OPTIMIZING PERIMETER SURVEILLANCE DRONES to enhance the security system of unmanned aerial vehicles

(CASE STUDY: JORDAN)

  • Mahmod Al-Bkree Óbuda University
Keywords: UAV, border surveillance, Optimization, perimeter security

Abstract

Research Paper

DOI: 10.37458/ssj.2.2.7

This work is to optimize perimeter surveillance and explore the distribution of ground bases for unmanned aerial vehicles along the Jordanian border and optimize the set of technologies for each aerial vehicle. This model is part of ongoing research on perimeter security systems based on unmanned aerial vehicles. The suggested models give an initial insight about selecting technologies carried by unmanned aerial vehicles based on their priority; it runs for a small scale system that can be expanded, the initial results show the need for at least four ground bases along the length of the border, and a selected set of various technologies for each vehicle.

References

. Szabolcsi, Róbert. "3D FLIGHT PATH PLANNING FOR MULTIROTOR UAV." Review of the Air Force Academy 1 (2020): 5-16.

. Al-Bkree, Mahmod. "Slat armor to protect critical infrastructure." Haditechnika 54, no. 3 (2020): 17-19.

. Szabolcsi, Róbert. "A new emergency landing concept for unmanned aerial vehicles." Review of the Air Force Academy 2 (2016): 5.

. Szabolcsi, Róbert. "The Developing Military Robotics." In Proceedings of the 13th International Conference of "Scientific Research and Education in the Air Force," "AFASES, vol. 2011. 2011.

. Al-Bkree, Mahmod. "Man-Tracking and Sign Cutting by Surveillance UAV." In 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People, and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), pp. 253-256. IEEE, 2019.

. U.S. Army unmanned aircraft systems roadmap 2010-2035.

. Bitay, Enikő. "2018-A XXIII. Fiatal Műszakiak Tudományos Ülésszak programja ." (2018).

. A. Basudhar and S. Missouri, "Adaptive explicit decision functions for probabilistic design and optimization using support vector machines," Computer & Structure, vol. 86, no. 19–20, pp. 1904–1917, 2008.

. https://www.nationsencyclopedia.com/geography/Indonesia-to-Mongolia/Jordan.html#ixzz6wFOMDbzp

. Lajos, Berek, Szabolcsi Róbert, Vass Attila, and Temesvári Zsolt. "Hetyei Csaba; Kiss Sándor; Szlivka Ferenc."

. Bathla, Yatish, and Mahmod Al-Bkree. "Web application for 3D software comparison considering PLM system." Hadmernok 13, no. 1 (2018): 302-313.

. Rardin, Ronald L., and Ronald L. Rardin. Optimization in operations research. Vol. 166. Upper Saddle River, NJ: Prentice-Hall, 1998.

. Salter, Mark B., and Can E. Mutlu. "Psychoanalytic theory and border security." European Journal of Social Theory 15, no. 2 (2012): 179-195.

. Derrick, Douglas C., Aaron C. Elkins, Judee K. Burgoon, Jay F. Nunamaker, and Daniel Dajun Zeng. "Border security credibility assessments via heterogeneous sensor fusion." IEEE Intelligent Systems 25, no. 3 (2010): 41-49.

. Doerner, Karl F., Walter J. Gutjahr, Richard F. Hartl, Christine Strauss, and Christian Stummer. "Pareto ant colony optimization with ILP preprocessing in multiobjective project portfolio selection." European Journal of Operational Research 171, no. 3 (2006): 830-841.

. Abdou, G., and J. Arghavani. "Interactive ILP procedures for stacking optimization for the 3D palletization problem." International Journal of Production Research 35, no. 5 (1997): 1287-1304.

Published
2021-12-19