Next Article in Journal
A Mission Planning Method for Long-Endurance Unmanned Aerial Vehicles: Integrating Heterogeneous Ground Control Resource Allocation
Previous Article in Journal
Equivalent Spatial Plane-Based Relative Pose Estimation of UAVs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-Type Task Assignment Algorithm for Heterogeneous UAV Cluster Based on Improved NSGA-Ⅱ

by
Yunchong Zhu
1,2,
Yangang Liang
1,2,
Yingjie Jiao
3,
Haipeng Ren
4 and
Kebo Li
1,2,*
1
College of Aerospace Science and Engineering, National University of Defense Technology, Changsha 410073, China
2
Hunan Key Laboratory of Intelligent Planning and Simulation for Aerospace Mission, Changsha 410073, China
3
Xi’an Modern Control Technologies Research Institute, Xi’an 710065, China
4
National Key Laboratory of Land and Air Based Information Perception and Control, Xi’an 710065, China
*
Author to whom correspondence should be addressed.
Drones 2024, 8(8), 384; https://doi.org/10.3390/drones8080384
Submission received: 13 June 2024 / Revised: 2 August 2024 / Accepted: 3 August 2024 / Published: 8 August 2024
(This article belongs to the Section Drone Design and Development)

Abstract

Cluster warfare, as a disruptive technology, leverages its numerical advantage to overcome limitations such as restricted task execution types and the low resilience of single platforms, embodying a significant trend in future unmanned combat. In scenarios where only the number of known targets and their vague locations within the region are available, UAV clusters are tasked with performing missions including close-range scout, target attack, and damage assessment for each target. Consequently, taking into account constraints such as assignment, payload, task time window, task sequencing, and range, a multi-objective optimization model for task assignment was formulated. Initially, optimization objectives were set as total mission completion time, total mission revenue, and cluster damage level. Subsequently, the concept of constraint tolerance was introduced to enhance the non-dominant sorting mechanism of NSGA-II by distinguishing individuals that fail to meet constraints, thereby enabling those violating constraints with high tolerance to be retained in the next generation to participate in further evolution, thereby resolving the difficulty of achieving a convergent Pareto solution set under complex interdependent task constraints. Finally, through comparisons, the superiority of the improved NSGA-II algorithm has been verified.

1. Introduction

UAVs play a critical role in modern warfare. With the increasingly complex and dynamic nature of the battlefield, UAVs are being equipped with diverse functionalities. In addition to traditional scout and attack tasks, modern military UAVs now possess more capabilities such as a communication relay, electronic countermeasures, and damage assessment. In unmanned combat scenarios, multiple tasks may need to be executed against the same target, necessitating the collaboration of heterogeneous platforms. An efficient task assignment algorithm enables rational assignment and orderly execution of combat tasks within a UAV cluster, enhancing overall combat effectiveness and reducing the workload of operators [1].
Cluster task assignment is a combinatorial optimization problem, and various mathematical models have been proposed to address it, such as Mixed Integer Linear Programming (MILP) [2,3], Multiple Traveling Salesmen Problem (MTSP) [4,5], Network Flow Optimization (NFO) [6], Vehicle Routing Problem (VRP) [7,8], Cooperative Multiple Task Assignment Problem (CMTAP) [9,10], etc. In the context of multi-objective task assignment models, two types of algorithms are commonly used: traditional optimization algorithms and intelligent optimization algorithms. The former mainly includes weight-based methods, constraint-based methods, linear programming methods, etc. However, as the size of the problem or the number of constraints increases, the intelligent optimization algorithms, which have inherent randomness, demonstrate superior solving capability compared with the traditional ones. Intelligent optimization algorithms encompass Evolutionary Algorithms (EA) [11,12], Particle Swarm Optimization (PSO) [13,14], Genetic Algorithm (GA) [15], Ant Colony Optimization (ACO) [16,17], and others.
When solving the task assignment problem, decision-makers take into account various factors including the total time and total reward required to complete the task; the damage level of the UAV cluster and the range are also involved. This constitutes a multi-objective optimization problem. Many traditional methods attempt to transform this into a single-objective optimization problem, which goes against the nature of multi-objective optimization and conflicts with the inherent feature of uncertainty in the real-world. Traditional methods usually provide decision-makers with a single optimal solution, which heavily relies on the assigned weights for the objective function. However, it is more reasonable to present decision-makers with a set of feasible optimal solutions, considering the uncertainty involved.
Many scholars have made significant improvements to intelligent algorithms for the multi-objective optimization problem. Reference [18] proposed the Multiple Objective Particle Swarm Optimization (MOPSO) method, which utilizes Pareto dominance to determine the direction of each particle. It sets a global repository of non-dominant vectors, which could be used as the reference of other particles to guide their movements. Reference [19] introduced the Multi-Objective Evolutionary Algorithm based on Decomposition (MOEA/D), which decomposes a multi-objective optimization problem into several scalar sub-problems and optimizes them simultaneously. For this algorithm, each sub-problem only utilizes information from neighboring sub-problems, which effectively reduces the computational complexity in each generation. Reference [20] proposed the Multi-Objective Particle Cluster Optimization based on Adaptive Grid Algorithms (AGA-MOPSO). It incorporates an adaptive grid algorithm for evaluating particle density estimation in non-inferior solution sets, along with the AGA-based Pareto optimal solution search technology that maintains a balance between the global and local search capabilities. Reference [21] advanced the Multi-Objective Particle Swarm Optimization algorithm based on Shared-learning and Dynamic Crowding Distance (MOPSO-SDCD), which incorporates a shared-learning factor to modify the velocity updating equation. The global and local search accuracies are both enhanced. It also maintains external files using a dynamic crowding distance sorting strategy to improve the diversity and distribution of Pareto optimal solutions. Reference [22] focused on optimizing the total flight distance and mission completion time of UAVs, while also accounting for practical constraints like heterogeneous UAV types and task execution sequences, a collaborative multi-task assignment model for heterogeneous UAVs based on multiple constraints has been developed. The Knee point-based coevolution multi-objective particle swarm optimization (KnCMPSO) algorithm has been introduced to effectively address the described model.
According to the number of task types, the cluster task assignment problems can be categorized into two classes. The first one is the class of single-type task assignment problems (each target has only one task to be executed), and the second one is the class of multi-type task assignment ones (each target has multiple tasks to be executed). This research primarily focuses on the second class. Taking the constraints of assignment, load, task time window, task order, and range into account, a multi-objective optimization model for task assignment was formulated.
In Section 2, the optimization objectives are set as follows: total task completion time, total task reward, and the level of cluster damage. In Section 3, the NSGA-II algorithm is improved. The original NSGA-II algorithm utilizes the number of constraint violations (NumVio) as a measure to determine the non-dominance relationship by comparing the magnitude of NumVio. However, when faced with a situation where there are numerous constraints with varying degrees of importance like this paper, it is easy for the population to be guided in the wrong direction, resulting in optimization failure. To address this issue, the concept of “constraint tolerance” is proposed to differentiate the impact of different constraints on the non-dominance sorting process. This allows the population to evolve towards satisfying the more important constraints first. In Section 4, simulation results are compared before and after the algorithm improvement under the same task scale, demonstrating better performance of the proposed algorithm. Additionally, the improved NSGA-II algorithm was also compared with the IMOQQPSO algorithm in the same application scenario, demonstrating the superiority of the enhanced NSGA-II algorithm. The main contributions of this paper are as follows:
  • A task assignment method based on the NSGA-II algorithm is proposed to tackle the problem of multi-type task assignment with incomplete state information. Furthermore, a new encoding and decoding method specifically for this problem is designed.
  • Introducing the enhancement of “constraint tolerance” in the NSGA-II algorithm addresses the challenge of converging to Pareto optimal solutions under complex and coupled task constraints. This enhancement enables task assignment results that more effectively meet complex constraint requirements.

2. Problem Description

Regarding the multi-type task assignment problem addressed, firstly, the specific attributes of three basic models in the scene are defined. Then, the constraints and objective optimization functions of the problem are described.

2.1. Basic Model Definition

2.1.1. Target Model

The symbol Ti represents target i; there are NT targets with approximate location information. For each target Ti, where i = (1, 2, 3, …, NT), three types of tasks (Ntype = 3) need to be executed: scout, attack, and assessment. The three tasks for the same target must be performed sequentially, meaning that a target can only be attacked after it has been reconnoitered. After completing the attack task, an assessment task is required to evaluate the damage status of the target.
Table 1 presents the relevant attributes of the targets: LocaiT represents the position of the target. ValueiT denotes the value of the target, indicating the reward obtained from completing all tasks related to the target. ThreatiT represents the threat level of the target, indicating the likelihood of the target causing damage to the UAV cluster.

2.1.2. Task Model

The symbol Mk represent task k, where k = (1, 2, 3, …, NM), and NM = NT × Ntype represents the total number of tasks. A membership variable Cik is used to describe the relationship between tasks and targets. If task Mk belongs to target Ti, then Cik = i; otherwise, Cik = 0. For tasks belonging to the same target, Typek is used to indicate the order of the task, with Typek ϵ {1, 2, 3}, where a smaller numerical value indicates a higher priority for execution.
Table 2 presents the detailed attributes of the tasks: Demandk represents the resource requirement for the task, specifically the number of missiles needed to execute this task. [tks, tke] indicates the task execution timeframe, with tks representing the start time and tke representing the completion time. tkdo represents the duration of task execution, which varies depending on the task type. [ETk, LTk] represent the time window constraints for the task; ETk is the earliest allowable execution time for the task, while LTk is the latest allowable completion time.

2.1.3. Heterogeneous UAV Model

The symbol Uj represents UAV j; there are NU UAVs in the heterogeneous cluster. There are three types of UAV in the cluster: scout UAV, attack UAV, and scout/attack UAV. The differences between heterogeneous UAVs are mainly reflected in combat payload. The scout UAV is equipped with information scout equipment, which can perform scout and assessment tasks. Attack UAVs are equipped with limited ammunition and can perform attack tasks. Scout/attack integrated UAVs can perform scout and assessment tasks but can also carry out attack tasks.
Table 3 presents the detailed attributes of the UAVs: PosjU represents the position of the UAV. VeljU represents the speed of the UAV. ValuejU represents the cost of the UAV. RangejU represents the maximum range of the UAV. DeteRadjU represents the detection radius of a scout UAV. LjU represents the maximum attack payload of a UAV. Pjk represents the ability of Uj to carry out Mk.
Based on the basic model, a variable is defined as xjk; xjk = 1 represents Uj to carry out Mk—that is,
x j k = 1 , U j execute M k 0 , U j   d o e s n t execute M k

2.2. Problem Constraints and Optimization Objectives

2.2.1. The Problem Constrains

All constraints can be categorized into two types: physical constraints and logical constraints. Physical constraints are limitations imposed by the capabilities of the cruise missile cluster, such as range constraints. On the other hand, Logical constraints are related to task requirements, such as task order constraints.
  • Assignment constraint
Each task only needs one UAV to perform it, but one UAV can perform several tasks:
k , j = 1 N V x j k = 1 , x j k { 1 , 0 }
2.
Payload constraint
The resources required to perform the current task shall not exceed the current load limit of the UAV:
k = 1 N M x j k D e m a n d k L j U , j N V
3.
Range constraint
The flight distance of a UAV should be less than its range. In addition, the payload of one UAV may be enough to complete most of the tasks in the total task set, so if the range is not limited in the assignment process, it may lead to the situation where one UAV is over-allocated while the other UAVs have no tasks:
max t k e x j k + Δ t j back   V e l j U < R a n g e j U
4.
Time window constraint
Task execution time [tKs, tKe] should be included in the task time window [ETK, LTK]:
E T k t k s < t k e L T k , k N M
5.
Task order constraint
When there is a coupling relationship between tasks of the same target, execution order needs to be considered—for example, a typical task flow to a target, like “scout → attack → assess”. When Mk and Mk+n all belong to target Ti, Cik = Cik+n = i, and the Typek < Typek+n. Thus, we have
t k e t k + n s

2.2.2. The Objective Optimization Functions

In the task assignment model presented in this paper, three objective optimization functions are defined: total task completion time, total task reward, and the level of cluster damage. The distribution plan is evaluated in these three aspects.
  • Total task completion time
In order to find a solution that can complete the task as soon as possible under the condition that constraints are satisfied, the objective function is as follows:
F time   = max t k e x j k + Δ t j back  
2.
Total task reward
In order to ensure that higher-value tasks have a higher success rate, the objective function of total task reward is introduced. Moreover, the objective function of total task reward is set as the remaining value of enemy targets to align with the data direction of total task completion time, as shown in the following equation:
F earn   = i = 1 N T V a l u e i T 1 f C TS   j = 1 N V k = 1 N M P j k C i k x j k / i = 1 N T V a l u e i T
In the equation, f(CTS) is the determining variable of the task order; when f(CTS) = 0, it indicates that the task order constraint is violated. On the other hand, f(CTS) = 1.
3.
The level of UAV cluster damage
In order to minimize the damage of UAV cluster during the task execution. Since some targets are threatening to UAVs, the objective function is related to the value of UAVs and target threat level, as shown in the following equation:
F loss   = j = 1 N V k = 1 N M x j k V a l u e j U T h r e a t i T + f C TW   1 T h r e a t i T / j = 1 N V V a l u e j U
In the equation, f(CTW) is the determining variable of the time window; when f(CTW) = 1, it indicates that the time window constraint is violated. On the other hand, f(CTW) = 0.

3. Improved NSGA-II Algorithm

The Non-dominated Sorting Genetic Algorithm (NSGA) was proposed by Srinivas and Deb in 1995 [23]. It is a genetic algorithm based on the concept of Pareto optimality. It performs non-dominated sorting on the population based on the dominance and non-dominance relationships among individuals. The selection operation is then performed based on the results of non-dominated sorting.
In 2002, they further proposed an improved algorithm called NSGA-II, which incorporates an elitist strategy into the non-dominated sorting genetic algorithm [24]. NSGA-II adopts a fast non-dominated sorting technique to enhance computational speed and robustness. It also introduces “crowding distance” to sort individuals within the same dominance level, promoting a more uniform distribution of non-dominated solutions in the solution space. Moreover, NSGA-II’s fast non-dominated sorting method demonstrates significant computational efficiency advantages when dealing with optimization problems with many constraints, similar to the ones discussed in this paper. The whole process of the algorithm and area for improvement are shown in Figure 1.
This section outlines the overall workflow of improving the algorithm, the specific improvement principles, and the encoding and decoding methods designed for addressing the multi-type task assignment problem for heterogeneous UAV cluster.

3.1. Improved Non-Dominated Sorting Method

Firstly, introduce the non-dominated sorting method before improvement. In the process of non-dominated sorting, two parameters need to be defined: (1) ni represents the number of individuals in the current population that can dominate individual i, and (2) Si represents the set of individuals in the current population that can be dominated by individual i. The steps are as follows:
① Compare the objective function values of each individual to determine ni and Si for all individuals in the population.
② Find the individuals in the population that are not dominated by any other individual, i.e., individuals with ni = 0. Let k = 0, and put these individuals into set Fk.
③ For each individual in set Fk and its corresponding set Si, for each individual l in Si. Let nl = nl − 1. If nl = 0, store this individual in set H.
④ Assign a non-dominated rank (Rank) to all individuals in set Fk and set Rank = k. Let Fk be referred to as the kth non-dominated set.
⑤ Let k = k + 1, Fk = H, and repeat steps 2–4 until all individuals in the current population are sorted into different ranks.
Non-dominated sorting essentially involves the following steps: Firstly, select the set of individuals in the population that cannot be dominated by any other individual and name this set Rank0. Then, temporarily exclude these individuals from the population and consider the remaining individuals to find the set of individuals that cannot be dominated by any other individual, naming it Rank1. This process is repeated, and all individuals in the population are sorted based on the dominance relationship, resulting in non-dominated ranks for each individual. Lower rank values indicate better solutions.
When determining the dominance relationship between two solutions, the most direct approach is to compare all their objective function values. If one solution performs better than the other in all objective functions, it dominates the other solution. However, comparing all objective function values for all individuals is inefficient. In fast non-dominated sorting, the number of constraint violations (NumVio) is introduced as part of the sorting process. First, the comparison is made based on the magnitude of NumVio, where a solution with a larger NumVio is dominated by a solution with a smaller NumVio. If two solutions have the same NumVio, then the comparison is made based on the objective function values.
In the context of improving NSGA-II in this paper, the determination of NumVio for an individual solution brings in the concept of “constraint tolerance”. This means that different increments in NumVio correspond to violating constraints of different tolerance levels. For example, consider a problem with two constraints, A and B, where Constraint A has a higher tolerance level while Constraint B has a lower tolerance level. If individual solution i violates only Constraint A, then NumVioi = 1. If it violates only Constraint B, then NumVioi = 2. Translating this to the constraints in the problem under study in this paper, time window constraints have a higher tolerance level compared to task sequencing constraints. This means that the system can tolerate some tasks not being completed within the desired time windows but cannot tolerate tasks being executed out of order.

3.2. Elitist Strategy

During each iteration, the parent population Pt is used to generate the offspring population Qt through selection, crossover, and mutation operations. The union of individuals from both the parent and offspring populations is denoted as Rt. Firstly, the merged population Rt is sorted and divided into ranks using non-dominated sorting. Then, within each rank, individuals are further sorted based on crowding distance. Finally, the top N individuals from the twice-sorted population Rt are selected as the new parent population Pt+1 for the next iteration. This process is illustrated in Figure 2. By incorporating an elitism strategy, the excellent individuals from each parent population can be preserved.
Since the population size N is fixed, the selection process first chooses the set of individuals that are not dominated by any other individual, which corresponds to Rank0. Then, individuals in Rank1, Rank2, Rank3, and so on are selected sequentially. However, it is possible to encounter situations like the one shown in Figure 2—that is,
i = 0 n 1 R a n k i < N i = 0 n R a n k i > N
To address the issue described above, it is necessary to sort individuals within the same Rank. Therefore, the concept of “crowding distance” Di is used to evaluate the quality of individuals within the same rank. It is assumed that when two random individuals are in the same non-dominated rank, the one with a larger crowding distance is considered better than the one with a smaller crowding distance. In comparison to the NSGA algorithm that uses a sharing radius, NSGA-II incorporates the concept of crowding distance. Within the same non-dominated rank, the crowding distance is utilized to assess the density of individuals, promoting a more uniform distribution of non-dominated solutions in the solution space. This eliminates the need for setting a sensitive sharing radius parameter, leading to improved algorithm efficiency and population diversity preservation compared to the NSGA algorithm. The crowding distance is defined as the sum of differences in distances on all sub-objectives between an individual i and its neighboring individuals i−1 and i+1:
D i = f i + 1 , 1 f i 1 , 1 + f i 1 , 2 f i + 1 , 2 + + f i 1 , n f i + 1 , n

3.3. Individual Encoding Method and Generation Method

3.3.1. Individual Encoding and Decoding Rules

The algorithm in this paper uses the form of real number encoding to generate individuals and maps them to the task assignment scheme using multi-layer decoding. The specific coding form is as Figure 3:
Among them, the elements in the individual are all real numbers in the range of (1, NU+1). k is the total number of tasks. Take the scene with k = 9 as an example; then, the code of an individual is as in Figure 4:
Taking the decoding of the above individual as an example, the specific process is as in Figure 5, Figure 6 and Figure 7:
Firstly, split the integer part and the decimal part of the element:
Secondly, sort the decimal elements in the second line from small to large, where the sorted number represents the task number Mk; then, according to the belonging variable of task Mk, generate line 3, and based on the type of Mk, generate line 4:
Finally, according to the original position of line 2, line 3 and line 4 are extended and line 2 is deleted. The decoding result is obtained:
Columns 2 and 6 of the above matrix represent the task list for platform 1: task 2 of T3 and task 1 of T1. Then, the task assignment results represented by the whole matrix are shown in Table 4:

3.3.2. Individual Generation Method

Based on the number of tasks NM, and the number of UAVs NU, the length of the individual vector is determined as NM and the range of values for individual elements is (1, NU + 1). According to the aforementioned encoding and decoding rules, let x1 = [1, 1, 1, 1, …, 1] and x2 = (NU + 1)∙[1, 1, 1, 1, …, 1]. All individuals in the population can be generated according to the following equation, and the population size can be set based on the requirements.
x = x 1 + ( x 2 x 1 ) r a n d ( 1 , N M )
According to the above method, most of the individuals generated in the population do not satisfy the constraints. Originally, five constraints were proposed: assignment constraint, payload constraint, task order constraint, time window constraint, and range constraint. Among them, the assignment constraint is satisfied by the encoding method. The time window and task order constraints are the most difficult to satisfy, and satisfying these two constraints is the goal of the algorithm. Therefore, it is only necessary to improve the individual generation method to satisfy the payload constraint.
The improved individual generation method for the payload constraint is “modify the integer part according to the type of task represented by decimal part”:
① For element “a. xx”, determine the sorting position k of its decimal part “0. xx”.
② By the task type of Mk, the matching relationship with the execution platform represented by the integer part “a” of the element determines how to change the value of “a”. When they do not match, the value of “a” is changed to the number of a random platform matching the task—that is, the task represented by “0. xx” is executed on a new platform. When they match, the value of “a” is not changed.
③ Put the newly formed element “a. xx” back to its original position in the individual.

4. Simulations and Comparative Analysis

4.1. Simulation Scene Setting

Consider an operational area with a range of 100 km x 100 km, which contains six enemy targets. The configuration of UAV cluster is as follows: four scout UAVs; three attack UAVs, each carrying six missiles; and two scout and attack integrated UAVs, each carrying 4 missiles. The target attributes, task attributes, and UAV attributes are shown in Table 5, Table 6 and Table 7, and the entire scenario is shown in Figure 8.

4.2. Comparative Analysis before and after Algorithm Improvement

4.2.1. Simulation Results

In the case of the above scenario setting, the original NSGA-II algorithm is used for simulation calculation, and the objective function values of Pareto solution set are obtained as shown in Table 8:
From the results in Table 8, it can be observed that the optimal values of the three objective functions converge to a fixed value, which effectively demonstrates the convergence of the algorithm. The Gantt Chart was originally developed by Henry Laurence Gantt, an American mechanical engineer and management scientist, in 1910. It is a graphical representation that can be used as a bar chart to visualize the progress of projects, schedules, and other time-related system progress over time. In the Gantt chart, the horizontal axis represents time, and the vertical axis represents the ID of UAVs. Blocks of the same color represent tasks assigned to the same target. The length of each block along the horizontal axis represents the duration of the task. The numbers on the blocks represent the target and task identifiers. For example, “302” indicates task 02 for target 3. Figure 9, Figure 10 and Figure 11 are the Gantt charts for three of these assignments.
As can be seen from the Gantt chart above, even if the objective function of total task reward about task order is optimal—that is, the result shown in Figure 10—the task order constraint still cannot be satisfied.
Under the premise of not changing the scene settings, the improved NSGA-II algorithm, which introduces “constraint tolerance”, is used for simulation calculations. The objective function values of the solution set are shown in Table 9, and the Gantt charts for the optimal results of the three objective functions are provided (Figure 12, Figure 13 and Figure 14).

4.2.2. Comparative Analysis of Results

From the Gantt charts of the simulation results, it can be observed that all tasks for each target were executed sequentially and satisfied all constraints. Therefore, after improving the NSGA-II algorithm, the population evolved from an initial state where no individual satisfied all constraints to a Pareto solution set that meets all constraints under the guidance of the improved algorithm.
By comparing the results before and after the improvement of the NSGA-II algorithm, the conclusion that the introduction of “constraint tolerance” effectively guides the population towards the direction of satisfying low-tolerance constraints can be obtained. As a result, a Pareto solution set with the desired effective assignments can be obtained, which outperforms the assignment results obtained by the original NSGA-II algorithm.

4.3. Compared with the IMOQPSO Algorithm

4.3.1. Simulation Results

The scene and model parameters were set the same as in reference [13], and an additional objective optimization function related to range was introduced for comparative simulation. The specific form of the objective function is shown in equation (13). The Pareto solution set obtained using the improved NSGA-II algorithm is shown in Table 10, and the Gantt charts for the optimal results of the four objective functions are provided (Figure 15, Figure 16, Figure 17 and Figure 18).
F range   = j = 1 N U max x j k t k e t j go + Δ t j back V e l j U / j = 1 N U R a n g e j U

4.3.2. Comparative Analysis of Results

The simulation results in Table 10 were compared with the results from reference [13], and the comparison is presented in Table 11. From the above tables, it can be observed that the total task completion time, the level of cluster damage, and range in the task assignment results of this paper are inferior to those of the IMOQPSO algorithm in reference [13]. Only the total task reward is better than the results in reference [13]. However, each optimized result obtained by the improved NSGA-II algorithm in this paper strictly satisfies the constraints of task time windows and task sequencing.
The significant differences between the two task assignment results are total task completion time and the level of cluster damage. This is because in the task assignment results of the IMOQPSO algorithm in reference [13], the constraints of task order were not satisfied, leading to unjustifiably reduced time and damage.
The Gantt charts in Figure 19 and Figure 20 provide evidence for the optimal total time and total damage in reference [13]. In Figure 19, for target 5, the task 02 (attack) has been completed, but task 01 (scout) is still incomplete. Similarly, in Figure 20, for target 6, the task 03 (assessment) has been completed, but task 02 (attack) remains incomplete.
Based on the above comparison, it can be observed that although the IMOQPSO algorithm in reference [13] yields better optimization results for three out of the four objective functions compared to the algorithm proposed in this paper, its task assignment results involve a significant number of target tasks that are not executed in the prescribed order. In contrast, the improved NSGA-II algorithm in this paper strictly satisfies the sequencing constraints for the execution of each objective task set in all schemes. Therefore, the improved NSGA-II algorithm in this paper exhibits better capability in satisfying the sequencing constraints for task assignment problems than the IMOQPSO algorithm in reference [13]. This enables the obtained assignment results to achieve optimal values for each objective function while strictly satisfying the sequencing constraints.

5. Conclusions

This paper investigates the problem of multi-type task assignment for a cluster of heterogeneous UAVs. The NSGA-II algorithm was improved by introducing the concept of “constraint tolerance” to differentiate the impact of different constraints on the non-dominance sorting process.
In the simulation verification, both the original and improved versions of the NSGA-II algorithm were utilized to address assignment problem characterized by three optimization objectives. The results indicate that the improved NSGA-II algorithm introduces “constraint tolerance”, effectively guiding the population towards evolutionary paths that satisfy constraints under low tolerance levels. This ultimately produces a Pareto solution set where 100% of solutions satisfy all constraints, while the original NSGA-II algorithm yields assignments that violate temporal constraints.
Furthermore, both the improved NSGA-II algorithm and the IMOQPSO algorithm were employed to address assignment problems involving four optimization objective functions. The results indicate that in three objectives, the optimization outcomes of the IMOQPSO algorithm surpassed those of the improved NSGA-II algorithm. However, the assignment results of the IMOQPSO algorithm involve a considerable number of target tasks that are not executed in the prescribed order. In contrast, the optimization results of the improved NSGA-II algorithm strictly adhere to the sequencing constraints for the execution of each target task set in all assignment schemes and ultimately outperform the IMOQPSO algorithm by 7% in Total Task Reward.

Author Contributions

Conceptualization, Y.Z., Y.J. and H.R.; Methodology, Y.L. and K.L.; Validation, Y.Z.; Writing—original draft, Y.Z.; Writing—review and editing, Y.Z. and K.L.; Visualization, Y.Z.; Supervision, Y.J. and H.R.; Project administration, Y.L.; Funding acquisition, K.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cheng, J.; Luo, S.B.; Song, C.; Wu, X. Loitering Munition-Swarm Coordination and Autonomous Decision-Making, 1st ed.; Science Press: Beijing, China, 2020; pp. 10–11. [Google Scholar]
  2. Afonso, R.; Maximo, M.; Galvāo, R. Task allocation and trajectory planning for multiple agents in the presence of obstacle and connectivity constraints with mixed-integer linear programming. Int. J. Robust Nonlinear Control 2020, 30, 5464–5491. [Google Scholar] [CrossRef]
  3. Mulumba, T.; Diabat, A. Optimization of the drone-assisted pickup and delivery problem. Transp. Res. Part E Logist. Transp. Rev. 2024, 181, 103377. [Google Scholar] [CrossRef]
  4. Wang, Z.; Liu, L.; Long, T.; Wen, Y. Multi-UAV reconnaissance task allocation for heterogeneous targets using an opposition-based genetic algorithm with double-chromosome encoding. Chin. J. Aeronaut. 2018, 31, 339–350. [Google Scholar] [CrossRef]
  5. Zhang, S.; Zhang, W.; Liu, C. Model-based Multi-UAV path planning for high-quality 3D reconstruction of buildings. Int. Arch. Photogramm. Remote Sens. Spat. Inf. Sci. 2023, 1923–1928. [Google Scholar] [CrossRef]
  6. Kong, X.Q.; Lu, N.; Li, B. Optimal scheduling for unmanned aerial vehicle networks with flow-level dynamics. IEEE Trans. Mob. Comput. 2021, 20, 1186–1197. [Google Scholar] [CrossRef]
  7. Minh, A.N.; Giang, T.D.; Minh, H.H.; Minh, P.T. The min-cost parallel UAV scheduling vehicle routing problem. Eur. J. Oper. Res. 2021, 229, 910–930. [Google Scholar]
  8. Causa, F.; Fasano, G. Multiple UAVs trajectory generation and waypoint assignment in urban environment based on DOP maps. Aerosp. Sci. Technol. 2021, 110, 106507. [Google Scholar] [CrossRef]
  9. Han, Z.; Chen, M.; Shao, S.; Zhu, H.; Wu, Q. Cooperative Multi-Task Assignment of Unmanned Autonomous Helicopters Based on Hybrid Enhanced Learning ABC Algorithm. IEEE Trans. Intell. Veh. 2023, 9, 526–540. [Google Scholar] [CrossRef]
  10. Dong, J.S.; Pan, Q.K.; Miao, Z.H.; Sang, H.Y.; Gao, L. An effective multi-objective evolutionary algorithm for multiple spraying robots task assignment problem. Swarm Evol. Comput. 2024, 87, 101558. [Google Scholar] [CrossRef]
  11. Gonzalez, V.; Monje, C.A.; Garrido, S.; Moreno, L.; Balaguer, C. Coverage mission for UAVs using differential evolution and fast marching square methods. IEEE Aerosp. Electron. Syst. Mag. 2020, 35, 18–29. [Google Scholar] [CrossRef]
  12. Chai, X.Z.; Zheng, Z.H.; Xiao, J.M.; Yan, L.; Qu, B.Y.; Wen, O.W.; Wang, H.; Zhou, Y.; Sun, H. Multi-strategy fusion differential evolution algorithm for UAV path planning in complex environment. Aerosp. Sci. Technol. 2022, 121, 107287. [Google Scholar] [CrossRef]
  13. Wang, J.F.; Jia, G.W.; Lin, J.C.; Hou, Z.X. Cooperative task allocation for heterogeneous multi-UAV using multi-objective optimization algorithm. J. Cent. South Univ. 2020, 27, 432–448. [Google Scholar] [CrossRef]
  14. Dong, P.; Chen, W.B.; Wang, K.W.; Zhou, K.; Wang, W. Research on Combat Mission Configuration of Unmanned Aerial Vehicle Maritime Reconnaissance Based on Particle Swarm Optimization Algorithm. Complexity 2024, 2024, 9143774. [Google Scholar] [CrossRef]
  15. Jia, Z.Y.; Yu, J.Q.; Ai, X.L.; Yang, D. Cooperative multiple task assignment problem with stochastic velocities and time windows for heterogeneous unmanned aerial vehicles using a genetic algorithm. Aerosp. Sci. Technol. 2018, 76, 112–125. [Google Scholar] [CrossRef]
  16. Xia, C.; Liang, Y.T.; Yuan, L.Y.; Qi, L.J. Cooperative task assignment and track planning for multi-UAV attack mobile targets. J. Intell. Robot. Syst. 2020, 100, 1383–1400. [Google Scholar] [CrossRef]
  17. Yan, Y.Z.; Sun, Z.Q.; Hou, Y.Q.; Zhang, B.Y.; Yuan, Z.W.; Zhang, G.; Wang, B.; Ma, X. UAV Swarm Mission Planning and Load Sensitivity Analysis Based on Clustering and Optimization Algorithms. Appl. Sci. 2023, 13, 12438. [Google Scholar] [CrossRef]
  18. Coello, C.A.C.; Lechuga, M.S. MOPSO: A proposal for multiple objective particle swarm optimization. Congr. Evol. Comput. 2002, 2, 1051–1056. [Google Scholar]
  19. Zhang, Q.F.; Li, H. MOEA/D: A multi-objective evolutionary algorithm based on decomposition. IEEE Trans. Evol. Comput. 2007, 11, 712–731. [Google Scholar] [CrossRef]
  20. Yang, J.J.; Zhou, J.Z.; Fang, R.C.; Li, Y.H. Multi-objective Particle Swarm Optimization Based on Adaptive Grid Algorithms. J. Syst. Simul. 2008, 20, 5843–5847. [Google Scholar]
  21. Peng, G.; Fang, Y.W.; Peng, W.S.; Chai, D.; Xu, Y. Multi-objective particle optimization algorithm based on sharing-learning and dynamic crowding distance. Optik 2016, 127, 5013–5020. [Google Scholar] [CrossRef]
  22. Wang, F.; Huang, Z.L.; Han, M.C.; Xing, L.N.; Wang, L. A Knee Point Based Coevolution Multi-objective Particle Swarm Optimization Algorithm for Heterogeneous UAV Cooperative Multi-task Allocation. Acta Autom. Sin. 2023, 49, 399–414. [Google Scholar]
  23. Srinivas, N.; Deb, K. Multi-objective function optimization using nondominated sorting genetic algorithms. IEEE Trans. Evol. Comput. 1994, 2, 221–248. [Google Scholar]
  24. Deb, K.; Pratap, A.; Agarwal, S.; Meyarivan, T.A. A fast and elitist multi-objective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 2002, 6, 182–197. [Google Scholar] [CrossRef]
Figure 1. Process of NSGA-Ⅱ algorithm and area for improvement.
Figure 1. Process of NSGA-Ⅱ algorithm and area for improvement.
Drones 08 00384 g001
Figure 2. Schematic diagram of the non-dominated ordering of elite policies.
Figure 2. Schematic diagram of the non-dominated ordering of elite policies.
Drones 08 00384 g002
Figure 3. Individual coding example.
Figure 3. Individual coding example.
Drones 08 00384 g003
Figure 4. Coding example when k = 9.
Figure 4. Coding example when k = 9.
Drones 08 00384 g004
Figure 5. Decoding Process (a).
Figure 5. Decoding Process (a).
Drones 08 00384 g005
Figure 6. Decoding Process (b).
Figure 6. Decoding Process (b).
Drones 08 00384 g006
Figure 7. Decoding process (c).
Figure 7. Decoding process (c).
Drones 08 00384 g007
Figure 8. Diagram of cluster configuration.
Figure 8. Diagram of cluster configuration.
Drones 08 00384 g008
Figure 9. Gantt chart of solution 1.
Figure 9. Gantt chart of solution 1.
Drones 08 00384 g009
Figure 10. Gantt chart of solution 6.
Figure 10. Gantt chart of solution 6.
Drones 08 00384 g010
Figure 11. Gantt chart of solution 10.
Figure 11. Gantt chart of solution 10.
Drones 08 00384 g011
Figure 12. Gantt chart of solution 1.
Figure 12. Gantt chart of solution 1.
Drones 08 00384 g012
Figure 13. Gantt chart of result 2.
Figure 13. Gantt chart of result 2.
Drones 08 00384 g013
Figure 14. Gantt chart of result 3.
Figure 14. Gantt chart of result 3.
Drones 08 00384 g014
Figure 15. Gantt chart of solution 1.
Figure 15. Gantt chart of solution 1.
Drones 08 00384 g015
Figure 16. Gantt chart of solution 2.
Figure 16. Gantt chart of solution 2.
Drones 08 00384 g016
Figure 17. Gantt chart of solution 3.
Figure 17. Gantt chart of solution 3.
Drones 08 00384 g017
Figure 18. Gantt chart of result 4.
Figure 18. Gantt chart of result 4.
Drones 08 00384 g018
Figure 19. Gantt chart with the optimal total time.
Figure 19. Gantt chart with the optimal total time.
Drones 08 00384 g019
Figure 20. Gantt chart with the optimal total damage.
Figure 20. Gantt chart with the optimal total damage.
Drones 08 00384 g020
Table 1. Target attributes.
Table 1. Target attributes.
ModelAttributeSymbol
Target TiTarget numberNT
Number of task typesNtype
The target locationLocaiT
The target valueValueiT
Threat levelThreatiT
Table 2. Task attributes.
Table 2. Task attributes.
ModelAttributeSymbol
Task MkNumber of tasksNM
Task resource requirementsDemandk
Task execution timeframe[tks, tke]
Task durationtdok
Task allowable time window[ETk, LTk]
Task type markerTypek
Belonging variableCik
Table 3. UAV attributes.
Table 3. UAV attributes.
ModelAttributeSymbol
UAV UjNumber of UAVsNU
UAV positionPosjU
UAV speedVeljU
Cost of UAVValuejU
The maximum range of UAVRangejU
Scout UAV detection radiusDeteRadjU
Maximum payload for attack UAVsLjU
The ability of Uj to carry out MkPjk
Table 4. Task assignment results of coding instance mapping.
Table 4. Task assignment results of coding instance mapping.
Platform NumberTask List—Ti (Typek)
V13(2)→1(1)
V23(3)→1(3)→2(2)
V32(1)→1(2)→2(3)→3(1)
Table 5. Target attributes.
Table 5. Target attributes.
Target NumberPosition XT/mValueTThreatT
1(20,000, 30,000)2000.10
2(30,000, 90,000)3000.20
3(45,000, 75,000)2500.15
4(75,000, 50,000)5000.40
5(85,000, 95,000)4000.30
6(90,000, 40,000)3000.20
Table 6. Heterogeneous UAV cluster attributes.
Table 6. Heterogeneous UAV cluster attributes.
UAV1–4UAV5–7UAV8–9
ModelsScout UAVAttack UAVScout and Attack UAV
RangeU/m(30,000, 0)(0, 75,000)(0, 50,000)
ValueU80120150
VelU/m·s−1305040
DeteRadU/m200001500
LU064
Scout capability0.9500.80
Attack capability00.950.80
Assess capability0.9500.80
Table 7. Task attributes.
Table 7. Task attributes.
CTypeTask Number[ET, LT]/minDemandtdo
111[0, 30]0180
22[30, 90]120
33[95, +∞]0120
214[0, 30]0180
25[30, 95]120
36[100, +∞]0120
317[0, 15]0180
28[15, 90]120
39[95, +∞]0120
4110[0, 20]0180
211[20, 95]220
312[100, +∞]0120
5113[0, 15]0180
214[15, 100]220
315[105, +∞]0120
6116[0, 25]0180
217[25, 85]120
318[90, +∞]0120
Table 8. Solutions of original NSGA-Ⅱ.
Table 8. Solutions of original NSGA-Ⅱ.
SolutionTotal Task Completion Time/sTotal Task RewardThe Level of Cluster Damage
175540.56030.6929
275540.78020.5786
375540.91210.5690
480770.27450.8071
510,4300.27450.6262
611,3100.27450.6071
787100.78020.4833
890510.69220.4833
993220.56030.4833
1012,3900.51640.4833
Table 9. Solutions of improved NSGA-II.
Table 9. Solutions of improved NSGA-II.
SolutionTotal Task Completion Time/sTotal Task RewardThe Level of Cluster Damage
110,1800.39160.7357
211,3800.24330.7464
315,1100.24690.5388
410,4900.40970.5801
511,3400.24580.7689
611,2500.27180.6316
712,5800.39510.6184
812,6600.35670.6184
Table 10. Solutions of improved NSGA-II in the scene of reference [13].
Table 10. Solutions of improved NSGA-II in the scene of reference [13].
SolutionTotal Task Completion Time/minTotal Task RewardThe Level of Cluster DamageRange
1144.950.24100.79390.5095
2184.780.18570.71230.5543
3185.100.21180.51750.5993
4184.050.24930.70180.4639
Table 11. Compares the simulation solutions with the IMOQPSO algorithm.
Table 11. Compares the simulation solutions with the IMOQPSO algorithm.
ItemTotal Task Completion Time/minTotal Task RewardThe Level of Cluster DamageRange
IMOQPSO114.8170.18700.33500.4480
NSGA-Ⅱ144.9500.18570.51750.4639
Error−16.2%+7%−54.5%−3.5%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhu, Y.; Liang, Y.; Jiao, Y.; Ren, H.; Li, K. Multi-Type Task Assignment Algorithm for Heterogeneous UAV Cluster Based on Improved NSGA-Ⅱ. Drones 2024, 8, 384. https://doi.org/10.3390/drones8080384

AMA Style

Zhu Y, Liang Y, Jiao Y, Ren H, Li K. Multi-Type Task Assignment Algorithm for Heterogeneous UAV Cluster Based on Improved NSGA-Ⅱ. Drones. 2024; 8(8):384. https://doi.org/10.3390/drones8080384

Chicago/Turabian Style

Zhu, Yunchong, Yangang Liang, Yingjie Jiao, Haipeng Ren, and Kebo Li. 2024. "Multi-Type Task Assignment Algorithm for Heterogeneous UAV Cluster Based on Improved NSGA-Ⅱ" Drones 8, no. 8: 384. https://doi.org/10.3390/drones8080384

APA Style

Zhu, Y., Liang, Y., Jiao, Y., Ren, H., & Li, K. (2024). Multi-Type Task Assignment Algorithm for Heterogeneous UAV Cluster Based on Improved NSGA-Ⅱ. Drones, 8(8), 384. https://doi.org/10.3390/drones8080384

Article Metrics

Back to TopTop