Two important aspects in dealing with autonomous navigation of a swarm of drones are collision avoidance mechanism and formation control strategy; a possible competition between these two modes of operation may have negative implications for success and efficiency of the mission. This issue is exacerbated in the case of distributed formation control in leader-follower based swarms of drones since nodes concurrently decide and act through individual observation of neighbouring nodes' states and actions. To dynamically handle this duality of control, a plan of action for multi-priority control is required. In this paper, we propose a method for formation-collision co-awareness by adapting the thin-plate splines algorithm to minimize deformation of the swarm's formation while avoiding obstacles. Furthermore, we use a non-rigid mapping function to reduce the lag caused by such maneuvers. Simulation results show that the proposed methodology maintains the desired formation very closely in the presence of obstacles, while the response time and overall energy efficiency of the swarm is significantly improved in comparison with the existing methods where collision avoidance and formation control are only loosely coupled. Another important result of using non-rigid mapping is that the slowing down effect of obstacles on the overall speed of the swarm is significantly reduced, making our approach especially suitable for time critical missions.
Wireless Sensor Network (WSN) is known to be a highly resource constrained class of network where energy consumption is one of the prime concerns. In this research, a cross layer design methodology was adopted to design an energy efficient routing protocol entitled “Position Responsive Routing Protocol” (PRRP). PRRP is designed to minimize energy consumed in each node by (1) reducing the amount of time in which a sensor node is in an idle listening state and (2) reducing the average communication distance over the network. The performance of the proposed PRRP was critically evaluated in the context of network lifetime, throughput, and energy consumption of the network per individual basis and per data packet basis. The research results were analyzed and benchmarked against the well-known LEACH and CELRP protocols. The outcomes show a significant improvement in the WSN in terms of energy efficiency and the overall performance of WSN.
The focus of this work is to present a novel methodology for optimal distribution of a swarm formation on either side of an obstacle, when evading the obstacle, to avoid overpopulation on the sides to reduce the agents' waiting delays, resulting in a reduced overall mission time and lower energy consumption. To handle this, the problem is divided into two main parts: 1) the disturbance phase: how to morph the formation optimally to avoid the obstacle in the least possible time in the situation at hand, and 2) the convergence phase: how to optimally resume the intended formation shape once the threat of potential collision has been eliminated. For the first problem, we develop a methodology which tests different formation morphing combinations and finds the optimal one, by utilizing trajectory, velocity, and coordinate information, to bypass the obstacle. For the second problem, we utilize thin-plate splines (TPS) inspired temperature function minimization method to bring the agents back from the distorted formation into the desired formation in an optimal manner, after collision avoidance has been successfully performed. Experimental results show that, in the considered test scenario, the proposed approach results in substantial energy savings as compared with the traditional methods.
Absrruct -Intrusion detection systems (IDS) are complimentary to other security mechanisms such as access control and authentication, While Signature based IDS are limited to known attacks only, Anomaly based IDS are capable of detecting novel attacks. However, anomaly based systems usually trade performance for efficiency. In this paper, we analyze various anomaly based IDS and list the strengths and weaknesses of different schemes. We conclude that abstract stack model proposed by Wagner [Z] shows best performance in detecting various types of attacks while it suffers from substantial runtime overhead owing to its non deterministic nature. A recently published approach utilizing code instrumentation, Giffin [SI minimizes runtime overhead while approaching the detection capability of abstract stack model [Z].
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.