Next Article in Journal
Active Mitigation Strategy of Structure-Borne Vibration with Complex Frequency Spectra from Asymmetric Plate-like Mounting Systems in Next Generation Mobilities
Next Article in Special Issue
An Optimal Location-Allocation Model for Equipment Supporting System Based on Uncertainty Theory
Previous Article in Journal
Calculating Crossing Numbers of Graphs Using Their Redrawings
Previous Article in Special Issue
One’s Fixing Method for a Distinct Symmetric Fuzzy Assignment Model
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Uncertain Sensor–Weapon–Target Allocation Problem Based on Uncertainty Theory

1
Air Defense and Anti-Missile School, Air Force Engineering University, No. 1, Changle East Road, Baqiao District, Xi’an 710043, China
2
Fundamentals Department, Air Force Engineering University, Xi’an 710043, China
3
Equipment Management and Unmanned Aerial Vehicle Engineering School, Air Force Engineering University, Xi’an 710043, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Symmetry 2023, 15(1), 176; https://doi.org/10.3390/sym15010176
Submission received: 5 December 2022 / Revised: 25 December 2022 / Accepted: 31 December 2022 / Published: 7 January 2023
(This article belongs to the Special Issue Fuzzy Set Theory and Uncertainty Theory)

Abstract

:
The sensor–weapon–target allocation (S-WTA) is a typical collaborative task allocation problem involved in network-centric warfare (NCW). The existing related studies have a limitation to the nature of cooperation and uncertainty in an air defense battle scenario, and most existing models have the assumption that they are determinate, i.e., the parameters in them are known certainly. For the actual battlefield environment, the asymmetric information in it could lead to the failure of the above assumption, and there are many uncertainties whose frequency can not be evaluated objectively. Based on uncertainty theory, this paper studied the S-WTA problem in an indeterminate battlefield environment. First, we analyze the uncertain factors existing in the actual battlefield environment and their influence on the S-WTA problem, and by considering the threat value of the target, the deviation parameters of the sensor tracking performance and weapon interception performance as uncertain variables, we then establish an uncertain S-WTA (USWTA) model, where the destruction value to targets is regarded as an objective function and four categories of typical constraints are set. Further, an equivalent transformation is presented to convert the unsolvable model into a determinate one by the expected value principle. To solve the proposed model efficiently, a permutation-based representation for the allocation scheme of the USWTA problem is introduced firstly, which can construct a feasible solution efficiently, and on this basis, a constructive heuristic algorithm based on maximum marginal return rule (MMRCH) is designed to construct a feasible solution with high quality. Additionally, a local search (LS) operation is proposed to explore for the better solution locally and further improve the quality of solution obtained by MMRCH. Finally, a set of instances are set to be solved by the designed algorithm, and the simulation experiment demonstrates the superiority of the designed algorithm and the feasibility of the proposed model.

1. Introduction

Network-centric warfare (NCW) is becoming a mainstream modern combat style, enabling rapid sharing of information between systems and greatly increasing the speed of the “Observe-Orient-Decide-Act” (OODA) loop proposed by Boyd. From the point of view of the classic OODA loop, the combat system is mainly composed of three categories: sensor platforms, weapon platforms, and command and control (C2) platforms. Specifically, the sensor platforms play the role of “Observer”, which acquire battlefield situation information and provide guidance information for weapon platforms. The C2 platforms play the roles of “Orient” and “Decide”, which process the collected battlefield situation information to make operational decisions. Finally, the weapon platforms play the role of “Act”, which intercept the targets under the command of the C2 platforms and the guidance information provided by sensor platforms. As two major resources in the NCW, the sensor platforms and weapon platforms are organized in a distributed network and can share the information in real time among the network centers. Thus, how to combine these platforms to form effective cooperation and allocate them to targets for engagement to improve combat effectiveness becomes an important research subject.
The problem regarding the allocation of sensors and weapons has been studied since the 1950s, and related studies can be divided into two categories according to the relationship between sensors systems and weapons systems. In the first category, the sensors system and weapons system are independent, and it leads to two types of task allocation problems: the sensor-target allocation (STA) problem [1,2,3,4] and the weapon-target allocation (WTA) problem [5,6,7,8,9,10]. They are considered classical combinatorial optimization problems and have proven to be NP-hard [11]. However, in actual combat, the interception of targets by weapons system requires the real-time guidance from the sensors system; thus, the tracking performance of sensors on the targets has an influence on the interception effectiveness, i.e., the sensors and weapons are not independent of each other, and it is needed to combine sensors and weapons to accomplish task allocation cooperatively, which leads to the sensor–weapon–target allocation (S-WTA) problem. Bogdanowicz [12] was the first to study the S-WTA problem and proposed two types of S-WTA models by analyzing the characteristics of it. Li [13] proposed an improved dependent S-WTA model introduced by the temporal and spatial constraints, which is a kind of dynamic WTA problem. Jian [14] developed an S-WTA model in which the damage probability of a target is influenced by both the destructive capacity of weapons and the tracking capacity of sensors. Xin [15] proposed a novel dependent S-WTA model in which the probability of successful engagement is the product of the interception probability of the weapons and the detection probability of the sensors. Xu [16] proposed a dependent dynamic S-WTA model that has bi-objective and multi-stage considerations, and is also more practical.
For the literature mentioned above, a wide assumption is that the battlefield environment is deterministic and the parameters in the models are known certainly, which neglects the influence of asymmetric information and uncertain factors in the actual situation on task allocation. On one hand, the possible electromagnetic interference and decoys released by the opponent make it difficult to detect the target state information accurately, and the target threat value can not be estimated objectively. Expert reliability is a common method to deal with this uncertainty. On the other hand, due to the unreliability of equipment systems and the maneuverability and stealth capability of targets, the performance of weapon systems and sensor systems in an engagement may deviate from the theoretical value. Therefore, the S-WTA problem is often uncertain with vagueness or imprecision, which is caused by an inaccurate observation of parameters, deficiency in history statistical data, and subjectivity of human judgment. The uncertainty in the S-WTA problem was studied by some scholars. Krokhmal [17] studied the uncertainty of the interception probability using the CVaR constraint. Ahner [18] regarded the number of targets for a subsequent engagement as a random variable, and a two-stage stochastic programming model was proposed. Li [19] proposed a robust optimization model for dealing with the uncertainty in the interception process. Most of the existing studies consider the uncertainty in S-WTA problem as random variables, and then the probability theory is used to deal with them. However, the application of probability theory is based on the law of large numbers [20], i.e., it needs a large scale of historical sample data to support the credibility of results, which is hard to meet in an actual combat scenario due to its unrepeatability. In this case, we can invite experts to estimate the distribution function for each uncertain parameter. Some surveys have shown that human beings usually overestimate the occurrence degree of unlikely events, and the expert belief degree may have larger variance than the real frequency of events; thus, if the probability theory is still used to deal with them, the conclusion may be a paradox [20]. To better describe the subjective imprecise quantity, Liu [21] proposed the uncertainty theory, which is a branch of mathematics based on normality, duality, subadditivity, and product axioms, and it is an effective tool to deal with imprecision rather than randomness. To date, many scholars have studied the uncertainty theory and a complete mathematical system is established, including uncertain set [22], uncertain process [23], uncertain differential equation [24], and two-stage uncertain programming [25,26]. Meanwhile, it has been studied in many application fields, such as uncertain inference [22], uncertain programming [27], uncertain statistics [28], uncertain portfolio selection [29], and uncertain optimal control [30]. So far, there are few relevant studies on the S-WTA problem based on uncertainty theory.
Due to the NP-hard nature of solving the large-scale S-WTA problem, many heuristic algorithms and evolutionary algorithms (EAs) have been designed in the past related studies. In the aspect of EAs, since it can use a flexible evolutionary mechanism to search for satisfactory solutions and usually has high robustness, it has been used to deal with the large scale S-WTA problems. Jian [14] proposed a modified genetic algorithm (GA) to solve a dependent S-WTA model where the kill probability of weapons was affected by the detection performance of sensors. Chen [31] improved the particle swarm optimization (PSO) algorithm with genetic operators and used it to solve an S-WTA model where a target can assign multiple weapons. However, one disadvantage of EAs is that their running time is relatively large. In the aspect of heuristic algorithms, since they can use the domain knowledge of the problem to obtain the solution with high quality, they have been used to solve the S-WTA problem and generally perform well in real-time performance. Bogdanowicz [12] designed a heuristic algorithm named Swt-opt based on the auction algorithm, and it was proved that the algorithm can obtain a complete optimal solution in finite steps, but it can only be applied in scenarios where a target can only be assigned a single sensor and a single weapon. Li [32] combined Swt-opt with the consensus algorithm to enhance the adaptability of Swt-opt to network topologies, but its application scenario is still limited. Xin [15] proposed a marginal-return-based constructive heuristic (MRBCH) to solve a dependent S-WTA model, so as to construct the solution with high quality rapidly and accurately. Xu [16] applied similar heuristic rules in solving a multi-stage S-WTA model, so as to produce a high quality initial population. However, the process of heuristic algorithms is generally fixed, which may traps the solutions into local optimality. In conclusion, the performance of heuristic algorithms and evolutionary algorithms is very sensitive to the parameters involved in it, and they have their own advantages and disadvantages, so how to designed an efficient algorithm combined their advantages to solve scenario-based S-WTA problem with uncertainty is a research key.
The aim of this paper is to solve the S-WTA problem in an indeterminate battlefield environment based on uncertainty theory. First, by analyzing the uncertain factors in the air defense battlefield environment, we treat the threat value of targets, the deviation of the interception performance of weapons and the deviation of the tracking performance of sensors as uncertain variables, then an uncertain S-WTA model (USWTA) is formulated. To make the proposed model solvable, a deterministic model named E-USWTA is derived based on expected value principle. For efficiently solving the proposed model with its NP-hard nature, a virtual representation (VP) and corresponding construction procedure (CP) of a feasible solution for the USWTA problem is introduced firstly, and then on this basis, a heuristic algorithm based on maximum marginal return (MMRCH) is designed to construct a solution with high quality, which utilizes the domain knowledge of the problem to add the allocation pairs to an allocation scheme. Additionally, a local search (LS) operation is employed to avoid missing the better solution in the neighborhood. Finally, a set of instances of the USWTA problem is generated and solved by the designed algorithm, and the allocation schemes with high quality can be obtained. The simulation results verify the effectiveness of the designed algorithm and the feasibility of the proposed model.
The rest of this paper is structured as follows. In Section 2, some basic definitions and theorems of uncertainty theory that are used subsequently are reviewed. In Section 3, the combat scenario is given and the USWTA model is established. In Section 4, the solution method of the USWTA model is derived. In Section 5, the heuristic algorithm based on maximum marginal return with local search is designed for solving the USWTA problems. Section 6 presents a set of instances of the USWTA problem to be solved by the designed algorithm, and the simulation results are analyzed. Finally, the main results of this paper are concluded in Section 7.

