A modified genetic algorithm for task assignment of heterogeneous unmanned aerial vehicle system

This study deals with the task assignment problem of heterogeneous unmanned aerial vehicle (UAV) system with the limited resources and task priority constraints. The optimization model which comprehensively considers the resource consumption, task completion effect, and workload balance is formulated. Then, a concept of fuzzy elite degree is proposed to optimize and balance the transmission of good genes and the variation strength of population during the operations of algorithm. Based on the concept, we propose the fuzzy elite strategy genetic algorithm (FESGA) to efficiently solve the complex task assignment problem. In the proposed algorithm, two unlock methods are presented to solve the deadlock problem in the random optimization process; a sudden threat countermeasure (STC) mechanism is presented to help the algorithm quickly respond to the change of task environment caused by sudden threats. The simulation results demonstrate the superiority of the proposed algorithm. Meanwhile, the effectiveness and feasibility of the algorithm in workload balance and task priority constraints are verified.


Introduction
Unmanned aerial vehicle (UAV) has made outstanding contributions in military, agriculture, and commercial applications with its unique low cost and strong maneuverability over the previous decades. 1 However, it is difficult for a single UAV to satisfy the increasingly complex task requirements in many cases due to its limited airborne resources. Therefore, UAV applications are gradually developing toward clusteringLiu et al., and Zhou et al.,. 2,3 tackled the multi-UAV collaborative data collection problem Motlagh et al. 4 studied the application of multi-UAV system in the Internet of Things (IOT) and realized the effective transmission of airborne information. Most of the above studies focus on the homogeneous UAV system. However, the diversity of tasks sets higher demands on the UAV system. The heterogeneity will be the main development direction of UAV system in the future. In the large-scale task scenario, the optimization effect of task assignment directly affects the work effectiveness of UAV system. 5,6 The task assignment problem of heterogeneous UAV system has become a hot issue in the field of multiple UAVs control. 7 The multiple heterogeneous UAVs task assignment problem is a complex combinatorial optimization problem. In Deng et al., 8 the total task execution time was taken as the objective function of the UAV task assignment problem. In Motlagh et al., 4 the authors jointly optimized the energy consumption and operational time of UAV system. Most of current studies focus on reducing the resource consumption of UAV system. The task completion effect of UAVs is ignored, which may lead to unnecessary resource consumption. Therefore, it is necessary to evaluate the task completion quality rationally, and jointly optimize the resource consumption and task completion effect of UAV system. In addition, many researchers have studied the workload balance in the UAV task assignment optimization problem. 9,10 The algorithms considering the workload balance can effectively prevent the situation that some vehicles run out of their resources, thereby decreasing the task completion time of UAV system. 11 However, the workload balance problem is difficult to solve due to the coordinated control of multiple UAVs. In Zhu and Yang, 9 the workload balance coefficient related to the average traveled distance of UAV system was introduced in objective function to alleviate the imbalance of task assignment effectively. However, the coefficient overlooks the great influence of the real-time resource information of UAV system to the task assignment optimization process. In Chen and Zhu, 12 a workload balance coefficient considering the real-time traveled distance of UAVs was proposed to achieve a fairer task assignment scheme. However, the proposed coefficient only focuses on the real-time change of traveled distance, the assignment scheme may not satisfy the equalization requirement of other types of resources. For instance, a UAV cannot continue working if a resource carried by the UAV is consumed excessively, then the stability of UAV system will be adversely affected. Therefore, it is of great practical significance to propose a workload balance method that comprehensively considers multiple realtime changing resources to ensure the efficient operation of UAV system.
The task assignment of UAV system is a complex nondeterministic polynomial hard (NP-hard) problem with multiple constraints. It is difficult to solve by traditional convex optimization theory. 8 In current studies, the deterministic algorithms such as mixed integer linear program (MILP), [13][14][15] branch and bound (BAB) algorithm, 16 and tree search algorithm (TSA) 17,18 have been widely adopted to solve the UAV system task assignment problem. In the process of solving largescale complex task assignment problem, matrix operations involved in MILP and BAB are numerous and complex, search scope of TSA is large. Thus, they are only suitable for solving small and medium-sized task assignment problems with fewer constraints. As experience-based algorithms, heuristic algorithms can avoid the high computational complexity of the NPhard problems. Therefore, they have been more extensively studied than deterministic algorithms in the field of task assignment. In Chen et al., 19 the authors developed a modified two-part wolf pack search (MTWPS) algorithm to solve the UAV system task assignment problem with task priority constraint effectively. In Xi et al., 20 a guiding mechanism based on particle swarm optimization (PSO) algorithm was presented to rapidly provide feasible task assignment scheme for homogeneous strike UAV cooperative operation. In Kalayci and Gupta, 21 the modified artificial bee colony (ABC) algorithm was proposed to effectively solve the decentralized task assignment problem. However, in the optimization process of algorithms, [19][20][21] a solution can only be updated with the guidance of other solutions. Searching ability of the algorithms is insufficient due to the single updating way. Thus, they may fail to provide satisfactory solutions in more complex task scenarios. Compared with the above heuristic algorithms, genetic algorithm (GA) can update solutions in more diversified ways through mutation. 22,23 GA shows stronger exploration ability and more advantages in solving the complex large-scale task assignment problem. In Deng et al., 8 a GA-based mirror representation method was proposed to cope with the limited resource constraint in the multi-UAV task assignment. In Schwarzrock et al., 24 the task assignment problem was transformed into a directed graph to simplify the problem complexity, and two different encoding methods were proposed for homogeneous UAVs and heterogeneous UAVs, respectively. In Jia et al., 25 the authors proposed a concept of penalty items to enable GA to solve the multi-UAV task assignment problem with task priority constraint effectively. More diversified constraints must be considered due to the complexity of task scenarios. The introduction of multiple complex constraints directly affects the solving efficiency of traditional GA. In Wu et al., 26 the authors proposed a distributed genetic algorithm (DGA) which treats each UAV as an independent processor to enhance the population diversity. In Bai et al., 22 multiple subpopulations were created to macroscopically increase the intensity of genetic operations, thereby enhancing search ability of the algorithm. In Zhou et al., 23 good individuals were achieved by adopting the greedy strategy to synthetically adjust the resource allocation of UAV system. These individuals can accelerate the population evolution and convergence speed. The above GAs focus on the convergence speed or search ability. They lack the comprehensive consideration of the two performances. However, it is difficult for GAs to improve these performances simultaneously. The increasing complexity of task scenarios requires higher performance of algorithms. Thus, it is significant to propose an improved GA with fast convergence speed and strong searching ability to solve the complex largescale UAV system task assignment problem.
Given that GA is an opportunistic optimization algorithm, some infeasible solutions may be generated in the optimization process. Wherein, deadlock problem is the main reason of generating infeasible solutions. Especially in the large-scale task scenarios, deadlock solution appears with more possibility 19 , Lemaire et al., 27 proposed a swapping method to resolve deadlocks by exchanging the order of any two tasks which violate the task priority constraint. However, the method may fail when multiple UAVs are involved in deadlocks. In Deng et al., 28 an unlock method based on graph theory was presented to detect and solve the deadlock problem. Nevertheless, too many matrix manipulations and loop operations are involved in the method. The tedious and large calculation greatly reduce the unlock efficiency. Therefore, it is meaningful to design a low complexity and high reliability unlocking method to adapt to the ever-expanding task background.
Based on the given analysis, some main challenges in the field of task assignment of heterogeneous UAV system are given as follows: (1) The solving difficulty of task assignment problem increases with the multiplicity of constraints. (2) The current heuristic algorithms show insufficient precision and slow convergence speed in solving the large-scale complex task assignment problem. (3) The existing unlocking methods are inefficient for the deadlock problem caused by the heterogeneity of UAVs and task priority constraint. In this study, we aim to propose an improved GA to solve the task assignment problem of heterogeneous UAV system with multiple constraints. First, we construct a combinatorial optimization model about the resource consumption, task completion effect, workload balance, task priority, and limited resource constraints. Different from the existing studies, 8,24,25 constraints contained in the proposed model are more comprehensive, which are conducive to improving the effectiveness of solutions. The joint optimization of multiple constraints may reduce the solution efficiency of traditional GA. To address the issue, a concept of fuzzy elite degree considering the preservation of good genes and the change intensity of individuals is presented. Based on the concept, we propose the fuzzy elite strategy genetic algorithm (FESGA) with high computational efficiency. Specifically, a novel initialization method and a parent selection method are presented to enhance the convergence speed of algorithm. An avoiding inbreeding (AI) mechanism and a hierarchical mutation (HM) rule are proposed to solve the local extremum problem. Then, a no zero mechanism and two unlock methods are presented to deal with the infeasible solutions which violate the limited resources constraint, and the deadlock infeasible solutions, respectively. Moreover, we presented the sudden threat countermeasure (STC) mechanism to enhance the ability of algorithm to converge quickly after detecting the sudden threats.
The main contributions of this study are further concluded as follows: 1) Aiming at the optimization of resource consumption, task completion effect, and workload balance of UAV system, we propose the resource consumption function, detection revenue function, and execution capability, respectively. Further, an optimization model with multiple constraints is formulated by jointly considering the task priority and limited resource constraints. 2) We propose a concept of fuzzy elite degree to evaluate the participation of individuals in the optimization process. In the proposed FESGA, the proposed concept can rationally optimize the retention and change intensity of genes. Therefore, the convergence performance and search ability of FESGA can be improved synthetically. 3) Multiple low computational complexity and effective unlock methods are presented to solve the deadlock problem in the genetic operations. The proposed diversified unlocking ways can help the algorithm avoid being affected by local extremes.
4) The STC mechanism is presented to improve the ability of algorithm to deal with sudden threats in the changing task scenario quickly. Thus, robustness of algorithm in the various complex environments is enhanced.
The rest of this paper is organized as follows. In Section 2, the task scenario and corresponding optimization model are formulated. In Section 3, details of FESGA are introduced. Section 4 describes the methods to deal with the deadlock problem and sudden threats, respectively. Numerical simulations and analyses are provided in Section 5. Finally, Section 6 summarizes this paper.

System model and problem formulation
In this section, we describe a scenario where a heterogeneous UAV system performs multiple tasks on a set of targets. Then, the complex task assignment optimization model with multiple constraints is formulated.

System model
In this study, we consider a task scenario which consists of several targets and a group of heterogeneous UAVs. Three tasks of reconnaissance, attack, and verification should be performed successively on each target. Denote the target set as T = ft 1 , t 2 , :::, t N g, the UAV set as U = fu 1 , u 2 , :::, u M g. Where N and M denote the number of targets and UAVs, respectively. The task set of each target is I = ftask R , task A , task V g. Where task R , task A , and task V represent reconnaissance task, attack task, and verification task, respectively. Define task i 1 task k to indicate that task i has higher priority than task k , the task priority on each target is expressed as: task R 1 task A 1 task V . The UAV system is classified into two categories depending on the type of tasks that UAVs can perform, that is, U = fU Su , U St g. Thereinto, U Su includes M Su surveillance UAVs that can execute the task R and task V ; U St includes M St strike UAVs that only can execute the task A . Each UAV belongs to only one collection. All of the UAVs should return to base after completing the assigned tasks. Moreover, a state set S = fE, W, Fg is defined to describe three different states of the UAV. Elements in the state set denote the task execution state, waiting state, and flight state, respectively. State E represents that the UAV is performing the specific task. State W means that the UAV is being forced to wait for the reason that the higher priority task of the target has not been completed. State F indicates that the UAV is flying to the next destination after completing a task.
Considering that the resource of UAV is limited, each UAV should complete the assigned tasks in a limited time, the fuel consumption and traveled distance of each UAV are not allowed to exceed its maximum limit.
Total range of u i can be achieved by where d j, j Ã (i) denotes the distance of u i from t j to the next target (t j Ã ). Noting that the fuel consumption varies in different states of UAV, the total fuel consumption of u i is achieved by where fuel flight ijk , fuel wait ijk , and fuel execute ijk denote the fuel consumption of u i when flying to execute the next task from t j , waiting to execute task k on t j , and performing task k on t j , respectively. x ijk is calculated as follows: Similar to fuel consumption, the total time of u i to complete all assigned tasks can be achieved as follows: where } flight ijk , } wait ijk , and } execute ijk denote the time consumed by u i in the state F, state W , and state E, respectively. } execute ijk is predetermined by the system, } flight ijk and } wait ijk can be achieved by the following formulas: In equation (5), v i denotes the flight speed of u i , d jk, j Ã (i) denotes the distance u i needs to fly to the next target t j Ã after completing task k on t j . In equation (6), } s k (i, j) and } w k (i, j) denote the time that u i starts to execute task k (the completion time of the task with higher priority than task k ) and the time of u i to start to get stuck into waiting after reaching t j , respectively. In the multiple UAVs task assignment problem, we propose the concept of execution capability to better address the issue of workload unbalance. Execution capability is defined as the ability of UAV to continue executing tasks based on remaining resources, which is an important means to prevent UAVs from running out of resources. The more resources remain, the greater the execution capability is. When the remaining resources of UAV are sufficient, the ability of the UAV to continue executing tasks is relatively strong. In this condition, the execution capability decreases slowly. On the contrary, when the remaining resources of UAV are exhausted, the UAV is most likely to consume all resources and cannot continue executing tasks. To avoid this situation, the execution capacity should decrease sharply in this condition. Since the resource of UAV changes over time, execution capability is a timevarying concept. In this study, traveled range is considered as one of the criteria for the evaluation of execution capacity. Thus, the range-impact execution capability C range (}) is defined. Since range is inversely proportional to remaining resources, it is inversely proportional to execution capability. Thus, C range (}) of u i is defined as follows: where d i (}) and d i max represent the traveled distance at time } and the allowed maximum range of u i , respectively. k r denotes the rate at which C i range (}) varies with d i (}). The smaller k r is, the slower the rate changes. The value range of k r is: k r 2 (0, 1. In equation (7), with the increase of time }, d i (}) gradually increases, C i range (}) gradually decreases. As the value of d i (}) approaches d i max , C i range (}) drops sharply. Thus, it is reasonable to construct equation (7) based on an exponential function to express the relationship between range and execution capacity.
Naturally, C range (}) of the UAV system is calculated as The execution capability of UAV is limited due to its limited resources. The situation that traveled distance of any UAV exceeds its permitted limits, C range (}) should be regarded as invalid. In this situation, C total range (}) is set to 0. Note that resources of strike UAV are related to the number of carried weapons besides range. The weaponimpact execution capability C weapon (}) is defined. C weapon (}) of u i is defined as follows: where w i max and w i (}) denote the maximum weapon number that u i can carry and the number of weapons left in u i , respectively. k w denotes the rate at which C i weapon (}) varies with w i (}). The larger k w is, the slower the rate changes. The value range of k w is: k w 2 (0, 1. In equation (9), with the reduction of w i (}), C i weapon (}) decreases. When w i (}) is closed to 0, C i weapon (}) greatly reduces. Therefore, the exponential function in equation (9) is suitable for describing the relationship between the execution capability and the number of remaining weapons. Similar to equation (8), C weapon (}) of the UAV system can be achieved by Based on equations (7) and (9), the more residual resources UAV system has, the stronger its execution capability is. In the ideal task assignment process, UAVs with sufficient residual resources (high execution capability) should be fully utilized; UAVs with little residual resources (low execution capability) should be assigned with few tasks. In this way, the situation that some UAVs run out resources due to executing excessive tasks can be avoided, and the workload balance constraint can be satisfied. Thus, the execution capacity of UAV system is directly proportional to workload balance degree of the allocation result.
For the sake of concentrating on the main issue of this study, we make the following assumptions: (1) UAVs are not destroyed when performing tasks 25 ; (2) the actual flight distances of UAVs are replaced by Euclidean distances 7,24 ; (3) UAVs fly at different altitudes to prevent collisions between them 19 ; (4) UAV cannot execute multiple tasks simultaneously; (5) the distance that the UAV moves in the task execution state is negligible.

Problem formulation
Resource consumption function. We adopt the total traveled distance d total , total fuel consumption fuel total , and time required to complete all tasks } total as the main factors to describe the resource consumption of UAV system. The traveled distance, fuel consumption, and task execution time of a single UAV can be calculated by equations (1), (2), and (4), respectively. Therefore, d total , fuel total , and } total can be achieved by following formulas: On the premise that the three factors mentioned above are equally important, the resource consumption function can be achieved as follows: where fuel i max and } i max represent the maximum fuel capacity and the endurance time of u i , respectively.
Detection revenue function. Some existing studies assume that UAVs only can perform tasks at the target points to ensure the effective execution of tasks. 24,29 The detection scope of surveillance UAVs is not considered in these task assignment model, which may lead to unnecessary resource consumption of UAV system. 30 In Jia et al., 25 the detection scope of UAV is represented by detection radius. In the allowed detection scope, the closer UAV gets to target, the higher detection accuracy is. For the sake of quantifying the detection accuracy of UAV, the detection revenue function f revenue is proposed. Given that f revenue is proportional to detection accuracy, it is proportional to the distance between the UAV and target. Detection revenue function f revenue can be achieved by the following formula: where x ijq is a binary variable, which equals 1 when the task q on the t j is assigned to u i . Note that task q can only be reconnaissance or verification task. r ijq denotes the distance between the surveillance UAV u i and the position where task q on t j is executed. r i det ect is the detection radius of u i . Given that the task completion effect of UAV becomes better with the increase of detection accuracy, task completion effect is proportional to f revenue . Optimization model. The task assignment optimization model of heterogeneous UAV system is described as follows: s.t.
In the fitness function (equation (16)), l ra and l we indicate the range-impact execution capability flag and weapon-impact execution capability flag, respectively. They can be achieved by The denominator of fitness function is resource consumption function, and the molecule consists of detection revenue function and execution capability of the UAV system.
Equations (17) and (18) ensure that each task only can be completed by one UAV, and all tasks must be completely performed. Equation (19) is the task priority constraint, where } sta rec (j), } sta att (j), and } sta ver (j) represent the time when task R , task A , and task V begin to be performed on t j , respectively. } exe rec , } exe att , and } exe ver represent the time required to complete task R , task A , and task V , respectively. In equation (20), w i total and w i max denote the consumed weapon number of UAV and the maximum weapon number it can carry. Thus, equation (20) indicates the constraint on weapon resource of strike UAVs. In equation (21), r i denotes the distance between the UAV u i and the target during the mission. Equation (21) indicates the constraint on detection scope of surveillance UAVs. Equation (22) ensures that the task execution time, fuel consumption, and range of any UAV are limited.
Fitness f (equation (16)) represents the satisfaction of UAV system with current task assignment solution. f should decrease with the increase of resource consumption (f consume ), and increase with the improvement of task completion effect (f revenue ) and workload balance degree (C total range (}), C total weapon (})). The proposed fitness function is capable of describing these properties.
In the proposed task assignment optimization model, we jointly consider the task completion effect, workload unbalance, and other factors. Although the proposed model makes the solutions more efficient, it makes the task assignment optimization problem more complicated. Especially in the large-scale task assignment, the proposed optimization problem is more difficult to be solved.

Fuzzy elite strategy genetic algorithm
GA, a heuristic algorithm with fast random search ability, can provide good approximated solutions for the complex task assignment problem. 21,22,31 However, the traditional GA converges slowly and easily converges to the local extreme when the search space is large. Therefore, the FESGA is proposed. A simple flow chart of the proposed FESGA is illustrated in Figure 1.

Encoding
Encoding of chromosome is the most critical part of GA. 24 However, traditional encoding method cannot be directly applied to the proposed problem due to the heterogeneity of UAVs and the particularity of tasks. 8 Therefore, we propose a matrix encoding method to accommodate the task assignment background. Each chromosome is encoded by a matrix of five lines and 3N columns.
1) The encoding method of UAV chromosome: The UAV chromosome is composed of M UAV subchromosomes, a complete UAV chromosome is achieved by arranging these UAV sub-chromosomes in the order of UAV number from small to large. An encoding example of UAV chromosome is given in Figure 2. The gene (column) sequence of each UAV sub-chromosome represents the task execution order of corresponding UAV. The first three lines of chromosome represent the target number, task number, and UAV number, respectively. 26 Thereinto, the task number of each target contains 1, 2, and 3, which represent task R , task A , and task V , respectively. Each gene represents a task assignment for a specific UAV. Since all tasks are encoded as the first two lines of UAV chromosome, the encoding method satisfies the constraint that all tasks are completely performed (equation (18)). Moreover, UAVs can be assigned to the appropriate type of tasks by encoding the target, task, and UAV as the separate lines. Thus, the proposed encoding method is applicable to the proposed task assignment background.
In addition, the fourth line of UAV chromosome is the distance r between surveillance UAV and target center, the fifth line of UAV chromosome is the course angle u of the UAV. Value ranges of r and u are: r 2 ½0, r det ect , u 2 ½0, 2p. Note that the fourth line and fifth line of genes in the strike UAV sub-chromosome are 0. Encoding method of the last two lines can determine the relative position of UAVs and targets, so as to help the algorithm achieve the value of detection revenue function more conveniently.
The proposed encoding method accomplishes the efficient assignment of all tasks, and the task execution order is encoded as the gene sequences of UAV chromosome. Thus, a UAV chromosome achieved by the proposed encoding method can represent a complete task assignment scheme.
2) The encoding method of target chromosome: The target chromosome is composed of N target subchromosomes, a complete target chromosome is achieved by arranging these target subchromosomes in the order of target number from small to large. Each target sub-chromosome is encoded in a matrix of five lines and three columns. An encoding example of t 1 sub-chromosome is shown in Figure 3. In Figure 3, the meaning of each line in target chromosome is same as that in UAV chromosome. However, the order of genes in target sub-chromosome is fixed, it cannot represent the task execution order of UAVs. Therefore, different from UAV chromosome, a target chromosome cannot represent a complete task assignment scheme.

Initialization
Most of studies generate the initial population by the way of random generation. 32 The way constructs a large search space when solving complex problems, which may lead to a slow convergence speed of the algorithm. Therefore, we propose the novel initialization method for target chromosome and UAV chromosome.

1) Target chromosome initialization:
Depending on the proposed encoding method, the first two lines of target chromosome can be easily achieved. We assume that matrix formed by the first two lines of target chromosome is X t . X t = fx 1 , x 2 , :::, x 3N g, elements in X t represent the column of the matrix. Then, a column x i is randomly selected from X t , and a complete gene g i can be achieved based on x i . For the sake of describing the generation process of g i more simply and clearly, the j-th line of g i and x i are expressed as g i (j) and x i (j), respectively. If x i (2) is 1 or 3, a surveillance UAV should be selected, and its number is used as g i (3). The probability of each surveillance UAV being selected is as follows:   Afterwards, g i (4) and g i (5) are randomly generated within their range of values.
If x i (2) is 2, a strike UAV should be selected. The probability of each strike UAV being selected is as follows: , j = 1, 2, :::, M St Afterwards, both g i (4) and g i (5) are set to 0. The gene generation process should be repeated until all elements of X t are selected to achieve a complete target chromosome. Note that elements cannot be selected repeatedly.
The proposed target chromosome initialization method should be repeated n times to make the initial population size satisfy the predefined population size n.
In the process of the proposed target chromosome initialization, the achieved chromosomes can satisfy the workload balance constraint by generating genes based on the execution capability. These workload balanced chromosomes can constitute a good initial population.
Since excellent initial population can speed up the evolution process, 30 the proposed method can accelerate the convergence speed of algorithm. Especially in the complex large-scale task assignment problem, advantages of the method are more prominent.
2) UAV chromosome initialization: UAV chromosome is generated during the generation of target chromosome. Once a gene g i on a target chromosome is generated, which UAV sub-chromosome that g i belongs to should be determined according to g i (3). Suppose that the UAV sub-chromosome is u j sub-chromosome, g i should be placed behind genes which have been generated on u j sub-chromosome. For example, the randomly achieved generation sequence of genes in the target chromosome is: g 4 , g 5 , g 1 , g 3 , :::, the generation process of UAV chromosome is demonstrated in Figure 4. N UAV sub-chromosomes are achieved when all genes of the target chromosome are generated. Then, a complete UAV chromosome can be easily achieved.
In the proposed UAV initialization method, genes on the UAV chromosome correspond one to one with genes on the target chromosome. Therefore, the UAV initialization method ensures that each UAV chromosome has a unique corresponding target chromosome. In addition, the gene generation order of target chromosome is converted into the gene sequence of UAV sub-chromosome. Given that the gene sequence represents the task execution order of UAV, the generated UAV chromosomes can represent a complete assignment scheme and satisfy the encoding requirements.

Fuzzy elite degree
Elitism has a great promotion effect on GA. Convergence speed of the algorithm can be improved by selecting some elite individuals based on the fitness function value. 33 However, it may reduce the population diversity and finally cause that the algorithm falls into local extremum. Therefore, we propose the concept of fuzzy elite degree E to eliminate this drawback.
Different from elite individuals defined in traditional GA, all individuals in the proposed FESGA are elite to a certain extent. E is adopted to measure the elite degree of an individual. The fitness function value f and the times the individual appears in current iteration A are the major factors of E. Considering that the requirements of elite individuals are different in different genetic operations, we present selection fuzzy elite degree E s , crossover fuzzy elite degree E c , and mutation fuzzy elite degree E m , respectively.
Selection fuzzy elite degree E s . In the selection process of proposed FESGA, some individuals with high elite degree are selected as elite individuals. Individuals with high f are selected as elite individuals with high probability, so as to retain good genes of the good individuals. Meanwhile, individuals with few A also have the opportunity to be selected, so as to ensure the population diversity. Therefore, E s is directly proportional to f and inversely proportional to A. E s of the i-th individual is shown below: Crossover fuzzy elite degree E c . In the crossover process of proposed FESGA, individuals with higher elite degree are selected as parents with higher possibility. Parents with high f can improve the superiority of offsprings. 34 Meanwhile, the operation that parents with large A are replaced by the newly generated offsprings can increase the population diversity. Therefore, E c is directly proportional to f and A. E c of the i-th individual can be achieved in equation (28) by modifying the part of occurrence number in equation (27).
where a c 2 ½0:5, 1, b c 2 ½0, 0:5, and a c + b c = 1. l c1 is used to regulate the rate at which E i c varies with A i . l c1 2 (0, 1, and the larger l c1 is, the slower the rate changes. l c2 and l c3 is adopted to ensure that the range of part A in E c is [0, 1], their values depend on the value of l c1 . Mutation fuzzy elite degree E m . In the mutation process of proposed FESGA, individuals with lower elite degree are mutated with higher possibility and have higher mutation intensity. Similar to the E s , E m is directly proportional to f and inversely proportional to A. However, ideally, more solutions with high E m are expected to be screened out in the mutation process to destroy good genes of the good individuals as little as possible. Therefore, take f as the example, with the increase of f, E m increases slowly in the early stage and increases greatly when f increases to nearly its maximum value. Thus, we construct new type exponential function in equation (29) to define E m of the i-th individual.
where a m 2 ½0:5, 1, b m 2 ½0, 0:5, and a m + b m = 1. l m1 is used to adjust the range of part f in E m . For the sake of ensuring that the value range of part f in E m is closer to [0, 1], l m1 2 ½0:4, 0:7. And the larger l m1 is, the slower E i m changes with the change of f i . l m2 is the rate at which E i m varies with A i . l m2 2 (0, 1, the smaller l m2 is, the slower the rate changes.
Fuzzy elite degree is the core concept of the proposed FESGA. In the proposed fuzzy elite degree, the part of fitness function value can help the algorithm quickly converge by largely retaining the good genes of individuals which are closed to the optimal solution; the part of the occurrence number can prevent the algorithm from converging to local extreme by changing the genes of the individuals with more occurrences.

Selection process of FESGA
In the selection process of traditional GA, individuals which do not participate in subsequent genetic operations are defined as elite individuals. Fitness function value is the only criteria for selecting elite individuals without considering other information of the optimization process. 35 For the sake of comprehensively utilizing the effective information of optimization process and improving the performance of algorithm, we present a new selection method. Individuals involved in subsequent genetic operations are called as ordinary individuals in this study. The selection process of FESGA is shown in Algorithm 1.
As shown in Algorithm 1, the selection process of FESGA consists of two parts: elite individual selection process (the 1st to 5th statements), and ordinary individual selection process (the 6th to 11st statements). In the elite individual selection process, individuals with higher E s are selected with higher probability. Since f and A are jointly considered in E s , the abilities of the algorithm to converge fast and achieve the global optimal solution are enhanced.

Crossover process of FESGA
The essence of crossover is that the new individuals are produced through the gene recombination of parents.
In Song et al., 34 a direction-based crossover operator (DBX) was presented to enhance the convergence performance and population diversity. However, DBX only can be applied to the numerically continuous system. It is not suitable for discrete system, such as the task assignment problem. Therefore, we present a parent selection method and a one-point crossover method.
Parent selection method is divided into two parts: selection of the first parent and the second parent.
Individuals with high E c are selected as the first parent G fp with high probability. The probability that individuals are selected as G fp is shown below: Then, G fp can be achieved by roulette wheel. Considering the definition of E c , the way that selecting parent according to E c can accelerate the convergence speed of the algorithm and avoid the local extremum problem by improving the superiority and diversity of offspring generation, respectively.
For the sake of further improving search ability of the algorithm, we present the AI mechanism to choose the second parent. The details of AI mechanism are as follows.
First, a concept of elite distance Cij is proposed to describe the difference degree between any two individuals. Cij is defined as follows: Then, individuals which have longer elite distance from G fp are selected as the second parent with higher probability. Meanwhile, the probability increases slowly in the close elite distance to ensure the sufficient difference of parent generation. The selection probability of the j-th individual can be achieved by where k sp is adopted to adjust the range of P j sp . For the sake of ensuring that the value range of P j sp is [0, 1], k sp 2 ½0:4, 0:7. The larger k sp is, the slower P j sp changes with the change of Cij.
Finally, the second parent is achieved by roulette wheel.
In the selection process, more diverse offsprings can be achieved by increasing the difference between parent generation. f, the criterion to evaluate individuals, is adopted to measure the difference in solution between individuals in existing study. 32 A is the occurrence number of the individual in current iteration, it can reflect the difference between individuals during the optimization process. In the proposed AI mechanism, both the solution difference (f) and individual difference in the iteration process (A) are considered. Thus, difference considered in AI mechanism is more abundant. The AI mechanism is more suitable for complex large-scale task assignment problem.
After determining parents involved in the crossover, the proposed one-point crossover method is adopted to achieve offsprings. The crossover process of a pair of individuals is shown in Figure 5. Part 1 of Figure 5 can be summarized as following steps.
Step 1: The first two lines of parent 1 are directly passed on to nonstandard offspring 1 to ensure the integrity of the tasks.
Step 2: A crossover point are randomly set in the code string of parent 1. All genes in front of the crossover point in parent 1 are directly transmitted to nonstandard offspring 1.
Step 3: Other genes of nonstandard offspring 1 are provided from parent 2. Gene g 4 parent1 in Figure 5 is taken as an example. First, the position of gene g 4 parent1 in parent 1 (w 4 ) is recorded. Then, the gene which has the same target and task with g 4 parent1 (g 4 parent2 ) is found in parent 2. Finally, g 4 parent2 is placed at the position w 4 in nonstandard offspring 1.
In part 2 of Figure 5, nonstandard offspring 2 is achieved, and the generation process is similar to that of nonstandard offspring 1. Note that nonstandard offspring 2 is composed of genes in front of the crossover point in parent 2 and genes after the crossover point in parent 1.
In part 3 of Figure 5, the achieved nonstandard offsprings are standardized. Genes whose third line (UAV number) are same are put together to achieve the standard form of chromosomes.
In the one-point crossover method, the first two lines of parents are fully inherited to offsprings, which can guarantee that all tasks are assigned and these tasks are not repeatedly executed. Since the achieved offsprings can still represent a complete allocation scheme, the proposed one-point crossover method is suitable for multiple heterogeneous UAVs task assignment background.
The parent selection method and one-point crossover method should be repeated until nP c pairs of offsprings are achieved, where P c is the crossover probability.

Mutation process of FESGA
Mutation is helpful for the algorithm to avoid falling into local extremum. 36 In the completely random traditional mutation method, the mutation intensity of good individuals and bad individuals are same. It may cause that good individuals get worse, and bad individuals do not have mutation intensity to overstep the local extreme. Therefore, we propose the HM rule in the mutation process. Meanwhile, we present three mutation methods.

Mutation methods
(1) Change the execution sequence of tasks: randomly exchange the position of genes on any UAV subchromosome. 26 (2) Assign a different UAV to a randomly selected task: randomly select a gene, and update the third line of the gene by randomly selecting a different matching UAV based on the type of task on the gene. 25 (3) Change the location of a randomly selected surveillance UAV: randomly select a gene g m whose third line represents the surveillance UAV. Then, change the values of g m (4) and g m (5). Note that the value range of g m (4) and g m (5) are: g m (4) 2 ½0, r det ect , g m (5) 2 ½0, 2p.
A variety of different mutation methods can achieve different task allocation strategy from multiple aspects, so as to better avoid the algorithm being trapped in local extremum.

The implementation process of HM rule
Step 1: E m of all individuals are calculated by equation (29).
Step 2: Individuals which are involved in the mutation operation are selected by roulette wheel. We stipulate that individuals with higher E m participate in the mutation operation with smaller possibility to prevent the destruction of good genes in good individuals. Therefore, the probability that individuals are involved in mutation can be calculated by , i = 1, 2, :::, n À n elite ð33Þ Step 3: The elite class of the selected individual is determined based on E m . The classification criteria is exhibited in Table 1.
Step 4: In the proposed HM rule, the lower the elite class of an individual is, the greater the mutation intensity of the individual. The different mutation rules are formulated for individuals of different elite classes. The specific content is shown in Table 1.
The HM rule should be repeated until nP m individuals are generated, where P m is the mutation probability.
The proposed HM rule enhances the ability of individuals with smaller f to overstep the local extreme by giving these individuals larger mutation intensity. Thus, search ability of the algorithm is improved. In addition, the HM rule can generate a more diverse population by mutating individuals with high A. Thus, the ability of the algorithm to find the global optimum is further improved.
Note that some infeasible solutions that do not satisfy the limited resource constraint may be generated in the genetic operations, f of these infeasible solutions are 0. The existence of infeasible solutions can destroy the integrity of the population. 37 Therefore, we propose the no zero mechanism to deal with the infeasible solutions. The pseudo-code of the no zero mechanism is shown in Algorithm 2.
In Algorithm 2, the no zero mechanism converts the infeasible solutions to be feasible by coordinating the workload between UAVs. Compared with the method of directly generating new feasible solutions, 25,38 the proposed no zero mechanism can retain good genes of the infeasible chromosomes to a large extent. Thus, the feasible solutions achieved by the no zero mechanism are better than the randomly generated solutions. The mechanism can help the algorithm converge fast.

Deadlock
In the task assignment problem with task priority constraint, the UAV system may fall into deadlock. The possibility that UAV system falls into deadlock Input: an infeasible solution (chromosome) G inf = fg 1 , g 1 , :::, g 3N g; f nz (f of G inf ) Output: a feasible solution G feasible 1. While f nz = 0 2. Randomly select a gene g i from G inf 3. Achieve the task type h by g i (2) 4. Achieve a set U h consists of UAVs which can execute type h of task 5. While f nz = 0 6.
Randomly select a UAV u i from U h 7.
Update g i (3) to the number of u i 8.
Achieved a nonstandard chromosome G non feasible 9 Convert G non feasible to the standard from to achieve G feasible 10.
f nz = f of G feasible 11.
If all UAVs of U h have been selected 12.
Break 13. End 14. End 15. End increases with the increase of task scale. The deadlock status mainly includes self-lock and interlock. 32 Self-lock problem. Self-lock means that lower-priority task on a target is executed earlier than the higherpriority task on the target. 19 The self-lock problem is easy to be solved by swapping the execution order of the tasks.
Interlock problem. In most situations, the deadlock that UAV system is stuck in is interlock. In the interlocked status, multiple UAVs fall into endless waiting as they wait for each other to execute tasks. 39 A pair of corresponding UAV chromosome and target chromosome contain the information of task execution order of UAVs and targets, respectively. The state of each UAV during the mission can be determined by decoding this pair of chromosomes. When two or more UAVs are in the permanent waiting state, the UAV system gets into interlock. Since the interlock problem involves the coordinated control of multiple UAVs, it is more complex and difficult to be solved than self-lock problem. We present two unlock methods for the interlock problem.
To describe the unlock process more clearly, we define the deadlock chromosome. Each deadlocked task assignment scheme is corresponding to a unique UAV chromosome. A new chromosome can be achieved by deleting the genes carrying information about the completed tasks from the UAV chromosome. The new chromosome is the deadlock chromosome. Similar to UAV chromosome, the deadlock chromosome can be divided into several deadlock subchromosomes according to the UAV number. The first gene in each deadlock sub-chromosome is defined as the deadlock gene.
Unlock Method 1: Firstly, a deadlock gene g 1 deadlock is randomly selected. Suppose g 1 deadlock (1) indicates the target t j . Then, gene g h which contains the information of the task with the highest priority of t i is found from the deadlock chromosome. Meanwhile, the deadlock sub-chromosome where g h resides is determined. Finally, deadlock gene of the determined deadlock subchromosome switches places with g h .
Unlock Method 2: Firstly, a surveillance UAV u i that has not completed its tasks is randomly selected. A reconnaissance task task r is randomly chosen from unexecuted tasks. Suppose the gene carrying the information of task r is g c . Then, g c is moved to the position in front of the deadlock gene of u i deadlock sub-chromosome, and g c (3) is set to the number of u i .
Each unlock method is conducted with one-half probability. Note that each method is adopted to remove current deadlock status. After each unlocking, the new solution should be determined whether is deadlocked. If the solution is deadlocked, the unlock methods are adopted again. A deadlock-free solution can be achieved by repeating the above process.
Compared with the unlock methods that only exchanging the task execution order, 19,28 our proposed unlock methods can also resolve the deadlock problem by adjusting the matching relationship between UAVs and targets. Therefore, the proposed unlock methods are more diversified, they can increase the search ability of the algorithm. Moreover, compared with digraphbased unlock method, 32 fewer loops are involved in the proposed unlock methods. Thus, the proposed methods have less computation and faster unlock speed.

Algorithm 3. The implement process of STC mechanism
Input: population G init t = fG 1 t , G 2 t , :::, G n t g; time } th when detecting sudden threat Output: new population G new t = fG 1 u , G 2 u , :::, G n u g 1. Achieve the state, resource consumption, and location of each UAV at } th 2. j = 1 3. While j4n 4. Achieve a new chromosome G new t by deleting genes which contain the information of completed tasks from G j t 5. Achieve genes fg 1 per , g 2 per , :::g k per g containing information about tasks being performed 6. Achieve a matrix X new t by deleting the last three lines of G new t except for fg 1 per , g 2 per , :::g k per g 7. g 1 threat (1) = N + 1, g 1 threat (2) = 2 8. Select a strike UAV u st according to P i threat , i = 1, 2, :::, M St 9. g 1 threat (3) = the number ofu st , g 1 threat (4) = 0, g 1 threat (5) = 0 10. Add g 1 threat after the last column of X new t 11. g 2 threat (1) = N + 1, g 2 threat (2) = 3 12. Select a surveillance UAV u su according to P i threat , i = 1, 2, :::, M Su 13. g 2 threat (3) = the number ofu su , randomly generate g 2 threat (4)andg 2 threat (5) 14. Add g 2 threat after g 1 threat 15. Achieve a target chromosomeG j t 16. Achieve G j u based onG j t according to the initialization method in Section 3.2 17. j = j + 1 18. End 19. Achieve G new u Especially in the complex large-scale task scenario, the proposed unlock methods have more obvious advantages.

Task assignment with sudden threat
During the execution of scheduled tasks, UAV system may discover some unknown threats. 40 We call these threats sudden threats in this study. All sudden threats should be immediately destroyed after being detected. There are two tasks on each sudden threat: the attack task task A threat and verification task task V threat . Note that task A threat 1 task V threat . The emergence of sudden threat changes the original task environment. For the sake of making the algorithm adapt to new environment quickly, we propose the STC mechanism.
In the proposed STC mechanism, the probability of u i to execute task A threat or task V threat when detecting the sudden threat (at time } th ) can be achieved as follows: where } i w represents the remaining waiting time of u i in the waiting state, } i e represents the remaining time of u i in the task execution state to complete the task, d i (} th ) is the traveled range of u i at } th , w i (} th ) is the remained weapon number on u i at } th , d i th represents the Euclidean distance between the location of u i and sudden threat. g 1 , g 2 , g 3 , g 4 , and g 5 represent the proportion of } i w , } i e , d i (} th ), w i (} th ), and d i th in equation (34), respectively. l m is a binary variable, which equals 1 when u i has executed tasks before } th . Moreover, l 1 , l 2 , l 3 , and l 4 are binary variables. l 1 , l 2 , and l 3 are set as 1 when u i is in the waiting state, task execution state, and flight state, respectively. l 4 equals 1 only when u i is strike UAV. k th1 , k th2 , k th3 , k th4 , and k th5 denote the rate at which P i threat (} th ) varies with } i w , } i e , d i (} th ), w i (} th ), and d i th , respectively. Their value ranges are: (0, 1. For k th1 , k th2 , k th3 , and k th5 , the smaller the values of these parameters are, the slower the rate changes. But for k th4 , the larger the value is, the slower the rate changes.

Simulation results
In this section, we evaluate the search ability and convergence speed of algorithms via extensive numerical simulations. Specifically, we consider a small-scale task assignment scenario (three targets and three UAVs) and a large-scale task assignment scenario (seven targets and four UAVs) in the simulations. The superiority of proposed algorithms is validated through the simulation in comparison with the variants of GA (modified genetic algorithm (GA), 25 DGA, 26 co-evolutionary multi-population genetic algorithm (CMGA), 22 modified genetic algorithm combined with greedy strategy (MGGS) 23 ) and other optimization algorithms (particle swarm optimization algorithm based on guidance mechanism (GMPSO), 20 artificial bee colony (ABC) algorithm, 21 and enumeration method). The effectiveness of proposed algorithm is confirmed by analyzing the typical solutions. All numerical simulations were conducted under the MATLAB environment (i.e. MATLAB 2014, Intel Core i5-8400 CUP@2.80 GHz).
In the simulations, parameters of UAV system and targets are shown in Tables 2 and 3, respectively. The resource consumption of UAVs under different states are shown in Table 4. Moreover, parameters of the proposed FESGA are summarized in Table 5.
To indicate the computational efficiency of the proposed FESGA intuitively, we analyze the complexity of the proposed algorithm as follows. The key factors affecting the running speed of proposed FESGA are the calculation of fuzzy elite degree, genetic operations of crossover and mutation, and unlocking of deadlock solutions. The complexity of these operations depends on the population size n and maximum iteration number m max . In the worst case, all individuals need to unlock. Therefore, the complexity of the proposed FESGA can be bound by O(nm max ). Further, the calculation time comparisons are given to show the complexity. The specific comparison results are presented in Table 6 below.
To verify the universal validity of FESGA, we perform 50 Monte Carlo comparison experiments under two different task-scale scenarios. Given that strong search ability can help the algorithm overstep the local extremum and find good solution, the average of the optimal fitness value achieved by algorithms in the Monte Carlo comparison experiments ave(f best ) and the error between the obtained result and the optimal solution err = ave(f best ) À f enu best =f enu best are taken as the criteria to judge the search ability of algorithms. Where f enu best is the optimal solution obtained by the enumeration method. In addition, the number of iterations required to converge to a stable level m stable and the calculation time G are adopted to measure the rapidity of algorithms. The comparison results are illustrated in Table 6. As shown in Table 6, in the small-scale task scenario, err of the presented FESGA is 0. It means that FESGA can converge to the global optimal quickly. In the large-scale task scenario, only err of the enumeration method equals 0. As a brute force method, the enumeration method can find the global optimal solution at all costs, but it is not suitable for practical applications due to the large amount of calculation time and cost. In addition to the enumeration method, FESGA has the smallest err compared with other heuristic algorithms. Therefore, the proposed FESGA can find high-quality suboptimal solutions in limited running time. It shows strong searching ability. In addition, only CMGA and GA are slightly better than the proposed FESGA as for the calculation time (G). But the small reduction in running time comes at the expense of algorithm accuracy. Meanwhile, GMPSO converges to the stable level in the fastest way by comparing m stable of all algorithms. Nevertheless, err of GMPSO is too large to provide satisfactory task assignment schemes. The presented FESGA has the smallest m stable except GMPSO, it can provide good enough solutions while exhibiting the characteristic of fast convergence.
Generally, the convergence speed of algorithms is judged by m stable . As shown in Figures 6 and 7, in any task scales, the four algorithms with the fastest convergence speed are arranged in order: GMPSO, FESGA, ABC, and MGGS. The differences in convergence performance of other algorithms are not obvious. Although the convergence speed of GMPSO is faster than that of the proposed FESGA, the results obtained by GMPSO are inferior to those obtained by FESGA. In addition, Figures 6 and 7 show that FESGA can quickly obtain the global optimal solution in small-scale task scenario, and the result obtained in large-scale task scenario is similar to the global optimal solution, which is obtained by enumeration method. Therefore, the optimization effect of FESGA is verified. Figures 6 and 7 indicate that the comprehensive performance of proposed FESGA is superior to other algorithms in any task scales. First, FESGA is slightly inferior to GMPSO in terms of convergence speed. This is because that GMPSO effectively uses the global information to search the current optimal solution space. However, GMPSO is easy to fall into the local extremum due to the over-dependence of current optimal solution. Compared with other algorithms, the proposed FESGA shows the fastest convergence speed. It benefits from the high-quality population obtained by the proposed initialization method. In addition, as shown in Figures 6 and 7, FESGA shows obvious advantages in searching ability than other algorithms. Unlike GMPSO and ABC, the variants of GA can better explore the solution space by the mutation operation. However, the inflexible genetic operation intensity may lead to the insufficient searching strength in the later stage of algorithms. Compared with other algorithms, the great advantage of FESGA lies in the proposed concept of fuzzy elite degree (E s , E c , E m ). The fuzzy elite degree balances the contradiction between fast converge speed and strong search ability by optimizing the retention of excellent genes and the change of individuals. Meanwhile, the presented HM rule set sufficient mutation intensity for poor individuals to further increase the probability of overstepping the local extremum. The superiority of the proposed FESGA in terms of convergence speed and searching ability are verified in Figures 6 and 7.  In one case of the large-scale task scenario, a solution achieved by FESGA is taken as an example to verify the effectiveness of FESGA. The approximate trajectory of each UAV under the achieved solution is demonstrated in Figure 8. Then, we analyze the feasibility of the solution from two aspects of task priority constraint and workload balance constraint.

The satisfied task priority constraint
The information of task execution order is extracted from Figure 8. Then, the task sequence of UAV system is given in Figure 9. The timeline in Figure 9 starts with the beginning of task execution and ends with the completion of all tasks. The dotted orange line corresponds to the time when all tasks on each target are completed. For each UAV, the flight time required to reach the next target, task execution time and synchronous waiting time are represented by blue, red, and green, respectively. The number of target that UAV reaches and the task to be executed are shown at the end of the blue rectangle. In Figure 9, task execution order of all targets are: task R , task A , and task V . That is, tasks on all targets are performed in order of priority from high to low. Thus, the effectiveness of FESGA in task priority constraint is verified. The proposed algorithm can reasonably plan the task order based on the task priority.

The satisfied workload balance constraint
Define an equalization coefficient z to evaluate the workload balance degree of the task assignment scheme. The equalization coefficient of u i is expressed as follows: Where l = 1, u i is a strike UAV 0, others ð36Þ r 1 + r 2 + lr 3 = 1 ð37Þ In equation (35), z i reflects the proportion of consumed resources in the maximum consumable resources. If there are no significant difference found among z of different UAVs, we can consider that this scheme satisfies the workload balance constraint. Nevertheless, given that the value of l corresponding to different types of UAVs is different, only z of the same type of UAVs can be compared. The evaluation results of the workload balance degree of UAV system is shown in Table 7.
In Table 7, a z and v z are the average and variance of z of the same type of UAVs, respectively. Since v z of surveillance UAV and strike UAV are both less than 1%, we can draw the conclusion that the solution satisfies the workload balance constraint. Therefore, the proposed FESGA can reasonably allocate tasks and plan the proportion of resources according to the airborne resources of UAVs.
The above experiments mainly compare the performance of algorithms in the static task scenario. To verify the wide adaptability of proposed FESGA and the superiority of proposed STC mechanism in dealing with sudden threat, we introduce sudden threat in the original task scenarios. Then, the comparison study on the optimization process of ABC, GMPSO, GA, DGA, CMGA, MGGS, FESGA, and FESGA with STC mechanism are demonstrated. The comparison results are indicated in Figures 10 and 11.
The focus of our study is the optimization process of the algorithm after detecting the sudden threat. Therefore, in the optimization process without sudden threat, we only show the last 50 iterations in Figures 10  and 11. In the simulation of small-scale and large-scale task scenarios, the sudden threat is detected at m = 700 and m = 3000, respectively. Changes in the resources, state and location of UAVs caused by the sudden threat will decrease the fitness function value, and the value decreases more obviously in large-scale task scenario. This is because that targets are more widely distributed in large-scale task scenario, more resources are consumed when dispatching UAVs to destroy the sudden threat. Task scenario with sudden threats has higher requirement on rapidity. Thus, we focus on the comparison of the rapidity performance of algorithms. Indicators G and m stable can measure the rapidity of algorithms in two aspects of calculation time and convergence speed, respectively. Where m stable can be obtained from Figures 10 and 11. The comparison results are indicated in Table 8.
As shown in Table 8, both G and m stable of FESGA with STC mechanism are the minimum under different task scales. Therefore, the proposed STC mechanism can greatly improve the calculation time and convergence performance of FESGA in both small-scale and large-scale task scenarios. This is because the proposed  STC mechanism can make full use of the feedback information of the sudden threat and UAV system, and help the algorithm rapidly adjust the allocation scheme. Thus, many excellent solutions can be achieved in a short time, convergence speed of the algorithm is accelerated.

Conclusion
In this study, we focus on the complex task assignment problem of heterogeneous UAV system with multiple constraints. The optimization model is formulated based on the comprehensive consideration of the UAV resource consumption, task completion effect, workload balance, task priority, and limited resources. The concept of fuzzy elite degree is proposed to optimize the retention and change intensity of genes, so as to improve the efficiency of the algorithm. Based on the concept, the FESGA is presented to assign tasks to heterogeneous UAV system. In addition, two unlock   methods are presented to deal with the deadlock solutions appearing in the optimization process. Then, the STC mechanism is proposed to help the algorithm converge quickly in the complex changing task scenario with sudden threats. Finally, the comparative results indicate that the proposed algorithm has significant search ability and convergence performance. Especially in large-scale task scenarios, advantages of the algorithm are more obvious.

Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.