Next Article in Journal
Assessment of Spatial Patterns of Backyard Shacks Using Landscape Metrics
Next Article in Special Issue
High-Performance Detection-Based Tracker for Multiple Object Tracking in UAVs
Previous Article in Journal
Fast Opium Poppy Detection in Unmanned Aerial Vehicle (UAV) Imagery Based on Deep Neural Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Hierarchical Task Assignment for Multi-UAV System in Large-Scale Group-to-Group Interception Scenarios

College of Intelligence Science and Technology, National University of Defense Technology, Changsha 410073, China
*
Author to whom correspondence should be addressed.
Drones 2023, 7(9), 560; https://doi.org/10.3390/drones7090560
Submission received: 2 August 2023 / Revised: 18 August 2023 / Accepted: 29 August 2023 / Published: 1 September 2023
(This article belongs to the Special Issue Advances in Perception, Communications, and Control for Drones)

Abstract

:
The multi-UAV task assignment problem in large-scale group-to-group interception scenarios presents challenges in terms of large computational complexity and the lack of accurate evaluation models. This paper proposes an effective evaluation model and hierarchical task assignment framework to address these challenges. The evaluation model incorporates the dynamics constraints specific to fixed-wing UAVs and improves the Apollonius circle model to accurately describe the cooperative interception effectiveness of multiple UAVs. By evaluating the interception effectiveness during the interception process, the assignment scheme of the multiple UAVs could be given based on the model. To optimize the configuration of UAVs and targets, a hierarchical framework based on the network flow algorithm is employed. This framework utilizes a clustering method based on feature similarity and interception advantage to decompose the large-scale task assignment problem into smaller, complete submodels. Following the assignment, Dubins curves are planned to the optimal interception points, ensuring the effectiveness of the interception task. Simulation results demonstrate the feasibility and effectiveness of the proposed scheme. With the increase in the model scale, the proposed scheme has a greater descending rate of runtime. In a large-scale scenario involving 200 UAVs and 100 targets, the runtime is reduced by 84.86 % .

1. Introduction

Counter-UAV has become a hot topic, as UAV attacks are increasing and used in conflicts [1]. Traditional counter-UAV approaches include methods such as fire strikes and electromagnetic interference. With the increase in the scale of low-cost UAVs, traditional counter-UAV methods are ineffective. In the face of large-scale UAV attacks, hostile UAV swarms can be constructed to achieve counter-UAV in the form of active interception [2]. This new type of counter-UAV covers advanced technologies including intelligent decision making and control and has certain advantages. For large-scale UAV attacks, interception based on fixed-wing UAV platforms will become one of the most important means of countering [3,4]. Task assignment, as the essential component of the multi-UAV system, plays a vital role in the optimal configuration of targets and UAVs in interception scenarios [5]. Once a target is detected, the UAV needs to provide an intercept solution as soon as possible, based on the situation of both sides. In large-scale interception scenarios, it is crucial for the assignment algorithm to fulfill the prerequisites of a reliable evaluation model and efficient solution speed. Solving the task assignment problem in large-scale group-to-group interception scenarios is still a challenge.
In large-scale group-to-group interception scenarios, multiple UAVs assess the situation by considering relevant information and form an assignment plan based on the evaluation outcomes. The multi-UAV task assignment problem in large-scale interception scenarios has the following characteristics.
  • The evaluation model may need to effectively evaluate the offensive and defensive situations of both parties and integrate the task assignment result with the interception technology to ensure the successful execution of the interception task.
  • There will be clustering targets in large-scale interception scenarios, and UAVs may need to cooperate to complete the task. In addition, the execution capabilities of UAVs are different.
  • The task assignment algorithm should provide feasible solutions in a short time to accommodate the high-speed movements of fixed-wing UAVs.
The establishment of an evaluation model is the basis of task assignment. A reasonable evaluation model is essential to ensure the efficiency of group-to-group interception. Gao et al. conduct an evaluation model that takes into account the azimuth, speed, and distance advantages [6]. Traditional evaluation models typically focus on the individual value of a single UAV and seldom consider the effectiveness of multi-UAV cooperative interception. Sun et al. establish the evaluation model considering not only the relative position and velocity mentioned in traditional functions, but also relative normal velocity, normal acceleration, maneuverability, and cooperation between multiple missiles [7]. Wang et al. and Guo et al. model the cooperative interception effectiveness as a geometric coverage problem [8,9]. The evaluation models in the literature mentioned in this article are mostly aimed at missiles or seldom consider the turning radius constraints of fixed-wing UAVs. When it comes to fixed-wing UAVs, the problem is challenging because all UAVs have different maneuvering capability and are subject to turning radius constraints [10]. Therefore, it is crucial to establish a simple but accurate evaluation model that can describe the interception scenario of the multi-UAV system.
After establishing the evaluation model, the task assignment algorithm is needed to obtain the optimal task scheme. Many scholars have proposed various methods to solve the task assignment problem. The multi-UAV task assignment problem is a non-deterministic polynomial-time hard (NP-hard) problem to find the global optimal solution [11]. The task assignment algorithm can be classified into centralized and distributed algorithms [12]. The centralized algorithm usually has more information available than the distributed algorithm so that the multi-UAV system can find the global optimal solution more efficiently [13]. In interception scenarios, the UAVs can receive all the task information detected by the radar system at the base, so the centralized algorithm has certain advantages in the initial task assignment stage. The centralized task assignment methods include optimization and heuristic algorithms [14,15]. Heuristic algorithms such as ant colony algorithms [16], particle swarm algorithms [17], and genetic algorithms [18] rely on iterations to obtain optimal solutions. However, the efficiency of the algorithms is severely affected by the initial parameters, which are difficult to determine. Classical optimization methods include mixed-integer programming, which can clearly describe the task assignment problem [19]. In addition, graph theory-based approaches such as the network flow model use graph theory methods to formalize the characteristics of tasks and UAVs and to establish the matching relationship between tasks and UAVs to generate an effective task assignment scheme [20]. However, it is generally limited to small-scale models. With the increase in the task assignment model scale, the optimization methods face the risk of exponential computational burden [21]. It is a challenge to give solutions to large-scale task assignment problems in a short time. A significant effort in the research community is the hierarchical task assignment scheme. The idea is to decompose the complex task assignment model into several small-scale submodels. Many scholars have verified the efficiency and scalability of this scheme [22,23,24].
For the task assignment problem in large-scale group-to-group interception scenarios, this paper proposes a hierarchical task assignment scheme to handle the multi-UAV task assignment problem. First, this paper establishes an evaluation model to accurately describe the group-to-group interception scenario for multi-UAV systems. The evaluation model fully considers the dynamic constraints of fixed-wing UAVs and reasonably describes the cooperative interception situation. Moreover, based on a hierarchical task assignment framework, the feasible task assignment scheme will be solved under the optimality and rapidity trade-offs. Compared with the existing works, the main contributions are summarized below.
  • A simple but accurate evaluation model is designed to describe complex group-to-group cooperative interception scenarios. Based on the Apollonius circle and the fixed-wing UAV dynamics model, the evaluation model can accurately describe the cooperative interception effectiveness of multiple UAVs and guide the solution of the task assignment problem.
  • Under the hierarchical task assignment framework, this paper designs a heuristic model decomposition method for the interception scenarios. In the model decomposition phase, large-scale UAVs and targets are effectively divided based on distribution characteristics and interception advantage. In the task assignment phase, the network flow model (NFO) suitable for multi-UAV systems is established to determine the feasible solutions for each submodel. The simulation results show that the proposed algorithm can give the solution in milliseconds and reduce the runtime even more as the model scale increases.
This article is organized as follows. The scenario description and the hierarchical framework are given in Section 2. Section 3 presents the model decomposition method. Section 4 describes the evaluation model and the network flow algorithm. Section 5 provides the details of the simulation experiment. Section 6 summarizes this paper.

2. Problem Formulation

The typical group-to-group interception scenario in this paper is shown in Figure 1. In this scenario, multiple UAVs attempt to intercept all target clusters, and targets may adopt maneuvering strategies to evade interception after detecting multiple UAVs within the detection range L 0 . It is assumed that both UAVs and targets are fixed-wing UAV platforms, with more UAVs than targets ( N U N T ). Initially, targets can be detected by a radar system. The central control station performs target and UAV grouping based on relevant information to assess the offensive and defensive situations. Then, each UAV is assigned a target suitable for interception, and excess UAVs are assigned to targets with a higher threat level for many-to-one interception to ensure higher interception effectiveness. According to the task assignment scheme, multiple UAVs will intercept multiple targets at optimal interception points.
Therefore, a hierarchical task assignment framework suitable for group-to-group interception scenarios is proposed as shown in Figure 2. First, according to the distribution of targets, feature similarity clustering is applied to decompose the targets into several subclusters. Based on the clustering results, the spatial location and requirements of each task subcluster are determined. Then, the interception advantage-based assignment method is applied to form the UAV teams for these clustered targets. After that, the large-scale task problem can be decomposed into several small-scale submodels to reduce the computational burden. Based on the decomposition results, an Apollonius circle-based evaluation function is proposed to describe the interception effectiveness of each UAV reasonably. In each submodel, the UAV broadcasts its interception effectiveness information to the central UAV. The central UAV assigns specific tasks to the UAVs within the team based on network flow optimization and plans optimal interception points to maximize the probability of successful cooperative interception. After all UAVs are assigned, the path planning algorithm based on the cooperative Dubins curve generates a path to the interception point for the UAV.

3. Model Decomposition

This paper models the task assignment problem as a network flow model G = ( V , E ) with the min-cost max-flow. In the directed graph G, the number of edges in graph G is denoted by m = | E | , while the number of vertices is n = | V | . Assume that the maximum cost of each edge is C, that is, C = m a x ( i , j ) E c ( i , j ) . The capacity of each edge is represented by U = m a x ( i , j ) E u ( i , j ) . Due to the limited capacity of the network, the flow value of the graph G will not exceed the maximum flow M a x F l o w = m U . Accordingly, the maximum cost of the network is C · M a x F l o w . The cost of the network decreases by at least one in each iteration and reaches its minimum after several iterations. Therefore, the maximum number of iterations of the algorithm is
I O ( m C U ) .
Then the Bellman–Ford (BF) algorithm is used to find a path from the source point to the sink point. The BF algorithm takes O ( m n ) times to find a feasible flow. Therefore, the maximum computational complexity B of the centralized network flow algorithm to produce a feasible task assignment solution is
B = O ( m 2 n C U ) .
In this paper, the maximum cost C and capacity U of the network are limited to 1, so the computational complexity in (2) can be simplified as O ( m 2 n ) . It can be seen that the computational complexity is closely related to the number of vertices and edges in the graph. At the same time, the number of vertices and edges is directly related to the number of UAVs and targets. In large-scale interception scenarios, solving a feasible task assignment scheme for a large number of UAVs and targets will result in a large amount of computation time. Therefore, it is necessary to design an effective method to reduce the scale of the model.
Assuming that the large-scale task assignment model can be decomposed into N S submodels, the UAV set and task set in the q t h ( q = 1 , 2 , . . . , N S ) submodel are separately U q = U 1 , . . . , U N U q and T q = T 1 , . . . , T N T q . U N U q and T N T q represent the number of UAVs and tasks in the q t h submodel, respectively. Each submodel is solved by the centralized network flow model. Similar to (2), the maximum computational complexity of the submodel can be expressed as
B q = O ( m q 2 n q ) .
Then, the maximum computational complexity of the hierarchical task assignment model is
B = O ( q = 1 N S B q ) = O ( q = 1 N S m q 2 n q ) O ( q = 1 N S m q 2 n ) O ( ( q = 1 N S m q ) 2 n ) = O ( m 2 n ) = B .
Obviously, the hierarchical task assignment model has less computational complexity than the original task assignment model through effective model decomposition. The required computation time is also reduced. However, the hierarchical scheme may lead to a suboptimal solution of the task assignment problem. Therefore, the core of the problem is to find a model decomposition method suitable for interception scenarios.

3.1. Target Grouping Based on Feature Similarity Clustering

For targets in group-to-group interception scenarios, the individual behavior within the group is consistent, and the individuals are close together to form a relatively dense formation. Therefore, the targets with high similarity can be grouped based on the geometric and motion characteristics. In addition, we hope to limit the number of targets in each group, so the traditional feature similarity clustering algorithm [25] is improved in this section.
According to the sensor detection and fusion results, the state set of targets is assumed to be S ( t ) = s 1 ( t ) , s 2 ( t ) , . . . , s n ( t ) . Among them, s i is the state of the i t h target. The time of data collection, target position, speed, and heading angle are all taken into account. The similarity matrices M d , M v , M θ are calculated according to the above information. The similarity matrices’ calculations are carried out in (5) and (6).
(1) The similarity of the target position: According to the Euclidean distance between two targets d m n , the target position similarity is defined as
M d ( d m n ) = 1 , d m n α e k ( d m n α ) , d m n > α ,
where α is the threshold, representing the allowed Euclidean distance between two targets.
(2) The similarity of target speed and heading angle: The similarity of the target speed is defined as
M v ( v m n ) = α 2 v m n α 2 α 1 , α 1 v m n α 2 ,
Among them, v m n is the absolute value of the velocity difference. We define the parameters α 1 and α 2 to measure the influence of the velocity difference. α 2 α 1 represents the maximum allowed velocity difference and (6) is normalized based on it. Considering the cruising speed of the fixed-wing UAV, the values of α 1 and α 2 are taken as 5 m / s and 10 m / s , respectively. The speed similarity of the two targets is 1 when the speed difference is within 5 m / s , and 0 when the speed difference is greater than 10 m / s .
The heading angle similarity M θ ( θ m n ) calculation method is the same as that of the speed similarity, where the parameter values are 5 and 10.
An undirected graph was constructed to form the target group based on the similarity between the target nodes. Target nodes with high similarity will form connected branches, but there may be isolated target points or subclusters. As shown in Figure 3, target 1 has low similarity with other targets and belongs to isolated nodes. The ideal clustering result is that the number of targets in each subcluster is relatively balanced. Too small or too large subclusters will weaken the clustering effect and further affect the performance of the task assignment algorithm.
Therefore, the upper and lower bounds for the number of targets in the subclusters are defined as [ b l , b u ] . For a subcluster whose number of targets is less than the lower bound, iteratively find the target j in other subclusters with the highest similarity with the subcluster, and classify the isolated targets into the cluster where the target j is located. After several iterations, the isolated targets with low similarity are classified into clusters, completing the graph merging process.
At the same time, the algorithm performs graph partitioning for clusters whose number of targets exceeds the upper bounds. Considering interception characteristics, the number of UAVs in the divided subclusters should be balanced as much as possible, and neighboring UAVs should be divided into the same subcluster. Therefore, the linear deterministic greedy (LDG) algorithm is adopted to implement graph partitioning [26]. The algorithm uses a greedy algorithm to ensure a balanced load of nodes in each subgraph. Therefore, the LDG algorithm is suitable for graph partitioning in interception scenarios.
In summary, the feature similarity clustering method with upper and lower bounds is given in Algorithm 1. The parameter λ measures the degree of similarity and is set to 0.7 in this paper.
Algorithm 1 Feature Similarity Clustering with upper and lower bounds
Input:  M d , M v , M θ , λ
Output: target clusters: T 1 , T 2
1:
M = M d M v M θ
2:
for  m i j in M do
3:
    m i j = s g n ( m i j λ )
4:
    i , j = f i n d ( m i j = 1 )
5:
    i n d = a r g m i n ( i , j )
6:
    T i n d = T i n d j
7:
end for
8:
for  T 1 , T 2 , . . . in target clusters do
9:
   if size ( T i ) b l  then
10:
      j m = a r g m a x j ( M i j ) , j
11:
     if size ( T j ) b l  then
12:
         T j m = T j m T i
13:
     end if
14:
   end if
15:
   if size  ( T i ) b u  then
16:
      LDG ( T i , c num )
17:
   end if
18:
end for

3.2. UAV Assignment Based on Interception Advantage

UAVs have limited execution capabilities, and the requirements of targets in different subclusters are also different. In order to maximize the execution capability of the UAV and meet the target requirements, an interception advantage-based assignment algorithm is proposed to assign UAV teams to these subclusters.
Assuming that targets have been clustered into N S target sets T 1 , T 2 , . . . , T N S , the clustering centers are extracted as representatives of the entire subcluster. The quantity requirements for targets in these subclusters are defined in (7).
R n = R 1 n , R 2 n , . . . , R N S n ,
Among them, R j n represents the number of UAVs required by the j t h subcluster. The number of UAVs required R j n is solved using a proportional approach, where the weights β j can be adjusted according to the priority of the target. In the interception scenario, a single UAV can intercept only one target. Therefore, the number of UAVs assigned should be greater than the number of targets. Based on this, the weights are constrained in (8). This paper simply conditions the number of targets in a subcluster to set the assignment weights.
R j n = β j · N U β j N T j i = 1 N S N T i , j = 1 , 2 , . . . , N S i = 1 N S β i = 1 .
Based on the kinematic parameters detected by the radar system, the interception advantage is calculated to guide the assignment of UAVs.
The kinematic characteristics of the UAVs and targets are shown in Figure 4.
The relative velocity advantage is defined in (9).
D v i j ( v i , v T j ) = 1 , v i > v T j v i v T j , 0.5 v T j v i < v T j 0.1 , v i < 0.5 v T j .
The relative distance between the UAV and the target will also affect the interception efficiency due to the cost of the flight. Therefore, the distance between the UAV and the target is considered as a factor in the interception advantage.
D d i j ( d r i j ) = 2 1 + e d r i j d 0 ,
where d 0 is the threshold of the relative distance. A smaller weight will be given when the distance between the UAV and the target is greater than d 0 .
In this paper, the pursuit evasion interception mode is employed, and UAVs have lower speed than targets. When the speeds of the UAV and the target are on the same side as the line of sight, it is considered as the optimal interception angle. The advantage of the heading angle is defined as follows:
D θ i j ( θ i , θ T j ) = 1 | θ i θ T j | π , | θ i | < π 2 | θ T j | < π 2 0.001 , o t h e r s .
If the heading angle advantage is slight, the interception advantage will be small despite the large speed and distance advantage. Therefore, the effect of heading angle on interception advantage is described by multiplication. Thus, the interception advantage is defined as
D i j = λ 1 D v i j ( v i , v T j ) + λ 2 D d i j ( d r i j ) · D θ i j ( θ i , θ T j ) ,
Among them, λ 1 , λ 2 are the weights and λ 1 + λ 2 = 1 .
Based on the interception advantage, the auction-based algorithm [22,27] is used to assign UAVs to the cluster. The interception advantage-based assignment of UAVs is given in Algorithm 2.
Algorithm 2 Assignment of UAVs
Input:  R n ,D
Output:  N S UAV teams: U 1 , U 2 , . . . , U N S
1:
U 1 = , . . . , U N S =
2:
while  D do
3:
    j T = a r g m a x R n
4:
    i U = a r g m a x D i j T
5:
    R j T n = R j T n 1
6:
    D i U = 0
7:
    U j T = U j T i U
8:
end while
The large-scale task assignment model can be effectively decomposed into several small-scale and non-overlapping task assignment submodels using the proposed model decomposition method. Then, the network flow model is applied to solve these small-scale task assignment problems.

4. Evaluation Model and Task Assignment Method

4.1. Evaluation Model Based on the Apollonius Circle

In order to describe the spatial location relationship between the UAVs and targets, the local coordinate system is established with zero-point as the origin. The coordinates of UAV i and target j are represented by ( x u , y u ) and ( x t , y t ) , respectively. v u and v t are the maximum speeds of UAVs and targets, respectively. The velocity rate of the UAV and the target is defined as λ = v u / v t < 1 . Assuming that both UAVs and the targets start moving at their maximum speeds, they will eventually meet at a point M = ( x m , y m ) in a finite time. The meeting point M satisfies (13).
( x u x m ) 2 + ( y u y m ) 2 ( x t x m ) 2 + ( y t y m ) 2 = v u · T v t · T = λ .
Then, (13) can be transformed into
( x m x u λ 2 x t 1 λ 2 ) 2 + ( y m y u λ 2 y t 1 λ 2 ) 2 = λ 2 ( ( x u x t ) 2 + ( y u y t ) 2 ) ( 1 λ 2 ) 2 .
It can be seen that M = ( x m , y m ) is on a circle shown in Figure 5a. The center of this circle can be expressed as (15), with the radius in (16). The circle is known as the Apollonius circle [28].
O = ( x u λ 2 x t 1 λ 2 , y u λ 2 y t 1 λ 2 ) .
r = λ ( x u x t ) 2 + ( y u y t ) 2 1 λ 2 .
In Figure 5a, l 1 and l 2 are the tangent lines of the Apollonius circle from the target T. If the flight path of the target is between the tangent lines l 1 and l 2 , the UAV can move along the corresponding direction to capture the target. The capture point is on the Apollonius circle. Therefore, we define the angle θ as the interceptable angle of the UAV, and the arc between the lines l 1 and l 2 can be defined as the interceptable area.
However, it is impractical for fixed-wing UAVs to reach the interceptable area in Figure 5b due to dynamic constraints. Therefore, the Apollonius circle suitable for fixed-wing UAVs is proposed, and the interceptable area should be redefined. As is shown in Figure 5b, two lines T M 1 and T M 2 intersect the circle at M 1 and M 2 , and the interceptable angle of the UAV can be represented by θ = [ θ 1 , θ 2 ] . Compared with Figure 5a, the orange part indicates the reduced interception area for fixed-wing UAVs. According to the sine rule, the interceptable angle for fixed-wing UAVs can be expressed as
M 1 T s i n θ 1 = M 1 U s i n θ 1 M 2 T s i n θ 2 = M 2 U s i n θ 2 .
Then, the interceptable area of the fixed-wing UAV can be defined as
θ = θ 1 + θ 2 θ 1 = a r c s i n ( λ s i n θ 1 ) θ 2 = a r c s i n ( λ s i n θ 2 ) .
Accordingly, the escapable direction of the target is defined as the maneuverable area θ T . This maneuverable area θ T can be calculated based on the angular velocity ω T and the detection range L 0 provided by the radar system.
Therefore, the ratio of the interceptable area of the UAV to the maneuverable area of the target can be defined as the the interception probability in (19). In other words, θ i j / θ T j percent of the escapable directions of the target j are occupied by UAV i.
p i j = θ i j θ T j .
If the interceptable area of the UAV can cover the maneuverable area of the target, the above interception probability is 1. Therefore, the goal of task assignment is to enable the UAV to cover the maneuverable area of the target as much as possible, i.e., to maximize the interception probability.
In addition, considering that the threat level of the target is different in the practical group-to-group interception scenario, UAVs need to be assigned according to the interception priority of the target. To enable the UAV with better interception performance to intercept the higher-threat target first, the target threat is evaluated to guide the task assignment phase. The position and maneuverability of the target are taken into account to evaluate the threat level.
(1) Target distance: The target distance is defined as the Euclidean distance between the target and the vital area.
As is shown in Figure 6, the threat level of the target increases as the target distance decreases. Based on the effective distance of our defense system, the minimum allowable and maximum defense distances are defined as the thresholds for evaluating the threat level of the target distance. Thus, the evaluation function of target distance is
W 1 ( d ) = 1 , d d m i n d m a x d d m a x d m i n , d m i n < d d m a x 0 , d > d m a x .
(2) The maneuverability of the target: The speed of the target is taken into account to evaluate the threat priority of the target. Since the kinetic energy is proportional to the square of the speed, the square of the speed is used as an evaluation factor. The logarithm form of the factor is defined as (21).
W 2 ( v T ) = l n ( 1 + v T 2 ) .
The weighted sum of the above factors is used to evaluate the threat level of the target.
W j = λ 3 W 1 ( d ) + λ 4 W 2 ( v T ) ,
Among them, λ 3 , λ 4 are the weights and λ 3 + λ 4 = 1 .
Note that the higher the threat level, the greater the need to intercept the target. The expected intercept priority also increases accordingly. Therefore, the threat level above is converted into the expected interception priority threshold.
P j 0 = 0.5 , W j 0.5 W j , W j 0.5 .
Therefore, in large-scale interception scenarios, the specific modeling methods based on the Apollonius circle and the fixed-wing UAV dynamic model are designed to increase the validity and applicability of the evaluation model and accurately assess the situation. For the q t h submodel, the evaluation model is proposed as follows:
max J q = j N T q i N U q P j 0 · x i j p i j ,
subject to
j = 1 N T q x i j 1
1 i = 1 N U q x i j N m i n
i = 1 N U q j = 1 N T q x i j = N T q
x i j = 0 , 1 , i N U q , j N T q ;
(25) shows that each UAV can intercept only one target. (26) represents that each target can be assigned to multiple UAVs. (27) indicates that all the targets should be assigned.

4.2. Task Assignment Based on Network Flow Model

Based on the above evaluation model, the task assignment phase aims to maximize the effectiveness of interception and satisfy the constraints of UAVs and targets. The task assignment problem for multi-UAV systems in group-to-group interception scenarios can be modeled as a network flow model with upper and lower flow bounds. Therefore, the task assignment minimum-cost maximum-flow algorithm (TAMM) in the previous work is adopted to solve the problem [29].
Since each UAV can only intercept one target, and each target must be executed by at least one UAV, the lower flow bounds of the network are defined. In addition, limited by the flight cost of UAVs, it is assumed that each target requires at most two UAVs to intercept, thus limiting the upper flow bounds of the network. The diagram of the network flow model is shown in Figure 7. UAVs and tasks are considered as vertices to form a two-layer network structure. To ensure the balance of the network flow, a virtual source point S S and a virtual sink point T T are introduced into the network. Among them, the tuples B , C represent the cost and the capacity of the network. In the interception scenarios, the capacity function is represented by the number of targets that the UAV can intercept. The cost function is directly related to the interception effectiveness of the UAV. The network flow models are described according to the relationship between the number of tasks and UAVs.
(1) N U 2 N T : UAVs can fully satisfy the need for interception, which allows UAVs to have a surplus. Targets are able to satisfy the conditions of interception by two UAVs. Therefore, only the flow bounds of the edges from the target vertices to the sink vertices E V T j , V t are limited to [ 1 , 2 ] .
(2) N T N U < 2 N T : All the UAVs are needed to participate in the intercept mission. Therefore, certain constraints are imposed on the capacity of the target vertices and the UAV vertices. The flow bounds of the edges from the source point to the UAV vertices E V s , V U i are limited to [ 1 , 1 ] , while the flow bounds of the edges from the target vertices E V T j , V t to the sink vertices are limited to [ 1 , 2 ] .
The assignment scheme can be given by solving the minimum-cost maximum-flow problem. The Bellman–Ford algorithm is introduced to find a feasible solution.

4.3. Design of Interception Points for UAVs

When the target detects the UAV, it may take maneuverable strategies to escape. The warring parties will evade or pursue within the detection distance L 0 . Therefore, the interception points are set on the circle with the target to be intercepted as the center and the detection range L 0 as the radius. The superposition of the interceptable area of the UAVs should cover the maneuver able area as much as possible. In addition, the overlap of the interceptable areas should be minimal to improve interception efficiency.
To facilitate the calculation, the polar coordinate system is established with the current position of the target as the origin and the current heading angle as the positive direction. Under the polar coordinate system, the interception scenario is shown in Figure 8.
Thus, the interception points in the polar coordinate system are
ρ i = L 0 θ i = j = 1 j = i θ j + θ 2 i .
Convert the above coordinate to the rectangular coordinate system as ( x i , y i ) = ( ρ i c o s θ i , ρ i s i n θ i ) . The rotation angle θ t of the coordinate system is determined as (30) according to the target heading angle θ T and the maximum maneuvering angle θ ω .
θ t = θ ω θ T .
Then, the coordinates of the UAV in the world coordinate system are
( x i , y i ) = c o s θ t s i n θ t s i n θ t c o s θ t ( x i , y i ) .
For the path planning of interception scenarios, the planned path should satisfy the dynamic constraints of the fixed-wing UAV. In addition, the time of the UAV arriving at the interception point should be reduced to improve the execution efficiency of the interception task. The multi-UAV cooperative path planning method based on Dubins curves is a relatively simple and common method that can meet real-time requirements. Therefore, this paper uses the Dubins curve as the flight path of the fixed-wing UAVs. The longest path in the UAV team is selected as the reference. Then, the corresponding radius is solved according to the longest path length. For more details on Dubins curve, please see [30]. Moreover, the existing position/attitude controller for UAV maneuvering flight can accurately track the reference path [31,32,33].

5. Results and Analysis

In this paper, model decomposition is the core of the hierarchical task assignment scheme. A centralized network flow algorithm is raised to give a solution to the task assignment. In order to prove the feasibility and superiority of the proposed hierarchical task assignment scheme (HTA-NFO), simulation experiments are conducted in various large-scale group-to-group interception scenarios.

5.1. Feasibility of the Hierarchical Task Assignment Scheme

Assuming that N T = 30 targets are randomly clustered at different locations in the 0.7 km × 0.5 km mission area, N U = 40 UAVs should perform interception missions on all targets. The randomly distributed targets and UAVs are shown in Figure 9a. The blue star shows the position of the targets, and the orange circle shows the position of the UAVs. The speed is randomly set in the range of [20 m/s, 25 m/s] for UAVs and [25 m/s, 30 m/s] for targets. The speed remains constant throughout the interception. All methods are performed on MATLAB R2017a with Inter(R) Core (TM) i7-10510U CPU @1.80 GHz.
First, the feature similarity clustering algorithm divides the target into different clusters. The upper limit of targets in the subcluster is set to 15. Comparing the clustering results in Figure 9b with the target distribution in Figure 9a, the central control station uses feature similarity clustering to divide the targets into four clusters properly. It is worth noting that Cluster 2 and Cluster 3 have a high similarity. However, they are divided into two subclusters to meet the upper limit of the number of targets in the subclusters. The number of targets in the N S = 4 subclusters is separately | T 1 | = 5 , | T 2 | = 11 , | T 3 | = 9 and | T 3 | = 5 . The targets in subclusters do not overlap. Then, N S = 4 UAV sets are formed for each target cluster. The UAV sets for four subclusters are
U 1 = U 5 , U 6 , U 11 , U 19 , U 21 , U 31 U 2 = U 1 , U 7 , U 10 , U 15 , U 17 , U 20 , U 22 , U 25 , U 28 , U 29 , U 30 , U 32 , U 33 , U 37 , U 38 , U 40 U 3 = U 4 , U 8 , U 9 , U 12 , U 13 , U 16 , U 18 , U 23 , U 27 , U 34 , U 36 , U 39 U 4 = U 2 , U 3 , U 14 , U 24 , U 26 , U 35
It can be seen that U 1 U 2 U 3 U 4 = U and U 1 U 2 U 3 U 4 = . The UAVs in the N S = 4 subclusters satisfy the no-overlap requirements. In addition, the algorithm assigns the appropriate number of UAVs according to the number of targets in the clusters. All four subclusters satisfy N U > N T . In Table 1, four submodels with different scales are established. NFO is applied to generate optimal solutions for each submodel.
Figure 10 shows the results of the task assignment. The x-axis and y-axis represent the positions of the targets and the UAVs. All the UAVs are assigned to the target with the same color. Figure 10a–d show the task assignment and planning results of clusters 1, 2, 3, and 4, respectively. It can be seen that each UAV intercepts only one target, and all the targets are intercepted by the corresponding UAV. For targets with higher speed or closer positions, two UAVs will intercept them simultaneously. Furthermore, the black dotted lines show the flight path of UAVs. The blue diamond represents the position of the targets, and the red diamond represents the interception points of the UAVs. The UAVs fly along the planned Dubins path and finally reach the interception point. The two UAVs intercepting the same target rotate and wait to achieve simultaneous assembly at the interception point. The Apollonius circle at the intercept point is also shown in the figure. The orange area represents the interceptable area of the UAV, while the blue area represents the maneuverable area of the target. Note that the interceptable area of the UAV can cover the maneuverable area of the target properly.
The Apollonius circle of targets 1 and 3 in Cluster 4 is shown in Figure 11. It can also be seen that the algorithms can calculate interception points for each UAV. The blue dotted line shows the maneuverable area of the targets, while the red dotted line shows the interceptable area of the UAVs. In the case of single-UAV interception, the UAV is in the center of the maneuverable area to deal with the target, which increases the probability of successful interception, while for the case of multi-UAV interception, the interceptable areas of the two UAVs do not overlap and cover the maneuverable area as much as possible.
To further demonstrate the feasibility of the Apollonius circle-based evaluation function, the interception situation of Cluster 4 at different time steps is shown in Figure 12. The overlap of the gray area and the Apollonius circle represents the interceptable area of the UAVs. Note that the radius of the Apollonius circle decreases as the UAV approaches the target. This is due to the reduction in the remaining interception time, making it more difficult for the UAV to maneuver to intercept the target. In addition, it can be seen that when the speed of the target is faster than that of the UAV, the radius of the Apollonius circle will be smaller, and the target will evade in a more extensive angular range. This is consistent with the actual interception situation. The demonstration can be found in the Supplementary Material.

5.2. Algorithm Runtime Analysis

Comparative experiments with the centralized network flow algorithm (NFO) and Hungarian algorithm (HA) are conducted to verify the performance of the proposed scheme. The experiment was set up with different numbers of UAVs and targets distributed within a 1 km × 1 km mission area. The number of UAVs and targets satisfies the condition N U = 2 N T . The relevant experimental parameters are the same as those in Section 5.1. In the experiment, the proposed HTA-NFO method, the centralized NFO method, and the HA algorithm are used to solve the task assignment problem. After the model is decomposed, we record the longest running time of the sub-model. Then, the average runtime of the algorithm is calculated and recorded in Table 2. Note that the proposed algorithm decomposes the entire task assignment model into N S = 2 submodels to avoid the impact of different numbers of submodels on the runtime.
The HTA-NFO model proposed in this paper is heuristic in the model decomposition stage to shorten the computation time. Therefore, the purpose of this paper is not to obtain the optimal solution but to achieve a balance between optimality and rapidity. We use the total probability of interception of the target in the objective function i , j N T , N U x i j p i j as a measure of the quality of the solution. The solution quality tests are conducted under different model scales, and the interception probability of the targets is also recorded in Table 2.
We first quantify the interception effectiveness of the UAV on the target. The goal of task assignments is to find a feasible solution to maximize interception effectiveness. The NFO and HA algorithms are used to solve the assignment matrix that can maximize the objective function. For the NFO algorithm, the task assignment problem is modeled as a minimum-cost maximum-flow problem. For the HA algorithm, the interception effectiveness is extended into a cost matrix to find the feasible solution that maximizes the interception effectiveness. For centralized NFO and HA algorithms with no grouping, the obtained feasible solution is the optimal solution; thus, the optimums of them will be presented together.
In Table 2, the runtime of different algorithms increases as the model scale increases, and it can also be seen that the NFO and HA algorithms have a larger increase in runtime than the HTA-NFO method, which is consistent with the analysis in Section 2. When the model scale becomes larger, the centralized NFO and HA algorithms find it challenging to provide a task assignment solution quickly. For example, when N U = 140 , N T = 70 , the average computation time of the NFO algorithm is 1.2147 s. In this case, the centralized NFO does not give a feasible solution in milliseconds. The hierarchical task assignment method proposed in this paper can reduce the computation time in large-scale interception scenarios. In addition, by comparing the optimums of the HTA-NFO with the global optimal solution, it can be seen that the deviation between the proposed HTA-NFO and the optimal solution is less than 10 % . Taking the 20 V S 10 interception scenario as an example, the optimal solutions obtained by the HA algorithm (the NFO algorithm has the same solution as the HA algorithm) and proposed HTA-NFO algorithm are shown in Table 3.
It can be seen from the table that for each target, the assignment schemes given by different algorithms are quite similar. According to the above task assignment scheme, the total interception efficiency is calculated according to the interception efficiency quantification method proposed in the paper. The total interception efficiency of the HTA-NFO and HA (NFO) algorithm is 12.7281 and 13.3293, respectively. The ratio is 95.49 % .
Though heuristic methods are used in the model decomposition phase, the proposed algorithm can obtain an approximate optimal solution. This is because the interception probability as an objective function is related to the heading angle. In the model decomposition stage, the modeling of heuristic formulas considers the advantage of the heading angle, resulting in the algorithm being able to obtain an approximate optimal solution. The feasible task assignment scheme will be solved under the optimality and rapidity trade-offs.
To further verify the performance of the HTA-NFO and the NFO algorithm, the runtime diagrams for the two methods are shown in Figure 13a and Figure 13b, respectively.
It can be seen that both HTA-NFO and NFO algorithms show an increase in runtime as the model scale increases. The growth rate of the algorithm runtime increases sharply as the model scale keeps growing. Comparing Figure 13a,b, the runtime growth of the HTA-NFO algorithm is smoother than that of the NFO algorithm. This is due to the decomposition of the large model, which results in a lower growth rate of the algorithm runtime, making the HTA-NFO algorithm more suitable for large-scale interception scenarios. However, for the small-scale interception scenario, the runtime of HTA-NFO is longer than that of the NFO algorithm. To further explore the reasons for this situation, we recorded the runtime of the model decomposition process for the 10 experimental groups mentioned above in Figure 14.
When the task assignment model is divided into two submodels, the runtime of the model decomposition algorithm is stable in the range of [ 0.04 , 0.07 ] seconds, which is not significantly affected by the number of UAVs and targets within the model. For small-scale scenarios, the runtime of the model decomposition (MD) and task assignment (TA) phases is shown in Table 4. For the task assignment phase, the runtime of the HTA-NFO algorithm is less than that of the centralized NFO algorithm. However, the model decomposition algorithm requires a certain amount of time, which affects the runtime of the algorithm. Therefore, the small-scale task assignment model does not need to be decomposed. It is better to use the HTA-NFO algorithm when the model scale is more than 60 V S 30 , and the HTA-NFO algorithm has better performance as the model scale increases.
Since the computation time of the model decomposition algorithm is relatively stable, the runtime of the algorithm may depend on the scale of the model in the task assignment phase. Therefore, we conduct experiments to investigate further the relationship between the number of submodels and the runtime of the HTA-NFO algorithm.
Assuming that N T = 100 targets and N U = 200 UAVs randomly gather in the mission area, the relevant experimental parameters are the same as those in Section 5.1. The upper and lower bounds [ b l , b u ] in Section 2 are adjusted to divide the target into N S = 2 , 3 , 4 , 5 , 10 , 20 , 35 , 50 , 100 subclusters, respectively. The average runtime of the HTA-NFO algorithm under different target distributions is recorded in Table 5.
As the number of submodels increases, the number of targets and UAVs in a submodel will continue to decrease. The model decomposition algorithm requires a certain amount of runtime. Although the number of targets in the cluster can continue to decrease, the runtime of HTA-NFO may not decrease again. Therefore, from the experimental results in Table 5, it can be seen that with the increase in the model scale, the descending rate of the runtime is continuously decreasing. As the model scale increases ( N S greater than 10), it can be seen that the average runtime of the algorithm starts to increase. The average runtime of the algorithm decreases first and then increases with the increase in the model scale. In other words, the average runtime of the algorithm will reach a minimum value at a specific model scale. In order to avoid the complete failure of the model decomposition, the proposed algorithm in this paper will adjust the model scale and the number of targets in a cluster according to the experimental results. Figure 15 shows the runtime of the model decomposition phase and the task assignment phase. The total runtime of the proposed algorithm is recorded with a black line. In addition, it can be found that the network flow model has a faster running speed and a lower growth rate of runtime when dealing with models of scale smaller than 60 V S 30 . Correspondingly, the runtime of the clustering algorithm increases with the number of submodels. This leads to the fact that the proposed algorithm will have a minimum at a certain scale. Therefore, the above results can provide a reference for the number of model decompositions when dealing with large-scale task assignment problems.
In addition, it can be found that the network flow model has a faster running speed and a smaller growth rate of runtime when dealing with models of scale smaller than 60 V S 30 . Therefore, the above results can provide a reference for the number of model decompositions when dealing with large-scale task assignment problems.
In conclusion, the algorithm successfully decomposes the large-scale task assignment problem into several small-scale submodels and shows superiority in large-scale interception scenarios. Moreover, the evaluation model based on the Apollonius circle can reasonably and accurately describe the interception scenarios.

6. Conclusions

This paper proposes a hierarchical task assignment scheme to solve the multi-UAV task assignment problem in large-scale group-to-group interception scenarios. First, the model decomposition method based on feature similarity clustering is proposed to decompose the large-scale task assignment model into several complete small-scale submodels. The model decomposition process reduces the required computational load and time cost in large-scale scenarios. Then, the evaluation model is defined based on the Apollonius circle and the fixed-wing UAV dynamic model. According to the quantitative relationship between UAV and task, the network flow model is used to solve the task assignment. Finally, the optimal target interception points of UAVs are determined, and the cooperative Dubins path planning is used to realize the rendezvous of multi-UAVs. Simulation results comprehensively show that the proposed hierarchical task assignment scheme can rapidly generate effective and feasible task assignment solutions in large-scale group-to-group interception scenarios.
The purpose of this paper is to explore an effective method of task assignment that enables quick decision making without severely impacting performance. For the task assignment problem in large-scale group-to-group interception scenarios, the proposed HTA-NFO can effectively reduce the dimension of the complex problem and give a feasible solution in a short time. In addition, in practice, if the interception strategies can be modeled, the assignment scheme will be adjusted appropriately. Then the complex problem can be decomposed to reduce the searching domain, and the total time of assignment can be reduced. We hope that this work provides insight for designing reasonable assignment strategies based on the model and solving optimization problems in large-scale interception scenarios.

Supplementary Materials

The video can be downloaded at https://github.com/xnwu9/HTA_NFO (accessed on 18 August 2023).

Author Contributions

Conceptualization, X.W. (Xinning Wu), H.Y. and X.W. (Xiangke Wang); methodology, X.W. (Xinning Wu), M.Z. and H.Y.; software, X.W. (Xinning Wu); validation, X.W. (Xinning Wu), Y.Z. and H.Y.; formal analysis, X.W. (Xinning Wu); investigation, X.W. (Xinning Wu); resources, X.W. (Xinning Wu); data curation, X.W. (Xinning Wu); writing—original draft preparation, X.W. (Xinning Wu); writing—review and editing, X.W. (Xiangke Wang), Y.Z. and H.Y.; visualization, X.W. (Xinning Wu) and M.Z.; supervision, X.W. (Xiangke Wang); project administration, H.Y.; funding acquisition, H.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Science and Technology Innovation Program of Hunan Province, grant number 2022RC1095 and the Natural Science Foundation of Hunan Province, grant number 2021JJ10053.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

References

  1. Laarni, J.; Väätänen, A.; Karvonen, H.; Lastusilta, T.; Saffre, F. Development of a Concept of Operations for a Counter-Swarm Scenario, Engineering Psychology and Cognitive Ergonomics. In Lecture Notes in Computer Science; Harris, D., Li, W.-C., Eds.; Springer International Publishing: Cham, Switzerland, 2022; Volume 13307, pp. 49–63. [Google Scholar]
  2. Brust, M.R.; Danoy, G.; Stolfi, D.H.; Bouvry, P. Swarm-based counter UAV defense system. Discov. Internet Things 2021, 1, 2. [Google Scholar] [CrossRef]
  3. Farlík, J.; Gacho, L. Researching UAV Threat–New Challenges. In Proceedings of the 2021 International Conference on Military Technologies (ICMT), Brno, Czech Republic, 8–11 June 2021; pp. 1–6. [Google Scholar] [CrossRef]
  4. Beard, R.W.; McLain, T.W.; Goodrich, M.A.; Anderson, E.P. Coordinated target assignment and intercept for unmanned air vehicles. IEEE Trans. Robot. Autom. 2002, 18, 911–922. [Google Scholar] [CrossRef]
  5. Korsah, G.A.; Stentz, A.; Dias, M. A comprehensive taxonomy for multi-robot task allocation. Int. J. Robot. Res. 2013, 32, 1495–1512. [Google Scholar] [CrossRef]
  6. Gao, Y.; Xiang, J. Target assignemnt in BVR air Combat. J. Beijing Univ. Aeronaut. Astronaut. 2007, 3, 286–289. [Google Scholar] [CrossRef]
  7. Sun, Z.; Yang, J. Multi-missile interception for multi-targets: Dynamic situation assessment, target allocation and cooperative interception in groups. J. Frankl. Inst. 2022, 359, 5991–6022. [Google Scholar] [CrossRef]
  8. Wang, L.; Yao, Y.; He, F.; Liu, K. A novel cooperative mid-course guidance scheme for multiple intercepting missiles. Chin. J. Aeronaut. 2017, 30, 1140–1153. [Google Scholar] [CrossRef]
  9. Guo, J.; Hu, G.; Guo, Z.; Zhou, M. Evaluation Model, Intelligent Assignment, and Cooperative Interception in Multimissile and Multitarget Engagement. IEEE Trans. Aerosp. Electron. Syst. 2022, 58, 3104–3115. [Google Scholar] [CrossRef]
  10. Yang, J.; Thomas, A.G.; Singh, S.; Baldi, S.; Wang, X. A Semi-Physical Platform for Guidance and Formations of Fixed-Wing Unmanned Aerial Vehicles. Sensors 2020, 20, 1136. [Google Scholar] [CrossRef]
  11. Wang, J.; Wang, J.; Che, H. Task Assignment for Multivehicle Systems Based on Collaborative Neurodynamic Optimization. IEEE Trans. Neural Netw. Learn. Syst. 2020, 31, 1145–1154. [Google Scholar] [CrossRef]
  12. Saravanan, S.; Ramanathan, K.C.; Ramya, M.M.; Janardhanan, M.N. Review on state-of-the-art dynamic task allocation strategies for multiple-robot systems. Ind. Robot 2020, 47, 929–942. [Google Scholar]
  13. Jia, X.; Meng, M.Q.-H. A survey and analysis of task allocation algorithms in multi-robot systems. In Proceedings of the 2013 IEEE International Conference on Robotics and Biomimetics (ROBIO), Shenzhen, China, 12–14 December 2013; pp. 2280–2285. [Google Scholar] [CrossRef]
  14. Zhang, J.; Xing, J. Cooperative task assignment of multi-UAV system. Chin. J. Aeronaut. 2020, 33, 2825–2827. [Google Scholar] [CrossRef]
  15. Tang, J.; Duan, H.; Lao, S. Swarm intelligence algorithms for multiple unmanned aerial vehicles collaboration: A comprehensive review. Artif. Intell. Rev. 2023, 56, 4295–4327. [Google Scholar] [CrossRef]
  16. Tang, J.; Chen, X.; Zhu, X.; Zhu, F. Dynamic Reallocation Model of Multiple Unmanned Aerial Vehicle Tasks in Emergent Adjustment Scenarios. IEEE Trans. Aerosp. Electron. Syst. 2022, 59, 1139–1155. [Google Scholar] [CrossRef]
  17. Wu, J.; Song, C.; Ma, J.; Wu, J.; Han, G. Reinforcement Learning and Particle Swarm Optimization Supporting Real-Time Rescue Assignments for Multiple Autonomous Underwater Vehicles. IEEE Trans. Intell. Transp. Syst. 2022, 23, 6807–6820. [Google Scholar] [CrossRef]
  18. Zhou, Z.; Feng, J.; Gu, B.; Ai, B.; Mumtaz, S.; Rodriguez, J.; Guizani, M. When Mobile Crowd Sensing Meets UAV: Energy-Efficient Task Assignment and Route Planning. IEEE Trans. Commun. 2018, 66, 5526–5538. [Google Scholar] [CrossRef]
  19. Martin, J.G.; García, R.A.; Camacho, E.F. Event-MILP-Based Task Allocation for Heterogeneous Robotic Sensor Network for Thermosolar Plants. J. Intell. Robot. Syst. 2021, 102, 1. [Google Scholar] [CrossRef]
  20. Alqahtani, S.; Riley, I.; Taylor, S.; Gamble, R.; Mailler, R. Task Allocation in Uncertain Environments using a QuadTree and Flow network. In Proceedings of the 2018 International Conference on Unmanned Aircraft Systems (ICUAS), Dallas, TX, USA, 12–15 June 2018; pp. 74–83. [Google Scholar] [CrossRef]
  21. Chen, X.; Zhang, P.; Du, G.; Li, F. A distributed method for dynamic multi-robot task allocation problems with critical time constraints. Robot. Auton. Syst. 2019, 118, 31–46. [Google Scholar] [CrossRef]
  22. Chen, J.; Xiao, K.; You, K.; Qing, X.; Ye, F.; Sun, Q. Hierarchical Task Assignment Strategy for Heterogeneous Multi-UAV System in Large-Scale Search and Rescue Scenarios. Int. J. Aerosp. Eng. 2021, 2021, 7353697. [Google Scholar] [CrossRef]
  23. Duan, X.; Liu, H.; Tang, H.; Cai, Q.; Zhang, F.; Han, X. A Novel Hybrid Auction Algorithm for Multi-UAVs Dynamic Task Assignment. IEEE Access 2020, 8, 86207–86222. [Google Scholar] [CrossRef]
  24. Wei, Y.; Wang, B.; Liu, W.; Zhang, L. Hierarchical Task Assignment of Multiple UAVs with Improved Firefly Algorithm Based on Simulated Annealing Mechanism. In Proceedings of the 2021 40th Chinese Control Conference (CCC), Shanghai, China, 26–28 July 2021; pp. 1943–1948. [Google Scholar] [CrossRef]
  25. Chai, H. Aerial Target Grouping Method Based on Feature Similarity Clustering. Comput. Sci. 2022, 49, 70–75. [Google Scholar]
  26. Stanton, I.; Kliot, G. Streaming graph partitioning for large distributed graphs. In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Beijing, China, 12–16 August 2012; pp. 1222–1230. [Google Scholar] [CrossRef]
  27. Chen, J.; Guo, Y.; Qiu, Z.; Xin, B.; Jia, Q.S.; Gui, W. Multiagent Dynamic Task Assignment Based on Forest Fire Point Model. IEEE Trans. Automat. Sci. Eng. 2022, 19, 833–849. [Google Scholar] [CrossRef]
  28. Isaacs, R. Differential Games: A Mathematical Theory with Applications to Warfare and Pursuit, Control and Optimization; Wiley: Hoboken, NJ, USA, 1965. [Google Scholar]
  29. Zhang, M.; Li, J.; Wang, X. Integrated Design of Cooperative Area Coverage and Target Tracking with Multi-UAV System. arXiv 2023, arXiv:2303.09003. [Google Scholar] [CrossRef]
  30. Chen, Q.; Xin, H.; Wang, Y.; Tang, Z.; Jia, G.; Zhu, B. A rapid path planning method for multiple UAVs to cooperative strike. J. Beijing Univ. Aeronaut. Astronaut. 2022, 48, 9. [Google Scholar]
  31. Yu, H.; Cao, S.; Wu, X.; Peng, Y.; Liu, J.; Wang, X. A Novel Brain-inspired Architecture and Flight Experiments for Autonomous Maneuvering Flight of Unmanned Aerial Vehicles. J. Intell. Robot. Syst. 2023, 108, 75. [Google Scholar] [CrossRef]
  32. Cao, S.; Wang, X.; Zhang, R.; Yu, H.; Shen, L. From Demonstration to Flight: Realization of Autonomous Aerobatic Maneuvers for Fast, Miniature Fixed-Wing UAVs. IEEE Robot. Autom. Lett. 2022, 7, 5771–5778. [Google Scholar] [CrossRef]
  33. Cao, S.; Yu, H. An Adaptive Control Framework for the Autonomous Aerobatic Maneuvers of Fixed-Wing Unmanned Aerial Vehicle. Drones 2022, 6, 316. [Google Scholar] [CrossRef]
Figure 1. Group-to-group interception scenarios.
Figure 1. Group-to-group interception scenarios.
Drones 07 00560 g001
Figure 2. The hierarchical task assignment framework.
Figure 2. The hierarchical task assignment framework.
Drones 07 00560 g002
Figure 3. Feature similarity clustering with upper and lower bounds. (A) Clustering result with an isolated points; (B) Graph merge; (C) Graph partition.
Figure 3. Feature similarity clustering with upper and lower bounds. (A) Clustering result with an isolated points; (B) Graph merge; (C) Graph partition.
Drones 07 00560 g003
Figure 4. The characteristics of the UAVs and targets.
Figure 4. The characteristics of the UAVs and targets.
Drones 07 00560 g004
Figure 5. The Apollonius circle model. (a) The Apollonius Circle; (b) The Apollonius Circle of the fixed-wing UAV.
Figure 5. The Apollonius circle model. (a) The Apollonius Circle; (b) The Apollonius Circle of the fixed-wing UAV.
Drones 07 00560 g005
Figure 6. Target distance.
Figure 6. Target distance.
Drones 07 00560 g006
Figure 7. Diagram of network flow model.
Figure 7. Diagram of network flow model.
Drones 07 00560 g007
Figure 8. Interception scenario in the polar coordinate system.
Figure 8. Interception scenario in the polar coordinate system.
Drones 07 00560 g008
Figure 9. The 40 V S 30 interception scenario. (a) The randomly distributed targets and UAVs. The blue star shows the position of the targets, and the orange circle shows the position of the UAVs; (b) The result of model decomposition phase. Submodels are represented by different colors. The stars and circles represent the same meaning as in (a).
Figure 9. The 40 V S 30 interception scenario. (a) The randomly distributed targets and UAVs. The blue star shows the position of the targets, and the orange circle shows the position of the UAVs; (b) The result of model decomposition phase. Submodels are represented by different colors. The stars and circles represent the same meaning as in (a).
Drones 07 00560 g009
Figure 10. Task assignment results. All the UAVs are assigned to the target with the same color. (a) Task assignment results of Cluster 1; (b) Task assignment results of Cluster 2; (c) Task assignment results of Cluster 3; (d) Task assignment results of Cluster 4.
Figure 10. Task assignment results. All the UAVs are assigned to the target with the same color. (a) Task assignment results of Cluster 1; (b) Task assignment results of Cluster 2; (c) Task assignment results of Cluster 3; (d) Task assignment results of Cluster 4.
Drones 07 00560 g010
Figure 11. The Apollonios circle for target 1 and target 3 in Cluster 4. The red diamods shows the position of the UAVs and the blue diamond shows the target.
Figure 11. The Apollonios circle for target 1 and target 3 in Cluster 4. The red diamods shows the position of the UAVs and the blue diamond shows the target.
Drones 07 00560 g011
Figure 12. Interception situation of Cluster 4. All the UAVs are assigned to the target with the same color. (a) Interception situation at step = 50. (b) Interception situation at step = 80. (c) Interception situation at step = 100.
Figure 12. Interception situation of Cluster 4. All the UAVs are assigned to the target with the same color. (a) Interception situation at step = 50. (b) Interception situation at step = 80. (c) Interception situation at step = 100.
Drones 07 00560 g012
Figure 13. Runtime of the algorithm. (a) Runtime of HTA-NFO; (b) Runtime of NFO.
Figure 13. Runtime of the algorithm. (a) Runtime of HTA-NFO; (b) Runtime of NFO.
Drones 07 00560 g013
Figure 14. Runtime of model descomposition and task assignment phase.
Figure 14. Runtime of model descomposition and task assignment phase.
Drones 07 00560 g014
Figure 15. The curve of runtime for HTA-NFO under different numbers of submodels.
Figure 15. The curve of runtime for HTA-NFO under different numbers of submodels.
Drones 07 00560 g015
Table 1. The number of UAVs and targets for N S = 4 submodels.
Table 1. The number of UAVs and targets for N S = 4 submodels.
ElementsCluster 1Cluster 2Cluster 3Cluster 4
Targets51195
UAVs616126
Table 2. Average runtime of three algorithms under different target distributions.
Table 2. Average runtime of three algorithms under different target distributions.
UAVs and Targets DistributionsAlgorithm Runtime(s)Solution Quality
UAVs vs. TargetsHTA-NFONFOHAHTA-NFONFO (HA)
TimeRatioTimeRatioTimeRatio
20 vs. 100.12060.07760.106316.208216.972995.49%
40 vs. 200.12130.09280.137411.72%27.006427.844296.99%
60 vs. 300.12660.13173.84%0.164422.99%48.249552.175792.48%
80 vs. 400.15090.240337.20%0.248439.25%62.919869.347490.73%
100 vs. 500.17820.362650.85%0.311542.76%80.945485.100295.12%
120 vs. 600.21510.734570.71%0.407847.25%97.4907100.024297.47%
140 vs. 700.25431.214779.06%0.550953.84%94.419996.921797.42%
160 vs. 800.30461.525180.03%0.709855.32%142.4397145.848397.66%
180 vs. 900.40082.475283.81%1.078362.83%128.9567130.414998.88%
200 vs. 1000.49463.265884.86%1.392064.47%138.4482149.405292.67%
Table 3. Assignment scheme of different algorithms in 20 V S 10 interception scenario.
Table 3. Assignment scheme of different algorithms in 20 V S 10 interception scenario.
Target ID12345678910
UAV IDHTA-NFO1, 611, 155, 177, 1610, 191, 188, 209, 134, 142, 3
NFO (HA)1, 610, 115, 197, 1512, 179, 208, 1813, 163, 142, 4
Table 4. Average runtime of model decomposition and task assignment phase in small-scale scenarios.
Table 4. Average runtime of model decomposition and task assignment phase in small-scale scenarios.
UAVs and Targets DistributionsAlgorithm Runtime (s)
UAVs vs. TargetsMD PhaseTA Phase
20 vs. 100.05440.0662
40 vs. 200.05450.0668
Table 5. Average runtime of HTA-NFO under different target distributions.
Table 5. Average runtime of HTA-NFO under different target distributions.
Models Scales N S = 2 N S = 3 N S = 4 N S = 5 N S = 10 N S = 15 N S = 20 N S = 35 N S = 50
Average runtime (s)0.48370.25610.20260.17330.21880.21940.21950.24430.2841
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wu, X.; Zhang, M.; Wang, X.; Zheng, Y.; Yu, H. Hierarchical Task Assignment for Multi-UAV System in Large-Scale Group-to-Group Interception Scenarios. Drones 2023, 7, 560. https://doi.org/10.3390/drones7090560

AMA Style

Wu X, Zhang M, Wang X, Zheng Y, Yu H. Hierarchical Task Assignment for Multi-UAV System in Large-Scale Group-to-Group Interception Scenarios. Drones. 2023; 7(9):560. https://doi.org/10.3390/drones7090560

Chicago/Turabian Style

Wu, Xinning, Mengge Zhang, Xiangke Wang, Yongbin Zheng, and Huangchao Yu. 2023. "Hierarchical Task Assignment for Multi-UAV System in Large-Scale Group-to-Group Interception Scenarios" Drones 7, no. 9: 560. https://doi.org/10.3390/drones7090560

APA Style

Wu, X., Zhang, M., Wang, X., Zheng, Y., & Yu, H. (2023). Hierarchical Task Assignment for Multi-UAV System in Large-Scale Group-to-Group Interception Scenarios. Drones, 7(9), 560. https://doi.org/10.3390/drones7090560

Article Metrics

Back to TopTop