Skip to main content
Top
Published in: Complex & Intelligent Systems 6/2022

Open Access 25-04-2022 | Original Article

A hybrid multi-objective bi-level interactive fuzzy programming method for solving ECM-DWTA problem

Authors: Luda Zhao, Zongxu An, Bin Wang, Yanqiu Zhang, Yihua Hu

Published in: Complex & Intelligent Systems | Issue 6/2022

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Electronic countermeasure (ECM) has become one of the most significant factors in modern warfare, in the course of combat, the electronic jamming allocation tasks need to be flexibly adjusted with the change of combat stage, which puts forward higher requirements for the modeling and solution method of this kind of problems. To solve the ECM dynamic weapon target assignment (ECM-DWTA) problem, a hybrid multi-target bi-level programming model is established. The upper level takes the sum of the electronic jamming effects in the whole combat stage as an optimization objective, and locally optimizes the ECM weapon (ECM-WP) assignment scheme in each stage. The lower level takes the importance expectation value of the target subjected to interference and combat consumption as double optimization objectives to globally optimize the ECM-WP assignment scheme. Focus on solving this complex model, a hybrid multi-objective bi-level interactive fuzzy programming algorithm (HMOBIF) is proposed, in this method, exponential membership function is used to describe the satisfaction degree of each level. When solving the multi-objective optimization problem composed of membership functions in the upper and lower levels, we use the MOEA/D algorithm to obtain the Pareto Front (PF) solution set, and then each solution in PF is evaluated and selected by the TOPSIS multi-criteria evaluation method. This local and global interactive optimization process of bi-level model is actually the process of executing observation-orientation-decision-action loop in practical combat. According to the current example, we conduct numerical simulation on the parameters in the model and obtain the parameter values suitable for the model solution. The computational experiments on different scale ECM-DWTA problems show that HMOBIF method is superior to four bi-level programming algorithms in terms of performance index, and can better solve ECM-DWTA problems.
Notes

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Introduction

The dynamic assignment of jamming task in ECMs is an important problem to be solved and optimized urgently in the intelligent modern warfare. Dynamic allocation of electronic interference can be regarded as an extension of the DWTA problem. The main purpose of the DWTA problem is to allocate our limited weapon resources to different kinds of targets according to the change of combat stages, different combat enemies, and the combat capability of weapons. ECM-DWTA problem is to allocate our ECM equipment to interference with different kinds of targets according to the change of combat stage and equipment capability, which can be viewed as a DWTA problem using “soft weapons”. In the past few decades, the DWTA problem has been mainly applied in some fixed combat scenarios, such as air defense operations, air assault operations, and maritime defense operations. However, there are few independent research results about the ECM-DWTA problem.
With the further study of the DWTA problem, it has developed into many kinds of problem models, which can be summarized as the following aspects:
1.
“Shoot-look-shoot” model. Generally speaking, in this kind of model, observational decision need to be made between each two operational actions (stages). The considering of building this kind of model is generally based on the state of combat targets and operational progresses. By observing the state of combat targets, commanders can determine the distribution scheme of our army’s weapon at different times. Hocaolu [1] established a nonlinear target programming model, and according to this model, the simplex method was used to solve it. With the development of intelligent algorithms, many scholars have applied a variety of intelligent algorithms to solve DWTA problems. Lai et al. [2] and Liu et al. [3] used the improved particle swarm optimization algorithm (PSO) to solve the “shoot-look-shoot” problem model. Zhao et al. [4] and Chen et al. [5] used the improved genetic algorithm (GA) to solve the first and second problems, respectively. However, in a certain operational scenario, for example, we need to carry out two attacks on enemy targets, after the first attack, it is necessary to judge the damage degree of enemy targets, and then determine the targets which need the second attack.
 
2.
“Multi-stage” dynamic model. The biggest difference between this model and the “shoot-look-shoot” model lies in the handling of combat targets. The previous model observed all enemy targets repeatedly until the target damage reached the expected level. Xu et al. [6] solves the multi-objective programming model using MOEA/D, taking into account the stochastic nature of the combat mission and the synergy effect of the combat objects when building the DWTA model. Aiming at the slow convergence rate and the low search efficiency in solving sensor-weapon-target assignment problem [7, 8] propose an improved genetic algorithm with a new initialization method utilizing rule-based heuristic factors. To this end, according to the defense area analysis Jia et al. [9] propose a network security situation awareness method using stochastic game in cloud computing environment, uses the utility of both sides of the game to quantify the network security situation value. But in this model, threat assessment can only be carried out on the number and type of enemy targets before each combat stage without the observational decision. It is necessary to distribute our weapons according to the threat levels of enemy targets at different times.
 
3.
“Dynamic game” model. At present, there are few studies on this kind of model. Such model treat the use of weapons by both sides as chips in game theory, and then allocate weapons according to the course of battle. The main idea of modeling is to calculate the operational benefits of both sides’ weapons and various target information, and solve the Nash equilibrium solution according to the operational benefits at different operational moments, to obtain the distribution results of our weapon target in the equilibrium solution. For example, Zhang [10] models the game allocation during air-ground combat, Ma et al. [11] discuss how to use game theory for the search of allocation space solutions, and Zhang et al. [12] draw on grey theory to further discuss the game solution for DWTA.
 
To better solve the above-mentioned various types of DWTA problem model, many optimization methods (i.e., approximation algorithms, heuristic algorithms, machine learning algorithms, etc.) have been widely applied. Operations research methods are the basic means to solve planning problems. Uhm et al. [13] modeled the weapon target assignment problem for missile intercept defense and improved the branch and bound method for integer nonlinear programming by using a simulated annealing algorithm, which made the problem well solved. Shin et al. [14] used mixed-integer linear programming (MILP) method to solve the weapon target assignment model of ground-based missiles striking ground targets, which reduces the operational time window. Aiming at the problem of weapon target allocation for air defense attack targets, Sonu [15] and Jiang et al. [16] used the modified crow search algorithm (MCSA) and dynamic allocation auction algorithm to solve the “multi-stage” DWTA model in air defense operations. Compared with all kinds of intelligent algorithms, heuristic algorithms may get better conclusions when solving some specific problems. Zhang et al. [17] take the statistical marginal revenue of both sides as the revenue value of decision-making and carry out the final dynamic weapon allocation through the revenue rolling in different operational stages. To solve the “multi-stage” problem, Wang et al. [18] proposed a knowledge-based incremental constructive heuristic algorithm and compared it with the random sampling algorithm based on random arrangement, which showed its superiority. Also, due to the optimization objectives are not fully considered in the construction of many models, in many models, multi-objective evolutionary optimization algorithms (MOEA) are adopted, such as MOEA/D [7, 19], NSGA-II [20], and C-TAEA [21], and good solution conclusion is obtained. In recent years, the great development of artificial intelligence algorithms have inspired many scholars to study DWTA. Qu et al. [22] established the combat task allocation network using the network optimization theory and solved this problem using the distributed intelligent agent model. Shojaeifard et al. [23] transformed the constraints of the DWTA model appropriately, and successfully obtained the optimal weapon allocation scheme using recurrent neural network (RNN) models. Jiang et al. [24] established an Adaptive Weapon-to-Target Assignment (AWTA) model that can adaptively predict the hit probability of an intercept missile and uses the framework of reinforcement learning algorithm (RL) to solve the model.
The above models and algorithms have made great contributions to solve the DWTA problems, but also have the following problems:
1.
In the process of modeling, the operational command process is not considered. The combat command process is an “observe-oriented-declare-act” (OODA) loop [17, 18]. In the “shoot-look-shoot” model only the “observe-oriented” stages are considered, and further modifications to the model are required.
 
2.
For the above model, the objective function is relatively simple when considering the combat effect, and the multi-objective function is not comprehensively considered from the operational “efficiency-cost ratio”.
 
3.
ECM-DWTA, as one of the DWTA problems [2527], has not been studied deeply and effectively enough regarding the modeling and solving of this problem.
 
In this paper, based on summarizing the advantages and disadvantages of the existing DWTA problem models as well as its solving methods, combined with the combat actual background of electronic interference task allocation, we propose the allocation scheme of the actual electronic interference dynamic problem as the new model of DWTA problems. A hybrid multi-objective bi-level interactive fuzzy programming method is established to solve this problem, and finally, the simulation results are discussed with some examples. The main motivations and contributions of this paper are as follows.
1.
The studying of ECM-DWTA problem so far has been modeled with a lack of consideration of OODA loops in actual operations currently. Therefore, in the modeling process of electronic jamming dynamic allocation, the OODA on the operational process and the operational effect is fully considered, and bi-level programming is used to describe the command decision. The upper level model corresponds to the global optimization process of combat, and the lower level model corresponds to the local optimization process of each combat stage.
 
2.
Given that there is little simultaneous consideration of operational efficiency and operational cost in the existing ECM-DWTA problem, we fully consider the “efficiency-cost ratio” of electronic jamming, and use MOEA/D to solve the model in each operational stage and the whole operational process. When selecting individuals from the solution set of multi-objective model, we propose a MOEA/D-TOPSIS method to solve it.
 
3.
Aiming at the ECM-DWTA model we rebuild, a hybrid multi-objective bi-level interactive fuzzy programming method (HMOBIF) is proposed, and we improve the traditional construction method of satisfaction score function. Through satisfaction iteration among different levels, the subjective judgment of the commander can be added into the process of combat assignment to a certain extent.
 
4.
In our proposed HMOBIF algorithm for solving multi-level programming problem, we borrow the idea of fuzzy programming method and use the decision fuzzy number of decision-makers to define the satisfaction function values in each levels, and then find the optimal solution that meets the requirements through the transfer of satisfaction values.
 
The remainder of this paper is arranged as follows. “Problem formulation” briefly introduces the background of the dynamic distribution of electronic countermeasure interference and formulates the mathematical model for ECM-DWTA. “Model solution based on hybrid multi-objective bi-level interactive fuzzy algorithm (HMOBIF) discusses the detailed process of solving the model and HMOBIF is proposed. The test problems are described, and the numerical results are discussed in “Experiment results and discussion”, and “Conclusions and future works” offers conclusions.

Problem formulation

Background of problem

The ECM jamming combat scenario considered in this paper is narrated as follows. We are the electronic attacker, and the enemy is the defensive. The defender has J weapon platforms to defend an asset. They are connected by communication networks and can combine to finish a task collaboratively, each communication link is regarded as a combat target. The attacker has a total of I electronic jamming equipment including five types of combat equipment (i.e., air-based radar, land-based radar, land-based communication, air-based communication, and land-based electro-optical countermeasures equipment), which may interfere with the enemy electronic targets. As shown in Fig. 1, The combat start time is \( t=0 \), the commander will distribute weapons based on the degree of threat of the target. During the enemy finishes the combat, we have a time interval to interfere with these targets, which can be divided into several stages with a fixed length. A stage is the minimum combat time unit. Assume that there are T stages. In each stage, we need to allocate weapons according to the real-time threat levels of enemy electronic targets and the war damage of our ECM equipment.
From the background, it can be seen that with the changes of combat stages, the assignment of electronic jamming is carried out in the OODA loop. We are inspired by this. If the dynamic jamming assignment of ECM (DJA-ECM) can be closely combined with the OODA loop, the solution set of this problem will be closer to the practical combat. Therefore, in this paper, we build up the relationship between different level of the bi-level programming model and the OODA loop framework, which can be represented by Fig. 2. In our model, the upper level and the lower level correspond to the local and global optimal solution in each stage of the DJA-ECM scheme, respectively. In addition, the whole operations at each operational moment in the current combat phase are conducted in the OODA loop. Through the bi-level interaction solution, the final DJA-ECM scheme can be obtained. Thereby, making the ECM-DWTA problem better solved.
The scheme of transfers between stages is denoted by \( {x'_{ij}}\left( t \right) \left( {i = 1,2, \cdots ,I,} \right. j = 1,2, \cdots ,J,\left. {t = 1,2, \cdots ,T} \right) \), and the scheme of ECM-WPs is denoted by \( {x_{ij}}\left( {t + 1} \right) \). For ease of reading, Table 1 summarizes all the notations that are used throughout this paper.
Table 1
Notations
Notations
Description
\( {p_{ij}}\left( t \right) \)
The interference benefit of the ith ECM-WP interfere with the jth target at stage t
\( {K_{ij}}\left( t \right) \)
The jamming-to-signal ratio of the ith ECM-WP interfere with the jth target at stage t
\( {K_a} \)
The jamming-to-signal ratio required to successfully interfere with the target
\( V\left( t \right) \)
The sum of interference value at stage t
\( {\alpha _j}\left( t \right) \)
The interference value coefficient of the jth target at stage t
\( J\left( t \right) \)
The number of the jth target at stage t;
\( {S_j}\left( t \right) \)
The operating state coefficient of the jth target at stage t, \( {S_j}\left( t \right) = 1 \) if \( \sum \nolimits _{i = 1}^I {{p_{ij}}\left( {t - 1} \right) > 0} \) and \( \sum \nolimits _{i = 1}^I {{p_{ij}}\left( t \right) = 0} \), 0 otherwise;
\( {P_{rj}}\left( \bullet \right) \)
The probability of effectively interfering with the jth target, \( \bullet \) represents the value of \( {S_j}\left( t \right) \);
\( {C_i}\left( t \right) \)
The operational consumption of the ith ECM-WP
\( C_{ij}^\mathrm{{sum}}\left( t \right) \)
The adaptive parameter of overall interference for the ith ECM-WP interfere with the jth target at stage t;
\( t_{i\left( j \right) }^\mathrm{{on}},t_{i\left( j \right) }^\mathrm{{off}} \)
The operation start and end time of ith ECM-WP and jth target;
\( \mathrm{{dis}}{_{\min ({\max })}}\)
The distance between the two sides, the minimum and maximum distance that can implement effective interference;
\(\mathrm{{angle}}{_{\min (\max ) }}\)
The angle between the two sides, the minimum and maximum angle that can implement effective interference;
\( {f_{Hi(j)}},{f_{Li(j)}} \)
The minimum and maximum frequency of effective interference and operational working frequency band;
\( C_{ij}^\mathrm{{time}}\left( t \right) \)
The adaptive parameter of time for the ith ECM-WP interfere with the jth target at stage t, \( C_{ij}^\mathrm{{time}}\left( t \right) = 1 \) if \( t_i^\mathrm{{off}} - t_j^\mathrm{{on}} > 0 \) and \( t_j^\mathrm{{off}} - t_i^\mathrm{{on}} > 0 \), 0 otherwise;
\( C_{ij}^\mathrm{{space}}\left( t \right) \)
The adaptive parameter of space for the ith ECM-WP interfere with the jth target at stage t, \( C_{ij}^\mathrm{{space}}\left( t \right) = 1 \) if \( \mathrm{{dis}} \in \left[ {\mathrm{{dis}}{_{\min }},\mathrm{{dis}}{_{\max }}} \right] \) and \( \mathrm{{angle}} \in \left[ {\mathrm{{angle}}{_{\min }},\mathrm{{angle}}{_{\max }}} \right] \), 0 otherwise;
\( C_{ij}^\mathrm{{freq}}\left( t \right) \)
The adaptive parameter of frequency for the ith ECM-WP interfere with the jth target at stage t, \( C_{ij}^\mathrm{{freq}}\left( t \right) = 1 \) if \( {f_{Hi}} - {f_{Lj}} > 0 \) and \( {f_{Hj}} - {f_{Li}} > 0 \), 0 otherwise;
\( {x'_{ij}}\left( t \right) \)
\( {x'_{ij}}\left( t \right) = 1 \) if the distribution targets for ith ECM-WP has no change, 0 otherwise;
\( {x_{ij}}\left( {t + 1} \right) \)
\( {x_{ij}}\left( {t + 1} \right) = 1 \) if the ith ECM-WP is allocated to the jth target at stage \( t+1 \), \( {x_{ij}}\left( {t + 1} \right) = {x'_{ij}}\left( {t + 1} \right) \) if \( {x'_{ij}}\left( {t + 1} \right) = 1 \), and 0 otherwise

Model description

Upper level model

(1)
Objective.
The purpose of the upper level model is to complete the optimal distribution of weapons in each combat stage, and its optimization objective is a single-objective function stands for the sum of jamming effects for each combat stage in the optimal scheme. Therefore, the objective function of the upper level model is expressed as
$$\begin{aligned} {Z_1} = \sum \limits _{j = 1}^J {\left( {1 - \prod \limits _{i = 1}^I {\left( {\sum \limits _{t = 1}^T {{{\left( {1 - {p_{ij}}\left( t \right) } \right) }^{{x_{ij}}\left( t \right) }}} } \right) } } \right) } \end{aligned}$$
(1)
where \( {p_{ij}}\left( t \right) \) is used to denote the interference benefit of the ith ECM-WP interfere with the jth target at stage t, combining the indicator with the jamming-to-signal ratio K, which is given by
$$\begin{aligned} {p_{ij}}\left( t \right) = \frac{{{K_{ij}}\left( t \right) - {K_a}}}{{{K_a}}} \end{aligned}$$
(2)
 
(2)
Constraints.
$$\begin{aligned}&1 - \prod \limits _{i = 1}^I {{{\left( {1 - {p_{ij}}\left( t \right) } \right) }^{{x_{ij}}\left( t \right) }} \ge {K_a}} ,\forall t \end{aligned}$$
(3)
$$\begin{aligned}&\sum \limits _{i = 1}^I {{x_{ij}}\left( t \right) } \le 1,\forall j,t \end{aligned}$$
(4)
$$\begin{aligned}&\sum \limits _{j = 1}^{J\left( t \right) } {{x_{ij}}\left( t \right) } \le a,\forall i,t \end{aligned}$$
(5)
$$\begin{aligned}&{x_{ij}}\left( t \right) = \left\{ {0,1} \right\} \end{aligned}$$
(6)
 
The constraint (3) represents the jamming effect of each combat stage must be greater than the specified effective suppression coefficient \( {K_a} \). Constraint (4) represents that the number of ECM-WP needs to be larger than the number of the opponent’s jamming targets. Constraint (5), on the other hand, indicates that the limit on the number of jamming targets per ECM-WP equipment in a single operational phase needs to be less than or equal to a. The following two constraints limit the maximum number of electronic targets ECM-WP can interfere in a single-stage, respectively. It depends on the combat ability of the ith ECM-WP. A platform with multi-objective combat ability can be regarded as multi-platforms with single-objective combat ability. The constraint (6) represent the scheme of ECM-WPs.

Lower level model

(1)
Objective
The purpose of the lower level model is to complete the optimal distribution of weapons during the whole combat stages, and its optimization objective is double-objective functions stand for the importance expectation value of the target subjected to interference and combat consumption, respectively. The importance expectation value of the target subjected to interference is expressed as
$$\begin{aligned} {Z_2} = \sum \limits _{t = 1}^{T - 1} {V\left( t \right) } + \sum \limits _{j = 1}^{J\left( t \right) } {\left( {{\alpha _j}\left( t \right) \cdot {S_j}\left( t \right) \cdot {P_{rj}}\left( {{S_j}\left( t \right) = 0} \right) } \right) }\nonumber \\ \end{aligned}$$
(7)
where \( V\left( t \right) \) is used to denote the total importance expectation value for stage t, which is given by
$$\begin{aligned} V\left( t \right) = \sum \limits _{j = 1}^{J\left( t \right) } {\left( {{\alpha _j}\left( t \right) \cdot {S_j}\left( t \right) \cdot {P_{rj}}\left( {{S_j}\left( t \right) = k} \right) } \right) } \end{aligned}$$
(8)
where \( {\alpha _j}\left( t \right) \) represents the interference importance expectation value coefficient of the jth target at stage t , \( {S_j}\left( t \right) \) represents the operating state coefficient of the jth target at stage t, \( {P_{rj}}\left( {{S_j}\left( t \right) = k} \right) \) is used to denote the probability of effectively interfering with the jth target in case \( {S_j}\left( t \right) = k \), which is given by
$$\begin{aligned}&{P_{rj}}\left( {{S_j}\left( t \right) = k} \right) \nonumber \\&\quad = k \cdot \prod \limits _{i = 1}^I {{\left( {1 - {p_{ij}}\left( t \right) } \right) }^{{x_{ij}}\left( 0 \right) }}\nonumber \\&\quad \cdot \prod \limits _{l = 1}^t {\prod \limits _{i = 1}^I {{{\left( {1 - {p_{ij}}\left( t \right) } \right) }^{{{x'}_{ij}}\left( l \right) }}} } \nonumber \\&\quad + \mathrm{{ }}\left( {1 - k} \right) \cdot \left( {1 - \prod \limits _{i = 1}^I {{{\left( {1 - {p_{ij}}\left( t \right) } \right) }^{{x_{ij}}\left( 0 \right) }}} } \right) \nonumber \\&\quad \cdot \left( {1 - \prod \limits _{l = 1}^t {\prod \limits _{i = 1}^I {{{\left( {1 - {p_{ij}}\left( t \right) } \right) }^{{{x'}_{ij}}\left( l \right) }}} } } \right) \end{aligned}$$
(9)
Then, the operating consumption during the whole operation process is expressed as
$$\begin{aligned} {Z_3} = \sum \limits _{i = 1}^I {\sum \limits _{t = 1}^T {\left( {{C_i}\left( t \right) \cdot \sum \limits _{j = 1}^J {{x_{ij}}\left( t \right) } } \right) } } \end{aligned}$$
(10)
 
(2)
Constraints.
$$\begin{aligned}&{x_{ij}}\left( t \right) \le C_{ij}^{sum}\left( t \right) \end{aligned}$$
(11)
$$\begin{aligned}&{S_j}\left( t \right) ,{x'_{ij}}\left( t \right) = \left\{ {0,1} \right\} \end{aligned}$$
(12)
 
The constraint (11) represents the scheme of ECM-WPs that should meet the adaptive parameter of overall interference for the ith ECM-WP interfere with the jth target at stage t, which is given by
$$\begin{aligned} C_{ij}^{sum}\left( t \right) = C_{ij}^{time}\left( t \right) \cdot C_{ij}^{space}\left( t \right) \cdot C_{ij}^{freq}\left( t \right) \end{aligned}$$
(13)
where \( C_{ij}^{time}\left( t \right) ,C_{ij}^{space}\left( t \right) ,C_{ij}^{freq}\left( t \right) \) represent the adaptive parameter of time, space and frequency for the ith ECM-WP interfere with the jth target at stage t, respectively. \( {x_{ij}}\left( t \right) \) is reasonable if and only if \( C_{ij}^{sum}\left( t \right) = 1 \).

Hybrid multi-objective bi-level model

The hybrid multi-objective bi-level model is given as follows:
$$\begin{aligned} \begin{array}{*{20}{c}} \mathrm{{Upper}}\\ \mathrm{{level}} \end{array}\left\{ \begin{array}{l} \max {Z_1} = \sum \limits _{j = 1}^J {\left( {1 - \prod \limits _{i = 1}^I {\left( {\sum \limits _{t = 1}^T {{{\left( {1 - {p_{ij}}\left( t \right) } \right) }^{{x_{ij}}\left( t \right) }}} } \right) } } \right) } \\ \mathrm{{s.t.}}\left\{ \begin{array}{l} 1 - \prod \limits _{i = 1}^I {{{\left( {1 - {p_{ij}}\left( t \right) } \right) }^{{x_{ij}}\left( t \right) }} \ge {K_a}} \\ \sum \limits _{i = 1}^I {{x_{ij}}\left( t \right) } \le 1,\forall j,t\\ \sum \limits _{j = 1}^{J\left( t \right) } {{x_{ij}}\left( t \right) } \le a,\forall i,t\\ {x_{ij}}\left( t \right) = \left\{ {0,1} \right\} \\ \begin{array}{*{20}{c}} \mathrm{{Lower}}\\ \mathrm{{level}} \end{array}\left\{ \begin{array}{l} \max {Z_2} = \sum \limits _{t = 1}^{T - 1} {V\left( t \right) }\\ \quad + \sum \limits _{j = 1}^{J\left( t \right) } {\left( {{\alpha _j}\left( t \right) \cdot {S_j}\left( t \right) \cdot {P_{rj}}\left( {{S_j}\left( t \right) = 0} \right) } \right) } \\ \min {Z_3} \\ = \sum \limits _{i = 1}^I {\sum \limits _{t = 1}^T {\left( {{C_i}\left( t \right) \cdot \sum \limits _{j = 1}^J {{x_{ij}}\left( t \right) } } \right) } } \\ \mathrm{{s.t.}}\left\{ \begin{array}{l} {x_{ij}}\left( t \right) \le {C_{ij}}\left( t \right) \\ {S_j}\left( t \right) ,{{x'}_{ij}}\left( t \right) = \left\{ {0,1} \right\} \end{array} \right. \end{array} \right. \end{array} \right. \end{array} \right. \nonumber \\ \end{aligned}$$
(14)

Model solution based on hybrid multi-objective bi-level interactive fuzzy algorithm (HMOBIF)

The basic DWTA model and the multi-level programming model studied in this paper have been proved to be NP-hard [28, 29], there is no polynomial-time algorithm to obtain the exact solution. At present, there are several methods to solve bi-level programming problems, such as Kth-Best algorithm [30], branch and bound algorithm [31], MPECs algorithm [32], descent algorithm [33], trust region algorithm [34], intelligent optimization algorithm [35] and fuzzy interactive algorithm [36], etc. When solving a bi-level programming model, it is very essential to find an equilibrium point in the conflict between the upper and lower levels of solutions, and the obtained solution is called the Stackelberg-Nash equilibrium solution [37]. On the other hand, the transfer of satisfaction values between levels in bi-level programming requires the existence of a metric, and we adopt the idea of fuzzy logic to use an appropriate membership function for the satisfaction value representation, which further leads to an optimal solution that satisfies the requirements. In current research, fuzzy logic has made full progress in the process of solving many optimization problems [38, 39]. For example, using type-2 logic combined with heuristic algorithms for representation and solution of optimization problems [40], using fuzzy logic combined with neural networks for optimization and prediction of models [41], etc. Inspired by the above kinds of approaches, we explore the use of bi-level programming for solving the ECM-DWTA problem. In the following, when solving the two-level model, the satisfaction function is used as the interaction factor between the two levels, through the satisfaction calculation between them, the solution result of the final model is obtained. In addition, because of the lower level is a multi-objective optimization model, we propose the MOED/D-TOPSIS algorithm to solve the optimal value in the solution set of the satisfaction.

Definition of satisfaction function

To better describe the satisfaction of each level and make the decision-maker’s subjective decision more closely combined with the objective calculation results, we borrowed the idea of fuzzy programming [27, 42] in the description process, using different membership functional to map the satisfaction values of the optimization objectives of each level, thus adding the fuzzy programming method to the framework of bi-level programming, making the whole algorithm process more in line with the actual requirements of combat. When calculating the degree of satisfaction, the membership function corresponding to the model index should be determined first. In the previous bi-level programming model, many scholars have used the linear, hyperbolic and parabolic membership functions [43]. In the actual combat process, the combat factors related to ECM can generally have a great impact on the combat results, so, in this paper, we will use the exponential membership function to describe satisfaction.
Let X be the solution set of the ECM-DWTA model, the satisfaction of the upper and lower model are \( {\delta _U} \) and \( {\delta _L} \), \(Z_k(x) \left( {k = 1,2,3} \right) \) represent the ECM-DWTA problem model’s object functions, and \( X' = \left\{ {x \in X|{\mu _l}\left( {{Z_k}\left( x \right) } \right) \ge {\delta _l}} \right\} \), \( {L_l} = \mathop {\min }\nolimits _{x \in X} {Z_k}\left( x \right) \), \( {U_l} = \mathop {\max }\nolimits _{x \in X'} {Z_k}\left( x \right) \) \((l=U,L)\), represent the upper and lower levels of the symbol in this paper, respectively. We use the degree of satisfaction solved by the membership function to express the degree of acceptance of the decision-maker, the expression is
$$\begin{aligned} {\mu _l}\left( {{Z_k}\left( x \right) } \right) = \left\{ {\begin{array}{*{20}{l}} {\begin{array}{*{20}{l}} {0,}\\ {\frac{{{e^{ - s{\varphi _l}\left( x \right) }} - {e^{ - s}}}}{{1 - {e^{ - s}}}},}\\ {1,} \end{array}}&{}{\begin{array}{*{20}{c}} {{Z_k}\left( x \right) \le {L_l}}\\ {{L_l} < {Z_k}\left( x \right) \le {U_l}}\\ {{Z_k}\left( x \right) \ge {U_l}} \end{array}} \end{array}} \right. \end{aligned}$$
(15)
where \( {\varphi _l}\left( x \right) = \frac{{{Z_k}\left( x \right) - {L_l}}}{{{U_l} - {L_l}}} \). Invert the membership function, and the satisfaction degree of the inverse function represented the rejection degree of the decision-maker, the expression is
$$\begin{aligned} {v_l}\left( {{Z_k}\left( x \right) } \right) = \left\{ {\begin{array}{*{20}{l}} {\begin{array}{*{20}{l}} {0,}\\ {\frac{{{e^{ - s{\varphi _l}^\prime \left( x \right) }} - {e^{ - s}}}}{{1 - {e^{ - s}}}},}\\ {1,} \end{array}}&{}{\begin{array}{*{20}{c}} {{Z_k}\left( x \right) \le {L_l}^\prime }\\ {{L_l}^\prime < {Z_k}\left( x \right) \le {U_l}^\prime }\\ {{Z_k}\left( x \right) \ge {U_l}^\prime } \end{array}} \end{array}} \right. \end{aligned}$$
(16)
where \( {\varphi _l}^\prime \left( x \right) = \frac{{{U_l}^\prime - {Z_k}\left( x \right) }}{{{U_l}^\prime - {L_l}^\prime }} \). In the above two formulas, s is a constant, where \( {U_l}^\prime , {L_l}^\prime \) denote the maximum and minimum values of the inverse function of the corresponding original function, respectively. Figure 3 shows these two kinds of membership function curves when \( s = 1 \) and \( s = 2 \).
In summary, the satisfaction calculation formula is
$$\begin{aligned} {s_l}\left( {{Z_k}\left( x \right) } \right) = {\mu _l}\left( {{Z_k}\left( x \right) } \right) - {\beta _l} \cdot {v_l}\left( {{Z_k}\left( x \right) } \right) \end{aligned}$$
(17)
where \( {\beta _l} \) is used to denote the fuzzy coefficient of satisfaction, represents the decision preference, \( {\beta _l} \in \left[ {0,1} \right] \), if \( {\beta _l} = 0 \), the satisfaction was biased towards acceptance; if \( {\beta _l} \in \left( {0,1} \right) \), the satisfaction was biased towards the degree of rejection; \( {\beta _l} = 1 \) indicates that the degree of acceptance is as important as that of rejection. In this way, according to the commander’s decision preference, the satisfaction function of each level can be calculated concretely through the above formula.

Sum approach of multi-objective satisfaction function

In the interaction process of the whole bi-level programming model, the optimization objective of the upper level is a single function, and the satisfaction function value is directly calculated according to Eq. (17). The optimization objective of the lower is the double function, and the satisfaction degree of each objective function needs to be treated by a sum approach. Inspired by the sum approach strategy in MOEA/D [44], the Tchebycheff approach [45] is used to aggregate the lower level satisfaction functions in this paper.
Let the weight decomposition vector of the global solution space be \( \lambda = {\left( {{\lambda _1},{\lambda _2}, \cdots ,{\lambda _N}} \right) ^{{T_\lambda }}} \), N is used to denote the population size, the reference points is \( {Z^*} = \min \left\{ {{Z_k}\left( x \right) |x \in X} \right\} \). According to Tchebycheff approach, the two kinds of membership functions of the model are expressed as follows:
$$\begin{aligned} {\mu _l}\left( {{Z_k}\left( x \right) } \right)= & {} \mathop {\min }\limits _{k \in \left\{ {1,2,3} \right\} } F\left( {{Z_k}\left( x \right) |\lambda ,{Z^*}} \right) \nonumber \\= & {} \mathop {\max }\limits _{k \in \left\{ {1,2,3} \right\} } \left\{ {{\lambda _l}|{\mu _l}\left( {{Z_k}\left( x \right) } \right) - {\mu _l}\left( {{Z^*}} \right) } \right\} \end{aligned}$$
(18)
$$\begin{aligned} {v_l}\left( {{Z_k}\left( x \right) } \right)= & {} \mathop {\max }\limits _{k \in \left\{ {1,2,3} \right\} } F\left( {{Z_k}\left( x \right) |\lambda ,{Z^*}} \right) \nonumber \\= & {} \mathop {\min }\limits _{k \in \left\{ {1,2,3} \right\} } \left\{ {{\lambda _l}|{v_l}\left( {{Z_k}\left( x \right) } \right) - {v_l}\left( {{Z^*}} \right) } \right\} \end{aligned}$$
(19)
Using the MOEA/D to solve the multi-objective optimization model composed of the above two kinds of membership functions, solution set \( X' \) (the Pareto Front (PF)) satisfying the requirements can be obtained. After successfully selecting the PF solution sets of each layer satisfying the requirements, further selection of each individual in the PF is required, and the solutions selected by the upper level solution set need to be transferred according to the satisfaction function as the basis for the lower level solution. The individual selected by the lower solution set can be used as the final basis for the commander to make decisions in the combat process.
The two solution selective processes of transferring the upper level optimal solution to the lower level and selecting the final optimal solution from the lower level optimal solution both require further selection in the PF set obtained by the multi-objective optimization. In fact, this problem can be regarded as a multi-attribute decision-making problem with the objective function of the multi-objective optimization model as the attribute value. Therefore, we used TOPSIS in combination with MOEA/D to obtain the final optimal solution. The flow framework of MOEA/D-TOPSIS algorithm proposed in this paper is shown in Algorithm 1.

HMOBIF

In the following, we use the hybrid multi-objective bi-level interactive fuzzy programming method (HMOBIF) proposed in this paper to solve the ECM-DWTA model. The steps are as follows.
Step 1 Initialize \( {\beta _l}\left( {l = 1,2} \right) \), obtain the satisfaction membership function \( {s_l}\left( {{Z_k}\left( x \right) } \right) \left( {k = 1,2,3} \right) \) according to formulas (17–19), and determine the prior minimum satisfaction \( {\theta _l} \) according to the prior knowledge of a decision-maker, where \( {\theta _l} \in \left( {0,1} \right) \). Both of them need to satisfy the following formula:
$$\begin{aligned} {s_l}\left( {{Z_k}\left( x \right) } \right) \ge {\theta _l},\forall l,k \end{aligned}$$
(20)
Step 2 MOEA/D is used to optimize the satisfaction of each objective function, and the model is as follows:
$$\begin{aligned} \left\{ \begin{array}{l} \max \left\{ {{s_1}\left( {{Z_1}\left( x \right) } \right) ,{s_1}\left( {{Z_2}\left( x \right) } \right) ,{s_1}\left( {{Z_3}\left( x \right) } \right) } \right\} \\ \mathrm{{s.t.}}\mathrm{{ }}\left\{ \begin{array}{l} {\mu _l}\left( {{Z_k}\left( x \right) } \right) \ge {v_l}\left( {{Z_k}\left( x \right) } \right) \ge 0,\forall l,k\\ {\mu _l}\left( {{Z_k}\left( x \right) } \right) + {v_l}\left( {{Z_k}\left( x \right) } \right) \le 1,\forall l,k\\ x \in X \end{array} \right. \end{array} \right. \end{aligned}$$
(21)
The initial local optimal solution of the model is obtained. Then, the initial satisfaction solution satisfying the preference of model (21) should be selected from the PF optimal solution set of the model.
Step 3 Determine if the formula (20) is valid.
  • If \( {s_1}\left( {{Z_k}\left( {{x^*}} \right) } \right) \ge {\theta _1} \), the initial solution is selected as the global optimal solution, and the flow proceeds to step 8;
  • If \( {s_1}\left( {{Z_k}\left( {{x^*}} \right) } \right) < {\theta _1} \), it is necessary to reduce \( {\theta _1} \) and adjust it according to the specified step, and then the flow goes to Step 4.
Step 4 Further, adjusting the upper level of minimum satisfaction, the equalization factor is defined as follows:
$$\begin{aligned} {\delta _1} = \frac{{{s_1}\left( {{Z_k}\left( x \right) } \right) }}{{{s_1}\left( {{Z_{k + 1}}\left( x \right) } \right) }},\forall k \end{aligned}$$
(22)
In addition, determine the range of equalization factor values \( {\delta _1} \in \left[ {\delta _1^L,\delta _1^U} \right] \), hereinafter referred to as the equalization interval, where \( \delta _1^L = {{\mathop {\min }\nolimits _{k \in \left\{ {1,2,3} \right\} } \left\{ {{s_1}\left( {{Z_k}\left( x \right) } \right) } \right\} } / {{s_1}\left( {{Z_{k + 1}}\left( x \right) } \right) }}\), \(\delta _1^U = {{\mathop {\max }\nolimits _{k \in \left\{ {1,2,3} \right\} } \left\{ {{s_1}\left( {{Z_k}\left( x \right) } \right) } \right\} } / {{s_1}\left( {{Z_{k + 1}}\left( x \right) } \right) }}\). After the upper level of satisfaction is solved, the corresponding equilibrium factor is further judged.
  • If the equalization factor is within the equalization interval, go to Step 8;
  • If the equalization factor exceeds the equalization interval, go to Step 5.
Step 5 Continue to judge.
  • If \( {\delta _1} < \delta _1^L \), the set satisfaction degree is too high, and \( {\theta _1} \) decreases according to the set step path;
  • If \( {\delta _1} > \delta _1^U \), the set prior satisfaction degree is too low, and \( {\theta _1} \) increases according to the set step path.
Loop the above judgment until the following conditions both are satisfied.
$$\begin{aligned}&{s_l}\left( {{Z_k}\left( x \right) } \right) \ge {\theta _l},\forall l,k \end{aligned}$$
(23)
$$\begin{aligned}&{\delta _l} \in \left[ {\delta _l^L,\delta _l^U} \right] ,\forall l \end{aligned}$$
(24)
When both conditions are satisfied, the algorithm is terminated and the flow goes to Step 8; otherwise, the flow goes to Step 6.
Step 6 Continue to judge.
  • If the condition of (23) in the termination condition is not satisfied, the lower level will reduce its satisfaction degree according to the set step path;
  • If both conditions are not met, go to Step3;
  • If that condition of (24) in the termination condition is not satisfied, continue to judge:
    (i)
    If \( {\delta _2} > \delta _2^U \), and \( {\theta _2} \) increases according to the set step path;
     
    (ii)
    If \( {\delta _2} < \delta _2^U \), and \( {\theta _2} \) decreases according to the set step path.
     
The resulting lower level satisfaction is \( {\theta '_2} \).
Step 7 Update the model (21) to get the model shown in the following formula:
$$\begin{aligned} \left\{ \begin{array}{l} \max \left\{ {{s_2}\left( {{Z_1}\left( x \right) } \right) ,{s_2}\left( {{Z_2}\left( x \right) } \right) ,{s_2}\left( {{Z_3}\left( x \right) } \right) } \right\} \\ \mathrm{{s.t.}} \left\{ \begin{array}{l} {\mu _l}\left( {{Z_k}\left( x \right) } \right) \ge {v_l}\left( {{Z_k}\left( x \right) } \right) \ge 0,\forall l,k\\ {\mu _l}\left( {{Z_k}\left( x \right) } \right) + {v_l}\left( {{Z_k}\left( x \right) } \right) \le 1,\forall l,k\\ {s_2}\left( {{Z_{k + 1}}\left( x \right) } \right) \ge {{\theta '}_2}\\ x \in X \end{array} \right. \end{array} \right. \end{aligned}$$
(25)
The MOEA/D is used to solve the multi-objective optimization model (25), and it is found that the locally optimal solution is \( {x^{**}} \) go to Step5.
Step 8 Algorithm terminated.
To express the logical relationship of the above steps more intuitively, we use Fig. 4 to represent the flowchart of the hybrid multi-objective bi-level interactive fuzzy programming method for solving the ECM-DWTA model.

Experiment results and discussion

To evaluate the performance of HMOBIF for ECM-DWTA, four experiments, EX-1, EX-2, EX-3 and EX-4, were carried out. We compare the simulation results of the model parameters and the algorithm in solving the bi-level model. According to the comparison of the simulation results, the optimal values of the model parameters and the comparison results of the algorithm performance are obtained. All compared methods were coded in MATLAB language and executed on an Intel Core i7 2.6-GHz PC with 32 GB of memory. The runtime units were CPU seconds.

Experimental problem set

The settings of the parameters in the ECM-DWTA model in all experiments are shown in Table 2. The maximum number of iterations \( N_{\max } \) is set to 1000 and 2000, which will be discussed in subsequent simulations.
In the process of simulation, we set up four cases of comparative experiments according to the different scales (Ex-1 to Ex-4), which are shown in Table 3.
In actual combat, \( {K_{ij}}\left( t \right) \) is generally determined by the performance of ECM equipment and electronic targets [47]. To facilitate the calculation, this paper randomly expands on the basis of a certain probability, rand() is the function for generating a random number in the range of [0, 1] .
Besides paying attention to the changes of the optimal solution, the objective function value and the membership function value, the jamming value-cost ratio is also compared, and the expression of this metric is
$$\begin{aligned} \mathrm{{ROI}} = \frac{{{Z_2}}}{{{Z_3}}} \end{aligned}$$
(26)
The range of ROI is (0, 1) . Obviously, a larger value means a better interference allocation scheme.

Parametric discussion and model solution

Firstly, we discuss the choice of a membership function type. Under the condition of \( {\beta _1} = {\beta _2} = 1 \), the linear, hyperbolic, parabolic, and the exponential membership function used in this paper are used to solve the model, let each comparison algorithm independently solve the above cases 30 times. Throughout the simulation, we run the MOEA/D-TOPSIS algorithm with \( N_{\max } \) set to 1000 and 2000, respectively. The results are shown in Table 4.
Table 2
Value setting of the parameters in the ECM-DWTA model in all experiments
Parameter
\( {\theta _1} \)
\( {\theta _2} \)
\( {\beta _1} \)
\( {\beta _2} \)
s
\( {K_a} \)
\( {T_\lambda } \)
N
T
w
Value
0.9
0.9
{0,1}
{0,1}
2
0.76
20
500
4
(0.5,0.5)
Table 3
The case scales of the comparative experiments
Ex.
No. 1
No. 2
No. 3
No. 4
I
15
25
50
100
J
12
23
46
97
\( {K_{ij}}\left( t \right) \)
\( {K_{ij}}\left( {t = 1} \right) \)
\( {K_{ij}}\left( {t = 2} \right) \)
\( {K_{ij}}\left( {t = 3} \right) \)
\( {K_{ij}}\left( {t = 4} \right) \)
\( 0.5 + 0.1rand\left( {I,J} \right) \)
\( 0.6 + 0.1rand\left( {I,J} \right) \)
\( 0.7 + 0.1 rand\left( {I,J} \right) \)
\( 0.8 + 0.1 rand\left( {I,J} \right) \)
Table 4
The comparative experiments of the case scales
Example
Criteria
\( N_{\max =1000} \)
\( N_{\max =2000} \)
Linear
Hyperbolic
Parabolic
Exponential
Linear
Hyperbolic
Parabolic
Exponential
EX-1
\( s_1^* \)
0.2867
0.3156
0.3097
0.3812
0.3254
0.4646
0.4587
0.5302
\( s_2^* \)
0.3786
0.3127
0.4656
0.4235
0.5467
0.4617
0.6146
0.5725
ROI
0.6842
0.6234
0.7123
0.7854
0.6732
0.7724
0.8613
0.9344
EX-2
\( s_1^* \)
0.4577
0.6788
0.7144
0.7954
0.5552
0.8278
0.8634
0.9444
\( s_2^* \)
0.4322
0.7832
0.7165
0.8012
0.4699
0.9322
0.8655
0.9502
ROI
0.6905
0.7843
0.7926
0.8252
0.8021
0.9333
0.9416
0.9742
EX-3
\( s_1^* \)
0.4018
0.4398
0.3216
0.4821
0.5971
0.5888
0.4706
0.6311
\( s_2^* \)
0.5865
0.4987
0.6345
0.6062
0.6543
0.6477
0.7035
0.7552
ROI
0.7012
0.6542
0.8743
0.8891
0.7548
0.8032
0.9233
0.9381
EX-4
\( s_1^* \)
0.4321
0.6144
0.6098
0.6664
0.4821
0.7634
0.7588
0.8154
\( s_2^* \)
0.4567
0.6788
0.7112
0.7643
0.4212
0.8278
0.8602
0.9133
ROI
0.8165
0.1987
0.7543
0.8976
0.8991
0.3477
0.9033
0.9466
Average
\( s_1^* \)
0.3948
0.5122
0.4889
0.5813
0.4148
0.6612
0.6379
0.7303
\( s_2^* \)
0.4635
0.5684
0.6322
0.6488
0.5833
0.7174
0.7812
0.7978
ROI
0.7231
0.5652
0.7644
0.8493
0.8032
0.7142
0.9134
0.9983
On the table, the index values under each membership function were the average values after multiple operations, where \( s_1^* \) and \( s_2^* \) are the optimal values of satisfaction degree of each level, i.e., \( s_1^* = \arg \max \left\{ {s_1}\left( {{Z_1}\left( x \right) } \right) ,{s_1}\left( {{Z_2}\left( x \right) } \right) ,\right. \left. {s_1}\left( {{Z_3}\left( x \right) } \right) \right\} \), \( s_2^* = \arg \max \left\{ {s_2}\left( {{Z_1}\left( x \right) } \right) ,{s_2}\left( {{Z_2}\left( x \right) } \right) ,{s_1}\right. \left. \left( {{Z_3}\left( x \right) } \right) \right\} \). We show the optimal value of the metric in bold. Analyzing Table 4, the mean value of \( s_1^* \), \( s_2^* \) and ROI of exponential membership functions are almost larger than the other three membership functions. It is also illustrated that the exponential membership function is suitable in the ECM-DWTA model than the other three membership functions. In addition, as the number of iterations in the algorithm increases from 1000 to 2000, all the indicators under the exponential membership functions are greater than the rest, and their advantages are more obvious. It further illustrates its adaptability..
Next, we set \( N_{\max }=2000 \) and select the exponential membership function to solve the ECM-DWTA problem for four scales, and Fig. 5 shows the solution results for the first two scenarios among them.
The times for successfully solving four ECM-DWTA problems of different sizes are 23.78 s, 59.01 s, 92.26 s and 146.44 s, respectively. In Fig. 5, the grey, blue and orange squares in the figure represent three different types of ECM equipment, respectively. The numbers in the squares represent the serial numbers of enemy electronic targets. It can be seen that the ECM-DWTA problem can be successfully solved using the algorithm proposed in this paper combined with the exponential membership function.
Then, we make a comparative experiment on the fuzzy satisfaction coefficient \( {\beta _l}\left( {l = 1,2} \right) \) in the algorithm. Let us assume that \( {\beta _1} \) and \( {\beta _2} \) choose a value between 0 and 1. We will exhaust all possible values for \( {\beta _l}\left( {l = 1,2} \right) \). When \( {\beta _1} = {\beta _2} = 1 \), the upper and lower decision-makers consider both acceptance and rejection. To make the simulation experiments general and comprehensive, we experimented with the value of \( {\beta _l} \) for all cases and separately for the number of algorithm iterations of 1000 and 2000, respectively. When \( {\beta _1} = {\beta _2} = 0 \), it indicates that the upper and lower decision-makers adopt an accepting attitude. When \( {\beta _1} = 1,{\beta _2} = 0 \), the upper decision-makers take the attitude of considering both acceptance and rejection, while the lower decision-makers take the attitude of acceptance. When \( {\beta _1} = 0,{\beta _2} = 1 \), it indicates the attitude of upper decision-makers to accept, while lower decision-makers consider both acceptance and rejection. The experimental results are shown in Table 5. We show the optimal value of the metric in bold.
Table 5
The comparative experiments of the fuzzy satisfaction coefficient \( {\beta _l} \)
Example
Criteria
\( N_{\max }=1000 \)
\( N_{max}=2000 \)
\( {\beta _{1,2}} = 1,1 \)
\( {\beta _{1,2}} = 1,0 \)
\( {\beta _{1,2}} =0, 1 \)
\( {\beta _{1,2}} = 0,0 \)
\( {\beta _{1,2}} = 1,1 \)
\( {\beta _{1,2}} = 1,0 \)
\( {\beta _{1,2}} =0, 1 \)
\( {\beta _{1,2}} = 0,0 \)
EX-1
\( s_1^* \)
0.5287
0.4591
0.3321
0.3442
0.6187
0.6491
0.4121
0.4242
\( s_2^* \)
0.4776
0.4427
0.3926
0.3336
0.5676
0.6327
0.4726
0.4136
ROI
0.7842
0.6889
0.7093
0.6855
0.8742
0.8789
0.7893
0.7655
EX-2
\( s_1^* \)
0.6677
0.7982
0.7165
0.6932
0.7577
0.9882
0.7965
0.7732
\( s_2^* \)
0.8302
0.7832
0.6865
0.8032
0.9202
0.9732
0.7665
0.8832
ROI
0.7947
0.8846
0.7921
0.6262
0.8847
0.9746
0.8721
0.7062
EX-3
\( s_1^* \)
0.4022
0.5368
0.4266
0.4878
0.4922
0.7268
0.5066
0.5678
\( s_2^* \)
0.4861
0.4987
0.3344
0.5069
0.5761
0.6887
0.4144
0.5869
ROI
0.7033
0.7541
0.6743
0.6899
0.7933
0.9441
0.7543
0.7699
EX-4
\( s_1^* \)
0.5663
0.5952
0.6696
0.6612
0.6563
0.7852
0.7496
0.7412
\( s_2^* \)
0.4568
0.6189
0.8112
0.7061
0.5468
0.8089
0.8912
0.7861
ROI
0.8121
0.7927
0.8596
0.8041
0.9021
0.9304
0.9827
0.8841
Average
\( s_1^* \)
0.5412
0.5973
0.5362
0.5466
0.6312
0.7873
0.6162
0.6266
\( s_2^* \)
0.5627
0.5859
0.5562
0.5875
0.6527
0.7759
0.6362
0.6675
ROI
0.7736
0.7801
0.7588
0.7014
0.8636
0.8388
0.9701
0.7814
From the comparison of the above four experimental results, it can be seen that when \( {\beta _1} = 0,{\beta _2} = 0 \), the model has the worst solution result. This is because only adopting the attitude of complete acceptance in the bi-level model can reduce the number of iterations of the model satisfaction degree, resulting in the optimal solution not being found. In addition, when the \( N_{\max }=1000 \), the values of \( {\beta _1} \) and \( {\beta _2} \) change from \( {\beta _1} ,{\beta _2} = \{1, 1\} \), \( {\beta _1},{\beta _2} = \{1, 0\} \) to \( {\beta _1},{\beta _2} = \{0, 1\} \), the larger the scale of the simulation experiment, the better the solution. This is because, in the case of a small scale, the bi-level decision-makers consider both acceptance and rejection factors at the same time, which is more conducive to the determination of satisfaction. However, when the scale example expand, excessive consideration of rejection factors will affect the solution efficiency of the model to a certain extent in the upper level model (single optimization objective). When \( {\beta _1} = 1,{\beta _2} = 0 \), that is, the upper decision-makers take the attitude of considering both acceptance and rejection, which can make the model obtain faster efficiency in the upper single-objective model and obtain enough satisfaction iteration in the lower double-objective model. Therefore, in large-scale problem solving, the result is the best in this case. In addition, when the number of iterations of the algorithm is increased to \( N_{\max }=2000 \), the optimal value is obtained in all cases except for the EX-4 metric which does not obtain all the optimal values under the condition of \( {\beta _1} = 1,{\beta _2} = 0 \). Therefore, this parameter value is used in the discussion of the algorithm performance in the subsequent sections.

Comparison and simulation of bi-level programming model algorithms

In the research of all DWTA problems, the setting of different models will greatly affect the choice of solving algorithms. At present, there is no research on constructing the DWTA model by bi-level programming. Therefore, in this paper, when choosing the comparison algorithm for model solving, several representative algorithms for solving multi-level programming are selected for simulation experiments, i.e., Kth-Best algorithm [30], MPECs algorithm [32], trust-region algorithm [34], fuzzy interactive algorithm [36]. The first four algorithms have no parameter setting, while the parameter setting of the fifth algorithm is the same as that of the fuzzy membership function in this paper.
Further, in the HMOBIF, we use the MOEA/D-TOPSIS algorithm to solve the multi-objective planning model for each level and find the optimal value in each PF. The MOEA we use in searching the PFs is MOEA/D. To illustrate the applicability of this algorithm to the ECM-DWTA problem, we will incorporate the current classical high-performance MOEAs (i.e., NSGA-II [20], RVEA [48], MOIBA/AD [49]) into the algorithmic framework shown in Fig. 4, conduct comparative experiments, and discuss the reasonableness and efficiency of the algorithm.
Table 6
Statistics of the computational time (CT) and the ROI metrics
Ex.
Metric
Comparison algorithms
Kth-Best
MPECs
Trust region
Fuzzy interactive
HMOBIF
EX-1
CT
\( 3.06 \pm 0.01 \)
\( 2.45\pm 0.03 \)
\( 1.94 \pm 0.05 \)
\( 1.45 \pm 0.02 \)
\(\varvec{ 1.01\pm 0 }\)
ROI
\( 0.9251 \pm 0 \)
\( 0.9295 \pm 0.0017 \)
\(\varvec{ 0.9301 \pm 0.0014 }\)
\( 0.9213 \pm 0.0020 \)
\( 0.9013 \pm 0 \)
EX-2
CT
\( 16.96 \pm 1.97 \)
\( 12.11 \pm 2.78 \)
\( 15.14 \pm 1.42 \)
\( 13.37 \pm 0.21 \)
\(\varvec{ 10.27 \pm 0.11 }\)
ROI
\( 0.8284 \pm 0.0015 \)
\( 0.8364 \pm 0.0019 \)
\( 0.8352 \pm 0.0020 \)
\( 0.8150 \pm 0.0020 \)
\(\varvec{ 0.8370 \pm 0 }\)
EX-3
CT
\( 43.22 \pm 7.01 \)
\( 42.31 \pm 5.78 \)
\( 39.14 \pm 4.89 \)
\( 38.37 \pm 3.14 \)
\(\varvec{ 33.07 \pm 1.34 }\)
ROI
\( 0.8906 \pm 0.0031 \)
\( 0.9090 \pm 0 \)
\( 0.8915 \pm 0 \)
\( 0.8972 \pm 0.0038 \)
\(\varvec{ 0.9107 \pm 0.0030 }\)
EX-4
CT
\( 63.06 \pm 9.77 \)
\( 62.77 \pm 10.11 \)
\( 55.25 \pm 8.01 \)
\( 56.32 \pm 3.49 \)
\(\varvec{ 51.25 \pm 2.89 }\)
ROI
\( 0.7553 \pm 0.0045 \)
\( 0.7710 \pm 0.0041 \)
\( 0.7652 \pm 0.0039 \)
\( 0.7619 \pm 0 \)
\(\varvec{ 0.7866 \pm 0 }\)
The optimal values of the metric are in bold
Five comparison algorithms are used to solve the ECM-DWTA problem in four combat examples, running independently 40 times. Table 6 shows the statistics of the computational time (CT) and the ROI metrics. Figure 6 shows the statistical distribution of the computational time and the ROI metrics of the 5 algorithms boxplot, respectively.
Based on the comprehensive analysis of Table 6, Fig. 6, except that the performance of the algorithm proposed in this paper in solving ROI index in EX-1 case is slightly lower than that of the four comparison algorithms, the performance indexes of CT and ROI in the other three scenarios are the best among the five algorithms for solving bi-level programming. In addition, the Kth Best algorithm and the MPECs algorithm adopt linear solution strategy in solving multi-level programming problem, which leads to great shortcomings in calculating the running time of the model. Trust-region algorithm and fuzzy interactive algorithm do not comprehensively consider the subjective judgment factors of two-tier decision-makers, which leads to the ROI value not reaching the optimal result. From the boxplot of the comparative experiment, it can be seen that the algorithm proposed in this paper has better stability when solving the model in different scale examples, and has greater convergence advantage than the comparative algorithms (Fig. 7).
The following comparative experimental analysis is conducted from the perspective of the combat effectiveness of the weapon allocation scheme for the ECM-DWTA problem. We compared the solution results of different algorithms in terms of the ROI metric of the four combat stages, the number of unassigned ECM weapons, and the number of unjammed electronic targets. The results are shown in Fig. 8.
In Fig. 8, the results of the three metrics of all algorithms in solving the ECM-DWTA model of the four combat cases show a declining trend. This is because, with the advance of the combat stage, ECM weapons are constantly joining in the combat, and the number of enemy electronic targets interfered with will be more and more, the number of non-interfered will be less and less, and the number of ECM weapons allocated to the target will also be less and less. Moreover, the interference of our army’s ECM weapons on enemy electronic targets exists in the decision-making and judgment of target allocation changes in the process of operational stage transition, resulting in smaller and smaller operational efficiency-cost ratio. To reflect the changing trend of ROI, unassigned ECM weapon and unjammed electronic target metrics well, the changes of each metric in different combat stages are displayed using the superpositive illustration of line and column charts. As can be seen from Fig. 8, the algorithm proposed in this paper has the best ROI metrics value in every combat example and stage during the solving process. Compared with the comparison algorithm of the first and second combat stages, the number of unassigned ECM weapons and the number of undisturbed electronic targets decrease more, which provides a better decision-making space and resource space for the flexible selection of electronic targets in the later combat stage. In summary, HMOBIF has better performance for solving the ECM-DWTA model than the other four comparison algorithms.
In the following, we will discuss the rationality of the multi-objective evolutionary optimization algorithm MOEA/D chosen for the model solving process. To better illustrate the performance of the algorithm, we solve the model (21) using several comparative MOEAs, present the results, and statistic the results of the parameters reflecting the performance of the algorithm to comprehensively analyze the suitability of the chosen MOEA/D.
In the selection of parameters, we choose the two, Inverted generational distance (IGD) and Hypervolume (HV) [50], which can reflect the quality of the solution set of the MOEAs, and the time taken to run the solution model (21), where IGD and HV can reflect the distributivity of PF, and the smaller value of the former indicates the better performance of the algorithm, and the larger value of the latter indicates the better performance of the algorithm. Table 7 and Fig. 8 show the performance parameter solution statistics and the solution set frontier in solving model (21) for the four compared algorithms with 1000 and 2000 iterations, respectively.
Table 7
Statistical results of IGD, HV and running time metrics for the comparison algorithm in solving model (21)
Example
Parameter
\( N_{\max }=1000 \)
NSGA-II
RVEA
MOIBA/AD
MOEA/D
EX-1
IGD
8.7269e+1 (8.8e+1)+
1.8939e+2 (1.26e+2)
2.4840e+3 (0.0e+0)\(-\)
1.7621e+2 (1.05e+2)\(-\)
HV
4.2538e\(-\)1 (7.49e\(-\)3)+
4.0656e\(-\)1 (1.62e\(-\)2)
4.2496e\(-\)1 (1.10e\(-\)2) =
4.2561e \(-\)1 (9.48e \(-\)3)+
Run time
5.8713e \(-\)2 (1.24e \(-\)1)+
1.0299e\(-\)1 (2.92e\(-\)1)
3.1431e\(-\)1 (4.92e\(-\)1)+
2.5172e\(-\)1 (5.63e\(-\)2)\(-\)
EX-2
IGD
1.0415e+1 (2.90e\(-\)1)+
1.0286e+1 (2.77e \(-\)1)
1.0512e+1 (3.79e\(-\)1)+
1.0492e+1 (3.19e\(-\)1)+
HV
6.4044e\(-\)1 (5.00e\(-\)3)+
9.0909e\(-\)2 (7.06e\(-\)17)
6.4808e\(-\)1 (4.33e\(-\)3)+
6.5157e \(-\)1 (2.41e \(-\)3)+
Run time
3.2049e\(-\)1 (1.31e\(-\)2)+
1.4882e\(-\)1 (4.04e\(-\)2)
2.7132e\(-\)1 (7.88e\(-\)3)+
1.3814e \(-\)1 (1.10e \(-\)2)+
EX-3
IGD
1.2458e+2 (2.92e\(-\)14)=
1.2458e+2 (2.92e\(-\)14)
1.2458e+2 (2.92e\(-\)14)=
1.26e+2 (1.46e \(-\)9)=
HV
7.0960e\(-\)1 (2.06e\(-\)2)+
7.0389e\(-\)1 (1.37e\(-\)2)
7.0975e\(-\)1 (1.49e\(-\)2)=
7.1846e \(-\)1 (1.42e \(-\)2)=
Run time
2.4610e+0 (2.04e\(-\)2)\(-\)
4.7554e\(-\)1 (3.38e\(-\)2)
1.7782e+0 (2.15e\(-\)2)+
2.6364e \(-\)1 (6.47e \(-\)3)+
EX-4
IGD
1.0001e+5 (1.50e\(-\)11)=
1.0001e+5 (1.50e\(-\)11)
1.0000e+5 (1.50e\(-\)11)=
1.078e+5 (1.5e \(-\)11)=
HV
2.6900e\(-\)1 (0.00e+0)=
2.6900e\(-\)1 (0.00e+0)
2.2100e\(-\)1 (0.00e+0)=
2.690e \(-\)1 (0.0e+0)=
Run time
3.2914e+0 (3.64e\(-\)2)+
1.0041e+0 (1.40e\(-\)2)
2.5023e+0 (2.97e\(-\)2)+
9.9466e \(-\)1 (2.52e \(-\)2)+
+/-/=
8/1/3
 
6/1/5
6/2/4
Example
Parameter
\( N_{\max }=2000 \)
NSGA-II
RVEA
MOIBA/AD
MOEA/D
EX-1
IGD
7.8537e+1 (8.10e+1)\(-\)
1.8662e+2 (1.32e+2)
2.4840e+3 (0.0e+0)+
1.5370e+2 (1.06e+2)\(-\)
HV
6.5157e \(-\)1 (2.41e \(-\)3)+
6.4044e\(-\)1 (5.00e\(-\)3)
9.0909e\(-\)2 (7.06e\(-\)17)\(-\)
6.4808e\(-\)1 (4.33e\(-\)3)\(-\)
Run time
4.7431e \(-\)2 (9.86e \(-\)2)+
7.7567e\(-\)2 (2.32e\(-\)1)
2.7173e\(-\)1 (3.92e\(-\)1)\(-\)
2.4739e\(-\)1 (4.48e\(-\)2)\(-\)
EX-2
IGD
1.0441e+1 (2.66e\(-\)1)+
1.0250e+1 (2.76e \(-\)1)
1.0457e+1 (4.43e\(-\)1)\(-\)
1.0468e+1 (3.41e\(-\)1)\(-\)
HV
6.4690e\(-\)1 (4.21e\(-\)3)+
6.3959e\(-\)1 (4.77e\(-\)3)
9.0909e\(-\)2 (4.28e\(-\)17)\(-\)
6.5135e \(-\)1 (2.49e \(-\)3)+
Run time
3.2026e\(-\)1 (1.06e\(-\)2)\(-\)
1.4754e\(-\)1 (3.40e\(-\)2)
2.6929e\(-\)1 (7.33e\(-\)3)\(-\)
1.3701e \(-\)1 (9.06e \(-\)3)+
EX-3
IGD
1.2458e+2 (4.34e\(-\)14)=
1.2458e+2 (4.34e\(-\)14)
1.2458e+2 (4.34e\(-\)14)=
2.717e \(-\)1 (3.92e \(-\)13)\(-\)
HV
7.0798e\(-\)1 (1.84e\(-\)2)+
7.0294e\(-\)1 (1.46e\(-\)2)
7.0781e\(-\)1 (1.41e\(-\)2)+
7.1912e \(-\)1 (1.35e \(-\)2)+
Run time
1.5204e+0 (1.17e+0)\(-\)
3.1008e\(-\)1 (2.22e\(-\)1)
1.0995e+0 (8.46e\(-\)1)\(-\)
1.7297e \(-\)1 (1.21e \(-\)1)+
EX-4
IGD
1.0780e+5 (5.92e\(-\)11)=
1.0780e+5 (5.92e\(-\)11)
1.0780e+5 (5.92e\(-\)11)=
1.078e+5 (5.9e \(-\)11)=
HV
7.8454e\(-\)1 (5.65e\(-\)16)=
7.8454e\(-\)1 (5.65e\(-\)16)
7.8454e\(-\)1 (5.65e\(-\)16)=
7.845e \(-\)1 (5.7e \(-\)16)=
Run time
2.0325e+0 (1.57e+0)\(-\)
6.2150e\(-\)1 (4.77e\(-\)1)
1.5463e+0 (1.19e+0)\(-\)
6.1596e \(-\)1 (4.72e \(-\)1)+
+/-/=
5/4/3
 
2/7/3
5/5/2
Table 7 shows the results for each parameter at the number of iterations of 1000 and 2000, respectively, and the optimal values of each parameter are marked in the table using bolded fonts. The contents of the table in parentheses indicate the standard deviation of the parameter results, and the last row indicates: the statistical number of results for each comparison algorithm with better than (+), worse than (−) and equal to (=) performance, using RVEA as the benchmark. As can be seen, among the results of the four comparison algorithms solving model (21) in the HMOBIF framework, MOEA/D obtains the majority of the optimal parameter solutions, and the algorithm performance advantage is not obvious enough in Ex-1, but the optimal metric results are obtained in Ex-3 and Ex-4 with the expansion of the example size. On the other hand, MOEA/D also obtains better results in the final statistical results, indicating that this algorithm obtains a better distribution of solution sets (PF) when solving the model. Similarly, Fig. 8 shows the distribution of the final solution set frontier obtained by each comparison algorithm in solving model (21). It can be seen that the solution set obtained by MOEA/D is better distributed for different number of iterations of the algorithm, and the better values of the objective function based on the PF obtained can be taken than the rest of the MOEAs. In summary, the MOEA/D algorithm can achieve the solution of the multi-objective model in the HMOBIF algorithm well, and has a strong applicability.

Conclusions and future works

In this paper, the traditional DWTA problem is reasonably extended and the ECM-DWTA problem model is established according to the combat characteristics and combat background of ECMs in modern warfare. The bi-level programming is used to describe the problem in this model, and the interaction between the bi-levels simulates the OODA loop of operational command decision, which makes the dynamic assignment of ECM weapons closer to the actual combat situation. We proposed the HMOBIF, considering both the acceptance and rejection degree of the decision-maker, and effectively solve the ECM-DWTA model. Simulation experiments were carried out in two aspects. The first is the comparison and simulation of the membership function type selection and the satisfaction coefficient. The other is the comparison and simulation of several common algorithms for solving multi-level programming and the algorithms proposed in this paper. The simulation results show that:
(i)
The exponential membership function selected in this paper is more suitable for the construction of the ECM-DWTA model.
 
(ii)
The parameters \( {\beta _1} = 1,{\beta _2} = 1 \) are more suitable for solving small-scale problems, while parameters \( {\beta _1} = 0,{\beta _2} = 1 \) are more suitable for solving large-scale problems.
 
(iii)
Compared with the four algorithms for multi-level programming, the algorithm proposed in this paper is more suitable for the ECM-DWTA model, has better results and better stability.
 
In the future work, we have the following 3 different research directions. First, the ECM-DWTA model proposed in our paper still has a gap with the actual combat scenario, it is necessary to further expand the model more consistent with the operational reality. Secondly, we will apply the HMOBIF to solve multi-level programming problems in other fields, and further study the algorithm for solving multi-level programming problems to the better performance and stability. Finally, we will further explore the application and solution methods of machine learning algorithms in ECM-DWTA problems, and compare the current very popular machine learning methods for solving combinatorial optimization problems with classical optimization methods to obtain faster and better solution algorithms to meet the needs of modern operations.

Acknowledgements

This paper was supported in part by the National Natural Science Foundation of China under Grant no. 72101266, the Military Postgraduate Funding Project under Grant no. JY2019C055, and the Hunan Province Postgraduate Scientific Research Innovation Project under Grant no. CX20200029.

Declarations

Conflict of interest

The authors declare that they have no conflict of interest.
This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://​creativecommons.​org/​licenses/​by/​4.​0/​.​

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Literature
1.
go back to reference Hocaolu MF (2019) Weapon target assignment optimization for land based multi-air defense systems: a goal programming approach. Comput Ind Eng 128:681–689CrossRef Hocaolu MF (2019) Weapon target assignment optimization for land based multi-air defense systems: a goal programming approach. Comput Ind Eng 128:681–689CrossRef
2.
go back to reference Lai CM, Wu TH (2019) Simplified swarm optimization with initialization scheme for dynamic weapon target assignment problem. Appl Soft Comput 82:105542CrossRef Lai CM, Wu TH (2019) Simplified swarm optimization with initialization scheme for dynamic weapon target assignment problem. Appl Soft Comput 82:105542CrossRef
3.
go back to reference Lu X, Di H, Jia Z, Zhang X (2019) Optimal weapon target assignment based on improved QPSO algorithm. In: 2019 international conference on information technology and computer application (ITCA). pp 217–220 Lu X, Di H, Jia Z, Zhang X (2019) Optimal weapon target assignment based on improved QPSO algorithm. In: 2019 international conference on information technology and computer application (ITCA). pp 217–220
4.
go back to reference Zhao Y, Chen Y, Zhen Z, Jiang J (2020) Multi-weapon multi-target assignment based on hybrid genetic algorithm in uncertain environment. Int J Adv Robot Syst 17(2):1729881420905922CrossRef Zhao Y, Chen Y, Zhen Z, Jiang J (2020) Multi-weapon multi-target assignment based on hybrid genetic algorithm in uncertain environment. Int J Adv Robot Syst 17(2):1729881420905922CrossRef
5.
go back to reference Chen Z, Liang Z, Dong X, Li Q, Ren Z (2019) Adaptive weapon-target assignment for multi-target interception. In: 2019 Chinese control conference (CCC). pp 4218–4223 Chen Z, Liang Z, Dong X, Li Q, Ren Z (2019) Adaptive weapon-target assignment for multi-target interception. In: 2019 Chinese control conference (CCC). pp 4218–4223
6.
go back to reference Xu W, Chen C, Ding S, Pardalos PM (2020) A bi-objective dynamic collaborative task assignment under uncertainty using modified MOEA/D with heuristic initialization. Expert Syst Appl 140:112844CrossRef Xu W, Chen C, Ding S, Pardalos PM (2020) A bi-objective dynamic collaborative task assignment under uncertainty using modified MOEA/D with heuristic initialization. Expert Syst Appl 140:112844CrossRef
7.
go back to reference Wang YP, Xin B, Chen J (2019) Modeling and optimization of multi-stage sensor-weapon-target assignment. Control Theory Appl 36(11):1886–1895 Wang YP, Xin B, Chen J (2019) Modeling and optimization of multi-stage sensor-weapon-target assignment. Control Theory Appl 36(11):1886–1895
8.
go back to reference Li X, Zhou D, Yang Z, Pan Q, Huang J (2019) A novel genetic algorithm for the synthetical sensor-weapon-target assignment problem. Appl Sci 9(18):3803CrossRef Li X, Zhou D, Yang Z, Pan Q, Huang J (2019) A novel genetic algorithm for the synthetical sensor-weapon-target assignment problem. Appl Sci 9(18):3803CrossRef
9.
go back to reference Jia ZR, Lu FX, Wang HY (2020) Multi-stage attack weapon target allocation method based on defense area analysis. J Syst Eng Electron 31(3):539–550CrossRef Jia ZR, Lu FX, Wang HY (2020) Multi-stage attack weapon target allocation method based on defense area analysis. J Syst Eng Electron 31(3):539–550CrossRef
10.
go back to reference Zhang XJ (2019) Land defense weapon versus target assignment against air attack. J Natl Univ Defense Technol 41(2):185–190 Zhang XJ (2019) Land defense weapon versus target assignment against air attack. J Natl Univ Defense Technol 41(2):185–190
11.
go back to reference Ma F, Cao ZY, Liu H (2010) Construction and search of strategy space of target assignment based on game theory. Syst Eng Electron 32(9):1941–1945 Ma F, Cao ZY, Liu H (2010) Construction and search of strategy space of target assignment based on game theory. Syst Eng Electron 32(9):1941–1945
12.
go back to reference Zhang Y, Jiang QS, Chen GS (2012) An approach of basing-on fuzzy-grey noncooperative Nash games to multi-team dynamic weapon-target assignment. J Yunnan Univ (Natural Science) 38:26–32 Zhang Y, Jiang QS, Chen GS (2012) An approach of basing-on fuzzy-grey noncooperative Nash games to multi-team dynamic weapon-target assignment. J Yunnan Univ (Natural Science) 38:26–32
13.
go back to reference Uhm HS, Lee YH (2019) An approach of basing-on fuzzy-grey noncooperative Nash games to multi-team dynamic weapon-target assignment. Mil Oper Res 24(4):53–62 Uhm HS, Lee YH (2019) An approach of basing-on fuzzy-grey noncooperative Nash games to multi-team dynamic weapon-target assignment. Mil Oper Res 24(4):53–62
14.
go back to reference Shin MK, Lee D, Choi HL (2019) Weapon-target assignment problem with interference constraints using mixed-integer linear programming. arXiv preprint arXiv:1911:12567 Shin MK, Lee D, Choi HL (2019) Weapon-target assignment problem with interference constraints using mixed-integer linear programming. arXiv preprint arXiv:​1911:​12567
15.
go back to reference Sonu E (2019) A modified crow search algorithm for the weapon-target assignment problem. Int J Optim Control Theor Appl (IJOCTA) 10(2):188–197MathSciNetCrossRef Sonu E (2019) A modified crow search algorithm for the weapon-target assignment problem. Int J Optim Control Theor Appl (IJOCTA) 10(2):188–197MathSciNetCrossRef
16.
go back to reference Jiang H, Li S, Lin C, Wang C, Zhong K, He G, Zhang QZ, Zhao YH, Liu J (2019) Research on distributed target assignment based on dynamic allocation auction algorithm. J Phys Conf Ser 1419(1):012001CrossRef Jiang H, Li S, Lin C, Wang C, Zhong K, He G, Zhang QZ, Zhao YH, Liu J (2019) Research on distributed target assignment based on dynamic allocation auction algorithm. J Phys Conf Ser 1419(1):012001CrossRef
17.
go back to reference Zhang K, Zhou D, Yang Z, Li X, Zhao Y, Kong W (2020) A dynamic weapon target assignment based on receding horizon strategy by heuristic algorithm. J Phys Conf Ser 1651(1):012062CrossRef Zhang K, Zhou D, Yang Z, Li X, Zhao Y, Kong W (2020) A dynamic weapon target assignment based on receding horizon strategy by heuristic algorithm. J Phys Conf Ser 1651(1):012062CrossRef
18.
go back to reference Zhang K, Zhou D, Yang Z, Zhao Y, Kong W (2019) Efficient decision approaches for asset-based dynamic weapon target assignment by a receding horizon and marginal return heuristic. Electronics 9(9):1511CrossRef Zhang K, Zhou D, Yang Z, Zhao Y, Kong W (2019) Efficient decision approaches for asset-based dynamic weapon target assignment by a receding horizon and marginal return heuristic. Electronics 9(9):1511CrossRef
19.
go back to reference Li J, Chen J, Xin B, Dou L, Peng Z (2016) Solving the uncertain multi-objective multi-stage weapon target assignment problem via MOEA/D-AWA. In: Proceedings of the 2016 IEEE congress on evolutionary computation (CEC). pp 4934–4941 Li J, Chen J, Xin B, Dou L, Peng Z (2016) Solving the uncertain multi-objective multi-stage weapon target assignment problem via MOEA/D-AWA. In: Proceedings of the 2016 IEEE congress on evolutionary computation (CEC). pp 4934–4941
20.
go back to reference Li J, Chen J, Xin B, Dou L (2015) Solving multi-objective multi-stage weapon target assignment problem via adaptive NSGA-II and adaptive MOEA/D: a comparison study. In Proceedings of the 2015 IEEE congress on evolutionary computation (CEC). pp 3132–3139 Li J, Chen J, Xin B, Dou L (2015) Solving multi-objective multi-stage weapon target assignment problem via adaptive NSGA-II and adaptive MOEA/D: a comparison study. In Proceedings of the 2015 IEEE congress on evolutionary computation (CEC). pp 3132–3139
21.
go back to reference Zou S, Shi X, Guo R, Lin X (2020) Solving multi-stage weapon target assignment problems by C-TAEA. In 2020 39th Chinese control conference (CCC). pp 1593–1598 Zou S, Shi X, Guo R, Lin X (2020) Solving multi-stage weapon target assignment problems by C-TAEA. In 2020 39th Chinese control conference (CCC). pp 1593–1598
22.
go back to reference Qu G, Brown D, Li N (2019) Distributed greedy algorithm for multi-agent task assignment problem with submodular utility functions. Automatica 105:206–215MathSciNetMATHCrossRef Qu G, Brown D, Li N (2019) Distributed greedy algorithm for multi-agent task assignment problem with submodular utility functions. Automatica 105:206–215MathSciNetMATHCrossRef
23.
go back to reference Shojaeifard A, Amroudi AN, Mansoori A, Erfanian M (2019) Projection recurrent neural network model: a new strategy to solve weapon-target assignment problem. Neural Process Lett 50(3):3045–3057CrossRef Shojaeifard A, Amroudi AN, Mansoori A, Erfanian M (2019) Projection recurrent neural network model: a new strategy to solve weapon-target assignment problem. Neural Process Lett 50(3):3045–3057CrossRef
24.
go back to reference Jang J, Yoon HG, Kim JC, Kim CO (2019) Adaptive weapon-to-target assignment model based on the real-time prediction of hit probability. IEEE Access 7:72210–72220CrossRef Jang J, Yoon HG, Kim JC, Kim CO (2019) Adaptive weapon-to-target assignment model based on the real-time prediction of hit probability. IEEE Access 7:72210–72220CrossRef
25.
go back to reference Hu B, Hou L (2014) Research and simulation of communication jamming task assignment optimization based on bi-level stochastic chance-constraint programming. Fire Control Command Control 11:59–63 Hu B, Hou L (2014) Research and simulation of communication jamming task assignment optimization based on bi-level stochastic chance-constraint programming. Fire Control Command Control 11:59–63
26.
go back to reference Xiang CW, Jiang QS, Qu Z (2017) Modeling and algorithm of dynamic resource assignment for ESJ electronic warfare aircraft. Command Control Simul 39(2):85–89 Xiang CW, Jiang QS, Qu Z (2017) Modeling and algorithm of dynamic resource assignment for ESJ electronic warfare aircraft. Command Control Simul 39(2):85–89
27.
go back to reference Castillo O (2018) Towards finding the optimal n in designing Type-n Fuzzy systems for particular classes of problems: a review. Appl Comput Math 17(1):3–9MathSciNetMATH Castillo O (2018) Towards finding the optimal n in designing Type-n Fuzzy systems for particular classes of problems: a review. Appl Comput Math 17(1):3–9MathSciNetMATH
28.
go back to reference Lloyd SP, Witsenhausen HS (1986) Weapons allocation is NP-complete. In: Proceedings of the 1986 summer computer simulation conference. pp 1054–1058 Lloyd SP, Witsenhausen HS (1986) Weapons allocation is NP-complete. In: Proceedings of the 1986 summer computer simulation conference. pp 1054–1058
29.
go back to reference Nicholls MG (1997) Developing an integrated model of an aluminium smelter incorporating sub-models with different time bases and levels of aggregation. Eur J Oper Res 99(2):477–490MATHCrossRef Nicholls MG (1997) Developing an integrated model of an aluminium smelter incorporating sub-models with different time bases and levels of aggregation. Eur J Oper Res 99(2):477–490MATHCrossRef
31.
go back to reference Al-Khayyal FA, Horst R, Pardalos PM (1992) Global optimization of concave functions subject to quadratic constraints: an application in nonlinear bilevel programming. Ann Oper Res 34(1):125–147MathSciNetMATHCrossRef Al-Khayyal FA, Horst R, Pardalos PM (1992) Global optimization of concave functions subject to quadratic constraints: an application in nonlinear bilevel programming. Ann Oper Res 34(1):125–147MathSciNetMATHCrossRef
33.
go back to reference Savard G, Gauvin J (1994) The steepest descent direction for the nonlinear bilevel programming problem. Oper Res Lett 15(5):265–272MathSciNetMATHCrossRef Savard G, Gauvin J (1994) The steepest descent direction for the nonlinear bilevel programming problem. Oper Res Lett 15(5):265–272MathSciNetMATHCrossRef
34.
go back to reference Colson B, Marcotte P, Savard G (2005) A trust-region method for nonlinear bilevel programming: algorithm and computational experience. Comput Optim Appl 30(3):211–227MathSciNetMATHCrossRef Colson B, Marcotte P, Savard G (2005) A trust-region method for nonlinear bilevel programming: algorithm and computational experience. Comput Optim Appl 30(3):211–227MathSciNetMATHCrossRef
35.
go back to reference Sinha A, Malo P, Deb K (2017) A review on bilevel optimization: from classical to evolutionary approaches and applications. IEEE Trans Evol Comput 22(2):276–295 Sinha A, Malo P, Deb K (2017) A review on bilevel optimization: from classical to evolutionary approaches and applications. IEEE Trans Evol Comput 22(2):276–295
36.
go back to reference Zheng Y, Liu J, Wan Z (2014) Interactive fuzzy decision making method for solving bilevel programming problem. Appl Math Model 38(13):3136–3141MathSciNetMATHCrossRef Zheng Y, Liu J, Wan Z (2014) Interactive fuzzy decision making method for solving bilevel programming problem. Appl Math Model 38(13):3136–3141MathSciNetMATHCrossRef
37.
go back to reference Maiti SK, Roy SK (2021) Bi-level programming for Stackelberg game with intuitionistic fuzzy number: a ranking approach. J Oper Res Soc China 9:131–149MathSciNetMATHCrossRef Maiti SK, Roy SK (2021) Bi-level programming for Stackelberg game with intuitionistic fuzzy number: a ranking approach. J Oper Res Soc China 9:131–149MathSciNetMATHCrossRef
38.
go back to reference Jin Y (2000) Fuzzy modeling of high-dimensional systems: complexity reduction and interpretability improvement. IEEE Trans Fuzzy Syst 8(2):212–221CrossRef Jin Y (2000) Fuzzy modeling of high-dimensional systems: complexity reduction and interpretability improvement. IEEE Trans Fuzzy Syst 8(2):212–221CrossRef
39.
go back to reference Castillo O, Melin P, Kacprzyk J, Pedrycz W (2007) Type-2 fuzzy logic: theory and applications. In: 2007 IEEE international conference on granular computing (GRC 2007). pp 145–145 Castillo O, Melin P, Kacprzyk J, Pedrycz W (2007) Type-2 fuzzy logic: theory and applications. In: 2007 IEEE international conference on granular computing (GRC 2007). pp 145–145
40.
go back to reference Rodríguez L, Castillo O, Soria J et al (2017) A fuzzy hierarchical operator in the grey wolf optimizer algorithm. Appl Soft Comput 57:315–328CrossRef Rodríguez L, Castillo O, Soria J et al (2017) A fuzzy hierarchical operator in the grey wolf optimizer algorithm. Appl Soft Comput 57:315–328CrossRef
41.
go back to reference Soto J, Melin P, Castillo O (2018) A new approach for time series prediction using ensembles of IT2FNN models with optimization of fuzzy integrators. Int J Fuzzy Syst 20(3):701–728MathSciNetCrossRef Soto J, Melin P, Castillo O (2018) A new approach for time series prediction using ensembles of IT2FNN models with optimization of fuzzy integrators. Int J Fuzzy Syst 20(3):701–728MathSciNetCrossRef
42.
go back to reference Bernal E, Lagunes ML, Castillo O, Soria J, Valdez F (2021) Optimization of type-2 fuzzy logic controller design using the GSO and FA algorithms. Int J Fuzzy Syst 23(1):42–57CrossRef Bernal E, Lagunes ML, Castillo O, Soria J, Valdez F (2021) Optimization of type-2 fuzzy logic controller design using the GSO and FA algorithms. Int J Fuzzy Syst 23(1):42–57CrossRef
43.
go back to reference Singh SK, Yadav SP (2018) Intuitionistic fuzzy multi-objective linear programming problem with various membership functions. Ann Oper Res 269(1):693–707MathSciNetMATHCrossRef Singh SK, Yadav SP (2018) Intuitionistic fuzzy multi-objective linear programming problem with various membership functions. Ann Oper Res 269(1):693–707MathSciNetMATHCrossRef
44.
go back to reference Zhang Q, Li H (2007) MOEA/D: a multiobjective evolutionary algorithm based on decomposition. IEEE Trans Evol Comput 11(6):712–731CrossRef Zhang Q, Li H (2007) MOEA/D: a multiobjective evolutionary algorithm based on decomposition. IEEE Trans Evol Comput 11(6):712–731CrossRef
45.
go back to reference Ma X, Zhang Q, Tian G, Yang J, Zhu Z (2017) On Tchebycheff decomposition approaches for multiobjective evolutionary optimization. IEEE Trans Evol Comput 22(2):226–244CrossRef Ma X, Zhang Q, Tian G, Yang J, Zhu Z (2017) On Tchebycheff decomposition approaches for multiobjective evolutionary optimization. IEEE Trans Evol Comput 22(2):226–244CrossRef
46.
go back to reference Karaboa D, kdem S (2004) A simple and global optimization algorithm for engineering problems: differential evolution algorithm. Turk J Electr Eng Comput Sci 12(1):53–60 Karaboa D, kdem S (2004) A simple and global optimization algorithm for engineering problems: differential evolution algorithm. Turk J Electr Eng Comput Sci 12(1):53–60
47.
go back to reference Adamy D (2001) EW 101: a first course in electronic warfare. Artech house, Chicago Adamy D (2001) EW 101: a first course in electronic warfare. Artech house, Chicago
48.
go back to reference Cheng R, Jin Y, Olhofer M et al (2016) A reference vector guided evolutionary algorithm for many-objective optimization. IEEE Trans Evol Comput 20(5):773–791CrossRef Cheng R, Jin Y, Olhofer M et al (2016) A reference vector guided evolutionary algorithm for many-objective optimization. IEEE Trans Evol Comput 20(5):773–791CrossRef
49.
go back to reference Zhao L, Wang B, Shen C (2021) A multi-objective scheduling method for operational coordination time using improved triangular fuzzy number representation. PLoS One 16(6):e0252293CrossRef Zhao L, Wang B, Shen C (2021) A multi-objective scheduling method for operational coordination time using improved triangular fuzzy number representation. PLoS One 16(6):e0252293CrossRef
50.
go back to reference Tian Y, Cheng R, Zhang X, Jin Y (2017) PlatEMO: a MATLAB platform for evolutionary multi-objective optimization [educational forum]. IEEE Comput Intell Mag 12(4):73–87CrossRef Tian Y, Cheng R, Zhang X, Jin Y (2017) PlatEMO: a MATLAB platform for evolutionary multi-objective optimization [educational forum]. IEEE Comput Intell Mag 12(4):73–87CrossRef
Metadata
Title
A hybrid multi-objective bi-level interactive fuzzy programming method for solving ECM-DWTA problem
Authors
Luda Zhao
Zongxu An
Bin Wang
Yanqiu Zhang
Yihua Hu
Publication date
25-04-2022
Publisher
Springer International Publishing
Published in
Complex & Intelligent Systems / Issue 6/2022
Print ISSN: 2199-4536
Electronic ISSN: 2198-6053
DOI
https://doi.org/10.1007/s40747-022-00730-9

Other articles of this Issue 6/2022

Complex & Intelligent Systems 6/2022 Go to the issue

Premium Partner