Professional Documents
Culture Documents
Astar and Predictive Control
Astar and Predictive Control
17, 2020.
Digital Object Identifier 10.1109/ACCESS.2020.3007496
ABSTRACT In recent years, stealth aircraft penetration path planning has been a significant research subject
in the field of low altitude combat. However, previous works have mainly concentrated on the path planning
for stealth unmanned aerial vehicle(UAV) in 2D static environment. In contrast, this paper addresses a
novel real-time path planning algorithm for stealth UAV to realize the rapid penetration, which aims to
devise a route penetration strategy based on the improved A-Star algorithm to address the problems of
replanning for stealth UAV in 3D complex dynamic environment. The proposed method introduces the
kinematic model of stealth UAV and detection performance of netted radar in the process of low altitude
penetration. Additionally, POP-UP threats are adopted into three different threat scenarios, which is closer to
the real combat environment. Moreover, further combined with the prediction technique and route planning
algorithm, the multi-step search strategy is developed for stealth UAV to deal with POP-UP threats and
complete the replanning of the route in different scenarios. Furthermore, the attitude angle information
is integrated into the improved A-Star algorithm, which reflects the characteristics of the dynamic radar
cross section(RCS) and conforms to the actual flight requirements for the stealth UAV. Finally, the improved
A-Star algorithm, the sparse A-Star search (SAS), and the dynamic A-Star algorithm(D-Star) are respectively
adopted to address the problem of penetration route planning for stealth UAV in three different threat
scenarios. Numerical simulations are performed to illustrate that the proposed approach can achieve rapid
penetration route planning for stealth UAV in a dynamic threat scenario, and verify the validity of the
improved A-Star algorithm which is compared to the other two algorithms.
INDEX TERMS Stealth unmanned aerial vehicle, dynamic radar cross-section, netted radar, real-time path
planning, A-Star algorithm.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
VOLUME 8, 2020 122757
Z. Zhang et al.: Novel Real-Time Penetration Path Planning Algorithm for Stealth UAV in 3D Complex Dynamic Environment
dynamic threats existing in the real combat environment, search algorithm and a deterministic search algorithm.
stealth UAV is difficult to realize rapid and safe penetration On the one hand, deterministic search algorithms are
route planning. Therefore, the rapid penetration route plan- adopted to solve UAV route planning, such as A-Star
ning for stealth UAV is a significant subject in the 3D dynamic algorithm [20]–[22],D-Star algorithm [23]–[25], artificial
threat environment. potential field algorithm [26], [27],Dijkstra algorithm [28],
In the current literature, many scholars have studied the [29], dynamic programming algorithm [30]–[32]. However,
problem of aircraft penetration route planning. Moore firstly the A-Star algorithm, Dijkstra algorithm, and dynamic pro-
proposed the path planning problem for the variation of gramming algorithm can only be applied for route planning
aircraft RCS, he found that the stealth UAV could signif- in a small-scale static environment. Although the D-Star algo-
icantly reduce its RCS in flight by adjusting its attitude rithm and artificial potential field algorithm are suitable for
angle [10]. Inanc studied the problem of low detectabil- dynamic route planning, they cannot satisfy the constraints on
ity trajectory generation for UAVs and proposed a research maneuverability of stealth UAV. On the other hand, random
framework of low detectability tactical trajectory planning in search algorithm is employed to settle UAV route planning
the presence of multiple radar-detected threat environments, problems, such as genetic algorithm(GA) [33], [34], particle
the form of trajectory generation was defined as the optimal swarm optimization(PSO) [35]–[37], ant colony algorithm
control problem with the minimum threat probability [11], [38]–[40], simulated annealing algorithm [41], [42] and neu-
[12]. Refs. [13], [14] proposed a hybrid heuristic adaptive ral network algorithm [43], [44]. Inversely, the real combat
pseudo spectrum method to solve the low-detectability tra- environment is composed of various uncertain and dynamic
jectory planning problem. However, these methods usually threats, so there is no effective method to address the problem
use a simplified kinematic model of aircraft to obtain a rough of penetration route planning for stealth UAV in 3D dynamic
reference track. Although the computing efficiency of the environment. Therefore, it is necessary to study the perfor-
simplified model is better, the constraints and control condi- mance of the improved algorithm, which can improve the
tions of radar attitude are not considered in these trajectories. applicability of the algorithm and the ability to settle the
Ref. [15] addressed a stealth track planning method based practical path planning problem for stealth UAV.
on the aircraft RCS ellipsoid model to obtain the position The purpose of this paper is to present a novel real-time
of the track node during penetration, which simplified the path planning algorithm for stealth UAV, which aims to
characteristics of UAV detection targets into ellipsoids and achieve rapid penetration route planning in the 3D dynamic
established the nonlinear differential equation model based combat environment. The main contributions of this study are
on the minimum cross-sectional area of the detected direc- as follows:
tion. The method requires a large amount of computation in 1) The idea of the predictive control and learning
addressing the problem of route planning and the route is not real-time A-Star algorithm are integrated to devise the
guaranteed to be optimal. Ref. [16] studied the game relation- improved A-Star algorithm with a multi-step search
ship between aircraft and radar and proposed the trajectory strategy.
planning method of aircraft based on dynamic game theory. 2) In order to improve the survival ability and flight path
Similarly, a real-time air battle trajectory optimization and penetration efficiency of stealth UAV in 3D dynamic
game model for aircraft based on a rolling time-domain con- threat environment, the improved A-Star algorithm is
trol strategy were presented in [17]. The calculation process applied to the real-time penetration path planning for
of this game theory method is tedious, and it cannot solve stealth UAV.
some of the penetration track planning problems with high 3) In order to prove the effectiveness of the improved
real-time requirements. Additionally, this method can only be A-Star algorithm in the presence of radar net in 3D
applied to the static combat environment where the location dynamic environment, numerical experiments are per-
of radars is known, and it cannot achieve the expected effect formed employing the improved A-star algorithm,
for the stealth UAV track planning problem in the dynamic the sparse A-Star search algorithm(SAS) and the
environment. Refs. [18], [19] proposed a path planning model D-Star algorithm in static and dynamic environments,
that related expected cost for air task of path planning prob- respectively.
lem in the hostile environment, this method described the The rest of the paper is organized as follows. Section II
expression of the cost function with the minimum expecta- describes the mathematical model of stealth UAV, includes
tion, and the particle swarm optimization algorithm(PSO) is the kinematics model and dynamic RCS model. Section III
developed to settle the route optimization problem. However, discusses the detection probability calculation of multiple
these researches mainly focus on the 2D environment, and radar net, which is close to the real combat environment.
the real-time performance of routes cannot satisfy the actual Section IV presents the improvement of the route plan-
flight requirements. ning algorithm, includes improved A-Star algorithm, SAS
More recently, scholars have tried to use some the state algorithm, and D-Star algorithm. Numerical simulations
of the art optimization algorithms to settle the flight results of different algorithms in dynamic scenarios are
path planning problem of aircraft penetration. The most discussed in Section V. Finally, the conclusions are made and
common search algorithm can be divided into a random future works are presented in Section VI.
Additionally, let
y − yk
αk = arctan
x − xk
λk = αk − φ + π (2)
u
FIGURE 2. Air defense holes created by stealth UAV. θ = arctan
g
II. STEALTH UAV MODEL be the azimuth, aspect, and roll angles, respectively, measured
What makes stealth UAV different from conventional UAV is with respect to the i th radar, g is the acceleration of gravity.
that it has smaller RCS in places, such as the nose, fuselage,
and tail, so it can reduce the radar detection probability by B. CONSTRAINTS
controlling the attitude angle during the flight. The RCS Due to the physical characteristics, stealth UAV is not allowed
distribution of the F-22 fighter is depicted in Fig. 1. to adjust the attitude angle greatly. Therefore, in order to
The appearance of stealth technology greatly reduces the satisfy the actual flight requirements of UAV and ensure
range of radar action, some air defense vulnerabilities may safety during the flight, it is necessary to limit the flight speed
exist, which is depicted in Fig. 2. However, it is difficult and attitude angle.
to achieve penetration only by stealth characteristics in the
traditional mode. Further combined with the route planning 1) CONSTRAINTS OF HEADING ANGLE
method is a essential way for stealth UAV to achieve the Stealth UAVs are not permit to adjust its attitude at a large
security penetration in complex combat scenarios. angle. The maximum heading angle limits the range of hor-
izontal direction angle of the UAV when it flies from route
A. KINEMATICS a to route a + 1, and the track planned by the model and
In order to study the control of flight track points and ignore algorithm can only change direction within the range less
the influence of external conditions such as wind force, than or equal to the maximum heading angle φmax . The
it is assumed that stealth UAV moves in 3D space. Specify geometric relationship is depicted in Fig. 3. The constraint
radar locations in the plane zk = 0 (on the ground) by the of the heading angle is given by
coordinates (xk , yk , 0), Therefore, the kinematics model can
be given by
1xa−1 1xa + 1ya−1 1ya
φ = cos−1 q ≤ φmax (3)
ẋ = v cos φ 1xa−1 + 1y2a−1 1xa2 + 1y2a
p
2
ẏ = v sin φ
u (1) where 1xa−1 = xa − xa−1 , 1xa = xa+1 − xa , 1ya−1 =
φ̇ =
vq ya − ya−1 and 1ya = ya+1 − ya .
R = (x − x )2 + (y − y )2 + z2
k k k
2) CONSTRAINTS OF PITCH ANGLE
where x and y are the Cartesian coordinates of the aircraft, φ is Similarly, the track obtained by the model and algorithm can
the heading angle, v is the constant speed, u is the acceleration only change direction within the range less than or equal
normal to the flight path vector, Rk is the range from the k th to the maximum pitch angle βmax . The geometric rela-
radar to the stealth UAV. tionship is depicted in Fig. 4. The pitch angle constraint
Suppose M is the number of radars in the netted radar OPEN list and CLOSE list are usually performed to achieve
system, when the number of radar detected in the system the storage and update of track points, and the operation
exceeds the detection threshold K0 according to the rank equation of the algorithm is given by
K fusion rule, that means, the target has been detected by
f (n) = g(n) + h(n) (13)
the radar system, and the approximate value of the optimal
detection threshold K0 is given by However, the route obtained by the standard A-Star
√ algorithm has many disadvantages: (1) only the position
K0 = 1.5 M (9) information of the stealth UAV can be obtained in the route,
Each radar makes a local judgment based on its detection and the dynamic RCS characteristics and attitude informa-
of the stealth UAV, and the judgment results are either 0 or 1, tion of the stealth UAV cannot be obtained. (2) unknown
which depends on whether the local threshold detection target path cost estimation cannot be accurately calculated in route
exists or not. H0 and H1 are binary assumptions, where H0 planning, not only the final route cannot guarantee to be
represents the target does not exist and H1 represents the globally optimal, but also the computation time is long. (3) the
target exists. Therefore, the decision value of the j th radar performance of real-time is poor, and the algorithm unable to
(j = 1, 2, . . . , M ) is given by deal with emergent threats. Therefore, the performance of the
( standard A-Star algorithm needs to be improved, including
0 if decision result is H0 the search validity of the algorithm, real-time performance in
dj = (10)
1 if decision result is H1 the face of unknown threats and the expansion mode of track
nodes.
Then, the local decision result is passed to the information
fusion center of the radar system to form a global decision
B. D-STAR ALGORITHM
matrix Dc , that is, Dc = (d1 , d2 , . . . , dM ). And the radar
D-Star algorithm is developed based on the A-Star algorithm
information fusion rule for the network is denoted as R,
and Dijkstra algorithm [49], [50] which is suitable for solving
the decision rule R(Dc ) for rank K is given by
route planning problems in unknown environments. The main
XM idea of the algorithm is to search the reverse path from the
1 if dj ≥ K0
goal to the origin when a new obstacle is found in the path,
j=1 the path between the target location and the path node within
R(Dc ) = M (11)
X the range of the new obstacle will not change due to the
dj < K0
0 if appearance of the new obstacle, but the path between the UAV
j=1
and the node within the range of the obstacle will change
Additionally, the total detection probability of the network during the flight. In other words, the whole track is only
radar system is given by partially replanned, which not only avoids the emergent threat
well but also improves the search efficiency. The heuristic
X
R (Dc )
Y Y function expression of the D-Star algorithm is given by
PNet = Pdj 1 − Pdj (12)
Dc df ∈S1 dj ∈S0 f (X , E) = h(X ) + g(X , E) (14)
where S1 is a set of local decision vectors that make the fusion where h(X ) represents the actual journey cost from the goal
center judge ’1’, S0 is a set of local decision vectors that to state X and g(X , E) represents the estimated journey cost
make the fusion center judge ’0’, and Pdj is the discovery from the state X to the current position of the stealth UAV.
probability of the first radar in the radar net. The D-Star algorithm is mainly composed of three
functions which are Process_State, Modify_Cost and
IV. PATH PLANNING METHOD Move_UAV. The function of Process_State is employed to
A-Star algorithm is a heuristic search algorithm, which is calculate the optimal path value and the route sequence. The
widely adopted in the path planning problems of various Modify_Cost is applied to change the path cost C(∗) between
agents. This paper discusses the improvement method of the two states and put the affected state into the OPEN list. The
A-Star algorithm and analyzes the efficiency of algorithm and function of Move_UAV ensures that the UAV can fly along
route safety in the stealth UAV penetration problem. the optimal route by calling the above two functions. The
main steps of the D-Star algorithm are described as follows.
A. A-STAR ALGORITHM Step 1: the value of tag all states is set to NEW, f (∗) and
The main idea of the standard A-Star algorithm is as follows. h(∗) are set to infinity for all states, h(G) is set to 0 and
Firstly, select the appropriate heuristic function, estimate the the target point G is added to the OPEN list. Step 2: the
generation value of the extensible search points in the search Process-State function is executed until the location of E
area, comprehensively. Additionally, compare the different which is removed from the OPEN list, that is, if the CLOSE
cost values of each point. Moreover, consider the operation list contains the tag value of the current UAV, the complete
time and distance cost of the track point search, Finally, find route sequence will be obtained. In contrast, the return of
an optimal route. In the A-Star algorithm, the operation of the ’NO-PATH’ means that the route planning of the stealth UAV
FIGURE 10. Numerical results of penetration route planning in the first scenario.
FIGURE 11. The variation of attitude angle that performed by improved A-Star algorithm in the first threat scenario.
FIGURE 12. The detection probability of netted radar in the first threat scenario.
where N is the length of the prediction domain, W is the TABLE 5. The statistical result of flight in the first scenario.
length of the control domain, qi is the output prediction error,
and δj is the weighting coefficient of the control variable.
FIGURE 13. Numerical results of penetration route planning in the second scenario.
FIGURE 14. The variation of attitude angle that performed by improved A-Star algorithm in the second threat scenario.
FIGURE 15. The detection probability of netted radar in the second threat scenario.
TABLE 7. The statistical result of flight in the second scenario. TABLE 8. The geographical location and types of threat sources in the
third threat scenario.
V. NUMERICAL RESULTS
Numerical simulations of penetration route planning are
performed by the improved A-Star algorithm, Sparse A-Star Besides, the Ph is performed to evaluate the safety degree of
Search algorithm, and D-Star algorithm in different threat the track segment, the smaller the value, the safer the route.
scenarios, which aims to verify the validity of the improved The RCS data of a certain type of stealth UAV is depicted
A-Star algorithm. The simulation experiments are con- in Fig. 9.
ducted with MATLAB2017Ra software and a Windows
10 system. The parameters of flight are given as follows. A. THE FIRST THREAT SCENARIO
v = 500km/h, φmax = 60◦ , βmax = 60◦ , U = g, The threat region has a range of 25 km × 25 km × 3km, the
θmax = 45◦ , s = 3, N = 4, ω = 0.5, geographical location and types of threat sources are pre-
Pc = 0.5, lmin = 3, ρ = 30◦ . The rank K fusion criterion is sented in Table 4. The coordinate of the starting point
developed for all radars to calculate the detection probability is (5, 5, 2)km, and the coordinate of the target point is
of stealth UAV. The value K0 is determined by the number (25, 25, 2)km, The numerical results of penetration route
of radar M and it will change when there is a POP-UP threat planning which is performed by different algorithms in the
in the scenario. Additionally, it is considered as the proba- first scenario are depicted in Fig. 10. The variation of attitude
bility state of radar high detection when PNet exceeds 0.4. angle which is performed by an improved A-Star algorithm
FIGURE 16. Numerical results of penetration route planning in the third scenario.
in the first scenario is depicted in Fig. 11, the detection penetration of stealth UAV in the first scenario, in which
probability of netted radar in the first threat scenario is static or dynamic environment. However, compared with
depicted in Fig. 12, and the statistical result of the flight in the other two algorithms, the routes obtained by using the
the first scenario is presented in Table 5. improved A-Star algorithm takes less run time and has a
Fig. 10 describes the penetration routes for stealth UAV smaller value of Ph . Additionally, the routes obtained by the
which is performed by adopting three different algorithms improved A-Star algorithm is shorter than the SAS algorithm,
in a scenario with fewer threat sources. Fig. 12 and Table 5 that means the improved A-Star algorithm has higher route
indicate that the three algorithms can achieve the security planning efficiency and route safety, which further proves
FIGURE 17. The variation of attitude angle that performed by improved A-Star algorithm in the third threat scenario.
the effectiveness of the algorithm. Fig. 11 shows that the TABLE 9. The statistical result of flight in the third scenario.
improved A-Star algorithm can accurately adjust the attitude
angle and reduce the RCS on the routes, and this algorithm
achieves the rapid and safe route penetration planning for
stealth UAV.
B. THE SECOND THREAT SCENARIO
The threat region has a range of 25 km × 25 km × 3km, the
geographical location and types of threat sources are pre-
sented in Table 6. The coordinate of the starting point C. THE THIRD THREAT SCENARIO
is (5, 5, 2)km, and the coordinate of the target point is The threat region has a range of 25 km × 25 km × 3km, the
(25, 25, 2)km, The numerical results of penetration route geographical location and types of threat sources are pre-
planning which is performed by different algorithms in sented in Table 8. The coordinate of the starting point
the second scenario are depicted in Fig. 13. The variation is (5, 5, 2)km, and the coordinate of the target point is
of attitude angle which is performed by an improved A-Star (25, 25, 2)km, The numerical results of penetration route
algorithm in the second scenario is depicted in Fig. 14, planning which is applied by different algorithms in the third
the detection probability of netted radar in the second threat scenario are depicted in Fig. 16. The variation of attitude
scenario is depicted in Fig. 15, and the statistical result of angle which is employed by an improved A-Star algorithm
flight in the second scenario is presented in Table 7. in the third scenario is depicted in Fig. 17, the detection
Fig. 13 describes the penetration routes for stealth UAV probability of netted radar in the third threat scenario is
which is performed by employing three different algorithms depicted in Fig. 18, and the statistical result of flight in the
in a scenario with more complex threat sources, and we can third scenario is presented in Table 9.
infer some interesting experimental results from Fig. 15 and Fig. 16 describes the penetration routes for stealth UAV
Table 7. For the original route planning, stealth UAV can which are performed by applying three different algorithms
still achieve safe penetration route planning in the threat in a scenario with a large number of threat sources and
scenario by applying three algorithms. Inversely, for the route dynamic threats, Fig. 18 and Table 9 show that the Ph of routes
replanning in the presence of POP-UP threats, the routes of obtained by the SAS algorithm and D-star algorithm is higher
that obtained by D-star algorithm is higher than 0.5, which than 0.5 no matter in the original route planning or route
means that the route replanning of D-Star algorithm has replanning. Obviously, these two algorithms are not suitable
failed in the second threat scenario, however, the improved for solving the route planning and replanning problems for
A-Star algorithm can still achieve the route replanning in stealth UAV in the third scenario. In contrast, the Ph of
the second scenario with two POP-UP threats. Additionally, routes obtained by the improved A-Star algorithm are always
compared with the other two algorithms, the improved A-Star lower than 0.5, from which we can infer that the improved
algorithm takes less run time and has higher route planning A-Star algorithm can still achieve the security penetration
efficiency whether in the original route planning or replan- for stealth UAV in the dynamic threat scenario. Additionally,
ning, and it further proves the effectiveness of the algorithm. compared with the other two algorithms, the improved A-Star
Fig. 14 shows that when the improved A-Star algorithm is algorithm has many advantages such as higher computational
performed to penetration route planning, the variation of efficiency, higher route safety, and shorter flight distance,
attitude angles are within the preset range, which can sat- which also proves the validity of the improved A-Star algo-
isfy the actual flight requirements. And the attitude angle rithm in the scenario with high threat density. Fig. 17 shows
of the stealth UAV changes more frequently, the more that when the improved A-Star algorithm is performed to
maneuvers are needed to reduce the RCS on the routes penetration route planning, the variation of attitude angle
to further obtain a shorter flight distance and a safe track within the preset range, which can satisfy the actual flight
node. requirements.
FIGURE 18. The detection probability of netted radar in the third threat scenario.
VI. CONCLUSION [8] K. Yue, Y. Tian, H. Liu, and W. Han, ‘‘Conceptual design and RCS
This paper presents a novel real-time path planning algorithm property research of three-surface strike fighter,’’ Int. J. Aeronaut. Space
Sci., vol. 15, no. 3, pp. 309–319, Sep. 2014.
for stealth unmanned aerial vehicle in 3D complex dynamic [9] H. Liu, S. Chen, L. Shen, and J. Chen, ‘‘Tactical trajectory planning for
environment. Firstly, an improved A-Star algorithm based stealth unmanned aerial vehicle to win the radar game,’’ Defence Sci. J.,
on a multi-step search strategy is designed by model-based vol. 62, no. 6, pp. 375–381, Nov. 2012.
predictive control and the A-Star algorithm. Meanwhile, [10] F. W. Moore, ‘‘Radar cross-section reduction via route planning and
intelligent control,’’ IEEE Trans. Control Syst. Technol., vol. 10, no. 5,
the attitude angle information of stealth UAV is added to pp. 696–700, Sep. 2002.
the algorithm, which shows the variation characteristics of [11] K. Misovec, T. Inanc, J. Wohletz, and R. M. Murray, ‘‘Low-observable
dynamic RCS. Further combined with the kinematics analysis nonlinear trajectory generation for unmanned air vehicles,’’ in Proc.
42nd IEEE Int. Conf. Decis. Control, Maui, HI, USA, Dec. 2003,
of stealth UAV and the detection performance analysis of pp. 3103–3110.
netted radar, the original routes and the replanning routes can [12] T. Inanc, M. K. Muezzinoglu, K. Misovec, and R. M. Murray, ‘‘Framework
satisfy the actual flight requirements. Additionally, compared for low-observable trajectory generation in presence of multiple radars,’’
with other algorithms, the improved A-Star algorithm can J. Guid., Control, Dyn., vol. 31, no. 6, pp. 1740–1749, Nov. 2008.
[13] H. Liu, J. Chen, L. Shen, and S. Chen, ‘‘Low observability trajectory
achieve the penetration route planning for stealth UAV in planning for stealth aircraft to evade radars tracking,’’ Proc. Inst. Mech.
dynamic threat scenarios, improve the survivability of stealth Eng., G, J. Aerosp. Eng., vol. 228, no. 3, pp. 398–410, Mar. 2014.
UAV and the efficiency of penetration route planning, and [14] S. Chen, H. Liu, J. Chen, and L. Shen, ‘‘Penetration trajectory planning
further verify the validity of the improved A-Star algorithm. based on radar tracking features for UAV,’’ Aircr. Eng. Aerosp. Technol.,
vol. 85, no. 1, pp. 62–71, Jan. 2013.
Moreover, the threat scenarios are closer to the real combat [15] J. J. Ruz, O. Arevalo, J. M. D. L. Cruz, and G. Pajares, ‘‘Using MILP
environment. The model and the improved A-Star algorithm for UAVs trajectory optimization under radar detection risk,’’ in Proc.
proposed in this paper can quickly generate better penetration IEEE Conf. Emerg. Technol. Factory Autom., Prague, Czech, Sep. 2006,
pp. 957–960.
routes in the combat area under a dynamic environment,
[16] R. Wang and J. Liu, ‘‘Adaptive formation control of quadrotor unmanned
exhibiting certain military application value. The future work aerial vehicles with bounded control thrust,’’ Chin. J. Aeronaut., vol. 30,
will focus on the problem of rapid penetration route planning no. 2, pp. 807–817, Apr. 2017.
for stealth UAV in combat scenarios that includes terrain [17] J. Zhang, Q. Hu, D. Wang, and W. Xie, ‘‘Robust attitude coordinated
control for spacecraft formation with communication delays,’’ Chin.
concealment and some uncertain motion targets. J. Aeronaut., vol. 30, no. 3, pp. 1071–1085, Jun. 2017.
REFERENCES [18] T. Erlandsson, ‘‘Route planning for air missions in hostile environments,’’
J. Defense Model. Simul., Appl., Methodol., Technol., vol. 12, no. 3,
[1] N. Aswini, E. K. Kumar, and S. V. Uma, ‘‘UAV and obstacle sensing pp. 289–303, Jul. 2015.
techniques–a perspective,’’ Int. J. Intell. Unmanned Syst., vol. 6, no. 1,
[19] T. Erlandsson and L. Niklasson, ‘‘Automatic evaluation of air mission
pp. 32–46, Jan. 2018, doi: 10.1108/IJIUS-11-2017-0013.
routes with respect to combat survival,’’ Inf. Fusion, vol. 20, pp. 88–98,
[2] S. Haoqin, B. Xiaoxiang, L. Jianhua, L. Kai, C. Mengxi, and S. Jing,
Nov. 2014.
‘‘Calculation and analysis on stealth and aerodynamics characteristics
of a medium altitude long endurance UAV,’’ Procedia Eng., vol. 99, [20] Z. Zhao, Y. Niu, Z. Ma, and X. Ji, ‘‘A fast stealth trajectory planning
pp. 111–115, 2015. algorithm for stealth UAV to fly in multi-radar network,’’ in Proc. IEEE
[3] J. Oh, D. Choe, C. Yun, J. Kim, and M. Hopmeier, ‘‘Towards the develop- Int. Conf. Real-time Comput. Robot. (RCAR), Angkor Wat, Cambodia,
ment and realization of an undetectable stealth UAV,’’ in Proc. Int. Conf. Jun. 2016, pp. 549–554.
Robotic Comput. (IRC), Naples, Italy, Feb. 2019, pp. 459–464. [21] A. V. Le, V. Prabakaran, V. Sivanantham, and R. E. Mohan, ‘‘Modified
[4] J. Paterson, ‘‘Overview of low observable technology and its effects a-star algorithm for efficient coverage path planning in tetris inspired self-
on combat aircraft survivability,’’ J. Aircr., vol. 36, no. 2, pp. 380–388, reconfigurable robot with integrated laser sensor,’’ Sensors, vol. 18, no. 8,
Mar. 1999. pp. 2585–2611, 2018.
[5] F. H. Zeitz, III, ‘‘UCAV path planning in the presence of radar-guided [22] F. Duchoň, A. Babinec, M. Kajan, P. Beňo, M. Florek, T. Fico, and
surface-to-air missile threats,’’ Ph.D. dissertation, Dept. Elect. Eng., Michi- L. Jurišica, ‘‘Path planning with modified a star algorithm for a mobile
gan Univ., Detroit, MI, USA, 2005. robot,’’ Procedia Eng., vol. 96, pp. 59–69, 2014.
[6] G. Martin, ‘‘Fifth-generation fighter options,’’ Defence Rev. Asia, vol. 14, [23] X. Liu, R. Deng, J. Wang, and X. Wang, ‘‘COStar: A D-star lite-
no. 2, pp. 12–18, 2020. based dynamic search algorithm for codon optimization,’’ J. Theor. Biol.,
[7] M. M. James, K. L. Gee, A. T. Wall, J. M. Downing, K. A. Bradley, and vol. 344, pp. 19–30, Mar. 2014.
S. A. McInerny, ‘‘Aircraft jet source noise measurements of a lockheed [24] P. Sudhakara and V. Ganapathy, ‘‘Trajectory planning of a mobile robot
Martin F-22 fighter jet using a prototype near-field acoustical holography using enhanced A-star algorithm,’’ Indian J. Sci. Technol., vol. 9, no. 41,
measurement system,’’ J. Acoust. Soc. Amer., vol. 127, no. 3, p. 1878, 2010. pp. 1–10, Nov. 2016.
[25] F. Poirion, Q. Mercier, and J.-A. Désidéri, ‘‘Descent algorithm for non- [49] K. Singh, K. Singh, L. H. Son, and A. Aziz, ‘‘Congestion control in wire-
smooth stochastic multiobjective optimization,’’ Comput. Optim. Appl., less sensor networks by hybrid multi-objective optimization algorithm,’’
vol. 68, no. 2, pp. 317–331, Nov. 2017. Comput. Netw., vol. 138, pp. 90–107, Jun. 2018.
[26] T. Y. Abdalla, A. A. Abed, and A. A. Ahmed, ‘‘Mobile robot navigation [50] I. M. Ismail and N. N. Agwu, ‘‘Influence of heuristic functions on real-
using PSO-optimized fuzzy artificial potential field with fuzzy control,’’ time heuristic search methods,’’ in Proc. 14th Int. Conf. Electron. Comput.
J. Intell. Fuzzy Syst., vol. 32, no. 6, pp. 3893–3908, May 2017. Comput. (ICECCO), Kaskelen, Kazakhstan, Nov. 2018, pp. 206–212.
[27] J. Zhang, J. Yan, and P. Zhang, ‘‘Fixed-wing UAV formation control design [51] J. C. Li, J. Chen, P. B. Wang, and C. S. Li, ‘‘Sensor-oriented path planning
with collision avoidance based on an improved artificial potential field,’’ for multiregion surveillance with a single lightweight UAV SAR,’’ Sensors,
IEEE Access, vol. 6, pp. 78342–78351, 2018. vol. 18, no. 2, pp. 548–581, 2018.
[28] G. Qing, Z. Zheng, and X. Yue, ‘‘Path-planning of automated guided [52] P. V. Silvestrin and M. Ritt, ‘‘An iterated tabu search for the multi-
vehicle based on improved dijkstra algorithm,’’ in Proc. 29th Chin. Control compartment vehicle routing problem,’’ Comput. Oper. Res., vol. 81,
Decis. Conf. (CCDC), Chongqing, China, May 2017, pp. 7138–7143. pp. 192–202, May 2017.
[29] Y. Dinitz and R. Itzhak, ‘‘Hybrid Bellman–Ford–Dijkstra algorithm,’’ [53] A. G. Kline, D. K. Ahner, and B. J. Lunday, ‘‘Real-time heuristic algo-
J. Discrete Algorithms, vol. 42, pp. 35–44, Jan. 2017. rithms for the static weapon target assignment problem,’’ J. Heuristics,
[30] D. P. Bertsekas, ‘‘Robust shortest path planning and semicontractive vol. 25, no. 3, pp. 377–397, Jun. 2019.
dynamic programming,’’ Nav. Res. Logistics (NRL), vol. 66, no. 1, [54] Y. Zhao, S. Yin, D. Li, Q. Yu, and P. Ranjitkar, ‘‘Improving motorway
pp. 15–37, Feb. 2019. mobility and environmental performance via vehicle trajectory data-based
[31] Y. Zhao, Z. Zheng, and Y. Liu, ‘‘Survey on computational-intelligence- control,’’ IEEE Access, vol. 8, pp. 86862–86869, 2020.
based UAV path planning,’’ Knowl.-Based Syst., vol. 158, pp. 54–64, [55] A. Afram, F. Janabi-Sharifi, A. S. Fung, and K. Raahemifar, ‘‘Artificial
Oct. 2018. neural network (ANN) based model predictive control (MPC) and opti-
[32] M. Roozegar, M. J. Mahjoob, and M. Jahromi, ‘‘Optimal motion plan- mization of HVAC systems: A state of the art review and case study
ning and control of a nonholonomic spherical robot using dynamic pro- of a residential HVAC system,’’ Energy Buildings, vol. 141, pp. 96–113,
gramming approach: Simulation and experimental results,’’ Mechatronics, Apr. 2017.
vol. 39, pp. 174–184, Nov. 2016.
[33] N. Metawa, M. K. Hassan, and M. Elhoseny, ‘‘Genetic algorithm based
model for optimizing bank lending decisions,’’ Expert Syst. Appl., vol. 80,
pp. 75–82, Sep. 2017. ZHE ZHANG received the B.Sc. degree in
[34] P. He and S. Dai, ‘‘Real-time stealth corridor path planning for fleets electronic science from Nankai University Binhai
of unmanned aerial vehicles in low-altitude penetration,’’ Int. J. Robot. College, China, in 2018. He is currently pursuing
Autom., vol. 30, no. 1, pp. 60–69, 2015. the M.Sc. degree in control engineering with Nan-
[35] A. Majeed and S. Lee, ‘‘A fast global flight path planning algorithm based chang Hangkong University, China. His research
on space circumscription and sparse visibility graph for unmanned aerial interest includes the tactical planning system for
vehicle,’’ Electronics, vol. 7, no. 12, pp. 375–401, 2018. stealth unmanned aerial vehicle.
[36] K. Wei and B. Y. Ren, ‘‘A method on dynamic path planning for robotic
manipulator autonomous obstacle avoidance based on an improved RRT
algorithm,’’ Sensors, vol. 18, no. 2, pp. 571–585, 2018.
[37] D. Wang, D. Tan, and L. Liu, ‘‘Particle swarm optimization algorithm:
An overview,’’ Soft Comput., vol. 22, no. 2, pp. 387–408, Jan. 2018.
[38] J. Liu, J. Yang, H. Liu, X. Tian, and M. Gao, ‘‘An improved ant JIAN WU received the B.Sc. degree in electrical
colony algorithm for robot path planning,’’ Soft Comput., vol. 21, no. 19, engineering and automation, and the M.Sc. and
pp. 5829–5839, Oct. 2017. Ph.D. degrees in control theory and engineer-
[39] W. Deng, J. Xu, and H. Zhao, ‘‘An improved ant colony optimization algo- ing from Air Force Engineering University, Xian,
rithm based on hybrid strategies for scheduling problem,’’ IEEE Access, China, in 2000, 2003, and 2006, respectively.
vol. 7, pp. 20281–20292, 2019. He is currently a Professor with the Nan-
[40] O. Engin and A. Güçlü, ‘‘A new hybrid ant colony optimization algorithm chang Hangkong University. His research interests
for solving the no-wait flow shop scheduling problems,’’ Appl. Soft Com-
include adaptive control and flight simulation.
put., vol. 72, pp. 166–176, Nov. 2018.
[41] L. Wei, Z. Zhang, D. Zhang, and S. C. H. Leung, ‘‘A simulated anneal-
ing algorithm for the capacitated vehicle routing problem with two-
dimensional loading constraints,’’ Eur. J. Oper. Res., vol. 265, no. 3,
pp. 843–859, Mar. 2018. JIYANG DAI received the B.Sc. and M.Sc. degrees
[42] A. E.-S. Ezugwu, A. O. Adewumi, and M. E. Frîncu, ‘‘Simulated annealing
from the Nanjing University of Aeronautics and
based symbiotic organisms search optimization algorithm for traveling
Astronautics, Nanjing, China, in 1988 and 1991,
salesman problem,’’ Expert Syst. Appl., vol. 77, pp. 189–210, Jul. 2017.
[43] C. He, J. Wu, J. Dai, Z. Zhang, L. Xu, and P. Li, ‘‘Approximation-based
and the Ph.D. degree from Beihang University,
fixed-time adaptive tracking control for a class of uncertain nonlinear Beijing, China, in 2001. Since 1991, he has been
pure-feedback systems,’’ Complexity, vol. 2020, pp. 1–17, Apr. 2020, a Professor with Nanchang Hangkong University,
doi: 10.1155/2020/4205914. Nanchang, China. His current research interests
[44] Y. Zhang, S. Li, and H. Guo, ‘‘A type of biased consensus-based dis- include robust control theory and applications,
tributed neural network for path planning,’’ Nonlinear Dyn., vol. 89, no. 3, intelligent controls, and helicopter control.
pp. 1803–1815, Aug. 2017.
[45] J. S. Patel, F. Fioranelli, and D. Anderson, ‘‘Review of radar classification
and RCS characterisation techniques for small UAVs or drones,’’ IEEE
Radar, Sonar Navigat., vol. 12, no. 9, pp. 233–244, Sep. 2018.
[46] C. Fang, ‘‘The simulation and analysis of quantum radar cross section for CHENG HE received the B.Sc. degree in
three-dimensional convex targets,’’ IEEE Photon. J., vol. 10, no. 1, pp. 1–8, automation from the Tongda College, Nanjing
Feb. 2018. University of Posts and Telecommunications,
[47] C. Fang, H. Tan, Q.-F. Liu, L. Tao, L. Xiao, Y. Chen, and L. Hua, China, in 2018. He is currently pursuing the
‘‘The calculation and analysis of the bistatic quantum radar cross section M.Sc. degree in control engineering with Nan-
for the typical 2-D plate,’’ IEEE Photon. J., vol. 10, no. 2, pp. 1–14, chang Hangkong University, China. His research
Apr. 2018. interests include adaptive control and nonlinear
[48] C. Zhang, X. F. Jiang, and D. Chen, ‘‘RCS promotion in orbital angular pure-feedback systems.
momentum imaging radar with rotational antenna,’’ IEEE Radar, Sonar
Navigat., vol. 13, no. 12, pp. 2140–2144, Dec. 2019.