1. Introduction
Network-centric warfare (NCW) is becoming a mainstream modern combat style, enabling rapid sharing of information between systems and greatly increasing the speed of the “Observe-Orient-Decide-Act” (OODA) loop proposed by Boyd. From the point of view of the classic OODA loop, the combat system is mainly composed of three categories: sensor platforms, weapon platforms, and command and control (C2) platforms. Specifically, the sensor platforms play the role of “Observer”, which acquire battlefield situation information and provide guidance information for weapon platforms. The C2 platforms play the roles of “Orient” and “Decide”, which process the collected battlefield situation information to make operational decisions. Finally, the weapon platforms play the role of “Act”, which intercept the targets under the command of the C2 platforms and the guidance information provided by sensor platforms. As two major resources in the NCW, the sensor platforms and weapon platforms are organized in a distributed network and can share the information in real time among the network centers. Thus, how to combine these platforms to form effective cooperation and allocate them to targets for engagement to improve combat effectiveness becomes an important research subject.
The problem regarding the allocation of sensors and weapons has been studied since the 1950s, and related studies can be divided into two categories according to the relationship between sensors systems and weapons systems. In the first category, the sensors system and weapons system are independent, and it leads to two types of task allocation problems: the sensor-target allocation (STA) problem [
1,
2,
3,
4] and the weapon-target allocation (WTA) problem [
5,
6,
7,
8,
9,
10]. They are considered classical combinatorial optimization problems and have proven to be NP-hard [
11]. However, in actual combat, the interception of targets by weapons system requires the real-time guidance from the sensors system; thus, the tracking performance of sensors on the targets has an influence on the interception effectiveness, i.e., the sensors and weapons are not independent of each other, and it is needed to combine sensors and weapons to accomplish task allocation cooperatively, which leads to the sensor–weapon–target allocation (S-WTA) problem. Bogdanowicz [
12] was the first to study the S-WTA problem and proposed two types of S-WTA models by analyzing the characteristics of it. Li [
13] proposed an improved dependent S-WTA model introduced by the temporal and spatial constraints, which is a kind of dynamic WTA problem. Jian [
14] developed an S-WTA model in which the damage probability of a target is influenced by both the destructive capacity of weapons and the tracking capacity of sensors. Xin [
15] proposed a novel dependent S-WTA model in which the probability of successful engagement is the product of the interception probability of the weapons and the detection probability of the sensors. Xu [
16] proposed a dependent dynamic S-WTA model that has bi-objective and multi-stage considerations, and is also more practical.
For the literature mentioned above, a wide assumption is that the battlefield environment is deterministic and the parameters in the models are known certainly, which neglects the influence of asymmetric information and uncertain factors in the actual situation on task allocation. On one hand, the possible electromagnetic interference and decoys released by the opponent make it difficult to detect the target state information accurately, and the target threat value can not be estimated objectively. Expert reliability is a common method to deal with this uncertainty. On the other hand, due to the unreliability of equipment systems and the maneuverability and stealth capability of targets, the performance of weapon systems and sensor systems in an engagement may deviate from the theoretical value. Therefore, the S-WTA problem is often uncertain with vagueness or imprecision, which is caused by an inaccurate observation of parameters, deficiency in history statistical data, and subjectivity of human judgment. The uncertainty in the S-WTA problem was studied by some scholars. Krokhmal [
17] studied the uncertainty of the interception probability using the CVaR constraint. Ahner [
18] regarded the number of targets for a subsequent engagement as a random variable, and a two-stage stochastic programming model was proposed. Li [
19] proposed a robust optimization model for dealing with the uncertainty in the interception process. Most of the existing studies consider the uncertainty in S-WTA problem as random variables, and then the probability theory is used to deal with them. However, the application of probability theory is based on the law of large numbers [
20], i.e., it needs a large scale of historical sample data to support the credibility of results, which is hard to meet in an actual combat scenario due to its unrepeatability. In this case, we can invite experts to estimate the distribution function for each uncertain parameter. Some surveys have shown that human beings usually overestimate the occurrence degree of unlikely events, and the expert belief degree may have larger variance than the real frequency of events; thus, if the probability theory is still used to deal with them, the conclusion may be a paradox [
20]. To better describe the subjective imprecise quantity, Liu [
21] proposed the uncertainty theory, which is a branch of mathematics based on normality, duality, subadditivity, and product axioms, and it is an effective tool to deal with imprecision rather than randomness. To date, many scholars have studied the uncertainty theory and a complete mathematical system is established, including uncertain set [
22], uncertain process [
23], uncertain differential equation [
24], and two-stage uncertain programming [
25,
26]. Meanwhile, it has been studied in many application fields, such as uncertain inference [
22], uncertain programming [
27], uncertain statistics [
28], uncertain portfolio selection [
29], and uncertain optimal control [
30]. So far, there are few relevant studies on the S-WTA problem based on uncertainty theory.
Due to the NP-hard nature of solving the large-scale S-WTA problem, many heuristic algorithms and evolutionary algorithms (EAs) have been designed in the past related studies. In the aspect of EAs, since it can use a flexible evolutionary mechanism to search for satisfactory solutions and usually has high robustness, it has been used to deal with the large scale S-WTA problems. Jian [
14] proposed a modified genetic algorithm (GA) to solve a dependent S-WTA model where the kill probability of weapons was affected by the detection performance of sensors. Chen [
31] improved the particle swarm optimization (PSO) algorithm with genetic operators and used it to solve an S-WTA model where a target can assign multiple weapons. However, one disadvantage of EAs is that their running time is relatively large. In the aspect of heuristic algorithms, since they can use the domain knowledge of the problem to obtain the solution with high quality, they have been used to solve the S-WTA problem and generally perform well in real-time performance. Bogdanowicz [
12] designed a heuristic algorithm named Swt-opt based on the auction algorithm, and it was proved that the algorithm can obtain a complete optimal solution in finite steps, but it can only be applied in scenarios where a target can only be assigned a single sensor and a single weapon. Li [
32] combined Swt-opt with the consensus algorithm to enhance the adaptability of Swt-opt to network topologies, but its application scenario is still limited. Xin [
15] proposed a marginal-return-based constructive heuristic (MRBCH) to solve a dependent S-WTA model, so as to construct the solution with high quality rapidly and accurately. Xu [
16] applied similar heuristic rules in solving a multi-stage S-WTA model, so as to produce a high quality initial population. However, the process of heuristic algorithms is generally fixed, which may traps the solutions into local optimality. In conclusion, the performance of heuristic algorithms and evolutionary algorithms is very sensitive to the parameters involved in it, and they have their own advantages and disadvantages, so how to designed an efficient algorithm combined their advantages to solve scenario-based S-WTA problem with uncertainty is a research key.
The aim of this paper is to solve the S-WTA problem in an indeterminate battlefield environment based on uncertainty theory. First, by analyzing the uncertain factors in the air defense battlefield environment, we treat the threat value of targets, the deviation of the interception performance of weapons and the deviation of the tracking performance of sensors as uncertain variables, then an uncertain S-WTA model (USWTA) is formulated. To make the proposed model solvable, a deterministic model named E-USWTA is derived based on expected value principle. For efficiently solving the proposed model with its NP-hard nature, a virtual representation (VP) and corresponding construction procedure (CP) of a feasible solution for the USWTA problem is introduced firstly, and then on this basis, a heuristic algorithm based on maximum marginal return (MMRCH) is designed to construct a solution with high quality, which utilizes the domain knowledge of the problem to add the allocation pairs to an allocation scheme. Additionally, a local search (LS) operation is employed to avoid missing the better solution in the neighborhood. Finally, a set of instances of the USWTA problem is generated and solved by the designed algorithm, and the allocation schemes with high quality can be obtained. The simulation results verify the effectiveness of the designed algorithm and the feasibility of the proposed model.
The rest of this paper is structured as follows. In
Section 2, some basic definitions and theorems of uncertainty theory that are used subsequently are reviewed. In
Section 3, the combat scenario is given and the USWTA model is established. In
Section 4, the solution method of the USWTA model is derived. In
Section 5, the heuristic algorithm based on maximum marginal return with local search is designed for solving the USWTA problems.
Section 6 presents a set of instances of the USWTA problem to be solved by the designed algorithm, and the simulation results are analyzed. Finally, the main results of this paper are concluded in
Section 7.
4. Solution Method of the USWTA Model
Since the objective function
J in model (
9) contains uncertain variables
,
, and
, which cannot be compared since there is no natural ordered relation in uncertain space, so the model (
9) is an unsolvable one and can not be optimized directly. For the case, a equivalent transformation form should be proposed to remove the uncertain ambiguity.
In model (
9), for any given decision variable
, the function
is a real-value measurable functions of
,
,
, then according to Theorem 2,
J is also an uncertain variable, and the uncertainty distribution of
J exists, denoted by
.
Different real-life problems have different application requirements, so they call for different meanings of valuation, which results in different compromise decisions [
34]. In general, the decision makers want to minimize the average cost of objective function; thus, it is rational to take the expected value of objective function as the evaluation criterion, and then a deterministic model named
E-USWTA can be established, which can be represented as follows:
Furthermore, we can assume that the uncertain variables in model (
9) are all independent of each other since there is no coupling between them, then the calculation formulas of
E-USWTA can be derived. Firstly, for any given decision variable
, we can obtain the property that
J is strictly decreasing with respect to
and
(
), and is strictly increasing with respect to
(
). Then, according to Theorem 4, the inverse uncertainty distribution of
J can be calculated as follows:
Hence, the expected value of objective function
J can be calculated through Theorem 3:
To sum up, the original USWTA model (
9) is converted to a determinate optimal model (
10) called
E-USWTA and the calculation Formulas (
11) and (
12) are derived. If the uncertainty distribution of each uncertain variable is known and a decision variable satisfying
and
is given, then the expected value of
J, denoted by
, can be calculated.
Remark 1. In model (9), the values of uncertain variables and are distributed in for any , and the uncertain variable is positive for any , thus for any given , the values of and are in . If and , the values of and are both equal to 1. Notice that when or changes from 0 to 1, the value of or will decrease and be in , and then according to Equations (11) and (12), it can be known that the value of will increase. From Remark 1, we can obtain the property that if one more sensor or one more weapon is allocated to a target, the objective value will increase, which will be used in subsequent algorithm design.
The proposed model (
10) is a modified model of WTA problem, which has been proved to be NP-hard [
11], so the model (
10) is also NP-hard.
5. Heuristic Algorithm for Solving the USTWA Problem
In
Section 4, the original USWTA model has been transformed into a deterministic model named
E-USWTA by using the expected value principle, which is formulated as a constrained binary programming problem with NP-hard nature. Notice that solving efficiency is very important in the actual battlefield situation, thus the EAs and meta-heuristics are generally used to search for optimal solution and obtain allocation scheme with high quality. There are mainly two aspects of challenge in solving this problem: One is how to generate a feasible solution in the iteration of the algorithm to satisfy all the constraints in Equations (5)–(8) efficiently, and the second is how to design the search mechanism to find the global optimal solution according to the potential knowledge contained in the problem. To address these challenges, a general “virtual” representation (VP) of solutions is introduced first, which can facilitate the rapid generation of feasible solutions, and on this basis, a heuristic algorithm based on maximum marginal return (MMR) and local search (LS) operation is designed to obtain the solution of
E-USWTA problem with high quality.
5.1. Virtual Represent Ion for the Solution of USWTA Problem
The decision variable, denoted by
, is a matrix with high dimension, and it is hard to generate a feasible solution efficiently satisfying all the constraints. In fact, given a practical USWTA problem, the allocation schemes of sensors and weapons to targets can be viewed as a process of gradually adding the combination of sensor–weapon–target pairs denoted by
i-
j-
k to the allocation scheme one by one, so a general “virtual” representation (VP) of solutions based on permutation can be proposed to facilitate the generation of feasible solutions for USWTA problem. Broadly speaking, the permutation-based representation is often utilized in solving the quadratic allocation problem (QAP) [
35].
First, the available allocation pair (AAP) is defined as follows:
Definition 9. An available allocation pair denoted by i-j-k is called an AAP which indicates that sensor i and weapon j is allocated to target k.
Then, the virtual representation, denoted by , is defined as follows:
Definition 10. A permutation of some or all AAPs is termed as a VP for the USWTA problem.
For example, given an USWTA problem with two sensors, two weapons, and two targets, all the AAPs consist of the following eight pairs (AAP1-AAP8): (1) 1-1-1; (2) 1-1-2; (3) 1-2-1; (4) 1-2-2; (5) 2-1-1; (6) 2-1-2; (7) 2-2-1; (8) 2-2-2, and any permutation of the AAPs, such as “(2)-(1)-(5)-(3)-(7)-(8)-(4)-(6)”, is a .
Obviously, a can be regarded as an indirect representation of the feasible solution for the USWTA problem: Given a , the AAPs will be added to the allocation scheme one by one following the permutation of . It should be noted that the addition of some AAPs in may cause violation to the constraints, thus they are unallowed, which are called unallocated AAPs (UAAP). If the addition of an AAP will not violate the constraints, it will be added to the allocation scheme and called an allocated AAP (AAAP). After all the AAPs in a have been processed, a corresponding feasible allocation scheme of the USWTA problem will be generated.
In order to determine which AAPs are AAAPs and which AAPs are UAAP in a , the following auxiliary variables are first defined to record the current allocation state in the process of adding AAPs:
: denotes the number of targets that sensor i is allocated to currently.
: denotes the number of targets that weapon j is allocated to currently.
: denotes the number of sensors that are allocated to target k currently.
: denotes the number of weapons that are allocated to target k currently.
With the variables defined above, the rules for handling the constraints in Equations (5)–(8) are presented as follows:
If , sensor i will not be allocated to any other targets.
If , weapon j will not be allocated to any other targets.
If , no more sensor will be allocated to target k.
If , no more weapon will be allocated to target k.
The specific process of generating feasible solution is called construction procedure (CP), which can convert a
to a complete allocation scheme (feasible solution) of the USWTA problem. The pseudocode of CP is shown in Algorithm 1.
Algorithm 1: Construction Procedure |
|
At the beginning of CP, a is given, and no AAPs are added to the allocation scheme, i.e., no sensors or weapons are allocated, so above four auxiliary variables are initialized to zeros. Before an AAP in the is added to the allocation scheme in order, the auxiliary variables are used to check whether its addition will violate any constraint. If it does, skip it and note it as an UAAP; otherwise, it is an AAAP and will be added to the allocation scheme by updating the decision variables and the auxiliary variables , , , .
To sum up, a
can generate a feasible allocation scheme (
) of the USWTA problem by processing the CP to it. Conversely, it is easy to prove that any feasible allocation scheme of the USWTA problem can be generated by processing the CP to a
(existing but not unique). Meanwhile, it should be pointed out that increasing the use of any available sensor or weapon without violating constraints will further improve or maintain the objective value, which has been analyzed in Remark 1. In other words, if a feasible allocation scheme is generated by a
that does not contain all AAPs, we can arrange the remaining AAPs behind the
, and then a new
containing all AAPs is generated, which can lead to a better allocation scheme with higher objective value. Therefore, the best feasible allocation scheme of the USWTA problem in (
10) must be generated by a
containing all AAPs.
Finally, the following Remark 2 is given to supplement the rationality of the VP and CP proposed in this paper.
Remark 2. For a given feasible allocation scheme , if there is target k that is assigned some sensors but no weapon or is assigned some weapons but no sensor, i.e., or , we can obtain thatwhich means that the destruction to target k has no contribution to the objective, and the weapons or sensors assigned to target k are not valid. Therefore, it is only effective when a sensor and a weapon are assigned to the target as a combination, which illustrates the conclusion that any feasible allocation scheme of the USWTA problem can be generated by processing the CP to a . 5.2. Constructive Heuristic Algorithm Based on Maximum Marginal Return
One of the reasons for the popular use of heuristic algorithms is that it can reduce the complexity of problem solving by using the domain knowledge contained in the problem [
36]. The “marginal return” is an important terminology in the field of economics, which refers to the additional yield resulting from the increase of a unit in the inputs when other inputs are held constant. denBroeder [
37] utilized the maximum marginal return algorithm (MMR) to solve a static WTA problem for the first time. Recently, Xin [
15] also utilized a similar concept to design a heuristic algorithm to solve a determined S-WTA model. Similarity, this concept can also be used in solving the USWTA problem.
Through the analysis in
Section 5.1, adding an AAP, denoted by
i-
j-
k, to an allocation scheme means allocating sensor
i and weapon
j to target
k, will contribute to the objective. Hence, we can regard the contribution of each AAP to the objective as the marginal return, and then a heuristic algorithm for constructing high quality feasible solutions based on maximum marginal return rule (MMRCH) is proposed.
In the beginning, we initialize
AAPs totally and we denote the set of them as
∂; then, we employ a matrix
to record the marginal return of each AAP in
∂, where
represents the marginal return if the AAP
i-
j-
k is added to the allocation scheme currently. It can be known from Equations (
11) and (
12) that the margin return is calculated as follows:
where
and
are defined to record the following distribute functions under the current allocation scheme:
In Equations (
13)–(
17),
represents the distribution function of the destroyed value of target
k under the current allocation scheme, and
represents the distribution function of destroyed value of target
k after adding
i-
j-
k to the current allocation scheme. In Equation (14), if sensor
i is already allocated to target
k currently, i.e.,
,
will not change after adding
i-
j-
k to allocation scheme. Analogously, if weapon
j is already allocated to target
k currently, i.e.,
,
will not change after adding
i-
j-
k to allocation scheme. Moreover, adding
i-
j-
k to the allocation scheme only change the distribution function of destroyed value of target
k, thus
can represent the marginal return of the AAP
i-
j-
k.
Then, the main rule of the MMRCH algorithm is given:
The more marginal return an AAP contributes to the objective, the higher priority it should be given in the process of allocation. This rule states that an AAP with highest marginal return should be added to the current allocation scheme preferentially, which is expressed as follows:
Once an AAP is added to the allocation scheme, the related variables
,
,
,
,
,
,
, and
will be updated, and
∂ will be updated by deleting the UAAPs in it. Above process will be repeated for the remaining AAPs until
∂ is empty (all AAPs have been allocated or deleted), and finally a feasible allocation scheme is output. The pseudocode of MMRCH is shown in Algorithm 2.
Algorithm 2: MMRCH |
|
5.3. Local Search Operation
Through the MMRCH algorithm, a feasible solution with high objective value can be constructed. However, due to the rule of the algorithm being fixed, the output allocation scheme is deterministic. Although the quality of the solution is high, its optimality cannot be guaranteed theoretically. In order to further improve the quality of the solution, a local search mechanism is employed to the algorithm framework, which can explore for the better solution locally with low computational cost.
Firstly, through the introduction of MMRCH in
Section 5.2, it is easy to prove that the
obtained by MMRCH satisfies the following two properties:
Property 1. AAAPs contained in the have no conflict against each other, which means that only changing the order of AAAPs in the will not generate a new allocation scheme.
Property 2. For a set of consecutive UAAPs following behind an AAAP, only changing the order of these UAAPs will not generate a new allocation scheme.
Through these two properties, we can know that exchanging the position of UAAPs that conflict against different AAAPs can generate new solutions; thus, an easy way to generate new solutions can be proposed. The specific operations called local search (LS) operation are as follows:
LS operation: Select m UAAPs from the , and for each UAAP, swap it with the nearest AAAP in front of it.
Note that
is the set of all UAAPs in the
. The parameter
m is given by human. The set of new
that can be generated by LS operation is called the neighborhood of original
. Obviously, the larger the value of
m, the more individuals in the neighborhood of original
. In order to save calculation costs, we set
and then the corresponding neighborhood is relatively small. The illustration and pseudocode of LS operation are shown in
Figure 2 and Algorithm 3.
Algorithm 3: Local search () |
|
5.4. The Framework of MMRCH-LS
The maximum marginal return constructed heuristic algorithm with local search (MMRCH-LS) is shown in
Figure 3, which combines the strengths of both MMRCH and LS operations.
Firstly, the related parameters are initialized, and then the MMRCH is used to construct a solution with high objective value. To further improve the quality of the solution obtained, LS is used to find the best solution in the neighborhood of .
6. Performance Test
To prove the effectiveness of the designed MMRCH-LS algorithm in solving the USWTA problem, we set up a series of test instances and conducted simulation experiments, and then analyzed the simulation results.
6.1. Test-Instance Generator
Firstly, we develop a generator to generate initial parameters for the USWTA problem including , , , , , , ().
- (1)
Generation of
The uncertain distribution of
,
, and
follow that
,
, and
, respectively. The detailed information is given in
Table 2.
- (2)
Generation of and
The values of
and
are set as follows:
where
and
are the lower bound and upper bound of tracking probability of sensors, respectively.
and
are the lower bound and upper bound of the interception probability of weapons, respectively. They are all predefined constants within
and
. Here, we set
,
,
, and
.
- (3)
Generation of ,
There are two cases to discuss here.
Case 1: Each target is allocated one sensor and one weapon at most, i.e., .
Case 2: The maximum number of sensors or weapons that can be allocated to a target are set to 1, 2, or 3 according the uncertain distribution of threat value of the target, i.e.,
Note that Case 1 present the simplified USWTA problem and Case 2 present the original one.
6.2. Algorithms for Comparison
To prove the effectiveness of the designed MMRCH-LS, we adopt a random sampling (RS) algorithm as the main comparison algorithm.
The framework of RS is similar to that of MMRCH but the rule is abandoned. In each iteration of RS, we randomly generate a and use CP to generate the corresponding allocation scheme. Apparently, RS is a random statistical method without the use of domain information accumulated during its sampling process. A series of feasible solutions are generated by repeating the above process within the running times permitted and select the best solution as the final output. Here, we set running times to 1000.
Meanwhile, in order to test the effect of LS in improving the quality of the solution, the MMRCH algorithm without LS is also adopted as a comparison algorithm.
6.3. Experiment Setup
In the simulation experiment, we preset 20 instances of USWTA problem, including 5 instances from
Case1 and 15 instances from
Case2. Give the basic parameters
and other parameters are generated by the test-instance generator proposed in
Section 6.1. The basic parameters of the 20 instances are shown in
Table 3.
Since RS is an algorithm with stochastic nature, it ran 20 times for each instance. The MMRCH-LS and MMRCH also ran 20 times in order to collect the data of runtime. A maximum acceptable time is set to 60 s. If the running time reaches or exceeds it, the output is deemed as invalid. The experiment was carried out in a MATLAB_R2018b environment on a PC with Intel Core i5 CPU 2.30 GHz and 12 GB internal memory.
6.4. Results and Analysis
The experimental results are shown in
Figure 4 and
Table 4.
Figure 4 shows the comparison of normalized objective function values obtained by the three algorithms for each instance. Notice that the objective function values are normalized from 0 to 1 by following formula:
where
are the minimum value, maximum value, original value, and normalized value obtained by the three algorithms, respectively.
Table 4 shows the running time of three algorithms.
In
Figure 4, the simulation results of instances including No.5, No.17 No.18, No.19, and No.20 are not displayed since the running time of the three algorithms in solving these instances exceeds the maximum acceptable time (60 s). From the comparison results of the normalized objective values in
Figure 4, we can know that the MMRCH-LS and MMRCH can obtain the allocation schemes with high quality. Furthermore, with the scale of units (sensors, weapons, and targets) in the instance increasing, the quality of the allocation scheme obtained by MMRCH-LS and MMRCH algorithms is more and more superior to that obtained of the RS algorithm, which validates that the maximum marginal return rule in MMRCH can use the domain knowledge of problem to construct allocation scheme with high objective value effectively. Specifically, it can be seen from the comparison results of instances No.6 and No.7 that, after MMRCH constructs a high-quality allocation scheme, the LS operation can further improve the quality of it in the neighborhood. However, when solving the instances with large scale units, the LS operation has failed and can not found a better solution.
From the comparison result of running time of the three algorithms in
Table 4, we can see that the real-time performance of MMRCH is unstable: When solving the instances with small scale units (No.1–No.3, No.6–No.11), the running time of MMRCH is less than that of RS. However, with the scale of units in the instance increasing, the running time of MMRCH and RS gradually increases, and the running time of MMRCH exceeds that of RS eventually (No.4, No.12–No.16). Additionally, it should be noted that the difference in running time between MMRCH-LS and MMRCH is caused by the presence or absence of LS operation, thus we can know that with the scale of units in the instance increasing, the running time of LS operation will also gradually increase, i.e., the real-time performance of LS operation decreases.
To calculate the computational time complexity of MMRCH and RS, we can start by calculating the time complexity of each lookup operation embedded in the iteration of algorithms. As for MMRCH, the complexity of a desirable lookup operation is
, where
l is the size of the AAPs for lookup and initialized to
. The size of
l will decrease while a lookup operation ends: When the first AAP is added in the first loop, there are
AAPs that are going to be deleted from
∂. For following
times of the loop, the minimum number of AAPs to be deleted is
in each loop. Then, for the remaining AAPs, we can delete at least one AAP in each loop; thus, in the worst condition,
l at
th loop can be calculated as follows:
As for RS, in each loop it only calculates the marginal return of one AAP, thus the desirable lookup operation of RS has the complexity of
. Notice that the initialized
of MMRCH will increase rapidly with the scale of units in the USWTA problem increasing, and the integral calculation in Equation (15) (Line 17 in Algorithm 2) in each iteration will consume a lot of computing time, so the time consumption of MMRCH is higher than that of RS in solving the USWTA problem with large scale units.
Additionally, the allocation schemes and corresponding objective values of instances including No.1-No.3,No.6-No.10 obtained by MMRCH-LS are shown in
Table 5 (The allocation schemes of other instances are too large to be displayed). From Remark 2 we can know that when a target is not assigned any sensors or weapons, assigning the weapons or sensors to it does not contribute to the objective value, but only wastes resources. Therefore, if a target is assigned a sensor or a weapon, then there must be a weapon or a sensor assigned to it as well. The results in
Table 5 are consistent with it. To conclude, when solving the USWTA problem with small scale units, the MMRCH-LS designed in this paper can obtain the allocation scheme with high quality, and the real-time performance of it can also meet actual requirements. However, when solving the USWTA problem with large scale units, although the MMRCH-LS can also obtain the allocation scheme with high quality, its real-time performance is poor, and the LS mechanism is redundant.
7. Conclusions
The STA and WTA problems have been extensively investigated in previous studies, while its uncertainties are generally ignored. In this paper, an S-WTA problem was studied based on uncertainty theory, and an USWTA model was established. Based on the actual requirement in battlefield, a solution method based on the expected value principle was provided to convert the proposed unsolvable model to a deterministic one, which was a constrained binary programming problem with an NP-hard nature. To solve the model efficiently, a permutation-based representation and a corresponding construction procedure were introduced firstly to facilitate the generation of a feasible solution for the USWTA problem. On this basis, a constructive heuristic algorithm based on maximum marginal return rule (MMRCH) was designed, which could use the domain knowledge of the problem to construct a feasible allocation scheme with high objective value. Additionally, the LS operation was employed to further improve the quality of obtained solution. Finally, a set of instances was presented to be solved by designed algorithm named MMRCH-LS, and the performance of algorithm is analyzed. The result showed that the designed algorithm can obtain the allocation scheme with high quality for each instance and outperform other comparison algorithms, and the real-time performance of it can meet the actual requirements when the scale of units was not very large.
The work in this paper provided a mathematical analysis method and model support for solving the S-WTA problem in the indeterminate battlefield environment full of uncertainties and subjective reliability, and an efficient heuristic algorithm utilizing the domain knowledge of problem was designed to solve the proposed model. The results showed that the designed algorithm can obtain high-quality solutions when solving the USWTA problems with any scale units, and its real-time performance also meets the actual requirements when the scale of units is not very large. Meanwhile, the allocation schemes obtained also verified the feasibility of the proposed model.
Although MMRCH-LS could effectively solve the USWTA problem in most of the instances and obtained solution with high quality, but its real-time performance was not good when solving the instances with large units. This was mainly because the integral operation in iteration occupies a lot of computation time, and the shortcoming became obvious when the amount of AAPs was large. Furthermore, in only 2 of the 20 instances was the output improved by the LS operation, and thus the validity of this mechanism cannot be fully demonstrated. Therefore, in our future work, we will focus on the design of better heuristic rules and local search operators. We hypothesize that the performance of the algorithm can be enhanced in solving USWTA problem with large units if we designed it appropriately.
Additionally, this paper assumed that the damage degree of the target is the product of the degree of weapon interception and the degree of sensor detection, which neglected some complicated factors of the sensor–weapon system configuration in actual application environment. Therefore, in our future work, we will also focus on establishing a more reasonable model which can further reflect the actual situation of the S-WTA problem.