2. Preliminaries

Let Γ be a nonempty set, and L is a σ -algebra over Γ . Each element Λ in L is called an event. A set function M from L to [0,1] is called an uncertain measure if it satisfied the following axioms:
Axiom 1. (Normality Axiom) M { Γ } = 1 for the universal set Γ ;
Axiom 2. (Duality Axiom) M { Λ } + M { Λ c } = 1 for any event Λ L ;
Axiom 3. (Subadditivity Axiom) For any countable sequence of events Λ 1 , Λ 2 , L , we have
M i = 1 Λ i i = 1 M Λ i .
The triplet ( Γ , L , M ) is called an uncertainty space. Furthermore, a product axiom of uncertain measure is defined by Liu [21].
Axiom 4. (Product Axiom) Let ( Γ i , L i , M i ) be the uncertainty space for i = 1 , 2 , . The product uncertain measure M is an uncertain measure satisfying
M i = 1 Λ i = i = 1 M Λ i .
Definition 1
([21]). An uncertain variable is a measurable function ξ from an uncertainty space ( Γ , L , M ) to the set of real numbers, i.e., for any Borel set B of real numbers, the set
ξ B = γ Γ | ξ ( γ ) B
is an event in L .
Definition 2
([28]). The uncertain variables ξ 1 , ξ 2 , , ξ n are said to be independent if
M i = 1 n ( ξ i B i ) = i = 1 n M ( ξ i B i )
for any Borel sets B 1 , B 2 , , B n of real numbers.
Theorem 1
([28]). The uncertain variables ξ 1 , ξ 2 , , ξ n are said to be independent if and only if
M i = 1 n ( ξ i B i ) = i = 1 n M ( ξ i B i )
for any Borel sets B 1 , B 2 , , B n of real numbers.
Theorem 2
([21]). Let ξ 1 , ξ 2 , , ξ n be uncertain variables, and f is a real-valued measurable function. Then f ( ξ 1 , ξ 2 , , ξ n ) is an uncertain variable.
Definition 3
([21]). The uncertainty distribution Φ of an uncertain variable ξ is defined by
Φ ( x ) = M ξ x
for any real number x R .
Definition 4
([28]). Let ξ be an uncertain variable with regular uncertainty distribution Φ. Then the inverse function Φ 1 is called the inverse uncertainty distribution of ξ .
Definition 5
([21]). Let ξ be an uncertain variable with regular uncertainty distribution Φ. If Φ is strictly increasing in the set { x | 0 < Φ ( x ) < 1 } , we call ξ obey to regular distribution.
Definition 6
([21]). An uncertain variable ξ is called linear if it has a linear uncertainty distribution
Φ ( x ) = 0 i f     x < a ( x a ) / ( b a ) i f     a x b 1 i f     x > b
denoted by ξ L ( a , b ) where a , b are real numbers with a < b .
Definition 7
([21]). An uncertain variable ξ is called zigzag if it has a zigzag uncertainty distribution
Φ ( x ) = 0 i f     x < a ( x a ) / 2 ( b a ) i f     a x < b ( x + c 2 b ) / 2 ( c b ) i f     b x < c 1 i f     x c
denoted by ξ z ( a , b , c ) where a , b , c are real numbers with a < b < c .
Definition 8
([21]). Let ξ be an uncertain variable. Then, the expected value of ξ is defined by
E [ ξ ] = 0 + M ξ x d x 0 M ξ < x d x
provided that at least one of the two integrals is finite.
Theorem 3
([21]). Let ξ be an uncertain variable with regular uncertainty distribution Φ. If the expected value exists, then
E [ ξ ] = 0 1 Φ 1 ( α ) d α .
Theorem 4
([21]). Let ξ 1 , ξ 2 , , ξ n be independent uncertain variables with regular uncertainty distributions Φ 1 , Φ 2 , , Φ n , respectively. If the function f ( x 1 , x 2 , , x n ) is a measurable function which is strictly increasing with respect to x 1 , x 2 , , x m and strictly decreasing with respect to x m + 1 , x m + 2 , , x n , then ξ = f ( ξ 1 , ξ 2 , , ξ n ) is an uncertain variable with inverse uncertainty distribution
Ψ 1 ( α ) = f ( Φ 1 1 ( α ) , , Φ m 1 ( α ) , Φ m + 1 1 ( 1 α ) , , Φ n 1 ( 1 α ) ) .

3. Establishment of the USWTA Model

This section describes a scenario of air defense combat operation and establishes an uncertain sensor–weapon–target allocation (USWTA) model.

3.1. Problem Description

In this paper, a combat scenario is narrated as follows: At a certain time, radars detect that T targets belonging to the opponent are coming to our air defense field. These targets can be any object that poses a threat to protected assets on the ground, such as fighters, missiles, unmanned aerial vehicles, and each target has a threat value, denoted by ξ k ( k = 1 , 2 , , T ) . The defender has S sensor platforms (sensors) and W weapon platforms (weapons) to defend the assets, where the sensors track and illuminate the targets and the weapons intercept the targets. All the sensors and weapons are connected to the C2 system through the network. Under the control of C2 system, sensors and weapons can be combined through the network to form a temporary distributed network, in which the units can directly share information and cooperate to intercept a target.
For a target to be effectively destroyed, sensors and weapons in a distributed network must cooperate, i.e., sensors are responsible for detecting and tracking the target, and the information obtained by them is shared to the weapons, so that the weapons can launch missiles to intercept the target under the guidance of sensors. Therefore, the target can be destroyed only when sensors effectively track it and the weapons successfully intercept it. Figure 1 describes the scenario.
Uncertainty has always been an important consideration when build the mathematical model for the S-WTA problem in indeterminate battlefield environment. The real battlefield is full of many uncertain factors, such as the electromagnetic interference and the unreliability of equipment discussed in Section 1. These uncertain factors lead to the distortion of the target information obtained by the sensors, i.e., the detection performance of sensors will decline. Additionally, if the enemy target suddenly makes a large maneuver flight, or releases a decoy projectile, the hit rate of the weapon against the target in the terminal guidance stage will decrease. Moreover, due to the use of unmanned aerial vehicle swarm and various aircraft with high stealth and high mobility, it is difficult for decision makers to accurately identify the type and the operational intention of each target based on the detection information, which will affect the objective estimation of the threat value of target; thus, in this paper, the degree that sensors effectively track targets, the degree that weapons successfully intercept targets, and the threat value of the target can be handled with uncertainty theory, i.e., treat them as uncertain variables and the uncertainty distribution of them is available through the expert knowledge with incomplete data.

3.2. Uncertain Objective Function

In the above scenario, how to combine the sensors and weapons to form different distributed networks and allocate them to targets to maximize the combat effectiveness is the concern of decision makers.
Generally speaking, the commander chooses the total destruction of targets as an evaluation criterion of combat effectiveness; thus, the S-WTA problem can be formulated as an optimization problem, i.e., maximizing the value of total destruction to targets. The formulation can be presented as follows:
max Y , Z J ( Y , Z ) = k = 1 T ξ k P d e s ( k )
P d e s ( k ) = P s ( k ) P w ( k )
P s ( k ) = 1 i = 1 S ( 1 ( 1 γ i k ) q i k ) y i k
P w ( k ) = 1 j = 1 W ( 1 ( 1 η j k ) p j k ) y j k
where P d e s ( k ) denotes the degree that target k could be successfully destroyed, which is determined by the tracking performance of sensors allocated to it and interception performance of weapons allocated to it simultaneously. q i k and p j k denote the degrees that sensor i successfully tracks target k and the degree that weapon j successfully intercepts target k when there is no interference from the uncertain factors in the battlefield. γ i k and η j k are the deviation parameters.
Note that in the determinate battlefield environment, the tracking performance of sensors and the interception performance of weapons to each target are known as accurate parameters, denoted by q i k and p j k , respectively, which are determined by the performance of weapon and sensor themselves and the target state [33]. In other words, γ i k and η j k in the above formulas are equal to 0. However, in the real battlefield environment, many uncertain factors, such as the equipment loss and the maneuverability of targets, will cause the degradation of the performance of sensors tracking targets and weapons intercepting targets, which makes the execution performance of equipment deviate from the theoretical value. Therefore, we use ( 1 γ i k ) q i k and ( 1 η j k ) p j k in Equations (3) and (4) to reflect these deviations. Meanwhile, the deviations generally can not be estimated objectively since the battlefield environment is not reproducible and we do not have enough sample data to predict it reliably, so it is reasonable to treat γ i k and η j k as uncertain variables and invite the experts to give the uncertainty distribution of them based on incomplete information and subjective experience. Here, we assume that the experts give the minimum value and maximum value of them, thus γ i k and η j k are considered as linear uncertain variables, i.e., γ i k L ( a γ , i k , b γ , i k ) and η j k L ( a η , j k , b η , j k ) , and their uncertainty distribution is
Φ γ , i k ( x ) = 0 i f     x < a γ , i k ( x a γ , i k ) / ( b γ , i k a γ , i k ) i f     a γ , i k x b γ , i k 1 i f     x > b γ , i k
Φ η , j k ( x ) = 0 i f     x < a η , j k ( x a η , j k ) / ( b η , j k a η , j k ) i f     a η , j k x b η , j k 1 i f     x > b η , j k
where a γ , i k and b γ , i k are the minimum and maximum deviation of performance that sensor i tracks target k, respectively, within 0 < a γ , i k < b γ , i k < 1 . a η , j k , and b η , j k are the minimum and maximum deviation of performance that weapon j intercept target k, respectively, within 0 < a η , j k < b η , j k < 1 .
Additionally, due to the uncertainties in the indeterminate battlefield environment, it is difficult to obtain the state information of targets accurately and need experts to estimate the threat value of targets subjectively based on incomplete information, so we can treat the threat value of targets, denoted by ξ k , as uncertain variables. Here, we assume that the experts give the minimum, average, and minimum value of threat value of each target; thus, ξ k is considered as a zigzag uncertain variable, i.e., ξ k z ( a ξ , k , b ξ , k , c ξ , k ) , and its uncertainty distribution is
Φ ξ , k ( x ) = 0 i f     x < a ξ , k ( x a ξ , k ) / 2 ( b ξ , k a ξ , k ) i f     a ξ , k x b ξ , k ( x + c ξ , k 2 b ξ , k ) / 2 ( c ξ , k b ξ , k ) i f     b ξ , k x c ξ , k 1 i f     x > c ξ , k
where a ξ , k , b ξ , k and c ξ , k are the minimum, average, and maximum threat value of target k, respectively, within 0 < a ξ , k < b ξ , k < c ξ , k .

3.3. Constraints

The constraints of the USWTA problem include following four categories:
k = 1 T y i k 1 , i { 1 , 2 , . . . , S }
k = 1 T z j k 1 , j { 1 , 2 , . . . , W }
i = 1 S y i k m k , k { 1 , 2 , , T }
j = 1 W z j k n k , k { 1 , 2 , , T } .
Equations (5) and (6) limit the maximum number of targets that sensors and weapons can track or intercept. Here, we assume that each sensor or weapon can be allocated to one target at most. In fact, if a sensor or weapon can track or intercept multiple targets, it can be regarded as multiple separated sensors or multiple separated weapons. Equations (7) and (8) limit the cost of weapons and sensors for each target, respectively, which means that m k sensors and n k weapons can be allocated to target k at most. Generally, m k and n k are determined by the threat value of target k, i.e., the target with the higher threat value can be allocated more sensors and weapons.

3.4. Formulation of USWTA Model

Based on the objective function and constraints analyzed above, the mathematical formulation of the USWTA problem is as follows:
max Y , Z J ( Y , Z , ξ , γ , η ) = k = 1 T ξ k 1 i = 1 S ( 1 ( 1 γ i k ) q i k ) y i k × 1 j = 1 W ( 1 ( 1 η j k ) p j k ) z j k s . t . k = 1 T y i k 1 , i { 1 , 2 , , S } k = 1 T z j k 1 , j { 1 , 2 , , W } i = 1 S y i k m k , k { 1 , 2 , , T } j = 1 W z j k n k , k { 1 , 2 , , T } .
For simplicity, we define the decision variable X = ( Y ; Z ) to combine the allocation scheme matrices Y and Z , and let S denote the feasible region of X in model (9). The meanings of symbols in the USWTA model are illustrated in Table 1.

4. Solution Method of the USWTA Model

Since the objective function J in model (9) contains uncertain variables ξ , γ , and η , which cannot be compared since there is no natural ordered relation in uncertain space, so the model (9) is an unsolvable one and can not be optimized directly. For the case, a equivalent transformation form should be proposed to remove the uncertain ambiguity.
In model (9), for any given decision variable X S , the function J ( X , ξ , γ , η ) is a real-value measurable functions of ξ , γ , η , then according to Theorem 2, J is also an uncertain variable, and the uncertainty distribution of J exists, denoted by Ψ ( x ) .
Different real-life problems have different application requirements, so they call for different meanings of valuation, which results in different compromise decisions [34]. In general, the decision makers want to minimize the average cost of objective function; thus, it is rational to take the expected value of objective function as the evaluation criterion, and then a deterministic model named E-USWTA can be established, which can be represented as follows:
max X E J ( X , ξ , γ , η ) s . t . X S .
Furthermore, we can assume that the uncertain variables in model (9) are all independent of each other since there is no coupling between them, then the calculation formulas of E-USWTA can be derived. Firstly, for any given decision variable X S , X 0 , we can obtain the property that J is strictly decreasing with respect to γ i k and η j k ( i { 1 , , S } , j { 1 , , W } , k { 1 , , T } ), and is strictly increasing with respect to ξ k ( k { 1 , , T } ). Then, according to Theorem 4, the inverse uncertainty distribution of J can be calculated as follows:
Ψ 1 ( α ) = k = 1 T Φ ξ , k 1 ( α ) 1 i = 1 S ( 1 ( 1 Φ γ , i k 1 ( 1 α ) ) q i k ) y i k × 1 i = 1 S ( 1 ( 1 Φ η , j k 1 ( 1 α ) ) p j k ) z j k .
Hence, the expected value of objective function J can be calculated through Theorem 3:
E J ( X , ξ , γ , η ) = 0 1 Ψ 1 ( α ) d α .
To sum up, the original USWTA model (9) is converted to a determinate optimal model (10) called E-USWTA and the calculation Formulas (11) and (12) are derived. If the uncertainty distribution of each uncertain variable is known and a decision variable satisfying X S and X 0 is given, then the expected value of J, denoted by E J ( X , ξ , γ , η ) , can be calculated.
Remark 1.
In model (9), the values of uncertain variables γ i k and η j k are distributed in [ 0 , 1 ] for any i = 1 , , S , j = 1 , , W , k = 1 , , T , and the uncertain variable ξ k is positive for any k = 1 , , T , thus for any given α [ 0 , 1 ] , the values of Φ γ , i k 1 ( 1 α ) and Φ η , j k 1 ( 1 α ) are in [ 0 , 1 ] . If y i k = 0 and z j k = 0 , the values of ( 1 ( 1 Φ γ , i k 1 ( 1 α ) ) q i k ) y i k and ( 1 ( 1 Φ η , j k 1 ( 1 α ) ) p j k ) z j k are both equal to 1. Notice that when y i k or z j k changes from 0 to 1, the value of ( 1 ( 1 Φ γ , i k 1 ( 1 α ) ) q i k ) y i k or ( 1 ( 1 Φ η , j k 1 ( 1 α ) ) p j k ) z j k will decrease and be in [ 0 , 1 ] , and then according to Equations (11) and (12), it can be known that the value of E J ( X , ξ , γ , η ) will increase.
From Remark 1, we can obtain the property that if one more sensor or one more weapon is allocated to a target, the objective value E J ( X , ξ , γ , η ) will increase, which will be used in subsequent algorithm design.
The proposed model (10) is a modified model of WTA problem, which has been proved to be NP-hard [11], so the model (10) is also NP-hard.

