# Multiobjective Cognitive Cooperative Jamming Decision-Making Method Based on Tabu Search-Artificial Bee Colony Algorithm.

1. IntroductionWith the advent of net-defender technology, information confrontation has played a more and more important role in the modern war, and multiattackers in various patterns have been the main way as electronic attack. The conventional jamming resource allocation algorithms based on point-to-point allocation are not suitable for modern war due to its low efficiency. Cognitive cooperative jamming will become a trend in the information confrontation due to the ability of cognitive technology for autonomous environment perception and real-time optimization of operating parameters [1, 2]. Cognitive confrontation is a closed-loop learning processing system based on the dynamic knowledge base of perception-recognition decision-making action-perception, and it is used to improve the combat effectiveness of electronic equipment under a complex electromagnetic environment [3]. Decision-making plays a vital role in this closed-loop system, directly affecting combat effectiveness and benefits [4-6].

One major goal of decision-making is to improve the jamming benefit, which is mainly measured by power, frequency, jamming space, and jamming patterns in the existing research [7-11]. These studies, however, which cannot reflect the real battlefield situation, only considered how to maximize the jamming benefit from the attacker and ignore the jamming cost. Literature [12] takes the jamming cost in to account, but it is rather vague. In order to be closer to the actual application scenario, this paper takes the jamming benefit and jamming cost into account together and selects the detection probability as the attacker cost to measure the attacker effect with power, frequency, jamming space, and jamming patterns.

Decision-making is a nonlinear integer combinatorial optimization problem [13, 14]. At present, intelligent algorithms such as genetic algorithms (GA), improved ant colony (IAC) algorithms, and particle swarm optimization (PSO) are widely used to solve this problem. Literature [15] used a genetic algorithm to solve multi-UAV (unmanned aerial vehicle) mission planning problems. Literature [16] proposed a quantum genetic algorithm that uses a qubit to encode communication parameters. It used quantum rotation gates to update the population and assign nonlinear characteristics to the algorithm. However, this algorithm is high in complexity and slow in convergence. Literature [17] introduced the ant colony algorithm to the intelligent decision problem and improved the speed of convergence. Literature [18] proposed an IAC algorithm to optimize the allocation of multitarget defender jamming resources and accelerate the speed of searching optimization. Literature [19] uses particle swarm optimization for decision-making. However, most intelligent algorithms need many complicate parameters, and there still is some room for improvement to convergence speed. To this issue, literature [20] applied the artificial bee colony algorithm to make antijamming communication decisions, which reduces the number of parameters and intensified convergence. However, the conventional ABC algorithm is easy to fall into the local maximum with poor robustness. This paper combines the ABC algorithm with the tabu search algorithm and proposes a new rule for searching new solutions. The optimization probability of the algorithm is improved while ensuring fewer parameters and fast convergence.

2. The Model of Multiobjective Cognitive Collaborative Jamming Decision

Suppose there are m attackers to jam n defenders, shown in Figure 1. The matrix X used to represent the jamming decision scheme can be achieved by the artificial intelligence algorithm, where [x.sub.ij] = 1 means the attacker is assigned to jam the defender; otherwise, [x.sub.ij] = 0. Different from the previous research, we propose the concept of jamming cost and convert the traditional model into the multiobjective collaborative jamming decision-making model.

2.1. Jamming Benefit and Jamming Cost. In this paper, the jamming benefit is measured by four elements (power suppression benefit, frequency alignment benefit, jamming coverage space benefit, and jamming pattern benefit), which can be represented by vector Q = [[q.sub.1ij], [q.sub.2ij], [q.sub.3ij], [q.sub.4ij]].

(1) Power Suppression Benefit. Firstly, we apply the ratio of jamming and signal (JSR) to describe the power suppression benefit which represents the suppressing effect to defender [R.sub.j](j =1,2,.., n) from attacker [u.sub.i] (i = 1,2,.., m). The power suppression benefit function can be expressed as [q.sub.1ij]. Only when the ratio of the power of the received interference power and the power of the echo signal is greater than the minimum JSR is it deemed that the jamming of the attacker is effective. The power of the attacker signal and the effective echo signal power received by the defender [R.sub.j] are shown in

[P.sub.ji] = [P.sub.j][G.sub.A]A/4[pi][R.sup.2][F.sub.A],

[P.sub.js] = [P.sub.s][G.sub.t][[sigma].sub.A]/16[[pi].sup.2][R.sup.4], (1) js 16n2 R4 ,

where [P.sub.s] and [P.sub.j] separately represent the transmission power of the defender and attacker, [G.sub.t] is the defender main lobe gain, [G.sub.A] is the gain of the attacker, [sigma] is the scattering area of the self-defense aircraft, A is the equivalent receiving area of the defender antenna, and R is the distance between defender and attacker.

[K.sub.j] denotes the minimum ratio of jamming and signal, which indicates defender [R.sub.j] required for normal work. Therefore, we can derive the decision-making criterions. After normalization, [q.sub.1ij] can be expressed as

[mathematical expression not reproducible] (2)

(2) Frequency Alignment Benefit. Then, the frequency alignment benefit function [q.sub.2ij] is addressed to report the jamming suppression effect of attacker [u.sub.i](i =1,2,..., m) on defender [R.sub.j](j = 1,2, ..., n) .The attacker [u.sub.i] can only jam the defender [R.sub.j] if the attacker's jamming frequency overlaps with the defender's operating frequency. ([f.sub.i1], [f.sub.i2]) denotes the operating frequency of the attacker, and ([f.sub.j1], [f.sub.j2]) denotes the operating frequency of the defender. Consequently, [q.sub.2ij] can be expressed as

[mathematical expression not reproducible]. (3)

(3) Jamming Coverage Space Benefit. After that, we introduce the jamming coverage space benefit function [q.sub.3ij] to represent the jamming coverage space benefit which represents the jamming suppression effect on the coverage space of attacker [u.sub.i](i =1,2,..., m) on defender [R.sub.j](j =1,2,..., n). The maximum jamming energy intensity EN of the attacker and its corresponding effective jamming radius satisfy the relation in

EN/[r.sub.e.sup.2] [less than or equal to] [epsilon], (4)

where [epsilon] is the lowest energy intensity threshold that affects the defender. If the distance between the attacker and the target exceeds the jamming radius, the jamming is invalid. Otherwise, [q.sub.3ij] is inversely proportional to [d.sup.2]. [q.sub.3ij] can be expressed as

[mathematical expression not reproducible], (5)

(4) Jamming Pattern Benefit. Finally, the jamming pattern benefit function [q.sub.4ij] is adopted to describe the jamming pattern benefit which represents the jamming suppression effect of attacker [u.sub.i] (I = 1,2,..., m) on defender [R.sub.j](j = 1, 2,...,n). Suppose that each defender (possibly of different system types) have valid m types of jamming patterns and have been sorted according to the advantages and disadvantages of theoretical jamming effects. If attacker [u.sub.i] contains the jamming patterns which are effective for defender [R.sub.j], then the higher the jamming pattern is in ranking, the greater the value of the jamming pattern benefit function is. Otherwise, [q.sub.4ij] = 0. [q.sub.4ij] can be expressed as

[mathematical expression not reproducible]. (6)

The weight vector of the four indicators is calculated as [epsilon] = [absolute value of ([[epsilon].sub.1], [[epsilon].sub.2], [[epsilon].sub.3], [[epsilon].sub.4]] using the analytic hierarchy process. Hence, the jamming benefit can be expressed as

[mathematical expression not reproducible]. (7)

All of the above indicators are for maximizing the m jamming benefits and ignoring the jamming cost. According to the jamming effect factors mentioned above, this paper will form a multiobjective cognitive collaborative jamming decision model. Thus, the purpose is to maximize the jamming benefits while minimizing the probability that the attacker is discovered.

The jamming cost that we mainly consider in this paper is the probability that the attacker was detected by the defender. The probability of the attacker being discovered by the defender should be minimized as much as possible to ensure the jamming benefit. The probability expression that the defender discovers the attacker from [t.sub.1] to [t.sub.2] is defined as

[mathematical expression not reproducible], (8)

where [mathematical expression not reproducible] indicates the instantaneous probability density of the attacker found by the defender.

Hence, the jamming cost can be expressed as

[mathematical expression not reproducible]. (9)

2.2. Objective Functions and Constraints. In the multiobjective cognitive cooperative jamming decision task, we intend to obtain the maximum jamming benefit, as well as the minimum jamming cost, where minimizing [f.sub.cos t] can also be considered as maximizing (-[f.sub.cos t]), just as

max y = f(x) = max [[f.sub.effect], -[f.sub.cos t]]. (10)

Obtaining the greatest jamming benefits and paying the smallest jamming costs are equally important in multiobjective cognitive collaborative jamming decision tasks. Therefore, the fitness function can be expressed as

[mathematical expression not reproducible], (11)

where [x.sub.ij] is the decision variable, [x.sub.ij] = 0 means attacker [u.sub.i] does not jam defender [R.sub.j], and [x.sub.ij = 1 means attacker [u.sub.i] jams defender [R.sub.j]. Decision matrix X is constituted by [x.sub.ij],. [[omega].sub.j] means the importance of defender [R.sub.j].

We obtain different decision-making schemes corresponding to different decision matrixes X through simulation. Finally, the decision matrix X that maximizes the objective function is selected as the final decision-making scheme.

Since the number of defenders that can be jammed at one time is limited, as well as the total number of attackers and defenders, the objective function should be restricted as

[mathematical expression not reproducible], (12)

where (1) means one defender should be jammed by one attacker at list and (2) means one attacker can jam at most ai defenders at one time to ensure the jamming effect on the defender network.

3. Tabu Search-Bee Colony Algorithm

In recent years, intelligent algorithms, such as genetic algorithm (GA) [15, 16], improved ant colony (IAC) algorithm [17, 18], and particle swarm optimization (PSO) [19], are widely used to solve the jamming decision-making problem. Among them, the IAC algorithm is the most widely used because it can greatly improve the optimization speed and reduce the running time to achieve the best decisionmaking. However, the parameters in the IAC algorithm depend heavily on manual selection which lack objectivity and credibility. Aimed to this issue, we propose the artificial bee colony (ABC) algorithm to solve the jamming decisionmaking problem because the ABC algorithm needs only fewer parameters and owns higher objectivity [21]. The using steps of making jamming decisions using the ABC algorithm are as follows:

(1) Initialize bee populations. There are three population parameters:

(a) The total number of bees: N (bees produce nectar as jamming decision matrix)

(b) Maximum iterations: maxCycle

(c) The single largest number of searching for each food source: limit

Because all bees are scouts with no prior information, the algorithm randomly generates N jamming decision matrix X overall situation corresponding to N food sources. The jamming effect of every decision scheme is its profitability [f.sub.fit].

At this time, all bees are scouts with no prior information. The algorithm randomly generates N jamming decision matrix X overall situation corresponding to N food sources. The jamming effect of every decision scheme is its profitability f fit.

[mathematical expression not reproducible]. (13)

(2) Divide all bees into employed foragers and onlookers according to the jamming effect of every decision matrix X in step (1). Among them, the N/2 bees with a higher [f.sub.fit] value are employed foragers, and the other N/2 bees are onlookers. Onlookers select employed foragers to follow according to the probability P of the [f.sub.fit] value of the former N/2 decision matrix.

[P.sub.i] = [fitness.sub.i]/[[summation].sup.N/2.sub.i=1][fitness.sub.i]. (14)

(3) Every employed forager searches for a new decision matrix around the old one and calculates its profitability. If it is greater than the old, then replace it according to the greedy criterion. The search formula is in

[X.sub.k'] = [[[x.sub.ij']].sub.mixn], i [member of] [1, m], j [member of] [1, n, k [member of] [1, N/2], (15)

where

[mathematical expression not reproducible], (16)

rand 1, and rand 2 are unequal random integers between [1, n].

(4) Onlookers change the distribution mode of the attacker corresponding to employed foragers to get a new decision matrix after selecting them to follow, similar as in step (3).

(5) If employed foragers and onlookers search more than limited times for a decision matrix and find no decision scheme with better profitability, then give up this decision matrix, turn the role of the bee into scouts, and generate a new decision matrix that satisfies the constraints.

(6) Record the decision matrix of the maximum jamming effect and turn to step (2), until the maximum iteration number maxCycle is satisfied. The decision matrix which makes the profitability maximal is the decision scheme with the best jamming effect.

Algorithm 1: The application of tabu search in ABC algorithm in jamming decision. 1: send employed foragers 2: calculate the jamming effect of the current decision matrices 3: if optimal solution updated after limit times then 4: keep the updated solution 5: else 6: update tabu list 7: search for new solution through the Tabu Search Algorithm 8: while distance [less than or equal to] threshold value do 9: keep the solution as the new solution 10: end while 11: end if 12: send onlookers 13: repeat

The jamming decision based on the ABC algorithm can not only ensure the optimization speed of the algorithm but also solve the problem that the IAC algorithm requires a large number of early parameters depending on manual selection. It is an effective improvement of the IAC algorithm.

However, there are some major problems faced by the ABC algorithm. When the optimization domain is large or in a flat area, the new solution sometimes overlaps with the already searched solution and further results in unnecessary repeated searches. As a result, the global search ability of the algorithm is reduced, and it is sometimes easy to fall into the local maximum. Due to the limitation of the taboo table in the tabu search algorithm, the probability of falling into the local optimal solution can be greatly reduced [22-24]. In order to avoid the algorithm falling into the local optimum and increase the probability of getting the optimal solution, we introduce the tabu search algorithm to the jamming decision-making field and introduce the new tabu search-artificial bee colony (TSABC) algorithm to the problem of jamming decision-making.

It is the first time that the TSABC algorithm is introduced to the problem of jamming decision-making. The elements in the taboo table are the decision matrices corresponding to different decision schemes, and the Euclidean distance cannot be calculated. Due to this, the conventional method of using the Euclidean distance between elements to represent the threshold has lost its significance in jamming decisions. We propose a new method for calculating the threshold value and a novel strategy to generate a new solution. The specific improvements are as follows.

If employed foragers and onlookers search more than limited times for a decision matrix and find no decision scheme with better profitability, then add the solution to the taboo list, convert the bee character into the scouts, and randomly generate a new solution that satisfies the constraint conditions. The element number of the taboo list is limited. In order to expand the search space, we consider the solution whose gap with the elements in the taboo list is less than the threshold value which is also in the taboo range. Since the elements in the taboo table are decision matrices corresponding to different decision schemes, the Euclidean distance cannot be calculated. Considering that the purpose of the decisionmaking is to obtain the maximum jamming benefit in the jamming decision problem, we propose the minimum value of the difference between the fitness of every two solutions in the taboo list as a threshold. It can be calculated as

Threshold value = min ([fitness.sub.i] - [fitness.sub.j]), (17)

where i, j =1,2,..., n; n is the number of elements in the taboo list.

If the difference of the fitness between the new solution and the solution in the taboo list is smaller than the threshold, we think that this new solution is in the range of the taboo list, and the new solution will be repeatedly generated until it is out of the taboo list.

The application of tabu search in the ABC algorithm in the jamming decision is shown in Algorithm 1.

4. Simulation Analysis

To verify the robustness and the ability of the improved tabu search-artificial bee colony algorithm for multiobjective collaborative jamming decision-making, we set two different jamming modes named "one-to-one" and "one-to-many" for simulation verification using the above objective function.

"One-to-one" jamming mode: suppose that the number of attackers is m = 10, and the number of defenders is n = 10. Each attacker can jam one defender. Calculate the weighted sum of the jamming benefit and jamming cost of attacker [u.sub.i] (I = 1,2, ..., m) to defender [R.sub.j](j =1,2, ..., n); the jamming effect matrixes are then shown in (18) and (19).

"One-to-many" jamming mode: suppose that the number of attackers is m = 5, and the number of defenders is n = 8. Each attacker can jam multiple defenders. Calculate the weighted sum of the jamming benefit and jamming cost of attacker [u.sub.i](i = 1,2,..., m) to defender [R.sub.i](j = 1,2,..., n); the jamming effect matrixes are then shown in (20) and (21).

[mathematical expression not reproducible], (18)

[[omega].sub.j1] = [0.4 0.8 0.6 0.9 0.7 0.4 0.7 0.3 0.6 0.8], (19)

[mathematical expression not reproducible], (20)

[[omega].sub.j2] = [0.6970 0.5267 0.5174 0.5228 0.2952 0.4199 0.6734 0.5706]. (21)

We design two sets of experiments to verify the optimization speed and optimization probability of the tabu search artificial bee colony algorithm. In the two experiments, NP = 40, limit = 100, and maxCycle = 100.

Experiment 1: the IAC algorithm, ABC algorithm, and TSABC algorithm are used to simulate the jamming decision in the "one-to-one" and "one-to-many" modes, which verifies that the optimization ability of the TSABC algorithm is better than that of the IAC algorithm and ABC algorithm. Then, the comparison of the simulation results of the three algorithms is exhibited in Figures 2 and 3.

It can be seen from Figures 2 and 3 that the IAC algorithm requires more iterations in the "one-to-one" mode. Although it is reduced in the "one-to-many" mode, the search ability is reduced too. The TSABC algorithm need not repeat the search process in the ABC algorithm because of the tabu list, which helps reach the optimal value with fewer iterations. The above results show that the optimization ability of the TSABC algorithm is better.

Next, we can obtain the respective optimal decision matrixes X in two modes through the simulation. The corresponding jamming decision schemes are shown in Tables 1 and 2.

Tables 1 and 2 show the jamming matching schemes. It can be seen from the tables that each defender has a corresponding attacker to jam. The number of defenders jammed per attacker is 1 in the one-to-one mode and does not exceed 2 in the "one-to-many" mode, which meets the constraint set.

In order to avoid the fortuity of a single optimization, we introduce Monte Carlo simulation to perform the decisionmaking process under the two modes 100 times, respectively, and record the average number of iterations after each operation. The optimization ability of three algorithms in two modes is shown in Figures 4 and 5.

It is obviously seen in Figures 4 and 5 that the number of iterations fluctuates around a fixed value. The number of iterations of the TSABC algorithm is less than the other two, which further indicates that the TSABC algorithm has a stronger optimization ability.

Experiment 2: Monte Carlo simulation is ulteriorly used to perform the decision-making process in the two modes 100 times, respectively, and record the average optimized value and the optimization probability of each algorithm after each decision. The average optimized values in two modes are shown in Figures 6 and 7.

The difference of the average optimized value in the one-to-one mode is small between the TSABC algorithm and ABC algorithm, and partial enlargement is shown in Figure 8.

It can be seen from Figures 5 and 6 that the optimization probability of the TSABC algorithm is better than that of the IACA algorithm and ABC algorithm. This phenomenon indicates that compared with the other two algorithms, the TSABC algorithm can jump out of the local optimum more effectively to find the optimal solution and improve the search probability. Thus, the robustness of the proposed algorithm is verified.

To further demonstrate the superiority of the proposed algorithm, the performance comparison of the three algorithms is shown in Table 3.

In Table 3, we take the weighted sum of the jamming benefit and jamming cost as the objective function of the multiobjective cognitive cooperative jamming decision, which ensures that the simulation solution can pay a very small jamming cost while obtaining great jamming benefits. It can be seen from Table 3 that the average number of iterations of the TSABC algorithm is less than the other two algorithms. Most importantly, the probability of the TSABC algorithm getting the optimal solution is far greater than the other two, which means its optimization probability is greater. Apparently, the optimization ability and the optimization probability of the proposed algorithm are both enhanced. In addition, the TSABC algorithm has better robustness. The advantages are more obvious in one to many modes.

5. Conclusion

In the modern war, information confrontation plays an increasingly important role where cognitive cooperative jamming will become a trend due to the ability of cognitive technology for autonomous environment perception and real-time optimization of operating parameters. Jamming decision-making plays a vital role in the closed loop of cognitive confrontation. Aiming at the problem of maximizing the jamming benefit as the decision target in the existing jamming decision model, in this paper, two objective functions as jamming benefit and jamming cost are proposed to measure the jamming effects, and the calculation methods of specific indicators and their revenue values are given, respectively. The increase in the objective function transformed the collaborative jamming decision-making problem into a multiobjective optimization problem and refined the model of multiobjective cognitive collaborative jamming decision. In the aspect of the decision algorithm, aiming at the deficiency of the improved ant colony algorithm in the jamming decision-making problem, this paper introduces the tabu search artificial bee colony algorithm to the jamming decision-making problem, and the superiority of the algorithm is proved by simulation. The simulation results show that the improved TSABC algorithm is greater than comparison methods both in the optimization ability and the optimization probability and has better robustness and higher application value in cognitive confrontation.

https://doi.org/10.1155/2018/7490895

Data Availability

The research data and software code used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that there is no conflict of interest regarding the publication of this paper.

Acknowledgments

This paper is funded by the National Natural Science Foundation of China (Grant No. 61701134), the National Key Research and Development Program of China (Grant No. 2016YFF0102806), the Natural Science Foundation of Heilongjiang Province, China (Grant No. F2017004), and the Fundamental Research Funds for the Central Universities of China (No. HEUCFM180802).

References

[1] K. Zhang, X. Zhang, and J. Jin, "A preliminary study of cognitive electronic warfare," Space Electronic Warfare, vol. 29, no. 1, pp. 53-56, 2013.

[2] R. Sabatini, T. Moore, and C. Hill, "Avionics-based GNSS integrity augmentation for unmanned aerial systems sense-and-avoid," in Proceedings of the 27th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS+ 2014), pp. 3600-3617, Tampa, FL, USA, September 2014.

[3] Z. Fan, G. Zhu, and Y. Hu, "Overview of cognitive electronic warfare," Electronic information countermeasure Technology, vol. 30, no. 1, pp. 33-38, 2015.

[4] X. Lu, D. Xu, L. Xiao, L. Wang, and W. Zhuang, "Anti-jamming communication game for UAV-aided VANETs," in GLOBECOM 2017-2017 IEEE Global Communications Conference, pp. 1-6, Singapore, December 2017.

[5] Q. Sun, Y. Tian, and M. Diao, "Cooperative localization algorithm based on hybrid topology architecture for multiple mobile robot system," IEEE Internet of Things Journal, p. 1, 2018.

[6] C. Niu, Y. Li, R. Hu, and F. Ye, "Fast and efficient radio resource allocation in dynamic ultra-dense heterogeneous networks," IEEE Access, vol. 5, pp. 1911-1924, 2017.

[7] Y. Xue, Y. Zhuang, and Y. Zhang, "Multi-UCAV cooperative jamming air combat decision based on heuristic adaptive discrete differential evolution algorithm," Journal of Astronautics, vol. 34, no. 2, pp. 343-351, 2013.

[8] M. Li, Research on multi-ECAV cooperative jamming resource optimization allocation problem, [M.S. thesis], National University of Defense Technology, 2013.

[9] Z. Ming, Z. Lingling, S. Xiaohong, M. Peijun, and Z. Yanhang, "Improved discrete mapping differential evolution for multiunmanned aerial vehicles cooperative multi-targets assignment under unified model," International Journal of Machine Learning and Cybernetics, vol. 8, no. 3, pp. 765-780, 2017.

[10] H. Jiang, Y. Zhang, and H. Xu, "Optimal allocation of cooperative jamming resource based on hybrid quantum-behaved particle swarm optimisation and genetic algorithm," IET Radar, Sonar & Navigation, vol. 11, no. 1, pp. 185-192, 2017.

[11] P. Gupta, M. K. Mehlawat, and G. Mittal, "A fuzzy approach to multicriteria assignment problem using exponential membership functions," International Journal of Machine Learning and Cybernetics, vol. 4, no. 6, pp. 647-657, 2013.

[12] Y. Lou, Y. Zhuang, and J. Gu, "Task scheduling method based on IMOABC in collaborative jamming environment," Computer Technology and Development, vol. 27, no. 11, pp. 46-51, 2017.

[13] S. Huang, L. Zhu, and S. Liu, "Based on virtual beamforming cooperative jamming with Stackelberg game for physical layer security in the heterogeneous wireless network," EURASIP Journal on Wireless Communications and Networking, vol. 2018, no. 1, 2018.

[14] Q. Gao, H. Zou, X. Zhang, and L. Zhou, "New relaxation algorithm for three-dimensional assignment problem," in IEEE Conference Anthology, pp. 1-4, China, January 2013.

[15] C. Ramirez-Atencia, G. Bello-Orgaz, M. D. R-Moreno, and D. Camacho, "Solving complex multi-UAV mission planning problems using multi-objective genetic algorithms," Soft Computing, vol. 21, no. 17, pp. 4883-4900, 2017.

[16] T.-C. Lu, G.-R. Yu, and J.-C. Juang, "Quantum-based algorithm for optimizing artificial neural networks," IEEE Transactions on Neural Networks and Learning Systems, vol. 24, no. 8, pp. 1266-1278, 2013.

[17] N. Zhao, S. Li, and Z. Wu, "Cognitive radio engine design based on ant colony optimization," Wireless Personal Communications, vol. 65, no. 1, pp. 15-24, 2012.

[18] F. He, S. Qi, G. Xie, and T. Wu, "Improved ant colony algorithm for optimal allocation of jamming resources of multiple targets radar," Fire Control and Command Control, vol. 39, no. 5, pp. 111-114, 2014.

[19] Y.-Z. Zhang, J.-W. Li, B. Hu, and J.-D. Zhang, "An improved PSO algorithm for solving multi-UAV cooperative reconnaissance task decision-making problem," in 2016 IEEE International Conference on Aircraft Utility Systems (AUS), pp. 434-437, Beijing, China, October 2016.

[20] X. Hui, J. Chen, and Y. Niu, "An initial population optimization-based particle swarm algorithm for antijamming communication decision engines," in 11th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2015), Shanghai, China, 2016.

[21] F. Ye, F. Che, and H. Tian, "Cognitive cooperative-jamming decision method based on bee colony algorithm," in 2017 Progress in Electromagnetics Research Symposium - Fall (PIERS - FALL), vol. 2017, pp. 531-537, Singapore, November 2017.

[22] I. Paprocka, A. Gwiazda, and M. Baczkowicz, "Robustness of schedules obtained using the Tabu search algorithm based on the average slack method," in International Conference on European Transnational Education, pp. 426-434, Springer International Publishing, 2016.

[23] W. Zheng, L. Qiaoqiao, T. Hongtao, and L. Jianxun, "Multiple task planning based on TS algorithm for multiple heterogeneous unmanned aerial vehicles," in Proceedings of 2014 IEEE Chinese Guidance, Navigation and Control Conference, pp. 630-635, Yantai, China, August 2014.

[24] F. Li, J. Feng, J. Liu, and S. Lu, "Defect profile reconstruction from MFL signals based on a specially-designed genetic taboo search algorithm," Insight - Non-Destructive Testing and Condition Monitoring, vol. 58, no. 7, pp. 380-387, 2016.

Fang Ye [iD], Fei Che [iD], and Lipeng Gao [iD]

College of Information and Communication Engineering, Harbin Engineering University, Harbin 150001, China

Correspondence should be addressed to Lipeng Gao; gaolipeng215@126.com

Received 17 May 2018; Revised 7 September 2018; Accepted 23 September 2018; Published 9 December 2018

Academic Editor: Angel Velazquez

Caption: Figure 1: Cognitive confrontation scene description.

Caption: Figure 2: Comparison of iteration in the one-to-one mode.

Caption: Figure 3: Comparison of iteration in the one-to-many mode.

Caption: Figure 4: Comparison of optimization ability in the one-to-one mode.

Caption: Figure 5: Comparison of optimization ability in the one-to-many mode.

Caption: Figure 6: Average optimized value in the one-to-one mode.

Caption: Figure 7: Average optimized value in the one-to-many mode.

Caption: Figure 8: "One-to-one" average optimized value partial enlargement.

Table 1: Jamming decision scheme in the "one-to-one" mode. Rader number 1 2 3 4 5 6 Attacker number 4 9 1 2 7 6 Rader number 7 8 9 10 Attacker number 3 10 8 5 Table 2: Jamming decision scheme in the "one-to-many" mode. Defender number 1 2 3 4 5 Attacker number 1 4 3 5 2 Defender number 6 7 8 Attacker number 1 4 2 Table 3: The performance comparison of three algorithms. One-to-one IACA ABC TSABC Average optimized value 3.46498 3.50676 3.50688 The average number of iterations 50 48 31 to obtain the optimal value Optimization probability 0.72 0.94 0.97 One-to-many IACA ABC TSABC Average optimized value 3.22874 3.26611 3.26794 The average number of iterations 31 34 19 to obtain the optimal value Optimization probability 0.65 0.84 0.95

Printer friendly Cite/link Email Feedback | |

Title Annotation: | Research Article |
---|---|

Author: | Ye, Fang; Che, Fei; Gao, Lipeng |

Publication: | International Journal of Aerospace Engineering |

Date: | Jan 1, 2018 |

Words: | 5091 |

Previous Article: | Propulsive Efficiency of Ridge/Inlet Configuration. |

Next Article: | The Influence of Orbital Element Error on Satellite Coverage Calculation. |

Topics: |