Next Article in Journal
Optical Helicity and Chirality: Conservation and Sources
Previous Article in Journal
Designing Safe General LED Lighting that Provides the UVB Benefits of Sunlight
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Coevolution Pigeon-Inspired Optimization with Cooperation-Competition Mechanism for Multi-UAV Cooperative Region Search

1
School of Aerospace Engineering, Xiamen University, Xiamen 361005, China
2
School of Automation Science and Electrical Engineering, Beihang University, Beijing 100191, China
3
State Key Laboratory of Virtual Reality Technology and Systems, Beihang University, Beijing 100191, China
*
Author to whom correspondence should be addressed.
Submission received: 19 January 2019 / Revised: 10 February 2019 / Accepted: 21 February 2019 / Published: 26 February 2019
(This article belongs to the Section Computing and Artificial Intelligence)

Abstract

:

Featured Application

Authors are encouraged to provide a concise description of the specific application or a potential application of the work. This section is not mandatory.

Abstract

In this paper, a dynamic two-stage closed search (DTSCS) scheme for the unmanned aerial vehicle (UAV) cooperative region search is designed, which satisfies the range constraint (RC) and orientation constraint (OC). The closed trajectory is composed of two coupling stages, the search stage and the return stage. The position and orientation at the end of the search stage are the starting cell and orientation of the return stage. In the first stage, a coevolution pigeon-inspired optimization (CPIO) algorithm based on the cooperation-competition mechanism is proposed for multi-UAV cooperative search. In the return stage, inspired by region searching and trajectory tracking, a search tracking (ST) approach is presented to obtain the lowest-cost path under OC. The simulation results show that: (i) N p = 5 is the best prediction time step. (ii) CPIO algorithm performs better than the compared intelligent algorithms in region searching. (iii) ST has high tracking performance than other algorithms. (iv) The DTSCS scheme enables every UAV to make the best use of its fuel to cover more region and return to the airport within the RC, and the average range utilization of UAVs is 97% under the 3OC.

1. Introduction

In the wide-area, complex and changeable environment, multiple unmanned aerial vehicles (UAVs) cooperative control is a critical research field [1,2,3,4] of unmanned system. In particular, multi-UAV cooperative search (MUCS) can be applied to prevent forest fires, patrol the border and probe potential safety hazards in cities and other aspects. Therefore, the study of MUCS strategy has practical significance. In [5], Sujit uses k-shortest path algorithm to search the target in an uncertain environment, but this algorithm cannot adapt to the situation that the edge weights of the search cell changes with the number of UAV passes. In [6], Bertuccelli models the uncertainty in the environment as the prior probabilities in the region and uses the Beta distribution to predict the minimum number of times required by UAV to search the target. This method, however, only considers a single UAV. Riehl transforms MUCS into a finite sequence of updates to a dynamic graph via sampling region with a high probability of target existence in [7], but ignores the orientation constraint (OC) of UAV. In [8], Tian maps the search rewards of the target to fitness function and proposes a coevolution genetic algorithm to search the random target under the OC of UAV. In [9], Hu designs a multi-agent mapping fusion scheme based on distributed control, which converges the individual search probability of agent to the whole searching region. Nevertheless, this method does not take into account the impacts of environmental conditions.
Currently, almost all achievements on MUCS have mentioned that the range limits the application of UAV. To our knowledge, however, there is no study of the search strategies of MUCS under the range constraints (RC). The motivation of this paper is to present a new search strategy considering the range constraint (RC) and the OC. The search path of UAV under RC should be a closed trajectory. UAVs set out from the airports and need to return to their respective airports after completing the search task. The search algorithm based on an intelligent algorithm has been proved to be superior to the traditional optimization algorithm in [10,11,12]. Intelligent algorithms start the optimization with a series of possible solutions, and their performances depend primarily on the parameter initializations. Therefore, the constant parameters are not entirely consistent with the evolutionary spirit of the algorithm itself [13,14,15]. The results of optimization may be premature, divergent or locally optimal. Duan presents the pigeon-inspired optimization (PIO) algorithm based on a dynamic size of solution agents in [16]. Map and compass operator and landmark operator are used respectively by the distance of the pigeons from the target. Although there are only two switching operators, the optimization ability of PIO has been verified to be better than other heuristic algorithms in many applications [17,18,19].
The grid map can accurately describe the size, location, and shape of obstacles. Eight non-obstacle neighbor cells are reachable nodes for every cell. Its center is the allowed waypoint [20,21]. The lowest-cost path in grid model corresponding to finding a suitable sequence of cells to move the UAV from the original cell to a goal cell such that its total accumulated expenditure is minimized. The least-cost path solved by Dijkstra algorithm [22] or A* algorithm [23] does not take into account the OC of the UAV. It is assumed that the cells sequence of the lowest p a t h a without the OC is P a ( L a ) = { L a ( 1 ) , , L a ( h ) , , L a ( N a ) } ( h = 1 , , N a ) , in which L a ( h ) is the cell that p a t h a contains. After adding the OC, if an element of P a ( L a ) is not in the feasible region, p a t h a will become a illegal path. Therefore, A* algorithm and other algorithms cannot find the lowest-cost path under the OC.
Our contributions: (i) We apply the concept of the closed search to MUCS for the first time, and design a dynamic two-stage closed search (DTSCS) scheme to realize the closed path search of UAV. The first stage is the search stage, and the second stage is the return stage. The pose, position and orientation, at the end of the search stage is the starting pose of the return stage. (ii) Inspired by the cooperation-competition relationship between subgroups within a population in nature, a CPIO algorithm based on the cooperation-competition mechanism is used as the search algorithm for MUCS in the first stage. Every subgroup pigeons is abstracted as one UAV. The cooperation-competition relationship between pigeons reflects the cooperative relationship between UAVs. (iii) In the second stage, a search tracking approach (ST) is proposed. The cells containing in the lowest-cost path without the OC are modeled as the key regions in the region searching. The basic PIO algorithm is used to obtain the lowest-cost path from the starting point to the goal point which satisfies the OC. Maximizing search rewards is equivalent to minimizing tracking errors.
The rest of the paper is organized as follows. Section 2 introduces the concept of the closed path and the basics of region searching. In Section 3, A CPIO algorithm based on the cooperation-competition mechanism is proposed for MUCS. A ST approach is given to obtain the lowest-cost path with the OC in Section 4. Section 5 describes the DTSCS scheme. Numerical simulations and analysis are drawn in Section 6. Concluding remarks are given in the final section.

2. Problem Formulation

The searching region is usually divided into grid cells. The target existence probability (TEP) represents the probability of target existence in a cell. Environmental uncertainty (EU) indicates the degree to which UAVs do not know about the environment. These two variables are regarded as prior information. Every cell is modeled as the key or non-key region, and then the search probability graph of the whole searching region is formed. UAVs accomplish the search task via environment perception and information interaction. This section includes three parts: the environment model, UAV kinematic model and the analysis of UAV closed search.