5. Heuristic Algorithm for Solving the USTWA Problem

In Section 4, the original USWTA model has been transformed into a deterministic model named E-USWTA by using the expected value principle, which is formulated as a constrained binary programming problem with NP-hard nature. Notice that solving efficiency is very important in the actual battlefield situation, thus the EAs and meta-heuristics are generally used to search for optimal solution and obtain allocation scheme with high quality. There are mainly two aspects of challenge in solving this problem: One is how to generate a feasible solution in the iteration of the algorithm to satisfy all the constraints in Equations (5)–(8) efficiently, and the second is how to design the search mechanism to find the global optimal solution according to the potential knowledge contained in the problem. To address these challenges, a general “virtual” representation (VP) of solutions is introduced first, which can facilitate the rapid generation of feasible solutions, and on this basis, a heuristic algorithm based on maximum marginal return (MMR) and local search (LS) operation is designed to obtain the solution of E-USWTA problem with high quality.

5.1. Virtual Represent Ion for the Solution of USWTA Problem

The decision variable, denoted by ( Y ; Z ) , is a matrix with high dimension, and it is hard to generate a feasible solution efficiently satisfying all the constraints. In fact, given a practical USWTA problem, the allocation schemes of sensors and weapons to targets can be viewed as a process of gradually adding the combination of sensor–weapon–target pairs denoted by i-j-k to the allocation scheme one by one, so a general “virtual” representation (VP) of solutions based on permutation can be proposed to facilitate the generation of feasible solutions for USWTA problem. Broadly speaking, the permutation-based representation is often utilized in solving the quadratic allocation problem (QAP) [35].
First, the available allocation pair (AAP) is defined as follows:
Definition 9.
An available allocation pair denoted by i-j-k is called an AAP which indicates that sensor i and weapon j is allocated to target k.
Then, the virtual representation, denoted by V P , is defined as follows:
Definition 10.
A permutation of some or all AAPs is termed as a VP for the USWTA problem.
For example, given an USWTA problem with two sensors, two weapons, and two targets, all the AAPs consist of the following eight pairs (AAP1-AAP8): (1) 1-1-1; (2) 1-1-2; (3) 1-2-1; (4) 1-2-2; (5) 2-1-1; (6) 2-1-2; (7) 2-2-1; (8) 2-2-2, and any permutation of the AAPs, such as “(2)-(1)-(5)-(3)-(7)-(8)-(4)-(6)”, is a V P .
Obviously, a V P can be regarded as an indirect representation of the feasible solution for the USWTA problem: Given a V P , the AAPs will be added to the allocation scheme one by one following the permutation of V P . It should be noted that the addition of some AAPs in V P may cause violation to the constraints, thus they are unallowed, which are called unallocated AAPs (UAAP). If the addition of an AAP will not violate the constraints, it will be added to the allocation scheme and called an allocated AAP (AAAP). After all the AAPs in a V P have been processed, a corresponding feasible allocation scheme of the USWTA problem will be generated.
In order to determine which AAPs are AAAPs and which AAPs are UAAP in a V P , the following auxiliary variables are first defined to record the current allocation state in the process of adding AAPs:
  • N S = [ n S ( i ) ] 1 × S : n S ( i ) denotes the number of targets that sensor i is allocated to currently.
  • N W = [ n W ( j ) ] 1 × W : n W ( j ) denotes the number of targets that weapon j is allocated to currently.
  • N T S = [ n T S ( k ) ] 1 × T : n T S ( k ) denotes the number of sensors that are allocated to target k currently.
  • N T W = [ n T W ( k ) ] 1 × T : n T W ( k ) denotes the number of weapons that are allocated to target k currently.
With the variables defined above, the rules for handling the constraints in Equations (5)–(8) are presented as follows:
  • If n S ( i ) = 1 , sensor i will not be allocated to any other targets.
  • If n W ( j ) = 1 , weapon j will not be allocated to any other targets.
  • If n T S ( k ) = m k , no more sensor will be allocated to target k.
  • If n T W ( k ) = n k , no more weapon will be allocated to target k.
The specific process of generating feasible solution is called construction procedure (CP), which can convert a V P to a complete allocation scheme (feasible solution) of the USWTA problem. The pseudocode of CP is shown in Algorithm 1.
Algorithm 1: Construction Procedure
Symmetry 15 00176 i001
At the beginning of CP, a V P is given, and no AAPs are added to the allocation scheme, i.e., no sensors or weapons are allocated, so above four auxiliary variables are initialized to zeros. Before an AAP in the V P is added to the allocation scheme in order, the auxiliary variables are used to check whether its addition will violate any constraint. If it does, skip it and note it as an UAAP; otherwise, it is an AAAP and will be added to the allocation scheme by updating the decision variables X , Y and the auxiliary variables N S , N W , N T S , N T W .
To sum up, a V P can generate a feasible allocation scheme ( Y ; Z ) of the USWTA problem by processing the CP to it. Conversely, it is easy to prove that any feasible allocation scheme of the USWTA problem can be generated by processing the CP to a V P (existing but not unique). Meanwhile, it should be pointed out that increasing the use of any available sensor or weapon without violating constraints will further improve or maintain the objective value, which has been analyzed in Remark 1. In other words, if a feasible allocation scheme is generated by a V P that does not contain all AAPs, we can arrange the remaining AAPs behind the V P , and then a new V P containing all AAPs is generated, which can lead to a better allocation scheme with higher objective value. Therefore, the best feasible allocation scheme of the USWTA problem in (10) must be generated by a V P containing all AAPs.
Finally, the following Remark 2 is given to supplement the rationality of the VP and CP proposed in this paper.
Remark 2.
For a given feasible allocation scheme ( Y ; Z ) , if there is target k that is assigned some sensors but no weapon or is assigned some weapons but no sensor, i.e., i { 1 , , S } , y i k = 1 , j { 1 , , W } , z j k = 0 or i { 1 , , S } , y i k = 0 , j { 1 , , W } , z j k = 1 , we can obtain that
Φ ξ , k 1 ( α ) 1 i = 1 S ( 1 ( 1 Φ γ , i k 1 ( 1 α ) ) q i k ) y i k × 1 i = 1 S ( 1 ( 1 Φ η , j k 1 ( 1 α ) ) p j k ) z j k = 0 ,
which means that the destruction to target k has no contribution to the objective, and the weapons or sensors assigned to target k are not valid. Therefore, it is only effective when a sensor and a weapon are assigned to the target as a combination, which illustrates the conclusion that any feasible allocation scheme of the USWTA problem can be generated by processing the CP to a V P .

5.2. Constructive Heuristic Algorithm Based on Maximum Marginal Return

One of the reasons for the popular use of heuristic algorithms is that it can reduce the complexity of problem solving by using the domain knowledge contained in the problem [36]. The “marginal return” is an important terminology in the field of economics, which refers to the additional yield resulting from the increase of a unit in the inputs when other inputs are held constant. denBroeder [37] utilized the maximum marginal return algorithm (MMR) to solve a static WTA problem for the first time. Recently, Xin [15] also utilized a similar concept to design a heuristic algorithm to solve a determined S-WTA model. Similarity, this concept can also be used in solving the USWTA problem.
Through the analysis in Section 5.1, adding an AAP, denoted by i-j-k, to an allocation scheme means allocating sensor i and weapon j to target k, will contribute to the objective. Hence, we can regard the contribution of each AAP to the objective as the marginal return, and then a heuristic algorithm for constructing high quality feasible solutions based on maximum marginal return rule (MMRCH) is proposed.
In the beginning, we initialize S × W × T AAPs totally and we denote the set of them as ; then, we employ a matrix Δ = [ δ i j k ] S × W × T to record the marginal return of each AAP in , where δ i j k represents the marginal return if the AAP i-j-k is added to the allocation scheme currently. It can be known from Equations (11) and (12) that the margin return is calculated as follows:
u 1 ( k , α ) = Φ ξ , k 1 ( α ) [ 1 Q m i s ( k , α ) ] [ 1 P m i s ( k , α ) ]
u 2 ( i , j , k , α ) = Φ ξ , k 1 ( α ) × [ 1 Q m i s ( k , α ) ( 1 ( 1 Φ γ , i k 1 ( 1 α ) ) q i k ) 1 y i k ] × [ 1 P m i s ( k , α ) ( 1 ( 1 Φ η , j k 1 ( 1 α ) ) p j k ) 1 z j k ]
δ i j k = 0 1 u 2 ( i , j , k , α ) d α 0 1 u 1 ( k , α ) d α
where Q m i s ( k , α ) and P m i s ( k , α ) are defined to record the following distribute functions under the current allocation scheme:
Q m i s ( k , α ) = i = 1 S ( 1 ( 1 Φ γ , i k 1 ( 1 α ) ) q i k ) y i k
P m i s ( k , α ) = j = 1 W ( 1 ( 1 Φ η , j k 1 ( 1 α ) ) p j k ) z j k .
In Equations (13)–(17), u 1 ( k , α ) represents the distribution function of the destroyed value of target k under the current allocation scheme, and u 2 ( i , j , k , α ) represents the distribution function of destroyed value of target k after adding i-j-k to the current allocation scheme. In Equation (14), if sensor i is already allocated to target k currently, i.e., y i k = 1 , Q m i s ( k , α ) will not change after adding i-j-k to allocation scheme. Analogously, if weapon j is already allocated to target k currently, i.e., z j k = 1 , P m i s ( k , α ) will not change after adding i-j-k to allocation scheme. Moreover, adding i-j-k to the allocation scheme only change the distribution function of destroyed value of target k, thus δ i j k can represent the marginal return of the AAP i-j-k.
Then, the main rule of the MMRCH algorithm is given: The more marginal return an AAP contributes to the objective, the higher priority it should be given in the process of allocation. This rule states that an AAP with highest marginal return should be added to the current allocation scheme preferentially, which is expressed as follows:
δ i j k = max { i , j , k } { δ i j k } .
Once an AAP is added to the allocation scheme, the related variables Y , Z , N S , N W , N T S , N T W , Q m i s ( k , α ) , and P m i s ( k , α ) will be updated, and will be updated by deleting the UAAPs in it. Above process will be repeated for the remaining AAPs until is empty (all AAPs have been allocated or deleted), and finally a feasible allocation scheme is output. The pseudocode of MMRCH is shown in Algorithm 2.
Algorithm 2: MMRCH
Symmetry 15 00176 i002

5.3. Local Search Operation

Through the MMRCH algorithm, a feasible solution with high objective value can be constructed. However, due to the rule of the algorithm being fixed, the output allocation scheme is deterministic. Although the quality of the solution is high, its optimality cannot be guaranteed theoretically. In order to further improve the quality of the solution, a local search mechanism is employed to the algorithm framework, which can explore for the better solution locally with low computational cost.
Firstly, through the introduction of MMRCH in Section 5.2, it is easy to prove that the V P obtained by MMRCH satisfies the following two properties:
Property 1.
AAAPs contained in the V P have no conflict against each other, which means that only changing the order of AAAPs in the V P will not generate a new allocation scheme.
Property 2.
For a set of consecutive UAAPs following behind an AAAP, only changing the order of these UAAPs will not generate a new allocation scheme.
Through these two properties, we can know that exchanging the position of UAAPs that conflict against different AAAPs can generate new solutions; thus, an easy way to generate new solutions can be proposed. The specific operations called local search (LS) operation are as follows:
LS operation: Select m UAAPs from the V P , and for each UAAP, swap it with the nearest AAAP in front of it.
Note that S U A A P s is the set of all UAAPs in the V P . The parameter m is given by human. The set of new V P that can be generated by LS operation is called the neighborhood of original V P . Obviously, the larger the value of m, the more individuals in the neighborhood of original V P . In order to save calculation costs, we set m = 1 and then the corresponding neighborhood is relatively small. The illustration and pseudocode of LS operation are shown in Figure 2 and Algorithm 3.
Algorithm 3: Local search ( m = 1 )
Symmetry 15 00176 i003

5.4. The Framework of MMRCH-LS

The maximum marginal return constructed heuristic algorithm with local search (MMRCH-LS) is shown in Figure 3, which combines the strengths of both MMRCH and LS operations.
Firstly, the related parameters are initialized, and then the MMRCH is used to construct a solution V P M with high objective value. To further improve the quality of the solution obtained, LS is used to find the best solution in the neighborhood of V P M .

6. Performance Test

To prove the effectiveness of the designed MMRCH-LS algorithm in solving the USWTA problem, we set up a series of test instances and conducted simulation experiments, and then analyzed the simulation results.

6.1. Test-Instance Generator

Firstly, we develop a generator to generate initial parameters for the USWTA problem including Φ ξ , k , Φ γ , i k , Φ η , i k , q i k , p j k , m k , n k ( i = 1 , 2 , . . . , S ; j = 1 , 2 , . . . , W ; k = 1 , 2 , . . . , T ).
(1)
Generation of Φ ξ , k , Φ γ , i k , Φ η , i k
The uncertain distribution of ξ k , γ i k , and η j k follow that ξ k z ( a ξ , k , b ξ , k , c ξ , k ) , γ i k L ( a γ , i k , b γ , i k ) , and η i k L ( a η , j k , b η , j k ) , respectively. The detailed information is given in Table 2.
(2)
Generation of q i k and p j k
The values of q i k and p j k are set as follows:
q i k = q L + ( q H q L ) · r a n d p i k = p L + ( p H p L ) · r a n d
where q L and q H are the lower bound and upper bound of tracking probability of sensors, respectively. p L and p H are the lower bound and upper bound of the interception probability of weapons, respectively. They are all predefined constants within 0 < q L < q H < 1 and 0 < p L < p H < 1 . Here, we set q L = 0.72 , q H = 0.96 , p L = 0.5 , and p H = 0.95 .
(3)
Generation of m k , n k
There are two cases to discuss here.
Case 1: Each target is allocated one sensor and one weapon at most, i.e., m k = 1 , n k = 1 ( k { 1 , 2 , , T } ) .
Case 2: The maximum number of sensors or weapons that can be allocated to a target are set to 1, 2, or 3 according the uncertain distribution of threat value of the target, i.e.,
m k = 1 ,     i f     0 < b ξ , k 4 2 ,     i f     4 < b ξ , k 8 3 ,     i f     8 < b ξ , k 10 n k = 1 ,     i f     0 < b ξ , k 4 2 ,     i f     4 < b ξ , k 8 3 ,     i f     8 < b ξ , k 10 .
Note that Case 1 present the simplified USWTA problem and Case 2 present the original one.

6.2. Algorithms for Comparison

To prove the effectiveness of the designed MMRCH-LS, we adopt a random sampling (RS) algorithm as the main comparison algorithm.
The framework of RS is similar to that of MMRCH but the rule is abandoned. In each iteration of RS, we randomly generate a V P and use CP to generate the corresponding allocation scheme. Apparently, RS is a random statistical method without the use of domain information accumulated during its sampling process. A series of feasible solutions are generated by repeating the above process within the running times permitted and select the best solution as the final output. Here, we set running times to 1000.
Meanwhile, in order to test the effect of LS in improving the quality of the solution, the MMRCH algorithm without LS is also adopted as a comparison algorithm.

6.3. Experiment Setup

In the simulation experiment, we preset 20 instances of USWTA problem, including 5 instances from Case1 and 15 instances from Case2. Give the basic parameters S , W , T and other parameters are generated by the test-instance generator proposed in Section 6.1. The basic parameters of the 20 instances are shown in Table 3.
Since RS is an algorithm with stochastic nature, it ran 20 times for each instance. The MMRCH-LS and MMRCH also ran 20 times in order to collect the data of runtime. A maximum acceptable time is set to 60 s. If the running time reaches or exceeds it, the output is deemed as invalid. The experiment was carried out in a MATLAB_R2018b environment on a PC with Intel Core i5 CPU 2.30 GHz and 12 GB internal memory.

6.4. Results and Analysis

The experimental results are shown in Figure 4 and Table 4. Figure 4 shows the comparison of normalized objective function values obtained by the three algorithms for each instance. Notice that the objective function values are normalized from 0 to 1 by following formula:
f ¯ = f f min f max f min
where f min , f max , f , f ¯ are the minimum value, maximum value, original value, and normalized value obtained by the three algorithms, respectively. Table 4 shows the running time of three algorithms.
In Figure 4, the simulation results of instances including No.5, No.17 No.18, No.19, and No.20 are not displayed since the running time of the three algorithms in solving these instances exceeds the maximum acceptable time (60 s). From the comparison results of the normalized objective values in Figure 4, we can know that the MMRCH-LS and MMRCH can obtain the allocation schemes with high quality. Furthermore, with the scale of units (sensors, weapons, and targets) in the instance increasing, the quality of the allocation scheme obtained by MMRCH-LS and MMRCH algorithms is more and more superior to that obtained of the RS algorithm, which validates that the maximum marginal return rule in MMRCH can use the domain knowledge of problem to construct allocation scheme with high objective value effectively. Specifically, it can be seen from the comparison results of instances No.6 and No.7 that, after MMRCH constructs a high-quality allocation scheme, the LS operation can further improve the quality of it in the neighborhood. However, when solving the instances with large scale units, the LS operation has failed and can not found a better solution.
From the comparison result of running time of the three algorithms in Table 4, we can see that the real-time performance of MMRCH is unstable: When solving the instances with small scale units (No.1–No.3, No.6–No.11), the running time of MMRCH is less than that of RS. However, with the scale of units in the instance increasing, the running time of MMRCH and RS gradually increases, and the running time of MMRCH exceeds that of RS eventually (No.4, No.12–No.16). Additionally, it should be noted that the difference in running time between MMRCH-LS and MMRCH is caused by the presence or absence of LS operation, thus we can know that with the scale of units in the instance increasing, the running time of LS operation will also gradually increase, i.e., the real-time performance of LS operation decreases.
To calculate the computational time complexity of MMRCH and RS, we can start by calculating the time complexity of each lookup operation embedded in the iteration of algorithms. As for MMRCH, the complexity of a desirable lookup operation is O ( l ) , where l is the size of the AAPs for lookup and initialized to S · W · T . The size of l will decrease while a lookup operation ends: When the first AAP is added in the first loop, there are A 1 = 1 + ( T 1 ) ( W 1 ) + ( T 1 ) ( S 1 ) AAPs that are going to be deleted from . For following ( S 1 ) times of the loop, the minimum number of AAPs to be deleted is A 2 = 1 + ( W 1 ) ( T 1 ) in each loop. Then, for the remaining AAPs, we can delete at least one AAP in each loop; thus, in the worst condition, l at β th loop can be calculated as follows:
l = α β = 1 , α A 1 β = 2 , α A 1 A 2 ( β 2 ) β = 3 , , S + 1 α A 1 A 2 ( β 2 ) ( β S 1 ) β = S + 2 , .
As for RS, in each loop it only calculates the marginal return of one AAP, thus the desirable lookup operation of RS has the complexity of O ( 1 ) . Notice that the initialized O ( l ) of MMRCH will increase rapidly with the scale of units in the USWTA problem increasing, and the integral calculation in Equation (15) (Line 17 in Algorithm 2) in each iteration will consume a lot of computing time, so the time consumption of MMRCH is higher than that of RS in solving the USWTA problem with large scale units.
Additionally, the allocation schemes and corresponding objective values of instances including No.1-No.3,No.6-No.10 obtained by MMRCH-LS are shown in Table 5 (The allocation schemes of other instances are too large to be displayed). From Remark 2 we can know that when a target is not assigned any sensors or weapons, assigning the weapons or sensors to it does not contribute to the objective value, but only wastes resources. Therefore, if a target is assigned a sensor or a weapon, then there must be a weapon or a sensor assigned to it as well. The results in Table 5 are consistent with it. To conclude, when solving the USWTA problem with small scale units, the MMRCH-LS designed in this paper can obtain the allocation scheme with high quality, and the real-time performance of it can also meet actual requirements. However, when solving the USWTA problem with large scale units, although the MMRCH-LS can also obtain the allocation scheme with high quality, its real-time performance is poor, and the LS mechanism is redundant.

7. Conclusions

The STA and WTA problems have been extensively investigated in previous studies, while its uncertainties are generally ignored. In this paper, an S-WTA problem was studied based on uncertainty theory, and an USWTA model was established. Based on the actual requirement in battlefield, a solution method based on the expected value principle was provided to convert the proposed unsolvable model to a deterministic one, which was a constrained binary programming problem with an NP-hard nature. To solve the model efficiently, a permutation-based representation and a corresponding construction procedure were introduced firstly to facilitate the generation of a feasible solution for the USWTA problem. On this basis, a constructive heuristic algorithm based on maximum marginal return rule (MMRCH) was designed, which could use the domain knowledge of the problem to construct a feasible allocation scheme with high objective value. Additionally, the LS operation was employed to further improve the quality of obtained solution. Finally, a set of instances was presented to be solved by designed algorithm named MMRCH-LS, and the performance of algorithm is analyzed. The result showed that the designed algorithm can obtain the allocation scheme with high quality for each instance and outperform other comparison algorithms, and the real-time performance of it can meet the actual requirements when the scale of units was not very large.
The work in this paper provided a mathematical analysis method and model support for solving the S-WTA problem in the indeterminate battlefield environment full of uncertainties and subjective reliability, and an efficient heuristic algorithm utilizing the domain knowledge of problem was designed to solve the proposed model. The results showed that the designed algorithm can obtain high-quality solutions when solving the USWTA problems with any scale units, and its real-time performance also meets the actual requirements when the scale of units is not very large. Meanwhile, the allocation schemes obtained also verified the feasibility of the proposed model.
Although MMRCH-LS could effectively solve the USWTA problem in most of the instances and obtained solution with high quality, but its real-time performance was not good when solving the instances with large units. This was mainly because the integral operation in iteration occupies a lot of computation time, and the shortcoming became obvious when the amount of AAPs was large. Furthermore, in only 2 of the 20 instances was the output improved by the LS operation, and thus the validity of this mechanism cannot be fully demonstrated. Therefore, in our future work, we will focus on the design of better heuristic rules and local search operators. We hypothesize that the performance of the algorithm can be enhanced in solving USWTA problem with large units if we designed it appropriately.
Additionally, this paper assumed that the damage degree of the target is the product of the degree of weapon interception and the degree of sensor detection, which neglected some complicated factors of the sensor–weapon system configuration in actual application environment. Therefore, in our future work, we will also focus on establishing a more reasonable model which can further reflect the actual situation of the S-WTA problem.

Author Contributions

Conceptualization, G.L. and M.Z.; methodology, G.L. and G.H.; software, G.L. and A.Z.; validation, G.H. and M.Z.; writing—original draft preparation, G.L.; writing—review and editing, G.H., M.Z. and A.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by the Natural Science Basic Research Program of Shaanxi (Program No.2023-JC-YB-629).

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ling, Q.; Fu, Y.; Tian, Z. Localized Sensor Management for Multi-target Tracking in Wireless Sensor Networks. Inf. Fusion 2011, 12, 194–201. [Google Scholar] [CrossRef]
  2. Zheng, Y.; Cao, N.; Wimalajeewa, T.; Varshney, P.K. Compressive sensing based probabilistic sensor management for target tracking in wireless sensor networks. IEEE Trans. Signal Process. 2015, 63, 6049–6060. [Google Scholar] [CrossRef]
  3. Zhang, H.; Xie, J.; Shi, J.; Zhang, Z.; Fu, X. Sensor scheduling and resource allocation in distributed MIMO radar for joint target tracking and detection. IEEE Access 2019, 7, 62387–62400. [Google Scholar] [CrossRef]
  4. Zhao, W.; Han, Y.; Wu, H.; Zhang, L. Weighted distance based sensor selection for target tracking in wireless sensor networks. IEEE Signal Process. Lett. 2009, 16, 647–650. [Google Scholar] [CrossRef]
  5. Kline, A.; Ahner, D.; Hill, R. The Weapon-target Assignment Problem. Comput. Oper. Res. 2019, 105, 226–236. [Google Scholar] [CrossRef]
  6. Shi, X.; Zou, S.; Song, S.; Guo, R. A multi-objective sparse evolutionary framework for large-scale weapon target assignment based on a reward strategy. J. Intell. Fuzzy Syst. 2021, 40, 10043–10061. [Google Scholar] [CrossRef]
  7. Ni, M.; Yu, Z.; Ma, F.; Wu, X. A lagrange relaxation method for solving weapon-target assignment problem. Math. Probl. Eng. 2011, 2011, 873292. [Google Scholar] [CrossRef] [Green Version]
  8. Chang, T.; Kong, D.; Hao, N.; Xu, K.; Yang, G. Solving the dynamic weapon target assignment problem by an improved artificial bee colony algorithm with heuristic factor initialization. Appl. Soft Comput. 2018, 70, 845–863. [Google Scholar] [CrossRef]
  9. Ahuja, R.K.; Kumar, A.; Jha, K.C.; Orlin, J.B. Exact and heuristic algorithms for the weapon-target assignment problem. Oper. Res. 2007, 55, 1136–1146. [Google Scholar] [CrossRef] [Green Version]
  10. Xin, B.; Chen, J.; Peng, Z.; Dou, L.; Zhang, J. An efficient rule-based constructive heuristic to solve dynamic weapon-target assignment problem. IEEE Trans. Syst. Man-Cybern.-Part Syst. Hum. 2010, 41, 598–606. [Google Scholar] [CrossRef]
  11. Lloyd, S.P.; Witsenhausen, H.S. Weapons Allocation is NP-complete. In Proceedings of the 1986 Summer Computer Simulation Conference, Reno, NV, USA, 28–30 July 1986; pp. 1054–1058. [Google Scholar]
  12. Bogdanowicz, Z.; Coleman, N. Sensor-target and Weapon-target Pairings Based on Auction Algorithm. In Proceedings of the 11th WSEAS International Conference on Applied Mathematics, Dallas, TX, USA, 22–34 March 2007; pp. 92–96. [Google Scholar]
  13. Li, Z.; Li, X.; Yan, J.; Dai, J.; Kong, F. An anytime algorithm based on decentralized cooperative auction for dynamic joint fire distribution problem. In Proceedings of the 2012 IEEE International Conference on Mechatronics and Automation, Chengdu, China, 5–8 August 2012; pp. 2031–2036. [Google Scholar]
  14. Jian, W.; Chen, C. Sensor-weapon Joint Management Based on Improved Genetic Algorithm. In Proceedings of the 2015 34th Chinese Control Conference (CCC), Hangzhou, China, 28–30 July 2015; pp. 2738–2742. [Google Scholar]
  15. Xin, B.; Wang, Y.; Chen, J. An Efficient Marginal-return-based Constructive Heuristic to Solve The Sensor–weapon–target Assignment Problem. IEEE Trans. Syst. Man Cybern. Syst. 2018, 49, 2536–2547. [Google Scholar] [CrossRef]
  16. Xu, W.; Chen, C.; Ding, S.; Pardalos, P.M. A bi-objective dynamic collaborative task assignment under uncertainty using modified MOEA/D with heuristic initialization. Expert Syst. Appl. 2020, 140, 112844. [Google Scholar] [CrossRef]
  17. Krokhmal, P.; Murphey, R.; Pardalos, P.; Uryasev, S.; Zrazhevski, G. Robust Decision Making: Addressing Uncertainties in Distributions. In Cooperative Control: Models, Applications and Algorithms; Butenko, S., Ed.; Springer: Boston, MA, USA, 2003; pp. 165–185. [Google Scholar]
  18. Ahner, D.K.; Parson, C.R. Optimal Multi-stage Allocation of Weapons to Targets Using Adaptive Dynamic Programming. Optim. Lett. 2015, 9, 1689–1701. [Google Scholar] [CrossRef]
  19. Li, J.; Chen, J.; Xin, B.; Dou, L.; Peng, Z. Solving the Uncertain Multi-Objective Multi-Stage Weapon Target Assignment Problem via MOEA/D-AWA. In Proceedings of the 2016 IEEE Congress on Evolutionary Computation (CEC), Vancouver, BC, Canada, 24–29 July 2016; pp. 4934–4941. [Google Scholar]
  20. Liu, B. Why is There a Need for Uncertainty Theory. J. Uncertain Syst. 2012, 6, 3–10. [Google Scholar]
  21. Liu, B. Uncertainty Theory, 5th ed.; Springer: Berlin, Germany, 2017. [Google Scholar]
  22. Liu, B. Uncertain Set Theory and Uncertain Inference Rule with Application to Uncertain Control. J. Uncertain Syst. 2010, 4, 83–98. [Google Scholar]
  23. Liu, B. Fuzzy process, Hybrid Process and Uncertain Process. J. Uncertain Syst. 2008, 2, 3–16. [Google Scholar]
  24. Chen, X.; Liu, B. Existence and Uniqueness Theorem for Uncertain Differential Equations. Fuzzy Optim. Decis. Mak. 2010, 9, 69–81. [Google Scholar] [CrossRef]
  25. Zheng, M.; Yi, Y.; Wang, Z.; Chen, J.F. Study on two-stage uncertain programming based on uncertainty theory. J. Intell. Manuf. 2017, 28, 633–642. [Google Scholar] [CrossRef]
  26. Zheng, M.; Yi, Y.; Wang, X.; Wang, J.; Mao, S. The information value and the uncertainties in two-stage uncertain programming with recourse. Soft Comput. 2018, 22, 5791–5801. [Google Scholar] [CrossRef]
  27. Liu, B. Theory and Practice of Uncertain Programming; Springer: Berlin, Germany, 2009. [Google Scholar]
  28. Liu, B. Uncertainty Theory: A Branch of Mathematics for Bodeling Human Uncertainty; Springer: Berlin, Germany, 2010. [Google Scholar]
  29. Chen, W.; Li, D.; Lu, S.; Liu, W. Multi-period Mean–semivariance Portfolio Optimization Based on Uncertain Measure. Soft Comput. 2019, 23, 6231–6247. [Google Scholar] [CrossRef]
  30. Zhu, Y. Uncertain Optimal Control with Application to A Portfolio Selection Model. Cybern. Syst. Int. J. 2010, 41, 535–547. [Google Scholar] [CrossRef]
  31. Chen, H.; Liu, Z.; Sun, Y.; Li, Y. Particle Swarm Optimization Based on Genetic Operators for Sensor-Weapon-Target Assignment. In Proceedings of the 2012 Fifth International Symposium on Computational Intelligence and Design, Hangzhou, China, 28–29 October 2012; Volume 2, pp. 170–173. [Google Scholar]
  32. Zi-fen, L.; Xiang-min, L.; Jin-jin, D.; Jin-zhu, C.; Feng-xia, Z. Sensor-weapon-target assignment based on improved SWT-opt algorithm. In Proceedings of the 2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering, Wuhan, China, 20–21 August 2011; Volume 2, pp. 25–28. [Google Scholar]
  33. Zhao, Y.; Chen, Y.; Zhen, Z.; Jiang, J. Multi-weapon Multi-target Assignment Based on Hybrid Genetic Algorithm in Uncertain Environment. Int. J. Adv. Robot. Syst. 2020, 17, 1054–1058. [Google Scholar] [CrossRef] [Green Version]
  34. Wang, Z.; Guo, J.; Zheng, M.; Wang, Y. Uncertain Multi-objective Traveling Salesman Problem. Eur. J. Oper. Res. 2015, 241, 478–489. [Google Scholar] [CrossRef]
  35. Loiola, E.M.; de Abreu, N.M.M.; Boaventura-Netto, P.O.; Hahn, P.; Querido, T. A Survey for The Auadratic Assignment Problem. Eur. J. Oper. Res. 2007, 176, 657–690. [Google Scholar] [CrossRef]
  36. Zhao, W.; Meng, Q.; Chung, P.W. A Heuristic Distributed Task Allocation Method for Multivehicle Multitask Problems and Its Application to Search and Rescue Scenario. IEEE Trans. Cybern. 2015, 46, 902–915. [Google Scholar] [CrossRef] [Green Version]
  37. den Broeder, G., Jr.; Ellison, R.; Emerling, L. On Optimum Target Assignments. Oper. Res. 1959, 7, 322–326. [Google Scholar] [CrossRef]
Figure 1. Combat scenario (S for sensor, W for weapon, and T for target).
Figure 1. Combat scenario (S for sensor, W for weapon, and T for target).
Symmetry 15 00176 g001
Figure 2. The illustration of the rationale for LS operation when m = 2 .
Figure 2. The illustration of the rationale for LS operation when m = 2 .
Symmetry 15 00176 g002
Figure 3. The process framework of MRLSH.
Figure 3. The process framework of MRLSH.
Symmetry 15 00176 g003
Figure 4. Normalized objective value obtained by MMRCH-LS, MMRCH, and RS.
Figure 4. Normalized objective value obtained by MMRCH-LS, MMRCH, and RS.
Symmetry 15 00176 g004
Table 1. Symbols explanation.
Table 1. Symbols explanation.
SymbolDefinition
q i k The degree that sensor i successfully track target k when there is no interference from the uncertainty.
p j k The degree that weapon j successfully intercept target k when there is no interference from the uncertainty.
m k The maximum number of sensors that can be allocated to target k.
n k The maximum number of weapons that can be allocated to target k.
Y S × T The sensor allocation scheme matrix (if sensor i is allocated to target k, y i k = 1 ; otherwise, y i k = 0 ).
Z W × T The weapon allocation scheme matrix (if weapon j is allocated to target k, z j k = 1 ; otherwise, z j k = 0 ).
X The decision variable formed by combining Y and Z , i.e., X = ( Y ; Z )
ξ k Positive uncertain variable defined in ( Γ , L , M ) , which denotes the treat value of target k.
γ i k Positive uncertain variable defined in ( Γ , L , M ) , which denotes the deviation of performance of sensor i tracking target k.
η j k Positive uncertain variable defined in ( Γ , L , M ) , which denotes the deviation of performance of weapon j tracking target k.
ξ Uncertain variable vector consisting of ξ k ( k = 1 , . . . , T ).
γ Uncertain variable vector consisting of γ i k ( i = 1 , , S , k = 1 , , T ).
η Uncertain variable vector consisting of η j k ( j = 1 , , W , k = 1 , , T ).
P s ( k ) The degree that target k be successfully tracked by sensors.
P w ( k ) The degree that target k be successfully intercepted by weapons.
P d e s ( k ) The degree that target k be destroyed.
Φ ξ , k 1 ( α ) The inverse uncertainty distribution of ξ k .
Φ γ , i k 1 ( α ) The inverse uncertainty distribution of γ i k .
Φ η , j k 1 ( α ) The inverse uncertainty distribution of η j k .
Table 2. Parameter setting.
Table 2. Parameter setting.
ParameterDetail Information
( a ξ , k , b ξ , k , c ξ , k ) Randomly valued in [1,10] within a ξ , k < b ξ , k < c ξ , k .
( a γ , i k , b γ , i k ) Randomly valued in (0,0.9) within a γ , i k < b γ , i k .
( a η , j k , b η , j k ) Randomly valued in (0,0.8) within a η , j k < b η , j k .
Table 3. S , W , T of 20 instances.
Table 3. S , W , T of 20 instances.
No. SWT No. SWT
1 * S 5 W 4 T 3 11 S 21 W 18 T 20
2 * S 10 W 9 T 8 12 S 28 W 20 T 23
3 * S 20 W 20 T 20 13 S 30 W 35 T 28
4 * S 40 W 45 T 50 14 S 45 W 50 T 38
5 * S 80 W 70 T 65 15 S 62 W 50 T 30
6 S 4 W 5 T 7 16 S 70 W 72 T 56
7 S 7 W 7 T 7 17 S 80 W 85 T 67
8 S 10 W 8 T 13 18 S 90 W 100 T 110
9 S 15 W 19 T 13 19 S 150 W 140 T 130
10 S 19 W 14 T 15 20 S 180 W 170 T 175
* means the instance belongs to Case 1, otherwise it belongs to Case 2.
Table 4. The runtime (s) of MMRCH-LS, MMRCH and RS.
Table 4. The runtime (s) of MMRCH-LS, MMRCH and RS.
No.MMRCH-LSMMRCHRS
1 *0.0348 ± 8.42 × 10−40.0028 ± 6.62 × 10−40.0386 ± 2.00 × 10−3
2 *0.0997 ± 5.15 × 10−40.0384 ± 4.57 × 10−40.1199 ± 0.0411
3 *1.0754 ± 0.03820.5861 ± 8.2 × 10−40.7147 ± 0.0568
4 *20.6079 ± 0.201718.1826 ± 0.132310.5079 ± 0.9322
5 *n.a.n.a.n.a.
60.0549 ± 6.33 × 10−30.0167 ± 5.53 × 10−30.0537 ± 0.0163
70.0901 ± 0.03420.0256 ± 9.56 × 10−30.0761 ± 0.0287
80.2827 ± 0.02810.0658 ± 0.01050.1695 ± 0.0331
91.2783 ± 0.04330.3228 ± 0.03210.4141 ± 0.0353
101.3769 ± 0.03920.3178 ± 0.02850.4289 ± 0.0458
113.1187 ± 0.10470.7047 ± 0.10100.7191 ± 0.0412
124.5348 ± 0.13261.3645 ± 0.20411.1473 ± 0.0625
1310.8739 ± 0.22864.5508 ± 0.30562.5840 ± 0.0589
1428.6842 ± 0.585618.6987 ± 0.61289.7200 ± 0.1210
1543.8781 ± 0.713424.0273 ± 1.039110.9021 ± 0.1580
16n.a.n.a.15.4585 ± 0.4210
17n.a.n.a.n.a.
18n.a.n.a.n.a.
19n.a.n.a.n.a.
20n.a.n.a.n.a.
* means the instance belongs to Case 1, otherwise it belongs to Case 2.
Table 5. The allocation schemes and objective values of some instances obtained by MMRCH-LS.
Table 5. The allocation schemes and objective values of some instances obtained by MMRCH-LS.
No.Allocation Scheme of SensorsAllocation Scheme of WeaponsObjective Value
1 *(0 2 0 3 1)(2 0 1 3)4.4490
2 *(4 3 1 8 2 7 0 0 6 5)(1 4 7 5 0 3 8 6 2)17.2214
3 *(9 10 16 5 20 8 3 1 14 7 2 11 13 12 19 4 6 15 17 18)(8 19 1 6 17 13 9 16 5 14 10 7 15 18 4 20 3 12 2 11)54.9023
6(6 6 7 3)(6 6 3 7 6)10.5315
7(1 3 6 3 1 7 7)(3 1 7 1 7 3 6)15.6225
8(6 11 4 9 12 7 7 8 4 11)(7 7 8 11 9 4 12 6)30.3581
9(13 10 8 3 5 3 10 5 2 13 12 7 8 4 9)(10 2 8 3 13 7 12 5 7 8 3 9 8 5 12 13 2 4 10)44.0332
10(3 5 12 6 1 13 2 5 7 3 6 7 12 2 4 12 3 15 1)(6 1 7 3 13 3 7 2 12 15 4 5 13 6)47.2940
* means the instance belongs to Case 1, otherwise it belongs to Case 2. The allocation scheme of sensors in instance No.1 means that the sensor 2 is allocated to target 2, sensor 3 is allocated to target 3, and sensor 4 is allocated to target 1; 0 means the unit is not allocated to any targets.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, G.; He, G.; Zheng, M.; Zheng, A. Uncertain Sensor–Weapon–Target Allocation Problem Based on Uncertainty Theory. Symmetry 2023, 15, 176. https://doi.org/10.3390/sym15010176

AMA Style

Li G, He G, Zheng M, Zheng A. Uncertain Sensor–Weapon–Target Allocation Problem Based on Uncertainty Theory. Symmetry. 2023; 15(1):176. https://doi.org/10.3390/sym15010176

Chicago/Turabian Style

Li, Guangjian, Guangjun He, Mingfa Zheng, and Aoyu Zheng. 2023. "Uncertain Sensor–Weapon–Target Allocation Problem Based on Uncertainty Theory" Symmetry 15, no. 1: 176. https://doi.org/10.3390/sym15010176

APA Style

Li, G., He, G., Zheng, M., & Zheng, A. (2023). Uncertain Sensor–Weapon–Target Allocation Problem Based on Uncertainty Theory. Symmetry, 15(1), 176. https://doi.org/10.3390/sym15010176

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop