Next Article in Journal
Multi-Objective Optimization in Air-to-Air Communication System Based on Multi-Agent Deep Reinforcement Learning
Next Article in Special Issue
Decentralized Coordination of a Multi-UAV System for Spatial Planar Shape Formations
Previous Article in Journal
Fast Nonlinear Predictive Control Using Classical and Parallel Wiener Models: A Comparison for a Neutralization Reactor Process
Previous Article in Special Issue
Swarm Metaverse for Multi-Level Autonomy Using Digital Twins
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Intelligent Drone Swarms to Search for Victims in Post-Disaster Areas

by
Matheus Nohra Haddad
1,2,*,
Andréa Cynthia Santos
1,
Christophe Duhamel
1 and
Amadeu Almeida Coco
1
1
LITIS, ISEL, Université Le Havre Normandie, 25 Rue Philippe Lebon, 76600 Le Havre, France
2
CRP-IEP, Universidade Federal de Viçosa, Km 7, MG-230, Rodoviário, Rio Paranaíba 38810-000, Brazil
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(23), 9540; https://doi.org/10.3390/s23239540
Submission received: 26 October 2023 / Revised: 27 November 2023 / Accepted: 28 November 2023 / Published: 30 November 2023
(This article belongs to the Special Issue Collective Mobile Robotics: From Theory to Real-World Applications)

Abstract

:
This study presents the Drone Swarms Routing Problem (DSRP), which consists of identifying the maximum number of victims in post-disaster areas. The post-disaster area is modeled in a complete graph, where each search location is represented by a vertex, and the edges are the shortest paths between destinations, with an associated weight, corresponding to the battery consumption to fly to a location. In addition, in the DSRP addressed here, a set of drones are deployed in a cooperative drone swarms approach to boost the search. In this context, a V-shaped formation is applied with leader replacements, which allows energy saving. We propose a computation model for the DSRP that considers each drone as an agent that selects the next search location to visit through a simple and efficient method, the Drone Swarm Heuristic. In order to evaluate the proposed model, scenarios based on the Beirut port explosion in 2020 are used. Numerical experiments are presented in the offline and online versions of the proposed method. The results from such scenarios showed the efficiency of the proposed approach, attesting not only the coverage capacity of the computational model but also the advantage of adopting the V-shaped formation flight with leader replacements.

1. Introduction

After a major disaster, it is very likely that access to some areas can be extremely difficult due to the damage caused by the disaster itself, road congestion or blockages, or even the contamination of dangerous products. This was the case of the Beirut port explosion in Lebanon in 2020 that caused several causalities, more than 7000 injured people, and left about 30,000 homeless [1]. In this context, an alternative strategy to circumvent the aforementioned accessibility difficulties is to use drones to perform tasks such as the distribution of drugs and food, the detection of ground conditions, and to search for victims. They can also quickly access hard-to-reach areas. An extensive study in [2] demonstrates the capabilities, performance outcomes and barriers of using drones in the context of humanitarian logistics.
In such a context, the search for victims is a crucial operation and must be well-planned and carried out with extreme efficiency to save lives. The search for victims can be supported by the use of drones. Moreover, the search can be boosted by using a fleet of drones equipped with optical and thermal cameras, flying in a coordinate swarm. This allows them to share updated information about the area, to be more efficient in scanning the area, and also to save energy using a special flight organization. As shown in [3], energy consumption can be reduced by applying a V-shaped formation with leader replacements, which is inspired by bird flight.
The search for victims using drone swarms involves not only solving a path planning problem [4], but also solving an optimization problem for finding the route that minimizes/maximizes a given criterion, which is the main focus of this study. More specifically, this study proposes the Drone Swarms Routing Problem (DSRP) and consists of defining routes for drone swarms in order to maximize the number of victims identified. The novelties of the DSRP are the consideration of the cooperative and decentralized flight of drone swarms, where they decide on the fly if they scan a location together or not. The interest of using such a strategy is to cover faster an area and to save energy, by means of an appropriate swarm organization. Civil drones still have low autonomy, which makes scanning large areas difficult. Moreover, the hydrogen technology for drones is not yet operational. This study extends the work of [5], in which, drones fly independently of each other with routes predefined by a control center.
A computational model to solve the DSRP is proposed here, using the concept of Multi-Agents Systems (MAS), where drones are agents able to analyze information about the post-disaster area, and smartly select the next search location to perform the search for victims. For such a purpose, a Drone Swarm Heuristic (DSH) is applied to carry out the decision step of the drones. The proposed method is tested over a case study inspired by the Beirut port explosion in 2020. Numerical experiments considering offline and online versions of the method are presented. In the former, the input data are predefined, while in the latter, data changes during the execution of the model. The DSRP solutions produced by the proposed method are also observed in the robot simulator CoppeliaSim [6] to simulate their execution step-by-step.
This study makes several contributions, in particular, we propose:
  • the new DSRP to search for victims in post-disaster scenarios;
  • a computational model based on multi-agent systems;
  • an offline and online heuristics for the DSRP;
  • solutions are tested using the CoppeliaSim simulator;
  • an adaptation of instances proposed in [5] for DSRP.
The remainder of this paper is organized as follows. The Drone Swarms Routing Problem is defined in Section 2. In Section 3, closely related studies are presented. The proposed DSRP computational model and heuristic method are detailed in Section 4. Numerical experiments, concluding remarks and future works are, respectively, given in Section 5 and Section 6.

2. The Drone Swarms Routing Problem

The Drone Swarms Routing Problem (DSRP) is defined on a complete and simple graph G = ( V , E ) built over a post-disaster area. Each search area is a vertex v V = { 0 , 1 , , n } which has an expected number of victims e v and a victim identification probability p v . The set of edges is E = { ( i , j ) | i , j V 2 } , where ( i , j ) is the shortest path between i and j. Moreover, each edge ( i , j ) E is weighted by a related cost c i j that represents the battery consumption of a single-drone flight starting from vertex i to j. Let D = { 1 , 2 , , m } be a homogeneous fleet of m drones, in which each drone d D has a range limit A according to its battery capacity, a battery recharge time R and an associated base b d B V to perform the take-off, land and recharge operations. A specific drone searches for victims on a search location during a period of time t s . The identification operation follows a binomial distribution e v p v . As a consequence of the binomial distribution, search areas may be visited more than once and this visit can also be performed by the same drone. Another characteristic of the searches is that, at the same period of time, more than one drone (drone swarm) can scan for victims over the same search area. This latter characteristic is actually a relaxation of the problem that, on one hand, can improve the effectiveness of victim identification, but, on the other hand, it increases the search space of solutions to the problem, making the problem even more complex.
The DSRP considers a trajectory as a direct flight from a vertex i to another vertex j, consuming c i j of the battery. Trajectories can be performed by a drone swarm flying in a V-shaped formation with leader replacements. A “trip” in the DSRP is a circuit of a drone that departs from its base, flies to search areas, performs victim detection, and returns to the base. In the DSRP the whole operation of a drone may include multiple trips and there is a maximum time T allowed for this operation. The objective of the DSRP is to define routes for a fleet of drones in order to maximize the expected number of detected victims.
The DSRP involves some assumptions to facilitate the modeling and analysis of the problem. The first relies on the drone movements which are constrained to two dimensions, assuming a flat surface or environment. This simplifies the spatial representation and allows efficient route planning within a 2D space. The second assumption is the communication between drones which is always considered available. This second assumption enables information sharing and real-time coordination, which facilitates efficient swarm behavior and collaboration during routing tasks. On the other hand, a more realistic communication model could be taken into account as a constraint in our model. In summary, the focus is on the decision optimization problem, and this first approach does not consider speed and altitude variation. However, since the speed and altitude are constant, the solutions generated belong to the set of feasible ones.
Figure 1 shows an example of a DSRP in a graph with nine vertices, eight drones and one base. It also contains two examples of routes performed by drones 1 and 2. Drone 1 starts the route by being the leader of the V-shaped formation, while drone 2, in turn, initiates the route by following another leader in another V-shaped formation. It can be seen that drone 2 performs two trips, as it returns to the base to be recharged.
Clearly, the DSRP is an NP-hard problem, as it originally comes from the Vehicle Routing Problem (VRP) [7], a well-known NP-hard problem. In this way, the time needed to find an optimal solution for the offline version of the DSRP can be impractical. Considering that the main focus here is to find a solution for the online version of the DSRP, the need for an efficient algorithm is even greater. This has motivated us to develop a heuristic to solve the DSRP problem.

3. Related Literature

This section provides a concise overview of closely related works in the literature, aiming to establish a comprehensive understanding of the research landscape. The review begins by examining optimization surveys that offer valuable insights into the current state-of-the-art techniques. Then, offline and centralized approaches are described for Drone Routing Problems, exploring different methodologies employed to optimize drone routes in the context of post-disaster management. In the following, online and decentralized Multi-Robot Task Allocation approaches are presented, showcasing an innovative strategy for real-time decision-making and coordination among drones. In addition, a study focusing on a V-shaped flight formation for drones is detailed, highlighting recent advances in flight formations that enhance efficiency and cooperation using drone swarms. The section ends with an overview comparing our contributions to those found in the scientific literature.

3.1. Optimization Surveys

In the scientific literature, there is growing interest in the use of drones, as can be noticed by the number of surveys published and the number of papers they analyze. From 2001 to 2017 more than 200 papers with optimization approaches for civil applications of drones were reviewed in [8], such as area coverage, search operations, routing, data gathering, networks of drones, communication linking and computing power to mobile devices. In [9], the authors classified 79 relevant publications from 2005 to 2019 that address Drone Routing Problems (DRP) modeled as a VRP. Survey [10] reviewed 63 papers, from 2015 to 2020, related to routing problems for four main problem classes: (1) the traveling salesman problem with drones; (2) the vehicle routing problem with drones; (3) the drone delivery problem and (4) the carrier-vehicle problem with drones. A survey and a framework for classifying drone-based delivery systems is presented in [11] and this framework was used to classify 101 related papers according to their objectives, methods, applications and constraints. The authors in [12] did an extensive analysis of articles published from January 2005 to June 2022, identifying 135 articles that explore various aspects of VRP problems. These surveys are very interesting entry points for researchers looking for the state-of-the-art on a wide range of topics involving optimization problems involving drones, like exact and heuristic solution methods, novel problem variants like drone routing, and emerging research areas such as green routing.
The surveys aforementioned surveys contain a very limited number of articles focusing on post-disaster management. This highlights a potential research gap in exploring the application of DRP methodologies to this constrained context. In addition, it is worth noting that a significant portion of the papers predominantly address the classic version of the VRP, which differs from the approach adopted in this work. This distinction emphasizes the contribution of this study in exploring novel perspectives and approaches that extend beyond traditional VRP formulations, aiming to address the specific challenges and complexities inherent in post-disaster management scenarios.

3.2. Offline and Centralized DRP Approaches

Some studies investigate variants of DRPs in the post-disaster context, proposing both methods and case studies. The DRPs can be addressed by adopting an offline or online approach. Offline computation is very often used for static and centralized approaches when there is enough time for decision-making. On the other hand, online computation is commonly used for dynamic and decentralized approaches, when the time for decision-making is a hard constraint, being taken in almost “real time”. All the works cited in this section consider offline computation with a centralized approach.
The authors in [13] address a DRP to recognize a post-earthquake area, where the objective is to find the shortest path to visit each site affected by the earthquake and to check the state of building damage. A simulated annealing was proposed and was applied to instances generated from the city of Acireale (Italy), finding good solutions with two drones. Another DRP to assess post-disaster areas using drones and motorcycles is studied in [14], where a bi-objective mathematical model for maximizing the total importance of population centers (nodes) and road segments (arcs) is presented. The bi-objectives are optimized by means of an ϵ -constraint method, together with a heuristic to solve the problem on instances based on Istanbul’s Kartal district (Turkey). The results show that a high-quality approximation of the Pareto front can be found using the proposed methodology.
Study [15] presents a DRP that uses gliders to collect useful information for assessing the extent of the disaster’s consequences by visiting the post-disaster locations as fast as possible. They also propose a solution to this problem by linearizing a Mixed-Integer Nonlinear Programming (MINLP) formulation that optimizes the routes and the trajectories along these routes. The MINLP formulation is tested on random instances and on instances based on flooding-prone cities of the United Kingdom (UK). These instances are divided into small and medium ranges and they contain up to 10 waypoints, 2 landing zones and 3 gliders. The strategy is able to prove optimal solutions for some test cases, contrary to large test cases with more waypoints and a medium to large size. A heterogeneous fixed fleet DRP is considered in [16] with the objective of minimizing the inspection cost of a post-disaster area. In order to solve it, the authors propose a Mixed-Integer Linear Programming (MILP) model and two heuristics, an Adaptive Large Neighborhood Search (ALNS) algorithm and a Modified Backtracking Adaptive Threshold Accepting (MBATA) one. The algorithms were tested on instances generated over Hancock county from Mississippi State (USA) and produced high-quality solutions in a reasonable time.

3.3. Online and Decentralized MRTA Approaches

Considering the field of multi-agent systems (MAS), the Multi-Robot Task Allocation (MRTA) is a problem commonly found problem (see [17] for more information on MRTA). The MRTA is an analogous problem to the VRP in which tasks are defined in terms of location. Furthermore, the MRTA problems can be also solved by adopting offline or online approaches.
Several studies consider MAS with an online approach to solve different MRTA problems, but there is a lack of studies that address MRTA in post-disaster areas. The authors in [18] present a MRTA in which robots (drones) with limited range and payload must accomplish tasks with deadlines that are generated during the search. The MRTA goal is to deliver survival kits to spatially distributed victims after a flood disaster. An Integer Linear Programming (ILP) formulation is presented to solve the offline version of the problem as well as an online method, named BiG-MRTA, that combines a bipartite graph construction with a model that assigns edge weights to the graph, and allocates tasks, by solving a maximum weighted matching problem. Each task can be allocated to only one agent and task selection is performed in a myopic way, i.e., at each iteration, an agent selects the next task to undertake considering an acquisition function that balances exploitation and exploration. The algorithms were run on instances generated from South Hilo district, Hawaii. The results show that the BiG-MRTA is more than 10 3 times efficient than the ILP, and it can also offer up to 46 % higher task completion when compared to a random walk baseline in problems with 1000 tasks.
Some studies in the literature investigate several dynamic issues (velocity, communication delays, etc.) of coordinating drones swarms, as for instance in [19,20].

3.4. V-Shaped Formation

Another inspiration for our work comes from [3], in which the authors study the energy conservation of V-shaped swarming flight for fixed-wing drones. The study has shown that the V-shaped formation drones can save up to 70% of their energy, and that adopting leader replacements during the flight, a further 21% of their energy is saved, consequently, increasing the flight time and the distance travelled.

3.5. Position of This Study

Table 1 summarizes the set of closely related studies and compares them with this study in terms of the problem addressed, the objective function, the proposed method (s) and the case study.
Analyzing Table 1, the lack of works that study DRPs using multi-agent systems in a decentralized approach and performing online computation is clearly noticeable. Moreover, no other work models a DRP that considers cooperation between drones that can fly in V-shaped formations with leader replacements. Another point to be highlighted is related to the objective addressed since the search for the maximum number of victims in a post-disaster context is considered crucial for disaster management.

