1. Introduction
Modern air attack operations are completed by the cooperation of a variety of weapons, including cruise missiles, ballistic missiles, guided bombs, bombers, attack aircraft and helicopters. The design method of the interception plan of the traditional air defense weapons is difficult to adapt to all-weather, all-airspace, multi-level and saturated air attack modes. At present, the design method of an air defense weapon interception scheme has not yet formed a complete theoretical system. Most of the research is only focused on specific practical problems, and the optimization mathematical model is established according to certain assumptions. Hence, it is difficult to achieve the maximization of air defense efficiency and minimization of interception cost at the same time.
With the development of unmanned technology, artificial intelligence technology and big data technology, battlefield perception is becoming more and more ubiquitous, and cluster operations are becoming more and more autonomous and coordinated, and combat system are becoming more and more cloudy. Faced with more diversified and intelligent means of enemy surprise defense, passive defense is less favorable. At the same time, air defense and anti-missile operations involve a large number of elements, changing operational styles, which puts forward higher requirements. An air defense and antimissile command control system is the core of realizing an air defense and antimissile network and systematic operation. How to find the most effective and appropriate command and control method to maximize its effectiveness has become a key problem in the research process of air defense and antimissile command and control systems. The intelligent command and control system can greatly improve the robustness and agility of the system, which is the inevitable direction of the development of the intelligent command and control system in the future.
Due to the continuous development of artificially intelligent (AI) technologies such as exploring big data, data mining and deep learning, more and more researchers are combining AI technology with aerospace defense, and use intelligent technology and big data to promote the upgrading of aerospace defense systems. Hughes [
1], Liu [
2] and Bai [
3], in order to meet the urgent demand for real-time intelligent assignment of weapon targets in the highly dynamic environment of modern air defense operations, considering the number of weapons and interception capability, taking the maximum damage efficiency as the optimization target, established an optimization model for weapon target assignment, and then a method of intelligent allocation of air defense weapon targets based on a neural network was proposed. On the basis of depth analysis of the main factors affecting the air defense operations of missile mixed groups, Liu [
4] and Wang [
5] aimed at the combat effectiveness assessment of the ground-air missile mixed group, applying BP neural network technology to establish the air defense combat effectiveness evaluation index system and effectiveness evaluation model, and evaluated the combat effectiveness of the ground-air missile mixed group. In the literature, Wang [
6], Chang [
7] and James [
8] solve the problem of insufficient speed of the optimal algorithm of allocation strategy in large-scale scenes through combining deep reinforcement learning with it and intelligently solving the problem of large-scale air defense task allocation. In the references, aiming at the problems of multiple and complex weapon target allocation constraints in current air defense operations, the traditional model cannot truly reflect the war process, and model credibility is low; a weapon target optimization allocation model based on multi-agent system theory is proposed and solved by using an improved and accelerated gradient descent algorithm. Wang [
9], Liu [
10] and Dong [
11] have, respectively, studied the weapon assignment interception and air defense combat system by using neural network technology, but have not studied the timeliness of air defense interception or proposed an optimization scheme for intelligent algorithms. Although researchers [
12,
13,
14,
15] proposed a solution to the timeliness problem of air defense tasks in the reference, they only combined deep learning with an air defense allocation algorithm, and did not propose an optimization scheme for the algorithm to improve its fast convergence. In these references, although the improved AGD-distributed multi-intelligence system solves the problem of weapon distribution in air defense operations, the timeliness of air defense is not studied. Researchers [
16,
17,
18,
19,
20] also paid attention to the combination of AI techniques and military missions, and some AI methods are developed for anti-missile, anti-ship, anti-aircraft missions. The researchers pointed out that AI techniques are key to future war and need much more attention.
In addition, AI technologies, such as deep learning and data mining, are not only applied to air defense, but also widely used in various fields, such as spacecraft fault diagnosis, drones, robots, navigation, image processing, network security and so on. It can be seen that AI technology has been widely used in various scientific and technological fields, and plays an important role in the development of various aspects of science and technology. In this study, an algorithm that can quickly give interception plans and plan generation is proposed to meet the air defense mission requirements of large-scale aircraft attacks. Its main advantages and characteristics could be concluded as follows: (1) the interception-cost mixed optimal function is established; (2) the system optimization objective is clarified. An A* optimization algorithm with fast convergence rate is proposed to solve the optimization problem. Finally, the proposed method is verified by numerical simulations.
2. Mathematical Model
Suppose the enemy attack weapon platform cluster is defined as follows.
, and
ith intercept target is launched from origin
O at the initial moment, the whole trajectory is in its orbit
xOz plan and satisfies the parabolic form as shown in Equation (1).
Similarly, assume our interceptor weapon platform cluster is defined as follows.
, assume the initial position selected region
of
jth interceptor is consist of excluding
disjoint disc regions in the
xOy plane, that is
All parameters of our interceptor in the above equation are known.
It is also assumed that interception region satisfies
Taking into account the possible local orbital maneuvers, interference, etc., we assume that the probability of our interceptor successfully intercepting the enemy’s
ith aircraft is
, after reaching the interception area. Meanwhile, the cost function of our launching
ith interceptor is
. Then, the probability function describing of our interceptor cluster intercepting the enemy’s aircraft destruction is
where
,
are the value function and cost function of
ith enemy weapon and
jth of interceptor,
is the possibility value parameter which describes the importance of interception possibility (larger
means the enemy weapon is more important and needs to be intercepted even with higher cost), and
meets
3. Problem Description
The object of this study can be summarized as follows. Find the mapping of our interceptor for the enemy’s aircraft under condition of Equations (1)–(3) and (5), and maximize the objective Equation (4).
However, it is worth noting that due to the specificity of the problem, this study has the following characteristics for its research question.
(1) Time sensitive: generally the time window from detecting enemy strike targets to enemy weapons hitting our target is usually in the order of minutes, which also involves the command chain of our decision–command–combat platform, so the time left for generation of air defense interception plans is extremely short.
(2) The large amount of data: the weapon, from the enemy’s weapon platform to our interception platform, may be more than a hundred kinds, and the large amount of data computing further intensifies the urgency of the problem of time sensitivity.
(3) The algorithm must converge: an urgent combat threats scheme generation system cannot accept the results of algorithm dispersion, which would result in no scheme generation. In other words, the scheme generation algorithm must be convergent.
In summary, the problems faced in this study lead to the disadvantages of the traditional variational approach to solving optimization problems in terms of a large number of operations and slow convergence rate, while the current emergence of big data and reinforcement learning methods have the disadvantages of time sensitivity, and the possibility of non-convergence, so it is necessary to find a new method to solve the problem of air defense interception scheme generation.
4. Modified A* Algorithm
4.1. Scheme of Modified A* Algorithm
A* algorithm, as a heuristic algorithm, synthetically examines the relationship between intermediate nodes and the edge values between the initial and final points. If the problem of path search has a solution, it can find the optimal path in the feasible solution, and avoid excessive unnecessary search loss; if the algorithm fails to obtain the feasible solution, it is known through the algorithm’s traversal of all nodes in the grid that there is no feasible path between the initial and final nodes.
Its advantages are: (1) the algorithm structure and process are simple and reliable; (2) the number of nodes can be counted; (3) the convergence capability is strong. This algorithm starts from the center point and spreads around to find the optimal solution of the objective function, so the convergence capability is strong (even if there is no subsequent better result and the algorithm spreads, the initial value is the optimal output; hence, the system can guarantee the existence of the output).
