Advanced Techniques for Networked Systems with ApplicationsView this Special Issue
Research Article | Open Access
Combat Network Synchronization of UCAV Formation Based on RTBA Model
The paper aims at developing an efficient method to acquire a proper UCAV formation structure with robust and synchronized features. Here we introduce the RTBA (Route Temporary Blindness Avoidance) model to keep the structure stable and the HPSO (hybrid particle swarm optimization) method is given to find an optimal synchronized formation. The major contributions include the following: (1) setting up the dynamic hierarchy topologic structure of UCAV formation; (2) the RTB phenomenon is described and the RTBA model is put forward; (3) the node choosing rules are used to keep the invulnerability of the formation and the detective information quantifying method is given to measure the effectiveness of the connected nodes; and (4) the hybrid particle swarm optimization method is given to find an optimal synchronized topologic structure. According to the related principles and models, the simulations are given in the end, and the results show that the simplification of the model is available in engineering, and the RTBA model is useful to solve the real problems in combat in some degree.
Since the control theory and intelligent technology have acquired significant advances, research on multiple unmanned combat aerial vehicles (UCAVs) has attracted more and more attentions in recent years. The cooperative problems , control command problems [2–4], mission assignment problems [5–7], and route planning problems [8, 9] have become the focus among researchers. The structure of UCAV formation has also been focused on in recent years. The frequent exchanging information among different UCAVs during the mission process needs a robust and efficient structure to keep the systems up. A robust status needs an adaptive structure both in physical level and in functional level and an efficient job among UCAVs needs a consistent recognition towards the same combat situation.
Many researches concerned about the UCAV formation have assumed that all the UCAV units had their information completely shared, and the communication interruptions from both the enemies and the measurement errors are neglected, such as [10, 11]. But, in real combat, the UCAV units can only get limited information about the situation due to the limitations of current communicating abilities. Just a few references have described the UCAV model with a local knowledge mastered by the combat units. Reference  has designed a new distributed auction algorithm based on the neighbor knowledge. Reference  puts forward a cooperative missile guiding rule based on the local communication and the features of heterogeneous structure. Reference  gives a new distributed auction algorithm with a limited communication ability. Though these researches have brought us many valuable results which may be useful to solve some problems in real society, the researches on topology structure and the dynamic model still need to be analyzed.
Route Temporary Blindness (RTB) problem  which may lead to communication interruption may also be very important to have an effect on the robustness of the UCAV formation. The communication among UCAVs during the continuous mission executing process may lead to RTB problem, and the RTB problem may force the formation to upgrade its structure. In order to get an optimal UCAV formation, we put forward a method in this study to solve the RTB problem and get an optimal structure with efficient synchronized features.
The paper is organized as follows: Section 1 is introduction. Section 2 presents the dynamic topology model of UCAV formation and its node survival model. Section 3 describes the rout blindness problem and its solution. Section 4 puts forward an optimal algorithm aiming at finding a better structure with a more stable and synchronized features. Section 5 gives the simulation results and Section 6 is conclusion.
2. Dynamic Topology Modeling of UCAV Net Constructing
In order to solve the cooperative problems in UCAV cooperation, we need to better understand the structure of the UCAV formation both in physical and in functional levels. The structure of UCAV formation can be described as , is the variable set of physical structure which can be described as , is the set of UCAV nodes, and means the connections between different nodes. Each edge can find two relative nodes in . is the feature set of UCAV formation, , is the maximum number of UCAVs, and is the maximum number of the kinds of UCAV features. is the variable set of functional structures which is constructed as , is the number of kinds of different missions, and represents a set of logic relationships between different functional nodes.
2.1. Physical and Functional Networks
The fast developed technologies have greatly expanded the functions of UCAVs, and different cooperative relationships may bring various functional UCAV formations to satisfy the continuously changing missions. In order to efficiently complete the given missions, we need to analyze the relationships of the net constructing structures between physical and functional levels in UCAV formations.
From Figure 1, we can see that one SoS (system of systems) of UCAV can be divided into several parts according to the needs of missions, such as fight network, interception network, support network, management network, and communication network. The latter one is communication network which can be regarded as the physical network and other networks are functional networks which are in close relationships with the physical network. For most real UCAV systems, their functional connections and physical connections are not equivalent.
2.1.1. Heterogeneity of UCAVs
For UCAV formation, each single UCAV has its own special features which match different kinds of functional networks, we suppose that there are kinds of UCAVs, and the number of UCAVs is , the state space is , and the relative action state is . Then the mapping formula can be described as
The transforming description can be seen in Figure 2.
In Figure 2, means the environment, and the other variables can be found in Section 2. Figure 2 is a typical OODA ring which can also reflect the transforming process of constructing the physical net to complete the task of functional net. A stable and static physical net can be useful to keep the high efficiency of UCAV formation. But, in real combat, the dynamic environment and other continuous changing factors may need a dynamic structure to support UCAV formation.
2.1.2. Time-Varying Features of UCAV Structure
Figure 3 shows the dynamic process of the transformation in the net constructing structure. During different time areas, the physical structure is different due to the needs of the missions and the features of each UCAV. is the time-varying function of physical structure which is driven by the missions. Different missions may stimulate different physical structure which can affect the style of functional structure greatly. The results coming from functional structure may also reaffect the physical construction. The physical structure will change at time , and in Figure 3 means the unexpected missions which may cause the changes of the physical structure. In particular, time between and is not a constant, and it depends on the needs of the relative missions.
Formula (2) can describe the dynamic process:
From formula (2), we can see that, during the stable stage, the physical structure keeps a stable status without considering the error , which can be described as , , and are the velocity and position errors of each UCAV. At time , the physical structure may change due to the new coming missions. is the transforming function which can help the system to complete the update. is the initial description of the structure which is decided by the given mission.
2.2. Node Survival Model of Multi-UCAV Formation
According to [16–18], we can conclude some obvious features of complex system. They are as follows:(i)The component systems achieve well-substantiated purposes independently even if detached from the overall system.(ii)The whole function of a complex system cannot be easily composed of every single subsystem ().(iii)It has some intelligent features in some degree which can complete a special mission by predicting the situation using the current information.
From the features we mentioned above, we can regard the UCAV formation as a complex system. Then the vulnerability feature should be analyzed in order to keep the system stable.
The failure probability function can be described as 
where denotes the degree of the node and can be regarded as the measure of the knowledge on the network structure. There are four kinds of conditions:(i), which means that the attacker masters more information about the nodes with low degree. Node with low degree may be more vulnerable and the attacker may use the low-node-first attack strategy.(ii), which means that the attacker masters more information about the nodes with high degree. Node with high degree may be more vulnerable and the attacker may use the high-node-first attack strategy.(iii), which means the random attack.(iv), which means the deliberate attack.
3. Description of Route Temporary Blindness Problem in UCAV
In Figure 1, the importance of physical and functional structure of UCAV formation has been described. We can easily find that the physical network is the foundation of the whole mission. And a proper physical structure is the most important factor for the formation to complete the given mission. And, in this paper, we regard the communication network as the physical network. Thus, the Route Temporary Blindness problem comes.
3.1. Problem Statement
When cooperating with other UCAVs during a mission, a single UCAV needs the information from its neighbors. A stable and reliable neighbor may be of great importance to keep the stable status of the whole structure.
The Route Temporary Blindness problem may be caused in different stages:(1)During relatively stable stage, the problem may be caused by . The accumulated errors in position may disturb the normal prediction of the single UCAV, and the deviated position within an information updated cycle may lead to the overranging of the communication radius. Then the chosen neighbor node may be unavailable and the communication in next cycle may be broken.(2)At the mission transforming moment, the problem may be caused by the change of the dynamic physical structure. The vulnerability of the nodes in different mission processes may get different values which may cause the changes in position and connection among UCAVs. When a mission changes, the highest degree neighbor may change from the most vulnerable node to the least vulnerable node. So the neighbor needs to be changed in order to protect the formation from the future temporary blindness problem.
From Figure 4, means the UCAV node in formation, is the node which has been researched on, and is the information communicated between and its neighbors. , , and are the position information, is the velocity, and is the degree of its neighbors.
3.2. RTBA Model
3.2.1. Route Temporary Blindness Physical Avoidance (RTBPA) Model
In order to avoid the RTB phenomenon, we need to predict the future position of the UCAV. Assume , is one of the intervals between and , and means the number of the intervals. We regard the whole process as a combination of uniform motion and accelerated motion. If the information at time is given, then the position in direction at time obeys Gauss distribution.
During th interval in time , the position, velocity, and acceleration of UCAV in direction can be described as , , and , and they have the following relationships:
According to the definition of Gauss distribution, if the position of at in direction is given, we can set the Gauss variables of position at as: , and . And, after , we can get the probability
Then, we can get the position at as
3.2.2. Rout Temporary Blindness Functional Avoidance (RTBFA) Model
(a) Analyze the Mission: Positive and Negative Missions. In order to simplify the combat conditions, the missions have been divided into two different types, namely, positive mission and negative mission .
Definition 1. One defines the positive mission as a preplanned mission which may be executed based on the possessed knowledge of the enemy. And the positive mission may have a hiding policy to reveal the information to the enemy as less as possible. In all, when executing a positive mission, the formation may have obtained the priority in combat.
According to Definition 1, one can see that when executing a positive mission, or . The enemy may consider random attack policy or low degree node preferential policy. Neighbor node with low degree may become more vulnerable.
Definition 2. Negative mission is an unintentional or partial knowledge possessed mission; it happens when outer threats come out without prediction or inner malfunctions appear in some probability. During negative mission process, the enemy has occupied the combat situation and it has possessed more information of our formation.
Analyzed by Definition 2, when executing a negative mission, or . The enemy may consider deliberate attack policy or high degree preferential policy. Neighbor node with high degree may become more vulnerable.
(b) Measurement of Possessed Information. The detective information is regarded as the possessed information about the enemies, and the detective problem is related to the hypothesis testing problem: : there is no object within the search range. : there exist (an) object(s) within the search range.
Suppose that the probabilities are and and the related variables of detective problem are as follows.
(i) Probability of False Alarm (PFA). It is the probability of a false decision which regards an event that did not happen as an event that happened. , and the PFA of airborne pulsed Doppler radar is 
where is the amplitude of noise envelope from the detector, is the mean square value of noise voltage, and is threshold voltage.
(ii) Probability of the Right Decision. It is the probability of a right recognition and decision which can be described as
(iii) Probability of Detection. When an event happened and is correctly decided by the detective facility, the probability can be described as . And the PD of airborne pulsed Doppler radar is
(iv) Probability of Miss. It is the opposite meaning of PFA, that is, when an event did happen while the detective facility decides that it as an event that did not happen. , and the PM of airborne pulsed Doppler radar is
Under condition , the information Shannon can be regarded as
And, under condition , the information Shannon can be regarded as
The information Shannon  under detection condition is set as the sum of and :
reflects the detective information. The bigger gets, the more the information is needed. Set an expected value , and if , the information is enough and the mission can be regarded as positive mission. If , the mission can be regarded as a negative mission:
3.2.3. Avoidance Function
is a decision function that measures the effectiveness of the current chosen nodes.
3.3. RTBA Utility Indexes
In order to get a more reliable communicating partner, we set the following indexes.
(i) Continuously connecting feature: being the set of the neighbors of .
According to the predicted position of UCAV and , the relative position between the sender and receiver can be described as
After , the positions of the sender and receiver are and .
where describes the connecting relationship between UCAV and after and can be regarded as continuously connecting feature.
(ii) Nearer connecting distance: , .
The complex index can be described as
where is the reliability weight of neighbor nodes.
The connecting result of each node can be decided by the value of , and we can finally get a neighbor matrix which decides the structure of the formation. According to the features of complex networks, if more than two nodes need to be replaced during the same mission period, then the new nodes choosing order may be very important to the net structure. Different nodes choosing order may lead to different neighbor matrix. is the neighbor matrix set, and we need to get a proper matrix which can bring a more stable and effective result.
4. Dynamic Topology Optimizing Method Based on Synchrony Features
4.1. The Synchronization of UCAV Formation
Synchronization phenomenon exists widely in nature, such as the synchronization of fireflies glowing and the synchronization of large groups of neurons in human brains and the clapping frequency synchronization . The synchronization phenomenon is also an important concept in UCAV formation and it reflects the recognizing abilities of each node and we give the definition of synchronization in formation.
Definition 3. Synchronization in UCAV formation can be regarded as the agreement on the combat situation by different UCAV nodes. And it can be described by the conformance degree towards the same combat situation.
As one mentioned in Section 3.1, each UCAV node can be regarded as a dynamic system, and there exists coupling effect between two connected nodes. Then the dynamic equation of each node can be given as below:
where is a dimensional state vector and is the dynamic equation which obeys Lipchitz condition .
is coupling efficient, describes the different coupling styles among different vibrators, is the element with Laplace features, and is the state of each node.
If any solution to (20) satisfies the following condition, then we can say that the system is a completely synchronized system:
If there exists a real number which is greater than zero, it constructs the following relationship:
If any solution to the equation above satisfies the following condition, then we can say that the system is a local synchronized system:
The UCAV formation can be regarded as a local synchronization system in this research.
4.2. Indexes of Synchronization in UCAV Formation
The synchronization of UCAV formation is decided by the following three factors :(i)The dynamic features of each node.(ii)The net structure, namely, matrix .(iii)The coupling effect between different dynamic systems.
According to , can be used to describe the synchronization features. describes the robustness towards the communication delay and means the second largest eigenvalue which can also be regarded as algebraic connectivity. The synchronization feature of the system is often improved by decreasing the value of . in ascending sort order is the eigenvalue of matrix . The evaluating function is set as
where is used to evaluate the connectivity and delay robustness of UCAV formation, is the number of kinds of functional nodes, means the weight in relation to different kinds of functional nodes, , and is the sum of all the nodes’ efficiencies. From , we can get the node’s efficiency model:
where is the degree of node and and are the modifying variables according to the situation. In order to get an optimal value, we need to get . Then the optimal function can be set as
4.3. Dynamic Topology Constructing Method Based on HPSO Method
According to the aforementioned contents, the optimal structure needs to be found in order to keep the stability and synchrony of the UCAV system. The new nodes choosing order has brought more than one kind of net constructing structure. Thus the problem has been simplified as finding a proper sequence.
4.3.1. Calculating Process
According to the problem simplification above, we have changed the complex model into a typical TSP model; thus we use hybrid particle swarm optimization method to solve this problem. The detailed steps can be acquired in Figure 5.
4.3.2. Encoding Method
The length of the code equals the number of nodes which need to find new partners. The codes can be described by natural numbers which should get repeated. If the new nodes choosing order is , then the code can be set as .
In Figure 6, is the sequence number which means the sequence of the node in kind of functional node. Different kinds of functional nodes may match different kinds of weights which are very important to the final result.
4.3.3. Code Crossing Rules
In order to accelerate the process of convergence, the crossing rules are brought into the algorithm. And the detailed rules are described in Figure 7.
From Figure 7, the crossing rules are as follows:(i)Selecting two crossing points in the old code set randomly.(ii)Exchanging the codes between the crossing points.(iii)Executing the self-testing process to avoid the repeated codes.(iv)Rebuilding the codes.
5.1. Hardware Condition
Hardware condition is as follows: CPU: P4 2.8 GHz, RAM: 1.5 G, and Matlab 2010, NS2.
5.2. Software Settings
|Simulation range||100 km2|
|UDP data||512 Bytes|
|Transportation fading model||Friis|
|UCAV communicating distance||1 km|
|Simulation time||200 s|
5.3. Evaluation Indexes
In order to verify the effectiveness of RTBA model, we use Packet Delivery Ratio (PDR) and End-to-End Delay (EED) to complete the evaluating process.
5.3.1. Packet Delivery Ratio (PDR): Ratio of Information Received by All the Possible Receiving Nodes to Information Sent by an Exact Sending Node
is the information received by a chosen node, describes the information received by possible chosen nodes. describes all the sent information.
5.3.2. Average End-to-End Delay (AEED): The Average Time of Information Transportation from Sender to Receivers
where means the time when the data package is received, means the time when the data package is sent, and is the number of data packages.
5.4. Simulation and Analysis
5.4.1. RTBA Model Analysis
Three models are put forward to compare the PDR values. Here we used RTBA, RTBPA, and normal model to make a comparison while the normal model is the traditional communication model without any restoring strategies. We first assume that the mission has kept a stable status, and the UCAV nodes fly at an increasing velocity.
The initial number of UCAV nodes is 50 in Figure 8(a), and we can find that during a stable status, the RTBA model may have a better PDR value. With the increasing of the velocity of nodes, the robustness of UCAV formation may be influenced. The continuously increasing velocity may enlarge the error in RTB problem, so the PDR may decrease, but RTBA model still has a better performance than others. And, in this situation, RTBPA model has almost the same performance as RTBA. Figure 8(b) has the same simulating environment but an increasing UCAV number. We set 100 UCAV nodes in the right side. We can easily find that the increasing number of UCAVs may have an obvious superiority. At a relatively low velocity, the normal model may even have a better value than the others, but, with the increasing of the velocity, RTBA model will show its superiority.
In order to describe the performance of models in an unstable status, a sudden threat is designed at time 30 s, and then negative mission appears. The velocity of UCAV formation is given as and the PDR values are shown in Figure 9.
Figure 9 reflects the PDR comparison when executing , and the unexpected threat has influenced the robustness of the formation. After 30 s, the threat has enlarged the potential risk of parts of the nodes, then PDR in all the models have descended. At about 45 s, PDR in RTBA model has bounced back and kept a stable value, while PDR in normal and RTBPA model has not bounced back. The threat has great influences on the functional feature of the nodes; RTB model may have a better self-testing and restoring ability which can be important to keep the robustness of UCAV formation.
AEED can also be used to evaluate the efficiency of a cooperative system. From Figure 10, RTBA model has a relatively low AEED value with the increasing of the velocity. Figure 10(a) has 50 nodes and Figure 10(b) has 100 nodes and Figure 10(a) has an obvious low average value compared to that in Figure 10(b). More nodes may offer more connecting choices, and more choices may shorten the node choosing time, so the average value of AEED is lower. The increasing velocity may enlarge the physical error and the formation in RTBA and RTBPA model has to test the connectivity of the system for many times, and then the value of AEED increases.
Figure 11 shows the average time delay probability in different models after 1000 times’ simulations when the formation encounters a sudden threat (negative mission). For simplification, we make the time delay remain at one decimal. In RTBA model, the time delay focus on 0.2 to 0.4 seconds. In RTBPA model, the time delay focus on 0.4 to 0.8 seconds. In normal model, though the time delay shows its random features, it has a greater average value. And we can find the following: , , and . Among 1000 simulations, there exists communicating broken situation in RTBPA and normal models. If a communicating broken problem happens, value of AEED may trend to be infinite and the result may be totally different.
5.4.2. Optimal Synchronized Structure Seeking
We assume that, after the appearance of a sudden threat, nodes 2, 6, and 9 may get a higher probability of being attacked, and then a better node choosing order is needed so as to get a better constructing structure.
From Figure 14 we can see that the edges among different nodes have increased, and the edges around nodes 2, 6, and 9 have decreased. The whole formation has a flatter structure which contains more cross-grade connections. And the relative values of relative variables are as follows: , , , and . The value of has decreased due to the interception of the negative mission. The result can also describe that a flat structure may be proper to improve the synchrony of UCAV formation.
Dynamic UCAV formation net constructing problem under RTB situation is solved in this paper. Robustness and synchronization are set as two important indexes to seek for an optimal UCAV formation structure. In order to analyze the influences caused by the combat missions, the mission kinds and mission stages are classified, and a dynamic structure changing mechanism is put forward. RTBA model is given to optimize the functional and physical nodes in order to keep the robustness of the formation. And HPSO method is used to find a proper structure to get an appropriately synchronized features. The dynamic structure constructing problem has been transferred to a node choosing sequence optimizing problem which can be regarded as a TSP problem. Finally, the efficiency of RTBA model has been given according to the comparison with other models and the optimal structure with better robustness and synchronization has been acquired using HPSO method.
From the perspective of net constructing consumption, the optimized formation structure is able to keep a synchronized feature with not many changes in edges. This will be very important to decrease the cost of keeping the connections among different UCAVs.
From the perspective of robustness, the high risky nodes have relatively low probability of being connected in the optimized structure which can be useful to keep the robustness of the formation.
From control and command perspective, edges in formation have increased obviously, and the cross-grade connections have taken a great ratio in the optimized structure. A flatter formation is useful to improve the comprehensive efficiency of UCAV formation.
Combat situation is very important because it can influence the state of UCAV and even the structure of UCAV formation. In this content, combat situation is simple and the scenario is regarded as an absolutely ideal space. A complex scenario may be more credible in real combat situation. Thus we need to pay more attention to this area in order to put the theory into practice.
The authors declare that they have no competing interests.
- C. Pan, W. Ye, J. Chen, and J. Guo, “Cooperative control for UCAVs path planning,” in Proceedings of the 8th World Congress on Intelligent Control and Automation (WCICA '10), pp. 5259–5263, Jinan, China, July 2010.
- J. Chen and X. Gao, “Modeling and analysis of command and control system in cooperative air combat,” Engineering and Applications, vol. 45, no. 10, pp. 195–198, 2009.
- A. H. Levis, Time Sensitive Control of Air Combat Operations, Cebter of Excellence in Command, Control, Communication and Intelligence, George MASON University, 1998.
- F. D. J. Bowden, Petri Nets and Their Application to Command and Control Systems, Information Technology Division, Electronics and Surveillance Research Laboratory, Salisbury, Australia, 1996.
- S. Erkan, M. Kandemir, and G. Giger, “Advanced task assignment for unmanned combat aerial vehicles targeting cost efficiency and survivability,” in Proceedings of the 46th AIAA Aerospace Sciences Meeting and Exhibit, Reno, Nev, USA, January 2008.
- C. Schumacher, P. Chandler, P. Pachter, and L. Pachter, “Constrained optimization for UAV task assignment,” in Proceedings of the AIAA Guidance, Navigation, and Control Conference and Exhibit, Guidance, Navigation, and Control and Co-located Conferences, Providence, RI, USA, August 2004.
- D. Zhang, G. Xie, J. Yu, and L. Wang, “Adaptive task assignment for multiple mobile robots via swarm intelligence approach,” Robotics and Autonomous Systems, vol. 55, no. 7, pp. 572–588, 2007.
- T.-Q. Ni, J.-D. Wang, and Y.-A. Liu, “Application of particle swarm algorithm in route planning of UAV,” Systems Engineering and Electronics, vol. 33, no. 4, pp. 806–810, 2011.
- R. J. Szczerba, P. Galkowski, I. S. Glicktein, and N. Ternullo, “Robust algorithm for real-time route planning,” IEEE Transactions on Aerospace and Electronic Systems, vol. 36, no. 3, pp. 869–878, 2000.
- S.-Q. Tang, C.-Q. Huang, J. Hu, and W.-C. Wu, “Threat equivalent and improved PSO algorithm based real-time method of UCAV route planning,” Systems Engineering and Electronics, vol. 32, no. 8, pp. 1706–1710, 2010.
- J.-Y. Du, F.-M. Zhang, H.-B. Mao, H.-W. Liu, and J. Yang, “Game theory based multi-UAV cooperative searching model and fast solution approach,” Journal of Shanghai Jiaotong University, vol. 47, no. 4, pp. 667–678, 2013.
- B. Di, R. Zhou, and Q.-X. Ding, “Distributed coordinated heterogeneous task allocation for unmanned aerial vehicles,” Control and Decision, vol. 28, no. 2, pp. 274–278, 2013.
- X. K. Bao, Modeling and Analyzing of Networked Operation Synchronization, National University of Defense Technology, Changsha, China, 2009.
- M. M. Zavlanos, L. Spesivtsev, and G. J. Pappas, “A distributed auction algorithm for the assignment problem,” in Proceedings of the 47th IEEE Conference on Decision and Control (CDC '08), pp. 1212–1217, Cancun, Mexico, December 2008.
- D. Medina, F. Hoffmann, F. Rossetto, and C.-H. Rokitansky, “Routing in the airborne internet,” in Proceedings of the Integrated Communications, Navigation, and Surveillance Conference (ICNS '10), pp. 11–13, Herndon, Va, USA, May 2010.
- X. Huang, Scientific Research on Complex Methodology, Qsinghua University, Beijing, China, 2014.
- S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, and D.-U. Hwang, “Complex networks: structure and dynamics,” Physics Reports, vol. 424, no. 4-5, pp. 175–308, 2006.
- R. John, Dynamic Complexity in System of Systems, Engineering & Technology. Advanced Sytems. Boeing Company, 2007.
- L. K. Gallos, R. Cohen, P. Argyrakis, A. Bunde, and S. Havlin, “Stability and topology of scale-free networks under attack and defense strategies,” Physical Review Letters, vol. 94, no. 18, Article ID 188701, 4 pages, 2005.
- D. Luo, Z. Yang, H. Duan, Z. Wu, and C. Shen, “Heuristic particle swarm optimization algorithm for air combat decision-making on CMTA,” Transactions of Nanjing University of Aeronautics & Astronautics, vol. 23, no. 1, pp. 20–26, 2006.
- D. Stein, J. Witkoskie, S. Theophanis, and W. Kuklinski, “Random set tracking and entropy based control applied to distributed sensor networks,” in Proceedings of the Proceedings of SPIE, vol. 6567, pp. 656709–656722, Beijing, China, November 2007.
- S. Li, Research on the Mechanism of Cascading Dynamics and Behaviors of Complex Networks, Beijing University of POSIS and Telecommunications, 2012.
- D. Shi, G. Chen, W. W. K. Thong, and X. Yan, “Searching for optimal network topology with best possible synchronizability,” IEEE Circuits and Systems Magazine, vol. 13, no. 1, pp. 66–75, 2013.
- M. Jalili, “Enhancing synchronizability of diffusively coupled dynamical networks: a survey,” IEEE Transactions on Neural Networks and Learning Systems, vol. 24, no. 7, pp. 1009–1022, 2013.
- J. Yan, X.-M. Li, L.-J. Liu, and B. Liu, “Combat network synchronization of air fleet formation,” Systems Engineering and Electronics, vol. 36, no. 8, pp. 1566–1572, 2014.
Copyright © 2016 Chengwei Ruan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.