2.1. Region Searching Model

This subsection describes the basic mathematical model of region searching. Firstly, rasterizing the searching region, and then the environment information is modeled as the prior probability information. The TEP in the whole search environment is updated by Bayesian rule. And the environmental uncertainty of every cell is updated according to search number of UAVs.

2.1.1. Environment Modeling

UAVs are assumed to fly on a fixed plane above the searching region. M UAVs search N t targets. The searching region R is uniformly divided into L x · L y cells:
R = { C ( m , n ) m = 1 , 2 , , L x ; n = 1 , 2 , , L y } ,
where C ( m , n ) is the coordinate of cell ( m , n ) . The side length of a cell is the unit length. Discretizing searching time of U A V i ( i = 1 , 2 , , M ) , U A V i can search a cell in one time step [24,25]. The real-time position of U A V i can be described by the geometric center of the cell it searches.

2.1.2. Probability Map Update

It is known that the TEP P e m , n ( k ) [ 0 , 1 ] and the EU χ e m , n ( k ) [ 0 , 1 ] . If 0 P e m , n ( k ) 0.3 and 0 χ e m , n ( k ) 0.3 , the cell (m, n) is modeled as a known region. If 0.3 < P e m , n ( k ) 0.7 and 0.3 < χ e m , n ( k ) 0.7 , the cell (m, n) is modeled as a non-key region. And if 0.7 < P e m , n ( k ) 1 and 0.7 < χ e m , n ( k ) 1 , the cell (m, n) is modeled as a key region. Dangerous areas, such as hostile radar detection regions, peaks, etc., are designated as no-fly zones. Bayesian rule is used to update whether a cell exists a target [26]. The update equations for the probability that a target exists but is not detected and that the target does not exist but is reported are written as follows:
P e m , n ( k + 1 ) = P e m , n ( k ) P c m , n ( k ) ( P c m , n ( k ) P f m , n ( k ) ) P e m , n ( k ) + P f m , n ( k ) ,
P e m , n ( k + 1 ) = P e m , n ( k ) ( 1 P c m , n ( k ) ) ( P f m , n ( k ) P c m , n ( k ) ) P e m , n ( k ) + 1 P f m , n ( k ) ,
where P c m , n ( k ) [ 0 , 1 ] is the detection probability of the airborne sensor to the target [27]. P f m , n ( k ) [ 0 , 1 ] is the false alarm rate, which indicates the probability that there is no target in the cell but a target is reported. χ e m , n ( k ) decreases with the search number of UAVs, satisfying the following equation:
χ e m , n ( k + 1 ) = 1 2 N f ( m , n ) χ e m , n ( k ) ,
where N f ( m , n ) N is the number of times that a cell (m, n) searched by UAVs.

2.2. UAV Kinematic Model

The kinematic model of U A V i with constant velocity and OC is obtained as follows:
x ˙ i ( t ) = v i ( t ) cos θ i ( t ) , y ˙ i ( t ) = v i ( t ) sin θ i ( t ) , y ˙ i ( t ) = 0 , θ ˙ i ( t ) ε i , v ˙ i ( t ) = 0 ,
where ( x i ( t ) , y i ( t ) , z i ( t ) ) is the position of U A V i , v i is its velocity. θ i is course angle. The fourth term sets the constraint on the angle rate, which cannot exceed ε i . In the grid map, U A V i can only move to one of its eight neighbor cells at a time step, corresponding to the heading D i ( k ) = { 0 , 1 , 2 , 3 , 4 , 5 , 6 , 7 } [28].
Definition 1. (D-orientation constraint, DOC).
In the grid map, The degree of freedom of the heading in which the UAV is allowed to walk in the next time step is D.
A slow-moving robot usually satisfies 8OC (equivalent to no constraint ) or 4OC , as shown in Figure 1a,b. The fast UAV can not turn backward or turn vertically during flying. Therefore, it is subject to 3OC: go straight ( 0 ), turn left ( 45 ), and turn right ( 45 ), which can be seen in Figure 1c. The orientation of the next time step of U A V i can be summarized as follows:
D i ( k + 1 ) = { ( D i ( k ) 1 ) mod 8 , D i ( k ) mod 8 , ( D i ( k ) + 1 ) mod 8 } .

2.3. Preliminary Analysis

In the research of MUCS, we always discuss the cooperative search strategy under the assumption that there is enough fuel, which is not consistent with the actual situation. Every UAV sets out from the airport and returns to its airport after completing the search task. The flight path is a closed track. We divide the closed search into two stages: search stage and return stage.

2.3.1. Closed Path Search

Definition 2. (Closed path).
According to the definition of the loop in the directed graph, a closed path is a flight trajectory of a UAV starting form an airport to carry out task and returning back to the same airport.
The closed search in this paper is different from the traveling salesman problem, which to find a solution that traverses all the reachable nodes from the starting point and returns to the starting point with the least travel cost. In this paper, the closed search refers to the closed path that UAV returns to the airport after completing the search task in the grid map.
Rasterizing searing region is consistent with discretizing searching time, so the RC of UAV is equated with its searching time limit. The closed path of the UAV under the RC should be composed of two stages: (1) search stage; (2) return stage. Long searching time means that UAV has a limited time to return and may not even return on time. And the short searching time means that the UAV can not effectively complete the search task. Ideally, the UAV would return to the airport at the time step when it is running out of fuel.

2.3.2. Search Stage

UAVs accomplish the search task via environment perception and information interaction. The principles of MUCS should include the following:
  • Get the maximum TEP
  • Acquire the maximum reduction of EU
  • Avoid UAVs repeatedly searching the same cell
  • Prohibit collisions between UAVs
  • Fly as far away from the airport as possible to search more unknown cells
  • Avoid searching for locally highly remunerated sequences of cells

2.3.3. Return Stage

Definition 3. (The lowest path with D-orientation constraint).
The solution that the UAV seeks from origin to the goal cell with the smallest travel cost under the OC.
The search strategy is no longer considered in the return stage. Our goal is to find a safe and collision-free lowest path under the OC. This path starts with the current cell and orientation and ends at the airport.
For the closed search, the primary purpose of this paper is to solve the following three problems: (1) Set the time step for UAV to return to the airport; (2) Maximize search rewards in the search stage; (3) The purpose of the return phase is to obtain a shortest path that satisfies the OC.

3. CPIO Algorithm with Cooperation-Competition Mechanism

According to the principle of cooperative search discussed above, we design the reward function of MUCS and regard it as the fitness function of PIO. In [8,29,30] coevolution genetic algorithm (GA) is applied to multi-robot platform to find the optimal solution through the cooperation among robots. In some conditions, the optimal solutions of every robots may sometimes be mutually exclusive. This conflict is consistent with the competition of subgroups in nature. Inspired by the cooperation-competition relationship between subgroups within a biological community in nature, a CPIO algorithm is used as the search heuristics for MUCS in the search stage. The optimal solution obtained via the CPIO algorithm is the position of a target, which is consistent with the attribute of region searching.

3.1. Design Reward Function

The MUCS process is modeled as a multiobjective nonlinear programming function with RC, OC, no-fly zone and collision free and the model is given in Equations (7) and (8):
J 1 = ω 1 q = 1 N p P e m , n ( k + q ) + ω 2 q = 1 N p Δ χ e m , n ( k + q ) + ω 3 q = 1 N p F r ( k + q ) + ω 4 q = 1 N p F a ( k + q ) ,
s . t . R c R , D i ( k + 1 ) = { ( D i ( k ) 1 ) mod 8 , D i ( k ) mod 8 , ( D i ( k ) + 1 ) mod 8 } , T i , 1 ( k + 1 ) < T i , d i j ( k ) , , d i j ( k + N p ) > 0 ,
where ω 1 , ω 2 , ω 3 , ω 4 are weighting factors, which satisfy ω 1 , ω 2 , ω 3 , ω 4 ( 0 , 1 ) and ω 1 + ω 2 + ω 3 + ω 4 = 1 . R c is the searchable region in R. T i , 1 ( k ) and T i are the searching time and the range of U A V i respectively. d i j ( k ) = ( x i ( k ) x j ( k ) ) 2 + ( y i ( k ) y j ( k ) ) 2 denotes the Euclidean distance of U A V i and U A V j . N p 1 is a positive integer. The first and second terms of the J 1 are designed to maximize search rewards, which corresponding to the first and second terms of the principles. The reduction of EU of the cell ( m , n ) can be defined as follows:
Δ χ e m , n ( k ) = χ e m , n ( k + 1 ) χ e m , n ( k ) .
The third of the J 1 is consistent with the fourth of the principles and is designed to avoid collision between UAVs:
F r ( k ) = 100 , d min ( k ) 2 , e 1 d min ( k ) , d min ( k ) > 2 ,
where d min ( k ) is the minimum element of the d i j ( k ) at time step k, and d i j ( k ) is given in Appendix A Equation (A1). When the distance between any two UAVs is less than or equal to 2 unit lengths, the reward of this term will be −100. And then the rewards of J 1 will also be negative. U A V i can only choose to search cells away from other UAVs. With regard to the fourth term of the J 1 , it implies that the further away U A V i is from the airport, the more rewards it obtains (principle 5):
F a ( k ) = e 1 d ( k ) ,
where d ( k ) is the sum of all the elements in d i h ( k ) , which is written in Appendix A Equation (A2).
Definition 4. ( N p -step-ahead prediction, N p SAP).
Learning from the idea of rolling optimization in model predictive control theory [31]. In each term of J 1 designed in Equation (7), the rewards of the reachable cells to be calculated is not only the next time step, but also the next N p time steps.
Remark 1.
Although n steps are predicted in advance each time, U A V i flies forward only one-time step.
The series of reachable waypoints of N p SAP of U A V i maps the predicted cells sequence E i ( k ) = { L i ( k + 1 ) , , L i ( k + q ) , , L i ( k + N p ) } ( q = 1 , , N p ) from the step ( k + 1 ) to the future time step ( k + N p ) , which is based on the present position L i ( k ) at time k. The reachable cells included in 3SAP construct an expanding tree, as shown in Figure 2a. Obviously, the expanding tree generated by N p SAP contains 3 N p alternative paths and the l-th path can be illustrated as:
P i l ( k ) = { L i l ( k + 1 ) , , L i l ( k + q ) , , L i l ( k + N p ) } ,
where L i l ( k + q ) L i ( k + q ) .
The positive aspects of N p SAP include:
  • Avoid greedy thought corresponding to the sixth term of principles referred in Section 2.3.2
  • Circumvent the no-fly zone ahead of time and continue to search the key region
  • Prohibit collision between UAVs
  • Reduce the impact of communication delays
As given in Figure 2b, Comparing the reward of p a t h 1 and p a t h 2 , if N p = 1 , J 1 , 1 ( k + 1 ) > J 1 , 2 ( k + 1 ) , the p a t h 1 is chosen at this time step. Else if N p = 3 , J 1 , 1 ( k + 1 ) + J 1 , 1 ( k + 2 ) + J 1 , 1 ( k + 3 ) > J 1 , 2 ( k + 1 ) + J 1 , 2 ( k + 2 ) + J 1 , 2 ( k + 3 ) , the p a t h 2 will be chosen. For an extreme situation, if N p = T i , 1 , the path with the largest reward in E i ( k ) must be the optimal path in the whole search process. As N p grows, the number of paths increases exponentially. Therefore, we use PIO algorithm to find the optimal solution that is difficult for conventional optimization algorithms.

3.2. Overview of Basic PIO

Inspired by natural phenomenon of the autonomous homing behavior of pigeon swarms, Duan proposes the PIO algorithm in [14], which the optimization process can be divided into two operators based on the distance of the pigeons from the destination.
Operator 1: Map and compass operator
During the prometaphase of the search, pigeons is far away from the goal. The real-time information of the sun is abstracted into map and compass operator to adjust the flight orientation, which is a rough navigation process. Suppose the number of pigeons is C 1 . The position and velocity of p i g e o n a , ( a = 1 , 2 , , C 1 ) in the two-dimensional (2D) plane is expressed as:
L a = [ x a , y a ] , V a = [ v x , a , v y , a ] .
The renewal equations of position and velocity are:
L a u = L a u 1 + V a u , V a u = V a u 1 e R p · u + r a n d ( L b e s t L a u 1 ) ,
where u = 1 , 2 , , N c 1 is the current iteration number. R p is the coefficient of the map and compass operator. r a n d is a random number from 0 to 1. L b e s t denotes the position of the pigeon closest to the goal in the pigeons in iteration u 1 . After N c 1 iterations, the rough navigation stage is completed. PIO algorithm enters the second stage of optimization.
Operator 2: Landmark operator
When the pigeons arrive near the target, the PIO algorithm switches to the landmark operator. The landmark information of the nearby environment will provide precise guidance information. The speed of the pigeon does not change at this stage, while the position is updated:
L c e n t e r v 1 = a = 1 C 2 v 1 L k v 1 · f i t n e s s ( L a v 1 ) C 2 v 1 · a = 1 C 2 v 1 f i t n e s s ( L a v 1 ) ,
L a v = L a v 1 + r a n d · ( L c e n t e r v 1 L a v 1 ) ,
where v = 1 , 2 , , N c 2 is the current iteration number. C 2 v = C 2 v 1 2 is the number of pigeons in v iteration. L c e n t e r v 1 denotes the position of the central pigeon in v 1 iteration. f i t n e s s ( · ) is the fitness function. The optimal solution will be obtained after Operator 2 is performed N c 2 iterations.

3.3. CPIO and Cooperative Search

In biology, a population may divide into some subgroups [32,33]. In the face of natural enemies, the subgroups will cooperate to resist. Nevertheless, they also compete with each other in the interests of food, mating, territory, and so on. Cooperation and competition make the population survive and evolve better. To simulate these natural behaviors, UAVs work together to complete the search task via information interaction, in the mean time UAVs compete with each other to search the specific vital cells. We propose a CPIO algorithm based on the cooperation-competition mechanism as the search algorithm for MUCS, as shown in Figure 3. In which, one subgroup pigeons is abstracted as one UAV. The cooperation-competition relationship between pigeons reflects the cooperative relationship between UAVs.
MUCS based on CPIO is composed of three parts: CPIO, UAVs, and environment model. The principle of which is shown in Figure 4. In the CPIO module, the initial information of the environment, the environment information detected by the UAVs and the real-time pose signals of the UAVs are modeled as prior information. This information is then transmitted to the reward function J 1 . S u b g r o u p i transforms the optimal solution obtained by the cooperative-competitive mechanism into discrete flight signals. And these signals will be transmitted to U A V i at each time step. Thus, the cooperation-competition mechanism can be described as follows:
Cooperation mechanism
  • Get the maximum P e m , n ( k ) and the maximum Δ χ e m , n ( k )
  • Stay away from airports and search for more unknown regions
  • Avoid searching locally highly remunerated cells
Competition mechanism
  • Forbid UAVs to search for the same cell at the same time step
  • Avoid UAVs repeatedly searching the same cell
  • Stay away from other UAVs to search more unknown cells
Under all constraints, the subgroup that maximizes the total rewards will win. Cooperation and competition are not entirely opposed to each other. The winning subgroup will search the controversial cell, and the other subgroups compete to search other cells. The result of the competition mechanism is consistent with the original intention of the cooperation mechanism.
Let f i t n e s s ( · ) = J 1 , thus Equation (15) can be transformed into:
L c e n t e r v 1 = a = 1 C 2 v 1 L k v 1 · J 1 ( L a v 1 ) C 2 v 1 · a = 1 C 2 v 1 J 1 ( L a v 1 ) .
In the searching region, L a u and L a v are neighbor cells of L a u 1 and L a v 1 , respectively. Under the constraint of Equation (6), the position (orientation) in the PIO algorithm can be expressed as:
L a u = { ( L a u 1 1 ) mod 8 , L a u 1 mod 8 , ( L a u 1 + 1 ) mod 8 } ,
L a v = { ( L a u 1 1 ) mod 8 , L a v 1 mod 8 , ( L a v 1 + 1 ) mod 8 } = L a u 1 + r a n d · ( L c e n t e r u 1 L a u 1 ) .
The MUCS process based on the CPIO algorithm can be expressed as Algorithm 1.
Algorithm 1 MUCS based on CPIO algorithm
Input: Initializing environmental information and pose information of U A V i .
Output: The searching trajectory of every UAV and its searching time steps T i , 1 ( k ) .
1: begin:
2:      for k = 1 , , T i  do
3:          Predict N time steps in advance, and get the alternative paths.
4:          Delete the paths that does not satisfy Equation (8).
5:          Use the CPIO algorithm to find the path with the highest fitness value among the remaining paths.
6:          while U A V i receives the return order, U A V i returns to the airport.
7:          Record the searching trajectory and searching time steps T i , 1 ( k ) when U A V i returns.
8:          end while
9:      end for
10: end

4. ST Approach

Inspired by the knowledge of cooperative search and trajectory tracking [34,35], we propose the ST approach. The lowest p a t h a without the OC of motion is mapped to a trajectory to be followed, and the cells it passes through are modeled as the key regions. Other blank cells are shaped as non-key regions, and obstacles are designed as no-fly zones. The input signal is the orientation sequence to maximize the search rewards of U A V i . The process of tracking p a t h a is the same as that of a UAV searching from the starting cell to the goal cell. Since the ST approach is only applied to a single UAV, there is no need to consider the cooperation-competition relationship between UAVs. ST approach based on basic PIO algorithm consists of four operators.
Operator 1: Obtain path a
We use A* algorithm [23] to find p a t h a , and A* algorithm can be simplified as the following steps:
  • Step 1: Specify the OC for the UAV.
  • Step 2: Design a cost function f ( m , n ) = g ( m , n ) + h ( m , n ) , where g ( m , n ) denotes the movement cost: corresponds to the expenditure of moving the current position ( m , n ) to other cell moved into the neighbor. h ( m , n ) denotes the heuristic cost: corresponds to the expenditure of changing from current cell to goal cell. When g ( m , n ) = 0 , A* algorithm degenerates to Dijkstra algorithm. When h ( m , n ) = 0 , A * algorithm degenerates to greedy best first search algorithm.
  • Step 3: Estimate total expenditure h ( m , n ) and change to the cell with the least cost.
  • Step 4: Repeat Step 3 until the goal cell is reached.
  • Step 5: When reaching the goal, choose the final path with least cost.
Operator 2: Mark key cells
Referring to the concept of the TEP in the region searching, the blank cells are set as the non-key regions, which implies P e , i m , n ( k ) = 0 . The cells that the path of U A V i p a t h a , i passes through are marked as the key regions, and their P e , i m , n ( k ) are denoted as follows:
P e , i m , n ( k ) = 1 5 , 1 < s i < N m , i , N f , i = 0 , 1 , s i = N m , i , N f , i = 0 , 0 , N f , i 1 , 0 , f o r o t h e r U A V j ( i j ) ,
where s i = 1 , 2 , , N m , i is the serial number of the mark points from the starting cell to the goal cell in p a t h a , i . s i = N m , i stands for goal point. When the key cell is searched for N f , i = 0 time, the existence probability of the goal cell is set to be 1, and the probability of the other key cell is 1 5 . When N f , i 0 , the probability of the corresponding key cell becomes 0.
Remark 2.
As shown in the fourth term of Equation (20), U A V i will only track p a t h a , i . The key cells marked for other UAVs are non-key cells for U A V i . This ensures that the tracking process of the UAVs does not affect each other.
Operator 3: Design fitness function
The reward function of the ST approach relates only to the TEP for every cell in Operation 2:
J 1 = q = 1 N p P e m , n ( k + q ) .
The original cell of p a t h a is the starting position of the ST approach. And its initial flight orientation is pointed from the starting position to the second cell of p a t h a .
Operator 4: Track path a
The process of tracking is similar to that of Algorithm 1 and can be described as the following steps:
  • Step 1: Initialize the information of the region to be searched and the pose of the UAVs.
  • Step 2: Execute N p SAP, and then get the predicted state sequence E i ( k ) .
  • Step 3: Let f i t n e s s ( · ) = J 2 , the path p i l ( k ) corresponding to the sequence with the greatest fitness in E i ( k ) solved by basic PIO.
  • Step 4: U A V i flies forward for a time step.
  • Step 5: Repeat Step 2 to Step 4 until the goal cell is searched.
  • Step 6: When reaching the goal, choose the final path with least cost and OC, as well as the total time steps T i , 2 ( k ) from the starting point to the goal point.
In light of the knowledge of graph theory, the key cells included by p a t h a is the only directed connection sequence from the starting position to the goal cell, which is equivalent to a directed path. Through the four operations described above, we can obtain a lowest path that satisfies 3OC. ST approach as opposed to path following or trajectory tracking. The errors of the latter two are the absolute errors between the actual tracking trajectory and the ideal trajectory. ST approach chooses the path with the highest reward in all alternative paths, and the resulting tracking errors are the relative errors. Minimizing tracking errors can be converted to maximizing search rewards and it can be represented as:
max J 2 = max f i t n e s s ( E i ( k ) ) = f i t n e s s ( p i * ( k ) ) = min L r ( k ) L c ( k ) 2 = min ( q = 1 N p ( x r ( k + q ) ( x c ( k + q ) ) 2 + ( y r ( k + q ) ( y c ( k + q ) ) 2 ,
where p i * ( k ) denotes the path with the greatest fitness in E i ( k ) at time step k. L r ( k ) = ( x r ( k ) , y r ( k ) ) is the coordinate of the key cell to be tracked. L c ( k ) = ( x c ( k ) , y c ( k ) ) is the coordinate of the cells actually tracked.
If L r ( k ) E i ( k ) , the tracking process with the highest search rewards must be error-free tracking. Algorithm 2 demonstrates the implementation procedure of the ST approach.
Remark 3.
(1) ST approach is not only suitable for A* algorithm. It is effective for other algorithms. (2) In addition to the 3OC mentioned in this section, the path can also be tracked under 4OC and 8OC. ST approach is suitable for different types of robots or different environments. (3) This approach can also track the 3D path or the path under the dynamic environment.
Algorithm 2 ST approach
Input: The lowest p a t h a , i without the OC.
Output: The lowest p a t h b , i with the OC, the tracking time steps T i , 2 ( k ) .
1: begin:
2:      Use the A* algorithm to get p a t h a , i .
2:      Mark the key cells contained in p a t h a , i .
3:      for m = 1 , , L x
4:          for n = 1 , , L y  do
5:              Assign different P e , i m , n ( k ) to the cells of whole map in term of Equation (23).
6:          end for
7:      end for
8:      Let f i t n e s s ( · ) = J 2 .
9:      for k = 1 , , T i ( k ) (unknow)
10:        Use basic PIO algorithm to track p a t h a , i under OC.
11:        while the goal cell (airport) is reached.
12:            Record the return p a t h b , i and T i , 2 ( k ) .
13:        end while
14:     end for
15: end

5. DTSCS Scheme for MUCS

According to the analysis and requirements of Section 2.3, we design the DTSCS scheme for closed search. In the first stage, the CPIO algorithm proposed in the Section 3 is used as the search algorithm for MUCS. In the return stage, the ST approach proposed in the former section is used to obtain the shortest path with OC to return to the airport. The two stages are coupled in time. The pose of UAV at the end of the search stage is the starting pose for the return stage, which in turn determine the time steps needed for UAV to return to the starting airport.
In the search stage, U A V i needs to calculate its remaining distance and the time steps needed to return to the airport in real time. Assume the RC of U A V i is T i . T i , 1 ( k ) represents the total time steps of the search stage. T i , 2 ( k ) is the total time steps of the return stage. Assume that U A V i has searched for k time steps and U A V i can still safely return to the airport. Before executing the next-step search, U A V i need first to calculate the position to be reached at the next step and how long it will take from the current cell returning back to the airport. If at the next step, the calculated fuel can still guarantee U A V i safely returning back to the airport, then the U A V i search forward a time step. Otherwise, the U A V i stop searching and return directly to the airport. Therefore, the time for U A V i returning to the airport should satisfy the following relationships:
T i , 1 ( k ) + T i , 1 ( k ) T i ,
T i , 1 ( k + 1 ) + T i , 1 ( k + 1 ) > T i ,
where Equation (23) means that the sum of T i , 1 ( k ) and T i , 2 ( k ) at any time step cannot exceed the RC. Equation (24) specifies the condition for the return of the U A V i . The DTSCS scheme can not only ensure that UAV gets the maximum search rewards, but also maximize the range. Besides, it is not limited to the fixed range T i . It can be changed during the task. We can specify the searching time for the first stage, or we can issue a return order at any time during the search. All of these scenarios are possible cases in the application of MUCS.
Remark 4.
Under return conditions, UAV may have surplus fuel after returning to the airport, which is due to the OC of itself.
Definition 5. (Range utilization).
The proportion of time-of-flight of UAV in T i is defined as:
η i = T i , 1 ( k ) + T i , 2 ( k ) T i × 100 % .
Set the RC for the U A V i to be 100 steps. Taking an example shown in Figure 5, the remaining range at this time step is assumed to be six steps. If U A V i continues to search, it will take at least nine steps, as shown in black arrow, for U A V i to return to the airport at the next step. According to Equations (23) and (24), U A V i should return to the airport at this time step, as shown in red arrow. In this case, η i = 95 % . Algorithm 3 describes the detailed flows of the DTSCS scheme.
Algorithm 3 DTSCS scheme
Input: Initializing environmental information, pose information of U A V i , and T i .
Output: T i , 1 ( k ) , T i , 2 ( k ) , closed trajectory and η i .
1: begin:
2:      for k = 1 , , T i  do
3:          if T i , 1 ( k ) + T i , 1 ( k ) T i and T i , 1 ( k + 1 ) + T i , 1 ( k + 1 ) T i
4:             do the search stage (Algorithm 1).
5:          else if T i , 1 ( k ) + T i , 1 ( k ) T i and T i , 1 ( k + 1 ) + T i , 1 ( k + 1 ) > T i
6:             do the return stage (Algorithm 2).
7:          while the airport is reached.
8:          end while
9:      end for
10: end

6. Numerical Simulation and Analysis

In this section, three simulations are performed to verify the performance of the proposed CPIO and the effectiveness of the ST approach and the DTSCS scheme. The simulation programs are coded in Matlab R2016a and implemented on Intel Core I7-2600 3.40 GHz personal computer with 4 GB random access memory.

6.1. MUCS Based on CPIO Algorithm

The region R consists of 50 × 50 cells, the center of every cell is the allowed waypoint. And the setting of the coordinate system of R is consistent with Figure 9a. The starting positions, i.e, the locations of starting airports, and orientations of the four UAVs are as follows.
U A V 1 : [(1, 20), 2] where (1, 20) is the position, and 2 is the orientation, U A V 2 : [(20, 50), 4], U A V 3 : [(27, 1), 0], U A V 4 : [(50, 26), 6]. No-fly zones: 5 x 20 , 30 y 40 and 30 x 40 , 5 y 15 . Known region: 30 x 45 , 20 y 28 , where P e m , n ( k ) = 0 , χ e m , n ( k ) = 0 . Generating 5 randomly distributed targets shown in pink stars in each key region: 5 x 24 , 10 y 25 and 25 x 45 , 30 y 35 , where P e m , n ( k ) = 0.9 , χ e m , n ( k ) = 0.9 . Other cells are non-key regions, where P e m , n ( k ) = 0.5 , χ e m , n ( k ) = 0.5 . The other simulation parameters are listed in Table 1.
Scenario 1: Search for the best N p
The advantages of N p SAP are discussed in Section 3.1. If N p is relatively large, the benefits of N p SAP will be limited or even negligible. In contrast, the number of alternative paths will increase exponentially. Figure 6 shows the simulation results and error analysis with different values of N p .
In Figure 6a, the running time T a of the personal computer increases with the increase of N p . When N p = 7 and the time steps of the search is 100, the computation time is T a = 121.7 s. Combined with the actual search process, it do not meet the requirements of the real-time search task. Figure 6b shows that if N p = 1 or 2, the average fitness value, average rewards for the search process, decreases gradually in the later stages of the search, this is because one or two time steps in advance cannot effectively avoid obstacles or continue to search within the key region. When N p = 4 , UAV has enough time to make obstacle avoidance and continue to search in the key regions. However, the increase of N p will not significantly improve the rewards. In Figure 6c, when N p 4 , the number of targets found out is less instead. When N p = 5 to 7, the number of targets found out are the same. Based on the above analysis, we choose N p = 5 as the best prediction steps. Figure 7 shows the search trajectories of four UAVs when N p = 5 .
Scenario 2: Searching performance of CPIO
To demonstrate the effectiveness of CPIO, comparative experiments are conducted with identical initial conditions. The searching performance of CPIO is compared to the basic PIO, particle swarm optimization (PSO), and GA. In Figure 8a, The convergence speed of the CPIO algorithm is faster than the basic PIO, PSO and GA. And the standard deviations of 100 experiments are also the smallest. Figure 8b shows that when the searching time step is 100, the average number of targets found out by CPIO is 9.6, which is more than the other three algorithms. Therefore, the CPIO algorithm based on cooperation-competition mechanism is superior to the compared algorithms in the cooperative search task.

6.2. Tracking Performance of the ST Approach

Definition 6. (Tracking efficiency ϕ).
The proportion of the key cells tracked in the total cells tracked by ST approach, which is the indicator of tracking performance.
The cells that A* algorithm passes through are modeled as the key regions, and Figure 9a shows the marked results. Using basic PIO algorithm to track these key cells, the tracking results under 3OC, 4OC, and 8OC are shown in Figure 9b. In some slit areas, ϕ will be reduced because the key cells cannot be tracked completely under the 3OC. The A* algorithm and Dijistra algorithm can not satisfy the 3OC in Area 1 and Area 2. To maximize the rewards, there will be some adaptive path selections, which via a few steps ahead of the turn or lag a few steps back to track the key cells. The ϕ for different OCs are given in Figure 10. Its abscissa represents the unit length after subdividing Figure 9a. The search efficiency of 8OC is higher than that of 3OC and 4OC. As the grid map is subdivided, The ϕ of 3OC and 4OC increases.

6.3. Closed Trajectory

The numerical simulation is carried out according to the DTSCS scheme designed by Section 5. Let T i , 1 ( k ) = 100 . The closed trajectory is shown in Figure 11, where the dotted line is the search path, and the solid line is the return path. Figure 12 shows the relationship between range utilization and time step for every UAV. The average range utilization of UAVs is 97 % under the 3OC. If switching to the 8OC, the range utilization of every UAV will increases.

7. Conclusions

According to the RC of UAV in the search process, we design a dynamic two-stage scheme to implement the closed search. Every UAV needs to take into account the time steps needed to return to the airport during searching process. When the searching time and the returning time meet the Equations (23) and (24), UAVs can return back to the starting airports. To improve the target search efficiency, the CPIO with cooperation-competition mechanism is proposed and applied to the search stage problem. The simulation results show that N p = 5 is the best prediction time steps. The CPIO algorithm outperforms the compared algorithms regarding the number of targets found out and the convergence speed. In the return stage, the ST approach is presented to ensure UAVs safely return to the their starting airport. Closed target searching simulations demonstrate the effectiveness and efficiency of the proposed algorithm. In the future, we will explore the cooperative search strategy and path planning in dynamic 3D environments.

Author Contributions

Conceptualization, D.L. and J.S.; methodology, D.L.; software, J.S.; validation, D.L., J.S., Y.X., Y.Y. and H.D.; formal analysis, J.S.; investigation, Y.X.; resources, D.L.; data curation, D.L., Y.X., Y.Y. and H.D.; writing–original draft preparation, J.S.; writing–review and editing, D.L., Y.X., Y.Y. and H.D.

Funding

This work is supported by the National Natural Science Foundation of China under Grant (No. 61673327) and the Natural Science Foundation of Fujian Province of China under Grant (No. 2016J06011).

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
UAVunmanned aerial vehicle
MUCSmulti-UAV cooperative search
DTSCSdynamic two-stage closed search
STsearch tracking
RCrange constraint
OCorientation constraint
N p SAP N p -step-ahead prediction
TEPtarget existence probability
EUenvironmental uncertainty
PIOpigeon-inspired optimisation
CPIOcoevolution pigeon-inspired optimization
3Dthree-dimensional

Appendix A

Here, d i j ( k ) is described as (A1)
d i j ( k ) = d 11 ( k ) d 12 ( k ) d 1 M ( k ) d 21 ( k ) d 22 ( k ) d 2 M ( k ) d M 1 ( k ) d M 2 ( k ) d M M ( k )
where d i j ( k ) = ( x i ( k ) x j ( k ) ) 2 + ( y i ( k ) y j ( k ) ) 2 denotes the Euclidean distance of U A V i and U A V j . M is the number of UAVs. d i i ( k ) = . ( x i ( k ) , y i ( k ) ) and ( x j ( k ) , y j ( k ) ) are the positions between U A V i and U A V j in time step k.
d i h ( k ) and d i j ( k ) are similar:
d i j ( k ) = d 11 ( k ) d 12 ( k ) d 1 H ( k ) d 21 ( k ) d 22 ( k ) d 2 H ( k ) d M 1 ( k ) d M 2 ( k ) d M H ( k )
where d i h ( k ) = ( k ) ( x i ( k ) x h ( k ) ) 2 + ( y i ( k ) y h ( k ) ) 2 is the Euclidean distance between U A V i and airport h ( h = 1 , 2 , , H ), H is the number of airport.

References

  1. Xu, Y.; Luo, D.; Li, D.; You, Y.; Duan, H. Affine formation control for heterogeneous multi-agent systems with directed interaction networks. Neurocomputing 2019, 330, 104–115. [Google Scholar] [CrossRef]
  2. Lan, M.; Xu, Y.; Lai, S.; Chen, B.M. In A modular mission management system for micro aerial vehicles. In Proceedings of the 14th IEEE International Conference on Control and Automation, Anchorage, AK, USA, 12–15 June 2018; pp. 293–299. [Google Scholar]
  3. Ruan, L.; Chen, J.; Guo, Q.; Jiang, H.; Zhang, Y.; Liu, D. A Coalition Formation Game Approach for Efficient Cooperative Multi-UAV Deployment. Appl. Sci. 2018, 8, 2427. [Google Scholar] [CrossRef]
  4. Xu, Y.; Li, D.; Luo, D.; You, Y. Affine Formation Maneuver Tracking Control of Multiple Second-Order Agents with Time-Varying Delays. Available online: http://engine.scichina.com/doi/10.1007/s11431-018-9328-2 (accessed on 12 December 2018).
  5. Sujit, P.B.; Ghose, D. Search using multiple UAVs with flight time constraints. IEEE Trans. Aerosp. Electron. Syst. 2004, 40, 491–509. [Google Scholar] [CrossRef]
  6. Bertuccelli, L.F.; How, J.P. In Robust UAV Search for Environments with Imprecise Probability Maps. In Proceedings of the 44th IEEE Conference on Decision and Control, Seville, Spain, 12–15 December 2005; pp. 5680–5685. [Google Scholar]
  7. Riehl, J.R.; Collins, G.E.; Hespanha, J.P. Cooperative Search by UAV Teams: A Model Predictive Approach using Dynamic Graphs. IEEE Trans. Aerosp. Electron. Syst. 2009, 47, 2637–2656. [Google Scholar] [CrossRef]
  8. Tian, J.; Chen, Y.; Shen, L. Cooperative search algorithm for multi-uavs in uncertainty environment. J. Electron. Inf. Technol. 2007, 29, 2325–2328. [Google Scholar]
  9. Hu, J.; Xie, L.; Lum, K.Y.; Xu, J. Multiagent Information Fusion and Cooperative Control in Target Search. IEEE Trans. Control Syst. Technol. 2009, 21, 1223–1235. [Google Scholar] [CrossRef]
  10. Shima, T.; Rasmussen, S.J.; Sparks, A.G.; Passino, K.M. Multiple task assignments for cooperating uninhabited aerial vehicles using genetic algorithms. Comput. Oper. Res. 2006, 33, 3252–3269. [Google Scholar] [CrossRef]
  11. Ge, H.; Chen, G.; Xu, G. Multi-AUV Cooperative Target Hunting Based on Improved Potential Field in a Surface-Water Environment. Appl. Sci. 2018, 8, 973. [Google Scholar] [CrossRef]
  12. Cai, Y.; Yang, S.X. An improved PSO-based approach with dynamic parameter tuning for cooperative multi-robot target searching in complex unknown environments. Int. J. Control 2013, 86, 1720–1732. [Google Scholar] [CrossRef]
  13. Wu, T.H.; Chung, S.H.; Chang, C.C. A water flow-like algorithm for manufacturing cell formation problems. Eur. J. Oper. Res. 2010, 205, 346–360. [Google Scholar] [CrossRef]
  14. Wu, T.H.; Chung, S.H.; Chang, C.C. Water flow-like algorithm for object grouping problems. J. Chin. Inst. Eng. 2007, 24, 475–488. [Google Scholar]
  15. Aleksandar, J.; Alvaro, G. Distributed bees algorithm parameters optimization for a cost-efficient target allocation in swarms of robots. Sensors 2011, 11, 10880–10893. [Google Scholar]
  16. Duan, H.; Qiao, P. Pigeon-inspired optimization: A new swarm intelligence optimizer for air robot path planning. Int. J. Intell. Comput. Cybern. 2014, 7, 24–37. [Google Scholar] [CrossRef]
  17. Yang, Z.; Duan, H.; Fan, Y.; Deng, Y. Automatic Carrier Landing System multilayer parameter design based on Cauchy Mutation Pigeon-Inspired Optimization. Aerosp. Sci. Technol. 2018, 79, 518–530. [Google Scholar] [CrossRef]
  18. Duan, H.; Wang, X. Echo State Networks with Orthogonal Pigeon-Inspired Optimization for Image Restoration. IEEE Trans. Neural Netw. Learn. Syst. 2015, 27, 2413–2425. [Google Scholar] [CrossRef] [PubMed]
  19. Deng, Y.; Duan, H. Control parameter design for automatic carrier landing system via pigeon-inspired optimization. Nonlinear Dyn. 2016, 85, 97–106. [Google Scholar] [CrossRef]
  20. Shirabe, T. A method for finding a least-cost wide path in raster space. Int. J. Geogr. Inf. Sci. 2016, 30, 1469–1485. [Google Scholar] [CrossRef]
  21. Antikainen, H. Comparison of Different Strategies for Determining Raster-Based Least-Cost Paths with a Minimum Amount of Distortion. Trans. GIS 2013, 17, 96–108. [Google Scholar] [CrossRef]
  22. Dijkstra, E.W. A note on two problems in connexion with graphs. Numer. Math. 1959, 1, 269–271. [Google Scholar] [CrossRef] [Green Version]
  23. Hart, P.E.; Nilsson, N.J.; Raphael, B. A Formal Basis for the Heuristic Determination of Minimum Cost Paths. IEEE Trans. Syst. Sci. Cybern. 1968, 4, 100–107. [Google Scholar] [CrossRef]
  24. Hu, J.; Xie, L.; Xu, J.; Xu, Z. Multi-Agent Cooperative Target Search. Sensors 2014, 14, 9408–9428. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  25. Xu, Y.; Ren, G.; Chen, J.; Zhang, X.; Jia, L.; Kong, L. Interference-Aware Cooperative Anti-Jamming Distributed Channel Selection in UAV Communication Networks. Appl. Sci. 2018, 8, 1911. [Google Scholar] [CrossRef]
  26. Lao, M.; Tang, J. Cooperative Multi-UAV Collision Avoidance Based on Distributed Dynamic Optimization and Causal Analysis. Appl. Sci. 2017, 7, 83. [Google Scholar] [CrossRef]
  27. Ha, I.-K.; Cho, Y.-Z. A Probabilistic Target Search Algorithm Based on Hierarchical Collaboration for Improving Rapidity of Drones. Sensors 2018, 18, 2535. [Google Scholar] [CrossRef] [PubMed]
  28. Liu, Z.; Gao, X.; Fu, X. A Cooperative Search and Coverage Algorithm with Controllable Revisit and Connectivity Maintenance for Multiple Unmanned Aerial Vehicles. Sensors 2018, 18, 1472. [Google Scholar] [CrossRef] [PubMed]
  29. Lei, D. Co-evolutionary genetic algorithm for fuzzy flexible job shop scheduling. Appl. Soft Comput. 2012, 12, 2237–2245. [Google Scholar] [CrossRef]
  30. Antonelli, M.; Ducange, P.; Marcelloni, F. Genetic Training Instance Selection in Multiobjective Evolutionary Fuzzy Systems: A Coevolutionary Approach. IEEE Trans. Fuzzy Syst. 2012, 20, 276–290. [Google Scholar] [CrossRef]
  31. Mayne, D.Q.; Rawlings, J.B.; Rao, C.V.; Scokaert, P.O.M. Constrained model predictive control: Stability and optimality. Automatica 2000, 36, 789–814. [Google Scholar] [CrossRef]
  32. Bednekoff, P.A.; Lima, S.L. Risk allocation and competition in foraging groups: Reversed effects of competition if group size varies under risk of predation. Biol. Sci. 2004, 271, 1491–1496. [Google Scholar] [CrossRef] [PubMed]
  33. Ridley, J.; Sutherland, W.J. Kin Competition within Groups: The Offspring Depreciation Hypothesis. Biol. Sci. 2002, 269, 2559–2564. [Google Scholar] [CrossRef] [PubMed]
  34. Aguiar, A.P.; Hespanha, J.P. Trajectory-Tracking and Path-Following of Underactuated Autonomous Vehicles With Parametric Modeling Uncertainty. IEEE Trans. Autom. Control 2007, 52, 1362–1379. [Google Scholar] [CrossRef] [Green Version]
  35. Xu, Y.; Lai, S.; Li, J.; Luo, D.; You, Y. Concurrent Optimal Trajectory Planning for Indoor Quadrotor Formation Switching. J. Intell. Robot. Syst. 2018, 4, 1–18. [Google Scholar] [CrossRef]
Figure 1. OC of motion: (a) 8OC; (b) 4OC; (c) 3OC.
Figure 1. OC of motion: (a) 8OC; (b) 4OC; (c) 3OC.
Applsci 09 00827 g001
Figure 2. Schematic diagram of N p SAP: (a) N p = 3 ; (b) N p SAP to avoid greedy thought.
Figure 2. Schematic diagram of N p SAP: (a) N p = 3 ; (b) N p SAP to avoid greedy thought.
Applsci 09 00827 g002
Figure 3. CPIO algorithm for MUCS.
Figure 3. CPIO algorithm for MUCS.
Applsci 09 00827 g003
Figure 4. Schematic diagram of MUCS based on cooperation-competition mechanism.
Figure 4. Schematic diagram of MUCS based on cooperation-competition mechanism.
Applsci 09 00827 g004
Figure 5. Cause for the remaining range.
Figure 5. Cause for the remaining range.
Applsci 09 00827 g005
Figure 6. Error analysis for different values of N p : (a) Running time; (b) Average fitness value; (c) Number of targets found.
Figure 6. Error analysis for different values of N p : (a) Running time; (b) Average fitness value; (c) Number of targets found.
Applsci 09 00827 g006
Figure 7. Search trajectory with N p = 5 .
Figure 7. Search trajectory with N p = 5 .
Applsci 09 00827 g007
Figure 8. Search performance of CPIO, PIO, PSO, and GA: (a) Convergence speed; (b) Average number of targets found out.
Figure 8. Search performance of CPIO, PIO, PSO, and GA: (a) Convergence speed; (b) Average number of targets found out.
Applsci 09 00827 g008
Figure 9. Effect drawing of the ST approach, A* algorithm and Dijkstra algorithm: (a) Marked key cells; (b) Result of tracking.
Figure 9. Effect drawing of the ST approach, A* algorithm and Dijkstra algorithm: (a) Marked key cells; (b) Result of tracking.
Applsci 09 00827 g009
Figure 10. Search efficiency under different OCs.
Figure 10. Search efficiency under different OCs.
Applsci 09 00827 g010
Figure 11. Closed trajectory of UAVs.
Figure 11. Closed trajectory of UAVs.
Applsci 09 00827 g011
Figure 12. Range utilization of UAVs.
Figure 12. Range utilization of UAVs.
Applsci 09 00827 g012
Table 1. Parameters in MUCS.
Table 1. Parameters in MUCS.
ParametersDescriptionValue
P c m , n ( k ) Detection probability of the UAV sensor to the goal.0.9
P f m , n ( k ) False alarm rate.0.1
ω 1 , ω 2 , ω 3 , ω 4 Weight factor of fitness function J 1 .0.3, 0.3, 0.3, 0.1
MNumber of UAVs (subgroups).4
C 1 Initial number of pigeons in every subgroup.40
R p Coefficient of the map and compass operator.0.5
N c 1 , N c 2 Number of iterations of Operation 1 and Operation 2 in the CPIO algorithm.25, 20

Share and Cite

MDPI and ACS Style

Luo, D.; Shao, J.; Xu, Y.; You, Y.; Duan, H. Coevolution Pigeon-Inspired Optimization with Cooperation-Competition Mechanism for Multi-UAV Cooperative Region Search. Appl. Sci. 2019, 9, 827. https://0-doi-org.brum.beds.ac.uk/10.3390/app9050827

AMA Style

Luo D, Shao J, Xu Y, You Y, Duan H. Coevolution Pigeon-Inspired Optimization with Cooperation-Competition Mechanism for Multi-UAV Cooperative Region Search. Applied Sciences. 2019; 9(5):827. https://0-doi-org.brum.beds.ac.uk/10.3390/app9050827

Chicago/Turabian Style

Luo, Delin, Jiang Shao, Yang Xu, Yancheng You, and Haibin Duan. 2019. "Coevolution Pigeon-Inspired Optimization with Cooperation-Competition Mechanism for Multi-UAV Cooperative Region Search" Applied Sciences 9, no. 5: 827. https://0-doi-org.brum.beds.ac.uk/10.3390/app9050827

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop