Skip to Content
SensorsSensors
  • Article
  • Open Access

2 September 2024

Methods and Software Tools for Reliable Operation of Flying LiFi Networks in Destruction Conditions

,
,
,
,
and
1
Department of Computer Systems, Networks and Cybersecurity, National Aerospace University “KhAI”, 17, Chkalov Str., 61070 Kharkiv, Ukraine
2
The Institute of Informatics and Telematics of the National Research Council (IIT-CNR), Research Area Via Giuseppe Moruzzi, 1, 56124 Pisa, Italy
3
Research Institute for Intelligent Computer Systems, West Ukrainian National University, 11, Lvivska Str., 46009 Ternopil, Ukraine
4
Department of Informatics and Teleinformatics, Kazimierz Pulaski University of Radom, ul. Malczewskiego 29, 26-600 Radom, Poland

Abstract

The analysis of utilising unmanned aerial vehicles (UAVs) to form flying networks in obstacle conditions and various algorithms for obstacle avoidance is conducted. A planning scheme for deploying a flying LiFi network based on UAVs in a production facility with obstacles is developed and described. Such networks are necessary to ensure reliable data transmission from sensors or other sources of information located in dangerous or hard-to-reach places to the crisis centre. Based on the planning scheme, the following stages are described: (1) laying the LiFi signal propagation route in conditions of interference, (2) placement of the UAV at the specified points of the laid route for the deployment of the LiFi network, and (3) ensuring the reliability of the deployed LiFi network. Strategies for deploying UAVs from a stationary depot to form a flying LiFi network in a room with obstacles are considered, namely the strategy of the first point for the route, the strategy of radial movement, and the strategy of the middle point for the route. Methods for ensuring the uninterrupted functioning of the flying LiFi network with the required level of reliability within a given time are developed and discussed. To implement the planning stages for deploying the UAV flying LiFi network in a production facility with obstacles, the “Simulation Way” and “Reliability Level” software tools are developed and described. Examples of utilising the proposed software tools are given.

2. Methodology

Within the framework of this study, the principles of system analysis were used in the development of the formulation and solution of partial research problems, namely the following:
  • When decomposing the assigned tasks into stages and determining the logic of their implementation;
  • Selection of research methods, mathematical apparatus, and their relationship with the results of individual stages;
  • Construction of deployment planning methods, actual deployment, and reliability improvement of the created flying LiFi network in a room with static interference.
To solve the formulated scientific and applied tasks, a planning scheme for deploying a flying LiFi network based on UAVs in a production facility with obstacles was developed (Figure 1), according to which such planning takes place in three stages.
Figure 1. Diagram for deploying a UAV-based LiFi network with obstacles in a production facility.
Stage 1. Laying the LiFi signal propagation route in conditions of interference. In the simplest version, the task can be formulated as follows: laying a route (LiFi communication line) from point A (source of information) to point B (consumer of information) in a production facility with obstacles in two-dimensional (2D) space is needed. Although the use of 2D space may limit flexibility in choosing optimal routes, especially in the face of changing environments or navigation accuracy requirements, 2D modelling is also desirable for the following reasons:
  • In 2D space, the task of laying LiFi signal propagation routes around obstacles can be more straightforward compared to 3D space and reduce the computational load on the flying LiFi network deployment planning support system, thereby speeding up the decision-making process;
  • Modelling scenarios in 2D space can allow the use of simpler and cheaper sensors and navigation systems, reducing the equipment’s cost and complexity.
It is also necessary to accept the assumption that the brightness of the light in the room and the level of its smog (dustiness) allows the use of LiFi technology. In the beginning, if there is an opportunity, it is necessary to assess the consequences of destruction in the production premises and make a map of the obstacles, and for the implementation of the methods discussed further, each of the obstacles will be presented in the form of a convex polygon. Next, we choose one of the methods of bypassing obstacles: the method of rectangles (when bypassing each obstacle is carried out exclusively according to the rule of the left or right corner) or the controlled waterfall method (these methods were developed and discussed in detail in previous works [58,67]). When implementing each method, we assume that points A and B and the obstacles are static and do not change over time. Applying the above methods allows the formation of a set of routes from point A to point B in the 2D space of the production premises. Combining all points of the route (A, B, and points of change in the direction of movement along the route due to bypassing obstacles) generates a graph of routes. The presence of such a graph in the next step allows applying the algorithm for finding the shortest route (for example, Dijkstra’s algorithm) for the propagation of a LiFi signal in conditions of interference from the source of information (point A) to its consumer (point B). The final step of the first stage is processing the obtained results for further use in stages 2 and 3. During the performance of stage 1, methods of system analysis, optimisation, mathematical modelling, and graph theory are used.
Stage 2. Placement of the UAV at the specified points of the laid route for the deployment of the LiFi network. The first step at this stage is to define a list of movement options for each UAV from its base location to a given route point for the deployment of the LiFi network. In the next step, the best option is selected by the given criterion (for example, the deployment time), and the UAV is placed at the specified points of the laid route. During stage 2, system analysis, mathematical modelling, graph theory, and schedule theory are used.
Thus, the flexible, high-speed, and secure flying LiFi network will be formed after the second stage; such a network will consist of the following:
  • Source of information (light-emitting device) encoding data into light signals and transmitting them to the UAVs;
  • UAVs serving as mobile repeaters and allowing the LiFi signal to reach areas that are not in direct line of sight of the source of information;
  • Consumer of information (a computer, smartphone, or other connected equipment) receiving and decoding the LiFi signal from UAV repeaters.
Stage 3. Ensuring the reliability of the deployed LiFi network. When the customer provides requirements regarding the minimum required value of the LiFi YBR of the network, the reservation method and the number of reserve UAVs are determined. If the requirements change, the reservation method and/or the number of reserve UAVs are adjusted. During stage 2, system analysis, reliability theory, mathematical modelling, and scheduling theory are used.
The stages’ results can further be used by the flying LiFi network’s UAV deployment planning system, which, in turn, is the main decision-support tool for the person responsible for responding to accidents at critical infrastructure facilities.

3. Strategies and Algorithms of Deployment

The deployment stage is based on the results of planning routes, calculation of the required UAV quantity, and their location point for providing communication (see Figure 1). This section describes three various strategies of UAVs routing from the depot to the location points and analyses examples of deployment to support decisions related to the choice of the rational route in point of view of the time and reliability characteristics. The results of this stage are the basis for ensuring operational reliability (Section 4).

3.1. Strategies

Since the main goals of this study are to develop UAV deployment strategies for forming a flying LiFi network in rooms with obstacles and to ensure its uninterrupted operation with a certain level of reliability during a given time, the following tasks are to be performed:
  • Analysis of various options for placing the UAV on the pre-laid LiFi signal propagation route from the source of information to its consumer in a room with obstacles;
  • Development of strategies for deploying UAVs from a stationary depot to form a flying LiFi network;
  • Development of methods for ensuring the uninterrupted functioning of the flying LiFi network with the required level of reliability within a given time.
When describing the strategies, the following assumptions were made:
  • The propagation route of the LiFi signal (LiFi route) from point A (source of information) to point B (consumer of information), the number of UAVs for the formation of a flying LiFi network, and their placement points on the route are considered as predetermined. A detailed description of the methods of planning the placement of the UAV on the route can be seen here [58];
  • The base location of the UAV (depot), which is indicated by point C, does not coincide with points A and B, as well as with any of the UAV placement points on the LiFi route;
  • The depot does not change its location over time (it is stationary);
  • The number of UAVs is sufficient to cover all designated UAV placement points on the LiFi route;
  • UAVs of the same type are used (the term of the same type means with the same characteristics regarding autonomy, speed, failure rate, etc.);
  • The time required to deploy the flying LiFi network is defined as the sum of the arrival time of the last UAV from the depot to the designated place on the LiFi route and the time of setting up the flying LiFi network.
UAV deployment strategies to form a flying LiFi network can be divided into two groups:
  • Individual. This group of strategies involves the movement of UAVs from the depot to their placement points on the LiFi route along individual routes according to established rules, including obstacle avoidance rules. Such strategies significantly depend on the capacity of the on-board battery of each UAV, since its resource, in addition to ensuring the operation of the flying LiFi network, is additionally spent both on moving to a specified point and on returning to the depot;
  • Collective. This strategy involves delivering a group of UAVs to a designated LiFi point of the route using a UAV carrier. The network deployment time criterion can determine the arrival point of the UAV group. These strategies are more complex since an additional entity—a carrier UAV—is introduced into the traffic rules and obstacle avoidance algorithms. However, its use saves the battery resource of each UAV and ensures longer operation of the LiFi network in one deployment.
Next, only a group of individual strategies will be considered, namely the strategy of the first point of the route, the strategy of radial movement, and the strategy of the middle point of the route.

3.1.1. First Point of the Route Strategy

This strategy involves moving each UAV to the first point of the LiFi route and further deploying the network within it (Figure 2). This strategy may be in demand if there are no obstacles on the UAV route from the depot (point C) to the first LiFi point of the route and a significant number of obstacles on the UAV routes to its other points (it is necessary to lay additional routes to bypass these obstacles).
Figure 2. Strategy of the first point of the route representation.
Arriving at the first point, each UAV moves along the LiFi route to the destination point (the location determined for it as part of the deployed LiFi network).
The sequence of departures of UAVs from the depot (point C) is established by decreasing the distance between the depot and the destination point: the UAV furthest from its destination point takes off first, and so on. This strategy is characterised by the significant consumption of the UAV’s on-board battery resources, which is the most distant from its destination.
Table 1 shows data characterising the deployment process of the flying LiFi network according to the strategy of the first point of the route at UAV speeds of 2 m/s, 3 m/s, and 4 m/s.
Table 1. Data characterising the process of deploying the flying LiFi network according to the strategy of the first point of the route with different speeds.
Thus, with a strategy of the first point, a flying LiFi network of five UAVs at a UAV speed of 2 m/s can be deployed in 41.38 s, with a speed of 3 m/s in 38 s, and with a speed of 4 m/s, it can be deployed in 36.6 s.

3.1.2. Radial Movement Strategy

This strategy involves moving each UAV immediately to the destination point on the LiFi route (Figure 3).
Figure 3. Radial movement strategy representation.
It is advisable to use this strategy if there are no obstacles on most UAVs’ movement routes from the depot to the destination point. This strategy prevents queuing at the LiFi points along the route as each UAV follows its route to its destination. The order of departure of UAVs from the depot also occurs in the order of decreasing distance between the depot and the destination point.
Table 2 shows data characterising the deployment process of the flying LiFi network using the radial movement strategy at UAV speeds of 2 m/s, 3 m/s, and 4 m/s.
Table 2. Data characterise deploying the flying LiFi network according to the route’s radial movement strategy at different speeds.
Thus, with a radial movement strategy, a flying LiFi network of five UAVs at a UAV speed of 2 m/s can be deployed in 41.38 s, with a speed of 3 m/s in 37.59 s, and with a speed of 4 m/s in 35.69 s.

3.1.3. Midpoint Strategy

This strategy involves moving each UAV to a point as close as possible to the middle of the LiFi route and further deploying the network within it (Figure 4).
Figure 4. Midpoint strategy representation.
This strategy is appropriate if there are no obstacles on the UAV route from the depot to the corresponding LiFi point of the route and there are many obstacles on the UAV routes to its other points (it is necessary to lay additional routes to bypass these obstacles).
Arriving as close as possible to the middle of the LiFi route, each UAV moves along the LiFi route in the direction of the destination—either in the direction of point A or in the direction of point B. The sequence of UAV departures from the depot is in the order of decreasing distance between the depots (point C) and the destination point. Movement in both directions of the LiFi route will reduce the likelihood of queues at this point.
Table 3 shows data characterising the deployment process of the flying LiFi network according to the strategy of the midpoint of the route at UAV speeds of 2 m/s, 3 m/s, and 4 m/s, respectively.
Table 3. Data characterise deploying a flying LiFi network according to the route midpoint strategy at different speeds.
Thus, with a midpoint strategy, a flying LiFi network of five UAVs at a UAV speed of 2 m/s can be deployed at 41.61 s, with a speed of 3 m/s in 37.74 s, and with a speed of 4 m/s, it can be deployed at 35.81 s.
For a comparative analysis, Figure 5 shows a graph of the dependence of the flying LiFi network’s deployment time on the UAV’s speed for each strategy.
Figure 5. The graph shows the dependence of the flying LiFi network’s deployment time on the UAV’s speed for the strategies of the first point of the route, radial movement, and the route’s midpoint.
The graph analysis in Figure 5 yields significant insights into the deployment time of the flying LiFi network, particularly concerning the speed of the UAV and the chosen strategies.
  • The most substantial reduction in the deployment time of the flying LiFi network, resulting from the increase in UAV speed from 2 m/s to 4 m/s, is particularly noteworthy. This reduction is observed for the strategy of the first point of the route, which is 6.5 s. The strategies for the radial movement and the midpoint of the route are 5.69 s and 5.81 s, respectively. When ranking the strategy based on the increasing gain in time from the UAV speed increase, the sequence is as follows: the radial movement strategy, the strategy of the midpoint of the route, and the strategy of the first point of the route.
  • For all considered UAV speeds, the radial movement strategy ensures the shortest deployment time of the flying LiFi network. For example, for a speed of 2 m/s, this time is 1.39 s less than the deployment time of a flying LiFi network when applying the strategy of the first point of the route. Suppose we rank the strategies to decrease the deployment time of the flying LiFi network. In that case, the result will be the following sequence: the strategy of the first point of the route, the strategy of the midpoint of the route, and the strategy of the radial movement.
Considering the research results, Table 4 summarises the advantages and disadvantages of each strategy.
Table 4. Advantages and disadvantages of each strategy.

3.2. Application Examples

The development of the UAV deployment method according to the strategy of the first point of the route was preceded by the laying of the LiFi route and the marking of UAV placement points on it for the formation of a flying LiFi network using the controlled waterfall algorithm to bypass obstacles. The simulation was carried out using the developed “Simulation Way” software tool (a detailed description of the tool is given in Section 5 of the paper). The simulation results are illustrated in Figure 6a, which shows the following:
Figure 6. The flying LiFi network is deployed using the following strategies: (a) the first point of the route; (b) radial movement; (c) midpoint.
  • The working area of the production premises with 20 rectangular obstacles measuring 2 × 2 m each;
  • Route laid to bypass LiFi obstacles (shown in red);
  • UAV placement points on the LiFi route to form a flying LiFi network (shown by green dots). These points were obtained taking into account the limitation on the maximum possible distance between UAVs (its increase may exceed the maximum possible range of the LiFi signal set for the given conditions);
  • Source of information (indicated by a green rectangle with the letter A inside);
  • Consumer of information (indicated by a red rectangle with the letter B inside);
  • Depot for UAVs (marked by a blue circle with the letter C inside).
Next, a first point strategy was applied to deploy the flying LiFi network. The modelling results using the “Simulation Way” software tool are also illustrated in Figure 6a, where individual UAV movement routes to their destinations on the LiFi route are shown in blue.
The same LiFi route according to the managed waterfall method was used to deploy the UAV according to the radial movement strategy, and a radial movement strategy was used to deploy the flying LiFi network.
The modelling results using the “Simulation Way” software tool are illustrated in Figure 6b, where individual UAV movement routes to their destinations on the LiFi route are shown in blue. According to the controlled waterfall algorithm, obstacles were avoided during the construction of UAV traffic routes from the depot to the destination points.
The midpoint strategy has used the same approach (see Figure 6c).

4. Methods for Ensuring Operational Reliability

According to the described methodology (Figure 1), operational reliability is ensured after solving UAV deployment tasks and choosing routes from the depot to the location points (Stage 2). This section presents developed approaches, models, and algorithms for ensuring flying network reliability, considering the schedule of the main and redundant UAVs. These algorithms are based on the various network deployment strategies developed in Section 3.

4.1. Approach

One of the requirements for a deployed flying LiFi network can be as follows: to ensure the continuous operation of the network with the probability of failure-free operation (PFFO) P ( t ) should not be lower than the minimum acceptable value P m i n during a given time. This can be, for example, the time of transmission to the consumer of information from sensors about the condition of the equipment, the level of atmospheric pollution in the room, a video stream that gives an idea of the degree of damage in the room, or the presence of injured persons in it.
When considering the methods of ensuring the reliability of the flying LiFi network by the specified requirement, we will accept the following assumptions:
  • All UAVs are of the same type and are characterised by the same failure rates λ , 1/hour;
  • To ensure uninterrupted operation of the flying LiFi network, two shifts of UAVs are used with the same number of UAVs in each of them n, and this number is equal to the number of their placement points on the laid LiFi route;
  • A working UAV shift must be replaced by another shift at the latest t c r i t of achievement by the working shift of the minimum permissible value of PFFO P m i n even with the availability of UAV battery life t b a t t , that is sufficient to continue their operation as part of the flying LiFi network;
  • Each of the shifts before the start of the first cycle of its work is characterised by PFFO P 0 = 1 ;
  • From each subsequent work cycle, the shift begins its work with the PFFO that it reached at the time of returning to the depot;
  • After returning to the depot, the battery life is renewed.

4.2. Models

Planning departures of changes for the formation of a flying LiFi network considers the fact that each of these changes can be in two states—the state of functioning as part of the LiFi network, the duration of which is calculated according to Formula (1), and the waiting state, in which the change is over time t w a i t .
t f u n c t = t s e t + t t r a n s m
where
t s e t —time to set up the flying LiFi network;
t t r a n s m —operation time of the flying LiFi network in data transmission mode.
The transition from the standby state to the operating state continues during the flight time of the UAV from the depot to its points on the LiFi route t a r r i v , and from the state of operation to the state of standby—during the return time of the UAV from the LiFi route to the deport t r e t u r n . Thus, the complete work cycle of a shift can have the form presented in Figure 7, and its duration will be calculated according to the following formula:
t s h i f t = t a r r i v + t s e t + t t r a n s m + t r e t u r n ;   t b a t t > t s h i f t
Figure 7. A one-shift work cycle is used to deploy and ensure LiFi functionality.
The PFFO of each shift at the time of return to the depot in the first cycle of work can be calculated with the Formula (2), and in the second and subsequent cycles ( k = 2 , , m ) with Formula (3):
P 1 t s h i f t = P 0 × e n λ t s h i f t ;   P 1 t s h i f t > P m i n
P k t s h i f t = P k 1 × e n λ t s h i f t ;   P k t s h i f t > P m i n
Thus, each shift can work for no more time t c r i t _ 1 (Formula (5)) in the first cycle and time t c r i t _ k (Formula (6)) in the second and subsequent cycles:
t c r i t _ 1 = ln ( P 0 P m i n ) n λ
t c r i t _ k = ln ( P k 1 P m i n ) n λ
To ensure the continuity of data transmission, it is necessary to ensure the departure of the next shift on ( t a r r i v + t s e t ) ahead of time ( t s h i f t t r e t u r n ) , which is shown in Figure 8.
Figure 8. Alternate work of two shifts to deploy and ensure the functioning of the flying LiFi network.
The following colouring scheme was used on the Figure 7 and Figure 8:
  • The red colour indicates the transition process of the current UAV queue from one functional state to another. In our case, it is either the process of UAV flight from the depot to the point on the route, or the process of flight from the point on the route to the depot after the end of the queue. In summary, the red line is the state of the network when the UAVs are in use, the LiFi network in the process of deployment. The probability of failure-free operation in this state varies;
  • The green colour indicates the process of supporting an active LiFi network. The probability of fail-safe operation in this state varies;
  • The violet colour characterizes the status of the UAV waiting in the Depot/preparation for the next departure. The probability of fault-free operation in this state does not change.
The next step of the research was developing software tools for modelling. These tools were used to ensure the continuous operation of the network with a PFFO not lower than the minimum permissible value during the given time by using two shifts of n UAVs each.

4.3. Examples

Consider the case when the number of UAVs in each shift, according to the previously accepted assumptions, equals the number of points on the LiFi route, which is 6 ( n = 6 UAVs). Let the following input data be given: UAV failure rate. λ = 0.0005 1/hour; P 0 = 1; P m i n = 0.99875.
Using the software tool “Reliability Level” (software integrated in “Simulation Way”. The detailed description will be given in Section 5 of the paper), in particular, the Gnuplot library integrated into it, graphs were drawn of the reduction in the PFFO of the flying LiFi network to the minimum permissible value when alternately ensuring the functioning of the flying LiFi network for the first and the second (Figure 9a,b) and two shifts (Figure 10) at the same time.
Figure 9. Graph of the dependence of the probability of fault-free operation of the (a) first shift in time; (b) second shift in time.
Figure 10. A general graph of the dependence of the probability of PFFO on time for both shifts.
The coloured sections of the graphs have the following meaning:
  • Segments in red show a decrease in the PFFO both during the flight of the UAV to its points on the LiFi route and the setting up of the flying LiFi network (upper red segments) and during the return of the UAV to the depot (red segments);
  • Segments of green colour illustrate the reduction in the PFFO during the time of data transmission from the source to the data consumer;
  • Blue segments (Figure 9a,b) show the PFFO while waiting for the UAV to change to its next operation cycle.
Analysis of the graphs presented in Figure 9 and Figure 10 allows us to draw the following conclusions:
  • The most significant decrease in the FFO is observed during data transmission;
  • While waiting for the UAV to change to its next cycle of operation, its PFFO remains unchanged;
  • Uninterrupted functioning of the flying LiFi network with the required level of reliability for 180 min can be ensured by two shifts, each of which consists of six UAVs and performs three work cycles;
  • The latter ensures the functioning of the flying LiFi network by the second shift in the third cycle of its work.

5. Developed Software Tools

Section 2, Section 3 and Section 4 have been dedicated to developing the general methodology, strategies, models, and algorithms for deploying and ensuring the operational reliability of flying networks (see Figure 1, Stages 2–3). Software tools to support decision making in real time are needed to apply these theoretical results. This section describes the tool’s architecture, interfaces, and application examples.

5.1. Architecture

The proposed software tool called “Simulation Way” was used to implement the planning stages of the deployment of the UAV flying LiFi network, in particular for the following activities: (i) laying LiFi routes from the source to the consumer of information in a room with obstacles, marking on the routes the points (places) of UAV placement for the formation of a flying LiFi network using left- and right-corner algorithms, as well as a controlled waterfall, to bypass obstacles; (ii) forming a graph of possible LiFi routes and determining the shortest of them by applying Dijkstra’s algorithm; and (iii) placement of UAVs at specified points (places) on the shortest laid LiFi route using different deployment strategies: the first point of the route, radial movement, and the middle point of the route.
The architecture of the software tool is shown in Figure 11. The “Simulation Way” software tool has a three-level architecture and consists of the following levels: (i) level of the graphical user interface (GUI). This level represents the interface of the software tool, which is implemented using the Python library called tkinter; (ii) business logic level. This level provides the interaction logic between the data storage (storage data) and the graphical interface (GUI). The layer contains modules for generating reports (results), modules for the calculation core, and modules for external algorithms (for example, Dijkstra’s algorithm for finding the shortest route), which can interact with each other.
Figure 11. Architecture of the “Simulation Way” software tool.
The software tool can be used by CC operators when simulating the deployment of a UAV-based LiFi network in a production facility with obstacles. Options for using the software tool by the CC operator are shown in Figure 12. The interaction of the CC operator with the software tool is carried out using a graphical interface. A large number of settings are available to the CC operator: set the dimensions of the working area of the production premises, generate the required number of obstacles with given characteristics, and choose methods (rules) for bypassing these obstacles. In addition, input data generated during one simulation iteration can be used in subsequent iterations.
Figure 12. Use-case diagram for the simulation in the “Simulation Way”.
The calculation core carries out calculations, combining mathematical algorithmic and interaction modules. The graphic core informs the CC operator about the progress of the modelling process, displays the results of calculations, and allows the modelling rules to be managed. In particular, the CC operator can visually see the following: (i) the iteration number; (ii) the name of the algorithm according to which obstacles are bypassed; (iii) the coordinates of points (places) of UAV placement on the laid LiFi route; (iv) the length of the LiFi route (the length of the given section of the LiFi route); and (v) the number of UAVs that need to be placed at the designated points of the LiFi route for the deployment of the LiFi network.
Figure 13 shows the sequence of the CC operator’s interaction with the “Simulation Way” software tool.
Figure 13. Sequence diagram of the interaction of CC operator with “Simulation Way”.
The necessary libraries and modules are initialised during the activation of the “Simulation Way” software tool. The CC operator does not directly interact with algorithms or the calculation core. For this, the CC operator has a graphical interface at his disposal. The functions of the CC operator when using the “Simulation Way” software are to enter (adjust) the parameters necessary for simulation. Based on the LiFi routes generated during simulation, the “Simulation Way” software tool forms a graph of possible LiFi routes. It determines the shortest by applying the Dijkstra algorithm. The receipt of calculation results is possible in the form of visual information on the control panel of the graphical interface and the form of a prepared report file.
CC operators can use the “Reliability Level” software tool to determine the time of operation of the flying LiFi network with a reliability level not less than the minimum permissible during the given time. The console interface allows the CC operator to interact with the “Reliability Level” software tool.
The CC operator can enter the following parameters: (i) UAV failure rates; (ii) setup time of the flying LiFi network; (iii) operation time of the flying LiFi network in data transmission mode; (iv) time resource of the on-board UAV battery; and (v) the minimum acceptable level of reliability with which a flying LiFi network can operate.

5.2. Modules and Interfaces

The “Simulation Way” software tool has a modular structure. Each module implements an API for interaction, separating individual functional blocks. Figure 14 shows a modular diagram demonstrating the interaction logic between the software tool’s components.
Figure 14. A modular diagram that demonstrates the logic of interaction between the components of the “Simulation Way” software tool.
The CC operator interacts with the software using the draw.py module. A graphical user interface (GUI) is implemented using tkinter (Python library), one of the most common GUI display solutions. The algo.py block implements inter-module interaction (obstacle avoidance, UAV movement, etc.) and provides basic functionality. The math_core module is the mathematical core of the software. This module implements an API for calculating lengths, converting and correcting floating point numbers, etc. The external zone is a zone of external modules that interact with operating system resources and basic integrated algorithms. It is thanks to the external zone that it becomes possible (i) to generate graph images when using various obstacle avoidance algorithms; (ii) to generate data on obstacle parameters, number of iterations, route length (route sections), number of UAVs required for LiFi network deployment, and coordinates of the location point of each UAV on the laid route; and (iii) keep a log of the “Simulation Way” software.
The storage.py module is a repository for variables required for inter-module interaction. This module stores the characteristics of UAVs, the coordinates of their base locations and further placement points on the LiFi route, the coordinates of the location of obstacles in the room, etc. The data generated using the “Simulation Way” software tool are primarily stored in this module (e.g., the coordinates of the route points for a specific iteration and the name of the obstacle avoidance algorithm). The “Simulation Way” software tool’s graphical interface is located in separate graphic windows: Control, which is the control centre for parameters and simulation rules (Figure 15), and Way simulation (Figure 16), which displays the progress of the process simulation in real time.
Figure 15. View of the Control panel with functional zones: 1—process launch zone; 2—zone of implementation of the method (rules) of avoiding obstacles; 3—zone of the graphic display of layers; 4—modelling parameters setting area.
Figure 16. An example of displaying the working area of a production facility with obstacles in 2D space.
The interface window, shown in Figure 15 can be conditionally divided into four zones.
Process launch zone. The Start button is responsible for starting the route search process between the start and end points according to the specified parameters. The Clear button allows data from previous iterations to be cleared. The Dijkstra button will enable the use of Dijkstra’s algorithm to find the shortest route in the current graph. The Start button combined with the CW item from zone 2 also uses this algorithm, but the graph is generated automatically and cannot be changed during all simulation iterations. The Save plan button saves the current room plan and obstacles. The data will be saved in an XML file and can be reused in the future. The Set_UAV button is responsible for placing the UAV at the specified points on the laid route.
Zone of implementation of the obstacle avoidance algorithm. This zone implements the obstacle avoidance algorithm in the production room. If the Right is selected, obstacle avoidance will be according to the algorithm of the right corner and the Left—the left corner. Selecting R + L will allow simultaneous use of left- and right-corner algorithms. Selecting CW will allow the controlled waterfall algorithm to be applied.
This is a zone for the graphic display of layers. This zone allows each layer to be turned on and off without data loss or limitations.
Zone for setting simulation parameters. This zone allows for setting the number of obstacles and their shape and automates the process of creating statistical data in the report generated for the CC operator.
The Way simulation panel (Figure 16) displays the working area of the production room in 2D space.
The small green (marked with the letter A) and red (marked with the letter A) rectangles in Figure 16 are, respectively, the initial (source of information) and final (consumer of information) points of the route. The blue circle (marked with the letter C) shows the stationary depot where the UAVs are located, which will then need to be placed on the laid LiFi route.
In the working area, generated obstacles are depicted as rectangles (in the presence of more complex forms of obstacles, their projection can be inscribed in a convex polygon with an arbitrary number of corners).

5.3. Case Study

In this subsection, examples of the use of the “Simulation Way” software tool for laying the route of LiFi signal propagation using the left- and right-corner algorithms, as well as the controlled waterfall algorithm, which are described in detail in the work of [58], will be sequentially considered. To use the correct corner algorithm to bypass obstacles, set the switch to the Right position on the Control panel and press Start (Figure 17a).
Figure 17. “Simulation Way” tool results for the right-angle algorithm to bypass obstacles: (a) control panel with parameters for laying a LiFi route; (b) image of a LiFi route.
The modelling results are presented in Figure 17a. The green broken line shown in this figure is the route laid. In addition, the software tool “Simulation Way” determines and stores the coordinates of points that will be used as UAV placement points as part of the LiFi network formed by them. All vertices of the broken (route) in Figure 17b are considered such points, except for the initial A (source of information) and the final B (consumer of information).
To activate the modelling process using the left-angle algorithm to bypass obstacles, set the switch to the Left position on the Control panel and press Start (Figure 18a).
Figure 18. “Simulation Way” tool results for the left-angle algorithm to bypass obstacles: (a) control panel with parameters for laying a LiFi route; (b) image of a LiFi route.
As in the previous case, the simulation result will be a generated LiFi route in the form of a green broken line (Figure 18a). To activate the modelling process using the controlled waterfall algorithm to bypass obstacles, it is necessary to set the switch on the Control panel to the CW position and press Start (Figure 18b).
The laid LiFi route will be displayed as a red broken line with green dots, indicating the UAVs’ locations on the route (Figure 19a). As can be seen, not only the vertices of the broken line but also a certain number of additional points will be the points of future placement of the UAV for network formation. Their inclusion is necessary because, in conditions of increased brightness (dusty, smoky) of the production premises, the distance between the peaks of the broken line may exceed the range of the LiFi signal set for the given conditions. Thus, an additional UAV(-s) must be placed between the UAVs on the points of the adjacent vertices of the broken lines.
Figure 19. “Simulation Way” tool results for the controlled waterfall algorithm to bypass obstacles: (a) control panel with parameters for laying a LiFi route; (b) image of a LiFi route.
To generate the UAV movement routes from the base locations (depots) to the placement points on the laid track, one should press the Set_UAV button on the Control panel. The same algorithms can be used to plot the UAV movement routes from the depot to their locations on the laid LiFi route as for laying the LiFi route. In the example presented in Figure 19b, the left- and right-corner algorithms are used simultaneously to bypass obstacles (the switch is set to the R + L position).
In Figure 20a–c, purple lines indicate the movement routes of each UAV to its location on the laid LiFi route according to the strategies of the first point of the route, radial movement, and the middle point of the route, respectively.
Figure 20. “Simulation Way” results: UAV movement routes from the depot to the placement points (places) on the laid LiFi route using (a) the first point of the route strategy, (b) the radial movement strategy, and (c) the midpoint strategy.
The “Reliability Level” software tool can be used independently or in combination with the “Simulation Way”.
All data are specified through a configuration file. The work’s results are the graphs presented in Figure 21a—PFFO dependence on time for the first shift, Figure 21b—PFFO dependence on time for the second shift, and Figure 21c—PFFO dependence on time for two shifts simultaneously.
Figure 21. Graphs of the dependence of the probability of fault-free operation: (a) PFFO and the first shift on time; (b) PFFO and the second shift on time; (c) a general graph of the probability of PFFO versus time for both changes.
The following colouring scheme was used on the Figure 21:
  • Red: part of the graph of the dependence of the probability of FFO on time, which characterizes the time of the transition process (flight from the depot to points on the route, return to the depot, network setup). That is, the section of the route on the graph is marked in red when the UAVs are functioning (their value of the probability of a robot failing) is changing, but they are not yet performing a useful action (the LiFi network is not deployed);
  • Green: part of the graph of the change in the probability of FFO over time, which characterizes the actual support of the deployed LiFi network;
  • Turquoise: part of the graph of the dependence of the probability of FFO on time, which characterizes the presence of a queue of UAVs in the depot.
The obtained graphs (Figure 21a–c) illustrate the simulation results and calculations, which have a clear physical interpretation, as they describe the change in reliability indicators depending on time and consider all the elements of the work schedule for the main and reserve UAVs. Based on them, depending on (i) the requirements for the reliability and strict continuity of communications and (ii) the spatial location of information sources and receivers, as well as the depot, which affects the time of replacement of UAVs, it is possible to make decisions regarding the choice of UAVs based on the indicators of reliability and reserve of autonomy, their quantity, and replacement procedures.

6. Discussion

Based on a comparative analysis of the deployment strategies of flying networks, the following was found:
  • The most substantial reduction in the deployment time of the flying LiFi network, resulting from the increase in the UAV speed from 2 m/s to 4 m/s, is particularly noteworthy. This reduction is observed for the strategy of the first point of the route, which is 6.5 s. The strategies for the radial movement and the midpoint of the route are 5.69 s and 5.81 s, respectively. When ranking the strategy based on the increasing gain in time from the UAV speed increase, the sequence is as follows: the radial movement strategy, the strategy of the midpoint of the route, and the strategy of the first point of the route;
  • For all considered UAV speeds, the radial movement strategy ensures the shortest deployment time of the flying LiFi network. For example, for a speed of 2 m/s, this time is 1.39 s less than the deployment time of a flying LiFi network when applying the strategy of the first point of the route. Suppose the strategies are ranked in order of decreasing network deployment time. In that case, the result will be the following sequence: the strategy of the first point of the route, the strategy of the midpoint of the route, and the strategy of the radial movement.
It was shown that the work cycle of one shift of a UAV swarm for deploying and ensuring the functioning of the LiFi network consists of the following stages: departure from the depot and approach to specified points on the laid LiFi route; network settings; data transfer; return to the depot; and waiting for the next work cycle. This work does not consider the reconnaissance stage and identification of the general location, number, and types of obstacles. Assumptions about the shape of obstacles are not fundamental.
A graphical interpretation of the alternating work of two UAV shifts to deploy and ensure uninterrupted functioning of the flying LiFi network is provided, according to which the UAVs of the next shift arrive and configure the network formed by them before the UAV of the current shift starts moving to the depot. It should be noted that the proposed two-shift substitution procedure is the simplest. On this basis, developing many other replacement procedures and strategies with whole and fractional multiples is possible, using unique cargo UAVs to deliver changes, etc.
Using the developed software tools, it was calculated that two shifts, each of which performs three work cycles and consists of six UAVs, can ensure the uninterrupted functioning of the flying LiFi network with a PFFO not lower than P m i n = 0.99875 for 180 min. The shifts have a failure rate of λ = 0.0005 1/hour.
This study develops the results presented in [59], where methods and algorithms for planning the placement of UAVs were developed to ensure continuous Li-Fi communications in destruction conditions. The task of deploying and ensuring the reliability of the flying network is a natural continuation of the study from the point of view of the entire operational cycle “planning-deployment-maintenance”. It should be noted that the considered model and algorithms describe one of the simplest backup options for reliable operation, which does not consider the possible effects of the physical environment on the network, as well as cyber-attacks, which will increase the probability of failures. These aspects can be considered by developing a more complex model for calculating the intensity of UAV failures.

7. Conclusions

The main contribution of this research is UAV deployment strategies and algorithms for forming the flying network, ensuring the dependable transmission of data from sensors or other sources of information located in dangerous or hard-to-reach places to the crisis centre, and models for ensuring continuous operation with given reliability.
The three UAV deployment strategies for forming the flying network are proposed as follows:
  • Strategy for the route that involves the movement of each UAV to the first point of the LiFi route and the further deployment of the network within it;
  • Radial movement strategy that consists of the movement per each UAV immediately to the destination point on the LiFi route;
  • A strategy for the middle point of the route involves moving each UAV to a point as close as possible to the middle of the LiFi route and further deploying the network within it.
This article presents the developed software tool “Simulation Way” to support the planning of UAV deployment for forming the LiFi network, which has a three-level architecture and consists of the following parts: (i) GUI; (ii) business logic for interaction between data storage and GUI and contains report generation modules (results), calculation core modules, and external algorithm modules that can interact with each other; and (iii) storage data for receiving and storing in the form of data files the results of calculations and reports on the process of the software tool. In addition, many settings are available to the crisis centre operator using the “Simulation Way” software: set the dimensions of the working area of the production room, generate the required number of obstacles with given characteristics, and choose methods (rules) for bypassing these obstacles. Moreover, input data generated during one simulation iteration can be used in subsequent iterations.
The developed software tool “Reliability Level” results were also presented. Crisis centre operators can use this tool to determine the time of operation for the flying LiFi network with a reliability level not less than the minimum permissible for a given time. The software tool “Reliability Level” has a single-level structure and a monolithic module that combines all the logic.
The crisis centre operator uses the console interface to interact with the “Reliability Level” software tool. That operator can enter the following parameters: (i) UAV failure rates; (ii) setup time of the flying LiFi network; (iii) operation time of the flying LiFi network in data transmission mode; (iv) time resource of the on-board UAV battery; and (v) the minimum acceptable level of reliability with which a flying LiFi network can operate.
The proposed complex of strategies, algorithms, and software tools forms a decision-support system, which was created as part of the project to develop unmanned systems for ensuring monitoring and communications in conditions of destruction and external influences.
Further research can be aimed at expanding the strategies for deploying and supporting the reliability of flying networks and developing algorithms for their evaluation and selection depending on requirements and limitations, as well as their compatible application with intelligent robotic systems for cleaning dangerous spaces [68]. In addition, studies that consider using heterogeneous UAVs and robots for such systems may also have a sense [69].
Moreover, the software or software packages that would solve the discussed problems in the paper are unavailable on the market. This is due to certain specifics of these tasks and the novelty of the proposed methods. The capabilities of the developed software tools can be expanded by using modern tools available on the market:
  • Matlab/Simulink and OptiSystem—for modelling optical communication systems, including LiFi;
  • Ekahau and iBwave—for planning and optimising LiFi networks;
  • AutoCAD/Revit and SketchUp—to create accurate 3D models of premises, plan placement of transmitters in them, and estimate coverage;
  • LightTools and TracePro—for modelling optical systems and tracing light rays;
  • NS3 (Network Simulator 3) and OMNeT++—for LiFi network optimisation and resource management;
  • Arduino/Raspberry Pi and Osram Opto Semiconductors—for prototyping and testing LiFi hardware.

Author Contributions

Conceptualisation, V.K., H.F. and A.S.; methodology, H.F. and K.L.; software, K.L.; validation, V.K., O.I. and L.S.; formal analysis, O.I.; investigation, K.L.; resources, K.L.; data curation, V.K. and K.L.; writing—original draft preparation, K.L. and L.S.; writing—review and editing, O.I. and L.S.; visualisation, K.L. and H.F.; supervision, V.K. and O.I.; project administration, O.I. and A.S.; funding acquisition, A.S. and L.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research was partly funded by the Ministry of Education and Science of Ukraine, state grant registration number 0124U000945, project title “Methods, means and technology for ensuring the dependability and resilience of intelligent complexes of UAV-USV with combined strategies of application”. This publication reflects the views only of the authors, and the Ministry of Education and Science of Ukraine cannot be held responsible for any use that may be made of the information contained therein.

Data Availability Statement

Data is contained within the article.

Acknowledgments

The authors appreciate the scientific staff of the Department of Computer Systems, Networks and Cybersecurity of the National Aerospace University “KhAI”, Research Institute for Intelligent Computer Systems, West Ukrainian National University, and Faculty of Electrical and Computer Engineering, Cracow University of Technology for invaluable inspiration and creative analysis during the preparation of this article. Also authors would thank the Ministry of Education and Sciences, Ukraine for their support in running this research within the project that is financed from a special fund received at the expense for the external aid instrument of the European Union for the fulfillment of Ukraine’s obligations in the Framework Program of the European Union for scientific research and innovation “Horizon 2020”. Besides, the authors are also grateful to colleagues who participated in the WS CyberIoT at the 12th conference IEEE IDAACS’23, 7–9 September, Dortmund, Germany for discussing the results that were further developed in this article.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations and Acronyms

The following abbreviations and acronyms included in the text are reported alphabetically:
Abbreviation/AcronymMeaning
CCCrisis centre
FANETFlying ad hoc networks
FFOProbability of failure-free operation
GPSGlobal Positioning System
GUIGraphical user interface
LiFiLight fidelity
RFRadio frequency
UAVUnmanned aerial vehicle
WiFiWireless fidelity

References

  1. Gao, C.; Wang, X.; Wang, R.; Zhao, Z.; Zhai, Y.; Chen, X.; Chen, B.M.A. UAV-based explore-then-exploit system for autonomous indoor facility inspection and scene reconstruction. Autom. Constr. 2023, 148, 104753. [Google Scholar] [CrossRef]
  2. Xiao, X.; Fan, Y.; Dufek, J.; Murphy, R. Indoor UAV Localization Using a Tether. In Proceedings of the 2018 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR), Philadelphia, PA, USA, 6–8 August 2018; pp. 1–6. [Google Scholar]
  3. Yu, T.; Jiliang, Z.; Gaofeng, P.; Mohamed-Slim, A. Satellite-UAV Communications. In UAV Communications: Modeling and Analyses; Pan, G., Miao, X., Yang, X., Yang, Z., Eds.; Springer International Publishing: Singapore, 2024; pp. 113–171. [Google Scholar]
  4. Wang, J.; Jiang, C.; Kuang, L. High-Mobility Satellite-UAV Communications: Challenges, Solutions, and Future Research Trends. IEEE Commun. Mag. 2022, 60, 38–43. [Google Scholar] [CrossRef]
  5. Xiao, X.; Dufek, J.; Suhail, M.; Murphy, R. Motion Planning for a UAV with a Straight or Kinked Tether. In Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Madrid, Spain, 1–5 October 2018; pp. 8486–8492. [Google Scholar]
  6. Han, B.; Qu, T.; Tong, X.; Jiang, J.; Zlatanova, S.; Wang, H.; Cheng, C. Grid-optimized UAV indoor path planning algorithms in a complex environment. Int. J. Appl. Earth Obs. Geoinf. 2022, 111, 102857. [Google Scholar] [CrossRef]
  7. Sawalmeh, A.; Noor, O. An Overview of Collision Avoidance Approaches and Network Architecture of Unmanned Aerial Vehicles (UAVs). Int. J. Eng. Technol. 2018, 7, 924. [Google Scholar] [CrossRef]
  8. Liu, Z.; Liu, H.; Lu, Z.; Zeng, Q. A Dynamic Fusion Pathfinding Algorithm Using Delaunay Triangulation and Improved A-Star for Mobile Robots. IEEE Access 2021, 9, 20602–20621. [Google Scholar] [CrossRef]
  9. Yang, L.; Fu, L.; Li, P.; Mao, J.; Guo, N. An Effective Dynamic Path Planning Approach for Mobile Robots Based on Ant Colony Fusion Dynamic Windows. Machines 2022, 10, 50. [Google Scholar] [CrossRef]
  10. He, Y.; Zeng, Q.; Liu, J.; Xu, G.; Deng, X. Path planning for indoor UAV based on Ant Colony Optimization. In Proceedings of the 25th Chinese Control and Decision Conference (CCDC), Guiyang, China, 25–27 May 2013; pp. 2919–2923. [Google Scholar]
  11. Zhang, L.; Zhang, Y.; Li, Y. Path planning for indoor Mobile robot based on deep learning. Optik 2020, 219, 165096. [Google Scholar] [CrossRef]
  12. Guruprasad, Y.K.; Nageswara Guptha, M. Autonomous UAV Object Avoidance with Floyd–Warshall Differential Evolution (FWDE) approach. Intelig. Artif. 2022, 25, 77–94. [Google Scholar]
  13. Penicka, R.; Scaramuzza, D. Minimum-Time Quadrotor Waypoint Flight in Cluttered Environments. IEEE Robot. Automat. Mag. 2022, 7, 5719–5726. [Google Scholar] [CrossRef]
  14. Jacob, H.; Forrest, J.; Alaa, S.; Hamza, T.; Kar, D. Path Planning for Indoor UAV Using A * and Late Acceptance Hill Climbing Algorithms Utilizing Probabilistic Roadmap. Int. J. Eng. Technol. 2020, 9, 857. [Google Scholar]
  15. Bolognini, M.; Fagiano, L.A. Scalable Hierarchical Path Planning technique for Autonomous Inspections with multicopter drones. In Proceedings of the European Control Conference (ECC), Delft, The Netherlands, 29 June–2 July 2021; pp. 787–792. [Google Scholar]
  16. Jin, Q.; Hu, Q.; Zhao, P.; Wang, S.; Ai, M. An Improved Probabilistic Roadmap Planning Method for Safe Indoor Flights of Unmanned Aerial Vehicles. Drones 2023, 7, 92. [Google Scholar] [CrossRef]
  17. Sadiq, B.O.; Salawudeen, A.T.; Sha’aban, Y.A.; Adedokun, E.A.; Mu’azu, M.B. Interface protocol design: A communication guide for indoor FANET. Telkomnika 2019, 17, 3175–3182. [Google Scholar] [CrossRef]
  18. Faruq, O.; Shahriar Rahman, K.R.; Jahan, N.; Rokoni, S.; Rabeya, M. Li-Fi technology based long range free-space communication data transmit system evaluation. Int. Rev. Appl. Sci. Eng. 2023, 14, 413–425. [Google Scholar] [CrossRef]
  19. Sadiq, B.O. A Feasibility Study of Using Light Fidelity with Multiple Unmanned Aerial Vehicles for Indoor Collaborative and Cooperative Networking. arXiv 2017, arXiv:1707.08627. [Google Scholar]
  20. Ghaderi, M.R. LiFi and Hybrid WiFi/LiFi indoor networking: From theory to practice. Opt. Switch. Netw. 2022, 47, 100699. [Google Scholar] [CrossRef]
  21. Sharma, R.; Gurjar, D.S.; Rahman, E.; Raghav, A.; Shukla, P.; Mishra, V. LiFi Technology: A Breakthrough for Massive Data Rates in Indoor Applications. In Intelligent Systems for Social Good. Advanced Technologies and Societal Change; Mukherjee, S., Muppalaneni, N.B., Bhattacharya, S., Pradhan, A.K., Eds.; Springer International Publishing: Singapore, 2022; pp. 63–79. [Google Scholar]
  22. Haas, H.; Yin, L.; Wang, Y.; Chen, C. What is LiFi? J. Light. Technol. 2016, 34, 1533–1544. [Google Scholar] [CrossRef]
  23. Jungnickel, V.; Berenguer, P.W.; Mana, S.M.; Hinrichs, M.; Kouhini, S.M.; Bober, K.L.; Kottke, C. LiFi for Industrial Wireless Applications. In Proceedings of the Optical Fiber Communication Conference (OFC), San Diego, CA, USA, 8–12 March 2020; pp. 1–3. [Google Scholar]
  24. Amran, N.A.; Soltani, M.D.; Yaghoobi, M.; Safari, M. Learning Indoor Environment for Effective LiFi Communications: Signal Detection and Resource Allocation. IEEE Access 2022, 10, 17400–17416. [Google Scholar] [CrossRef]
  25. Arfaoui, M.A.; Soltani, M.D.; Tavakkolnia, I.; Ghrayeb, A.; Assi, C.M.; Safari, M.; Haas, H. Measurements-Based Channel Models for Indoor LiFi Systems. IEEE Trans. Wirel. Commun. 2020, 20, 827–842. [Google Scholar] [CrossRef]
  26. Ma, S.; Sheng, H.; Sun, J.; Li, H.; Liu, X.; Qiu, C.; Safari, M.; Al-Dhahir, N.; Li, S. Feasibility Conditions for Mobile LiFi. IEEE Trans. Wirel. Commun. 2023, 23, 7911–7923. [Google Scholar] [CrossRef]
  27. Muller, M.; Behnke, D.; Bok, P.B.; Kottke, C.; Bober, K.L.; Jungnickel, V. Leverage LiFi in Smart Manufacturing. In Proceedings of the IEEE Globecom Workshops (GC Wkshps), Taipei, Taiwan, 7–11 December 2021; pp. 1–6. [Google Scholar]
  28. Ozyurt, A.B.; Tinnirello, I.; Popoola, W.O. LiFi-enabled UAV swarm networks. Appl. Opt. 2024, 63, 1471–1480. [Google Scholar] [CrossRef]
  29. Leon, T.; Sumiko, M. A UAV traffic prediction considering AP connection errors and UAV altitude. Nonlinear Theory Appl. 2024, 15, 365–375. [Google Scholar]
  30. Gordon, V.; Danquah, P. An Experimental Assessment of LiFi Data Communication. Ghana J. Sci. 2020, 61, 73–87. [Google Scholar] [CrossRef]
  31. Vaiopoulos, N.; Vavoulas, A.; Sandalidis, H.G. Impact of a Randomly Placed Terminal on LiFi Performance. IEEE Trans. Commun. 2022, 70, 1875–1885. [Google Scholar] [CrossRef]
  32. Anwar, D.N.; Ahmad, R.; Bany Salameh, H.; Elgala, H.; Ayyash, M. Performance analysis of neural network-based unified physical layer for indoor hybrid LiFi–WiFi flying networks. Neural Comput. Appl. 2023, 35, 24179–24189. [Google Scholar] [CrossRef]
  33. Oubbati, O.; Atiquzzaman, M.; Ahanger, T.; Atef, I. Softwarization of UAV Networks: A Survey of Applications and Future Trends. IEEE Access 2020, 8, 98073–98125. [Google Scholar] [CrossRef]
  34. Hu, J.; Cai, L.; Khosravi, M.; Pei, Q.; Wan, S. UAV-Assisted Vehicular Edge Computing for the 6G Internet of Vehicles: Architecture, Intelligence, and Challenges. IEEE Commun. Stand. Mag. 2021, 5, 12–18. [Google Scholar] [CrossRef]
  35. Rahul, G.; Srikumar, V.; Amandeep, R.; Deepa, K. LiFi for Vehicle to Vehicle Communication—A Review. Procedia Comput. Sci. 2020, 165, 25–31. [Google Scholar]
  36. Devi, G.; Jayanthi, N.; Rahul, S.; Karthick, M.; Srinivasan, G.; Anand, M. A critical review on LiFi technology and its future applications. AIP Conf. Proc. 2023, 2690, 020061. [Google Scholar]
  37. Chowdhury, M.; Hasan, M.K.; Shahjalal, M.; Hossan, M.; Jang, Y. Optical Wireless Hybrid Networks: Trends, Opportunities, Challenges, and Research Directions. IEEE Commun. Surv. Tutorials. 2020, 22, 930–966. [Google Scholar] [CrossRef]
  38. Ramadhani, E. A Mini Review of LiFi Technology: Security Issue. Int. J. Comput. Inf. Syst. 2020, 3, 90–93. [Google Scholar] [CrossRef]
  39. Abumarshoud, H.; Soltani, M.D.; Safari, M.; Haas, H. Realistic Secrecy Performance Analysis for LiFi Systems. IEEE Access 2022, 9, 120675–120688. [Google Scholar] [CrossRef]
  40. Bai, J.; Chen, Y. The Node Selection Strategy for Federated Learning in UAV-Assisted Edge Computing Environment. IEEE Internet Things J. 2023, 10, 13908–13919. [Google Scholar] [CrossRef]
  41. Wehbi, O.; Arisdakessian, S.; Wahab, O.A.; Otrok, H.; Otoum, S.; Mourad, A.; Guizani, M. FedMint: Intelligent Bilateral Client Selection in Federated Learning with Newcomer IoT Devices. IEEE Internet Things J. 2023, 10, 20884–20898. [Google Scholar] [CrossRef]
  42. Kouhini, S.M.; Kottke, C.; Ma, Z.; Freund, R.; Jungnickel, V.; Muller, M.; Behnke, D.; Vazquez, M.M.; Linnartz, J.-P.M.G. LiFi Positioning for Industry 4.0. IEEE J. Sel. Top. Quantum Electron. 2021, 27, 7701215. [Google Scholar] [CrossRef]
  43. Muraleedharan, N.; Cohen, D.S. Modelling and simulation of UAV systems. In Imaging and Sensing for Unmanned Aircraft Systems: Control and Performance; Estrela, V.V., Hemanth, J., Saotome, O., Nikolakopoulos, G., Sabatini, R., Eds.; IET Digital Library: London, UK, 2020; pp. 101–121. [Google Scholar]
  44. Udvardy, P.; Beszedes, B.; Toth, B.; Foldi, A.; Botos, A. Simulation of obstacle avoidance of an UAV. In Proceedings of the 15th IEEE International Conference on New Trends in Aviation Development (NTinAD’2020), Starý Smokovec, Slovakia, 17–18 September 2021; pp. 245–249. [Google Scholar]
  45. Romaniuk, S.; Gosiewski, Z.; Ambroziak, L. A ground control station for the UAV flight simulator. Acta Mech. Autom. 2016, 10, 28–32. [Google Scholar] [CrossRef]
  46. Zhenxiong, W.; Kai, K.; Xueying, H.; Huanming, H.; Jianghai, L.; Lang, C. Computational simulation study on disturbance of six-rotor UAVs due to ammunition launch. J. Phys. Conf. Ser. 2023, 2478, 102022. [Google Scholar] [CrossRef]
  47. Chandrasekaran, K.; Theningaledathil, V.; Hebbar, A. Ground based variable stability flight simulator. Aviation 2021, 25, 22–34. [Google Scholar] [CrossRef]
  48. Kampf, R.; Soviar, J.; Bartuška, L.; Kubina, M. Creation of SW for Controlling Unmanned Aerial Systems. Sci. J. Transp. Logist. 2022, 13, 198–209. [Google Scholar] [CrossRef]
  49. Phadke, A.; Medrano, F.A.; Sekharan, C.N.; Chu, T. Designing UAV Swarm Experiments: A Simulator Selection and Experiment Design Process. Sensors 2023, 23, 7359. [Google Scholar] [CrossRef]
  50. Al-Mousa, A.; Sababha, B.H.; Al-Madi, N.; Barghouthi, A.; Younisse, R. UTSim: A framework and simulator for UAV air traffic integration, control, and communication. Int. J. Adv. Robot. Syst. 2019, 16, 1–19. [Google Scholar] [CrossRef]
  51. Jayashree, T.R.; Priyadarshini, K.; Sri Harini, K. Li-Fi & Wi-Fi based drone for weather monitoring with data storage in cloud using IoT. Adv. Parallel Comput. 2021, 38, 434–438. [Google Scholar]
  52. Ahmad, R.; Ayyash, M.; Salameh, H.B.; El-Khazali, R.; Eigala, H. Indoor Flying Networks for 6G: Concepts, Challenges, Enabling Technologies, and Opportunities. IEEE Commun. Mag. 2023, 61, 156–162. [Google Scholar] [CrossRef]
  53. Qi, X.; Zhou, Y.; Liu, L. Evaluation of the reliability of UAV swarm for ground combat missions. Syst. Eng. Electron. 2023, 45, 2971–2978. [Google Scholar]
  54. Zaitseva, E.; Levashenko, V.; Mukhamediev, R.; Brinzei, N.; Kovalenko, A.; Symagulov, A. Review of Reliability Assessment Methods of Drone Swarm (Fleet) and a New Importance Evaluation Based Method of Drone Swarm Structure Analysis. Mathematics 2023, 11, 2551. [Google Scholar] [CrossRef]
  55. Zaitseva, E.; Levashenko, V.; Brinzei, N.; Kovalenko, A.; Yelis, M.; Gopejenko, V.; Mukhamediev, R. Reliability Assessment of UAV Fleets. In Emerging Networking in the Digital Transformation Age. TCSET 2022. Lecture Notes in Electrical Engineering; Klymash, M., Luntovskyy, A., Beshley, M., Melnyk, I., Schill, A., Eds.; Springer International Publishing: Cham, Switzerland, 2023; Volume 965, pp. 335–357. [Google Scholar]
  56. Fesenko, H.; Kharchenko, V. Determination of an optimal route for flight over of specified points of a potentially dangerous object territory by UAV fleet. Radioelectron. Comput. Syst. 2019, 3, 63–72. [Google Scholar]
  57. Fesenko, H.; Kharchenko, V. Reliability models of UAV fleet groups with k-out-of-n redundancy for monitoring of potentially dangerous objects. Radioelectron. Comput. Syst. 2019, 2, 147–156. [Google Scholar]
  58. Leichenko, K.; Fesenko, H.; Kharchenko, V.; Illiashenko, O. Deployment of a UAV swarm-based LiFi network in the obstacle-ridden environment: Algorithms of finding the path for UAV placement. Radioelectron. Comput. Syst. 2024, 1, 176–195. [Google Scholar] [CrossRef]
  59. Fesenko, H.; Kharchenko, V.; Sachenko, A.; Hiromoto, R.; Kochan, V. Chapter 9—An internet of drone-based multi-version post-severe accident monitoring system: Structures and reliability. In Dependable IoT for Human and Industry: Modeling, Architecting, Implementation; Kharchenko, V., Kor, A.L., Rucinski, A., Eds.; River Publishers: Gistrup, Denmark, 2018; pp. 197–217. [Google Scholar]
  60. Sun, Y.; Fesenko, H.; Kharchenko, V.; Zhong, L.; Kliushnikov, I.; Illiashenko, O.; Morozova, O.; Sachenko, A. UAV and IoT-Based Systems for the Monitoring of Industrial Facilities Using Digital Twins: Methodology, Reliability Models, and Application. Sensors 2022, 22, 6444. [Google Scholar] [CrossRef]
  61. Pasieka, M.; Grzesik, N.; Kuźma, K. Simulation Modeling of Fuzzy Logic Controller for Aircraft Engines. Int. J. Comput. 2017, 16, 27–33. [Google Scholar] [CrossRef]
  62. Kharchenko, V.; Ponochovnyi, Y.; Abdulmunem, A.-S.M.Q.; Boyarchuk, A. Security and Availability Models for Smart Building Automation Systems. Int. J. Comput. 2017, 16, 194–202. [Google Scholar] [CrossRef]
  63. Großwindhager, B.; Rupp, A.; Tappler, M.; Tranninger, M.; Weiser, S.; Aichernig, B.K.; Boano, C.A.; Horn, M.; Kubin, G.; Mangard, S.; et al. Dependable Internet of Things for Networked Cars. Int. J. Comput. 2017, 16, 226–237. [Google Scholar] [CrossRef]
  64. Kolisnyk, M. Vulnerability Analysis and Method of Selection of Communication Protocols for Information Transfer in Internet of Things Systems. Radioelectron. Comput. Syst. 2021, 1, 133–149. [Google Scholar] [CrossRef]
  65. Zemlianko, H.; Kharchenko, V. Cybersecurity risk analysis of multifunctional UAV fleet systems: A conceptual model and IMECA-based technique. Radioelectron. Comput. Syst. 2023, 4, 152–170. [Google Scholar] [CrossRef]
  66. Sihag, V.; Choudhary, G.; Choudhary, P.; Dragoni, N. Cyber4Drone: A Systematic Review of Cyber Security and Forensics in Next-Generation Drones. Drones 2023, 7, 430. [Google Scholar] [CrossRef]
  67. Leichenko, K.; Fesenko, H.; Kharchenko, V. Deploying the Reliable UAV Swarm for Providing P2P LiFi Communications Considering Physical Obstacles: Method of Rectangles, Algorithms, and Tool. In Proceedings of the 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Dortmund, Germany, 7–9 September 2021; Volume 1, pp. 1011–1016. [Google Scholar]
  68. Fedorenko, G.; Fesenko, H.; Kharchenko, V.; Kliushnikov, I.; Tolkunov, I. Robotic-biological systems for detection and identification of explosive ordnance: Concept, general structure, and models. Radioelectron. Comput. Syst. 2023, 2, 143–159. [Google Scholar] [CrossRef]
  69. Patil, M.; Abukhalil, T.; Patel, S.; Sobh, T. UB Swarm: Hardware implementation of heterogeneous swarm robot with fault detection and power management. Int. J. Comput. 2016, 15, 162–176. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.