首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 625 毫秒
1.
The emergence of Beyond 5G (B5G) and 6G networks translated personal and industrial operations highly effective, reliable, and gainful by speeding up the growth of next generation Internet of Things (IoT). Industrial equipment in 6G encompasses a huge number of wireless sensors, responsible for collecting massive quantities of data. At the same time, 6G network can take real-world intelligent decisions and implement automated equipment operations. But the inclusion of different technologies into the system increased its energy consumption for which appropriate measures need to be taken. This has become mandatory for optimal resource allocation in 6G-enabled industrial applications. In this scenario, the current research paper introduces a new metaheuristic resource allocation strategy for cluster-based 6G industrial applications, named MRAS-CBIA technique. MRAS-CBIA technique aims at accomplishing energy efficiency and optimal resource allocation in 6G-enabled industrial applications. The proposed MRAS-CBIR technique involves three major processes. Firstly, Weighted Clustering Technique (WCT) is employed to elect the optimal Cluster Heads (CHs) or coordinating agents with the help of three parameters namely, residual energy, distance, and node degree. Secondly, Decision Tree-based Location Prediction (DTLP) mechanism is applied to determine the exact location of Management Agent (MA). Finally, Fuzzy C-means with Tunicate Swarm Algorithm (FCM-TSA) is used for optimal resource allocation in 6G industrial applications. The performance of the proposed MRAS-CBIA technique was validated and the results were examined under different dimensions. The resultant experimental values highlighted the superior performance of MRAS-CBIR technique over existing state-of-the-art methods.  相似文献   

2.
Emerging technologies such as edge computing, Internet of Things (IoT), 5G networks, big data, Artificial Intelligence (AI), and Unmanned Aerial Vehicles (UAVs) empower, Industry 4.0, with a progressive production methodology that shows attention to the interaction between machine and human beings. In the literature, various authors have focused on resolving security problems in UAV communication to provide safety for vital applications. The current research article presents a Circle Search Optimization with Deep Learning Enabled Secure UAV Classification (CSODL-SUAVC) model for Industry 4.0 environment. The suggested CSODL-SUAVC methodology is aimed at accomplishing two core objectives such as secure communication via image steganography and image classification. Primarily, the proposed CSODL-SUAVC method involves the following methods such as Multi-Level Discrete Wavelet Transformation (ML-DWT), CSO-related Optimal Pixel Selection (CSO-OPS), and signcryption-based encryption. The proposed model deploys the CSO-OPS technique to select the optimal pixel points in cover images. The secret images, encrypted by signcryption technique, are embedded into cover images. Besides, the image classification process includes three components namely, Super-Resolution using Convolution Neural Network (SRCNN), Adam optimizer, and softmax classifier. The integration of the CSO-OPS algorithm and Adam optimizer helps in achieving the maximum performance upon UAV communication. The proposed CSODL-SUAVC model was experimentally validated using benchmark datasets and the outcomes were evaluated under distinct aspects. The simulation outcomes established the supreme better performance of the CSODL-SUAVC model over recent approaches.  相似文献   

3.
Many extensive UAV communication networks have used UAV cooperative control. Wireless networking services can be offered using unmanned aerial vehicles (UAVs) as aerial base stations. Not only is coverage maximization, but also better connectivity, a fundamental design challenge that must be solved. The number of applications for unmanned aerial vehicles (UAVs) operating in unlicensed bands is fast expanding as the Internet of Things (IoT) develops. Those bands, however, have become overcrowded as the number of systems that use them grows. Cognitive Radio (CR) and spectrum allocation approaches have emerged as a potential approach for resolving spectrum scarcity in wireless networks, and hence as technological solutions for future generations, from this perspective. As a result, combining CR with UAVs has the potential to give significant benefits for large-scale UAV deployment. The paper examines existing research on the subject of UAV covering and proposes a multi-UAV cognitive-based error-free model for energy-efficient communication. Coverage maximization, power control, and enhanced connection quality are the three steps of the proposed model. To satisfy the desired signal-to-noise ratio, the covering zone efficacy is investigated as a function of the distance among UAVs stationed in a specific geographic region depending on multiple deployment configurations like as rural, suburban, and urban macro deployment scenarios of the ITU-R M.2135 standard (SNR).  相似文献   

