Next Article in Journal
One-Step Suicide Substrate Inactivation Kinetics of a Ping-Pong Reaction with One Substrate Undergoing Disproportionation: A Theoretical Approach with Approximate Solutions
Next Article in Special Issue
Associated Fault Diagnosis of Power Supply Systems Based on Graph Matching: A Knowledge and Data Fusion Approach
Previous Article in Journal
Dynamic Multicriteria Game with Pollution Externalities
Previous Article in Special Issue
An Improved Optimization Algorithm for Aeronautical Maintenance and Repair Task Scheduling Problem
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Unified Multi-Objective Optimization Framework for UAV Cooperative Task Assignment and Re-Assignment

1
School of Mathematical Science, Dalian University of Technology, Dalian 116024, China
2
Department of Airborne Vehicle Engineering, Naval Aeronautical and Astronautical University, Yantai 264001, China
3
Science and Technology on Reliability and Environmental Engineering Laboratory, Beijing 100191, China
4
Institute of Reliability Engineering, Beihang University, Beijing 100191, China
5
School of Reliability and Systems Engineering, Beihang University, Beijing 100191, China
6
State Key Laboratory of Structural Analysis for Industrial Equipment, Department of Engineering Mechanics, Dalian University of Technology, Dalian 116024, China
*
Authors to whom correspondence should be addressed.
Mathematics 2022, 10(22), 4241; https://doi.org/10.3390/math10224241
Submission received: 15 September 2022 / Revised: 30 October 2022 / Accepted: 4 November 2022 / Published: 13 November 2022
(This article belongs to the Special Issue Mathematical Problems in Aerospace)

Abstract

:
This paper focuses on cooperative multi-task assignment and re-assignment problems when multiple unmanned aerial vehicles (UAVs) attack multiple known targets. A unified multi-objective optimization framework for UAV cooperative task assignment and re-assignment is studied in this paper. In order to simultaneously optimize the losses and benefits of the UAVs, we establish a multi-objective optimization model. The amount of tasks that each UAV can perform and the number of attacks on each target are limited according to the ammunition capacity of each UAV and the value of each target. To solve this multi-objective optimization problem, a multi-objective genetic algorithm suitable for UAV cooperative task assignment is constructed based on the NSGA-II algorithm. At the same time, a selection strategy is used to assist decision-makers in choosing one or more solutions from the Pareto-optimal front. Moreover, to deal with emergencies such as UAV damage and to detect of new targets, a task re-assignment algorithm based on the contract network protocol (CNP) is developed. It can be implemented in real-time while only slightly sacrificing the ability to seek the optimal solution. Simulation results demonstrate that the methods developed in this paper are effective.

1. Introduction

Unmanned aerial vehicles (UAVs) refer to aircraft without pilots; such aircraft can fly autonomously or can be remotely controlled by an operator [1]. They can completely reduce casualties and costs when performing high-risk missions [2]. At present, UAVs have become very popular in many fields, such as infrastructure inspection, coastal border surveillance, military applications, and others fields [3,4,5,6]. In the increasingly complex battlefield situation, a single UAV cannot quickly adapt to the changing battlefield environment due to lack of information interaction. At the same time, the effectiveness of a single UAV in perform tasks is not high due to the limited ammunition capacity of a single UAV. However, when a team composed of multiple UAVs performs tasks cooperatively it can overcome the shortcomings of a single UAV. The UAV team can share information and fully allocate internal resources, allowing tasks to be completed efficiently [7,8].
In order to take the advantage of multiple UAVs when performing tasks realize improvements in efficiency, cooperative task assignment is important. In recent years, results have been achieved in research on task assignment in different fields [9,10]. According to the different factors considered by researchers, the task assignment problem of multiple UAVs can be categorized into different models, and many related algorithms have been proposed as well. Swarm intelligence optimization algorithms are widely used in this field, particularly genetic algorithms [11]. The UAV team can be composed of either homogeneous UAVs or heterogeneous UAVs. For cooperative task assignment of homogeneous UAVs considering the limitations on the total flight distance of UAVs, Wang et al. [12] established a combinatorial optimization problem with the total weighted cost of target value and distance cost as the objective, and presented an improved genetic algorithm based on the beetle antennae search algorithm. Venugopalan et al. [13] presented a team search-based decentralized task assignment scheme for homogeneous UAVs. Velhal et al. [14] formulated the restricted airspace protection problem as a multi-UAV spatio-temporal multi-task allocation problem, and proposed a modified consensus-based bundled auction method to solve it. For cooperative task assignment of heterogeneous UAVs, Fatemeh Afghah et al. [15] proposed a coalition formation approach to solve the problem of adversary target detection and subsequent task completion. Schwarzrock et al. [16] proposed a method to increase the amount of tasks performed within the problem of task allocation among agents representing UAVs. Taking the minimization of the task execution time of UAVs as the objective, Ye et al. [17] established a task assignment model and proposed a modified genetic algorithm with a multi-type-gene chromosome encoding method. Considering a coupled task allocation and path planning problem, Yan et al. [18] proposed a task allocation algorithm and a cooperative particle swarm algorithm. Uncertain factors are considered in the cooperative task assignment problem as well. Considering the parameter and time-sensitive uncertainties in the task assignment problem, Chen et al. [19] proposed an algorithm that combines the interior point method and the modified two-part wolf pack search algorithm. Jia et al. [20] established a two-stage stochastic programming model of the cooperative task assignment problem incorporating the stochastic velocities of UAVs, and proposed a novel metaheuristic based on a modified genetic algorithm.
However, only a single goal is considered by the above task assignment problems. In order to simultaneously optimize the losses and benefits of the UAV team, it is necessary to study the multi-objective optimization problem for multi-UAV task assignment. NSGA-II and its variants are widely used in the study of multi-objective optimization for UAV mission assignment [21,22]. Cheng et al. [23] considered the multi-objective optimization of task assignment, with minimization of cost and maximization of the value of destroyed targets regarded as the objectives. Taking into account the relationship between the UAVs and the ground control stations, Cristian et al. [24] proposed a new multi-objective genetic algorithm for solving complex mission planning problems be formulating mission planning as a constraint satisfaction problem [25]. Chen et al. [26] studied the task assignment problem for UAVs with different sensor capacities, and proposed a modified multi-objective symbiotic organism search algorithm. Wang et al. [27] considered a high-dimensional multi-objective optimization problem containing four objectives for task assignment, then used an improved multi-objective quantum-behaved particle swarm optimization algorithm to solve the problem. Pohl et al. [28] developed an innovative algorithm for multi-UAV mission routing. Phiboon et al. [29] studied multi-fidelity multi-objective airfoil design optimization for fixed-wing UAVs. However, the above studies have not explained how decision-makers are to choose a solution from the Pareto-optimal front. At the same time, the above literature does not consider the emergencies that may occur on the battlefield. The complexity of the battlefield environment inevitably causes emergencies; for example, damage to UAVs, the appearance of new targets, etc. The problem of UAV task re-assignment needs to be considered when such emergencies occur. Unlike the general task assignment problem, task re-assignment in emergencies must be completed in a short time. Therefore, the task re-assignment problem has higher requirements with respect to the calculation speed of the algorithm. A contract network algorithm [30] based on the auction mechanism has been applied to the real-time task assignment problem. Zhen et al. [31] proposed an improved contract network protocol-based cooperative target assignment scheme to deal with heterogeneous overloading and time sequence problems. Zhang et al. [32] established a model of real-time assignment of tasking based on reconnaissance benefits and reconnaissance costs, and proposed an improved contract network algorithm. Xiang et al. [33] studied the cooperation target assignment of multiple agents, and proposed an improved contract network protocol according to the characteristics and restrictions of target assignment.
The contributions of the present article are provided as follows:
(1)
Based on the idea of the NSGA-II algorithm, an algorithm suitable for solving the multi-objective optimization problem of multi-UAV task assignment is presented, and the encoding format and genetic operators therein are specially designed.
(2)
A method for aiding commanders in choosing an operation plan from among the Pareto solution set is provided.
(3)
A highly efficient CNP-based algorithm is developed for real-time task re-assignment in emergencies.
The remainder of this paper is organized as follows. Section 2 presents a multi-objective optimization model of cooperative task assignment. Section 3 provides the multi-objective optimization strategy. Section 4 provides the method of selecting solutions from the Pareto solution set. The problem of task re-assignment in emergencies is studied in Section 5. Numerical examples are provided in Section 6. Finally, Section 7 concludes the paper.

2. Multi-Objective Optimization Model of Cooperative Task Assignment

For convenience, let I n : = { 1 , 2 , , n } , I ¯ n : = { 0 } I n , n N + . On the battlefield, UAVs with attack capabilities are required to attack multiple known targets in coordination to improve efficiency. Assume that N U ( N U N + ) UAVs coordinately attack N T ( N T N + ) targets in the combat area. Let U : = { U 1 , U 2 , , U N U } be the set of UAVs, where U i ( i I N U ) represents the i-th UAV. The target set is recorded as T : = { T 1 , T 2 , , T N T } , where T j ( j I N T ) represents the j-th target. When a UAV attacks a target, the UAV may be destroyed, and different UAVs have different probabilities of being destroyed when they attack different targets. Let P i j , K i j respectively denote the probability that U i ( i I N U ) and T j ( j I N T ) are destroyed when U i attacks T j . Let V T j ( j I N T ) and W U i ( i I N U ) represent the value of T j and U i , respectively.
Because the previous single-objective optimization cannot achieve simultaneous optimization of two conflicting objectives, i.e., simultaneous optimization of the costs and benefits in terms of UAVs, it is necessary to establish a multi-objective optimization model for the cooperative task assignment problem. Considering the respective probabilities of UAVs and targets being destroyed, the following two objectives are used to maximize the value of the destroyed targets while incurring the minimum cost in damaged UAVs.
(i)
Maximizing the total value of the targets destroyed by UAVs:
max f 1 ( x ) = i = 1 N U j = 1 N T K i j V T j x i j ,
(ii)
Minimizing the total cost of the damaged UAVs:
min f 2 ( x ) = i = 1 N U j = 1 N T P i j W U i x i j ,
where x i j { 0 , 1 } , i I N U , and j I N T . If x i j = 1 , this means that U i attacks T j ,; otherwise, T j is not attacked by U i .
The UAVs have a limited amount of ammunition, which makes it impossible to allocate more tasks to each UAV than its ammunition capacity. Targets have different values, and are divided into high-value targets and low-value targets. In this paper, the values of enemy targets are known in advance. Multiple attack missions are assigned to the same high-value target in order to increase the probability of success. To decrease the time that UAVs must stay within the enemy’s threat range, the following assumption is made.
Hypothesis 1 (H1).
Different tasks for the same target are performed by different UAVs.
The implicit constraint in H 1 is that the same UAV can only attack the same target once. This constraint not being taken into account can cause the limited ammunition to be distributed unevenly, which can affect efficiency. For this reason, the number of high-value targets to be attacked needs to be limited. According to the above description, the task assignment problem needs to satisfy the following constraints.
(i)
The amount of tasks assigned to each UAV cannot exceed its own ammunition capacity:
j = 1 N T x i j n i , i I N U ,
(ii)
The number of tasks for each target is limited:
i = 1 N U x i j m j , j I N T ,
(iii)
The same UAV can only attack the same target once:
a i j 1 , i I N U , j I N T ,
where n i ( i I N U ) represents the ammunition capacity of U i , m j ( j I N T ) represents the maximum number of T j being attacked, and a i j ( i I N U , j I N T ) represents the number of tasks performed by U i on T j .
Let F ( x ) : = f 1 ( x ) , f 2 ( x ) . The multi-objective optimization problem of the cooperative task assignment (CTAMOP) is expressed as follows.
( C T A M O P ) min F ( x ) s . t . j = 1 N T x i j n i , i = 1 N U x i j m j , a i j 1 , i I N U , j I N T , x i j { 0 , 1 } , i I N U , j I N T .

3. Multi-Objective Optimization Strategy

In order to solve CTAMOP, an improved multi-objective genetic algorithm based on the NSGA-II algorithm [34] is constructed in this section. Based on the characteristics of the task assignment problem, the chromosome encoding method along with the crossover and mutation operators are specially designed and constructed.

3.1. Chromosome Encoding

The task assignment problem has two characteristics. First, the problem is that multiple UAVs may attack multiple targets; second, whether U i ( i I N U ) attacks T j ( j I N T ) is represented by 0 and 1. Considering the above factors, we use the binary matrix encoding method to encode the chromosomes in order to accurately describe the situation of UAVs performing tasks.
For the scenario of N U UAVs attacking N T targets, the generated chromosomes should be N U × N T order matrices, which only contain 0 and 1 elements. Constraints (3)–(5) need to be satisfied, i.e., the sum of the i-th row ( i I N U ) of each generated matrix is less than or equal to n i , and the sum of the j-th ( j I N T ) column is less than or equal to m j . The i-th row represents the situation of the targets attacked by U i , and the j-th column represents the situation of UAVs attacking T j .
The chromosome encoding method is suitable for all combat situations, i.e., when ammunition is sufficient and when ammunition is insufficient. In order to ensure randomness, the chromosomes are generated in the following way. First, a UAV U i ( i I N U ) and a target T j ( j I N T ) are randomly selected; then, it is determined whether constraints (3)–(5) are satisfied. If both constraints are satisfied, a variable (0 or 1) is randomly assigned to x i j ; otherwise, x i j = 0 . This process is executed repeatedly. When all UAVs do not satisfy constraint (3) or all targets do not satisfy constraint (4) or (5), the process is terminated. At the same time, all x i j ( i I N U , j I N T ) that have not been assigned a value receive a value of 0.
Here, a specific example is provided to illustrate how chromosomes are encoded considering the case of N U = 4 and N T = 10 . The ammunition capacity of UAVs is n 1 = n 2 = n 3 = 3 and n 4 = 2 , and the maximum number of targets that can be attacked is m 1 = m 2 = = m 10 = 2 . For the scenario in Figure 1a, T 4 , T 5 , T 9 are assigned to U 1 , T 1 , T 2 , T 7 are assigned to U 2 , T 3 , T 9 , T 10 are assigned to U 3 , and T 6 , T 8 are assigned to U 4 . The values of the corresponding positions of the chromosome are set to 1, and the remaining positions are set to 0, as shown in Figure 1b.
In the evolution process, the offspring are composed of the retained elite individuals and the individuals obtained by crossover and mutation operations. The crossover and mutation operators play key roles. Because the chromosomes are binary matrix, it is necessary to design the crossover and mutation operators for algorithm.

3.2. The Crossover Operator

Two chromosomes F 1 and F 2 are selected from the parents, then a crossover operation is performed on F 1 and F 2 with crossover probability P c . The specific crossover steps are as follows. First, the l 1 -th ( l 1 I N U ) row and the l 2 -th ( l 2 I N U ) row from F 1 and F 2 , respectively, are randomly selected. Then, the l 1 -th row of F 1 and the l 2 -th row of F 2 are swapped to obtain two new chromosomes O 1 and O 2 . If the task assignment of the obtained chromosome satisfies constraints (3) and (4) and there is no idle UAV, then the obtained chromosome is the crossover offspring. It is common that O 1 and O 2 do not satisfy the constraints, and the following cases may exist as well.
  • Task assignment satisfies constraint (4) while not satisfying constraint (3). If the l 1 -th ( l 1 I N U ) row of O 1 does not satisfy constraint (3), that is, the number of tasks assigned to U l 1 exceeds the ammunition capacity n l 1 of U l 1 , we sort the tasks of U l 1 according to the number of tasks attacked, then delete the corresponding tasks from the task set of U l 1 according to their number, from high to low. When the l 1 -th ( l 1 I N U ) row satisfies constraint (3), then the operation is stopped.
  • Task assignment satisfies constraint (3) while not satisfying constraint (4). If the j-th ( j I N T ) column of O 2 does not satisfy constraint (4), that is, the number of attacks on T j exceeds the upper limit m j , the attack task of T j is randomly deleted from the rows that have not been exchanged. If T j satisfies the constraint (4), then the operation is stopped.
  • Task assignment satisfies neither constraint (3) nor (4). In this case, the same method as in case 1 is first used to change the chromosome and then to determine whether constraint (4) is satisfied. If constraint (4) is not satisfied, then the method from case 2 is used to change the chromosome.
If both constraints (3) and (4) are satisfied and there is an idle UAV, then as many tasks as possible are assigned to the idle UAV under the premise that constraints (3)–(4) are satisfied; targets that have not yet been attacked are prioritized.
The example provided in Section 3.1 is used to illustrate the construction of the crossover operator. The two selected parent chromosomes are shown in Figure 2. Let the rows randomly selected from F 1 and F 2 be the second and fourth rows, respectively. It can be seen from Figure 2 that T 3 (i.e., the third column marked in yellow) in the offspring chromosome obtained by F 1 does not satisfy constraint (4). As this scenario belongs to the first case, an attack task of T 3 is randomly deleted from the first or fourth row. If the task of U 1 (i.e., the first row marked in yellow) is randomly deleted, U 1 becomes an idle UAV. Thus, as many tasks as possible are assigned to U 1 under the premise that the constraints are satisfied, and the crossover offspring C 1 can be obtained. Here, T 4 and U 4 (i.e., the fourth column and fourth row marked in yellow) in the offspring chromosome obtained by F 2 fail to satisfy constraints (4) and (3), respectively. This belongs to the third case. According to the method used in the third case, the attack task of U 4 is deleted. Then, as the chromosome satisfies the constraints and there are no idle UAVs, we have the crossover offspring C 2 .

3.3. The Mutation Operator

A mutation operation is performed on crossover offspring with a mutation probability of P m . There are three situations that may occur with respect to the crossover offspring, and different mutation operations are used for different situations.
  • If there are targets in the chromosome that have not been attacked and there are UAVs with ammunition that can perform tasks, then the mutation operation seeks to assign the targets to these UAVs under the premise that constraint (3) is satisfied.
  • If there are targets in the chromosome that have not been attacked and the UAVs have no remaining ammunition, then the mutation operation randomly selects the task sets of two UAVs from the chromosome and exchanges them.
  • If all targets are attacked, then the task sets of two UAVs from the chromosome are randomly selected and exchanged.

3.4. The Improved Multi-Objective Genetic Algorithm

Based on the methods used to construct the chromosomes, crossover operators and mutation operators, the following multi-objective optimization algorithm (i.e., Algorithm 1) suitable for UAV cooperative task assignment is developed.
Algorithm 1 Multi-objective optimization algorithm.
1:Initialize the values of the following parameters: the population size N, crossover probability P c , mutation probability P m , and maximum number of evolutions G;
2: g 0 ;
3:Randomly generate an initial population P g of size N. The chromosome encoding method and chromosome generation method are based on the methods described in Section 3.1;
4:while g < G do
5: Calculate the objective function values of each chromosome in population P g using (1) and (2);
6: Sort population P g using the fast non-dominated sorting approach, then determine the front of each chromosome;
7: Perform crossover operations on the selected parents according to the crossover probability P c , then mutate the obtained crossover offspring with probability P m . Proceed to the next step when a progeny population S g with N chromosomes is obtained;
8: Combine the parent population P g with the offspring population S g to obtain a new population Q g ; then, the size of population Q g is 2N;
9: Perform the process in lines 5–6 on population Q g to obtain the front of each chromosome in Q g ;
10: Select chromosomes from the front;
11:while the number of chromosomes selected is less than N do
12:  First, the chromosome is selected from the first front, then, the chromosome is selected from the second front, and so on;
13:  if the number of chromosomes required is less than the number of chromosomes in the l-th front then
14:   Calculate the crowded distances;
15:   Select the chromosomes based on the crowding distance from large to small;
16:  end if
17:end while
18: g g + 1 and q g
19:if g = G then
20:  Sort P g using the fast non-dominated sorting approach, then output the chromosomes in the first front;
21:  end if
22:end while

4. Selection Strategy

Because the decision-maker needs to select one or more solutions from the Pareto solution set in order to perform specific operations, it is necessary to have a strategy for selecting non-dominated solutions from the Pareto-optimal front. Let f j denote the j-th objective function, n denote the number of objective functions, and m denote the number of non-dominated solution on the Pareto-optimal front. The specific selection steps are shown in Algorithm 2.
Algorithm 2 The strategy for selecting solutions.
1:Convert all objective functions f j ( j I n ) into a form that minimizes or maximizes the function F j ( j I n ) .
2:Solve the problem using the improved NSGA-II algorithm to obtain the Pareto-optimal front.
3:If the dimensions of any two objective functions are different or the orders of magnitude of the values of any two objective functions are different, then normalize the objective function values; otherwise, the objective function values are not normalized. The j-th objective function of the i-th non-dominated solution on the Pareto-optimal front is denoted as F ¯ j i ( j I n , i I m ) .
4:Weight and sum each group of objective function values obtained in step 3 to obtain the following set:
S = S i | S i = j = 1 n α j F ¯ j i , j = 1 n α j = 1 , i I m .
5:In step 1, if the objective functions are transformed into the form of seeking the minimum value, then the solution corresponding to the minimum value in set S obtained in step 4 is selected; otherwise, the solution corresponding to the maximum value in set S is selected.
The specific value of α j ( j I n ) depends on the degree of preference of the decision-maker for the objective function f j . Let C = { c 1 , c 2 , , c n } , where c j ( j I n ) represents the degree of preference of the decision-maker for f j . The rules for setting the value of α j ( j I n ) are as follows:
  • If c j 1 > c j 2 > > c j n , then α j 1 > α j 2 > > α j n , and l = j 1 j n α l = 1 , j i I n , i I n .
  • If c j 1 = c j 2 , then α j 1 = α j 2 , j 1 , j 2 I n . In particular, if c j 1 = c j 2 = = c j n , then α j 1 = α j 2 = = α j n = 1 n .
Finally, the flowchart diagram of the improved genetic algorithm together with the selection strategy is shown in Figure 3.

5. Task Re-Assignment for Emergencies

The task assignment process is carried out on the enemy targets found on the battlefield. However, there are many uncertain factors due to the complexity of the battlefield environment. For example, after assigning the discovered targets, new enemy targets may be found on the battlefield again, or certain UAVs in the task assignment may suddenly malfunction and be unable to continue performing combat tasks. Both new targets and targets in the task sets of damaged UAVs need to be re-assigned. There are two methods of assigning tasks. The first method is to assign all tasks according to the current health status of the UAVs, and the second is to assign tasks that need to be assigned based on the obtained task assignment plan. In combat, efficiency issues are more important when solving unexpected situations. Compared with the first method, the second method takes less time and has a higher task assignment efficiency.
In this paper, the re-assignment strategy for new tasks is constructed based on the idea of the contract network protocol and the characteristics of the task assignment problem. Smith first proposed the idea of a contract network protocol [30]. The principle idea of a contract network protocol is to assign tasks through a process of tendering and bidding between agents. There are three types of agents in a contract network protocol: the tender agent, bidding agent, and winning agent. In the problem of UAV task re-assignment, the tender agent is the reconnaissance UAV that discovers a new task or the UAVs that becomes damaged, the bidding agents are UAVs with the ability to perform the newly available tasks, and the winning agent is the UAV corresponding to the bid with the best function value.

5.1. Task Re-Assignment Model

Based on the above description, there are two trigger conditions for task reassignment: (1) new enemy targets are discovered and (2) one or more UAVs are damaged. Suppose that the number of new targets found on the battlefield is s 1 , and the number of destroyed UAVs is s 2 . Let T ¯ denote the set of targets that need to be assigned,
T ¯ : = { T N T + 1 , T N T + 2 , , T N T + s 1 } ,
where T N T + i ( i I s 1 ) represents the i-th task that needs to be assigned. Let U ¯ denote the set of UAVs that can perform tasks,
U ¯ : = { U l 1 , U l 2 , U l N U s 2 } = U { U l ¯ 1 , U l ¯ 2 , , U l ¯ s 2 } ,
where U l ¯ j ( j I s 2 ) represents the l ¯ j -th damaged UAV. Based on (1) and (2), an objective function is constructed with the following form:
m a x f ¯ = α 1 i = l 1 l N U s 2 K i ( N T + j ) V T N T + j x i ( N T + j ) + α 2 i = l 1 l N U s 2 1 P i ( N T + j ) W U i x i ( N T + j ) α 1 i = l 1 l N U s 2 K i j r V T j r x i j r α 2 i = l 1 l N U s 2 1 P i j r W U i x i j r ,
where j I s 1 and T j r ( j r I N T + j 1 ) represents the target replaced by T N T + j ; T j r is only considered in an interchange contract, which is described along with sales contracts in the next section. The values of α 1 and α 2 are the same as the values of α 1 and α 2 in Algorithm 2 in Section 4. Thus, the model of task re-assignment (TRAM) is as follows:
( T R A M ) max f ¯ s . t . j ˜ = 1 N T + j x i j ˜ n i , i = l 1 l N U s 2 x i ( N T + j ) m j , a i ( N T + j ) 1 , i { l 1 , l 2 , , l N U s 2 } , x i ( N T + j ) { 0 , 1 } , i { l 1 , l 2 , , l N U s 2 } ,
where j I s 1 .

5.2. Task Re-Assignment Algorithm

In the CNP-based algorithm, sales contracts and interchange contracts are considered. The idea of a sales contract is that a new task is added to the task set of the bidding agent. The specific form of a sales contract of a UAV U i for a target T N T + j is represented as follows:
< U i , T N T + j , 0 , f ¯ > ,
where, i { l 1 , l 2 , , l N U s 2 } , j I s 1 . The sales contract (9) indicates that the revenue obtained by adding target T N T + j to the task set of U i is f ¯ . An interchange contract, on the other hand, replaces a target in the UAV task set with a target that needs to be assigned. The specific form of an interchange contract of a UAV U i for a target T N T + j is represented as follows:
< U i , T N T + j , T j r , f ¯ > ,
where i { l 1 , l 2 , , l N U s 2 } , j I s 1 , and j r I N T + j 1 . The interchange contract (10) indicates that the revenue obtained by replacing T j r in the task set of U i with T N T + j is f ¯ . If UAV U i ( i { l 1 , l 2 , , l N U s 2 } ) has ammunition remaining, then U i can execute both the sales contract and the interchange contract; otherwise, U i can only execute the interchange contract. The steps for assigning target T N T + j ( j I s 1 ) are provided in Algorithm 3.
Algorithm 3 Task re-assignment algorithm T N T + j ( j I s 1 ) .
1:Initialize the information of UAV U i , the values of parameters K i ( N T + j ) , P i ( N T + j ) , V T N T + j ( i { l 1 , l 2 , , l N U s 2 } , j I s 1 ) , and the number of iterations of interchange contract G i c .
2:Calculate the remaining ammunition R i m ( i { l 1 , l 2 , , l N U s 2 } ) of U i .
3:If R i m 0 , then U i executes the interchange contract and sales contract for T N T + j ; otherwise, U i only executes the interchange contract for T N T + j . Then, bidding agent U i chooses the contract with the largest value of f ¯ .
4:The bidding agent evaluates the received contracts and selects the contract with the largest value of f ¯ as the winning contract, then broadcasts the information of winning agent.
The flowchart diagram of the CNP-based algorithm is shown in Figure 4.

6. Numerical Experiments

In order to verify the effectiveness of Algorithms 1–3, simulation examples of various battle situations are analyzed in this section. Examples of the improved multi-objective genetic algorithm and selection strategy are provided in Section 6.1. In Section 6.1.1 and Section 6.1.2, examples where the total amount of ammunition is less than or equal to the total number of tasks are considered, and the effectiveness of Algorithm 1 is verified. In Section 6.1.3, a large-scale example where the total amount of ammunition is greater than the total number of tasks is provided. Examples of task re-assignment in emergencies are laid out in Section 6.2. In Section 6.2.1, an example is used to illustrate the process of Algorithm 3. A large-scale example considering emergencies is provided in Section 6.2.2 to verify the effectiveness and advantages of Algorithm 3. In Section 6.2.3, we analyze why the CNP-based method is not directly used to solve the task assignment problem. All numerical experiments were implemented using Python 3.8 on a computer with an Intel Core i5-10210U CPU @ 1.60GHz, 2.11 GHz, and 4.00 GB RAM. The code for the algorithms can be found at the URL (accessed on 14 September 2022) https://github.com/gaoxh-github/multi-objetive-task-assignment-source-code. For the different examples provided in this paper, the reader only needs to change the corresponding parameters in the code.

6.1. Test of the Improved Multi-Objective Genetic Algorithm

6.1.1. Case 1: Total Amount of Ammunition = Total Number of Tasks

First, we consider a case in which N U = 4 and N T = 8 . The ammunition capacity of each UAV is n i = 2 ( i I 4 ) , and the upper limit of each target being attacked is m j = 1 ( j I 8 ) . When U i ( i I 4 ) attacks T j ( j I 8 ) , the probability P i j of U i being destroyed and the probability K i j of T j being destroyed are shown in Table 1. The values of U i and T j are shown in Table 2. To verify the effectiveness of Algorithm 1, we compare it with the Multiple Objective Particle Swarm Optimization (MOPSO) algorithm using the example in this section. In Algorithm 1, the crossover probability is P c = 0.8 and the mutation probability is P m = 0.2 . In MOPSO, the values of the parameters are ω = 0.7298 , c 1 = 1.49618 and c 2 = 1.49618 . The population size and maximum number of iterations of the two algorithms are N = 100 and G = 200 , respectively.
The comparison results of the obtained Pareto-optimal fronts and CPU runtime are shown in Figure 5. According to the definition of the Pareto solution [34], it can be seen from Figure 5a that all the non-dominated solutions obtained by Algorithm 1 dominate the non-dominated solution obtained by MOPSO. As can be seen from Figure 5b, the CPU runtime of GA-CTAP is significantly shorter than that of MOPSO. The convergence curves of the objective functions are shown in Figure 6. Clearly, thte GA-CTAP algorithm achieves better convergence performance compared to MOPSO. For convenient description, the task assignment corresponding to the non-dominated solutions A, B, and C are provided in Table 3.
Case 1 considers a situation in which the total amount of ammunition is equal to the number of tasks. However, in actual combat it is possible that the number of tasks is more or less than the amount of ammunition.

6.1.2. Case 2: Total Amount of Ammunition < Total Number of Tasks

In this section, we analyze a case in which four UAVs attack twenty targets. For convenience of calculation, it is assumed that each UAV has the same amount of ammunition n i = 4 ( i I 4 ) . At the same time, in order to simplify the description, the parameter information of multiple UAVs carrying out attacking tasks on the first eight targets takes the values in Table 1 and Table 2. When U i ( i I 4 ) attacks T j ( j { 9 , 10 , , 20 } ) , the probability P i j of U i being destroyed, the probability K i j of T j being destroyed, and the value of T j ( j { 9 , 10 , , 20 } ) are provided in Table 4.
The obtained Pareto-optimal front is shown in Figure 7. It can be seen that the non-dominated solutions are evenly distributed and the population diversity is good. Figure 8 shows the changes of the maximum value of f 2 and the minimum value of f 1 in each iteration over the course of the entire iteration when n i = 4 ( i I 4 ) . It can be seen that as the evolutionary algebra increases, the values of the two functions converge.
The process of selecting solutions from the Pareto solution set using the selection strategy is as follows. Let S : = { S 0 , S 1 , , S 44 } represent the result obtained in Step 4 of Algorithm 2, where S i = α 1 F 1 i + α 2 F 2 i , F 1 i = f 1 i , F 2 i = f 2 i ( i I ¯ 44 ) , α 1 , and α 2 represent the weights and ( F 1 i , F 2 i ) represents the i-th non-dominated solution in the Pareto-optimal front. Based on this example and the description of weights in Section 4, the rules for setting the values of α i ( i I 2 ) are as follows:
  • If c 1 > c 2 , then α 1 ( 0.5 , 1 ] .
  • If c 1 = c 2 , then α 1 = α 2 = 0.5 .
  • If c 1 < c 2 , then α 1 [ 0 , 0.5 ) .
For the Pareto-optimal front shown in Figure 7, the solutions from the upper left corner to the lower right corner are the 0th to the 44th non-dominated solutions. In this example, the objective function values are not normalized because the dimensions of f 1 and f 2 are the same, and the order of magnitude of the values of f 1 and f 2 is the same at 2.62 f 1 7.71 and 0.78 f 2 3.81 , respectively. Assuming the weights α 1 = 0.5 , α 2 = 0.5 , the results obtained by selection strategy are shown in Table 5.
As can be seen from Table 5, the sixth and seventh non-dominated solutions on the Pareto-optimal front are the best choices, while the 44th non-dominated solution is the worst choice. For the sake of simplifying the description, only the non-dominated solution information and the specific task assignment corresponding to the first five choices are shown. The positions of the five solutions are shown in Figure 7, and the corresponding specific task assignments are shown in Table 6.
The above description represents the process of selecting solutions of the multi-objective task assignment problem containing two objective functions. For general multi-objective optimization problems, the process of selecting solutions from the Pareto-optimal front is similar to the above process, and the values of weights are set according to the rules in Section 4.
Let M U i ( i I N U ) denote the task set of UAV U i . According to the meaning of chromosomes, the task assignment information corresponding to the five non-dominated solutions in Table 6 is provided in Table 7.

6.1.3. Case 3: Total Amount of Ammunition > Total Number of Tasks

In this section, a large-scale task assignment example of 15 UAVs attacking 100 targets is considered. The ammunition capacity of each UAV is n i = 7 ( i I 15 ) , and the upper limit of each target being attacked is m j = 1 ( j I 100 ) . Considering the length of the paper, the values of parameters V T j , W U i , P i j , and K i j ( i I 15 , j I 100 ) are not provided. The values of these parameters can be downloaded from the website (accessed on 14 September 2022) https://github.com/gaoxh-github/Values-of-parameters. In Algorithm 1, the values of the parameters are as follows: N = 100 , G = 200 , P c = 0.8 , P m = 0.2 . The obtained Pareto-optimal front is shown in Figure 9. The average time for this scale of experiment is about 60 min.
Algorithm 2 is used to select the solution from the Pareto solution set in Figure 9. In Algorithm 2, the values of weights α 1 and α 2 are α 1 = α 2 = 0.5 . The obtained results are shown in Table 8. It can be seen from Table 8 that the 53rd non-dominated solution should be selected. The information of the 53rd non-dominated solution is shown in Figure 9 and the task assignment scheme of the 53rd non-dominated solution is shown in Table 9.
To further verify the effectiveness of the proposed task assignment algorithm combined with the solution selection strategy, in this section we compare the algorithms developed in this paper with the well-developed Gurobi optimization solver. There are three methods for solving multi-objective optimization problems in the Gurobi solver, namely, Blend, Hierarchical, and a combination of these two methods. In this paper, after obtaining the Pareto front of the task assignment problem using Algorithm 1, the decision-maker can be assisted in selecting a solution from the set of non-dominated solutions based on Algorithm 2, which is constructed based on the weights. Considering the idea behind the construction of Algorithm 2, we compared Algorithm 1 and Algorithm 2 with the Blend method in Gurobi in order to better reflect the comparison results. The comparison process is as follows. First, given nine different sets of weights, the solution of the example provided in this section is solved for each set of weights using Blend in Gurobi. Second, the Pareto front of the example is solved using Algorithm 1, then the solution is selected from the Pareto front under each set of weights using Algorithm 2. Finally, the solutions obtained by the two methods are compared for each case of weights. Table 10 shows the results of the comparison between Gurobi and the algorithms in this paper under nine sets of weights. As can be seen in Table 10, for each set of weights, the solutions developed this paper and those obtained by Gurobi are not dominated by each other, i.e., both are non-dominated solutions of the problem. Although it cannot be proven that the algorithms in this paper are better than the Gurobi solver, it can be seen that the proposed algorithms are not inferior to Gurobi in terms of solution quality.

6.2. Test of the CNP-Based Task Re-Assignment Algorithm

6.2.1. Case 1: A Small-Scale Scenario Involving the Task Re-Assignment Problem

In order to introduce the specific steps of Algorithm 3 in detail, the process of task re-assignment is explained based on the sixth non-dominated solution selected in Section 6.1.2. Suppose that four new targets T i ( i { 21 , 22 , 23 , 24 } ) are found on the battlefield. The probability of UAVs successfully attacking these targets, the probability of UAVs being destroyed, and the values of these new targets are shown in Table 11. In Algorithm 3, the value of the parameter G i c is 10 and α 1 = α 2 = 0.5 .
Targets T i ( i { 21 , 22 , 23 , 24 } ) are assigned using Algorithm 3; the bidding process is shown in Table 12. The results of task re-assignment are shown in Figure 10, where Figure 10a shows the results for the initial assignment and Figure 10b the results for task re-assignment in emergencies. From Figure 10 and Table 12, the following can be determined. The winning agents of T 21 and T 22 are U 4 and U 2 , respectively, and the contracts of U 4 and U 2 are all sales contracts. The winning agents of T 23 and T 24 are U 3 and U 2 , respectively, and the contracts of U 3 and U 2 are all interchange contracts. In the contract of U 3 and U 2 , the replaced targets are T 2 and T 22 , respectively, while in the bidding processes of T 2 and T 22 , no UAV bids for T 2 or T 22 .

6.2.2. Case 2: A Large-Scale Scenario involving the Task Re-Assignment Problem

The primary advantage of the CNP-based method is that it can shorten the time requried for task assignment. The effectiveness of this method can be fully reflected in large-scale calculation examples. In a large-scale problem, to assign all the current tasks again takes a lot of time. However, if only new tasks are assigned using the CNP-based method, a large amount of time can be saved. In this section, the large-scale calculation example in Section 6.1.3 is used to discuss the effectiveness of the task re-assignment method in emergencies.
Suppose that ten new targets are found. The values of the parameters V T j , P i j , K i j ( i I 15 , j { 101 , 102 , , 110 } ) of the new targets can be downloaded from the website (accessed on 14 September 2022) https://github.com/gaoxh-github/Values-of-parameters. In Algorithm 3, the value of the parameter G i c is 50. The results of the assignment of ten new targets based on the original assignment results are shown in Table 13. It can be seen from Table 13 that the task sets of UAVs U 4 , U 6 , U 11 , and U 14 have changed. The task assignment results obtained using Algorithms 1 and 2 to assign all 110 targets are shown in Table 14. Through calculation, the values of S 1 corresponding to the task assignment schemes in Table 13 and Table 14 are 8.91 and 9.42 , respectively. The performance of the assignment scheme obtained using Algorithms 1 and 2 to assign all tasks is better than the performance of the assignment scheme obtained using Algorithm 3 to assign new tasks. However, the calculation time of Algorithm 3 is lower than that of Algorithm 1 combined with Algorithm 2. Figure 11 shows the time of ten task re-assignment experiments under these two assignment methods. It can be seen from Figure 11 that Algorithm 3 requires less time to solve the problem of task re-assignment in emergencies than Algorithm 1 combined with Algorithm 2. Therefore, in emergency situations, Algorithm 3 can perform real-time task re-assignment by slightly sacrificing the ability to seek global optimization.

6.2.3. Case 3: Attempting to Solve the Task Assignment Problem Directly Using the CNP-Based Method

Considering that Algorithm 3 can quickly solve the task re-assignment problem, it may be possible to use this algorithm directly to solve the task assignment problem. An analysis of this problem is provided in this section. In the task assignment problem before the battle, the main goal of assignment is to find an assignment plan that achieves better performance. Taking the 15 UAVs attacking 100 targets in Section 6.1.3 as an example. Let α 1 = α 2 = 0.5 , the calculation time of Algorithm 3 is about 1 s. The task assignment plan obtained using the CNP-based algorithm is shown in Table 15. The values of S 1 corresponding to the task assignment schemes in Table 9 and Table 15 are 8.75 and 5.189 , respectively. Obviously, the calculation result of the improved multi-objective genetic algorithm combined with selection strategy is much better than the calculation result of the CNP-based method. For the task assignment problem, the CNP-based method is much faster than the improved multi-objective genetic algorithm combined with selection strategy. However, the result obtained by the improved multi-objective genetic algorithm combined with selection strategy is much better than the result obtained by the CNP-based algorithm. Therefore, according to the above analysis, Algorithms 1 and 2 should be used in the task assignment phase with high requirements for the performance of the task assignment scheme, and Algorithm 3 should be used in the task re-assignment phase in emergencies with high requirements related to assignment time.

7. Conclusions

In this paper, we have provided a unified multi-objective optimization framework for the cooperative task assignment and re-assignment of multiple UAVs. First, we propose a multi-objective optimization problem in which the minimization of the cost and the maximization of the benefits are regarded as the objectives. To solve the problem, a multi-objective genetic algorithm suitable for UAV cooperative task assignment is proposed and the encoding format and genetic operators in the proposed algorithm are specially designed. Then, we provide a selection strategy to facilitate the choice of an operation plan from the Pareto solution set by the decision-maker. Finally, taking into account the possible emergencies in the complex combat environment, the task re-assignment problem in emergencies before the battle is studied and a task re-assignment algorithm based on a contract network protocol is proposed. Simulation examples are used to verify the effectiveness of the proposed algorithms.
When the battlefield environment is more complex, a single target may contain multiple different tasks. For multiple types of tasks, heterogeneous UAVs have higher efficiency in performing their tasks compared to homogeneous UAVs. At the same time, there may be multiple obstacles in the environment that affect UAV flight. In addition, it is important to study the performance of the algorithm. Therefore, in our next work we intend to focus on the performance of the algorithm and task assignment of heterogeneous UAVs in complex environments containing obstacles.

Author Contributions

Data curation, Y.D.; Funding acquisition, L.W. and X.W.; Investigation, X.S. and Y.D.; Methodology, X.G., L.W., C.W. and X.W.; Project administration, L.W. and X.W.; Resources, C.L., C.W. and X.W.; Supervision, C.L., Y.D., C.W. and H.P.; Validation, X.S.; Writing—original draft, X.G.; Writing—review and editing, X.G. and X.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key Research and Development Plan (2021YFB3302501); the National Natural Science Foundation of China (12102077); and the Fundamental Research Funds for the Central Universities (DUT22LAB305, DUT22RC(3)010).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Contact the first/corresponding author please.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Newcome, L.R. Unmanned Aviation: A Brief History of Unmanned Aerial Vehicles; Library of Flight Series; AIAA: Reston, VA, USA, 2004. [Google Scholar] [CrossRef] [Green Version]
  2. Sarris, Z. Survey of UAV applications in civil markets (June 2001). In Proceedings of the IEEE Mediterranean Conference on Control and Automation, Dubrovnik, Croatia, June 2001; Available online: https://www.researchgate.net/publication/229091536_Survey_of_UAV_applications_in_civil_markets_June_2001 (accessed on 14 September 2022).
  3. Nonami, K.; Kendoul, F.; Suzuki, S.; Wang, W.; Nakazawa, D. Autonomous Flying Robots: Unmanned Aerial Vehicles and Micro Aerial Vehicles; Springer: Tokyo, Japan, 2010; Available online: https://dl.acm.org/doi/abs/10.5555/1941802 (accessed on 14 September 2022).
  4. Qu, X.B.; Zhang, W.G.; Wang, X.G. Research of UAVs’ attack strategy under uncertain condition. Flight Dyn. 2015, 33, 381–384. Available online: http://en.cnki.com.cn/Article_en/CJFDTOTAL-FHLX201504021.htm (accessed on 14 September 2022).
  5. Máthé, K.; Busoniu, L. Vision and Control for UAVs: A Survey of General Methods and of Inexpensive Platforms for Infrastructure Inspection. Sensors 2015, 15, 14887–14916. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  6. Turner, I.L.; Harley, M.D.; Drummond, C.D. UAVs for coastal surveying. Coast. Eng. 2016, 114, 19–24. [Google Scholar] [CrossRef]
  7. Fu, X.; Feng, P.; Gao, X. Swarm UAVs Task and Resource Dynamic Assignment Algorithm Based on Task Sequence Mechanism. IEEE Access 2019, 7, 41090–41100. [Google Scholar] [CrossRef]
  8. Zhen, Z.; Xing, D.; Gao, C. Cooperative search-attack mission planning for multi-UAV based on intelligent self-organized algorithm. Aerosp. Sci. Technol. 2018, 76, 402–411. [Google Scholar] [CrossRef]
  9. Zhang, L.; Sun, J.; Guo, C.; Zhang, H. A Multi-swarm Competitive Algorithm Based on Dynamic Task Allocation Particle Swarm Optimization. Arab. J. Sci. Eng. 2018, 43, 8255–8274. [Google Scholar] [CrossRef]
  10. Issac, T.; Silas, S.; Rajsingh, E.B. Prototyping a Scalable P-system-Inspired Dynamic Task Assignment Algorithm for a Centralized Heterogeneous Wireless Sensor Network. Arab. J. Sci. Eng. 2020, 45, 10353–10380. [Google Scholar] [CrossRef]
  11. Takahashi, M.; Kita, H. A crossover operator using independent component analysis for real-coded genetic algorithms. In Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No. 01TH8546), Seoul, Korea, 27–30 May 2001; Volume 1, pp. 643–649. [Google Scholar] [CrossRef]
  12. Wang, Z.Y.; Wang, B.; Wei, Y.L.; Liu, P.F.; Zhang, L. Cooperative multi-task assignment of multiple UAVs with improved genetic algorithm based on beetle antennae search. In Proceedings of the 2020 39th Chinese Control Conference, Shenyang, China, 27–29 July 2020; pp. 1065–1610. [Google Scholar] [CrossRef]
  13. Venugopalan, T.K.; Subramanian, K.; Sundaram, S. Multi-UAV task allocation: A team-based approach. In Proceedings of the 2015 IEEE Symposium Series on Computational Intelligence, Cape Town, South Africa, 7–10 December 2015; pp. 45–50. [Google Scholar] [CrossRef]
  14. Velhal, S.; Sundaram, S. Restricted airspace protection using multi-UAV spatio-temporal multi-task allocation. arXiv 2020, arXiv:2011.11247. [Google Scholar]
  15. Afghah, F.; Zaeri-Amirani, M.; Razi, A.; Chakareski, J.; Bentley, E. A coalition formation approach to coordinated task allocation in heterogeneous UAV networks. In Proceedings of the 2018 Annual American Control Conference, Milwaukee, WI, USA, 27–29 June 2018; pp. 5968–5975. [Google Scholar] [CrossRef] [Green Version]
  16. Schwarzrock, J.; Zacarias, I.; Bazzan, A.L.; Fernandes, R.Q.D.A.; Moreira, L.H.; de Freitas, E.P. Solving task allocation problem in multi Unmanned Aerial Vehicles systems using Swarm intelligence. Eng. Appl. Artif. Intell. 2018, 72, 10–20. [Google Scholar] [CrossRef]
  17. Ye, F.; Chen, J.; Tian, Y.; Jiang, T. Cooperative Multiple Task Assignment of Heterogeneous UAVs Using a Modified Genetic Algorithm with Multi-type-gene Chromosome Encoding Strategy. J. Intell. Robot. Syst. 2020, 100, 615–627. [Google Scholar] [CrossRef]
  18. Yan, F.; Zhu, X.; Zhou, Z.; Tang, Y. Real-time task allocation for a heterogeneous multi-UAV simultaneous attack. Sci. Sin. Inf. 2019, 49, 555–569. [Google Scholar] [CrossRef] [Green Version]
  19. Chen, Y.; Yang, D.; Yu, J. Multi-UAV Task Assignment With Parameter and Time-Sensitive Uncertainties Using Modified Two-Part Wolf Pack Search Algorithm. IEEE Trans. Aerosp. Electron. Syst. 2018, 54, 2853–2872. [Google Scholar] [CrossRef]
  20. Jia, Z.; Yu, J.; Ai, X.; Xu, X.; Yang, D. Cooperative multiple task assignment problem with stochastic velocities and time windows for heterogeneous unmanned aerial vehicles using a genetic algorithm. Aerosp. Sci. Technol. 2018, 76, 112–125. [Google Scholar] [CrossRef]
  21. Singh, M.K.; Choudhary, A.; Gulia, S.; Verma, A. Multi-objective NSGA-II optimization framework for UAV path planning in an UAV-assisted WSN. J. Supercomput. 2022, 1–35. [Google Scholar] [CrossRef]
  22. Zhu, J.; Wang, X.; Huang, H.; Cheng, S.; Wu, M. A NSGA-II Algorithm for Task Scheduling in UAV-Enabled MEC System. IEEE Trans. Intell. Transp. Syst. 2021, 23, 9414–9429. [Google Scholar] [CrossRef]
  23. Cheng, C.; Wu, X.Q.; Liu, M.; Chen, M. Research on task allocation for UCAVs cooperatively attacking multiple targets. J. Jilin Univ. (Inf. Sci. Ed.) 2012, 30, 609–615. [Google Scholar]
  24. Ramirez-Atencia, C.; Bello-Orgaz, G.; R-Moreno, M.; Camacho, D. Solving complex multi-UAV mission planning problems using multi-objective genetic algorithms. Soft Comput. 2016, 21, 4883–4900. [Google Scholar] [CrossRef]
  25. Ramirez-Atencia, C.; Camacho, D. Constrained multi-objective optimization for multi-UAV planning. J. Ambient. Intell. Humaniz. Comput. 2019, 10, 2467–2484. [Google Scholar] [CrossRef]
  26. Chen, H.-X.; Nan, Y.; Yang, Y. Multi-UAV Reconnaissance Task Assignment for Heterogeneous Targets Based on Modified Symbiotic Organisms Search Algorithm. Sensors 2019, 19, 734. [Google Scholar] [CrossRef] [Green Version]
  27. Wang, J.-F.; Jia, G.-W.; Lin, J.-C.; Hou, Z.-X. Cooperative task allocation for heterogeneous multi-UAV using multi-objective optimization algorithm. J. Central South Univ. 2020, 27, 432–448. [Google Scholar] [CrossRef]
  28. Pohl, A.J.; Lamont, G.B. Multi-objective UAV mission planning using evolutionary computation. In Proceedings of the 2008 Winter Simulation Conference, Miami, FL, USA, 7–10 December 2008; pp. 1268–1279. [Google Scholar] [CrossRef]
  29. Phiboon, T.; Khankwa, K.; Petcharat, N.; Phoksombat, N.; Kanazaki, M.; Kishi, Y.; Bureerat, S.; Ariyarit, A. Experiment and computation multi-fidelity multi-objective airfoil design optimization of fixed-wing UAV. J. Mech. Sci. Technol. 2021, 35, 4065–4072. [Google Scholar] [CrossRef]
  30. Smith, R.G. The contract net protocol: High-level communication and control in a distributed problem solver. IEEE Trans. Comput. 1980, 29, 1104–1113. [Google Scholar] [CrossRef]
  31. Zhen, Z.; Wen, L.; Wang, B.; Hu, Z.; Zhang, D. Improved contract network protocol algorithm based cooperative target allocation of heterogeneous UAV swarm. Aerosp. Sci. Technol. 2021, 119, 107054. [Google Scholar] [CrossRef]
  32. Zhang, K.W.; Zhao, X.L.; Li, Z.Z.; Zhao, B.X.; Xiao, Z.H. Real-time reconnaissance task assignment of multi-UAV based on improved contract network. In Proceedings of the 2020 International Conference on Artificial Intelligence and Computer Engineering, Beijing, China, 23–25 October 2020. [Google Scholar] [CrossRef]
  33. Xiang, J.Q.; Dong, X.W.; Li, Q.D.; Ren, Z. Cooperation target assignment of missiles based on multi-agent technique and improved contract net protocol. In Proceedings of the 2018 IEEE CSAA Guidance, Navigation and Control Conference, Xiamen, China, 10–12 August 2018. [Google Scholar] [CrossRef]
  34. Deb, K.; Pratap, A.; Agarwal, S.; Meyarivan, T. A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 2002, 6, 182–197. [Google Scholar] [CrossRef]
Figure 1. Assignment of tasks and the chromosome encoding method.
Figure 1. Assignment of tasks and the chromosome encoding method.
Mathematics 10 04241 g001
Figure 2. Example of crossover operator.
Figure 2. Example of crossover operator.
Mathematics 10 04241 g002
Figure 3. The flowchart of task assignment.
Figure 3. The flowchart of task assignment.
Mathematics 10 04241 g003
Figure 4. The flowchart of task re-assignment.
Figure 4. The flowchart of task re-assignment.
Mathematics 10 04241 g004
Figure 5. Comparison of results.
Figure 5. Comparison of results.
Mathematics 10 04241 g005
Figure 6. Convergence curves of objective functions for case 1.
Figure 6. Convergence curves of objective functions for case 1.
Mathematics 10 04241 g006
Figure 7. Pareto-optimal front of case 2.
Figure 7. Pareto-optimal front of case 2.
Mathematics 10 04241 g007
Figure 8. Convergence curves of objective functions for case 2.
Figure 8. Convergence curves of objective functions for case 2.
Mathematics 10 04241 g008
Figure 9. Pareto-optimal front of case 3.
Figure 9. Pareto-optimal front of case 3.
Mathematics 10 04241 g009
Figure 10. Results of initial task assignment and task re-assignment in emergencies.
Figure 10. Results of initial task assignment and task re-assignment in emergencies.
Mathematics 10 04241 g010
Figure 11. CPU runtime required for the task re-assignment process. (a) Algorithm 1 combined with Algorithm 2. (b) Algorithm 3.
Figure 11. CPU runtime required for the task re-assignment process. (a) Algorithm 1 combined with Algorithm 2. (b) Algorithm 3.
Mathematics 10 04241 g011
Table 1. Probabilities of UAVs and targets being destroyed.
Table 1. Probabilities of UAVs and targets being destroyed.
T1T2T3T4T5T6T7T8
U 1 P 1 j 0.160.650.140.160.440.140.350.25
K 1 j 0.50.80.30.40.50.60.60.7
U 2 P 2 j 0.140.160.440.140.650.160.450.35
K 2 j 0.80.40.40.80.70.60.80.6
U 3 P 3 j 0.440.140.160.160.140.650.350.18
K 3 j 0.60.50.80.30.80.30.70.7
U 4 P 4 j 0.650.140.160.440.080.160.550.48
K 4 j 0.60.40.20.30.30.60.50.6
Table 2. Values of UAVs and targets.
Table 2. Values of UAVs and targets.
Target T 1 T 2 T 3 T 4 T 5 T 6 T 7 T 8
Value0.620.650.680.70.730.780.810.85
UAV U 1 U 2 U 3 U 4
Value0.81.10.91.3
Table 3. Specific task assignment of non-dominated solutions A, B, C.
Table 3. Specific task assignment of non-dominated solutions A, B, C.
ABC
x000000110000000100000100
100100001001000010010000
001010000010100001000001
010001000000010000001000
Table 4. Probabilities of UAVs and targets being destroyed and target values.
Table 4. Probabilities of UAVs and targets being destroyed and target values.
T9T10T11T12T13T14T15T16T17T18T19T20
U 1 P 1 j 0.210.150.320.180.460.230.550.140.350.160.260.25
K 1 j 0.70.60.50.60.40.60.40.30.30.80.30.7
U 2 P 2 j 0.300.240.510.440.440.300.420.150.160.180.080.48
K 2 j 0.60.70.70.30.30.50.30.50.30.70.30.6
U 3 P 3 j 0.530.160.440.680.140.250.500.480.140.090.130.60
K 3 j 0.70.40.60.50.30.50.40.60.30.80.40.8
U 4 P 4 j 0.650.300.420.080.500.180.480.150.160.200.150.60
K 4 j 0.70.60.60.70.40.70.60.50.40.80.40.8
Targetvalue0.720.780.620.650.760.880.630.70.680.820.750.81
Table 5. The order of selection of non-dominated solutions.
Table 5. The order of selection of non-dominated solutions.
S i −2.185−2.185−2.135−2.11−2.105−2.105−2.1−2.1−2.065−2.055−2.05−2.05
i6791038251113412
S i −2.01−1.99−1.99−1.98−1.975−1.97−1.95−1.94−1.925−1.915−1.9−1.86
i1151614171801920212223
S i −1.85−1.765−1.755−1.715−1.7−1.675−1.655−1.565−1.545−1.53−1.465−1.395
i242526272829303132333435
S i −1.37−1.355−1.355−1.34−1.105−1.09−1.08−0.935−0.92
i363738394041424344
Table 6. The information of the first five non-dominated solutions.
Table 6. The information of the first five non-dominated solutions.
( f 1 , f 2 ) x
6th(−6.84, 2.47)00000001111000000000
10010100000000000000
01101010000000000000
00000000000101010000
7th(−6.68, 2.31)00000011110000000000
10010100000000000000
01101000000010000000
00000000000101010000
9th(−6.45, 2.18)00000011110000000000
10010100000000000000
01101000000000000000
00000000000101010000
10th(−6.33, 2.11)00000011110000000000
10010100000000000000
01101000000010000000
00000000000101000000
3th(−7.32, 3.11)00000011110000000000
10010100000000000000
01101000000010000000
00000000000100000111
Table 7. The task assignment schemes of the solutions in Table 6.
Table 7. The task assignment schemes of the solutions in Table 6.
UAVTask Set UAVTask Set
6th U 1 M U 1 = { T 8 , T 9 , T 10 , T 11 } 7th U 1 M U 1 = { T 7 , T 8 , T 9 , T 10 }
U 2 M U 2 = { T 1 , T 4 , T 6 } U 2 M U 2 = { T 1 , T 4 , T 6 }
U 3 M U 3 = { T 2 , T 3 , T 5 , T 7 } U 3 M U 3 = { T 2 , T 3 , T 5 , T 13 }
U 4 M U 4 = { T 12 , T 14 , T 16 } U 4 M U 4 = { T 12 , T 14 , T 16 }
9th U 1 M U 1 = { T 7 , T 8 , T 9 , T 10 } 10th U 1 M U 1 = { T 7 , T 8 , T 9 , T 10 }
U 2 M U 2 = { T 1 , T 4 , T 6 } U 2 M U 2 = { T 1 , T 4 , T 6 }
U 3 M U 3 = { T 2 , T 3 , T 5 } U 3 M U 3 = { T 2 , T 3 , T 5 , T 13 }
U 4 M U 4 = { T 12 , T 14 , T 16 } U 4 M U 4 = { T 12 , T 14 }
3th U 1 M U 1 = { T 7 , T 8 , T 9 , T 10 }
U 2 M U 2 = { T 1 , T 4 , T 6 }
U 3 M U 3 = { T 2 , T 3 , T 5 , T 13 }
U 4 M U 4 = { T 12 , T 18 , T 19 , T 20 }
Table 8. The order of selecting non-dominated solutions.
Table 8. The order of selecting non-dominated solutions.
S i −8.75−8.56−8.555−8.55−8.54−8.525−8.515−8.51−8.46−8.44−8.375−8.355
i536454585557625659616051
S i −8.355−8.35−8.275−8.165−8.14−8.12−8.095−8.03−7.995−7.935−7.92−7.91
i654963486652685067467370
S i −7.88−7.87−7.865−7.83−7.78−7.745−7.745−7.715−7.715−7.665−7.655−7.62
i436972714774754445764238
S i −7.61−7.55−7.485−7.46−7.405−7.375−7.325−7.315−7.155−7.13−7.13−7.12
i393740774180787930263533
S i −7.045−7.04−7.025−6.995−6.975−6.95−6.915−6.81−6.805−6.775−6.605−6.56
i318132362927348382288485
S i −6.525−6.51−6.42−6.34−6.335−6.28−6.19−6.19−6.165−6.125−6.085−5.995
i258687242023228889211991
S i −5.965−5.85−5.815−5.675−5.605−5.58−5.57−5.53−5.52−5.48−5.06−5.02
i901892151417169394131011
S i −4.965−4.92−4.825−4.49−4.4−4.285−4.2−3.935−3.915−3.57−3.465
i129876432510
Table 9. Task assignment of the 53rd non-dominated solution in Figure 9.
Table 9. Task assignment of the 53rd non-dominated solution in Figure 9.
UAVTask SetUAVTask Set
U 1 M U 1 = { T 8 , T 27 , T 29 , T 41 , T 48 , T 96 , T 98 } U 2 M U 2 = { T 19 , T 44 , T 64 , T 65 , T 79 , T 86 }
U 3 M U 3 = { T 22 , T 24 , T 62 , T 80 , T 89 , T 91 } U 4 M U 4 = { T 16 , T 33 , T 43 , T 71 }
U 5 M U 5 = { T 34 } U 6 M U 6 = { T 3 , T 68 }
U 7 M U 7 = { T 10 , T 23 , T 78 , T 83 , T 85 } U 8 M U 8 = { T 21 , T 45 }
U 9 M U 9 = { T 5 , T 11 , T 32 , T 36 , T 54 , T 57 , T 75 } U 10 M U 10 = { T 7 , T 66 }
U 11 M U 11 = { T 73 } U 12 M U 12 = { T 13 , T 38 , T 74 , T 76 , T 77 , T 93 }
U 13 M U 13 = { T 6 , T 9 } U 14 M U 14 = { T 99 }
U 15 M U 15 = { T 28 , T 52 , T 55 , T 84 , T 88 }
Table 10. Comparison results of the proposed algorithms and the multi-objective method in Gurobi.
Table 10. Comparison results of the proposed algorithms and the multi-objective method in Gurobi.
Weight ( α 1 , α 2 ) ( 0.1 , 0.9 ) ( 0.2 , 0.8 ) ( 0.3 , 0.7 ) ( 0.4 , 0.6 ) ( 0.5 , 0.5 )
Gurobi ( f 1 , f 2 ) (−8.61, 0.02)(−8.61, 0.05)(−19.26, 3.22)(−19.26, 3.22)(−19.26, 3.22)
Algorithm 1 and 2(−15.01, 3.38)(−15.01, 3.38)(−20.27, 5.52)(−25.97, 8.85)(−30.06, 12.56)
Weight ( α 1 , α 2 ) ( 0.6 , 0.4 ) ( 0.7 , 0.3 ) ( 0.8 , 0.2 ) ( 0.9 , 0.1 )
Gurobi ( f 1 , f 2 ) (−19.26, 3.22)(−19.31, 3.32)(−19.38, 3.5)(−19.41, 3.68)
Algorithm 1 and 2(−40.73, 26.47)(−50.94, 44.01)(−50.94, 44.01)(−50.94, 44.01)
Table 11. Probabilities of UAVs and new targets being destroyed and the value of new targets.
Table 11. Probabilities of UAVs and new targets being destroyed and the value of new targets.
T 21 T 22 T 23 T 24 T 21 T 22 T 23 T 24
U 1 P 1 j 0.30.220.440.17 U 2 P 1 j 0.210.290.410.15
K 1 j 0.580.860.450.82 K 1 j 0.510.950.550.92
U 3 P 1 j 0.340.20.210.32 U 4 P 1 j 0.410.330.460.23
K 1 j 0.690.860.540.82 K 1 j 0.640.940.620.95
Targetvalue0.80.60.750.65
Table 12. The bidding process and results.
Table 12. The bidding process and results.
T 21 T 22 Winning contract
U 1 - - -
U 2 < 2 , 21 , 0 , 0.6385 > < 2 , 22 , 0 , 0.6755 > < 2 , 22 , 0 , 0.6755 >
U 3 < 3 , 21 , 2 , 0.0235 > < 3 , 22 , 2 , 0.0685 > -
U 4 < 4 , 21 , 0 , 0.6395 > - < 4 , 21 , 0 , 0.6395 >
T 23 T 24 Winning contract
T 2 T 22
U 1 -- < 1 , 24 , 11 , 0.001 > --
U 2 -- < 2 , 24 , 22 , 0.0455 > - < 2 , 24 , 22 , 0.0455 >
U 3 < 3 , 23 , 2 , 0.0085 > --- < 3 , 23 , 2 , 0.0085 >
U 4 ----
Table 13. Results of task re-assignment using Algorithm 3.
Table 13. Results of task re-assignment using Algorithm 3.
UAVTask SetUAVTask Set
U 1 M U 1 = { T 8 , T 27 , T 29 , T 41 , T 48 , T 96 , T 98 } U 2 M U 2 = { T 19 , T 44 , T 64 , T 65 , T 79 , T 86 }
U 3 M U 3 = { T 22 , T 24 , T 62 , T 80 , T 89 , T 91 } U 4 M U 4 = { T 16 , T 33 , T 43 , T 71 , T 103 , T 105 , T 106 }
U 5 M U 5 = { T 34 } U 6 M U 6 = { T 3 , T 68 , T 110 }
U 7 M U 7 = { T 10 , T 23 , T 78 , T 83 , T 85 } U 8 M U 8 = { T 21 , T 45 }
U 9 M U 9 = { T 5 , T 11 , T 32 , T 36 , T 54 , T 57 , T 75 } U 10 M U 10 = { T 7 , T 66 }
U 11 M U 11 = { T 73 , T 107 , T 109 } U 12 M U 12 = { T 13 , T 38 , T 74 , T 76 , T 77 , T 93 }
U 13 M U 13 = { T 6 , T 9 } U 14 M U 14 = { T 99 , T 101 , T 102 , T 104 , T 108 }
U 15 M U 15 = { T 28 , T 52 , T 55 , T 84 , T 88 }
Table 14. Results of task re-assignment using Algorithm 1 and Algorithm 2.
Table 14. Results of task re-assignment using Algorithm 1 and Algorithm 2.
UAVTask SetUAVTask Set
U 1 M U 1 = { T 3 , T 27 , T 106 } U 2 M U 2 = { T 108 }
U 3 M U 3 = { T 14 , T 38 , T 39 , T 79 , T 80 , T 94 } U 4 M U 4 = { T 44 , T 57 , T 77 , T 84 }
U 5 M U 5 = { T 8 } U 6 M U 6 = { T 22 }
U 7 M U 7 = { T 5 , T 9 , T 17 , T 34 , T 68 , T 74 , T 75 } U 8 M U 8 = { T 86 }
U 9 M U 9 = { T 11 , T 48 , T 65 , T 73 , T 98 } U 10 M U 10 = { T 40 , T 52 , T 69 }
U 11 M U 11 = { T 55 , T 66 , T 87 } U 12 M U 12 = { T 6 , T 21 , T 32 , T 76 , T 100 , T 101 , T 103 }
U 13 M U 13 = { T 24 , T 89 } U 14 M U 14 = { T 83 }
U 15 M U 15 = { T 1 , T 10 , T 33 , T 45 , T 78 , T 93 , T 99 }
Table 15. The result of Case 3 in Section 6.1.3 based on the CNP-based method.
Table 15. The result of Case 3 in Section 6.1.3 based on the CNP-based method.
UAVTask SetUAVTask Set
U 1 M U 1 = { T 33 , T 40 , T 48 , T 52 , T 55 , T 64 , T 65 } U 2 M U 2 = { T 72 , T 73 , T 75 , T 76 , T 77 , T 78 , T 79 }
U 3 M U 3 = { T 99 , T 100 } U 4 M U 4 = { T 5 , T 9 , T 10 , T 14 , T 16 , T 21 , T 22 }
U 5 M U 5 = { T 36 , T 44 , T 46 , T 53 , T 54 , T 60 , T 61 } U 6 M U 6 = { T 1 , T 6 , T 18 , T 24 , T 26 , T 29 , T 31 }
U 7 M U 7 = { T 74 , T 80 , T 82 , T 84 , T 85 , T 88 , T 96 } U 8 M U 8 = { T 2 , T 42 , T 49 , T 50 , T 58 , T 59 , T 69 }
U 9 M U 9 = { T 43 , T 51 , T 57 , T 62 , T 66 , T 68 , T 70 } U 10 M U 10 = { T 15 , T 17 , T 19 , T 20 , T 25 , T 30 , T 32 }
U 11 M U 11 = { T 23 , T 27 , T 28 , T 34 , T 35 , T 38 , T 39 } U 12 M U 12 = { T 81 , T 86 , T 87 , T 90 , T 91 , T 97 , T 98 }
U 13 M U 13 = { T 37 , T 41 , T 45 , T 47 , T 56 , T 63 , T 67 } U 14 M U 14 = { T 3 , T 4 , T 7 , T 8 , T 11 , T 12 , T 13 }
U 15 M U 15 = { T 71 , T 83 , T 89 , T 92 , T 93 , T 94 , T 95 }
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Gao, X.; Wang, L.; Su, X.; Lu, C.; Ding, Y.; Wang, C.; Peng, H.; Wang, X. A Unified Multi-Objective Optimization Framework for UAV Cooperative Task Assignment and Re-Assignment. Mathematics 2022, 10, 4241. https://doi.org/10.3390/math10224241

AMA Style

Gao X, Wang L, Su X, Lu C, Ding Y, Wang C, Peng H, Wang X. A Unified Multi-Objective Optimization Framework for UAV Cooperative Task Assignment and Re-Assignment. Mathematics. 2022; 10(22):4241. https://doi.org/10.3390/math10224241

Chicago/Turabian Style

Gao, Xiaohua, Lei Wang, Xichao Su, Chen Lu, Yu Ding, Chao Wang, Haijun Peng, and Xinwei Wang. 2022. "A Unified Multi-Objective Optimization Framework for UAV Cooperative Task Assignment and Re-Assignment" Mathematics 10, no. 22: 4241. https://doi.org/10.3390/math10224241

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop