This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks onWireless Sensor Networks(WSNs).Jamming is a type of Denial of Service(DoS)attack and intentional ...This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks onWireless Sensor Networks(WSNs).Jamming is a type of Denial of Service(DoS)attack and intentional interference where a malicious node transmits a high-power signal to increase noise on the receiver side to disrupt the communication channel and reduce performance significantly.To defend and prevent such attacks,the first step is to detect them.The current detection approaches use centralized techniques to detect jamming,where each node collects information and forwards it to the base station.As a result,overhead and communication costs increased.In this work,we present a jamming attack and classify nodes into different categories based on their location to the jammer by employing a single node observer.As a result,we introduced a machine learning model that uses distance ratios and power received as features to detect such attacks.Furthermore,we considered several types of jammers transmitting at different power levels to evaluate the proposed metrics using MATLAB.With a detection accuracy of 99.7%for the k-nearest neighbors(KNN)algorithm and average testing accuracy of 99.9%,the presented solution is capable of efficiently and accurately detecting jamming attacks in wireless sensor networks.展开更多
The aperture of natural rock fractures significantly affects the deformation and strength properties of rock masses,as well as the hydrodynamic properties of fractured rock masses.The conventional measurement methods ...The aperture of natural rock fractures significantly affects the deformation and strength properties of rock masses,as well as the hydrodynamic properties of fractured rock masses.The conventional measurement methods are inadequate for collecting data on high-steep rock slopes in complex mountainous regions.This study establishes a high-resolution three-dimensional model of a rock slope using unmanned aerial vehicle(UAV)multi-angle nap-of-the-object photogrammetry to obtain edge feature points of fractures.Fracture opening morphology is characterized using coordinate projection and transformation.Fracture central axis is determined using vertical measuring lines,allowing for the interpretation of aperture of adaptive fracture shape.The feasibility and reliability of the new method are verified at a construction site of a railway in southeast Tibet,China.The study shows that the fracture aperture has a significant interval effect and size effect.The optimal sampling length for fractures is approximately 0.5e1 m,and the optimal aperture interpretation results can be achieved when the measuring line spacing is 1%of the sampling length.Tensile fractures in the study area generally have larger apertures than shear fractures,and their tendency to increase with slope height is also greater than that of shear fractures.The aperture of tensile fractures is generally positively correlated with their trace length,while the correlation between the aperture of shear fractures and their trace length appears to be weak.Fractures of different orientations exhibit certain differences in their distribution of aperture,but generally follow the forms of normal,log-normal,and gamma distributions.This study provides essential data support for rock and slope stability evaluation,which is of significant practical importance.展开更多
Uniform linear array(ULA)radars are widely used in the collision-avoidance radar systems of small unmanned aerial vehicles(UAVs).In practice,a ULA's multi-target direction of arrival(DOA)estimation performance suf...Uniform linear array(ULA)radars are widely used in the collision-avoidance radar systems of small unmanned aerial vehicles(UAVs).In practice,a ULA's multi-target direction of arrival(DOA)estimation performance suffers from significant performance degradation owing to the limited number of physical elements.To improve the underdetermined DOA estimation performance of a ULA radar mounted on a small UAV platform,we propose a nonuniform linear motion sampling underdetermined DOA estimation method.Using the motion of the UAV platform,the echo signal is sampled at different positions.Then,according to the concept of difference co-array,a virtual ULA with multiple array elements and a large aperture is synthesized to increase the degrees of freedom(DOFs).Through position analysis of the original and motion arrays,we propose a nonuniform linear motion sampling method based on ULA for determining the optimal DOFs.Under the condition of no increase in the aperture of the physical array,the proposed method obtains a high DOF with fewer sampling runs and greatly improves the underdetermined DOA estimation performance of ULA.The results of numerical simulations conducted herein verify the superior performance of the proposed method.展开更多
With rapid development of unmanned aerial vehicles(UAVs), more and more UAVs access satellite networks for data transmission. To improve the spectral efficiency, non-orthogonal multiple access(NOMA) is adopted to inte...With rapid development of unmanned aerial vehicles(UAVs), more and more UAVs access satellite networks for data transmission. To improve the spectral efficiency, non-orthogonal multiple access(NOMA) is adopted to integrate UAVs into the satellite network, where multiple satellites cooperatively serve the UAVs and mobile terminal using the Ku-band and above. Taking into account the rain fading and the fading correlation, the outage performance is first analytically obtained for fixed power allocation and then efficiently calculated by the proposed power allocation algorithm to guarantee the user fairness. Simulation results verify the outage performance analysis and show the performance improvement of the proposed power allocation scheme.展开更多
Yardangs are wind-eroded ridges usually observed in arid regions on Earth and other planets. Previous geomorphology studies of terrestrial yardang fields depended on satellite data and limited fieldwork. The geometry ...Yardangs are wind-eroded ridges usually observed in arid regions on Earth and other planets. Previous geomorphology studies of terrestrial yardang fields depended on satellite data and limited fieldwork. The geometry measurements of those yardangs based on satellite data are limited to the length, the width, and the spacing between the yardangs; elevations could not be studied due to the relatively low resolution of the satellite acquired elevation data, e.g. digital elevation models(DEMs). However, the elevation information(e.g. heights of the yardang surfaces) and related information(e.g. slope) of the yardangs are critical to understanding the characteristics and evolution of these aeolian features. Here we report a novel approach, using unmanned aerial vehicles(UAVs) to generate centimeterresolution orthomosaics and DEMs for the study of whaleback yardangs in Qaidam Basin, NW China. The ultra-high-resolution data provide new insights into the geomorphology characteristics and evolution of the whaleback yardangs in Qaidam Basin. These centimeter-resolution datasets also have important potential in:(1) high accuracy estimation of erosion volume;(2) modeling in very fine scale of wind dynamics related to yardang formation;(3) detailed comparative planetary geomorphology study for Mars, Venus, and Titan.展开更多