4.
Mobile edge cloud networks can be used to offload computationally intensive tasks from Internet of Things (IoT) devices to nearby mobile edge servers, thereby lowering energy consumption and response time for ground mobile users or IoT devices. Integration of Unmanned Aerial Vehicles (UAVs) and the mobile edge computing (MEC) server will significantly benefit small, battery-powered, and energy-constrained devices in 5G and future wireless networks. We address the problem of maximising computation efficiency in U-MEC networks by optimising the user association and offloading indicator (OI), the computational capacity (CC), the power consumption, the time duration, and the optimal location planning simultaneously. It is possible to assign some heavy tasks to the UAV for faster processing and small ones to the mobile users (MUs) locally. This paper utilizes the k-means clustering algorithm, the interior point method, and the conjugate gradient method to iteratively solve the non-convex multi-objective resource allocation problem. According to simulation results, both local and offloading schemes give optimal solution.  相似文献   

5.
The paper proposes a technique for the development of "optimal" transit route networks (for example, a bus route network) given the information on link travel times and transit demand. The proposed method, unlike previous techniques, primarily uses optimization tools for the development of the transit route network--the reliance on heuristics is minimal. In the proposed method, genetic algorithms, an evolutionary optimization technique, is used to develop the "optimal" set of routes. Results show that the proposed procedure performs better than the existing techniques.  相似文献   

6.
Seungkeun Kim 《工程优选》2013,45(3):199-224
This article proposes a behavioural decentralized approach that allows an unmanned aerial vehicle (UAV) formation flight to carry out a waypoint-passing mission effectively. The objective of the proposed controller is to make each UAV in the formation fly through predefined waypoints while maintaining its distance from other UAVs. To perform these two tasks, which can conflict with each other, coupled dynamics of UAVs is considered; this combines the dynamics of all the members in the formation. To apply the behavioural decentralized controller on the basis of the coupled dynamics, a feedback linearization technique with a diffeomorphic transfer map is derived for a three-dimensional UAV kinematics model. A behavioural approach in which the control input is decided by the relative weight of each UAV's desired behaviour is considered, so that the UAVs can react promptly in various situations. Optimization techniques of the gain matrices are also performed to improve the performance of the formation flight using eigen-structure analysis and Cholesky decomposition. To verify the performance of the proposed controller, numerical simulation is performed for a waypoint-passing mission of multiple UAVs.  相似文献   

7.
The main aim of future mobile networks is to provide secure, reliable, intelligent, and seamless connectivity. It also enables mobile network operators to ensure their customer’s a better quality of service (QoS). Nowadays, Unmanned Aerial Vehicles (UAVs) are a significant part of the mobile network due to their continuously growing use in various applications. For better coverage, cost-effective, and seamless service connectivity and provisioning, UAVs have emerged as the best choice for telco operators. UAVs can be used as flying base stations, edge servers, and relay nodes in mobile networks. On the other side, Multi-access Edge Computing (MEC) technology also emerged in the 5G network to provide a better quality of experience (QoE) to users with different QoS requirements. However, UAVs in a mobile network for coverage enhancement and better QoS face several challenges such as trajectory designing, path planning, optimization, QoS assurance, mobility management, etc. The efficient and proactive path planning and optimization in a highly dynamic environment containing buildings and obstacles are challenging. So, an automated Artificial Intelligence (AI) enabled QoS-aware solution is needed for trajectory planning and optimization. Therefore, this work introduces a well-designed AI and MEC-enabled architecture for a UAVs-assisted future network. It has an efficient Deep Reinforcement Learning (DRL) algorithm for real-time and proactive trajectory planning and optimization. It also fulfills QoS-aware service provisioning. A greedy-policy approach is used to maximize the long-term reward for serving more users with QoS. Simulation results reveal the superiority of the proposed DRL mechanism for energy-efficient and QoS-aware trajectory planning over the existing models.  相似文献   

8.
In recent years, progressive developments have been observed in recent technologies and the production cost has been continuously decreasing. In such scenario, Internet of Things (IoT) network which is comprised of a set of Unmanned Aerial Vehicles (UAV), has received more attention from civilian to military applications. But network security poses a serious challenge to UAV networks whereas the intrusion detection system (IDS) is found to be an effective process to secure the UAV networks. Classical IDSs are not adequate to handle the latest computer networks that possess maximum bandwidth and data traffic. In order to improve the detection performance and reduce the false alarms generated by IDS, several researchers have employed Machine Learning (ML) and Deep Learning (DL) algorithms to address the intrusion detection problem. In this view, the current research article presents a deep reinforcement learning technique, optimized by Black Widow Optimization (DRL-BWO) algorithm, for UAV networks. In addition, DRL involves an improved reinforcement learning-based Deep Belief Network (DBN) for intrusion detection. For parameter optimization of DRL technique, BWO algorithm is applied. It helps in improving the intrusion detection performance of UAV networks. An extensive set of experimental analysis was performed to highlight the supremacy of the proposed model. From the simulation values, it is evident that the proposed method is appropriate as it attained high precision, recall, F-measure, and accuracy values such as 0.985, 0.993, 0.988, and 0.989 respectively.  相似文献   

9.
In the IoT (Internet of Things) system, the introduction of UAV (Unmanned Aerial Vehicle) as a new data collection platform can solve the problem that IoT devices are unable to transmit data over long distances due to the limitation of their battery energy. However, the unreasonable distribution of UAVs will still lead to the problem of the high total energy consumption of the system. In this work, to deal with the problem, a deployment model of a mobile edge computing (MEC) system based on multi-UAV is proposed. The goal of the model is to minimize the energy consumption of the system in the process of data transmission by optimizing the deployment of UAVs. The DEVIPSK (differential evolution algorithm with variable population size based on a mutation strategy pool initialized by K-Means) is proposed to solve the model. In DEVIPSK, the population is initialized by K-Means to obtain better initial positions of UAVs. Besides, considering the limitation of the fixed mutation strategy in the traditional evolutionary algorithm, a mutation strategy pool is used to update the positions of UAVs. The experimental results show the superiority of the DEVIPSK and provide guidance for the deployment of UAVs in the field of edge data collection in the IoT system.  相似文献   

10.
Mavlink is a lightweight and most widely used open-source communication protocol used for Unmanned Aerial Vehicles. Multiple UAVs and autopilot systems support it, and it provides bi-directional communication between the UAV and Ground Control Station. The communications contain critical information about the UAV status and basic control commands sent from GCS to UAV and UAV to GCS. In order to increase the transfer speed and efficiency, the Mavlink does not encrypt the messages. As a result, the protocol is vulnerable to various security attacks such as Eavesdropping, GPS Spoofing, and DDoS. In this study, we tackle the problem and secure the Mavlink communication protocol. By leveraging the Mavlink packet’s vulnerabilities, this research work introduces an experiment in which, first, the Mavlink packets are compromised in terms of security requirements based on our threat model. The results show that the protocol is insecure and the attacks carried out are successful. To overcome Mavlink security, an additional security layer is added to encrypt and secure the protocol. An encryption technique is proposed that makes the communication between the UAV and GCS secure. The results show that the Mavlink packets are encrypted using our technique without affecting the performance and efficiency. The results are validated in terms of transfer speed, performance, and efficiency compared to the literature solutions such as MAVSec and benchmarked with the original Mavlink protocol. Our achieved results have significant improvement over the literature and Mavlink in terms of security.  相似文献   

11.
In this article, the problem of two Unmanned Aerial Vehicles (UAVs) cooperatively searching an unknown region is addressed. The search region is discretized into hexagonal cells and each cell is assumed to possess an uncertainty value. The UAVs have to cooperatively search these cells taking limited endurance, sensor and communication range constraints into account. Due to limited endurance, the UAVs need to return to the base station for refuelling and also need to select a base station when multiple base stations are present. This article proposes a route planning algorithm that takes endurance time constraints into account and uses game theoretical strategies to reduce the uncertainty. The route planning algorithm selects only those cells that ensure the agent will return to any one of the available bases. A set of paths are formed using these cells which the game theoretical strategies use to select a path that yields maximum uncertainty reduction. We explore non-cooperative Nash, cooperative and security strategies from game theory to enhance the search effectiveness. Monte-Carlo simulations are carried out which show the superiority of the game theoretical strategies over greedy strategy for different look ahead step length paths. Within the game theoretical strategies, non-cooperative Nash and cooperative strategy perform similarly in an ideal case, but Nash strategy performs better than the cooperative strategy when the perceived information is different. We also propose a heuristic based on partitioning of the search space into sectors to reduce computational overhead without performance degradation.  相似文献   

12.
Zhu Wang  Li Liu  Guangtong Xu 《工程优选》2019,51(8):1412-1429
Trajectory planning of formation rendezvous of multiple unmanned aerial vehicles (UAVs) is formulated as a mixed-integer optimal control problem, and an efficient hierarchical planning approach based on the Dubins path and sequential convex programming is proposed. The proposed method includes the assignment of rendezvous points (high level) and generation of cooperative trajectories (low level). At the high level, the assignment of rendezvous points to UAVs is optimized to minimize the total length of Dubins-path-based approximate trajectories. The assignment results determine the geometric relations between the UAVs’ goals, which are used as equality constraints for generating trajectories. At the low level, trajectory generation is treated as a non-convex optimal control problem, which is transformed to a non-convex parameter optimization and then solved via sequentially performing convex optimization. Numerical experiments demonstrate that the proposed method can generate feasible trajectories and can outperform a typical nonlinear programming method in terms of efficiency.  相似文献   

13.
将无人机(unmanned aerial vehicle, UAV)技术用于实现电力线展放正逐步成为电力行业发展的主要趋势,研究无人机自主架线技术能够有效提高作业效率、降低施工成本和保障工人安全。但现阶段无人机架线技术面临的问题主要有:1)大多数无人机依赖人工操控或地面站发布航点控制,智能化水平低,长期作业会给电力工人带来较强负荷;2)无人机缺乏自主避障能力且感知能力不足,电线、电杆等障碍物会对其造成安全隐患。为解决上述问题,首先,构建了无人机自主架线系统的硬件框架和以ROS(robot operating system,机器人操作系统)为基础的模块化软件框架,并在此基础上实现了架线任务规划算法和架线弓检测算法等,使无人机具备稳定的自主架线能力。然后,利用碰撞检测方法构建了无人机碰撞模型,并提出了无人机路径规划算法,同时引入地面站辅助避障策略,以有效提高无人机的安全性。实验结果表明:所设计的无人机自主架线系统的软、硬件框架合理,架线任务规划算法能帮助无人机高效稳定地完成自主架线任务;地面站能够实时监控无人机状态,并在必要时及时辅助无人机避障,最大程度地保证了无人机的安全。所设计系统安全可靠,可满足实际电力架线作业的需求。  相似文献   

14.
With the flexible deployment and high mobility of Unmanned Aerial Vehicles (UAVs) in an open environment, they have generated considerable attention in military and civil applications intending to enable ubiquitous connectivity and foster agile communications. The difficulty stems from features other than mobile ad-hoc network (MANET), namely aerial mobility in three-dimensional space and often changing topology. In the UAV network, a single node serves as a forwarding, transmitting, and receiving node at the same time. Typically, the communication path is multi-hop, and routing significantly affects the network’s performance. A lot of effort should be invested in performance analysis for selecting the optimum routing system. With this motivation, this study modelled a new Coati Optimization Algorithm-based Energy-Efficient Routing Process for Unmanned Aerial Vehicle Communication (COAER-UAVC) technique. The presented COAER-UAVC technique establishes effective routes for communication between the UAVs. It is primarily based on the coati characteristics in nature: if attacking and hunting iguanas and escaping from predators. Besides, the presented COAER-UAVC technique concentrates on the design of fitness functions to minimize energy utilization and communication delay. A varied group of simulations was performed to depict the optimum performance of the COAER-UAVC system. The experimental results verified that the COAER-UAVC technique had assured improved performance over other approaches.  相似文献   

15.
The Wireless Sensor Network (WSN) is a promising technology that could be used to monitor rivers’ water levels for early warning flood detection in the 5G context. However, during a flood, sensor nodes may be washed up or become faulty, which seriously affects network connectivity. To address this issue, Unmanned Aerial Vehicles (UAVs) could be integrated with WSN as routers or data mules to provide reliable data collection and flood prediction. In light of this, we propose a fault-tolerant multi-level framework comprised of a WSN and a UAV to monitor river levels. The framework is capable to provide seamless data collection by handling the disconnections caused by the failed nodes during a flood. Besides, an algorithm hybridized with Group Method Data Handling (GMDH) and Particle Swarm Optimization (PSO) is proposed to predict forthcoming floods in an intelligent collaborative environment. The proposed water-level prediction model is trained based on the real dataset obtained from the Selangor River in Malaysia. The performance of the work in comparison with other models has been also evaluated and numerical results based on different metrics such as coefficient of determination (), correlation coefficient (), Root Mean Square Error (), Mean Absolute Percentage Error (), and are provided.  相似文献   

16.
With the rapid development of emerging 5G and beyond (B5G), Unmanned Aerial Vehicles (UAVs) are increasingly important to improve the performance of dense cellular networks. As a conventional metric, coverage probability has been widely studied in communication systems due to the increasing density of users and complexity of the heterogeneous environment. In recent years, stochastic geometry has attracted more attention as a mathematical tool for modeling mobile network systems. In this paper, an analytical approach to the coverage probability analysis of UAV-assisted cellular networks with imperfect beam alignment has been proposed. An assumption was considered that all users are distributed according to Poisson Cluster Process (PCP) around base stations, in particular, Thomas Cluster Process (TCP). Using this model, the impact of beam alignment errors on the coverage probability was investigated. Initially, the Probability Density Function (PDF) of directional antenna gain between the user and its serving base station was obtained. Then, association probability with each tier was achieved. A tractable expression was derived for coverage probability in both Line-of-Sight (LoS) and Non-Line-of-Sight (NLoS) condition links. Numerical results demonstrated that at low UAVs altitude, beam alignment errors significantly degrade coverage performance. Moreover, for a small cluster size, alignment errors do not necessarily affect the coverage performance.  相似文献   

17.
Unmanned Ariel Vehicles (UAVs) are flying objects whose trajectory can be remotely controlled. UAVs have lot of potential applications in the areas of wireless communications, internet of things, security, traffic management, monitoring, and smart surveying. By enabling reliable communication between UAVs and ground nodes, emergency notifications can be efficiently and quickly disseminated to a wider area. UAVs can gather data from remote areas, industrial units, and emergency scenarios without human involvement. UAVs can support ubiquitous connectivity, green communications, and intelligent wireless resource management. To efficiently use UAVs for all these applications, important challenges need to be investigated. In this paper, we first present a detailed classification of UAVs based on factors such as their size, communication range, weight, and flight altitude. We also explain the hardware system configuration and uses of these UAVs. We present a brief overview of recent work done related to three major challenges in UAVs. These challenges include trajectory control, energy efficiency and resource allocation. We also present three open challenges and future opportunities for efficient UAV communications. These include use of learning algorithms for resource allocation and energy efficiency in UAVs, intelligent surfaces-based communications for enhanced reliability in UAVs, and security algorithms to combat malicious attacks against UAVs.  相似文献   

18.
In order to explore the safe operation of UAVs in non-segregated airspace, a collision risk model for cylindrical UAVs based on conflict areas was constructed and the risk of conflict between manned and unmanned aerial vehicles was researched. According to the results of risk analysis, a strategy for solving the conflict of aircraft is proposed, and the risk assessment experiment of unmanned aerial vehicle (UAV) in non-isolated airspace conflict is carried out. The results show that under the experimental conditions, large unmanned aerial vehicles equipped with ADS-B, TCAS and other airborne sensing systems will indeed interfere with other aircraft in airspace when they enter non-isolated airspace. Especially when the number of aircraft in airspace is large, the automatic avoidance system of UAV will increase the avoidance time and trigger the safety alarm, but the safety level is still acceptable. This indicates that it is relatively safe for UAVs to enter non-isolated airspace under limited conditions. The results can be used as a reference for the safe operation of unmanned aerial vehicle (UAV) in non-isolated airspace.  相似文献   

19.
Utilizing artificial intelligence (AI) to protect smart coastal cities has become a novel vision for scientific and industrial institutions. One of these AI technologies is using efficient and secure multi-environment Unmanned Vehicles (UVs) for anti-submarine attacks. This study’s contribution is the early detection of a submarine assault employing hybrid environment UVs that are controlled using swarm optimization and secure the information in between UVs using a decentralized cybersecurity strategy. The Dragonfly Algorithm is used for the orientation and clustering of the UVs in the optimization approach, and the Re-fragmentation strategy is used in the Network layer of the TCP/IP protocol as a cybersecurity solution. The research’s noteworthy findings demonstrate UVs’ logistical capability to promptly detect the target and address the problem while securely keeping the drone’s geographical information. The results suggest that detecting the submarine early increases the likelihood of averting a collision. The dragonfly strategy of sensing the position of the submersible and aggregating around it demonstrates the reliability of swarm intelligence in increasing access efficiency. Securing communication between Unmanned Aerial Vehicles (UAVs) improves the level of secrecy necessary for the task. The swarm navigation is based on a peer-to-peer system, which allows each UAV to access information from its peers. This, in turn, helps the UAVs to determine the best route to take and to avoid collisions with other UAVs. The dragonfly strategy also increases the speed of the mission by minimizing the time spent finding the target.  相似文献   

20.
Path planning algorithm is the key point to UAV path planning scenario. Many traditional path planning methods still suffer from low convergence rate and insufficient robustness. In this paper, three main methods are contributed to solving these problems. First, the improved artificial potential field (APF) method is adopted to accelerate the convergence process of the bat’s position update. Second, the optimal success rate strategy is proposed to improve the adaptive inertia weight of bat algorithm. Third chaos strategy is proposed to avoid falling into a local optimum. Compared with standard APF and chaos strategy in UAV path planning scenarios, the improved algorithm CPFIBA (The improved artificial potential field method combined with chaotic bat algorithm, CPFIBA) significantly increases the success rate of finding suitable planning path and decrease the convergence time. Simulation results show that the proposed algorithm also has great robustness for processing with path planning problems. Meanwhile, it overcomes the shortcomings of the traditional meta-heuristic algorithms, as their convergence process is the potential to fall into a local optimum. From the simulation, we can see also obverse that the proposed CPFIBA provides better performance than BA and DEBA in problems of UAV path planning.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号