Abstract

In recent wars, there is an increasing trend that unmanned aerial vehicles (UAVs) are utilized to conduct military attacking missions. In this paper, we investigate a novel multidepot UAV routing problem with consideration of weapon configuration in the UAV and the attacking time window of the target. A mixed-integer linear programming model is developed to jointly optimize three kinds of decisions: the weapon configuration strategy in the UAV, the routing strategy of target, and the allocation strategy of weapons to targets. An adaptive large neighborhood search (ALNS) algorithm is proposed for solving the problem, which is tested by randomly generated instances covering the small, medium, and large sizes. Experimental results confirm the effectiveness and robustness of the proposed ALNS algorithm.

1. Introduction

With the development of information technologies, artificial intelligence, and new materials, as well as their wide application in unmanned aerial vehicles (UAVs), the abilities of UAVs on autonomously flying, endurance, and stealth have been greatly improved. There are many advantages of UAVs to conduct military operations, such as low cost, high agility, good stealth, and no risk of casualties. Thus, in several recent local wars, there was an increasing trend to employ UAVs for completing military missions. During the Gulf War [1, 2], the US army deployed the “Pioneer” and the “Pointer” UAVs to conduct military tasks, such as battlefield reconnaissance, surveillance, artillery support, and target damage assessment. In the Kosovo war [3, 4], NATO employed over 200 UAVs during the war. In the Afghanistan war [5], the UAV named “Global Hawk” was used to directly destroy enemy targets. The outstanding performance of UAVs in current wars has proved their military value, and more UAVs are introduced and used to replace manned aircrafts for carrying out various military missions.

When UAVs are used to perform attack missions on enemy targets, commanders need to consider the constraints on UAV load and the hanging points for weapons and should determine the type and quantity of weapons equipped in the UAV while optimizing the flight path for visiting the targets. In the UAV mission planning process, commanders also have to determine the type and quantity of weapons that the UAV delivers to each target, ensuring that these weapons can cause sufficient damage on the target and meet the mission’s damage requirements. Modern wars are usually joint operations of multiple services (army, navy, air force, etc.), and there are many cooperative actions among different military units. Thus, for most of the targets attacked by UAVs, the attacking actions are required to complete in specific time windows. In the military operations research field, most literatures related to UAV mission planning focused on task assignment, path planning, and routing separately. To the best of our knowledge, the UAV routing problem with weapon configuration and time window has not been studied.

The UAV routing problems were usually solved based on models and algorithms utilized in vehicle routing problem (VRP). The weapon configuration in the UAV and allocation to the targets are quite different from the product delivery to customer in the common VRP. For a target, the attacking effect is different if it is attacked by different weapons. Table 1 presents the combat ability matrix of three different weapons on two targets. It can be seen that if the destroy requirement for the bridge target is restricted over 90 in the mission, there are a number of combinations of weapons that can satisfy the requirement, such as 3 small smart bombs, 1 small smart bomb, 1 small precision guided bomb, and 1 laser-guided bomb. Thus, the weapons delivered to a target are not deterministic and are impacted by the weapon configuration and routing strategies of the UAV, while the types and quantities of products delivered to each customer are deterministic in the general VRP problem.

Motivated by the practical requirement in military mission planning of UAV, we investigated the multidepot UAV routing problem with weapon configuration and time window (MD-URP-WC&TW), which can be viewed as a new extension on the traditional VRP. In MD-URP-WC&TW, three kinds of decisions should be cooperatively optimized, which are the weapon configuration strategy in the UAV, the routing strategy of target, and the allocation strategy of weapons to targets. The interaction among these decisions makes the modelling and solution of the problem more complex. In this paper, a mixed-integer linear programming model is developed to formulate the problem, and a powerful adaptive large neighborhood search (ALNS) based metaheuristic is proposed to obtain better feasible solutions.

The paper is organized as follows. In Section 2, the related literatures are reviewed. The formulated model is developed in Section 3, and the proposed ALNS algorithm, including its main steps, is presented in Section 4. The computational results are reported and analyzed in Section 5. Section 6 concludes the paper.

2. Literature Review

Multidepot UAV routing problem with consideration of weapon configuration and time window is related to main streams of literatures, which are UAV path planning/routing and UAV task assignment. A review of the literatures on these two fields is summarized below.

The earlier studies in the field of UAV flight path optimization mainly focused on optimizing the UAV flight path from the control level. It is necessary to consider the influence of the turning angle, obstacle avoidance, and weather conditions (such as wind power level) on the UAV. Based on these constraints, an optimal flight path is found for the UAV [6]. Edison and Shima [7] studied the mission planning and path planning of multi-UAV in military operations. They fully considered flight parameters, such as the minimum turning radius, in the proposed mathematical model and solved the problem using a genetic algorithm. Zhang et al. [8] studied multi-UAV path planning, considering mobility, collision avoidance, and flight information sharing, and proposed the Cooperative and Geometric Learning Algorithm (CGLA) to solve the above problem. Moon et al. [9] developed a multilevel planning model for multi-UAV task assignment and path planning, taking into account practical constraints such as collision avoidance between UAVs, and solved the problem by the algorithm. Yang et al. [10] studied the path planning problem of UAV in terms of obstacle avoidance, decomposed the original goal and constraint function of UAV path planning into a new set of evaluation functions, and proposed the evolutionary algorithm for solving the problem.

With the improvement in intelligent control technology for UAVs, UAVs can independently complete the flight between the target points. In recent years, studies on UAV path planning have begun to focus on tactical optimization in order to minimize the overall minimum flight distance by optimizing the sequence of UAV to visit the target. Shetty et al. [11] studied multi-UAV task assignment and routing problems based on target priority and distinguished the targets by their degrees of importance using the Tabu search algorithm. Mufalli et al. [12] studied the multi-UAV routing problem for target reconnaissance considering the load constraints of the UAV and solved the problem by the column generation and heuristic algorithm. Liu et al. [13] studied the UAV deployment and routing problem for road-traffic information collection. Subject to the number of UAVs and the maximum cruise distance, a multiobjective optimization model was developed. Moyo and Plessis [14] studied the inspection path optimization problem for the cable network of UAVs and described it as a traveling salesman problem (TSP). Guerriero et al. [15] proposed a system of UAVs that are able to communicate, self-organize, and cooperate. A multicriteria optimization model was developed to determine the distributed dynamic schedule of UAVs and ensure both spatial coverage and temporal coverage of specific targets. Evers et al. [16] studied multi-UAV path planning with target reconnaissance time windows. Luo et al. [17] studied the two-echelon routing problem of mounting UAV on a ground vehicle (GV), where the GV acts as the mobile depot for launching and recycling the UAV, while the UAV visits the targets for information collection.

In order to facilitate multi-UAV collaborative task allocation during mission planning, Ghalenoei et al. [18] proposed the Discrete Invasive Weed Optimization Algorithm for specific target attributes and geographical locations. George et al. [19] proposed an online task assignment algorithm based on UAV task alliance to deal with unexpected tasks, which involves requesting adjacent UAVs to form task alliances and replanning the tasks. Zhong et al. [20] studied the UAV task assignment problem with dynamic changes in target value over time, taking into account various constraints including UAV flight altitude, maximum climb height, and maximum turning radius. Hu et al. [21] studied the assignment of UAV collaborative tasks using the hierarchical assignment method and solved the problem by an improved ant colony algorithm. Yin et al. [22] described the UAV collaborative task assignment problem as a multiobjective optimization problem and solved it using a Pareto-dominated multiobjective discrete particle swarm optimization algorithm. Jin [23] studied the distributed UAV task allocation problem where the tasks are divided into detection, attack, and verification.

As far as current UAV mission planning and path planning studies are concerned, no study has focused on the integrated optimization of UAV flight path for target attack and airborne weapons configuration. Taking into account the type and quantity of weapons on board, during the UAV path planning process, there exists a new direction for traditional path planning, which is of great significance for improving the efficiency of UAV mission planning in the military.

3. Model Formulation

The MD-URP-WC&TW considers a set of targets, each of which must be attacked once by one UAV. The weapons delivered to the target must be able to destroy it over a required destroy level. There are multiple depots for the UAV, where the weapons are configured for each UAV, subject to the UAV’s constraints on payload and hanging points. An illustration of the MD-URP-WC&TW is presented in Figure 1. In the MD-URP-WC&TW, the commander has to optimize the decisions on which depot the UAV leaves, which targets are visited in what sequence, what type and how many weapons are configured on the UAV, and what type and how many weapons are delivered to each target. The objective is to minimize the number of UAVs employed, the overall weapons consumed for destroying all the targets, and the total cost (time/distance) traveled by all UAVs.

3.1. Symbol Description

The notations and symbols utilized in the model formulation are presented as follows.(1)Sets: the set of targets, and : the set of depots, and : the set of UAVs, and : the set of different weapon types, and (2)Parameters: damage demand of target , and : the payload capacity of the UAV: the number of hanging points of the UAV: the time of UAV flying from target to target , and , : the cost of a weapon of type , and : the weight of a weapon of type , and : the combat ability of weapon on target , and ,  : the duration time of UAV: the earliest allowed hitting time of target , and : the latest allowed hitting time of target , and : the spent time of UAV hitting target , and : the waiting time of UAV hovering above target , and , : a large enough number(3)Decision Variables: binary variable, which is equal to 1 if a target is attacked after target by UAV and 0 otherwise: continuous variable, the moment of UAV reaching target : integer variable, which denotes the number of weapons on UAV used to attack target , and

3.2. Mathematical Model

The MD-URP-WC&TW can be formulated as the following mixed-integer programming model:

The objective function consists of three parts. The first part represents the total number of UAVs used in combat operations, the second part shows the total cost of the weapons used in combat operations, and the third part expresses the total flight time for all UAVs in combat operations. , , and are the weight coefficients of each part to adjust the three parts of the objective function to the same number of units. Constraints (2) and (3) define that every target can be hit by one UAV. Flow conservation is guaranteed by constraints (4). Constraints (5) ensure that that the total weight of category weapons carried by each UAV cannot exceed its load limit. Constraints (6) ensure that the number of weapons mounted on each UAV does not exceed the number of weapons hanging on the UAV. Constraints (7) regulate that the damage demand of each target must be fulfilled. Constraints (8) ensure that the UAV can only drop off weapons to the target visited by it. Constraints (9) guarantee that the endurance of the UAV must not be exceeded. Constraints (10) ensure that the arriving time of UAV at target is no later than the arriving time at target if UAV attacks target after target . Constraints (11) and (12) are time window constraints for the UAV to perform a task. Constraints (13), (14), and (15) are the constraints of decision variables

4. Algorithm

ALNS is an extension of the large neighborhood search algorithm and is first proposed by Ropke and Pisinger [24], which has been widely employed for solving complex vehicle routing problems [25, 26]. The main procedure of ALNS is illustrated in Algorithm 1. The ALNS starts from an initial feasible solution and conducts iteratively search for better solutions. The initial feasible solution is usually generated by a constructive heuristic. In each iteration, the current solution is destroyed and repaired by heuristics, which are selected based on their past performances.

Input:
: initial solution;
six neighborhood structures.
Output: the best solution .
;
;
initialize scores on neighborhood structures;
while acceptance standards not meet do
select a neighborhood structure;
modify   by chosen structure to generate ;
if   is accepted then
;
end
if    then
;
end
update scores on neighborhood structures;
end
Return  .
4.1. The Heuristic Algorithm for Constructing an Initial Solution

The heuristic algorithm for generating an initial solution aims to rapidly construct a feasible solution, which includes four main steps. First, weapons are assigned to each target according to its damage requirements based on some heuristic rules. Second, the targets are clustered to the depots through the clustering strategies. Third, a complete tour is constructed to visit all the targets assigned to a depot. Finally, the feasible flight path for each UAV is constructed.

4.1.1. Weapon Allocation Strategy

The weapon assignment strategy is to determine the type and quantity of weapons used to attack the target and meet its damage requirement. Two strategies are designed to dispose and assign weapons to the targets.

(a) Assigning Strategy Based on Destroy Effect. The assigning strategy based on destroy effect is to select the weapon with the highest destroy effect on the target and assign it to the target. The main procedure is illustrated in Algorithm 2.

Input:  , , for ,  ;
Output:  : the number of weapon assigned to target .
Set  ;
;
;
;
++;
Return  .

(b) Assigning Strategy Based on Cost-Effectiveness. In the assigning strategy based on cost-effectiveness, a measurement named as “cost-effectiveness” is introduced as follows:

The weapon with the highest “cost-effectiveness” is preferentially selected and assigned to the target. The main procedure for the assigning strategy based on cost-effectiveness is illustrated in Algorithm 3.

Input:
: the cost-effectiveness ratio of weapon m against target ;
: the weight of weapon , ;
: the UAV’s payload;
: the number of hanging points in the UAV.
Output:
: the number of weapon assigned to target .
Set  , ;
while    do
;
;
if   and ) then
;
end
else
;
;
end
end
Return  .
4.1.2. Target Clustering Strategy

Three target clustering strategies are designed for assigning targets to each depot, which are distance based clustering, greedy search clustering, and virtual feedback clustering.

(a) Distance Based Clustering (DC). The basic idea of the DC strategy is to assign each target to its closest depot. The distance between each target point and each depot is first calculated, and then the targets are clustered to their closest depot.

(b) Greedy Search Clustering (GSC). In the GSC strategy, each depot is first allowed to select one target randomly, and then the target closest to the selected target is added. The operation is repeated until all targets are assigned to the appropriate depots. The GSC strategy is illustrated in Figure 2.

(c) Virtual Feedback Clustering (VFC). The basic idea of the VFC strategy is to assume that there is a virtual depot around the known depots, and all UAVs performing the striking task are from the virtual depot. We can obtain , a set of path planning schemes for multiple UAVs departing from the virtual depot. In addition, , where denotes the quantity of UAVs used. Then, the virtual depot is changed to the actual depot for each route in . The total flying distance is computed every time after the depot is changed. The targets corresponding to the changing scheme with the shortest distance are assigned to the appropriate depots. The above operation is repeated until all elements in set are assigned.

4.1.3. Target Sequencing Strategy

The target sequencing strategy aims to determine the sequence in which the UAV visits the targets, subject to their time windows. There are four strategies for sequencing the targets, which are sequencing based on distance (SD), sequencing based on earliest striking time (SEST), sequencing based on latest striking time (SLST), and sequencing based on time window width (STWW). The SD strategy aims to sort all targets by the distance to the depot in an ascending order. A UAV first visits the closest target and then the next target at a longer distance after departing from the depot. The UAV visits the remaining targets in the same manner until all targets are visited. The SEST strategy is to visit all targets in an ascending order by the earliest striking time of the target; that is, the targets with earlier striking time should be attacked earlier. In the SLST strategy, all targets are visited in a descending order of the latest striking time. The STWW strategy is to visit all targets in an ascending order of the time window width.

4.1.4. Feasible Route Construction (FRC)

In this step, a feasible route for each UAV is constructed, while considering the constraints on endurance, payload, the number of hanging points in UAV, and the time window of the target. The main procedure of the FRC algorithm is presented in Algorithm 4.

Input:
: the total number of targets;
: the basic information matrix related with the target. The first
line of the matrix is the target’s number; The second line of
the matrix stores the earliest allowed strike time of the target; The third line
of the matrix stores the target’s latest hit time; The fourth
line of the matrix stores the target time that UCAV hit the goal; The
fifth line of the matrix stores the time it takes UCAV to fly to the
target; The sixth line of the matrix stores the time it takes UCAV to fly
from the previous target to the target; The seventh line of the matrix
stores the total number of weapons assigned to the target; The eighth
line stores the total weight of the weapon assigned to the target point.
: time accumulated from depot to target and to depot;
: time accumulated from target to target ;
: total time for all target points visited by UAV;
: the total numbers of weapons after visiting all targets;
: The total weight of weapons after visiting all targets;
: UAV endurance;
: UAV maximum payload;
: The number of UAV hanging points;
: The number of UAV.
Output:
: A matrix set containing   number of new information matrix
, where  .
Set  ;  ;  ;  ;  ;  ;
while    do
while    do
for  (; ; )  do
;  ;
;  ;
;
end
;
If  (  or  or
  or    or  )
do
;  ;  ;  ;
;  ;
end
else
;  ;  ;
Output a new encoding matrix  ;
end
end
;  ;  ;
end
Return  .

The basic idea of FRC is to let a UAV depart from the depot and visit the targets one by one. The total weight and quantity of the weapons carried by the UAV and its total actual flight time are calculated when it arrives at a target. Then, constraints (5), (6), (9), (11), and (12) are checked, and the target is added to the UAV’s route if all these constraints are satisfied. If any constraint is not met, the UAV returns to the depot and the target is assigned to a new UAV and its route. The operation is repeated until all targets are visited.

4.2. Neighbourhood Structures

In ALNS, the neighborhood structures are employed to slightly diversify the starting point of local search. In this section, six neighborhood structures are designed for effectively searching the solution space.

(a) Depot Exchanging (DE). In the DE operator, firstly, one depot is selected randomly, and one flight route is also selected from the routes starting at this depot. In this way, we select depots and routes. Then the depots corresponding to the selected routes are exchanged. We further verify whether the new routes satisfy the constraints on endurance of the UAV and the time windows of the targets. If the constraints are met, a new solution is obtained. The depots are exchanged again if any constraint is not satisfied. The above steps are repeated until a new feasible solution is obtained. It should be noted that it is impossible to guarantee that each DE operation obtains an improved feasible solution, and sometimes it is even not possible to obtain a feasible solution.

(b) Targets Reclustering (TRC). The TRC operator is to construct a new feasible solution by reclustering all target nodes. When the targets are reclustered, target sequencing and feasible route construction strategies in the above section are conducted to generate a new solution.

(c) Weapons Reconfiguration (WR). The basic idea of the WR operator is to first delete the weapon assignment schemes for targets and invoke the appropriate weapon allocation strategies to reassign weapons for these targets. A new weapon assignment scheme follows the “deletion” and “reassignment” operations.

(d) Reducing the Number of Weapons (RNW). The basic idea of the RNW structure is to reduce the total cost by adjusting the quantity of weapons assigned to the target. In the RNW structure, we first select the target with the most weapons. Then, the type and number of weapons assigned to this target are changed in an attempt to reduce the quantity of weapons. If the RNW operation successfully reduces the quantity of weapons at a target, it provides potentials for reducing the cost of weapons, the quantity of UAVs, and the flying distance.

(e) Reducing the Cost of Weapons (RCW). The basic idea of the RCW structure is to reduce the total cost by replacing high-cost weapons with low-cost weapons. In the RCW structure, we first select the target with the highest cost of weapons in the weapon assignment schemes and then attempt to replace the high-cost weapons with combination of low-cost weapons. It should be noted that the RCW operation cannot guarantee that the weapon exchange always reduces the total cost. For example, the cost of weapons at a target may be lowered, and in the same time the weight and number of the weapons at this target may increase, which may make the value of the objective increase.

(f) Reducing the Weight of Weapons (RWW). The RWW structure is a variant of the RCW structure. Its basic idea is to reduce the quantity of weapons and, thus, improve the objective by replacing the heavy weapons with relatively lighter weapons in the weapon assignment schemes. In the RWW structure, we first select the target with the highest weight of weapons and then attempt to replace the heaviest weapons with relatively lighter weapons. The damage requirements for the target point must be verified when the weapons are being replaced. In other words, the adjusted weapon assignment schemes should meet Constraints (5) and (7).

4.3. Adaptive Learning Strategy

The six neighborhood structures provide potentials to improve a solution from different perspectives. The first neighborhood structure, DE, may improve the solution by adjusting the UAV flight loop. The second neighborhood structure, TRC, may improve the solution by changing the depot. The third to sixth neighborhood structures, WR, RNW, RCW, and RWW, may improve the solution by adjusting the weapon assignment scheme. Different neighborhood structures may lead to different improvement results. To achieve more extensive neighborhood search, this section presents an adaptive learning strategy to dynamically adjust the weights of the six structures during the neighborhood search process.

The six neighborhood structures are randomly selected to adjust the solution under the “roulette” principle. Given the weights of the neighborhood structures,   , the probability of structure to be selected is . The weights of the six neighborhood structures are adaptively updated every iteration by evaluating their performance in these earlier iterations. We note iterations as an evaluation segment. Assuming the initial weight of every neighborhood structure is 1, in the th evolution, the weight of structure is as follows:where is a constant, is the number of times the neighborhood structure is invoked in the th evolution, and is the score of the neighborhood structure in the th evolution.

The neighborhood structure in the th evolution is scored according to the following scoring rules:

  : the initial score of structure at the beginning of the th evaluation is set to be 0.

  : 30 scores are added to structure if the new solution is the best one generated in the th evolution.

  : 20 scores are added to structure if the new solution is better than the average one generated in the th evolution.

  : 10 scores are added to structure if the new solution is worse than the average one generated in the th evolution.

  : 5 scores are added to structure if the new solution is better than the worst one generated in the th evolution but can be accepted by the algorithm.

4.4. Acceptance Standard and Criteria for Termination
4.4.1. Acceptance Standard for Solutions

In the ALNS algorithm, the acceptance standard for the generated solutions is defined on the basis of the record-to-record algorithm proposed by Dueck [27]. It is assumed that is the objective function value of the current optimal solution, called record. It is assumed that is the difference between the objective function value of the current solution and , called deviation.

It is assumed that is the solution, is the neighborhood solution to , and is the objective function value of .

When , the neighborhood solution can be accepted, where . And is only allowed to be updated when .

4.4.2. Criteria for Termination of Algorithm Search

In the study, there are two criteria for termination of the ALNS algorithm:

The iteration process should be terminated when the quality of the solution does not improve after the number of iterations reaches a given value.

The iteration process should be terminated when the number of iterations reaches a given value.

5. Experiments

In this section, computational experiments are conducted to test the performance of the proposed algorithms. All the algorithms are coded with Visual C# 4.0 and the test environment is set up on a computer with Intel Core i7-4790 CPU, 3.60 GHz, 32 GB RAM, running on Windows 7.

5.1. Experimental Design

In order to fully test the performance of the proposed algorithms, instances with four different sizes are randomly generated, respectively: 10 targets, 20 targets, 50 targets, and 100 targets. Three different types of UAVs were utilized, which are UAVs with 4 hanging points and 600 kg loads, 6 hanging points and 900 kg loads, and 8 hanging points and 1200 kg loads. Three sizes of combat areas, 500 × 300 km2, 800 × 500 km2, and 1200 × 800 km2, are utilized. The experimental scale settings are shown in Table 2. The values of parameters for the weapons are illustrated in Tables 3 and 4. In the experiment, the service time of targets (unit: hours) is generated randomly in . The target’s time window is also generated randomly between 0 hours and 12 hours. Meanwhile, the following restrictions are considered in the random generation process: the earliest allowed strike time, , for target is no less than the time-consumed by the UAV flying from the depot to the target, ; the difference between the latest required strike time of target , , and its earliest allowed attack time, , is no more than   ( hours) and is no less than the service time .

In practical battlefields, there is usually a safe distance between the depot and the enemy target. Thus, the depots and the enemy targets are randomly generated in different combat zones, which can ensure that the distance between each depot and any enemy target is over 100 km.

5.2. Computational Results Analysis
5.2.1. Small-Scale Experiment

The results of small-scale experiments with 10 targets and 20 targets are shown in Tables 5 and 6. In the table, column 3 presents the initial feasible solutions obtained by the constructive heuristic and column 4 presents the final solutions obtained by ALNS. Column 5 presents the computational time consumed by the ALNS algorithm, and column 6 proposes the improvement (Impro.) of the final solution relative to the initial solution. In order to further analyze the performance of the six neighborhood structures utilized in ALNS, we calculated the percentage of the number of times that each neighborhood structure is invoked in the overall iterations of ALNS. The results are shown in columns 7 to 12, respectively. As we can see from Table 5, when the ALNS algorithm is used to solve the instances with 10 targets, the average computational time is 11.31 seconds and the average improvement of the final solution compared to the initial solution is 43.66%. As shown in columns 7 to 12, the percentages of six neighborhood structures invoked are quite different from each other, and there is no same situation for any two of the thirty instances, which indicates that the adaptive learning strategy can efficiently adjust the weights of the neighborhood structures in the search process.

The average computational time for instances with 20 targets, as shown in Table 6, is 26.81 seconds and the average improvement on the initial solution is 27.24%. Compared to the results for instances with 10 targets, the ALNS consumes more time and obtains lower improvement on the initial solution.

In order to show the experimental results more intuitively, the routing results of instance #51 in Table 6 are graphically displayed in Figure 3. As shown in Figure 3, eight UAVs have to be dispatched from three stations.

5.2.2. Medium-Scale and Large-Scale Experiments

From Tables 5 and 6, we can see that the performance of ALNS on improving the initial solution decreases as the problem scale increases, when the total number of iterations remains unchanged. In order to get better results, the number of iterations, , is increased as the problem size increases, and we set for solving instances with 50 targets and set cases for solving instances with 100 targets.

The results are presented in Tables 7 and 8. As we can see from Table 7, when ALNS algorithm is used to solve the instances with 50 targets, the average computational time of the algorithm is 60.55 seconds and the average improvement of the final solution compared to the initial solution is 19.25%. The results for instances with 100 targets in Table 8 show that the average calculation time is 206.13 seconds and the average improvement (Impro.) of the final solution compared to the initial solution is 19.54%.

The computational time for the heuristic to construct initial feasible solution is less than one second, and thus we do not report the detailed time for all instances. The maximum computational time for the instance with 100 targets is 228.37 seconds, which is acceptable for mission planning in current wars. For most of the instances, the ALNS can make good improvement on their initial solutions, which indicates that the solution obtained by the ALNS is relatively better and can satisfy the requirement of practical mission planning. We note that the improvement on some instances is less than 10%, and the similarity of these instances is that the UAV utilized in them has 4 hanging points and a payload of 600 kg. We can see that the combination scale for solving these instances is lower, and the constructive heuristic can present a better initial solution, which provides a better start point for the ALNS. Thus, although the ALNS may find a relative good solution, its improvement compared to the initial solution is not so big.

6. Summary

This paper focuses on the mathematical model and solution algorithm design for a multidepot UAV routing problem with consideration of weapon configuration in UAV and time window of the target. A four-step heuristic is designed to construct an initial feasible solution, and then the ALNS algorithm is proposed to find better solutions. Experiments for instances with different scales indicate that the constructive heuristic can obtain a feasible solution in one second, and the ALNS algorithm can efficiently improve the quality of the solutions. For the largest instances with 100 targets, the proposed algorithms can present a relative good solution within 4 minutes. Thus, the overall performance of the algorithm can satisfy the practical requirement of commanders for military mission planning of UAVs in current wars.

The UAV routing problem with weapon configuration and time window is new extension on the traditional vehicle routing problem, and there are many new topics required to study in future research. More efficient algorithms should be developed and compared with the ALNS algorithm, which is a broad and hard research. As the problem considered in this paper is quite complicated, there are no benchmark instances that consider exactly the same situation in literatures. Thus, we generate random instance based on practical military operation rules to test the proposed algorithm. In next research, benchmark instances from practical military applications need to be constructed and used to test the performance of different algorithms.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

The research is supported by the National Natural Science Foundation of China (no. 71771215, no. 71471174, and no. 71471175).