Next Article in Journal
Applied Agri-Technologies for Agriculture 4.0—Part I
Next Article in Special Issue
Improved Adaptive NDI Flight Control Law Design Based on Real-Time Aerodynamic Identification in Frequency Domain
Previous Article in Journal
Morphological Integration on the Calcaneum of Domestic Sheep (Ovis aries Linnaeus, 1758)—A Geometric Morphometric Study
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Using Historical Data to Dynamically Route Post-Disaster Assessment Unmanned Aerial Vehicles in the Context of Responding to Tornadoes

Polytechnique Montréal, Département de Mathématiques et de Génie Industriel, Montréal, QC H3T 1J4, Canada
*
Author to whom correspondence should be addressed.
Appl. Sci. 2023, 13(7), 4178; https://doi.org/10.3390/app13074178
Submission received: 24 February 2023 / Revised: 20 March 2023 / Accepted: 21 March 2023 / Published: 25 March 2023
(This article belongs to the Special Issue Advanced Research and Application of Unmanned Aerial Vehicles)

Abstract

:

Featured Application

This paper demonstrates the intelligent and specific use of historic meteorological data can be used to better route disaster assessment unmanned aerial vehicles so they can complete their mission in a quicker amount of time.

Abstract

Responding to tornado disasters resides at a unique intersection of search and rescue operations: it has attributes of wilderness and maritime search and rescue operations and search and rescue operations in the aftermath of earthquakes and hurricanes. This paper presents a method of attempting to leverage historical data to more efficiently identify the extent of the area damaged by a tornado. To assist in building and understanding the historical data, we also develop a method to generate tornado areas that react similarly to the limited historical data set. The paper successfully demonstrates the method of creating artificial tornado instances that can be used as a testing sandbox for the further development of tools when responding to tornado-type disasters. These artificial instances perform similarly in some important metrics to the historical database of tornado instances that we produced. This paper also shows that the use of historical tornado trends has an impact on the response method outlined in this article, typically reducing the standard deviation of the time it takes to fully identify the extent of the damage.
MSC:
90B06; 90B90; 90C39; 90C90

1. Introduction and Literature Review

The majority of search and rescue (SAR) literature, in particular when using unnamed aerial vehicles (UAVs) in assisting SAR personnel, typically responds to disasters that involved earthquakes or hurricanes. A detailed breakdown of the use of UAVs in disaster response and SAR operations can be found in the previous literature [1,2]. The two main axes of the use of UAVs for SAR operations can be separated into locating missing individuals or post-disaster damage assessment. Examples of the former can be broken down into wilderness SAR operations [3] and mountain rescue operations [4]. Examples of the latter, UAVs were used in earthquake response [1,5,6,7,8] and hurricane response [9,10]. There is a limited amount of work incorporating UAVs in response to tornadoes [11,12]. Therefore, when UAVs are being used in assisting SAR personnel in disaster assessment operations, most of the literature aims at responding to disasters that involved earthquakes or hurricanes.
How UAVs can be incorporated into the response to tornadoes can be found in the intersection of the two axes. There are many overlaps of wilderness SAR, maritime SAR operations, and earthquake/hurricane response and the response to tornadoes; post-tornado search and rescue operations provide a unique setting that is ripe to develop dynamic routing algorithms to more effectively search an area that has been impacted by a tornado.
Wilderness and maritime SAR operations often involve systematically searching an area to identify a single entity (vessel in distress, missing hikers) or responding directly to a distress call. There exist search rules that searchers will use to effectively cover an area and ensure that searchers rigorously examine an area and that the human searchers balance the time investigating any given small area versus the overall potential area a person in aid might be. In addition, knowledge of general ocean currents can aid searchers in their efforts by allowing searchers to prioritize their areas of inspection [13].
In response to large-scale disasters (such as earthquakes, hurricanes), search and rescue operations are often conducted as damage assessment operations from the sky and/or require the use of search dogs, cameras, and reports of where missing people may be [1,14]. However, there is a growing body of work proposing the use of “wireless sniffers” to help identify where victims may be by passively detecting cell phones [1,15,16,17]. Even with this innovative technology, the response (search) in the aftermath of earthquakes or hurricanes will still involve assessing an area on the size of a city, county, province, department, or region.
Tornadoes, and responding to tornadoes, provide a situation that is not adequately covered by the response literature. One of the ways of allocating search areas is by using meteorological data for creating a search area [11] (For a deeper understanding of the meteorological attributes of tornadoes, we direct the reader to search meteorological literature or to consult the National Weather Service (NWS) extensive online library on the subject). Previous work used storm-based warnings (SBWs) and local storm reports (LSRs) to identify and route post-disaster UAVs. SBWs are polygons that are drawn over an area that meteorologists expect there could be severe weather. SBWs can indicate many kinds of severe weather; however, we are only explicitly looking at the SBWs that are drawn to indicate the presence of tornadoes (not severe thunderstorms, not hail, not snowstorms). LSRs are observations to where severe weather is presently occurring. Their paper only considers LSRs observations to indicate the presence of tornadoes. The intersection in both time and space of this spatial information delineates the search area [11].
The strategic aspect of SAR operations—such as the location and allocation of SAR teams, vehicles, and equipment—can be seen in previous works [12,18]. Specifically, there is a discussion of the location of United States Coast Guard helicopters that conduct SAR operations in the Atlantic Ocean [18]. In other literature, the search area is further identified by the named road network under the assumption that anyone in need of rescue would be close to the road network of a state. That is, in areas where there are large open fields, the UAV would not search throughout a–for example–cornfield. They used the road network to create a series of waypoints that can be used to route one or several UAVs through a disaster area [12].
Where tornado response begins to differentiate from other SAR response operations is that the area impacted by a tornado (that is, where people may be need of aid) is significantly smaller than the search area in an earthquake, hurricane, or even the area defined in previous work. Only about 1–5% of the area defined by a SBW is damaged. This aligns more with the wilderness and maritime SAR operations as rescuers are trying to identify a missing person or vessel in distress and identifying this is disproportionally smaller than the area needed to be searched, that is, like a “needle-in-a-haystack”. However, wilderness and maritime SAR operations fall short because once a portion of the damaged area has been identified, the extent of the damage must also be identified.
When formulating the problem as a mathematical optimization problem, the most common formulations appear to be in the form of a traveling salesperson problem [19,20], a vehicle routing problem [21], or as a simpler shortest path problem or pathfinding problem—where returning to the start is unnecessary [22,23,24,25]. While the latter papers in the literature may on the surface appear simple, the goals put forth in the papers are often to create a coverage network in an attempt to identify victims and find paths to them [25,26], or to set up a connectivity network to a victim [24,27].
After graph-based formulations, another common model formulation is a set covering method [28,29]. It is a formulation well-suited to monitoring procedures as set covering formulations attempt to allocate the robots over a disaster scene to ensure connectivity [28] or to ensure an area is adequately searched [29]. Swarm-based methods (such as ant colony optimization or particle swarm optimization) are frequently used when multiple UAVs are used in completing their mission [28,29,30,31,32].
In addition to the mathematical optimization models proposed, several robot task allocation models and methods were used in the literature [1,33,34,35]. Robot task allocation can be implemented in a decentralized way and enable real-time reactions to new information present in the environment. The advantage of most robot task allocations (such as in [1,34,35]) is that they allow for the decentralized operation of many robots. Conversely, ref. [33] allow for robots to compete for performing the next task.
In addition to the well-established procedures outlined previously, some authors attempt simulation techniques such as Markov Decision Process [17,25,36,37].
One method of Markov Decision Processes is conducting a random forest to determine the next area for the UAV to explore to find a lost hiker [17]. However, the method they propose works well in spatially small search areas and the attraction of the WiFi sensor helps triangulate the missing person(s). There is also use a Markov Decision Process using land-based robots are navigating an interior environment (i.e., office space, school) [36]. There is also a a Markov model attempting to predict the rescuer’s needs and to deploy a UAV with wireless sensor networks and cellular networks to focus on maintaining connectivity for rescuers in a search area [37]. Markov Decision Processes can also be used to consider and map an unknown interior environment [25].
There is a large and growing body of work in using UAVs in disaster response applications, in particular with assisting SAR teams in identifying where people are in need of aid or transporting medical and first aid supplies to people in need of aid. The advent of wireless sniffer technologies allow for SAR UAVs to detect the presence of wireless devices (i.e., cell phones). With the adoption of cell phones in much of the world, the combination of these two technologies allows for the use of UAVs in responding to emergencies where people in need of aid may not have line-of-sight to the sky. When responding to emergencies and disasters, while there are some over-arching principals when developing SAR procedures, domain-specific data and knowledge can go a long way in creating searches that can be conducted faster (e.g., understanding ocean currents to identify where overboard and stranded sailors may be). In the context of searching after a tornado strikes, we can use broad understandings of tornadoes to better capture and identify the extent of the damage. A UAV equipped with wireless sniffers can also estimate the number of people that may be in need of aid at any given area, even if they are buried. To the best of our knowledge, there is very little research in utilizing meteorological and tornado data to help rescuers identify where victims may need aid [11,12]. In addition, these past works do not attempt to identify the extent of the damage as quickly as possible; they simply assume the entire area must be assessed.
This paper presents a method of attempting to identify the damaged area of a tornado quicker than trying to search the entire area. It also attempts to demonstrate that intelligently incorporating historical data into the decision-making process can assist the tools to make better decisions. The remainder of the paper is broken down into five sections. Section 2 contains the problem context and other rules and assumptions that are used in this paper. Section 3 discusses how the dynamic program will work. Section 4 details the experimentation, including a method for generating “artificial tornado instances” to provide additional cases for the paper. We test the method developed on historical cases in Section 5. We then conclude this paper in Section 6 by outlining our contribution and discussing research opportunities. Appendix A has additional results for Section 5 and Appendix B outlines the location of the publicly available data this paper is building on.

2. Problem Context

Given the existence and use of UAVs for assessing damage and identifying areas to deploy SAR teams to in the aftermath of a tornado, multiple methods can be used for routing deployed UAVs to identify damaged areas as quickly as possible. For example, the UAVs may be routed through the entire identified search area [11]. However, the actual damaged area is significantly smaller than a proposed search area.
An example of such an area can be seen in Figure 1. Here, we have a red polygon, which represents an area that may have tornado damage, with the cyan polygon representing the actual damage caused by the tornado. The objective of this paper is to identify the area denoted in cyan, in relation to the initial search area outlined in red. Note that the tornado damage area may not be totally encompassed by the SBW.
To effectively search the area, previous works assume that people in need of aid would be within some radius of a road, which has been denoted r s c a n . The performance metrics outlined in [1,6,11,12] yield an r s c a n of 300 m. Using the road network as a proxy for the location of people (as in [11]), and heuristically finding the minimum number of waypoints with a radius of r s c a n that can cover the road network in a given area. An example of these waypoints can be seen in Figure 2. Given the context of Figure 2, a UAV that is scanning the area is attempting to identify the waypoints in green by searching through the collection of blue waypoints. The waypoints in green will not be known when the UAV is launched. Previously, the UAV only considers waypoints inside the SBW and will never inspect the damaged waypoints outside the SBW [11,12]. That is, “damaged waypoints” outside the SBW (for example, the waypoints west of the red box outlined in Figure 1 and Figure 2) would never be inspected in the previous literature. This paper attempts to allow the UAV to scan the entire area as well as identify damage that may occur outside of a search area.

3. Model Concepts and Dynamic Routing Setup

The following section breaks down the concepts and steps included in the dynamic routing of the UAV over the search area. The concepts are broken down into five sections. First, we propose a concept called the “base score of a waypoint”. The next section is a concept of an “Influence matrix”, which determines how much information gained from one waypoint has on another waypoint. The “influence matrix” and “base score” are combined to determine the “Computed Score of a Waypoint”, which is discussed in the third subsection. The next subsection discusses the details of how the UAV will route itself to its next waypoint(s) based on its computed score. Finally, “Evaluation of the quality of the solution” discusses the objective of the routing algorithm (find the extent of the damage as quickly as possible) and how this paper determines what subset of parameters works toward this goal.

3.1. Base Score of a Waypoint

Each waypoint receives a “Base Score” that follows a basic decision tree (the following decision tree is graphically represented in Figure 3 to aid the reader) based on the following attributes: whether the UAV has visited the waypoint or not (unvisited), whether the waypoint is initially in an SBW or not, and whether there is damage in the waypoint area. If a waypoint is not in the search area and not visited, the base score is 0.0. If a waypoint is in the search area and not visited, the base score is 0.5. If the waypoint is visited and not damaged, the waypoint base score is 0.0. If the waypoint is visited and damaged, the waypoint is given a base score of 5.0 (This value was initially set to 1.0; however, with initial testing, we quickly realized the score of 1.0 would not be sufficient). The base score is dynamic, but it only changes upon visitation with the UAV. Waypoints outside the SBW can be visited if the dynamic program decides to visit the waypoint, but will never receive the base score of 0.5: either the visitation will affirm the waypoint’s base score of 0.0 (no damage), or it will receive the damaged score of 5.0. A decision tree of this process can be seen in Figure 3.

3.2. Influence Matrix

The base score of a waypoint exerts influence on its neighbor waypoints as a function of distance. Waypoints that are spatially “close” to each other will more likely have the same attribute of being damaged or undamaged. The influence of one waypoint on another is a function of the distance between the waypoints. Let an influence matrix I be a n n matrix that can be referenced as the influence waypoint j has on waypoint i. The value of any element I i j is in the range of 0 to 1. For this paper, we used a linear relationship of influence; however, other functions (say, logarithmic or exponential) can be used. The objective is to inform the solver of the likelihood a nearby waypoint will share the same state (damaged or undamaged). We use the parameters minimum influence range (the distance from a waypoint where the influence is 1.0, typically r s c a n ) and maximum influence range (where waypoints beyond have an influence of 0.0). Samples of the symmetric case can be found in Figure 4.
In addition to the previous “symmetric influence matrix”, we have also developed a data driven influence matrix where the samples can be seen in Figure 5. Here, we use the historical data set of tornadoes to create an elongated matrix (along the 35–215 to 50–230 degree directions, south-west to north-east) to better reflect the typical direction a tornado might travel. The idea behind this data driven influence matrix is that since most tornadoes traverse along this half, there will be a greater chance of waypoints along this path to have identical conditions and attributes. Samples of this matrix can be found in Figure 5.
This is generated by using the frequency of the direction of tornadoes from the historical tornado database from 1950 until 2021. The radial histogram of this can be found in Figure 6. Here, the direction of a tornado is simply what is recorded as the start point and the end point, and the direction between those two points. This is the same direction used in this data driven influence matrix. It will not necessarily capture the path the tornado might take that may resemble an S or something else.

3.3. Computed Score of a Waypoint

In addition to the base score of each waypoint, each waypoint also has a computed score. The computed score is between 0.0 and 1.0 and is only computed and applied for unvisited waypoints. The computed score of a waypoint is used in the dynamic routing of the UAV. Simply, the computed score of a waypoint is the weighted average of all the waypoints weighted by the influence matrix score. Mathematically, let the computed score of waypoint i be s i , the base score of waypoint j be B j , and the influence of waypoint j on waypoint i be I i j . The computed score of waypoint s i is s i = j I i j B j j I i j .

