Submarine Hunter: Efficient and Secure Multi-Type Unmanned Vehicles

被引:0
|
作者
Mahmoud, Halah Hasan [1 ]
Al-Shammari, Marwan Kadhim Mohammed [1 ]
Amran, Gehad Abdullah [2 ,3 ]
Eldin, Elsayed Tag [4 ]
Alareqi, Ala R. [5 ]
Ghamry, Nivin A. [6 ]
ALnajjar, Ehaa [7 ]
Almosharea, Esmail [8 ]
机构
[1] Univ Baghdad, Comp Ctr, 6751, Baghdad, Iraq
[2] Dalian Univ Technol, Dept Management Sci & Engn, Dalian 116024, Liaoning, Peoples R China
[3] AL Razi Univ, Fac Comp Sci & Informat Technol, Dept Informat Technol, Sanaa, Yemen
[4] Future Univ Egypt, Fac Engn & Technol, New Cairo 11835, Egypt
[5] Dalian Univ Technol, Fac Engn Mech, Dalian 116024, Liaoning, Peoples R China
[6] Cairo Univ, Fac Comp & Artificial Intelligence, Giza, Egypt
[7] Dalian Univ Technol, Dept Business Adm, Dalian 116024, Liaoning, Peoples R China
[8] Dalian Univ Technol, Coll Software Engn, Dalian, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 76卷 / 01期
关键词
Unmanned vehicles; unmanned aerial vehicles; unmanned underwater vehicles; high altitude unmanned aerial vehicles; anti-submarine warfare; re-fragmentation; dragonfly algorithm;
D O I
10.32604/cmc.2023.039363
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Utilizing artificial intelligence (AI) to protect smart coastal cities has become a novel vision for scientific and industrial institutions. One of these AI technologies is using efficient and secure multi-environment Unmanned Vehicles (UVs) for anti-submarine attacks. This study's contribution is the early detection of a submarine assault employing hybrid environment UVs that are controlled using swarm optimization and secure the information in between UVs using a decentralized cybersecurity strategy. The Dragonfly Algorithm is used for the orientation and clustering of the UVs in the optimization approach, and the Re-fragmentation strategy is used in the Network layer of the TCP/IP protocol as a cybersecurity solution. The research's noteworthy findings demonstrate UVs' logistical capability to promptly detect the target and address the problem while securely keeping the drone's geographical information. The results suggest that detecting the submarine early increases the likelihood of averting a collision. The dragonfly strategy of sensing the position of the submersible and aggregating around it demonstrates the reliability of swarm intelligence in increasing access efficiency. Securing communication between Unmanned Aerial Vehicles (UAVs) improves the level of secrecy necessary for the task. The swarm navigation is based on a peer-to-peer system, which allows each UAV to access information from its peers. This, in turn, helps the UAVs to determine the best route to take and to avoid collisions with other UAVs. The dragonfly strategy also increases the speed of the mission by minimizing the time spent finding the target.
引用
收藏
页码:573 / 589
页数:17
相关论文
共 50 条
  • [21] AN ALGORITHM ON MULTI-DEPOTS AND MULTI-TYPE VEHICLES ROUTING BASED ON GLOBAL SEARCHING CLUSTERING
    Zheng, Liying
    Wang, Jingbo
    Jia, Haipeng
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 536 - 539
  • [22] Vehicle Routing Problem with Multi-type Vehicles in the Cold Chain Logistics System
    Huai Chu-xuan
    Sun Guo-hua
    Qu Ran-ran
    Gao Zhao
    Zhang Ze-hao
    2019 16TH INTERNATIONAL CONFERENCE ON SERVICE SYSTEMS AND SERVICE MANAGEMENT (ICSSSM2019), 2019,
  • [23] Research on anti-submarine strategy for unmanned undersea vehicles
    Zeng B.
    Zhang H.
    Li H.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2022, 44 (10): : 3174 - 3181
  • [24] Introduction to Secure Computing Methods in Unmanned Aerial Vehicles
    Park, Soohyun
    Yoo, Minjae
    Jung, Soyi
    Choi, Minseok
    Kim, Joongheon
    2022 THIRTEENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2022, : 239 - 241
  • [25] Study on Hybrid Genetic Algorithm for Multi-type Vehicles Vehicle Routing Problem with Backhauls
    Wang, Xiaobo
    Sun, Jinying
    Ren, Chunyu
    2009 6TH INTERNATIONAL CONFERENCE ON SERVICE SYSTEMS AND SERVICE MANAGEMENT, VOLS 1 AND 2, 2009, : 135 - +
  • [26] A Queueing Analysis of Multi-type Servers and Multi-type Customers System based on Gas Stations
    Machida, Yoshito
    Phung-Duc, Tuan
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON OPERATIONS RESEARCH AND ENTERPRISE SYSTEMS (ICORES), 2021, : 145 - 152
  • [27] Study on Hybrid Genetic Algorithm for Multi-type Vehicles and Multi-depot Vehicle Routing Problem with Backhauls
    Ren Chunyu
    Wang Xiaobo
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL I, PROCEEDINGS, 2009, : 197 - 200
  • [28] Power Optimization of Multi-Type Mixed-Connection Photovoltaic Generation System for Recreational Vehicles
    Tang, DaiBin
    Siaw, Fei Lu
    Thio, Tzer Hwai Gilbert
    WORLD ELECTRIC VEHICLE JOURNAL, 2024, 15 (04):
  • [29] Secure and Intelligent Video Surveillance using Unmanned Aerial Vehicles
    Simmers, Ethan
    Salman, Ahmad
    Day, Evan
    Oracevic, Alma
    2023 IEEE INTERNATIONAL CONFERENCE ON SMART MOBILITY, SM, 2023, : 98 - 103
  • [30] A secure group communication architecture for autonomous unmanned aerial vehicles
    Phillips, Adrian N.
    Mullins, Barry E.
    Raines, Richard A.
    Baldwin, Rusty O.
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (01) : 55 - 69