4. DSRP Computational Model and Methods

In the DSRP multi-agent decentralized approach, each drone is modeled as an agent able to compute its route based on real-time information. The drones can decide when it is appropriate (or not) to work cooperatively in a swarm of drones, considering a V-shaped formation with leader replacements. This decision is addressed by means of a heuristic proposed here. It should be noted that two versions of this model have been developed. The first is the offline version, whose main feature is the fact that when a drone searches for victims at a search location, the number of victims identified will always be equal to the expected number. As for the other version, the online version, the number of victims identified will be obtained at the instant of identification, and may be greater or less than the expected number.
Figure 2 shows a flowchart of the proposed decentralized model. This algorithm contains two main modules: the Main Control (MC) and the Drone Agent (DA). The MC is responsible for building the heatmap of the post-disaster area containing all the information about possible victim locations. In the sequel, a graph based on this heatmap is built. Then, the algorithm checks which drones are available, updates the graph by getting their new information and sends it to the available drones. In the following, the MC performs a leader election to choose a leader. Finally, the MC controls the return of the drones to the base, considering the start of a new operation or the end of the whole operation.
The DA starts its work by becoming available and communicating with the MC. Thus, it waits for the leader election and when the answer from MC is positive the Drone Swarm Heuristic algorithm is executed to choose the next node to visit in the next trip. This decision is made by obtaining the updated graph and information about the other operations from the MC. In this module, it also decides about the drone swarms’ V-shaped formation, by making the DA able to join a nearby drone swarm, and the leader replacements during the flight. In order to perform any operation, the DA must check whether it will have enough battery power to reach the next node, search for victims and return to the base. Thus, the DA performs its operation, which may be to start the trip to the next node and then search for victims at this node; otherwise, it stops and returns to the base station. Finally, after finishing its operation, the DA reports to the MC if it will be available for the next operation or if it has finished all its work.
By employing an auction-based algorithm, for example, the Consensus-Based Bundle Algorithm (CBBA) [21], decentralized coordination can be achieved, enabling agents to effectively exchange information between themselves. Such an approach fosters distributed decision-making, increased autonomy and robustness in the face of uncertainties or disruptions. With regard to the architecture of the data communication network, we can cite some recent works that address interesting architectures in which our model can be easily incorporated, making it possible to deploy it in real disasters. In [22] we are introduced to a communication network architecture for a squadron of drones to be used in the scanning rocket impact area of Barreira do Inferno Launch Center in Rio Grande do Norte, Brazil to detect intruder boats. The system uses Wireless Sensor Networks, specifically employing XBee Pro 900HP S3B modules, for information transmission within a range of 5 km.
The remainder of this section describes in more detail both modules of the algorithm, Main Control (Section 4.1) and Drone Agent (Section 4.2). It is important to note that both modules contain simple and reproducible algorithms.

4.1. Main Control

The main control module contains five sub-modules: Get heatmap and Build a graph, Drones available, Update graph/info, Leader election and Drones returned. These sub-modules are detailed next.
Get heatmap and build graph. The heatmap is essential information to start the search for a solution to the DSRP. The procedure on how to build the heatmap and transform it into a complete graph is illustrated in Figure 3. This procedure consists of five steps.
The first step consists of obtaining the map of the post-disaster search area through some data source, for instance, the open data source OpenStreetMap (OSM). Then, the second step consists of defining all possible search locations for the drones, and setting the radius of action according to the range detection of the drones. The goals are to identify victims and cover the entire search area using this information.
The third step looks for the data related to the expected number of victims ( e v ) and the victim identification probability ( p v ) in each possible search location. Such information can be obtained from official government data, as well as through unofficial data from other sources (ground teams, Non-governmental organizations, etc.) The e v number can be deduced, for example, from the number of buildings existing before the disaster. The probability p v is defined by taking into account the difficulty of identifying victims in each search area after the disaster has occurred. The more buildings there are, the higher the expected number of victims, and the lower the probability of identifying them. Figure 2 shows each search area colored in tints of red, in which the deeper the tint, the higher the estimation of the number of victims.
In the fourth step, the conversion of the heatmap into a complete graph is initiated, by first building a grid graph. This transformation is made as follows. Each search area of the grid represents a vertex of the graph, and the edges connect adjacent search areas. The edges are weighted by the battery consumption related to the path of a single drone. Once again, the number of buildings can help to define these weights.
In the last step, the complete graph is built, by solving the All Pairs Shortest Path Problem and then connecting all pairs of vertices with edges weighted by the minimum battery consumption between them, i.e., the one that corresponds to the shortest path between such vertices in the previous graph.
This step allows the drone availability to be checked. At this stage, there are three possibilities for receiving messages concerning the availability of drones. Two of them are treated in trivial ways, i.e., as soon as the message is received the process continues its flow directly to the next step. The third possibility requires synchronization as well as consistency of the graph information. The two trivial possibilities are when the DA module starts its processing and after the drone finishes its battery recharge. In the latter case, the message is only sent if there is still enough time to visit at least one search location. The last one is when the drone just ends up performing a search for victims operation. In order to avoid exchanging too many messages with the MC module, it is considered that at the end of the search, the current leader will control the availability of his swarm and he will be responsible for sending the message to the MC, notifying the swarm availability and also containing new information about the number of victims identified by the swarm.
Update graph/info. In the Update graph/info step, the information obtained by the leaders regarding the number of victims identified by the drones is updated in the graph. In addition, information related to the current allocation of drones to search locations is also updated. Considering this information, it is important to limit the number of drones that are on their way to the same search location.
Leader election. This step performs the choice of an available drone to be the next leader. This choice is performed according to a very simple rule: the next leader will be the one with the largest amount of available battery. In case of a tie, the next leader will be chosen randomly among those with sufficient battery.
Drones returned. Drones returned is the last sub-module of MC and is responsible for controlling the return of drones to the base. Basically, it is performed as a check on the remaining time of the whole operation, considering the maximum time available T. If there is still enough time for the drone to visit at least one search location and still return to the base, then the drone becomes available and this message is transmitted to the DA sub-module. Otherwise, the DA module of such a drone is concluded. In this way, the MC must wait until all the drones have no more time left for the operation to stop the algorithm.

4.2. Drone Agent

As mentioned before, the DA module starts by sending a message indicating its availability to the MC. Then, the processing continues following the flow of its eight sub-modules detailed next: Leader, Get graph/info, Drone swarm heuristic, Join swarm, Battery check, Start trip/Return base, Search for victims and Recharge.
Leader. In this step, the agent waits for the leader’s election. Once it is defined, the agent immediately moves on to the next step, the heuristic choice based on updated information.
Get graph/info. Before choosing the next search location to visit, the agent updates the information regarding the graph, as well as the operations that other agents are performing at the moment. These data are essential to make the best decisions considering the current configuration of the environment. Hence, the DA requests, and obtains, from the MC the current information which, more specifically, corresponds not only to the expected number of victims remaining at each search location but also to what are the trips that other agents are performing at that moment.
Drone swarm heuristic. The Drone Swarm Heuristic (DSH) will build iteratively a complete solution for the DSRP based on two criteria: the expected number of victims and operation cost. The choice to define only the next visit at each moment is necessary to guarantee the applicability of the model. Thus, the drones make this decision promptly, avoiding a bottleneck in the model and consuming less energy. Initially, DSH uses the data obtained from the previous sub-module to know the possible search locations available to be visited by the agent, this information is referred to here as the candidate list (CL). It means that if a search location has a positive remaining number of expected victims, then it will be included in the CL. Otherwise, if this number is close to zero, it means that all expected victims were identified. Then, DSH will rank each search location v according to the F function (1):
F ( i , v ) = e v × p v c i j × s w a r m ( v ) + t s ,
which is responsible for obtaining, given a start location i and a search location v, the ratio of the expected number of remaining victims ( e v × p v ) over the operation cost (the trip cost c i v may be reduced according to the number of drones in the swarm). The objective is to maximize g in CL, the F m a x = max { F ( i , v ) | v C L } . In other words, the g m a x represents the search location that provides the highest victim identification while also taking into account the cost of this operation.
It is noteworthy that the DA can only choose feasible search locations to visit, taking into account enough battery to fly to the location, detect and return to the base station.
Join swarm. Once the decision on the node to be visited is made, the agent has the possibility of joining up with another agent or a swarm that is making a common trip. Even though they may have different final destinations, agents can group together to make an intermediate trip and split up afterward.
In [3], the authors presented some possible scenarios of savings when using a drone swarm performing flights in a V-shaped formation. Among all of them, in this work, we adopted the one that the authors consider the closest to real applications, i.e., reducing to 10%, 15%, 19% and 21% of energy consumption by using two, three, four and five drones. In addition, in [3] the possibility of reducing to 20% of extra savings by adopting the V-shaped formation with leader replacements in each case is also presented. Table 2 presents the savings of this realistic scenario, considering the V-shaped formation and leader replacements according to the number of drones. In the last row (Total savings) we present the combined savings adopted by our computational model. To clarify, in our model, if the energy consumption between two locations is 100 and there is a swarm of two drones flying between them, this means that we will have a final consumption of 72 (28%) because of the reduction in total consumption, being 90 (10%) because of the flight in a V-shaped formation and finally 72 (20% extra) because of the replacement of leaders. It is noticeable from the table that drone swarms are limited to a maximum of five drones. This means that during the whole operation at most five drones are allowed to be in the same V-shaped formation. If more than five drones fly to the same search location, then the model will allow at least two different swarms to coexist.
The swarm function used by Equation (1) works as follows. According to a search location v, the swarm function returns the corresponding saving value related to the number of drones that visit v.
Battery check. The agent must check its remaining battery during the whole operation to prevent the drone from dropping during its flight. The Battery check sub-module periodically performs such a check, considering that the agent must always have enough battery to return to its base. If, for any reason, the remaining battery is not enough to continue the current operation, this sub-module triggers the immediate return of the agent to the base.
Start trip/return base. The Start trip/return base sub-module is responsible for conducting the trip for the agent. An agent can perform the trip by itself or in a swarm of drones, in the latter case the trip cost will be lower for all drones involved in this cooperation. When the agent is running out of battery, it will perform a return to base, which is also conducted as a normal trip, alone or in a cooperative flight.
Search for victims. The search for victims is an action of an agent that demands a fixed time. If this action is carried out by more than one drone the time required will be similar for each. However, the more agents there are, the greater the probability of identifying victims. At the end of this sub-module, the DA leader sends a message to the Drones available sub-module reporting not only on the number of victims identified but also on drone availability for future operations.
Recharge. The recharge of an agent requires a fixed time, which must be respected until the end for the recharge to take place, i.e., it is not possible to recharge an agent partially. Once the recharge is complete, the DA notifies the Drones returned sub-module of the MC that the battery is full and whether there is still enough time to perform any further operations. If there is not enough time, in addition to notifying the MC, the agent terminates its activity.

5. Computational Experiments

All the algorithms were implemented in C++, using the Windows/GNU g++ compiler (version 8.1.0). All tests with the proposed algorithms were executed on an Intel(R) Core(TM) i5-9300H @ 2.40 GHz processor with 16 GB RAM on Windows 10.
The solutions produced by the proposed methods were adapted to be visualized using the simulator CoppeliaSim [6]. This allows the execution of the solutions to be followed dynamically.
The goals of the numerical experiments are to check the performance and the impact of the proposed offline and online methods using the realistic case study. For such a purpose, several indicators are used such as:
  • O→ total number of operations achieved by all drones;
  • O c → the number of operations achieved in cooperation;
  • T→ the total number of trips;
  • T v → the total number of trips in a V-shaped formation;
  • S→ the total number of scans;
  • S c → the total number of scans in cooperation;
  • R→ the total number of recharges;
  • e n d → the time the last drone returns to base;
  • a v g → the average time the drones return to base;
  • C→ the total cost in time units to conclude all operations: to take off from the base, arrive at search locations, identify victims, return to a base and recharge;
  • C ¯ → the total cost in time units to conclude all operations without considering savings from the V-shaped formation flight;
  • G ( % ) → the percentage gain obtained by considering the savings;
  • E→ the total number of expected victims;
  • V→ the total number of victims identified by the drones;
  • V ( % ) → the percentage related to the number of victims found.
In the following sections, the case study, the development and settings and results considering both offline and online approaches, together with sensitivity analysis are detailed in the next sections.

5.1. Case Study: Beirut Port Explosion

The Beirut Port scenarios were generated with the instance generator coming from the study [5], using additional features for the DSRP. The process was described in Section 4.1. A fleet of drones able to communicate with each other is defined. The complete graph is obtained by All Pairs Shortest Path Problem. Figure 4 shows the selected area divided into squares of 100 m 2 , colored in tints of red to illustrate the expected number of victims. The dimension of the grid graph constructed is 42 × 25, thus resulting in a complete graph of 1050 vertices.

Scenarios

Three scenarios, referred here as Scenario 1, 2 and 3, were generated with 1050 vertices, 2 recharge base stations, and 8 drones. Each drone has a range limit of 3540, a recharging time of 2400, and the time spent detecting victims equals one. These values are based on the eBee senseFly drone [23], which was also set and used by [3]. The maximum time for the whole operation is 7200. The differences between the three scenarios are the variation in the expected number of victims in each search area (totaling 29,349, 30,599, and 31,711, respectively). They also differ in the identification probability for each search area.

5.2. Development and Settings

The MC module makes use of a main thread, while the DA uses more than one thread, working in parallel. This distinguishes our development from that of [18], who employ only one thread.
Figure 5 shows the interface of CoppeliaSim as well as an example of a loaded solution for the DSRP, containing four drones and nine vertices (one base and eight search areas). Each drone is positioned at a certain height in order to facilitate viewing, even if they are in a V-shaped formation. This has been conducted to simplify the simulation. A code color is used to identify the leaders, the drones following the leader, drone recharging, for example, the yellow and blue vertices that represent, respectively, the base stations, and the potential nodes with victims. The size of each yellow circle is proportional to the expected number of victims in the corresponding area.

5.3. Results Using an Offline Approach

The performance of the proposed algorithm is also evaluated in an offline approach based on the Beirut Port explosion. In the offline version, the number of victims obtained in each search location will always be equal to the expected number. For instance, if it is expected that there are 100 victims in a search location and the identification probability is 60%, then for each victim search operation, 60% of the remaining victims will be identified, i.e., 60, 24, 9.6, 3.84, etc.

5.3.1. Sensitivity Analysis on the Number of Drones

In this experiment, the number of drones varies (4, 8, 16, 32 and 64), while the other parameters remain similar along the optimization. Table 3, Table 4 and Table 5 present results using the aforementioned indicators.
Obviously, the more the number of drones increases, the higher the percentage of identified expected victims is. It is noteworthy that with only four drones it is possible to reach more than 91% of identified victims. When increasing to eight drones, this percentage reaches more than 99% of the expected victims. Finally, with 16, 32 and 64 drones, practically all victims are expected to be identified. Taking into account the modest savings model applied, it is considered that reasonable gains can be achieved through the use of V-shaped formation flight, reaching values above 3%.
Results using 32 and 64 drones show that the final time spent concluding all operations is less than the maximum time allowed. Due to that, the maximum time limit used in the simulation was removed, in order to check the impact of using each number of drones. Figure 6, Figure 7 and Figure 8 depict a graph that contains the percentage of expected victims identified by our computational model over time and according to the number of drones for Scenarios 1, 2 and 3.
These results show that the proposed method obtains a good coverage of the post-disaster area of Beirut in a very acceptable time. Using 64 drones, the time required to reach all expected victims is about 40 min. If the number of drones equals 32, this time increases to one hour. All the expected victims were found using 16 drones and about 2.5 h. Six hours are necessary to identify all the expected victims using eight drones. Not surprisingly, the longest time to identify all the victims is when there are only four drones, taking slightly less than 12 h.

5.3.2. Sensitivity Analysis of the V-Shaped Formation with Leader Replacements

Table 6, Table 7 and Table 8 present the results obtained without using a V-shaped formation with leader replacements, respectively, for Scenario 1, 2 and 3, using 4, 8, 16, 32 and 64 drones. Moreover, Figure 9 and Figure 10 consider, respectively, the additional cost and number of victims found, whenever not considering the savings related to the V-shaped formation flight with leader replacements.
Results clearly indicate that not using V-shaped formations with leader replacements led to a smaller number of victim detection and a higher cost, compared to the previous results. The cost is increased in up to 80%, and the victim detection is decreased up to 1% It is worth noting that the number of recharges also increases for 32 and 64 drones.
Figure 9 illustrates higher cost, except with four drones in scenario 1, which was slightly lower, −0.20. Using more drones, 32 and 64 drones results in a higher cost, especially using a V-shaped formation. This is due to the additional recharges required. On the contrary, the number of victims identified increases, as depicted in Figure 10. Using 32 and 64 all victims are identified, while the improvement using fewer drones (4, 8 and 16) is noticeable. On average, 137 extra victims could be identified with 4 drones, 18 extra victims with 8 drones and 1 extra victim with 16 drones. Such results demonstrate the importance of adopting the savings related to the V-shaped formation strategy.

5.3.3. Sensitivity Analysis on the Detection Probability

In these experiments, we evaluated the impact of using a detection probability associated with the search locations. For this purpose, three levels of detection probabilities, defined by means of intervals, were used: low ( [ 0 % , 33 % ] ), medium ( [ 33 % , 66 % ] ), and high ( [ 66 % , 100 % ] ). Values were randomly generated within these ranges for each search location of each scenario. The results obtained for scenarios 1, 2 and 3 using eight drones are shown, respectively, in Table 9, Table 10 and Table 11.
It is remarkable for the three Scenarios, that even with low identification probabilities, the proposed computational model was able to find a high percentage of expected victims, more than 87%. Another interesting observation is that in these more "adverse" situations, the method makes use of more flights in a V-shaped formation. This can be seen when observing the highest gains in savings and, of course, the number of squad operations. Whenever the probabilities were applied at the medium level, more than 98.7% of victims were identified in all Scenarios, obtaining savings of more than 1.3% with V-shaped formation flight. By using the level with a high identification probability, the percentage of identified victims was greater than 99.6% and the savings gain was about 1%. This happens since the use of V-shaped formation flight is not as necessary as in the low detection probability level.

5.3.4. Sensitivity Analysis on the Number of Expected Victims

The goal of these numerical experiments is to evaluate the impact of the method when the expected number of victims at each search location is underestimated or overestimated. Therefore, the Scenarios were adapted to this case. In an underestimated case, each search location has the number of victims decreased to a random value between 50% to 75%, 25% to 50%, and 0% to 25%, considering the initial number of victims. In the overestimated case, the number of victims was increased in each location as a random value between 0% to 25%, 25% to 50% and 50% to 75%, considering the initial number of victims. Results are depicted in Table 12, Table 13 and Table 14, using eight drones. The previous results obtained in Table 3, Table 4 and Table 5 are presented in line “Initial Scenario” to allow comparison.
Results remain stable for underestimated and overestimated cases, i.e., more than 99% of the expected victims are found, with gains in savings with flights in V-shaped formation between 1% and 2%. These results allow the robustness of the proposed method to be evaluated and, as a consequence, its applicability in real situations.

5.4. Results Using an Online Approach

In post-disasters, the probability of detecting victims in a search location may vary in every scanning situation. Thus, at each location, the number of victims identified is not always equal to the expected number. To address this context, an online version of the proposed method is tested, using the underestimate and overestimate cases, considering the variation of the detection probability. Both have the following intervals: [0–5%], [5–10%], [10–15%] and [15–20%]. For instance, whenever applying an underestimated case related to the interval [0–5%] over a search location where identification probability equals 60%, the underestimated case varies from 55% to 60%.
Table 15, Table 16 and Table 17 present the results obtained for the online approach, using the three Scenarios 1, 2, and 3. The proposed method seems robust for the Scenarios used, even in the most adverse situationwhere the probabilities decrease between <15% and 20%, the model was able to locate more than 97% of victims. Applying the overestimated case and the interval >15% and 20%, the method is able to identify almost all the victims. In summary, for these Scenarios, the approach deals very well with uncertainties related to the identifications.

6. Conclusions

In this article, the Drones Swarm Routing Problem (DSRP) is proposed, motivated by the application of finding victims after a disaster. The main novelty of the DSRP is to address a cooperation issue between drones. Both online and offline strategies are tested using drone cooperation. This is conducted with multiple drones and using a V-shaped formation with leader replacements that lead to less energy consumption.
A computational model that applies the Drone Swarm Heuristic and uses multi-agents in a decentralized approach is proposed. It has decision features allowing a drone to operate alone or in a swarm. It relies on the hypothesis that drones are able to correctly fly within a group without collisions, considering both path planning and detection. This assumption is used since we are focusing on the decision optimization problem. The proposed computational model was developed using threads. Solutions obtained were also tested using the robot simulator CoppeliaSim, in order to visualize the operations of drones over time.
A case study was conducted based on the Beirut port explosion, thereby generating three test Scenarios. They were tested using an online and an offline approach. Extensive numerical experiments were run for the off-line version: varying the number of drones; enabling and disabling a flight-related V-shaped formation with leader replacements; varying the identification probability, and the number of expected victims. In the sequel, the online version was studied, where the identification probability was randomly modified along the test.
For the Scenarios used in this study, the proposed heuristic methods are robust. Moreover, using eight drones, results indicate that more than 99% of victims can be found within 2 h. Using 16, 32 and 64 drones, a slight improvement is obtained, despite a higher running time. The V-shaped formation with leader replacements gives very interesting results, making it possible to find extra numbers of victims at a lower cost. In general, the proposed heuristic method has good coverage.
This study opens several avenues of research. The communication issue, which in practice consumes a large part of the energy consumption can be investigated together with other types of topologies for drones, for example, the work of [24] presents an architecture including aerial base stations that must provide network services to ground users who can move around. Other methods, such as 3D search space with Reinforcement Learning [25] or even artificial potential fields [26], can be investigated in order to carry out the path planning and also guarantee the permanence of the V-shaped formation. In addition, the detection is not explicitly integrated in this study. In fact, it is possible to accomplish that using thermal cameras, or even artificial intelligence using images of the areas. This step is an area for forthcoming study. Moreover, it is noticeable that observations at a higher altitude allow larger areas to be scanned at once, in spite of lower precision. On the contrary, a lower altitude allows more local and precise observations. Analyzing the trade-off between higher and lower altitudes is left for future work.

Author Contributions

Conceptualization, M.N.H., C.D. and A.C.S.; methodology, M.N.H., C.D. and A.A.C.; validation, M.N.H. and C.D.; formal analysis, M.N.H. and C.D.; data curation, A.A.C. and M.N.H.; draft preparation, M.N.H.; writing—review and editing, M.N.H. and A.C.S.; visualization, M.N.H. and A.A.C.; supervision, C.D. and A.C.S.; project administration, A.C.S.; funding acquisition, A.C.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Normandie Region, European Union, Programme Opérationnel Région Normandie FEDER-FSE/IEJ-Haute Normandie, Available online: https://www.europe-en-normandie.eu/ (accessed on 26 October 2023), in the context of the emerging LIS project.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Acknowledgments

The authors would like to thank the Normandie Region for its financial support and to the anonymous reviewers for their careful reading of our manuscript and their many insightful comments and suggestions.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ALNSAdaptive Large Neighborhood Search
CLCandidate List
CBBAConsensus-Based Bundle Algorithm
DADrone Agent
DRPDrone Routing Problems
DSHDrone Swarm Heuristic
DSRPDrone Swarms Routing Problem
ILPInteger Linear Programming
MCMain Control
MILPMixed-Integer Linear Programming
MINLPMixed-Integer Nonlinear Programming
MBATAModified Backtracking Adaptive Threshold Accepting
MASMulti-Agents Systems
MRTAMulti-Robot Task Allocation
OSMOpenStreetMap
VRPVehicle Routing Problem

References

  1. Wikipedia Contributors. 2020 Beirut Explosion—Wikipedia. The Free Encyclopedia. 2023. Available online: https://en.wikipedia.org/w/index.php?title=2020_Beirut_explosion&oldid=1150690393 (accessed on 15 May 2023).
  2. Rejeb, A.; Rejeb, K.; Simske, S.; Treiblmaier, H. Humanitarian drones: A review and research agenda. Internet Things 2021, 16, 100434. [Google Scholar] [CrossRef]
  3. Mirzaeinia, A.; Hassanalian, M.; Lee, K.; Mirzaeinia, M. Energy conservation of V-shaped swarming fixed-wing drones through position reconfiguration. Aerosp. Sci. Technol. 2019, 94, 105398. [Google Scholar] [CrossRef]
  4. Aggarwal, S.; Kumar, N. Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges. Comput. Commun. 2020, 149, 270–299. [Google Scholar] [CrossRef]
  5. Coco, A.A.; Duhamel, C.; Santos, A.C.; Haddad, M.N. Solving the probabilistic drone routing problem—Searching for victims in the aftermath of disasters. 2023; in press. [Google Scholar]
  6. Rohmer, E.; Singh, S.P.N.; Freese, M. CoppeliaSim (formerly V-REP): A versatile and scalable robot simulation framework. In Proceedings of the International Conference on Intelligent Robots and Systems (IROS), Tokyo, Japan, 3–7 November 2013; Available online: https://www.coppeliarobotics.com (accessed on 18 May 2023).
  7. Dantzig, G.B.; Ramser, J.H. The truck dispatching problem. Manag. Sci. 1959, 6, 80–91. [Google Scholar] [CrossRef]
  8. Otto, A.; Agatz, N.; Campbell, J.; Golden, B.; Pesch, E. Optimization approaches for civil applications of unmanned aerial vehicles (UAVs) or aerial drones: A survey. Networks 2018, 72, 411–458. [Google Scholar] [CrossRef]
  9. Rojas Viloria, D.; Solano-Charris, E.L.; Muñoz-Villamizar, A.; Montoya-Torres, J.R. Unmanned aerial vehicles/drones in vehicle routing problems: A literature review. Int. Trans. Oper. Res. 2021, 28, 1626–1657. [Google Scholar] [CrossRef]
  10. Macrina, G.; Pugliese, L.D.P.; Guerriero, F.; Laporte, G. Drone-aided routing: A literature review. Transp. Res. Part Emerg. Technol. 2020, 120, 102762. [Google Scholar] [CrossRef]
  11. Moshref-Javadi, M.; Winkenbach, M. Applications and research avenues for drone-based models in logistics: A classification and review. Expert Syst. Appl. 2021, 177, 114854. [Google Scholar] [CrossRef]
  12. Golden, B.; Wang, X.; Wasil, E. The evolution of the Vehicle Routing Problem—A survey of VRP research and practice from 2005 to 2022. In A Survey of VRP Research and Practice from 2005 to 2022; Springer Nature: Cham, Switzerland, 2023; pp. 1–64. [Google Scholar]
  13. Cannioto, M.; D’Alessandro, A.; Lo Bosco, G.; Scudero, S.; Vitale, G. Brief communication: Vehicle routing problem and UAV application in the post-earthquake scenario. Nat. Hazards Earth Syst. Sci. 2017, 17, 1939–1946. [Google Scholar] [CrossRef]
  14. Oruc, B.E.; Kara, B.Y. Post-disaster assessment routing problem. Transp. Res. Part B Methodol. 2018, 116, 76–102. [Google Scholar] [CrossRef]
  15. Coutinho, W.P.; Fliege, J.; Battarra, M. Glider routing and trajectory optimisation in disaster assessment. Eur. J. Oper. Res. 2019, 274, 1138–1154. [Google Scholar] [CrossRef]
  16. Chowdhury, S.; Shahvari, O.; Marufuzzaman, M.; Li, X.; Bian, L. Drone routing and optimization for post-disaster inspection. Comput. Ind. Eng. 2021, 159, 107495. [Google Scholar] [CrossRef]
  17. Skaltsis, G.M.; Shin, H.S.; Tsourdos, A. A survey of task allocation techniques in MAS. In Proceedings of the 2021 International Conference on Unmanned Aircraft Systems (ICUAS), Athens, Greece, 15–18 June 2021; pp. 488–497. [Google Scholar]
  18. Ghassemi, P.; Chowdhury, S. Multi-robot task allocation in disaster response: Addressing dynamic tasks with deadlines and robots with range and payload constraints. Robot. Auton. Syst. 2022, 147, 103905. [Google Scholar] [CrossRef]
  19. Li, W.; Qin, K.; Li, G.; Shi, M.; Zhang, X. Robust bipartite tracking consensus of multi-agent systems via neural network combined with extended high-gain observer. ISA Trans. 2023, 136, 31–45. [Google Scholar] [CrossRef] [PubMed]
  20. Li, W.; Shi, M.; Shi, L.; Lin, B.; Qin, K. Containment Tracking for Networked Agents Subject to Nonuniform Communication Delays. IEEE Trans. Netw. Sci. Eng. 2023, 10, 3658–3669. [Google Scholar] [CrossRef]
  21. Choi, H.L.; Brunet, L.; How, J.P. Consensus-based decentralized auctions for robust task allocation. IEEE Trans. Robot. 2009, 25, 912–926. [Google Scholar] [CrossRef]
  22. Silva, M.R.; Souza, E.S.; Alsina, P.J.; Leite, D.L.; Morais, M.R.; Pereira, D.S.; Nascimento, L.B.P.; Medeiros, A.A.D.; Junior, F.H.C.; Nogueira, M.B.; et al. Performance evaluation of multi-UAV network applied to scanning rocket impact area. Sensors 2019, 19, 4895. [Google Scholar] [CrossRef] [PubMed]
  23. AgEagle. eBee SenseFly Series. Available online: https://ageagle.com/drones/ebee-x/ (accessed on 9 June 2023).
  24. Arani, A.H.; Hu, P.; Zhu, Y. HAPS-UAV-enabled heterogeneous networks: A deep reinforcement learning approach. IEEE Open J. Commun. Soc. 2023, 4, 1745–1760. [Google Scholar] [CrossRef]
  25. Silvirianti; Shin, S.Y. Energy-efficient multidimensional trajectory of UAV-aided IoT networks with reinforcement learning. IEEE Internet Things J. 2022, 9, 19214–19226. [Google Scholar] [CrossRef]
  26. Chen, S.; Yang, Z.; Liu, Z.; Jin, H. An improved artificial potential field based path planning algorithm for unmanned aerial vehicle in dynamic environments. In Proceedings of the 2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC), Shenzhen, China, 15–17 December 2017; pp. 591–596. [Google Scholar]
Figure 1. Example of a DSRP with eight drones, one base and eight search areas.
Figure 1. Example of a DSRP with eight drones, one base and eight search areas.
Sensors 23 09540 g001
Figure 2. Flowchart of the computational model for the DSRP.
Figure 2. Flowchart of the computational model for the DSRP.
Sensors 23 09540 g002
Figure 3. How to build the heatmap and transform it into a complete graph.
Figure 3. How to build the heatmap and transform it into a complete graph.
Sensors 23 09540 g003
Figure 4. Case study: Beirut Port explosion.
Figure 4. Case study: Beirut Port explosion.
Sensors 23 09540 g004
Figure 5. Example of a solution loaded in CoppeliaSim.
Figure 5. Example of a solution loaded in CoppeliaSim.
Sensors 23 09540 g005
Figure 6. Scenario 1: Results varying the number of drones, in terms of time and percentage of expected victims.
Figure 6. Scenario 1: Results varying the number of drones, in terms of time and percentage of expected victims.
Sensors 23 09540 g006
Figure 7. Scenario 2: Results varying the number of drones, in terms of time and percentage of expected victims.
Figure 7. Scenario 2: Results varying the number of drones, in terms of time and percentage of expected victims.
Sensors 23 09540 g007
Figure 8. Scenario 3: Results varying the number of drones, in terms of time and percentage of expected victims.
Figure 8. Scenario 3: Results varying the number of drones, in terms of time and percentage of expected victims.
Sensors 23 09540 g008
Figure 9. Additional cost required without V-shaped formation savings.
Figure 9. Additional cost required without V-shaped formation savings.
Sensors 23 09540 g009
Figure 10. Number of extra expected victims identified with V-shaped formation savings.
Figure 10. Number of extra expected victims identified with V-shaped formation savings.
Sensors 23 09540 g010
Table 1. Comparison of closely related works with this study.
Table 1. Comparison of closely related works with this study.
AuthorsProblem AddressedObjective FunctionMethod(s)Case Study
Cannioto et al. (2017) [13]Drone routingMinimize travel
distance
Metaheuristic,
centralized
Sicily,
Italy
Oruc and Kara (2018) [14]Drone routingMaximize assessed
road segments and
points of interest
MILP, exact,
heuristic,
centralized
Kartal,
Turkey
Coutinho et al. (2019) [15]Drone routingMinimize total
flight time
MINLP,
centralized
Cities,
UK
Chowdhury et al. (2021) [16]Drone routingMinimize inspection
cost
MILP,
metaheuristics,
centralized
Mississippi,
USA
Ghassemi and
Chowdhury (2022) [18]
Online Task allocation
(Drone routing)
Maximize completed
tasks
MILP,
metaheuristics,
decentralized,
multi-agent systems
South Hilo
district, Hawaii
Our workOnline Drone routingMaximize identification
of victims
Heuristic,
decentralized,
multi-agent systems
Beirut,
Lebanon
Table 2. Possible savings for the drone swarms obtained from [3].
Table 2. Possible savings for the drone swarms obtained from [3].
Number of Drones12345
V-shaped formation0%10%15%19%21%
Leader replacements0%20%20%20%20%
Total savings0%28%32%35.2%36.8%
Table 3. Results produced using Scenario 1.
Table 3. Results produced using Scenario 1.
Scenario 1O O c T T v S S c R end avg C C ¯ G(%)EVV(%)
4 drones3249171215152030047199.937199.4828,797.928,903.10.37%29,34926,946.191.81%
8 drones6592300231774426722187199.717194.5857,556.658,3831.44%29,34929,20099.49%
16 drones12,45649847572157683268167199.147179.07114,865116,5231.44%29,34929,347.499.99%
32 drones14,89811356257404864172103370.753175.09101,603104,1762.53%29,34929,348.599.99%
64 drones17,797187999761018782182902715.882461.86157,559162,7193.27%29,34929,348.699.99%
Table 4. Results produced using Scenario 2.
Table 4. Results produced using Scenario 2.
Scenario 2O O c T T v S S c R end avg C C ¯ G(%)EVV(%)
4 drones32839811632521167047199.977182.9728,731.928,929.10.69%30,59928,970.294.68%
8 drones616712723805937796187199.747184.4757,475.858,147.71.17%30,59930,439.699.48%
16 drones11,50241648312066655128167196.727164.71114,635.4116,536.61.66%30,59930,597.199.99%
32 drones14,2126077108273710419003533.233425.93109,630111,7241.91%30,59930,598.599.99%
64 drones16,6519689662798698915502696.052343.24149,967153,8572.59%30,59930,598.699.99%
Table 5. Results produced using Scenario 3.
Table 5. Results produced using Scenario 3.
Scenario 3O O c T T v S S c R end avg C C ¯ G(%)EVV(%)
4 drones3288221197162087347199.827182.0928,728.328,865.20.48%31,71129,522.893.10%
8 drones663411523788742482087190.957187.2957,498.458,299.21.39%31,71131,544.399.47%
16 drones12,9022794785198810165167199.557186.52114,984116,4481.27%31,71131,709.799.99%
32 drones14,7889776585408819856155688.023629.65116,149118,4942.02%31,71131,710.599.99%
64 drones18,340166210,6711137766950903188.752617.07167,493173,7653.74%31,71131,710.699.99%
Table 6. Results for Scenario 1 without using V-shaped formation with leader replacements.
Table 6. Results for Scenario 1 without using V-shaped formation with leader replacements.
Scenario 1OTSR end avg CEVV(%)
4 drones31331200192947199.797199.4228,797.729,34926,773.291.22%
8 drones67452300443787199.967199.4457,595.529,34929,181.599.43%
16 drones11,99345197458167199.917198.85115,18229,34929,346.699.99%
32 drones15,36565758760306587.265660.85181,14729,34929,348.599.99%
64 drones17,7639498826324561.892539.06162,50029,34929,348.699.99%
Table 7. Results for Scenario 2 without using V-shaped formation with leader replacements.
Table 7. Results for Scenario 2 without using V-shaped formation with leader replacements.
Scenario 2OTSR end avg CEVV(%)
4 drones33281185213947199.997199.8628,799.530,59928,849.294.28%
8 drones61532365378087199.887199.4157,595.330,59930,42699.43%
16 drones11,47246816775167199.937197.88115,16630,59930,597.199.99%
32 drones14,30571167157326317.95885.28188,32930,59930,598.599.99%
64 drones16,7389950678802849.222498.59159,91030,59930,598.699.99%
Table 8. Results for Scenario 3 without using V-shaped formation with leader replacements.
Table 8. Results for Scenario 3 without using V-shaped formation with leader replacements.
Scenario 3OTSR end avg CEVV(%)
4 drones35681150241447199.877199.3328,797.331,71129,403.192.72%
8 drones65222333418187199.817199.4157,595.331,71131,522.499.41%
16 drones11,87946607203167199.977197.74115,16431,71131,707.399.99%
32 drones15,83980217786327098.456535.99209,15231,71131,710.599.99%
64 drones18,96310,512844654830.352840.62181,80031,71131,710.699.99%
Table 9. Impact of using different levels of probability for Scenario 1.
Table 9. Impact of using different levels of probability for Scenario 1.
Scenario 1O O c T T v S S c R end avg C C ¯ G(%)EVV(%)
[ 0 % , 33 % ] 15,1371687146324013666144187199.947178.0957,424.759,471.93.57%29,34925,636.787.35%
[ 33 % , 66 % ] 8401167216912362243887199.977162.6257,30158,372.51.87%29,34928,973.498.72%
[ 66 % , 100 % ] 5595632464563123187199.737184.5457,476.358,002.20.91%29,34929,245.199.65%
Table 10. Impact of using different levels of probability for Scenario 2.
Table 10. Impact of using different levels of probability for Scenario 2.
Scenario 2O O c T T v S S c R end avg C C ¯ G(%)EVV(%)
[ 0 % , 33 % ] 14,8461730150222113,336150187199.987187.9657,503.759,230.93.00%30,59927,098.788.56%
[ 33 % , 66 % ] 842515722049762135487199.667172.3657,378.858,146.61.34%30,59930,26798.91%
[ 66 % , 100 % ] 5486602457533021087199.887188.2557,50658,0160.89%30,59930,481.299.62%
Table 11. Impact of using different levels of probability for Scenario 3.
Table 11. Impact of using different levels of probability for Scenario 3.
Scenario 3O O c T T v S S c R end avg C C ¯ G(%)EVV(%)
[ 0 % , 33 % ] 15,0461836144623013,592159987199.897170.3257,362.559,323.23.42%31,71128,03288.40%
[ 33 % , 66 % ] 8638153220410364264387199.757174.3957,395.158,243.21.48%31,71131,339.398.83%
[ 66 % , 100 % ] 5545802438693099187199.67180.7257,445.858,156.11.24%31,71131,597.599.64%
Table 12. Results varying the number of expected victims for Scenario 1.
Table 12. Results varying the number of expected victims for Scenario 1.
Scenario 1O O c T T v S S c R end avg C C ¯ G(%)EVV(%)
<50–75%6422318231187410322487199.817178.5957,428.758,234.61.40%11,03610,97799.47%
<25–50%6757186235978439010187199.417183.3157,466.558,187.11.25%18,40018,300.799.46%
<0–25%6387155234411840353087199.517166.1657,329.358,504.62.05%25,76325,540.799.14%
Initial Scenario6592300231774426722187199.717194.5857,556.60858,383.0421.44%29,34929,20099.49%
>0–25%6474174237161409510787199.87172.9457,383.657,969.91.02%33,01832,826.299.42%
>25–50%6677158231011343593887187.247174.757,397.658,623.22.14%40,38540,116.899.34%
>50–75%6638232235276427815087199.987190.7757,526.258,2471.25%47,74947,535.199.55%
Table 13. Results varying the number of expected victims for Scenario 2.
Table 13. Results varying the number of expected victims for Scenario 2.
Scenario 2O O c T T v S S c R end avg C C ¯ G(%)EVV(%)
<50–75%607013023729736902687199.247157.7257,261.858,109.91.48%1139011,328.299.46%
<25–50%61217124085237051387199.857186.7657,494.158,046.40.96%19,08018,967.599.41%
<0–25%61479523707737691187199.417177.157,416.858,166.41.31%26,74626,605.799.48%
Initial Scenario616712723805937796187199.747184.4757,475.858,147.71.17%30,59930,439.699.48%
>0–25%607512523768136913787199.677177.9357,423.558,215.31.38%34,30934,10599.41%
>25–50%6127732409593710887199.977189.9757,519.858,106.41.02%41,98941,749.599.43%
>50–75%62168224316437771287199.877192.2657,53858,123.31.02%49,67949,394.899.43%
Table 14. Results varying the number of expected victims for Scenario 3.
Table 14. Results varying the number of expected victims for Scenario 3.
Scenario 2O O c T T v S S c R end avg C C ¯ G(%)EVV(%)
<50–75%6325288235671396121187199.997176.9757,415.758,155.71.29%11,83711,77599.48%
<25–50%6434336234279408425087199.777182.457,459.258,1871.27%19,79519,686.499.45%
<0–25%644312923757540604887199.817186.0257,488.158,100.41.07%27,75527,56999.33%
Initial Scenario663411523788742482087190.957187.2957,498.458,299.21.39%31,71131,544.399.47%
>0–25%674210723447043903287199.997172.6957,381.557,998.61.08%35,60435,382.999.38%
>25–50%67177223795143301487199.837190.557,52457,999.20.83%43,54843,303.199.44%
>50–75%68629823226245322887199.167177.857,422.458,010.31.02%51,50651,234.499.47%
Table 15. Results for the underestimate and overestimate cases using Scenario 1.
Table 15. Results for the underestimate and overestimate cases using Scenario 1.
Scenario 1O O c T T v S S c R end avg C C ¯ G(%)EVV(%)
<15–20%65121702377113412711387199.697189.6057,516.8058,105.501.02%29,34928,565.4097.33%
<10–15%6522198235066416412687199.737183.6957,469.558,153.71.19%29,34928,824.598.21%
<5–10%6528221231078421013787199.837170.2757,362.1058,134.51.35%29,34928,980.9098.75%
<0–5%6518243234192416914487199.507180.6357,44558,329.301.54%29,34929,09999.15%
>0–5%665710823437443062887199.507181.6957,453.5058,240.201.37%29,34929,221.5099.57%
>5–10%57614152352117340129187199.717187.2557,49858,618.41.95%29,34929,239.599.63%
>10–15%5709205241067329113187199.587183.8157,470.558,165.11.21%29,34929,260.199.70%
>15–20%5441165244553298810787199.947187.1457,497.158,098.21.05%29,34929,277.299.76%
Table 16. Results for the underestimate and overestimate cases using Scenario 2.
Table 16. Results for the underestimate and overestimate cases using Scenario 2.
Scenario 2O O c T T v S S c R end avg C C ¯ G(%)EVV(%)
<15%–20%614415223847137527387199.737195.3257,562.658,282.61.25%30,59929,829.897.49%
<10–15%624114023688138655287199.217174.0357,392.358,203.51.41%30,59930,091.498.34%
<5–10%636310923974339585987199.847189.1857,513.557,9960.84%30,59930,283.598.97%
>0–5%61578724005737492387199.857172.5557,380.457,968.81.03%30,59930,377.999.28%
>0–5%599411124005435865187199.867186.8357,494.658,040.50.95%30,59930,458.399.54%
>5–10%5690672441533241687199.327185.7657,486.158,042.50.97%30,59930,476.899.60%
>10–15%5381198247469289912287199.627194.1557,553.258,284.61.27%30,59930,496.899.67%
>15–20%52359924524927754387199.837192.6457,541.158,0420.87%30,59930,53999.80%
Table 17. Results for the underestimate and overestimate cases using Scenario 3.
Table 17. Results for the underestimate and overestimate cases using Scenario 3.
Scenario 3O O c T T v S S c R end avg C C ¯ G(%)EVV(%)
<15–20%66308323776742451187199.937184.3457,474.758,055.81.01%31,71130,797.897.12%
<10–15%6370378235970400330387199.97176.7857,414.258,095.81.19%31,71131,076.298.00%
<5–10%66668023956042631487199.697195.8857,56758,074.10.88%31,71131,315.398.75%
<0–5%666011523668042862887199.917188.4557,507.658,214.81.23%31,71131,484.299.28%
<0–5%65719223916241722487199.87719257,53658,1301.03%31,71131,536.899.45%
>5–10%596110324447535092087199.917189.3257,514.558,232.71.25%31,71131,564.299.54%
>10–15%5740299242660330623287199.567191.3457,530.758,139.41.06%31,71131,604.499.66%
>15–20%55117924825830211387199.777185.7957,486.357,981.40.86%31,71131,631.299.75%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Haddad, M.N.; Santos, A.C.; Duhamel, C.; Coco, A.A. Intelligent Drone Swarms to Search for Victims in Post-Disaster Areas. Sensors 2023, 23, 9540. https://doi.org/10.3390/s23239540

AMA Style

Haddad MN, Santos AC, Duhamel C, Coco AA. Intelligent Drone Swarms to Search for Victims in Post-Disaster Areas. Sensors. 2023; 23(23):9540. https://doi.org/10.3390/s23239540

Chicago/Turabian Style

Haddad, Matheus Nohra, Andréa Cynthia Santos, Christophe Duhamel, and Amadeu Almeida Coco. 2023. "Intelligent Drone Swarms to Search for Victims in Post-Disaster Areas" Sensors 23, no. 23: 9540. https://doi.org/10.3390/s23239540

APA Style

Haddad, M. N., Santos, A. C., Duhamel, C., & Coco, A. A. (2023). Intelligent Drone Swarms to Search for Victims in Post-Disaster Areas. Sensors, 23(23), 9540. https://doi.org/10.3390/s23239540

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop