Shitharth Selvarajan, Hariprasath Manoharan, Alaa O. Khadidos, Achyut Shankar, Adil O. Khadidos, Edeh Michael Onyema
{"title":"Obstacles Uncovering System for Slender Pathways Using Unmanned Aerial Vehicles with Automatic Image Localization Technique","authors":"Shitharth Selvarajan, Hariprasath Manoharan, Alaa O. Khadidos, Achyut Shankar, Adil O. Khadidos, Edeh Michael Onyema","doi":"10.1007/s44196-023-00344-0","DOIUrl":null,"url":null,"abstract":"Abstract In this study, unidentified flying machines are built with real-time monitoring in mid-course settings for obstacle avoidance in mind. The majority of the currently available methods are implemented as comprehensive monitoring systems, with significant success in monitored applications like bridges, railways, etc. So, the predicted model is developed exclusively for specific monitoring settings, as opposed to the broad conditions that are used by the current approaches. Also, in the design model, the first steps are taken by limiting the procedure to specific heights, and the input thrust that is provided for take up operation is kept to a minimum. Due to the improved altitudes, the velocity and acceleration units have been cranked up on purpose, making it possible to sidestep intact objects. In addition, Advanced Image Mapping Localization (AIML) is used to carry out the implementation process, which identifies stable sites at the correct rotation angle. Besides, Cyphal protocol integration improves the security of the data-gathering process by transmitting information gathered from sensing devices. The suggested system is put to the test across five different case studies, where the designed Unmanned aerial vehicle can able to detect 25 obstacles in the narrow paths in considered routs but existing approach can able to identify only 14 obstacle in the same routes.","PeriodicalId":54967,"journal":{"name":"International Journal of Computational Intelligence Systems","volume":"224 1","pages":"0"},"PeriodicalIF":2.9000,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computational Intelligence Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/s44196-023-00344-0","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Abstract In this study, unidentified flying machines are built with real-time monitoring in mid-course settings for obstacle avoidance in mind. The majority of the currently available methods are implemented as comprehensive monitoring systems, with significant success in monitored applications like bridges, railways, etc. So, the predicted model is developed exclusively for specific monitoring settings, as opposed to the broad conditions that are used by the current approaches. Also, in the design model, the first steps are taken by limiting the procedure to specific heights, and the input thrust that is provided for take up operation is kept to a minimum. Due to the improved altitudes, the velocity and acceleration units have been cranked up on purpose, making it possible to sidestep intact objects. In addition, Advanced Image Mapping Localization (AIML) is used to carry out the implementation process, which identifies stable sites at the correct rotation angle. Besides, Cyphal protocol integration improves the security of the data-gathering process by transmitting information gathered from sensing devices. The suggested system is put to the test across five different case studies, where the designed Unmanned aerial vehicle can able to detect 25 obstacles in the narrow paths in considered routs but existing approach can able to identify only 14 obstacle in the same routes.
期刊介绍:
The International Journal of Computational Intelligence Systems publishes original research on all aspects of applied computational intelligence, especially targeting papers demonstrating the use of techniques and methods originating from computational intelligence theory. The core theories of computational intelligence are fuzzy logic, neural networks, evolutionary computation and probabilistic reasoning. The journal publishes only articles related to the use of computational intelligence and broadly covers the following topics:
-Autonomous reasoning-
Bio-informatics-
Cloud computing-
Condition monitoring-
Data science-
Data mining-
Data visualization-
Decision support systems-
Fault diagnosis-
Intelligent information retrieval-
Human-machine interaction and interfaces-
Image processing-
Internet and networks-
Noise analysis-
Pattern recognition-
Prediction systems-
Power (nuclear) safety systems-
Process and system control-
Real-time systems-
Risk analysis and safety-related issues-
Robotics-
Signal and image processing-
IoT and smart environments-
Systems integration-
System control-
System modelling and optimization-
Telecommunications-
Time series prediction-
Warning systems-
Virtual reality-
Web intelligence-
Deep learning