Next Article in Journal
Three-Dimensional Drone Exploration with Saliency Prediction in Real Unknown Environments
Next Article in Special Issue
Bridging the Gap between Simulation and Real Autonomous UAV Flights in Industrial Applications
Previous Article in Journal
Study on Optimization Design of Airfoil Transonic Buffet with Reinforcement Learning Method
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Path Planning of an Unmanned Combat Aerial Vehicle with an Extended-Treatment-Approach-Based Immune Plasma Algorithm

Department of Aeronautical Engineering, Erciyes University, Kayseri 38039, Turkey
*
Author to whom correspondence should be addressed.
Aerospace 2023, 10(5), 487; https://doi.org/10.3390/aerospace10050487
Submission received: 29 March 2023 / Revised: 12 May 2023 / Accepted: 15 May 2023 / Published: 21 May 2023
(This article belongs to the Special Issue UAV Path Planning and Navigation)

Abstract

:
The increasing usage of unmanned aerial vehicles (UAVs) and their variants carrying complex weapon systems, known as unmanned combat aerial vehicles (UCAVs), has triggered a global revolution in complex military and commercial operations and has attracted researcher attention from different engineering disciplines in order to solve challenging problems regarding these modern vehicles. Path planning is a challenging problem for UAV and UCAV systems that requires the calculation of an optimal solution by considering enemy threats, total flight length, fuel or battery consumption, and some kinematic properties such as turning or climbing angles. In this study, the immune plasma (IP or IPA) algorithm, one of the most recent nature-inspired intelligent optimization methods, was modified by changing the default plasma transfer operations with a newly proposed technique called the extended treatment approach; extended IPA (ExtIPA) was then introduced as a path planner. To analyze the solving capabilities of the ExtIPA, 16 cases from five battlefield scenarios were tested by assigning different values to the algorithm-specific control parameters. The paths calculated with ExtIPA were compared with the paths found by planners on the basis of other intelligent optimization techniques. Comparative studies between ExtIPA and other techniques allowed for stating that the extended treatment approach significantly contributes to both the convergence speed and qualities of the obtained solutions and helps ExtIPA in performing better than its rivals in most cases.

1. Introduction

Tremendous advances in computing, communication, optical, weapon, and ammunition technologies have brought unexpected reconnaissance, surveillance, and destructive capabilities to unmanned aerial vehicles (UAVs) and unmanned combat aerial vehicles (UCAVs) [1,2]. To increase the likelihood of success of a task assigned to a UAV, UCAV, or similar modern aerial vehicle, a flight path should be carefully calculated by taking into account some optimization goals related to enemy threats, fuel consumption, or battery usage [3,4]. Even though graph-based algorithms such as the Voronoi diagram, A* search, D* lite, and other classical techniques such as rapidly exploring random trees (RRT), artificial potential fields (APF), and probabilistic road maps (PRM) are commonly used for calculating UAV or UCAV paths, they require the generation of cost maps of complex battlefields and usually suffer from convergence to local optimal solutions [5,6].
In recent years, meta-heuristic algorithms, which are a branch of artificial intelligence techniques, have started being used as path planners of UAV or UCAV systems because of their advantages regarding their implementation simplicity, computational complexity, and configurable or adjustable structures [7,8,9]. C. Xu et al. directed the employed foragers of the artificial bee colony (ABC) algorithm to the best current food source by utilizing chaotic variables for their path planner, named chaotic ABC (CABC), and pictorially proved the superiority of the CABC over the ABC algorithm [10]. Y. Zhang et al. converted the raw fitness values of food sources by using a fitness scaling strategy and employed Lorenz equations to generate random numbers required by the bee phases to improve the path-planning performance of the ABC algorithm [11]. In another study, Y. Zhang et al. improved the selection probabilities of qualified solutions by taking into account a fitness scaling mechanism for the particle swarm optimization (PSO) algorithm [12]. Moreover, Y. Zhang et al. adaptively adjusted the inertial weight and acceleration coefficients of the population update equation in PSO and utilized a chaotic random number generator to determine the values of the random coefficients of the same equation [12]. The PSO algorithm introduced by Y. Zhang et al., called the fitness-scaling adaptive chaotic PSO (FAC-PSO), was used as a path planner [12]. P. Li and Duan referenced the idea of memory and social information concept of PSO for their gravitational search algorithm (GSA), and its effectiveness on solving UAV path-planning problems was verified via comparisons with the standard PSO, GSA, and two other GSA-based models [13]. Fu operated a version of the PSO algorithm for which each particle modified the related velocities by guiding the best solution of a small solution group as the path planner [14].
G.-G. Wang et al. designed a new information-sharing approach between the qualified solutions of the firefly algorithm (FA) and presented the modified FA (MFA) [15]. A detailed comparison was presented between the MFA and other meta-heuristic-based UAV path planners such as PSO, ant colony optimization (ACO), differential evolution (DE), biogeograph-based optimization (BBO), evolutionary strategies (ES), population-based incremental learning (PBIL), genetic algorithm (GA), and, lastly, a variant of GA known as stud GA (SGA) [15]. The studies pioneered by G.-G Wang were not limited to the MFA. G.-G. Wang et al. tried to embed some dynamics of the DE algorithm into cuckoo search (CS), and the DE/CS algorithm was announced for planning UCAV paths being operated in a three-dimensional environment [16]. G.-G. Wang et al. altered the solution update procedure of the bat algorithm (BA) with the mutation operator of DE, and BAM was presented [17]. The qualities of the obtained UCAV paths allowed for stating that the mutation operator accelerated the convergence speed of BA while maintaining the existing strong search characteristics of the algorithm [17]. A separate study of G.-G. Wang et al. borrowed the mutation operator from the DE and ported it into the workflow of BA [18]. The BA with the support of the mutation operator of DE was named improved BA (IBA) and was tested in a three-dimensional environment to calculate optimal UCAV paths [18]. The BBO algorithm was updated with chaos theory and the predator–prey concept by W. Zhu and Duan; then, chaotic predator–prey BBO (CPPBBO) was introduced for solving path-planning problems [19]. These authors conducted a set of experiments for a UAV with constraints regarding the maximal yawing angle and flight length [19]. Heidari and Abbaspour varied the communication relationship between the stars and other elements of the black hole (BH) algorithm, and controlled the effects of modifications over UCAV path-planning problems [20]. Tang and Zhou replaced the location update model of glowworm swarm optimization (GSO) with the mechanism inherited from the PSO, and introduced the PGSO algorithm [21]. The performance of PGSO was analyzed in detail for path-planning problems, and it obtained more qualified solutions than other tested algorithms did, especially when the number of segmentation points or waypoints was set to 5 or 10 [21].
G. Yu et al. applied teaching–learning-based optimization (TLBO) to a two-dimensional UAV path-planning problem and reached some critical conclusions regarding the solving capabilities of TLBO compared with the ABC, PSO, DE, and GSO algorithms [22]. X. Zhang and Duan defined multiple constraints such as the total cruise length, flight altitude, turning angle, climbing or gliding slope, terrain, non-flight zones, and enemy threats, including radars, missiles, and anti-air guns, for path-planning problems; they announced a DE algorithm specialized with an  α -level comparison-based constraint-handling technique [23]. Q. Zhou et al. changed the wolf colony search (WCS) algorithm, so that the complex method was responsible for managing the leading strategy of the wolf colony; they simulated a newly proposed technique called CWCS as the path planner [24]. B. Li et al. first developed the balance-evolution strategy (BES) by controlling the trial counters of employed bees to generate candidate solutions in the ABC algorithm, and the BE-ABC algorithm was introduced [25]. They examined the BE-ABC algorithm for planning UCAV paths by using three different battlefield scenarios, and compared BE-ABC, ABC, and two ABC variants, namely, the I-ABC and IF-ABC algorithms [25]. The predator–prey concept was combined with the pigeon-inspired optimization (PIO) by B. Zhang and Duan, and predator–prey pigeon-inspired optimization (PPPIO) was presented [26]. They prepared test scenarios for which danger zones moved dynamically and planned UCAV paths with PPPIO [26]. Y. Zhou et al. specialized some stages of wind-driven optimization (WDO) with the quantum rotation gate and quantum non-gate strategies, and quantum WDO (QWDO) was proposed [27]. The UCAV paths found by QWDO were compared with the paths found by quantum-supported variants of PSO and BA, and standard implementations of the WDO, PSO, and DE algorithms [27].
S. Zhang et al. focused on how the standard implementation of the grey wolf optimizer (GWO) performs on calculating UAV paths for two-dimensional test cases [28]. Luo et al. represented the solution of BA with the quantum encoding and executed the quantum rotation gate to manage update operations and the quantum dot gate to manage the mutation operations for their path planner known as quantum encoding BA (QBA) [29]. Q. Zhang et al. decided to develop a collection decision optimization algorithm (CDOA)-guided technique and verified the effectiveness of it after solving the UAV path-planning problem [30]. Alihodzic et al. investigated the path-planning capabilities of the elephant herding optimization (EHO) algorithm for two-dimensional battlefields [31]. Alihodzic et al. also solved UCAV path-planning problem with the fireworks algorithm (FWA)-based approach in which the qualities of solutions are utilized for determining how many sparks are generated and how the exploitation amplitude is calculated [32]. Miao et al. provided an extensively rich set of experiments about their path planner developed via the hybridization of the simplex method (SM) and the symbiotic organism search (SOS) algorithm [33]. Dolicanin et al. configured the brain storm optimization (BSO) algorithm as a path planner and used a battlefield with five enemy threats for testing [34]. Pan et al. adjusted the scaling factor and fraction probability of the CS algorithm with the help of chaotic sequences of Circle-type Chaotic Maps and showed the superiority of their CS algorithm against the standard CS algorithm for solving the UCAV path-planning problem [35]. The valuable contribution to the literature of intelligent UAV or UCAV path-planning by the studies pioneered by Pan has carried over to current times. Pan et al. remodeled the process of encircling or searching for the prey of the whale optimization algorithm (WOA) with a self-tuning parameter based on the qualities of the agents [36]. Two battlefield scenarios were simulated with the purpose of UCAV path-planning, and it was understood that improved WOA achieves more qualified paths compared to the standard WOA [36]. Moreover, Pan et al. brought together the advantageous sides of two DE variants such as CIPDE and JADE, and CIJADE was proposed [37]. In CIJADE, the crossover rate and scaling factor were determined according to a parameter adaption strategy in each cycle or generation. Some tests carried out for a battlefield with ten enemy threats demonstrated that CIJADE outperforms PSO, DE, ABC, JADE, and CIPDE, and the superiority of CIJADE becomes more apparent when the number of segmentation points is increased [37].
Lin et al. altered the position update procedure of BA with the help of APF when designing a BA-guided path planner [38]. They also improved the inertia weight of the mentioned BA by using the optimal success rate strategy and chaos theory to further escape the local optimal solutions [38]. Qu et al. integrated reinforcement learning (RL) into the workflow of GWO by assuming that the population members of GWO correspond to the training agents of RL and introduced RLGWO for calculating optimal UAV paths [39]. RLGWO was tested using three battlefield scenarios and compared with the standard GWO and its variants, including IGWO, MGWO, and EEGWO [39]. The GWO algorithm was selected by Qu et al. in another study. They hybridized a simplified variant of the GWO algorithm with SOS that uses a modified commensalism phase and developed HSGWO-MSOS [40]. Comparative studies between HSGWO-MSOS, GWO, SOS, and simulated annealing (SA) conducted on both two- and three-dimensional scenarios proved the better performance of the newly proposed technique [40]. Monarch butterfly optimization (MBO) was modified by Yi et al. in a manner that quantum operators are responsible for regenerating a certain set of worst butterflies, and quantum-inspired MBO (QMBO) was proposed as a three-dimensional path planner [41]. C. Wu et al. considered some physical constraints of the UAV when exploring the search space and used them in the initialization of the bees belonging to ABC algorithm [42]. Yang Chen et al. changed the global update equation of the flower pollination algorithm (FPA) to guarantee a non-monotonic decreasing sequence [43]. In addition to this, a population reconstruction mechanism was added to protect the algorithm from premature convergence [43]. The new implementation of the FPA, named neighborhood global-learning-based FPA (NGFPA), was executed to find optimal UAV paths, and its results were compared with the results of some well-known techniques such as A*, APF, and RRT [43].
H. Zhu et al. provided a detailed comparative study by using standard versions of ABC, BA, DE, FA, GWO, PSO, WOA, CS, a modified variant of MBO called GSMBO, harmony search (HS) and spider monkey algorithm (SMA) and concluded that SMO is able to planning more safe UCAV paths than other tested algorithms do [44]. The superior performance of SMO gave inspiration to H. Zhu et al. for developing new path planners on the basis of the mentioned algorithm. The SMO supported with cooperative co-evolution, which is a method helping the division of the parameter set into smaller sub-sets first to solve them independently and then combining the partial solutions appropriately, was used by H. Zhu et al. when planning UCAV paths [45]. In order to validate the competitiveness of the SMA-based technique, twenty-five cases under five different scales were described and tested [45]. X. Zhou et al. tried to handle the poor local search ability of BA with the help of the ABC algorithm, and the improved BA (IBA) was presented and tested for planning UAV paths in an environment containing specially modeled enemy radars, missiles, anti-aircraft weapons, and climate effects [46]. P. Wu et al. determined the values of the random coefficients in the PSO algorithm using a Zaslavskii chaos map, and a path planner named improved chaotic PSO was announced [47]. H. Xu et al. remodeled the critical sections of the GSA by using an adaptive alpha-adjusting strategy and a Cauchy mutation strategy. The GSA variant, also called mixed-strategy-based GSA (MSGSA for short) was used to obtain optimal UAV paths by considering enemy threats, total flight length, turning angles, and non-flight zones [48].
One of the most specialized UAV path planners was introduced by Jiang et al. at the beginning of 2022 [49]. They changed the workflow of the standard GWO by adding a communication mechanism for avoiding local optimum solutions in the search process and  ϵ -level comparison for managing constraints [49]. Moreover, they utilized the partially observable Markov decision process and Monte Carlo tree search algorithm for the purpose of collision avoidance [49]. X. Wang et al. supported different stages of the mayfly algorithm (MA) and offered the modified MA (modMA) [50]. In the modMA, the gravity coefficient was determined with an exponent inertia weight strategy, and the position of each male mayfly was adjusted by employing Cauchy-based mutation approach [50]. Finally, they integrated the horizontal crossover strategy in which the solution space is divided into hypercubes to allow the parent individuals to generate candidates of distant regions [50]. Niu et al. controlled different stages of the artificial ecosystem optimizer (AEO) and proposed an adaptive neighborhood-based search-enhanced AEO (NSEAEO for short) to address the UCAV path planning problem [51]. In NSEAEO, distance-fitness-based information was used to define neighborhoods for consumers and a significant contribution was given to the global exploration capability of the algorithm [51]. Moreover, Niu et al. employed a novel decomposition method maintaining the population diversity. Experimental studies on both two- and three-dimensional environments showed that NSEAEO is able to handle challenging objectives regarding enemy threats, total flight length, and turning and climbing angles more robustly than other techniques can, such as the salp swarm algorithm (SSA), the stain bowerbird optimizer (SBO), the pathfinder algorithm (PFA), the sine–cosine algorithm (SCA), two PSO variants named GAPSO and CIPSO, GA, MFO, a modified TLBO (ECTLBO), HSGWO-MSOS, and AEO [51]. Jia et al. developed a new approach called double-layer coding (DLC) used for deciding which segmentation points or waypoints are considered to define a UCAV path and used it with their PSO variant known as rotation-based PSO (RPSO) [52].
When the details given about a how a meta-heuristic algorithm is specialized or modified in order to solve UAV or UCAV path-planning problem are given, it can be easily seen that nature has a tremendous potential to inspire researchers in the development of new computational intelligence techniques. The immune plasma algorithm (IP algorithm or IPA) is one of the most recent meta-heuristic methods that shows the immense richness of nature by modeling the fundamental steps of a medical method. This algorithm gained popularity again with the COVID-19 pandemic and was named as the convalescent or immune plasma treatment [53]. If the main operations executed by the IPA are investigated, it can be easily seen that the IPA differs from the most representative meta-heuristics including ACO, ABC, PSO, BA, FA, FWA, DE, and GA [53]. While the exploitation-dominant operations of the IPA are designed in a semi-adaptive manner and adjust the convergence dynamically without changing the initial values of the control parameters, a quasi-deterministic approach is responsible for managing the important part of exploration, and its promising performance has been validated recently for engineering problems such as channel assignment [54], time series prediction [55], wireless sensor deployment [56], signal noise minimization [57], neural network training [58], and also UAV or UCAV path planning [59]. In this study, the plasma transfer scheme of the IP algorithm was changed with a newly introduced approach called extended treatment, and an extended IP algorithm, or ExtIPA, was designed to solve the path-planning problem. The extended treatment approach mainly depends on continuing the transfer of plasma from the donor to the selected receiver until the receiver becomes better than its donor and allows for the algorithm to search the vicinity of the eligible solutions more sensitively. The contribution of the extended treatment approach on the qualities of planned UCAV paths was investigated by using different battlefield scenarios, and obtained solutions were compared with the solutions of other meta-heuristic-based path planners. Comparative studies between ExtIPA and other techniques showed that the newly introduced treatment approach significantly improves the exploitation performance of the IPA while maintaining the existing exploration capabilities, and ExtIPA outperforms its competitors in most of the test cases. The rest of the paper is organized as follows: Details of the path-planning problem and score calculation method are given in Section 2. Fundamental steps of the IP algorithm are summarized in Section 3. Section 4 is devoted to the extended treatment approach and its integration into the IPA. The results of the experiments and comparative studies are presented in Section 5. Finally, some conclusions and future works about the development of new IPA-based path planning techniques are mentioned in Section 6.

2. Mathematical Description of the UCAV Path-Planning Problem

Before we start to determine a UCAV path, a strong mathematical model that describes enemy threats and their effects, the fuel or battery consumption over the total flight length, and a score calculation schema to understand how the path is qualified should be introduced. One of the commonly used mathematical models depends on describing an enemy threat by utilizing the radius of a circle with a known center coordinate to show the effect range and the grade or level to show the destructive capability. Given that there is a UCAV being planned to destroy a target positioned at  P t = ( x t , y t )  by taking off from the start point at  P s = ( x s , y s ) , a reference line between  P s  and  P t  is drawn. Moreover, the reference line between  P s  and  P t  is divided equally into  D + 1  segments with the help of D segmentation points [59]. Each segmentation point on the reference line is intersected with a line that is vertical to the reference line, such as  L 1  for point  P 1  and  L 2  for point  P 2 ; then, line set  L = { L 1 , L 2 , , L D 1 , L D }  is obtained. Set L serves a critical function in determining a flight path. Assume that only one point is selected from each line in the set L and combined appropriately with  P s  and  P t ; then, a set of points described as  P = { P 1 , P 2 , , P D 1 , P D }  can be generated. When each subsequent pair of points in set P is connected with a line segment, a UCAV path from start point  P s  to the target point  P t  can also be found [59].
Even though the forming a UCAV path by connecting each subsequent pair of points with a line segment seems relatively straightforward, finding the members of the set L and determining the coordinates of points in the set P require difficult calculations. To simplify the required calculations when generating the set L and set P, some properties of a new coordinate system in which the reference line corresponds to the horizontal axis can be utilized [59]. In order to transform a point of the original coordinate system into the appropriate counterpart of the new coordinate system, Equation (1) can be used [59]. While  x k  and  y k  are matched with the x-axis and y-axis values of point  P k  in the original coordinate system,  x ´ k  and  y ´ k  are matched with the  x ´ -axis and  y ´ -axis values of the transformed  P k  or  P ´ k  in Equation (1).  θ  is the angle between the x-axis of the original coordinate system and reference line and can be calculated as the results of the  a r c t a n ( ( y s y t ) / ( x s x t ) )  operation [59]:
x ´ k y ´ k = c o s ( θ ) s i n ( θ ) s i n ( θ ) c o s ( θ ) × x k x s y k y s
Because the reference line becomes the horizontal axis of the new coordinate system and is divided equally into  D + 1  segments with D different segmentation points, the distance between two subsequent segmentation points is found equal to  | P s P t | / ( D + 1 ) , and the  x ´ k -axis value of the ith segmentation point or  x ´ i  is also found equal to  i | P s P t | / ( D + 1 )  [59]. As stated earlier, each segmentation point is intersected with a line vertical to the reference line, and a point is selected from this vertical line. Considering the vertical line passing through the ith segmentation point, the  x ´ -axis value of any point being selected from this line becomes equal to  i | P s P t | / ( D + 1 ) , and only the  y ´ -axis value is required [59]. If only the  y ´ -axis values of the points being selected from the vertical lines are considered and organized in a set such as  { y ´ 1 , y ´ 2 , , y ´ D 1 , y ´ D } , path planning can be turned into a problem for which the  y ´ -axis values of D different points are optimally determined by selecting one for each vertical line with the purpose of a safe and efficient flight mission. A visual investigation can be conducted in order to understand the relationship between the original and transformed coordinate systems by controlling the Figure 1.
The geometrical modeling of the path-planning problem allows one to find an infinite set of possible solutions due to the continuous search spaces of the points. In order to compare two possible solutions to decide which path is better, a quality or score measurement schema should be described. A quality or score measurement schema used for comparing different paths is introduced in Equation (2) [59]. In Equation (2),  J t  is used to represent the cost of enemy threats for the considered path, and it is calculated using the integral of  w f  from 0 to the total length of the path, abbreviated as l. Similarly,  J f  is used on behalf of the cost of fuel consumption, and it is calculated using the integral of  w f  from 0 to the total length of the path. To adjust the weights of  J t  and  J f  in the construction of the J score, a constant called  λ , chosen between 0 and 1, is directly multiplied by  J t , and the value of  1 λ  operation is multiplied by  J f  [59].
J = λ J t + ( 1 λ ) J f = λ 0 l w t d l + ( 1 λ ) 0 l w f d l
The integral calculations about the cost of enemy threats and cost of fuel consumption can be carried out by using some approximations with acceptable accuracies. Given that  w f  is set to a constant such as 1, the  J f  is found to simply equal the length of the flight path [59]. If the length of the flight path increases, it is seen that the cost of fuel consumption also increases, as expected. When calculating the cost of enemy threats, integral-based operations are replaced with an approximation model in which the whole path is first divided by considering the subsequent points in the set P, and then each line segment is evaluated to understand whether it is in the effect ranges of enemy threats or not. Assume that  P i  and  P j  are two subsequent points, and the length of the path segment between these points is shown as  L i j . The path segment of length  L i j  is divided into ten subsegments and the first, third, fifth, seventh, and ninth subsegmentation points are named points  0.1 0.3 0.5 0.7 , and  0.9 . If the mentioned path segment is in the effect range of the kth enemy threat of grade  t k , the cost of the kth enemy threat on the path segment between  P i  and  P j  or  J t , ( i j ) , k  is determined with Equation (3) [59]. In Equation (3), while  d 0.1 , i , k 4 d 0.3 , i , k 4 , and  d 0.5 , i , k 4  show the Euclidean distances between the center of the kth enemy threat and  0.1 0.3 , and  0.5  subsegmentation points,  d 0.7 , i , k 4  and  d 0.9 , i , k 4  correspond to the Euclidean distances between the center of the kth enemy threat and  0.7  and  0.9  subsegmentation points. When the cost of all enemy threats are determined for each path segment and then summed, the value of  J t  can be obtained. As easily seen from the calculation details of  J t  and  J f  values, qualified paths have smaller J scores compared to other paths of the same battlefield [59].
J t , ( i j ) , k = L i j t k 5 ( 1 d 0.1 , i , k 4 + 1 d 0.3 , i , k 4 + 1 d 0.5 , i , k 4 + 1 d 0.7 , i , k 4 + 1 d 0.9 , i , k 4 )

3. Immune Plasma Algorithm

The new coronavirus, or COVID-19, first seen in Wuhan, China, at the beginning of 2019, caused a global health crisis that still affects people all over the world, and different medical methods and treatment approaches were developed in response. Immune or convalescent plasma treatment, used previously for the 1918 great influenza pandemic, also became a promising medical method for COVID-19. The idea behind this mentioned treatment approach that is over a hundred years old is transferring the blood and antibodies in the blood from an individual recovered recently to a critically ill patient. When the biologically strong idea lying behind the immune or convalescent plasma treatment is investigated from the viewpoint of a computer scientist, it is easily seen that there is an analogy with the transfer of blood from the selected donor to the critical patient and the exploitation of dominant operations of a meta-heuristic algorithm [53]. Aslan utilized the described analogy and introduced an IP algorithm (IPA for short) to the literature of artificial intelligence techniques [53]. When a problem that requires searching for optimal values for a set of decision parameters by considering the minimization or maximization of an objective function is attempted to be solved using IPA, a person or individual corresponds to a solution and the antibody amount or immune response of this individual is measured by using the objective function. If the IP algorithm decides that an individual in the population is a critical patient, or receiver, it selects another individual from the same population as a plasma donor, and treatment is started. Until the IPA completes a run because it reaches the maximum evaluation number or satisfies a similar termination criterion, the distribution of the infection between all members of the population, the selection of receiver and donor individuals, and the application of plasma treatment are carried out in a circular manner.

3.1. Generating Initial Members of the Population

The IP algorithm employs a randomized generation schema to determine initial values of its population members. Given that the problem being solved has D different parameters, the IP algorithm will start subsequent operations with a population of size  P S . When representing an individual or member of population, a D-dimensional vector is used. By assuming that  x k  is the kth member of the population and  x k j  is the jth element or parameter of the mentioned individual, Equation (4) given below is executed in the IP algorithm with the purpose of assigning the initial value of  x k j  [53]. In Equation (4),  x j m a x  and  x j m i n  are problem-dependent upper and lower bounds for the jth parameter.  r a n d ( 0 , 1 )  also corresponds to a random number generated between 0 and 1 [53].
x k j = x j m i n + r a n d ( 0 , 1 ) ( x j m a x x j m i n )

3.2. Distributing Infection within a Population

Each member or individual of the population in the IPA is matched with a possible solution to the considered problem. When the initialization of individuals is completed, the IPA starts to distribute infection using a relatively simple model, as described in Equation (5), where  x k j  and  x m j  are used to represent the randomly selected jth parameters of  x k  and  x m  individuals, respectively [53].  x k i n f  corresponds to the  x k  individual infected by the  x m , which is also chosen randomly from the population of size  P S x k j i n f  represents the jth parameter of  x k i n f  newly calculated with the transmission of infection. Because  x k i n f  indicates the infectious  x k  individual, all of its parameters, except the jth one, are the same as the parameters of  x k  individuals. Finally, in Equation (5),  r a n d ( 1 , 1 )  is matched with a random number generated between −1 and 1.
x k j i n f = x k j + r a n d ( 1 , 1 ) ( x k j x m j )
An infection triggers the immune system of the host, and a specific immune response in terms of the synthesized antibodies is given. To measure the level of a given response by an infectious individual, the IP algorithm directly utilizes the objective function of the problem [53]. When the IP algorithm tries to solve a minimization problem with the objective function f, the immune response or level of antibodies is determined as  f ( x k )  for the  x k  individual before the infection and  f ( x k i n f )  for the  x k  individual immediately after the infection. If  f ( x k )  is higher than  f ( x k i n f ) , it is decided that the  x k  individual and its immune system is strong enough to handle the infection and the immune memory of  x k  should be updated for subsequent infection cycles by changing  x k j  to  x k j i n f . Otherwise, the  x k  individual remains unchanged, as described in Equation (6) [53].
x k j = x k j i n f , i f   f ( x k i n f ) < f ( x k ) x k j , o t h e r w i s e

3.3. Treatment of Receivers with Donors

The IP algorithm continues the distribution of the infection until all population members meet with the infection. When all of the individuals meet with the infection, the IPA is ready to start its second main phase in which one or more individuals are treated by the support of one or more individuals chosen from the same population. In order to decide how individuals will be chosen as critical and labeled as receiver and how individuals will be chosen as recovered and labeled as donor, the IPA introduces two specific control parameters called  N o R  and  N o D  [53].  N o R  is the number of receivers, and the  N o R  individuals who are worse than the remaining members are selected as receivers. The  N o D  abbreviation is used on behalf of number of donors, and the  N o D  individuals who are better than the remaining members are selected as donors. Assume that  x k r c v  is the kth receiver from the set of receivers with the  N o R  individuals and  x m d n r  is the randomly selected donor from the set of donors with  N o D  individuals. To model the transfer of a single plasma dose, Equation (7) is used by the IP algorithm [53]. In Equation (7),  x k j r c v  and  x m j d n r  show the jth parameters of  x k r c v  and  x m d n r , and j is selected from the set  { 1 , 2 , , D }  sequentially. Moreover,  x k j r c v p  is matched with the jth parameter of  x k r c v p , and  x k r c v p  is used to represent the  x k r c v  after transferring a single dose of plasma. If  f ( x k r c v p )  is less than  f ( x m d n r )  for the first dose of plasma,  x k r c v  is updated with  x k r c v p  appropriately, and treatment is continued, with the second dose taken from the same donor [53]. Otherwise, it is decided that the treatment does not cause a dramatic improvement in the immune system of  x k r c v  and it should be completed. However, in order to guarantee that at least one dose of plasma is given,  x k r c v  is updated with  x m d n r , and treatment is concluded immediately after the first dose [53].
x k j r c v p = x k j r c v + r a n d ( 1 , 1 ) ( x k j r c v x m j d n r )
The second and other doses of plasma are transferred to  x k r c v  from  x m d n r  by referencing the model introduced in Equation (7). However, the IPA changes the decision mechanism for understanding whether the plasma treatment is continued with a third dose of plasma or not. If  f ( x k r c v p )  corresponding to the antibody level of  x k r c v  after the second dose of plasma is less than the antibody level of  x k r c v  after the first dose of plasma,  x k r c v  is updated by using  x k r c v p , and then the treatment of  x k r c v  is continued with a third dose of plasma from  x m d n r  [53]. Otherwise, treatment is concluded for  x k r c v , and the next receiver is selected, if they exist.

3.4. Modification of Donor Individuals

The antibody amount synthesized for a specific infection by the immune system of an individual recovered previously can decrease with time or incidence of encountering the infection. To model this type of change, the IP algorithm utilizes a random number generated between 0 and 1 and the ratio between  t c r  and  t m a x  [53]. Moreover,  t c r  is used to represent the current evaluation number, and it is increased by one for each evaluation.  t m a x  is used on behalf of the maximum evaluation number, and the IPA terminates when  t c r  becomes equal to  t m a x  [53]. If the ratio between  t c r  and  t m a x  is less than the generated random number,  x m d n r  is reinitialized by using Equation (4) to indicate that the immune memory of the mentioned donor individual is not strong enough to synthesize the required amount of antibodies quickly [53]. Otherwise,  x m d n r  donor individual is changed slightly, as described in Equation (8), where the j index ranges from 1 to D [53]. When the IP algorithm continues its run,  t c r / t m a x  reaches 1, and the probability of generating a random number between 0 and 1 less than  t c r / t m a x  increases intrinsically. As an expected result of this situation, the probability of using Equation (8) also increases, and the IPA tries to protect the immune memories of its donors. After executing the update procedure for all donors, the infection cycle of the IPA is completed and a new one is started.
x m j d n r = x m j d n r + r a n d ( 1 , 1 ) x m j d n r

4. Details of Extended Treatment Approach

The treatment schema modeled in the standard implementation of the IP algorithm guarantees that a poor solution corresponding to a receiver is replaced with a solution represented by the selected donor or a solution better than the solution represented by the selected donor when the plasma transfer is completed. If the first dose of plasma cannot provide a satisfactory contribution and the receiver for which the first dose of plasma is given does not match to a solution better than the solution represented by its donor, the treatment is simply ended after replacing the receiver with a copy of the selected donor. Even though the idea underlying the used treatment schema brings some advantages to the IP algorithm, the possibility of copying the same donor more than once should be taken into account. When the treatment of receivers is completed by copying the same donor more than once, the population can have difficulties in managing solution diversities. Moreover, in the subsequent infection cycle, the chance of selecting the previously utilized donor and its copies also increases, and the IP algorithm requires a subtle configuration for the  N o R  and  N o D  parameters in order to handle the possible drawbacks stemming from the existing workflow of the plasma treatment.
The performance of the IP algorithm can be further improved by remodeling how the plasma from the donor will be transferred to the receiver and when the treatment will be completed. The requirement of  N o R  or  N o D  parameters and setting them appropriately can be removed completely if the exploitation characteristics of the newly designed plasma transfer and treatment operations are configured subtly. Given that  x k r c v  is the kth receiver from the set of critical individuals of size  N o R  and  x d n r  is the best individual of the entire population, when transferring the plasma from the  x d n r  to the  x k r c v  individual, it is assumed that all of the parameters belonging to the  x d n r , except the randomly determined jth one, are copied into the  x k r c v  and then jth parameter of the  x k r c v  is calculated with the Equation (9) after plasma treatment is concluded. In Equation (9),  x k j r c v p  corresponds to the jth parameter of  x k r c v p  and  x k r c v p  is used on behalf of the  x k r c v  individual who receives a dose of plasma from the donor.
x k j r c v p = x j d n r + r a n d ( 1 , 1 ) ( x j d n r x k j r c v )
Standard implementation of the IP algorithm compares the antibody amount of  x k r c v  immediately after the first dose of plasma calculated as  f ( x k r c v p )  with the antibody amount of  x d n r  calculated as  f ( x d n r ) . For a minimization problem, if  f ( x k r c v p )  is not less than  f ( x d n r ) , in other words,  x k r c v p  is not better than  x d n r , and  x k r c v  is replaced with a copy of  x d n r  and treatment is ended. The replacement of  x k r c v  with a copy of  x d n r  ensures that  x k r c v  or a poor solution corresponding to  x k r c v  is discarded from the population and a more qualified solution represented by  x d n r  is added. However, it should be noticed that some difficulties about the population diversity and efficiency of the subsequent treatment operations can be encountered and solving performance of the IP algorithm can deteriorate. In order to handle the possible problems to do with the replacement procedure between  x k r c v  and  x d n r  individuals, an extended treatment approach that repeats the same plasma transfer operations as modeled by guiding Equation (9) until the  x k r c v p  becomes better than the  x d n r  is developed. By using the extended treatment approach, the IP algorithm empowers its exploitation characteristics because of the repetitive search in the neighborhood of the selected donor without requiring neither  N o D  parameter nor its sensitive configuration. Newly proposed treatment approach allows IP algorithm to guarantee that  x k r c v  will be replaced with a solution better than the solution represented by  x d n r . The IP algorithm that transfers plasma from the best individual in the population or  x d n r  to the  x k r c v  in the receiver set of size  N o R , as described by Equation (9), and continues plasma transfer until the receiver becomes better than its donor is called extended IPA for short ExtIPA. The details of treatment operations in ExtIPA can be controlled over the Algorithm 1.
Algorithm 1 Fundamental steps of extended treatment approach
 1:
x b e s t  get the best solution found so far
 2:
r c v I n d e x e s [ 1 N o R ]  get the indexes of the receivers
 3:
for    i 1 N o R   do
 4:
     x d n r  get the best individual in the population as donor
 5:
     k r c v I n d e x e s [ i ]  and determine  x k r c v  as the current receiver
 6:
    if  t c r < t m a x  then
 7:
         t c r t c r + 1
 8:
         x k r c v p  apply plasma treatment to  x k r c v  with  x d n r  using Equation (9)
 9:
        while  f ( x k r c v p ) > f ( x d n r )  do
10:
            if  t c r < t m a x  then
11:
                 t c r t c r + 1
12:
                 x k r c v p  apply plasma treatment to  x k r c v  with  x d n r  using Equation (9)
13:
            else
14:
                Terminate the run and send  x b e s t  as the final solution
15:
            end if
16:
        end while
17:
           Update  x k r c v  with  x k r c v p
18:
        if  f ( x b e s t ) > f ( x k r c v )  then
19:
            Update  x b e s t  with  x k r c v
20:
        end if
21:
    else
22:
        Terminate the run and send  x b e s t  as the final solution
23:
    end if
24:
end for

5. Experimental Studies

The qualities of the solutions calculated by a path planner can change with the properties of the considered battlefield in terms of the starting and target points, the number of enemy threats and their locations, sensing or shooting ranges, and grades. By taking into account this major requirement about the performance investigation, five challenging battlefields, detailed in Table 1, were used. For the first and second battlefields, the number of segmentation points and number of parameters, also abbreviated as D, were determined to be 30 and 50, while the number of segmentation points was determined to be 20 and 25 for the third battlefield and fourth battlefield, which were related with two test cases, one of which has 20 segmentation points determined optimally and the latter has 30 segmentation points. The  λ  constant was set to  0.5  with the purpose of equally weighting the cost of enemy threats and cost of fuel consumption on the J score calculation of a path [59]. In the experiments, the population size of ExtIPA was taken to be equal to 30, and five different constants, including 1, 2, 3, 4, and 5, were assigned to the  N o R  parameter. The experiments on the first and second battlefields were repeated 50 times by setting the maximum evaluation numbers to 30,000 and 60,000, respectively [59]. Similarly, the experiments on the third and fourth battlefields were repeated 50 times by setting the maximum evaluation number to 6000 [59]. At the end of each run or test of ExtIPA, the best path found and the value of its objective function were recorded and summarized in Table 2 as the mean best, best, and worst objective function values and standard deviations.
The test results given in Table 2 allow us to investigate the relationship between the qualities of the calculated path, the dimensionality of the test case, and the value of the  N o R  parameter. For six of the eight test cases, ExtIPA performs better by assigning 1 to the  N o R  parameter when compared to the same algorithm with the remaining  N o R  configurations. Moreover, in the 30-dimensional test cases belonging to the first and fourth battlefields, ExtIPA obtains more efficient paths with the  N o R  configured as 2. The treatment schema of ExtIPA continues to transfer the plasma from the best individual to the receiver until the antibody level of the receiver becomes higher than the antibody level of the donor. By executing this type of treatment schema, ExtIPA consumes more evaluations on the plasma transfer operations that are responsible for maintaining the exploitation characteristics of the algorithm when ExtIPA completes the treatment of the receiver or a receivers is not determined in advance. If ExtIPA spends more evaluations on the treatment of the receiver or receivers, exploration-dominant operations related to the phase of infection distribution and the phase of the donor update cannot be sufficiently executed, and some difficulties can arise about escaping from the local optimum solution or solutions. When the  N o R  parameter of ExtIPA is configured inappropriately for the existing population size, the qualities of the final solutions can deteriorate for some of the repetitive runs.
The population size of ExtIPA can change the performance of the algorithm like in other meta-heuristics. In order to analyze how the performance of ExtIPA varies with the different values of the  P S  parameter, 20, 40, 50, 75, and 100 constants were used. The  N o R  parameter of ExtIPA was set to 1 in the experiments. While 50 independent runs were carried out for the first and second battlefield scenarios after setting the maximum number of evaluations to 30,000 and 60,000, 50 independent runs were carried out for the third and fourth battlefield scenarios after setting the maximum evaluation number to 6000. The mean best, best, and worst objective function values and standard deviations given in Table 3 for various  P S  values of ExtIPA showed that the population size should be equal to or less than 40 if the dimensionality of the test cases and termination criteria are determined as detailed above. When the properties of the first four battlefields are visually inspected in Figure 2, Figure 3, Figure 4 and Figure 5, it is clearly seen that the test cases belonging to the second and third battlefields require paths containing more challenging maneuvers. When starting ExtIPA with a population in which there are some individuals partially satisfying the needed maneuvers, a relatively high population size should be chosen to increase the probability of producing the mentioned individuals or solutions. Because of this main reason, while ExtIPA with  P S  equal to 30 or 40 finds more robust paths for the majority of the test cases related to the second and third battlefield scenarios, it should start the work with  P S  equal to 20 or 30 for the test cases of the first and fourth battlefield scenarios.
The test cases used to evaluate the path-planning performance of ExtIPA contain at least 20 segmentation points and at most 30 segmentation points. However, the complexity of the path-planning problem can change unexpectedly with the number of segmentation points. Even though a relatively small number of segmentation points is chosen, some of the lines in the set L can intersect with the circles representing the enemy threats, and thus, selecting a point that is outside the circle or circles and on the related line becomes more difficult. Different experiments should therefore be carried out by assigning values less than 20 and more than 30 to the number of segmentation points. For this purpose, the fifth battlefield scenario containing eight cases with 5, 10, 15, 20, 25, 30, 35, and 40 segmentation points was tested. In the experiments, while the value of the  P S  parameter of ExtIPA was set to 20, 30, 40, 50, 75, and 100, the  N o R  parameter was taken as equal to 1. Each test case generated by combining the D and  P S  parameters was solved 100 times by ExtIPA after setting the maximum number of evaluations to 6000 [59]. The best solution found by ExtIPA at the end of each run was recorded and then summarized in Table 4 with the mean best, best, and worst objective function values and the calculated standard deviations. When the results given in Table 4 are investigated, it is clearly seen that ExtIPA performs better if the  P S  parameter is equal to 20 or 30 for the test case of fifth battlefield. Another important conclusion that can be extracted from the results of ExtIPA for the fifth battlefield scenario is about its relatively stable performance. As stated earlier, the values being assigned to the number of segmentation points can trigger unpredictable changes in the characteristics of the path-planning problem, and an algorithm should preserve its performance for different configurations of the same battlefield. While the number of segmentation points for the fifth battlefield scenario is increased eight times from the first to the last case, the difference between the mean best objective function values is found to only be  2.459  for the ExtIPA with 20 individuals. The best and worst paths found by ExtIPA for the fifth scenario can be seen in Figure 6.
In order to determine whether the paths planned by ExtIPA are promising or not, they should be compared with the paths found by other meta-heuristic-based path planners. For this purpose, ExtIPA was compared with the IP, ABC, I-ABC, IF-ABC, and BE-ABC algorithms for the test cases of the first and second battlefields [25,59]. To guarantee that all of the compared algorithms obtain their solutions under equal conditions, the population size and maximum evaluation number were fixed to 30 and 30,000 when solving test cases about the first battlefield scenario [25,59]. Similarly, the population size and maximum evaluation number were fixed to 30 and 60,000 when solving test cases in the second battlefield scenario [25,59]. From the test results summarized in Table 5 after completing 50 independent runs for each algorithm, it is seen that ExtIPA has a promising performance against other competitors. While ExtIPA outperforms IPA, ABC, I-ABC, IF-ABC and BE-ABC and its rank is determined as first for the test cases in the first battlefield scenario, it lags slightly behind the IPA for the 30-dimensional case in the second battlefield, and its rank becomes second. ExtIPA lags slightly behind the BE-ABC for the 50-dimensional case in the second battlefield and its rank is found to be second. Even though the positive contribution of the extended treatment approach on the exploitation characteristics becomes more apparent in the first battlefield, some special requirements of the second battlefield concerning its exploitation limit the efficiency of the proposed method. However, it should be noticed that ExtIPA still maintains its promising performance and provides better solutions than four of its five competitors.
A path planned in the third battlefield requires challenging maneuvers similar to a safe and efficient path of the second battlefield, and a meta-heuristic-based planner should manage exploration-dominant operations more carefully. To determine whether the changes made in the workflow with the extended treatment approach allow ExtIPA to calculate more qualified paths or not, a comparison between the performances of ExtIPA, IPA, DE, PSO, BA, WDO, QPSO, QBA, and QWDO for the third battlefield was conducted. The population size of the algorithms was equal to 30 and the maximum evaluation number was set to 6000 to emphasize that they are executed under the same conditions [27,59]. When the results obtained after 50 independent runs and presented in Table 6 are investigated, it is seen that ExtIPA has some problems maintaining a comparative performance, especially for the 25-dimensional case in the third battlefield scenario. The initial population diversity and exploration-dominant operations of ExtIPA are generally found to be sufficient to calculate better paths compared to IPA, DE, PSO, BA, WDO, QPSO, QBA, and QWDO. However, for the 25-dimensional test case in the third battlefield scenario, because of the huge volume of the maximum evaluation number consumed by the operations related to the extended treatment approach, new solutions are not sufficiently explored, and the performance of ExtIPA deteriorates.
The comparative studies between ExtIPA and other meta-heuristic-based planners, including IPA, PSO, ABC, DE, CIJADE, JADE, and CIPDE, were continued in the fourth battlefield scenario. In these comparisons, the colony size of ABC and the population size of IPA and ExtIPA were set to 30, and the population size of PSO, DE, CIJADE, JADE, and CIPDE were set equal to 60, roughly equalizing the total number of evaluations per cycle or iteration [37]. While ABC, IPA, and ExtIPA were tested 50 times with random seeds by fixing the maximum evaluation number to 6000, PSO, DE, CIJADE, JADE, and CIPDE were tested 20 times by fixing the maximum evaluation number to 6000 [37]. The mean best, best, and worst objective function values and standard deviations calculated after completing the tests are recorded and summarized in Table 7. As seen from the results given in Table 7, ExtIPA produces more robust and efficient paths compared to the other tested algorithms. The promising performance of the ExtIPA can already be seen for the 30- and 50-dimensional cases in the first and second battlefields, and 20-dimensional case in the third battlefield was also validated for the 20- and 30-dimensional cases in the fourth battlefield. A detailed search within the vicinity of a qualified solution, as is performed in the extended treatment, helps the algorithm to subtly calibrate the selected points from the lines and thus plan more satisfactory UCAV paths. Because of the presence of enemy threats and their locations, effect ranges, and grades in the fourth battlefield decrease the probability of generating eligible paths using dense exploration-based operations, ExtIPA gets a chance to show its robust and stable convergence performance more apparently in the mean best objective function values and standard deviations.
The performance validation of ExtIPA was concluded after a comparison with other meta-heuristic algorithms, including IPA, ABC, BA, ACO, BBO, DE, ES, FA, GA, PBIL, and PSO and some of their variants, such as BAM, MFA, SGA, and PGSO, in the fifth battlefield scenario. The path planners used for the test cases of the fifth battlefield were run 100 times by setting the population size to 30 and the maximum evaluation number to 6000 [21,57]. The mean best, best, and worst objective function values and related standard deviations of them calculated after 100 independent runs are given in Table 8. One of the important results extracted from this table is the superiority of the ExtIPA over all of fifteen competitors for the 5-, 10-, 15-, and 20-dimensional cases in the existing battlefield scenario. On the other hand, when the remaining test cases in the fifth battlefield are considered, it is seen that ExtIPA lags behind both BAM and MFA and becomes the third best path planner. As stated previously, the number of segmentation points can completely change the properties of the optimal path being planned for a UAV or UCAV, even if the same battlefield is considered. Each extra segmentation point can cause problems related to the escaping enemy threats and increasing total flight length, and handling these special requirements for all test cases of a battlefield, such as the fifth battlefield, can be challenging. Because of this situation, while ExtIPA dominates other algorithms for some test cases and is ranked as the best planner among them, other problem instances become more suitable to the search characteristics of the BAM and MFA path planners for the 25-, 30-, 35-, and 40-dimensional cases in the fifth battlefield. However, it should be still considered that ExtIPA is able to preserve its path-planning capability compared to BAM and MFA when all eight cases are evaluated together, and its average and overall ranks and smaller standard deviations prove the strong and stable performance of the algorithm.
The paths and their objective function values found by different path planners are relatively close to each other for most cases of the fifth battlefield scenario. Even though the average and overall ranks provide information which algorithm is capable of dominating other competitors, an appropriate test should also be employed for investigating whether the superiority of the considered algorithm can be validated statistically or not. Wilcoxon signed rank test is one of the most commonly used tests for deciding there is a statistical difference in favor of one of the compared techniques. If the significance level abbreviated as  ρ  with Wilcoxon signed rank test is less than a constant that is usually determined as  0.05 , it is said that one of the algorithm is statistically better than another [60]. In order to understand that ExtIPA is statistically better than other path planners for the fifth battlefield scenario or not, Wilcoxon signed rank test with the significance level  0.05  was executed by considering the mean best, best and worst objective function values and its results were presented in Table 9, Table 10 and Table 11. In these tables, Z value shows the test statistics. While the  W +  abbreviation represents the sum of ranks for which ExtIPA is worse than other planner, the  W  abbreviation represents the sum of ranks for which ExtIPA is better than other planner. From the test results given in Table 9, Table 10 and Table 11, it is seen that while the performance of ExtIPA is statistically better than the IPA, ABC, BA, ACO, BBO, DE, ES, FA, GA, PBIL, PSO, SGA and PGSO with  ρ  values less than 0.05, the significance is not in favor of ExtIPA for the comparison between ExtIPA and BAM or MFA.
The extended treatment approach can accelerate the convergence speed. Because the treatment of a receiver is continued until the antibody level of the receiver becomes higher than the antibody level of its donor, the extended treatment can boost the convergence to the global optimum. However, it should be noticed that if the treatment takes longer, different stagnation periods can be seen on the convergence curves. To evaluate the convergence performances of the algorithms, the success rate ( S r ) and mean evaluations ( M e ) are two commonly used metrics [60]. If an algorithm obtains a solution whose objective function value is better than the previously determined threshold, it is assumed that the algorithm is successful for the considered run and the percentage of the number of successful runs to the total number of runs corresponds to the  S r . When a run is labeled as successful, the minimum number of evaluations required to find a solution with an objective function value better than threshold is recorded. The average of the recorded values is also matched with the  M e  metric. From the  S r  and  M e  metrics calculated by setting the threshold as 55, as given in Table 12 for the fifth battlefield, it is understood that the convergence performance of ExtIPA is more robust than the convergence performances of both the IPA- and ABC-based planners. For the first four test cases related to the considered battlefield scenario, ExtIPA, IPA, and ABC are capable of obtaining better solutions with objective function values less than the threshold in each of the 100 independent runs. However, it should be noticed that ExtIPA requires at least two times fewer evaluations compared to IPA and ABC for the 5-, 10-, 15-, and 20-dimensional test cases. When the dimensionality of the test cases is increased starting from 25 to 40, while ExtIPA and IPA still preserve their convergence characteristics, ABC has some difficulties reaching the given threshold, and no successful run is detected for the cases with 35 and 40 segmentation points.

6. Conclusions

Recent years have witnessed dramatic paradigm and strategic changes in the military and commercial operations carried out by UAVs and their customized variants carrying complex optical, targeting, and weapon systems called UCAVs. To improve the success of a task being employed with one of these advanced aerial vehicles, a flight path should be carefully determined by taking into account some challenging optimization objectives that must be satisfied about the enemy air defense systems, fuel or battery usage, or total cruise length. The immune plasma algorithm (IP algorithm or IPA) is one of the most recent nature-inspired computational intelligence techniques, and its promising performance has been validated on different numerical benchmarks and engineering problems. In this study, the plasma transfer schema of the IPA was completely changed with a newly introduced extended treatment approach, and the extended IP algorithm (ExtIPA) was proposed as a UAV or UCAV path planner. To investigate the path-planning capabilities of ExtIPA, five different battlefield scenarios and various algorithm-specific parameter configurations were used.
The paths found by the ExtIPA were also compared with the paths found by well-known meta-heuristic algorithms such as ABC, BA, ACO, BBO, DE, ES, FA, GA, PSO, PBIL, and WDO and some of their improved versions, such as BAM, MFA, SGA, PGSO, I-ABC, IF-ABC, BE-ABC, QPSO, QBA, QWDO, CIJADE, JADE, and CIPDE. Comparative studies between ExtIPA and other path planners showed that the extended treatment approach contributes to the efficiency of plasma transfer operations by ensuring the treatment will be continued until a poor solution, represented by a receiver individual becoming better than its donor, and ExtIPA outperforms the other algorithms in most of the test cases. Moreover, ExtIPA removed the necessity of using the  N o D  parameter and resolved some difficulties around guessing the interaction between  N o D  and  N o R  and then assigning appropriate values to them to obtain better solutions. In the future, ExtIPA can be further improved by integrating a mechanism that adjusts the  N o R  parameter adaptively. The IP algorithm with multiple populations each executing a unique treatment procedure can be designed and used to solve UAV or UCAV path-planning problems made difficult by the existence of dynamic obstacles, enemy threats, and real-time calculations.

Author Contributions

Conceptualization, S.A. and T.O.; methodology, S.A.; software, S.A.; validation, S.A. and T.O.; formal analysis, S.A.; investigation, S.A.; resources, S.A.; data curation, S.A.; writing—original draft preparation, S.A.; writing—review and editing, S.A. and T.O.; visualization, S.A.; supervision, S.A.; project administration, S.A.; funding acquisition, T.O. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data sharing not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Tisdale, J.; Kim, Z.; Hedrick, J.K. Autonomous UAV path planning and estimation. IEEE Robot. Autom. Mag. 2009, 16, 35–42. [Google Scholar] [CrossRef]
  2. Hermand, E.; Nguyen, T.W.; Hosseinzadeh, M.; Garone, E. Constrained control of UAVs in geofencing applications. In Proceedings of the 2018 26th Mediterranean Conference on Control and Automation (MED), Zadar, Croatia, 19–22 June 2018; pp. 217–222. [Google Scholar] [CrossRef]
  3. Chen, J.; Zhang, R.; Zhao, H.; Li, J.; He, J. Path planning of multiple unmanned aerial vehicles covering multiple regions based on minimum consumption ratio. Aerospace 2023, 10, 93. [Google Scholar] [CrossRef]
  4. Song, J.; Zhao, K.; Liu, Y. Survey on mission planning of multiple unmanned aerial vehicles. Aerospace 2023, 10, 208. [Google Scholar] [CrossRef]
  5. Ait Saadi, A.; Soukane, A.; Meraihi, Y.; Benmessaoud Gabis, A.; Mirjalili, S.; Ramdane-Cherif, A. UAV path planning using optimization approaches: A survey. Arch. Comput. Methods Eng. 2022, 29, 4233–4284. [Google Scholar] [CrossRef]
  6. Bal, M. An overview of path planning technologies for unmanned aerial vehicles. Therm. Sci. 2022, 26, 2865–2876. [Google Scholar] [CrossRef]
  7. Wu, Y. A survey on population-based meta-heuristic algorithms for motion planning of aircraft. Swarm Evol. Comput. 2021, 62, 100844. [Google Scholar] [CrossRef]
  8. Majeed, A.; Hwang, S.O. A multi-objective coverage path planning algorithm for UAVs to cover spatially distributed regions in urban environments. Aerospace 2021, 8, 343. [Google Scholar] [CrossRef]
  9. Saeed, R.A.; Omri, M.; Abdel-Khalek, S.; Ali, E.S.; Alotaibi, M.F. Optimal path planning for drones based on swarm intelligence algorithm. Neural Comput. Appl. 2022, 34, 10133–10155. [Google Scholar] [CrossRef]
  10. Xu, C.; Duan, H.; Liu, F. Chaotic artificial bee colony approach to Uninhabited Combat Air Vehicle (UCAV) path planning. Aerosp. Sci. Technol. 2010, 14, 535–541. [Google Scholar] [CrossRef]
  11. Zhang, Y.; Wu, L.; Wang, S. UCAV path planning based on FSCABC. Inf.-Int. Interdiscip. J. 2011, 14, 687–692. [Google Scholar]
  12. Zhang, Y.; Wu, L.; Wang, S. UCAV path planning by fitness-scaling adaptive chaotic particle swarm optimization. Math. Probl. Eng. 2013, 2013. [Google Scholar] [CrossRef]
  13. Li, P.; Duan, H. Path planning of unmanned aerial vehicle based on improved gravitational search algorithm. Sci. China Technol. Sci. 2012, 55, 2712–2719. [Google Scholar] [CrossRef]
  14. Fu, Z.F. Path planning of UCAV based on a modified GeesePSO algorithm. In Proceedings of the International Conference on Intelligent Computing, Huangshan, China, 25–29 July 2012; pp. 471–478. [Google Scholar] [CrossRef]
  15. Wang, G.G.; Guo, L.; Duan, H.; Liu, L.; Wang, H. A modified firefly algorithm for UCAV path planning. Int. J. Hybrid Inf. Technol. 2012, 5, 123–144. [Google Scholar]
  16. Wang, G.G.; Guo, L.; Duan, H.; Wang, H.; Liu, L.; Shao, M. A hybrid metaheuristic DE/CS algorithm for UCAV three-dimension path planning. Sci. World J. 2012, 2012, 583973. [Google Scholar] [CrossRef] [PubMed]
  17. Wang, G.G.; Guo, L.; Duan, H.; Liu, L.; Wang, H. A bat algorithm with mutation for UCAV path planning. Sci. World J. 2012, 2012, 418946. [Google Scholar] [CrossRef]
  18. Wang, G.G.; Chu, H.E.; Mirjalili, S. Three-dimensional path planning for UCAV using an improved bat algorithm. Aerosp. Sci. Technol. 2016, 49, 231–238. [Google Scholar] [CrossRef]
  19. Zhu, W.; Duan, H. Chaotic predator–prey biogeography-based optimization approach for UCAV path planning. Aerosp. Sci. Technol. 2014, 32, 153–161. [Google Scholar] [CrossRef]
  20. Heidari, A.; Abbaspour, R. Improved black hole algorithm for efficient low observable UCAV path planning in constrained aerospace. Adv. Comput. Sci. Int. J. 2014, 3, 87–92. [Google Scholar]
  21. Tang, Z.; Zhou, Y. A glowworm swarm optimization algorithm for uninhabited combat air vehicle path planning. J. Intell. Syst. 2015, 24, 69–83. [Google Scholar] [CrossRef]
  22. Yu, G.; Song, H.; Gao, J. Unmanned aerial vehicle path planning based on TLBO algorithm. Int. J. Smart Sens. Intell. Syst. 2014, 7, 1310–1325. [Google Scholar] [CrossRef]
  23. Zhang, X.; Duan, H. An improved constrained differential evolution algorithm for unmanned aerial vehicle global route planning. Appl. Soft Comput. 2015, 26, 270–284. [Google Scholar] [CrossRef]
  24. Zhou, Q.; Zhou, Y.; Chen, X. A wolf colony search algorithm based on the complex method for uninhabited combat air vehicle path planning. Int. J. Hybrid Inf. Technol. 2014, 7, 183–200. [Google Scholar] [CrossRef]
  25. Li, B.; Gong, L.G.; Yang, W.L. An improved artificial bee colony algorithm based on balance-evolution strategy for unmanned combat aerial vehicle path planning. Sci. World J. 2014, 2014, 232704. [Google Scholar] [CrossRef] [PubMed]
  26. Zhang, B.; Duan, H. Three-dimensional path planning for uninhabited combat aerial vehicle based on predator-prey pigeon-inspired optimization in dynamic environment. IEEE/ACM Trans. Comput. Biol. Bioinform. 2015, 14, 97–107. [Google Scholar] [CrossRef]
  27. Zhou, Y.; Bao, Z.; Wang, R.; Qiao, S.; Zhou, Y. Quantum wind driven optimization for unmanned combat air vehicle path planning. Appl. Sci. 2015, 5, 1457–1483. [Google Scholar] [CrossRef]
  28. Zhang, S.; Zhou, Y.; Li, Z.; Pan, W. Grey wolf optimizer for unmanned combat aerial vehicle path planning. Adv. Eng. Softw. 2016, 99, 121–136. [Google Scholar] [CrossRef]
  29. Luo, Q.; Li, L.; Zhou, Y. A quantum encoding bat algorithm for uninhabited combat aerial vehicle path planning. Int. J. Innov. Comput. Appl. 2017, 8, 182–193. [Google Scholar] [CrossRef]
  30. Zhang, Q.; Wang, R.; Yang, J.; Ding, K.; Li, Y.; Hu, J. Modified collective decision optimization algorithm with application in trajectory planning of UAV. Appl. Intell. 2018, 48, 2328–2354. [Google Scholar] [CrossRef]
  31. Alihodzic, A.; Tuba, E.; Capor-Hrosik, R.; Dolicanin, E.; Tuba, M. Unmanned aerial vehicle path planning problem by adjusted elephant herding optimization. In Proceedings of the 2017 25th Telecommunication Forum (Telfor), Belgrade, Serbia, 21–22 November 2017; pp. 1–4. [Google Scholar] [CrossRef]
  32. Alihodzic, A.; Hasic, D.; Selmanovic, E. An effective guided fireworks algorithm for solving UCAV path planning problem. In Proceedings of the International Conference on Numerical Methods and Applications, Borovets, Bulgaria, 20–24 August 2018; pp. 29–38. [Google Scholar] [CrossRef]
  33. Miao, F.; Zhou, Y.; Luo, Q. A modified symbiotic organisms search algorithm for unmanned combat aerial vehicle route planning problem. J. Oper. Res. Soc. 2019, 70, 21–52. [Google Scholar] [CrossRef]
  34. Dolicanin, E.; Fetahovic, I.; Tuba, E.; Capor-Hrosik, R.; Tuba, M. Unmanned combat aerial vehicle path planning by brain storm optimization algorithm. Stud. Inform. Control 2018, 27, 15–24. [Google Scholar] [CrossRef]
  35. Pan, J.S.; Liu, J.L.; Hsiung, S.C. Chaotic cuckoo search algorithm for solving unmanned combat aerial vehicle path planning problems. In Proceedings of the 2019 11th International Conference on Machine Learning and Computing, Zhuhai, China, 22–24 February 2019; pp. 224–230. [Google Scholar] [CrossRef]
  36. Pan, J.S.; Liu, J.L.; Liu, E.J. Improved whale optimization algorithm and its application to UCAV path planning problem. In Proceedings of the International Conference on Genetic and Evolutionary Computing, Qingdao, China, 1–3 November 2019; pp. 37–47. [Google Scholar] [CrossRef]
  37. Pan, J.S.; Liu, N.; Chu, S.C. A hybrid differential evolution algorithm and its application in unmanned combat aerial vehicle path planning. IEEE Access 2020, 8, 17691–17712. [Google Scholar] [CrossRef]
  38. Lin, N.; Tang, J.; Li, X.; Zhao, L. A novel improved bat algorithm in UAV path planning. J. Comput. Mater. Contin. 2019, 61, 323–344. [Google Scholar] [CrossRef]
  39. Qu, C.; Gai, W.; Zhong, M.; Zhang, J. A novel reinforcement learning based grey wolf optimizer algorithm for unmanned aerial vehicles (UAVs) path planning. Appl. Soft Comput. 2020, 89, 106099. [Google Scholar] [CrossRef]
  40. Qu, C.; Gai, W.; Zhang, J.; Zhong, M. A novel hybrid grey wolf optimizer algorithm for unmanned aerial vehicle (UAV) path planning. Knowl.-Based Syst. 2020, 194, 105530. [Google Scholar] [CrossRef]
  41. Yi, J.H.; Lu, M.; Zhao, X.J. Quantum inspired monarch butterfly optimisation for UCAV path planning navigation problem. Int. J.-Bio-Inspired Comput. 2020, 15, 75–89. [Google Scholar] [CrossRef]
  42. Wu, C.; Huang, X.; Luo, Y.; Leng, S. An improved fast convergent artificial bee colony algorithm for unmanned aerial vehicle path planning in battlefield environment. In Proceedings of the 2020 IEEE 16th International Conference on Control & Automation (ICCA), Sapporo, Japan, 6–9 July 2020; pp. 360–365. [Google Scholar] [CrossRef]
  43. Chen, Y.; Pi, D.; Xu, Y. Neighborhood global learning based flower pollination algorithm and its application to unmanned aerial vehicle path planning. Expert Syst. Appl. 2021, 170, 114505. [Google Scholar] [CrossRef]
  44. Zhu, H.; Wang, Y.; Ma, Z.; Li, X. A comparative study of swarm intelligence algorithms for ucav path-planning problems. Mathematics 2021, 9, 171. [Google Scholar] [CrossRef]
  45. Zhu, H.; Wang, Y.; Li, X. UCAV path planning for avoiding obstacles using cooperative co-evolution spider monkey optimization. Knowl.-Based Syst. 2022, 246, 108713. [Google Scholar] [CrossRef]
  46. Zhou, X.; Gao, F.; Fang, X.; Lan, Z. Improved bat algorithm for UAV path planning in three-dimensional space. IEEE Access 2021, 9, 20100–20116. [Google Scholar] [CrossRef]
  47. Wu, P.; Li, T.; Song, G. UCAV path planning based on improved chaotic particle swarm optimization. In Proceedings of the 2020 Chinese Automation Congress (CAC), Shanghai, China, 6–8 November 2020; pp. 1069–1073. [Google Scholar] [CrossRef]
  48. Xu, H.; Jiang, S.; Zhang, A. Path planning for unmanned aerial vehicle using amix-strategy-based gravitational search algorithm. IEEE Access 2021, 9, 57033–57045. [Google Scholar] [CrossRef]
  49. Jiang, W.; Lyu, Y.; Li, Y.; Guo, Y.; Zhang, W. UAV path planning and collision avoidance in 3D environments based on POMPD and improved grey wolf optimizer. Aerosp. Sci. Technol. 2022, 121, 107314. [Google Scholar] [CrossRef]
  50. Wang, X.; Pan, J.S.; Yang, Q.; Kong, L.; Snášel, V.; Chu, S.C. Modified mayfly algorithm for UAV path planning. Drones 2022, 6, 134. [Google Scholar] [CrossRef]
  51. Niu, Y.; Yan, X.; Wang, Y.; Niu, Y. An adaptive neighborhood-based search enhanced artificial ecosystem optimizer for UCAV path planning. Expert Syst. Appl. 2022, 208, 118047. [Google Scholar] [CrossRef]
  52. Jia, Y.; Qu, L.; Li, X. A double-layer coding model with a rotation-based particle swarm algorithm for unmanned combat aerial vehicle path planning. Eng. Appl. Artif. Intell. 2022, 116, 105410. [Google Scholar] [CrossRef]
  53. Aslan, S.; Demirci, S. Immune plasma algorithm: A novel meta-heuristic for optimization problems. IEEE Access 2020, 8, 220227–220245. [Google Scholar] [CrossRef]
  54. Kisa, M.; Demirci, S.; Arslan, S.; Aslan, S. Solving channel assignment problem in cognitive radio networks with immune plasma algorithm. In Proceedings of the 2021 6th International Conference on Computer Science and Engineering (UBMK), Ankara, Turkey, 15–17 September 2021; pp. 818–822. [Google Scholar] [CrossRef]
  55. Arslan, S. Solving the problem of time series prediction using immune plasma programming. Avrupa Bilim Teknol. Derg. 2022, 219–224. [Google Scholar] [CrossRef]
  56. Tasdemir, A.; Demirci, S.; Aslan, S. Performance investigation of immune plasma algorithm on solving wireless sensor deployment problem. In Proceedings of the 2022 9th International Conference on Electrical and Electronics Engineering (ICEEE), Alanya, Turkey, 29–31 March 2022; pp. 296–300. [Google Scholar] [CrossRef]
  57. Aslan, S.; Demirci, S. An improved immune plasma algorithm with a regional pandemic restriction. Signal Image Video Process. 2022, 16, 2093–2101. [Google Scholar] [CrossRef]
  58. Ajay, V.; Nesasudha, M. Detection of attackers in cognitive radio network using optimized neural networks. Intell. Autom. Soft Comput. 2022, 34, 193–204. [Google Scholar] [CrossRef]
  59. Aslan, S.; Erkin, T. An immune plasma algorithm based approach for UCAV path planning. J. King Saud-Univ.-Comput. Inf. Sci. 2023, 35, 56–69. [Google Scholar] [CrossRef]
  60. Aslan, S.; Karaboga, D.; Badem, H. A new artificial bee colony algorithm employing intelligent forager forwarding strategies. Appl. Soft Comput. 2020, 96, 106656. [Google Scholar] [CrossRef]
Figure 1. Initial (a) and transformed (b) coordinate systems, calculated paths (c), and their counterparts for the initial coordinate system (d).
Figure 1. Initial (a) and transformed (b) coordinate systems, calculated paths (c), and their counterparts for the initial coordinate system (d).
Aerospace 10 00487 g001
Figure 2. The best and worst paths of ExtIPA with  P S  equal to 30 for 30-dimensional (a) and 50-dimensional (b) cases of the first scenario and with  P S  equal to 100 for 30-dimensional (c) and 50-dimensional (d) cases of the first scenario.
Figure 2. The best and worst paths of ExtIPA with  P S  equal to 30 for 30-dimensional (a) and 50-dimensional (b) cases of the first scenario and with  P S  equal to 100 for 30-dimensional (c) and 50-dimensional (d) cases of the first scenario.
Aerospace 10 00487 g002
Figure 3. The best and worst paths of ExtIPA with  P S  equal to 30 for 30-dimensional (a) and 50-dimensional (b) cases of the second scenario and with  P S  equal to 100 for 30-dimensional (c) and 50-dimensional (d) cases of the second scenario.
Figure 3. The best and worst paths of ExtIPA with  P S  equal to 30 for 30-dimensional (a) and 50-dimensional (b) cases of the second scenario and with  P S  equal to 100 for 30-dimensional (c) and 50-dimensional (d) cases of the second scenario.
Aerospace 10 00487 g003
Figure 4. The best and worst paths of ExtIPA with  P S  equal to 30 for 20-dimensional (a) and 25-dimensional (b) cases of the third scenario and with  P S  equal to 100 for 20-dimensional (c) and 25-dimensional (d) cases of the third scenario.
Figure 4. The best and worst paths of ExtIPA with  P S  equal to 30 for 20-dimensional (a) and 25-dimensional (b) cases of the third scenario and with  P S  equal to 100 for 20-dimensional (c) and 25-dimensional (d) cases of the third scenario.
Aerospace 10 00487 g004
Figure 5. The best and worst paths of ExtIPA with  P S  equal to 30 for 20-dimensional (a) and 30-dimensional (b) cases of the fourth scenario and with  P S  equal to 100 for 20-dimensional (c) and 30-dimensional (d) cases of the fourth scenario.
Figure 5. The best and worst paths of ExtIPA with  P S  equal to 30 for 20-dimensional (a) and 30-dimensional (b) cases of the fourth scenario and with  P S  equal to 100 for 20-dimensional (c) and 30-dimensional (d) cases of the fourth scenario.
Aerospace 10 00487 g005
Figure 6. The best and worst paths of ExtIPA with  P S  equal to 30 for 25-dimensional (a) and 40-dimensional (b) cases of the fifth scenario and with  P S  equal to 100 for 25-dimensional (c) and 40-dimensional (d) cases of the fifth scenario.
Figure 6. The best and worst paths of ExtIPA with  P S  equal to 30 for 25-dimensional (a) and 40-dimensional (b) cases of the fifth scenario and with  P S  equal to 100 for 25-dimensional (c) and 40-dimensional (d) cases of the fifth scenario.
Aerospace 10 00487 g006
Table 1. Properties of the battlefields in the experiments.
Table 1. Properties of the battlefields in the experiments.
Sc.Threat CentersThreat RadiusThreat GradeStart-Target Point
1(52, 52), (32, 40), (12, 48), (36, 26),
(80, 60), (63, 56), (50, 42), (30, 70)
10, 10, 8, 12,
9, 7, 10, 10
2, 10, 1, 2,
3, 5, 2, 4
(11, 11)–(75, 75)
2(0, 200), (200, 0), (50, 50), (95, 95),
(150, 150), (95, 50), (50, 95), (140, 105), (105, 140)
90, 90, 20, 20,
20, 20, 20, 20, 20
7, 7, 5, 5
5, 6, 5, 6, 5
(0, 0)–(200, 200)
3(59, 52), (55, 80), (27, 58), (24, 33),
(12, 48), (70, 65), (70, 34), (70, 30)
10, 9, 9, 9,
12, 7, 12, 10
9, 7, 3, 12,
1, 5, 13, 2
(10, 15)–(80, 75)
4(10, 50), (20, 20), (30, 42), (30, 80), (50, 55),
(60, 10), (60, 80), (65, 38), (75, 65), (90, 80)
10, 9, 8, 10, 10,
10, 10, 12, 8, 10
8, 6, 5, 4, 7,
6, 7, 6, 8, 10
(0, 0)–(80, 100)
5(45, 50), (12, 40), (32, 68), (36, 26), (58, 80)10, 10, 8, 12, 92, 10, 1, 2, 3(10, 10)–(55, 100)
Table 2. Results of ExtIPA for the first four battlefields.
Table 2. Results of ExtIPA for the first four battlefields.
Sc.D   NoR
12345
130Mean48.59548.59348.71648.94249.676
Best48.15848.14448.16048.20048.368
Worst49.77150.24550.56251.69753.322
Std.0.4500.6060.7020.7951.285
50Mean51.16752.05753.19855.56259.367
Best48.60048.69448.82949.87551.629
Worst54.26057.96961.22862.90966.841
Std.1.7832.5343.0693.9084.407
230Mean152.053153.018152.951153.266153.515
Best149.743149.734149.730149.750150.047
Worst153.706155.659155.673155.820155.624
Std.1.3471.6591.6661.8441.486
50Mean153.816156.198156.791157.848159.582
Best149.273151.898149.288152.155153.410
Worst157.542159.238160.430162.613164.025
Std.2.1882.3002.6602.8402.780
320Mean47.96952.35849.96955.18749.727
Best47.81247.82947.95648.08447.970
Worst48.37358.26063.69963.72358.526
Std.0.1314.6284.6086.6162.529
25Mean50.09857.07350.58953.72056.734
Best48.01947.94648.00948.41148.983
Worst63.77468.04767.83962.63769.766
Std.4.0797.4504.4785.1907.432
420Mean66.39766.57066.59666.66467.480
Best66.36366.34566.37066.33566.942
Worst66.59466.99366.93767.31568.466
Std.0.0740.1720.1670.2650.413
30Mean68.17067.61768.16270.64972.665
Best67.20766.87067.15268.03368.649
Worst70.13568.64470.62883.54982.528
Std.0.9580.6690.7162.5343.567
Table 3. Results of ExtIPA for the first four battlefields with different  P S  values.
Table 3. Results of ExtIPA for the first four battlefields with different  P S  values.
Sc.D   PS
2030405075100
130Mean48.52648.59548.83548.60649.22349.472
Best48.16048.15848.18548.18148.19748.206
Worst49.42049.77150.17350.14651.56952.023
Std.0.4040.4500.5970.4971.0091.190
50Mean51.17351.16751.55651.51153.37356.069
Best48.43548.60048.60248.86349.46749.683
Worst53.38854.26056.34156.04657.92963.702
Std.1.5791.7832.2022.0742.3553.523
230Mean152.234152.053151.950152.261152.193152.146
Best149.744149.743149.734149.751149.764149.737
Worst153.747153.706153.720153.834155.036154.023
Std.1.4561.3471.3401.3711.5511.349
50Mean154.318153.816154.440155.328156.165157.016
Best149.298149.273149.544149.656150.530150.619
Worst157.417157.542158.112158.697160.588161.196
Std.1.9592.1881.9562.0372.6182.558
320Mean50.74447.96948.26950.38052.67455.004
Best47.82047.81248.00348.09448.16348.887
Worst63.58748.37350.38657.90764.31261.872
Std.6.0700.1310.4523.5486.0824.588
25Mean56.70050.09853.05854.15560.30361.740
Best47.84948.01948.21648.24649.30254.614
Worst63.88063.77464.01664.32972.98472.348
Std.6.8134.0796.6085.8649.5325.049
420Mean66.45266.49766.72066.87567.76068.036
Best66.26366.36366.47366.46866.97667.263
Worst66.74866.59466.96767.56469.51369.935
Std.0.1230.0740.1800.3060.8890.518
30Mean67.30068.17068.12369.79672.43978.074
Best66.70667.20767.56468.19368.57471.222
Worst67.75270.13569.62072.62476.45286.972
Std.0.3520.9580.5251.2412.7105.664
Table 4. Results of ExtIPA for the fifth battlefield with different  P S  values.
Table 4. Results of ExtIPA for the fifth battlefield with different  P S  values.
D   PS
2030405075100
5Mean50.38450.38450.38950.39150.38750.393
Best50.38450.38450.38750.38950.38650.388
Worst50.38550.38550.39050.39350.38950.396
Std.0.0020.0010.0010.0020.0010.003
10Mean50.37550.37250.37950.37550.38250.396
Best50.37150.37050.37150.37050.37550.372
Worst50.38950.37750.38550.38550.39550.433
Std.0.0050.0030.0040.0040.0060.020
15Mean50.37350.40250.43150.45750.76551.068
Best50.37050.37850.38950.38950.41750.430
Worst50.38150.43850.49150.70351.25952.782
Std.0.0030.0220.0430.0910.3080.792
20Mean50.47250.45750.74050.82151.49152.351
Best50.37550.39550.40750.45850.63350.836
Worst50.59550.59551.53752.19053.37854.884
Std.0.0700.0570.3920.4640.7311.081
25Mean50.95751.03151.25451.32752.85353.923
Best50.49750.47250.47950.77150.68751.530
Worst53.46352.15653.79352.49854.85057.218
Std.0.6490.5160.7550.4761.4331.895
30Mean51.34551.60252.29152.96253.87355.254
Best50.52450.67351.24051.11651.34051.765
Worst52.16553.08353.46756.63856.37762.244
Std.0.5200.7810.6131.6221.5703.101
35Mean52.15052.44653.46454.36256.59362.090
Best50.89551.01051.93350.85951.19352.200
Worst54.22755.44459.27758.86962.87768.912
Std.0.9191.1911.1942.0163.6194.815
40Mean52.84353.36554.23057.67660.46464.279
Best51.60850.86851.94752.67352.01852.446
Worst55.14355.47556.87461.63171.52181.205
Std.0.9001.4821.4352.7415.5928.667
Table 5. Comparison between ExtIPA and other techniques for the first and second battlefields.
Table 5. Comparison between ExtIPA and other techniques for the first and second battlefields.
Sc.DExtIPAIPAABCI-ABCIF-ABCBE-ABC
130Mean48.59349.28952.98860.45951.93950.456
Std.0.6060.4651.4253.2881.3430.672
Rank125643
50Mean52.05759.35459.97280.17459.95654.982
Std.2.5344.9142.9137.7572.2142.231
Rank135642
230Mean152.053151.499154.927185.792153.583153.410
Std.1.3471.2852.5123.7540.4920.554
Rank215643
50Mean153.816157.368157.204164.990157.814153.524
Std.2.1881.5963.6032.8111.9051.047
Rank243651
Average Rank1.5002.5004.5006.0004.2502.250
Overall Rank135642
Table 6. Comparison between ExtIPA and other techniques for the third battlefield.
Table 6. Comparison between ExtIPA and other techniques for the third battlefield.
Sc.DExtIPAIPADEPSOBAWDOQPSOQBAQWDO
320Mean47.96952.70350.07353.86950.86166.95549.52450.95849.503
Best47.81250.21147.93550.43448.06957.01348.01848.13447.868
Worst48.37355.15451.57559.96252.76574.82051.63456.00650.828
Std.0.1312.820-------
Rank174859362
25Mean50.09862.16449.84251.48150.90166.66849.67950.07148.814
Best48.01954.65248.12649.24648.16358.43048.39748.33347.807
Worst63.77471.30252.11054.24667.44175.96751.30753.42349.749
Std.4.0795.516-------
Rank583769241
Average Rank37.53.57.55.592.551.5
Overall Rank374769251
Table 7. Comparison between ExtIPA and other techniques for the fourth battlefield.
Table 7. Comparison between ExtIPA and other techniques for the fourth battlefield.
Sc.DExtIPAIPACIJADEPSODEABCJADECIPDE
420Mean66.39768.29766.42670.79467.39767.26066.52466.469
Best66.36367.29766.29867.66366.73066.63166.32166.331
Worst66.59470.00966.64673.96072.57168.18467.00766.751
Std.0.0740.6820.0871.8691.2490.5120.1930.126
Rank17286543
30Mean68.17076.49670.29778.98275.19772.65670.40771.033
Best67.20771.33467.62273.75371.76667.84567.52168.170
Worst70.13582.25075.25685.56181.64576.71881.63178.238
Std.0.9582.8231.8133.8282.4342.1473.0262.502
Rank17286534
Average Rank1728653.5003.500
Overall Rank17286533
Table 8. Comparison between ExtIPA and other techniques for the fifth battlefield.
Table 8. Comparison between ExtIPA and other techniques for the fifth battlefield.
Sc.DExtIPAIPAABCBABAMACOBBODEESFAGAMFAPBILPSOSGAPGSO
55Mean50.38450.38450.384106.48359.05461.52072.73058.59680.72058.75060.47059.16766.13959.90660.50153.669
Best50.38450.38450.38460.69054.35761.37260.33054.35759.59054.35955.24754.35759.76355.16755.65453.380
Worst50.38550.38550.385345.25560.24063.320171.50062.200112.26065.74061.60062.41972.25066.07161.20060.630
Std.0.0010.0010.001----2.160-3.010-2.250-2.6201.5602.260
Rank11116712145156108139114
10Mean50.37250.39850.38469.42552.70761.95057.96553.10476.28052.18052.54251.574101.44057.04152.27950.849
Best50.37050.37650.37152.36051.39560.22852.94751.39557.42051.39951.60751.39783.11252.20751.54950.649
Worst50.37750.45750.406108.73860.724468.19076.82056.736123.46056.71060.11053.786119.25068.62256.16553.330
Std.0.0030.0240.013----2.600-2.370-1.730-2.2501.4301.870
Rank13214913121015685161174
15Mean50.40250.57050.59163.60151.23160.26059.52652.27871.86052.82252.18850.897128.25058.34051.89151.516
Best50.37850.42450.42553.07550.60958.53052.55750.61158.25550.61750.87150.612107.22352.09750.80750.452
Worst50.43851.21950.78985.74560.19261.00090.37062.580103.86094.27657.44753.832189.20087.32061.80055.460
Std.0.0220.1930.100----3.730-4.250-1.340-4.0102.4501.490
Rank12314513129151084161176
20Mean50.45750.92552.18163.63050.76066.22061.8852.72270.19053.73353.09050.700185.43058.24853.16752.398
Best50.39550.49550.86652.39550.46760.44554.72350.51060.23250.46350.82550.455130.15252.46450.84650.657
Worst50.59551.27154.67283.70653.74267.18078.20064.57081.45078.91459.18052.028337.30078.16068.95059.850
Std.0.0570.1960.994----3.710-7.580-1.020-6.9503.9901.560
Rank14513214127151082161196
25Mean51.03151.67854.69064.90150.70961.57064.78054.40872.78053.90453.78150.999257.72060.26354.15754.587
Best50.47250.79051.91155.01750.44861.54955.52850.55163.36950.49151.24250.457159.74053.73851.23950.782
Worst52.15657.31457.53074.92653.51962.07080.33069.66083.91066.45260.39853.704699.60078.13965.70063.160
Std.0.5161.5031.618----4.120-8.660-0.810-7.5504.0602.380
Rank34101411213815652161179
30Mean51.60251.78959.80566.61651.10663.95067.87059.98874.78054.96255.00851.357395.54062.38554.52156.891
Best50.67350.99754.52757.24750.46763.23056.60750.89865.72550.68351.92150.516230.15053.29951.61751.019
Worst53.08361.56564.94080.08460.28564.71078.58074.12091.30065.97662.71858.336239693.69564.71075.320
Std.0.7812.2752.366----6.740-9.120-1.230-8.2004.1103.450
Rank34913112141015672161158
35Mean52.44655.88966.18767.70351.46168.31071.56067.90076.52055.99655.96051.601684.66064.13555.82659.744
Best51.01051.00557.25957.44850.47966.96063.02152.53766.74551.08352.31150.471270.33055.50351.63354.136
Worst55.44496.30174.09582.73758.81968.72093.85084.44088.7683.88774.47955.883636282.83367.61071.450
Std.1.19112.2494.298----9.150-9.550-1.650-8.6504.1204.010
Rank35101111314121576216948
40Mean53.36555.99475.59569.97351.87674.58074.85077.62080.26057.85657.49352.198116964.88557.11062.420
Best50.86851.02563.26958.65050.60269.79563.55054.54968.23151.52352.20850.561390.62055.73752.61855.092
Worst55.475116.19586.61383.26358.42777.06090.70093.26096.42086.66372.06957.724710384.73067.87072.650
Std.1.48216.1885.356----10.900-10.430-2.380-9.4104.5504.540
Rank34131011112141576216958
Average Rank2.0003.3756.62513.1253.37512.50012.8759.37515.0007.2507.2503.37515.62510.2506.8756.625
Overall Rank12514212131015882161175
Table 9. Statistical comparison between ExtIPA and other planners for the fifth scenario using the mean best objective function values.
Table 9. Statistical comparison between ExtIPA and other planners for the fifth scenario using the mean best objective function values.
ExtIPA vs.IPAABCBABAMACO
Z-val.2.4172.4172.6600.1972.660
ρ -val.0.0150.0150.0070.8430.007
  W + 000160
  W 2828362036
Sign.ExtIPAExtIPAExtIPA-ExtIPA
ExtIPA vs.BBODEESFAGA
Z-val.2.6602.6602.6602.6602.660
ρ -val.0.0070.0070.0070.0070.007
  W + 00000
  W 3636363636
Sign.ExtIPAExtIPAExtIPAExtIPAExtIPA
ExtIPA vs.MFAPBILPSOSGAPGSO
Z-val.0.3282.6602.6602.6602.660
ρ -val.0.7420.0070.0070.0070.007
  W + 150000
  W 2136363636
Sign.-ExtIPAExtIPAExtIPAExtIPA
Table 10. Statistical comparison between ExtIPA and other planners for the fifth scenario using the best objective function values.
Table 10. Statistical comparison between ExtIPA and other planners for the fifth scenario using the best objective function values.
ExtIPA vs.IPAABCBABAMACO
Z-val.2.1532.4172.6600.3282.660
ρ -val.0.0310.0150.0070.7420.007
  W + 100150
  W 2728362136
Sign.ExtIPAExtIPAExtIPA-ExtIPA
ExtIPA vs.BBODEESFAGA
Z-val.2.6602.6602.6602.6602.660
ρ -val.0.0070.0070.0070.0070.007
  W + 00000
  W 3636363636
Sign.ExtIPAExtIPAExtIPAExtIPAExtIPA
ExtIPA vs.MFAPBILPSOSGAPGSO
Z-val.0.3282.6602.6602.6602.660
ρ -val.0.7420.0070.0070.0070.007
  W + 150000
  W 2136363636
Sign.-ExtIPAExtIPAExtIPAExtIPA
Table 11. Statistical comparison between ExtIPA and other planners for the fifth scenario using the worst objective function values.
Table 11. Statistical comparison between ExtIPA and other planners for the fifth scenario using the worst objective function values.
ExtIPA vs.IPAABCBABAMACO
Z-val.2.1532.4172.6600.3282.660
ρ -val.0.0310.0150.0070.7420.007
  W + 100150
  W 2728362136
Sign.ExtIPAExtIPAExtIPA-ExtIPA
ExtIPA vs.BBODEESFAGA
Z-val.2.6602.6602.6602.6602.660
ρ -val.0.0070.0070.0070.0070.007
  W + 00000
  W 3636363636
Sign.ExtIPAExtIPAExtIPAExtIPAExtIPA
ExtIPA vs.MFAPBILPSOSGAPGSO
Z-val.0.3282.6602.6602.6602.660
p-val.0.7420.0070.0070.0070.007
  W + 150000
  W 2136363636
Sign.-ExtIPAExtIPAExtIPAExtIPA
Table 12. S r  and  M e  values of ExtIPA, IPA, and ABC for the fifth scenario.
Table 12. S r  and  M e  values of ExtIPA, IPA, and ABC for the fifth scenario.
DExtIPAIPAABC
5   S r 100.000100.000100.000
  M e 103.920217.454210.474
10   S r 100.000100.000100.000
  M e 308.1701324.990850.474
15   S r 100.000100.000100.000
  M e 782.1902049.3302037.113
20   S r 100.000100.000100.000
  M e 1244.4502609.2473946.557
25   S r 100.00098.99061.856
  M e 1885.3103889.1945435.733
30   S r 100.00098.9905.155
  M e 2887.8503904.8885923.000
35   S r 95.00086.0000.000
  M e 3465.2114305.440-
40   S r 90.00090.0000.000
  M e 4147.2004380.840-
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Aslan, S.; Oktay, T. Path Planning of an Unmanned Combat Aerial Vehicle with an Extended-Treatment-Approach-Based Immune Plasma Algorithm. Aerospace 2023, 10, 487. https://doi.org/10.3390/aerospace10050487

AMA Style

Aslan S, Oktay T. Path Planning of an Unmanned Combat Aerial Vehicle with an Extended-Treatment-Approach-Based Immune Plasma Algorithm. Aerospace. 2023; 10(5):487. https://doi.org/10.3390/aerospace10050487

Chicago/Turabian Style

Aslan, Selcuk, and Tugrul Oktay. 2023. "Path Planning of an Unmanned Combat Aerial Vehicle with an Extended-Treatment-Approach-Based Immune Plasma Algorithm" Aerospace 10, no. 5: 487. https://doi.org/10.3390/aerospace10050487

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop