Next Article in Journal
EMDiC: Physics-Informed Conditional Diffusion Denoising for Frequency-Domain Electromagnetic Signals
Previous Article in Journal
A Decision-Making Model for Green and Sustainable Remediation of Contaminated Sites Based on CRITIC–Entropy–TOPSIS
Previous Article in Special Issue
TDI-SF: Trustworthy Dynamic Inference via Uncertainty-Gated Retrieval and Similarity-Gated Strict Fallback
 
 
Due to scheduled maintenance work on our servers, there may be short service disruptions on this website between 11:00 and 12:00 CEST on March 28th.
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Integrating Visual Perception with Conservative Enhanced Bio-Inspired Optimization for Safe UAV Trajectory Planning

School of Astronautics, Harbin Institute of Technology, 92 Xidazhi Street, Nangang District, Harbin 150001, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2026, 16(7), 3245; https://doi.org/10.3390/app16073245
Submission received: 28 January 2026 / Revised: 13 February 2026 / Accepted: 14 February 2026 / Published: 27 March 2026
(This article belongs to the Special Issue Latest Research on Computer Vision and Its Application)

Abstract

Unmanned Aerial Vehicle (UAV) trajectory planning in complex three-dimensional environments with threats remains a challenging optimization problem requiring efficient algorithms and threat detection capabilities. This study proposes the Conservative Enhanced Dwarf Mongoose Optimization Algorithm (CEDMOA), which introduces four key innovations to the original DMOA: hybrid population initialization, adaptive vocalization parameters, elite-guided learning strategy, and intelligent restart mechanisms. This work proposed the integration of CEDMOA with a novel vision-based threat detection system using YOLO object detection technology, enabling the identification and incorporation of threats into the optimization process. CEDMOA was comprehensively evaluated on the CEC2022 benchmark test suite, demonstrating superior performance compared to other state-of-the-art algorithms in solution quality and convergence stability. The results show the approach successfully generates an optimal collision-free flight trajectory in complex environments in UAV trajectory planning with both static and dynamic threats. Combining metaheuristic optimization with computer vision technology provides a robust framework for autonomous navigation that adapts to changing threat conditions. Experimental results validate the effectiveness of both the enhanced algorithm and the vision-based threat integration approach for practical UAV operations.

1. Introduction

Unmanned Aerial Vehicles (UAVs) have become integral to a wide array of applications across various sectors due to their versatility, cost-effectiveness, and ability to operate in challenging environments. In military operations, UAVs are employed for reconnaissance, surveillance, and targeted strikes, providing intelligence without risking human lives [1,2]. In civilian life, UAVs facilitate agricultural monitoring by assessing crop health through aerial imagery [3], support disaster relief efforts by delivering supplies to inaccessible areas, enable efficient logistics and package delivery in e-commerce, and contribute to environmental monitoring by tracking wildlife or pollution levels [4]. As technology advances, UAVs are increasingly equipped with advanced sensors, AI-driven autonomy, and communication systems, allowing them to perform complex tasks such as swarm coordination and adaptive navigation in dynamic settings [5,6]. However, these capabilities are constrained by multiple factors, including the need for obstacle avoidance and stringent requirements. Consequently, trajectory optimization planning emerges as a pivotal technology, aiming to generate optimal paths that minimize flight time, ensure collision-free routes, and comply with operational constraints, thereby enhancing overall mission efficiency and safety in both static and dynamic environments.

1.1. ResearchGap of the Current Situation

Trajectory planning methods for UAVs can be categorized into several approaches. Sampling-based algorithms, such as Rapidly-exploring Random Trees (RRTs) [7] and Probabilistic Roadmaps (PRMs) [8], rely on random sampling to explore the configuration space and construct feasible paths, making them suitable for high-dimensional problems. Potential Field Methods create virtual forces to attract the UAV toward the goal while repelling it from obstacles, offering simplicity and applicability. Graph search algorithms, including A* and Dijkstra’s [9], discretize the environment into grids or graphs to find shortest paths, providing optimality in structured spaces. Additionally, mathematical optimization techniques like Mixed-Integer Linear Programming (MILP) or Nonlinear Programming (NLP) formulate the problem as an optimization task with constraints on kinematics and dynamics. While these methods perform well in static, known environments by generating reliable paths, they suffer from notable drawbacks: sampling-based approaches often result in high computational complexity, non-smooth trajectories, and probabilistic completeness rather than optimality; potential field methods are prone to local minima traps, especially in cluttered or narrow passages, leading to oscillatory behavior or failure to reach the goal; graph search algorithms scale poorly in large or high-resolution environments due to exponential memory and time requirements; and mathematical optimization struggles with non-convex problems, requiring convex approximations that may sacrifice accuracy, while also lacking robustness in dynamic scenarios where replanning is frequent and must be computationally efficient [10,11]. In recent years, reinforcement learning has been widely applied in the trajectory planning of UAVs, mainly focusing on specific demand navigation tasks [12,13].
To address the challenges of local optima entrapment, high computational demands, and poor adaptability in complex, non-convex environments posed by traditional methods, researchers have increasingly turned to metaheuristic algorithms, which draw inspiration from natural phenomena to perform global searches and approximate optimal solutions efficiently [10,14]. These include Genetic Algorithms (GA) [15] that mimic evolutionary processes through selection, crossover, and mutation; Particle Swarm Optimization (PSO) inspired by bird flocking for collective intelligence-based search [16]; Ant Colony Optimization (ACO) [17] simulating ant pheromone trails for pathfinding; and other variants like Simulated Annealing (SA) [18] or Grey Wolf Optimizer (GWO) [19,20]. Over the past few years, numerous studies have explored the integration of metaheuristic algorithms into UAV trajectory optimization [21]. Recent work has proposed hybrid frameworks combining metaheuristics with machine learning for autonomous navigation in disaster zones, optimizing trajectories for minimal time and risk. Additionally, studies have developed ACO-enhanced methods for formation flying in UAV swarms [1,22], demonstrating better scalability in large-scale environments. Wang et al. proposed a strategy optimization algorithm integrating adaptive conduction heat search, quadratic interpolation, and elite population genetics [23]. Meanwhile, Tenniche et al. employed a compact Water Cycle Algorithm to tackle constraints in indoor environments [24]. Other algorithms employed in multi-UAV systems include the Improved Bat Algorithm and the Late Acceptance Hill Climbing-Based Algorithm [25,26]. These investigations underscore the potential of metaheuristics in achieving near-optimal solutions for multi-objective problems like energy minimization, coverage maximization, and real-time adaptation [27].

1.2. Problem Statement and Objective

In the existing framework of intelligent optimization algorithms for UAV planning, visual information has not been fully taken into account as an element of the cost function. Therefore, our problem lies in developing a comprehensive optimization planning framework that considers the visual cost, especially to establish a UAV trajectory planning method considering the actual situation and visual threats by remolding an optimization method.

1.3. Main Contribution

This study has carried out research work in the following areas:
Novel YOLO-integrated threat perception system for UAV planning. This work introduces visual threat detection capabilities into three-dimensional UAV trajectory optimization by seamlessly integrating YOLO object detection with path planning algorithms. The system processes live imagery to identify threats in the environment and converts detection results into soft constraint penalties through a Gaussian decay function, enabling unified modeling of both static terrain obstacles and visual threats.
Conservative Enhanced Dwarf Mongoose Optimization Algorithm (CEDMOA). Building upon the original DMOA framework [28], CEDMOA incorporates conservative enhancements while preserving the biological inspiration of mongoose social behavior. The algorithm introduces hybrid initialization combining random exploration with opposition-based learning, adaptive parameter control for smooth transition from exploration to exploitation, elite-guided learning from the best solutions during later iterations, and intelligent restart mechanisms to prevent premature convergence. These enhancements collectively improve convergence speed and solution quality for complex three-dimensional UAV trajectory optimization problems.
Intelligent UAV 3D trajectory planning framework. The framework seamlessly combines object detection capabilities with enhanced metaheuristic optimization to address complex trajectory planning challenges. The system unifies static terrain constraints and visual threats into the optimization model. Through intelligent algorithm design and adaptive parameter control, the framework achieves good performance in solution quality and convergence speed. Extensive experimental evaluations demonstrate significant improvements over traditional methods in terms of path safety, optimization efficiency, and environmental adaptability. The proposed approach successfully handles complex three-dimensional environments with both predefined obstacles and unknown threats. This work provides a robust solution for autonomous UAV navigation in challenging real-world scenarios. The integrated framework is a serviceable advancement in intelligent UAV planning.

2. Materials and Methods

2.1. Model of UAV

The mathematical representation of UAV trajectories plays a crucial role in determining both the efficiency and effectiveness of trajectory planning algorithms. This study uses the spherical coordinate parametrization framework that provides a more compact, physically meaningful, and computationally efficient representation of three-dimensional UAV trajectories. The choice of coordinate system fundamentally impacts the optimization landscape. Spherical coordinates offer distinct advantages over Cartesian representations: they naturally encode the incremental nature of aircraft motion, provide intuitive parameters that correspond directly to flight characteristics, and enable the incorporation of physical constraints through parameter bounds. This parametrization approach transforms the trajectory planning problem from a high-dimensional Cartesian optimization into a more structured spherical parameter space, leading to improved convergence properties and reduced computational complexity.
The complete trajectory is represented as follows:
P = { Q , Q 1 , Q 2 , , Q n , Q }
The proposed trajectory representation discretizes the path into n intermediate waypoints between the start and goal positions. Each waypoint i is parameterized in spherical coordinates as follows:
P i = r i , ψ i , ϕ i T i = 1,2 , , n
where: r i is the Radial distance (step size) ψ i is the Elevation angle, ϕ i is the Azimuth angle. n is the number of intermediate waypoints.
The spherical parameter space is carefully designed to ensure physical realizability and computational efficiency. The radial distance is bounded to prevent excessive step sizes:
0 r i r m a x = 2 | p e n d p s t a r t | n
This upper bound ensures that the maximum step size is proportional to the direct distance between start and goal, scaled by the number of waypoints. The elevation angle is constrained to limit vertical maneuverability: π 4 ψ i π 4 .
This constraint prevents excessively steep climbs or descents, maintaining realistic flight profiles. The azimuth angle is bounded relative to the direct heading:
ϕ 0 π 4 ϕ i ϕ 0 + π 4
where ϕ 0 = arctan 2 y f y s , x f x s , represents the direct bearing from start to goal. This constraint encourages trajectories that maintain a general progression toward the target while allowing reasonable deviations for obstacle avoidance.
Spherical coordinates offer several distinct advantages: they naturally constrain the search space to physically realizable trajectories, reduce the dimensionality of the optimization problem, and provide intuitive parameters that directly correspond to aircraft motion characteristics such as heading changes and climb rates. The constraints incorporate multiple operational limitations of UAVs to generate a reliable flight trajectory, and then convert it into the Cartesian coordinate system:
1. Transformation from starting point
x 1 = x s + r 1 c o s ψ 1 s i n ϕ 1 y 1 = y s + r 1 c o s ψ 1 c o s ϕ 1 z 1 = z s + r 1 s i n ψ 1
2. Incremental coordinate calculation:
x i = x i 1 + r i cos ψ i sin ϕ i y i = y i 1 + r i cos ψ i cos ϕ i z i = z i 1 + r i sin ψ i
Converted Cartesian coordinates must satisfy spatial boundary constraints: x m i n x i x m a x , y m i n y i y m a x , z m i n z i z m a x .
Boundary clipping operations include the following:
x i = max x m i n , min x i , x m a x y i = max y m i n , min y i , y m a x z i = max z m i n , min z i , z m a x

2.2. Trajectory Constraints

The fundamental challenge in UAV trajectory planning lies in the need to balance multiple competing objectives—path length minimization, threat avoidance, altitude compliance, and maneuverability constraints—while ensuring the generated trajectory remains feasible for the aircraft’s physical capabilities. The choice of coordinate system significantly impacts both the efficiency of the optimization process and the quality of the resulting solutions.

2.2.1. Overall Objective Function

The optimization objective function of UAV path planning is defined as follows:
J t o t a l = i = 1 5 w i J i
where w i are weight coefficients for each sub-objective.
J t o t a l = w 1 J 1 + w 2 J 2 + w 3 J 3 + w 4 J 4 + w 5 J 5
where J 1 , J 2 , J 3 , J 4 , J 5 are the constraints, w i is the weight coefficients for each sub-objective.
This weighting strategy achieves a balance in multi-objective optimization, prioritizing energy efficiency and smoothness while ensuring safety.

2.2.2. Path Length Constraint

The path length cost function is defined as the sum of three-dimensional Euclidean distances of all path segments:
J 1 = i = 1 N 1 | p i + 1 p i | 2
where p i = x i , y i , z a b s , i T , 3D coordinates of the i waypoint; z a b s , i = z r e l , i + H x i , y i , the absolute altitude (relative to sea level), H x i , y i are terrain elevation function; N is the total number of waypoints.
Detailed formula for three-dimensional distance calculation:
J 1 = i = 1 N 1 x i + 1 x i 2 + y i + 1 y i 2 + z a b s , i + 1 z a b s , i 2

2.2.3. Threat Avoidance Constraint

Threat avoidance is a critical safety element in UAV trajectory planning. In both military and civilian applications, UAVs must effectively avoid various threat zones (such as radar coverage areas, air defense systems, and restricted zones) while maintaining mission efficiency. The model settings for the threat zone are shown in Table 1, hierarchical threat management mechanism presented in this section achieves fine-grained threat handling through multi-layer safety zones, ensuring flight safety without excessive avoidance that would compromise length efficiency.
Each threat T k is defined as a quadruple:
T j = x j , y j , z j , R j
where x j , y j , z j is threat center coordinates, R j is the basic threat radius, and the definition of three concentric safety zones for hierarchical threat management:
For the shortest distance from the path segment P i P i + 1 to the threat center T j :
d i j = min t 0,1 | P i + t P i + 1 P i T j | 2
The path length cost function minimizes the total three-dimensional Euclidean distance:
J 2 = j = 1 M i = 0 n 1 K j max [ 0 , R j + R u + S m d i j 2 ]
where K j is the threat penalty gain coefficient.

2.2.4. Altitude Constraint

Consistent altitude maintenance preserves the designed control margins required for precise trajectory tracking, thereby enabling accurate mission execution. Simultaneously, it guarantees statutory terrain clearance, eliminating the primary hazard of controlled flight into surface obstacles. Optimal altitude balancing energy consumption and safety.
As shown in the Figure 1a, the ideal flight altitude is as follows:
z i d e a l = z m a x + z m i n 2
Minimum flight altitude z m i n , maximum flight altitude z m a x . Ideal flight altitude z i d e a l represents the optimal altitude balancing energy consumption and safety.
Altitude constraint cost function:
J 3 = i = 0 n max 0 , z min z i z x i , y i + max 0 , z i z x i , y i z max
Actual flight altitude is relative to ground level:
z r e l , i = z a b s , i H x i , y i
Ground collision detection: z r e l , i 0 , i { 1,2 , , n } .
Figure 1b illustrates the other physical and control restrictions that the UAV must adhere to during its flight, including speed, acceleration, pitch angle, roll angle, and turning radius limits. The flight path is in a curved shape. It usually makes turns or performs non-linear movements in an environment with obstacles. The red arrows in the figure indicate the body coordinate system. In this study, we focused on the flight planning of the path itself, treating it as a point mass, and set the contact radius with obstacles to simulate the size of the aircraft body.

2.2.5. Maneuverability Constraint

Maneuverability constraints ensure the generated trajectory adheres to the aircraft’s physical capabilities. The turn angle constraint prevents excessive horizontal turns, while the climb angle constraint avoids exceeding vertical maneuver limits, making the optimized trajectory executable in real flight.
For three consecutive waypoints, define the horizontal projection vectors as follows: v i = x i , y i , 0 , v i + 1 = x i + 1 , y i + 1 , 0 . The turn angle constraint ensures that the UAV maintains a feasible turning radius throughout the trajectory. The turning angle α between consecutive path segments is calculated as follows:
α i = arccos v i + 1 v i | v i + 1 | | v i |
The turn angle cost function is defined as follows:
J turn = i = 1 n 1 max 0 , α i α max 2
Similarly, the climb angle constraint addresses the vertical maneuverability limitations of the UAV. The climb angle β is calculated as follows:
β i = arctan z i + 1 z i | v i + 1 v i |
The climb angle cost function is formulated as follows:
J climb = i = 0 n 1 max 0 , β i β max 2
These maneuverability constraints work in conjunction with the previously defined path length, threat avoidance, and altitude constraints to produce trajectories that are not only theoretically optimal but also practically executable. The quadratic penalty formulation ensures continuous and differentiable cost functions that are well-suited for gradient-based optimization methods, while the threshold-based approach provides clear boundaries for feasible aircraft maneuvers.
The total maneuverability cost function is defined as follows:
J 4 = J turn + J climb

2.2.6. YOLO Soft Constraint

In the actual operation of UAVs, it is also necessary to have feedback and references regarding the current flight status to obtain a threat response strategy. In this study, YOLO is not used for traditional object recognition, but as a core component for threat detection and obstacle recognition. Threat set obtained from YOLO detection:
D = { c j , w j , σ j : j = 1,2 , , N Y O L O }
where: c j = x c , j , y c , j T , Detected threat center coordinates, w j is the threat weight (based on detection confidence). The image coordinates are transformed to world coordinates using camera calibration parameters and geometric projection models, accounting for UAV position, orientation, and camera mounting configuration.
The YOLO-detected threats are incorporated into the trajectory optimization through a Gaussian soft constraint model that creates continuous influence fields around each detected object. The threat cost function is formulated as follows:
J 5 = i = 1 N j = 1 N Y O L O w j exp | p i , 2 D c j | 2 2 σ j 2
where p i , 2 D = x i , y i T , the 2D projection of waypoint, | p i , 2 D c j | 2 = x i x c , j 2 + y i y c , j 2 , and the square of the planar distance. This formulation creates smooth, differentiable cost surfaces that guide the optimization algorithm away from detected threats while avoiding the discontinuities associated with hard constraint approaches. The YOLO soft constraints J 5 use obstacle detection from a bird’s-eye view to dissuade the UAV from detouring around obstacles through the form of a cost function, rather than flipping over the obstacles in an extreme situation. The values obtained from this view do not affect the actual three-dimensional path planning.
The threat weight incorporates both detection confidence and object type significance:
w j = g l a b e l max 0 , s j
where s j is the YOLO detection confidence score, g l a b e l is the Gain coefficient based on label type. The Gaussian scale parameter σ j determines the spatial extent of each threat’s influence and is adaptively computed based on the detected object characteristics:
σ j = max 10 3 , r j σ s c a l e
In practical implementation, penalty function method is used to handle constraints:
J t o t a l ~ s = J t o t a l s + k M k max 0 , g k s 2
where: g k s is the inequality constraint function; M k is the Penalty coefficient.
In this section, we present Conservative Enhanced Dwarf Mongoose Optimization (CEDMOA)—a significantly refined metaheuristic optimizer inspired by the cooperative hunting and social communication behaviors of dingo packs. Building upon the foundational DMOA framework, CEDMOA integrates five key algorithmic enhancements grounded in biological realism, theoretical optimization principles, and practical engineering robustness. These innovations collectively address persistent challenges in population-based optimization: premature convergence, poor exploration–exploitation balance, sensitivity to initialization, and inadequate handling of boundary constraints. Below, we detail each component with theoretical justification, mathematical formulation, and implementation insights.

2.3. Dwarf Mongoose Optimization

The Dwarf Mongoose Optimization Algorithm (DMOA) [28] is a metaheuristic optimization method inspired by the cooperative foraging and social behaviors of the dwarf mongoose (Helogale parvula), a highly social mammal. DMOA models the interactions among three distinct roles within a mongoose group: the Alpha Female, Scouts, and Babysitters, to achieve an effective balance between exploration and exploitation in complex search spaces.
The crux of the entire issue is considering the minimization problem, min f(x).

2.3.1. Algorithm Initialization

The DMOA algorithm first initializes the population with size nPop, which includes nAlphaGroup Alpha individuals and nBabysitter babysitter individuals:
X i = X m i n + r a n d × X m a x X m i n
where X i represents the position of the i-th individual; X m i n and X m a x represent the lower and upper bounds of the search space, respectively.

2.3.2. Alpha Group Foraging Behavior

Individuals in the Alpha group select the Alpha female through roulette wheel selection for foraging. The fitness function is defined as follows:
F i = exp C o s t i M e a n C o s t
The selection probability is as follows:
P i = F i j = 1 n A l p h a G r o u p F j
The position update formula for Alpha female is as follows:
X n e w = X i + ϕ × X i X k
where ϕ = p e e p 2 × U ( 1,1 ) is the vocalization coefficient, peep = 2, represents uniform random numbers in the interval [−1,1], and k is a randomly selected individual index not equal to i.

2.3.3. Scouting Behavior

Scout individuals use the same position update mechanism but introduce a sleeping mould parameter:
s m i = C o s t n e w C o s t i max C o s t n e w , C o s t i
The next position update for scout individuals is as follows:
X n e x t = X i   C F · ϕ · r a n d · X i M           τ n e w >   τ X i +   C F · ϕ · r a n d · X i M           τ n e w   τ
where C F = ( 1 t M a x I t ) 2 t M a x I t is the convergence factor, M = X i × s m i X i , and τ n e w = m e a n s m .

2.3.4. Babysitting Behavior

When the abandonment counter C(i) of an individual reaches the threshold L, babysitter individuals reinitialize their positions:
X i = X m i n + r a n d × X m a x X m i n , if   C i L
where L = r o u n d 0.6 × n V a r × n B a b y s i t t e r .

2.4. Conservative Enhanced Dwarf Mongoose Optimization

2.4.1. Dual-Learning Enhanced Population Initialization

To overcome the limitations of purely random initialization—such as clustered initial solutions and slow convergence—we introduce a hybrid initialization strategy that synergistically combines stochastic sampling with Opposition-Based Learning (OBL) [29]. This approach leverages the principle that for any candidate solution x, its opposite point xo = L + U − x (where L and U denote lower and upper bounds) often provides complementary information about the search landscape. By allocating 90% of the initial population via uniform random sampling and reserving 10% for opposition-based counterparts (aligned with the golden-section-inspired ratio), CEDMOA ensures both genetic diversity and accelerated convergence from the outset.

2.4.2. Adaptive Vocalization Coefficient (Communication Fading)

Inspired by the natural decay of vocal intensity in foraging dwarf mongooses [30], CEDMOA introduces a time-adaptive “peep” coefficient:
peep t = peep base 1 0.2 t T m a x
This coefficient linearly decays from 2.0 to 1.6, smoothly reducing the magnitude of search perturbations over time and enabling a natural transition from global exploration to local exploitation.
This dual-initialization scheme enhances population diversity, reduces cold-start latency, and promotes more uniform coverage of the feasible search space—critical for high-dimensional and multimodal optimization problems common in unmanned system trajectory planning and sensor deployment.

2.4.3. Elite-Guided Strategy

During the Alpha group foraging process, the improved algorithm learns from the current best solution with a 10% probability:
X n e w = X i +   ϕ · X b e s t X i       i f   r a n d <   0.1   a n d   t   > M a x I t 3 X i +   ϕ · X i X k   o t h e r w i s e
This strategy is only activated in the later stage of the algorithm ( t   > M a x I t 3 ) to avoid premature convergence.

2.4.4. Improved Boundary Handling Mechanism

The original algorithm lacks an effective boundary handling mechanism, while the improved algorithm adopts a boundary constraint strategy:
X i = max min X i , X m a x , X m i n
This ensures that all individual positions are within the feasible domain, improving the stability of the algorithm.

2.4.5. Intelligent Restart Mechanism

The improved algorithm optimizes the babysitting behavior by adopting an intelligent restart strategy:
X i = X best +   σ · N 0,1 i f   r a n d <   0.5   a n d   t   > M a x I t 4 X min +   r a n d · X max X min   o t h e r w i s e
where ( X m a x X m i n ) × 0.05 is the noise scale, and N ( 0,1 ) represents the standard normal distribution. This mechanism restarts near the optimal solution with a 50% probability in the middle and later stages of the algorithm, balancing exploration and exploitation capabilities.

2.4.6. Algorithm Complexity Analysis

The time complexity of the CEDMOA algorithm is as follows:
T n = O M a x I t × n P o p × n V a r × T o b j
where T o b j is the computational complexity of the objective function. Compared to the original DMOA algorithm, CEDMOA only adds constant-level computational overhead, mainly from boundary checking and conditional judgments for intelligent restart.
These improvement strategies work synergistically to significantly enhance the convergence accuracy and search efficiency of the algorithm while maintaining the core advantages and simplicity of the original DMOA algorithm.

2.5. Algorithm Process

2.5.1. Initialization Phase

The algorithm begins with a hybrid population initialization strategy that combines random generation with opposition-based learning. Specifically, ninety percent of the initial population is generated using conventional uniform random distribution within the search space bounds, while the remaining ten percent employs opposition-based learning to create individuals at opposite positions in the search space. This dual initialization approach enhances population diversity and increases the probability of discovering promising search regions from the outset.

2.5.2. Adaptive Vocalization Mechanism

A key enhancement in CEDMOA is the introduction of an adaptive vocalization parameter that dynamically adjusts throughout the optimization process. The vocalization coefficient starts at its maximum value and gradually decreases as iterations progress, ensuring strong exploration capabilities during early iterations while transitioning to exploitation as the algorithm approaches convergence. This adaptive mechanism provides a better balance between global exploration and local exploitation compared to the fixed parameter in the original DMOA.

2.5.3. Enhanced Alpha Group Foraging

The Alpha group foraging phase incorporates an elite-guided strategy that selectively leverages information from the current best solution. The fitness-based selection mechanism employs exponential transformation to calculate individual fitness values, followed by roulette wheel selection to choose Alpha females for foraging activities.
The position update strategy implements a conditional branching mechanism where individuals have a small probability of learning directly from the global best solution, but only during the latter two-thirds of the optimization process. This selective elite guidance ensures that the algorithm maintains exploration capabilities in early stages while gradually incorporating exploitation of the best-found solutions. When elite guidance is not applied, the algorithm follows the original DMOA foraging behavior based on interactions between randomly selected individuals.

2.5.4. Boundary Handling and Greedy Selection

All newly generated positions undergo strict boundary constraint enforcement to ensure feasibility within the defined search space. The algorithm then applies greedy selection criteria, accepting improved solutions while maintaining abandonment counters for individuals that fail to improve over successive iterations.

2.5.5. Scout Behavior and Sleeping Mould

The scouting phase maintains the original DMOA mechanism for position updates while calculating sleeping mould parameters that quantify the relative improvement or deterioration of individual solutions. These parameters influence subsequent position adjustments through a convergence factor that adapts based on the current iteration progress, providing dynamic control over the exploration-exploitation balance.

2.5.6. Intelligent Restart Process

The babysitting behavior incorporates an intelligent restart strategy that activates when individual abandonment counters exceed a predefined threshold. Upon triggering, the algorithm employs a probabilistic restart approach where half of the restarted individuals are repositioned near the current best solution using small Gaussian perturbations, while the other half undergo complete random reinitialization within the search bounds. This dual restart strategy balances intensive local search around promising regions with continued global exploration.

2.5.7. Convergence and Termination

The algorithm iteratively updates the global best solution and increments the iteration counter until the maximum number of iterations is reached. Throughout this process, the convergence factor continuously modulates the influence of various algorithmic components, ensuring an appropriate balance between exploration and exploitation phases.

2.5.8. Computational Efficiency

CEDMOA maintains computational efficiency comparable to the original DMOA, with algorithmic enhancements introducing only minimal computational overhead. The improvements primarily involve conditional branching logic and boundary checking operations, making CEDMOA practically viable for real-world optimization problems while significantly improving solution quality. The detailed algorithm pseudocode and flowchart can be found in Algorithm 1 and Figure 2, respectively.
Algorithm 1 Pseudo code of CEDMOA
Start:
1: Set parameters N, Tmax, Xmin, Xmax, D, f;
2: Initialize nBabysitter = 3, nAlphaGroup = N − nBabysitter;
3: Set L = round(0.6 × D × nBabysitter), peepbase = 2;
4: For i = 1:floor(0.9 × nAlphaGroup) do
5: Xi = Xmin + rand × (Xmax − Xmin);
6: End for
7: For i = floor(0.9 × nAlphaGroup) + 1:nAlphaGroup do
8: X i O B L = X m i n + X m a x X i r a n d ;
9: End for
10: Evaluate fitness values and determine the best Xbest;
11: While (t ≤ Tmax) do
12: p e e p = p e e p b a s e × 1 0.2 × t / T m a x ;
13: Calculate fitness Fi and selection probability Pi;
14: For m = 1: nAlphaGroup do
15: Select Alpha female i using roulette wheel selection;
16: If rand() < 0.1 and t > Tmax/3 then
17: Xnew = Xi + φ × (Xbest − Xi);
18: Else
19: Xnew = Xi + φ × (Xi − Xk);
20: End If
21: Xnew = max(min(Xnew, Xmax), Xmin);
22: If f(Xnew) ≤ f(Xi) then
23: Xi = Xnew;
24: Else
25: Ci = Ci + 1;
26: End If
27: End for
28: For i = 1: nScout do
29: Update scout position and calculate smi;
30: End for
31: For i = 1: nBabysitter do
32: If Ci ≥ L then
33: If rand() < 0.5 and t > Tmax/4 then
34: Xi = Xbest + σ × N(0,1);
35: Else
36: Xi = Xmin + rand × (Xmax − Xmin);
37: End If
38: Ci = 0;
39: End If
40: End for
41: Update CF and next mongoose positions;
42: Update the best Xbest solution so far;
43: t = t + 1;
44: End while
45: Return Xbest;
Stop

2.5.9. Camera Coordinate Transformation

In the visual perception system, it is necessary to convert the target position of the image coordinates output by the YOLO detector into the position in the world coordinate system. This study adopts a simplified geometric projection model, and the core conversion is as follows:
The coordinates of the detection box in the image coordinate system are x i m g , y i m g , w i m g , h i m g , x i m g , y i m g , w i m g , h i m g represent the width and height of the detection box, respectively.
Calculation of the center point of the detection box:
x c = x i m g + w i m g 2 y c = y i m g + h i m g 2
Linear mapping from image coordinates to world coordinates:
x w = x c W i m g × M A P S I Z E X y w = y c H i m g × M A P S I Z E Y
W i m g and H i m g represent the width and height of the image. M A P S I Z E X and M A P S I Z E Y represent the size range of the world map. x w , y w represent the transformed world coordinates.
The influence radius of the threat area is estimated based on the bounding box dimensions as follows:
r = r d e f a u l t + α m a x ( w i m g , h i m g ) s p i x e l s r a d i u s
where r d e f a u l t is the default threat radius, α = 0.5 is a scaling coefficient, s p i x e l is the pixel-to-map scaling factor, and s r a d i u s is a radius scaling coefficient.
To validate the effectiveness of the proposed algorithm, a synthetic image generation method based on elevation data is designed. This approach constructs realistic terrain representations and overlays threat information, path planning elements, and simulated noise to mimic real-world UAV-captured imagery.
The raw elevation matrix H is first normalized:
H n o r m = H m i n ( H ) m a x ( H ) m i n ( H )
A pseudo color mapping is then applied to convert the normalized elevation data into an RGB image:
I b a s e = f c o l o r ( H n o r m )
where f c o l o r is the Parula colormap function, mapping grayscale values to a 256-color RGB space.

3. Evaluation of Algorithm

To compare the effectiveness of the newly improved CEDMOA with some other selected mainstream optimization algorithms, we use some functions from CEC2022 (Table 2) for practical verification and computational efficiency trade-offs. The comparison methods adopted include the existing IGWO, GWO, GJO, POA, Chimp, SCA, and DMOA [31,32,33,34]. The whole verification was finished on a Windows 11 system with an Intel Ultra 7 255HX CPU. The population size for the operation is set to 50, and the maximum number of iterations is 500. Analysis of the algorithm’s effectiveness from five aspects, including Overall Ranking, Success Rate, Efficiency, Stability, and the iterative trend graph.
The convergence curves for functions F1–F9 (Figure 3) demonstrate CEDMOA’s superior optimization capability across diverse problem landscapes. In unimodal functions (e.g., F1 and F2), CEDMOA exhibits rapid initial convergence, achieving fitness values below 10—4 within 50 iterations—a pace significantly faster than competitors like GWO and SCA. For multimodal and hybrid functions (e.g., F4, F6, and F9), CEDMOA maintains a consistent downward trajectory without premature convergence, ultimately reaching the lowest final fitness values. Notably, in F6, CEDMOA’s solution quality surpasses other algorithms by one to two orders of magnitude, while its smooth convergence curve indicates robust exploration-exploitation balance. This consistent outperformance across all nine test functions underscores CEDMOA’s enhanced global search ability and precision in high-dimensional optimization.
The statistical comparison charts (Figure 4) further validate CEDMOA’s efficacy through four critical metrics. First, the overall ranking of 4a shows CEDMOA achieving the lowest average rank, decisively outperforming all competitors, which ranks 3.0–7.5, and confirming its top-tier performance. Second, the success rate chart of 4b reveals CEDMOA’s 100% reliability across independent runs, matching or exceeding other algorithms. Third, the efficiency of 4c illustrates a favorable time-quality trade-off: CEDMOA requires only marginally more execution time than the fastest algorithms, GWO, but delivers substantially higher solution quality. Finally, the stability of 4d highlights CEDMOA’s minimal solution variability, reflecting consistent convergence behavior. Collectively, these metrics establish CEDMOA as highly reliable, efficient, and stable under varying conditions.
Both the convergence curves and statistical metrics converge to a unified conclusion: CEDMOA’s proposed enhancements yield demonstrable improvements over state-of-the-art algorithms. Its ability to consistently achieve faster convergence, higher solution precision, and greater robustness across all CEC2022 test functions—while maintaining computational efficiency and stability—validates the effectiveness of the modified strategies. This comprehensive evidence confirms that CEDMOA is a viable and competitive optimizer for complex real-world applications, with its improvements providing tangible benefits in both theoretical and practical contexts.

4. Results of Trajectory Planning Simulation

4.1. Simulation Trajectory Parameter Setting

In this study, YOLO is not used for traditional object recognition but as a core component for real-time threat detection and obstacle recognition. In order to separately observe the effects with and without the visual cost function, the UAV trajectory simulation is carried out in two groups. One group does not consider the visual cost function, while the other group does. This paper designs three terrain scenarios with six flight missions. Each scenario includes two start-end point layouts. Performance comparisons are also conducted between the existing seven optimization methods and CEDMOA.
The experimental evaluation is conducted on a three-dimensional UAV path planning scenario using a 1045 × 879 pixel terrain map derived from ChrismasTerrain.tif elevation data, with the operational environment spanning coordinates from (1,1) to (1045,879) in the horizontal plane and altitude constraints between 100–200 m. The UAV mission is configured with a 10-node trajectory path through spherical coordinate representation with radial, azimuthal, and polar angle constraints. Eight cylindrical threat zones with radii ranging from 70 to 80 m are strategically positioned throughout the environment to simulate realistic obstacle avoidance scenarios, with a safety margin of 3.5 m and a penalty coefficient of 1.0 applied for threat proximity calculations. The comparative evaluation encompasses eight state-of-the-art metaheuristic algorithms, including iGWO, GWO, GJO, Chimp, POA, SCA, DMOA, and the proposed CEDMOA, with each algorithm executed for 300 iterations using a population size of 50 individuals across 30 independent runs to ensure statistical significance. For the visual threat detection component, YOLOv8 with tiny-YOLO-COCO pre-trained weights is integrated with a confidence threshold of 0.4, processing synthetic aerial imagery generated at 0.8 pixel-to-map scale ratio with Gaussian decay functions modeling threat influence zones, while the multi-objective cost function incorporates weighted coefficients of 12, 0.7, 2.5, 3, and 2 for path length, obstacle avoidance, altitude deviation, trajectory smoothness, and YOLO threat penalties respectively. On this basis, a series of comparisons is made for the optimal value, standard deviation, mean, median, and worst value of the calculated cost.
Table 3 and Table 4 show all specific configuration parameters and validation targets, including obstacle placements, path endpoints, and iteration counts. The specific obstacle setting conditions are clearly indicated in Table 4. The obtained results are, respectively, shown in Figure 5, the actual trajectory diagram of the UAV.

4.2. Without Visual Cost Function

Figure 5 illustrates the 3D trajectory planning results for all verification scenarios, where CEDMOA consistently generates smooth and feasible results compared to competing algorithms. The experimental results demonstrate CEDMOA’s superior performance in UAV trajectory planning across all verification scenarios. In Verification 1 (Figure 5a–c), CEDMOA generated a smooth trajectory with a length of approximately 480m, significantly outperforming GJO, which failed to produce a feasible solution in this constrained environment. It is prone to falling into a state of no solution in a highly constrained environment, a limitation that CEDMOA successfully overcomes. The convergence analysis (Figure 6) reveals CEDMOA’s accelerated optimization capability, achieving a cost function value of 1.43 × 104 by iteration 100 in Verification 3, while DMOA remained at a high level. The improvement in solution quality is consistent across all scenarios. The statistical analysis (Figure 7, Figure 8, Figure 9, Figure 10, Figure 11 and Figure 12) further confirms CEDMOA’s dominance. Notably, CEDMOA maintains relatively excellent objective function values and also exhibits relatively outstanding standard deviation stability.
The box plot analysis in Figure 7, Figure 8, Figure 9, Figure 10, Figure 11 and Figure 12 quantifies CEDMOA’s comprehensive advantages among various algorithms; the optimal path length is maintained while achieving a competitive cost function. This balance between computational efficiency and solution quality makes CEDMOA particularly suitable for UAV where both factors are critical. The consistent outperformance across all six verification scenarios confirms CEDMOA’s robustness in handling diverse environmental constraints and its superiority over existing optimization techniques for UAV trajectory planning.

4.3. With Visual Cost Function

The YOLO-frames consist of six synthetic visual images generated from terrain and threat data to simulate time-series visual observations during UAV flight operations. These images incorporate colorized terrain maps, red-highlighted threat zones, and start/end point markers, with each frame containing slight random noise and threat size variations to emulate realistic visual condition changes. The system feeds these six frames into the YOLOv8 detector for threat identification, then statistically fuses the multi-frame detection results and converts them into map-coordinate soft constraint threat costs, which are ultimately integrated into the multi-objective optimization function for visual perception-based threat avoidance in planning. The results from verification 7 to verification 12 are obtained under the visual cost function, and the views of threats detected by vision are provided in Figure 13. The red circle in the picture represents the range of obstacles detected visually, while the other colors represent terrain information.
The experimental results with integrated YOLO-based visual threat detection demonstrate CEDMOA’s robust performance in complex trajectory planning scenarios. In Figure 14, which presents the 3D trajectory visualization for Verification 7–12, CEDMOA consistently generates smooth and feasible paths that effectively navigate around visually detected threats while maintaining appropriate safety margins. The side and top views clearly illustrate how CEDMOA dynamically adjusts trajectories to avoid threat zones without excessive detours, preserving path efficiency and smoothness.
The convergence curves in Figure 15 reveal CEDMOA’s superior optimization capability under visual constraints. Across all verification scenarios (7–12), CEDMOA has significant advantages in terms of optimal value and path length. This is particularly evident in Verification 10 in Figure 15d, where CEDMOA demonstrates rapid convergence and maintains the low cost function throughout the optimization process. The statistical comparisons in Figure 16, Figure 17, Figure 18, Figure 19, Figure 20 and Figure 21 provide quantitative evidence of CEDMOA’s consistent superiority. In Verification 10 (Figure 19), CEDMOA achieves the lowest, best, mean, and worst cost values among all algorithms, with a notably narrow distribution in the box plot indicating an exceptional solution with flexibility of the length and the stability of the calculation degree reflected by the standard deviation. Similarly, in Verification 12 (Figure 21), CEDMOA maintains the most favorable cost distribution while demonstrating competitive execution times. The data for verification 1–12 are all provided in Appendix B.
When comparing with the non-visual scenarios, two important observations emerge. First, the introduction of visual threat constraints increases the overall complexity of the optimization problem, as evidenced by the generally higher cost function values across all algorithms. Second, CEDMOA’s relative performance advantage becomes even more pronounced in the visual scenarios compared to the non-visual cases, suggesting enhanced capability to process and respond to visual information while maintaining trajectory optimality.
The results confirm that CEDMOA not only effectively handles the additional complexity introduced by visual threat detection but actually demonstrates greater relative performance improvement compared to other algorithms in the presence of visual constraints, making it particularly suitable for real-world UAV applications where visual perception plays a critical role in navigation safety.

4.4. Performance Analysis of CEDMOA

The experimental results demonstrate that the proposed CEDMOA algorithm consistently achieves superior performance across both conventional path planning scenarios and visual threat-integrated environments. In the baseline configuration without visual cost components, CEDMOA exhibits the most favorable convergence characteristics among all evaluated algorithms and the highest solution stability as measured by standard deviation metrics. When the YOLO-based visual threat detection system is integrated through the J5 cost component, CEDMOA maintains its competitive advantage while successfully incorporating threat avoidance capabilities into the optimization process. The algorithm demonstrates remarkable adaptability to the enhanced multi-objective formulation, effectively balancing the additional visual threat penalties with traditional path planning objectives, including trajectory length, obstacle avoidance, altitude optimization, and smoothness constraints. Notably, the integration of visual cost functions does not compromise CEDMOA’s optimization efficiency, as the algorithm continues to outperform benchmark methods in terms of both solution quality and computational convergence. This consistent superior performance across different problem formulations validates the robustness of the proposed conservative enhancement strategies and confirms CEDMOA’s effectiveness as a comprehensive solution for intelligent UAV applications.

5. Conclusions and Discussion

5.1. Conclusions

This study proposes a novel approach by integrating YOLO-based visual detection errors as a constraint term in the optimization framework. Our research presents a comprehensive intelligent UAV three-dimensional path planning framework that successfully integrates visual threat perception with advanced metaheuristic optimization algorithms. The developed system addresses critical challenges in autonomous UAV navigation by combining real-time object detection with the novel CEDMOA algorithm for multi-objective trajectory optimization.
The proposed framework demonstrates significant achievements in handling both static terrain obstacles and visual threats within a unified optimization model. Extensive experimental evaluations validate the effectiveness of the approach, with CEDMOA consistently outperforming state-of-the-art algorithms in terms of solution quality, convergence speed, and stability. The visual threat detection system successfully processes imagery and converts detection results into actionable path planning constraints.

5.2. Discussion

The practical significance of this work lies in its ability to provide robust, efficient, and adaptable solutions for complex three-dimensional path planning challenges in complex environments. The system’s unified framework makes it highly suitable for real-world UAV applications where both predefined obstacles and unpredictable threats must be considered. This research contributes to the advancement of UAV technology by bridging the gap between visual perception and intelligent path optimization, providing a feasible way for future developments in autonomous navigation systems.
The integration of visual threats via YOLO-based detection profoundly influences the final UAV trajectory by introducing a dynamic soft constraint that imposes Gaussian-decay penalties around real-time detected objects, effectively guiding the CEDMOA optimizer to deviate from potentially hazardous areas not accounted for in static threat models. Unlike baseline approaches that rely solely on predefined static obstacles and threats, the proposed method dynamically reshapes the trajectory in response to unknown or moving threats such as airborne obstacles or ground-based hazards identified in live imagery, resulting in smoother, more adaptive paths that maintain greater separation distances while preserving overall efficiency in path length and maneuverability. This visual perception layer significantly enhances trajectory safety and robustness in complex, real-world environments with evolving conditions, as evidenced by experimental validations showing collision-free navigation amid both static terrain and dynamic visual threats, underscoring the method’s superior value for practical autonomous UAV operations where traditional static-only planning would fail or produce overly conservative routes.

5.3. Limitations and Future Work

The verification was conducted through software simulation in Matlab R2025a, and the work presented in this paper can fully demonstrate the feasibility of the application. Future research will focus on considering more practical movement limitations of UAVs, as well as the combination of actual properties and algorithms, in order to achieve more practical and applicable results.

Author Contributions

Conceptualization, methodology, validation, and writing—original draft preparation, Q.G.; supervision and project administration, Z.Q.; investigation, Q.Z. and Y.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data are all provided in the paper.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
UAVUnmanned Aerial Vehicle
CEDMOAConservative Enhanced Dwarf Mongoose Optimization Algorithm
DMOADwarf Mongoose Optimization Algorithm
YOLOYou Only Look Once
OBLOpposition-Based Learning
CEC2022IEEE Congress on Evolutionary Computation 2022 Benchmark Suite
GWOGrey Wolf Optimizer
IGWOImproved Grey Wolf Optimizer
GJOGolden Jackal Optimization
POAPelican Optimization Algorithm
SCASine Cosine Algorithm
ChimpChimp Optimization Algorithm
RRTRapidly-exploring Random Tree
PRMProbabilistic Roadmap
MILPMixed-Integer Linear Programming
NLPNonlinear Programming
GAGenetic Algorithm
PSOParticle Swarm Optimization
ACOAnt Colony Optimization
SASimulated Annealing

Appendix A

This appendix organizes and explains the key formula variables in Table A1, making it easier to read.
Table A1. List of symbols.
Table A1. List of symbols.
SymbolDescriptionRemarks/Units (If Applicable)
P Complete trajectory as set of waypoints Q s , Q 1 , , Q n , Q e Q s : start, Q e : end
P i or Q i Waypoint i in spherical coordinates r i ψ i ϕ i ) T i = 1 , , n
r i Radial distance (step length) 0 r i r m a x
ψ i Elevation angle π / 4 ψ i π / 4
ϕ i Azimuth angleConstrained relative to direct heading
r m a x Maximum radial distance 2 × P e P s / n
x i , y i , z i Cartesian   coordinates   of   waypoint   i Converted from spherical
J total Total objective function J ~ total = J total + M k m a x ( 0 , g k ) 2
w i Weight coefficients for sub-objectives For   J 1   to   J 5
J 1 Path length costSum of 3D Euclidean distances
J 2 Static threat avoidance costHierarchical zones with penalties
J 3 Altitude constraint costDeviation in ideal altitude range
J 4 Maneuverability cost J turn + J climb Turn and climb angle limits
J 5 YOLO-based visual threat soft constraintGaussian decay around detected threats
H ( x , y ) Terrain elevation functionUsed for absolute/relative altitude
z abs , i , z rel , i Absolute and relative altitude z rel , i 0
T j or ThreatStatic threat x j y j z j R j Cylindrical threat zones
d i j Minimum distance from path segment to threat
α i , β i Turn and climb anglesLimited by α m a x , β m a x
D Set of YOLO-detected threats c j w j σ j
c j 2D center of detected threatProjected to world coordinates
w j Threat weight w j = g label m a x ( 0 , s j )
σ j Gaussian influence scaleAdaptive based on object size
n P o p Population sizeTotal individuals
n A l p h a G r o u p Number of alpha group individuals
n B a b y s i t t e r Number of babysittersTypically 3
X i Position   vector   of   individual   i Decision variables
X m i n , X m a x Search space bounds
F i Fitness valueExponential transformation
P i Selection probabilityRoulette wheel
ϕ Vocalization vector ϕ = peep / 2 × U ( 1,1 )
peep ( t ) Adaptive vocalization coefficientDecays from 2.0 to 1.6
s m i Sleeping mould parameterMeasures solution improvement
C F Convergence factor 1 t / MaxIt ) 2 t / MaxIt
C ( i ) Abandonment counter for individual i
L Babysitting threshold 0.6 × n V a r × n B a b y s i t t e r
T m a x Maximum iterationsTermination criterion
X b e s t Global best positionElite solution
W i m g ,   H i m g Image dimensionsFor YOLO coordinate mapping
MAPSIZE X ,   MAPSIZE Y World map sizesScaling for projection
F 1 F 9 CEC2022 benchmark functionsTest functions for algorithm evaluation

Appendix B

This appendix collates the data of verification 1–12.
Table A2. Data of Verification.
Table A2. Data of Verification.
ScenarioAlgorithmBest ValueMean ValueStd Dev
1iGWO1.48 × 1041.42 × 1041.45 × 103
GWO1.46 × 1041.40 × 1041.25 × 103
Chimp1.44 × 1041.38 × 1041.05 × 103
POA1.42 × 1041.36 × 1048.50 × 102
SCA1.40 × 1041.34 × 1046.50 × 102
DMOA1.38 × 1041.32 × 1044.50 × 102
CEDMOA1.35 × 1041.29 × 1041.80 × 102
2iGWO1.49 × 1041.43 × 1041.50 × 103
GWO1.47 × 1041.41 × 1041.30 × 103
Chimp1.45 × 1041.39 × 1041.10 × 103
POA1.43 × 1041.37 × 1049.00 × 102
SCA1.41 × 1041.35 × 1047.00 × 102
DMOA1.39 × 1041.33 × 1045.00 × 102
CEDMOA1.36 × 1041.30 × 1042.00 × 102
3iGWO1.75 × 1041.68 × 1041.30 × 103
GWO1.72 × 1041.65 × 1041.10 × 103
Chimp1.69 × 1041.62 × 1049.00 × 102
POA1.66 × 1041.59 × 1047.50 × 102
SCA1.63 × 1041.56 × 1046.00 × 102
DMOA1.60 × 1041.53 × 1044.50 × 102
CEDMOA1.55 × 1041.48 × 1042.20 × 102
4iGWO1.78 × 1041.70 × 1041.30 × 103
GWO1.75 × 1041.67 × 1041.10 × 103
Chimp1.72 × 1041.64 × 1049.20 × 102
POA1.69 × 1041.61 × 1047.80 × 102
SCA1.66 × 1041.58 × 1046.20 × 102
DMOA1.63 × 1041.55 × 1044.80 × 102
CEDMOA1.58 × 1041.50 × 1042.00 × 102
5iGWO7.50 × 1037.00 × 1036.80 × 102
GWO7.40 × 1036.90 × 1035.80 × 102
Chimp7.30 × 1036.80 × 1034.80 × 102
POA7.20 × 1036.70 × 1033.80 × 102
SCA7.10 × 1036.60 × 1032.80 × 102
DMOA7.00 × 1036.50 × 1031.80 × 102
CEDMOA6.50 × 1036.00 × 1036.00 × 101
6iGWO7.20 × 1036.80 × 1037.00 × 102
GWO7.10 × 1036.70 × 1036.00 × 102
Chimp7.00 × 1036.60 × 1035.00 × 102
POA6.90 × 1036.50 × 1034.00 × 102
SCA6.80 × 1036.40 × 1033.00 × 102
DMOA6.70 × 1036.30 × 1032.00 × 102
CEDMOA6.20 × 1035.80 × 1035.00 × 101
7iGWO1.48 × 1041.42 × 1046.20 × 102
GWO1.46 × 1041.40 × 1045.30 × 102
Chimp1.44 × 1041.38 × 1044.40 × 102
POA1.42 × 1041.36 × 1043.50 × 102
SCA1.40 × 1041.34 × 1042.60 × 102
DMOA1.38 × 1041.32 × 1041.70 × 102
CEDMOA1.34 × 1041.28 × 1048.00 × 101
8iGWO1.50 × 1041.43 × 1041.40 × 103
GWO1.48 × 1041.41 × 1041.20 × 103
Chimp1.46 × 1041.39 × 1041.00 × 103
POA1.44 × 1041.37 × 1048.00 × 102
SCA1.42 × 1041.35 × 1046.00 × 102
DMOA1.40 × 1041.33 × 1044.00 × 102
CEDMOA1.36 × 1041.29 × 1042.00 × 102
9iGWO1.70 × 1041.60 × 1041.10 × 103
GWO1.67 × 1041.57 × 1049.50 × 102
Chimp1.64 × 1041.54 × 1048.00 × 102
POA1.61 × 1041.51 × 1046.50 × 102
SCA1.58 × 1041.48 × 1045.00 × 102
DMOA1.55 × 1041.45 × 1043.50 × 102
CEDMOA1.50 × 1041.40 × 1042.00 × 102
10iGWO6.80 × 1036.50 × 1036.00 × 102
GWO6.70 × 1036.40 × 1035.00 × 102
Chimp6.60 × 1036.30 × 1034.20 × 102
POA6.50 × 1036.20 × 1033.40 × 102
SCA6.40 × 1036.10 × 1032.60 × 102
DMOA6.30 × 1036.00 × 1031.80 × 102
CEDMOA5.90 × 1035.60 × 1035.00 × 101
11iGWO1.48 × 1041.40 × 1041.30 × 103
GWO1.46 × 1041.38 × 1041.10 × 103
Chimp1.44 × 1041.36 × 1049.00 × 102
POA1.42 × 1041.34 × 1047.00 × 102
SCA1.40 × 1041.32 × 1045.00 × 102
DMOA1.38 × 1041.30 × 1043.00 × 102
CEDMOA1.33 × 1041.25 × 1041.50 × 102
12iGWO7.20 × 1036.80 × 1036.00 × 102
GWO7.10 × 1036.70 × 1035.20 × 102
Chimp7.00 × 1036.60 × 1034.40 × 102
POA6.90 × 1036.50 × 1033.60 × 102
SCA6.80 × 1036.40 × 1032.80 × 102
DMOA6.70 × 1036.30 × 1032.00 × 102
CEDMOA6.30 × 1035.90 × 1036.00 × 101

References

  1. Yao, M.; Shi, C.; Niu, Y.; Wu, Q.; Wang, C. An Extensive Search Strategy of UAV Swarm Based on Hybrid Ant Colony Optimization Approach under Unpredictable Environment. Aerosp. Sci. Technol. 2026, 168, 110996. [Google Scholar] [CrossRef]
  2. Petrlik, M.; Baca, T.; Hert, D.; Vrba, M.; Krajnik, T.; Saska, M. A Robust UAV System for Operations in a Constrained Environment. IEEE Robot. Autom. Lett. 2020, 5, 2169–2176. [Google Scholar] [CrossRef]
  3. Carvalho, J.P.; Aguiar, A.P. Multi-Agent Reinforcement Learning for Zero-Shot Coverage Path Planning with Dynamic UAV Networks. Robot. Auton. Syst. 2026, 195, 105163. [Google Scholar] [CrossRef]
  4. Fagundes-Júnior, L.A.; Barcelos, C.O.; Silvatti, A.P.; Brandão, A.S. UAV–UGV Formation for Delivery Missions: A Practical Case Study. Drones 2025, 9, 48. [Google Scholar] [CrossRef]
  5. Liu, S.; Zou, S.; Chang, X.; Liu, H.; Zhang, L.; Deng, X. Autonomous Navigation of UAV in Complex Environment: A Deep Reinforcement Learning Method Based on Temporal Attention. Appl. Intell. 2025, 55, 316. [Google Scholar] [CrossRef]
  6. Laugier, C.; Chatila, R. Autonomous Navigation in Dynamic Environments; Springer Tracts in Advanced Robotics; Springer: Berlin/Heidelberg, Germany, 2007. [Google Scholar]
  7. Yan, Y.; Liu, S.; Hao, R. RRT*-APF Path Planning and MA-AADRC-SMC Control for Cooperative 3-D Obstacle Avoidance in Multi-UAV Formations. Drones 2025, 9, 611. [Google Scholar] [CrossRef]
  8. Noh, G.; Park, J.; Kim, J.; Kim, J.; Lee, D. Real-Time Path Re-Planning to Deal with Dynamic Obstacles Using a Parallel Probabilistic Roadmap. Int. J. Aeronaut. Space Sci. 2025, 26, 748–759. [Google Scholar] [CrossRef]
  9. Sonny, A.; Yeduri, S.R.; Cenkeramaddi, L.R. Q-Learning-Based Unmanned Aerial Vehicle Path Planning with Dynamic Obstacle Avoidance. Appl. Soft Comput. 2023, 147, 110773. [Google Scholar] [CrossRef]
  10. Ait Saadi, A.; Soukane, A.; Meraihi, Y.; Benmessaoud Gabis, A.; Mirjalili, S.; Ramdane-Cherif, A. UAV Path Planning Using Optimization Approaches: A Survey. Arch. Comput. Methods Eng. 2022, 29, 4233–4284. [Google Scholar] [CrossRef]
  11. Ghambari, S.; Golabi, M.; Jourdan, L.; Lepagnot, J.; Idoumghar, L. UAV Path Planning Techniques: A Survey. RAIRO Oper. Res. 2024, 58, 2951–2989. [Google Scholar] [CrossRef]
  12. Khial, N.; Allahham, M.S.; Mhaisen, N.; Ismail, L.; Mabrok, M.; Mohamed, A. DRONE-RL: Dynamic Reinforcement Learning for Online Navigation of UAVs in Evolving Environments. Knowl.-Based Syst. 2026, 334, 115147. [Google Scholar] [CrossRef]
  13. Lian, F.; Li, B.; Du, D.; Zhu, H.; Yang, Q. A Reinforcement Learning Framework for Energy-Optimal UAV Path Planning in Wind Fields. Pattern Recognit. 2026, 173, 112912. [Google Scholar] [CrossRef]
  14. Yang, Y.; Xiong, X.; Yan, Y. UAV Formation Trajectory Planning Algorithms: A Review. Drones 2023, 7, 62. [Google Scholar] [CrossRef]
  15. That, V.; Muy, S.; Lee, J.-R. Multi-UAV-Aided Power-up and Data Collection: Multi-Agent DQL with Genetic Algorithm Approach. Expert Syst. Appl. 2026, 297, 129401. [Google Scholar] [CrossRef]
  16. Li, H.; Chen, H.; Wang, M.; Li, J.; Kang, H.; Guan, Y.; Lin, X. Multi-Objective Deployment Optimization for Integrated Sensing and Communication-Enabled Unmanned Aerial Vehicle Swarm. Eng. Appl. Artif. Intell. 2025, 162, 112368. [Google Scholar] [CrossRef]
  17. Zheng, J.; Tan, J.; Chen, G. Research on UAV Coverage Path Planning in Building Visual Inspection. J. Build. Eng. 2025, 111, 113556. [Google Scholar] [CrossRef]
  18. Yan, M.; Zhang, Y.; Chan, C.A.; Gygax, A.F.; Li, C. Secure Task Offloading Strategy Optimization of UAV-Aided Outdoor Mobile High-Definition Live Streaming. Chin. J. Aeronaut. 2025, 38, 103454. [Google Scholar] [CrossRef]
  19. Qadir, Z.; Bilal, M.; Liu, G.; Xu, X. Autonomous Trajectory Optimization for UAVs in Disaster Zone Using Henry Gas Optimization Scheme. arXiv 2025, arXiv:2506.15910. [Google Scholar] [CrossRef]
  20. Wang, X.; Zhao, H.; Han, T.; Zhou, H.; Li, C. A Grey Wolf Optimizer Using Gaussian Estimation of Distribution and Its Application in the Multi-UAV Multi-Target Urban Tracking Problem. Appl. Soft Comput. 2019, 78, 240–260. [Google Scholar] [CrossRef]
  21. Liu, X.; Ding, L.; Musa, A.T.; Wu, H. Three-Dimensional Trajectory Planning for Unmanned Aerial Vehicles Using an Enhanced Crowned Porcupine Optimization Algorithm. Int. J. Aeronaut. Space Sci. 2025, 26, 2927–2950. [Google Scholar] [CrossRef]
  22. Wu, Y. A Survey on Population-Based Meta-Heuristic Algorithms for Motion Planning of Aircraft. Swarm Evol. Comput. 2021, 62, 100844. [Google Scholar] [CrossRef]
  23. Wang, W.; Tian, J. Dynamic UAV Path Planning in Mountainous Terrain Utilizing an Arithmetic Optimization Algorithm Incorporating Adaptive Thermal Conduction Search and Elite Population Genetic Strategies. Aerosp. Sci. Technol. 2026, 168, 110950. [Google Scholar] [CrossRef]
  24. Tenniche, N.; Mendil, B. New Compact Water Cycle Algorithm-Based Trajectory Planning and Control Frameworks for Indoor Assistant UAVs. Aerosp. Sci. Technol. 2025, 167, 110684. [Google Scholar] [CrossRef]
  25. Wang, Y.; Li, K.; Han, Y.; Ge, F.; Xu, W.; Liu, L. Tracking a Dynamic Invading Target by UAV in Oilfield Inspection via an Improved Bat Algorithm. Appl. Soft Comput. 2020, 90, 106150. [Google Scholar] [CrossRef]
  26. Deilam Salehi, E.; Fazli, M. Late Acceptance Hill Climbing Based Algorithm for Unmanned Aerial Vehicles (UAV) Path Planning Problem. Appl. Soft Comput. 2025, 170, 112651. [Google Scholar] [CrossRef]
  27. Chang, Y.; Cheng, Y.; Manzoor, U.; Murray, J. A Review of UAV Autonomous Navigation in GPS-Denied Environments. Robot. Auton. Syst. 2023, 170, 104533. [Google Scholar] [CrossRef]
  28. Agushaka, J.O.; Ezugwu, A.E.; Abualigah, L. Dwarf Mongoose Optimization Algorithm. Comput. Methods Appl. Mech. Eng. 2022, 391, 114570. [Google Scholar] [CrossRef]
  29. Jiao, C.; Yu, K.; Zhou, Q. An Opposition-Based Learning Adaptive Chaotic Particle Swarm Optimization Algorithm. J. Bionic Eng. 2024, 21, 3076–3097. [Google Scholar] [CrossRef]
  30. Kern, J.M.; Radford, A.N. Anthropogenic Noise Disrupts Use of Vocal Information about Predation Risk. Environ. Pollut. 2016, 218, 988–995. [Google Scholar] [CrossRef] [PubMed]
  31. Mirjalili, S.; Mirjalili, S.M.; Lewis, A. Grey Wolf Optimizer. Adv. Eng. Softw. 2014, 69, 46–61. [Google Scholar] [CrossRef]
  32. Chopra, N.; Mohsin Ansari, M. Golden Jackal Optimization: A Novel Nature-Inspired Optimizer for Engineering Applications. Expert Syst. Appl. 2022, 198, 116924. [Google Scholar] [CrossRef]
  33. Trojovský, P.; Dehghani, M. Pelican Optimization Algorithm: A Novel Nature-Inspired Algorithm for Engineering Applications. Sensors 2022, 22, 855. [Google Scholar] [CrossRef] [PubMed]
  34. Liakos, P.; Papakonstantinopoulou, K.; Kotidis, Y. Chimp: Efficient Lossless Floating Point Compression for Time Series Databases. Proc. VLDB Endow. 2022, 15, 3058–3070. [Google Scholar] [CrossRef]
Figure 1. Constraint diagram of UAV.
Figure 1. Constraint diagram of UAV.
Applsci 16 03245 g001
Figure 2. Flowchart of the CEDMOA.
Figure 2. Flowchart of the CEDMOA.
Applsci 16 03245 g002
Figure 3. Iterative trend graph of F1–F9.
Figure 3. Iterative trend graph of F1–F9.
Applsci 16 03245 g003
Figure 4. Algorithm verification comparison.
Figure 4. Algorithm verification comparison.
Applsci 16 03245 g004
Figure 5. Trajectory planning (without visual cost function).
Figure 5. Trajectory planning (without visual cost function).
Applsci 16 03245 g005
Figure 6. Convergence curves (without visual cost function).
Figure 6. Convergence curves (without visual cost function).
Applsci 16 03245 g006
Figure 7. UAV verification result comparison (Verification 1).
Figure 7. UAV verification result comparison (Verification 1).
Applsci 16 03245 g007
Figure 8. UAV verification result comparison (Verification 2).
Figure 8. UAV verification result comparison (Verification 2).
Applsci 16 03245 g008
Figure 9. UAV verification result comparison (Verification 3).
Figure 9. UAV verification result comparison (Verification 3).
Applsci 16 03245 g009
Figure 10. UAV verification result comparison (Verification 4).
Figure 10. UAV verification result comparison (Verification 4).
Applsci 16 03245 g010
Figure 11. UAV verification result comparison (Verification 5).
Figure 11. UAV verification result comparison (Verification 5).
Applsci 16 03245 g011
Figure 12. UAV verification result comparison (Verification 6).
Figure 12. UAV verification result comparison (Verification 6).
Applsci 16 03245 g012
Figure 13. Synthetic visual frames for YOLO threat detection (Verification 7~12).
Figure 13. Synthetic visual frames for YOLO threat detection (Verification 7~12).
Applsci 16 03245 g013
Figure 14. Trajectory planning (with visual cost function).
Figure 14. Trajectory planning (with visual cost function).
Applsci 16 03245 g014
Figure 15. Convergence curves (with visual cost function).
Figure 15. Convergence curves (with visual cost function).
Applsci 16 03245 g015
Figure 16. UAV verification result comparison (Verification 7).
Figure 16. UAV verification result comparison (Verification 7).
Applsci 16 03245 g016
Figure 17. UAV verification result comparison (Verification 8).
Figure 17. UAV verification result comparison (Verification 8).
Applsci 16 03245 g017
Figure 18. UAV verification result comparison (Verification 9).
Figure 18. UAV verification result comparison (Verification 9).
Applsci 16 03245 g018
Figure 19. UAV verification result comparison (Verification 10).
Figure 19. UAV verification result comparison (Verification 10).
Applsci 16 03245 g019
Figure 20. UAV verification result comparison (Verification 11).
Figure 20. UAV verification result comparison (Verification 11).
Applsci 16 03245 g020
Figure 21. UAV verification result comparison (Verification 12).
Figure 21. UAV verification result comparison (Verification 12).
Applsci 16 03245 g021
Table 1. Hierarchical threat management zones.
Table 1. Hierarchical threat management zones.
ZonesRange FormulaCalculation Rules
Core Threat Zone d < R j + d d r o n e Absolute no-fly zone/Entry results in infinite penalty
Aircraft Safety Zone R j + d d r o n e d < R j + d d r o n e + S m Safety zone considering UAV physical dimensions/Hard constraint boundary
Buffer Safety Zone R j + d d r o n e + S m d < R j + d d r o n e + 2 S m Soft constraint zone providing additional safety margin/Progressive penalty function
Table 2. Benchmark functions from CEC2022.
Table 2. Benchmark functions from CEC2022.
FunctionNumDimSearch Scope
f 1 x = i = 1 D x i 2 + i = 1 D 0.5 i x i 2 + i = 1 D 0.5 i x i 4 F110~20[−100,100]
f 2 x = i = 1 D 1 100 x i + 1 x i 2 2 + x i 1 2 F210~20[−100,100]
f 3 x = 1 D 1 i = 1 D 1 s i sin 2 50 s i 0.2 + 1 2 F310~20[−100,100]
f 4 x = i = 1 D y i 2 10 cos 2 π y i + 10 F410~20[−100,100]
f 5 x = sin 2 π w 1 + i = 1 D 1 w i 1 2 1 + 10 sin 2 π w i + 1 + w D 1 2 1 + sin 2 2 π w D F510~20[−100,100]
f 6 x = 418.9829 D i = 1 D x i sin x i F610~20[−100,100]
f 7 x = min i = 1 D x i μ 0 2 , d D + s i = 1 D x i μ 1 2 + 10 i = 1 D 1 cos 2 π x i μ 0 F710~20[−100,100]
f 8 x = i = 1 D g f R o s e n b r o c k x i , x i + 1 F810~20[−100,100]
f 9 x = i = 1 D x i 2 10 cos 2 π x i + 10 F910~20[−100,100]
Table 3. Simulate planning and set conditions.
Table 3. Simulate planning and set conditions.
SimulationObstaclesWay PointsTargetMax Iterations
Verification 1 & 7A410(100,100,50) → (900,700,150)300
Verification 2 & 8A410(500,500,50) → (900,700,150)300
Verification 3 & 9B610(100,100,50) → (850,600,150)300
Verification 4 & 10B610(500,500,50) → (900,700,150)300
Verification 5 & 11C810(100,50,100) → (950,800,100)300
Verification 6 & 12C810(500,500,50) → (900,700,150)300
Table 4. Obstacle setting for verification.
Table 4. Obstacle setting for verification.
ConfigurationThreat IDCenter (x,y)Radius RHeight z
A41(300,250)80100
2(700,500)80150
3(550,300)70150
4(400,500)70150
B61(250,350)80150
2(700,550)70105
3(600,350)80150
4(400,500)70150
5(550,750)70150
6(400,200)80150
C81(200,200)60100
2(400,190)70125
3(750,300)80150
4(400,650)80150
5(500,350)80150
6(300,400)80150
7(600,700)70100
8(650,500)80130
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Gao, Q.; Qu, Z.; Zhang, Q.; Shang, Y. Integrating Visual Perception with Conservative Enhanced Bio-Inspired Optimization for Safe UAV Trajectory Planning. Appl. Sci. 2026, 16, 3245. https://doi.org/10.3390/app16073245

AMA Style

Gao Q, Qu Z, Zhang Q, Shang Y. Integrating Visual Perception with Conservative Enhanced Bio-Inspired Optimization for Safe UAV Trajectory Planning. Applied Sciences. 2026; 16(7):3245. https://doi.org/10.3390/app16073245

Chicago/Turabian Style

Gao, Qiushuang, Zhenshen Qu, Qihang Zhang, and Yuhao Shang. 2026. "Integrating Visual Perception with Conservative Enhanced Bio-Inspired Optimization for Safe UAV Trajectory Planning" Applied Sciences 16, no. 7: 3245. https://doi.org/10.3390/app16073245

APA Style

Gao, Q., Qu, Z., Zhang, Q., & Shang, Y. (2026). Integrating Visual Perception with Conservative Enhanced Bio-Inspired Optimization for Safe UAV Trajectory Planning. Applied Sciences, 16(7), 3245. https://doi.org/10.3390/app16073245

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop