1. Introduction
Since the beginning of this century, the development of war forms and the emergence of networked task systems have put forward new demands and challenges for resource task allocation in complex operations [
1]. For the intelligent complex task system, the characteristics of modern warfare and the application of distributed command mode are not enough to describe the status quo of coordinated tasks and the uncertain factors on the battlefield. On the one hand, the acceleration of task tempo and the improvement of weapon maneuvering performance make the battlefield change rapidly, putting high requirements on the real-time performance of the allocation algorithm.
On the other hand, the concept of Mosaic warfare proposes that the hybrid decision-making ability of man-machine integration and the autonomous decision-making and collaborative ability of intelligent equipment means that intelligent equipment can independently recognize the battlefield environment, independently determine the task plan, and independently implement the task plan under the high dynamic and strong confrontation task scenario [
2]. Intelligent equipment complex relying on the unified self-organization structure, platform, and mechanism, build the trust ability between heterogeneous multi-platforms, cluster distributed collaborative perception, distributed intelligent decision and distributed fire attack, and finally accelerate the battlefield frontier Observation Orientation Decision Action (OODA) loop operation efficiency [
3]. This has inspired the thinking of this paper, which is devoted to studying the autonomous adaptability of UAV complex online mission chains [
4].
Vidal [
5], an early scholar, proposed that two airframes realize a distributed layered hybrid system architecture, emphasizing the autonomy of the system. In 2004, M.Dias proposed a centralized global optimization scheme and proposed the problem of multi-machine collaboration under a dynamic environment [
6], mainly oriented to centralized allocation. After that, document [
7] establishes an organized formation mode tracking and uses a distributed group game controller better to meet the new organization goal of the information-sharing graph. The document [
8] considers the perception degradation of UAVs, and a radar tracking model is proposed to improve the perception technology to assist decision-making. document [
9] uses the data-driven distributed formation control method of multi-population evolutionary games to improve control performance. With the development of UAV technology, scholars have begun to study UAV dynamic task allocation and cooperative control in complex environments [
10,
11], then the intelligent optimization method is used to optimize [
12].
Most of the existing studies rely on the center of charge for centralized allocation [
13,
14]. The general research idea of the centralized allocation problem is to build a model according to the problem, and then choose a more appropriate model to solve it, to achieve a higher algorithm consistency or a shorter time to get the solution of the scheme allocation [
15,
16,
17]. The distributed problem is to design a collaborative mechanism matching the problem. When the pre-allocated scheme encounters a problem, the distribution node dynamically coordinates the task allocation scheme according to the collaborative mechanism. Dynamic changes in the environment pose a threat to preconceived mission chain schemes. Aiming at specific emergent tasks, literature [
18] proposes an emergent threat countermeasure STC mechanism to help the algorithm quickly respond to the task environment changes caused by emergent threats, and Literature [
19] designed a chain reconstruction method in which tasks are inserted into chains.
Mission chain adaptability dynamic planning is a task adaptability mechanism in the task domain. Its main objectives are to plan the updated list of task targets online for new task target chains, support chain reconstruction rules, and detect and evaluate the integrity and compatibility of attack chains. Therefore, the trigger conditions are as follows: a new task is issued by the superior, a new target threat is discovered, and a failed node exists on the original chain. Therefore, this paper gradually shifts the research focus from a small number of centralized static distributions to distributed dynamic distributions. In other words, Distributed Source-Task-Capability allocation (DSTCA) is introduced. The research focuses on resource-task-capability allocation to describe complex resource allocation. At the same time, it can meet the new operational requirements in the complex task system and greatly strengthen the adaptability and flexibility of the UAV complex under the premise of the loss of some individuals and other unexpected situations.
2. DSTCA Method Based on Contract Network Protocol
DSTCA belongs to the Distributed Resource Management (DRM) category, the core is the collaboration mechanism between C2, and the research is still in the initial stage [
20]. Contract Net Protocol (CNP) is a market mechanism based on auction theory, which has developed into a relatively mature coordination mechanism in MAS coordination technology and has a broad application prospect. Therefore, this chapter takes CNP as a collaborative mechanism for solving DSTCA problems between point domain charge nodes, and combined with the task background, proposes a mission chain-oriented CNP method, and studies and discusses six key questions in DSTCA, namely, bidding conditions, tendering strategy, bidding strategy, winning strategy, protocol mechanism and contract type (
Table 1).
2.1. Problem Description
DSTCA is the matching situation of all resources and tasks in the case of contract occurrence, denoted as
. Let set
C represent the mission chain contract network protocol, denoted as
,
A represents a certain assumed environment, and
G represents a matching relationship triggered when
A occurs.
indicates the matching set of task resource tasks, and
indicates the task set. The hypothetical environment set can be expressed as
, the operational requirement resource (system) set can be expressed as
, and the mission requirement set can be expressed as
, For the hypothetical environment, the combination of task requirements is
. If there is a definite influence relationship between
and
, When matching
, it is matched again according to
C. Define
to be a static space of DSTCA, where how to make distributed adjustment make unmanned complex system platform and task match dynamically, make
and
relation, make the following formula be established at
moment:
where
is the task change rate after normalization at
time; as decision variable matrix
for the matching between
and
situation. Suppose that
has a 0–1 distribution relationship between
and
under
determined at time
.
on the premise of
means that the resource
is allocated to the task at time
. Other cases do not constitute distributive relations
represents the influence probability of
A set at time
. In addition, the matching of tasks and resources should also meet the constraints of weapon capability, resource storage, and other matching conditions.
2.2. Formalize the Task Package Bundle
The motif is a basic unit with high frequency, uniform distribution, and a simple connection structure. The mission chain of the UAV complex includes detection, control [
21,
22], and task. Based on UAV functions and combined with the characteristics of UAV complex tasks, it is necessary to establish a function-oriented UAV complex modular model. Based on the DoDAF2.0 framework, this paper uses the idea of five functional modules of UAVs and further divides the task entities of the multi-UAVs complex into five types: cluster maneuver, reconnaissance and detection, information processing, decision making, and action taking.
Among them, the cluster maneuver mission chain contains multiple complex maneuver task entities, the reconnaissance and exploration mission chain contains multiple reconnaissance and exploration task entities, the information processing mission chain contains multiple information processing task entities, the decision-making mission chain contains multiple decision-making task entities and the action taking mission chain contains multiple action task entities.
To make use of predetermined marked data and node attribute information for chain planning and prediction, scholars have proposed several supervised algorithms [
23,
24], which combine network structure information with node and edge-level attributes and develop a learning algorithm named supervised random walk for chain prediction in social networks. The adaptive planning of the target mission chain studied in this paper is a kind of task network, which is a heterogeneous network HCN with multiple nodes and chain types [
25].
Each Bundle contains task packages with different functions, defined as , according to the mission task decomposition, the specific task package is obtained, and the UAV is assigned to the task package, which contains multiple task entities. does not have the function of assigning a single task and supports intra-pack structure reorganization, and entity bidding to create a new task, update the task pack, and add to the mission chain.
2.3. Constraint Condition
Aiming at online adaptive dynamic task planning of UAV complex chain, this paper designs some constraints as follows:
Constraint 1: If the equipment platform is replaced or added with a component that is most critical to the decision-making of the complex system, The decision time before and after replacement and addition is
and
, the contribution rate of the equipment system
w to the complex system is:
Constraint 2: The dynamic agent is set as the entity executing the task,
, and the assignment of task xx shall meet the following requirements:
where
is the minimum distance between the agent and target during task assignment.
Constraint 3: According to the order of target type, target model, target state, and target behavior, the threat degree of the target is determined according to the target behavior.
Constraint 4: The task completion cost dependent on environment state
A includes the cost of the optimal control problem completed at time
, where the optimal control input is
and the minimization function
:
Constraint 5: In the total task allocation cost of task
, for
, given a
, the total utility should follow:
Constraint 6: The calculation of the efficiency ratio shall follow:
3. Task Chain Contract Network Protocol(TC-CNP) Method
3.1. Based on the Basic Idea of CNP
From the perspective of decision-makers, the task allocation process based on CNP mainly includes four stages: Tender, Bidding, Winning, and signing, as shown in
Figure 1. Each agent can simultaneously serve two roles, namely, Tenderer and Bidder. In the CNP-based task assignment process, participants are composed of task allocators and recipients and make decisions as bidders and tenderers according to their respective tendering mechanisms and bidding mechanisms [
26]. Different problems can specify different tendering and bidding mechanisms to achieve the optimal task resource allocation scheme. As for the DSTCA problem, the adjustment of the distribution scheme needs to meet certain conditions, and the specific execution ways of the tendering mechanism and bidding mechanism will be different under different conditions.