The core advantage of this algorithm is that a heuristic function is set up to assign different weights to each node, which determines the direction of the path search and improves the search efficiency. The general form of this heuristic function is
where
h(
n) is the difference of the optimization function between the beginning and end of the path containing node
n;
p(
n) is the difference of the optimization function between node
n and the initial node;
f(
n) is the difference of the optimization function between node
n and the next code. Thus, if the shortest path is the goal, we only need a node that minimizes
h(
n) as the priority search direction. In turn, the optimization problem is transformed into a system node-partitioning and node-finding problem.
Standard A* optimization algorithm has the advantage of simple structure and strong adaptability, but its disadvantage is its long and non-smooth path. In this study, the standard A* algorithm is modified from following aspects: (1) implement the sugar diffusion algorithm to deduce the computation of meshing grids; (2) implement the direction expand method to reduce the time to find the path; (3) clear the redundancy nodes by secondary redundancy method to simplify the path; (4) implement the adaptive smoothing algorithm to smooth the generated path.
Comparing with the standard A* optimization algorithm, the specific steps proposed in this study of the algorithm are follows.
Step 1. Set flag bit s for the initial node and place it in the Opened table.
Step 2. With s as the current node, place all the nodes adjacent to it into the Opened table, and calculate the corresponding heuristic function value h(n), and set s point as the parent of each adjacent node. Finally, move the point s into the Closed table as the examined node.
Step 3. If Opened table is empty, the optimization search fails and there is no solution. Instead, the node corresponding to the smallest h(n) is moved into the Closed table. For convenience, this part assumes that its parent node is b.
Step 4. If a is the target node and the path search is successful, output the path and end the program. If not, go to the next step.
Step 5. With a as current node, repeat the process of step 2 to step 3 to find the node c corresponding to the smallest h(n) and set the parent node of c as a. Note that if the node adjacent to a is already in the Closed table, it is not examined.
It is worth noting that during the search process, the objective function of node b to c needs to be examined. If it is smaller than the actual objective function optimization result to a, the parent node of c needs to be set to b, otherwise remains unchanged. In addition, for the optimal path search problem, if there is a feasible solution, the A* algorithm is solvable; if f(n) is solvable in the heuristic function, the optimal path is solvable.
The process of the modified A* algorithm is given in
Figure 1 and the orange brackets are the modifications made in this study.
4.2. Sugar Diffusion Method
The A* algorithm tends to consume a lot of time in path planning when the map is more complex, as shown in
Figure 2.
The blue boxes in
Figure 2 represent the passable areas, the orange boxes represent the obstacles, and the gray boxes represent the boxes that the A* algorithm has searched during the path planning. In order to find the correct path nodes, we need to backtrack the whole algorithm and recalculate the
f(
n) values of different raster, thus the A* algorithm takes a lot of time trying to jump out of the black box to find the grid labeled 3.
In order to solve this problem, this study adopts the sugar diffusion method to preprocess the map, number the map raster, and then improve the A* algorithm heuristic function according to the raster number, which can quickly jump out of a complex environment and reduce the computational time of the algorithm. The sugar diffusion method was firstly proposed to solve the problem of “gyration structure” of the map in a special case of the ant colony algorithm. It is assumed that there is a strongly smelling food at a certain point of the map, and the smell of the food will be radiated to the surrounding area in layers, with the strongest smell in the grids where the food is located and the lighter smell in the grids which are farther away from the food. The odor concentration of the grids on the same layer is the same, and all the grids with odor radiation are marked with the odor element value in turn.
The biggest advantages of the sugar diffusion method are twofold. Firstly, all the passable areas of the whole grid map can be marked with the odor element value, and only the obstacle grids or the passable areas completely surrounded by the obstacle grids will not be marked; secondly, the sugar diffusion method has a single tendency. Therefore, the end point can be set as the “food center”.
The sugar diffusion method can also choose 4-neighborhood diffusion and 8-neighborhood diffusion when odor diffusion is performed, and the 8-neighborhood diffusion method is chosen in this study. The diffusion process of the sugar diffusion method is shown below.
(1) Creates a collection of marked odor raster P and the initial state of the collection P is empty.
(2) Consider the endpoint as the raster where the food is located, and mark the odorant value as 1, and add the endpoint to the set P.
(3) Take all the grids with the smallest odorant value from the set P and denote the value of the odorant as , then 8-neighborhood expansion is performed with these grids as the center. If the neighboring grid is an obstacle, the grid should be ignored; if the neighboring grid is not tagged with odor value, its odor value is marked and is added to the set P; if the neighboring grid is already in the set P, the grid should be ignored.
(4) After all the grids with the odor element value are expanded, if there are still grids in the map that are not marked as passable areas except for the obstacle grids and the passable areas completely surrounded by the obstacle grids, then go back to step 3 and continue the next expansion step until the whole map is marked.
4.3. Direction Expand Method
The traditional A* algorithm searches in eight directions, as shown in
Figure 3, where the yellow dots represent the robot’s retaining wall location and the numbers 1 to 8 represent the eight search directions of the A* algorithm.
Through the study, it is known that each expansion only searches a limited number of directions. It can determine the next node with the same 8 directions searched, then the directions that do not need to search can be called useless directions. Such a diagram is shown in
Figure 4.
The red dot in
Figure 4 represents the end point of this path planning, and the green rectangle is the obstacle. The current location of the robot is in the same horizontal line with the end point. When searching using the traditional A* algorithm, by comparing the
f(
n) values of 8 directions, the
f(
n) value of direction 4 is the smallest, and the next node of this extension is determined to be the node where direction 3 is located. The analysis shows that from the current path node, only search {3,4,5} in three directions can be derived from the next node for the direction 3 node, and at this time there is no need to search the remaining directions, which we call useless directions.
For this characteristic, we propose a directional expansion improvement to the traditional A* algorithm, which divides the 8 search directions into different sets of directions, selects a specific set of directions according to the relative position of the current path node and the end point at each search, and carries out direction expansion according to the directions in the set, ignoring the expansion directions outside the set. This method can achieve the purpose of reducing the search range and computational effort of the algorithm.
The specific step of directional expansion is that the coordinate difference between the current path node and the end point is found according to Equation (7).
where
denotes the end point coordinates, and
denotes the current path node coordinates.
The magnitudes of
and
values are compared separately into 8 cases, and the 8 search directions are divided into 8 different sets of extended directions, and the corresponding sets of search directions are selected according to the different magnitude cases of
and
in Equation (8).
The numbers in the set of 8 search directions correspond to the different search directions in
Figure 3. In this way, the number of directions can be reduced from the traditional 8 to 3 or 5 for each search, thus reducing the search range and computational effort of the algorithm. In addition, to avoid the failure of directional expansion in extreme map environments, the traditional 8-neighborhood expand method is used to determine the next node at a node when the next node cannot be searched by the direction expand method.
4.4. Secondary Redundancy Clear Algorithm
Path redundant node means that the path length can be reduced after the node is deleted, and the optimized path will not cause safety problems to cross obstacles, and the redundant node in the path planned by the traditional A* algorithm is caused by its search mechanism.
In this study, we propose a secondary redundancy clear algorithm with a safe distance limit to reduce the path length by removing redundant nodes on the premise that the distance between the path and the obstacle is sufficient for the actual movement of the robot. The secondary redundancy clear algorithm is improved on the basis of the common redundant point removal algorithm, and the algorithm flow of the common redundant point removal algorithm is as follows.
(1) Obtain the coordinates of all nodes on the path planned by the traditional A* algorithm and put them into the set in which node denotes the starting point and node denotes the end point.
(2) Create a set W to hold critical nodes that cannot be removed, and the initial state of W includes only the starting point and ending point .
(3) Judgment from the starting point
, firstly connect the nodes
and
to get the straight line
, as shown in
Figure 5, and judge whether the straight line
passes through the obstacle, if the straight line
does not pass through the obstacle, then prove that the node
is a redundant node, and delete the node
from the set {
}, then connect the straight line
for judgment until the line between
and some intermediate node
passes through the obstacle, then prove that the node
is a key node. Put
into the set
W, then start from the node
, connect the straight line
and continue to judge backward until it connects to the end point
to finish all judgments.
(4) At this point, the nodes in the set W are all the retained key nodes, and the optimization of the paths can be completed by connecting these nodes in turn.
However, the common redundant point removal algorithm determines whether a node is redundant by directly detecting whether the two-point line crosses the obstacle. If it does not, the intermediate node is removed. However, there are special cases when the two-point line may produce a tangent to an obstacle, as shown in
Figure 6.
The black dots 1, 2 and 3, in
Figure 6, are the original path nodes determined by the traditional A* algorithm. When using the common redundancy removal algorithm, the line 13 is connected to determine whether it passes through the obstacle, and since the line 13 is tangent to the vertex of the obstacle, it does not pass through the obstacle, so the black dot 2 is determined as a redundant node, and the optimized path has dot 2 removed. Therefore, the path optimized by the common redundant point removal algorithm is not suitable for the actual robot walking.
To deal with such issue, this study sets the safety distance between the redundant points and the obstacles on the basis of the common redundant points removal algorithm: each time after connecting the straight line to two points, according to Equation (9), the connected line is divided into
k equal parts, and the distance between the
k equal parts and the center point of all obstacles is judged in turn whether it is less than the preset safety distance, as shown in
Figure 7. Only if the distance between all the equipartition points and the center point of the obstacle is greater than the preset safety distance, then the nodes between the two points constituting the straight line are considered as redundant nodes and can be removed; when there is any equipartition point whose distance to the center point of the obstacle is less than the preset safety distance, then the redundant point removal operation cannot be performed. In this study, the preset safety distance is the length of the side of a grid.
where
function is used to find the Euclidean norm;
function is used to find the nearest integer not less than the number in parentheses;
is any positive integer. The larger the value of
, the more equal points are inserted in each straight line, and the higher the accuracy of judging whether the path is safe, but the computational load of the overall algorithm will be greatly increased. Through experimental comparisons,
here, has the best effect.
The yellow dots in
Figure 7 are the equipartition points of the line
, and the green dot is the center point of the obstacle. From
Figure 7, we can see that since the distance between the three aliquots and the center point of the obstacle is greater than the edge length of a raster, the line
satisfies the safety distance condition, so the node
is a redundant node that can be removed.
4.5. Adaptive Path Smoothing Algorithm
B spline curve is a common curve-fitting method, which is a generalization of the Bezier curve. Due to the defects of the Bezier curve such as inflexibility, poor control, and difficulty in making local modifications, Gordon et al. extended it and proposed the B spline curve, which retains all the advantages of the Bezier curve, while overcoming its drawbacks.
The B spline curve can be expressed by
where
is the position phase measure of each feature node and
is the
k-order spline piecewise mixing function and
is expressed as shown in
The full name of these curve segments is k times B-sample curve (k = 0, 1,…, m). The magnitude of k value reflects the smoothness of the curve. If k increases, then smoothness of the curve increases, but the computational effort also increases.
When
, the primary B-sample curve at this point is a straight line determined by the starting point and the ending point, and its mathematical expression is given by Equations (10) and (11) as
When
, an example graph of a quadratic B spline curve is shown in
Figure 8, which consists of four B spline curves. Each individual curve is controlled by three adjacent vertices. The quadratic B-sample curve given by (13) is indicated.
When
, an example plot of a cubic B-spline is shown in
Figure 9, which consists of 3 B-splines. Each individual curve is controlled by four adjacent vertices. Quadratic B-splines can be expressed using the Equation (14).
Considering the path optimization effect and the calculation amount of the algorithm, the cubic B-spline curve is selected for curve fitting by experimental comparisons, but because the distribution of the path nodes used to fit is relatively discrete, if the cubic B-spline curve is directly used for fitting, the path may pass through the obstacle due to the excessive amplitude of the fitting curve, so this study proposes an adaptive path smoothing algorithm based on the cubic B-spline for smoothing.
Firstly, the path nodes optimized by the secondary redundancy removal algorithm are obtained, and local endpoints are added near each path node except for the start and end points in an adaptive manner. The local endpoints are added as shown in
where
is the added local endpoints;
,
and
are the coordinates of each path node, and
len is the map edge length. Equation (15) can be used to add local endpoints with different spacing according to different distances between two nodes in maps of different sizes, as shown in
Figure 10, where the black dots are the path nodes and the blue dots are the added local endpoints. It can be found from
Figure 10 that since the length of
is greater than
, the local endpoint spacing on
is greater than the local endpoint spacing on
.
By using both the path nodes and the added local endpoints as the feature nodes for curve fitting in Equation (12), and then fitting the curve, we can reduce the amplitude of the fitted curve and avoid obstacles while ensuring the smoothness of the curve.
5. Interception Constraints
Once the theoretical optimization approach is given, there is one more step (the interceptability criterion of our interception platform for enemy strike weapons) to be performed before the optimization process can be carried out. Generally, without considering the enemy weapon maneuver (if the enemy’s weapon has end maneuver capability, it is considered that the interception probability of our weapon is reduced), the conditions for our weapon to intercept the enemy weapon mainly depend on the time criterion, the speed criterion and the overload criterion. Our weapon can be considered to have the ability to intercept the enemy weapon if the above three conditions are satisfied. Such three conditions are introduced as follows.
(1) Time criterion. The physical meaning of this criterion is that our vehicle is able to approach the enemy weapon close enough and intercept it before it hits our target. We only consider the motion of the enemy vehicle in the
xOz plane in this study, and its altitude is 0 when it hits our target. Considering the most extreme case under this condition we have
Hence, our vehicle needs to approach the enemy vehicle within the threshold time. That is,
where
is the speed of out
jth vehicle and
is the initial distance between our
jth interception platform and the enemy
ith weapon defined as
Thus, if Equation (17) is satisfied, the time constraint is satisfied.
(2) Speed criterion. Speed criterion refers to whether our vehicle has the ability to intercept enemy weapons at the end of interception. The current guidance methods, such as proportional guidance method, parallel approach method, etc., require our vehicle’s speed to be larger than that of the enemy vehicle, so that the enemy weapon can be tracked at the end. This means our vehicle should meet the following condition
where
,
are the leading angles of the
jth and
ith vehicles of enemy and our side. Considering the worst condition, Equation (19) can be further simplified to
with
denoting the maximum forward angle of our vehicle.
(3) Overload criterion. In the guidance end, the line-of-sight guidance method, the parallel approach method and the most mainstream proportional guidance method require our vehicle to have a strong overload capacity to realize the end of maneuver. In other words, considering the requirements of the normal overload, we have
In the most extreme cases, we have
Thus, our overload needs to meet
This is the empirically determined minimum lead angle for our vehicle.
To sum up, the criteria (17), (20) and (23) need to be satisfied so that our vehicle is qualified to intercept and can enter the pool of selected weapons. Otherwise, it will be removed from the pool.
6. Plan Generation Process
Based on the optimization method and mathematical models in previous sections, the specific steps to generate the air defense interception plan are as follows.
(1) Enter the data of the enemy and our weapons.
(2) Intercept ability judgement based on enemy and our weapon parameters, and screening of our interceptor platform weapon pool with intercept ability for each enemy weapon.
(3) Grid division. Construct a two-dimensional space with the vertical axis coordinates as our weapon number and the horizontal axis coordinates as the enemy weapon number. If our interceptor weapon j is assigned to intercept enemy weapon i, its grid coordinates are (i, j).
(4) Determine the initial value of the plan. In this study, the initial value is the single interceptor weapon with the highest probability of interception for us against enemy weapons.
(5) Calculate the objective function and use it from the starting node to the surrounding nodes to perform A* optimize.
(6) Determine whether the objective function is optimized; if it is, reconfigure the weapon and configure the weapon pool, update the node; if it is not, go directly to the next node.
(7) Node ergodicity judgement. If the exploration completes the square grid region consisting of region (0, 0) (i, 0) (0, j) (i, j), then the node search for optimization is completed and the result is output; if not, then the search for optimization continues from the current node.
The process to generate air defense interception plan is shown as
Figure 11.
7. Numerical Simulations
In order to demonstrate the superiority of the proposed method in this study, the standard A* optimization algorithm, ant optimization algorithm and sequence allocation algorithm are compared.
Firstly, set interception scene parameters. Assume there are 10 enemy missiles and their initial states are as
Table 1.
Set our interception weapons parameters as
Table 2.
Noting that the possibility value parameter partly determines the algorithm performance, hence, the simulation is made under 10 cases, i.e., , and the simulation results are given as follows.
Remark: Noting that there are many enemy weapons and interception weapons (total amount is 30 and the amount involves interception is more than 25), it is difficult to demonstrate all the interception process and, noting that the focus of this paper is the scheme generation algorithm, it is also meaningless to demonstrate all the interception process, hence, in this paper only the result of air-defence is demonstrated. Moreover, the
X-axis of following figures is the possibility value parameter
l (since the simulation is conducted by different possibility value parameter which describes the interception resolution strength), and its
Y-axis is the value of the figure title(such as
Figure 1 its
Y-axis is the value of optimizations function).
Based on
Figure 12, it could be found that the modified A* algorithm has the best object function under most conditions, which means the proposed has the best optimization for the plan generation algorithm. Based on
Figure 13, it could be found that the proposed method could intercept all incoming enemy weapons for four conditions which performs best among all methods. In addition, it could be found that if the number of intercepted weapons is the core concern, we need to set larger possibility parameter
l. Based on
Figure 14, it could be found that the cost of our weapons is relatively low comparing with other methods (only bit larger than sequence allocation algorithm). Based on
Figure 15, it could be found that the plan generation time for the proposed method is also relatively low among all methods. The performance of all methods could be concluded as
Table 3.
Based on the simulation results, it could be found that the proposed method has the best optimization performance and the lowest cost. Meanwhile, the plan generation time is largely reduced compared with the standard A* algorithm and the structure is relatively simple. This demonstrates the effectiveness and superiority of the proposed method in this study.
8. Conclusions
In this study, the standard A* algorithm is modified for air defense interception plan generation. The proposed methods and the simulation results demonstrate the following conclusions. (1) By meshing the grid properly, the convergence rate of optimization algorithm is improved, and the sugar diffusion method is an effective method for meshing grid. The proposed method has better convergence rate (improved more than 30%) by implementing this method and it is insightful for other optimization algorithms. (2) The optimization direction is another key issue for optimization methods, and in this study, the direction expansion and secondary redundancy clear method could help the optimization process. This property is proved by numerical simulation results. (3) The air defense interception mission is very sensitive to reaction time, which corresponds to system convergence rate and algorithm complexity. The structure of the proposed method is still relatively complex and this still needs further improvements in future research; (4) Comparing with standard optimization methods under air-defence background, the proposed modified A* algorithm has better optimization performance (optimization function and cost function) and lower convergence rate compared with the standard A* algorithm, hence, it could be concluded that the proposed method is an improvement, compared to the standard A* algorithm.
In addition, it is also worth noting that although a optimization method is proposed in this paper, a hardware-in-the-loop (HIL) simulation, or half hardware-in-the-loop simulation, is not conducted. The reason is the high cost of hardware-in-the-loop simulation of anti-missile experiments, and how to conduct the HIL simulation is the next focus of future work.