Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (12)

Search Parameters:
Keywords = cooperative patrol

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
40 pages, 50126 KiB  
Article
Cooperative Patrol Control of Multiple Unmanned Surface Vehicles for Global Coverage
by Yuan Liu, Xirui Xu, Guoxing Li, Lingyun Lu, Yunfan Gu, Yuna Xiao and Wenfang Sun
J. Mar. Sci. Eng. 2025, 13(3), 584; https://doi.org/10.3390/jmse13030584 - 17 Mar 2025
Viewed by 707
Abstract
The cooperative patrol control of multiple unmanned surface vehicles (Multi-USVs) in dynamic aquatic environments presents significant challenges in global coverage efficiency and system robustness. The study proposes a cooperative patrol control algorithm for multiple unmanned surface vehicles (Multi-USVs) based on a hybrid embedded [...] Read more.
The cooperative patrol control of multiple unmanned surface vehicles (Multi-USVs) in dynamic aquatic environments presents significant challenges in global coverage efficiency and system robustness. The study proposes a cooperative patrol control algorithm for multiple unmanned surface vehicles (Multi-USVs) based on a hybrid embedded task state information model and reward reshaping techniques, addressing global coverage challenges in dynamic aquatic environments. By integrating patrol, collaboration, and obstacle information graphs, the algorithm generates kinematically feasible control actions in real time and optimizes the exploration-cooperation trade-off through a dense reward structure. Simulation results demonstrate that the algorithm achieves 99.75% coverage in a 1 km × 1 km task area, reducing completion time by 23% and 74% compared to anti-flocking and partition scanning algorithms, respectively, while maintaining collision rates between agents (CRBAA) and obstacles (CRBAO) below 0.15% and 0.5%. Compared to DDPG, SAC, and PPO frameworks, the proposed training framework (TFMUSV) achieves 28% higher rewards with 40% smaller fluctuations in later training stages. This study provides an efficient and reliable solution for autonomous monitoring and search-rescue missions in complex aquatic environments. Full article
(This article belongs to the Section Ocean Engineering)
Show Figures

Figure 1

32 pages, 1742 KiB  
Review
A Survey of the Routing Problem for Cooperated Trucks and Drones
by Shuo Dang, Yao Liu, Zhihao Luo, Zhong Liu and Jianmai Shi
Drones 2024, 8(10), 550; https://doi.org/10.3390/drones8100550 - 3 Oct 2024
Cited by 3 | Viewed by 3504
Abstract
The emerging working mode of coordinated trucks and drones has demonstrated significant practical potential in various fields, including logistics and delivery, intelligence surveillance reconnaissance, area monitoring, and patrol. The seamless collaboration between trucks and drones is garnering widespread attention in academia and has [...] Read more.
The emerging working mode of coordinated trucks and drones has demonstrated significant practical potential in various fields, including logistics and delivery, intelligence surveillance reconnaissance, area monitoring, and patrol. The seamless collaboration between trucks and drones is garnering widespread attention in academia and has emerged as a key technology for achieving efficient and secure transportation. This paper provides a comprehensive and in-depth review of the research status on the routing problem for coordinated trucks and drones, covering aspects such as application background, cooperative modes, configurations, issues that have been taken into consideration, and solution methodologies. Full article
Show Figures

Figure 1

26 pages, 6630 KiB  
Article
Study on Multi-UAV Cooperative Path Planning for Complex Patrol Tasks in Large Cities
by Hongyu Xiang, Yuhang Han, Nan Pan, Miaohan Zhang and Zhenwei Wang
Drones 2023, 7(6), 367; https://doi.org/10.3390/drones7060367 - 1 Jun 2023
Cited by 13 | Viewed by 3061
Abstract
Unmanned Aerial Vehicles (UAVs) are increasingly utilized for urban patrol and defense owing to their low cost, high mobility, and rapid deployment. This paper proposes a multi-UAV mission planning model that takes into account mission execution rates, flight energy consumption costs, and impact [...] Read more.
Unmanned Aerial Vehicles (UAVs) are increasingly utilized for urban patrol and defense owing to their low cost, high mobility, and rapid deployment. This paper proposes a multi-UAV mission planning model that takes into account mission execution rates, flight energy consumption costs, and impact costs. A kinematics and dynamics model of a quadcopter UAV is established, and the UAV’s flight state is analyzed. Due to the difficulties in addressing 3D UAV kinematic constraints and poor uniformity using traditional optimization algorithms, a lightning search algorithm (LSA) based on multi-layer nesting and random walk strategies (MNRW-LSA) is proposed. The convergence performance of the MNRW-LSA algorithm is demonstrated by comparing it with several other algorithms, such as the Golden Jackal Optimization (GJO), Hunter–Prey Optimization (HPO), Pelican Optimization Algorithm (POA), Reptile Search Algorithm (RSA), and the Golden Eagle Optimization (GEO) using optimization test functions, Friedman and Nemenyi tests. Additionally, a greedy strategy is added to the Rapidly-Exploring Random Tree (RRT) algorithm to initialize the trajectories for simulation experiments using a 3D city model. The results indicate that the proposed algorithm can enhance global convergence and robustness, shorten convergence time, improve UAV execution coverage, and reduce energy consumption. Compared with other algorithms, such as Particle Swarm Optimization (PSO), Simulated Annealing (SA), and LSA, the proposed method has greater advantages in addressing multi-UAV trajectory planning problems. Full article
Show Figures

Figure 1

23 pages, 7972 KiB  
Article
Deep Visual Waterline Detection for Inland Marine Unmanned Surface Vehicles
by Shijun Chen, Jing Huang, Hengfeng Miao, Yaoqing Cai, Yuanqiao Wen and Changshi Xiao
Appl. Sci. 2023, 13(5), 3164; https://doi.org/10.3390/app13053164 - 1 Mar 2023
Cited by 3 | Viewed by 2178
Abstract
Waterline usually plays as an important visual cue for the autonomous navigation of marine unmanned surface vehicles (USVs) in specific waters. However, the visual complexity of the inland waterline presents a significant challenge for the development of highly efficient computer vision algorithms tailored [...] Read more.
Waterline usually plays as an important visual cue for the autonomous navigation of marine unmanned surface vehicles (USVs) in specific waters. However, the visual complexity of the inland waterline presents a significant challenge for the development of highly efficient computer vision algorithms tailored for waterline detection in a complicated inland water environment that marine USVs face. This paper attempts to find a solution to guarantee the effectiveness of waterline detection for the USVs with a general digital camera patrolling variable inland waters. To this end, a general deep-learning-based paradigm for inland marine USVs, named DeepWL, is proposed, which consists of two cooperative deep models (termed WLdetectNet and WLgenerateNet, respectively). They afford a continuous waterline image-map estimation from a single video stream captured on board. Experimental results demonstrate the effectiveness and superiority of the proposed approach via qualitative and quantitative assessment on the concerned performances. Moreover, due to its own generality, the proposed approach has the potential to be applied to the waterline detection tasks of other water areas such as coastal waters. Full article
(This article belongs to the Special Issue Recent Advances in Image Processing)
Show Figures

Figure 1

17 pages, 2845 KiB  
Article
Clustering Algorithm Based on the Ground-Air Cooperative Architecture in Border Patrol Scenarios
by Yanling Shao, Liming Liu, Hewen Gao, Hao Xu, Yaokuan Wang, Siliang Gong and Hanyao Huang
Electronics 2022, 11(18), 2876; https://doi.org/10.3390/electronics11182876 - 11 Sep 2022
Cited by 6 | Viewed by 1985
Abstract
The border security situation is complex and severe, and the border patrol system relying on the ground-air cooperative architecture has been paid attention to by all countries as an important means of protecting national security. In the flying ad-hoc network (FANET), under the [...] Read more.
The border security situation is complex and severe, and the border patrol system relying on the ground-air cooperative architecture has been paid attention to by all countries as an important means of protecting national security. In the flying ad-hoc network (FANET), under the ground-air cooperative architecture, an unmanned aerial vehicle (UAV) uses a patrol mobility model to improve patrol efficiency. Since the patrol mobility model leads to frequent changes in UAV movement direction to improve patrol efficiency, selecting some clustering utility factors and calculating utility factors in previous clustering algorithms do not apply to this scenario. To solve the above problems, in this paper, we propose a border patrol clustering algorithm (BPCA) based on the ground-air cooperative architecture, which is based on the existing weighted clustering algorithm and improved in terms of the selection of utility factors and calculations of utility factors in cluster head selection. This algorithm comprehensively considers the effects of relative speed, relative distance, and the movement model of the UAV on the network topology. Extensive simulation results show that this algorithm can extend the duration time of cluster heads and cluster members and improve the stability of clusters and the reliability of links. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

23 pages, 3040 KiB  
Article
Promoting Cooperation of Monitoring, Control, and Surveillance of IUU Fishing in the Asia-Pacific
by Iwao Fujii, Yumi Okochi and Hajime Kawamura
Sustainability 2021, 13(18), 10231; https://doi.org/10.3390/su131810231 - 13 Sep 2021
Cited by 18 | Viewed by 9416
Abstract
Illegal, unreported, and unregulated (IUU) fishing is becoming a growing threat to sustainable fisheries and the economy worldwide. To solve this issue, various efforts on monitoring, control, and surveillance (MCS) have been made at the national, regional, and international levels. However, there is [...] Read more.
Illegal, unreported, and unregulated (IUU) fishing is becoming a growing threat to sustainable fisheries and the economy worldwide. To solve this issue, various efforts on monitoring, control, and surveillance (MCS) have been made at the national, regional, and international levels. However, there is still the lack of measures against IUU fishing vessels at the multilateral level. Here, we assessed the situations of fisheries, and the current systems and challenges of MCS in eight Asia-Pacific countries with a focus on MCS of IUU fishing vessels at sea. Through a literature review and interviews, we confirmed that IUU fishing was linked with the status of fisheries in each country, and that each country implements various MCS measures with different emphases. However, there was a trend of enhancing or newly establishing four areas of MCS: vessel tracking, patrol, onboard observers, and port State measures, with amended or newly adopted laws. We also identified challenges of MCS such as insufficient MCS in coastal areas and fragmented cooperation among the countries. Based on our findings, we advance several recommendations including the enhancement of cooperation among stakeholders, especially fishers, for co-monitoring in coastal areas and the establishment of a communication platform for Asia-Pacific countries. Full article
(This article belongs to the Special Issue International Fisheries Policy and Economic Analysis)
Show Figures

Figure 1

15 pages, 5144 KiB  
Article
Hybrid Partition-Based Patrolling Scheme for Maritime Area Patrol with Multiple Cooperative Unmanned Surface Vehicles
by Jiajia Xie, Rui Zhou, Jun Luo, Yan Peng, Yuan Liu, Shaorong Xie and Huayan Pu
J. Mar. Sci. Eng. 2020, 8(11), 936; https://doi.org/10.3390/jmse8110936 - 18 Nov 2020
Cited by 32 | Viewed by 3914
Abstract
Multi-robot cooperative patrolling systems have been extensively employed in the civilian and military fields, including monitoring forest fires, marine search-and-rescue, and area patrol. Multi-robot area patrol problems refer to the activity that a team of robots works cooperatively and regularly to visit the [...] Read more.
Multi-robot cooperative patrolling systems have been extensively employed in the civilian and military fields, including monitoring forest fires, marine search-and-rescue, and area patrol. Multi-robot area patrol problems refer to the activity that a team of robots works cooperatively and regularly to visit the key targets in the given area for security. Following consideration of the low cost and high safety of unmanned surface vehicles (USV), a team of USVs is organized to perform area patrol in a sophisticated maritime environment. In this paper, we establish a mathematical model considering the characteristics of the cooperative patrol task and the limited conditions of USVs. A hybrid partition-based patrolling scheme is proposed for a multi-USV system to visit targets with different importance levels in a maritime area. Firstly, a centralized area partition algorithm is utilized to partition the patrolling area according to the number of USVs. Secondly, a distributed path planning algorithm is applied to planning the patrolling path for each USV to visit the targets in a maritime environment to minimize the length of the patrolling path for the USV team. Finally, comparative experiments between the proposed scheme and other methods are carried out to validate the performance of the hybrid partition-based patrolling scheme. Simulation results and experimental analysis show the efficiency of the proposed hybrid partition-based patrolling scheme compared to several previous patrolling algorithms. Full article
(This article belongs to the Section Ocean Engineering)
Show Figures

Figure 1

23 pages, 2975 KiB  
Article
Self-Adaptation of a Heterogeneous Swarm of Mobile Robots to a Covered Area
by Ján Zelenka, Tomáš Kasanický, Marek Bundzel and Rudolf Andoga
Appl. Sci. 2020, 10(10), 3562; https://doi.org/10.3390/app10103562 - 21 May 2020
Cited by 3 | Viewed by 2708
Abstract
An original swarm-based method for coordination of groups of mobile robots with a focus on the self-organization and self-adaptation of the groups is presented in this paper. The method is a nature-inspired decentralized algorithm that uses artificial pheromone marks and enables the cooperation [...] Read more.
An original swarm-based method for coordination of groups of mobile robots with a focus on the self-organization and self-adaptation of the groups is presented in this paper. The method is a nature-inspired decentralized algorithm that uses artificial pheromone marks and enables the cooperation of different types of independent reactive agents that operate in the air, on the ground, or in the water. The advantages of our solution include scalability, adaptability, and robustness. The algorithm worked with variable numbers of agents in the groups. It was resistant against failures of the individual robots. A transportation control algorithm that ensured the spreading of different types of agents across exploration space with different types of environments was introduced and tested. We established that our swarm control algorithm was able to successfully control three basic behaviors: space exploration, population management, and transportation. The behaviors were able to run simultaneously, and space exploration (the main goal) was never stopped or interrupted. All these features combined in a single algorithmic package represent a framework for future development of swarm-based agent systems applicable in a broad scope of environments. The results confirmed that the algorithm can be applied to monitoring, surveillance, patrolling, or search and rescue tasks. Full article
(This article belongs to the Special Issue Advances in Multi-Agent Systems)
Show Figures

Figure 1

21 pages, 12868 KiB  
Article
Opponent-Aware Planning with Admissible Privacy Preserving for UGV Security Patrol under Contested Environment
by Junren Luo, Wanpeng Zhang, Wei Gao, Zhiyong Liao, Xiang Ji and Xueqiang Gu
Electronics 2020, 9(1), 5; https://doi.org/10.3390/electronics9010005 - 18 Dec 2019
Cited by 2 | Viewed by 2644
Abstract
Unmanned ground vehicles (UGVs) have been widely used in security patrol. The existence of two potential opponents, the malicious teammate (cooperative) and the hostile observer (adversarial), highlights the importance of privacy-preserving planning under contested environments. In a cooperative setting, the disclosure of private [...] Read more.
Unmanned ground vehicles (UGVs) have been widely used in security patrol. The existence of two potential opponents, the malicious teammate (cooperative) and the hostile observer (adversarial), highlights the importance of privacy-preserving planning under contested environments. In a cooperative setting, the disclosure of private information can be restricted to the malicious teammates. In adversarial setting, obfuscation can be added to control the observability of the adversarial observer. In this paper, we attempt to generate opponent-aware privacy-preserving plans, mainly focusing on two questions: what is opponent-aware privacy-preserving planning, and, how can we generate opponent-aware privacy-preserving plans? We first define the opponent-aware privacy-preserving planning problem, where the generated plans preserve admissible privacy. Then, we demonstrate how to generate opponent-aware privacy-preserving plans. The search-based planning algorithms were restricted to public information shared among the cooperators. The observation of the adversarial observer could be purposefully controlled by exploiting decoy goals and diverse paths. Finally, we model the security patrol problem, where the UGV restricts information sharing and attempts to obfuscate the goal. The simulation experiments with privacy leakage analysis and an indoor robot demonstration show the applicability of our proposed approaches. Full article
(This article belongs to the Special Issue AI-Enabled Security and Privacy Mechanisms for IoT)
Show Figures

Figure 1

20 pages, 4832 KiB  
Article
Traffic Patrolling Routing Problem with Drones in an Urban Road System
by He Luo, Peng Zhang, Jiajie Wang, Guoqiang Wang and Fanhe Meng
Sensors 2019, 19(23), 5164; https://doi.org/10.3390/s19235164 - 25 Nov 2019
Cited by 35 | Viewed by 5619
Abstract
The remarkable development of various sensor equipment and communication technologies has stimulated many application platforms of automation. A drone is a sensing platform with strong environmental adaptability and expandability, which is widely used in aerial photography, transmission line inspection, remote sensing mapping, auxiliary [...] Read more.
The remarkable development of various sensor equipment and communication technologies has stimulated many application platforms of automation. A drone is a sensing platform with strong environmental adaptability and expandability, which is widely used in aerial photography, transmission line inspection, remote sensing mapping, auxiliary communication, traffic patrolling, and other fields. A drone is an effective supplement to the current patrolling business in road traffic patrolling with complex urban buildings and road conditions and a limited ground perspective. However, the limited endurance of patrol drones can be directly solved by vehicles that cooperate with drones on patrolling missions. In this paper, we first proposed and studied the traffic patrolling routing problem with drones (TPRP-D) in an urban road system. Considering road network equations and the heterogeneity of patrolling tasks in the actual patrolling process, we modeled the problem as a double-layer arc routing problem (DL-ARP). Based on graph theory and related research work, we present the mixed integer linear programming formulations and two-stage heuristic solution approaches to solve practical-sized problems. Through analysis of numerical experiments, the solution method proposed in this paper can quickly provide an optimal path planning scheme for different test sets, which can save 9%–16% of time compared with traditional vehicle patrol. At the same time, we analyze several relevant parameters of the patrol process to determine the effect of coordinated traffic patrol. Finally, a case study was completed to verify the practicability of the algorithm. Full article
Show Figures

Figure 1

17 pages, 703 KiB  
Article
Virtual-Lattice Based Intrusion Detection Algorithm over Actuator-Assisted Underwater Wireless Sensor Networks
by Jing Yan, Xiaolei Li, Xiaoyuan Luo and Xinping Guan
Sensors 2017, 17(5), 1168; https://doi.org/10.3390/s17051168 - 20 May 2017
Cited by 19 | Viewed by 6196
Abstract
Due to the lack of a physical line of defense, intrusion detection becomes one of the key issues in applications of underwater wireless sensor networks (UWSNs), especially when the confidentiality has prime importance. However, the resource-constrained property of UWSNs such as sparse deployment [...] Read more.
Due to the lack of a physical line of defense, intrusion detection becomes one of the key issues in applications of underwater wireless sensor networks (UWSNs), especially when the confidentiality has prime importance. However, the resource-constrained property of UWSNs such as sparse deployment and energy constraint makes intrusion detection a challenging issue. This paper considers a virtual-lattice-based approach to the intrusion detection problem in UWSNs. Different from most existing works, the UWSNs consist of two kinds of nodes, i.e., sensor nodes (SNs), which cannot move autonomously, and actuator nodes (ANs), which can move autonomously according to the performance requirement. With the cooperation of SNs and ANs, the intruder detection probability is defined. Then, a virtual lattice-based monitor (VLM) algorithm is proposed to detect the intruder. In order to reduce the redundancy of communication links and improve detection probability, an optimal and coordinative lattice-based monitor patrolling (OCLMP) algorithm is further provided for UWSNs, wherein an equal price search strategy is given for ANs to find the shortest patrolling path. Under VLM and OCLMP algorithms, the detection probabilities are calculated, while the topology connectivity can be guaranteed. Finally, simulation results are presented to show that the proposed method in this paper can improve the detection accuracy and save the energy consumption compared with the conventional methods. Full article
Show Figures

Figure 1

23 pages, 1178 KiB  
Article
Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network
by Andrea Caiti, Vincenzo Calabrò, Gianluca Dini, Angelica Lo Duca and Andrea Munafò
Sensors 2012, 12(2), 1967-1989; https://doi.org/10.3390/s120201967 - 10 Feb 2012
Cited by 50 | Viewed by 10636
Abstract
Methodologies and algorithms are presented for the secure cooperation of a team of autonomous mobile underwater sensors, connected through an acoustic communication network, within surveillance and patrolling applications. In particular, the work proposes a cooperative algorithm in which the mobile underwater sensors (installed [...] Read more.
Methodologies and algorithms are presented for the secure cooperation of a team of autonomous mobile underwater sensors, connected through an acoustic communication network, within surveillance and patrolling applications. In particular, the work proposes a cooperative algorithm in which the mobile underwater sensors (installed on Autonomous Underwater Vehicles—AUVs) respond to simple local rules based on the available information to perform the mission and maintain the communication link with the network (behavioral approach). The algorithm is intrinsically robust: with loss of communication among the vehicles the coverage performance (i.e., the mission goal) is degraded but not lost. The ensuing form of graceful degradation provides also a reactive measure against Denial of Service. The cooperative algorithm relies on the fact that the available information from the other sensors, though not necessarily complete, is trustworthy. To ensure trustworthiness, a security suite has been designed, specifically oriented to the underwater scenario, and in particular with the goal of reducing the communication overhead introduced by security in terms of number and size of messages. The paper gives implementation details on the integration between the security suite and the cooperative algorithm and provides statistics on the performance of the system as collected during the UAN project sea trial held in Trondheim, Norway, in May 2011. Full article
(This article belongs to the Special Issue Underwater Sensor Nodes and Underwater Sensor Networks)
Show Figures

Graphical abstract

Back to TopTop