期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Research on multi-view collaborative detection system for UAV swarms based on Pix2Pix framework and BAM attention mechanism
1
作者 Yan Ding Qingxin Cao +2 位作者 Bozhi Zhang Peilin Li Zhongjiao Shi 《Defence Technology(防务技术)》 2025年第4期213-226,共14页
Drone swarm systems,equipped with photoelectric imaging and intelligent target perception,are essential for reconnaissance and strike missions in complex and high-risk environments.They excel in information sharing,an... Drone swarm systems,equipped with photoelectric imaging and intelligent target perception,are essential for reconnaissance and strike missions in complex and high-risk environments.They excel in information sharing,anti-jamming capabilities,and combat performance,making them critical for future warfare.However,varied perspectives in collaborative combat scenarios pose challenges to object detection,hindering traditional detection algorithms and reducing accuracy.Limited angle-prior data and sparse samples further complicate detection.This paper presents the Multi-View Collaborative Detection System,which tackles the challenges of multi-view object detection in collaborative combat scenarios.The system is designed to enhance multi-view image generation and detection algorithms,thereby improving the accuracy and efficiency of object detection across varying perspectives.First,an observation model for three-dimensional targets through line-of-sight angle transformation is constructed,and a multi-view image generation algorithm based on the Pix2Pix network is designed.For object detection,YOLOX is utilized,and a deep feature extraction network,BA-RepCSPDarknet,is developed to address challenges related to small target scale and feature extraction challenges.Additionally,a feature fusion network NS-PAFPN is developed to mitigate the issue of deep feature map information loss in UAV images.A visual attention module(BAM)is employed to manage appearance differences under varying angles,while a feature mapping module(DFM)prevents fine-grained feature loss.These advancements lead to the development of BA-YOLOX,a multi-view object detection network model suitable for drone platforms,enhancing accuracy and effectively targeting small objects. 展开更多
关键词 Drone swarm systems Reconnaissance and strike Image generation Multi-view detection Pix2Pix framework Attention mechanism
在线阅读 下载PDF
Intelligent obstacle avoidance algorithm for safe urban monitoring with autonomous mobile drones 被引量:1
2
作者 Didar Yedilkhan Abzal E.Kyzyrkanov +2 位作者 Zarina A.Kutpanova Shadi Aljawarneh Sabyrzhan K.Atanov 《Journal of Electronic Science and Technology》 EI CAS CSCD 2024年第4期19-36,共18页
The growing field of urban monitoring has increasingly recognized the potential of utilizing autonomous technologies,particularly in drone swarms.The deployment of intelligent drone swarms offers promising solutions f... The growing field of urban monitoring has increasingly recognized the potential of utilizing autonomous technologies,particularly in drone swarms.The deployment of intelligent drone swarms offers promising solutions for enhancing the efficiency and scope of urban condition assessments.In this context,this paper introduces an innovative algorithm designed to navigate a swarm of drones through urban landscapes for monitoring tasks.The primary challenge addressed by the algorithm is coordinating drone movements from one location to another while circumventing obstacles,such as buildings.The algorithm incorporates three key components to optimize the obstacle detection,navigation,and energy efficiency within a drone swarm.First,the algorithm utilizes a method to calculate the position of a virtual leader,acting as a navigational beacon to influence the overall direction of the swarm.Second,the algorithm identifies observers within the swarm based on the current orientation.To further refine obstacle avoidance,the third component involves the calculation of angular velocity using fuzzy logic.This approach considers the proximity of detected obstacles through operational rangefinders and the target’s location,allowing for a nuanced and adaptable computation of angular velocity.The integration of fuzzy logic enables the drone swarm to adapt to diverse urban conditions dynamically,ensuring practical obstacle avoidance.The proposed algorithm demonstrates enhanced performance in the obstacle detection and navigation accuracy through comprehensive simulations.The results suggest that the intelligent obstacle avoidance algorithm holds promise for the safe and efficient deployment of autonomous mobile drones in urban monitoring applications. 展开更多
关键词 Drone swarms Fuzzy logic Intelligent solution Smart city Urban monitoring
在线阅读 下载PDF
Efficient Remote Identification for Drone Swarms 被引量:1
3
作者 Kang-Moon Seo Jane Kim +2 位作者 Soojin Lee Jun-WooKwon Seung-Hyun Seo 《Computers, Materials & Continua》 SCIE EI 2023年第9期2937-2958,共22页
With the advancement of unmanned aerial vehicle(UAV)technology,the market for drones and the cooperation of many drones are expanding.Drone swarms move together in multiple regions to perform their tasks.A Ground Cont... With the advancement of unmanned aerial vehicle(UAV)technology,the market for drones and the cooperation of many drones are expanding.Drone swarms move together in multiple regions to perform their tasks.A Ground Control Server(GCS)located in each region identifies drone swarmmembers to prevent unauthorized drones from trespassing.Studies on drone identification have been actively conducted,but existing studies did not consider multiple drone identification environments.Thus,developing a secure and effective identification mechanism for drone swarms is necessary.We suggested a novel approach for the remote identification of drone swarms.For an efficient identification process between the drone swarm and the GCS,each Reader drone in the region collects the identification information of the drone swarmand submits it to the GCS for verification.The proposed identification protocol reduces the verification time for a drone swarm by utilizing batch verification to verify numerous drones in a drone swarmsimultaneously.To prove the security and correctness of the proposed protocol,we conducted a formal security verification using ProVerif,an automatic cryptographic protocol verifier.We also implemented a non-flying drone swarmprototype usingmultiple Raspberry Pis to evaluate the proposed protocol’s computational overhead and effectiveness.We showed simulation results regarding various drone simulation scenarios. 展开更多
关键词 Drone remote identification drone swarms multi-drone authentication
在线阅读 下载PDF
A Secure Communication Framework for Drone Swarms in Autonomous Surveillance Operations
4
作者 Ahad Alotaibi Chris Chatwin Phil Birch 《Journal of Computer and Communications》 2024年第11期1-25,共25页
Drones have become indispensable tools in various domains, from surveillance and environmental monitoring to disaster response and communication relay. However, their growing use in critical missions necessitates robu... Drones have become indispensable tools in various domains, from surveillance and environmental monitoring to disaster response and communication relay. However, their growing use in critical missions necessitates robust security measures to protect against potential threats and ensure the integrity of operations. This research presents a novel secure architecture for a swarm of drones deployed on surveillance missions. Leveraging a reliable foundation established through Delaunay triangulation for communication among drones, this work introduces advanced security protocols to enhance the protection and integrity of the network. The architecture employs a mesh network topology connecting six drones, each configured for specific surveillance tasks, including perimeter monitoring, area scanning, thermal imaging, traffic observation, communication relay, and incident response. The mesh network design ensures extended coverage, redundancy, load balancing, and self-configuration, significantly improving reliability and resilience. Security validation was conducted using GNS3 and Ettercap, simulating various vulnerability scenarios. Comparative performance analysis between a classic drone network and the proposed secure mesh network demonstrates superior traffic management and robustness against potential attacks. The results underscore the architecture’s suitability for secure and reliable operations in critical surveillance environments. 展开更多
关键词 Drone swarm Security Mesh Network Architecture Surveillance Missions Vulnerability Testing GNS3 Simulation
在线阅读 下载PDF
Intelligent situation awareness:Redefining cognitive paradigms in aerospace domain
5
作者 Chunxiao YANG Yafei SONG Gang WANG 《Chinese Journal of Aeronautics》 2025年第6期1-2,共2页
In the third decade of the 21st century,the aerospace field is evolving at an unprecedented pace towards intelligence and autonomy.As competition for space resource development intensifies,breakthroughs in near-space ... In the third decade of the 21st century,the aerospace field is evolving at an unprecedented pace towards intelligence and autonomy.As competition for space resource development intensifies,breakthroughs in near-space vehicle technology emerge,and the concept of drone swarm warfare matures,traditional rule-based and experience-driven battlefield situation awareness models are struggling to meet the demands of complex adversarial environments.This special issue brings together the latest research findings from fields such as computer science and technology,electronic engineering,and cognitive science,systematically exploring the cognitive revolution driven by the deep integration of next-generation artificial intelligence and aerospace engineering,all centered around the core theme of"Intelligent Situation Awareness"(ISA). 展开更多
关键词 intelligent situation awareness space resource development aerospace engineering intelligence autonomyas deep integration next generation artificial intelligence drone swarm warfare aerospace field
原文传递
A Survey on Sensor-and Communication-Based Issues of Autonomous UAVs
6
作者 Pavlo Mykytyn Marcin Brzozowski +1 位作者 Zoya Dyka Peter Langendoerfer 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1019-1050,共32页
The application field for Unmanned Aerial Vehicle (UAV) technology and its adoption rate have been increasingsteadily in the past years. Decreasing cost of commercial drones has enabled their use at a scale broader th... The application field for Unmanned Aerial Vehicle (UAV) technology and its adoption rate have been increasingsteadily in the past years. Decreasing cost of commercial drones has enabled their use at a scale broader thanever before. However, increasing the complexity of UAVs and decreasing the cost, both contribute to a lack ofimplemented securitymeasures and raise new security and safety concerns. For instance, the issue of implausible ortampered UAV sensor measurements is barely addressed in the current research literature and thus, requires moreattention from the research community. The goal of this survey is to extensively review state-of-the-art literatureregarding common sensor- and communication-based vulnerabilities, existing threats, and active or passive cyberattacksagainst UAVs, as well as shed light on the research gaps in the literature. In this work, we describe theUnmanned Aerial System (UAS) architecture to point out the origination sources for security and safety issues.Weevaluate the coverage and completeness of each related research work in a comprehensive comparison table as wellas classify the threats, vulnerabilities and cyber-attacks into sensor-based and communication-based categories.Additionally, for each individual cyber-attack, we describe existing countermeasures or detectionmechanisms andprovide a list of requirements to ensureUAV’s security and safety.We also address the problem of implausible sensormeasurements and introduce the idea of a plausibility check for sensor data. By doing so, we discover additionalmeasures to improve security and safety and report on a research niche that is not well represented in the currentresearch literature. 展开更多
关键词 Unmanned aerial vehicle unmanned aerial system cyber security and privacy drone swarm security vulnerabilities cyber-threats cyber-attacks plausibility check
在线阅读 下载PDF
DeepSwarm:towards swarm deep learning with bi-directional optimization of data acquisition and processing
7
作者 Sicong LIU Bin GUO +4 位作者 Ziqi WANG Lehao WANG Zimu ZHOU Xiaochen LI Zhiwen YU 《Frontiers of Computer Science》 2025年第3期125-127,共3页
1 Introduction On-device deep learning(DL)on mobile and embedded IoT devices drives various applications[1]like robotics image recognition[2]and drone swarm classification[3].Efficient local data processing preserves ... 1 Introduction On-device deep learning(DL)on mobile and embedded IoT devices drives various applications[1]like robotics image recognition[2]and drone swarm classification[3].Efficient local data processing preserves privacy,enhances responsiveness,and saves bandwidth.However,current ondevice DL relies on predefined patterns,leading to accuracy and efficiency bottlenecks.It is difficult to provide feedback on data processing performance during the data acquisition stage,as processing typically occurs after data acquisition. 展开更多
关键词 drone swarm classification efficient local data processing data processing deep learning dl device deep learning bi-directional optimization iot devices swarm deep learning
原文传递
Optimization of Air Defense System Deployment Against Reconnaissance Drone Swarms 被引量:1
8
作者 Ning Li Zhenglian Su +2 位作者 Haifeng Ling Mumtaz Karatas Yujun Zheng 《Complex System Modeling and Simulation》 2023年第2期102-117,共16页
Due to their advantages in flexibility,scalability,survivability,and cost-effectiveness,drone swarms have been increasingly used for reconnaissance tasks and have posed great challenges to their opponents on modern ba... Due to their advantages in flexibility,scalability,survivability,and cost-effectiveness,drone swarms have been increasingly used for reconnaissance tasks and have posed great challenges to their opponents on modern battlefields.This paper studies an optimization problem for deploying air defense systems against reconnaissance drone swarms.Given a set of available air defense systems,the problem determines the location of each air defense system in a predetermined region,such that the cost for enemy drones to pass through the region would be maximized.The cost is calculated based on a counterpart drone path planning problem.To solve this adversarial problem,we first propose an exact iterative search algorithm for small-size problem instances,and then propose an evolutionary framework that uses a specific encoding-decoding scheme for large-size problem instances.We implement the evolutionary framework with six popular evolutionary algorithms.Computational experiments on a set of different test instances validate the effectiveness of our approach for defending against reconnaissance drone swarms. 展开更多
关键词 drone swarms anti-drone air defense systems deployment optimization evolutionary algorithms
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部