A route planning method for uuv under the threat of the Internet
A technology of route planning and Internet, applied in three-dimensional position/course control, instruments, calculation models, etc., to achieve the effect of short routes
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment approach 1
[0044] Specific implementation mode one, a kind of path planning method that threatens UUV under the Internet described in this implementation mode, carry out according to the following steps:
[0045] Step 1: Pass in the deployment point and recovery point, and store the array list[] of the necessary points according to the traversal order; obtain the safety probability safep_limit required by the user; set the number of ant colony m_AntNum, the maximum number of iterations Max_generation, and the number of historical optimal retention Max_histBest, pheromone volatilization coefficient vol, pheromone upper limit up_limit, pheromone lower limit low_limit; Step 2: Initialize pheromone matrix, history best ant HistoryBestAnt, history best ant saved times history_best_hold=0, cycle iteration number m_generation=0 ;
[0046] Step three: set ant k=0, go to step four;
[0047] Step 4: If k>m_AntNum, go to step 8, if, k
specific Embodiment approach 2
[0058] Specific embodiment two, this embodiment is a further description of the route planning method for a UUV that threatens the Internet described in the specific embodiment one. The calculation rules involved in step seven have safety probability calculation rules, and its specific content is as follows:
[0059] The risk borne by the planned path is converted into the safety probability safep, that is, the greater the risk borne by the UUV, the smaller the safety probability; the danger probability of the threat area increases exponentially in a certain way according to the number of threat areas passed by the UUV, and the safe probability calculation rules of the path as follows:
[0060]
[0061] Among them, i is the serial number of the threat area passed on the path, N is the total number of threat areas passed on the path, thread_pro_i is the threat probability of the i-th threat area passed on the path, w is the threat escalation weight, w>1.
specific Embodiment approach 3
[0062] Specific embodiment three. This embodiment is a further description of the route planning method for a UUV that threatens the Internet described in the specific embodiment one. The calculation rules involved in step seven have a state transition probability calculation method, and its specific content is as follows:
[0063] State transition probability calculation rules:
[0064]
[0065] In the above formula, is the probability that ant k transfers to the visible point j at the current target point i; allow is the set of visible points that ant k is allowed to do state transition at the current target point i; η is a heuristic function, which is the visual point to be transferred to the current target The reciprocal of the point-line distance, η j is the reciprocal of the straight-line distance from the visible point j to be transferred to the current target point i, η r is the reciprocal of the straight-line distance from any point in allow to the current targe...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


