雷达威胁 | (23.0, 68.0) | 9.6 | 9.6 |
9 | 雷达威胁 | (20.0, 38.0) | 10.0 | 10.0 |
10 | 雷达威胁 | (44.0, 19.0) | 8.0 | 8.0 |
11 | 雷达威胁 | (69.0, 24.0) | 8.0 | 8.0 |
12 | 防空导弹威胁 | (94.0, 27.0) | 7.0 | 10.0 |
13 | 防空导弹威胁 | (92.0, 46.0) | 7.0 | 10.0 |
14 | 防空导弹威胁 | (78.0, 75.0) | 7.0 | 8.0 |
15 | 防空导弹威胁 | (36.0, 80.0) | 7.0 | 9.0 |
16 | 防空导弹威胁 | (25.0, 16.0) | 7.0 | 9.0 |
17 | 防空导弹威胁 | (92.0, 85.0) | 7.0 | 7.0 |
18 | 气候威胁 | (38.0, 38.0) | 30.0 | 6.0 |
19 | 气候威胁 | (71.0, 38.0) | 30.0 | 8.0 |
20 | 气候威胁 | (58.0, 69.0) | 30.0 | 6.0 |
21 | 气候威胁 | (20.0, 85.0) | 30.0 | 6.0 |
22 | 气候威胁 | (40.0, 66.0) | 30.0 | 6.0 |
23 | 气候威胁 | (90.0, 68.0) | 30.0 | 6.0 |
The names of relevant algorithms and the description of algorithm improvements in this section are shown in Table 2, and the description will not be repeated later.
Table 2 Related algorithm name and algorithm improvement description表2 相关算法名称及算法改进描述 |
序号 | 算法 | 改进 |
1 | 传统SAS算法 | |
2 | I-SAS算法 | 添加“飞行扩展节点改进模型” |
3 | IT-SAS算法 | 添加“飞行扩展节点改进模型”+“并发扩展结构”+“时间协同代价计算模型” |
4 | IS-SAS算法 | 添加“飞行扩展节点改进模型”+“并发扩展结构”+“多机防碰撞约束模型” |
5 | T/S-SAS算法 | 添加“飞行扩展节点改进模型”+“并发扩展结构”+“时间协同代价计算模型”+“多机防碰撞约束模型” |
3.2 Simulation Verification and Analysis of Planning
In order to fully verify the effectiveness of the improved algorithm model in this paper, the improved model proposed in this paper is simulated and verified respectively, and the following experiments are carried out according to the initial conditions of the simulation.
3.2.1 Verification of efficiency and effectiveness of algorithm planning
Set the parameters of UAV starting point and target point as shown in Table 3.
Table 3 Starting point and target point parameters of algorithm planning efficiency test表3 算法规划效率测试的起点、目标点参数 |
无人机编号 | 起始点坐标/km | 设定目标点坐标/km |
U1 | (20.0, 0, 1.0) | (20.0, 100.0, 1.0) |
U2 | (40.0, 0, 1.0) | (40.0, 100.0, 1.0) |
U3 | (60.0, 0, 1.0) | (60.0, 100.0, 1.0) |
U4 | (80.0, 0, 1.0) | (80.0, 100.0, 1.0) |
Keeping the same planning environment and parameter settings, the traditional SAS algorithm and I-SAS algorithm are used to plan the attack route of UAV.
Due to the addition of additional expansion nodes in the I-SAS algorithm, the calculation time will be increased and the attack route will be shortened in theory. In order to study the relationship between the two and verify the improvement of the improved flight expansion node model proposed in this paper on the performance of the I-SAS algorithm planning results, the planning efficiency of the algorithm is defined as
In the formula, :TF, SAS, TF, I-SAS are the flight time required for the UAV to use the traditional SAS algorithm, I-SAS algorithm planning results and fly to the target point at the maximum flight speed (s);Tp, SAS, and Tp, I-SAS are the time (s) used by the traditional SAS algorithm, I-SAS algorithm planning, respectively.
Set a single node to expand the number of nodes M = 4 in the vertical plane and the number of nodes S = 4 in the horizontal plane. The planning results are shown in Figure 10.
Fig.10 Planning result comparison of traditional SAS algorithm and I-SAS algorithm图10 传统SAS算法与I-SAS算法规划结果对比 |
Full size|PPT slide
In Figure 10, different hemispheres and cylinders represent different environmental threats, the yellow → brown → white gradient position represents the height fluctuation of the simulated terrain, and the dotted lines of different colors represent the planned attack routes of different UAVs.
As shown in Figure 10, especially in the position circled by the white ellipse, compared with the traditional SAS algorithm, in the planning results of the I-SAS algorithm, in addition to the necessary evasion maneuvers against obstacles, the attack route has a clearer target directivity and a smoother route.
Keep the same planning environment and parameter settings, expand the number of nodes with different vertical and horizontal planes, and carry out multiple experiments. The statistical planning results are shown in Figure 11.
Fig.11 Data comparison between traditional SAS algorithm and I-SAS algorithm under different number of expanded nodes图11 不同扩展节点数量下传统SAS算法与I-SAS算法规划结果数据对比 |
Full size|PPT slide
As shown in Figure 11, with the increase of the number of expansion nodes, the number of expansion directions that can be selected increases, and the overall calculation amount of the algorithm increases, so both algorithms generally show a trend that the average planned route length gradually decreases. However, compared with the traditional SAS algorithm, the average route length in the planning results of I-SAS algorithm is reduced by 2. 8%, the maximum 17478 of algorithm planning efficiency is 17478, and the average value is 6377. This shows that for different numbers of expansion nodes (taking the maximum flight speed of 360 km/H set in simulation as an example), when the I-SAS algorithm increases the calculation time by 0. 1 s, the total range of multiple UAVs can be reduced by about 174. 78 km, with an average reduction of 63. 8 km, which greatly improves the planning quality. Especially when the number of vertical and horizontal expansion nodes is small, the planning results of I-SAS algorithm are greatly improved.
3.2.2 Multi-UAV Cooperative Planning-Time Cooperative Validity Verification
In order to make the straight-line distance of UAV route have reference deviation and give the meaning of cooperative time planning, the parameters of UAV starting point and settable target point are set as shown in Table 4. In a single simulation, different target points are set for comparative experiments.
Table 4 Starting point and target point parameters of time coordination test表4 时间协同测试的起点、目标点参数 |
无人机 编号 | 起始点 坐标/km | | 目标 编号 | 设定目标点 坐标/km |
U1 | (20.0, 0, 1.0) | T1 | (20.0, 100.0, 1.0) |
U2 | (40.0, 0, 1.0) | T2 | (40.0, 100.0, 1.0) |
U3 | (60.0, 0, 1.0) | T3 | (60.0, 100.0, 1.0) |
U4 | (80.0, 0, 1.0) | T4 | (80.0, 100.0, 1.0) |
Keeping the same planning environment and parameter settings, the I-SAS algorithm and the IT-SAS algorithm are used to plan the attack route of the UAV.
Compared with I-SAS algorithm, IT-SAS algorithm adds concurrent extension structure and time coordination model, which further increases the amount of calculation and planning time in theory. The difference between the maximum and minimum time required for different UAVs to reach the target point, that is, the range of cooperative time, will decrease. In order to study the relationship between the two, and verify the improvement of the planning results of the IT-SAS algorithm on the cooperative time strike performance of multiple UAVs, the cooperative time efficiency ET: of the algorithm is defined.
In the formula, :ΔTF, I-SAS, d and ΔTF, IT-SAS, d are the cooperative time range (s) obtained when the UAV adopts the planning results of I-SAS and IT-SAS algorithms and flies to the target point at the maximum flight speed, which are calculated as shown in Formula (18) and Formula (19) respectively:
ΔTF, I-SAS, d=TF, I-SAS, max-TF, I-SAS, min
(18) ΔTF, IT-SAS, d=TF, IT-SAS, max-TF, IT-SAS, min
(19)
Keep the number of nodes M = 4 in the vertical plane and S = 4 in the horizontal plane for a single node in different algorithms. The UAV planning target points are all set as target 2, and the planning results are shown in Figure 12.
Fig.12 Planning result comparison of I-SAS algorithm and IT-SAS algorithm图12 I-SAS算法与IT-SAS算法规划结果对比 |
Full size|PPT slide
Reference numerals in fig. 12 have the same meanings as those in fig. 10. In Figure 12, UAVs 1 to 4 and their corresponding planning targets are numbered as 1-2, 2-2, 3-2, and 4-2.
As shown in Figure 12, in the left ellipse of the planning results of the I-SAS algorithm and the IT-SAS algorithm, the directivity to the target is relatively clear and the planning results are similar due to the addition of the flight expansion node improvement model; In the right ellipse of the planning results of I-SAS algorithm and IT-SAS algorithm, the IT-SAS algorithm in this paper can increase the planned range of some UAVs (especially UAV 3), so as to balance the track gap between different UAVs, thus making IT easier to achieve multi-UAV coordinated time attack.
Keep the same planning environment, set different target points for the UAV to carry out multiple experiments, and the statistical planning result data is shown in Figure 13.
Fig.13 Data comparison between I-SAS algorithm and IT-SAS algorithm under different target location settings图13 不同目标位置设定下I-SAS算法与IT-SAS规划结果数据对比 |
Full size|PPT slide
As shown in Figure 13, the straight-line distance between the starting point and the end point of multiple UAVs is quite different, and under the influence of environmental threats, the flight distance is even more different; In this case, compared with the I-SAS algorithm, the IT-SAS algorithm proposed in this paper has a shorter range of flight time for different UAVs in its planning results, with an average reduction of about 35. 5% in the experiment, that is, the planning routes of different UAVs are closer, and the maximum value of the algorithm's collaborative time efficiency is 2061.3, with an average of 871.3. Taking the maximum flight speed of 360 km/H set in the simulation as an example, the IT-SAS algorithm can shorten the maximum range of cooperation time of different UAVs by 206. 1 s and the average range of cooperation time of different UAVs by 87. 1 s by increasing the calculation time by 0. 1 s, which makes IT easier to achieve time cooperation by adjusting the flight speed, so that the planning results can be applied to multi-UAV cooperative attack under time cooperation constraints.
3.2.3 Multi-UAV Cooperative Planning-Space Cooperative Effectiveness Verification
In order to increase the possible conflict probability of the UAV route, set the UAV starting point to be close and the target point to be the same, as shown in Table 5.
Table 5 Starting point and target point parameters of space coordination test表5 空间协同测试的起点、目标点参数 |
无人机编号 | 起始点坐标/km | 设定目标点坐标/km |
U1 | (0.5, 0, 1.0) | (100.0, 100.0, 1.0) |
U2 | (1.0, 0, 1.0) | (100.0, 100.0, 1.0) |
U3 | (0, 0.5, 1.0) | (100.0, 100.0, 1.0) |
U4 | (0, 1.0, 1.0) | (100.0, 100.0, 1.0) |
Keeping the same planning environment and parameter settings, the I-SAS algorithm and IS-SAS algorithm are used to plan the attack route of UAV. In order to verify the improvement effect of the planning result of the IS-SAS algorithm proposed in this paper on the spatial coordination performance of the UAV flight route, the ES of the efficiency of the algorithm coordination space IS defined as shown in formula (20):
Where: PNi is the sum of the total number of UAV route planning points for different algorithms; IPNi is the sum of the total number of UAV route collision points for different algorithms.
Keep the number of nodes M = 4 in the vertical plane and S = 4 in the horizontal plane for a single node in different algorithms. The UAV is set to have a minimum safety distance of 500 m, and the planning results are shown in Figure 14.
Fig.14 Planning result comparison of I-SAS algorithm and IS-SAS algorithm图14 I-SAS算法与IS-SAS算法规划结果对比 |
Full size|PPT slide
It can be seen from Fig. 14 that compared with the I-SAS algorithm, the planning results of the IS-SAS algorithm show that the attack routes of different UAVs are more sparse, and the interval between the planned routes of different UAVs IS larger intuitively and visually, so that the cooperative attack routes of multiple UAVs meet the requirements of space cooperative anti-collision flight.
Keep the same planning environment, set different space coordination distances (minimum anti-collision safety distance) for UAVs to carry out multiple experiments, and the statistical planning results are shown in Figure 15.
Fig.15 Data comparison between I-SAS algorithm and IS-SAS algorithm under different safety distances图15 不同安全距离下I-SAS算法与IS-SAS算法规划结果数据对比 |
Full size|PPT slide
It can be seen from Fig. 15 that under different safety distances, the IS-SAS algorithm proposed in this paper has no collision point (except the starting point) in the whole route compared with the I-SAS algorithm, that IS, the distance between each node and other UAV planning nodes in the UAV planning results will not be less than the safety distance constraint, and its cooperative space efficiency ES is stable at more than 99%. There are UAV collision points in the planning results of I-SAS algorithm under partial safety distance constraints, which leads to the non-flyable route and invalid planning results. Therefore, the IS-SAS algorithm proposed in this paper can solve the problem of multi-UAV space cooperative attack route generation.
3.2.4 Effectiveness Verification of Multi-UAV Cooperative Four-dimensional Attack Route Generation
Set the starting point of the UAV to be close and the target point to be the same, as shown in Table 6.
Table 6 Starting point and target point parameters of time/space coordination test表6 时间/空间协同测试的起点、目标点参数 |
无人机编号 | 起始点坐标/km | 设定目标点坐标/km |
U1 | (1.0, 0, 1.0) | (100.0, 100.0, 1.0) |
U2 | (2.0, 0, 1.0) | (100.0, 100.0, 1.0) |
U3 | (0, 1.0, 1.0) | (100.0, 100.0, 1.0) |
U4 | (0, 2.0, 1.0) | (100.0, 100.0, 1.0) |
Keeping the same planning environment and parameter settings, the traditional SAS algorithm, I-SAS algorithm, IT-SAS algorithm, IS-SAS algorithm and T/S-SAS algorithm are used to plan the attack route of UAV. The number of nodes for a single node in the vertical plane is M = 4, and the number of nodes in the horizontal plane is S = 4. The minimum safety distance of UAV is set as 500m, and the statistical planning result data is shown in Fig. 16.
Fig.16 Planning result comparison of different algorithms图16 不同算法规划结果数据对比 |
Full size|PPT slide
It can be seen from Figure 16 that under the same conditions, different algorithms are used for planning. With the adjustment and improvement of the improved model, the computational complexity is gradually increased, and the planning results are improved:
In the aspect of planning distance, compared with the average route length of the planning results of the traditional SAS algorithm, other algorithms reduce the average route length in different degrees, the lowest value of the algorithm planning efficiency Ep is 118.23, the maximum value is 2587.93, and the route is shortened between 1.65% and 2.64%, that is to say, the improved model of flight expansion nodes can improve the planning efficiency of different algorithms. In the aspect of time coordination, compared with the traditional SAS algorithm, I-SAS algorithm and IS-SAS algorithm, the IT-SAS algorithm and T/S-SAS algorithm can effectively reduce the time range. Compared with I-SAS algorithm, the time efficiency ET of IT-SAS algorithm and T/S-SAS algorithm is 80. 9 and 17. 81, respectively, and the time range difference of reducing cooperation is 37. 74% and 26. 46%, respectively.IT is easier to achieve time cooperation of multiple UAVs by adjusting the flight speed. In the aspect of space cooperation, compared with the traditional SAS algorithm, I-SAS algorithm and IT-SAS algorithm, IS-SAS algorithm and T/S-SAS algorithm solve the space collision problem of different UAVs; Compared with I-SAS algorithm, both IS-SAS algorithm and T/S-SAS algorithm have 100% Es of cooperative space efficiency, which can realize multi-UAV space cooperation.
The above simulation results show that, compared with the traditional SAS algorithm, the proposed T/S-SAS algorithm shortens the average path of UAVs, reduces the range of cooperation time of different UAVs, and solves the space anti-collision problem of different UAVs. It has good balance and applicability in solving time and space coordination.
4 Conclusion
In this paper, a four-dimensional cooperative attack route generation algorithm for multiple UAVs based on T/S-SAS algorithm is proposed to solve the problem of time cooperation and flight route space cooperation of multiple UAVs attacking targets.The flight expansion node model is improved, the algorithm structure based on concurrent expansion is designed, the time coordination cost calculation model and the multi-aircraft anti-collision constraint model are established, and the multi-UAV cooperative attack route generation algorithm is proposed. The main conclusions are as follows:
The algorithm proposed in this paper can enhance the planning efficiency of UAV attack routes, reduce the time difference of coordinated attack between different UAVs to reach the target, and solve the problem of space anti-collision between different UAVs.The multi-UAV attack route can meet the time/space constraint, the multi-UAV cooperative time strike performance and the flight route space cooperative performance are improved, and the UAV cooperative combat efficiency and combat capability are improved.
{{custom_sec.title}}
{{custom_sec.title}}
{{custom_sec.content}}