The command tracking problem of formation flight control system(FFCS)for multiple unmanned aerial vehicles(UAVs)with sensor faults is discussed.And the objective of the addressed control problem is to design a robust ...The command tracking problem of formation flight control system(FFCS)for multiple unmanned aerial vehicles(UAVs)with sensor faults is discussed.And the objective of the addressed control problem is to design a robust fault tolerant tracking controller such that,for the disturbances and sensor faults,the closed-loop system is asymptotically stable with a given disturbance attenuation level.A robust fault tolerant tracking control scheme,combining an observer with H∞ performance,is proposed.Furthermore,it is proved that the designed controller can guarantee asymptotic stability of FFCS despite sensor faults.Finally,a simulation of two UAV formations is employed to demonstrate the effectiveness of the proposed approach.展开更多
This research focuses on trajectory generation algorithms that take into account the stealthiness of autonomous UAVs;generating stealthy paths through a region laden with enemy radars. The algorithm is employed to est...This research focuses on trajectory generation algorithms that take into account the stealthiness of autonomous UAVs;generating stealthy paths through a region laden with enemy radars. The algorithm is employed to estimate the risk cost of the navigational space and generate an optimized path based on the user-specified threshold altitude value. Thus the generated path is represented with a set of low-radar risk waypoints being the coordinates of its control points. The radar-aware path planner is then approximated using cubic B-splines by considering the least radar risk to the destination. Simulated results are presented, illustrating the potential benefits of such algorithms.展开更多
This paper presents a path planning approach for rotary unmanned aerial vehicles(R-UAVs)in a known static rough terrain environment.This approach aims to find collision-free and feasible paths with minimum altitude,le...This paper presents a path planning approach for rotary unmanned aerial vehicles(R-UAVs)in a known static rough terrain environment.This approach aims to find collision-free and feasible paths with minimum altitude,length and angle variable rate.First,a three-dimensional(3D)modeling method is proposed to reduce the computation burden of the dynamic models of R-UAVs.Considering the length,height and tuning angle of a path,the path planning of R-UAVs is described as a tri-objective optimization problem.Then,an improved multi-objective particle swarm optimization algorithm is developed.To render the algorithm more effective in dealing with this problem,a vibration function is introduced into the collided solutions to improve the algorithm efficiency.Meanwhile,the selection of the global best position is taken into account by the reference point method.Finally,the experimental environment is built with the help of the Google map and the 3D terrain generator World Machine.Experimental results under two different rough terrains from Guilin and Lanzhou of China demonstrate the capabilities of the proposed algorithm in finding Pareto optimal paths.展开更多
This paper proposes a new distributed formation flight protocol for unmanned aerial vehicles(UAVs)to perform coordinated circular tracking around a set of circles on a target sphere.Different from the previous results...This paper proposes a new distributed formation flight protocol for unmanned aerial vehicles(UAVs)to perform coordinated circular tracking around a set of circles on a target sphere.Different from the previous results limited in bidirectional networks and disturbance-free motions,this paper handles the circular formation flight control problem with both directed network and spatiotemporal disturbance with the knowledge of its upper bound.Distinguishing from the design of a common Lyapunov fiunction for bidirectional cases,we separately design the control for the circular tracking subsystem and the formation keeping subsystem with the circular tracking error as input.Then the whole control system is regarded as a cascade connection of these two subsystems,which is proved to be stable by input-tostate stability(ISS)theory.For the purpose of encountering the external disturbance,the backstepping technology is introduced to design the control inputs of each UAV pointing to North and Down along the special sphere(say,the circular tracking control algorithm)with the help of the switching function.Meanwhile,the distributed linear consensus protocol integrated with anther switching anti-interference item is developed to construct the control input of each UAV pointing to east along the special sphere(say,the formation keeping control law)for formation keeping.The validity of the proposed control law is proved both in the rigorous theory and through numerical simulations.展开更多
The network performance and the unmanned aerial vehicle(UAV)number are important objectives when UAVs are placed as communication relays to enhance the multi-agent information exchange.The problem is a non-determinist...The network performance and the unmanned aerial vehicle(UAV)number are important objectives when UAVs are placed as communication relays to enhance the multi-agent information exchange.The problem is a non-deterministic polynomial hard(NP-hard)multi-objective optimization problem,instead of generating a Pareto solution,this work focuses on considering both objectives at the same level so as to achieve a balanced solution between them.Based on the property that agents connected to the same UAV are a cluster,two clustering-based algorithms,M-K-means(MKM)and modified fast search and find density of peaks(MFSFDP)methods,are first proposed.Since the former algorithm requires too much computational time and the latter one requires too many relays,an algorithm for the balanced network performance and relay number(BPN)is proposed by discretizing the area to avoid missing the optimal relay positions and defining a new local density function to reflect the network performance metric.Simulation results demonstrate that the proposed algorithms are feasible and effective.Comparisons between these algorithms show that the BPN algorithm uses fewer relay UAVs than the MFSFDP and classic set-covering based algorithm,and its computational time is far less than the MKM algorithm.展开更多
We investigate the trajectory tracking problem of vertical take-off and landing(VTOL) unmanned aerial vehicles(UAV), and propose a practical disturbance rejection control strategy. Firstly, the nonlinear error model i...We investigate the trajectory tracking problem of vertical take-off and landing(VTOL) unmanned aerial vehicles(UAV), and propose a practical disturbance rejection control strategy. Firstly, the nonlinear error model is established completely by the modified Rodrigues parameters, while considering dynamics of the servo actuators. Then, a hierarchical control scheme is applied to design the translational and rotational controllers based on the time-scale property of each subsystem,respectively. And the linear extended state observer and auxiliary observer are used to deal with the uncertainties and saturation.At last, global stability of the closed-loop system is analyzed based on the singular perturbation theory. Simulation results show the effectiveness of the proposed control strategy.展开更多
Aiming at the suppression of enemy air defense(SEAD)task under the complex and complicated combat sce-nario,the spatiotemporal cooperative path planning methods are studied in this paper.The major research contents in...Aiming at the suppression of enemy air defense(SEAD)task under the complex and complicated combat sce-nario,the spatiotemporal cooperative path planning methods are studied in this paper.The major research contents include opti-mal path points generation,path smoothing and cooperative rendezvous.In the path points generation part,the path points availability testing algorithm and the path segments availability testing algorithm are designed,on this foundation,the swarm intelligence-based path point generation algorithm is utilized to generate the optimal path.In the path smoothing part,taking ter-minal attack angle constraint and maneuverability constraint into consideration,the Dubins curve is introduced to smooth the path segments.In cooperative rendezvous part,we take esti-mated time of arrival requirement constraint and flight speed range constraint into consideration,the speed control strategy and flight path control strategy are introduced,further,the decoupling scheme of the circling maneuver and detouring maneuver is designed,in this case,the maneuver ways,maneu-ver point,maneuver times,maneuver path and flight speed are determined.Finally,the simulation experiments are conducted and the acquired results reveal that the time-space cooperation of multiple unmanned aeriel vehicles(UAVs)is effectively real-ized,in this way,the combat situation suppression against the enemy can be realized in SEAD scenarios.展开更多
The main contribution of this paper is the design of an event-triggered formation control for leader-following consensus in second-order multi-agent systems(MASs)under communication faults.All the agents must follow t...The main contribution of this paper is the design of an event-triggered formation control for leader-following consensus in second-order multi-agent systems(MASs)under communication faults.All the agents must follow the trajectories of a virtual leader despite communication faults considered as smooth time-varying delays dependent on the distance between the agents.Linear matrix inequalities(LMIs)-based conditions are obtained to synthesize a controller gain that guarantees stability of the synchronization error.Based on the closed-loop system,an event-triggered mechanism is designed to reduce the control law update and information exchange in order to reduce energy consumption.The proposed approach is implemented in a real platform of a fleet of unmanned aerial vehicles(UAVs)under communication faults.A comparison between a state-of-the-art technique and the proposed technique has been provided,demonstrating the performance improvement brought by the proposed approach.展开更多
Mavlink is a lightweight and most widely used open-source communication protocol used for Unmanned Aerial Vehicles.Multiple UAVs and autopilot systems support it,and it provides bi-directional communication between th...Mavlink is a lightweight and most widely used open-source communication protocol used for Unmanned Aerial Vehicles.Multiple UAVs and autopilot systems support it,and it provides bi-directional communication between the UAV and Ground Control Station.The communications contain critical information about the UAV status and basic control commands sent from GCS to UAV and UAV to GCS.In order to increase the transfer speed and efficiency,the Mavlink does not encrypt the messages.As a result,the protocol is vulnerable to various security attacks such as Eavesdropping,GPS Spoofing,and DDoS.In this study,we tackle the problem and secure the Mavlink communication protocol.By leveraging the Mavlink packet’s vulnerabilities,this research work introduces an experiment in which,first,the Mavlink packets are compromised in terms of security requirements based on our threat model.The results show that the protocol is insecure and the attacks carried out are successful.To overcomeMavlink security,an additional security layer is added to encrypt and secure the protocol.An encryption technique is proposed that makes the communication between the UAV and GCS secure.The results show that the Mavlink packets are encrypted using our technique without affecting the performance and efficiency.The results are validated in terms of transfer speed,performance,and efficiency compared to the literature solutions such as MAVSec and benchmarked with the original Mavlink protocol.Our achieved results have significant improvement over the literature and Mavlink in terms of security.展开更多
This study is concerned with the H∞control for the full-envelope unmanned aerial vehicles(UAVs) in the presence of missing measurements and external disturbances. With the dramatic parameter variations in large fligh...This study is concerned with the H∞control for the full-envelope unmanned aerial vehicles(UAVs) in the presence of missing measurements and external disturbances. With the dramatic parameter variations in large flight envelope and the locally overlapped switching laws in flight, the system dynamics is modeled as a locally overlapped switched polytopic system to reduce designing conservatism and solving complexity. Then,considering updating lags of controller s switching signals and the weighted coefficients of the polytopic subsystems induced by missing measurements, an asynchronous H∞control method is proposed such that the system is stable and a desired disturbance attenuation level is satisfied. Furthermore, the sufficient existing conditions of the desired switched parameter-dependent H∞controller are derived in the form of linear matrix inequality(LMIs) by combining the switched parameter-dependent Lyapunov function method and average dwell time method.Finally, a numerical example based on a highly maneuverable technology(Hi MAT) vehicle is given to verify the validity of the proposed method.展开更多
In this paper, a real-time online data-driven adaptive method is developed to deal with uncertainties such as high nonlinearity, strong coupling, parameter perturbation and external disturbances in attitude control of...In this paper, a real-time online data-driven adaptive method is developed to deal with uncertainties such as high nonlinearity, strong coupling, parameter perturbation and external disturbances in attitude control of fixed-wing unmanned aerial vehicles (UAVs). Firstly, a model-free adaptive control (MFAC) method requiring only input/output (I/O) data and no model information is adopted for control scheme design of angular velocity subsystem which contains all model information and up-mentioned uncertainties. Secondly, the internal model control (IMC) method featured with less tuning parameters and convenient tuning process is adopted for control scheme design of the certain Euler angle subsystem. Simulation results show that, the method developed is obviously superior to the cascade PID (CPID) method and the nonlinear dynamic inversion (NDI) method.展开更多
Road traffic monitoring is an imperative topic widely discussed among researchers.Systems used to monitor traffic frequently rely on cameras mounted on bridges or roadsides.However,aerial images provide the flexibilit...Road traffic monitoring is an imperative topic widely discussed among researchers.Systems used to monitor traffic frequently rely on cameras mounted on bridges or roadsides.However,aerial images provide the flexibility to use mobile platforms to detect the location and motion of the vehicle over a larger area.To this end,different models have shown the ability to recognize and track vehicles.However,these methods are not mature enough to produce accurate results in complex road scenes.Therefore,this paper presents an algorithm that combines state-of-the-art techniques for identifying and tracking vehicles in conjunction with image bursts.The extracted frames were converted to grayscale,followed by the application of a georeferencing algorithm to embed coordinate information into the images.The masking technique eliminated irrelevant data and reduced the computational cost of the overall monitoring system.Next,Sobel edge detection combined with Canny edge detection and Hough line transform has been applied for noise reduction.After preprocessing,the blob detection algorithm helped detect the vehicles.Vehicles of varying sizes have been detected by implementing a dynamic thresholding scheme.Detection was done on the first image of every burst.Then,to track vehicles,the model of each vehicle was made to find its matches in the succeeding images using the template matching algorithm.To further improve the tracking accuracy by incorporating motion information,Scale Invariant Feature Transform(SIFT)features have been used to find the best possible match among multiple matches.An accuracy rate of 87%for detection and 80%accuracy for tracking in the A1 Motorway Netherland dataset has been achieved.For the Vehicle Aerial Imaging from Drone(VAID)dataset,an accuracy rate of 86%for detection and 78%accuracy for tracking has been achieved.展开更多
Unmanned aerial vehicles(UAVs) have gained significant attention in practical applications, especially the low-altitude aerial(LAA) object detection imposes stringent requirements on recognition accuracy and computati...Unmanned aerial vehicles(UAVs) have gained significant attention in practical applications, especially the low-altitude aerial(LAA) object detection imposes stringent requirements on recognition accuracy and computational resources. In this paper, the LAA images-oriented tensor decomposition and knowledge distillation-based network(TDKD-Net) is proposed,where the TT-format TD(tensor decomposition) and equalweighted response-based KD(knowledge distillation) methods are designed to minimize redundant parameters while ensuring comparable performance. Moreover, some robust network structures are developed, including the small object detection head and the dual-domain attention mechanism, which enable the model to leverage the learned knowledge from small-scale targets and selectively focus on salient features. Considering the imbalance of bounding box regression samples and the inaccuracy of regression geometric factors, the focal and efficient IoU(intersection of union) loss with optimal transport assignment(F-EIoU-OTA)mechanism is proposed to improve the detection accuracy. The proposed TDKD-Net is comprehensively evaluated through extensive experiments, and the results have demonstrated the effectiveness and superiority of the developed methods in comparison to other advanced detection algorithms, which also present high generalization and strong robustness. As a resource-efficient precise network, the complex detection of small and occluded LAA objects is also well addressed by TDKD-Net, which provides useful insights on handling imbalanced issues and realizing domain adaptation.展开更多
The utilization of mobile edge computing(MEC)for unmanned aerial vehicle(UAV)communication presents a viable solution for achieving high reliability and low latency communication.This study explores the potential of e...The utilization of mobile edge computing(MEC)for unmanned aerial vehicle(UAV)communication presents a viable solution for achieving high reliability and low latency communication.This study explores the potential of employing intelligent reflective surfaces(IRS)andUAVs as relay nodes to efficiently offload user computing tasks to theMEC server system model.Specifically,the user node accesses the primary user spectrum,while adhering to the constraint of satisfying the primary user peak interference power.Furthermore,the UAV acquires energy without interrupting the primary user’s regular communication by employing two energy harvesting schemes,namely time switching(TS)and power splitting(PS).The selection of the optimal UAV is based on the maximization of the instantaneous signal-to-noise ratio.Subsequently,the analytical expression for the outage probability of the system in Rayleigh channels is derived and analyzed.The study investigates the impact of various system parameters,including the number of UAVs,peak interference power,TS,and PS factors,on the system’s outage performance through simulation.The proposed system is also compared to two conventional benchmark schemes:the optimal UAV link transmission and the IRS link transmission.The simulation results validate the theoretical derivation and demonstrate the superiority of the proposed scheme over the benchmark schemes.展开更多
基金funded by the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia through the Project Number (IF-PSAU-2021/01/18707).
文摘This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks onWireless Sensor Networks(WSNs).Jamming is a type of Denial of Service(DoS)attack and intentional interference where a malicious node transmits a high-power signal to increase noise on the receiver side to disrupt the communication channel and reduce performance significantly.To defend and prevent such attacks,the first step is to detect them.The current detection approaches use centralized techniques to detect jamming,where each node collects information and forwards it to the base station.As a result,overhead and communication costs increased.In this work,we present a jamming attack and classify nodes into different categories based on their location to the jammer by employing a single node observer.As a result,we introduced a machine learning model that uses distance ratios and power received as features to detect such attacks.Furthermore,we considered several types of jammers transmitting at different power levels to evaluate the proposed metrics using MATLAB.With a detection accuracy of 99.7%for the k-nearest neighbors(KNN)algorithm and average testing accuracy of 99.9%,the presented solution is capable of efficiently and accurately detecting jamming attacks in wireless sensor networks.
基金This work was supported by the National Nature Science Foundation of China(Grant Nos.42177139 and 41941017)the Natural Science Foundation Project of Jilin Province,China(Grant No.20230101088JC).The authors would like to thank the anonymous reviewers for their comments and suggestions.
文摘The aperture of natural rock fractures significantly affects the deformation and strength properties of rock masses,as well as the hydrodynamic properties of fractured rock masses.The conventional measurement methods are inadequate for collecting data on high-steep rock slopes in complex mountainous regions.This study establishes a high-resolution three-dimensional model of a rock slope using unmanned aerial vehicle(UAV)multi-angle nap-of-the-object photogrammetry to obtain edge feature points of fractures.Fracture opening morphology is characterized using coordinate projection and transformation.Fracture central axis is determined using vertical measuring lines,allowing for the interpretation of aperture of adaptive fracture shape.The feasibility and reliability of the new method are verified at a construction site of a railway in southeast Tibet,China.The study shows that the fracture aperture has a significant interval effect and size effect.The optimal sampling length for fractures is approximately 0.5e1 m,and the optimal aperture interpretation results can be achieved when the measuring line spacing is 1%of the sampling length.Tensile fractures in the study area generally have larger apertures than shear fractures,and their tendency to increase with slope height is also greater than that of shear fractures.The aperture of tensile fractures is generally positively correlated with their trace length,while the correlation between the aperture of shear fractures and their trace length appears to be weak.Fractures of different orientations exhibit certain differences in their distribution of aperture,but generally follow the forms of normal,log-normal,and gamma distributions.This study provides essential data support for rock and slope stability evaluation,which is of significant practical importance.
基金National Natural Science Foundation of China(61973037)National 173 Program Project(2019-JCJQ-ZD-324)。
文摘Uniform linear array(ULA)radars are widely used in the collision-avoidance radar systems of small unmanned aerial vehicles(UAVs).In practice,a ULA's multi-target direction of arrival(DOA)estimation performance suffers from significant performance degradation owing to the limited number of physical elements.To improve the underdetermined DOA estimation performance of a ULA radar mounted on a small UAV platform,we propose a nonuniform linear motion sampling underdetermined DOA estimation method.Using the motion of the UAV platform,the echo signal is sampled at different positions.Then,according to the concept of difference co-array,a virtual ULA with multiple array elements and a large aperture is synthesized to increase the degrees of freedom(DOFs).Through position analysis of the original and motion arrays,we propose a nonuniform linear motion sampling method based on ULA for determining the optimal DOFs.Under the condition of no increase in the aperture of the physical array,the proposed method obtains a high DOF with fewer sampling runs and greatly improves the underdetermined DOA estimation performance of ULA.The results of numerical simulations conducted herein verify the superior performance of the proposed method.
基金supported in part by the National Natural Science Foundation of China (No. 91638205, 91438206, 61771286, 61621091)
文摘With rapid development of unmanned aerial vehicles(UAVs), more and more UAVs access satellite networks for data transmission. To improve the spectral efficiency, non-orthogonal multiple access(NOMA) is adopted to integrate UAVs into the satellite network, where multiple satellites cooperatively serve the UAVs and mobile terminal using the Ku-band and above. Taking into account the rain fading and the fading correlation, the outage performance is first analytically obtained for fixed power allocation and then efficiently calculated by the proposed power allocation algorithm to guarantee the user fairness. Simulation results verify the outage performance analysis and show the performance improvement of the proposed power allocation scheme.
基金supported by the National Scientific Foundation of China (No. 41773061)the Fundamental Research Funds for the Central Universities,China University of Geosciences (Wuhan) (Nos. CUGL160402, CUG2017G02 and CUGYCJH18-01)
文摘Yardangs are wind-eroded ridges usually observed in arid regions on Earth and other planets. Previous geomorphology studies of terrestrial yardang fields depended on satellite data and limited fieldwork. The geometry measurements of those yardangs based on satellite data are limited to the length, the width, and the spacing between the yardangs; elevations could not be studied due to the relatively low resolution of the satellite acquired elevation data, e.g. digital elevation models(DEMs). However, the elevation information(e.g. heights of the yardang surfaces) and related information(e.g. slope) of the yardangs are critical to understanding the characteristics and evolution of these aeolian features. Here we report a novel approach, using unmanned aerial vehicles(UAVs) to generate centimeterresolution orthomosaics and DEMs for the study of whaleback yardangs in Qaidam Basin, NW China. The ultra-high-resolution data provide new insights into the geomorphology characteristics and evolution of the whaleback yardangs in Qaidam Basin. These centimeter-resolution datasets also have important potential in:(1) high accuracy estimation of erosion volume;(2) modeling in very fine scale of wind dynamics related to yardang formation;(3) detailed comparative planetary geomorphology study for Mars, Venus, and Titan.
基金supported in part by the Post Doctoral Research Foundation of Jiangsu Province(No.1701140B)the National Natural Science Foundation of China (No. 61403195)the GF Research and Development Project of the Nanjing Tech Universities(No.201709)
文摘The command tracking problem of formation flight control system(FFCS)for multiple unmanned aerial vehicles(UAVs)with sensor faults is discussed.And the objective of the addressed control problem is to design a robust fault tolerant tracking controller such that,for the disturbances and sensor faults,the closed-loop system is asymptotically stable with a given disturbance attenuation level.A robust fault tolerant tracking control scheme,combining an observer with H∞ performance,is proposed.Furthermore,it is proved that the designed controller can guarantee asymptotic stability of FFCS despite sensor faults.Finally,a simulation of two UAV formations is employed to demonstrate the effectiveness of the proposed approach.
文摘This research focuses on trajectory generation algorithms that take into account the stealthiness of autonomous UAVs;generating stealthy paths through a region laden with enemy radars. The algorithm is employed to estimate the risk cost of the navigational space and generate an optimized path based on the user-specified threshold altitude value. Thus the generated path is represented with a set of low-radar risk waypoints being the coordinates of its control points. The radar-aware path planner is then approximated using cubic B-splines by considering the least radar risk to the destination. Simulated results are presented, illustrating the potential benefits of such algorithms.
基金supported by the National Natural Science Foundation of China(6167321461673217+2 种基金61673219)the Natural Science Foundation of the Jiangsu Higher Education Institutions of China(18KJB120011)the Postgraduate Research and Practice Innovation Program of Jiangsu Province(KYCX19_0299)
文摘This paper presents a path planning approach for rotary unmanned aerial vehicles(R-UAVs)in a known static rough terrain environment.This approach aims to find collision-free and feasible paths with minimum altitude,length and angle variable rate.First,a three-dimensional(3D)modeling method is proposed to reduce the computation burden of the dynamic models of R-UAVs.Considering the length,height and tuning angle of a path,the path planning of R-UAVs is described as a tri-objective optimization problem.Then,an improved multi-objective particle swarm optimization algorithm is developed.To render the algorithm more effective in dealing with this problem,a vibration function is introduced into the collided solutions to improve the algorithm efficiency.Meanwhile,the selection of the global best position is taken into account by the reference point method.Finally,the experimental environment is built with the help of the Google map and the 3D terrain generator World Machine.Experimental results under two different rough terrains from Guilin and Lanzhou of China demonstrate the capabilities of the proposed algorithm in finding Pareto optimal paths.
基金supported in part by the National Natural Science Foundation of China(61673106)the Natural Science Foundation of Jiangsu Province(BK20171362)the Fundamental Research Funds for the Central Universities(2242019K40024)
文摘This paper proposes a new distributed formation flight protocol for unmanned aerial vehicles(UAVs)to perform coordinated circular tracking around a set of circles on a target sphere.Different from the previous results limited in bidirectional networks and disturbance-free motions,this paper handles the circular formation flight control problem with both directed network and spatiotemporal disturbance with the knowledge of its upper bound.Distinguishing from the design of a common Lyapunov fiunction for bidirectional cases,we separately design the control for the circular tracking subsystem and the formation keeping subsystem with the circular tracking error as input.Then the whole control system is regarded as a cascade connection of these two subsystems,which is proved to be stable by input-tostate stability(ISS)theory.For the purpose of encountering the external disturbance,the backstepping technology is introduced to design the control inputs of each UAV pointing to North and Down along the special sphere(say,the circular tracking control algorithm)with the help of the switching function.Meanwhile,the distributed linear consensus protocol integrated with anther switching anti-interference item is developed to construct the control input of each UAV pointing to east along the special sphere(say,the formation keeping control law)for formation keeping.The validity of the proposed control law is proved both in the rigorous theory and through numerical simulations.
基金the National Natural Science Foundation of China(61573285)。
文摘The network performance and the unmanned aerial vehicle(UAV)number are important objectives when UAVs are placed as communication relays to enhance the multi-agent information exchange.The problem is a non-deterministic polynomial hard(NP-hard)multi-objective optimization problem,instead of generating a Pareto solution,this work focuses on considering both objectives at the same level so as to achieve a balanced solution between them.Based on the property that agents connected to the same UAV are a cluster,two clustering-based algorithms,M-K-means(MKM)and modified fast search and find density of peaks(MFSFDP)methods,are first proposed.Since the former algorithm requires too much computational time and the latter one requires too many relays,an algorithm for the balanced network performance and relay number(BPN)is proposed by discretizing the area to avoid missing the optimal relay positions and defining a new local density function to reflect the network performance metric.Simulation results demonstrate that the proposed algorithms are feasible and effective.Comparisons between these algorithms show that the BPN algorithm uses fewer relay UAVs than the MFSFDP and classic set-covering based algorithm,and its computational time is far less than the MKM algorithm.
基金supported by National Natural Science Foundation of China(61221003)
文摘We investigate the trajectory tracking problem of vertical take-off and landing(VTOL) unmanned aerial vehicles(UAV), and propose a practical disturbance rejection control strategy. Firstly, the nonlinear error model is established completely by the modified Rodrigues parameters, while considering dynamics of the servo actuators. Then, a hierarchical control scheme is applied to design the translational and rotational controllers based on the time-scale property of each subsystem,respectively. And the linear extended state observer and auxiliary observer are used to deal with the uncertainties and saturation.At last, global stability of the closed-loop system is analyzed based on the singular perturbation theory. Simulation results show the effectiveness of the proposed control strategy.
文摘Aiming at the suppression of enemy air defense(SEAD)task under the complex and complicated combat sce-nario,the spatiotemporal cooperative path planning methods are studied in this paper.The major research contents include opti-mal path points generation,path smoothing and cooperative rendezvous.In the path points generation part,the path points availability testing algorithm and the path segments availability testing algorithm are designed,on this foundation,the swarm intelligence-based path point generation algorithm is utilized to generate the optimal path.In the path smoothing part,taking ter-minal attack angle constraint and maneuverability constraint into consideration,the Dubins curve is introduced to smooth the path segments.In cooperative rendezvous part,we take esti-mated time of arrival requirement constraint and flight speed range constraint into consideration,the speed control strategy and flight path control strategy are introduced,further,the decoupling scheme of the circling maneuver and detouring maneuver is designed,in this case,the maneuver ways,maneu-ver point,maneuver times,maneuver path and flight speed are determined.Finally,the simulation experiments are conducted and the acquired results reveal that the time-space cooperation of multiple unmanned aeriel vehicles(UAVs)is effectively real-ized,in this way,the combat situation suppression against the enemy can be realized in SEAD scenarios.
文摘The main contribution of this paper is the design of an event-triggered formation control for leader-following consensus in second-order multi-agent systems(MASs)under communication faults.All the agents must follow the trajectories of a virtual leader despite communication faults considered as smooth time-varying delays dependent on the distance between the agents.Linear matrix inequalities(LMIs)-based conditions are obtained to synthesize a controller gain that guarantees stability of the synchronization error.Based on the closed-loop system,an event-triggered mechanism is designed to reduce the control law update and information exchange in order to reduce energy consumption.The proposed approach is implemented in a real platform of a fleet of unmanned aerial vehicles(UAVs)under communication faults.A comparison between a state-of-the-art technique and the proposed technique has been provided,demonstrating the performance improvement brought by the proposed approach.
文摘Mavlink is a lightweight and most widely used open-source communication protocol used for Unmanned Aerial Vehicles.Multiple UAVs and autopilot systems support it,and it provides bi-directional communication between the UAV and Ground Control Station.The communications contain critical information about the UAV status and basic control commands sent from GCS to UAV and UAV to GCS.In order to increase the transfer speed and efficiency,the Mavlink does not encrypt the messages.As a result,the protocol is vulnerable to various security attacks such as Eavesdropping,GPS Spoofing,and DDoS.In this study,we tackle the problem and secure the Mavlink communication protocol.By leveraging the Mavlink packet’s vulnerabilities,this research work introduces an experiment in which,first,the Mavlink packets are compromised in terms of security requirements based on our threat model.The results show that the protocol is insecure and the attacks carried out are successful.To overcomeMavlink security,an additional security layer is added to encrypt and secure the protocol.An encryption technique is proposed that makes the communication between the UAV and GCS secure.The results show that the Mavlink packets are encrypted using our technique without affecting the performance and efficiency.The results are validated in terms of transfer speed,performance,and efficiency compared to the literature solutions such as MAVSec and benchmarked with the original Mavlink protocol.Our achieved results have significant improvement over the literature and Mavlink in terms of security.
基金supported by National Natural Science Foundation of China(61273083,61074027)
文摘This study is concerned with the H∞control for the full-envelope unmanned aerial vehicles(UAVs) in the presence of missing measurements and external disturbances. With the dramatic parameter variations in large flight envelope and the locally overlapped switching laws in flight, the system dynamics is modeled as a locally overlapped switched polytopic system to reduce designing conservatism and solving complexity. Then,considering updating lags of controller s switching signals and the weighted coefficients of the polytopic subsystems induced by missing measurements, an asynchronous H∞control method is proposed such that the system is stable and a desired disturbance attenuation level is satisfied. Furthermore, the sufficient existing conditions of the desired switched parameter-dependent H∞controller are derived in the form of linear matrix inequality(LMIs) by combining the switched parameter-dependent Lyapunov function method and average dwell time method.Finally, a numerical example based on a highly maneuverable technology(Hi MAT) vehicle is given to verify the validity of the proposed method.
文摘In this paper, a real-time online data-driven adaptive method is developed to deal with uncertainties such as high nonlinearity, strong coupling, parameter perturbation and external disturbances in attitude control of fixed-wing unmanned aerial vehicles (UAVs). Firstly, a model-free adaptive control (MFAC) method requiring only input/output (I/O) data and no model information is adopted for control scheme design of angular velocity subsystem which contains all model information and up-mentioned uncertainties. Secondly, the internal model control (IMC) method featured with less tuning parameters and convenient tuning process is adopted for control scheme design of the certain Euler angle subsystem. Simulation results show that, the method developed is obviously superior to the cascade PID (CPID) method and the nonlinear dynamic inversion (NDI) method.
基金supported by a grant from the Basic Science Research Program through the National Research Foundation(NRF)(2021R1F1A1063634)funded by the Ministry of Science and ICT(MSIT),Republic of KoreaThe authors are thankful to the Deanship of Scientific Research at Najran University for funding this work under the Research Group Funding Program Grant Code(NU/RG/SERC/13/40)+2 种基金Also,the authors are thankful to Prince Satam bin Abdulaziz University for supporting this study via funding from Prince Satam bin Abdulaziz University project number(PSAU/2024/R/1445)This work was also supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2023R54)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Road traffic monitoring is an imperative topic widely discussed among researchers.Systems used to monitor traffic frequently rely on cameras mounted on bridges or roadsides.However,aerial images provide the flexibility to use mobile platforms to detect the location and motion of the vehicle over a larger area.To this end,different models have shown the ability to recognize and track vehicles.However,these methods are not mature enough to produce accurate results in complex road scenes.Therefore,this paper presents an algorithm that combines state-of-the-art techniques for identifying and tracking vehicles in conjunction with image bursts.The extracted frames were converted to grayscale,followed by the application of a georeferencing algorithm to embed coordinate information into the images.The masking technique eliminated irrelevant data and reduced the computational cost of the overall monitoring system.Next,Sobel edge detection combined with Canny edge detection and Hough line transform has been applied for noise reduction.After preprocessing,the blob detection algorithm helped detect the vehicles.Vehicles of varying sizes have been detected by implementing a dynamic thresholding scheme.Detection was done on the first image of every burst.Then,to track vehicles,the model of each vehicle was made to find its matches in the succeeding images using the template matching algorithm.To further improve the tracking accuracy by incorporating motion information,Scale Invariant Feature Transform(SIFT)features have been used to find the best possible match among multiple matches.An accuracy rate of 87%for detection and 80%accuracy for tracking in the A1 Motorway Netherland dataset has been achieved.For the Vehicle Aerial Imaging from Drone(VAID)dataset,an accuracy rate of 86%for detection and 78%accuracy for tracking has been achieved.
基金supported in part by the National Natural Science Foundation of China (62073271)the Natural Science Foundation for Distinguished Young Scholars of the Fujian Province of China (2023J06010)the Fundamental Research Funds for the Central Universities of China(20720220076)。
文摘Unmanned aerial vehicles(UAVs) have gained significant attention in practical applications, especially the low-altitude aerial(LAA) object detection imposes stringent requirements on recognition accuracy and computational resources. In this paper, the LAA images-oriented tensor decomposition and knowledge distillation-based network(TDKD-Net) is proposed,where the TT-format TD(tensor decomposition) and equalweighted response-based KD(knowledge distillation) methods are designed to minimize redundant parameters while ensuring comparable performance. Moreover, some robust network structures are developed, including the small object detection head and the dual-domain attention mechanism, which enable the model to leverage the learned knowledge from small-scale targets and selectively focus on salient features. Considering the imbalance of bounding box regression samples and the inaccuracy of regression geometric factors, the focal and efficient IoU(intersection of union) loss with optimal transport assignment(F-EIoU-OTA)mechanism is proposed to improve the detection accuracy. The proposed TDKD-Net is comprehensively evaluated through extensive experiments, and the results have demonstrated the effectiveness and superiority of the developed methods in comparison to other advanced detection algorithms, which also present high generalization and strong robustness. As a resource-efficient precise network, the complex detection of small and occluded LAA objects is also well addressed by TDKD-Net, which provides useful insights on handling imbalanced issues and realizing domain adaptation.
基金the National Natural Science Foundation of China(62271192)Henan Provincial Scientists Studio(GZS2022015)+10 种基金Central Plains Talents Plan(ZYYCYU202012173)NationalKeyR&DProgramofChina(2020YFB2008400)the Program ofCEMEE(2022Z00202B)LAGEO of Chinese Academy of Sciences(LAGEO-2019-2)Program for Science&Technology Innovation Talents in the University of Henan Province(20HASTIT022)Natural Science Foundation of Henan under Grant 202300410126Program for Innovative Research Team in University of Henan Province(21IRTSTHN015)Equipment Pre-Research Joint Research Program of Ministry of Education(8091B032129)Training Program for Young Scholar of Henan Province for Colleges and Universities(2020GGJS172)Program for Science&Technology Innovation Talents in Universities of Henan Province under Grand(22HASTIT020)Henan Province Science Fund for Distinguished Young Scholars(222300420006).
文摘The utilization of mobile edge computing(MEC)for unmanned aerial vehicle(UAV)communication presents a viable solution for achieving high reliability and low latency communication.This study explores the potential of employing intelligent reflective surfaces(IRS)andUAVs as relay nodes to efficiently offload user computing tasks to theMEC server system model.Specifically,the user node accesses the primary user spectrum,while adhering to the constraint of satisfying the primary user peak interference power.Furthermore,the UAV acquires energy without interrupting the primary user’s regular communication by employing two energy harvesting schemes,namely time switching(TS)and power splitting(PS).The selection of the optimal UAV is based on the maximization of the instantaneous signal-to-noise ratio.Subsequently,the analytical expression for the outage probability of the system in Rayleigh channels is derived and analyzed.The study investigates the impact of various system parameters,including the number of UAVs,peak interference power,TS,and PS factors,on the system’s outage performance through simulation.The proposed system is also compared to two conventional benchmark schemes:the optimal UAV link transmission and the IRS link transmission.The simulation results validate the theoretical derivation and demonstrate the superiority of the proposed scheme over the benchmark schemes.