CN115016526B - Cluster self-organizing control method for double-layer defense - Google Patents
Cluster self-organizing control method for double-layer defense Download PDFInfo
- Publication number
- CN115016526B CN115016526B CN202210476976.0A CN202210476976A CN115016526B CN 115016526 B CN115016526 B CN 115016526B CN 202210476976 A CN202210476976 A CN 202210476976A CN 115016526 B CN115016526 B CN 115016526B
- Authority
- CN
- China
- Prior art keywords
- cluster
- individual
- item
- defending
- intrusion
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000007123 defense Effects 0.000 title claims abstract description 36
- 238000000034 method Methods 0.000 title claims abstract description 29
- 230000008447 perception Effects 0.000 claims description 12
- 238000009827 uniform distribution Methods 0.000 claims description 5
- 230000002195 synergetic effect Effects 0.000 claims description 4
- 230000008859 change Effects 0.000 claims description 3
- 238000004590 computer program Methods 0.000 claims description 2
- 230000003993 interaction Effects 0.000 abstract description 9
- 230000000694 effects Effects 0.000 abstract description 7
- 239000010410 layer Substances 0.000 description 9
- 230000033001 locomotion Effects 0.000 description 7
- 230000006399 behavior Effects 0.000 description 6
- 238000004088 simulation Methods 0.000 description 6
- 230000009545 invasion Effects 0.000 description 5
- 230000001133 acceleration Effects 0.000 description 4
- 238000013461 design Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 241000251468 Actinopterygii Species 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000008485 antagonism Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000001580 bacterial effect Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000004138 cluster model Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 239000002355 dual-layer Substances 0.000 description 1
- 230000007717 exclusion Effects 0.000 description 1
- 238000005290 field theory Methods 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 230000005012 migration Effects 0.000 description 1
- 238000013508 migration Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05D—SYSTEMS FOR CONTROLLING OR REGULATING NON-ELECTRIC VARIABLES
- G05D1/00—Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots
- G05D1/10—Simultaneous control of position or course in three dimensions
- G05D1/101—Simultaneous control of position or course in three dimensions specially adapted for aircraft
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Landscapes
- Engineering & Computer Science (AREA)
- Aviation & Aerospace Engineering (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Burglar Alarm Systems (AREA)
Abstract
The invention relates to a self-organizing control method of a double-layer defending cluster, wherein the defending cluster and the intrusion cluster respectively have different individual attributes and interaction strategies, and a defending potential field force is formed by constructing a defending potential field to realize a double-layer defending effect for the defending cluster, and in addition, a position cooperative item, a speed cooperative item, a self-driving item, an anti-intrusion item and a random noise item are also provided, so that the intrusion of an intruder can be dealt with by setting different weight coefficients; for an intrusion cluster, a certain difference exists between a cooperative rule and a defense cluster, and main cooperative items comprise: the method comprises the steps of setting a cooperative item weight coefficient to complete an intrusion task. And (3) making a rule on the cooperative rules and the interaction strategies of the two-party clusters, further determining the defending cluster parameters according to the defending effect, and finally realizing successful cluster defending.
Description
Technical Field
The invention relates to the technical field of cluster intelligence, in particular to a self-organizing control method for carrying out cluster defense countermeasure by utilizing a double-layer defense potential field.
Background
The phenomenon of colony movement is widely found in nature, and is suggested from vortex of fish to migration of bird colony, from cooperation of ant colony to formation of bacterial colony. The individuals composing the group have limited ability and do not have complex intelligent thinking, and the group formed by the individuals can show complex ordered and various intelligent clustering phenomenon, which is also called clustering self-organization emerging behavior. The core of the cluster motion is the basic rule followed by individuals in the cluster, and the rule is followed by the individuals to finally emerge rich phenomena at the group level. By referencing the natural cluster rules, people construct various artificial cluster systems, which are embodied in military use and civil use. For example, the method is applied to unmanned aerial vehicle groups, and can be used for completing complex environment exploration, forest fire prevention and control, personnel search and rescue under disasters, and even realizing cross-domain cooperation through a cluster technology. Meanwhile, various cluster models, such as a social force model, a Vicsek model, a Couzin model and the like, are also put forward on a theoretical level through realizing actual manual clustering.
In terms of defending against intrusion challenge problems, the most basic model is called: target-intruder-defender challenge model (target-attacker-DEFENDER GAME, TAD game). This basic challenge model contains three participants, the target, intruder and defender, respectively. An intruder aims to capture the target while avoiding attack by an defender. Defenders attempt to protect the target while also capturing the intruder as much as possible. The target has no defensive ability to the invader and can only avoid the attack of the invader by escaping. Solutions to TAD models are mainly divided into two categories: and selecting an optimal strategy according to the initial position division dominant region, and constructing a differential equation to dynamically update the state. The TAD problem aims at the defending invasion problem of a single individual, when defending invasion among a plurality of individuals (groups), the method is generally adopted to match a target between an defender and an invader through an allocation algorithm, and the traditional TAD solution method is adopted after one-to-one matching is completed. Namely, the current thought for defending the intrusion problem among groups is to decompose the defending among groups into two steps: individual matching and individual defense. The method simply regards the population as the accumulated sum of a plurality of individuals, changes the population defense into a plurality of individual defenses which are performed simultaneously, and does not fully highlight the population advantage.
So how to motivate population advantage is a core problem for current population defense. Defensive intrusion countermeasures using a clustered self-organizing approach are one option, where how to design clustered individual rules such that defensive behavior emerges is a matter of intense investigation.
Disclosure of Invention
Technical problem to be solved
In order to avoid the defects of the prior art, the invention provides a self-organizing control method for cluster defense, which updates the motion state of individuals by combining a social force model through the design of individual interaction mechanisms in a cluster and among the clusters, and finally realizes the self-organizing control of the cluster defense.
Technical proposal
A cluster self-organizing control method of double-layer defense is characterized in that: setting a cooperative rule of an individual in a defending cluster and an individual in an intrusion cluster;
1) The cooperative rule of the individual in the defense cluster is expressed as follows:
Wherein, Is a self-driven item,/>For location collaborative item,/>Is a velocity synergistic term,/>As a potential field protection term,As an anti-intrusion term, ηζ i is random noise;
the self-driving item
Wherein, alpha represents the maximum value of the defending cluster speed, and v i (t) represents the defending cluster speed;
The position cooperative item
Representing the balance position adjustment parameter of attraction force and repulsion force, wherein the repulsion force is represented when the individual interval is smaller than the value, and the attraction force is represented when the individual interval is larger than the value; /(I)Representing the subgroup spacing, the repulsive force between subgroups reaching a maximum when the individual spacing is equal to the value; /(I)A unit vector representing the location vector of neighbor individuals to individuals D i;
n i is a set of perceivable neighbors:
Ni={k|dik<Rsen,k∈{1,...,ND},k≠i}
Wherein d ik represents the distance between individuals in the defensive cluster, and R sen > 0 is the perceived radius of the defensive cluster;
The speed cooperative item
Representing the speed of the neighbor individual with the largest angle change in the neighbors;
The potential field protection item
Wherein d ip represents the distance from the defending individual to the protected object,A unit vector representing a position vector of the individual D i to the protection object; /(I)Respectively corresponding to the boundary distances of potential fields surrounding the protection object;
the anti-intrusion item
T i is a set of perceivable intruders:
Ti={k|dik<Rsen,k∈{1,...,NI}}
Wherein d ik represents the distance of the defending individual to the intruder T i within the perception domain, where A unit vector representing a location vector of the individual D i to the intruder T i within the perception domain;
the random noise eta xi i represents random noise with the intensity eta > 0, and the random noise eta xi i is expressed as Is a random vector satisfying uniform distribution at [ -0.5,0.5] 2;
2) The cooperative rule of the individuals in the intrusion cluster is expressed as follows:
wherein, self-driving force The random noise eta zeta j is consistent with the expression of the defender, and only the parameter of the self-driving force of the invading individual, namely the maximum value beta of the speed is different from the self-driving force parameter alpha of the defending individual, wherein beta is more than alpha; the remaining items include location synergy items/>Individual intrusion item/>Anti-flooding item by item/>The specific expression is as follows:
The self-driving force
Wherein, beta represents the maximum value of the intrusion cluster speed, and beta is more than alpha, v j (t) is the intrusion cluster speed;
The position cooperative item
Wherein,A unit vector representing a neighbor individual to individual I j's location vector;
N j is a set of perceivable neighbors:
Nj={k|djk<rsen,k∈{1,...,NI},k≠j}
Wherein d jk represents the inter-individual distance within the intrusion cluster, and r sen > 0 is the perceived radius of the intrusion cluster;
The individual intrusion item
A unit vector representing a position vector of the individual I j to the protected object;
the said anti-flooding item by item
T j is a set of perceivable defenders:
Tj={k|djk<rsen,k∈{1,...,ND}}
N D represents a defensive cluster;
The random noise eta xi j represents random noise with the intensity eta > 0, and the random noise eta xi j is expressed as Is a random vector satisfying a uniform distribution at [ -0.5,0.5] 2.
A computer system, comprising: one or more processors, a computer-readable storage medium storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the methods described above.
A computer readable storage medium, characterized by storing computer executable instructions that when executed are configured to implement the method described above.
A computer program comprising computer executable instructions which when executed are adapted to implement the method described above.
Advantageous effects
The invention provides a cluster self-organizing control method for double-layer defense, which solves the problem of defending intrusion and countermeasure by using the cluster self-organizing control method. By means of the design of individual interaction mechanisms in the group and among the groups and the combination of a social force model, the motion state of the individual is updated, and finally self-organizing control of cluster defense is achieved. The defending clusters and the intrusion clusters respectively have different individual attributes and interaction strategies, wherein a defending potential field force is formed by constructing a defending potential field to realize a double-layer defending effect for the defending clusters, and a position cooperative item, a speed cooperative item, a self-driving item, a counter-intrusion item and a random noise item are also provided for the defending clusters, so that the invaders can be prevented from being intruded by setting different weight coefficients; for an intrusion cluster, a certain difference exists between a cooperative rule and a defense cluster, and main cooperative items comprise: the method comprises the steps of setting a cooperative item weight coefficient to complete an intrusion task. And (3) making a rule on the cooperative rules and the interaction strategies of the two-party clusters, further determining the defending cluster parameters according to the defending effect, and finally realizing successful cluster defending.
Drawings
The drawings are only for purposes of illustrating particular embodiments and are not to be construed as limiting the invention, like reference numerals being used to refer to like parts throughout the several views.
Figure 1 is a schematic diagram of a dual layer defensive loop potential field design.
FIG. 2 is a diagram of a simulation interface in the method of the present invention.
Figure 3 is a simulated view of a defensive sub-population forming a double layer defensive loop in the method of the invention.
Fig. 4 is a simulated view of the capture radius of an intruder into an defender in the method of the present invention.
Figure 5 is a simulated view of an intruder surrounded by inner and outer defensive subgroups in the method of the present invention.
Figure 6 is a simulation diagram of the successful defense of a defense cluster in the method of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention. In addition, technical features of the embodiments of the present invention described below may be combined with each other as long as they do not collide with each other.
The invention provides a cluster defense model capable of realizing defense intrusion countermeasure between two clusters, which ensures that the clusters can emerge cooperative defense behavior in the movement process and finally realizes effective self-organizing defense effect. The cluster defense system has the following characteristics:
1. Individuals in the group are isomorphic and have consistent rules. That is, the individual attributes in the same camping group are consistent, and the individual behavior rules are also the same. Where individual attributes include kinematic characteristics (maximum speed, maximum acceleration, etc.), perceptibility, capturing ability, etc.
2. Individual heterogeneous among groups and different rules. The individual attributes of different camps are different, such as the maximum speed and the maximum acceleration of the defender and the invader are different, and the perception level is also different, and specific parameters are shown in the table one.
3. All intra-group individuals are externally identical. That is, the identity of the individual cannot be identified through the external or signal, all the individuals are consistent in the cluster, and no specificity exists.
4. The individuals decide autonomously, and there is no centralized distribution. All individuals in the group are autonomously aware and autonomously update the individual states according to the cluster rule to make autonomous decisions, and no upper and lower levels or follow-up dependence exists among the individuals.
5. The antagonism between clusters is embodied in a captured form. The defender intercepts the invader to catch the invader until the invader enters the capturing radius of the defender, and the defender are simultaneously 'all-in-one' to represent the fight of the defender to the invader, and the invader escapes from the defender opposite to the defender to catch the protected object until the protected object enters the capturing radius of the invader, so that the fight of the invader is successful.
The defending cluster and the intrusion cluster are constructed according to the five-point characteristics, wherein the defending cluster is named as D and comprises N D individuals; the intrusion cluster is designated as I, which contains N I individuals; the protected object is named P. Wherein the position vector of the individual D i(i=1,...,ND),Ij(j=1,...,NI) isVelocity vector is/>Irrespective of the individual profile, the individual mass is assumed to be m=1. The individual satisfies newton's law of mechanics, where individual synergy is divided into intra-group and inter-group synergy. The defensive individual position speed update formula is as follows:
Where u i (t) represents the resultant force of the defending individual D i, where the resultant force and the acceleration are equivalent in magnitude because of the mass of 1, where u i (t) represents the acceleration of the defending individual D i. The invading individual position and speed updating formula is the same as the defending cluster updating formula, and the cooperative terms of the individuals in the two clusters are different, and the following description is given:
first, defend against the collaborative rules of individuals within a cluster, as follows:
Defensive clustering individual cooperative items include self-driven items Location synergy item/>Velocity synergistic term/>Potential field protection term/>Anti-intrusion item/>And random noise ηζ i. The specific rule settings are as follows:
(1) Self-driving item
Where α represents the maximum value of the velocity, |v i (t) | represents the velocity magnitude.
(2) Sports coordination item
Individual interactions are based on the motion state of a neighbor partner, assuming that an individual can perceive in real time the motion state information (location and speed) of a neighbor within a certain neighborhood. Wherein the perceived radius of the defending cluster is R sen > 0, the set of perceivable neighbors is:
Ni={k|dik<Rsen,k∈{1,...,ND},k≠i} (4)
where d ik represents the distance between individuals within the defensive cluster.
The sports coordination items include location coordination itemsSum velocity synergistic term/>
Wherein the positional synergy term formula is as above, and the model is short-distance rejection-long-distance attraction-medium-distance rejection.Representing the balance position adjustment parameter of attraction force and repulsion force, wherein the repulsion force is represented when the individual interval is smaller than the value, and the attraction force is represented when the individual interval is larger than the value; representing the sub-group spacing, the repulsive force between sub-groups reaches a maximum when the individual spacing is equal to this value. /(I) A unit vector representing the location vector of neighbor individuals to individuals D i.
The speed cooperative term adopts an uneven rule, and neighbor individuals with the largest angle change are selected from the neighborsAnd references its velocity orientation.
(3) Potential field protection item
The double-layer defending potential field is constructed by combining with the artificial potential field theory, as shown in figure 1. The defenses are shown below:
wherein the defending individual perceives the protected object globally, d ip represents the distance of the defending individual to the protected object, A unit vector representing the position vector of the individual D i to the protected object. When defending individuals exist in different potential fields and are subjected to potential field forces in different directions, the positive and negative of the potential field protection force also correspond to two behaviors of approaching and separating from the protection object. Wherein the method comprises the steps ofRespectively, corresponds to the potential field boundary distance around the protection object as shown in fig. 1. The defending clusters thus eventually form a double-layered defending ring around the protected object.
(4) Anti-intrusion item
This is an inter-group interaction term, i.e., defending individuals interacting with invading individuals. The defending individual locally perceives the invading individual, the perceiving radius of the invading individual is R sen & gt 0, and the perceivable invader set is as follows:
Ti={k|dik<Rsen,k∈{1,...,NI}} (8)
The anti-intrusion force is the resultant force direction of each intruder in the approaching perception range, and the distance from the intruder to the defender influences the corresponding weight, and the specific form is as follows:
Where d ik represents the distance of the defending individual to the intruder T i within the perception domain, where A unit vector representing the location vector of the individual D i to the intruder T i within the perception domain.
(5) Random noise
Eta xi i represents random noise with strength eta > 0, and makesIs a random vector satisfying a uniform distribution at [ -0.5,0.5] 2.
Then, the cooperative rule of the individuals in the intrusion cluster is expressed as follows:
Wherein the self-driving force The random noise eta zeta j is consistent with the expression of the defender, but the parameter of the self-driving force of the invading individual, namely the maximum value beta of the speed is different from the self-driving force parameter alpha of the defending individual, and the beta is generally larger than the alpha. The other items comprise position cooperative itemsIndividual intrusion item/>Anti-flooding item by item/>The specific expression is as follows:
(1) Location collaborative item
The intruder also has local perception, wherein the perceived radius of the intrusion cluster is r sen > 0, and the set of perceivable neighbors is:
Nj={k|djk<rsen,k∈{1,...,NI},k≠j} (11)
The cooperation of the positions of the invading individuals and the neighbors in the perception domain thereof follows the principle of 'only exclusion', namely, the individuals are only collided, and no aggregation exists, and the specific expression is as follows:
(2) Individual intrusion item
The invading individual has an invasion trend to the protected object, and has an individual invasion force, which is specifically expressed as follows:
(3) Anti-flooding item-by-item
The method is an inter-group interaction item of an invading individual, namely the invading individual interacts with a defending individual. The invasion individuals are locally perceived by the defending individuals, the perception radius of the defending individuals is r sen & gt 0, and the perceivable defending person set is as follows:
Tj={k|djk<rsen,k∈{1,...,ND}} (14)
The counter-driving progressive force is the resultant force direction away from each defender in the perception range, and meanwhile, the distance from the defender to the invader influences the corresponding weight, and the concrete form is as follows:
Simulation results
The algorithm is simulated, the simulation object consists of a defending cluster, an intrusion cluster and a protection object, and the simulation interface is shown in figure 2. According to the collaborative rule, the individual in the cluster updates the speed and the position information in real time, and the simulation result finally shows that in the cluster defense countermeasure, the defense cluster can spontaneously develop various defense behaviors, such as a defense subgroup forms a double-layer defense ring, an inner ring defense subgroup surrounds an attack invader, an outer ring directly strikes and captures the invader, the self-organizing defense of the cluster is finally successfully realized, and the specific effect is as shown in fig. 3-6, and the double-layer defense ring is formed again to cope with the next intrusion after the defense of the defense cluster is successful.
Table-cluster parameters
While the invention has been described with reference to certain preferred embodiments, it will be understood by those skilled in the art that various changes and substitutions of equivalents may be made without departing from the spirit and scope of the invention.
Claims (4)
1. A cluster self-organizing control method of double-layer defense is characterized in that: setting a cooperative rule of an individual in a defending cluster and an individual in an intrusion cluster;
1) The cooperative rule of the individual in the defense cluster is expressed as follows:
Wherein, Is a self-driven item,/>For location collaborative item,/>Is a velocity synergistic term,/>Is a potential field protection term,/>As an anti-intrusion term, ηζ i is random noise;
the self-driving item
Wherein, alpha represents the maximum value of the defending cluster speed, and v i (t) represents the defending cluster speed;
The position cooperative item
Representing the balance position adjustment parameter of attraction force and repulsion force, wherein the repulsion force is represented when the individual interval is smaller than the value, and the attraction force is represented when the individual interval is larger than the value; /(I)Representing the subgroup spacing, the repulsive force between subgroups reaching a maximum when the individual spacing is equal to the value; /(I)A unit vector representing the location vector of neighbor individuals to individuals D i;
n i is a set of perceivable neighbors:
Ni={k|dik<Rsen,k∈{1,...,ND},k≠i}
Wherein d ik represents the distance between individuals in the defensive cluster, and R sen > 0 is the perceived radius of the defensive cluster;
The speed cooperative item
Representing the speed of the neighbor individual with the largest angle change in the neighbors;
The potential field protection item
Wherein d ip represents the distance from the defending individual to the protected object,A unit vector representing a position vector of the individual D i to the protection object; /(I)Respectively corresponding to the boundary distances of potential fields surrounding the protection object;
the anti-intrusion item
T i is a set of perceivable intruders:
Ti={k|dik<Rsen,k∈{1,...,NI}}
Wherein d ik represents the distance of the defending individual to the intruder T i within the perception domain, where A unit vector representing a location vector of the individual D i to the intruder T i within the perception domain;
the random noise eta xi i represents random noise with the intensity eta > 0, and the random noise eta xi i is expressed as Is a random vector satisfying uniform distribution at [ -0.5,0.5] 2;
2) The cooperative rule of the individuals in the intrusion cluster is expressed as follows:
wherein, self-driving force The random noise eta zeta j is consistent with the expression of the defender, and only the parameter of the self-driving force of the invading individual, namely the maximum value beta of the speed is different from the self-driving force parameter alpha of the defending individual, wherein beta is more than alpha; the remaining items include location synergy items/>Individual intrusion item/>Anti-flooding item by item/>The specific expression is as follows:
The self-driving force
Wherein, beta represents the maximum value of the intrusion cluster speed, and beta is more than alpha, v j (t) is the intrusion cluster speed;
The position cooperative item
Wherein,A unit vector representing a neighbor individual to individual I j's location vector;
N j is a set of perceivable neighbors:
Nj={k|djk<rsen,k∈{1,...,NI},k≠j}
Wherein d jk represents the inter-individual distance within the intrusion cluster, and r sen > 0 is the perceived radius of the intrusion cluster;
The individual intrusion item
A unit vector representing a position vector of the individual I j to the protected object;
the said anti-flooding item by item
T j is a set of perceivable defenders:
Tj={k|djk<rsen,k∈{1,...,ND}}
N D represents a defensive cluster;
The random noise eta xi j represents random noise with the intensity eta > 0, and the random noise eta xi j is expressed as Is a random vector satisfying a uniform distribution at [ -0.5,0.5] 2.
2. A computer system, comprising: one or more processors, a computer-readable storage medium storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of claim 1.
3. A computer readable storage medium, characterized by storing computer executable instructions that, when executed, are adapted to implement the method of claim 1.
4. A computer program comprising computer executable instructions which, when executed, are adapted to implement the method of claim 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210476976.0A CN115016526B (en) | 2022-05-01 | 2022-05-01 | Cluster self-organizing control method for double-layer defense |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210476976.0A CN115016526B (en) | 2022-05-01 | 2022-05-01 | Cluster self-organizing control method for double-layer defense |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115016526A CN115016526A (en) | 2022-09-06 |
CN115016526B true CN115016526B (en) | 2024-04-30 |
Family
ID=83066843
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210476976.0A Active CN115016526B (en) | 2022-05-01 | 2022-05-01 | Cluster self-organizing control method for double-layer defense |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115016526B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108680063A (en) * | 2018-05-23 | 2018-10-19 | 南京航空航天大学 | A kind of decision-making technique for the dynamic confrontation of extensive unmanned plane cluster |
CN112000070A (en) * | 2020-07-28 | 2020-11-27 | 西北工业大学 | Heterogeneous cluster cooperative motion planning method |
WO2021036833A1 (en) * | 2019-08-28 | 2021-03-04 | 中国人民解放军国防科技大学 | Method for generating unmanned aerial vehicle cluster escort behavior based on improved virtual force field |
WO2021174765A1 (en) * | 2020-03-03 | 2021-09-10 | 中国科学院自动化研究所 | Control system based on multi-unmanned-aerial-vehicle collaborative game confrontation |
-
2022
- 2022-05-01 CN CN202210476976.0A patent/CN115016526B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108680063A (en) * | 2018-05-23 | 2018-10-19 | 南京航空航天大学 | A kind of decision-making technique for the dynamic confrontation of extensive unmanned plane cluster |
WO2021036833A1 (en) * | 2019-08-28 | 2021-03-04 | 中国人民解放军国防科技大学 | Method for generating unmanned aerial vehicle cluster escort behavior based on improved virtual force field |
WO2021174765A1 (en) * | 2020-03-03 | 2021-09-10 | 中国科学院自动化研究所 | Control system based on multi-unmanned-aerial-vehicle collaborative game confrontation |
CN112000070A (en) * | 2020-07-28 | 2020-11-27 | 西北工业大学 | Heterogeneous cluster cooperative motion planning method |
Non-Patent Citations (1)
Title |
---|
大规模无人系统集群智能控制方法综述;梁晓龙;孙强;尹忠海;王亚利;刘苹妮;;计算机应用研究(第01期);17-22 * |
Also Published As
Publication number | Publication date |
---|---|
CN115016526A (en) | 2022-09-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112269396B (en) | Unmanned aerial vehicle cluster cooperative confrontation control method for eagle pigeon-imitated intelligent game | |
Liu et al. | A mechanism for recognizing and suppressing the emergent behavior of UAV swarm | |
CN110554709A (en) | Distributed bionic multi-agent autonomous cluster control method | |
JP2015035806A (en) | Method and system for selecting position and orientation for monitoring camera | |
Sapaty | Mosaic warfare: from philosophy to model to solutions | |
La et al. | Cooperative flocking and learning in multi-robot systems for predator avoidance | |
Hahn et al. | Emergent escape-based flocking behavior using multi-agent reinforcement learning | |
CN109104737A (en) | A kind of cluster antagonism appraisal procedure based on time-varying network | |
Goel | Pigeon optimization algorithm: A novel approach for solving optimization problems | |
CN115016526B (en) | Cluster self-organizing control method for double-layer defense | |
Qiming et al. | A review of intelligent optimization algorithm applied to unmanned aerial vehicle swarm search task | |
Straub | Consideration of the use of autonomous, non-recallable unmanned vehicles and programs as a deterrent or threat by state actors and others | |
CN112000070B (en) | Heterogeneous cluster cooperative motion planning method | |
Fusano et al. | Multi-agent based combat simulation from OODA and network perspective | |
CN115454136B (en) | Unmanned aerial vehicle cluster cooperative attack and defense countermeasure decision-making method | |
Price et al. | GA directed self-organized search and attack UAV swarms | |
Hall et al. | Intelligence collection: How to plan and execute intelligence collection in complex environments | |
Junaedi et al. | Multi agent with multi behavior based on particle swarm optimization (PSO) for crowd movement in fire evacuation | |
CN115061495B (en) | Unmanned aerial vehicle group countermeasure autonomous control method based on eagle pigeon game | |
Kaewkamnerdpong et al. | Perceptive particle swarm optimisation | |
Coeckelbergh | Too Close to Kill, Too Far to Talk-Interpretation and Narrative in Drone Fighting and Surveillance in Public Places | |
Li et al. | Simulation of bi-direction pedestrian movement in corridor based on crowd space | |
Silva et al. | Classifying organizational structures on targets in the cooperative target observation | |
Sapaty | Distributed technology for global control | |
Hutchinson | Deceiving autonomous drones |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |