Aerial threat assessment is a crucial link in modern air combat, whose result counts a great deal for commanders to make decisions. With the consideration that the existing threat assessment methods have difficulties in dealing with high dimensional time series target data, a threat assessment method based on self-attention mechanism and gated recurrent unit (SA-GRU) is proposed. Firstly, a threat feature system including air combat situations and capability features is established. Moreover, a data augmentation process based on fractional Fourier transform (FRFT) is applied to extract more valuable information from time series situation features. Furthermore, aiming to capture key characteristics of battlefield evolution, a bidirectional GRU and SA mechanisms are designed for enhanced features. Subsequently, after the concatenation of the processed air combat situation and capability features, the target threat level will be predicted by fully connected neural layers and the softmax classifier. Finally, in order to validate this model, an air combat dataset generated by a combat simulation system is introduced for model training and testing. The comparison experiments show the proposed model has structural rationality and can perform threat assessment faster and more accurately than the other existing models based on deep learning.
To address the shortcomings of single-step decision making in the existing deep reinforcement learning based unmanned aerial vehicle (UAV) real-time path planning problem, a real-time UAV path planning algorithm based on long short-term memory (RPP-LSTM) network is proposed, which combines the memory characteristics of recurrent neural network (RNN) and the deep reinforcement learning algorithm. LSTM networks are used in this algorithm as Q-value networks for the deep Q network (DQN) algorithm, which makes the decision of the Q-value network has some memory. Thanks to LSTM network, the Q-value network can use the previous environmental information and action information which effectively avoids the problem of single-step decision considering only the current environment. Besides, the algorithm proposes a hierarchical reward and punishment function for the specific problem of UAV real-time path planning, so that the UAV can more reasonably perform path planning. Simulation verification shows that compared with the traditional feed-forward neural network (FNN) based UAV autonomous path planning algorithm, the RPP-LSTM proposed in this paper can adapt to more complex environments and has significantly improved robustness and accuracy when performing UAV real-time path planning.
The weapon and equipment operational requirement analysis (WEORA) is a necessary condition to win a future war, among which the acquisition of knowledge about weapons and equipment is a great challenge. The main challenge is that the existing weapons and equipment data fails to carry out structured knowledge representation, and knowledge navigation based on natural language cannot efficiently support the WEORA. To solve above problem, this research proposes a method based on question answering (QA) of weapons and equipment knowledge graph (WEKG) to construct and navigate the knowledge related to weapons and equipment in the WEORA. This method firstly constructs the WEKG, and builds a neutral network-based QA system over the WEKG by means of semantic parsing for knowledge navigation. Finally, the method is evaluated and a chatbot on the QA system is developed for the WEORA. Our proposed method has good performance in the accuracy and efficiency of searching target knowledge, and can well assist the WEORA.
Aviation accidents are currently one of the leading causes of significant injuries and deaths worldwide. This entices researchers to investigate aircraft safety using data analysis approaches based on an advanced machine learning algorithm. To assess aviation safety and identify the causes of incidents, a classification model with light gradient boosting machine (LGBM) based on the aviation safety reporting system (ASRS) has been developed. It is improved by k-fold cross-validation with hybrid sampling model (HSCV), which may boost classification performance and maintain data balance. The results show that employing the LGBM-HSCV model can significantly improve accuracy while alleviating data imbalance. Vertical comparison with other cross-validation (CV) methods and lateral comparison with different fold times comprise the comparative approach. Aside from the comparison, two further CV approaches based on the improved method in this study are discussed: one with a different sampling and folding order, and the other with more CV. According to the assessment indices with different methods, the LGBM-HSCV model proposed here is effective at detecting incident causes. The improved model for imbalanced data categorization proposed may serve as a point of reference for similar data processing, and the model’s accurate identification of civil aviation incident causes can assist to improve civil aviation safety.
How to mine valuable information from massive multi-source heterogeneous data and identify the intention of aerial targets is a major research focus at present. Aiming at the long-term dependence of air target intention recognition, this paper deeply explores the potential attribute features from the spatiotemporal sequence data of the target. First, we build an intelligent dynamic intention recognition framework, including a series of specific processes such as data source, data preprocessing, target space-time, convolutional neural networks-bidirectional gated recurrent unit-atteneion (CBA) model and intention recognition. Then, we analyze and reason the designed CBA model in detail. Finally, through comparison and analysis with other recognition model experiments, our proposed method can effectively improve the accuracy of air target intention recognition, and is of significance to the commanders’ operational command and situation prediction.
The rapid development of unmanned aerial vehicle (UAV) swarm, a new type of aerial threat target, has brought great pressure to the air defense early warning system. At present, most of the track correlation algorithms only use part of the target location, speed, and other information for correlation. In this paper, the artificial neural network method is used to establish the corresponding intelligent track correlation model and method according to the characteristics of swarm targets. Precisely, a route correlation method based on convolutional neural networks (CNN) and long short-term memory (LSTM) Neural network is designed. In this model, the CNN is used to extract the formation characteristics of UAV swarm and the spatial position characteristics of single UAV track in the formation, while the LSTM is used to extract the time characteristics of UAV swarm. Experimental results show that compared with the traditional algorithms, the algorithm based on CNN-LSTM neural network can make full use of multiple feature information of the target, and has better robustness and accuracy for swarm targets.
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence, surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing, decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.
An adaptive control approach is presented in this paper for tracking desired trajectories in interactive manipulators. The controller design incorporates prescribed performance functions (PPFs) to improve dynamic performance. Notably, the performance of the output error is confined in an envelope characterized by exponential convergence, leading to convergence to zero. This feature ensures a prompt response from admittance control and establishes a reliable safety framework for interactions. Simulation results provide practical insights, demonstrating the viability of the control scheme proposed in this paper.
Based on the characteristics of high-end products, crowd-sourcing user stories can be seen as an effective means of gathering requirements, involving a large user base and generating a substantial amount of unstructured feedback. The key challenge lies in transforming abstract user needs into specific ones, requiring integration and analysis. Therefore, we propose a topic mining-based approach to categorize, summarize, and rank product requirements from user stories. Specifically, after determining the number of story categories based on pyLDAvis, we initially classify “I want to” phrases within user stories. Subsequently, classic topic models are applied to each category to generate their names, defining each post-classification user story category as a requirement. Furthermore, a weighted ranking function is devised to calculate the importance of each requirement. Finally, we validate the effectiveness and feasibility of the proposed method using 2 966 crowd-sourced user stories related to smart home systems.
With the development of information technology, a large number of product quality data in the entire manufacturing process is accumulated, but it is not explored and used effectively. The traditional product quality prediction models have many disadvantages, such as high complexity and low accuracy. To overcome the above problems, we propose an optimized data equalization method to pre-process dataset and design a simple but effective product quality prediction model: radial basis function model optimized by the firefly algorithm with Levy flight mechanism (RBFFALM). First, the new data equalization method is introduced to pre-process the dataset, which reduces the dimension of the data, removes redundant features, and improves the data distribution. Then the RBFFALFM is used to predict product quality. Comprehensive experiments conducted on real-world product quality datasets validate that the new model RBFFALFM combining with the new data pre-processing method outperforms other previous methods on predicting pro-duct quality.
Nowadays manufacturers are facing fierce challenge. Apart from the products, providing customers with multiple maintenance options in the service contract becomes more popular, since it can help to improve customer satisfaction, and ultimately promote sales and maximize profit for the manufacturer. By considering the combinations of corrective maintenance and preventive maintenance, totally three types of maintenance service contracts are designed. Moreover, attractive incentive and penalty mechanisms are adopted in the contracts. On this basis, Nash non-cooperative game is applied to analyze the revenue for both the manufacturer and customers, and so as to optimize the pricing mechanism of maintenance service contract and achieve a win-win situation. Numerical experiments are conducted. The results show that by taking into account the incentive and penalty mechanisms, the revenue can be improved for both the customers and manufacturer. Moreover, with the increase of repair rate and improvement factor in the preventive maintenance, the revenue will increase gradually for both the parties.
Dominant technology formation is the key for the high-tech industry to “cross the chasm” and gain an established foothold in the market (and hence disrupt the regime). Therefore, a stimulus-response model is proposed to investigate the dominant technology by exploring its formation process and mechanism. Specifically, based on complex adaptive system theory and the basic stimulus-response model, we use a combination of agent-based modeling and system dynamics modeling to capture the interactions between dominant technology and the socio-technical landscape. The results indicate the following: (i) The dynamic interaction is “stimulus-reaction-selection”, which promotes the dominant technology ’s formation. (ii) The dominant technology’s formation can be described as a dynamic process in which the adaptation intensity of technology standards increases continuously until it becomes the leading technology under the dual action of internal and external mechanisms. (iii) The dominant technology’s formation in the high-tech industry is influenced by learning ability, the number of adopting users and adaptability. Therein, a “critical scale” of learning ability exists to promote the formation of leading technology: a large number of adopting users can promote the dominant technology’s formation by influencing the adaptive response of technology standards to the socio-technical landscape and the choice of technology standards by the socio-technical landscape. There is a minimum threshold and a maximum threshold for the role of adaptability in the dominant technology ’s formation. (iv) The socio-technical landscape can promote the leading technology’s shaping in the high-tech industry, and different elements have different effects. This study promotes research on the formation mechanism of dominant technology in the high-tech industry, presents new perspectives and methods for researchers, and provides essential enlightenment for managers to formulate technology strategies.
At present, although knowledge graphs have been widely used in various fields such as recommendation systems, question and answer systems, and intelligent search, there are always quality problems such as knowledge omissions and errors. Quality assessment and control, as an important means to ensure the quality of knowledge, can make the applications based on knowledge graphs more complete and more accurate by reasonably assessing the knowledge graphs and fixing and improving the quality problems at the same time. Therefore, as an indispensable part of the knowledge graph construction process, the results of quality assessment and control determine the usefulness of the knowledge graph. Among them, the assessment and enhancement of completeness, as an important part of the assessment and control phase, determine whether the knowledge graph can fully reflect objective phenomena and reveal potential connections among entities. In this paper, we review specific techniques of completeness assessment and classify completeness assessment techniques in terms of closed world assumptions, open world assumptions, and partial completeness assumptions. The purpose of this paper is to further promote the development of knowledge graph quality control and to lay the foundation for subsequent research on the completeness assessment of knowledge graphs by reviewing and classifying completeness assessment techniques.
The rapid growth of mobile applications, the popularity of the Android system and its openness have attracted many hackers and even criminals, who are creating lots of Android malware. However, the current methods of Android malware detection need a lot of time in the feature engineering phase. Furthermore, these models have the defects of low detection rate, high complexity, and poor practicability, etc. We analyze the Android malware samples, and the distribution of malware and benign software in application programming interface (API) calls, permissions, and other attributes. We classify the software’s threat levels based on the correlation of features. Then, we propose deep neural networks and convolutional neural networks with ensemble learning (DCEL), a new classifier fusion model for Android malware detection. First, DCEL preprocesses the malware data to remove redundant data, and converts the one-dimensional data into a two-dimensional gray image. Then, the ensemble learning approach is used to combine the deep neural network with the convolutional neural network, and the final classification results are obtained by voting on the prediction of each single classifier. Experiments based on the Drebin and Malgenome datasets show that compared with current state-of-art models, the proposed DCEL has a higher detection rate, higher recall rate, and lower computational cost.
Aiming at the triangular fuzzy (TF) multi-attribute decision making (MADM) problem with a preference for the distribution density of attribute (DDA), a decision making method with TF number two-dimensional density (TFTD) operator is proposed based on the density operator theory for the decision maker (DM). Firstly, a simple TF vector clustering method is proposed, which considers the feature of TF number and the geometric distance of vectors. Secondly, the least deviation sum of squares method is used in the program model to obtain the density weight vector. Then, two TFTD operators are defined, and the MADM method based on the TFTD operator is proposed. Finally, a numerical example is given to illustrate the superiority of this method, which can not only solve the TF MADM problem with a preference for the DDA but also help the DM make an overall comparison.
With the new development trend of multi-resource coordinated Earth observation and the new goal of Earth observation application of “short response time, high observation accuracy, and wide coverage”, space-aeronautics cooperative complex task planning problem has become an urgent problem to be solved. The focus of this problem is to use multiple resources to perform collaborative observations on complex tasks. By analyzing the process from task assignment to receiving task observation results, we propose a multi-layer interactive task planning framework which is composed of a preprocessing method for complex tasks, a task allocation layer, a task planning layer, and a task coordination layer. According to the characteristics of the framework, a hybrid genetic parallel tabu (HGPT) algorithm is proposed on this basis. The algorithm uses genetic annealing algorithm (GAA), parallel tabu (PT) algorithm, and heuristic rules to achieve task allocation, task planning, and task coordination. At the same time, coding improvements, operator design, annealing operations, and parallel calculations are added to the algorithm. In order to verify the effectiveness of the algorithm, simulation experiments under complex task scenarios of different scales are carried out. Experimental results show that this method can effectively solve the problems of observing complex tasks. Meanwhile, the optimization effect and convergence speed of the HGPT is better than that of the related algorithms.
This paper studies a special defense game using unmanned aerial vehicle (UAV) swarm against a fast intruder. The fast intruder applies an offensive strategy based on the artificial potential field method and Apollonius circle to scout a certain destination. As defenders, the UAVs are arranged into three layers: the forward layer, the midfield layer and the back layer. The co-defense mechanism, including the role derivation method of UAV swarm and a guidance law based on the co-defense front point, is introduced for UAV swarm to co-detect the intruder. Besides, five formations are designed for comparative analysis when ten UAVs are applied. Through Monte Carlo experiments and ablation experiment, the effectiveness of the proposed co-defense method has been verified.
Due to people’s increasing dependence on social networks, it is essential to develop a consensus model considering not only their own factors but also the interaction between people. Both external trust relationship among experts and the internal reliability of experts are important factors in decision-making. This paper focuses on improving the scientificity and effectiveness of decision-making and presents a consensus model combining trust relationship among experts and expert reliability in social network group decision-making (SN-GDM). A concept named matching degree is proposed to measure expert reliability. Meanwhile, linguistic information is applied to manage the imprecise and vague information. Matching degree is expressed by a 2-tuple linguistic model, and experts’ preferences are measured by a probabilistic linguistic term set (PLTS). Subsequently, a hybrid weight is explored to weigh experts ’ importance in a group. Then a consensus measure is introduced and a feedback mechanism is developed to produce some personalized recommendations with higher group consensus. Finally, a comparative example is provided to prove the scientificity and effectiveness of the proposed consensus model.
In the field of model-based system assessment, mathematical models are used to interpret the system behaviors. However, the industrial systems in this intelligent era will be more manageable. Various management operations will be dynamically set, and the system will be no longer static as it is initially designed. Thus, the static model generated by the traditional model-based safety assessment (MBSA) approach cannot be used to accurately assess the dependability. There mainly exists three problems. Complex: huge and complex behaviors make the modeling to be trivial manual; Dynamic: though there are thousands of states and transitions, the previous model must be resubmitted to assess whenever new management arrives; Unreusable: as for different systems, the model must be resubmitted by reconsidering both the management and the system itself at the same time though the management is the same. Motivated by solving the above problems, this research studies a formal management specifying approach with the advantages of agility modeling, dynamic modeling, and specification design that can be re-suable. Finally, three typical managements are specified in a series-parallel system as a demonstration to show the potential.
Some attributes are uncertain for evaluation work because of incomplete or limited information and knowledge. It leads to uncertainty in evaluation results. To that end, an evaluation method, uncertainty entropy-based exploratory evaluation (UEEE), is proposed to guide the evaluation activities, which can iteratively and gradually reduce uncertainty in evaluation results. Uncertainty entropy (UE) is proposed to measure the extent of uncertainty. First, the belief degree distributions are assumed to characterize the uncertainty in attributes. Then the belief degree distribution of the evaluation result can be calculated by using uncertainty theory. The obtained result is then checked based on UE to see if it could meet the requirements of decision-making. If its uncertainty level is high, more information needs to be introduced to reduce uncertainty. An algorithm based on the UE is proposed to find which attribute can mostly affect the uncertainty in results. Thus, efforts can be invested in key attribute(s), and the evaluation results can be updated accordingly. This update should be repeated until the evaluation result meets the requirements. Finally, as a case study, the effectiveness of ballistic missiles with uncertain attributes is evaluated by UEEE. The evaluation results show that the target is believed to be destroyed.
Aimed at a multiple traveling salesman problem (MTSP) with multiple depots and closed paths, this paper proposes a k-means clustering donkey and a smuggler algorithm (K-DSA). The algorithm first uses the k-means clustering method to divide all cities into several categories based on the center of various samples; the large-scale MTSP is divided into multiple separate traveling salesman problems (TSPs), and the TSP is solved through the DSA. The proposed algorithm adopts a solution strategy of clustering first and then carrying out, which can not only greatly reduce the search space of the algorithm but also make the search space more fully explored so that the optimal solution of the problem can be more quickly obtained. The experimental results from solving several test cases in the TSPLIB database show that compared with other related intelligent algorithms, the K-DSA has good solving performance and computational efficiency in MTSPs of different scales, especially with large-scale MTSP and when the convergence speed is faster; thus, the advantages of this algorithm are more obvious compared to other algorithms.
As one of the most important part of weapon system of systems (WSoS), quantitative evaluation of reconnaissance satellite system (RSS) is indispensable during its construction and application. Aiming at the problem of nonlinear effectiveness evaluation under small sample conditions, we propose an evaluation method based on support vector regression (SVR) to effectively address the defects of traditional methods. Considering the performance of SVR is influenced by the penalty factor, kernel type, and other parameters deeply, the improved grey wolf optimizer (IGWO) is employed for parameter optimization. In the proposed IGWO algorithm, the opposition-based learning strategy is adopted to increase the probability of avoiding the local optima, the mutation operator is used to escape from premature convergence and differential convergence factors are applied to increase the rate of convergence. Numerical experiments of 14 test functions validate the applicability of IGWO algorithm dealing with global optimization. The index system and evaluation method are constructed based on the characteristics of RSS. To validate the proposed IGWO-SVR evaluation method, eight benchmark data sets and combat simulation are employed to estimate the evaluation accuracy, convergence performance and computational complexity. According to the experimental results, the proposed method outperforms several prediction based evaluation methods, verifies the superiority and effectiveness in RSS operational effectiveness evaluation.
Aiming at the suppression of enemy air defense (SEAD) task under the complex and complicated combat scenario, the spatiotemporal cooperative path planning methods are studied in this paper. The major research contents include optimal path points generation, path smoothing and cooperative rendezvous. In the path points generation part, the path points availability testing algorithm and the path segments availability testing algorithm are designed, on this foundation, the swarm intelligence-based path point generation algorithm is utilized to generate the optimal path. In the path smoothing part, taking terminal attack angle constraint and maneuverability constraint into consideration, the Dubins curve is introduced to smooth the path segments. In cooperative rendezvous part, we take estimated time of arrival requirement constraint and flight speed range constraint into consideration, the speed control strategy and flight path control strategy are introduced, further, the decoupling scheme of the circling maneuver and detouring maneuver is designed, in this case, the maneuver ways, maneuver point, maneuver times, maneuver path and flight speed are determined. Finally, the simulation experiments are conducted and the acquired results reveal that the time-space cooperation of multiple unmanned aeriel vehicles (UAVs) is effectively realized, in this way, the combat situation suppression against the enemy can be realized in SEAD scenarios.
The deep deterministic policy gradient (DDPG) algorithm is an off-policy method that combines two mainstream reinforcement learning methods based on value iteration and policy iteration. Using the DDPG algorithm, agents can explore and summarize the environment to achieve autonomous decisions in the continuous state space and action space. In this paper, a cooperative defense with DDPG via swarms of unmanned aerial vehicle (UAV) is developed and validated, which has shown promising practical value in the effect of defending. We solve the sparse rewards problem of reinforcement learning pair in a long-term task by building the reward function of UAV swarms and optimizing the learning process of artificial neural network based on the DDPG algorithm to reduce the vibration in the learning process. The experimental results show that the DDPG algorithm can guide the UAVs swarm to perform the defense task efficiently, meeting the requirements of a UAV swarm for non-centralization, autonomy, and promoting the intelligent development of UAVs swarm as well as the decision-making process.
Strategic management of equipment system development must attach importance to effective strategic risk management. Aiming at the identification of strategic risk of equipment system development, firstly, the source of strategic risk of equipment system development is analyzed and classified. Based on this, a causal loop diagram of strategic risk of equipment system development based on system dynamics is established. The system dynamics analysis software Vensim PLE is used to carry out the risk influencing factors analysis, risk consequences analysis, risk feedback loop identification and corresponding pre-control measures, and achieves a good risk identification effect.
The unmanned combat aerial vehicle (UCAV) is a research hot issue in the world, and the situation assessment is an important part of it. To overcome shortcomings of the existing situation assessment methods, such as low accuracy and strong dependence on prior knowledge, a data-driven situation assessment method is proposed. The clustering and classification are combined, the former is used to mine situational knowledge, and the latter is used to realize rapid assessment. Angle evaluation factor and distance evaluation factor are proposed to transform multi-dimensional air combat information into two-dimensional features. A convolution success-history based adaptive differential evolution with linear population size reduction-means (C-LSHADE-Means) algorithm is proposed. The convolutional pooling layer is used to compress the size of data and preserve the distribution characteristics. The LSHADE algorithm is used to initialize the center of the mean clustering, which overcomes the defect of initialization sensitivity. Comparing experiment with the seven clustering algorithms is done on the UCI data set, through four clustering indexes, and it proves that the method proposed in this paper has better clustering performance. A situation assessment model based on stacked autoencoder and learning vector quantization (SAE-LVQ) network is constructed, and it uses SAE to reconstruct air combat data features, and uses the self-competition layer of the LVQ to achieve efficient classification. Compared with the five kinds of assessments models, the SAE-LVQ model has the highest accuracy. Finally, three kinds of confrontation processes from air combat maneuvering instrumentation (ACMI) are selected, and the model in this paper is used for situation assessment. The assessment results are in line with the actual situation.
The key advantage of unmanned swarm operation is its autonomous cooperation. How to improve the proportion of cooperators is one of the key issues of autonomous collaboration in unmanned swarm operations. This work proposes a strategy dominance mechanism of autonomous collaboration in unmanned swarm within the framework of public goods game. It starts with the requirement analysis of autonomous collaboration in unmanned swarm; and an aspiration-driven multiplayer evolutionary game model is established based on the requirement. Then the average abundance function and strategy dominance condition of the model are constructed by theoretical derivation. Furthermore, the evolutionary mechanism of parameter adjustment in swarm cooperation is revealed via simulation, and the influences of the multiplication factor $ r $ , aspiration level $ \alpha $ , threshold $ m $ and other parameters on the strategy dominance conditions were simulated for both linear and threshold public goods games (PGGs) to determine the strategy dominance characteristics; Finally, deliberate proposals are suggested to provide a meaningful exploration in the actual control of unmanned swarm cooperation.
Space emergency launching is to send a satellite into space by using a rapid responsive solid rocket in the bounded time to implement the emergency Earth observation mission. The key and difficult points mainly include the business process construction of launching mission planning, validation of the effectiveness of the launching scheme, etc. This paper proposes the agile space emergency launching mission planning simulation and verification method, which systematically constructs the overall technical framework of space emergency launching mission planning with multi-field area, multi-platform and multi-task parallel under the constraint of resource scheduling for the first time. It supports flexible reconstruction of mission planning processes such as launching target planning, trajectory planning, path planning, action planning and launching time analysis, and can realize on-demand assembly of operation links under different mission scenarios and different plan conditions, so as to quickly modify and generate launching schemes. It supports the fast solution of rocket trajectory data and the accurate analysis of multi-point salvo time window recheck and can realize the fast conflict resolution of launching missions in the dimensions of launching position and launching window sequence. It supports lightweight scenario design, modular flexible simulation, based on launching style, launching platform, launching rules, etc., can realize the independent mapping of mission planning results to two-dimensional and three-dimensional visual simulation models, so as to achieve a smooth connection between mission planning and simulation.
With increased dependence on space assets, scheduling and tasking of the space surveillance network (SSN) are vitally important. The multi-sensor collaborative observation scheduling (MCOS) problem is a multi-constraint and high-conflict complex combinatorial optimization problem that is non-deterministic polynomial (NP)-hard. This research establishes a sub-time window constraint satisfaction problem (STWCSP) model with the objective of maximizing observation profit. Considering the significant effect of genetic algorithms (GA) on solving the problem of resource allocation, an evolution heuristic (EH) algorithm containing three strategies that focus on the MCOS problem is proposed. For each case, a task scheduling sequence is first obtained via an improved GA with penalty (GAPE) algorithm, and then a mission planning algorithm (heuristic rule) is used to determine the specific observation time. Compared to the model without sub-time windows and some other algorithms, a series of experiments illustrate the STWCSP model has better performance in terms of total profit. Experiments about strategy and parameter sensitivity validate its excellent performance in terms of EH algorithms.
In this paper, a flexible modular “Tetris” microsatellite platform is studied to implement the rapid integration and assembly of microsatellites. The proposed microsatellite platform is fulfilled based on a sandwich assembly mode which consists of the isomorphic module structure and the standard mechanical-electric-data-thermal interfaces. The advantages of the sandwich assembly mode include flexible reconfiguration and efficient assembly. The prototype of the sandwich assembly mode is built for verifying the performance and the feasibility of the proposed mechanical-electric-data-thermal interfaces. Finally, an assembly case is accomplished to demonstrate the validity and advantages of the proposed “Tetris” microsatellite platform.