152 research outputs found

    Motion Planning of UAV Swarm: Recent Challenges and Approaches

    Get PDF
    The unmanned aerial vehicle (UAV) swarm is gaining massive interest for researchers as it has huge significance over a single UAV. Many studies focus only on a few challenges of this complex multidisciplinary group. Most of them have certain limitations. This paper aims to recognize and arrange relevant research for evaluating motion planning techniques and models for a swarm from the viewpoint of control, path planning, architecture, communication, monitoring and tracking, and safety issues. Then, a state-of-the-art understanding of the UAV swarm and an overview of swarm intelligence (SI) are provided in this research. Multiple challenges are considered, and some approaches are presented. Findings show that swarm intelligence is leading in this era and is the most significant approach for UAV swarm that offers distinct contributions in different environments. This integration of studies will serve as a basis for knowledge concerning swarm, create guidelines for motion planning issues, and strengthens support for existing methods. Moreover, this paper possesses the capacity to engender new strategies that can serve as the grounds for future work

    Defensive swarm: an agent-based modeling analysis

    Get PDF
    Security at remote military bases is a difficult, yet critical, mission. Remote locations are generally closer to enemy combatants and farther from supporting forces; the individuals charged with defending the bases do so with less equipment. These locations are also usually reliant on air-resupply missions to maintain mission readiness and effectiveness. This thesis analyzes how swarms of small autonomous unmanned aerial vehicles (UAVs) could assist in defensive operations. To accomplish this, I created an agent-based computer simulation model, which creates a tactical problem (enemies attempting to attack or infiltrate a notional base) that a swarm of UAVs attempts to defend against. Results indicate that a swarm can effectively deter 95% of attackers if each UAV is responsible for covering no more than 0.18 square miles and at least 40% of the UAVs are armed. I conclude that UAVs are an excellent addition to base defense and are particularly helpful at remote outposts with less organic capability (limited field of view, defensive assets, etc.). While this research deals specifically with countering a threat to a central base, the algorithms for swarm dynamics could be applied to future problems in mobile convoy or aircraft defense, and even peacetime applications like search and rescue.http://archive.org/details/defensiveswarmng1094556777Major, United States Air ForceApproved for public release; distribution is unlimited

    Security, privacy and safety evaluation of dynamic and static fleets of drones

    Get PDF
    Inter-connected objects, either via public or private networks are the near future of modern societies. Such inter-connected objects are referred to as Internet-of-Things (IoT) and/or Cyber-Physical Systems (CPS). One example of such a system is based on Unmanned Aerial Vehicles (UAVs). The fleet of such vehicles are prophesied to take on multiple roles involving mundane to high-sensitive, such as, prompt pizza or shopping deliveries to your homes to battlefield deployment for reconnaissance and combat missions. Drones, as we refer to UAVs in this paper, either can operate individually (solo missions) or part of a fleet (group missions), with and without constant connection with the base station. The base station acts as the command centre to manage the activities of the drones. However, an independent, localised and effective fleet control is required, potentially based on swarm intelligence, for the reasons: 1) increase in the number of drone fleets, 2) number of drones in a fleet might be multiple of tens, 3) time-criticality in making decisions by such fleets in the wild, 4) potential communication congestions/lag, and 5) in some cases working in challenging terrains that hinders or mandates-limited communication with control centre (i.e., operations spanning long period of times or military usage of such fleets in enemy territory). This self-ware, mission-focused and independent fleet of drones that potential utilises swarm intelligence for a) air-traffic and/or flight control management, b) obstacle avoidance, c) self-preservation while maintaining the mission criteria, d) collaboration with other fleets in the wild (autonomously) and e) assuring the security, privacy and safety of physical (drones itself) and virtual (data, software) assets. In this paper, we investigate the challenges faced by fleet of drones and propose a potential course of action on how to overcome them.Comment: 12 Pages, 7 Figures, Conference, The 36th IEEE/AIAA Digital Avionics Systems Conference (DASC'17

    Unmanned systems interoperability standards

    Get PDF
    Over the past several years, there has been rapid growth in the development and employment of unmanned systems in military and civilian endeavors. Some military organizations have expressed concern that these systems are being fielded without sufficient capabilities to interoperate with existing systems. Despite recognition of this requirement, interoperability efforts remain diverse and disjointed across the United States and internationally. The Naval Postgraduate School (NPS), Monterey, California, was sponsored by the U.S. Office of the Secretary of Defense (OSD) Joint Ground Robotics Enterprise (JGRE) in Fiscal Year 2016 (FY16) to explore (1) enhancement of robotics education; (2) improved representation of robotic systems in combat simulations; and (3) interoperability standards for military robotics systems. This report discusses work performed in FY16 to identify current and emerging interoperability standards for unmanned systems, including interactions of robotic systems with command and control (C2) and simulation systems. The investigation included assessment of the applicability of standardization activities in the Simulation Interoperability Standards Organization (SISO) in its development of the Phase 1 Coalition Battle Management Language (C-BML) and currently in-progress Command and Control Systems - Simulation Systems Interoperation (C2SIM) standardization efforts. The report provides a recommended approach, standards, activities, and timetable for a cross-system communications roadmap.Secretary of Defense Joint Ground Robotics Enterprise, 3090 Defense Pentagon, Room 5C756, Washington, DC 20301Office of the Secretary of Defense Joint Ground Robotics Enterprise.Approved for public release; distribution is unlimited

    Using a Semi-autonomous Drone Swarm to Support Wildfire Management – A Concept of Operations Development Study

    Get PDF
    This paper provides insights into a human factors-oriented Concept of Operations (ConOps), which can be applied for future semi-autonomous drone swarms to support the management of wildfires. The results provide, firstly, an overview of the current practices to manage wildfires in Finland. Secondly, some of the current challenges and future visions about drone usage in a wildfire situation are presented. Third, a description of the key elements of the developed future ConOps for operating a drone swarm to support the combat of wildfires is given. The ConOps has been formulated based on qualitative research, which included a literature review, seven subject matter expert interviews and a workshop with 40 professionals in the domain. Many elements of this ConOps may also be applied to a variety of other swarm robotics operations than only wildfire management. Finally, as the development of the ConOps is still in its first stage, several further avenues for research and development are proposed

    Unmanned Vehicle Systems & Operations on Air, Sea, Land

    Get PDF
    Unmanned Vehicle Systems & Operations On Air, Sea, Land is our fourth textbook in a series covering the world of Unmanned Aircraft Systems (UAS) and Counter Unmanned Aircraft Systems (CUAS). (Nichols R. K., 2018) (Nichols R. K., et al., 2019) (Nichols R. , et al., 2020)The authors have expanded their purview beyond UAS / CUAS systems. Our title shows our concern for growth and unique cyber security unmanned vehicle technology and operations for unmanned vehicles in all theaters: Air, Sea and Land – especially maritime cybersecurity and China proliferation issues. Topics include: Information Advances, Remote ID, and Extreme Persistence ISR; Unmanned Aerial Vehicles & How They Can Augment Mesonet Weather Tower Data Collection; Tour de Drones for the Discerning Palate; Underwater Autonomous Navigation & other UUV Advances; Autonomous Maritime Asymmetric Systems; UUV Integrated Autonomous Missions & Drone Management; Principles of Naval Architecture Applied to UUV’s; Unmanned Logistics Operating Safely and Efficiently Across Multiple Domains; Chinese Advances in Stealth UAV Penetration Path Planning in Combat Environment; UAS, the Fourth Amendment and Privacy; UV & Disinformation / Misinformation Channels; Chinese UAS Proliferation along New Silk Road Sea / Land Routes; Automaton, AI, Law, Ethics, Crossing the Machine – Human Barrier and Maritime Cybersecurity.Unmanned Vehicle Systems are an integral part of the US national critical infrastructure The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. Unmanned Vehicle (UV) Systems & Operations On Air, Sea, Land discusses state-of-the-art technology / issues facing U.S. UV system researchers / designers / manufacturers / testers. We trust our newest look at Unmanned Vehicles in Air, Sea, and Land will enrich our students and readers understanding of the purview of this wonderful technology we call UV.https://newprairiepress.org/ebooks/1035/thumbnail.jp

    Distributed Control of a Swarm of Autonomous Unmanned Aerial Vehicles

    Get PDF
    With the increasing use of Unmanned Aerial Vehicles (UAV)s military operations, there is a growing need to develop new methods of control and navigation for these vehicles. This investigation proposes the use of an adaptive swarming algorithm that utilizes local state information to influence the overall behavior of each individual agent in the swarm based upon the agent\u27s current position in the battlespace. In order to investigate the ability of this algorithm to control UAVs in a cooperative manner, a swarm architecture is developed that allows for on-line modification of basic rules. Adaptation is achieved by using a set of behavior coefficients that define the weight at which each of four basic rules is asserted in an individual based upon local state information. An Evolutionary Strategy (ES) is employed to create initial metrics of behavior coefficients. Using this technique, three distinct emergent swarm behaviors are evolved, and each behavior is investigated in terms of the ability of the adaptive swarming algorithm to achieve the desired emergent behavior by modifying the simple rules of each agent. Finally, each of the three behaviors is analyzed visually using a graphical representation of the simulation, and numerically, using a set of metrics developed for this investigation

    Unmanned Aircraft Systems in the Cyber Domain

    Get PDF
    Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions. This second edition discusses state-of-the-art technology issues facing US UAS designers. It focuses on counter unmanned aircraft systems (C-UAS) – especially research designed to mitigate and terminate threats by SWARMS. Topics include high-altitude platforms (HAPS) for wireless communications; C-UAS and large scale threats; acoustic countermeasures against SWARMS and building an Identify Friend or Foe (IFF) acoustic library; updates to the legal / regulatory landscape; UAS proliferation along the Chinese New Silk Road Sea / Land routes; and ethics in this new age of autonomous systems and artificial intelligence (AI).https://newprairiepress.org/ebooks/1027/thumbnail.jp
    • …
    corecore