2016
DOI: 10.1109/lra.2015.2511444
|View full text |Cite
|
Sign up to set email alerts
|

Active Magnetic Anomaly Detection Using Multiple Micro Aerial Vehicles

Abstract: Abstract-Magnetic Anomaly Detection (MAD) is an important problem in applications ranging from geological surveillance to military reconnaissance. MAD sensors detect local disturbances in the magnetic field, which can be used to detect the existence of and to estimate the position of buried, hidden, or submerged objects, such as ore deposits or mines. These sensors may experience false positive and false negative detections and, without prior knowledge of the targets, can only determine proximity to a target. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 36 publications
(23 citation statements)
references
References 22 publications
0
23
0
Order By: Relevance
“…The standard method used to solve this task is to utilize a quadtree representation to adaptively refine the environment in areas that are likely to contain targets [167]- [169]. The main distinction between these three works is that [167], [168] assume that each robot sees one and only one cell, which implicitly connects the elevation of the robots to the quadtree resolution (and the sensing quality) while [169] allows the robots to see multiple cells and utilize the theory of random finite sets [170] to estimate the set of targets.…”
Section: A Target Search and Trackingmentioning
confidence: 99%
“…The standard method used to solve this task is to utilize a quadtree representation to adaptively refine the environment in areas that are likely to contain targets [167]- [169]. The main distinction between these three works is that [167], [168] assume that each robot sees one and only one cell, which implicitly connects the elevation of the robots to the quadtree resolution (and the sensing quality) while [169] allows the robots to see multiple cells and utilize the theory of random finite sets [170] to estimate the set of targets.…”
Section: A Target Search and Trackingmentioning
confidence: 99%
“…Step 3: Extract all the dynamic paths generated from source node to destination node using improved KNN based A * path planning algorithm [2].…”
Section: Donementioning
confidence: 99%
“…It is worth to note that the Ukrainian military realized from their mistakes and begun effecting communication security measures gained from military systems like specific operating procedures and encryption into their Do-It-Yourself (DIY) products. This proves the fact that small teams dedicated to hateful intentions can mess up with UAV [2]. It is vital to change the symmetric encryption keys regularly.…”
Section: Introductionmentioning
confidence: 95%
“…Coverage tasks are most similar to our problem, which require a team of robots to collectively observe every location in an environment [25]. Target tracking and search problems require using the sensing capabilities of multiple robots to locate and maintain contact with targets [8], [10], [11]. Mapping tasks require adaptively exploring unobserved regions [10].…”
Section: Related Workmentioning
confidence: 99%
“…The informativeness of observations, and therefore the performance of perception algorithms, can be improved by judiciously selecting observation locations [4]. Performance can be significantly improved by using longer planning horizons [5], [6], [7], jointly planning for multiple robots [8], [9], [10], [11] and considering larger sets of candidate sensing locations. However, current planning algorithms with these properties are often too computationally expensive for practical use in large scale and more complex active perception tasks; we propose a self-organising map algorithm as a solution to bridge this gap.…”
Section: Introductionmentioning
confidence: 99%