3.4. Routing the UAV: Parameters and Considerations

The overarching idea behind dynamically routing the UAV is for the UAV to fly directly to the waypoint with the highest computed score. If multiple waypoints have the highest computed score, the closest one is selected. In practice, waypoints along the route will have the ability to be scanned while a UAV is on route from waypoint k to the waypoint with the highest computed score (waypoint k + 1 ). The decision was to include waypoints that are within a rectangle whose width is 2 × ϵ and length l is the length of the line between waypoint k and waypoint k + 1 . The value of ϵ is the minimum of the length of 2 or 2 × r s c a n , ϵ = min 2 , 2 × r s c a n . Figure 7 illustrates the area and the waypoints that will be considered.
Figure 6. Radial histogram of the direction of tornadoes with the length indicating of tornadoes in each direction. Note: this chart does not indicate the intensity of the tornado, nor does it give any indication of the length or width the tornado took.
Figure 6. Radial histogram of the direction of tornadoes with the length indicating of tornadoes in each direction. Note: this chart does not indicate the intensity of the tornado, nor does it give any indication of the length or width the tornado took.
Applsci 13 04178 g006
There is also the concept of Minimum Score to Consider (MStC). Given a computed score s j , if the score is below a MStC, the waypoint is ignored, and not considered in determining the next waypoint to visit. Once all waypoints with a computed score above a MStC are visited, the UAV is considered to have completed its mission. This is an extension of the idea that once you have enough information about a waypoint’s neighbor waypoints, you can potentially safely ignore these waypoints even if they have not been visited. By default, the MStC is 0.0 (for example, waypoints outside of the initial search area have 0.0 s and will be below or equal to the MStC). MStC was selected and tuned in this paper to ensure that all damaged waypoints inside a SBW would be identified.
There is also the option to give an initial route. The initial route is a minimum Hamiltonian path through all the way points in the search area. This initial route was the standard search pattern in [11,12]. There are two options in the testing of this dynamic program on the historical and artificial test cases. Having the initial route allows for a systematic and shortest route to search an area. However, offering no initial route would allow the UAV to inspect the center of the search area and work outward. However, this may cause the UAV’s traveled route to cross itself searching for damaged areas.
Finally, given our two types of influence matrices (data driven and symmetric), we have four variations of the two influence matrices at our disposal: using symmetric the entire time; using the data driven matrix the entire time; starting with the symmetric and then switching to the data driven once damage is uncovered; and then using data driven and then switching to symmetric once damage is uncovered.

3.5. Evaluation of the Quality of the Solution

There are three attributes to assess the quality of the dynamic routing problem:
  • How quickly the damaged area is identified;
  • How quickly the extent of the damage is identified; and
  • How quickly the UAV finishes assessing the area (confirms there is no more damage in the area).
To calculate how quickly the damaged area is identified and how quickly the UAV finishes scanning the area, we define the metric “Score of Finding Damage” and “Score of Completing route”. The former is the distance the UAV takes until the first damaged waypoint is uncovered divided by the number of waypoints initially in the SBW; the latter is the distance the UAV takes to complete its entire route divided by the number of waypoints initially in the SBW. This is to normalize the distance traveled to the number of waypoints, as there may be disparities between the initial number of waypoints initially in the SBW and may have grave effects on the length of the route. How quickly the extent of the damage is identified is defined as a “Score of Identifying Damage” and is computed by the distance the UAV took from identifying the first damaged waypoint to the last damaged waypoint divided by the minimum length that the Hamiltonian path would have taken to identify all the damaged waypoints. A score of 1.0 would be a perfect score and means that the path the program took matched the minimum Hamiltonian path; a score of 5.0 would mean the distance the program found was five times as long as the minimum Hamiltonian path.

4. Experimentation

While we have historical data for more than 300 tornadoes, we developed the ability to create a larger, artificial data set in order to test the routing algorithm that is developed. The method that we propose for creating these new scenarios is based on historical data (such as the direction, length, and width of historical tornadoes) in order to obtain realistic scenarios. These scenarios will be used as test cases with historical scenarios for the development of more advanced/better routing algorithms. Due to the limited number of historical cases available for testing, we developed a method for generating cases based on real world data for use in initial parameter tuning and testing. Due to the customizability of these generated cases, we were able to develop smaller tests sizes (that is, typically fewer waypoints). In this section, the subscript G C (Generated Case) is added to variable names to differentiate them from notations elsewhere.

4.1. Generated Cases

A “Generated Case” is randomly created using a five-step approach, where Figure 8 graphically depicts this five-step process. In Step 1, some number of points n p o i n t s , G C are randomly and uniformly generated within a bounding box (represented as blue points in Figure 8). These points are akin to the waypoints from the historical cases. In Step 2, a search area S B W G C is generated by creating a concave quadrilateral that is encapsulated between 33% and 67% of the n p o i n t s , G C (represented as a red polygon in Figure 8). This is akin to the SBW. In the next three steps, a polygon to represent the damaged area is created. These steps of the process are using the base database of tornadoes from 1950–2021 [38]. Only tornadoes that have a start point and an end point were considered. In Step 3, a point is randomly selected within the search area (represented as a red triangle in Figure 8). Next, in Step 4, a “direction” is randomly selected from the NWS’s tornado database from 1950–2021. Finally, in Step 5, the widths and lengths of each tornado in the database were normalized to the range of the randomly generated points (the minimum axis of the bounding box). A random length and width are selected from this database. The damaged area is the rectangle created by the centerline defined by the randomly selected start point, the randomly selected length, and randomly selected direction. The sides of this rectangle are defined by offsetting the centerline half the randomly selected width, perpendicular to the centerline (represented a yellow line and polygon in Figure 8).

4.2. Testing on Generated Cases

To test our algorithm, the following procedure was used. First, an initial generated case is created as outlined in Section 4.1. Then, eighteen subcases were created based on three parameters: whether an initial route is used (Yes, No); the type of influence matrix policy used (data-driven-first, data-driven, symmetric-first, symmetric); and the minimum score to consider (0.0, 0.1, 0.2). The combination of the three tested parameters yields 24 subcases; however, when using an “initial route”, the change of use of the matrix before identifying damage is meaningless, and by removing these parameter combinations we are left with 18 subcases. Using this procedure, 1000 cases were generated.

