Submarine Hunter: Efficient and Secure Multi-Type Unmanned Vehicles

被引:0
|
作者
Mahmoud, Halah Hasan [1 ]
Al-Shammari, Marwan Kadhim Mohammed [1 ]
Amran, Gehad Abdullah [2 ,3 ]
Eldin, Elsayed Tag [4 ]
Alareqi, Ala R. [5 ]
Ghamry, Nivin A. [6 ]
ALnajjar, Ehaa [7 ]
Almosharea, Esmail [8 ]
机构
[1] Univ Baghdad, Comp Ctr, 6751, Baghdad, Iraq
[2] Dalian Univ Technol, Dept Management Sci & Engn, Dalian 116024, Liaoning, Peoples R China
[3] AL Razi Univ, Fac Comp Sci & Informat Technol, Dept Informat Technol, Sanaa, Yemen
[4] Future Univ Egypt, Fac Engn & Technol, New Cairo 11835, Egypt
[5] Dalian Univ Technol, Fac Engn Mech, Dalian 116024, Liaoning, Peoples R China
[6] Cairo Univ, Fac Comp & Artificial Intelligence, Giza, Egypt
[7] Dalian Univ Technol, Dept Business Adm, Dalian 116024, Liaoning, Peoples R China
[8] Dalian Univ Technol, Coll Software Engn, Dalian, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 76卷 / 01期
关键词
Unmanned vehicles; unmanned aerial vehicles; unmanned underwater vehicles; high altitude unmanned aerial vehicles; anti-submarine warfare; re-fragmentation; dragonfly algorithm;
D O I
10.32604/cmc.2023.039363
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Utilizing artificial intelligence (AI) to protect smart coastal cities has become a novel vision for scientific and industrial institutions. One of these AI technologies is using efficient and secure multi-environment Unmanned Vehicles (UVs) for anti-submarine attacks. This study's contribution is the early detection of a submarine assault employing hybrid environment UVs that are controlled using swarm optimization and secure the information in between UVs using a decentralized cybersecurity strategy. The Dragonfly Algorithm is used for the orientation and clustering of the UVs in the optimization approach, and the Re-fragmentation strategy is used in the Network layer of the TCP/IP protocol as a cybersecurity solution. The research's noteworthy findings demonstrate UVs' logistical capability to promptly detect the target and address the problem while securely keeping the drone's geographical information. The results suggest that detecting the submarine early increases the likelihood of averting a collision. The dragonfly strategy of sensing the position of the submersible and aggregating around it demonstrates the reliability of swarm intelligence in increasing access efficiency. Securing communication between Unmanned Aerial Vehicles (UAVs) improves the level of secrecy necessary for the task. The swarm navigation is based on a peer-to-peer system, which allows each UAV to access information from its peers. This, in turn, helps the UAVs to determine the best route to take and to avoid collisions with other UAVs. The dragonfly strategy also increases the speed of the mission by minimizing the time spent finding the target.
引用
收藏
页码:573 / 589
页数:17
相关论文
共 50 条
  • [41] Online pricing for multi-type of items
    Ting, H.F.
    Xiang, Xiangzhong
    Theoretical Computer Science, 2015, 572 : 66 - 82
  • [42] Online pricing for multi-type of items
    Ting, H.F.
    Xiang, Xiangzhong
    Theoretical Computer Science, 2015, 572 : 66 - 82
  • [43] Multi-Type Urban Crime Prediction
    Zhao, Xiangyu
    Fan, Wenqi
    Liu, Hui
    Tang, Jiliang
    THIRTY-SIXTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FOURTH CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE / THE TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, : 4388 - 4396
  • [44] Multi-Type, Multi-Zone Facility Location
    Heyns, Andries M.
    van Vuuren, Jan H.
    GEOGRAPHICAL ANALYSIS, 2018, 50 (01) : 3 - 31
  • [45] OBSTACLE AVOIDANCE PATH PLANNING FOR INTELLIGENT VEHICLES BASED ON SPARROW POTENTIAL FIELD IN MULTI-TYPE SCENARIOS
    Chen, Qiping
    Pi, Siyuan
    Jiang, Zhiqiang
    Zeng, Dequan
    Zhong, Yingqiang
    INTERNATIONAL JOURNAL OF AUTOMOTIVE TECHNOLOGY, 2025, 26 (01) : 283 - 299
  • [46] Joint optimization of infrastructure deployment and fleet operations for an electric carsharing system by considering multi-type vehicles
    Sai, Qiuyue
    Bi, Jun
    Zhao, Xiaomei
    Guan, Wei
    Lu, Chaoru
    JOURNAL OF CLEANER PRODUCTION, 2023, 414
  • [47] Efficient multi-agent task allocation for collaborative route planning with multiple unmanned vehicles
    Yoon, Sukmin
    Kim, Jinwhan
    IFAC PAPERSONLINE, 2017, 50 (01): : 3580 - 3585
  • [48] Secure Beamforming for Unmanned Aerial Vehicles Equipped Reconfigurable Intelligent Surfaces
    Narmeen, Ramsha
    Almadhor, Ahmad
    Alkhayyat, Ahmed
    Ho, Pin-Han
    IEEE Internet of Things Magazine, 2024, 7 (02): : 30 - 37
  • [49] Dual-verified secure localization method for unmanned intelligent vehicles
    Gu X.
    Xia G.
    Song B.
    Yang M.
    Luo J.
    Tongxin Xuebao/Journal on Communications, 2024, 45 (06): : 131 - 143
  • [50] Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles
    Nyangaresi, Vincent Omollo
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (04):