Skip to main content

Attacking Strategy of Multiple Unmanned Surface Vehicles Based on DAMGWO Algorithm

  • Conference paper
  • First Online:
  • 756 Accesses

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 333))

Abstract

Unmanned combat system has received more and more attention with the development of modern weapons and equipment in recent years, which results in the application of unmanned surface vehicles (USVs) in the military. The USVs are designed to attack the protected hostile target with a minimum loss that use the lower attack capacity and a small number of attack USVs to reach the target. The USVs attack problem could be viewed as a multi-constrained task assignment problem. In this study, a novel algorithm is proposed, which is called DAMGWO, a grey wolf optimization (GWO) algorithm based on distributed auction mechanism (DAM). This algorithm combines DAM and GWO algorithm to constrain the wolf initialization, increasing the ability to break away from the local optimum. Furthermore a corresponding fitness function to evaluate the quality of this algorithm is proposed. The experimental results show that the proposed algorithm not only fully meets the requirements of the attacking strategy of multiple USVs that to attack the protected hostile target with a minimum loss, but also has better convergence than the traditional GWO algorithm and PSO algorithm.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Zhang, B., Wang, L., Li, Y.: Development trend of unmanned surface vehicle. Sci. Technol. Vis. 19, 301 (2016)

    Google Scholar 

  2. Chen, H.Y., Zhang, Y.: An overview of research on military unmanned ground vehicles. Acta Armamentarii 35, 1696–1706 (2014)

    Google Scholar 

  3. Bo, W.U., Wen, Y., Bei, W.U., Zhou, S., Xiao, C., Navigation, S.O.: Review and expectation on collision avoidance method of unmanned surface vessel. J. Wuhan Univ. Technol. 40(3), 456–461 (2016)

    Google Scholar 

  4. Steimle, E.T., Murphy, R.R., Lindemuth, M., Hall, M.L.: Unmanned marine vehicle use at Hurricanes Wilma and Ike, pp. 1–6. IEEE (2009)

    Google Scholar 

  5. Yang, N., Guo, D.L.: Solving polynomial equation roots based on wolves algorithm. Sci. Technol. Vis. 15, 35–36 (2016)

    Google Scholar 

  6. Wang, X.F., Wang, B.: Techniques for threat assessment based on intuitionistic fuzzy theory and plan recognition. Comput. Sci. 37(5), 175–177 (2010)

    Google Scholar 

  7. Zhang, B., Kang, F.J., Bing, S.U., Collage, M.: Simulation of allied attack mission planning model of multi- unmanned surface vessels. Comput. Simul. 32(4), 349–354 (2015)

    Google Scholar 

  8. Xhafa, F., Sun, J., Barolli, A., Biberaj, A., Barolli, L.: Genetic algorithms for satellite scheduling problems. Mob. Inf. Syst. 8(4), 351–377 (2012)

    Google Scholar 

  9. Ceriotti, M., Vasile, M.: Automated multigravity assist trajectory planning with a modified ant colony algorithm. J. Aerosp. Comput. Inf. Commun. 7(9), 261–293 (2010)

    Article  Google Scholar 

  10. El-Menshawy, M., Bentahar, J., El Kholy, W., Dssouli, R.: Verifying conformance of multi-agent commitment-based protocols. Expert Syst. Appl. 40(1), 122–138 (2013)

    Article  Google Scholar 

  11. Pu, J., Wu, X., Guo, Y., Xie, S., Pu, H., Peng, Y.: The combat of unmanned surface vehicles based on wolves attack. Intell. Softw. Methodol. Tools Techn. 297, 794–805 (2017)

    Google Scholar 

  12. Yu, J.P., Zhou, X.M., Chen, M.: Research on representative algorithms of swarm intelligence. Jisuanji Gongcheng yu Yingyong (Comput. Eng. Appl.) 46(25), 1–4 (2010)

    Google Scholar 

  13. Li, J., Sun, Y.: Research on cluster attack mission planning of USVs based on DAMPSO algorithm. Comput. Eng. Appl. 49(20), 1–4 (2013)

    Google Scholar 

  14. Mirjalili, S., Mirjalili, S.M., Lewis, A.: Grey wolf optimizer. Adv. Eng. Softw. 69, 46–61 (2014)

    Article  Google Scholar 

  15. Adhau, S., Mittal, M.L., Mittal, A.: A multi-agent system for distributed multi-project scheduling: an auction-based negotiation approach. Eng. Appl. Artif. Intell. 25(8), 1738–1751 (2012)

    Article  Google Scholar 

  16. Long, W., Zhao, D., Xu, S.: Improved grey wolf optimization algorithm for constrained optimization problem. J. Comput. Appl. 35(9), 2590–2595 (2015)

    Google Scholar 

Download references

Acknowledgments

This paper is supported by the National Natural Science Foundation of China (Grant No. 61625304), by the Science and Technology Commission of Shanghai Municipality (16511102400) and by the Innovation Program of Shanghai Municipal Education Commission under Grant No. 14YZ024.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xing Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pu, J., Wu, X., Guo, Y., Xie, S., Pu, H., Peng, Y. (2018). Attacking Strategy of Multiple Unmanned Surface Vehicles Based on DAMGWO Algorithm. In: Wrycza, S., Maślankowski, J. (eds) Information Systems: Research, Development, Applications, Education. SIGSAND/PLAIS 2018. Lecture Notes in Business Information Processing, vol 333. Springer, Cham. https://doi.org/10.1007/978-3-030-00060-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00060-8_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00059-2

  • Online ISBN: 978-3-030-00060-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics