UUV navigation path planning method under threat Internet
A route planning and Internet technology, applied in three-dimensional position/channel control, instruments, calculation models, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment approach 1
[0044] Specific implementation mode one, a kind of path planning method that threatens UUV under the Internet described in this implementation mode, carry out according to the following steps:
[0045] Step 1: Pass in the deployment point and recovery point, and store the array list[] of the necessary points according to the traversal order; obtain the safety probability safep_limit required by the user; set the number of ant colony m_AntNum, the maximum number of iterations Max_generation, and the number of historical optimal retention Max_histBest, pheromone volatilization coefficient vol, pheromone upper limit up_limit, pheromone lower limit low_limit; Step 2: Initialize pheromone matrix, history best ant HistoryBestAnt, history best ant saved times history_best_hold=0, cycle iteration number m_generation=0 ;
[0046] Step three: set ant k=0, go to step four;
[0047] Step 4: If k>m_AntNum, go to step 8, if, k
specific Embodiment approach 2
[0058] Specific embodiment two, this embodiment is a further description of the route planning method for a UUV that threatens the Internet described in the specific embodiment one. The calculation rules involved in step seven have safety probability calculation rules, and its specific content is as follows:
[0059] The risk borne by the planned path is converted into the safety probability safep, that is, the greater the risk borne by the UUV, the smaller the safety probability; the danger probability of the threat area increases exponentially in a certain way according to the number of threat areas passed by the UUV, and the safe probability calculation rules of the path as follows:
[0060] s a f e p = Π i = 0 N ( 1 - w i ...
specific Embodiment approach 3
[0062] Specific embodiment three. This embodiment is a further description of the route planning method for a UUV that threatens the Internet described in the specific embodiment one. The calculation rules involved in step seven have a state transition probability calculation method, and its specific content is as follows:
[0063] State transition probability calculation rules:
[0064] p i j k = ( τ i j ) α ( η j ) β Σ r ∈ ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 