CN102722751A - Heuristic quantum genetic method of multi-target distribution in air war - Google Patents

Heuristic quantum genetic method of multi-target distribution in air war Download PDF

Info

Publication number
CN102722751A
CN102722751A CN2012101470560A CN201210147056A CN102722751A CN 102722751 A CN102722751 A CN 102722751A CN 2012101470560 A CN2012101470560 A CN 2012101470560A CN 201210147056 A CN201210147056 A CN 201210147056A CN 102722751 A CN102722751 A CN 102722751A
Authority
CN
China
Prior art keywords
aircraft
enemy
chromosome
beta
alpha
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012101470560A
Other languages
Chinese (zh)
Other versions
CN102722751B (en
Inventor
李妮
孔海朋
龚光红
韩亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Original Assignee
Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University filed Critical Beihang University
Priority to CN201210147056.0A priority Critical patent/CN102722751B/en
Publication of CN102722751A publication Critical patent/CN102722751A/en
Application granted granted Critical
Publication of CN102722751B publication Critical patent/CN102722751B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a heuristic quantum genetic method of multi-target distribution in an air war and belongs to the technical field of computer simulation and method optimization. The heuristic quantum genetic method comprises the following steps: obtaining the current battlefield situation from a command control center; obtaining threat factors among aircrafts between us and the enemy of the current battlefield; obtaining all of attack distribution values of each weapon of the aircrafts of ourselves and establishing a priority attack distribution value vector; carrying out quantum bit encoding and initializing all quantum chromosomes in a population; filtering the quantum chromosomes; and correcting the quantum chromosomes according to the priority attack distribution value vector. According to the heuristic quantum genetic method, a threat empirical formula of collaborative multi-target attack air war decision problem is subjected to deformation conversion, a distribution scheme of the weapons of us is subjected to quantum bit encoding, and the representation range of feasible solution is enlarged. The priority attack distribution value vector PAVZN*1 is provided and designed according to all of the attack distribution values of each weapon, thus the quantum chromosomes are corrected in a heuristic mode according to the PAVZN*1, and the convergence velocity is accelerated.

Description

The heuristic quantum genetic method that a kind of air battle multiple goal is distributed
Technical field
The present invention relates to the heuristic quantum genetic method that a kind of air battle multiple goal is distributed, belong to Computer Simulation and method technical field of optimizing.
Background technology
Oneself becomes one of gordian technique of modern opportunity of combat realization over-the-horizon air action fire control system collaborative Multi-target Attacking air combat decision, and its research has great importance.Collaborative Multi-target Attacking air combat decision is meant that independent or many aircraft of aircraft attack aerial a plurality of enemy's discrete target simultaneously.When enemy's number of vehicles more for a long time, we also need set out many aircraft simultaneously it is tackled, attacks, thereby forms Cooperative Air Combat.The key of collaborative Multi-target Attacking air combat decision is to distribute target according to our number of vehicles and situation for each friendly side's aircraft, and assessment of air battle situation and threat analysis are the bases of Target Assignment.Therefore, the assessment of air battle situation, threat analysis, collaborative Target Assignment have constituted the core content of collaborative Multi-target Attacking air combat decision together, and collaborative Target Assignment then is a wherein most important part.
The threat analysis of collaborative Multi-target Attacking air combat decision mainly is according to some basic experimental formulas at present, calculates the threat factor between the aircraft; The method of collaborative Target Assignment mainly contains methods such as ant crowd, neural network, population, but these method ubiquity inefficiencies, shortcoming such as can not restrain.Genetic algorithm is to be proposed and found in late 1960s by the John Holland of U.S. Michigan university, uses organic sphere evolutionism and genetic thought, has simulated the breeding that takes place in natural selection and the genetic process; Mating and variation phenomenon; According to the survival of the fittest, the natural law of the survival of the fittest utilizes genetic operator to select; Intersect and make a variation and pursue generation generation excellent individual, finally search more excellent individuality.But shortcomings such as genetic algorithm is absorbed in local convergence easily when the Multi-target Attacking air combat decision is worked in coordination with in solution, the evolution late convergence is slow, and precision is relatively poor.Quantum genetic optimization method (QGA) is proposed in 2000 by K.H.Han etc. the earliest, and this method is expressed the state vector of quantum and introduced genetic coding, utilizes the quantum revolving door to realize the adjustment of chromogene, and its notion is simple, realize easily, the hunting zone is big.But its binary coding mode has certain limitation when solving practical problems.In addition,, also has blind search, shortcoming such as speed of convergence is slow, and precision is relatively poor as a kind of random optimization method.
Summary of the invention
To the problem that exists in the prior art; The present invention proposes the heuristic quantum genetic method that a kind of air battle multiple goal is distributed; Purpose is the easy local convergence of genetic method for the collaborative Target Assignment that solves collaborative Multi-target Attacking air combat decision; Shortcomings such as the evolution late convergence is slow, and precision is relatively poor are out of shape conversion with the threat experimental formula of collaborative Multi-target Attacking air combat decision problem; Make it our weapon allocative decision (each the bar chromosome in the heuristic here quantum genetic algorithm is represented a solution) is carried out the quantum bit coding, and propose a kind of according to priority allocation value vector PAV ZN * 1Heuristic quantum chromosome modification method at last through the quantum chromosomal variation, is accelerated the quantum bit corresponding state to global optimum's derotation, improves search efficiency.
The present invention proposes the heuristic quantum genetic method that a kind of air battle multiple goal is distributed, and comprises following step:
Step 1: obtain current situation of battlefield from the command and control center:
Step 2: obtain the current battlefield threat factor between the aircraft between ourselves and the enemy through experimental formula.
Our aircraft to the threat factor experimental formula of enemy's aircraft is:
th ij = ω 1 th ij D ij th ij ϵ ij + ω 2 th ij V Bi - - - ( 1 )
Wherein subscript i representes our aircraft B i(i=1,2 ..., M), wherein M representes the total quantity of our aircraft, subscript j representes enemy's aircraft R j(j=1,2 ..., N), N representes the total quantity of enemy's aircraft, th IjRepresent our aircraft B iTo enemy's aircraft R jThe threat factor,
Figure BDA00001628489800022
Represent our aircraft B iTo enemy's aircraft R jDistance threaten the factor,
Figure BDA00001628489800031
Represent our aircraft B iTo enemy's aircraft R jAngle threaten the factor, Represent our aircraft B iTo enemy's aircraft R jSpeed threaten the factor, wherein ω 1With ω 2Be non-negative weight coefficient, and satisfy ω 1+ ω 2=1;
We is aircraft B iTo enemy's aircraft R jDistance threaten the factor
Figure BDA00001628489800033
Be specially:
th ij D ij = 1.0 D ij &le; Ra B 1 - D ij - Ra B Tr B - Ra B Ra B < D ij &le; Tr B 0.0 D ij > Tr B - - - ( 2 )
Wherein: D IjRepresent our aircraft B iTo enemy's aircraft R jDistance, Ra BRepresent our aircraft B iThe average effective operating distance of entrained weapon, Tr BThe maximum tracking range of representing our aircraft radars;
We is aircraft B iTo enemy's aircraft R jAngle threaten the factor
Figure BDA00001628489800035
Be specially:
th ij &epsiv; ij = e - &lambda; 1 ( &pi;&epsiv; ij / 180 ) &lambda; 2 - - - ( 3 )
ε wherein IjExpression enemy aircraft R jWith respect to we aircraft B iOff-axis angle, λ 1With λ 2Be constant λ 1With λ 2Generally between 0 to 10, there is not the relation of mutual restriction in value;
We is aircraft B iTo enemy's aircraft R jSpeed threaten the factor
Figure BDA00001628489800037
Be specially:
th ij V Bi = 1.0 V R j < 0.5 V B i 1.5 - V R j / V B i 0.5 V B i < V R j &le; 1.4 V B i 0.1 V R j > 1.4 V B i - - - ( 4 )
Wherein Represent our aircraft B iSpeed,
Figure BDA000016284898000310
Expression enemy aircraft R jSpeed;
Enemy's aircraft R in like manner jTo we aircraft B iThe threat experimental formula be:
th ij = &omega; 3 th ji D ji th ji &epsiv; ji + &omega; 4 th ji V Rj - - - ( 5 )
Wherein subscript j representes enemy's aircraft R j, subscript i representes our aircraft B i, th JiExpression enemy aircraft R jTo we aircraft B iThe threat factor,
Figure BDA000016284898000312
Expression enemy aircraft R jTo we aircraft B iDistance threaten the factor,
Figure BDA000016284898000313
Expression enemy aircraft R jTo we aircraft B iAngle threaten the factor,
Figure BDA000016284898000314
Expression enemy aircraft R jTo we aircraft B iSpeed threaten the factor, ω 3With ω 4Be non-negative weight coefficient, and satisfy ω 3+ ω 4=1;
Enemy's aircraft R jTo we aircraft B iDistance threaten the factor
Figure BDA00001628489800041
Be specially:
th ji D ji = 1.0 D ji &le; Ra R 1 - D ji - Ra R Tr R - Ra R Ra R < D ji &le; Tr R 0.0 D ji > Tr R - - - ( 6 )
D wherein JiExpression enemy aircraft R jTo we aircraft B iDistance, Ra RExpression enemy aircraft R jThe average effective operating distance of entrained weapon, Tr RThe maximum tracking range of expression enemy aircraft radars; Enemy's aircraft R jTo we aircraft B iAngle threaten the factor
Figure BDA00001628489800043
Be specially:
th ji &epsiv; ji = e - &lambda; 3 ( &pi;&epsiv; ji / 180 ) &lambda; 4 - - - ( 7 )
ε wherein JiRepresent our aircraft B iWith respect to enemy's aircraft R jOff-axis angle, λ 3With λ 4Be constant; Enemy's aircraft R jTo we aircraft B iSpeed threaten the factor
Figure BDA00001628489800045
Be specially:
th ji V Rj = 1.0 V B i < 0.5 V R j 1.5 - V B i / V R j 0.5 V R j < V B i &le; 1.4 V R j 0.1 V B i > 1.4 V R j - - - ( 8 )
Wherein Expression enemy aircraft R jSpeed,
Figure BDA00001628489800048
Represent our aircraft B iSpeed;
Step 3: all of each weapon of obtaining all our aircraft according to the apportioning cost experimental formula are attacked apportioning costs, make up the preferential apportioning cost vector of attacking:
We is aircraft B i(i=1,2 ..., M) to enemy's aircraft R j(j=1,2 ..., apportioning cost experimental formula N) is:
AV ij = th ij &CenterDot; &Sigma; i = 1 M th ji - - - ( 9 )
Th wherein IjRepresent our aircraft B iTo enemy's aircraft R jThe threat factor,
Figure BDA000016284898000410
Expression enemy aircraft R jTo we aircraft B iThreat, AV IjRepresent our aircraft B iAttack enemy's aircraft R jAttack apportioning cost;
According to apportioning cost experimental formula (9) calculate our all weapon r (r=1,2 ..., Z) the aircraft B at this end of institute iThe integral body of all enemy's aircraft is attacked apportioning cost vector AV ZN * 1For
AV ZN×1=[AV 11,AV 12,…,AV 1N,AV 21,…,AV ZN],
Wherein Z is the total quantity of the entrained weapon of our all aircraft, AV 11Represent that our carrying arms is numbered 1 aircraft attack enemy aircraft R 1The attack apportioning cost, AV 12Represent that our carrying arms is numbered 1 aircraft attack enemy aircraft R 2The attack apportioning cost, AV 1NRepresent that our carrying arms is numbered 1 aircraft attack enemy aircraft R NThe attack apportioning cost, AV 21Represent that our carrying arms is numbered 2 aircraft attack enemy aircraft R 1The attack apportioning cost, AV ZNRepresent that our carrying arms is numbered the aircraft attack enemy aircraft R of Z NThe attack apportioning cost.The whole apportioning cost vector AV that attacks ZN * 1=[AV 11, AV 12..., AV 1N, AV 21..., AV ZN] in comprised our each weapon attack apportioning cost to each aircraft of enemy, comprise ZN altogether and attack apportioning cost;
Integral body is attacked apportioning cost vector AV ZN * 1Middle ZN AV 11, AV 12..., AV 1N, AV 21..., AV ZNAttack apportioning cost and arrange, obtain priority allocation value vector PAV according to order from big to small ZN * 1, vectorial dimension is ZN * 1;
Step 4: set population scale, greatest iteration step number and variation probability P m, to our weapon allocative decision, carry out all the quantum chromosomes in quantum bit coding and the initialization population, wherein population scale is designated as NUM; Be chromosomal number in the population, the greatest iteration step number is designated as MAX, in i our weapon allocative decision; With our weapon r (r ∈ 1,2 ... Z) enemy's aircraft of being attacked carries out quantum bit coding, and the gene segment length of each weapon equals the number N of enemy's aircraft, and therefore our gene position of each weapon r correspondence is encoded in i chromosome g i r = [ &alpha; i r 1 &beta; i r 1 | &alpha; i r 2 &beta; i r 2 | . . . | &alpha; i RN &beta; i RN ] , I ∈ 1,2 ... NUM, wherein
Figure BDA00001628489800052
Represent that we weapon r does not attack enemy's aircraft R in i the chromosome 1The quantum bit probability amplitude, wherein
Figure BDA00001628489800053
Represent that we weapon r attacks enemy's aircraft R in i the chromosome 1The quantum bit probability amplitude,
Figure BDA00001628489800054
Represent that we weapon r does not attack enemy's aircraft R in i the chromosome 2Probability amplitude, wherein Represent that we weapon r attacks enemy's aircraft R in i the chromosome 2The quantum bit probability amplitude,
Figure BDA00001628489800062
Represent that we weapon r does not attack enemy's aircraft R in i the chromosome NThe quantum bit probability amplitude, wherein
Figure BDA00001628489800063
Represent that we weapon r attacks enemy's aircraft R in i the chromosome NThe quantum bit probability amplitude, in a chromosome of our weapon allocative decision, comprise the gene section of our Z all weapons, therefore a chromosome total length is ZN, being encoded to an of whole chromosome of i our all weapons g i = [ g i 1 | g i 2 | . . . | g i r | . . . | g i Z ] , i &Element; 1,2 , . . . NUM , Comprise z gene section, wherein r gene section is encoded to the corresponding gene position coding of we weapon r g i r = [ &alpha; i r 1 &beta; i r 1 | &alpha; i r 2 &beta; i r 2 | . . . | &alpha; i RN &beta; i RN ] , i &Element; 1,2 , . . . NUM , Therefore include ZN gene position in the whole chromosome.Right g i = [ g i 1 | g i 2 | . . . | g i r | . . . | g i Z ] , i &Element; 1,2 , . . . NUM In each gene position launch fully according to each gene position coding after, from 1 to ZN serial number, the chromosome after then renumbeing is:
g i = [ &alpha; i 1 &beta; i 1 | &alpha; i 2 &beta; i 2 | . . . | &alpha; i ( r - 1 ) &CenterDot; N + j &beta; i ( r - 1 ) &CenterDot; N + j | . . . | &alpha; i Z &CenterDot; N &beta; i Z &CenterDot; N ] = [ &alpha; i 1 &beta; i 1 | &alpha; i 2 &beta; i 2 | . . . | &alpha; i k &beta; i k | . . . | &alpha; i Z &CenterDot; N &beta; i Z &CenterDot; N ] - - - ( 10 ) ;
Wherein i ∈ 1,2 ... NUM, r ∈ 1,2 ..., Z, j ∈ 1,2 ..., N, k=(r-1) N+j and k ∈ 1,2 ..., ZN; In i chromosome of
Figure BDA00001628489800068
expression the 1st, the 2nd ... (r-1) N+j ... ZN gene position do not attacked the quantum bit probability amplitude of enemy's aircraft,
Figure BDA00001628489800069
in i chromosome of expression the 1st, the 2nd ... (r-1) N+j ... ZN gene position attacked the quantum bit probability amplitude of enemy's aircraft;
Each gene position of whole chromosome to our all weapons in the population is carried out initialization, makes all gene position &alpha; i 1 &beta; i 1 , &alpha; i 2 &beta; i 2 . . . &alpha; i ( r - 1 ) &CenterDot; N + j &beta; i ( r - 1 ) &CenterDot; N + j . . . &alpha; i N &CenterDot; Z &beta; i N &CenterDot; Z All be initialized as same numerical value
Figure BDA000016284898000613
thus make in every chromosome our each weapon attacking enemy aircraft identical with the probability of not attacking enemy's aircraft.
Step 5: quantum chromosome is filtered (the method is called observation in quantum calculation), confirm the value of each gene position in the chromosome;
To chromosome g i = [ &alpha; i 1 &beta; i 1 | &alpha; i 2 &beta; i 2 | . . . | &alpha; i k &beta; i k | . . . | &alpha; i Z &CenterDot; N &beta; i Z &CenterDot; N ] , I ∈ 1,2 ... NUM filters, and with random chance each gene position of chromosome is carried out value, produces the random number between 0 to 1 immediately, if random number less than
Figure BDA00001628489800072
Value after k gene position filtered is 1, otherwise is taken as 0, the chromosome g after then filtering i' be:
g i &prime; = [ G i 1 | G i 2 | . . . | G i N - Z ] , i &Element; 1,2 , . . . NUM - - - ( 11 )
Wherein
Figure BDA00001628489800074
Or 0 (k ∈ 1,2 ..., NZ),
Figure BDA00001628489800075
Be the chromosome g after filtering i' the k position gene position value, k is NZ the k in the gene position;
Step 6: according to preferential attack apportioning cost vector corrected quantum chromosome.
According to the preferential attack apportioning cost vector PAV that obtains in the step 3 ZN * 1, the chromosome g after will filtering successively i', i ∈ 1,2 ... The attack apportioning cost AV that NUM calculates according to formula (9) IjLittle and
Figure BDA00001628489800076
Gene location be 0, makes chromosome satisfy our weapon and only attack enemy's aircraft, and each enemy's aircraft distributes 2 weapons to attack at most;
If the whole chromosome g after filtering i' in
Figure BDA00001628489800077
Number less than the total number Z of our weapon, according to preferential attack apportioning cost vector PAV ZN * 1Whole chromosome g after will filtering successively i' middle attack apportioning cost AV IjBig and
Figure BDA00001628489800078
Gene location be 1;
Step 7: obtain through the threaten degree of enemy's aircraft behind our weapon attacking according to the threat experimental formula after the conversion, and find out historical optimum solution to our aircraft;
Threaten in the experimental formula for the quantum bit coding that filters after stain colour solid gene position in the step 4 is corresponded to, the threaten degree objective function carried out following conversion:
E = min &Sigma; j = 1 N &Sigma; i = 1 M { th ji &CenterDot; [ &Pi; r = 1 Z ( 1 - th rj ) X rj ] }
= min &Sigma; i = 1 M &Sigma; j = 1 N { th ji &CenterDot; [ &Pi; r = 1 Z ( 1 - th rj ) X rj ] }
= min &Sigma; i = 1 M &Sigma; j = 1 N { th ji &CenterDot; [ &Pi; r = 1 Z ( 1 - th rj ) G j + ( r - 1 ) &CenterDot; N ] } - - - ( 12 )
Wherein: E representes the threaten degree objective function, and N is the total number of enemy's aircraft, and M is the total number of our aircraft, and Z is the total number of our weapon, G J+ (r-1) NN gene position of j+ (r-1) of representing we the chromosome g' after filtering, j ∈ 1,2 ..., N, r ∈ 1,2 ..., ZN; If gene position G k=1 (k ∈ 1 ... 2, Z, 1, and can know k=(r-1) N+j by the corresponding relation in the formula (10), then represent us to be numbered the weapon attacking enemy aircraft R of r jIf we the weapon that is numbered r does not attack enemy's aircraft R 0 expression j
Calculate the chromosome g ' after the i bar filters in the population iThe threaten degree target function value E that process formula (12) obtains i, wherein i ∈ 1,2 ..., NUM as chromosomal current the separating of i bar, in individual current the separating of the first generation, finds out the current E of separating of all chromosomes iIn minimum value as the historical optimum solution of population, be designated as E b, the chromosome g ' after the corresponding filtration iFor filtering chromosome, the optimum of population is designated as g b', corresponding unfiltered chromosome g iOptimum chromosome g for population b
If not the first generation is individual, this generation every chromosomal current separating with historical optimum solution compare, if i the chromosomal current E that separates iLess than historical optimum solution E b, i.e. E i<E b, then with this chromosomal current E that separates iValue give E b, i.e. E b=E i, filter chromosome g with i i' give optimum to filter chromosome g b', i.e. g b'=g i', with i chromosome g iGive optimum chromosome g b, g b=g i
Step 8: all chromosomes in the population are carried out the rotation of quantum door.
&alpha; k , &beta; k , ] = [ cos &theta; k - sin &theta; k sin &theta; k cos &theta; k ] [ &alpha; k &beta; k - - - ( 13 )
With reference to experimental formula (13), wherein α k, β kFor filtering the chromosomal quantum bit probability amplitude that will be rotated in the prochromosome gene position, α ' k, β ' kFor filtering postrotational quantum bit probability amplitude in the after stain colour solid gene position, θ kExpression quantum rotation angle, inquiry quantum rotation angle θ kTable is rotated θ in the quantum rotation door to every chromosome kQuestion blank as shown in table 1:
Table 1: θ in the quantum rotation door kQuestion blank
F in the above-mentioned table (x) is a target function value, here for enemy's aircraft behind our weapon attacking that obtains according to the threat experimental formula (12) after the conversion in the step 7 to the threaten degree functional value of our aircraft; S (α kβ k) be θ kSymbol; b kAnd x kBe respectively that the optimum that obtains in the step 7 filters chromosome g b' to carry out the filtration chromosome g that the quantum door rotates with current i' (i ∈ 1,2 ..., k NUM) (k ∈ 1,2 ..., the ZN) value of individual gene position; After the rotation of quantum door, the probability amplitude of k gene position of postrotational chromosome by &alpha; k &beta; k Become &alpha; k , &beta; k , ;
Step 9: filter chromosome g ' according to optimum bWith the variation probability P m, all chromosomes in the population are carried out mutation operation;
To the chromosome g in the population i(i ∈ 1,2 ..., NUM) carry out mutation operation, produce a random number P at first at random, if P>=P m, the chromogene bit comparison after then filtering;
The gene position comparison procedure is: the chromosome g after will filtering i' filter chromosome g ' with optimum bCarry out corresponding gene for relatively, with g ' bIn gene position be 1 and g i' middle gene position is that 0 gene position is taken out, if g i' in k (k ∈ 1,2 ..., ZN) individual gene position is removed, and the chromosome g of corresponding filtered iThe probability amplitude of k gene position satisfy
Figure BDA00001628489800101
Then with g iIn two probability amplitudes of k gene position
Figure BDA00001628489800102
With
Figure BDA00001628489800103
Exchange the g after the exchange iIn k gene position by &alpha; i k &beta; i k Become &beta; i k &alpha; i k , g iBy g i = [ &alpha; i 1 &beta; i 1 | &alpha; i 2 &beta; i 2 | . . . | &alpha; i k &beta; i k | . . . | &alpha; i Z &CenterDot; N &beta; i Z &CenterDot; N ] Become g i = [ &alpha; i 1 &beta; i 1 | &alpha; i 2 &beta; i 2 | . . . | &beta; i k &alpha; i k | . . . | &alpha; i Z &CenterDot; N &beta; i Z &CenterDot; N ] ; If
Figure BDA00001628489800108
then probability amplitude do not exchange;
If P<P m, chromosome g then iSkip mutation process;
Step 10: judge whether iterations reaches greatest iteration step number MAX,, return step 5, continue circulation if do not reach; If iterations reaches MAX, withdraw from circulation;
Step 11: after the process step 10 withdraws from circulation, the resulting optimum chromosome g ' that filters bBe the air battle multiple goal allocative decision that obtains.
The invention has the advantages that:
(1) the present invention proposes the heuristic quantum genetic method that a kind of air battle multiple goal is distributed; The threat experimental formula of collaborative Multi-target Attacking air combat decision problem is out of shape conversion; Our weapon allocative decision is carried out the quantum bit coding, enlarged the expression scope of feasible solution;
(2) the present invention proposes the heuristic quantum genetic method that a kind of air battle multiple goal is distributed, and according to all attack apportioning costs of each weapon, proposes and design preferential attack apportioning cost vector PAV ZN * 1, make chromosome according to PAV ZN * 1Didactic correction daughter chromosome is accelerated speed of convergence;
(3) the present invention proposes the heuristic quantum genetic method that a kind of air battle multiple goal is distributed, and proposes the variation strategy of the chromosomal probability amplitude exchange of quantum, has accelerated the quantum bit corresponding state to global optimum's derotation, improves search efficiency;
(4) the present invention proposes the heuristic quantum genetic method that a kind of air battle multiple goal is distributed, and quantum genetic algorithm is applied in the air battle multiple goal assignment problem, uses intelligent method to obtain a good air battle multiple goal allocative decision.
Description of drawings
The process flow diagram of the heuristic quantum genetic method that a kind of air battle multiple goal that Fig. 1 the present invention proposes is distributed;
Fig. 2 is a quantum door rotation diagram.
Embodiment
To combine accompanying drawing that the present invention is done further detailed description below:
The present invention proposes the heuristic quantum genetic method that a kind of air battle multiple goal is distributed, and flow process is as shown in Figure 1, comprises following step:
Step 1: obtain current situation of battlefield from the command and control center.
Obtain current situation of battlefield from the command and control center, current situation of battlefield comprises position and attitude, both sides at war's aircraft speed and the maximum tracking range of radar of the entrained weapon quantity of quantity, our every aircraft of our aircraft and enemy's aircraft, all aircraft of current battlefield, the average effective operating distance of the entrained weapon of both sides' aircraft;
Step 2: obtain the current battlefield threat factor between the aircraft between ourselves and the enemy through experimental formula.
Our aircraft to the threat factor experimental formula of enemy's aircraft is:
th ij = &omega; 1 th ij D ij th ij &epsiv; ij + &omega; 2 th ij V Bi - - - ( 1 )
Wherein subscript i representes our aircraft B i(i=1,2 ..., M), wherein M representes the total quantity of our aircraft, subscript j representes enemy's aircraft R j(j=1,2 ..., N), N representes the total quantity th of enemy's aircraft IjRepresent our aircraft B iTo enemy's aircraft R jThe threat factor,
Figure BDA00001628489800112
Represent our aircraft B iTo enemy's aircraft R jDistance threaten the factor,
Figure BDA00001628489800113
Represent our aircraft B iTo enemy's aircraft R jAngle threaten the factor,
Figure BDA00001628489800114
Represent our aircraft B iTo enemy's aircraft R jSpeed threaten the factor, ω 1With ω 2Be non-negative weight coefficient, and satisfy ω 1+ ω 2=1;
We is aircraft B iTo enemy's aircraft R jDistance threaten the factor
Figure BDA00001628489800121
Be specially:
th ij D ij = 1.0 D ij &le; Ra B 1 - D ij - Ra B Tr B - Ra B Ra B < D ij &le; Tr B 0.0 D ij > Tr B - - - ( 2 )
D wherein IjRepresent our aircraft B iTo enemy's aircraft R jDistance, Ra BRepresent our aircraft B iThe average effective operating distance of entrained weapon, Tr BThe maximum tracking range of representing our aircraft radars;
We is aircraft B iTo enemy's aircraft R jAngle threaten the factor
Figure BDA00001628489800123
Be specially:
th ij &epsiv; ij = e - &lambda; 1 ( &pi;&epsiv; ij / 180 ) &lambda; 2 - - - ( 3 )
ε wherein IjExpression enemy aircraft R jWith respect to we aircraft B iOff-axis angle, λ 1With λ 2Be constant λ 1With λ 2Generally between 0 to 10, there is not the relation of mutual restriction in value.
We is aircraft B iTo enemy's aircraft R jSpeed threaten the factor
Figure BDA00001628489800125
Be specially:
th ij V Bi = 1.0 V R j < 0.5 V B i 1.5 - V R j / V B i 0.5 V B i < V R j &le; 1.4 V B i 0.1 V R j > 1.4 V B i - - - ( 4 )
Wherein
Figure BDA00001628489800127
Represent our aircraft B iSpeed,
Figure BDA00001628489800128
Expression enemy aircraft R jSpeed;
In like manner, enemy's aircraft R jTo we aircraft B iThe threat experimental formula be:
th ji = &omega; 3 th ji D ji th ji &epsiv; ji + &omega; 4 th ji V Rj - - - ( 5 )
Wherein subscript j representes enemy's aircraft R j, subscript i representes our aircraft B i, th JiExpression enemy aircraft R jTo we aircraft B iThe threat factor,
Figure BDA000016284898001210
Expression enemy aircraft R jTo we aircraft B iDistance threaten the factor,
Figure BDA000016284898001211
Expression enemy aircraft R jTo we aircraft B iAngle threaten the factor,
Figure BDA000016284898001212
Expression enemy aircraft R jTo we aircraft B iSpeed threaten the factor, ω 3With ω 4Be non-negative weight coefficient, and satisfy ω 3+ ω 4=1;
Enemy's aircraft R jTo we aircraft B iDistance threaten the factor Be specially:
th ji D ji = 1.0 D ji &le; Ra R 1 - D ji - Ra R Tr R - Ra R Ra R < D ji &le; Tr R 0.0 D ji > Tr R - - - ( 6 )
D wherein JiExpression enemy aircraft R jTo we aircraft B iDistance, Ra RExpression enemy aircraft R jThe average effective operating distance of entrained weapon, Tr RThe maximum tracking range of expression enemy aircraft radars;
Enemy's aircraft R jTo we aircraft B iAngle threaten the factor
Figure BDA00001628489800132
Be specially:
th ji &epsiv; ji = e - &lambda; 3 ( &pi;&epsiv; ji / 180 ) &lambda; 4 - - - ( 7 )
ε wherein JiRepresent our aircraft B iWith respect to enemy's aircraft R jOff-axis angle, λ 3With λ 4Be constant, λ 3With λ 4Value generally between 0 to 10, do not have the relation of mutual restriction.
Enemy's aircraft R jTo we aircraft B iSpeed threaten the factor
Figure BDA00001628489800134
Be specially:
th ji V Rj = 1.0 V B i < 0.5 V R j 1.5 - V B i / V R j 0.5 V R j < V B i &le; 1.4 V R j 0.1 V B i > 1.4 V R j - - - ( 8 )
Wherein
Figure BDA00001628489800136
Expression enemy aircraft R jSpeed,
Figure BDA00001628489800137
Represent our aircraft B iSpeed;
Step 3: all of each weapon of obtaining all our aircraft according to the apportioning cost experimental formula are attacked apportioning costs, make up the preferential apportioning cost vector of attacking.
We is aircraft B i(i=1,2 ..., M) to enemy's aircraft R j(j=1,2 ..., apportioning cost experimental formula N) is:
AV ij = th ij &CenterDot; &Sigma; i = 1 M th ji - - - ( 9 )
Th wherein IjRepresent our aircraft B iTo enemy's aircraft R jThe threat factor, Expression enemy aircraft R jTo we aircraft B iThreat, AV IjRepresent our aircraft B iAttack enemy's aircraft R jAttack apportioning cost;
According to apportioning cost experimental formula (9) calculate our all weapon r (r=1,2 ..., Z) the aircraft B at this end of institute iThe integral body of all enemy's aircraft is attacked apportioning cost vector AV ZN * 1For
AV ZN×1=[AV 11,AV 12,…,AV 1N,AV 21,…,AV ZN],
Wherein Z is the total quantity of the entrained weapon of our all aircraft, AV 11Represent that our carrying arms is numbered 1 aircraft attack enemy aircraft R 1The attack apportioning cost, AV 12Represent that our carrying arms is numbered 1 aircraft attack enemy aircraft R 2The attack apportioning cost, AV 1NRepresent that our carrying arms is numbered 1 aircraft attack enemy aircraft R NThe attack apportioning cost, AV 21Represent that our carrying arms is numbered 2 aircraft attack enemy aircraft R 1The attack apportioning cost, AV ZNRepresent that our carrying arms is numbered the aircraft attack enemy aircraft R of Z NThe attack apportioning cost.The whole apportioning cost vector AV that attacks ZN * 1=[AV 11, AV 12..., AV 1N, AV 21..., AV ZN] in comprised our each weapon attack apportioning cost to each aircraft of enemy, comprise ZN altogether and attack apportioning cost.
Integral body is attacked apportioning cost vector AV ZN * 1Middle ZN AV 11, AV 12..., AV 1N, AV 21..., AV ZNAttack apportioning cost and arrange, obtain priority allocation value vector PAV according to order from big to small ZN * 1, vectorial dimension is ZN * 1.
Step 4: set population scale, greatest iteration step number and variation probability P m,, carry out all the quantum chromosomes in quantum bit coding and the initialization population to our weapon allocative decision.Wherein, Population scale is designated as NUM; Be chromosomal number in the population, the greatest iteration step number is designated as MAX, and promptly step 5 is to the maximum cycle of step 9; Our weapon allocative decision is meant the concrete distribution method of our all weapon attacking enemy aircraft, comprises our whole each weapon in our the weapon allocative decision and once attacks all the independent subschemes in the distribution at certain.Adopt a kind of our weapon allocative decision of chromosome representative among the present invention.
In i our weapon allocative decision (being in i chromosome of population); With we weapon r (r ∈ 1; 2 ..., enemy's aircraft of Z) being attacked carries out the quantum bit coding; Therefore the gene segment length of each weapon equals the number N of enemy's aircraft, and our gene position of each weapon r correspondence is encoded in i chromosome g i r = [ &alpha; i r 1 &beta; i r 1 | &alpha; i r 2 &beta; i r 2 | . . . | &alpha; i rN &beta; i rN ] , i &Element; 1,2 , . . . NUM , α wherein iRepresent that we weapon r does not attack enemy's aircraft R in i the chromosome 1The quantum bit probability amplitude, wherein
Figure BDA00001628489800152
Represent that we weapon r attacks enemy's aircraft R in i the chromosome 1The quantum bit probability amplitude, Represent that we weapon r does not attack enemy's aircraft R in i the chromosome 2Probability amplitude, wherein
Figure BDA00001628489800154
Represent that we weapon r attacks enemy's aircraft R in i the chromosome 2The quantum bit probability amplitude, Represent that we weapon r does not attack enemy's aircraft R in i the chromosome NThe quantum bit probability amplitude, wherein
Figure BDA00001628489800156
Represent that we weapon r attacks enemy's aircraft R in i the chromosome NThe quantum bit probability amplitude.The gene section that in a chromosome of our weapon allocative decision, comprises our Z all weapons, therefore a chromosome total length is ZN, being encoded to an of whole chromosome of i our all weapons g i = [ g i 1 | g i 2 | . . . | g i r | . . . | g i Z ] , i &Element; 1,2 , . . . NUM , Comprise z gene section, wherein r gene section is encoded to the corresponding gene position coding of we weapon r g i r = [ &alpha; i r 1 &beta; i r 1 | &alpha; i r 2 &beta; i r 2 | . . . | &alpha; i RN &beta; i RN ] , i &Element; 1,2 , . . . NUM , Therefore include ZN gene position in the whole chromosome.Right g i = [ g i 1 | g i 2 | . . . | g i r | . . . | g i Z ] , i &Element; 1,2 , . . . NUM In each gene position launch fully according to each gene position coding after, from 1 to ZN serial number, the chromosome after then renumbeing is:
g i = [ &alpha; i 1 &beta; i 1 | &alpha; i 2 &beta; i 2 | . . . | &alpha; i ( r - 1 ) &CenterDot; N + j &beta; i ( r - 1 ) &CenterDot; N + j | . . . | &alpha; i Z &CenterDot; N &beta; i Z &CenterDot; N ] = [ &alpha; i 1 &beta; i 1 | &alpha; i 2 &beta; i 2 | . . . | &alpha; i k &beta; i k | . . . | &alpha; i Z &CenterDot; N &beta; i Z &CenterDot; N ] - - - ( 10 ) ;
Wherein i ∈ 1,2 ... NUM, r ∈ 1,2 ..., Z, j ∈ 1,2 ..., N, k=(r-1) N+j and k ∈ 1,2 ..., ZN; In i chromosome of
Figure BDA000016284898001511
expression the 1st, the 2nd ... (r-1) N+j ... ZN gene position do not attacked the quantum bit probability amplitude of enemy's aircraft,
Figure BDA000016284898001512
in i chromosome of expression the 1st, the 2nd ... (r-1) N+j ... ZN gene position attacked the quantum bit probability amplitude of enemy's aircraft;
Each gene position of whole chromosome to our all weapons in the population is carried out initialization, makes all gene position &alpha; i 1 &beta; i 1 , &alpha; i 2 &beta; i 2 . . . &alpha; i ( r - 1 ) &CenterDot; N + j &beta; i ( r - 1 ) &CenterDot; N + j . . . &alpha; i N &CenterDot; Z &beta; i N &CenterDot; Z All be initialized as same numerical value thus make in every chromosome our each weapon attacking enemy aircraft identical with the probability of not attacking enemy's aircraft.
Step 5: quantum chromosome is filtered (in quantum calculation, being called " observation "), confirm the value of each gene position in the chromosome.
To chromosome g i = [ &alpha; i 1 &beta; i 1 | &alpha; i 2 &beta; i 2 | . . . | &alpha; i k &beta; i k | . . . | &alpha; i Z &CenterDot; N &beta; i Z &CenterDot; N ] , i &Element; 1,2 , . . . NUM Filter, each gene position of chromosome is carried out value, for example: first gene position with random chance &alpha; i 1 &beta; i 1 Filter, produce the random number between 0 to 1 immediately, if random number less than
Figure BDA00001628489800166
Value after k gene position filtered is 1, otherwise is taken as 0, the chromosome g after then filtering i' be:
g i &prime; = [ G i 1 | G i 2 | . . . | G i N - Z ] , i &Element; 1,2 , . . . NUM - - - ( 11 )
Wherein
Figure BDA00001628489800168
Or 0 (k ∈ 1,2 ..., NZ),
Figure BDA00001628489800169
Be the chromosome g after filtering i' the k position gene position value, k is NZ the k in the gene position.
Step 6: according to preferential attack apportioning cost vector corrected quantum chromosome.
According to the preferential attack apportioning cost vector PAV that obtains in the step 3 ZN * 1, the chromosome g after will filtering successively i', i ∈ 1,2 ... The attack apportioning cost AV that NUM calculates according to formula (9) IjLittle and
Figure BDA000016284898001610
Gene location be 0, makes chromosome satisfy our weapon and only attack enemy's aircraft, and each enemy's aircraft distributes 2 weapons to attack at most;
If the whole chromosome g after filtering i' in
Figure BDA000016284898001611
Number less than the total number Z of our weapon, according to preferential attack apportioning cost vector PAV ZN * 1Whole chromosome g after will filtering successively i' middle attack apportioning cost AV IjBig and Gene location be 1.
Step 7: obtain through the threaten degree of enemy's aircraft behind our weapon attacking according to the threat experimental formula after the conversion, and find out historical optimum solution to our aircraft.
Threaten in the experimental formula for the quantum bit coding that filters after stain colour solid gene position in the step 4 is corresponded to, the threaten degree objective function carried out following conversion:
E = min &Sigma; j = 1 N &Sigma; i = 1 M { th ji &CenterDot; [ &Pi; r = 1 Z ( 1 - th rj ) X rj ] }
= min &Sigma; i = 1 M &Sigma; j = 1 N { th ji &CenterDot; [ &Pi; r = 1 Z ( 1 - th rj ) X rj ] }
= min &Sigma; i = 1 M &Sigma; j - 1 N { th ji &CenterDot; [ &Pi; r = 1 Z ( 1 - th rj ) G j + ( r - 1 ) &CenterDot; N ] } - - - ( 12 )
Wherein: E representes the threaten degree objective function, and N is the total number of enemy's aircraft, and M is the total number of our aircraft, and Z is the total number of our weapon, G J+ (r-1) NN gene position of j+ (r-1) of representing we the chromosome g' after filtering, j ∈ 1,2 ..., N, r ∈ 1,2 ..., ZN; If gene position G k=1 (k ∈ 1 ... 2, Z, 1, and can know k=(r-1) N+j by the corresponding relation in the formula (10), then represent us to be numbered the weapon attacking enemy aircraft R of r jIf we the weapon that is numbered r does not attack enemy's aircraft R 0 expression j
Calculate the chromosome g ' after the i bar filters in the population iThe threaten degree target function value E that process formula (12) obtains i(wherein i ∈ 1,2 ..., NUM),, in individual current the separating of the first generation (the threaten degree target function value that promptly calculates according to formula (12) for the first time), find out the current E of separating of all chromosomes as chromosomal current the separating of i bar iIn minimum value be designated as E as the historical optimum solution (abbreviation optimum solution) of population b, the chromosome g ' after the corresponding filtration iFor filtering chromosome, the optimum of population is designated as g b', corresponding unfiltered chromosome g iOptimum chromosome g for population b
If not the first generation individual (promptly not being to carry out iteration through step 5 to nine for the first time), this generation every chromosomal current separating with historical optimum solution compare, if i the chromosomal current E that separates iLess than historical optimum solution E b, i.e. E i<E b, then with this chromosomal current E that separates iValue give E b, i.e. E b=E i, filter chromosome g with i i' give optimum to filter chromosome g b', i.e. g b'=g i', with i chromosome g iGive optimum chromosome g b, i.e. g b=g iSo will obtain historical optimum solution E through step 7 at every turn b, the optimum chromosome g that filters b' and optimum chromosome g b
Step 8: all chromosomes in the population are carried out the rotation of quantum door.
&alpha; k , &beta; k , = cos &theta; k - sin &theta; k sin &theta; k cos &theta; k &alpha; k &beta; k - - - ( 13 )
With reference to experimental formula (13), wherein α k, β kFor filtering the chromosomal quantum bit probability amplitude that will be rotated in the prochromosome gene position, α ' k, β ' kFor filtering postrotational quantum bit probability amplitude in the after stain colour solid gene position, θ kExpression quantum rotation angle.Inquiry quantum rotation angle θ kTable is rotated θ in the quantum rotation door to every chromosome kQuestion blank as shown in table 1 down:
Table 1: θ in the quantum rotation door kQuestion blank
Figure BDA00001628489800182
F in the above-mentioned table (x) is a target function value, in the step 7 according to enemy's aircraft behind our weapon attacking that obtains of threat experimental formula (12) after the conversion to the threaten degree functional value of our aircraft; S (α kβ k) be θ kSymbol; b kAnd x kBe respectively k during the optimum chromosome that obtains in the step 7 and the current chromosome that will carry out the rotation of quantum door are separated (k ∈ 1,2 ..., the ZN) value of individual gene position.Quantum door rotation diagram is as shown in Figure 2, after the rotation of quantum door, the probability amplitude of k gene position of postrotational chromosome by &alpha; k &beta; k Become &alpha; k , &beta; k , .
Step 9: filter chromosome g ' according to optimum bWith the variation probability P m, all chromosomes in the population are carried out mutation operation.
To the chromosome g in the population iI ∈ 1,2 ..., NUM carries out mutation operation.Produce a random number P at first at random, if P>=P m, the chromogene bit comparison after then filtering;
The gene position comparison procedure is: the chromosome g after will filtering i' filter chromosome g ' with optimum bCarry out corresponding gene for relatively, with g ' bIn gene position be 1 and g i' middle gene position is that 0 gene position is taken out, if g i' in k (k ∈ 1,2 ..., ZN) individual gene position is removed, and the chromosome g of corresponding filtered iThe probability amplitude of k gene position satisfy Then with g iIn two probability amplitudes of k gene position
Figure BDA00001628489800194
With Exchange the g after the exchange iIn k gene position by &alpha; i k &beta; i k Become &beta; i k &alpha; i k , g iBy g i = [ &alpha; i 1 &beta; i 1 | &alpha; i 2 &beta; i 2 | . . . | &alpha; i k &beta; i k | . . . | &alpha; i Z &CenterDot; N &beta; i Z &CenterDot; N ] Become g i = [ &alpha; i 1 &beta; i 1 | &alpha; i 2 &beta; i 2 | . . . | &beta; i k &alpha; i k | . . . | &alpha; i Z &CenterDot; N &beta; i Z &CenterDot; N ] ; If
Figure BDA000016284898001910
then probability amplitude do not exchange.
If P<P m, chromosome g then iSkip mutation process.
Step 10: judge whether iterations reaches greatest iteration step number MAX,, return step 5, continue circulation if do not reach; If iterations reaches MAX, withdraw from circulation.
Step 11: after the process step 10 withdraws from circulation, the resulting optimum chromosome g ' that filters bBe the air battle multiple goal allocative decision that obtains.

Claims (1)

1. an air battle multiple goal heuristic quantum genetic method of distributing is characterized in that: comprise following step:
Step 1: obtain current situation of battlefield from the command and control center:
Step 2: obtain the current battlefield threat factor between the aircraft between ourselves and the enemy through experimental formula;
Our aircraft to the threat factor experimental formula of enemy's aircraft is:
th ij = &omega; 1 th ij D ij th ij &epsiv; ij + &omega; 2 th ij V Bi - - - ( 1 )
Wherein subscript i representes our aircraft B i(i=1,2 ..., M), wherein M representes the total quantity of our aircraft, subscript j representes enemy's aircraft R j(j=1,2 ..., N), N representes the total quantity of enemy's aircraft, th IjRepresent our aircraft B iTo enemy's aircraft R jThe threat factor, Represent our aircraft B iTo enemy's aircraft R jDistance threaten the factor,
Figure FDA00001628489700013
Represent our aircraft B iTo enemy's aircraft R jAngle threaten the factor,
Figure FDA00001628489700014
Represent our aircraft B iTo enemy's aircraft R jSpeed threaten the factor, wherein ω 1With ω 2Be non-negative weight coefficient, and satisfy ω 1+ ω 2=1;
We is aircraft B iTo enemy's aircraft R jDistance threaten the factor
Figure FDA00001628489700015
Be specially:
th ij D ij = 1.0 D ij &le; Ra B 1 - D ij - Ra B Tr B - Ra B Ra B < D ij &le; Tr B 0.0 D ij > Tr B - - - ( 2 )
Wherein: D IjRepresent our aircraft B iTo enemy's aircraft R jDistance, Ra BThe average effective operating distance of representing the entrained weapon of we aircraft Bi, Tr BThe maximum tracking range of representing our aircraft radars;
We is aircraft B iTo enemy's aircraft R jAngle threaten the factor
Figure FDA00001628489700017
Be specially:
th ij &epsiv; ij = e - &lambda; 1 ( &pi;&epsiv; ij / 180 ) &lambda; 2 - - - ( 3 )
ε wherein IjExpression enemy aircraft R jWith respect to we aircraft B iOff-axis angle, λ 1With λ 2Be constant λ 1With λ 2Generally between 0 to 10, there is not the relation of mutual restriction in value;
We is aircraft B iTo enemy's aircraft R jSpeed threaten the factor
Figure FDA00001628489700019
Be specially:
th ij V Bi = 1.0 V R j < 0.5 V B i 1.5 - V R j / V B i 0.5 V B i < V R j &le; 1.4 V B i 0.1 V R j > 1.4 V B i - - - ( 4 )
Wherein
Figure FDA00001628489700022
Represent our aircraft B iSpeed,
Figure FDA00001628489700023
Expression enemy aircraft R jSpeed; Enemy's aircraft R in like manner jTo we aircraft B iThe threat experimental formula be:
th ji = &omega; 3 th ji D ji + th ji &epsiv; ji + &omega; 4 th ji V Rj - - - ( 5 )
Wherein subscript j representes enemy's aircraft R j, subscript i representes our aircraft B i, th JiExpression enemy aircraft R jTo we aircraft B iThe threat factor, Expression enemy aircraft R jTo we aircraft B jDistance threaten the factor, Expression enemy aircraft R jTo we aircraft B iAngle threaten the factor,
Figure FDA00001628489700027
Expression enemy aircraft R jTo we aircraft B iSpeed threaten the factor, ω 3With ω 4Be non-negative weight coefficient, and satisfy ω 3+ ω 4=1;
Enemy's aircraft R jTo we aircraft B iDistance threaten the factor Be specially:
th ji D ji = 1.0 D ji &le; Ra R 1 - D ji - Ra R Tr R - Ra R Ra R < D ji &le; Tr R 0.0 D ji > Tr R - - - ( 6 )
D wherein JiExpression enemy aircraft R jTo we aircraft B iDistance, Ra RExpression enemy aircraft R jThe average effective operating distance of entrained weapon, Tr RThe maximum tracking range of expression enemy aircraft radars;
Enemy's aircraft R jTo we aircraft B iAngle threaten the factor
Figure FDA000016284897000210
Be specially:
th ji &epsiv; ji = e - &lambda; 3 ( &pi;&epsiv; ji / 180 ) &lambda; 4 - - - ( 7 )
ε wherein JiRepresent our aircraft B iWith respect to enemy's aircraft R jOff-axis angle, λ 3With λ 4Be constant;
Enemy's aircraft R jTo we aircraft B iSpeed threaten the factor
Figure FDA000016284897000212
Be specially:
th ji V Rj = 1.0 V B i < 0.5 V R j 1.5 - V B i / V R j 0.5 V R j < V B i &le; 1.4 V R j 0.1 V B i > 1.4 V R j - - - ( 8 )
Wherein
Figure FDA000016284897000214
Expression enemy aircraft R jSpeed,
Figure FDA000016284897000215
Represent our aircraft B iSpeed;
Step 3: all of each weapon of obtaining all our aircraft according to the apportioning cost experimental formula are attacked apportioning costs, make up the preferential apportioning cost vector of attacking:
We is aircraft B i(i=1,2 ..., M) to enemy's aircraft R j(j=1,2 ..., apportioning cost experimental formula N) is:
AV ij = th ij &CenterDot; &Sigma; i = 1 M th ji - - - ( 9 )
Th wherein IjRepresent our aircraft B iTo enemy's aircraft R jThe threat factor,
Figure FDA00001628489700032
Expression enemy aircraft R jTo we aircraft B iThreat, AV IjRepresent our aircraft B iAttack enemy's aircraft R jAttack apportioning cost;
According to apportioning cost experimental formula (9) calculate our all weapon r (r=1,2 ..., Z) the aircraft B at this end of institute iThe integral body of all enemy's aircraft is attacked apportioning cost vector AV ZN * 1For
AV ZN×1=[AV 11,AV 12,…,AV 1N,AV 21,…,AV ZN],
Wherein Z is the total quantity of the entrained weapon of our all aircraft, AV 11Represent that our carrying arms is numbered 1 aircraft attack enemy aircraft R 1The attack apportioning cost, AV 12Represent that our carrying arms is numbered 1 aircraft attack enemy aircraft R 2The attack apportioning cost, AV 1NRepresent that our carrying arms is numbered 1 aircraft attack enemy aircraft R NThe attack apportioning cost, AV 21Represent that our carrying arms is numbered 2 aircraft attack enemy aircraft R 1The attack apportioning cost, AV ZNRepresent that our carrying arms is numbered the aircraft attack enemy aircraft R of Z NThe attack apportioning cost, the whole apportioning cost vector AV that attacks ZN * 1=[AV 11, AV 12..., AV 1N, AV 21..., AV ZN] in comprised our each weapon attack apportioning cost to each aircraft of enemy, comprise ZN altogether and attack apportioning cost;
Integral body is attacked apportioning cost vector AV ZN * 1Middle ZN AV 11, AV 12..., AV 1N, AV 21..., AV ZNAttack apportioning cost and arrange, obtain priority allocation value vector PAV according to order from big to small ZN * 1, vectorial dimension is ZN * 1;
Step 4: set population scale, greatest iteration step number and variation probability P m, to our weapon allocative decision, carry out all the quantum chromosomes in quantum bit coding and the initialization population, wherein population scale is designated as NUM; Be chromosomal number in the population, the greatest iteration step number is designated as MAX, in i our weapon allocative decision; With our weapon r (r ∈ 1,2 ... Z) enemy's aircraft of being attacked carries out quantum bit coding, and the gene segment length of each weapon equals the number N of enemy's aircraft, and therefore our gene position of each weapon r correspondence is encoded in i chromosome g i r = [ &alpha; i r 1 &beta; i r 1 | &alpha; i r 2 &beta; i r 2 | . . . | &alpha; i RN &beta; i RN ] , I ∈ 1,2 ... NUM, wherein
Figure FDA00001628489700042
Represent that we weapon r does not attack enemy's aircraft R in i the chromosome 1The quantum bit probability amplitude, wherein
Figure FDA00001628489700043
Represent that we weapon r attacks enemy's aircraft R in i the chromosome 1The quantum bit probability amplitude,
Figure FDA00001628489700044
Represent that we weapon r does not attack enemy's aircraft R in i the chromosome 2Probability amplitude, wherein Represent that we weapon r attacks enemy's aircraft R in i the chromosome 2The quantum bit probability amplitude,
Figure FDA00001628489700046
Represent that we weapon r does not attack enemy's aircraft R in i the chromosome NThe quantum bit probability amplitude, wherein
Figure FDA00001628489700047
Represent that we weapon r attacks enemy's aircraft R in i the chromosome NThe quantum bit probability amplitude, in a chromosome of our weapon allocative decision, comprise the gene section of our Z all weapons, therefore a chromosome total length is ZN, being encoded to an of whole chromosome of i our all weapons g i = [ g i 1 | g i 2 | . . . | g i r | . . . | g i Z ] , i &Element; 1,2 , . . . NUM , Comprise z gene section, wherein r gene section is encoded to the corresponding gene position coding of we weapon r g i r = [ &alpha; i r 1 &beta; i r 1 | &alpha; i r 2 &beta; i r 2 | . . . | &alpha; i RN &beta; i RN ] , i &Element; 1,2 , . . . NUM , Therefore include ZN gene position in the whole chromosome, right g i = [ g i 1 | g i 2 | . . . | g i r | . . . | g i Z ] , i &Element; 1,2 , . . . NUM In each gene position launch fully according to each gene position coding after, from 1 to ZN serial number, the chromosome after then renumbeing is:
g i = [ &alpha; i 1 &beta; i 1 | &alpha; i 2 &beta; i 2 | . . . | &alpha; i ( r - 1 ) &CenterDot; N + j &beta; i ( r - 1 ) &CenterDot; N + j | . . . | &alpha; i Z &CenterDot; N &beta; i Z &CenterDot; N ] = [ &alpha; i 1 &beta; i 1 | &alpha; i 2 &beta; i 2 | . . . | &alpha; i k &beta; i k | . . . | &alpha; i Z &CenterDot; N &beta; i Z &CenterDot; N ] - - - ( 10 )
Wherein i ∈ 1,2 ... NUM, r ∈ 1,2 ..., Z, j ∈ 1,2 ..., N, k=(r-1) N+j and k ∈ 1,2 ..., ZN; In i chromosome of
Figure FDA000016284897000412
expression the 1st, the 2nd ... (r-1) N+j ... ZN gene position do not attacked the quantum bit probability amplitude of enemy's aircraft, in i chromosome of
Figure FDA000016284897000414
expression the 1st, the 2nd ... (r-1) N+j ... ZN gene position attacked the quantum bit probability amplitude of enemy's aircraft;
Each gene position of whole chromosome to our all weapons in the population is carried out initialization, makes all gene position &alpha; i 1 &beta; i 1 , &alpha; i 2 &beta; i 2 . . . &alpha; i ( r - 1 ) &CenterDot; N + j &beta; i ( r - 1 ) &CenterDot; N + j . . . &alpha; i N &CenterDot; Z &beta; i N &CenterDot; Z All be initialized as same numerical value thus make in every chromosome our each weapon attacking enemy aircraft identical with the probability of not attacking enemy's aircraft;
Step 5: quantum chromosome is filtered, confirm the value of each gene position in the chromosome;
To chromosome g i = [ &alpha; i 1 &beta; i 1 | &alpha; i 2 &beta; i 2 | . . . | &alpha; i k &beta; i k | . . . | &alpha; i Z &CenterDot; N &beta; i Z &CenterDot; N ] , I ∈ 1,2 ... NUM filters, and with random chance each gene position of chromosome is carried out value, produces the random number between 0 to 1 immediately, if random number less than
Figure FDA00001628489700055
Value after k gene position filtered is 1, otherwise is taken as 0, the chromosome g after then filtering i' be:
g i &prime; = [ G i 1 | G i 2 | . . . | G i N - Z ] , i &Element; 1,2 , . . . NUM - - - ( 11 )
Wherein
Figure FDA00001628489700057
Or 0 (k ∈ 1,2 ..., NZ), Be the chromosome g after filtering i' the k position gene position value, k is NZ the k in the gene position;
Step 6: according to preferential attack apportioning cost vector corrected quantum chromosome;
According to the preferential attack apportioning cost vector PAV that obtains in the step 3 ZN * 1, the chromosome g after will filtering successively i', i ∈ 1,2 ... The attack apportioning cost AV that NUM calculates according to formula (9) IjLittle and
Figure FDA00001628489700059
Gene location be 0, makes chromosome satisfy our weapon and only attack enemy's aircraft, and each enemy's aircraft distributes 2 weapons to attack at most;
If the whole chromosome g after filtering i' in
Figure FDA000016284897000510
Number less than the total number Z of our weapon, according to preferential attack apportioning cost vector PAV ZN * 1Whole chromosome g after will filtering successively i' middle attack apportioning cost AV IjBig and
Figure FDA000016284897000511
Gene location be 1;
Step 7: obtain through the threaten degree of enemy's aircraft behind our weapon attacking according to the threat experimental formula after the conversion, and find out historical optimum solution to our aircraft;
Threaten in the experimental formula for the quantum bit coding that filters after stain colour solid gene position in the step 4 is corresponded to, the threaten degree objective function carried out following conversion:
E = min &Sigma; j = 1 N &Sigma; i = 1 M { th ji &CenterDot; [ &Pi; r = 1 Z ( 1 - th rj ) X rj ] }
= min &Sigma; i = 1 M &Sigma; j = 1 N { th ji &CenterDot; [ &Pi; r = 1 Z ( 1 - th rj ) X rj ] }
= min &Sigma; i = 1 M &Sigma; j - 1 N { th ji &CenterDot; [ &Pi; r = 1 Z ( 1 - th rj ) G j + ( r - 1 ) &CenterDot; N ] } - - - ( 12 )
Wherein: E representes the threaten degree objective function, and N is the total number of enemy's aircraft, and M is the total number of our aircraft, and Z is the total number of our weapon, G J+ (r-1) NN gene position of j+ (r-1) of representing we the chromosome g' after filtering, j ∈ 1,2 ..., N, r ∈ 1,2 ..., ZN; If gene position G k=1 (k ∈ 1 ... 2, Z, 1, and can know k=(r-1) N+j by the corresponding relation in the formula (10), then represent us to be numbered the weapon attacking enemy aircraft R of r jIf we the weapon that is numbered r does not attack enemy's aircraft R 0 expression j
Calculate the chromosome g ' after the i bar filters in the population iThe threaten degree target function value E that process formula (12) obtains i, wherein i ∈ 1,2 ..., NUM as chromosomal current the separating of i bar, in individual current the separating of the first generation, finds out the current E of separating of all chromosomes iIn minimum value as the historical optimum solution of population, be designated as E b, the chromosome g ' after the corresponding filtration iFor filtering chromosome, the optimum of population is designated as g b', corresponding unfiltered chromosome g iOptimum chromosome g for population b
If not the first generation is individual, this generation every chromosomal current separating with historical optimum solution compare, if i the chromosomal current E that separates iLess than historical optimum solution E b, i.e. E i<E b, then with this chromosomal current E that separates iValue give E b, i.e. E b=E i, filter chromosome g with i i' give optimum to filter chromosome g b', i.e. g b'=g i', with i chromosome g iGive optimum chromosome g b, g b=g i
Step 8: all chromosomes in the population are carried out the rotation of quantum door;
&alpha; k , &beta; k , = cos &theta; k - sin &theta; k sin &theta; k cos &theta; k &alpha; k &beta; k - - - ( 13 )
With reference to experimental formula (13), wherein α k, β kFor filtering the chromosomal quantum bit probability amplitude that will be rotated in the prochromosome gene position, α ' k, β ' kFor filtering postrotational quantum bit probability amplitude in the after stain colour solid gene position, θ kExpression quantum rotation angle, inquiry quantum rotation angle θ kTable is rotated every chromosome, after the rotation of quantum door, the probability amplitude of k gene position of postrotational chromosome by &alpha; k &beta; k Become &alpha; k , &beta; k , ;
Step 9: filter chromosome g ' according to optimum bWith the variation probability P m, all chromosomes in the population are carried out mutation operation;
To the chromosome g in the population iI ∈ 1,2 ..., NUM carries out mutation operation, produces a random number P at first at random, if P>=P m, the chromogene bit comparison after then filtering;
The gene position comparison procedure is: the chromosome g after will filtering i' filter chromosome g ' with optimum bCarry out corresponding gene for relatively, with g ' bIn gene position be 1 and g i' middle gene position is that 0 gene position is taken out, if g i' in k (k ∈ 1,2 ..., ZN) individual gene position is removed, and the chromosome g of corresponding filtered iThe probability amplitude of k gene position satisfy
Figure FDA00001628489700073
Then with g iIn two probability amplitudes of k gene position
Figure FDA00001628489700074
With Exchange the g after the exchange iIn k gene position by &alpha; i k &beta; i k Become &beta; i k &alpha; i k , g iBy g i = [ &alpha; i 1 &beta; i 1 | &alpha; i 2 &beta; i 2 | . . . | &alpha; i k &beta; i k | . . . | &alpha; i Z &CenterDot; N &beta; i Z &CenterDot; N ] Become g i = [ &alpha; i 1 &beta; i 1 | &alpha; i 2 &beta; i 2 | . . . | &beta; i k &alpha; i k | . . . | &alpha; i Z &CenterDot; N &beta; i Z &CenterDot; N ] ; If
Figure FDA000016284897000710
then probability amplitude do not exchange;
If P<P m, chromosome g then iSkip mutation process;
Step 10: judge whether iterations reaches greatest iteration step number MAX,, return step 5, continue circulation if do not reach; If iterations reaches MAX, withdraw from circulation;
Step 11: after the process step 10 withdraws from circulation, the resulting optimum chromosome g ' that filters bBe the air battle multiple goal allocative decision that obtains.
CN201210147056.0A 2012-05-11 2012-05-11 Heuristic quantum genetic method of multi-target distribution in air war Expired - Fee Related CN102722751B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210147056.0A CN102722751B (en) 2012-05-11 2012-05-11 Heuristic quantum genetic method of multi-target distribution in air war

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210147056.0A CN102722751B (en) 2012-05-11 2012-05-11 Heuristic quantum genetic method of multi-target distribution in air war

Publications (2)

Publication Number Publication Date
CN102722751A true CN102722751A (en) 2012-10-10
CN102722751B CN102722751B (en) 2014-07-30

Family

ID=46948500

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210147056.0A Expired - Fee Related CN102722751B (en) 2012-05-11 2012-05-11 Heuristic quantum genetic method of multi-target distribution in air war

Country Status (1)

Country Link
CN (1) CN102722751B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103246818A (en) * 2013-05-15 2013-08-14 西北工业大学 TOPSIS-method multi-target threat ordering method based on information entropy
CN109376544A (en) * 2018-09-18 2019-02-22 浙江工业大学 A method of prevent the community structure in complex network from being excavated by depth
CN112284188A (en) * 2020-09-25 2021-01-29 南京航空航天大学 Unmanned aerial vehicle attack and defense decision method based on self-adaptive step discrete wolf cluster algorithm

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050143845A1 (en) * 2003-12-24 2005-06-30 Hirotaka Kaji Multiobjective optimization apparatus, multiobjective optimization method and multiobjective optimization program
CN101908097A (en) * 2010-07-13 2010-12-08 北京航空航天大学 Particle swarm optimization method for air combat decision

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050143845A1 (en) * 2003-12-24 2005-06-30 Hirotaka Kaji Multiobjective optimization apparatus, multiobjective optimization method and multiobjective optimization program
CN101908097A (en) * 2010-07-13 2010-12-08 北京航空航天大学 Particle swarm optimization method for air combat decision

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
WANG ZHITENG ET AL: "Majorization Of Artillery Fire Distribution Base On Quantum Genetic Algorithm", 《2011 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEM DESIGN AND ENGINEERING APPLICATION》 *
张鹏飞等: "量子遗传算法在目标分配上的应用", 《佳木斯大学学报( 自然科学版)》 *
武志东等: "基于量子遗传算法的反舰导弹火力分配方法", 《计算机测量与控制》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103246818A (en) * 2013-05-15 2013-08-14 西北工业大学 TOPSIS-method multi-target threat ordering method based on information entropy
CN109376544A (en) * 2018-09-18 2019-02-22 浙江工业大学 A method of prevent the community structure in complex network from being excavated by depth
CN112284188A (en) * 2020-09-25 2021-01-29 南京航空航天大学 Unmanned aerial vehicle attack and defense decision method based on self-adaptive step discrete wolf cluster algorithm

Also Published As

Publication number Publication date
CN102722751B (en) 2014-07-30

Similar Documents

Publication Publication Date Title
CN106406346B (en) A kind of multiple no-manned plane collaboration rapid Cover search path planning method
CN108680063B (en) A kind of decision-making technique for extensive unmanned plane cluster dynamic confrontation
CN101908097B (en) Particle swarm optimization method for air combat decision
CN103744290B (en) A kind of multiple no-manned plane formation layering target assignment method
CN112733421B (en) Task planning method for cooperation of unmanned aerial vehicle with ground fight
CN108549402B (en) Unmanned aerial vehicle group task allocation method based on quantum crow group search mechanism
CN107832885B (en) Ship formation fire power distribution method based on self-adaptive migration strategy BBO algorithm
CN102506863B (en) Universal gravitation search-based unmanned plane air route planning method
CN105739303B (en) Multiple no-manned plane collaboration strike method for allocating tasks based on rolling time horizon method
CN102436604B (en) Multi-missile collaborative route calculation method based on multi-target evolution method
CN103425840A (en) Cooperative air combat firepower distribution method based on improved multi-target leapfrog algorithm
CN110766254A (en) Multi-unmanned aerial vehicle cooperative task allocation method based on improved genetic algorithm
CN111240353A (en) Unmanned aerial vehicle collaborative air combat decision method based on genetic fuzzy tree
CN109460056A (en) Unmanned plane cluster fight game decision-making method based on quantum krill group&#39;s mechanism of Evolution
CN111240366A (en) Swarm unmanned aerial vehicle cooperative attack method based on genetic simulated annealing algorithm
CN101286071A (en) Multiple no-manned plane three-dimensional formation reconfiguration method based on particle swarm optimization and genetic algorithm
CN102722751B (en) Heuristic quantum genetic method of multi-target distribution in air war
CN103413186A (en) Cooperative multi-aircraft target distribution method based on hybrid optimization algorithm
CN105590142A (en) Method for assigning collective fire of combined teams
CN101893441A (en) Unmanned aerial vehicle flight path optimization method based on deviation maximization and grey correlation analysis
CN104950673A (en) Method for distributing targets cooperatively attacked by unmanned aerial vehicle group
CN113031650B (en) Unmanned aerial vehicle cluster cooperative target distribution design method under uncertain environment
CN111859816A (en) Simulated physical method and DDQN combined unmanned aerial vehicle cluster air combat decision method
Qiuni et al. Approach for air-to-air confrontment based on uncertain interval information conditions
CN112926825A (en) Multi-unmanned aerial vehicle task allocation method based on multi-target quantum shrimp swarm mechanism

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140730

Termination date: 20150511

EXPY Termination of patent right or utility model