Next Article in Journal
Detection of Water Contaminants by Organic Transistors as Gas Sensors in a Bottom-Gate/Bottom-Contact Cross-Linked Structure
Previous Article in Journal
A Review of Approaches for Mitigating Effects from Variable Operational Environments on Piezoelectric Transducers for Long-Term Structural Health Monitoring
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Two-Stage Distributed Task Assignment Algorithm Based on Contract Net Protocol for Multi-UAV Cooperative Reconnaissance Task Reassignment in Dynamic Environments

1
College of Computer Engineering, Naval University of Engineering, Wuhan 430033, China
2
School of Undergraduate Education, Shenzhen Polytechnic University, Shenzhen 518055, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(18), 7980; https://doi.org/10.3390/s23187980
Submission received: 15 August 2023 / Revised: 1 September 2023 / Accepted: 13 September 2023 / Published: 20 September 2023
(This article belongs to the Section Physical Sensors)

Abstract

:
Multi-UAV systems have been widely used in reconnaissance, disaster relief, communication, and other fields. However, many dynamic events can cause a partial failure of the original mission during the mission execution process, in which case task reassignment should be carried out. How to reassign resources and tasks in multi-dynamic, multi-target, and multi-constraint events becomes a core issue in the enhancement of combat efficiency. This paper establishes a model of multi-UAV cooperative reconnaissance task reassignment that comprehensively considers various dynamic factors such as UAV performance differences, size of target areas, and time window constraints. Then, a two-stage distributed task assignment algorithm (TS-DTA) is presented to achieve multi-task reassignment in dynamic environments. Finally, this paper verifies the effectiveness of the TS-DTA algorithm through simulation experiments and analyzes its performance through comparative experiments. The experimental results show that the TS-DTA algorithm can efficiently solve the task reassignment problem in dynamic environments while effectively reducing the communication burden of UAV formations.

1. Introduction

Compared with manned aircrafts, UAVs have the advantages of low cost, strong concealment, and being unmanned [1,2,3]. They are widely used in reconnaissance, disaster relief, communication, and other fields [4,5,6,7]. However, with the continuous expansion of task scales, in many cases, a single UAV cannot complete its tasks efficiently [8]. Multi-UAV systems have higher efficiency and stronger robustness than single UAVs [9,10]. In order to improve the efficiency and success rate of reconnaissance tasks, multi-UAVs often perform them cooperatively, especially in the field of military reconnaissance. Task assignment is a key issue for multi-UAVs to cooperate efficiently [11].
Before a reconnaissance mission begins, multi-UAV systems need to assign tasks according to static prior information and obtain the initial mission plan. In recent years, many researchers have established models and proposed solutions to such task assignment problems [12,13,14,15,16]. However, there are many uncertainties in the actual task execution process, such as target movement, drone damage, and many other dynamic events [17]. When these dynamic events occur, multi-UAV systems need to adjust the initial mission plan to adapt to these changes, a process called task reassignment [18].
Many researchers have established relevant models of task reassignment in dynamic environments. Yang et al. [17] established a task reassignment model for multi-UAVs performing search and rescue (SAR) missions, considering five dynamic events: finding new tasks, canceling original tasks, updating task coordinates, updating task deadlines, and updating task durations. However, the model only involved dynamic changes of targets and did not consider damage to UAVs during the mission. In the context of multi-UAV cooperative task assignment in SAR missions, Chen et al. [19] considered time sensitivity and dynamic environments and studied the problem of multi-UAV task reassignment after the emergence of a new target. However, their model did not consider the simultaneous occurrence of multiple targets. Oh et al. [20], in the context of suppression of enemy air defense (SEAD) missions, considered the problem of task assignment in the case of pop-up threats and UAV loss. However, the performance differences of UAVs were not considered in the model. Zhang et al. [21] studied the dynamic task assignment problem in the context of multi-UAVs attacking multiple ground targets cooperatively and considered the emergence of new targets and sudden UAV failure. However, the time window constraint of targets and movement of targets were not considered in the model.
Due to the nature of armed conflict, multi-UAVs are often in a dynamic environment when performing a cooperative reconnaissance mission. Existing multi-UAV task reassignment models in dynamic environments are not directly used for the modeling of multi-dynamic, multi-target, and multi-constraint events. In order to better describe the problem of multi-UAV cooperative reconnaissance task reassignment and discuss the literature on the above subject, this paper establishes a model of multi-UAV cooperative reconnaissance task reassignment in dynamic environments (DE-MCRTR) based on our previous work [22]. The DE-MCRTR model addresses task reassignment problems in dynamic events, including UAV damage, new target occurrence, location change of the target, as well as time window change of the target, while comprehensively considering various factors such as UAV performance differences, size of target areas, and time window constraints.
Multi-UAV task assignment is an NP-hard problem [23,24]. Commonly used task assignment algorithms can be divided into two categories [5,19]: one comprises centralized algorithms and the other comprises distributed algorithms. Centralized algorithms have the ability of global optimization [24] but their computational demand is high [17]. So, the solution speed of centralized algorithms is low, which causes their slow responsiveness to dynamic changes [25]. Although distributed algorithms cannot obtain global optimal solutions [24], their computational complexity is relatively small and their stability is higher [26]. Since task reassignment in dynamic environments is carried out in the process of mission execution, higher requirements are placed on the speed of reassignment. Thus, researchers usually use distributed task assignment algorithms to solve the problem of task reassignment in dynamic environments. The most common are consensus-based auction algorithms and market-based algorithms [27]. Among them, the most widely used are consensus-based bundle algorithms (CBBAs) [28] and the contract net protocol (CNP) [29].
Aiming at the problem of UAV swarms performing cooperative reconnaissance-and-attack tasks on multiple targets in complex and uncertain combat scenarios, Qin et al. [30] proposed a cooperator determination mechanism and a selection mechanism of sequential tasks, and extended the contract net protocol to design an event-triggered dynamic task allocation strategy. This strategy adopted the selection mechanism of sequential tasks and assigned tasks one by one. When the number of tasks was large, it was difficult to ensure efficiency. Zitouni et al. [31] proposed a distributed multi-UAV task assignment algorithm by combining a consensus-based bundle algorithm and an ant colony algorithm. However, the algorithm was only applicable if some original tasks were cancelled. Using the state feedback, gradient descent, and primal–dual methods, Deng et al. [32] designed a distributed algorithm for high-order agents to perform resource allocation tasks autonomously. Zhang et al. [33] introduced a sales contract, exchange contract, and replacement contract into the original contract net protocol and proposed an algorithm based on a hybrid contract net protocol to achieve dynamic task reassignment. This method had a low proportion of feasible solution combinations in the solving process; so, the solving efficiency was low when the number of targets is large. Yang et al. [17] proposed a partial reassignment algorithm based on the PI algorithm to realize online task reassignment after the target dynamic changes during mission execution. The algorithm was used for a single task reassignment situation, and it was not suitable for multiple tasks. Gao et al. [34] designed a task reassignment algorithm based on the contract net protocol to solve the task reassignment problem when new targets appear or UAV damage occurs during task execution. However, with the expansion of the scale of the problem, the number of UAV communications would be multiplied, resulting in poor reliability of the system.
There are multiple targets that need to be assigned in the DE-MCRTR model, and some targets contain time window constraints. In order to realize rapid reassignment of multiple targets, reduce the communication burden of multi-UAV formation, and ensure the quality of task assignment to a certain extent, this paper proposes a two-stage distributed task assignment algorithm based on contract net protocol (TS-DTA). The goal of the first stage and the second stage of the TS-DTA algorithm is to assign the targets without a time window and the targets with a time window, respectively. Based on the original contract net protocol, the bidding strategy with bidding benchmark is introduced in the first stage to reduce the communication burden of UAV formation, the bidding strategy based on route distance is proposed in the first stage to realize synchronous assignment of multiple tasks, and the cyclic bidding strategy based on task timing is proposed in the second stage to achieve efficient assignment of targets with time window constraints.
The rest of this paper is organized as follows: In Section 2, the background of multi-UAV cooperative reconnaissance task reassignment problem is introduced, and the task reassignment model is established. In Section 3, the TS-DTA algorithm is introduced in detail. In Section 4, a series of simulation experiments is conducted. In Section 5, the conclusions and prospects are given.

2. Task Reassignment Model

This section first introduces the background of the task reassignment problem of multi-UAV cooperative reconnaissance, and then establishes the task reassignment model according to dynamic events.

2.1. Background

The reconnaissance in this paper refers to using the photoelectric equipment and radar carried by UAVs to obtain real-time video and image information of targets so as to provide information support for decision-making for the command center. After the initial mission plan is obtained based on static prior information, UAVs start from their ship platform to each target to perform reconnaissance. The circular reconnaissance route is adopted by UAVs when performing reconnaissance. The radius of circular route is dependent on the danger degree and the size of each target. After completing all tasks, UAVs return to the ship platform. However, in the actual mission execution process, the confrontation between the enemy and ourselves would lead to many dynamic events, such as damage to the UAV, movement of targets, and so on. These dynamic events may partially invalidate the original mission plan. In order to ensure the completion of all tasks, it is necessary to reasonably assign unfinished tasks to currently dispatched UAVs. Combined with the actual mission, this paper focuses on the following four kinds of dynamic events.
(1) UAV damage
During the mission, a drone is suddenly hit by enemy air defense forces, making it impossible to complete the remaining tasks.
(2) New target occurrence
During the reconnaissance mission, early warning aircraft or ships may find some new targets that need to be reconnoitered.
(3) Location change of target
In order to enable UAV formation to quickly capture the moving targets, the provider of prior information needs to update the location of those targets in time.
(4) Time window change of target
In order to realize an effective cooperation with other combat forces, UAVs need to reconnoiter some targets within a given time window. When the time window of some targets are advanced or pushed back, the original plan may no longer meet the requirements of the new time window.

2.2. DE-MCRTR Model

Based on the previous work [22], this article introduces dynamic events and establishes a multi-UAV cooperative reconnaissance task reassignment model in a dynamic environment. The specific model is as follows:

2.2.1. Basic Information of the Model

(1) After the reconnaissance mission begins, each UAV starts from the ship platform at the same time, and the departure time is t = 0.
(2) UAVs that obtain tasks in the initial task assignment are called dispatched UAVs. After the dynamic event occurs, all dispatched UAVs participate in the task reassignment.
(3) Each task is completed by a single UAV.
(4) Every UAV can obtain its own location in real time.

2.2.2. UAV Model

The UAVs are initially carried by the ship platforms. The number of ship platforms is n s , the ship platform set is S = { S 0 , S 1 , , S n s 1 } , and the coordinate of S i is [ X S i , Y S i ] . The types and numbers of UAVs carried by each platform are known. The number of UAVs is n u , the UAV set is U = { U 0 , U 1 , , U n u 1 } , the cruising speed of U i is v i , the maximum range of U i is m r i , and the initial coordinate is the coordinate of the ship platform. P l a n = { P 0 , P 1 , , P n u 1 } is the task scheme of UAV formation, which will be updated during task execution. The number of dispatched UAVs is n d , U d i s p a t c h = { U d 1 , U d 2 , , U d n d } . Once U d i is damaged, remove U d i from U d i s p a t c h . When dynamic events occur, the coordinate of U i is [ X U i , Y U i ] ; the leftover maximum range of U i is m r l i ; the list of finished tasks of U i is T F i = { T F i 1 , T F i 2 , , T F i n f i   } ; the list of leftover tasks of U i is T L i = { T L i 1 , T L i 2 , , T L i n l i   } ; and n f i , n l i are the number of finished tasks and leftover tasks of U i , respectively.

2.2.3. Target Model

The initial number of targets is n t , the target set is T = { T 0 , T 1 , , T n t 1 } , and the approximate coordinate of T j is [ X T j , Y T j ] . The reconnaissance time window for T j with time window constraint is TW j = [ t w s j ,   t w e j ] . The radius of the circular reconnaissance route for UAV to reconnaissance target T j is a r j . If n n e w new targets appear, the new target set is T n e w = { T n 1 , T n 2 , , T n n n e w } , the approximate coordinate of T n i is [ X T n i , Y T n i ] , and the radius of circular reconnaissance route is a r T n i . If T n i contains a time window constraint, the time window is TW T n i = [ t w s T n i ,   t w e T n i ] . Meanwhile, these new targets need to be added to the original target set T , and the updated target set is T = { T 0 , T 1 , , T n t 1 , T n t , ,   T n t + n n e w 1 } . If the location of target T j is changed, its coordinates need to be changed to the new location [ X T j n , Y T j n ] . If the time window of target T j is changed, its time window needs to be changed to the new time window [ t w s j n ,   t w e j n ] .

2.2.4. Decision Variable

Referring to our previous work [22], define r e i j as the decision variable, where i = 0 , 1 , , n u 1 and j = 0 , 1 , , n t 1 . The value of r e i j is 0 or 1; r e i j = 1 indicates that U i conducts reconnaissance on target T j and vice versa.

2.2.5. Constraint Condition

In engineering fields, constraints occur naturally, such as resource limitations, which the agents are subject to [35]. The purpose of task reassignment is to reasonably assign tasks that have not been finished when a dynamic event occurs under the premise of satisfying various constraints and to obtain a new mission plan, denoted as P l a n n e w = { P n 0 , P n 1 , , P n n n e w 1 } .
(1) Completeness constraint
To ensure the effective completion of the mission and avoid resource waste, each target must be reconnoitered by one UAV:
i = 1 n u r e i j = 1 ,   j = 0 , 1 , 2 , , n t 1
(2) Leftover maximum range constraint
After U i receives the new mission plan P n i , it starts from the current location [ X U i , Y U i ] and flies to each target point in turn to perform reconnaissance. The remaining flight distance of U i is recorded as f d i ; suppose P n i = { T i 1 , T i 2 , , T i n i } , f d i is expressed as Equation (2):
f d i = L U i ,   T i 1 + k = 1 n i 2 π a r T i k + k = 1 n i 1 L T i k ,   T i k + 1 + L T i n i , S U i  
where L U i ,   T i 1 is the distance from the current location of U i to target   T i 1 , k = 1 n i 2 π a r T i k represents the sum length of the circular reconnaissance route of targets, k = 1 n i 1 L T i k ,   T i k + 1 represents the sum distances of transferring between targets, and L T i n i , S U i represents the flight distance of the UAV from the last target to its ship platform.
The leftover maximum range needs to be updated in real time. According to the discussion in Section 2.2.2, the list of finished tasks of U i is T F i = { T F i 1 , T F i 2 , , T F i n f i   } , and the m r l i of U i is expressed as Equation (3):
m r l i = m r i ( L S U i , T F i 1 + k = 1 n f i 2 π a r T F i k + k = 1 n f i 1 L T F i k ,   T F i k + 1 + L T F i n f i , U i )
where L S U i , T F i 1 represents the distance from the platform to the first finished target, and L T F i n f i , U i represents the distance from the last finished target to the current location of U i . If U i is exactly at the location of T F i n f i , then L T F i n f i , U i = 0 .
In order to ensure that U i can successfully complete the mission, it is required that the remaining flight distance of U i cannot be greater than its remaining maximum range:
f d i m r l i
(3) Time window constraint
Suppose that the time when a dynamic event happens is t d . According to P l a n n e w , each UAV can obtain the time period for reconnaissance of its targets. Take U i as an example, supposing P n i = { T i 1 , T i 2 , , T i n i } . The start time of reconnaissance for T i j is t s i j , and the end time of reconnaissance for T i j is t e i j . Then, t s i j and t e i j are expressed as Equations (5) and (6):
t s i j = L U i ,   T i 1 + k = 1 j 1 2 π a r T i k + k = 1 j 1 L T i k ,   T i k + 1 v i + t d
t e i j = t s i j + 2 π a r T i j / v i
If T j contains a time window constraint, t s i j and t e i j are required to satisfy the following constraints:
{ t s i j t w s j t e i j t w e j

2.2.6. Cost Function

(1) Cost of multi-UAV formation
In order to intuitively evaluate the pros and cons of the final mission plan, we establish the cost function of UAV formation by referring to the previous literatures [22,36].
f c = α C T + β A T + γ × 10 4
where CT represents the mission completion time, which is the moment that the UAV complete the last task; AT represents the average flight time—that is, the average time spent by each UAV from departure to return to the platform (except damaged UAVs); and α , β [ 0 , 1 ] are proportional coefficients satisfying α + β = 1 , based on the discussions in literatures [12,37], which are α = β = 0.5 here. Plans that do not satisfy the constraints cannot be used as the final mission plan, considering that a good mission plan should enable UAV formation to complete the task with less consumption. Referring to [36], γ × 10 4 is used to penalize the plans that do not satisfy the constraints in Section 2.2.5. γ is the constraint factor, and the value of γ is 0 or 1: if the mission plan does not meet the constraints, γ = 1 , so that f c increases by 10 4 ; otherwise, γ = 0.
(2) Cost of single UAV
Due to the distributed architecture used in online task reassignment, each UAV cannot obtain the overall task mission plan. When updating its mission scheme, a single UAV cannot measure the merits of its scheme through the cost of UAV formation. Therefore, this paper introduces the single cost function to measure the cost of a single UAV. The cost of U i depends on its task scheme, denoted as c i , which is calculated by Equation (9):
c i = ω 1 · c t i + ω 2 · r t i + γ i × 10 4
where c t i represents the time from now to U i completing all tasks according to its scheme P i ; r t i represents the time from now to U i returning back to platform; ω 1 , ω 2 are proportional coefficients, ω 1 = ω 2 = 0.5 here.   γ i is the constraint factor: if P i is satisfied with the constraints, γ i = 0 ; otherwise, γ i = 1 .

3. Two-Stage Distributed Task Assignment Algorithm Based on CNP

The advantages of the TS-DTA algorithm mainly include the following three aspects. The first is to achieve the assignment of multiple targets. The two-stage task assignment strategy can avoid the conflicts of multi-targets in the task allocation process, ensuring smooth task allocation. Secondly, tasks can be assigned efficiently. The algorithm is designed based on CNP. The original CNP is improved such that the TS-DTA algorithm can achieve rapid reassignment and ensure the quality of the solution to a certain extent. Thirdly, the communication burden of UAV formation is relatively small. By introducing the bidding benchmark and the bidding strategy based on route distance, the communication times of UAV formation during task assignment are reduced.

3.1. Tasks to Be Assigned

Task reassignment is carried out when some tasks cannot be completed due to dynamic events. When executing task reassignment, partial reassignment can be carried out on the basis of the previous mission plan, which can save computing resources and improve the speed of calculation [17,33]. Therefore, the TS-DTA algorithm proposed in this paper adopts the partial reassignment strategy—that is, only part of the targets that need to be reassigned are assigned and these targets are reasonably added to the existing task scheme of dispatched UAVs U d i s p a t c h .
According to the description in Section 2.1, the targets directly related to dynamic events need to be reassigned, which should be added to the list to be assigned T L u n and removed from the current scheme of their corresponding UAVs. Removing some targets may lead to the reconnaissance time of subsequent targets violating the time window constraints, which will interfere with task reassignment. Therefore, it is necessary to remove the subsequent targets that do not meet the constraints from the current task scheme and add them to T L u n . These targets are called the additional targets of task reassignment. For example, the current task scheme of U i is T L i = { T L i 1 , T L i 2 , , T L i n l i   } . When T L i 2 needs to be reassigned, we remove T L i 2 from T L i ; so, T L i = { T L i 1 , T L i 3 , , T L i n l i   } , supposing that T L i 4 , T L i 6 contain time window constraints. According to the new task scheme, the reconnaissance time of T L i 4 , T L i 6 will be earlier than the beginning of the time window. Then, it is necessary to remove T L i 4 , T L i 6 from T L i to T L u n .
Based on the above discussion, the sources of T L u n include the leftover targets of damaged UAVs, new targets, the targets whose location changed, the targets whose time window changed, and additional targets. After a dynamic event occurs, the above targets need to be added to T L u n . The additional targets are confirmed by UAV formation during the task reassignment process.

3.2. The Manager UAV and Contractor UAV

When the contract net protocol is used for task assignment, UAVs obtain a conflict-free solution by negotiating with each other. During this period, a manager UAV U m needs to be specified as the manager in the negotiation process. The other UAVs of U d i s p a t c h are contractor UAVs, which are denoted as C U . C U bids for tasks issued by U m during the assignment process. In addition, in the algorithm proposed in this paper, the manager UAV U m itself also participates in the task bidding.
From the perspective of balancing the communication distance between UAVs, this paper takes the UAV closest to the center of dispatched UAV formation as the manager and the remaining UAVs as the contractor. During the mission, U m obtains the location and task execution process of each UAV in real time by communicating with C U and switches the manager’s identity in time according to the relative location between UAVs so as to dynamically update U m and C U .

3.3. The Framework of TS-DTA

Based on the previous discussion, some of the targets in T L u n may contain time window constraints. If the targets with time window constraints are assigned first, the previously assigned targets may violate time window constraints when other targets are inserted later. These targets need to be assigned again, thus affecting the smooth progress of task assignment. Therefore, this paper adopts the two-stage assignment strategy. Targets without time window constraints are assigned in the first assignment stage. On this basis, the second assignment stage is carried out to assign targets with time window constraints.
After manager UAV U m obtains the list of tasks to be assigned T L u n , it is first divided into two sub-lists according to whether the target contains a time window constraint: the task list without time window constraints is F T L u n ; the task list with time window constraints is W T L u n . At the same time, U m removes every target in T L u n from the existing scheme P i of the corresponding UAV U i to obtain the current mission plan, P l a n = { P 1 , P 2 , , P n u } . In particular, for a damaged UAV U b , its task list P b needs to be emptied. The specific task assignment architecture is shown in Figure 1.
The objective of the first assignment stage is to assign the targets in F T L u n to U d i s p a t c h . U m needs to determine the number of targets in F T L u n first. It needs to be disposed in two cases: If there is only one target T x in F T L u n , the bidding strategy with bidding benchmark is used for task assignment, as detailed in Section 3.4.2. If there are n   ( n 2 ) targets in F T L u n , the bidding strategy based on route distance is used for task assignment, as detailed in Section 3.4.3. In addition, U m needs to add additional targets to W T L u n in the first assignment stage; the specific process is described in Section 3.4.2 and Section 3.4.3.
The objective of the second assignment stage is to assign the targets in W T L u n to U d i s p a t c h . In the second stage, the cyclic bidding strategy based on task timing is used for task assignment, as detailed in Section 3.5.

3.4. The First Assignment Stage

3.4.1. Single-Target Insertion Method

Before we begin to introduce the strategies in the first assignment stage, we need to introduce the single-target insertion method. This method is designed to obtain the optimal new scheme B P i j and the minimum cost increment m d c i j for U i to insert T j into the current scheme P i . There may be several targets in P i already; thus, there are different positions of inserting T j into P i . The method is to traverse each insertable position of P i and measure the quality of insertion scheme by comparing the cost of U i . After the new target is inserted into the current scheme of U i , we can obtain a new task scheme of U i . The pseudo-code of this method is shown in Algorithm 1.
Algorithm 1 Single-target Insertion Method
Input :   P i ,   T j
Output :   B P i j ,   m d c i j
1Let  n = l e n ( P i ) ,   m d c i j = 10 4
2 U i   calculates   the   cos t   c i   according   to   P i by Equation (9)
3For  k  in range (0, n) do
4    C o P i = c o p y   ( P i )
5    U i   insert   T j   into   C o P i   at   the   position   k
6    U i   calculates   the   new   cos t   according   to   C o P i   by   Equation   ( 9 ) ,   denoted   as   n c i
7    dc = n c i c i
8   If  d c < m d c i j
9      B P i j = C o P i
10      m d c i j = d c
11   End if
12End for
Based on the above discussion, before T j is inserted into P i , P i satisfies the constraint conditions. If m d c i j 10 4 , it means that the task allocation scheme does not satisfy the constraints after target T j is inserted into P i .

3.4.2. Bidding Strategy with Bidding Benchmark

The contract net protocol enables UAVs to negotiate with each other by simulating the bidding process of the market mechanism. One round of bidding includes four stages: initialization, task bidding, winning bids, and signing contracts [38]. The manager and each contractor need to communicate three times in every round of bidding. In this way, with the increase in the number of UAVs, the communication burden of U m is heavier, which reduces the stability of the UAV system. Therefore, this paper proposes a bidding strategy with a bidding benchmark, which requires U m to publish the bidding benchmark at the same time when publishing bidding information. Before bidding, every U i in C U compares its bid with the bidding benchmark. If its bid does not meet the bidding benchmark, U i directly abandons the bidding. In this strategy, the number of communications between UAVs can be reduced. The specific steps are as follows:
( 1 )   U m verifies whether P m meet constraints or not. If P m does not meet constraints, U m removes the targets with time window from P m into W T L u n . Then, U m finds the best scheme B P m and the minimum cost increment m d c m by inserting T x into P m by single-target insertion method, and the m d c m acts as bidding benchmark. At last, U m sends T x , m d c m , and P l a n to every UAV of C U .
(2) After U i ( U i C U ) receives the bidding information sent by U m , U i first verifies whether P i meets the constraints or not. If P i does not meet the constraints, U i removes the targets with time window from P i into W T i , which will be sent to U m later. Then, U i find the best scheme B P i and the minimum cost increment m d c i of inserting T x into P i by single-target insertion method. At last, U i compares m d c i with m d c m . If m d c i is smaller than m d c m , and m d c i is smaller than 10 4 , then U i sends B P i , m d c i , and W T i to U m ; otherwise, U i sends W T i to U m and gives up the bidding.
(3) After U m receives the bidding information sent by C U , U m puts the additional targets in all received W T i into W T L u n . If all U i in C U give up the bidding and m d c m is smaller than 10 4 , T x is assigned to U m . If all U i in C U give up the bidding and m d c m is bigger than 10 4 , T x fails to be assigned. Otherwise, U m compares all received m d c and finds the U b e s t with the min m d c , assigns T x to U b e s t , updates the task scheme of U b e s t ( P b e s t = B P b e s t ), sends the losing signal to those U i that participated in the bidding (except U b e s t ), and sends the winning signal to U b e s t .
According to the bidding strategy with bidding benchmarks, when the contractor UAV in C U finds that its bid exceeds the bidding benchmark, it directly abandons the bidding, and the U m no longer needs to transmit the information of bidding failure to it. The pseudo-code is shown in Algorithm 2.
Algorithm 2 Bidding Strategy with Bidding Benchmark
Input :   T x ,   W T L u n ,   P l a n ,   U m ,   C U
Output :   updated   P l a n ,   W T L u n
1If  P m does not meet the constraints in Section 2.2.5
2    U m   removes   the   targets   with   time   window   from   P m   into   W T L u n
3End if
4 U m   get   B P m ,   m d c m   of   inserting   T x   into   P m by single-target insertion method
5 U m   sends   T x ,   m d c m ,   P l a n   to   every   UAV   of   C U
6For  U i   in   C U  do (Parallel)
7   If   P i does not meet the constraints in Section 2.2.5
8 U i   removes   the   targets   with   time   window   from   P i   into   W T i
9     End if
10   U i   get   B P i ,   m d c i   of   inserting   T x   into   P i by single-target insertion method
11   If   m d c i < m d c m   and   m d c i < 10 4
12      U i   sends   B P i ,   m d c i ,   W T i   to   U m
13   Else
14     U i   sends   W T i   to   U m and give up the bidding
15   End if
16End for
17 U m   puts   the   targets   in   all   received   W T i   into   W T L u n
18If   all   U i   in   C U give up the bidding
19    If   m d c m < 10 4
20      P m = B P m
21   Else
22             T x failed to be assigned
23   End if
24Else
25 U m   compares   all   received   m d c   and   finds   the   U b e s t   with   the   min   m d c
26      P b e s t = B P b e s t ,   U m   sends   losing signal   to   those   U i   participated   in   the   bidding   ( except   U b e s t )   and   sends   winning signal   to   U b e s t
27      End if
The ‘Parallel’ in the pseudo-code indicates that the calculation of each UAV is concurrent. This is because the UAV formation adopts a distributed architecture; so, calculation can be carried out independently based on the computing resources of each UAV. Therefore, the calculation of each UAV is in no order and they do not interfere with each other.

3.4.3. Bidding Strategy Based on Route Distance

When there are multiple targets to be allocated, there will be repeated communications between U m and C U , if targets are tendered one by one. As the number of targets and UAVs increases, the communication burden will be heavy and the stability will be poor. In order to better complete synchronous assignment of multiple targets, this paper proposes a bidding strategy based on route distance. In this strategy, U m assigns bids according to the relative distance between the remaining waypoints of U d i s p a t c h (including U m ) and the targets to be allocated. The specific steps are as follows:
(1)   U m sends F T L u n , P l a n to every UAV of C U first, then verifies whether P m meet the constraints or not. If P m does not meet constraints, U m removes the targets with time window from P m into W T L u n . Finally, the distance from each route point contained in P m to each target point in F T L u n is calculated, and the distance matrix D T m is obtained.
(2) After receiving the bidding information sent by U m ,   U i ( U i C U ) first verifies whether P i meets the constraints or not. If P i does not meet constraints, U i removes the targets with time window from P i into W T i , which will be sent to U m later. Then, U i calculates the distance of every route point in P i to each target in F T L u n and obtains the distance matrix D T i . Finally, the D T i and W T i are sent to the manager UAV U m .
(3) After U m receives the bidding information sent by C U , U m puts the additional targets in all received W T i into W T L u n . Then, all the distance matrices (including D T m ) are processed to obtain the task assignment scheme, A s s i g n = { A 1 , A 2 , , A n } . Assign is a two-dimensional list, in which the elements in sub-list A j are the serial numbers of UAVs in U d i s p a t c h . The serial numbers are arranged according to the minimum route distance from each UAV to the target T j in ascending order.
(4) U m assigns targets to UAVs according to A s s i g n . At the k t h assignment (first set k = 1), U m directly assigns each target to the k t h UAV in the corresponding sub-list of A s s i g n for bidding. Thus, U m obtains the assigned task list A S T L k = { A L k 1 , A L k 2 , , A L k n d } . Then, U m sends the A L k i to each corresponding UAV U i and processes the task list assigned to itself.
(5) After U i ( U i U d i s p a t c h ) receives A L k i , for every task T j in A L k i , the single-target insertion method is adopted to find the optimal scheme B P i j and the minimum cost increment m d c i j of inserting T j into P i . If m d c i j is smaller than 10 4 , update the task scheme of U i ( P i = B P i j ), remove T j from A L k i , and try to insert the next target in A L k i . Otherwise, try to insert the next target in A L k i directly. After all the targets in A L k i are traversed once, the remaining A L k i is sent back to U m .
(6) After obtaining feedback from all U d i s p a t c h , U m merges the targets in all A L k i into a new F T L u n . Then, it is judged whether F T L u n is an empty set: if it is empty, the assignment of F T L u n is completed; if not empty, let k = k + 1 , and then repeat steps (3)–(5). Continue this process until F T L u n is an empty set, meaning the task assignment is successful; otherwise, if k > n d ( n d is the number of dispatched UAVs), it means the remaining targets in F T L u n failed to be assigned.
According to Formula (9), for targets without a time window constraint, the main factor affecting the assignment result is distance. From the perspective of reducing flight distance of UAVs, the target should be assigned to the UAV with the smallest flight distance added by completing the target. Therefore, the bidding strategy based on route distance is proposed. The manager U m directly assigns UAVs to bid for targets, which ensures the quality of the task scheme while reducing communication burden. The pseudo-code is shown in Algorithm 3.
Algorithm 3 Bidding Strategy Based on Route Distance
Input :   F T L u n ,   W T L u n ,   P l a n ,   U m ,   C U ,   U d i s p a t c h ,   n d
Output :   updated   P l a n ,   W T L u n
1 U m   sends   F T L u n ,   P l a n   to   every   UAV   of   C U
2If  P m does not meet the constraints in Section 2.2.5
3    U m   removes   the   targets   with   time   window   from   P m   into   W T L u n
4End if
5 U m   calculates   the   distance   of   every   route   point   to   each   target   in   F T L u n ,   gets   D T m
6For  U i   in   C U  do (Parallel)
7   If   P i does not meet the constraints in Section 2.2.5
8        U i   removes   the   targets   with   time   window   from   P i   into   W T i
9     End if
10      U i   calculates   the   distance   of   every   route   point   to   each   target   in   F T L u n ,   gets   D T i
11      U i   sends   D T i ,   W T i   to   U m
12End for
13 U m   puts   the   targets   in   all   received   W T i   into   W T L u n
14 U m   processes   all   D T i ,   gets   A s s i g n
15k = 1
16While  F T L u n       and   k n d  do
17   For   j   in   range   1   to   n f t l  do
18 Assign   F T L u n [ j ]   to   A s s i g n [ j ] [ k ]
19End for
20   U m   gets   the   assigned   task   list   A S T L k   and   sends   A L k i   to   U i   ( A L k m   handled   by   U m )
21   For   U i   in   U d i s p a t c h  do (Parallel)
22For  T j   in   A L k i  do
23   U i   get   B P i j ,   m d c i   of   inserting   T j   into   P i by single-target insertion method
24   If   m d c i < 10 4
25       P i = B P i j ,   delete   T j   from   A L k i
26   End if
27End for
28 U i   sends   A L k i   to   U m
29   End for
30    k = k + 1
31    U m   put   the   targets   in   all   A L k i   into   F T L u n
32End while
33If  F T L u n =
34  All tasks without time window have been assigned successfully
35Else
36       Tasks   in   F T L u n failed to be assigned

3.5. The Second Assignment Stage

The second assignment stage mainly relies on the cyclic bidding strategy based on task timing to complete the task assignment since targets in W T L u n are constrained by time windows, and the end times of time windows are different. The end time of the time window of T j is denoted as t w e j . It is a better choice to first assign the targets with an earlier end time of time window. Otherwise, some subsequent targets may need to be inserted ahead of the targets assigned previously. This insertion would change the mission process. As a result, the reconnaissance time of previously assigned tasks may not satisfy its time window constraint. In order to ensure that the task assignment can be carried out more smoothly, the targets in W T L u n are firstly sorted according to the end time of time window, and then allocated one by one. At the same time, after the post-order targets are assigned, the pre-order targets that fail to be assigned could be successfully allocated. In order to enable more targets to be successfully assigned, we use a cyclic bidding method. In addition, in order to reduce the communication burden and improve the efficiency of assignment, similar to Section 3.4.1, the cyclic bidding strategy introduces a bidding benchmark when assigning each target in W T L u n . The specific process is as follows:
(1)   U m finds the best scheme B P m k and the minimum cost increment m d c m k of inserting the k t h (first set k = 1) target in W T L u n into P m by single-target insertion method. The m d c m k acts as bidding benchmark. Then, U m sends T w k , m d c m k , and P l a n to every UAV of C U .
(2) After receiving the bidding information sent by U m ,     U i ( U i C U ) finds the best scheme B P i k and the minimum cost increment m d c i k of inserting T w k into P m by single-target insertion method. Then, U i compares m d c i k with m d c m k . If m d c i k is smaller than m d c m k , and m d c i k is smaller than 10 4 , then U i sends B P i k and m d c i k to U m ; otherwise, U i sends a give up signal to U m and gives up the bidding.
(3) After U m receives the bidding information sent by C U , U m compares all received m d c and finds the U b e s t with the min m d c ; then, it assigns T w k to U b e s t , updates the task scheme of U b e s t ( P b e s t = B P b e s t ), sends losing signal to those U i that participated in the bidding (except U b e s t ), and sends winning signal to U b e s t . Then, T w k is removed from W T L u n . If all U i in C U give up the bidding and m d c m k is smaller than 10 4 , T w k is assigned to U m .
(4) Repeat steps (1)–(3) (increase k by 1 each time) until all targets in W T L u n complete a traversal.
(5) Determine whether W T L u n is an empty set: if yes, the task allocation is complete; otherwise, it is judged whether the target in W T L u n is consistent with the target after the last traversal. If not, let k = 1 and repeat steps (1)–(4); if yes, it means that the existing tasks in W T L u n can no longer be successfully assigned, the second assignment stage is terminated, and targets in W T L u n failed to be assigned.
The pseudo-code of this strategy is shown in Algorithm 4.
Algorithm 4 Cyclic Bidding Strategy Based on Task Timing
Input :   W T L u n ,   P l a n ,   U m ,   C U
Output :   updated   P l a n
1 Co W T L u n = copy   ( W T L u n )
2While  W T L u n     or   C o W T L u n W T L u n  do
3    Co W T L u n = copy   ( W T L u n )
4  For  k   in   range   ( 1 ,   n w t l ) do
5     U m   gets   B P m k ,   m d c m k   of   inserting   T w k   into   P m by single-target insertion method
6      U m   sends   T w k ,   m d c m k ,   P l a n   to   every   UAV   of   C U
7    For  U i   in   C U  do (Parallel)
8      U i   gets   B P i k ,   m d c i k   of   inserting   T w k   into   P i by single-target insertion method
9         If   m d c i k < m d c m k   and   m d c i k < 10 4
10        U i   sends   B P i k ,   m d c i k   to   U m
11      Else
12       U i give up the bidding
13      End if
14       End for
15      If   all   U i   in   C U give up the bidding
16        If   m d c m < 10 4
19       P m = B P m k ,   U m   delete   T w k from W T L u n
20      End if
21Else
22    U m   compares   all   received   m d c   and   finds   the   U b e s t   with   the   min   m d c
23      P b e s t = B P b e s t ,   U m   sends   losing signal   to   those   U i   participated   in   the   bidding   ( except   U b e s t )   and   sends   winning signal   to   U b e s t
24      End if
25       End for
26      End while

4. Performance Analysis of TS-DTA

In order to comprehensively analyze the performance of the TS-DTA algorithm, a series of experiments are conducted based on the DE-MCRTR model. All algorithms are implemented in Python 3.9, the IDE is PyCharm, the computer CPU is an AMD Ryzen 5-5600H, and the CPU clock speed is 3.30 GHz. The distance unit in the text is kilometer (km) and the time unit is second (s). In order to simplify the expression, the units are omitted in the following text.

4.1. Validation of Effectiveness

4.1.1. Background Information

In order to verify the effectiveness of the TS-DTA algorithm in the DE-MCRTR model, we conducted a set of simulation experiments. Referring to existing literature [12,22,37], this article assumes that there are four ship platforms, each equipped with two UAVs. The cruising speeds and maximum ranges of different types of UAVs are different. The ship platforms are distributed in the area of [ 0 ,   100 ] × [ 0 ,   100 ] ; we randomly initialize the location of the four platforms. The initialization information and related parameters are shown in Table 1.
The targets are distributed in the area of [ 100 ,   300 ] × [ 100 ,   300 ] . The radius of the circular routes of targets are initialized randomly within [ 1 ,   3 ] . We assume that there are twenty targets, of which five targets contain time window constraints. Similarly, this article randomly initializes the locations of the twenty targets within the given range and randomly selects five targets to set the time window constraints. The initialization information of targets is shown in Table 2.
Before the mission starts, the offline task assignment algorithm is first used to obtain the initial mission plan: P l a n = [[2, 13, 5, 4], [6, 15, 12], [1, 14], [7, 16, 17, 18], [], [], [8, 19, 9], [0, 10, 11, 3]]. The P l a n is a two-dimensional list, where the sub-list represents the scheme of each UAV. The numbers in the sub-list represent the targets’ number. The same is true later. According to the initial mission plan, a total of six UAVs are dispatched to carry out the reconnaissance mission: U d i s p a t c h = [ U 0 , U 1 , U 2 , U 3 , U 6 , U 7 ] , n d = 6 . The initial situation and the initial mission plan are shown in Figure 2a,b. The numbers next to the targets icon indicate targets’ number, the same is true later.

4.1.2. Task Reassignment in the Case of UAV Damage

To verify the effectiveness of the TS-DTA algorithm in the case of UAV damage, test 1 is conducted. The moment when the drone departs from the ship platform is t = 0. Assuming t = 1200, U 1 is attacked by the enemy and loses the ability to execute tasks. In the simulation experiment, the location and task execution status of each UAV is calculated based on the initial mission plan. By this way, the finished task list of UAV formation is T F = [ [ 2 ] ,   [ ] ,   [ 1 ] ,   [ 7 ,   16 ] ,   [ ] ,   [ ] ,   [ 8 ] ,   [ 0 ,   10 ] ] , the leftover task list of UAV formation is T L = [ [ 13 ,   5 ,   4 ] ,   [ 6 ,   15 ,   12 ] ,   [ 14 ] ,   [ 17 ,   18 ] ,   [ ] ,   [ ] ,   [ 19 ,   9 ] ,   [ 11 ,   3 ] ] , and T L 1 = [ 6 ,   15 ,   12 ] is the leftover task list of U 1 . The tasks in T L 1 need to be assigned to U d i s p a t c h . So, the list of tasks to be assigned is T L u n = [ 6 ,   15 ,   12 ] , and U d i s p a t c h = [ U 0 , U 2 , U 3 , U 6 , U 7 ] . The current battlefield situation is shown in Figure 3a.
In Figure 3, the green circular icons represent the targets that have been reconnoitered, the blue circular icons represent the targets that have not been finished, the gray circular icons represent the targets that have changed, and the solid lines of different colors represent the remaining flight routes of UAVs according to the current mission plan. The UAVs that have not been given a task are still located on ship platforms; so, the icons of these UAVs and ship platforms overlap.
Run the TS-DTA algorithm to assign tasks in T L u n . The new mission plan is P l a n n e w = [[13, 5, 4], [], [14, 6], [17, 18, 12, 15], [], [], [19, 9], [11, 3]. The cost of multi-UAV formation is f c = 2051.28 . So, T 6 is assigned to U 2 , and T 12 , T 15 are assigned to U 3 . According to P l a n n e w , the remaining routes of UAVs are shown in Figure 3b. The reconnaissance schedules of targets are shown in Figure 4. The green icons represent the reconnaissance time of the targets that have been reconnoitered, and the blue icons represent the reconnaissance time of the targets that will be reconnoitered. The same is true later.
From Figure 3b, we can find that T 6 will be reconnoitered by U 2 and T 12 , T 15 will be reconnoitered by U 3 . Combining Table 2 and Figure 4, P l a n n e w can ensure that all targets with time windows are reconnoitered within the time window.
According to P l a n n e w , T 6 is reconnoitered after T 14 in the scheme of U 2 . In Figure 5, there are two possible routes for U 2 to finish T 6 and T 14 . One is the shorter route, shown by the green dotted line, where the start and end times of the U 2 reconnaissance of T 14 are marked in green font in the figure. Another is the actual route, shown by the brown solid line, where the start and end times of the U 2 reconnaissance of T 14 are marked in brown font in the figure. t s i j represents the U i start time to reconnoiter T j ; t e i j represents the U i end time reconnoitering T j . From Figure 5, we can find that in the shorter route T 6 is reconnoitered before T 14 . However, if the shorter route is adopted, t s 2 14 = 1624.95 and t e 2 14 = 1701.89 , which obviously contradicts T W 14 = [ 1000 ,   1600 ] . So, the shorter route (green dotted line) is abandoned.

4.1.3. Task Reassignment in the Case of New Target Occurrence

To verify the effectiveness of the TS-DTA algorithm in the case of finding new targets, test 2 is conducted. Suppose that at t = 1300, the early warning aircraft detects three new targets: T n 1 , T n 2 , and T n 3 . The location of T n 1 is L O C T n 1 = [217.00, 153.00], the radius of the annular route a r T n 1   = 1.50, and the reconnaissance time window is T W T n 1 = [ 1500 ,   1800 ] . The location of T n 2 is L O C T n 2 = [130.00, 206.00], and the radius of the annular route a r T n 2 = 2.30, without a reconnaissance time window. The location of T n 3 is L O C T n 3 = [241.00, 263.00], and the radius of annular route a r T n 2 = 1.90, without a reconnaissance time window.
According to Section 2.2.3, new targets need to be added into the original target set T . The original target number is 20, numbered from 0 to 19. So, T n 1 is numbered 20, denoted as T 20 . Similarly, T n 2 and T n 3 are numbered 21 and 22, which are denoted as T 21 and T 22 , respectively. The current battlefield situation is shown in Figure 6a.
The list of tasks to be allocated is T L u n = [ 20 ,   21 ,   22 ] . The UAVs participating in task reassignment are U d i s p a t c h = [ U 0 , U 1 , U 2 , U 3 , U 6 , U 7 ] . The finished task list of UAV formation is T F = [ [ 2 ] ,   [ ] ,   [ 1 ] ,   [ 7 ,   16 ] ,   [ ] ,   [ ] ,   [ 8 ] ,   [ 0 ,   10 ] ] , and the leftover task list of UAV formation is T L = [ [ 13 ,   5 ,   4 ] ,   [ 6 ,   15 ,   12 ] ,   [ 14 ] ,   [ 17 ,   18 ] ,   [ ] ,   [ ] ,   [ 19 ,   9 ] ,   [ 11 ,   3 ] ] .
Run the TS-DTA algorithm to obtain the new task plan: P l a n n e w = [[13, 5, 4], [6, 20, 15, 12], [14], [17, 18], [], [], [19, 21, 9], [11, 22, 3]]. The cost of multi-UAV formation is f c = 2166.98 . According to P l a n n e w , T 20 is assigned to U 1 , T 21 is assigned to U 6 , and T 22 is assigned to drone U 7 . The result is shown in Figure 6b. The reconnaissance schedules of targets are shown in Figure 7. Analysis shows that T 21 , T 22 are assigned through bidding strategy based on route distance. So, T 21 and T 22 are assigned to U 6 and U 7 , respectively, which are judged from the route distance.
It is reasonable to assign to U 1 and U 2 from the perspective of flight distance. However, T 20 needs to be completed within the time window of [ 1500 ,   1800 ] , which conflicts with the time window of T 14 that belongs to U 1 . So, T 20 is finally assigned to U 2 .

4.1.4. Task Reassignment in the Case of Changing the Location of Targets

To verify the effectiveness of the TS-DTA algorithm in the case of changing the location of targets, test 3 is conducted. It is assumed that at time t = 1100, the early warning aircraft detects that four targets have moved to new locations as follows: T 4 moves from [ 184.89 ,   215.84 ] to [157.00, 198.00], T 9 moves from [ 109.69 ,   185.35 ] to [105.00, 210.00], T 14 moves from [ 193.87 ,   108.35 ] to [194.00, 132.00], and T 17 moves from [ 260.90 ,   226.18 ] to [250.00, 256.00]. The list of tasks to be allocated is T L u n = [ 4 ,   9 ,   14 ,   17 ] . Among them, T 4 and T 14 contain time window constraints, and T 9 and T 17 do not contain time window constraints. The current battlefield situation is shown in Figure 8a.
The lines in Figure 8a represent the original planned routes of UAVs. Because the locations of T 4 , T 9 , T 14 , and T 17 are changed, UAVs can no longer finish the reconnaissance of these moved targets according to the original planned route. So, we need to reassign these moved targets and update the flight routes according to P l a n n e w to ensure that all tasks can be completed. Now, the finished task list of UAV formation is T F = [ [ ] ,   [ ] ,   [ ] ,   [ 7 ] ,   [ ] ,   [ ] ,   [ ] ,   [ 0 ] ] , and the leftover task list of UAV formation is T L = [[2, 13, 5], [6, 15, 12], [1], [16, 18], [], [], [8, 19], [10, 11, 3]]. The UAVs participating in the assignment are U d i s p a t c h = [ U 0 , U 1 , U 2 , U 3 , U 6 , U 7 ] .
Run the TS-DTA algorithm to obtain the new task plan: P l a n n e w = [[2, 4, 13, 5], [18, 6, 15, 12], [1, 14], [16], [], [], [8, 19, 9], [10, 11, 17, 3]]; T 4 , T 9 , T 14 , T 17 are assigned to U 0 , U 6 , U 2 , U 7 , respectively. The cost of multi-UAV formation is f c = 2440.83 . The remaining routes are shown in Figure 8b, and the reconnaissance schedules of targets are shown in Figure 9. Although T 9 and T 14 have moved, the range of motion is not large; thus, they are assigned to the original UAV and the task orders are not changed. As for T 4 , the time window constraint cannot be satisfied due to the change in location. After reassignment, the task execution order of U 0 is adjusted to ensure that T 4 is reconnoitered within its time window.
For U 3 , because the location of T 17 is changed, the algorithm first removes T 17 from the task list of U 3 , which leads to the advance in the reconnaissance time of T 18 . As a result, the time window of T 18 cannot be satisfied. So, T 18 is the additional target, which should be added to T L u n . Finally, T 18 is assigned to U 0 , and T 17 is assigned to U 7 , which is nearer to T 17 . According to P l a n n e w , U 0 first reconnoiters T 18 and then performs subsequent tasks. By this way, the completion time of subsequent tasks are delayed; however, the time window constraints of all targets are satisfied.

4.1.5. Task Reassignment in the Case of Changing the Time Window of Targets

To verify the effectiveness of the TS-DTA algorithm in the case of changing the time window of targets, test 4 is conducted. Assuming that at time t = 1250 , the time windows of T 4 and T 18 are changed. The new time windows are T W 4 = [ 1400 ,   1700 ] and T W 18 = [ 1300 ,   1600 ] . The current battlefield situation is shown in Figure 10a.
Now, the finished task list of UAV formation is T F = [[2], [], [1], [7, 16], [], [], [8], [0, 10]] and the leftover task list of UAV formation is T L = [[13, 5], [6, 15, 12], [14], [17], [], [], [19, 9], [11, 3]]. According to the initial mission plan, the start and end times of reconnaissance for T 4 and T 18 are [ 1717.29 ,   1747.38 ] and [1661.72, 1728.01], which obviously does not meet the new time window constraints. So, the list of tasks to be allocated is T L u n = [ 4 ,   18 ] , and the UAVs participating in the assignment are U d i s p a t c h = [ U 0 , U 1 , U 2 , U 3 , U 6 , U 7 ] .
Run the TS-DTA algorithm to obtain a new mission plan: P l a n n e w = [[13, 4, 5], [6, 15, 12], [14], [18, 17], [], [], [19, 9], [11, 3]]. The cost of multi-UAV formation is f c = 1958.39 . The results are shown in Figure 10a and Figure 11. According to the initial plan, the task scheme of U 0 is P 0 = [ 2 ,   13 ,   5 ,   4 ] and the task scheme of U 3 is P 3 = [ 7 ,   16 ,   17 ,   18 ] . So, in the initial plan, T 4 belongs to U 0 and T 18 belongs to U 3 . It can be seen from P l a n n e w that both T 4 and T 18 are assigned to the UAV they originally belonged to. However, compared with the initial plan, the orders of tasks in P 0 and P 3 have changed. According to P l a n n e w , U 0 reconnoiters T 4 and then reconnoiters T 5 , and U 3 reconnoiters T 18 and then reconnoiters T 17 . This is because the time windows of T 4 and T 18 have advanced.

4.2. Comparative Analysis

4.2.1. Analysis of Communication Simplification Effect

The communication times mean the total times that UAVs communicate with each other during the process of task assignment. This paper reduces the communication times of UAV formation by introducing a bidding benchmark and assignment strategy based on route distance into the TS-DTA algorithm. Gao et al. [34] proposed a CNP-based algorithm to solve the task reassignment problem, in which targets are allocated one by one. In order to analyze the simplification effect of the TS-DTA algorithm on the communication process, we carried out some comparative experiments. Since the CNP-based algorithm [34] is only applicable to the two cases of UAV damage and new target occurrence, we only consider the above two dynamic events when setting up comparative experiments.
In the experiment, we randomly generate some targets that need to be reconnoitered in the range of [ 100 ,   300 ]   ×   [ 100 ,   300 ] as new targets. The specific data are shown in Table 3.
We conducted the following three sets of tests: UAV damage, new target appearance, and new target appearance at the same time as UAV damage. Experiments are based on the initial mission plan described in Section 4.1.1, and different dynamic events are introduced for comparative experiments.
The dynamic events are introduced at time t = 1000 in the first set of experiments, recorded as test 5. The leftover task list of UAV formation is T L = [[2, 13, 5, 4], [6, 15, 12], [1, 14], [16, 17, 18], [], [], [8, 19, 9], [10, 11, 3]]. By changing the serial number and numbers of damaged UAVs, comparative experiments are carried out. The experimental results are shown in Table 4. In the table, n d represents the number of UAVs in U d i s p a t c h and n u n represents the number of targets to be allocated.
It can be seen from the results that under various experimental conditions, the communication times of the CNP-based algorithm are greater than those of the TS-DTA algorithm. It is noted that the communication times of the TS-DTA algorithm are not stable even if n d and n u n are constant, which is mainly caused by three reasons: First, the bidding benchmark is introduced in the algorithm and the number of contractors that meet the bidding benchmark in the bidding process is not certain. Second, the number of assignments in the bidding strategy based on the route distance is not stable. Third, the number of cycles of the cyclic bidding strategy based on task timing is not stable.
The dynamic events are introduced at time t = 1200 in the second set of experiments, recorded as test 6. The leftover task list of UAV formation is TL = [[13, 5, 4], [6, 15, 12], [14], [17, 18], [], [], [19, 9], [11, 3]]. By introducing different numbers of new targets for comparative analysis, the experimental results are shown in Table 5. It can be seen from the results that as the number of new targets increases, the communication times of the CNP-based algorithm increases linearly. However, the communication times of the TS-DTA algorithm are significantly less than those of the CNP-based algorithm, and as the number of targets increases, the advantage is more obvious.
The dynamic events are introduced at time t = 1200 in the third set of experiments, recorded as test 7. A comparative analysis was performed by changing the number of damaged UAVs and the number of new targets. The experimental results are shown in Table 6. It can be seen from the results that the number of communication times of the TS-DTA algorithm is significantly lower than that of the CNP-based algorithm in various cases.

4.2.2. Analysis of Solution Speed and Solution Quality

In order to analyze the solution speed and solution quality of the TS-DTA algorithm, we conducted a set of comparative experiments. In addition to the CNP-based algorithm mentioned in Section 4.2.1, we add two centralized task assignment algorithms for comparison, including RPSO [39] and IEPPSO [22]. The solution speed and solution quality of RPSO and IEPPSO are related to the population size of particles. In order to analyze the performance of the algorithm more comprehensively, the task assignment effects of RPSO and IEPPSO algorithms with population sizes of 100, 300, and 500 are compared in each experiment. In the experiment, the number of iterations of the centralized algorithm is set to 200.
In the experiment, the number of targets to be reassigned is set to 2, 4, 6, 8, and 10, respectively. The performance is analyzed by comparing the CPU running time ( t c p u ) and the overall cost of UAV formation ( f c ) in various cases. Due to the randomness of the results of RPSO and IEPPSO algorithms, in order to ensure the objectivity of experiments, the RPSO and IEPPSO algorithms are run 20 times in each test, and the average of the 20 results are taken as the final result. The results are shown in Table 7.
According to the results of Table 7, the paper draws a line chart of CPU running time changing with the number of targets to be allocated, as shown in Figure 12, and draws a line chart of overall cost changing with the number of targets to be allocated, as shown in Figure 13.
From Figure 12, we can intuitively see that the CPU running time of the TS-DTA algorithm and the CNP-based algorithm is the shortest, followed by the RPSO algorithm, and that of the IEPPSO algorithm is the longest. As the population size increases, the time consumption of the RPSO and IEPPSO algorithms increase. Based on the experimental results in Section 4.2.1, the CNP-based algorithm requires a large amount of communication for task assignment. In the experiment, we did not consider the time cost of communication, and a large amount of communication will lead to a slower solution speed in actual task assignment.
From Figure 13, we can see that as the number of targets increases, the solving ability of the RPSO algorithm becomes weaker and the proportion of solutions that do not meet the constraints becomes higher, resulting in an overall higher cost value. The solving ability of the IEPPSO algorithm is relatively stable, and when the population size is 500, the solution of IEPPSO algorithm is optimal in various situations. However, combined with Figure 12, we find that the CPU running time of the IEPPSO algorithm significantly increases with the increase in the number of targets, which reflects that the IEPPSO algorithm improves the quality of the solution by increasing the computational load. So, the IEPPSO algorithm is not applicable in dynamic environments with high requirements for solving speed. Besides, the quality of solutions of the TS-DTA algorithm and the CNP-based algorithm are similar, and there is not much difference compared with the IEPPSO algorithm with a population size of 500.
Finally, considering the solving speed, communication burden, and solution quality, the TS-DTA algorithm is more suitable for solving the task reassignment problem in dynamic environments.

5. Conclusions and Future Work

In this paper, a model of multi-UAV cooperative reconnaissance task reassignment is established to comprehensively consider many dynamic events including UAV damage, new target occurrence, location change of the target, and time window change of the target. Then, a two-stage distributed task assignment algorithm (TS-DTA) based on the improved contract net protocol is presented to realize the rapid reassignment of multiple targets, reduce the communication burden of multi-UAV formation, and ensure the quality of task assignment to a certain extent. Finally, the experimental results show that the proposed TS-DTA algorithm can efficiently solve the task reassignment problem in dynamic environments while effectively reducing the communication burden of UAV formation.
Our future works will focus mainly on the two following aspects. Firstly, the TS-DTA algorithm will be further optimized to improve efficiency. Secondly, the task assignment and reassignment of reconnaissance UAVs and attack UAVs in mixed tasks will be further studied.

Author Contributions

Conceptualization, X.L. and G.W.; methodology, X.L. and G.W.; software, G.W.; validation, X.Y.; formal analysis, G.W.; investigation, G.W. and X.Y.; resources, X.L.; data curation, G.W.; writing—original draft preparation, G.W.; writing—review and editing, X.L.; visualization, G.W.; supervision, X.L.; project administration, X.L.; funding acquisition, X.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China under Grant 62102268, the Stable Supporting Program for Universities of Shenzhen under Grant 20220812102547001, the Research Foundation of Shenzhen Polytechnic University under Grants 6022312044K and 6023310030K, and Natural Science Foundation of Hubei Province (No.2019CFB627).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Frattolillo, F.; Brunori, D.; Iocchi, L. Scalable and Cooperative Deep Reinforcement Learning Approaches for Multi-UAV Systems: A Systematic Review. Drones 2023, 7, 236. [Google Scholar] [CrossRef]
  2. Yu, X.; Gao, X.; Wang, L.; Wang, X.; Ding, Y.; Lu, C.; Zhang, S. Cooperative Multi-UAV Task Assignment in Cross-Regional Joint Operations Considering Ammunition Inventory. Drones 2022, 6, 77. [Google Scholar] [CrossRef]
  3. Xu, S.; Zhang, J.; Meng, S.; Xu, J. Task allocation for unmanned aerial vehicles in mobile crowdsensing. Wirel. Netw. 2021, 14, 4185. [Google Scholar] [CrossRef]
  4. Rahman, D.A.; Sitorus, A.B.Y.; Condro, A.A. From Coastal to Montane Forest Ecosystems, Using Drones for Multi-Species Research in the Tropics. Drones 2022, 6, 6. [Google Scholar] [CrossRef]
  5. Xia, C.; Yongtai, L.; Liyuan, Y.; Lijie, Q. Cooperative Task Assignment and Track Planning for Multi-UAV Attack Mobile Targets. J. Intell. Robot. Syst. 2020, 100, 1383–1400. [Google Scholar] [CrossRef]
  6. Guo, J.; Huang, G.; Li, Q.; Xiong, N.N.; Zhang, S.; Wang, T. STMTO: A smart and trust multi-UAV task offloading system. Inf. Sci. 2021, 573, 519–540. [Google Scholar] [CrossRef]
  7. Muñoz, J.; López, B.; Quevedo, F.; Monje, C.A.; Garrido, S.; Moreno, L.E. Multi UAV Coverage Path Planning in Urban Environments. Sensors 2021, 21, 7365. [Google Scholar] [CrossRef] [PubMed]
  8. Zhang, J.; Xing, J. Cooperative task assignment of multi-UAV system. Chin. J. Aeronaut. 2020, 33, 2825–2827. [Google Scholar] [CrossRef]
  9. Chen, X.; Zhang, P.; Du, G.; Li, F. A distributed method for dynamic multi-robot task allocation problems with critical time constraints. Robot. Auton. Syst. 2019, 118, 31–46. [Google Scholar] [CrossRef]
  10. Huang, H.; Zhuo, T. Multi-model cooperative task assignment and path planning of multiple UCAV formation. Multimed. Tools Appl. 2019, 78, 415–436. [Google Scholar] [CrossRef]
  11. Fu, Z.; Mao, Y.; He, D.; Yu, J.; Xie, G. Secure Multi-UAV Collaborative Task Allocation. IEEE Access 2019, 7, 35579–35587. [Google Scholar] [CrossRef]
  12. Wang, Z.; Liu, L.; Long, T.; Wen, Y. Multi-UAV reconnaissance task allocation for heterogeneous targets using an opposition-based genetic algorithm with double-chromosome encoding. Chin. J. Aeronaut. 2018, 31, 339–350. [Google Scholar] [CrossRef]
  13. Jia, Z.; Yu, J.; Ai, X.; Xu, X.; Yang, D. Cooperative multiple task assignment problem with stochastic velocities and time windows for heterogeneous unmanned aerial vehicles using a genetic algorithm. Aerosp. Sci. Technol. 2018, 76, 112–125. [Google Scholar] [CrossRef]
  14. Yan, M.; Yuan, H.; Xu, J.; Yu, Y.; Jin, L. Task allocation and route planning of multiple UAVs in a marine environment based on an improved particle swarm optimization algorithm. EURASIP J. Adv. Signal Process. 2021, 2021, 39. [Google Scholar] [CrossRef]
  15. Cui, Y.; Dong, W.; Hu, D.; Liu, H. The Application of Improved Harmony Search Algorithm to Multi-UAV Task Assignment. Electronics 2022, 11, 1171. [Google Scholar] [CrossRef]
  16. Zhu, P.; Fang, X. Multi-UAV Cooperative Task Assignment Based on Half Random Q-Learning. Symmetry 2021, 13, 2417. [Google Scholar] [CrossRef]
  17. Yang, M.; Bi, W.; Zhang, A.; Gao, F. A distributed task reassignment method in dynamic environment for multi-UAV system. Appl. Intell. 2022, 52, 1582–1601. [Google Scholar] [CrossRef]
  18. Song, J.; Zhao, K.; Liu, Y. Survey on Mission Planning of Multiple Unmanned Aerial Vehicles. Aerospace 2023, 10, 208. [Google Scholar] [CrossRef]
  19. Chen, J.; Qing, X.; Ye, F.; Xiao, K.; You, K.; Sun, Q. Consensus-based bundle algorithm with local replanning for heterogeneous multi-UAV system in the time-sensitive and dynamic environment. J. Supercomput. 2022, 78, 1712–1740. [Google Scholar] [CrossRef]
  20. Oh, G.; Kim, Y.; Ahn, J.; Choi, H.-L. Market-Based Distributed Task Assignment of Multiple Unmanned Aerial Vehicles for Cooperative Timing Mission. J. Aircr. 2017, 54, 2298–2310. [Google Scholar] [CrossRef]
  21. Zhang, J.; Chen, Y.; Yang, Q.; Lu, Y.; Shi, G.; Wang, S.; Hu, J. Dynamic Task Allocation of Multiple UAVs Based on Improved A-QCDPSO. Electronics 2022, 11, 1028. [Google Scholar] [CrossRef]
  22. Lv, X.; Wang, G.; Chen, J. Multi-UAV Cooperative Reconnaissance Task Allocation Based on IEPPSO Algorithm. In Proceedings of the 2023 18th Chinese Conference on Computer Supported Cooperative Work and Social Computing, Harbin, China, 18–20 August 2023. [Google Scholar]
  23. Gerkey, B.P.; Matarić, M.J. A Formal Analysis and Taxonomy of Task Allocation in Multi-Robot Systems. Int. J. Robot. Res. 2004, 23, 939–954. [Google Scholar] [CrossRef]
  24. Chen, Y.; Di Yang Yu, J. Multi-UAV Task Assignment with Parameter and Time-Sensitive Uncertainties Using Modified Two-Part Wolf Pack Search Algorithm. IEEE Trans. Aerosp. Electron. Syst. 2018, 54, 2853–2872. [Google Scholar] [CrossRef]
  25. Ye, F.; Chen, J.; Sun, Q.; Tian, Y.; Jiang, T. Decentralized task allocation for heterogeneous multi-UAV system with task coupling constraints. J. Supercomput. 2021, 77, 111–132. [Google Scholar] [CrossRef]
  26. Zhen, Z.; Zhu, P.; Xue, Y.; Ji, Y. Distributed intelligent self-organized mission planning of multi-UAV for dynamic targets cooperative search-attack. Chin. J. Aeronaut. 2019, 32, 2706–2716. [Google Scholar] [CrossRef]
  27. Ghassemi, P.; Chowdhury, S. Multi-robot task allocation in disaster response: Addressing dynamic tasks with deadlines and robots with range and payload constraints. Robot. Auton. Syst. 2022, 147, 103905. [Google Scholar] [CrossRef]
  28. Choi, H.-L.; Brunet, L.; How, J.P. Consensus-Based Decentralized Auctions for Robust Task Allocation. IEEE Trans. Robot. 2009, 25, 912–926. [Google Scholar] [CrossRef]
  29. Smith, R.G. The contract net protocol: High-level communication and control in a distributed problem solver. IEEE Trans. Comput. 1980, 29, 1104–1113. [Google Scholar] [CrossRef]
  30. Qin, B.; Zhang, D.; Tang, S.; Wang, M. Distributed Grouping Cooperative Dynamic Task Assignment Method of UAV Swarm. Appl. Sci. 2022, 12, 2865. [Google Scholar] [CrossRef]
  31. Zitouni, F.; Harous, S.; Maamri, R. A Distributed Approach to the Multi-Robot Task Allocation Problem Using the Consensus-Based Bundle Algorithm and Ant Colony System. IEEE Access 2020, 8, 27479–27494. [Google Scholar] [CrossRef]
  32. Deng, Z.; Chen, T. Distributed algorithm design for constrained resource allocation problems with high-order multi-agent systems. Automatica 2022, 144, 110492. [Google Scholar] [CrossRef]
  33. Zhang, Z.; Liu, H.; Wu, G. A Dynamic Task Scheduling Method for Multiple UAVs Based on Contract Net Protocol. Sensors 2022, 22, 4486. [Google Scholar] [CrossRef]
  34. Gao, X.; Wang, L.; Su, X.; Lu, C.; Ding, Y.; Wang, C.; Peng, H.; Wang, X. A Unified Multi-Objective Optimization Framework for UAV Cooperative Task Assignment and Re-Assignment. Mathematics 2022, 10, 4241. [Google Scholar] [CrossRef]
  35. Deng, Z.; Luo, J. Fully Distributed Algorithms for Constrained Nonsmooth Optimization Problems of General Linear Multi-Agent Systems and Their Application. IEEE Trans. Autom. Control 2023. early access. [Google Scholar] [CrossRef]
  36. Shami, T.M.; El-Saleh, A.A.; Alswaitti, M.; Al-Tashi, Q.; Summakieh, M.A.; Mirjalili, S. Particle swarm optimization: A comprehensive survey. IEEE Access 2022, 10, 10031–10061. [Google Scholar] [CrossRef]
  37. Gao, S.; Wu, J.; Ai, J. Multi-UAV reconnaissance task allocation for heterogeneous targets using grouping ant colony optimization algorithm. Soft Comput. 2021, 25, 7155–7167. [Google Scholar] [CrossRef]
  38. Zhen, Z.; Wen, L.; Wang, B.; Hu, Z.; Zhang, D. Improved contract network protocol algorithm based cooperative target allocation of heterogeneous UAV swarm. Aerosp. Sci. Technol. 2021, 119, 107054. [Google Scholar] [CrossRef]
  39. Liu, W.; Wang, Z.; Zeng, N.; Yuan, Y.; Alsaadi, F.E.; Liu, X. A novel randomized particle swarm optimizer. Int. J. Mach. Learn. Cybern. 2021, 12, 529–540. [Google Scholar] [CrossRef]
Figure 1. The framework of TS-DTA.
Figure 1. The framework of TS-DTA.
Sensors 23 07980 g001
Figure 2. (a) Initial situation. (b) Initial mission plan.
Figure 2. (a) Initial situation. (b) Initial mission plan.
Sensors 23 07980 g002
Figure 3. (a) The battlefield situation of test 1. (b) Result of task reassignment in test 1.
Figure 3. (a) The battlefield situation of test 1. (b) Result of task reassignment in test 1.
Sensors 23 07980 g003
Figure 4. Reconnaissance schedules in test 1.
Figure 4. Reconnaissance schedules in test 1.
Sensors 23 07980 g004
Figure 5. Routes comparison.
Figure 5. Routes comparison.
Sensors 23 07980 g005
Figure 6. (a) The battlefield situation of test 2. (b) Result of task reassignment in test 2.
Figure 6. (a) The battlefield situation of test 2. (b) Result of task reassignment in test 2.
Sensors 23 07980 g006
Figure 7. Reconnaissance schedules in test 2.
Figure 7. Reconnaissance schedules in test 2.
Sensors 23 07980 g007
Figure 8. (a) The battlefield situation of test 3. (b) Result of task reassignment in test 3.
Figure 8. (a) The battlefield situation of test 3. (b) Result of task reassignment in test 3.
Sensors 23 07980 g008
Figure 9. Reconnaissance schedules in test 3.
Figure 9. Reconnaissance schedules in test 3.
Sensors 23 07980 g009
Figure 10. (a) The battlefield situation of test 4; (b) Result of task reassignment in test 4.
Figure 10. (a) The battlefield situation of test 4; (b) Result of task reassignment in test 4.
Sensors 23 07980 g010
Figure 11. Reconnaissance schedules in test 4.
Figure 11. Reconnaissance schedules in test 4.
Sensors 23 07980 g011
Figure 12. CPU running time.
Figure 12. CPU running time.
Sensors 23 07980 g012
Figure 13. Cost of UAV formation.
Figure 13. Cost of UAV formation.
Sensors 23 07980 g013
Table 1. Initialization information of platforms and UAVs.
Table 1. Initialization information of platforms and UAVs.
PlatformLocationUAVCruising Speed
(km/h)
Maximum Range
(km)
S 0 [19.37, 37.39] U 0 0.22 1000
U 1 0.181200
S 1 [65.77, 57.97] U 2 0.16 1500
U 3 0.221000
S 2 [42.48, 21.43] U 4 0.18 1200
U 5 0.161500
S 3 [32.59, 75.64] U 6 0.221000
U 7 0.30800
Table 2. Initialization information of targets.
Table 2. Initialization information of targets.
TargetLocationRadius of Circular RouteTime Window
T 0 [218.78, 270.38]2.37
T 1 [195.39, 162.48]1.67[900, 1200]
T 2 [146.44, 239.28]2.18
T 3 [156.53, 289.27]2.01
T 4 [184.89, 215.84]1.05[1300, 1800]
T 5 [199.31, 250.61]2.78
T 6 [231.33, 110.05]1.64
T 7 [227.74, 154.97]1.97
T 8 [126.38, 294.10]2.33
T 9 [109.69, 185.35]1.03
T 10 [280.76, 266.99]1.31[800, 1300]
T 11 [260.75, 287.63]2.22
T 12 [275.67, 125.95]1.23
T 13 [173.67, 250.11]2.47
T 14 [193.87, 108.35]1.96[1000, 1600]
T 15 [268.56, 107.26]2.21
T 16 [254.66, 183.98]2.02
T 17 [260.90, 226.18]1.31
T 18 [290.79, 172.73]2.32[1400, 1800]
T 19 [125.60, 254.88]2.11
Table 3. Data of new targets.
Table 3. Data of new targets.
TargetLocationRadius of Circular RouteTime Window
T n 1 [280.63, 278.70]2.00
T n 2 [180.89, 173.82]1.03
T n 3 [151.43, 198.77]2.85[1400, 1700]
T n 4 [215.02, 172.35]2.06
T n 5 [191.46, 292.98]1.62
T n 6 [251.27, 263.65]2.46
T n 7 [257.51, 280.33]2.44
T n 8 [173.28, 290.10]1.18[1600, 1900]
T n 9 [296.40, 146.77]1.78
T n 10 [275.39, 207.76]1.30
T n 11 [296.49, 161.63]1.25
T n 12 [223.44, 166.88]2.36[1500, 1900]
T n 13 [143.55, 265.13]2.41
T n 14 [179.71, 228.92]2.31
Table 4. Statistics of communication times in test 5.
Table 4. Statistics of communication times in test 5.
Damaged UAV T L u n n d n u n Communication Times
CNP-BasedTS-DTA
U 0 [2, 13, 5, 4]543222
U 1 [6, 15, 12]532412
U 3 [16, 17, 18]532418
U 6 [8, 19, 9]532412
U 0 , U 1 [2, 13, 5, 4, 6, 15, 12]474219
U 0 , U 3 [2, 13, 5, 4, 16, 17, 18]474226
U 0 , U 6 [2, 13, 5, 4, 8, 19, 9]474217
Table 5. Statistics of communication times in test 6.
Table 5. Statistics of communication times in test 6.
New Target n d n u n Times of Communication
CNP-BasedTS-DTA
T n 1 , T n 2 622014
T n 1 , T n 2 , T n 3 , T n 4 644021
T n 1 , T n 2 , T n 3 , T n 4 , T n 5 , T n 6 666021
T n 1 , T n 2 , T n 3 , T n 4 , T n 5 , T n 6 , T n 7 , T n 8 688028
T n 1 , T n 2 , T n 3 , T n 4 , T n 5
T n 6 , T n 7 , T n 8 , T n 9 , T n 10
61010028
T n 1 , T n 2 , T n 3 , T n 4 , T n 5 , T n 6
T n 7 , T n 8 , T n 9 , T n 10 , T n 11 , T n 12
61212035
T n 1 , T n 2 , T n 3 , T n 4 , T n 5 , T n 6 , T n 7
T n 8 , T n 9 , T n 10 , T n 11 , T n 12 , T n 13 , T n 14 ,
61414039
Table 6. Statistics of communication times in test 7.
Table 6. Statistics of communication times in test 7.
Damaged UAVNew Target n d n u n Times of Communication
CNP-BasedTS-DTA
U 0 T n 1 , T n 2 554018
U 1 T n 1 , T n 2 , T n 3 , T n 4 , T n 5 , T n 6 597222
U 2 T n 1 , T n 2 , T n 3 , T n 4 , T n 5 , T n 6 , T n 7 , T n 8 5107230
U 0 , U 2 T n 9 , T n 10 , T n 11 , T n 12 494823
U 0 , U 7 T n 9 , T n 10 , T n 11 , T n 12 , T n 13 , T n 14 4116620
Table 7. The CPU running time and the overall cost of UAV formation.
Table 7. The CPU running time and the overall cost of UAV formation.
n u n Indicator RPSO
n p   = 100
RPSO
n p = 300
RPSO
n p = 500
IEPPSO
n p = 100
IEPPSO
n p = 300
IEPPSO
n p = 500
CNP-Based TS-DTA
2 t c p u 1.605.128.5711.3228.9949.940.0160.016
f c 2889.132208.322200.232047.232032.552001.192008.652016.87
4 t c p u 1.725.349.1116.7942.0164.970.0310.016
f c 3124.002389.122349.332116.752086.812071.352090.082160.61
6 t c p u 1.835.629.3027.5762.8196.750.0310.031
f c 4747.523134.252618.542264.272162.502178.092216.052216.05
8 t c p u 1.915.909.9541.0887.14129.780.0470.047
f c 6868.403960.383785.012357.672271.902260.062346.452348.27
10 t c p u 1.986.2510.3667.69138.86191.720.0310.047
f c 8484.403610.043567.312444.062323.402282.112355.242355.34
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, G.; Lv, X.; Yan, X. A Two-Stage Distributed Task Assignment Algorithm Based on Contract Net Protocol for Multi-UAV Cooperative Reconnaissance Task Reassignment in Dynamic Environments. Sensors 2023, 23, 7980. https://doi.org/10.3390/s23187980

AMA Style

Wang G, Lv X, Yan X. A Two-Stage Distributed Task Assignment Algorithm Based on Contract Net Protocol for Multi-UAV Cooperative Reconnaissance Task Reassignment in Dynamic Environments. Sensors. 2023; 23(18):7980. https://doi.org/10.3390/s23187980

Chicago/Turabian Style

Wang, Gang, Xiao Lv, and Xiaohu Yan. 2023. "A Two-Stage Distributed Task Assignment Algorithm Based on Contract Net Protocol for Multi-UAV Cooperative Reconnaissance Task Reassignment in Dynamic Environments" Sensors 23, no. 18: 7980. https://doi.org/10.3390/s23187980

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop