Model-based system-of-systems (SOS) engineering (MBSoSE) is becoming a promising solution for the design of SoS with increasing complexity. However, bridging the models from the design phase to the simulation phase poses significant challenges and requires an integrated approach. In this study, a unified requirement modeling approach is proposed based on unified architecture framework (UAF). Theoretical models are proposed which compose formalized descriptions from both top-down and bottom-up perspectives. Based on the description, the UAF profile is proposed to represent the SoS mission and constituent systems (CS) goal. Moreover, the agent-based simulation information is also described based on the overview, design concepts, and details (ODD) protocol as the complement part of the SoS profile, which can be transformed into different simulation platforms based on the eXtensible markup language (XML) technology and model-to-text method. In this way, the design of the SoS is simulated automatically in the early design stage. Finally, the method is implemented and an example is given to illustrate the whole process.
Delay aware routing is now widely used to provide efficient network transmission. However, for newly developing or developed mobile communication networks (MCN), only limited delay data can be obtained. In such a network, the delay is with epistemic uncertainty, which makes the traditional routing scheme based on deterministic theory or probability theory not applicable. Motivated by this problem, the MCN with epistemic uncertainty is first summarized as a dynamic uncertain network based on uncertainty theory, which is widely applied to model epistemic uncertainties. Then by modeling the uncertain end-to-end delay, a new delay bounded routing scheme is proposed to find the path with the maximum belief degree that satisfies the delay threshold for the dynamic uncertain network. Finally, a low-Earth-orbit satellite communication network (LEO-SCN) is used as a case to verify the effectiveness of our routing scheme. It is first modeled as a dynamic uncertain network, and then the delay bounded paths with the maximum belief degree are computed and compared under different delay thresholds.
Architecture framework has become an effective method recently to describe the system of systems (SoS) architecture, such as the United States (US) Department of Defense Architecture Framework Version 2.0 (DoDAF2.0). As a viewpoint in DoDAF2.0, the operational viewpoint (OV) describes operational activities, nodes, and resource flows. The OV models are important for SoS architecture development. However, as the SoS complexity increases, constructing OV models with traditional methods exposes shortcomings, such as inefficient data collection and low modeling standards. Therefore, we propose an intelligent modeling method for five OV models, including operational resource flow OV-2, organizational relationships OV-4, operational activity hierarchy OV-5a, operational activities model OV-5b, and operational activity sequences OV-6c. The main idea of the method is to extract OV architecture data from text and generate interoperable OV models. First, we construct the OV meta model based on the DoDAF2.0 meta model (DM2). Second, OV architecture named entities is recognized from text based on the bidirectional long short-term memory and conditional random field (BiLSTM-CRF) model. And OV architecture relationships are collected with relationship extraction rules. Finally, we define the generation rules for OV models and develop an OV modeling tool. We use unmanned surface vehicles (USV) swarm target defense SoS architecture as a case to verify the feasibility and effectiveness of the intelligent modeling method.
A task allocation problem for the heterogeneous unmanned aerial vehicle (UAV) swarm in unknown environments is studied in this paper. Considering that the actual mission environment information may be unknown, the UAV swarm needs to detect the environment first and then attack the detected targets. The heterogeneity of UAVs, multiple types of tasks, and the dynamic nature of task environment lead to uneven load and time sequence problems. This paper proposes an improved contract net protocol (CNP) based task allocation scheme, which effectively balances the load of UAVs and improves the task efficiency. Firstly, two types of task models are established, including regional reconnaissance tasks and target attack tasks. Secondly, for regional reconnaissance tasks, an improved CNP algorithm using the uncertain contract is developed. Through uncertain contracts, the area size of the regional reconnaissance task is determined adaptively after this task assignment, which can improve reconnaissance efficiency and resource utilization. Thirdly, for target attack tasks, an improved CNP algorithm using the fuzzy integrated evaluation and the double-layer negotiation is presented to enhance collaborative attack efficiency through adjusting the assignment sequence adaptively and multi-layer allocation. Finally, the effectiveness and advantages of the improved method are verified through comparison simulations.
Beyond-visual-range (BVR) air combat threat assessment has attracted wide attention as the support of situation awareness and autonomous decision-making. However, the traditional threat assessment method is flawed in its failure to consider the intention and event of the target, resulting in inaccurate assessment results. In view of this, an integrated threat assessment method is proposed to address the existing problems, such as overly subjective determination of index weight and imbalance of situation. The process and characteristics of BVR air combat are analyzed to establish a threat assessment model in terms of target intention, event, situation, and capability. On this basis, a distributed weight-solving algorithm is proposed to determine index and attribute weight respectively. Then, variable weight and game theory are introduced to effectively deal with the situation imbalance and achieve the combination of subjective and objective. The performance of the model and algorithm is evaluated through multiple simulation experiments. The assessment results demonstrate the accuracy of the proposed method in BVR air combat, indicating its potential practical significance in real air combat scenarios.
The rapid evolution of unmanned aerial vehicle (UAV) technology and autonomous capabilities has positioned UAV as promising last-mile delivery means. Vehicle and onboard UAV collaborative delivery is introduced as a novel delivery mode. Spatiotemporal collaboration, along with energy consumption with payload and wind conditions play important roles in delivery route planning. This paper introduces the traveling salesman problem with time window and onboard UAV (TSP-TWOUAV) and emphasizes the consideration of real-world scenarios, focusing on time collaboration and energy consumption with wind and payload. To address this, a mixed integer linear programming (MILP) model is formulated to minimize the energy consumption costs of vehicle and UAV. Furthermore, an adaptive large neighborhood search (ALNS) algorithm is applied to identify high-quality solutions efficiently. The effectiveness of the proposed model and algorithm is validated through numerical tests on real geographic instances and sensitivity analysis of key parameters is conducted.
This paper investigates the selective maintenance of systems that perform multi-mission in succession. Selective maintenance is performed on systems with limited break time to improve the success of the next mission. In general, the duration of the mission is stochastic. However, existing studies rarely take into account system availability and the repairpersons with different skill levels. To solve this problem, a new multi-mission selective maintenance and repairpersons assignment model with stochastic duration of the mission are developed. To maximize the minimum phase-mission reliability while meeting the minimum system availability, the model is transformed into an optimization problem subject to limited maintenance resources. The optimization is then realized using an analytical method based on a self-programming function and a Monte Carlo simulation method, respectively. Finally, the validity of the model and solution method approaches are verified by numerical arithmetic examples. Comparative and sensitivity analyses are made to provide proven recommendations for decision-makers.
Dempster-Shafer evidence theory is broadly employed in the research of multi-source information fusion. Nevertheless, when fusing highly conflicting evidence it may produce counterintuitive outcomes. To address this issue, a fusion approach based on a newly defined belief exponential divergence and Deng entropy is proposed. First, a belief exponential divergence is proposed as the conflict measurement between evidences. Then, the credibility of each evidence is calculated. Afterwards, the Deng entropy is used to calculate information volume to determine the uncertainty of evidence. Then, the weight of evidence is calculated by integrating the credibility and uncertainty of each evidence. Ultimately, initial evidences are amended and fused using Dempster’s rule of combination. The effectiveness of this approach in addressing the fusion of three typical conflict paradoxes is demonstrated by arithmetic examples. Additionally, the proposed approach is applied to aerial target recognition and iris dataset-based classification to validate its efficacy. Results indicate that the proposed approach can enhance the accuracy of target recognition and effectively address the issue of fusing conflicting evidences.
In order to solve the problem of uncertainty and fuzzy information in the process of weapon equipment system selection, a multi-attribute decision-making (MADM) method based on probabilistic hesitant fuzzy set (PHFS) is proposed. Firstly, we introduce the concept of probability and fuzzy entropy to measure the ambiguity, hesitation and uncertainty of probabilistic hesitant fuzzy elements (PHFEs). Sequentially, the expert trust network is constructed, and the importance of each expert in the network can be obtained by calculating the cumulative trust value under multiple trust propagation paths, so as to obtain the expert weight vector. Finally, we put forward an MADM method combining the probabilistic hesitant fuzzy entropy and grey relation analysis (GRA) model, and an illustrative case is employed to prove the feasibility and effectiveness of the method when solving the weapon system selection decision-making problem.
Aiming at the characteristics of multi-stage and (extremely) small samples of the identification problem of key effectiveness indexes of weapon equipment system-of-systems (WESoS), a Bayesian intelligent identification and inference model for system effectiveness assessment indexes based on dynamic grey incidence is proposed. The method uses multilayer Bayesian techniques, makes full use of historical statistics and empirical information, and determines the Bayesian estimation of the incidence degree of indexes, which effectively solves the difficulties of small sample size of effectiveness indexes and difficulty in obtaining incidence rules between indexes. Secondly, The method quantifies the incidence relationship between evaluation indexes and combat effectiveness based on Bayesian posterior grey incidence, and then identifies key system effectiveness evaluation indexes. Finally, the proposed method is applied to a case of screening key effectiveness indexes of a missile defensive system, and the analysis results show that the proposed method can fuse multi-moment information and extract multi-stage key indexes, and has good data extraction capability in the case of small samples.
Failure mode and effect analysis (FMEA) is a preventative risk evaluation method used to evaluate and eliminate failure modes within a system. However, the traditional FMEA method exhibits many deficiencies that pose challenges in practical applications. To improve the conventional FMEA, many modified FMEA models have been suggested. However, the majority of them inadequately address consensus issues and focus on achieving a complete ranking of failure modes. In this research, we propose a new FMEA approach that integrates a two-stage consensus reaching model and a density peak clustering algorithm for the assessment and clustering of failure modes. Firstly, we employ the interval 2-tuple linguistic variables (I2TLVs) to express the uncertain risk evaluations provided by FMEA experts. Then, a two-stage consensus reaching model is adopted to enable FMEA experts to reach a consensus. Next, failure modes are categorized into several risk clusters using a density peak clustering algorithm. Finally, the proposed FMEA is illustrated by a case study of load-bearing guidance devices of subway systems. The results show that the proposed FMEA model can more easily to describe the uncertain risk information of failure modes by using the I2TLVs; the introduction of an endogenous feedback mechanism and an exogenous feedback mechanism can accelerate the process of consensus reaching; and the density peak clustering of failure modes successfully improves the practical applicability of FMEA.
Cascading failures in infrastructure networks have serious impacts on network function. The limited capacity of network nodes provides a necessary condition for cascade failure. However, the network capacity cannot be infinite in the real network system. Therefore, how to reasonably allocate the limited capacity resources is of great significance. In this article, we put forward a capacity allocation strategy based on community structure against cascading failure. Experimental results indicate that the proposed method can reduce the scale of cascade failures with higher capacity utilization compared with Motter-Lai (ML) model. The advantage of our method is more obvious in scale-free network. Furthermore, the experiment shows that the cascade effect is more obvious when the vertex load is randomly varying. It is known to all that the growth of network capacity can make the network more resistant to destruction, but in this paper it is found that the contribution rate of unit capacity rises first and then decreases with the growth of network capacity cost.
Future unmanned battles desperately require intelligent combat policies, and multi-agent reinforcement learning offers a promising solution. However, due to the complexity of combat operations and large size of the combat group, this task suffers from credit assignment problem more than other reinforcement learning tasks. This study uses reward shaping to relieve the credit assignment problem and improve policy training for the new generation of large-scale unmanned combat operations. We first prove that multiple reward shaping functions would not change the Nash Equilibrium in stochastic games, providing theoretical support for their use. According to the characteristics of combat operations, we propose tactical reward shaping (TRS) that comprises maneuver shaping advice and threat assessment-based attack shaping advice. Then, we investigate the effects of different types and combinations of shaping advice on combat policies through experiments. The results show that TRS improves both the efficiency and attack accuracy of combat policies, with the combination of maneuver reward shaping advice and ally-focused attack shaping advice achieving the best performance compared with that of the baseline strategy.
Blockchain technology has attracted worldwide attention, and has strong application potential in complex product system supply chain and other fields. This paper focuses on the supply chain management issues of complex product systems, and combines the technical characteristics of blockchain, such as tamper resistance and strong resistance to destruction, to conduct research on the application of blockchain based supply chain management for complex product systems. The blockchain technology is integrated into functional modules such as business interaction, privacy protection, data storage, and system services. The application technology architecture of complex product system supply chain integrated with blockchain is constructed. The application practice in complex product system supply chain is carried out. The results show that the supply chain of complex product systems has the functions of traceability, cost reduction, and anti-counterfeiting protection. Finally, the future development direction and research focus of the complex product system supply chain based on blockchain are prospected, which provides a reference for the equipment manufacturing supply chain management in the military industry.
A framework that integrates planning, monitoring and replanning techniques is proposed. It can devise the best solution based on the current state according to specific objectives and properly deal with the influence of abnormity on the plan execution. The framework consists of three parts: the hierarchical task network (HTN) planner based on Monte Carlo tree search (MCTS), hybrid plan monitoring based on forward and backward and norm-based replanning method selection. The HTN planner based on MCTS selects the optimal method for HTN compound task through pre-exploration. Based on specific objectives, it can identify the best solution to the current problem. The hybrid plan monitoring has the capability to detect the influence of abnormity on the effect of an executed action and the premise of an unexecuted action, thus trigger the replanning. The norm-based replanning selection method can measure the difference between the expected state and the actual state, and then select the best replanning algorithm. The experimental results reveal that our method can effectively deal with the influence of abnormity on the implementation of the plan and achieve the target task in an optimal way.
In the aircraft control system, sensor networks are used to sample the attitude and environmental data. As a result of the external and internal factors (e.g., environmental and task complexity, inaccurate sensing and complex structure), the aircraft control system contains several uncertainties, such as imprecision, incompleteness, redundancy and randomness. The information fusion technology is usually used to solve the uncertainty issue, thus improving the sampled data reliability, which can further effectively increase the performance of the fault diagnosis decision-making in the aircraft control system. In this work, we first analyze the uncertainties in the aircraft control system, and also compare different uncertainty quantitative methods. Since the information fusion can eliminate the effects of the uncertainties, it is widely used in the fault diagnosis. Thus, this paper summarizes the recent work in this aera. Furthermore, we analyze the application of information fusion methods in the fault diagnosis of the aircraft control system. Finally, this work identifies existing problems in the use of information fusion for diagnosis and outlines future trends.
A new approach is proposed in this study for accountable capability improvement based on interpretable capability evaluation using the belief rule base (BRB). Firstly, a capability evaluation model is constructed and optimized. Then, the key sub-capabilities are identified by quantitatively calculating the contributions made by each sub-capability to the overall capability. Finally, the overall capability is improved by optimizing the identified key sub-capabilities. The theoretical contributions of the proposed approach are as follows. (i) An interpretable capability evaluation model is constructed by employing BRB which can provide complete access to decision-makers. (ii) Key sub-capabilities are identified according to the quantitative contribution analysis results. (iii) Accountable capability improvement is carried out by only optimizing the identified key sub-capabilities. Case study results show that “Surveillance”, “Positioning”, and “Identification” are identified as key sub-capabilities with a summed contribution of 75.55% in an analytical and deducible fashion based on the interpretable capability evaluation model. As a result, the overall capability is improved by optimizing only the identified key sub-capabilities. The overall capability can be greatly improved from 59.20% to 81.80% with a minimum cost of 397. Furthermore, this paper also investigates how optimizing the BRB with more collected data would affect the evaluation results: only optimizing “Surveillance” and “Positioning” can also improve the overall capability to 81.34% with a cost of 370, which thus validates the efficiency of the proposed approach.
Discrete event system (DES) models promote system engineering, including system design, verification, and assessment. The advancement in manufacturing technology has endowed us to fabricate complex industrial systems. Consequently, the adoption of advanced modeling methodologies adept at handling complexity and scalability is imperative. Moreover, industrial systems are no longer quiescent, thus the intelligent operations of the systems should be dynamically specified in the model. In this paper, the composition of the subsystem behaviors is studied to generate the complexity and scalability of the global system model, and a Boolean semantic specifying algorithm is proposed for generating dynamic intelligent operations in the model. In traditional modeling approaches, the change or addition of specifications always necessitates the complete resubmission of the system model, a resource-consuming and error-prone process. Compared with traditional approaches, our approach has three remarkable advantages: (i) an established Boolean semantic can be fitful for all kinds of systems; (ii) there is no need to resubmit the system model whenever there is a change or addition of the operations; (iii) multiple specifying tasks can be easily achieved by continuously adding a new semantic. Thus, this general modeling approach has wide potential for future complex and intelligent industrial systems.
Remote sensing data plays an important role in natural disaster management. However, with the increase of the variety and quantity of remote sensors, the problem of “knowledge barriers” arises when data users in disaster field retrieve remote sensing data. To improve this problem, this paper proposes an ontology and rule based retrieval (ORR) method to retrieve disaster remote sensing data, and this method introduces ontology technology to express earthquake disaster and remote sensing knowledge, on this basis, and realizes the task suitability reasoning of earthquake disaster remote sensing data, mining the semantic relationship between remote sensing metadata and disasters. The prototype system is built according to the ORR method, which is compared with the traditional method, using the ORR method to retrieve disaster remote sensing data can reduce the knowledge requirements of data users in the retrieval process and improve data retrieval efficiency.
To address the current problems of poor generality, low real-time, and imperfect information transmission of the battlefield target intelligence system, this paper studies the battlefield target intelligence system from the top-level perspective of multi-service joint warfare. First, an overall planning and analysis method of architecture modeling is proposed with the idea of a bionic analogy for battlefield target intelligence system architecture modeling, which reduces the difficulty of the planning and design process. The method introduces the Department of Defense architecture framework (DoDAF) modeling method, the multi-living agent (MLA) theory modeling method, and other combinations for planning and modeling. A set of rapid planning methods that can be applied to model the architecture of various types of complex systems is formed. Further, the liveness analysis of the battlefield target intelligence system is carried out, and the problems of the existing system are presented from several aspects. And the technical prediction of the development and construction is given, which provides directional ideas for the subsequent research and development of the battlefield target intelligence system. In the end, the proposed architecture model of the battlefield target intelligence system is simulated and verified by applying the colored Petri nets (CPN) simulation software. The analysis demonstrates the reasonable integrity of its logic.
With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology, the new cloud manufacturing system (NCMS) built on the connotation of cloud manufacturing 3.0 presents a new business model of “Internet of everything, intelligent leading, data driving, shared services, cross-border integration, and universal innovation”. The network boundaries are becoming increasingly blurred, NCMS is facing security risks such as equipment unauthorized use, account theft, static and extensive access control policies, unauthorized access, supply chain attacks, sensitive data leaks, and industrial control vulnerability attacks. Traditional security architectures mainly use information security technology, which cannot meet the active security protection requirements of NCMS. In order to solve the above problems, this paper proposes an integrated cloud-edge-terminal security system architecture of NCMS. It adopts the zero trust concept and effectively integrates multiple security capabilities such as network, equipment, cloud computing environment, application, identity, and data. It adopts a new access control mode of “continuous verification + dynamic authorization”, classified access control mechanisms such as attribute-based access control, role-based access control, policy-based access control, and a new data security protection system based on blockchain, achieving “trustworthy subject identity, controllable access behavior, and effective protection of subject and object resources”. This architecture provides an active security protection method for NCMS in the digital transformation of large enterprises, and can effectively enhance network security protection capabilities and cope with increasingly severe network security situations.
With the continuous development of network functions virtualization (NFV) and software-defined networking (SDN) technologies and the explosive growth of network traffic, the requirement for computing resources in the network has risen sharply. Due to the high cost of edge computing resources, coordinating the cloud and edge computing resources to improve the utilization efficiency of edge computing resources is still a considerable challenge. In this paper, we focus on optimizing the placement of network services in cloud-edge environments to maximize the efficiency. It is first proved that, in cloud-edge environments, placing one service function chain (SFC) integrally in the cloud or at the edge can improve the utilization efficiency of edge resources. Then a virtual network function (VNF) performance-resource (P-R) function is proposed to represent the relationship between the VNF instance computing performance and the allocated computing resource. To select the SFCs that are most suitable to deploy at the edge, a VNF placement and resource allocation model is built to configure each VNF with its particular P-R function. Moreover, a heuristic recursive algorithm is designed called the recursive algorithm for max edge throughput (RMET) to solve the model. Through simulations on two scenarios, it is verified that RMET can improve the utilization efficiency of edge computing resources.
To maintain the stability of the inter-satellite link for gravitational wave detection, an intelligent learning monitoring and fast warning method of the inter-satellite link control system failure is proposed. Different from the traditional fault diagnosis optimization algorithms, the fault intelligent learning method proposed in this paper is able to quickly identify the faults of inter-satellite link control system despite the existence of strong coupling nonlinearity. By constructing a two-layer learning network, the method enables efficient joint diagnosis of fault areas and fault parameters. The simulation results show that the average identification time of the system fault area and fault parameters is 0.27 s, and the fault diagnosis efficiency is improved by 99.8% compared with the traditional algorithm.
As the unmanned weap system-of systems (UWSoS) becomes complex, the inevitable uncertain interference gradually increases, which leads to a strong emphasis on the resilience of UWSoS. Hence, this paper presents a resilience-driven cooperative reconfiguration strategy to enhance the resilience of UWSoS. First, a unified resilience-driven cooperative reconfiguration strategy framework is designed to guide the UWSoS resilience enhancement. Subsequently, a cooperative reconfiguration strategy algorithm is proposed to identify the optimal cooperative reconfiguration sequence, combining the cooperative pair resilience contribution index (CPRCI) and cooperative pair importance index (CPII). At last, the effectiveness and superiority of the proposed algorithm are demonstrated through various attack scenario simulations that include different attack modes and intensities. The analysis results can provide a reference for decision-makers to manage UWSoS.
Today’s air combat has reached a high level of uncertainty where continuous or discrete variables with crisp values cannot be properly represented using fuzzy sets. With a set of membership functions, fuzzy logic is well-suited to tackle such complex states and actions. However, it is not necessary to fuzzify the variables that have definite discrete semantics. Hence, the aim of this study is to improve the level of model abstraction by proposing multiple levels of cascaded hierarchical structures from the perspective of function, namely, the functional decision tree. This method is developed to represent behavioral modeling of air combat systems, and its metamodel, execution mechanism, and code generation can provide a sound basis for function-based behavioral modeling. As a proof of concept, an air combat simulation is developed to validate this method and the results show that the fighter Alpha built using the proposed framework provides better performance than that using default scripts.
To solve the problem that the existing situation awareness research focuses on multi-sensor data fusion, but the expert knowledge is not fully utilized, a heterogeneous information fusion recognition method based on belief rule structure is proposed. By defining the continuous probabilistic hesitation fuzzy linguistic term sets (CPHFLTS) and establishing CPHFLTS distance measure, the belief rule base of the relationship between feature space and category space is constructed through information integration, and the evidence reasoning of the input samples is carried out. The experimental results show that the proposed method can make full use of sensor data and expert knowledge for recognition. Compared with the other methods, the proposed method has a higher correct recognition rate under different noise levels.
Evolutionary algorithms (EAs) have been used in high utility itemset mining (HUIM) to address the problem of discovering high utility itemsets (HUIs) in the exponential search space. EAs have good running and mining performance, but they still require huge computational resource and may miss many HUIs. Due to the good combination of EA and graphics processing unit (GPU), we propose a parallel genetic algorithm (GA) based on the platform of GPU for mining HUIM (PHUI-GA). The evolution steps with improvements are performed in central processing unit (CPU) and the CPU intensive steps are sent to GPU to evaluate with multi-threaded processors. Experiments show that the mining performance of PHUI-GA outperforms the existing EAs. When mining 90% HUIs, the PHUI-GA is up to 188 times better than the existing EAs and up to 36 times better than the CPU parallel approach.
Survivability is used to evaluate the ability of the satellite to complete the mission after failure, while the duration of maintaining performance is often ignored. An effective backup strategy can restore the constellation performance timely, and maintain good network communication performance in case of satellite failure. From the perspective of network utility, the low Earth orbit (LEO) satellite constellation survivable graphical evaluation and review technology (GERT) network with backup satellites is constructed. A network utility transfer function algorithm based on moment generating function and Mason formula is proposed, the network survivability evaluation models of on-orbit backup strategy and ground backup strategy are established. The survivable GERT model can deduce the expected maintenance time of LEO satellite constellation under different fault states and the network utility generated during the state maintenance period. The case analysis shows that the proposed survivable GERT model can consider the satellite failure rate, backup satellite replacement rate, maneuver control replacement ability and life requirement, and effectively determine the optimal survivable backup strategy for LEO satellite constellation with limited resources according to the expected network utility.
This paper systematically introduces and reviews a scientific exploration of reliability called the belief reliability. Beginning with the origin of reliability engineering, the problems of present theories for reliability engineering are summarized as a query, a dilemma, and a puzzle. Then, through philosophical reflection, we introduce the theoretical solutions given by belief reliability theory, including scientific principles, basic equations, reliability science experiments, and mathematical measures. The basic methods and technologies of belief reliability, namely, belief reliability analysis, function-oriented belief reliability design, belief reliability evaluation, and several newly developed methods and technologies are sequentially elaborated and overviewed. Based on the above investigations, we summarize the significance of belief reliability theory and make some prospects about future research, aiming to promote the development of reliability science and engineering.
Autonomous umanned aerial vehicle (UAV) manipulation is necessary for the defense department to execute tactical missions given by commanders in the future unmanned battlefield. A large amount of research has been devoted to improving the autonomous decision-making ability of UAV in an interactive environment, where finding the optimal maneuvering decision-making policy became one of the key issues for enabling the intelligence of UAV. In this paper, we propose a maneuvering decision-making algorithm for autonomous air-delivery based on deep reinforcement learning under the guidance of expert experience. Specifically, we refine the guidance towards area and guidance towards specific point tasks for the air-delivery process based on the traditional air-to-surface fire control methods. Moreover, we construct the UAV maneuvering decision-making model based on Markov decision processes (MDPs). Specifically, we present a reward shaping method for the guidance towards area and guidance towards specific point tasks using potential-based function and expert-guided advice. The proposed algorithm could accelerate the convergence of the maneuvering decision-making policy and increase the stability of the policy in terms of the output during the later stage of training process. The effectiveness of the proposed maneuvering decision-making policy is illustrated by the curves of training parameters and extensive experimental results for testing the trained policy.