Next Article in Journal
Changes in Forcecardiography Heartbeat Morphology Induced by Cardio-Respiratory Interactions
Next Article in Special Issue
Environmental-Driven Approach towards Level 5 Self-Driving
Previous Article in Journal
Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimal-Damage-Effectiveness Cooperative-Control Strategy for the Pursuit–Evasion Problem with Multiple Guided Missiles

1
ZNDY of National Defense Key Laboratory, School of Mechanical Engineering, Nanjing University of Science and Technology, Nanjing 210094, China
2
North Information Control Research Academy Group Co., Ltd., Nanjing 211153, China
3
School of Mechatronical Engineering, Beijing Institute of Technology, Beijing 100081, China
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(23), 9342; https://doi.org/10.3390/s22239342
Submission received: 2 November 2022 / Revised: 24 November 2022 / Accepted: 29 November 2022 / Published: 30 November 2022
(This article belongs to the Special Issue Smart Sensing and Control for Autonomous Intelligent Unmanned Systems)

Abstract

:
In this paper, an optimal-damage-effectiveness cooperative-control strategy based on a damage-efficiency model and a virtual-force method is proposed to solve the pursuit–evasion problem with multiple guided missiles. Firstly, different from the overly ideal assumption in the traditional pursuit–evasion problem, an optimization problem that maximizes the damage efficiency is established and solved, making the optimal-damage-effectiveness strategy more meaningful for practical applications. Secondly, a modified virtual-force method is proposed to obtain this optimal-damage-effectiveness control strategy, which solves the numerical solution challenges brought by the high-complexity damage function. Thirdly, adaptive gain is designed in this strategy based on guidance-integrated fuze technology to achieve robust maximum damage efficiency in unpredictable interception conditions. Finally, the effectiveness and robustness of the proposed strategy are verified by numerical simulations.

1. Introduction

With the rapid development of cyber–physical systems and complex dynamic networks, cluster confrontation is becoming the mainstream direction in aerospace. In the field of cluster work, cooperative swarm-intelligence decision-making is the key to success in various missions, including UAV group confrontations [1], grouped underwater robot cooperative searching [2], and grouped missile cooperative control [3].
Missile cooperative interception is very much in line with the needs of the field of cluster work, and there are always great hidden dangers in using only one missile for interception. Due to the increasing mobility of targets, the defensive line is very likely to be broken. Grouped missile cooperative interception can greatly improve the success rate of intercepting invading aircraft. The optimal strategy of this pursuit–evasion game is actually an important method for defending important targets [4]. This issue has also attracted worldwide attention. Several studies have focused on multiple low-speed ‘pursuers’ hunting a high-speed ‘evader’ [5,6,7,8]. In [5], the scenario involves a single pursuer and a single evader, the latter of which is slower. Furthermore, refs. [6,7,8] cover the Target–Attacker–Defender scenario where the Attacker seeks to capture the Target, and the Defender seeks to capture the Attacker, thereby protecting the Target. For the case of multiple pursuers, the Hamilton–Jacobi (HJI) equation [9] is applied to achieve cooperative decision-making, but its direct numerical solution is difficult and even unsolvable [10]. Therefore, an approximate numerical solution of the HJI equation is the key to such a problem. Compared with reinforcement learning [11,12] and other methods, the “virtual force” method [13] has unparalleled advantages in computational complexity. This is a strategy based on the position of the two sides and the position of the defense line and is independent of the initial cost function in obtaining the optimal control method. Thus, it is the most practical tool for the solution of the optimal strategy in the cooperative pursuit–evasion problem.
For all these traditional pursuit–evasion games, modeling is based on the concept of the Apollonius circle [14], which essentially sets the successful condition of achieving a final range between the pursuers and evader below a certain threshold as the termination [15]. Typically, the capture time or distance from the target is used as a performance criterion in such scenarios. However, for the actual missile control operation, maximizing the damage effect on the evader is the essential object. Unfortunately, the damage effect is a complex function of multiple factors, including the distance, direction, and relative velocity vector. Therefore, it is necessary to reform the overly ideal Apollonius circle assumption by considering the damage effect, which is determined by the damage-efficiency model [16], to make the optimization strategy more meaningful for practical applications.
Obviously, real-time estimation of the damage effect function relies on a variety of types of data detection by the guidance-integrated fuze system [17,18,19,20]. It is worth noting that the priority of distance and the direction for damage-effect optimization varies during different stages of the pursuit. In the early stage of the pursuit, it is difficult for the fuze to accurately estimate the final intersection direction between the pursuer and the evader, so reducing the distance between the pursuer and the evader as quickly as possible is the dominant purpose. In the later stages of the pursuit, the direction is increasingly important for the final damage effect and should be the dominant factor in the control strategy [3,21,22]. Therefore, the optimal control strategy must dynamically set the priority of distance and direction during the progress of the pursuit.
Based on the above overview, there are still two difficulties to be overcome in cooperative control. To address them, we propose a more practical and easy-to-implement optimal-damage-effectiveness cooperative-control strategy, and the main contributions are as follows:
(1)
By replacing the overly ideal Apollonius circle concept with the damage-efficiency model, the optimization model of the cooperative pursuit–evasion game is reconstructed to maximize the damage efficiency on the evader.
(2)
The heuristic “virtual force” method is reformed to be compatible with the damage-efficiency model, enabling a low-complexity numerical solution to the damage-effectiveness cooperative-control strategy.
(3)
The adaptive gains for distance and direction are elaborately designed in this optimal-damage-effectiveness strategy to address their variable priorities during control, ensuring robust maximum damage efficiency in unpredictable control conditions.
The remainder of this paper is designed as follows: Section 2 formulates the problem, introduces the movement model of guided ammunition, and establishes the damage-efficiency function to determine the end condition. Section 3 designs strategies for pursuers and evaders. In Section 4, a numerical simulation and analysis are carried out. Finally, Section 5 concludes the paper.

2. Problem Formulation

2.1. Guided Munition Movement Model

The relative motion model of pursuer and evader is shown in Figure 1: p i ( i = 1 , 2 , , n ) represents the pursuers, and all guided missiles are the same type, so the movement model can be described as follows:
x ˙ p i = v p i cos θ p i y ˙ p i = v p i sin θ p i θ ˙ p i = w p i
where x p i and y p i , respectively, are the positions of the x and y directions of the i-th pursuer; v p i is the speed of the i-th pursuer; θ p i is the course angle of the i-th pursuer; and w p i is the input of the i-th pursuer. The variable p e represents the evader; its movement model can be described as follows:
x ˙ e = v e cos θ e y ˙ e = v e sin θ e θ ˙ e = w e
where x e and y e , respectively, are the positions of the x and y directions of the evader; v e is the speed of the i-th evader; θ e is the course angle of the evader; and w e is the input of the evader.
Based on the above motion model, the following assumptions are made in the interception process:
(1)
A line of defense is set up at x = 0 , the pursuer’s mission is to destroy the evader before the evader breaks through the line of defense, and the evader’s mission is to break through the line of defense before it is destroyed, as shown in Figure 1.
(2)
Due to the limitation of the driving force, the input of the movement mode of the pursuer and the evader is limited to the constants w p max and w e max . The input of the movement mode of the pursuer also satisfies a certain proportion relationship [23,24]. Because of the above assumption, the pursuer is slower than the evader, i.e.,
λ = v p v e , λ < 1 , w p i w p max , w e w e max
(3)
The location of the line of defense is determined, as are the number of pursuers and evaders. The evader cannot get the precise initiation range and damage function of the pursuer but only the speed and position information of the pursuer. The pursuer can obtain all state information from the system of the guidance-integrated fuze and can make a real-time decision.
Remark 1.
For the above assumptions, this model is only applicable to the pursuit–evasion problem with a proportion of fixed speed. Because there are more pursuers, the pursuers have worse performance than the evader. However, the detection system of the pursuer is better than that of the evader under the model proposed in this paper. In addition to position detection of the evader, heading angle detection of the evader is added.

2.2. Damage Efficiency Model

In this problem, not only does the motion control of the pursuer need to be taken into account, but the specific initiation time also needs to be decided. The information is obtained through the guidance system and the fuze system then combined with the damage-efficiency model to judge the damage efficiency under the current state. Therefore, it is changed from the general pursuit–evasion problem, which judges the outcome of both sides of the game based on distance, to the space–time optimization problem that needs to combine the initiation time and damage range. Thus, this paper introduces the damage-efficiency model to further evaluate the damage efficiency. To better measure the damage degree, it is generally considered that the greater the impact kinetic energy of the fragment, the stronger the damage effect [25,26]. Therefore, the damage efficiency function is introduced to determine the degree of destruction of the target, which can be expressed as follows:
F b i = f k d · v d g i 2
where f k d is the damage efficiency coefficient, and v d g i 2 is the square of the fragment impact velocity of the pursuer.
The initial detonation velocity in the warhead can be calculated using the Gurney coefficient [26]:
v 0 = 2 E η β 1 + β 2
where η is the fragment initial-velocity-correction coefficient; 2 E is the Gurney coefficient of the explosive; and β is the ratio of charge mass to the warhead. Then, angle θ f between the fragment velocity vector and the warhead normal is as follows:
θ f = arctan v 0 2 D cos x m / R
where cos x m / R is the included angle between the normal line of the shell and the propagation direction of the detonation wave, x m is the abscissa of the pre-supported fragment, R is the radius of the warhead, and D is the explosive detonation velocity. Thus, the fragment’s scatter angle is in the range of θ d 0 π / 2 θ f , π / 2 + θ f π / 2 θ f , π / 2 + θ f . When the guided ammunition is in motion, as shown in Figure 2, the initial velocity of the fragment is v 0 . Combined with the currently guided ammunition speed v p i , the initial static velocity v d 0 of the fragment in the projectile coordinate system is:
v d 0 = v 0 cos θ d 0 + v p i 2 + v 0 sin θ d 0 2 , θ d 0 = arctan v 0 cos θ 0 + v p i / v 0 sin θ 0
Due to the influence of air resistance, gravity, and other factors, the fragment velocity will be attenuated, so the actual fragment velocity v d in the body coordinate system is:
v d = v d 0 e k T r
where R is the fragment flight distance; k r is the attenuation coefficient, which can be expressed as k r = C x ρ A / 2 m f ; C x is the resistance coefficient; ρ is the air density; and A / 2 m f is the ratio of the windward area of the fragment to the fragment mass. The relative motion of the pursuer and evader in the ground coordinate system is shown in Figure 3. Based on the transformation relationship between the body coordinate system and the ground coordinate system, the value v d g of the fragment in the ground coordinate system is:
v d g i = B G · v d = cos θ p i sin θ p i sin θ p i cos θ p i · v 0 cos θ 0 + v p i e k r r v 0 sin θ 0 e k r r = cos θ p i v 0 cos θ 0 + v p i e k r r sin θ p i v 0 sin θ 0 e k r r sin θ p i v 0 cos θ 0 + v p i e k r r + cos θ p i v 0 sin θ 0 e k r r
where B G is the coordinate transformation matrix. The square of the fragment impact velocity of the pursuer can be expressed as follows:
v d g i 2 = v e v d g i 2 = v e cos θ e cos θ p i v 0 cos θ 0 + v p i e k p r sin θ p i v 0 sin θ 0 e k p r v e sin θ e sin θ p i v 0 cos θ 0 + v p i e k p r + cos θ p i v 0 sin θ 0 e k p r 2
Due to the scattering characteristics of fragments, more fragments with high kinetic energy will gather in the middle line of the damage range; thus, the expression of the damage efficiency coefficient is as follows:
f k d = max k d 2 π σ e θ 0 π / 2 θ p i 2 2 σ 2 , k d 2 π σ e θ 0 + π / 2 θ p i 2 2 σ 2
where k d is the gain of damage efficiency, and σ is the standard deviation of damage efficiency. The damage efficiency satisfies a Gaussian distribution. In the projectile coordinate system, the closer the relative positions between projectile target positions are to ± π / 2 , the greater the damage efficiency is.

3. Pursuit–Evasion Strategy

Based on the above description, the following coordination variables are designed to better solve the above problems:
r p i = x p i x e 2 + y p i y e 2 r e = x e x t 2
where r p i is the Euclidean distance between the i-th pursuer and the evader, r e is the Euclidean distance between the evader and the line of defense, and x t is the x-coordinate of the line of defense. The conditions of the end decision are as follows:
(1)
The evader breaks through the line of defense without being destroyed by the pursuer, which is x t 0 .
(2)
The pursuer meets the initiation condition and causes certain damage to the evader.

3.1. Evader Strategy

For the evader, since the specific damage-efficiency model of the guided missiles cannot be accurately obtained, the evader strategy design scheme can follow the design method of the general pursuit–evasion model. Before designing the evader strategy, we can analyze the situation of the pursuer first [13]. The cost function corresponding to the design of pursuers is made as follows:
J i = 1 2 k e p i r p i 2 k e r e 2 i = 1 , , n
where k e p i is the gain of evasion, and k e is the gain of breakthrough. Take the derivative of Equation (13) to obtain:
J ˙ i = k e p i x p i x e x ˙ p i x ˙ e + y p i y e y ˙ p i y ˙ e k e x e x t x ˙ e + y e y t y ˙ e = k e p i v p i x p i x e cos θ p i + y p i y e sin θ p i v e k e x e k e x t k p i x p i + k p i x e cos θ e + k e y e k e y t k p i y p i + k p i y e sin θ e
It can be concluded from Equation (14) that no matter what kind of evader strategy is adopted, if the pursuer p i needs to shorten the distance r p i , it can adopt the following strategy to minimize the cost function J i ; the θ p i * can be expressed as:
sin θ p i * = x p i x e x p i x e 2 + y p i y e 2 , cos θ p i * = y p i y e x p i x e 2 + y p i y e 2
According to Equation (15), the input of p i can be obtained as follows:
w * = θ p i * θ p i
Since the finite maneuver condition of Assumption (2) means that the control input is bounded, the input needs to satisfy:
w p i = w p max w p i * > w p max w p i * w p i * w p max w p max w p i * < w p max
However, for the evader, it is impossible to achieve the maximum value at the same time by solving Equation (13) directly. Although the optimal solution of a certain J i ( i = 1 , , n ) can be solved through Equation (14), due to the different states (i.e., positions or heading angles) of the pursuers, each pursuer also has a different effect on the evader. Obviously, the evader cannot simultaneously maximize each pursuer’s cost. So the following two principles should be met based on the characteristics of the evader.
(1)
Breakthrough principle: the distance r e between the evader and the line of defense should be narrowed to as small as possible. This requires the evader to be able to break through the defense line as soon as possible, thus optimizing Function (18).
(2)
Avoidance principle: the value of r p i is as large as possible. This requires the evader to stay away from the pursuers to prevent it from being destroyed by the pursuers, thus also optimizing Function (18).
Based on two principles above, the cost function of the evader can be expressed as:
J e = 1 2 k e r e 2 k e p i r p i 2 i = 1 , , n
where it is very difficult for the evader strategy to satisfy both principles at the same time, especially in the case of multiple pursuers; therefore, the weight of each principle needs to be adjusted based on different situations. Combined with the concept of virtual force in the literature [13], we can think that each pursuer and evader is a mass, and different pursuers will have a virtual force on the evader, which can be divided into repulsion under threat and gravity that needs to break through the defense line, as shown in Figure 4. The particle e will be subjected to the gravitational force F 0 from the line of defense due to Principle (1); the particle e receives repulsive force F i ( i = 1 , , n ) from particle p i ( i = 1 , , n ) due to Principle (2).
To solve the cost function (18) more accurately, an adaptive-gain virtual-force method is designed considering the threat degree of different pursuers based on [13]. The farther the distance is, the smaller the repulsive force of the pursuer on the evader is; otherwise, larger than the repulsive force is the gravitational force of the defense line to the pursuer. The threat of the pursuer is lower and the gravitational force is greater while the distance between the pursuer and the evader is farther. Thus, the repulsive forces F i ( i = 1 , , n ) and F 0 can be designed as follows:
F i = k e p i / r p i 2 , F 0 = k e / i = 1 n k e p i / r p i 2
Based on the above analysis, the adaptive laws of k e p i and k e in Function (19) are as follows:
k e p i = i = 1 n r p i / r p i 2 , k e = 1 / i = 1 n k e p i
Therefore, we can calculate the resultant force of such a pursuit model to obtain the direction of the evader. The virtual resultant forces in the horizontal direction and the vertical direction can be expressed as:
F e x = F 0 + i = 1 n F i cos α i , F e y = i = 1 n F i sin α i sin α i = x e x p i / r p i , cos α i = y e y p i / r p i
Based on the above analysis, the direction of the resultant force and input w e can be obtained as:
sin θ e * = F e y / F e x 2 + F e y 2 , cos θ e * = F e x / F e x 2 + F e y 2 , w e * = θ e * θ e
Since the finite maneuver condition of Assumption (2) means that the control input is bounded, the input needs to satisfy:
w e = w e max w e * > w e max w e * w e * w e max w e max w e * < w e max

3.2. Pursuer Strategy

Since the pursuer’s goal is to destroy the evader, the effect of the damage function also needs to be considered. Therefore, it is impossible to design the cost function according to the general pursuit–evasion problem; thus, the cost function can be written according to the design method of the damage function combined with Equation (4):
J p = 1 / i = 1 n F b i r p i , v p i , v e , θ p i , θ e i = 1 , , n
where F b i represents the damage to the evader caused by the i-th pursuer detonating at its current position. The damage range of the pursuer is shown in Figure 5. In combination with Equation (4), it is expressed as follows:
θ p i * = arg min 1 / ( f k d · i = 1 n v d g i 2 )
where θ p i * = [ θ p 1 * , θ p 2 * , , θ p n * ] represents the cost function solution. Since θ 0 represents the fragment scatter angle, the θ 0 angle fragments that can cause damage to the target are determined by the relative position of the pursuer and evader at the initiation time. Thus, it is impossible to determine the specific value of θ 0 in the movement stage of the pursuer. Therefore, the relative position of the pursuer and evader is used to solve for θ 0 to solve this problem. However, this solution method may cause a certain risk in the initiation of the pursuer: that is, the evader does not fall in the damage range or falls on the edge of the damage range. In the actual situation, the distribution of damage efficiency satisfies a normal distribution, and the center of the sector is the central value of the normal distribution: that is, more fragments with high damage efficiency will fall near the middle line of the damage range. Because of this risk, the resulting value may lead to a decrease in damage efficiency. In addition, the calculation of the minimum value of the above functions by using the interior-point method is very large, and the accuracy of the results will be affected if the accuracy and step-size of the solution are adjusted.
Based on the above points, it is very difficult to directly solve the problem of the cost Function (25). Therefore, three principles are proposed for the cost Function (25), and a virtual-force-analysis method based on these principles is established to approximate the solution.
(1)
Capture principle: the distance r p i between the pursuer and the evader should be narrowed as quickly as possible. This not only helps to achieve interception as soon as possible but also helps to increase the fragment kinetic energy relative to the evader at the initiation time, thus optimizing Function (21).
(2)
Azimuth correction principle: in terms of azimuth, the pursuer tries to keep the evader in the center of the damage area. This is conducive to the interception of more fragments with high kinetic energy that can act on the evader at the initiation moment, thus optimizing Function (25).
(3)
Coordinated initiation principle [27,28,29]: if pursuers are required to attack the evader simultaneously, the remaining time from each pursuer to the evader is required to be the same for all pursuers. Since each pursuer has the same velocity, the distance r p i between the pursuers and the evader should be as equal as possible. This is conducive to the fact that the damage ranges of multiple pursuers can act on the evader at the same time to achieve the superposition of damage effectiveness to achieve the purpose of high damage effectiveness.
Based on the three principles above, the approximate cost function is derived based on the virtual-force method. For the fast-capture principle, the process of analysis is similar to Equations (12)–(16). The distance cost function can be directly set as:
F p i = r p i 2
For the azimuth correction principle, since it is very difficult to solve v d g i , it is necessary to determine the characteristic conditions of initiation and optimize the function to achieve the purpose of maximum damage and accurate initiation. Combined with the damage-efficiency function, it is required that the evader is within the range of initiation and its speed direction is opposite to the flight direction of the fragment. In other words, the center-line of the dynamic flight angle of detonation at the moment is in a straight line with the heading angle of the evader to meet the maximum damage condition and reduce the probability of escape; the damage range is shown in Figure 5. Then, the initiation pose cost function can be reconstructed as follows:
F d i = min θ p i + θ p s i θ e 2 , θ p i θ p s i θ e 2 / r p i 2 θ e = θ e π θ e 0 θ e + π 2 π < θ e < 0 θ e + 3 π θ e 0
where θ p s i is the center-line of the dynamic scattering angle of the i-th pursuer; θ e is the opposite of the evader’s motion. Since an initiation angle needs to be aligned, it can be considered that the particle p i is subjected to a torque F d i for angular alignment.
The cooperative principle requires the pursuers to attack the target simultaneously so as to increase the efficiency of damage. The cooperative cost function is defined as:
F c i = r p i i = 1 n r p i / n 2
where in Equation (28), the cooperativity of the i-th pursuer can be described. The higher the value of | F c i | is, the worse the cooperativity. Then, the cooperativity can be adjusted through the control input to achieve the cooperative attack of pursuers. If r p i i = 1 n r p i , particle p i receives a gravitational force towards particle e to rapidly shorten its distance from particle e; if r p i < i = 1 n r p i , particle p i receives a repulsive force in the opposite direction of e. The virtual-force analysis of the pursuer based on the above design principles is shown in Figure 6.
The pursuer’s resultant force is as follows:
F p i = k p i F p i + k d i F d i + k c i F c i
where k p i is the gain of pursuit, k d i is the gain of damage, and k c i is the gain of cooperativeness. It is worth noting that for guided ammunition controlled by a guidance-integrated fuze, the interception process goes through the stages of long-range guidance control and short-range fuze control. In this process, the dominant position of each gain in Function (29) also changes. Therefore, we propose an interception-state-adaptive variable-weight design for Function (29) so that its solution can better approximate the solution of Function (24). Specifically, in the stage of long-range guidance control, k p i is increased to quickly approach the evader when the distance between the i-th pursuer and the evader is far. In the stage of short-range fuze control, k d i is increased to ensure a proper initiation azimuth and to maximize damage efficiency when close to the evader. The factor k c i ensures coordinated initiation of different pursuers during a cooperative interception. Based on the above analysis, the adaptive laws of k p i , k d i , and k c i in Function (29) are as follows:
k p i = r p i 2 , k d i = i = 1 n r p i / r p i 2 , k c i = r p i i = 1 n r p i / n 2
Therefore, the direction of the virtual resultant force on the pursuer can be calculated. If r p i i = 1 n r p i , The resultant virtual force in the horizontal direction and the vertical direction can be divided into the following two cases:
F p x i = k p i F p i cos α i + k d i F d i cos α i + π / 2 + k c i F c i cos α i + π F p y i = k p i F p i sin α i + k d i F d i sin α i + π / 2 + k c i F c i sin α i + π d e + d e
F p x i = k p i F p i cos α i + k d i F d i cos α i π / 2 + k c i F c i cos α i + π F p y i = k p i F p i sin α i + k d i F d i sin α i π / 2 + k c i F c i sin α i + π d e + < d e
where d e + = θ p i + θ p s i θ e , d e = θ p i θ p s i θ e . Otherwise r p i < i = 1 n r p i . The virtual resultant force in the horizontal direction and the vertical direction can be expressed as:
F p x i = k p i F p i cos α i + k d i F d i cos α i + π / 2 + k c i F c i cos α i F p y i = k p i F p i sin α i + k d i F d i sin α i + π / 2 + k c i F c i sin α i d e + d e
F p x i = k p i F p i cos α i + k d i F d i cos α i π / 2 + k c i F c i cos α i F p y i = k p i F p i sin α i + k d i F d i sin α i π / 2 + k c i F c i sin α i d e + < d e
Based on the above analysis, the direction of the resultant force can be obtained as:
sin θ p i * = F p y i / F p y i 2 + F p y i 2 , cos θ p i * = F p x i / F p x i 2 + F p y i 2 , w p i * = θ p i * θ p i
This takes into account the position information of the evader so that the evader is more likely to be in the damage area on one side of the pursuers. Thus, the input can be expressed as:
w p i = w p max w p i * > w p max w p i * w p i * w p max w p max w p i * < w p max

3.3. Condition of the Explosive

In the traditional pursuit–evasion problem, the pursuer is considered to have completed the task by reaching the range of the Apollonius circle between the evader and the pursuers [6,8,10]. General fuze designs also use the distance from the target as the basis of initiation. Therefore, both the traditional fuze and the judgment condition for the end of the pursuit–evation depend on the distance: that is, r i < d . However, because the initiation time of the fuze is a time and space judgment process integrating various physical information, it is insufficient to judge it by distance only. Therefore, Equation (9) can be used to determine the best initiation timing based on the information of the fuze and the target. The determination conditions of initiation conditions are as follows: F b i > F s e t . F s e t is the condition satisfied by the initiation function, and its specific parameters is designed to meet the empirical value of the damage condition, which changes according to different objectives.

4. Numerical Simulations

4.1. Parameter Setting

As an example, we provide a scene consisting of four pursuers and one evader. The position of the defensive line is a straight line with a coordinate of zero. The initial position design of the pursuers and the evader are shown in Table 1:
Parameters settings of the fuze–warhead matching mode in the numerical simulation model are shown in Table 2:

4.2. Simulation Analysis of Pursuit–Evasion Problem

In this section, a mathematical simulation is taken as an example to explicate the effectiveness of the proposed strategy, and the comparison strategies are proposed in [13] and solve Equation (25) directly. The simulation step size is 0.005. The trajectory and damage range of the pursuers/evader adopting the proposed pursuer strategy are shown in Figure 7a, and the comparison is shown in Figure 7b. It can be seen from Figure 7a that the strategy takes into account the cooperative characteristics of multiple pursuers and the impact of detonation position on the damage so that the damage range overlaps and the damage direction is corrected. At the time of initiation, p 1 is corrected by 38.2°, and p 2 is corrected by 11.9°; therefore, the damage degree of evaders is increased based on Principles (2) and (3). It can be seen from Figure 7b that p 1 and p 2 successfully detonate and cause certain damage to the evader. However, since the judgment of explosive conditions does not involve cooperative and pose characteristics, the degree of damage to the pursuers is weakened to some extent.
For the strategy of directly solving Equation (25), due to accuracy of both the simulation and the algorithm having great influence on the solution result, the results vary greatly under different simulation and algorithm solution accuracies. Figure 7c shows the results with simulation step-size of 0.001. The maximum calculation time of the interior-point method solution is 1 × 10 5 , and the tolerance is 1 × 10 10 . It can be seen from the figure that its damage range also overlaps, but the overlap mode is different from that of the proposed strategy. However, when the simulation step-size is 0.5, as shown in Figure 7d, the maximum calculation time of the interior-point-method solution is 1 × 10 3 , and the tolerance is 1 × 10 7 ; only one pursuer can cause effective damage, which greatly reduces the damage efficiency.
Damage efficiency is determined by Equation (9). The unit fragment damage efficiency of the proposed pursuer strategy is shown in Figure 8a, and the comparison is shown in Figure 8b. The proposed pursuer strategy has significantly improved the damage efficiency of the unit fragment compared with the ordinary situation because of the consideration of the cooperative position and pose information, and the damage efficiency of the cooperative strategy proposed in this paper is 1.612 × 10 6 J at the initiation time. However, in comparison with the literature [13], due to adjustment of the final initiation position and pose, coordinated initiation cannot be achieved, and the damage efficiency is 1.113 × 10 6 J. The proposed strategy improves the damage efficiency by 44.8% compared with the strategy of [13]. Based on the numerical value analysis above, the proposed adaptive-gain method based on different principles of virtual force and guidance-integrated fuze significantly improves the damage efficiency.
For a strategy that directly solves Equation (25). The simulation step size is 0.0005, the maximum calculation time for the interior-point-method solution is 10,000, and the tolerance is 1 × 10 7 ; the results are shown in Figure 8c. It can be seen from this figure that its damage efficiency is 1.661 × 10 6 J, which is higher than the proposed strategy using virtual force. However, the simulation step size is 0.05, the maximum number of calculations is 1000, and the tolerance is 1 × 10 2 , as shown in Figure 8d. The damage efficiency is reduced to 1.337 × 10 6 J. Moreover, under the condition of high precision and the same simulation step size, the solving time becomes 13.4 times that of the proposed strategy. Even under low-accuracy conditions, it is 6.1 times more than the proposed strategy.
In order to explain the advantages and disadvantages of the two methods more clearly, Figure 9 shows the time-cost as the X-axis and the damage efficiency as the Y-axis. As can be seen from Figure 9, due to the high complexity of the direct solution method, its damage efficiency is greater when the calculation accuracy is higher, but it also consumes more computing resources, which is not conducive to direct application in the actual system. If the solution accuracy continues to be reduced, the solution value does not converge. However, the virtual-force method is relatively stable as a whole and is not affected by accuracy, which saves computing resources and is more conducive to use in the actual system. The proposed algorithm can have relatively stable performance even in the case of low computational resource consumption.
Different gains for the pursuer in the proposed pursuer strategy are shown in Figure 10. It can be seen from Figure 10 that the gain changes for the pursuer can be divided into the guidance stage and the fuze stage. Taking p 1 as an illustration, the proportion of k p 1 is the largest when the distance r p 1 is relatively far from 0–4 s. At this time, the main task of p 1 is to approach the evader as quickly as possible. When the pursuer is in the main function stage of the fuze at 4–4.3 s, the distance r p 1 is relatively close; then, the gain in k b 1 would be rapid to adjust for the best detonation position to maximize damage efficiency. Further, k c i also increases to achieve cooperative initiation when r p 1 deviates far from the mean of r p i ( i = 1 , , 4 ) .

4.3. Monte Carlo Analysis of Pursuit–Evasion Problem

In practice, the relative positions of the pursuer, the evader, and the line of defense are uncertain. Therefore, it is necessary to consider the ultimate damage effectiveness under different circumstances. The initial range of the evader is shown in Figure 11. The final damage efficiency of the proposed strategy is compared with that of the strategy in [13].
The damage efficiency of the proposed pursuer strategy is shown in Figure 12. The comparison is shown in Figure 13. The X-axis direction range of the breakout adopted is (−500, 2500), the Y-axis range is (3000, 7000), and the Z-axis is the damage efficiency. The average damage efficiency of the proposed strategy is 1.363 × 10 6 J, while that of the compared strategy is 8.078 × 10 5 J, which improves the damage efficiency by 68.3%. If an area greater than 6 × 10 5 J is defined as the effective damage area, the effective damage area of the proposed strategy is 89.3%, while that of the compared strategy is 63.2%, which is an improvement of 41.2%. The histogram of the proportional distribution of damage efficiency is shown in Figure 14, from which it can be seen that the proportion of the optimal damage efficiency distribution of the proposed strategy is much larger than that of the compared strategy.
In order to show the improvement in the final damage efficiency of the different design principles, the strategy in [13] is combined with Principle (2) and Principle (3) to carry out simulations using the same initial conditions, and the results are shown in Figure 15 and Figure 16, respectively. The cost functions of the strategy in [13] combined with Principle (2) are as follows:
F p i 12 = k p i F p i + k d i F d i
It can be seen from Figure 15 that since Principle (2) has a great influence on the position and pose of detonation, damage efficiency is improved as much as possible. The average damage efficiency can reach 1.0691 × 10 6 J, but the effective damage area is not greatly improved. The cost functions of the strategy in [13] combined with Principle (3) are as follows:
F p i 13 = k p i F p i + k c i F c i
It can be seen from Figure 16 that the average damage efficiency of the strategy from [13] combined with Principle (3) can reach 1.1008 × 10 6 , and the effective damage range can be improved due to its cooperative characteristics so as to ensure the reliability of simultaneous attack.
Monte Carlo simulation is performed for different pursuer speeds, and the simulation speed is designed to be 500–750 m/s. The results are shown in Figure 17 according to the average damage efficiency of the unit fragments and the percentage of effective damage range as the comparison standard. The damage range is more easily satisfied when the speed of the catcher is close to the speed of the breaker, so the damage range adopted by the two principles will gradually converge with increased speed. The results show that the unit fragment damage efficiency of the proposed algorithm increases by 52.62% and the effective damage range increases by 10.69% at different speeds.

5. Conclusions

In this paper, a cooperative control strategy considering damage range is designed to solve the problem of cooperative pursuit–evasion of multiple guided missiles. Firstly, the damage-efficiency function is established by using the fuse–warhead matching model, which can maximize the damage efficiency. Furthermore, a kind of pursuit–evasion problem considering damage range is reconstructed by combining the damage efficiency function. Secondly, the strategies of the pursuers and the evader are designed based on the virtual force and a simplified damage-efficiency function, which greatly reduces the computational complexity and is easier to use in an actual system. Thirdly, a parameter-adaptive method based on the main task stage is designed to realize the optimal damage-efficiency strategy, which can make the corresponding different gain self-adaptive so as to achieve the maximum damage efficiency in unpredictable situations. Finally, numerical simulations are performed on fixed occasions and multi-case simulations with different initial positions and different speeds. The results show that the proposed strategy not only improves the average damage efficiency by 68.3%, but it also expands the range of average effective damage for various initial positions by 41.2% over existing approaches in the literature.

Author Contributions

Conceptualization, X.M. and K.D.; methodology, X.M.; software, X.M. and H.Y.; formal analysis, W.S.; investigation, L.D.; writing—original draft preparation, X.M.; writing—review and editing, H.Z.; visualization, X.W.; supervision, M.L.; funding acquisition, K.D. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Strengthening Plan Technical Field Fund, grant number 2021-JCJQ-JJ-0597.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Xing, N.; Zong, Q.; Dou, L.; Tian, B.; Wang, Q. A game theoretic approach for mobility prediction clustering in unmanned aerial vehicle networks. IEEE Trans. Veh. Technol. 2019, 68, 9963–9973. [Google Scholar] [CrossRef]
  2. Cao, X.; Sun, H.; Guo, L. Potential field hierarchical reinforcement learning approach for target search by multi-AUV in 3-D underwater environments. Int. J. Control 2020, 93, 1677–1683. [Google Scholar] [CrossRef]
  3. Yu, J.; Dong, X.; Li, Q.; Ren, Z.; Lv, J. Cooperative guidance strategy for multiple hypersonic gliding vehicles system. Chin. J. Aeronaut. 2020, 33, 990–1005. [Google Scholar] [CrossRef]
  4. Jiang, S.; Tian, F.Q.; Sun, S.Y.; Liang, W.G. Integrated guidance and control of guided projectile with multiple constraints based on fuzzy adaptive and dynamic surface. Def. Technol. 2020, 16, 1130–1141. [Google Scholar] [CrossRef]
  5. Garcia, E.; Casbeer, D.W.; Pachter, M. Optimal strategies of the differential game in a circular region. IEEE Control Syst. Lett. 2020, 4, 492–497. [Google Scholar] [CrossRef]
  6. Garcia, E.; Casbeer, D.W.; Pachter, M. Design and analysis of state-feedback optimal strategies for the differential game of active defense. IEEE Trans. Autom. Control 2019, 64, 553–568. [Google Scholar] [CrossRef]
  7. Garcia, E. Cooperative target protection from a superior attacker. Automatica 2021, 131, 109696. [Google Scholar] [CrossRef]
  8. Liang, L.; Deng, F.; Peng, Z.; Li, X.; Zha, W. A differential game for cooperative target defense. Automatica 2019, 102, 58–71. [Google Scholar] [CrossRef]
  9. Chen, M.; Zhou, Z.; Tomlin, C.J. Multiplayer reach-avoid games via pairwise outcomes. IEEE Trans. Autom. Control 2017, 62, 1451–1457. [Google Scholar] [CrossRef]
  10. Wei, X.; Yang, J. Optimal Strategies for multiple unmanned aerial vehicles in a pursuit/evasion differential game. J. Guid. Control. Dyn. 2018, 41, 1799–1806. [Google Scholar] [CrossRef]
  11. Wang, Y.; Dong, L.; Sun, C. Cooperative control for multi-player pursuit-evasion games with reinforcement learning. Neurocomputing 2020, 412, 101–114. [Google Scholar] [CrossRef]
  12. de Souza, C., Jr.; Newbury, R.; Cosgun, A.; Castillo, P.; Vidolov, B.; Kulic, D. Decentralized multi-agent pursuit using deep reinforcement learning. IEEE Robot. Autom. Lett. 2021, 6, 4552–4559. [Google Scholar] [CrossRef]
  13. Zhang, F.; Zha, W. Evasion strategies of a three-player lifeline game. Sci. China Inf. Sci. 2018, 61, 112206. [Google Scholar] [CrossRef]
  14. Makkapati, V.R.; Sun, W.; Tsiotras, P. Optimal evading strategies for two-pursuer/one-evader Problems. J. Guid. Control. Dyn. 2018, 41, 851–862. [Google Scholar] [CrossRef] [Green Version]
  15. Shule, W.; Almansa, C.M.; Queralta, J.P.; Zou, Z.; Westerlund, T. UWB-based localization for multi-UAV systems and collaborative Heterogeneous multi-robot systems. Procedia Comput. Sci. 2020, 175, 357–364. [Google Scholar] [CrossRef]
  16. Zhang, P.C.; Cheng, Y.Z.; Wang, J. Damage effectiveness evaluation of missile and artillery air defense Group. In Advanced Materials Research; Trans Tech Publications: Wollerau, Switzerland, 2014; Volume 1044, pp. 959–962. [Google Scholar]
  17. Zhang, X.; Xiaoxian, Y.; Zheng, Q. Impact point prediction guidance based on iterative process for dual-spin projectile with fixed canards. Chin. J. Aeronaut. 2019, 32, 1967–1981. [Google Scholar] [CrossRef]
  18. Wang, Y.; Song, W.D.; Fang, D.; Guo, Q.W. Guidance and control design for a class of spin-stabilized projectiles with a two-dimensional trajectory correction fuze. Int. J. Aerosp. Eng. 2015, 2015, 1–15. [Google Scholar] [CrossRef] [Green Version]
  19. Yuzhao, L.; Yan, L.; Xi, C.; Sha, S.; Juan, G. Precision analyses of point-of-burst control based on laser fuze. Infrared Laser Eng. 2018, 47, 1206004. (In Chinese) [Google Scholar] [CrossRef]
  20. Jinkui, W.; Wenzhong, L.; Weitong, L.; Zilong, S. Integrated design of guidance law, fuze and warhead for maneuvering target interception. Acta Armamentarii 2020, 41, 649. [Google Scholar]
  21. He, L.; Yan, X. Adaptive terminal guidance law for spiral-diving maneuver based on virtual sliding targets. J. Guid. Control. Dyn. 2018, 41, 1591–1601. [Google Scholar] [CrossRef]
  22. Guo, Y.; Li, X.; Zhang, H.; Wang, L.; Cai, M. Entry guidance with terminal time control based on quasi-equilibrium glide condition. IEEE Trans. Aerosp. Electron. Syst. 2019, 56, 887–896. [Google Scholar] [CrossRef]
  23. Kartal, Y.; Subbarao, K.; Dogan, A.; Lewis, F. Optimal game theoretic solution of the pursuit-evasion intercept problem using on-policy reinforcement learning. Int. J. Robust Nonlinear Control 2021, 31, 7886–7903. [Google Scholar] [CrossRef]
  24. Weintraub, I.E.; Pachter, M.; Garcia, E. An introduction to pursuit-evasion differential games. In Proceedings of the 2020 American Control Conference (ACC), Denver, CO, USA, 1–3 July 2020; pp. 1049–1066. [Google Scholar]
  25. Catovic, A.; Kljuno, E. A novel method for determination of lethal radius for high-explosive artillery projectiles. Def. Technol. 2021, 17, 1217–1233. [Google Scholar] [CrossRef]
  26. Dhote, K.; Murthy, K.; Rajan, K.; Sucheendran, M. Quantification of projection angle in fragment generator warhead. Def. Technol. 2014, 10, 177–183. [Google Scholar] [CrossRef] [Green Version]
  27. Yu, H.; Dai, K.; Li, H.; Zou, Y.; Ma, X.; Ma, S.; Zhang, H. Three-dimensional adaptive fixed-time cooperative guidance law with impact time and angle constraints. Aerosp. Sci. Technol. 2022, 123, 107450. [Google Scholar] [CrossRef]
  28. Hu, Q.; Han, T.; Xin, M. Three-dimensional guidance for various target motions with terminal angle constraints using twisting control. IEEE Trans. Ind. Electron. 2019, 67, 1242–1253. [Google Scholar] [CrossRef]
  29. Li, Z.; Ding, Z. Robust cooperative guidance law for simultaneous arrival. IEEE Trans. Control. Syst. Technol. 2018, 27, 1360–1367. [Google Scholar] [CrossRef]
Figure 1. Relative motion.
Figure 1. Relative motion.
Sensors 22 09342 g001
Figure 2. Initial static velocity v d 0 of the fragment in the projectile coordinate system.
Figure 2. Initial static velocity v d 0 of the fragment in the projectile coordinate system.
Sensors 22 09342 g002
Figure 3. The relative motion of pursuer and evader in the ground coordinate system.
Figure 3. The relative motion of pursuer and evader in the ground coordinate system.
Sensors 22 09342 g003
Figure 4. Virtual-force analysis of evaders.
Figure 4. Virtual-force analysis of evaders.
Sensors 22 09342 g004
Figure 5. Damage range and movement diagram of the evader.
Figure 5. Damage range and movement diagram of the evader.
Sensors 22 09342 g005
Figure 6. Virtual-force-analysis diagram of the i-th pursuer.
Figure 6. Virtual-force-analysis diagram of the i-th pursuer.
Sensors 22 09342 g006
Figure 7. Trajectory and damage range of pursuers/evader: (a) proposed strategy; (b) strategy from the literature [13]; (c) strategy of Equation (24) with high precision; and (d) strategy of Equation (24) with low precision.
Figure 7. Trajectory and damage range of pursuers/evader: (a) proposed strategy; (b) strategy from the literature [13]; (c) strategy of Equation (24) with high precision; and (d) strategy of Equation (24) with low precision.
Sensors 22 09342 g007
Figure 8. Unit fragment damage efficiency: (a) proposed strategy; (b) strategy from the literature [13]; (c) strategy of Equation (24) with high precision; and (d) strategy of Equation (24) with low precision.
Figure 8. Unit fragment damage efficiency: (a) proposed strategy; (b) strategy from the literature [13]; (c) strategy of Equation (24) with high precision; and (d) strategy of Equation (24) with low precision.
Sensors 22 09342 g008
Figure 9. Damage efficiency under different time-costs.
Figure 9. Damage efficiency under different time-costs.
Sensors 22 09342 g009
Figure 10. Gain of pursuer: (a) gain of p 1 and p 2 and (b) gain of p 3 and p 4 .
Figure 10. Gain of pursuer: (a) gain of p 1 and p 2 and (b) gain of p 3 and p 4 .
Sensors 22 09342 g010
Figure 11. The initial range of the evader.
Figure 11. The initial range of the evader.
Sensors 22 09342 g011
Figure 12. Damage efficiency of proposed strategy.
Figure 12. Damage efficiency of proposed strategy.
Sensors 22 09342 g012
Figure 13. Damage efficiency of [13].
Figure 13. Damage efficiency of [13].
Sensors 22 09342 g013
Figure 14. Histogram of the proportional distribution of damage efficiency [13].
Figure 14. Histogram of the proportional distribution of damage efficiency [13].
Sensors 22 09342 g014
Figure 15. Damage efficiency in [13].
Figure 15. Damage efficiency in [13].
Sensors 22 09342 g015
Figure 16. Damage efficiency in [13].
Figure 16. Damage efficiency in [13].
Sensors 22 09342 g016
Figure 17. Monte Carlo simulation of different pursuer speeds [13].
Figure 17. Monte Carlo simulation of different pursuer speeds [13].
Sensors 22 09342 g017
Table 1. Participants’ initial parameter settings.
Table 1. Participants’ initial parameter settings.
ParticipantX/mY/mInitial Angle/°Speed/m·s 1
p 1 020000600
p 2 013330600
p 3 06670600
p 4 000600
e60,000120090800
Table 2. Damage efficiency model.
Table 2. Damage efficiency model.
ParameterValueParameterValue
Gurney coefficient2370Correction coefficient1.1
Detonation velocity of explosive6930Explosive loading factor1
Damage range angle[−15, 15]Velocity attenuation coefficient100
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ma, X.; Dai, K.; Li, M.; Yu, H.; Shang, W.; Ding, L.; Zhang, H.; Wang, X. Optimal-Damage-Effectiveness Cooperative-Control Strategy for the Pursuit–Evasion Problem with Multiple Guided Missiles. Sensors 2022, 22, 9342. https://doi.org/10.3390/s22239342

AMA Style

Ma X, Dai K, Li M, Yu H, Shang W, Ding L, Zhang H, Wang X. Optimal-Damage-Effectiveness Cooperative-Control Strategy for the Pursuit–Evasion Problem with Multiple Guided Missiles. Sensors. 2022; 22(23):9342. https://doi.org/10.3390/s22239342

Chicago/Turabian Style

Ma, Xiang, Keren Dai, Man Li, Hang Yu, Weichen Shang, Libo Ding, He Zhang, and Xiaofeng Wang. 2022. "Optimal-Damage-Effectiveness Cooperative-Control Strategy for the Pursuit–Evasion Problem with Multiple Guided Missiles" Sensors 22, no. 23: 9342. https://doi.org/10.3390/s22239342

APA Style

Ma, X., Dai, K., Li, M., Yu, H., Shang, W., Ding, L., Zhang, H., & Wang, X. (2022). Optimal-Damage-Effectiveness Cooperative-Control Strategy for the Pursuit–Evasion Problem with Multiple Guided Missiles. Sensors, 22(23), 9342. https://doi.org/10.3390/s22239342

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop