224 research outputs found

    Information-driven persistent sensing of a non-cooperative mobile target using UAVs

    Get PDF
    This paper addresses the persistent sensing problem of moving ground targets of interest using a group of fixed wing UAVs. Especially, we aim to overcome the challenge of physical obscuration in complex mission environments. To this end, the persistent sensing problem is formulated under an optimal control framework, i.e. deploying and managing UAVs in a way maximising the visibility to the non-cooperative target.The main issue with such a persistent sensing problem is that it generally requires the knowledge of future target positions, which is uncertain. To mitigate this issue, a probabilistic map of the future target position is widely utilised. However, most of the probabilistic models use only limited information of the target. This paper proposes an innovative framework that can make the best use of all available information, not only limited information. For the validation of the feasibility, the performance of the proposed framework is tested in a Manhattan-type controlled urban environment. All the simulation tests use the same framework proposed, but utilise different level of information. The simulation results confirm that the performance of the persistent sensing significantly improves, up to 30%, when incorporating all available target information

    Resilience Model for Teams of Autonomous Unmanned Aerial Vehicles (UAV) Executing Surveillance Missions

    Get PDF
    Teams of low-cost Unmanned Aerial Vehicles (UAVs) have gained acceptance as an alternative for cooperatively searching and surveilling terrains. These UAVs are assembled with low-reliability components, so unit failures are possible. Losing UAVs to failures decreases the team\u27s coverage efficiency and impacts communication, given that UAVs are also communication nodes. Such is the case of a Flying Ad Hoc Network (FANET), where the failure of a communication node may isolate segments of the network covering several nodes. The main goal of this study is to develop a resilience model that would allow us to analyze the effects of individual UAV failures on the team\u27s performance to improve the team\u27s resilience. The proposed solution models and simulates the UAV team using Agent-Based Modeling and Simulation. UAVs are modeled as autonomous agents, and the searched terrain as a two-dimensional M x N grid. Communication between agents permits having the exact data on the transit and occupation of all cells in real time. Such communication allows the UAV agents to estimate the best alternatives to move within the grid and know the exact number of all agents\u27 visits to the cells. Each UAV is simulated as a hobbyist, fixed-wing airplane equipped with a generic set of actuators and a generic controller. Individual UAV failures are simulated following reliability Fault Trees. Each affected UAV is disabled and eliminated from the pool of active units. After each unit failure, the system generates a new topology. It produces a set of minimum-distance trees for each node (UAV) in the grid. The new trees will thus depict the rearrangement links as required after a node failure or if changes occur in the topology due to node movement. The model should generate parameters such as the number and location of compromised nodes, performance before and after the failure, and the estimated time of restitution needed to model the team\u27s resilience. The study addresses three research goals: identifying appropriate tools for modeling UAV scenarios, developing a model for assessing UAVs team resilience that overcomes previous studies\u27 limitations, and testing the model through multiple simulations. The study fills a gap in the literature as previous studies focus on system communication disruptions (i.e., node failures) without considering UAV unit reliability. This consideration becomes critical as using small, low-cost units prone to failure becomes widespread

    Aerial Drone-based System for Wildfire Monitoring and Suppression

    Full text link
    Wildfire, also known as forest fire or bushfire, being an uncontrolled fire crossing an area of combustible vegetation, has become an inherent natural feature of the landscape in many regions of the world. From local to global scales, wildfire has caused substantial social, economic and environmental consequences. Given the hazardous nature of wildfire, developing automated and safe means to monitor and fight the wildfire is of special interest. Unmanned aerial vehicles (UAVs), equipped with appropriate sensors and fire retardants, are available to remotely monitor and fight the area undergoing wildfires, thus helping fire brigades in mitigating the influence of wildfires. This thesis is dedicated to utilizing UAVs to provide automated surveillance, tracking and fire suppression services on an active wildfire event. Considering the requirement of collecting the latest information of a region prone to wildfires, we presented a strategy to deploy the estimated minimum number of UAVs over the target space with nonuniform importance, such that they can persistently monitor the target space to provide a complete area coverage whilst keeping a desired frequency of visits to areas of interest within a predefined time period. Considering the existence of occlusions on partial segments of the sensed wildfire boundary, we processed both contour and flame surface features of wildfires with a proposed numerical algorithm to quickly estimate the occluded wildfire boundary. To provide real-time situational awareness of the propagated wildfire boundary, according to the prior knowledge of the whole wildfire boundary is available or not, we used the principle of vector field to design a model-based guidance law and a model-free guidance law. The former is derived from the radial basis function approximated wildfire boundary while the later is based on the distance between the UAV and the sensed wildfire boundary. Both vector field based guidance laws can drive the UAV to converge to and patrol along the dynamic wildfire boundary. To effectively mitigate the impacts of wildfires, we analyzed the advancement based activeness of the wildfire boundary with a signal prominence based algorithm, and designed a preferential firefighting strategy to guide the UAV to suppress fires along the highly active segments of the wildfire boundary

    Unmanned Vehicle Systems & Operations on Air, Sea, Land

    Get PDF
    Unmanned Vehicle Systems & Operations On Air, Sea, Land is our fourth textbook in a series covering the world of Unmanned Aircraft Systems (UAS) and Counter Unmanned Aircraft Systems (CUAS). (Nichols R. K., 2018) (Nichols R. K., et al., 2019) (Nichols R. , et al., 2020)The authors have expanded their purview beyond UAS / CUAS systems. Our title shows our concern for growth and unique cyber security unmanned vehicle technology and operations for unmanned vehicles in all theaters: Air, Sea and Land – especially maritime cybersecurity and China proliferation issues. Topics include: Information Advances, Remote ID, and Extreme Persistence ISR; Unmanned Aerial Vehicles & How They Can Augment Mesonet Weather Tower Data Collection; Tour de Drones for the Discerning Palate; Underwater Autonomous Navigation & other UUV Advances; Autonomous Maritime Asymmetric Systems; UUV Integrated Autonomous Missions & Drone Management; Principles of Naval Architecture Applied to UUV’s; Unmanned Logistics Operating Safely and Efficiently Across Multiple Domains; Chinese Advances in Stealth UAV Penetration Path Planning in Combat Environment; UAS, the Fourth Amendment and Privacy; UV & Disinformation / Misinformation Channels; Chinese UAS Proliferation along New Silk Road Sea / Land Routes; Automaton, AI, Law, Ethics, Crossing the Machine – Human Barrier and Maritime Cybersecurity.Unmanned Vehicle Systems are an integral part of the US national critical infrastructure The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. Unmanned Vehicle (UV) Systems & Operations On Air, Sea, Land discusses state-of-the-art technology / issues facing U.S. UV system researchers / designers / manufacturers / testers. We trust our newest look at Unmanned Vehicles in Air, Sea, and Land will enrich our students and readers understanding of the purview of this wonderful technology we call UV.https://newprairiepress.org/ebooks/1035/thumbnail.jp

    Energy-Efficient UAVs Deployment for QoS-Guaranteed VoWiFi Service

    Get PDF
    This paper formulates a new problem for the optimal placement of Unmanned Aerial Vehicles (UAVs) geared towards wireless coverage provision for Voice over WiFi (VoWiFi) service to a set of ground users confined in an open area. Our objective function is constrained by coverage and by VoIP speech quality and minimizes the ratio between the number of UAVs deployed and energy efficiency in UAVs, hence providing the layout that requires fewer UAVs per hour of service. Solutions provide the number and position of UAVs to be deployed, and are found using well-known heuristic search methods such as genetic algorithms (used for the initial deployment of UAVs), or particle swarm optimization (used for the periodical update of the positions). We examine two communication services: (a) one bidirectional VoWiFi channel per user; (b) single broadcast VoWiFi channel for announcements. For these services, we study the results obtained for an increasing number of users confined in a small area of 100 m2 as well as in a large area of 10,000 m2. Results show that the drone turnover rate is related to both users’ sparsity and the number of users served by each UAV. For the unicast service, the ratio of UAVs per hour of service tends to increase with user sparsity and the power of radio communication represents 14–16% of the total UAV energy consumption depending on ground user density. In large areas, solutions tend to locate UAVs at higher altitudes seeking increased coverage, which increases energy consumption due to hovering. However, in the VoWiFi broadcast communication service, the traffic is scarce, and solutions are mostly constrained only by coverage. This results in fewer UAVs deployed, less total power consumption (between 20% and 75%), and less sensitivity to the number of served users.Junta de Andalucía Beca 2020/00000172Unión Europea FEDER 2014-202

    Optimal path planning using psychological profiling in drone-assisted missing person search

    Get PDF
    Search and rescue operations are all time-sensitive and this is especially true when searching for a vulnerable missing person, such as a child or elderly person suffering dementia. Recently, Police Scotland Air Support Unit has begun the deployment of drones to assist in missing person searches with success, although the efficacy of the search relies upon the expertise of the drone operator. In this paper, several algorithms for planning the search path are compared to determine which approach has the highest probability of finding the missing person in the shortest time. In addition to this, the use of á priori psychological profile information of the subject to create a probability map of likely locations within the search area was explored. This map is then used within a nonlinear optimization to determine the optimal flight path for a given search area and subject profile. Two optimization solvers were compared; genetic algorithms, and particle swarm optimization. Finally, the most effective algorithm was used to create a coverage path for a real-life location, for which Police Scotland Air Support Unit completed multiple test flights. The generated flight paths based on the predicted intent of the lost person were found to perform statistically better than those of the expert police operators

    Combat Network Synchronization of UCAV Formation Based on RTBA Model

    Get PDF
    The paper aims at developing an efficient method to acquire a proper UCAV formation structure with robust and synchronized features. Here we introduce the RTBA (Route Temporary Blindness Avoidance) model to keep the structure stable and the HPSO (hybrid particle swarm optimization) method is given to find an optimal synchronized formation. The major contributions include the following: (1) setting up the dynamic hierarchy topologic structure of UCAV formation; (2) the RTB phenomenon is described and the RTBA model is put forward; (3) the node choosing rules are used to keep the invulnerability of the formation and the detective information quantifying method is given to measure the effectiveness of the connected nodes; and (4) the hybrid particle swarm optimization method is given to find an optimal synchronized topologic structure. According to the related principles and models, the simulations are given in the end, and the results show that the simplification of the model is available in engineering, and the RTBA model is useful to solve the real problems in combat in some degree

    UAVs for Enhanced Communication and Computation

    Get PDF

    Distributed Control for Collective Behaviour in Micro-unmanned Aerial Vehicles

    Get PDF
    Full version unavailable due to 3rd party copyright restrictions.The work presented herein focuses on the design of distributed autonomous controllers for collective behaviour of Micro-unmanned Aerial Vehicles (MAVs). Two alternative approaches to this topic are introduced: one based upon the Evolutionary Robotics (ER) paradigm, the other one upon flocking principles. Three computer simulators have been developed in order to carry out the required experiments, all of them having their focus on the modelling of fixed-wing aircraft flight dynamics. The employment of fixed-wing aircraft rather than the omni-directional robots typically employed in collective robotics significantly increases the complexity of the challenges that an autonomous controller has to face. This is mostly due to the strict motion constraints associated with fixed-wing platforms, that require a high degree of accuracy by the controller. Concerning the ER approach, the experimental setups elaborated have resulted in controllers that have been evolved in simulation with the following capabilities: (1) navigation across unknown environments, (2) obstacle avoidance, (3) tracking of a moving target, and (4) execution of cooperative and coordinated behaviours based on implicit communication strategies. The design methodology based upon flocking principles has involved tests on computer simulations and subsequent experimentation on real-world robotic platforms. A customised implementation of Reynolds’ flocking algorithm has been developed and successfully validated through flight tests performed with the swinglet MAV. It has been notably demonstrated how the Evolutionary Robotics approach could be successfully extended to the domain of fixed-wing aerial robotics, which has never received a great deal of attention in the past. The investigations performed have also shown that complex and real physics-based computer simulators are not a compulsory requirement when approaching the domain of aerial robotics, as long as proper autopilot systems (taking care of the ”reality gap” issue) are used on the real robots.EOARD (European Office of Aerospace Research & Development), euCognitio

    Multi-Level Multi-Objective Programming and Optimization for Integrated Air Defense System Disruption

    Get PDF
    The U.S. military\u27s ability to project military force is being challenged. This research develops and demonstrates the application of three respective sensor location, relocation, and network intrusion models to provide the mathematical basis for the strategic engagement of emerging technologically advanced, highly-mobile, Integrated Air Defense Systems. First, we propose a bilevel mathematical programming model for locating a heterogeneous set of sensors to maximize the minimum exposure of an intruder\u27s penetration path through a defended region. Next, we formulate a multi-objective, bilevel optimization model to relocate surviving sensors to maximize an intruder\u27s minimal expected exposure to traverse a defended border region, minimize the maximum sensor relocation time, and minimize the total number of sensors requiring relocation. Lastly, we present a trilevel, attacker-defender-attacker formulation for the heterogeneous sensor network intrusion problem to optimally incapacitate a subset of the defender\u27s sensors and degrade a subset of the defender\u27s network to ultimately determine the attacker\u27s optimal penetration path through a defended network
    • …
    corecore