Open Access

LAV Path Planning by Enhanced Fireworks Algorithm on Prior Knowledge


Cite

Introduction

LAV is a new kind of aircraft, which can cruise in the airspace over the targets, whose development has benefited from the rapid development of UAV (unmanned aerial vehicle) and missile technology. The path planning of LAV is to generate a space path between an initial safe location and the desired dangerous destination that has an optimal or near-optimal performance under specific constraint conditions. It is always a complex research subject, so it is an imperative technology required in the design of LAV. Series of algorithms have been proposed to solve similar complicated multiconstrained optimization problem of UAV and UCAV. Yudong Zhang et al. [1] introduced these methods, and described their advantages and disadvantages, such as GA (Genetic Algorithms) [2, 3], ACO (Artificial ant colony algorithm) [4], ABC (Artificial bee colony algorithm) [5, 6], PSO (Particle swarm optimization) [7]. After that, some scholars still used a modified form of these algorithms to handle the UCAV Path Planning, and the performances had corresponding been increased, such as PSO [8]- [13], ABC [14], ACO [15].

Yudong Zhang et al. [1] improved PSO algorithm by the way of introducing the chaotic random number and adaptive parameters, and Adaptive Chaotic PSO (FAC-PSO) algorithm is proposed, path planning efficiency had improved significantly, and reduced the time consuming. The authors in [16]– [18] improved A * algorithm, making it more suitable for handling the problem in their own papers. Some academics have also introduced newer and younger intelligent algorithms for route planning. For example, the authors in [19, 20] used firefly algorithm for unmanned vehicles path planning. Compared with other intelligent algorithms such as GA, ACO, PSO, this algorithm has a better performance in searching the optimal solution.

In our pre-work [21]– [23], we modeled, analyzed and researched the related content of LAV swarm cooperative combat. The LAVs cooperative combat needs real-time or near real-time path planning. This article is based on this purpose, and strive to further improve the efficiency of route planning for LAVs cooperative combat to provide support.

For now, one way to solve the problem of slow route planning is to improve the performance of intelligent optimization algorithms. Therefore, this paper uses a younger FWA which has more excellent optimization performance. In 2010, Y TAN et al. [24] put forward a algorithm called FWA(fireworks algorithm), received widespread attention in the field of swarm intelligence optimization. They improved FWA in the subsequent years continuously [25]– [30], and performance of FWA was continuously improved. Therefore, this paper introduces FWA, expecting to further reduce the time-consuming in path planning.

Actually, computing speeds of the most intelligent optimization algorithms are closely related to the optimization space of the population, and large optimization space results in large consumption of computing resources, while significantly increasing the time consumption. So is FWA. Within a known space to find the optimal or suboptimal path, therefore, making full use of priori knowledge of a known space to limit the optimization space, will further reduce the waste of time. In this paper, by using a priori battlefield information to generate the optimization space of fireworks algorithm, the computational efficiency of path planning is improved significantly.

Fireworks Algorithm
Conventional Fireworks Algorithm

As shown in the original FWA paper [24], FWA outperformed SPSO and CPSO significantly and converged in most cases towards the function optimum already after a few iterations. However, when applying FWA on shifted functions the results worsen progressively with increasing distance between function optimum and origin of the search space. By investigating the operators of FWA, it is found that conventional FWA has the following drawbacks:

(1)For functions which have their optimum at FWA will find the optimal solution very fast. However, not due to the intelligence of the algorithm but due to the specific mapping and Gaussian mutation operators which map/create sparks close to the origin;

(2) For functions which have their optimum far away from the origin, FWA has to face the two drawbacks that the mapping operator rebounds most solutions which are out of the search space to locations which are far away from the function optimum, and that the mutation operator creates many sparks at locations close to the origin (for example, again far away from the optimum).

(3) FWA has a high computational cost per iteration.

Enhanced Fireworks Algorithm

As shown in [25], Y Tan et al. made 5 major changes in FWA and got the EFWA. The 5 changes are shown as follows.

(1) A new Minimal Explosion Amplitude Check;

(2) A new Operator for Generating Explosion Sparks;

(3) A new Mapping Operator;

(4) A New Operator for Generating Gaussian Sparks;

(5) A new Selection Operator;

EFWA is a significant improvement of the recently developed FWA. And it eliminates the drawbacks of conventional FWA. As is shown in the experimental evaluation, with the exception of one benchmark function, the results of EFWA are very stable and remain almost unaffected even if the optimum of the function is shifted towards the edges of the search space. EFWA shows significant improvements over conventional FWA. Compared to SPSO, which turned out to be rather sensitive to increasing shift values, EFWA achieves very stable results, and has the advantage that its results do not deteriorate even for large shift values. In terms of computational cost, the new selection operator is faster by a factor of 6 compared to the distance based selection operator of conventional FWA.

TAN also proposed AFWA (an adaptive version of FWA) [29] and dynFWA( dynamic version of FWA) [30], AFWA improvement is similar with FAC-PSO, and dynFWA improvement is also similar with other intelligent algorithm. Although adaptive algorithm can improve computational efficiency to some extent, but to significantly improve the efficiency of path planning, takes full advantage of a priori knowledge of the battlefield environment, directly reduce the optimization EFWA space. Therefore, this article uses EFWA, and apply the prior knowledge of the battlefield environment to determine its optimization space.

Optimization Space Determination
Path and Threats Coding

We use the same path coding in the literature [1], as shown in Figure 1. In this way, the path from the starting node P to the target node Pf can be described as follows:

Path={Ps,P1,P2,,Pn,Pf}$$\begin{array}{} \displaystyle Path = \{P_s,P_1,P_2, \cdots,P_n,P_f\} \end{array}$$

Fig. 1

Typical 2D LAV battlefield model

Therefore, each point Pi(i = 1, 2, ···, n) can be expressed using only 1 parameter,its distance to the straight line PsPf¯$\begin{array}{} \displaystyle \overline{P_{s}P_{f}} \end{array}$.The benefits of this kind of path coding is that two-dimensional problem can be represented with a one-dimensional variable to facilitate the problem model solving.

Optimization space involves determining the threat weight calculations. To facilitate the presentation, Let Ti denote the threat i, and set its data structure as:

Ti={TiP,TiR,TiD,TiV,TiTPsPf,TiEIP,TiEDTPsPf}$$\begin{array}{} \displaystyle T_{i}= \{T_i{^P}, T_i{^R},T_i{^D},T_i{^V},T_i{^{TP_{s}P_{f}}},T_i{^{EIP}},T_i{^{EDTP_{s}P_{f}}}\} \end{array}$$

Where TiP$\begin{array}{} \displaystyle T_i{^P} \end{array}$ denotes the position of Ti, T Ri, denotes the radius of Ti, TiD$\begin{array}{} \displaystyle T_i{^D} \end{array}$, denotes the threat degree of Ti, TiV$\begin{array}{} \displaystyle T_i^V \end{array}$, denotes the velocity of Ti, TiTPsPf$\begin{array}{} \displaystyle T_i^{T{P_s}{P_f}} \end{array}$, denotes the distance between Ti and PsPf¯$\begin{array}{} \displaystyle \overline {{P_s}{P_f}} \end{array}$, TiEIP$\begin{array}{} \displaystyle T_i^{EIP} \end{array}$ denotes the ability of influencing the path of Ti, 1 denotes it can, -1 denotes it can not, TiEDTPsPf$\begin{array}{} \displaystyle T_i^{EDT{P_s}{P_f}} \end{array}$ denotes the effective threat degree of Ti to PsPf¯$\begin{array}{} \displaystyle \overline {{P_s}{P_f}} \end{array}$, and PsPf¯$\begin{array}{} \displaystyle \overline {{P_s}{P_f}} \end{array}$ denotes the line between Pf and Ps. TiP,TiR,TiD,TiV$\begin{array}{} \displaystyle T_i^P,T_i^R,T_i^D,T_i^V \end{array}$ is the information already known in the battlefield, TiEIP$\begin{array}{} \displaystyle T_i^{EIP} \end{array}$ is initialized to -1. TiTPsPf$\begin{array}{} \displaystyle T_i^{T{P_s}{P_f}} \end{array}$ can be calculated with a simple geometric method:

TiTPsPf=|PfPsTPiPs|/PfPs$$\begin{array}{} \displaystyle T_i{^{TP_sP_f}}=\begin{vmatrix}P_f-P_s\\TP_i-P_s\end{vmatrix}/\begin{Vmatrix}P_f-P_s\end{Vmatrix} \end{array}$$

The calculation of TiEDTPsPf$\begin{array}{} \displaystyle T_i^{EDT{P_s}{P_f}} \end{array}$ is as follows:

TiEDTPsPf=[TiDSu/Si TiDSd/Si]$$\begin{array}{} \displaystyle T_i{^{EDTP_sP_f}}=\begin{bmatrix}T_i{^D}\cdot S_u/S_i~&~T_i^{D}\cdot S_d/S_i \end{bmatrix} \end{array}$$

Here, Su and Sd denote the effective threat area of Ti up and down PsPf¯$\begin{array}{} \displaystyle \overline{P_{s}P_{f}} \end{array}$ respectively. Si is the area of Ti, and the method of calculating [Su Sd] is as Formula (5).

[SuSd]={[Su=SiSdSd=cos-1(|TiTPsPf/TiR|)(TiR)TiTPsPf(TiR)2(TiTPsPf)2],                                                                        if |TiTPsPf|<TiRandTiTPsPf0[Su=cos1(|TiTPsPf/TiR|)(TiR)2TiTPsPf(TiR)2(TiTPsPf)2Sd=SiSu],                                                                       if |TiTPsPf|<TiRandTiTPsPf<0[Si(TiR)2/(TiTPsPf)20],if TiR|TiTPsPf|3TiRandTiTPsPf0[0 Si(TiR)2/(TiTPsPf)2],if TiR|TiTPsPf|3TiRandTiTPsPf<0[0 0],if|TiTPsPf|3TiR$$\begin{array}{} \displaystyle \left[ {{S_u}{S_d}} \right] = \left\{ \begin{array}{*{20}{l}} {\left[ {{S_u} = {S_i} - {S_d}{S_d} = {\rm{co}}{{\rm{s}}^{{\rm{ - 1}}}}\left( {\left| {T_i^{T{P_s}{P_f}}/T_i^R} \right|} \right) \cdot \left( {T_i^R} \right) - T_i^{T{P_s}{P_f}} \cdot \sqrt {{{\left( {T_i^R} \right)}^2} - {{\left( {T_i^{T{P_s}{P_f}}} \right)}^2}} } \right],} \hfill \\ \qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad{if{\rm{ }}\left| {T_i^{T{P_s}{P_f}}} \right| \lt T_i^R{\rm{and}}T_i^{T{P_s}{P_f}} \ge 0} \hfill \\ {\left[ {{S_u} = {\rm{co}}{{\rm{s}}^{ - 1}}\left( {\left| {T_i^{T{P_s}{P_f}}/T_i^R} \right|} \right) \cdot {{\left( {T_i^R} \right)}^2} - T_i^{T{P_s}{P_f}} \cdot \sqrt {{{\left( {T_i^R} \right)}^2} - {{\left( {T_i^{T{P_s}{P_f}}} \right)}^2}} {S_d} = {S_i} - {S_u}} \right],} \hfill \\ \qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad\qquad{if{\rm{ }}\left| {T_i^{T{P_s}{P_f}}} \right| \lt T_i^R{\rm{and}}T_i^{T{P_s}{P_f}} \lt 0} \hfill \\ {\left[ {{S_i} \cdot {{\left( {T_i^R} \right)}^2}/{{\left( {T_i^{T{P_s}{P_f}}} \right)}^2}0} \right],if{\rm{ }}T_i^R \le \left| {T_i^{T{P_s}{P_f}}} \right| \le 3 \cdot T_i^R{\rm{and}}T_i^{T{P_s}{P_f}} \ge 0} \hfill \\ {\left[ {0{\rm{ }}{S_i} \cdot {{\left( {T_i^R} \right)}^2}/{{\left( {T_i^{T{P_s}{P_f}}} \right)}^2}} \right],if{\rm{ }}T_i^R \le \left| {T_i^{T{P_s}{P_f}}} \right| \le 3 \cdot T_i^R{\rm{and}}T_i^{T{P_s}{P_f}} \lt 0} \hfill \\ {\left[ {0{\rm{ 0}}} \right],if\left| {T_i^{T{P_s}{P_f}}} \right| \ge 3 \cdot T_i^R} \hfill \\ \end{array}\right. \end{array}$$

Calculation of the potential side of the optimal path

TTTLof the threats of upper and lower sides to PsPf¯$\begin{array}{} \displaystyle \overline{P_{s}P_{f}} \end{array}$ can calculated as formula(6).

TTTL=i=1nTiEDTPsPf$$\begin{array}{} \displaystyle {T^{TTL}} = \sum\limits_{i = 1}^n {T_i^{EDT{P_s}{P_f}}} \end{array}$$

Then the potential side PPD of the optimal path is,

PPD=sign(TTTL(1,1)TTTL(1,2)){1,1}$$\begin{array}{} \displaystyle {P^{PD}} = sign\left( {{T^{TTL}}\left( {1,1} \right) - {T^{TTL}}\left( {1,2} \right)} \right) \in \left\{ {1, - 1} \right\} \end{array}$$

Here, the value of sign is 1 when the independent variable is non-negative, and is -1 when the independent variable is negative. 1 denotes that the optimal path exists on the upper side of PsPf¯$\begin{array}{} \displaystyle \overline{P_{s}P_{f}} \end{array}$, then -1 denotes the optimal path exists on lower side of PsPf¯$\begin{array}{} \displaystyle \overline{P_{s}P_{f}} \end{array}$ . In order to more intuitively describe, with the data in Table 2 in literature [1], PPD = −1 can be calculated, that is that the optimal path is on the lower side of PsPf¯$\begin{array}{} \displaystyle \overline{P_{s}P_{f}} \end{array}$ as shown in Fig.2.

Average computation time(s)

nFAC-PSOEFWA on Prior Knowledge
1010.20.8
1511.31.2
2013.71.5

Fig. 2

The potential side of the optimal path

Upper and lower initial limits of the population

Known the potential side of optimal path, the upper and lower limits of the initial population can be calculated. Let BI be the upper and lower limits of the initial population, the data structure is as follows,

BI={(BiIU,BiID,BiIP)|1i<n}$$\begin{array}{} \displaystyle {B^I} = \left\{ {\left( {B_i^{IU},B_i^{ID},B_i^{IP}} \right)|1 \le i \lt n} \right\} \end{array}$$

Where, BiIU$\begin{array}{} \displaystyle B_i^{IU} \end{array}$ denotes the upper limit of seed i,BiID$\begin{array}{} \displaystyle B_i^{ID} \end{array}$ denotes the lower limit of seed I, BiID$\begin{array}{} \displaystyle B_i^{ID} \end{array}$ denotes the position locating the upper and lower limit, and dimBI < n .The method of calculating BI is as the pseudo-codes in Fig.3.

Fig. 3

method of calculating BI

ΔL in Fig.3 can be calculated as follows,

ΔL=PfPs¯/(n+1)$$\begin{array}{} \displaystyle \Delta L=\begin{Vmatrix}\overline{P_fP_s}\end{Vmatrix}/(n+1) \end{array}$$

Based on the results calculated in section 3.2, the upper and lower initial limits of the population can be retained as shown in Fig.4. To facilitate the analysis, it is rotated to the horizontal axis as shown in Fig.5.

Fig. 4

The upper and lower initial limits of the population

Fig. 5

The upper and lower initial limits of the population shown on the horizontal axis

The upper and lower limits of the population

After the upper and lower initial limits of the population retained, the path still cannot be optimized with EFWA. Upper and lower limits of the population on each dimension Bi need to be calculated according to the initial limits. The structure of Bi is set as follows.

Bi={BiU,BiD},i=1,2,,n$$\begin{array}{} \displaystyle {B_i} = \left\{ {B_i^U,B_i^D} \right\},i=1,2,\cdots,n \end{array}$$

Here, BU denotes upper limit, BDdenotes lower limit, dimB = n. The method of calculating B is as pseudo-codes in Fig.6.

Fig. 6

Calculation of B

Based on the retained results in section 3.3, the transition results are got from step 1 to step 3 in Fig.6, and are shown in Fig.7. Then linear interpolation completed by step 4, the final results of upper and lower limits are retained, and are shown in Fig.8.

Fig. 7

The transition results of upper and lower limits

Fig. 8

The final results of upper and lower limits between two path points

Iterative calculation of upper and lower limits of the population between start point and target point

o increase the probability that final upper and lower limits cover the optimal path, numbers of iterative calculations need to be done between start point and target point, and the final upper and lower limits are retained in which contains the optimal path the probability is highest. That is, optimization space is got finally. Iterative calculation process is as shown in Fig.9.

Fig. 9

The iterative calculation pseudo-codes of optimization space between the start point and target point

Information of 2D threatening objects

IndexPositionRadius
1(10,30)14
2(10,50)10
3(20,80)20
4(40,50)12
5(45,50)15
6(50,70)12
7(75,70)14
8(80,40)12

Experiment
Comparative Experiment

Because of use the path coding in [1], in order to facilitate comparison, we use the same objective function and simulation settings in [1] too. Programming Environment is MATLAB 2014b. CPU in our computer is P4, its frequency is 2.8GHz, and memory is 2G.

The results of path planning are as shown in 10, and the data of consuming time are as shown in 4.1.

Experiment under random static threats condition

The number of threats is still 8, set the threat positions as TiP[10,80]$\begin{array}{} \displaystyle T_i^P \in \left[ {10,80} \right] \end{array}$and the threat radius as TiP[10,15]$\begin{array}{} \displaystyle T_i^P \in \left[ {10,15} \right] \end{array}$, and set the dimension n of path as 30. Six groups of representative results are shown in Figure 11.

Fig. 10

Path planning by EFWA when n=20

Dynamic Path Planning

The setting of dynamic path planning is still the same as [1], and set the dimension as 20. To improve the performance of the path planning, the iterative number is increased to 300. The LAV paths by the EFWA on Prior Knowledge at steps 0, 5, 10, and 15 are shown in Fig.12, which implies the feasibility of EFWA on Prior Knowledge under moving threatening conditions. The time consuming of each step is shown in Table 4.

Fig. 12

All threatening obstacles are moving for dynamic path planning: (a) step 0; (b) step 5; (c) step 10; and (d) step 15.

time consuming of each step(s)

StepTimeStepTime
13.0111.5
22.7121.4
32.9131.3
42.7141.6
52.6151.4
62.3161.4
72.1171.0
81.9180.8
91.8190.6
101.7200.5

Discussion

As shown in Table 2, when the settings are the same, the path by EFWA on prior knowledge is close to the one in [1], but the time consuming is an order of magnitude less than that in [1]. The method in this article improve the efficiency of path planning significantly.

In section 4.2, we set the positions and radiuses of threats randomly. The EFWA on prior knowledge is still able to plan out a more reasonable path. That implies the method in this article has good adaptability.

In section 4.3, we give each threat a random initial velocity, and increase the number of iterations appropriately. Figure 12 implies the feasibility of EFWA on Prior Knowledge under moving threatening conditions. Table 4 implies the planning speed is still fast in dynamic environment, and our method has a high real-time.

Conclusion

In this article, we introduce a younger FWA which has more excellent optimization performance to deal with the problem of path planning for LAVs. Firstly, we introduce the researches of FWA in recent years briefly. After compare the improved versions of FWA, we choose EFWA. To improve the efficiency of the path planning for LAVs, we use the prior knowledge of the battle environment sufficiently with the methods in section 3, then retain the optimization space between the start point and target point.

The simulation results show that the proposed Enhanced Fireworks Algorithm on Prior Knowledge excels FACPSO algorithm with computation time obviously. We extended our experiment to 2D dynamic path planning, and the results show that the speed of EFWA on Prior Knowledge is faster than FAC-PSO algorithm too. All prove the superiority of Enhanced Fireworks Algorithm on Prior Knowledge. Therefore, it is a feasible and effective way for LAV path planning, and is highly possible to provide support for cooperative combat of LAVs. But, in order to retain better performance of path planning, we still need to continue research in the following areas:(1)To improve the efficiency of path planning and fault tolerance, we need to introduce more rules to calculate the optimization space;(2)Considered the computational efficiency and computational complexity, we use linear interpolation to generate the upper and lower limits, but using non-linear interpolation method to improve the performance of path planning requires further study.

eISSN:
2444-8656
Language:
English
Publication timeframe:
2 times per year
Journal Subjects:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics