Abstract

In multiobjective air attacking tasks, it is essential to find the optimal combat preplanning for the attacking flight. This paper solves the planning problem by decomposing it into two subproblems: attacking sequence planning and attacking direction planning. According to this decomposition, we propose the VGHPSO (Variable Granularity Hybrid Particle Swarm Optimization) method. VGHPSO employs the Particle Swarm Optimization, a metaheuristic global optimization method, to solve the planning problem in multiple granularities, including optimizing the high-level attacking sequence and optimizing the low-level attacking directions for engagements. Furthermore, VGHPSO utilizes infeasible individuals in the swarm in order to enhance the capability of searching in the boundary of the feasible solution space. Simulation results show that the proposed model is feasible in the combat, and the VGHPSO method is efficient to complete the preplanning process.

1. Introduction

The traditional multi-target-attack can be presented as a unique attack style that a single flight fighter or multiple flight fighters launch and guide weapons towards multiple targets at the same time. With the development of many advanced technologies, the air combat scenario becomes more and more complex, the needed condition to attack different targets at the same time is hard to satisfy, and then the sequential attack style is born to make the air combat more reasonable.

The multi-target-attack in this paper is defined as an attack process that the multiple targets which are located in distributed spaces are attacked in sequence. Here, the attack sequence is of a great importance according to different relative situations brought by different targets and the reasonable attack sequence may make the task easier and more effective to complete. The other important point in this paper is about the transform time during the mentioned multi-target-attack. It is not avoidable to research on how to enter the attack area of next target after completing the last attack mission. The concept of attack direction is given to describe the transform style during mission process and a proper attack direction can shorten the total time of executing the attack task and keep our flight fighter safer.

Current researches on multi-target-attack problem mainly focused on the algorithms of calculating the target threat [1, 2], methods of target assignment [35], tactical decision [6, 7], and so on. Only few references are concerned about the transform time during the attack task, and the common researches on sequential attack pay much attention to the optimization algorithms [8]; the systematic researches from a broader tactical view still need to be focused on.

In this study, a new sequential attack method based on the classic multi-target-attack problem is put forward which can make the abstract route planning problem more concrete, and the whole problem has been transformed into a multiobjective optimization problem based on virtual navigation planning. The classic weapon-target-assignment (WTA) problem [9] has been changed to a PSO (Particle Swarm Optimization) problem [10] in solution space. The classic complicated route planning problem has been decomposed into a hierarchical problem which pay more attentions to the optimizing of attack sequence and attack direction. In the process of optimization, the attack sequence and the attack direction are optimized with relative setting granularities and a surviving policy of noninferior solutions is given to make sure that the best solutions in the Pareto boundary [1114] will not be neglected.

The paper is organized as follows: Section 1 is introduction. Section 2 presents the basic sequential attack model and its simplified method. Section 3 describes the modified swarm optimization algorithm with a new surviving policy. Section 4 exhibits the simulation results and Section 5 is conclusion.

2. Background-Basic Scenario

2.1. The Analysis of Target Threatening Area

In modern combat scenario, the flight fighter may have many advanced sensor and weapon systems which can bring much more threats [15]. And in this paper, we define the target’s threat as the threat of target’s comprehensive ability and the threat of target’s destroy ability.

Figure 1 describes the traditional 1 versus 1 air combat situation, is our flight fighter and is the target, and are the velocities, is the relative distance between and , is the target’s approaching angle, and is the target’s azimuth angle. In this paper, we suppose that the attitude angle exposed to the target’s radar is equal to the target’s azimuth angle on condition that and are in the same horizontal plane.

In air combat, the greatest threat to our flight fighter comes from the target’s detection threat and the target’s weapon threat. Thus we need to choose an appropriate approaching method to avoid the threatening area in order to increase our task success rate. So it is necessary to analyze the attack area and the exposure area.

Attack Area. We define the attack area in this content as a special air-to-air missile attack area around the target and only in this area our flight fighter can get a probability within a given threshold to destroy the target after launching a proper missile. The destroy probability may decrease rapidly to zero when launching a missile outside this area [16]. The real-time calculating method to get the attack area is hard to satisfy the needs of the modern combat, so we apply the data fitting method to acquire the approximate target’s attack area [17]. Suppose our member carries the middle-range-missile; then the far and near boundary of the attack area around the target can be calculated by the following formulas:where , are far and near boundary of the attack area around the target, : is attack height, : is missile launching velocity, : is target velocity, : is target accelerated velocity, : is target angular velocity, : is target accelerated angular velocity, : is maneuver overload, : is maximum missile off-boresight launch angle, : is target approaching angle, and : is missile working time.

Then we can get the whole attack area around the target in polar coordinate:where is the target’s approaching angle, is the distance of the target, and is the relative height to the target, where means the attack range in height of missile.

In this study, we suppose that our member has the same attack area with the targets, and both of them have nearly the same comprehensive combat capability. If there was a great gap between these two comprehensive combat capabilities, then we can describe the combat as an asymmetric combat, and the model is not efficient. According to current model, we need to find a proper route planning project to get a better attack situation which can be useful to avoid the target’s attack and to make our member safer.

Exposure Area. It means an area we exposed to target’s radar. The scanning range of airborne radar is about . Then we can also get the exposure area as follows:where is the scanning angle of target’s radar, is the maximum detection distance, and means the detection range in height of radar.

2.2. The Basic Description of the Model

Sequential attack [18] problem can be regarded as a multiobjective optimization problem, and once the attack sequence and the attack direction are assured, the whole attack logic is born. In order to analyze the multi-target-attack process in detail, we focus on the situation with single target for the first step. Before bringing in the model, we should give some definitions about the relative problems.

Definition. (i) Minimum safety distance: this distance can be regarded as the maximum attack distance of the enemy’s. When entering this area, our member may get the probability of being attacked by the enemies. (ii) Attack preparing area: this area is defined between the minimum safety distance boundary and the far attack area boundary where our flight fighter should complete a series of actions to complete its attack task.

From the left side of Figure 2, we can see the whole process of single-target-attack.

is the virtual navigation route across the attack preparing area (an approximate area in this paper), and through the whole cross process, the flight fighter may deal with several key stages; they are listed as follows.

(a) Tactical Maneuvering Stage. This stage may decide which targets to attack and which routes to choose to enter the minimum safety distance. This stage may last till the missile launches.

(b) Attack Direction Assuring Stage. This stage is used to avoid the threaten area of enemies and find a more effective way to increase the success rate.

(c) Retreat Routing Stage. This stage is very important to offer an input for the next attack process and it is also useful to find an safe retreat route to get away from the last threaten area.

The three stages can describe the whole attack process and in order to build a mathematical model of the different stages, we simplified the model as the right side of Figure 2.

The attack preparing area is described by two circles of tactical navigation points. The inner circle is the boundary of far attack area and the outer circle is the boundary of minimum safety distance. The missile can be launched towards the target when the far attack area boundary is reached, so we center the target and take sample points in the far attack area boundary every angle; then we can get the 1st circle tactical navigation points. We define the 1st circle tactical points of target as . In order to enter the 1st circle tactical points, we cannot avoid the minimum safety distance boundary which can be decided by the threatening degree of the target as well as the relative combat situations. So we also center the target and take sample points in the minimum safety distance boundary every () angle; then we can get the 2nd circle tactical points. We define the 2nd circle tactical points of target as . Then the problem can be simplified as a route optimization problem which can be described as how to find a best route through the two circles with shortest time and least threats. Then the transformation between two targets can be completed.

If target would be attacked before target , then the partial order exists and we make it as . The solution space of virtual navigation can be described as

From the right side of Figure 2, we can see that means the attack route through two circles of navigation points and is the angle between the velocity of target and the attack route and it can describe the attack direction towards the target.

From the analysis above, we can conclude the problem in two steps.

Step 1. Choose four tactical points from the two circles, and decide the attack sequence according to every single target in different space. We describe it as .

Step 2. Connect the four tactical points in sequence, and a new virtual navigation route is born. We can describe it as a tuple:where means the number of navigation route fragments which connect the two kinds of navigation points in different circles. is the initial position of our member and it is also the first navigation point in the attack route. is a set of serial numbers of targets which records the attack sequence. contains all the chosen tactical points and their orders. ends the navigation.

3. Modeling and Algorithm Optimizing

3.1. Analysis of Sequential Attack and the Attack Direction

The single-target-attack model is given in Section 2, and the multi-target-attack model is set up in this chapter. From Figure 2, we can get the general view of sequential attack in multiple targets’ situation.

In Figure 3, the blue line means the attack sequence and the red line means the attack direction. We can easily find that once the tactical points are decided, the whole attack plan including attack sequence and direction is acquired. From a tactical view of the combat situation, we can solve this problem in three different hierarchies.

In Figure 4, the problem has been divided into three parts which describe the feasible region, sequential attack, and attack direction, respectively. The second layer can be described as a directed graph , , where is a set of targets and is a set of connection arcs. means there is a partial order between and , and will be attacked first. The third layer can also be described as a connected directed graph , where is a set of tactical navigation points and is a set of connection arcs. Then the whole problem can be rebuilt as a variable granularity directed graph , means the connection arcs between different granularities.

3.2. Modeling
3.2.1. Targets’ Reformation

In current air combat scenario, the targets’ flight fighters always appear in formation to execute associated tactical task. Thus we can divide these targets into different groups according to their unique characters in order to simplify the complex combat situation. And first, the group should satisfy the following formula:where is the mean distance between two targets in the same group and is the mean distance between two different groups. The minimum value of can be regarded as the important index to choose the proper projects.

We give the minimum distance between groups and maximum distance between targets in the same group in different projects according to the combat needs. When , then the target does not belong to the group. When  , we can decide that the target is in the same group. Thus, we let in order to use a common method for completing the targets’ reformation.

The concrete method to reform the target is given as follows:(a)Set a tactical target’s group as are members in the group and is the member.(b)Set the attribute of the member as is the space coordinate of the target in geographic coordinate system; is the velocity in geographic coordinate system; is the flight direction angle in geographic coordinate system; is the target’s types.(c)Set the constraints to reform the target: is the threshold to reform the targets in targets’ location; is the velocity threshold of target; is the flight direction angle threshold of target; is the maximum number of the group. Different constraints may bring different consequence, so it all depends on the combat situation.

3.2.2. Attack Sequence Optimization

In air combat scenario, the advantages or disadvantages towards enemies can be judged by four conditions such as aspect, relative distance, velocity, and height [19]. We can get the attack sequence by the formula below:where are linguistic variables in which grade values are between 0 and 1; the closer the value of membership grade is to 1, the more advantages it is to attack the target. is the weight variable set which contains four relative weight variables in order to stress the importance of the linguistic variables. Then the fitness function can be given as follows:

According to different targets, we can get a sequence of (), and then the total advantages can be confirmed.

3.2.3. Attack Direction Optimization

In the model we mentioned above, we can easily find that the attack direction can only be confirmed by connecting two tactical navigation points around the target. So once the best tactical points are chosen, the optimal attack direction is given automatically.

3.3. The Evaluating Indexes of the Optimization

The evaluation function is needed to evaluate the attack route, and in this situation the distance between two different tactical points is far enough with the support of the ability of long-middle-range missile. Thus we set up four main indexes to evaluate the whole attack route which contains the total distance of attack route, the exposure rate, the constraints of attack direction, and the constraints when turning around. Figure 5 describes the detailed definition of each variable.

3.3.1. Total Distance of Attack Route

Considerwhere is the distance of each navigation fragment.

3.3.2. Attack Route under Threat

Considerwhere is the distance under threat (fire threat) of each navigation fragment, the distance under threat is in relationship with the target’s attack area, and it can be calculated by analysis of the combat situation of enemies.

3.3.3. Attack Direction Constraints

The attack direction should satisfy the maximum missile off-boresight launch angle, so we give the constraint aswhere describes the attack direction towards target and is the maximum missile off-boresight launch angle.

3.3.4. Constraints When Turning Around

Considerwhere is the angle between route and route , means the distance of route , is the minimum turn radius, and is the minimum turn angle.

These four indexes we mentioned above can make contributions to building the fitness function as follows: where is the fitness function and the smaller gets the better the result will be. If , then the value would be meaningless. is the total distance of the attack route, is the distance under threat, and are normalized coefficients, and are weight coefficients, and and are correction terms to correct the conditions when the target approaching angle cannot satisfy the need of maximum missile off-boresight launch angle and the turning angle is too small to support our action.

3.4. Calculating Process

According to the problem simplification above, we have changed the complex model into a typical TSP model; thus we use hybrid Particle Swarm Optimization method to solve this problem. The detailed steps can be acquired in Figure 6.

3.4.1. Encoding Method

From Figure 7, we can see that the length of the gene code is , each target may get 4 codes which can be described by decimalism, and each code ranges from 1 to the maximum number of tactical points. For better initializing the values, we make the two codes in the middle of the gene unequal, and all the code will get a random but not repeated number from 1 to the maximum number of tactical points.

3.4.2. Route Modifying

The two-circle-encode style has forced all the routes to cross through the tactical points, so the situations of route crossing and repeating exist. According to the rule in Figure 8, we can get the new attack route.

The project needs to be accessed again after modifying the virtual navigation. If the accessing result was not better than the old one, we would keep the old policy.

3.4.3. Result Space Expanding Policy

When calculating, the result may not get out of the local optimization, so after each iteration, we get the global optimal value:

Then we can deal with the existing result as follows and the description of the space expanding policy can be seen in Figure 9:(a)Rescue the abandoned route when the following condition is satisfied:where is the global optimal value in current time and is the abandoned value in the current circulation; when the given condition is satisfied, we rescue the relative , and this route will take part in the next circulation.(b)Get random points around each best tactical navigation point within the distance . ( defines the radius of each tactical area.)(c)Expand the result space with choosing points and get a new result space .(d)Calculating , is the simulation time. If , then we save the current result.

3.4.4. Calculating Steps

See Algorithm 1.

Input: () Targets’ attributes, including the targets’ number , the coordinate , the velocity and the attack area
; () Our flight fighters’ attributes, including the number of our fighters , the angle to decide the number of tactical
navigation points, the coordinate , and the results space ; () A result space expanding policy to optimize
the result.
Suppose Condition: () The targets stay flying in a stable velocity and an unchanged direction; () The tactical points’
formation should obey the constraints .
Output: () The global optimal fitness result ; () Best tactical points formation .
Initialize: random , set the initial state
Begin
For each iteration   // is the iteration number.
  Cross // executing the cross process towards the setting codes.
   If   do not obey the constraints
    While  ( obey the constraints )
     Random   // make sure that all the elements in obey the constraints.
    end
     Update  ()
   end
     Calculating  ()
      If    Then
      
      // executing the variation process towards the setting codes.
   Cycling the process as  Cross  method.
   Executing  () // the saving policy is used to expand the result space to optimize the final result.
End
      Return  , ,
End

4. Simulation

4.1. Hardware Condition

CPU is P4 2.8 GHz and RAM is 1.5 G, Matlab 2010.

4.2. The Tactical Scenario

Our flight fighter is flying towards the enemies’ formation, and the initial locations of enemies and our member are given in Table 1.

The relative situation can be seen in Figure 10.

4.3. Simulation Result

We suppose the detecting area of enemies is stable at the moment, and we need to find the best attack sequence and attack direction at this moment. We set 3000 loops to optimize the final result, and the result can be seen in Figures 11 and 12.

From Figure 11, our member choose the proper direction to avoid the threaten areas in order to complete the task in a relative short way. The attack sequence can be described as , and the attack direction (the direction of enemy velocity is the initial angle 0°) can be decided by the angles given in Table 2.

Figure 12 shows the updating process when choosing the best solution, and after 600 more loops, we get the stable value; the best route we choose can be shown as follows:

In Figure 12, three different methods are compared with each other. The blue line shows the result when using traditional PSO method without dividing them in different granularities; then it has cost more time to get a stable result because of much more formations of the available tactical points. The red line means the VGHPSO method we mentioned above, it has cost less time to get a stable value, but it is easy to get trapped in the local optimal value. Thus we use method which means the VGHPSO method with result space expanding policy. We can see the result reflected in cyan line.

In the former chapters, we can know that the numbers of tactical points are depended on the sampling angle. Thus we do some simulation with different sampling angles, and the results can be seen in Figure 13.

From left side of Figure 13, the blue parts mean the total distances in different sampling angles, and the red parts describe the distances under enemies’ threats. Then we can get the ratio as shown in Table 3.

From Table 3, we can see that when choosing the sampling angle as 15°, we can get a minimum comprehensive index which indicates that we may get a more proper result efficiently with less threats and shorter times.

The usage of the results in this paper can only be regarded as the equal description of attack sequence and attack direction, and the tactical points in virtual navigation are not the real navigation points, but of great importance to simplify the engineering problems.

5. Conclusion

The multiobjective sequence attack and attack direction planning methods are given in the paper. We put forward a simplified model to create the tactical points in virtual navigation, and the complex air-to-air combat planning problem has been transformed into a variable granularity TSP problem; then the VGHPSO method is used to solve the given problem. In the end, the result of the simulation shows the efficiency of the method and it also indicates that the model is available.

The model and method we mentioned in the paper are available only in static combat planning which belongs to precombat planning problem. But in real combat scenario, we need a dynamic data management system to optimize the real-time policies. Then we need to pay much attention to the prediction of the future situation according to the historical data [20]. Thus we may get a more proper and more accurate result.

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.