4.3. Results on the Generated Cases

The first analysis is testing the efficacy of the method to identify the extent of the damage. Precisely, we define this metric as the distance the UAV took from identifying the first damaged waypoint to the last damaged waypoint over the length of the minimum Hamiltonian path it would take to identify all the damaged waypoints. Recall a score of 1.0 would be a perfect score and a score of 5.0 would mean the distance the program found was five times as long as the minimum Hamiltonian path. Table 1 has the average and standard deviation of the 1000 cases.
Broadly speaking, the use of either the data-driven-first (symmetric second) or using the symmetric matrix for the entire program yield higher quality results than using data-driven matrices second (after the damage is uncovered). However, what is potentially more interesting is that when using the data-driven-first (symmetric second) matrices, they produce a markedly lower standard deviation than their symmetric only counterparts; three of the four lowest standard deviations are from the data-driven-first matrices. This can be viewed as the method that produces more consistent results. Given the information in Table 1, it is reasonable to draw the conclusion that the quality of this solution based on this metric is unaffected using the initial route and the use of the MStC.
Figure 8. Step-by-step process on creating a random case.
Figure 8. Step-by-step process on creating a random case.
Applsci 13 04178 g008
Next, we assess the quality of the dynamic program to identify the damage and to complete its route (assert that there is no further damage to be identified). To complete this analysis, the distance of the route when the damage is first uncovered is divided/normalized by the number of waypoints in the SBW is one metric; likewise, the distance of the route when completed is divided/normalized by the number of waypoints in the SBW is the other metric. These results are shown in Table 2 and Table 3.
As expected, the relationship between not using an initial route and how quickly damage is identified is incredibly stark. It is additionally readily apparent that using data-driven influence matrices to identify damage is marginally better than using the symmetric to identify the damage areas. Visually inspecting the resulting route does demonstrate that the data-driven influence matrix forces the UAV to fly perpendicular to the common orientation of tornadoes.
Also as expected, allowing the UAV to terminate early allows the program to terminate once the computed scores of unvisited waypoints are sufficiently low. Implementation notes: Internal preliminary tests showed that when the MStC was 0.25 or greater, it was common for the UAV to miss damaged waypoints. In the 1000 tests executed, the UAV did not miss any waypoints up to the a MStC 0.20. As for why using an initial route, symmetric matrix (or a data-driven matrix), and a MStC of 0.10 performs similarly to using a MStC of 0.20, it is believed that the systemic search of the search area allows for many waypoints with no damage to be identified and excluded from the search in later stages.
Overall, these test cases demonstrate that our parameters operate as expected: higher MStC yields a search that is terminated earlier; not using a seeded route yields identifying damage quicker, using an initial route can help the search terminate earlier; and using a data driven search method has an effect and that effect largely helps initially identify the damage, but is detrimental after the damage is identified.

5. Testing on Historical Data

With a basic understanding of what parameters work better for the generated cases, we also run these on the collections of historical cases.

5.1. Data and Creation of the Historical Cases

The data was pulled from the historical meteorological data from March 2008 to June 2019 (inclusive) for the Weather Forecast Offices with the ID code of: OUN, TSA, AMA, SHV, LZK, LCH, LIX, JAN, MEG, HUN, BMX, MOB, FFC, TAE, JAX, CHS, PAH, OHX, MRX, LMK, JKL – which encompasses the US States of Alabama, Arkansas, Florida, Georgia, Kentucky, Louisiana, Mississippi, Oklahoma, South Carolina, Tennessee, and Texas (A map and list of WFO offices can be found at https://www.weather.gov/srh/nwsoffices, accessed on 1 February 2023). This and the location of all data used in this paper are in Appendix B in Table A3. There were 182 days with tornadoes in this region. Of these 182 days, several had multiple tornadoes in multiple areas. If we separate these instances where multiple tornadoes occurred on the same day, we find there are 415 unique cases.
We applied the procedure explained before. The first analysis is testing the efficacy of the method to identify the extent of the damage, again the distance the UAV took from identifying the first damaged waypoint to the last damaged waypoint divided by the minimum Hamiltonian path to identify all the damaged waypoints. The table summarizing these results can be found in Table 4.
It is immediately apparent that: (1) data-driven-first and symmetric influence matrices continue to be better than using data driven; (2) the lack of an initial route is much more positively impactful in the historical cases than in the artificial cases; and (3) there is very little difference in the scores of several pairs of cases.
Next, we assess the quality of the dynamic program to identify the damage in historical cases and to complete its route (assert that there is no further damage to be identified). These values are computed likewise to the generated cases. To complete this analysis, the distance of the route when the damage is first uncovered is divided/normalized by the number of waypoints in the SBW (metric 1); likewise, the distance of the route when completed is divided/normalized by the number of waypoints in the SBW (metric 2). These results are shown in Table 5 and Table 6.
Reflecting the generated cases, the relationship between not using an initial route and how quickly damage is identified is similar between the generated cases and the historical cases (Table 5). It is also apparent, however, that the MStC is a stronger indicator of a lower score to find damage than the matrix type. That is, using a MStC 0.20 along with not using an initial route produces results that produce a route that identifies the extent of the damage quicker than using similar parameters, but a lower MStC (0.10 and 0.00).
Also reflecting the results from the generated cases, allowing the UAV to terminate early allows the program to terminate once the computed scores of unvisited waypoints are sufficiently low (Table 6). Once again, using a symmetric matrix and a MStC of 0.10 performs similarly to using a MStC of 0.20.
Overall, these test cases demonstrate that our parameters operate as expected: higher MStC yields a search that is terminated earlier; not using a seeded route yields identifying damage quicker; and using a data driven search method has an effect and that effect largely helps to initially identify the damage but may be detrimental after the damage is identified.
As indicated previously, there are some instances where multiple tornado tracks do appear. We have separated these and denoted them as simple (one track) and complex (multiple tracks), while the explicit numerical values do change between simple and complex cases and the performance of “complex” cases are worse than “simple” cases, the substantive takeaways remain. A separation of these data is shown in Appendix A Table A1 and Table A2 as reference.

5.2. Comparison of Results

To easily compare both the historical cases and the generated cases, Table 7 indicates which parameters the end user should use to achieve a specific goal. In Table 7, we have used boldface type to indicate matching parameters. The parameters that match both historical and generated cases are: to minimize the distance/time it takes to uncover the extent of a tornado, use data-driven-first or symmetric influence matrix; to reduce the standard deviation of distance/time it takes to uncover the extent of a tornado, use a data-driven-first influence matrix; to minimize the distance/time it takes to initially identify a tornado, do not use an initial route; and to minimize the distance/time it takes to complete the mission, use a higher MStC.
For reducing “the standard deviation of distance/time it takes to uncover extent of a tornado”, the effect of data-driven-first versus the symmetric influence is less pronounced on historical cases than it is on the artificially generated cases.

6. Conclusions

This paper presents both a (1) method of attempting to identify the extent of the damaged area in the aftermath of a tornado as quickly as possible and (2) a method for creating artificial cases that can be used to increase the number of cases available for testing. We have demonstrated that intelligently incorporating historical data into the decision-making process can assist the dynamic routing method to route and reroute a damage assessment UAV to determine the extent of damage as quickly as possible. In addition, we have developed a method for creating artificial instances that react similarly for key goals (that is, identifying the extent of tornado damage). The difficulty we encountered was that we successfully developed the algorithm to use only one UAV in identifying damage (rather than multiple UAVs in the previous literature).
These artificial instances perform similarly in some important metrics to the historical database of tornado instances that we produced; however, there is a gap that needs to be addressed. From the outset, we aimed to create a method to “Minimize the distance/time it takes to uncover extent of tornado” and the generated cases perform similarly. Recall this was our primary goal. However, the other goals outlined in this paper have slight differences between parameters in the historical cases data set versus the generated cases data set. For instance, using a data-driven influence matrix first helps identify damage in the generated cases, but this has less of an impact on the actual historical data set. This is possibly because the number of waypoints is larger than the generated cases. The nature of the data driven matrix strongly encourages the UAV to travel perpendicular to the typical direction of tornadoes before damage is beginning to be identified. That is, before damage is identified, the influence matrix encourages the UAV to fly in a northwest-to-southeast direction. This makes intuitive sense as, if you are trying to initially identify something that will typically be in a northeast-to-southwest orientation, you would systematically search in a northwest-to-southeast direction. The additional waypoints and size of the search area curtails this effect.
Second, we also show that the use of historical tornado trends has an impact on the response method outlined in this article. The method is interesting as the historical data typically has a positive impact on the discovery of damaged areas and a reduction in the standard deviation of uncovering damaged areas. That is, once the damage has begun to be uncovered, the information gained from the route prior to identifying damage can help (typically) reduce the extremes in time/distance it takes identifying the extent of the damage. However, using the data driven matrix after damage is identified performs worse regardless of any other parameters used.
Tornadoes are broadly considered to be a random and unpredictable phenomenon that are hard to predict and simulate. This paper demonstrates that, even given the unpredictable nature of tornadoes, the intelligent and directed use of historical tornado damage can help rescuers identify the area impacted by a tornado in a much more efficient manner.
Some main limitations and avenues for future research to still be explored include further sensitivity on the setup of the influence matrix (as a larger range of influence may be desired for spatially larger cases). The method outlined here is also ripe for introducing more real-time data into the method. For example: the press, storm chasers, or emergency calls reporting impacted areas can convert a waypoint with unknown attributes into a known waypoint, which can be updated immediately in the dynamic routing algorithm. We use one UAV to assess an area; practically, multiple UAVs can reduce the time it takes to search the entire area, and as indicated in the previous literature, when flying multiple UAVs over a disaster area the UAV with the greatest time aloft is what we attempt to minimize [11]. However it remains unknown how multiple UAVs would effectively assess the extent of a damaged area within the context outlined in this paper. In addition, it remains an open question if using/flying multiple UAVs over a disaster area would be better served by multiple UAVs assessing the same area or multiple UAVs assessing their own areas. The influence matrix only considers direction and frequency; the influence matrix lacks any context on tornado width and length. While the direction histogram remains constant through most of the contiguous United States, length, width, and severity vary with the tornado location so sensitivity of data used based on location can be performed. The minimum score to consider has the potential to be adaptive. Presently, there is also a lack of adequate research on whether these wireless sniffers can be used in practice. Assessing whether a waypoint is “damaged” is still a manual process, and aerial assessment may result in inaccurate damage reporting for some structures.

Author Contributions

S.G.: Conceptualization; data curation; formal analysis; investigation; project administration; software; validation; visualization; writing—original draft. M.G.: methodology; project administration; supervision; validation; writing—review and editing. R.P.: Funding acquisition; methodology; project administration; resources; supervision; validation; writing—review and editing. All authors have read and agreed to the published version of the manuscript.

Funding

This work has been supported by the Jarislowsky/SNC-Lavalin Research Chair in the Management of International Projects. This support is gratefully acknowledged.

Data Availability Statement

All raw data for the procedures in this paper can be found in publicly available outlined in Appendix B in Table A3. The code used for this research project will be available at https://github.com/seangrogan-researchprojects/2023-TornadoDynamRouting-GeneratedCases, accessed on 20 March 2023 and https://github.com/seangrogan-researchprojects/2023-TornadoDynamRouting-HistoricalCases, accessed on 20 March 2023.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
MStCMinimum Score to Consider
SARSearch and Rescue
SBWStorm Based Warning
UAVUnmanned Aerial Vehicle

Appendix A. Additional Result Tables

As indicated in Section 5, some cases have multiple tornado tracks. We have separated the data into “simple” (Table A1) and “complex” (Table A2) here, with similar tables above.
Table A1. Results table, historical cases, and simple cases.
Table A1. Results table, historical cases, and simple cases.
Initial
Route?
Matrix TypeMStCMean ScoreStd Dev.Score,
Find Damage
Score,
Finish Route
FALSEdata-driven-first0.204.89224.25966943624
FALSEsymmetric0.205.01103.76127353664
FALSEdata-driven-first0.105.09674.51667704542
FALSEsymmetric0.105.12013.86777984592
FALSEsymmetric0.005.25224.53528267089
FALSEdata-driven-first0.005.31324.63988327083
TRUEsymmetric0.206.405017.01849623481
TRUEsymmetric0.106.517219.54899624116
TRUEsymmetric0.006.768120.72679627608
TRUEdata-driven0.209.556916.39409624061
FALSEdata-driven0.2010.839514.75296944269
TRUEdata-driven0.1010.996821.48109624923
FALSEsymmetric-first0.2011.305815.75327354349
FALSEdata-driven0.1011.480116.33747705378
FALSEsymmetric-first0.1011.673017.13607985445
FALSEsymmetric-first0.0012.182318.23218268476
FALSEdata-driven0.0012.279417.44588328478
TRUEdata-driven0.0014.203640.49719628643
Table A2. Results table, historical cases and complex Cases.
Table A2. Results table, historical cases and complex Cases.
Initial
Route?
Matrix TypeMStCMean ScoreStd Dev.Score,
Find Damage
Score,
Finish Route
FALSEdata-driven-first0.209.36063.79234573647
FALSEsymmetric0.209.49333.73344533645
TRUEsymmetric0.209.64224.34765193406
FALSEdata-driven-first0.1010.08764.36734584360
FALSEsymmetric0.1010.09284.36384554367
FALSEdata-driven-first0.0010.87694.82114626504
FALSEsymmetric0.0010.96584.85934556500
TRUEdata-driven0.2010.99435.42995193830
TRUEsymmetric0.1011.08875.78205194018
FALSEsymmetric-first0.2011.81425.80254534086
FALSEdata-driven0.2011.83235.91814574079
FALSEsymmetric-first0.1013.01326.28424555150
TRUEdata-driven0.1013.07656.93955194601
FALSEdata-driven0.1013.13576.32624585158
TRUEsymmetric0.0014.12629.82535196550
FALSEdata-driven0.0014.31036.88144627655
FALSEsymmetric-first0.0014.31246.79304557632
TRUEdata-driven0.0017.723212.31895197229

Appendix B. Data Locations

Table A3. Location of data used in this paper.
Table A3. Location of data used in this paper.
What?Where?When?Notes
Weather SBW Datahttps://mesonet.agron.iastate.edu/1 June 2022For the WFOs: OUN, TSA, AMA, SHV, LZK, LCH, LIX, JAN, MEG, HUN, BMX, MOB, FFC, TAE, JAX, CHS, PAH, OHX, MRX, LMK, JKL
Road data for South Carolinahttp://info2.scdot.org/GISMapping/Pages/GIS.aspx2 May 2022Statewide Highways; Statewide Other Roads
Road data for Texashttps://gis-txdot.opendata.arcgis.com/datasets/d4f7206d27af4358acb70cb1cc819d10_0/explore?location=31.008846%2C-100.055172%2C6.287 June 2022
Road data for Oklahomahttps://okmaps.org/OGI/search.aspx19 June 2022ODOT Roadways; ODOT Highways; ODOT Local Roadways
Road data for Kentuckyhttps://transportation.ky.gov/Planning/Pages/Centerlines.aspx29 May 2022Centerline Network >All Roads
Road data for Arkansashttps://gis.arkansas.gov/product/arkansas-road-inventory/1 June 2023Updated 2020-10-30
Road data for Tennesseehttps://tn-tnmap.opendata.arcgis.com/datasets/37229399437446b9acd653f353f7decc_0/explore?location=35.785027%2C-85.962491%2C7.723 June 2022
Road data for Alabamahttps://data-algeohub.opendata.arcgis.com/search?groupIds=b54e33ef0a114bacb2fa059fc0bf134019 June 2022Need to download each county separately
Road data for Mississippihttps://www.maris.state.ms.us/HTML/DATA/data_Transportation/MDOTRoadCenterlines.html#gsc.tab=023 February 2022
Road data for Georgiahttps://www.sciencebase.gov/catalog/item/5a5f36bee4b06e28e9bfc1ba15 June 2022TRAN_Georgia_State_Shape > Shape/Trans_RoadSegment_0.shp; and TRAN_Georgia_State_Shape > Shape/Trans_RoadSegment_1.shp
Road data for Floridahttps://www.sciencebase.gov/catalog/item/5a86ea14e4b00f54eb3a1b5515 June 2022TRAN_Florida_State_Shape > Shape/Trans_RoadSegment_0.shp and TRAN_Florida_State_Shape > Shape/Trans_RoadSegment_1.shp; and TRAN_Florida_State_Shape > Shape/Trans_RoadSegment_2.shp
Road data for Louisianahttps://www.sciencebase.gov/catalog/item/5a5f36c4e4b06e28e9bfc1ca15 June 2022Trans_RoadSegment

References

  1. Beck, Z. Collaborative Search and Rescue by Autonomous Robots. Ph.D. Thesis, University of Southampton, Southampton, UK, 2016. [Google Scholar]
  2. Grogan, S.; Gamache, M.; Pellerin, R. The Use of Unmanned Aerial Vehicles and Drones in Search and Rescue Operations—A Survey. In Proceedings of the Pro-Log Project Logistic 2018, Hull, UK, 28–29 June 2018; pp. 1–20. [Google Scholar]
  3. Kashino, Z.; Nejat, G.; Benhabib, B. Multi-UAV Based Autonomous Wilderness Search and Rescue Using Target Iso-Probability Curves. In Proceedings of the 2019 International Conference on Unmanned Aircraft Systems (ICUAS), Atlanta, GA, USA, 11–14 June 2019; pp. 636–643. [Google Scholar] [CrossRef]
  4. Silvagni, M.; Tonoli, A.; Zenerino, E.; Chiaberge, M. Multipurpose UAV for Search and Rescue Operations in Mountain Avalanche Events. Geomat. Nat. Hazards Risk 2017, 8, 18–33. [Google Scholar] [CrossRef] [Green Version]
  5. Beck, Z.; Teacy, L.; Rogers, A. Online Planning for Collaborative Search and Rescue by Heterogeneous Robot Teams. In Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, Singapore, 9–13 May 2016; p. 9. [Google Scholar] [CrossRef]
  6. Beck, Z.; Teacy, W.T.L.; Rogers, A.; Jennings, N.R. Collaborative Online Planning for Automated Victim Search in Disaster Response. Robot. Auton. Syst. 2018, 100, 251–266. [Google Scholar] [CrossRef] [Green Version]
  7. Dominici, D.; Alicandro, M.; Massimi, V. UAV Photogrammetry in the Post-Earthquake Scenario: Case Studies in L’Aquila. Geomat. Nat. Hazards Risk 2017, 8, 87–103. [Google Scholar] [CrossRef] [Green Version]
  8. Golabi, M.; Shavarani, S.M.; Izbirak, G. An Edge-Based Stochastic Facility Location Problem in UAV-supported Humanitarian Relief Logistics: A Case Study of Tehran Earthquake. Nat. Hazards 2017, 87, 1545–1565. [Google Scholar] [CrossRef]
  9. Fernandes, O.; Murphy, R.; Merrick, D.; Adams, J.; Hart, L.; Broder, J. Quantitative Data Analysis: Small Unmanned Aerial Systems at Hurricane Michael. In Proceedings of the 2019 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR, Wurzburg, Germany, 2–4 September 2019; pp. 116–117. [Google Scholar] [CrossRef]
  10. Murphy, R.R.; Steimle, E.; Griffin, C.; Cullins, C.; Hall, M.; Pratt, K. Cooperative Use of Unmanned Sea Surface and Micro Aerial Vehicles at Hurricane Wilma. J. Field Robot. 2008, 25, 164–180. [Google Scholar] [CrossRef]
  11. Grogan, S.; Pellerin, R.; Gamache, M. Using Tornado-Related Weather Data to Route Unmanned Aerial Vehicles to Locate Damage and Victims. OR Spectr. 2021. [Google Scholar] [CrossRef]
  12. Grogan, S.; Perrier, N.; Gamache, M.; Pellerin, R. Location of Disaster Assessment UAVs Using Historical Tornado Data. Geomat. Nat. Hazards Risk 2022, 13, 2385–2404. [Google Scholar] [CrossRef]
  13. Breivik, Ø.; Allen, A.A.; Maisondieu, C.; Olagnon, M. Advances in Search and Rescue at Sea. Ocean. Dyn. 2013, 63, 83–88. [Google Scholar] [CrossRef] [Green Version]
  14. El-Tawil, S.; Aguirre, B. Search and Rescue in Collapsed Structures: Engineering and Social Science Aspects. Disasters 2010, 34, 1084–1101. [Google Scholar] [CrossRef] [PubMed]
  15. Mirowski, P.; Ho, T.K.; Saehoon, Y.; MacDonald, M. SignalSLAM: Simultaneous Localization and Mapping with Mixed WiFi, Bluetooth, LTE and Magnetic Signals. In Proceedings of the 2013 International Conference on Indoor Positioning and Indoor Navigation, Montbeliard, France, 28–31 October 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 1–10. [Google Scholar] [CrossRef]
  16. Liu, Z.; Chen, Y.; Liu, B.; Cao, C.; Fu, X. HAWK: An Unmanned Mini-Helicopter-Based Aerial Wireless Kit for Localization. IEEE Trans. Mob. Comput. 2014, 13, 287–298. [Google Scholar] [CrossRef]
  17. Acuna, V.; Kumbhar, A.; Vattapparamban, E.; Rajabli, F.; Guvenc, I. Localization of WiFi Devices Using Probe Requests Captured at Unmanned Aerial Vehicles. In Proceedings of the 2017 IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, CA, USA, 19–22 March 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1–6. [Google Scholar] [CrossRef]
  18. Afshartous, D.; Guan, Y.; Mehrotra, A. US Coast Guard Air Station Location with Respect to Distress Calls: A Spatial Statistics and Optimization Based Methodology. Eur. J. Oper. Res. 2009, 196, 1086–1096. [Google Scholar] [CrossRef]
  19. Jevtic, A.; Andina, D.; Jaimes, A.; Gomez, J.; Jamshidi, M. Unmanned Aerial Vehicle Route Optimization Using Ant System Algorithm. In Proceedings of the 2010 5th International Conference on System of Systems Engineering, Loughborough, UK, 22–24 June 2010; IEEE: Piscataway, NJ, USA, 2010; pp. 1–6. [Google Scholar] [CrossRef]
  20. Pasqualetti, F.; Durham, J.W.; Bullo, F. Cooperative Patrolling via Weighted Tours: Performance Analysis and Distributed Algorithms. IEEE Trans. Robot. 2012, 28, 1181–1188. [Google Scholar] [CrossRef] [Green Version]
  21. Zillies, J.; Westphal, S.; Scheidt, D. A Column Generation Approach for Optimized Routing and Coordination of a UAV Fleet. In Proceedings of the 2016 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR), Lausanne, Switzerland, 23–27 October 2016. [Google Scholar] [CrossRef]
  22. Bakhshipour, M.; Jabbari Ghadi, M.; Namdari, F. Swarm Robotics Search & Rescue: A Novel Artificial Intelligence-Inspired Optimization Approach. Appl. Soft Comput. 2017, 57, 708–726. [Google Scholar] [CrossRef]
  23. Ganesan, S.; Shakya, M.; Aqueel, A.F.; Nambiar, L.M. Small Disaster Relief Robots with Swarm Intelligence Routing; ACM Press: New York, NY, USA, 2011; p. 123. [Google Scholar] [CrossRef]
  24. Hayat, S.; Yanmaz, E.; Brown, T.X.; Bettstetter, C. Multi-Objective UAV Path Planning for Search and Rescue. In Proceedings of the 2017 IEEE International Conference on Robotics and Automation (ICRA), Singapore, 29 May–3 June 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 5569–5574. [Google Scholar] [CrossRef]
  25. Senthilkumar, K.; Bharadwaj, K. Multi-Robot Exploration and Terrain Coverage in an Unknown Environment. Robot. Auton. Syst. 2012, 60, 123–132. [Google Scholar] [CrossRef]
  26. Olson, E.; Strom, J.; Morton, R.; Richardson, A.; Ranganathan, P.; Goeddel, R.; Bulic, M.; Crossman, J.; Marinier, B. Progress toward Multi-Robot Reconnaissance and the MAGIC 2010 Competition. J. Field Robot. 2012, 29, 762–792. [Google Scholar] [CrossRef] [Green Version]
  27. Loukas, G.; Timotheou, S. Connecting Trapped Civilians to a Wireless Ad Hoc Network of Emergency Response Robots. In Proceedings of the 2008 11th IEEE Singapore International Conference on Communication Systems, Guangzhou, China, 19–21 November 2008; IEEE: Piscataway, NJ, USA, 2008; pp. 599–603. [Google Scholar] [CrossRef]
  28. Couceiro, M.S.; Rocha, R.P.; Ferreira, N.M.F. Ensuring Ad Hoc Connectivity in Distributed Search with Robotic Darwinian Particle Swarms. In Proceedings of the 2011 IEEE International Symposium on Safety, Security, and Rescue Robotics, Kyoto, Japan, 1–5 November 2011; IEEE: Piscataway, NJ, USA, 2011; pp. 284–289. [Google Scholar] [CrossRef]
  29. Fard, F.S.N.; Parvar, H.; Shiri, M.E.; Soleimani, E. Using Self-Configurable Particle Swarm Optimization for Allocation Position of Rescue Robots. In Proceedings of the Second International Conference on Computer and Network Technology, Bangkok, Thailand, 23–25 April 2010; IEEE: Piscataway, NJ, USA, 2010; pp. 362–366. [Google Scholar] [CrossRef]
  30. Tang, J.; Chen, X.; Zhu, X.; Zhu, F. Dynamic Reallocation Model of Multiple Unmanned Aerial Vehicle Tasks in Emergent Adjustment Scenarios. IEEE Trans. Aerosp. Electron. Syst. 2022, 1–43. [Google Scholar] [CrossRef]
  31. Tang, J.; Liu, G.; Pan, Q. A Review on Representative Swarm Intelligence Algorithms for Solving Optimization Problems: Applications and Trends. IEEE/CAA J. Autom. Sin. 2021, 8, 1627–1643. [Google Scholar] [CrossRef]
  32. Couceiro, M.S.; Rocha, R.P.; Ferreira, N.M. A PSO Multi-Robot Exploration Approach over Unreliable MANETs. Adv. Robot. 2013, 27, 1221–1234. [Google Scholar] [CrossRef]
  33. Choi, S.; Zhu, W. Performance Optimisation of Mobile Robots for Search-and-Rescue. Appl. Mech. Mater. 2012, 232, 403–407. [Google Scholar] [CrossRef]
  34. Mouradian, C.; Sahoo, J.; Glitho, R.H.; Morrow, M.J.; Polakos, P.A. A Coalition Formation Algorithm for Multi-Robot Task Allocation in Large-Scale Natural Disasters. In Proceedings of the 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, 26–30 June 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1909–1914. [Google Scholar] [CrossRef] [Green Version]
  35. Straub, J.; Marsh, R.; Mohammad, A.F. Robotic Disaster Recovery Efforts with Ad-Hoc Deployable Cloud Computing. Proc. SPIE 2013, 8711, 87110Q. [Google Scholar] [CrossRef]
  36. Pineda, L.; Takahashi, T.; Jung, H.T. Continual Planning for Search and Rescue Robots. In Proceedings of the 2015 IEEE-RAS 15th International Conference on Humanoid Robots (Humanoids), Seoul, Republic of Korea, 3–5 November 2015; IEEE: Piscataway, NJ, USA, 2015. [Google Scholar] [CrossRef]
  37. Sardouk, A.; Mansouri, M.; Merghem-Boulahia, L.; Gaiti, D.; Rahim-Amoud, R. Multi-Agent System Based Wireless Sensor Network for Crisis Management. In Proceedings of the IEEE Globecom 2010, Miami, FL, USA, 6–10 December 2010; IEEE: Piscataway, NJ, USA, 2010; pp. 1–6. [Google Scholar] [CrossRef]
  38. Center, S.P. Storm Prediction Center Severe Weather GIS (SVRGIS) Page. 2022. Available online: https://www.spc.noaa.gov/gis/svrgis/ (accessed on 20 July 2022).
Figure 1. An example of a tornado damage area (cyan) and a SBW (red).
Figure 1. An example of a tornado damage area (cyan) and a SBW (red).
Applsci 13 04178 g001
Figure 2. Example of waypoints in the vicinity of the tornado, Green dots represent waypoints within the damage, blue dots represent waypoints within the search area that do not correspond to damage, and orange dots represent waypoints outside the damage area and outside the search area. Note: the size of the waypoints are not to the scale of r s c a n .
Figure 2. Example of waypoints in the vicinity of the tornado, Green dots represent waypoints within the damage, blue dots represent waypoints within the search area that do not correspond to damage, and orange dots represent waypoints outside the damage area and outside the search area. Note: the size of the waypoints are not to the scale of r s c a n .
Applsci 13 04178 g002
Figure 3. Decision tree for determining the base score of a waypoint; once the waypoint has been visited (i.e., the right, orange part of the, the score is fixed for the remainder of the scenario).
Figure 3. Decision tree for determining the base score of a waypoint; once the waypoint has been visited (i.e., the right, orange part of the, the score is fixed for the remainder of the scenario).
Applsci 13 04178 g003
Figure 4. Visual samples of an “influence matrix” for a random waypoint (in blue) where yellow dots indicate high influence (close to 1.0), red dots indicate a lower influence (close to 0.0), and black dots indicate no influence (that is, 0.0).
Figure 4. Visual samples of an “influence matrix” for a random waypoint (in blue) where yellow dots indicate high influence (close to 1.0), red dots indicate a lower influence (close to 0.0), and black dots indicate no influence (that is, 0.0).
Applsci 13 04178 g004
Figure 5. Visual samples of an “Data-driven influence matrix” for a random waypoint (in blue) where yellow dots indicate high influence (close to 1.0), red dots indicate a lower influence (close to 0.0), and black dots indicate no influence (that is, 0.0).
Figure 5. Visual samples of an “Data-driven influence matrix” for a random waypoint (in blue) where yellow dots indicate high influence (close to 1.0), red dots indicate a lower influence (close to 0.0), and black dots indicate no influence (that is, 0.0).
Applsci 13 04178 g005
Figure 7. How waypoints enroute to the next waypoint are selected and routed; orange arrows is the route as traveled by the UAV, and purple is the determined route between k to k + 1 waypoint.
Figure 7. How waypoints enroute to the next waypoint are selected and routed; orange arrows is the route as traveled by the UAV, and purple is the determined route between k to k + 1 waypoint.
Applsci 13 04178 g007
Table 1. Assessment of quality of method.
Table 1. Assessment of quality of method.
Initial Route?Matrix TypeMStCMean ScoreStd Dev.
FALSEdata-driven-first0.103.25961.8526
TRUEsymmetric0.203.32823.1588
FALSEdata-driven-first0.003.36952.1064
FALSEsymmetric0.103.38832.6931
FALSEdata-driven-first0.203.41282.5698
TRUEsymmetric0.003.41983.5320
FALSEsymmetric0.203.43292.3417
TRUEsymmetric0.103.44224.1455
FALSEsymmetric0.003.46423.1460
TRUEdata-driven0.103.87323.1936
TRUEdata-driven0.203.88603.0132
FALSEdata-driven0.203.93053.7456
TRUEdata-driven0.003.95453.2255
FALSEsymmetric-first0.103.97033.7709
FALSEdata-driven0.104.00583.8564
FALSEsymmetric-first0.204.05163.8829
FALSEdata-driven0.004.06984.3266
FALSEsymmetric-first0.004.12964.9137
Table 2. Scores of finding damage.
Table 2. Scores of finding damage.
Initial Route?Matrix TypeMStCMean ScoreScore
Find Damage
FALSEdata-driven-first0.203.41287592
FALSEdata-driven0.203.93057592
FALSEdata-driven-first0.103.25967614
FALSEdata-driven0.104.00587614
FALSEdata-driven-first0.003.36957733
FALSEdata-driven0.004.06987733
FALSEsymmetric0.103.38838001
FALSEsymmetric-first0.103.97038001
FALSEsymmetric0.203.43298043
FALSEsymmetric-first0.204.05168043
FALSEsymmetric0.003.46428071
FALSEsymmetric-first0.004.12968071
TRUEsymmetric0.203.32829377
TRUEsymmetric0.103.44229377
TRUEsymmetric0.003.41989377
TRUEdata-driven0.103.87329377
TRUEdata-driven0.203.88609377
TRUEdata-driven0.003.95459377
Table 3. Scores of finishing the route.
Table 3. Scores of finishing the route.
Initial Route?Matrix TypeMStCMean ScoreScore
Finish Route
TRUEsymmetric0.203.328236,269
TRUEdata-driven0.203.886036,619
FALSEdata-driven0.203.930538,403
FALSEsymmetric-first0.204.051638,469
TRUEsymmetric0.103.442240,480
FALSEdata-driven-first0.203.412841,301
FALSEsymmetric0.203.432941,349
TRUEdata-driven0.103.873243,395
FALSEsymmetric-first0.103.970348,069
FALSEdata-driven0.104.005848,101
FALSEdata-driven-first0.103.259649,230
FALSEsymmetric0.103.388349,263
TRUEsymmetric0.003.419850,218
FALSEsymmetric0.003.464260,850
TRUEdata-driven0.003.954560,895
FALSEdata-driven-first0.003.369560,926
FALSEsymmetric-first0.004.129664,801
FALSEdata-driven0.004.069865,037
Table 4. Assessment of quality of method, historical cases.
Table 4. Assessment of quality of method, historical cases.
Initial Route?Matrix TypeMStCMean ScoreStd Dev.
FALSEdata-driven-first0.206.38174.6151
FALSEsymmetric0.206.50514.3033
FALSEdata-driven-first0.106.76035.0457
FALSEsymmetric0.106.77774.6675
FALSEsymmetric0.007.15675.3666
FALSEdata-driven-first0.007.16785.3796
TRUEsymmetric0.207.484114.1935
TRUEsymmetric0.108.041016.4381
TRUEsymmetric0.009.220818.1696
TRUEdata-driven0.2010.036013.7550
FALSEdata-driven0.2011.170512.5204
FALSEsymmetric-first0.2011.475313.2841
TRUEdata-driven0.1011.690118.0052
FALSEdata-driven0.1012.032013.8424
FALSEsymmetric-first0.1012.119714.4577
FALSEsymmetric-first0.0012.892315.4161
FALSEdata-driven0.0012.956414.8083
TRUEdata-driven0.0015.376833.8396
Table 5. Scores of finding damage, historical cases.
Table 5. Scores of finding damage, historical cases.
Initial Route?Matrix TypeMStCMean ScoreScore
Find Damage
FALSEdata-driven-first0.206.3817615
FALSEdata-driven0.2011.1705615
FALSEsymmetric0.206.5051641
FALSEsymmetric-first0.2011.4753641
FALSEdata-driven-first0.106.7603666
FALSEdata-driven0.1012.0320666
FALSEsymmetric0.106.7777684
FALSEsymmetric-first0.1012.1197684
FALSEsymmetric0.007.1567702
FALSEsymmetric-first0.0012.8923702
FALSEdata-driven-first0.007.1678709
FALSEdata-driven0.0012.9564709
TRUEsymmetric0.207.4841814
TRUEsymmetric0.108.0410814
TRUEsymmetric0.009.2208814
TRUEdata-driven0.2010.0360814
TRUEdata-driven0.1011.6901814
TRUEdata-driven0.0015.3768814
Table 6. Scores of finishing the route, historical cases.
Table 6. Scores of finishing the route, historical cases.
Initial Route?Matrix TypeMStCMean ScoreScore
Finish Route
TRUEsymmetric0.207.48413456
FASLEdata-driven-first0.206.38173631
FASLEsymmetric0.206.50513658
TRUEdata-driven0.2010.03603984
TRUEsymmetric0.108.04104083
FASLEdata-driven0.2011.17054206
FASLEsymmetric-first0.2011.47534261
FASLEdata-driven-first0.106.76034481
FASLEsymmetric0.106.77774517
TRUEdata-driven0.1011.69014816
FASLEdata-driven0.1012.03205304
FASLEsymmetric-first0.1012.11975347
FASLEdata-driven-first0.007.16786890
FASLEsymmetric0.007.15676892
TRUEsymmetric0.009.22087255
TRUEdata-driven0.0015.37688172
FASLEsymmetric-first0.0012.89238194
FASLEdata-driven0.0012.95648203
Table 7. Summary and comparison of historical and generated cases.
Table 7. Summary and comparison of historical and generated cases.
GoalIn Generated CasesIn Historical Cases
Minimize the distance/time it takes to uncover extent of tornadoUse data-driven-first or symmetric influence matrixUse data-driven-first or symmetric influence matrix
Reduce the standard deviation of distance/time it takes to uncover extent of tornadoUse data-driven-first matrix and not using an initial routeDo not use an initial route and use a data-driven-first or symmetric influence matrix
Minimize the distance/time it takes to initially identify tornado damageUse data-driven-first or data-driven matrix Do not use an initial route and all else being equal a higher MStC helpsDo not use an initial route Use a higher MStC
Minimize the distance/time it takes to complete the missionUse a higher MStC Using an initial routeUse a higher MStC
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Grogan, S.; Gamache, M.; Pellerin, R. Using Historical Data to Dynamically Route Post-Disaster Assessment Unmanned Aerial Vehicles in the Context of Responding to Tornadoes. Appl. Sci. 2023, 13, 4178. https://doi.org/10.3390/app13074178

AMA Style

Grogan S, Gamache M, Pellerin R. Using Historical Data to Dynamically Route Post-Disaster Assessment Unmanned Aerial Vehicles in the Context of Responding to Tornadoes. Applied Sciences. 2023; 13(7):4178. https://doi.org/10.3390/app13074178

Chicago/Turabian Style

Grogan, Sean, Michel Gamache, and Robert Pellerin. 2023. "Using Historical Data to Dynamically Route Post-Disaster Assessment Unmanned Aerial Vehicles in the Context of Responding to Tornadoes" Applied Sciences 13, no. 7: 4178. https://doi.org/10.3390/app13074178

APA Style

Grogan, S., Gamache, M., & Pellerin, R. (2023). Using Historical Data to Dynamically Route Post-Disaster Assessment Unmanned Aerial Vehicles in the Context of Responding to Tornadoes. Applied Sciences, 13(7), 4178. https://doi.org/10.3390/app13074178

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop