Next Article in Journal
A Systematic Review of UAVs for Island Coastal Environment and Risk Monitoring: Towards a Resilience Assessment
Next Article in Special Issue
UAV Deployment Optimization for Secure Precise Wireless Transmission
Previous Article in Journal
TAN: A Transferable Adversarial Network for DNN-Based UAV SAR Automatic Target Recognition Models
Previous Article in Special Issue
A Distributed Collaborative Allocation Method of Reconnaissance and Strike Tasks for Heterogeneous UAVs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Adjustable Fully Adaptive Cross-Entropy Algorithms for Task Assignment of Multi-UAVs

1
School of Information Engineering, Wuhan University of Technology, Wuhan 430070, China
2
Department of Early Warning Intelligence, Air Force Early Warning Academy, Wuhan 430070, China
3
College of Intelligence Science and Technology, National University of Defense Technology, Changsha 410073, China
4
School of Navigation, Wuhan University of Technology, Wuhan 430070, China
*
Author to whom correspondence should be addressed.
Drones 2023, 7(3), 204; https://doi.org/10.3390/drones7030204
Submission received: 13 February 2023 / Revised: 5 March 2023 / Accepted: 13 March 2023 / Published: 16 March 2023
(This article belongs to the Special Issue Multi-UAV Networks)

Abstract

:
This paper investigates the multiple unmanned aerial vehicle (multi-UAV) cooperative task assignment problem. Specifically, we assign different types of UAVs to accomplish the classification, attack, and verification tasks of targets under resource, precedence, and timing constraints. Due to complex coupling among these tasks, we decompose the considered problem into two subproblems: one with continuous and independent tasks and another with continuous and correlative tasks. To solve them, we first present an adjustable, fully adaptive cross-entropy (AFACE) algorithm based on the cross-entropy (CE) method, which serves as a stepping stone for developing other algorithms. Secondly, to overcome task precedence in the first subproblem, we propose a mutually independent AFACE (MIAFACE) algorithm, which converges faster than the CE method when obtaining the optimal scheme vectors of these continuous and independent tasks. Thirdly, to deal with task coupling in the second subproblem, we present a mutually correlative AFACE (MCAFACE) algorithm to find the optimal scheme vectors of these continuous and correlative tasks, while its computational complexity is inferior to that of the MIAFACE algorithm. Finally, numerical simulations demonstrate that the proposed MIAFACE (MCAFACE, respectively) algorithm consumes less time than the existing algorithms for the continuous and independent (correlative, respectively) task assignment problem.

1. Introduction

Due to its rapid deployment and nearly unlimited mobility, an unmanned aerial vehicle (UAV) has great potential in both military and civilian applications, including modern warfare, disaster search and rescue, traffic control, celestial exploration, and a variety of other fields [1,2,3,4]. UAVs for these applications have limited capabilities and require sufficient resources to perform tasks autonomously. As a result, multi-UAVs can be regarded as a promising method by which to handle complex tasks. As more attention is focused on them, two problems in multi-UAV collaboration, such as multi-UAV cooperative path planning and cooperative task assignment, are becoming more widely recognized. The main consideration of this paper is the multi-UAV cooperative task assignment problem.
In recent years, many scholars have paid attention to the multi-UAV cooperative task assignment problem, while the related research of this problem is as follows. Chen et al. [5] utilized mixed integer linear programming (MILP) to address the problem of multi-UAV cooperative task assignment and path planning for moving targets on the ground, but it had low scalability while maintaining global optimality. References [6,7] used a heuristic approach to produce near-optimal results in real time, which has been widely considered for large-scale problems and dynamic scenarios. For swarm intelligence algorithms, e.g., particle swarm optimization (PSO) [8], ant colony optimization (ACO) [9], and genetic algorithm (GA) [10], when solving the task assignment problem, they had a fast convergence speed and could effectively obtain optimal assignment schemes, but there is a possibility of falling into local optimum. Moreover, the auction algorithm, game theory, and reinforcement learning have also been applied to the multi-UAV task assignment problem. Duan et al. [11] presented a novel hybrid “two-stage” auction algorithm that combines the structural advantages of the centralized and distributed auction algorithms, which greatly facilitates the performance of UAVs in dynamic task assignments. Chen et al. [12] studied the cooperative reconnaissance and spectrum access (CRSA) problem for task-driven heterogeneous coalition-based UAV networks, and proposed a joint bandwidth allocation and coalition formation (JBACF) algorithm to solve the task assignment and bandwidth allocation. Qie et al. [13] proposed an artificial intelligence method called simultaneous target assignment and path planning (STAPP) to solve the multi-UAV target assignment and path planning problem, and the effectiveness of the algorithm was experimentally verified. In addition, references [14,15,16,17,18,19,20,21] provide a variety of alternative algorithms for the solution of analogous problems.
Similarly, some novel works on task assignment, e.g., UAV-assisted task assignment, have been presented. Liu et al. [22] studied a UAV-assisted IoT system while presenting a nonconvex age-of-information (AoI) minimization problem, which was solved by jointly optimizing task assignment, interaction point selection (IPT), and UAV trajectories. Zhu et al. [23] considered the problem of task loss rate (TLR) fairness among IoTs and equal energy consumption (EC) fairness among UAVs, and proposed a multiagent deep deterministic policy gradient (MA-DDPG) method by which to assign UAVs to accomplish tasks and guarantee the balance between IoT TLR and UAV EC. Seid et al. [24] considered the assignment of UAVs to perform aerial base station tasks based on a multi-UAV-assisted IoT network framework, while presenting a joint optimization problem for computational offloading with energy harvesting (EH) and resource price, and the resource demands and pricing strategies between IoT devices and UAVs were continuously adjusted by the Stackelberg game. Hu et al. [25] considered the aging of cache refreshing, computation offloading, and state updates in UAV-assisted vehicle task awareness, and formulated a task-assignment energy-minimization problem that was solved by a deep deterministic policy gradient (DDPG) method. Zhou et al. [26] studied UAV-assisted mobile crowd sensing (MCS) scenarios and proposed a UAV-assisted multitasking assignment (UMA) method, while demonstrating the effectiveness of UMA. In addition, compared the UAV-assisted task assignment with the UAV task assignment, the difference is that UAVs play a secondary role in the former while serving as the primary reconnaissance and attack objects in the latter. Furthermore, the simulation scenarios in the paper are not consistent with the existing works (e.g., references [22,23,24,25,26]).
In the complex stochastic network, the cross-entropy (CE) method [27], a relatively new technique for dealing with combinatorial optimization problems, was initially utilized to estimate rare event probabilities. Then, references [28,29] discussed and analysed its convergence. Additionally, the cross-entropy (CE) method was proved by the authors in [30] to be particularly meaningful for handling combinatorial optimization problems. Since then, it has also been proven by many scholars to be a simple and effective tool for different fields, e.g., vehicle routing [31], buffer allocation [31], and machine learning [32]. In addition, researchers have also considered applying the cross-entropy (CE) method to the UAV task assignment [33,34,35]. However, the authors of these papers did not consider the specific precedence and timing constraints among these tasks.
When it comes to task-assignment schemes in the field of UAVs, some researchers usually assume that each UAV is assigned to only one target, and they rarely consider the execution sequence and the time constraints among tasks. On the other hand, multi-UAVs are sometimes needed to perform some complex combinatorial tasks, such as classifying the target, attacking it, and then verifying the target’s damage level in a reasonable time on the battlefield. In addition, such deterministic approaches may not be able to find the optimal solution in a reasonable time for large-scale task assignment problems. Under these circumstances, we present an adjustable fully adaptive cross-entropy (AFACE) algorithm based on CE method.
Therefore, the purpose of this paper is to study the AFACE algorithm for the multi-UAV cooperative task assignment problem under resource, precedence, and timing constraints. The main contributions are summed up as follows.
  • We consider the multi-UAV cooperative task assignment problem in which different types of UAVs are assigned to perform classification, attack and verification tasks of targets under resource, and precedence and timing constraints. Considering complex coupling among these tasks, we decompose the considered problem into two subproblems: one with continuous and independent tasks and another with continuous and correlative tasks.
  • We propose an AFACE algorithm, which changes the random sample and the quantile at each iteration and adds a parameter to adjust the maximum sample based on the CE method. Meanwhile, the algorithm serves as a stepping stone for developing other algorithms.
  • To overcome task precedence and task coupling existing in these two problems, respectively, we present a mutually independent AFACE (MIAFACE) algorithm and a mutually correlative AFACE (MCAFACE) algorithm with polynomial time complexity. The former algorithm converges faster than the CE method, while the computational complexity of the latter algorithm is inferior to that of the former algorithm.
  • Simulation results demonstrate that both MIAFACE and MCAFACE algorithms consume less time than other existing optimization algorithms for solving the corresponding problem.
The rest of this paper is organized as follows. In Section 2, we introduce the related works of the CE method and other algorithms for the UAV task assignment. Section 3 depicts the multi-UAV cooperative task assignment problem with its mathematical formulation. In Section 4, we decompose the considered problem into two subproblems, and propose an AFACE algorithm, a MIAFACE algorithm, and a MCAFACE algorithm, and apply the latter two algorithms to solving the corresponding problem. Section 5 conducts several simulations and comparisons to verify the feasibility and effectiveness of the proposed algorithms. This paper is concluded in Section 6.

2. Related Work

This section reviews the related works on CE method and other algorithms used for UAV task assignment.

2.1. CE Method Used for UAV Task Assignment

Due to CE’s merits, the authors of [33] first proposed using the CE method for tackling the multi-UAV task assignment problem to tackle the large traveling salesman problem (TSP), the vehicle routing problem (VRP), and Markov decision process (MDP). In particular, compared to other algorithms, CE could solve optimization problems efficiently because of its ability to deal with these problems with nonlinear objective functions. Three separate multi-UAV task assignment problems were then formulated, including a nonlinear objective function with distance penalty, a nonlinear objective function with no distance penalty, and nonlinear constraints. In these problems, the authors considered the distance penalty and required that each task must be assigned to at least one vehicle. Then, the task scores were considered as nonlinear functions, and the CE method was used to determine the optimal schemes for the functions of these problems. Finally, simulation results verified that the performance of the CE method was superior to other algorithms.
The authors in [34] considered the multi-UAV task assignment problem. Then, the score function of this problem was determined with the constraint that each UAV was used for only one task. Subsequently, the CE method was used to find the optimal scheme of this problem. Finally, simulation results showed that the CE method outperformed the Branch and Bound algorithm in solving the above problem, especially on a large scale.
Referring to [33,34], the authors in [35] described the multitype UAV task assignment problem. In this problem, different types of UAVs, or the same type of UAV as well as resource constraints, were considered. The authors then formulated the problem and provided a score function under resource constraints. Then, the CE method was used to determine the optimal scheme of this problem by assigning multitype UAVs to complete tasks. Finally, numerical simulations of the CE method for task assignment, as well as comparisons with the exhaust search method, were conducted to verify its merits in solving the considered problem.
In [36], the authors first analyzed the CE method, then redefined its construct and applied it to UAV swarms. Subsequently, due to the robustness of this method, it could be used as an effective measure to control UAV swarms in the face of obstacles and unforeseen problems. Finally, it was validated to support UAV swarms in achieving mission objectives.
The authors of [37] considered the multi-UAV task assignment problem under resource constraint and precedence constraint. The fully adaptive cross-entropy (FACE) algorithm based on the CE method was then applied to solve the considered problem. Then, simulation results verified that the FACE algorithm was better than the CE method and PSO algorithm in terms of convergence speed.

2.2. Other Algorithms Used for UAV Task Assignment

The authors in [8] improved the PSO algorithm with an inertia weight factor and applied it to handle the multi-UAV task assignment problem, then conducted several simulations and comparisons. Then, it was verified that the improved algorithm has a faster convergence speed and global optimization capability compared with the standard PSO algorithm.
In [38], the authors presented a novel hierarchical task assignment method to solve the multi-UAV task assignment problem, and the method was decomposed into two phases, including the hierarchical decomposition phase and the task assignment phase. The former phase reduced the computational complexity by using the balance cluster method to simplify the large-scale UAV model; the latter phase maintained the diversity of the population by an improved firefly algorithm. Then, simulations showed that compared with other algorithms, the proposed hierarchical method becomes more efficient in terms of search ability and convergence speed.
The authors in [39] defined the task assignment problem for cooperative multi-UAV road network reconnaissance and formulated a multi-UAV road network reconnaissance traveling salesman problem (MRRTSP) model. Furthermore, a customized genetic algorithm for road network reconnaissance (CGA-RNR) was proposed and used to solve the considered problem. Then, simulations showed that the algorithm can quickly obtain feasible solutions and converge to the optimal solution.

3. Problem Description and Formulation

The main parameters of this paper is shown in Table 1.

Problem Description

On the battlefield, multi-UAVs are deployed to perform different tasks, for example, to classify targets before attacking them, and then to verify them to check whether these tasks have been accomplished. The problem considered in this paper is the selection of a mix of the same type of UAV or different types of UAVs from their bases to perform the classification, attack and verification tasks of targets. As shown in Figure 1, there are N b types of UAVs with the same speed, and the related components of this problem can be defined as a 5-tuple { A , B , G , K , T } . In the 5-tuple, A : = { 1 , 2 , , N m } denotes the set of task index of targets, B : = { 1 , 2 , , N b } represents the set of N b bases, G : = { 1 , 2 , , N t } denotes the set of N t targets with known positions, K : = { K 1 , K 2 , , K N m } represents the set of N m tasks of targets, and T : = { T 1 , T 2 , , T N m } denotes the set of the execution time of N m tasks of targets. Note that the time required to allocate tasks is ignored.
Moreover, let x ( m ) = [ x 1 ( m ) , x 2 ( m ) , , x N t ( m ) ] T denote a feasible UAV deployment scheme vector, and define Y as the set of all feasible x ( m ) . Let Z : = { 1 , 2 , , L } be the set of all possible UAV deployment scheme indices. Thus, x ( m ) satisfies
g ( x j ( m ) ; k ) = 1 , i f ϕ ( x j ( m ) ) = k , j G , m A , k Z 0 , i f ϕ ( x j ( m ) ) k , x j ( m ) X ,
where j denotes the target index, m designates the task index, x j ( m ) is a feasible UAV deployment scheme or a UAV formation of task m of target j, k represents a UAV deployment scheme index or a UAV formation index, ϕ ( x j ( m ) ) is an index function that serves to output the subscript corresponding to x j ( m ) in X , and g ( x j ( m ) ; k ) is a 0–1 decision variable, i.e., the kth UAV formation is assigned to accomplish task m of target j.
Then, the total objective function ρ based on x ( m ) is defined as
ρ = m = 1 N m Ω ( x ( m ) ) = j = 1 N t ψ ( x j ( 2 ) ) m = 1 N m j = 1 N t φ ( x j ( m ) ) ,
where Ω ( x ( m ) ) is the subobjective function of task m, ψ ( x j ( 2 ) ) and φ ( x j ( m ) ) denote the reward benefit of the attack task and the cost of assigning x j ( m ) to accomplish tasks of target j, respectively, which are
ψ ( x j ( 2 ) ) = w 1 × P c × p k j × y j
φ ( x j ( m ) ) = w 2 × p s j × s j + w 3 × ( V × T m + d j ( m ) ) ,
where P c is the target identification certainty, y j represents the value of target j, s j denotes the threat level of target j, V is the constant velocity of each UAV, T m represents the execution time of task m, d j ( m ) denotes the farthest distance from the bases corresponding to UAV formation x j ( m ) to target j, w 1 , w 2 and w 3 represent weight coefficients, indicating the information about the relative importance of each subobjective, p k j denotes the probability of killing target j, and p s j is the UAV survival probability of accomplishing task m of target j.
In addition, p k j and p s j are defined as
p k j = a x j ( 2 ) p a j
p s j = 1 b x j ( m ) p b j ,
where a stands for a UAV in UAV formation x j ( 2 ) ; p a j is the probability of killing target j with UAV a, b represents a UAV in UAV formation x j ( m ) , and p b j is the UAV survival probability of accomplishing task m of target j with UAV b.
According to Equations (2)–(6), ρ is rewritten as
ρ = j = 1 N t w 1 × P c × p k j × y j m = 1 N m j = 1 N t [ w 2 × p s j × s j + w 3 × ( V × T m + d j ( m ) ) ] .
Then, our objective is to maximize ρ , and the considered problem can be formulated as
P : max x ( m ) Y ρ = m = 1 N m Ω ( x ( m ) )
s . t . w 1 + w 2 + w 3 = 1 , 0 w 1 , w 2 , w 3 1
d j ( m ) + V × T m D max j , m
K 1 j K 2 j K 3 j j .
Constraint (9) represents the range of w 1 , w 2 , and w 3 . Constraint (10) is that, for target j, the sum of d j ( m ) and the farthest flying distance performed by the UAV formation x j ( m ) does not exceed the maximum flying distance D max . Constraint (11) means that K 1 j , K 2 j , and K 3 j are the classification, attack, and verification tasks of the target j, which are executed in a specific order, and ≺ denotes the preceding symbol.
According to Equation (11), the specific precedence and timing constraints are equal to
t s 1 j s 1 , e 1 t s 1 j + T 1 t s 2 j s 2 , e 2 t s 2 j + T 2 t s 3 j s 3 , e 3 t s 3 j + T 3 ,
where [ s 1 , e 1 ] , [ s 2 , e 2 ] , and [ s 3 , e 3 ] represent the classification, attack, and verification time windows and t s 1 j , t s 2 j and t s 3 j denote the start time of classification, attack, and verification tasks of the target j, respectively.
Moreover, we set a certain value γ , which ensures that the optimal scheme vector x * ( m ) conforms to Ω ( x * ( m ) ) γ . After that, the maximum ρ * is written as
ρ * = m = 1 N m Ω ( x * ( m ) ) N m γ .
Therefore, to obtain x * ( m ) , we present an AFACE algorithm.

4. Algorithm Analysis

In this section, an AFACE algorithm will be introduced for the considered problem, and the differences between the algorithm and cross-entropy (CE) method are that the former changes the random sample N d t and the quantile θ t at each iteration t, and adds a parameter to adjust the maximum sample N max . For details, please refer to the analysis of the algorithm below.

4.1. Adjustable Fully Adaptive Cross-Entropy Algorithm

Referring to the principle of CE method in references [30,35] and maximizing the subobjective function Ω ( x ( m ) ) of the considered problem, we have
γ * = Ω ( x * ( m ) ) = max x ( m ) Y Ω ( x ( m ) ) ,
where γ * is the maximum of Ω ( x ( m ) ) on Y ; that is, the optimal scheme vector is x * ( m ) .
After that, transform this problem into a probability estimator problem, which can be explained by the probability density function (PDF) f ( · ; u ) with respect to u, and the problem can be written as
( γ ) = P u ( Ω ( x ( m ) ) γ ) = x ( m ) I { Ω ( x ( m ) ) γ } f ( x ( m ) ; u ) = E u I { Ω ( x ( m ) ) γ } ,
where γ denotes a value close to γ * , P u represents the probability measure under which the random vector x ( m ) has the PDF f ( · ; u ) , E u is the corresponding expectation operator, and I ( x ( m ) ; γ ) , i.e.,  I { Ω ( x ( m ) ) γ } , denotes the indicator function, which is
I ( · ; γ ) = 1 , i f Ω ( x ( m ) ) γ 0 , i f Ω ( x ( m ) ) < γ .
Then, at the tth iteration of AFACE algorithm, we obtain
Ω t , 1 Ω t , i Ω t , N d t ,
where Ω t , i ( i = 1 , 2 , , N d t ) denotes the ith sample performance, and Ω ( x i ( m ) ) ) and Ω t , N d t are defined by Ω t , i and Ω t * for convenience. Meanwhile, AFACE algorithm parameters N d t and θ t satisfy
N min N d t N max θ t = β m / N d t ,
where N d t denotes the random sample of the tth iteration, varying between N min and N max ( N min = N , N max = h N , h { 2 , 3 , 4 , 5 } ) and θ t represents the quantile of the tth iteration. The reason for presenting h is that by adjusting the size of N max , we can obtain the optimal N max that matches the combat scenario, which can be conducted by the following simulations in Section 5.
For the AFACE algorithm, the main idea is to update N d t and θ t based on the elite sample β m ( β m = c m N ), where c m and N are the elite sample influence coefficient of task m (usually 0.01 c m 0.1 ) and the fixed random sample, respectively. Therefore, the set of elite samples ε t ( ε t Y ) are comprised of such β m samples in { x 1 ( m ) , x 2 ( m ) , , x N d t ( m ) } with the highest performances Ω t , 1 , Ω t , 2 , , Ω t , N d t .
Next, referring to the formulas for solving γ ^ t and v ^ t of CE method [30], they are modified as
γ ^ t = Ω ( ( 1 θ t ) N d t )
v ^ t = arg max v x i ( m ) ε t ln f ( x i ( m ) ; v ) ,
where x i ( m ) is generated from f ( · ; u ) , f ( · ; v ) denotes another PDF with respect to v on Y via minimizing the Kullback–Leibler distance, γ ^ t is equal to the worst sample performance among the elite performances, while Ω t * is the best sample performance among the elite performances, and v ^ t converges to the probability density when Ω t * occurs.
Then, we devise a sampling scheme for each iteration t, ensuring high probability that
Ω t * > Ω t 1 * γ ^ t > γ ^ t 1 .
Moreover, we simultaneously generate two sequences to validate the correctness of AFACE algorithm. One is the levels γ ^ 1 , γ ^ 2 , , γ ^ t , and the other is the parameters v ^ 1 , v ^ 2 , , v ^ t . After that, the initialization process is set to v ^ 0 = u , and the quantile ( 1 θ t ) is calculated at the tth iteration according to Equation (18), followed by the next two steps of Algorithm 1.
In addition, the main steps of AFACE algorithm applied to solving the subobjective function Ω ( x ( m ) ) of the considered problem are given by Algorithm 2.
Algorithm 1 Adaptive updating of γ ^ t and v ^ t .
Adaptive updating of γ ^ t :
1:
Given a fixed v ^ t 1 at the tth iteration;
2:
Let γ t be a ( 1 θ t )-quantile of Ω ( x ( m ) ) under v ^ t 1 , then γ t satisfies P v ^ t 1 ( Ω ( x ( m ) ) γ t ) 1 θ t , where x ( m ) f · ; v ^ t 1 ;
3:
Obtain a simple estimator γ ^ t of γ t by drawing N d t random samples x 1 ( m ) , x 2 ( m ) , , x N d t ( m ) from f ( · ; v ^ t 1 ) ;
4:
Calculate and order all performances of Ω ( x ( m ) ) from smallest to biggest: Ω t , 1 Ω t , N d t ;
5:
Compute γ ^ t according to Equation (19);
Adaptive updating of v ^ t :
6:
Given a fixed γ ^ t and v ^ t 1 at the tth iteration, then derive v ^ t according to Equation (20).
Algorithm 2 AFACE algorithm.
Input:  v ^ 0 , h, N.
Output:  Ω t * .
1:
Set t = 1, N min = N and N max = h N ;
2:
while at the tth iteration ( t 1 ) do
3:
   if  t = 1  then
4:
     Generate N d t ( N d t = N min ) random samples x 1 ( m ) , x 2 ( m ) , , x N d t ( m ) from f ( · ; v ^ 0 ) ;
5:
     Calculate γ ^ t and v ^ t according to Equations (19) and (20);
6:
   else
7:
     Draw N d t ( N min N d t N max ) random samples x 1 ( m ) , x 2 ( m ) , , x N d t ( m ) from f ( · ; v ^ t 1 ) ;
8:
   end if
9:
   Update γ ^ t and v ^ t according to Algorithm 1, then calculate Ω t * ;
10:
   if Equation (21) occurs then
11:
     Set t = t + 1 and go to step 2;
12:
   else
13:
     Check whether or not Ω t * = = Ω t d * for some t d , e.g.,  d = 5 ;
14:
     if  Ω t * = = Ω t d *  then
15:
        Stop, obtain Ω t * and return Ω t * ;
16:
     else
17:
        Set t = t + 1 , take random integer N d t in [ N min , N max ] and go to step 2;
18:
     end if
19:
   end if
20:
end while

4.2. Adjustable Fully Adaptive Cross-Entropy Algorithm for Solving Problem

Considering complex coupling among the three tasks, we decompose the considered problem P into two subproblems: the problem P 1 with continuous and independent tasks and the problem P 2 with continuous and correlative tasks.
Before discussing the algorithm for solving problem P , we have to determine the number of the available schemes for each task. Please refer to Theorem 1 for the specific derivation process.
Theorem 1.
Assume that z 1 and N b = 3 , the number of the available schemes for each task of targets is L. Then, according to the mathematical formulas of permutation and combination, we can obtain
L = 3 z + z ( z 1 ) ( z + 7 ) 6 , z 1 .
Proof. 
Please see Appendix A.    □

4.2.1. Mutually Independent AFACE Algorithm for Solving Problem P 1

In problem P 1 , assume that there are N m continuous and mutually independent tasks for each target. Time continuity among these tasks then needs to be considered. Assume that there are L available schemes for each task, i.e., the scheme chosen by the previous task has no effect on the choice of the scheme for the next task, indicating that the available schemes among these tasks are independent. Thus, the problem P 1 is rewritten as
P 1 : max x ( m ) Y ρ = m = 1 N m Ω ( x ( m ) ) s . t . ( 9 ) ( 12 ) l m 1 = L m ,
where l m 1 is the available schemes when performing the mth task.
Considering time sequence and independence of the available schemes among these tasks, we present a MIAFACE algorithm, which is a combination of N m AFACE algorithms. For MIAFACE algorithm, we first introduce the probability matrix vector P = [ P ( 1 ) , P ( 2 ) , , P ( N m ) ] T and the performance vector Ω = [ Ω ( x ( 1 ) ) , Ω ( x ( 2 ) ) , , Ω ( x ( N m ) ) ] T , where P ( m ) and Ω ( x ( m ) ) are the probability matrix and the performance of task m, respectively. Then, P ( m ) is defined as
P ( m ) = p ( 1 | 1 , m ) p ( 2 | 1 , m ) p ( l m 1 | 1 , m ) p ( 1 | 2 , m ) p ( 2 | 2 , m ) p ( l m 1 | 2 , m ) p ( 1 | N t , m ) p ( 2 | N t , m ) p ( l m 1 | N t , m ) N t × l m 1 ,
where p ( k | j , m ) represents the probability of assigning the kth UAV formation to accomplish task m of target j and P ( m ) is subjected to k = 1 l m 1 p ( k | j , m ) = 1 .
Then, for the mth task, we initialize P 0 ( m ) = ( p 0 ( k | j , m ) ) N t × l m 1 with a uniform distribution. Let n j m 1 be the number of the feasible schemes of target j, and define p 0 ( k | j , m ) : = 1 n j m 1 as the element of P 0 ( m ) . After that, we set v ^ 0 = P 0 ( m ) .
At the tth iteration, we assume that the samples x 1 ( m ) , x 2 ( m ) , , x N d 1 t ( m ) are drawn from f ( x ( m ) ; v ^ t 1 ( m ) ) . In addition, we calculate the performances Ω t , i ( i = 1 , 2 , , N d 1 t ) , and order them from smallest to largest: Ω t , 1 Ω t , 2 Ω t , N d 1 t . It is noted that β m 1 is calculated by β m 1 = c m 1 N , and  γ ^ t is updated by Equation (20). After that, we compare Ω t , i with γ ^ t , and obtain all eligible performances greater than γ ^ t and merge them into a set S 1 : = { Ω ( t , ( 1 θ t ) N d 1 t ) , Ω ( t , ( 1 θ t ) N d 1 t + 1 ) , , Ω t , N d 1 t } , where β m 1 is the number of the element of S 1 , and Ω t * is the maximum element of S 1 . Then, p t ( k | j , m ) is calculated, and the specific derivation process can be seen in Theorem 2. Thus, P t ( m ) is the probability matrix composed of p t ( k | j , m ) , and  v ^ t is equal to P t ( m ) .
Theorem 2.
Assume that there are N m continuous and mutually independent tasks for each target. After that, N m tasks correspond to N m AFACE algorithms, which has an elite sample of β m 1 = c m 1 N . In the MIAFACE algorithm, c 1 is a combined vector of c m 1 , e.g.,  c 1 = [ c 1 1 , c 2 1 , , c N m 1 ] T . Thus, when performing the mth task, we can then obtain the updating formula of P ( m ) as follows:
p ( k | j , m ) = n = 1 c m 1 N g ( x j n ( m ) ; k ) c m 1 N k { 1 , , L } , n { 1 , , c m 1 N } , c m 1 c 1 .
Proof. 
Please see Appendix B.    □
Through the iterative updating of P ( m ) , the optimal probability matrix vector P * and the maximum performance vector Ω * are obtained. Then, the main steps of the MIAFACE algorithm applied to solving problem P 1 are described in Algorithm 3, and the convergence of the MIAFACE algorithm is similar to that of the CE method in  [40].
Algorithm 3 MIAFACE algorithm.
Input:  N m , l m 1 , N, h.
Output:  P * , Ω * .
1:
Set N min = N and N max = h N ;
2:
for m = 1 ; m < N m ; m + + do
3:
   Initialize P 0 ( m ) with a uniform distribution and define v ^ 0 = P 0 ( m ) , then set t = 1 ;
4:
   while at the tth iteration ( t 1 ) do
5:
     if  t = 1  then
6:
        Generate N d 1 t ( N d 1 t = N min ) random samples x 1 ( m ) , x 2 ( m ) , , x N d 1 t ( m ) from f ( · ; v ^ 0 ) ;
7:
     else
8:
        Draw N d 1 t ( N min N d 1 t N max ) random samples x 1 ( m ) , x 2 ( m ) , , x N d 1 t ( m ) from f ( · ; v ^ t 1 ) ;
9:
     end if
10:
     Update γ ^ t according to Equation (19) and calculate Ω t * ;
11:
     Calculate p t ( k | j , m ) by Equation (A14) in Appendix B;
12:
     if  k = 1 l m 1 p t ( k | j , m ) = 1 and p t ( k | j , m ) { 0 , 1 }  then
13:
        Stop, obtain P t * ( m ) and Ω t * , then P * ( m ) P t * ( m ) and Ω ( x * ( m ) ) Ω t * ;
14:
     else
15:
        Calculate P t ( m ) and update v ^ t by v ^ t = P t ( m ) ;
16:
        Set t = t + 1 , take random integer N d 1 t in [ N min , N max ] , then go to step 4;
17:
     end if
18:
   end while
19:
end for
20:
Return P * and Ω * .

4.2.2. Mutually Correlative AFACE Algorithm for Solving Problem P 2

In problem P 2 , assume that there are N m continuous and mutually correlative tasks for each target. Then, time continuity among these tasks also needs to be considered. Assume that when performing the mth task, there are only L m + 1 available schemes since m 1 schemes have been deleted before performing the mth task. It means that the available schemes among these tasks are correlative. Thus, the problem P 2 is rewritten as
P 2 : max x ( m ) Y ρ = m = 1 N m Ω ( x ( m ) ) s . t . ( ) ( ) l m 2 = L m + 1 m ,
where l m 2 is the remaining schemes when performing the mth task.
Considering time sequence and relevance of the available schemes among these tasks, we present a MCAFACE algorithm, which is also combined by N m AFACE algorithms. For the MCAFACE algorithm, we first introduce the probability matrix vector Q = [ Q ( 1 ) , Q ( 2 ) , , Q ( N m ) ] T and the performance vector Ω = [ Ω ( x ( 1 ) ) , Ω ( x ( 2 ) ) , , Ω ( x ( N m ) ) ] T , where Q ( m ) and Ω ( x ( m ) ) are the probability matrix and the performance of task m, respectively. Then, Q ( m ) is defined as
Q ( m ) = q ( 1 | 1 , m ) q ( 2 | 1 , m ) q ( l m 2 | 1 , m ) q ( 1 | 2 , m ) q ( 2 | 2 , m ) q ( l m 2 | 2 , m ) q ( 1 | N t , m ) q ( 2 | N t , m ) q ( l m 2 | N t , m ) N t × l m 2 ,
where q ( k | j , m ) represents the probability of assigning the kth UAV formation to accomplish task m of target j and Q ( m ) is subjected to k = 1 l m 2 q ( k | j , m ) = 1 .
Then, for the mth task, we initialize Q 0 ( m ) = ( q 0 ( k | j , m ) ) N t × l m 2 with a uniform distribution. Let n j m 2 be the number of the feasible schemes of target j and define q 0 ( k | j , m ) : = 1 n j m 2 as the element of Q 0 ( m ) . After that, we set v ^ 0 = Q 0 ( m ) .
At the tth iteration, we assume that the samples x 1 ( m ) , x 2 ( m ) , , x N d 2 t ( m ) are drawn from f ( x ( m ) ; v ^ t 1 ( m ) ) . In addition, we calculate the performances Ω t , i ( i = 1 , 2 , , N d 2 t ) , and order them from smallest to largest: Ω t , 1 Ω t , 2 Ω t , N d 2 t . It is noted that β m 2 is calculated by β m 2 = c m 2 N , and  γ ^ t is updated by (20). After that, we compare Ω t , i with γ ^ t , and obtain all eligible performances greater than γ ^ t and merge them into a set S 2 : = { Ω ( t , ( 1 θ t ) N d 2 t ) , Ω ( t , ( 1 θ t ) N d 2 t + 1 ) , , Ω t , N d 2 t } , where β m 2 is the number of the element of S 2 and Ω t * is the maximum element of S 2 . Then, q t ( k | j , m ) is calculated and the specific derivation process can be found in Theorem 3. Thus, Q t ( m ) is the probability matrix composed of q t ( k | j , m ) , and  v ^ t is equivalent to Q t ( m ) .
Theorem 3.
Assume that there are N m continuous and mutually correlative tasks for each target. After that, the selected scheme is required to be deleted after each task is accomplished. The other settings are the same as Theorem 2. Thus, when performing the mth task, we can obtain the updating formula of Q ( m ) , as follows:
q ( k | j , m ) = n = 1 c m 2 N g ( x j n ( m ) ; k ) c m 2 N k { 1 , , L m + 1 } , n { 1 , , c m 2 N } , c m 2 c 2 .
Proof. 
Please see Appendix C.    □
Through the iterative updating of Q ( m ) , the optimal probability matrix vector Q * and the maximum performance vector Ω * are obtained. Then, the main steps of the MCAFACE algorithm for dealing with problem P 2 are explained in Algorithm 4, and the convergence of the MCAFACE algorithm is also close to that of CE method in  [40].
Algorithm 4 MCAFACE algorithm.
Input:  N m , l m 2 , N, h.
Output: Q * , Ω * .
1:
Set N min = N and N max = h N ;
2:
for m = 1 ; m < N m ; m + + do
3:
   Initialize Q 0 ( m ) with a uniform distribution and define v ^ 0 = Q 0 ( m ) , then set t = 1 ;
4:
   while at the t-th iteration ( t 1 ) do
5:
     if  t = 1  then
6:
        Generate N d 2 t ( N d 2 t = N min ) random samples x 1 ( m ) , x 2 ( m ) , , x N d 2 t ( m ) from f ( · ; v ^ 0 ) ;
7:
     else
8:
        Draw N d 2 t ( N min N d 2 t N max ) random samples x 1 ( m ) , x 2 ( m ) , , x N d 2 t ( m ) from f ( · ; v ^ t 1 ) ;
9:
     end if
10:
     Update γ ^ t according to Equation (19) and calculate Ω t * ;
11:
     Calculate q t ( k | j , m ) by Equation (A15) in Appendix C;
12:
     if  k = 1 l m 2 q t ( k | j , m ) = 1 and q t ( k | j , m ) { 0 , 1 }  then
13:
        Stop, obtain Q t * ( m ) and Ω t * , then Q * ( m ) Q t * ( m ) and Ω ( x * ( m ) ) Ω t * ;
14:
     else
15:
        Calculate Q t ( m ) and update v ^ t by v ^ t = Q t ( m ) ;
16:
        Set t = t + 1 , take random integer N d 2 t in [ N min , N max ] , then go to step 4;
17:
     end if
18:
   end while
19:
end for
20:
Return Q * and Ω * .

4.3. Complexity Analysis of the MIAFACE Algorithm and the MCAFACE Algorithm

Let N m represent the number of tasks, n d denote the random sample to perform each task, n f represent the iteration number of AFACE algorithm to perform each task, N e denote the elite sample, N t represent the number of targets, and L denote the number of all possible UAV deployment schemes. The computational complexity of AFACE algorithm is divided into four parts: initialization C 1 , sample C 2 , sort C 3 , and update C 4 . Meanwhile, these parts can be defined as
C 1 = N t × L
C 2 = n f × n d
C 3 = n f × n d log n d
C 4 = n f × ( n d N e ) .
Specifically, the computational complexity of AFACE algorithm can be written as
C f = C 1 + C 2 + C 3 + C 4 = N t × L + n f × ( n d + n d log n d + n d N e ) .
Obviously, n f increases with the increment of ( N t × L ) , i.e., n f ( N t × L ) . Then, Equation (31) is rewritten as
C f = N t × L × ( 1 + n d + n d log n d + n d N e ) = N t × L × ( n d log n d + 2 n d N e + 1 ) ,
where n d log n d is greater than the other terms in the bracket on the right side of the equation. Thus, the time complexity of AFACE algorithm can be computed as O ( N t × L × n d log n d ) .
When the proposed algorithms are applied to accomplishing N m tasks of targets in problems P 1 and P 2 , respectively, according to Algorithm 3 and Equation (32), the computational complexity of MIAFACE algorithm is
C mi = N m × C f .
Thus, its time complexity is written as O ( N m × N t × L × n d log n d ) . However, based on Algorithm 4 and Equation (32), the computational complexity of the MCAFACE algorithm is
C mc = N t × ( L + L 1 + + L N m + 1 ) × ( n d log n d + 2 n d N e + 1 ) = N t × ( N m × L ( 1 + 2 + + N m 1 ) ) × ( n d log n d + 2 n d N e + 1 ) = N t × N m × ( L ( N m 1 ) 2 ) × ( n d log n d + 2 n d N e + 1 ) .
Since N m 3 , its time complexity is approximately equal to O ( N m × N t × ( L 1 ) × n d log n d ) .

5. Simulation and Analysis

In order to verify the effectiveness of the proposed algorithms, we compared these proposed algorithms with the CE method and other intelligent algorithms by applying them to the multi-UAV cooperative task assignment problem. The simulations were implemented in Pycharm Community’s 2019.1.1 x64 version of the programming environment on an Intel Core PC with 8 GB memory. The total cumulative reward that the UAV formations earn by successfully completing three tasks from all targets are used to measure the system performance.
On the basis of the above algorithms, various simulations were performed by assigning three types of UAVs located in the corresponding bases to accomplish three tasks of 20 targets in a 200 m × 200 m combat scenario. The position of each base and these targets are shown in Figure 2. Bases B1, B2, and B3 are located in (0,0), (0,200), and (200,0), respectively. The information of three types of UAVs and 20 target are given in Table 2 and Table 3, respectively, where a and b represent two types of resources, for example, the number of resources a and b needed for different types of UAVs or to accomplish different tasks, and also they have no units.
Referring to Theorem 1, we note that when z exceeds 3, these simulations are complicated. Thus, z is set to be 3, i.e., no more than 3 UAVs are needed to accomplish three tasks of targets in a specific order, and then the total number of each type of UAV is unrestricted. Then, each target in the following cases has 19 possible schemes, i.e., A, B, C, A A , A B , A C , B B , B C , C C , A A A , A A B , A A C , A B B , A C C , B B B , B B C , B C C , C C C , and A B C , respectively, and these schemes correspond to numbers from 1 to 19. After that, we can use a matching approach to quickly find the feasible schemes. The resources needed to accomplish three tasks of targets are randomly generated and satisfy the maximum cooperative number of UAVs.
In the following simulations, the notations used in the tables and the figures are displayed as
  • U resource represents the initial resources consumed by three types of UAVs;
  • T resource represents the resources consumed by three tasks; and
  • Time is CPU time in seconds for each case, and the time of each case is the average consumption time of running 100 times of each algorithm.
The parameters of the CE method, MIAFACE algorithm, MCAFACE algorithm, PSO algorithm, ACO algorithm, and GA algorithm are assumed to be set in Table 4, where the settings of the speed and maximum flying distance of the UAV are referred to [35] and they have no effect on the simulation results. For more detailed theory and parameter settings of CE, PSO, ACO, and GA (see [8,9,10,30,35,41]). For the targets in Table 3, there are two scenarios in the multi-UAV cooperative task assignment problem.
(1)
In scenario 1, we consider the first 10 targets or more similar targets. When performing the three tasks of each target, we obtain the identical optimal scheme vector of each task. Therefore, the situation in which each target has different tasks but each task has the same optimal scheme is called the problem with continuous and independent tasks.
(2)
In scenario 2, the last 10 targets or more similar targets are considered. When performing the three tasks of each target, we obtain the different optimal scheme vector of each task. Thus, the situation in which each target has different tasks and each task does not have the same optimal scheme is called the problem with continuous and correlative tasks.

5.1. Scenario 1

In case 1, we used the first 10 targets in Table 3 to perform continuous and independent tasks of problem P 1 , and the results are shown in Table 5.
According to Table 5, we note that the optimal scheme vector and the total result of CE and MIAFACE are identical, while that of MCAFACE is suboptimal to the other two algorithms. Moreover, we can obtain some observations. (i) For CE, the number of iterations and the optimal scheme vector are both 4 and [3,3,3,2,2,2,3,2,2,3], respectively, and the results of each task are −79.50, 274.90, and −79.50, and the sum of the results of each task is 115.9. The situations of MIAFACE are similar to CE, except that the number of iterations is 3. (ii) For MCAFACE, the numbers of iterations and the optimal scheme vectors are 3, 2, 1 and [3,3,3,2,2,2,3,2,2,3], [9,9,9,7,7,7,9,7,7,9], [18,18,18,15,15,15,18,15,15,18], respectively, and the results of each task are −79.50, 179.0, and −82.14, and the sum of the results of each task is 17.36. (iii) The total times of using CE, MIAFACE and MCAFACE are 3.36, 3.29, and 2.17, respectively.
In case 2, we tested the MIAFACE algorithm and MCAFACE algorithm under h and c 1 , and their times change with N t in Figure 3a–c and Figure 4a–c, respectively.
From Figure 3 and Figure 4, the curves of MIAFACE and MCAFACE both show an increasing trend as N t grows, and their times increase with the increment of c 1 and h. Meanwhile, the time differences between the curves gradually increase with the growth of N t in each figure. In Figure 3a, the curve with h = 2 is at the lowest of the four curves, while the curve with h = 5 is at the highest of the four curves. The remaining two curves are in the middle, and the curve with h = 4 is at the top and the other one is at the bottom. Moreover, the time ranges of the four curves are both approximately in [1,12]. In Figure 3b,c, their situations are described similarly to Figure 3a, and their time ranges are in [1,14] and [1,15], respectively. From Figure 4a, the order of the four curves is similar to Figure 3a. Moreover, their time ranges are both roughly in [0.3,10]. In Figure 4b,c, their situations are analogous to Figure 4a, and their time ranges are in [0.3,10] and [0.3,12], respectively.
In case 3, the CE method, PSO algorithm, ACO algorithm, and GA algorithm are both used three times for three tasks continuously. We compared them with MIAFACE algorithm by obtaining the same optimal score under h = 2 and c 1 , and their times change with N t in Figure 5a–c. Since MCAFACE algorithm obtains suboptimal results in scenario 1, it is not compared to other algorithms.
From Figure 5, we note that the curves of CE and MIAFACE grow linearly, while the curves of PSO, ACO, and GA increase exponentially. In addition, their times increase gradually with the increment of c 1 and N t . In Figure 5a, when N t is in [5,20], the time of MIAFACE is less than that of CE, and the time difference between the two algorithms grows as N t increases. Meanwhile, when N t is below 8, the times of PSO, ACO, and GA are lower than that of CE and MIAFACE, but when N t is more than 8, the situation is reversed. In addition, the time ranges of CE and MIAFACE are both approximately in [1,10], while the times of other algorithms are over 20 when N t is larger than 10. From Figure 5b,c, their situations are similar to Figure 5a, except that the time difference between CE and MIAFACE in Figure 5b is lower than that in Figure 5a, and the time difference in Figure 5c first decreases gradually to intersect at a point where N t is 10, then increases slowly with the increment of N t .

5.2. Scenario 2

In case 4, we utilized the last 10 targets in Table 3 to perform continuous and correlative tasks of problem P 2 , and the results are shown in Table 6.
According to Table 6, we note that the optimal scheme vectors and the total results of CE, MIAFACE, and MCAFACE are the same. The reason for this phenomenon is that for three tasks of the same 10 targets, the optimal scheme vectors are eventually obtained and identical by using the three algorithms, which leads to the same score of the total objective function; however, the consumption time by the different algorithms varies. Moreover, some observations are available. First, for CE, the number of iterations and the sum of each task’s result are 5 and 218.72, and the optimal solution vectors are [3,3,3,3,3,3,3,3,3,3], [9,9,9,7,7,7,9,7,7,9], [18,18,18,15,15,15,18,15,15,18], and the results of each task are −298.65, 819.85, and −302.48, respectively. Secondly, the situations using MIAFACE and MCAFACE are similar to that of CE, apart from the fact that the number of iterations in MIAFACE is 4 and the numbers of iterations in MCAFACE are 4, 4, and 3. Finally, the total times using CE, MIAFACE, and MCAFACE are 7.33, 7.11, and 6.9, respectively.
In case 5, we tested the MIAFACE algorithm and MCAFACE algorithm under h and c 2 , and their times change with N t in Figure 6a–c and Figure 7a–c, respectively.
From Figure 6 and Figure 7, the variations of the curves, the times and the time differences are both similar to Figure 3 and Figure 4, while in Figure 6a and Figure 7a, the time grows rapidly when N t is over 10. The reason is that the results of these two figures are suboptimal to others. In Figure 6a, the order of the curves is the same as that of each figure in Figure 3 and Figure 4. In addition, the time ranges of these four curves are both approximately in [1,50]. From Figure 6b,c, the situations are described similarly to that of Figure 6a and their time ranges are in [2,30] and [2,32], except that their results are the optimal results. In Figure 7, the situation of each figure is roughly similar to that of the corresponding figure in Figure 6, apart from the fact that the time range is lower than that in Figure 6.
In case 6, we compared the CE method, MIAFACE algorithm, MCAFACE algorithm, PSO algorithm, ACO algorithm, and GA algorithm by obtaining the same optimal score under h = 2 and c 2 , and their times change with N t in Figure 8a–c. The CE method, PSO algorithm, ACO algorithm, and GA algorithm are also used three times for three tasks continuously.
From Figure 8, we note that for CE, MIAFACE, MCAFACE, PSO, ACO, and GA, the variations of the curves and the times are similar to the case in Figure 5. In Figure 8a, when N t is below 11, the times of MIAFACE and MCAFACE are relatively close and less than that of CE; however, when N t is over 11, the times of MIAFACE and MCAFACE grow quickly and more than that of CE due to obtaining the suboptimal results. Moreover, the time ranges of CE, MIAFACE, and MCAFACE are both approximately in [1,30]. Meanwhile, the times of PSO, ACO, and GA are much higher than that of CE, MIAFACE, and MCAFACE, and their time ranges are over 30 when N t is more than 6. From Figure 8b,c, the situations of PSO, ACO, and GA are similar to Figure 8a. In Figure 8b, the time differences between CE, MIAFACE, and MCAFACE grow as N t increases. In addition, the time of MCAFACE is lower than that of CE and MIAFACE, and the curves of CE and MIAFACE intersect at N t = 8 and the time of CE is also lower than that of MIAFACE when N t is below 8, then the situation is reversed after N t exceeds 8. Moreover, the time ranges of CE, MIAFACE, and MCAFACE are both in [2,22]. In Figure 8c, the time differences between CE, MIAFACE, and MCAFACE decrease, and then increase as N t grows. Furthermore, the curves of CE, MIAFACE, and MCAFACE intersect at N t = 9 and the time of CE is lower than that of MIAFACE and MCAFACE when N t is below 9, then the situation is reversed after N t exceeds 9.

5.3. Analysis

Analysing the results of case 1 and case 4, we note that the optimal scheme vectors of using MIAFACE and MCAFACE algorithms in problems P 1 and P 2 , respectively, are obtained by initializing and updating the probability matrices P ( m ) and Q ( m ) , which conforms to Algorithms 3 and 4 described in Section 4.2. In addition, the result of MCAFACE in case 1 is suboptimal to that of other algorithms due to deleting the corresponding optimal solution after the end of each task.
Comprehensively considering the situations of case 2 and case 5, we note that the times of CE, MIAFACE, and MCAFACE increase with the increment of N t , h, as well as c and the time complexity of MCAFACE is lower than that of MIAFACE, and these phenomena comply with the complexity analysis of MIAFACE and MCAFACE in Section 4.3. In addition, the time of case 5 is superior to that of case 2 because there are more available solutions for each target in case 5 than in case 2 after each iteration. Meanwhile, in case 5, using MIAFACE and MCAFACE for solving this problem is easy to fall into local optimum when c is inferior to a certain vector, e.g., c = [ 0.01 , 0.02 , 0.03 ] . The reason behind this phenomenon is that when all elements in c are small and more solutions exist after each iteration, the optimal scheme may not be selected during one of the iterations of MIAFACE and MCAFACE, leading to a suboptimal result.
Comparing the situations of case 3 and case 6, we note that the times of PSO, ACO, and GA are only related to the growth of N t . Meanwhile, CE, MIAFACE, and MCAFACE are superior to PSO, ACO, and GA for large-scale allocation problems, e.g., more than 8 targets of case 3 and 5 targets of case 6. Moreover, CE is inferior to MIAFACE in scenario 1, e.g., Figure 5, when N t is over 10. Moreover, e.g., Figure 8c in scenario 2, MCAFACE is superior to MIAFACE and CE when N t is over 9.

6. Conclusions

In this paper, the multi-UAV cooperative task assignment problem was described and formulated, and three types of UAVs were considered, cooperatively accomplishing the classification, attack, and verification tasks of targets under resource, precedence, and timing constraints. After that, considering complex coupling among these three tasks, we decomposed the considered problem into two subproblems. In order to solve them, we proposed an AFACE algorithm, a MIAFACE algorithm, and a MCAFACE algorithm. Finally, simulation results verified that both MIAFACE and MCAFACE consume less time than other intelligent algorithms for solving the corresponding problem.
Nevertheless, there still exist challenges when applying the MIAFACE algorithm and MCAFACE algorithm to processing optimization problems, e.g., appropriate parameter settings, falling into local optimum when using lower elements in c , etc. In future work, it will be meaningful to concentrate on promoting these two algorithms on problems where it is vulnerable to local optimum when the number of samples is limited and on task assignment problems in complex dynamic scenarios.

Author Contributions

Conceptualization, K.W., X.Z. and X.L.; methodology, X.Z.; software, X.Z.; validation, K.W., X.Z., X.L. and W.C.; formal analysis, K.W. and X.Z.; investigation, X.Z.; resources, X.Q. and Y.C.; data curation, X.Q., Y.C. and K.L.; writing—original draft preparation, X.Z.; writing—review and editing, X.Z.; visualization, X.Z.; supervision, K.W.; project administration, Y.C. and K.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded in part by the National Natural Science Foundation of China under Grant 62172313 and 52031009, in part by the Natural Science Foundation of Hunan Province under Grant 2021JJ20054.

Data Availability Statement

Data sharing is not applied.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

If one of each type of UAVs is selected, i.e., z = 1 , the possible schemes are written as
L = C N b 1 C z 1 = 3 .
When z = 2 , we can choose no more than three types of UAVs, and then
L = C N b 1 C z 1 + C N b 2 C z 2 = 9 .
Once z 3 , we can choose no more than three types of UAVs; thus
L = C N b 1 C z 1 1 t y p e + C N b 2 C z 2 2 t y p e s + C N b 3 C z 3 3 t y p e s = 3 z + 3 z ( z 1 ) 2 + z ( z 1 ) ( z 2 ) 6 = 3 z + z ( z 1 ) ( z + 7 ) 6 .
As a conclusion, the number of the possible schemes for each task of targets can be defined as
L = 3 z + z ( z 1 ) ( z + 7 ) 6 , z 1 .
Thus, we have successfully proven Theorem 1.

Appendix B

Inserting P ( m ) and Equation (1) into f ( x ( m ) ; u ) , we define the problem P 1 as
f ( x ( m ) ; P ( m ) ) = j = 1 N t p ( x j ( m ) | j , m ) = j = 1 N t k = 1 l m 1 p ( k | j , m ) g x j ( m ) ; k ,
where p ( k | j , m ) represents the coefficient in the column k and the row j of P ( m ) , g ( x j ( m ) ; k ) is 1 if ϕ ( x j ( m ) ) equals k and 0 otherwise according to Equation (1).
After that, at the tth iteration, we assume that the samples x 1 ( m ) , x 2 ( m ) , , x N d 1 t ( m ) are drawn from f ( x ( m ) ; v ^ t 1 ( m ) ) . In addition, we calculate the performances Ω t , i , and order them from smallest to largest: Ω t , 1 Ω t , 2 Ω t , N d 1 t , and then define γ ^ t ( m ) = Ω ( N d 1 t β m 1 ) .
Thus, Equation (A5) can be rewritten as follows:
arg max P ( m ) 1 N d 1 t i = 1 N d 1 t I { Ω ( x i ( m ) ) γ ^ t ( m ) } × ln f x i ( m ) ; P ( m ) .
In Equation (A6), I ( x i ( m ) ; γ ^ t ( m ) ) is recognized, and when N d 1 t , the problem is equal to
max P ( m ) n = 1 β m 1 ln f ( x ( m ) ; P ( m ) ) .
Putting Equation (A5) into Equation (A7), we have
max P ( m ) n = 1 β m 1 ln f ( x ( m ) ; P ( m ) ) = max p ( k | j , m ) n = 1 β m 1 ln j = 1 N t k = 1 l m 1 p k | j , m g ( x j n ( m ) ; k ) = max p ( k | j , m ) n = 1 β m 1 j = 1 N t k = 1 l m 1 g ( x j n ( m ) ; k ) ln ( p ( k | j , m ) ) .
Then, we assume that r k j ( m ) = p ( k | j , m ) , a k j n ( m ) = g ( x j n ( m ) ; k ) , and Equation (A8) is modeled as
P 11 : min r k j ( m ) ( n = 1 β m 1 j = 1 N t k = 1 l m 1 a k j n ( m ) ln r k j ( m ) ) s . t . k = 1 l m 1 r k j ( m ) = 1 j , m r k j ( m ) 0 j , k , m l m 1 = L m .
Considering P 11 as a convex problem and denoting the convex function by f ( r k j ( m ) ) , we can obtain the Lagrangian function
O ( r k j ( m ) , λ j ( m ) , μ k j ( m ) ) = f r k j ( m ) + j = 1 N t λ j ( m ) k = 1 L r k j ( m ) 1 + j = 1 N t k = 1 L μ k j ( m ) r k j ( m ) ,
where λ j ( m ) and μ k j ( m ) are the relevant restraint coefficients.
Generally, for convex optimization problem, the Karush–Kuhn–Tucker (KKT) condition is required and sufficient [42]. Thus, considering the KKT conditions of problem in Equation (A10), we have
a k j ( m ) r k j ( m ) + λ j ( m ) μ k j ( m ) = 0 λ j ( m ) k = 1 L r k j ( m ) 1 = 0 μ k j ( m ) r k j ( m ) = 0 λ j ( m ) > 0 μ k j ( m ) 0 r k j ( m ) 0
When solving Equation (A11), we obtain
r k j ( m ) = a k j n ( m ) λ j ( m ) μ k j ( m ) λ j ( m ) = k = 1 L a k j n ( m ) μ k j ( m ) = 0 .
Comparing λ j ( m ) and r k j ( m ) , we acquire the relationship between r k j ( m ) and a k j n ( m ) , i.e.,
r k j ( m ) = a k j n ( m ) k = 1 L a k j n ( m ) .
Returning to our problem, the updating formula of P ( m ) is given by
p ( k | j , m ) = n = 1 β m 1 g ( x j n ( m ) ; k ) β m 1 = n = 1 c m 1 N g ( x j n ( m ) ; k ) c m 1 N ,
where k { 1 , , L } , n { 1 , , c m 1 N } , c m 1 c 1 .
Therefore, we have successfully proven Theorem 2.

Appendix C

Calculating the updating formulas of N m tasks continuously and correlatively is considered.
For the mth task, if m = 1 , its optimal solution is taken from L schemes, and if 1 < m N m , its optimal scheme is only taken from the remaining L m + 1 solutions since the m 1 schemes selected before performing the mth task have been deleted.
Thus, referring to the proof process of Theorem 2, the updating formula of Q ( m ) in problem P 2 is
q ( k | j , m ) = n = 1 β m 2 g ( x j n ( m ) ; k ) β m 2 = n = 1 c m 2 N g ( x j n ( m ) ; k ) c m 2 N
where k { 1 , , L m + 1 } , n { 1 , , c m 2 N } , c m 2 c 2 .
Hence, we have successfully proven Theorem 3.

References

  1. Singh, H.; Sharma, M. Electronic Warfare System Using Anti-Radar UAV. In Proceedings of the 2021 8th International Conference on Signal Processing and Integrated Networks, Noida, India, 26–27 August 2021; pp. 102–107. [Google Scholar]
  2. Deng, Z.; Gao, Y.; Hu, A.; Zhang, Y. A Mobile Phone Uplink CPDP-DTDOA Positioning Method Using UAVs for Search and Rescue. IEEE Sens. J. 2022, 22, 18170–18179. [Google Scholar] [CrossRef]
  3. Fan, B.; Jiang, L.; Chen, Y.; Zhang, Y.; Wu, Y. UAV Assisted Traffic Offloading in Air Ground Integrated Networks With Mixed User Traffic. IEEE T. Intell. Transp. 2022, 23, 12601–12611. [Google Scholar] [CrossRef]
  4. D’Arcy, S.; Gonzalez, F. Design and Flight Testing of a Rocket-Launched Folding UAV for Earth and Planetary Exploration Applications. In Proceedings of the 2022 IEEE Aerospace Conference, Big Sky, MT, USA, 5–12 March 2022; pp. 1–15. [Google Scholar]
  5. Chen, X.; Liu, Y.; Yin, L.; Qi, Y. Cooperative Task Assignment and Track Planning For Multi-UAV Attack Mobile Targets. J. Intell. Robot. Syst. 2020, 100, 1383–1400. [Google Scholar]
  6. Sabo, C.; Kingston, D.; Cohen, K. A Formulation and Heuristic Approach to Task Allocation and Routing of UAVs under Limited Communication. Unmanned Syst. 2014, 2, 1–17. [Google Scholar] [CrossRef]
  7. Wang, J.; Zhang, Y.F.; Geng, L.; Fuh, J.Y.H.; Teo, S.H. A Heuristic Mission Planning Algorithm for Heterogeneous Tasks with Heterogeneous UAVs. Unmanned Syst. 2015, 3, 205–219. [Google Scholar] [CrossRef]
  8. Gou, Q.; Li, Q. Task assignment based on PSO algorithm based on Logistic function inertia weight adaptive adjustment. In Proceedings of the 2020 3rd International Conference on Unmanned Systems, Harbin, China, 1–4 September 2020; pp. 825–829. [Google Scholar]
  9. Li, Y.; Zhang, S.; Chen, J.; Jiang, T.; Ye, F. Multi-UAV Cooperative Mission Assignment Algorithm Based on ACO method. In Proceedings of the 2020 International Conference on Computing, Networking and Communications, Big Island, HI, USA, 17–20 February 2020; pp. 304–308. [Google Scholar]
  10. Ma, Y.; Zhang, H.; Zhang, Y.; Gao, R.; Xu, Z.; Yang, J. Coordinated Optimization Algorithm Combining GA with Cluster for Multi-UAVs to Multi-tasks Task Assignment and Path Planning. In Proceedings of the 2019 IEEE 15th International Conference on Control and Automation, Edinburgh, UK, 22–26 August 2019; pp. 1026–1031. [Google Scholar]
  11. Duan, X.; Liu, H.; Tang, H.; Cai, Q.; Zhang, F.; Han, X. A Novel Hybrid Auction Algorithm for Multi-UAVs Dynamic Task Assignment. IEEE Access 2020, 8, 86207–86222. [Google Scholar] [CrossRef]
  12. Chen, J.; Wu, Q.; Xu, Y.; Qi, N.; Guan, X.; Zhang, Y.; Xue, Z. Joint Task Assignment and Spectrum Allocation in Heterogeneous UAV Communication Networks: A Coalition Formation Game-Theoretic Approach. IEEE Trans. Wirel. Commun. 2021, 20, 440–452. [Google Scholar] [CrossRef]
  13. Qie, H.; Shi, D.; Shen, T.; Xu, X.; Li, Y.; Wang, L. Joint Optimization of Multi-UAV Target Assignment and Path Planning Based on Multi-Agent Reinforcement Learning. IEEE Access 2019, 7, 146264–146272. [Google Scholar] [CrossRef]
  14. Tang, J.; Chen, X.; Zhu, X.; Zhu, F. Dynamic Reallocation Model of Multiple Unmanned Aerial Vehicle Tasks in Emergent Adjustment Scenarios. IEEE Trans. Aerosp. Electron. Syst. 2022, 1–43. [Google Scholar] [CrossRef]
  15. Qie, H.; Shi, D.; Shen, T.; Xu, X.; Li, Y.; Wang, L. Distributed Cooperative Search Algorithm With Task Assignment and Receding Horizon Predictive Control for Multiple Unmanned Aerial Vehicles. IEEE Access 2021, 9, 6122–6136. [Google Scholar]
  16. Fu, X.; Feng, P.; Gao, X. Swarm UAVs Task and Resource Dynamic Assignment Algorithm Based on Task Sequence Mechanism. IEEE Access 2019, 7, 41090–41100. [Google Scholar] [CrossRef]
  17. Chen, Y.; Yang, D.; Yu, J. Multi-UAV Task Assignment With Parameter and Time-Sensitive Uncertainties Using Modified Two-Part Wolf Pack Search Algorithm. IEEE Trans. Aerosp. Electron. Syst. 2018, 54, 2853–2872. [Google Scholar] [CrossRef]
  18. Zhu, F.; Wu, F.; Chen, C.F.; Li, D.; Guo, Y.; Zhang, J.G.; Zhao, X. A coordinated assignment method for multi-UAV area search tasks. In Proceedings of the CSAA/IET International Conference on Aircraft Utility Systems, Nanchang, China, 17–20 August 2022; pp. 751–756. [Google Scholar]
  19. Chen, Y.; Chen, J.; Du, C. Allocation of Multi-UAVs Timing-dependent Tasks based on Completion Time. In Proceedings of the 2022 WRC Symposium on Advanced Robotics and Automation, Beijing, China, 20 August 2022; pp. 71–76. [Google Scholar]
  20. Yan, S.; Xu, J.; Song, L.; Pan, F. Heterogeneous UAV collaborative task assignment based on extended CBBA algorithm. In Proceedings of the 2022 7th International Conference on Computer and Communication Systems, Wuhan, China, 22–25 April 2022; pp. 825–829. [Google Scholar]
  21. Yan, S.; Pan, F.; Zhang, D.; Xu, J. Research on Task Reassignment Method of Heterogeneous UAV in Dynamic Environment. In Proceedings of the 2022 6th International Conference on Robotics and Automation Sciences, Wuhan, China, 9–11 June 2022; pp. 57–61. [Google Scholar]
  22. Liu, C.; Guo, Y.; Li, N.; Song, X. AoI-Minimal Task Assignment and Trajectory Optimization in Multi-UAV-Assisted IoT Networks. IEEE Internet Things J. 2022, 9, 21777–21791. [Google Scholar] [CrossRef]
  23. Zhu, C.; Zhang, G.; Yang, K. Fairness-Aware Task Loss Rate Minimization for Multi-UAV Enabled Mobile Edge Computing. IEEE Wirel. Commun. Lett. 2023, 12, 94–98. [Google Scholar] [CrossRef]
  24. Seid, A.M.; Lu, J.; Abishu, H.N.; Ayall, T.A. Blockchain-Enabled Task Offloading with Energy Harvesting in Multi-UAV-assisted IoT Networks: A Multi-agent DRL Approach. IEEE J. Sel. Areas Commun. 2022, 40, 3517–3532. [Google Scholar] [CrossRef]
  25. Hu, N.; Qin, X.; Ma, N.; Liu, Y.; Yao, Y.; Zhang, P. Energy-efficient Caching and Task offloading for Timely Status Updates in UAV-assisted VANETs. In Proceedings of the 2022 IEEE/CIC International Conference on Communications in China, Sanshui, Foshan, China, 11–13 August 2022; pp. 1032–1037. [Google Scholar]
  26. Gao, H.; Feng, J.; Xiao, Y.; Zhang, B.; Wang, W. A UAV-assisted Multi-task Allocation Method for Mobile Crowd Sensing. IEEE Trans. Mob. Comput. 2022. [Google Scholar] [CrossRef]
  27. Rubinstein, R.Y. Optimization of computer simulation models with rare events. Eur. J. Oper. Res. 1997, 99, 89–112. [Google Scholar] [CrossRef]
  28. Rubinstein, R.Y. The cross-entropy method for combinatorial and continuous optimization. Methodol. Comput. Appl. Probab. 1999, 1, 127–190. [Google Scholar] [CrossRef]
  29. Rubinstein, R.Y. Combinatorial optimization, cross-entropy, ants and rare events. In Stochastic Optimization: Algorithms and Applications; Springer: Boston, MA, USA, 2001; pp. 303–363. [Google Scholar]
  30. De Boer, P.-T.; Kroese, D.P.; Mannor, S.; Rubinstein, R.Y. A tutorial on the cross-entropy method. Ann. Oper. Res. 2005, 134, 19–67. [Google Scholar] [CrossRef]
  31. Chepuri, K.; Homem-de-Mello, T. Solving the vehicle routing problem with stochastic demands using the cross-entropy method. Ann. Oper. Res. 2005, 134, 153–181. [Google Scholar] [CrossRef]
  32. Rubinstein, R.Y.; Kroses, D.P. The cross-entropy method: A unified approach to combinatorial optimization Monte-Carlo simulation and machine learning. Technometrics 2006, 48, 147–148. [Google Scholar]
  33. Undurti, A.; How, J. A Cross-Entropy Based Approach for UAV Task Allocation with Nonlinear Reward. In Proceedings of the AIAA Guidance, Navigation, and Control Conference, Toronto, ON, Canada, 2–5 August 2010; pp. 1–16. [Google Scholar]
  34. Le Thi, H.A.; Nguyen, D.M.; Dinh, T.P. Globally solving a nonlinear UAV task assignment problem by stochastic and deterministic optimization approaches. Optim. Lett. 2012, 6, 315–329. [Google Scholar] [CrossRef]
  35. Huang, L.; Qu, H.; Zuo, L. Multi-Type UAVs Cooperative Task Allocation Under Resource Constraints. IEEE Access 2018, 6, 17841–17850. [Google Scholar] [CrossRef]
  36. Cofta, P.; Ledziński, D.; Śmigiel, S.; Gackowska, M. Cross-Entropy as a Metric for the Robustness of Drone Swarms. Entropy 2020, 22, 597. [Google Scholar] [CrossRef] [PubMed]
  37. Zhang, X.; Wang, K.; Dai, W. Multi-UAVs Task Assignment Based on Fully Adaptive Cross-Entropy Algorithm. In Proceedings of the 2021 11th International Conference on Information Science and Technology, Chengdu, China, 7–10 May 2021; pp. 286–291. [Google Scholar]
  38. Wei, Y.; Wang, B.; Liu, W.; Zhang, L. Hierarchical Task Assignment of Multiple UAVs with Improved Firefly Algorithm Based on Simulated Annealing Mechanism. In Proceedings of the 2021 40th Chinese Control Conference, Shanghai, China, 26–28 July 2021; pp. 1943–1948. [Google Scholar]
  39. Wang, Q.; Liu, L.; Tian, W. Cooperative Task Assignment of Multi-UAV in Road-network Reconnaissance Using Customized Genetic Algorithm. In Proceedings of the 2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference, Chongqing, China, 18–20 June 2021; pp. 803–809. [Google Scholar]
  40. Costa, A.; Jones, O.D.; Kroese, D. Convergence properties of the cross-entropy method for discrete optimization. Oper. Res. Lett. 2007, 35, 573–580. [Google Scholar] [CrossRef] [Green Version]
  41. Kennedy, J.; Eberhart, R. Particle swarm optimization. In Proceedings of the ICNN’95—International Conference on Neural Networks, Perth, WA, Australia, 27 November–1 December 1995; pp. 1942–1948. [Google Scholar]
  42. Luo, Z.-Q.; Yu, W. An introduction to convex optimization for communications and signal processing. IEEE J. Sel. Areas Commun. 2006, 24, 1426–1438. [Google Scholar]
Figure 1. Task assignment diagram.
Figure 1. Task assignment diagram.
Drones 07 00204 g001
Figure 2. Initial bases and targets state.
Figure 2. Initial bases and targets state.
Drones 07 00204 g002
Figure 3. Time changing with N t under MIAFACE algorithm in scenario 1. (a) c 1 = [0.01,0.02,0.03]. (b) c 1 = [0.02,0.03,0.04]. (c) c 1 = [0.03,0.04,0.05].
Figure 3. Time changing with N t under MIAFACE algorithm in scenario 1. (a) c 1 = [0.01,0.02,0.03]. (b) c 1 = [0.02,0.03,0.04]. (c) c 1 = [0.03,0.04,0.05].
Drones 07 00204 g003
Figure 4. Time changing with N t under MCAFACE algorithm in scenario 1. (a) c 1 = [0.01,0.02,0.03]. (b) c 1 = [0.02,0.03,0.04]. (c) c 1 = [0.03,0.04,0.05].
Figure 4. Time changing with N t under MCAFACE algorithm in scenario 1. (a) c 1 = [0.01,0.02,0.03]. (b) c 1 = [0.02,0.03,0.04]. (c) c 1 = [0.03,0.04,0.05].
Drones 07 00204 g004
Figure 5. Time changing with N t under h = 2 and different algorithms in scenario 1. (a) c 1 = [0.01,0.02,0.03]. (b) c 1 = [0.02,0.03,0.04]. (c) c 1 = [0.03,0.04,0.05].
Figure 5. Time changing with N t under h = 2 and different algorithms in scenario 1. (a) c 1 = [0.01,0.02,0.03]. (b) c 1 = [0.02,0.03,0.04]. (c) c 1 = [0.03,0.04,0.05].
Drones 07 00204 g005
Figure 6. Time changing with N t under MIAFACE algorithm in scenario 2. (a) c 2 = [0.01,0.02,0.03]. (b) c 2 = [0.02,0.03,0.04]. (c) c 2 = [0.03,0.04,0.05].
Figure 6. Time changing with N t under MIAFACE algorithm in scenario 2. (a) c 2 = [0.01,0.02,0.03]. (b) c 2 = [0.02,0.03,0.04]. (c) c 2 = [0.03,0.04,0.05].
Drones 07 00204 g006
Figure 7. Time changing with N t under MCAFACE algorithm in scenario 2. (a) c 2 = [0.01,0.02,0.03]. (b) c 2 = [0.02,0.03,0.04]. (c) c 2 = [0.03,0.04,0.05].
Figure 7. Time changing with N t under MCAFACE algorithm in scenario 2. (a) c 2 = [0.01,0.02,0.03]. (b) c 2 = [0.02,0.03,0.04]. (c) c 2 = [0.03,0.04,0.05].
Drones 07 00204 g007
Figure 8. Time changing with N t under h = 2 and different algorithms in scenario 2. (a) c 2 = [0.01,0.02,0.03]. (b) c 2 = [0.02,0.03,0.04]. (c) c 2 = [0.03,0.04,0.05].
Figure 8. Time changing with N t under h = 2 and different algorithms in scenario 2. (a) c 2 = [0.01,0.02,0.03]. (b) c 2 = [0.02,0.03,0.04]. (c) c 2 = [0.03,0.04,0.05].
Drones 07 00204 g008
Table 1. Simulation parameter settings.
Table 1. Simulation parameter settings.
VariablesExplanation
N b The number of bases
N t The number of targets
jThe target index
K The set of tasks of targets
N m The number of tasks of targets
mThe task index of targets
X The set of all possible UAV deployment schemes
LThe number of X for each task
zThe maximum number of UAVs in each scheme of X
Z The set of all possible UAV deployment scheme indexes
kA UAV deployment scheme index or a UAV formation index
x ( m ) A feasible UAV deployment scheme vector of task m
x j ( m ) A feasible UAV deployment scheme or a UAV formation of task m of target j
g ( x j ( m ) ; k ) A 0–1 decision variable
Y The set of all feasible x ( m )
Ω ( x ( m ) ) The performance of task m
Ω The performance vector of Ω ( x ( m ) )
ρ The total objective function
ψ ( x j ( 2 ) ) The reward benefit of the attack task of target j
φ ( x j ( m ) ) The cost of assigning UAV formation x j ( m ) to accomplish task m of target j
p k j The probability of killing target j
p s j The UAV survival probability of accomplishing tasks of target j
w 1 , w 2 and w 3 Weight coefficients
P c and VThe target identification certainty and the constant velocity of each UAV
y j and s j The value and the threat level of target j
d j ( m ) The farthest distance from the base corresponding to UAV formation x j ( m ) to target j
D max The maximum flying distance
T m The execution time of task m
Table 2. Information of three types of UAVs.
Table 2. Information of three types of UAVs.
UAVBase U resource (Units) p k p s
ab
Type AB1120.90.7
Type BB2220.80.8
Type CB3330.70.9
Table 3. Information of 20 targets.
Table 3. Information of 20 targets.
TargetPosition T resource ys
K 1 ([a,b]) K 2 ([a,b]) K 3 ([a,b])
Target 1(23,85)[2,3][2,3][2,3]302
Target 2(35,90)[3,3][3,3][3,3]706
Target 3(48,95)[2,3][2,3][2,3]504
Target 4(92,35)[3,2][3,2][3,2]10010
Target 5(95,28)[2,2][2,2][2,2]1208
Target 6(100,32)[3,2][3,2][3,2]405
Target 7(45,105)[3,3][3,3][3,3]653
Target 8(90,30)[2,2][2,2][2,2]787
Target 9(88,40)[2,2][2,2][2,2]359
Target 10(50,100)[3,2][3,2][3,2]635
Target 11(160,170)[2,3][5,3][4,3]302
Target 12(165,178)[3,3][5,3][5,3]706
Target 13(132,155)[3,3][5,3][6,3]504
Target 14(90,150)[3,3][3,5][4,4]10010
Target 15(162,175)[2,2][4,5][4,4]1208
Target 16(140,155)[2,3][6,3][5,3]405
Target 17(82,134)[3,3][4,3][4,3]653
Target 18(148,152)[2,3][4,2][5,2]787
Target 19(145,160)[3,2][3,4][4,3]359
Target 20(95,160)[2,2][3,4][4,4]635
Table 4. Simulation parameter settings.
Table 4. Simulation parameter settings.
ParameterValue
The target identification P c = 1
Weight coefficients w 1 = 0.8 , w 2 = 0.18 , w 3 = 0.02
The UAV’s speed V = 40 m/s
The maximum flying distance D max = 1000 m
Time window of task K 1 (s) [ e 1 , s 1 ] = [ 3 , 10 ]
Time window of task K 2 (s) [ e 2 , s 2 ] = [ 8 , 20 ]
Time window of task K 3 (s) [ e 3 , s 3 ] = [ 18 , 26 ]
Consumption time of task K 1 T 1 = 5 s
Consumption time of task K 2 T 2 = 10 s
Consumption time of task K 3 T 3 = 5 s
The number of targets N t [ 5 , 20 ]
The fixed random samples N = 1000
The quantile in CE θ = 0.1
Inertial weight in PSO w = 0.75
Learning factors in PSO η 1 = η 2 = 0.5
The number of ants in ACO N a = 200
Pheromone evaporation coefficient in ACO ε = 0.9
Transfer probability in ACO P a = 0.2
Mating probability in GA P 1 = 0.8
Mutation probability in GA P 2 = 0.01
Table 5. Iterative results of three algorithms in case 1.
Table 5. Iterative results of three algorithms in case 1.
AlgorithmCEMIAFACEMCAFACE
Task K 1 K 1 K 1
K 2 K 2 K 2
K 3 K 3 K 3
Iterations433
2
1
Optimal scheme vector[3,3,3,2,2,2,3,2,2,3][3,3,3,2,2,2,3,2,2,3][3,3,3,2,2,2,3,2,2,3]
[9,9,9,7,7,7,9,7,7,9]
[18,18,18,15,15,15,18,15,15,18]
Result of each task−79.50−79.50−79.50
274.90274.90179.0
−79.50−79.50−82.14
Sum of each task’s result115.9115.917.36
Total time(s)3.363.292.17
Table 6. Iterative results of three algorithms in case 4.
Table 6. Iterative results of three algorithms in case 4.
AlgorithmCEMIAFACEMCAFACE
Task K 1 K 1 K 1
K 2 K 2 K 2
K 3 K 3 K 3
Iterations544
4
3
Optimal scheme vector[3,3,3,2,2,2,3,2,2,3][3,3,3,2,2,2,3,2,2,3][3,3,3,2,2,2,3,2,2,3]
[9,9,9,7,7,7,9,7,7,9][9,9,9,7,7,7,9,7,7,9][9,9,9,7,7,7,9,7,7,9]
[18,18,18,15,15,15,18,15,15,18][18,18,18,15,15,15,18,15,15,18][18,18,18,15,15,15,18,15,15,18]
Result of each task−298.65−298.65−298.65
819.85819.85819.85
−302.48−302.48−302.48
Sum of each task’s result218.72218.72218.72
Total time(s)7.337.116.9
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, K.; Zhang, X.; Qiao, X.; Li, X.; Cheng, W.; Cong, Y.; Liu, K. Adjustable Fully Adaptive Cross-Entropy Algorithms for Task Assignment of Multi-UAVs. Drones 2023, 7, 204. https://doi.org/10.3390/drones7030204

AMA Style

Wang K, Zhang X, Qiao X, Li X, Cheng W, Cong Y, Liu K. Adjustable Fully Adaptive Cross-Entropy Algorithms for Task Assignment of Multi-UAVs. Drones. 2023; 7(3):204. https://doi.org/10.3390/drones7030204

Chicago/Turabian Style

Wang, Kehao, Xun Zhang, Xuyang Qiao, Xiaobai Li, Wei Cheng, Yirui Cong, and Kezhong Liu. 2023. "Adjustable Fully Adaptive Cross-Entropy Algorithms for Task Assignment of Multi-UAVs" Drones 7, no. 3: 204. https://doi.org/10.3390/drones7030204

Article Metrics

Back to TopTop