3.2. TC-CNP Method
Contract network protocol network is more suitable for solving distributed problems [
27], based on CNP, many algorithms are proposed to solve the task allocation problem, including CBBA, MDP, and model prediction [
28,
29,
30]. The main purpose of task assignment is to maximize the efficiency of task execution through the interaction and negotiation between agents [
31,
32]. The auction mechanism is embedded in it, mainly so that each agent can compete for tasks fairly and freely when interacting [
33,
34,
35].
Under the network structure, the unmanned complex equipment platform can exercise a variety of new integrated task capabilities. The integrated task capability is an important way to improve the system efficiency and also puts forward the demand for the dynamic structure adjustment of the complex system. The main purpose of DSTCA is three aspects. First, if the UAV node currently performing the task fails, the control relationship between tasks and system resources in the system can be quickly adjusted to maintain the survivability of the complex system and improve its adaptability of the complex system. The second is to expand the effective task area of a complex task, in the effective tasks area, as early as possible to complete the task, and enhance the task capability; The third is to improve task accuracy, reduce attack behavior error, and increase the probability of killing the target. Based on the agent cooperation mechanism in the contract network protocol, a new mission chain-based contract network protocol based on the DSTCA model is proposed by considering the individual’s ability to contribute to the task system.
For , if it exists, the system will automatically trigger the default trigger conditions for the target assigned by the system, and the DSTCA model shall be executed when the following seven immediate effectiveness protocols are met for task execution.
Contract 1: If there are two alternative nodes
that are flat and there is no accusative organizational structure relationship, the node with a larger residual capacity is regarded as having a larger contribution rate, and the node with a larger residual capacity is selected for attack.
Contract 2: If difficulty RFL-3 occurs during task execution, the reduction rate of residual value is less than the conventional rate, and the reduction rate of fuel consumption is greater than the average, the help message will be released;
Contract 3: When the target task set of
changes, RWL-1 and the DSTCA allocation scheme change at the current moment, a more suitable alternative node
is selected within a certain period to form a new task combination.
Contract 4: If the new target and the original target conflict detection RWL-4, no conflict, directly added to the own target task list; If conflict detection finds a conflict, the original target will continue to be executed and the information will be released again to iterate the idle node. If there is no idle node, immediate efficacy contract 6 will be executed.
Contract 5: If there is a new target node, RWL-3, each node will evaluate its own residual capacity value, and the one with the largest residual value will have priority. COA planning will be reissued and contract 7 will be executed later.
Contract 6: If there is a new target beyond the original plan, or the node suddenly fails, re-planning and other cases of RFL-2, meet the normal speed of use of fuel consumption and capability value, and the minimum time cost is regarded as the largest contribution rate and the highest reward value.
Contract 7: If the node fails RWL-4, the current node will publicly release information and inform itself whether it has advanced authorization node
. If yes, it will send authorization change instructions to the replacement node; otherwise, it will not send; Specific content implementation performance contract 7;
3.3. Capability-Based Bids
A bidding strategy is a way for the bidder to quickly find a suitable contract partner, while the battlefield situation is complex, the environment changes dynamically at any time, and the time window is relatively small. For the DSTCA problem, the bidding scope should be reduced as far as possible. This paper proposes a Capability-based bidding strategy under the constraint of the adaptive protocol. According to the specific functions required by the task point, the task replaceable node set is narrowed down, and then the bidding specification is sent to the appropriate node.
The UAV complex task entities include complex maneuver task entity, reconnaissance and detection task entity, information processing task entity, decision-making task entity, and action-taking task entity, which have their respective functions as shown in
Table 2.
For target
, the task matrix can be expressed as:
where, the indicates that
under task
i, the matrix that meets task requirements and mission chain contract network protocol is greater than 1.
Similarly, the system matrix can be expressed as:
Satisfy that each system provides more than one capability, each task activity selects more than one system, and different capabilities satisfy linear summation.
The function matrix represents that UAV has decision-making, detection and control, observation and attack, and other functions. Let’s call it
,
The main influencing factors include orientation Angle, where, the pitch Angle, fuel value
, task damage value
, weapon remaining number
, and position information
.
The overall capability value is determined by the UAV’s position information and where,
,
,
and
information, where in
information is affected by orientation Angle, pitch Angle and height:
where, Individual capability
is a correlation function based on individual functions of UAV, including reconnaissance capability
, strike capability
, information transmission capability
, command and control capability
. The calculation method is as follows:
3.4. Tendering Strategy Based on TC-CNP
The bid value was set as the weight value of the edge, and tendering was conducted according to the bid value to realize mission chain reconstruction the Bidder was tested to see whether the range was met, and bidders were allowed to participate in tendering if the range was met. Tenderer can find target sets
for tendering bids based on current information about other nodes:
Only when the individual capability is not empty and the global capability meets the tendering threshold, the tendering value for the target can be calculated.
For
, tendering cannot be conducted because
cannot be satisfied, so tendering can be conducted according to the following formula:
The tendering strategy is given as shown below the Algorithm 1.
Algorithm 1 The tendering strategy |
Input:; Current status information Output:
if: elseif: Find and return; & Compute the The updated label value is based on formula 25 Update endif end |
3.5. Bidding Strategy Based on Maximum Spanning Tree
Bidding mainly selects appropriate Bids from bidders, relies on the function of the winning bidder, the bid value is set as the weight value of the edge, and bids according to the size of the bid value to realize mission chain reconstruction. Bidders can participate in the bidding according to their ability measurement if they meet the range. Bidders bid according to the current information status of other nodes. The key point of the winning strategy is to select the best task executor according to a certain evaluation function ([bestInEdge]). The bidding strategy is shown in Algorithm 2:
Save the best bid information and the best score value, and save the current position with the best score information.
Algorithm 2 The Bidding strategy |
Initialization: ; root, score Output: spanning-tree Initialize: F ← []; T′← []; score ← [] for: each v do: bestInEdge ←e = (u,v) score[e] for: each e do: if: is a spanning tree return else a cycle in F return T endif endfor end |
4. Improvement on CBBA Algorithm-DSTCA Results
According to the characteristics and solution process of the DSTCA problem, the TC-CNP solution framework based on contract network protocol is extended to CNP. In the process of UAV complex offensive and defensive tasks, by establishing the immediate effectiveness protocol of the mission chain and designing the auction algorithm based on the immediate effectiveness protocol, the decision-making framework can be known as . It is mainly composed of seven parts: bidding conditions, task notice, bidding description, task brief, tendering strategy, bidding strategy, and time.
The principle of action is to calculate the utility of each agent to the target, which is the bid. Based on the bid value proposed by each individual, agents communicate with each other within a certain time range to get the best bid. The most critical point is that they must know each other’s bid, which is a discrete task allocation problem. CBBA is a distributed auction protocol that provides a demonstrably good solution to the problem of multi-agent multitasking in local area networks [
36,
37]. It mainly includes the iteration between two stages: one is the package construction stage, where each agent generates an ordered task package locally, which conforms to the composition of the expected task package and can be directly indexed to the initial function chain; the other is the consensus stage, where conflicts are resolved by using consensus algorithm through the local communication between neighboring agents.
The algorithm is mainly improved based on the CBBA algorithm to detect whether there is a task status according to the update, otherwise start to announce the task, and quickly locate the task package, according to the tendering strategy, and bidding strategy to determine the content of the task book to issue the set of objects, and then determine whether to bid [
38]. First of all, it is necessary to determine the radius range of task packages, within which task packages will be reassigned, to ensure that there will not be too many or too few UAV agents involved in task reassignment.
Each Agent determined to participate in the bidding task adds a new task to the task package and then uses the mission chain contract network protocol in
Section 3.3 to calculate the highest score as the bidding value. Use the bid values of the bid as the bid set in
Section 3.4 to generate the bid strategy. Successful bidding agents complete new tasks without the need for additional consensus stages. For an Agent with a premium outbid, the task is released from the package and updated through communication. The specific algorithm flow is shown in
Figure 2.
First, initialize the working parameters, set up the bundle and target range complex, initialize the reward value, Then calculate the score of each Agent (calculate the score through the distance formula, then use the reward-punishment function), then determine whether to participate in the bid and update the bid value by running the CBBA bundle. Return the index task with the best bid by calculating the bid, checking the fitness of each Agent and task, and checking for a match. Then save the best bid task location, save the bidding information, and algorithm flow refers to Algorithm 3 pseudo-code.
The Sale Contract is a new mission released, from the new mission objective System
to provide cooperative engagement capability against the
unit, the sale contract is only useful if the buyer can afford the mission.
Replacement contract is task rescheduling, urgent task processing. The bidding unit does not meet the requirements of the value of the residual capacity, and insufficient capacity is found in the process of executing the task, which is secondary scheduling, so the replacement target needs to be found for replacement.
Exchange contracts exist in emergencies and where the reward value is high.
Algorithm 3 DSTCA-CBBA |
Input: initialize working variabls Output: score while(doneflag ==0) & check for conflicts for: end if else end for: each eiE do minDist ←argmin Dist(ei, cj) j1, 2, …k if then end end end |
5. Discussion
In this paper, the UAV complex task case background is used, and the comprehensive information of A country’s Marines to recover lost land—the island as the experimental basis. The list of UAV complex resources and the number of available UAVs is shown in Table. Dynamic task link adaptive scheme planning is shown in
Figure 3.
The command is responsible for the dynamic link adaptability planning, which belongs to the task adaptability mechanism of the task domain. Its main objectives are to update the list of task objectives online, plan for new task target links, support link reconstruction rules, and detect and evaluate the integrity and compatibility of attack links. The triggering conditions are as follows: a new task is assigned from the superior, a new target is discovered, and a faulty node exists on the existing link. The mode-switching rule base includes the target update rule, original task link reconstruction rule, new link generation rule, link integrity, compatibility detection and evaluation rule, etc. The specific steps of the implementation of the mechanism are:
- (1)
Update the task target list
- (2)
Generate alternatives online according to switching rules
- (3)
Evaluate options and their compatibility with existing mandates
- (4)
Select a new task link scheme
Based on
Section 3, we improved the CBBA algorithm, and the simulation model of multi-task assignment is established. First, 10 UAV entities are selected to perform 20 tasks. The running diagram of the simulation process is shown in
Figure 4 and
Figure 5 The task cluster was established to improve the efficiency of task allocation and execution. The parameters were set as
and
, respectively, and the tests in
Table 3 were carried out (
Figure 6 and
Figure 7). The dotted line in the Figure represents the trajectory process performed by the UAV entity, and the task target is represented by the square entity. The mission packet is represented by a dotted circle, the asterisk is represented by the drone entity, and DSTCA-CBBA determines the direction of the dotted line. Therefore, the normal operation of
Figure 4,
Figure 5 and
Figure 6 has shown the preliminary implementation of the algorithm simulation. Then the score, utility, and time need to be analyzed and compared.
At the beginning of the war, the pre-task planning scheme was generated. First, 10 agents are set to perform 10 tasks, and the performance control parameter is
. Use ode45 differential solver to solve, adjust parameter
, By changing the location information through setting, the UAV Agent must try to reach the
position at time
.
sets the specific type of task, which consists of task entities with different functions. Set, the number of iterations. The task scheduling scheme is shown in
Figure 4. Therefore, the DSTCA model is used to calculate task redistribution. As shown in
Figure 4 and
Figure 5 the parameter value of Agent-task is 10–10, and the parameter setting of 20–20, respectively. The asterisk indicates the agent, the red square indicates the target, the dotted line indicates the path, and a blue dotted line indicates the CBBA assignment method.
Then, set the second case. The number of Agents is different from the number of tasks. Not every Agent can perform tasks, and some agents are idle. Set parameter
, other parameters remain unchanged, as shown in
Figure 6. The change task marked with a red circle is to increase the demand, which requires the assistance of other agents.
The solution framework in Section Capability-Based Bids and Improvement on the CBBA algorithm in Section Bidding Strategy is used to establish the three-dimensional data graph of tasks, agents, and utility, as shown in
Figure 7.
By using the solution framework in
Section 3 and the improved CBBA algorithm in
Section 4, the three-dimensional data graph of tasks, Agents, and time cost is established, as shown in
Figure 8,
Figure 9,
Figure 10 and
Figure 11. The time cost is relatively independent of the number of tasks and Agents.When the number of tasks increases, the global utility value increases linearly with the number of tasks
Figure 12, while the increase of utility increases exponentially with the number of Agents. The larger the problem-solving space, the more task requirement
needs to be executed. Agents will choose the nearest mission area, and the higher the reward value will be.
Next, to verify the validity of the instant-efficacy protocol, it is necessary to further compare and analyze the original algorithm (without setting the instant-efficacy protocol) and the auction algorithm based on the instant-efficacy protocol. The comprehensive evaluation index is used for analysis as follows:
- (1)
Comparative analysis of task completion time
Firstly, the completion time of the task was compared and analyzed, and the number of iterations was set as
(from
Figure 13,
Figure 14,
Figure 15 and
Figure 16). For a reassigned task bid, set the reward range to
. We use the task execution time in the first column as a comparison, and the results show that the overall running time of the algorithm increases with the number of tasks of the agent, and the time consumption increases slowly. Does not occupy a very large time cost.
Using the control variable method, the number of tasks and Agents and the number of dynamically adjusted tasks remain unchanged. The improved algorithm DSTCA-CBBA algorithm is compared with the original algorithm CBBA. The experimental results show that with the increase in the number of iterations, the completion time of the DSTCA-CBBA algorithm tends to be stable and lower than that of the original algorithm CBBA. As shown in the figure below, when the parameter of the algorithm is set to 8–15, the algorithm is 1-a for 500 iterations and 1-b for 500 iterations for 10–20. Similarly, when the parameter is set to 8–15, the algorithm is 2-a for 1000 iterations and 2-b for 1000 iterations for 10–20.
- (2)
Task completion utility comparative analysis.
In the fourth part and the fifth part, two sets of different experimental parameters
and
are set respectively. To ensure the completeness of the experiment and test the algorithm index, the total utility calculation convergence of these two sets of parameters is carried out respectively. The experimental results are shown in
Figure 17 and
Figure 18. The total utility a and b show different utility result values. In the case of different parameter Settings, the Settings of task and agent are 10–20 and 8–15 respectively, and if the Settings are the same color and background cloth, it is easy to mistake that two pictures of the same graph are placed. Therefore, it is carefully observed that although they have different parameter Settings, they all converge to a single vertex. The convergence process is represented by the gradient change, so the utility value can converge to 8 as the task is executed. Then the improved algorithm is compared with the original CBBA algorithm.
Set A3, and set the number of iterations to (
Figure 19), (
Figure 20), and (
Figure 21) respectively. using the real-time efficacy protocol-based CSCTA-CBBA algorithm and the original algorithm CBBA for comparative analysis. Calculate utility analysis for F2 times.
According to the experimental results, the number of iterations is respectively
(
Figure 19),
(
Figure 20), and
(
Figure 21). With the same Settings of other parameters, the completion efficiency of the DSTCA-CBBA algorithm is higher than that of the original algorithm CBBA.
6. Conclusions
In this paper, a DSTCA model is constructed based on contract network protocol to solve the mission chain adaptability problem of the UAV complex, and the resource-task-capability allocation method is proposed for the first time. According to the application scenario, TC-CNP is proposed based on CNP, and the bid value, bidding strategy, and bidding strategy based on the capability of TC-CNP are designed. Then using the improved CBBA algorithm, the DSTCA-CBBA algorithm is designed, and a specific case is used to verify the experiment. Through the concrete simulation verification, it is found that the algorithm is more effective in the case of iteration 100 times, 500 times, and 1000 times from the two indexes of time and efficiency, and also verifies the effectiveness of the DSTCA method.
As shown in
Figure 13,
Figure 14 and
Figure 15, DSTCA is marked in blue, and CBBA original algorithm is marked in orange. When there is no task change at the beginning, the task consumption time of the DSTCA algorithm is relatively small. The time consumption of both algorithms fluctuates with the sudden change of tasks, and then gradually flattens out when the cluster starts executing tasks. When the task changes, the difference in time consumption between the two algorithms is not large. However, you can still see that DSTCA consumes slightly less time. This shows that the algorithm is effective.
In future work, we plan to simulate the adaptive work in the environment of Ubuntu to verify whether the method effectively improves the adaptive performance of the distributed mission link of UAVs, and verify the effectiveness of the DSTCA method by using the simulation means.