首页期刊导航|International journal of intelligent unmanned systems
期刊信息/Journal information
International journal of intelligent unmanned systems
Emerald Group Publishing Ltd.
International journal of intelligent unmanned systems

Emerald Group Publishing Ltd.

季刊

2049-6427

International journal of intelligent unmanned systems/Journal International journal of intelligent unmanned systemsESCI
正式出版
收录年代

    Secure data communication in WSN using Prairie Indica optimization

    Amune A.C.Pande H.
    377-398页
    查看更多>>摘要:© 2024, Emerald Publishing Limited.Purpose: Security is the major issue that motivates multiple scholars to discover security solutions apart from the advantages of wireless sensor networks (WSN) such as strong compatibility, flexible communication and low cost. However, there exist a few challenges, such as the complexity of choosing the expected cluster, communication overhead, routing selection and the energy level that affects the entire communication. The ultimate aim of the research is to secure data communication in WSN using prairie indica optimization. Design/methodology/approach: Initially, the network simulator sets up clusters of sensor nodes. The simulator then selects the Cluster Head and optimizes routing using an advanced Prairie Indica Optimization algorithm to find the most efficient communication paths. Sensor nodes collect data, which is securely transmitted to the base station. By applying prairie indica optimization to WSNs, optimize key aspects of data communication, including secure routing and encryption, to protect sensitive information from potential threats. Findings: The Prairie Indica Optimization, as proposed, achieves impressive results for networks comprising 50 nodes, with delay, energy and throughput values of 77.39 ms, 21.68 J and 22.59 bps. In the case of 100-node networks, the achieved values are 80.95 ms, 27.74 J and 22.03 bps, significantly surpassing the performance of current techniques. These outcomes underscore the substantial improvements brought about by the Prairie Indica Optimization in enhancing WSN data communication. Originality/value: In this research, the Prairie Indica Optimization is designed to enhance the security of data communication within WSN.

    A systematic study of traffic sign recognition and obstacle detection in autonomous vehicles

    Vartak Koli R.D.Sharma A.
    399-417页
    查看更多>>摘要:© 2024, Emerald Publishing Limited.Purpose: This study aims to compare traffic sign (TS) and obstacle detection for autonomous vehicles using different methods. The review will be performed based on the various methods, and the analysis will be done based on the metrics and datasets. Design/methodology/approach: In this study, different papers were analyzed about the issues of obstacle detection (OD) and sign detection. This survey reviewed the information from different journals, along with their advantages and disadvantages and challenges. The review lays the groundwork for future researchers to gain a deeper understanding of autonomous vehicles and is obliged to accurately identify various TS. Findings: The review of different approaches based on deep learning (DL), machine learning (ML) and other hybrid models that are utilized in the modern era. Datasets in the review are described clearly, and cited references are detailed in the tabulation. For dataset and model analysis, the information search process utilized datasets, performance measures and achievements based on reviewed papers in this survey. Originality/value: Various techniques, search procedures, used databases and achievement metrics are surveyed and characterized below for traffic signal detection and obstacle avoidance.

    Detection, identification and alert of wild animals in surveillance videos using deep learning

    Jartarghar H.A.Kruthi M.N.Karuntharaka B.Nasreen A....
    418-432页
    查看更多>>摘要:© 2024, Emerald Publishing Limited.Purpose: With the rapid advancement of lifestyle and technology, human lives are becoming increasingly threatened. Accidents, exposure to dangerous substances and animal strikes are all possible threats. Human lives are increasingly being harmed as a result of attacks by wild animals. Further investigation into the cases reported revealed that such events can be detected early on. Techniques such as machine learning and deep learning will be used to solve this challenge. The upgraded VGG-16 model with deep learning-based detection is appropriate for such real-time applications because it overcomes the low accuracy and poor real-time performance of traditional detection methods and detects medium- and long-distance objects more accurately. Many organizations use various safety and security measures, particularly CCTV/video surveillance systems, to address physical security concerns. CCTV/video monitoring systems are quite good at visually detecting a range of attacks associated with suspicious behavior on the premises and in the workplace. Many have indeed begun to use automated systems such as video analytics solutions such as motion detection, object/perimeter detection, face recognition and artificial intelligence/machine learning, among others. Anomaly identification can be performed with the data collected from the CCTV cameras. The camera surveillance can generate enormous quantities of data, which is laborious and expensive to screen for the species of interest. Many cases have been recorded where wild animals enter public places, causing havoc and damaging lives and property. There are many cases where people have lost their lives to wild attacks. The conventional approach of sifting through images by eye can be expensive and risky. Therefore, an automated wild animal detection system is required to avoid these circumstances. Design/methodology/approach: The proposed system consists of a wild animal detection module, a classifier and an alarm module, for which video frames are fed as input and the output is prediction results. Frames extracted from videos are pre-processed and then delivered to the neural network classifier as filtered frames. The classifier module categorizes the identified animal into one of the several categories. An email or WhatsApp notice is issued to the appropriate authorities or users based on the classifier outcome. Findings: Evaluation metrics are used to assess the quality of a statistical or machine learning model. Any system will include a review of machine learning models or algorithms. A number of evaluation measures can be performed to put a model to the test. Among them are classification accuracy, logarithmic loss, confusion matrix and other metrics. The model must be evaluated using a range of evaluation metrics. This is because a model may perform well when one measurement from one evaluation metric is used but perform poorly when another measurement from another evaluation metric is used. We must utilize evaluation metrics to guarantee that the model is running correctly and optimally. Originality/value: The output of conv5 3 will be of size 7*7*512 in the ImageNet VGG-16 in Figure 4, which operates on images of size 224*224*3. Therefore, the parameters of fc6 with a flattened input size of 7*7*512 and an output size of 4,096 are 4,096, 7*7*512. With reshaped parameters of dimensions 4,096*7*7*512, the comparable convolutional layer conv6 has a 7*7 kernel size and 4,096 output channels. The parameters of fc7 with an input size of 4,096 (i.e. the output size of fc6) and an output size of 4,096 are 4,096, 4,096. The input can be thought of as a one-of-a-kind image with 4,096 input channels. With reshaped parameters of dimensions 4,096*1*1*4,096, the comparable convolutional layer conv7 has a 1*1 kernel size and 4,096 output channels. It is clear that conv6 has 4,096 filters, each with dimensions 7*7*512, and conv7 has 4,096 filters, each with dimensions 1*1*4,096. These filters are numerous, large and computationally expensive. To remedy this, the authors opt to reduce both their number and the size of each filter by subsampling parameters from the converted convolutional layers. Conv6 will use 1,024 filters, each with dimensions 3*3*512. Therefore, the parameters are subsampled from 4,096*7*7*512 to 1,024*3*3*512. Conv7 will use 1,024 filters, each with dimensions 1*1*1,024. Therefore, the parameters are subsampled from 4,096*1*1*4,096 to 1,024*1*1*1,024.

    A comparative evaluation of multi-criteria decision-making framework for armed unmanned aerial vehicle

    Keles N.
    433-453页
    查看更多>>摘要:© 2024, Emerald Publishing Limited.Purpose: This study focuses on the selection of armed unmanned aerial vehicles (AUAV), which have recently taken an important place on the world agenda, are used effectively in the defense industry and change the war systems of countries. This study aims to select the most suitable armed AUAV by using and comparing multi-criteria decision-making (MCDM) methods. Design/methodology/approach: There are various types of (unmanned aerial vehicles) UAVs, and some of them are Armed UAVs. This study used the criteria obtained from the market and previous UAV studies and ranked/selected various AUAVs produced in line with the determined criteria. The AHP method was used to prioritize the criteria, and the PROMETHEE method, a powerful ranking method, was used to rank/select the alternatives. Findings: By the expert judgments, the payload capacity (28.2%) criteria took first rank by far as the most important criteria. The AUAV alternatives are listed as 1-6-5-2-7-3-4, respectively. Practical implications: UAVs around the world have been showing significant and rapid developments recently, and those concerned closely follow developments in this field. Depending on the development of the aviation industry and technology, UAVs provide services to individuals or institutions in various ways for civil or military use. Originality/value: The difference from similar studies is the research of Armed UAVs. Sensitivity analysis was performed and alternatives were analyzed by their weights. Comparisons were made using the MEREC, LOPCOW, and ELECTRE methods.

    Fuzzy synthetic evaluation of the critical drivers of UAVs’ deployment for construction in Nigeria

    Aliu J.Aghimien D.O.Olumide David O.Oke A.E....
    454-472页
    查看更多>>摘要:© 2024, Emerald Publishing Limited.Purpose: The slow adoption of unmanned aerial vehicles (UAVs) in the construction industry, particularly in developing countries like Nigeria, underscores the need for a deeper understanding of the critical factors influencing their adoption. This study aims to identify these factors using the Technology-Organization-Environment (TOE) framework and address uncertainties in their prioritization through Fuzzy Synthetic Evaluation (FSE). The utility of this approach lies in its ability to provide construction organizations with actionable insights to enhance operational efficiency and competitiveness through effective UAV adoption. Design/methodology/approach: A post-positivist philosophical stance was adopted, wherein quantitative data were gathered from construction professionals in Nigeria via a questionnaire survey. The collected data were analyzed using the Cronbach alpha test as a measure of internal consistency and the FSE test to synthesize critical drivers for the adoption of UAVs. Findings: The study found that drivers related to technology and organization are the most critical drivers. This implies that variables related to technology and organization warrant a higher level of focus if UAVs are to continue gaining popularity within the construction industry. Additionally, this study identified that logistic management, construction monitoring and site surveying represent the most critical areas of UAV application within the construction industry. Practical implications: The emphasis on technology and organizational drivers as critical factors suggests that construction companies should prioritize investments in technology infrastructure and cultivate an organizational culture that embraces innovation. This may involve providing training to construction professionals to enhance their technological skills and fostering a leadership culture that champions technology adoption. Originality/value: This study introduces novelty by applying the TOE framework, which has received limited attention in UAV adoption studies within construction. Additionally, the use of FSE addresses uncertainties in prioritizing critical drivers, particularly relevant in developing countries facing unique technological challenges. By assigning priority to these factors, this research lays the groundwork for a more informed and strategic approach to UAV adoption.

    An efficient three-dimensional node localization using recurrent neural networks in unmanned aerial vehicle-assisted wireless networks: an optimization perspective

    Negassa W.G.Gelmecha D.J.Singh R.S.Rathee D.S....
    473-490页
    查看更多>>摘要:© 2024, Emerald Publishing Limited.Purpose: Unlike many existing methods that are primarily focused on two-dimensional localization, this research paper extended the scope to three-dimensional localization. This enhancement is particularly significant for unmanned aerial vehicle (UAV) applications that demand precise altitude information, such as infrastructure inspection and aerial surveillance, thereby broadening the applicability of UAV-assisted wireless networks. Design/methodology/approach: The paper introduced a novel method that employs recurrent neural networks (RNNs) for node localization in three-dimensional space within UAV-assisted wireless networks. It presented an optimization perspective to the node localization problem, aiming to balance localization accuracy with computational efficiency. By formulating the localization task as an optimization challenge, the study proposed strategies to minimize errors while ensuring manageable computational overhead, which are crucial for real-time deployment in dynamic UAV environments. Findings: Simulation results demonstrated significant improvements, including a channel capacity of 99.95%, energy savings of 89.42%, reduced latency by 99.88% and notable data rates for UAV-based communication with an average localization error of 0.8462. Hence, the proposed model can be used to enhance the capacity of UAVs to work effectively in diverse environmental conditions, offering a reliable solution for maintaining connectivity during critical scenarios such as terrestrial environmental crises when traditional infrastructure is unavailable. Originality/value: Conventional localization methods in wireless sensor networks (WSNs), such as received signal strength (RSS), often entail manual configuration and are beset by limitations in terms of capacity, scalability and efficiency. It is not considered for 3-D localization. In this paper, machine learning such as multi-layer perceptrons (MLP) and RNN are employed to facilitate the capture of intricate spatial relationships and patterns (3-D), resulting in enhanced localization precision and also improved in channel capacity, energy savings and reduced latency of UAVs for wireless communication.

    Improved 3D laser point cloud reconstruction for autonomous mobile robot applications by using SVM-R technique

    Singh M.Nagla K.S.
    491-506页
    查看更多>>摘要:© 2024, Emerald Publishing Limited.Purpose: In autonomous mobile robots, high-level accuracy and precision in 3D perception are required for object detection, shape estimation and obstacle distance measurement. However, the existing methods suffer from limitations like inaccurate point clouds, noise in sensor data and synchronization problems between 2D LiDAR and servomotor. These factors can lead to the wrong perception and also introduce noise during sensor registration. Thus, the purpose of this study is to address these limitations and enhance the perception in autonomous mobile robots. Design/methodology/approach: A new sensor mounting structure is developed for 3D mapping by using a 2D LiDAR and servomotor. The proposed method uses a support vector machine regression (SVM-R) technique to optimize the waypoints of the servomotor for the point cloud reconstruction process and to obtain a highly accurate and detailed representation of the environment. Findings: The study includes an analysis of the SVM-R model, including Linear, radial basis function (RBF) and Polynomial kernel. Results show that the Linear kernel performs better with the lowest 3.67 mean absolute error (MAE), 26.24 mean squared error (MSE) and 5.12 root mean squared error (RMSE) values than the RBF and Polynomial kernels. The 2D to 3D point cloud reconstruction shows that the proposed method with a new sensor mounting structure performs better in perception accuracy and achieves an error of 0.45% in measuring the height of the target objects whereas in previous techniques the error was very large. Originality/value: The study shows the effectiveness of SVM-R in the 3D point cloud reconstruction process and exhibits remarkable performance for object height measurement. Further, the proposed technique is applicable for future advanced visual applications and has a superior performance over the other conventional methods.

    An RSSI-based Sybil attack detection system with continuous authentication using a novel lightweight multimodal biometrics

    Brindha, N., VMeenakshi, V. S.
    507-507页

    Experimental analysis of Medicare data using hierarchical grouping mechanism

    Jyothi, P. NagaLakshmi, D. RajyaRao, K. V. S. N. Rama
    508-508页