当前位置:网站首页>【Paper】2020_ Research on defense and evaluation strategy of heterogeneous UAV formation_ Zuojiankai
【Paper】2020_ Research on defense and evaluation strategy of heterogeneous UAV formation_ Zuojiankai
2022-06-30 04:35:00 【Zhao-Jichao】
List of articles
1 introduction
This paper is based on the previous research , This paper studies the defense deployment of unmanned aerial vehicles , Mainly for the scale of 16 Formation of UAVs . meanwhile , This research has good applicability for practical technology application .
Suppose that we have a certain number of unarmed UAVs under scientific research , To prevent other UAV formations from interfering , We need to send a certain number of defensive UAVs for deployment .
2 Coding scheme and decoding scheme
2.1 Basic encoding unit and decoding scheme


2.2 Decoding scheme
1) Calculate the local coordinates of each basic formation .

2) Calculate the coordinates of the center point of the sub formation .
After obtaining the local coordinates, length and width of each basic formation , The center point of each sub formation The coordinates are calculated according to the following formula :
X i ′ = X i ± ( L + 0.5 L i ) (1) X^\prime_i = X_i \pm (L + 0.5 L_i) \tag{1} Xi′=Xi±(L+0.5Li)(1)
Y i ′ = Y i ± ( W + 0.5 W i ) (2) Y^\prime_i = Y_i \pm (W + 0.5 W_i) \tag{2} Yi′=Yi±(W+0.5Wi)(2)
X i ′ X^\prime_i Xi′: It means the first one i i i Abscissa of the center point of the sub formation
Y i ′ Y^\prime_i Yi′: It means the first one i i i The ordinate of the center point of the sub formation
X i X_i Xi: It means the first one i i i The local abscissa of the parent formation corresponding to the child formation
Y i Y_i Yi: It means the first one i i i The local ordinate of the parent formation corresponding to the child formation
L i L_i Li: It means the first one i i i The length of the sub formation
W i W_i Wi: It means the first one i i i The width of the sub formation
L L L: It means the first one i i i The child formation corresponds to the single machine and the parent formation x x x The length of the sub formation corresponding to other single machines between the axes
W W W: It means the first one i i i The child formation corresponds to the single machine and the parent formation y y y The width of the sub formation corresponding to other single machines between the axes
Pass formula (1) and (2) The position coordinates of the center point of each sub formation in the actual formation can be determined .
3) Calculate the coordinates of each UAV .
x i j = X i ′ ± L i (3) x_{ij} = X^\prime_i \pm L_i \tag{3} xij=Xi′±Li(3)
y i j = Y i ′ ± W i (4) y_{ij} = Y^\prime_i \pm W_i \tag{4} yij=Yi′±Wi(4)
x i j x_{ij} xij: It means the first one i i i The second of the sub formation j j j The abscissa of an aircraft
y i j y_{ij} yij: It means the first one i i i The second of the sub formation j j j The ordinate of an airplane
3 Fitness function
3.1 Construction of UAV formation fitness function

Missile flight distance index :
α 1 = R S 1 (5) \alpha_1 = \frac{R}{S_1} \tag{5} α1=S1R(5)
R R R: Indicates the distance from the defensive aircraft to the interception point
S 1 S_1 S1: Respectively indicate the distance between the enemy aircraft and the interception point
S 2 S_2 S2: Respectively represent the distance from the unarmed UAV to the interception point
Define the explosion damage index :
α 2 = e − S 2 (7) \alpha_2 = e^{-S_2} \tag{7} α2=e−S2(7)
In an enemy plane 、 The fitness function is established in the case of an unarmed UAV and a defensive aircraft :
α = 1 k 1 α 1 + k 2 α 2 (8) \alpha = \frac{1}{k_1 \alpha_1+ k_2 \alpha_2} \tag{8} α=k1α1+k2α21(8)
k 1 , k 2 k_1, k_2 k1,k2: Index weight coefficient
α 1 \alpha_1 α1 and α 2 \alpha_2 α2 The smaller theta is , The more beneficial it is to our formation's defense against unarmed UAVs .
The fitness value of the whole UAV formation is the sum of the fitness values of all unarmed UAVs :
α i = ∑ j = 1 q ( i ) α i j (9) \alpha_i = \sum_{j=1}^{q(i)} \alpha_{ij} \tag{9} αi=j=1∑q(i)αij(9)
λ = ∑ i = 1 n α i (10) \lambda = \sum_{i=1}^{n} \alpha_{i} \tag{10} λ=i=1∑nαi(10)
i i i: It means the first one i i i An unarmed UAV
j j j: It means the first one i i i The corresponding number of unarmed UAVs j j j Enemy aircraft
q ( i ) q(i) q(i): It means that you can attack the i i i Total number of enemy aircraft of unarmed UAVs
a i j a_{ij} aij: It means the first one j j j An enemy plane attacked the i i i The total fitness of an unarmed UAV
n n n: Indicates the number of unarmed UAVs
λ \lambda λ: Indicates the fitness value of the whole formation
3.2 Optimization of fitness function
4 Simulation experiments verify
Case one
Assume opposite 16 All the enemy planes can attack our UAV , And we have 6 ( n = 6 ) (n=6) (n=6) An unarmed machine , So you get 6 Fitness values
α 1 = ∑ j = 1 16 α 1 j \alpha_1 = \sum_{j=1}^{16} \alpha_{1j} α1=j=1∑16α1j α 2 = ∑ j = 1 16 α 2 j \alpha_2 = \sum_{j=1}^{16} \alpha_{2j} α2=j=1∑16α2j α 3 = ∑ j = 1 16 α 3 j \alpha_3 = \sum_{j=1}^{16} \alpha_{3j} α3=j=1∑16α3j α 4 = ∑ j = 1 16 α 4 j \alpha_4 = \sum_{j=1}^{16} \alpha_{4j} α4=j=1∑16α4j α 5 = ∑ j = 1 16 α 5 j \alpha_5 = \sum_{j=1}^{16} \alpha_{5j} α5=j=1∑16α5j α 6 = ∑ j = 1 16 α 6 j \alpha_6 = \sum_{j=1}^{16} \alpha_{6j} α6=j=1∑16α6j
The total fitness value is
λ = α 1 + α 2 + α 3 + α 4 + α 5 + α 6 \lambda = \alpha_1 + \alpha_2 + \alpha_3 + \alpha_4 + \alpha_5 + \alpha_6 λ=α1+α2+α3+α4+α5+α6
5 Effect evaluation
k 1 = k 2 = 1 k_1 = k_2 = 1 k1=k2=1
边栏推荐
- Redis实现短信登入功能(二)Redis实现登入功能
- Bean创建流程 与 lazy-init 延迟加载机制原理
- Memorize unfamiliar words at SSM stage and update them from time to time
- Cheap SSL certificate abroad
- 股票利益【非dp】
- 7-3 single source shortest circuit for strange play upgrade
- SQL error caused by entity class: Oracle "ora-00904" error: possible case of invalid identifier
- Difference between request forwarding and redirection
- Differences between cookies and sessions
- 进程间通信之匿名管道
猜你喜欢

Five methods to clear floating and their advantages and disadvantages

MySQL DDL change

This connection is not a private connection this website may be pretending to steal your personal or financial information

管道实现进程间通信之命名管道

Window10 jar double click to run without response

How to repair expired SSL certificates?

Myrpc version 5

Intern method of string

IIS request SSL certificate

Redis cache avalanche, breakdown and penetration
随机推荐
Five methods to clear floating and their advantages and disadvantages
The difference between get and post requests
OneNote production schedule
What to do when the alicloud SSL certificate expires
2021-07-14
Serializable and Deserialize
Paging query, using jdbc-- paging query
Encapsulating JDBC tool classes
Myrpc version 6
7-3 打怪升级 单源最短路
How to renew an SSL certificate
Error Nova missingauthplugin: an auth plugin is required to determine endpoint URL
Iterator of JS
Process architecture and process management
Redis implements SMS login function (II) redis implements login function
Qt6 QML Book/Qt Quick 3D/Qt Quick 3D
Robot slam navigation core technology and practice Season 1: Chapter 0_ Slam development overview
Transport layer protocol tcp/udp
JS inheritance
Summary of the reasons why transactional doesn't work