Next Article in Journal
Value-Oriented Requirements: Eliciting Domain Requirements from Social Network Services to Evolve Software Product Lines
Previous Article in Journal
Does Apical Papilla Survive and Develop in Apical Periodontitis Presence after Regenerative Endodontic Procedures?
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cooperative Multi-UAV Collision Avoidance Based on a Complex Network

College of Systems Engineering, National University of Defence Technology, Changsha 410073, China
*
Authors to whom correspondence should be addressed.
Appl. Sci. 2019, 9(19), 3943; https://doi.org/10.3390/app9193943
Submission received: 15 August 2019 / Revised: 14 September 2019 / Accepted: 16 September 2019 / Published: 20 September 2019

Abstract

:
The conflict resolution problem in cooperative unmanned aerial vehicle (UAV) clusters sharing a three-dimensional airspace with increasing air traffic density is very important. This paper innovatively solves this problem by employing the complex network (CN) algorithm. The proposed approach allows a UAV to perform only one maneuver—that of the flight level change. The novel UAV conflict resolution is divided into two steps, corresponding to the key node selection (KS) algorithm based on the node contraction method and the sense selection (SS) algorithm based on an objective function. The efficiency of the cooperative multi-UAV collision avoidance (CA) system improved a lot due to the simple two-step collision avoidance logic. The paper compares the difference between random selection and the use of the node contraction method to select key nodes. Experiments showed that using the node contraction method to select key nodes can make the collision avoidance effect of UAVs better. The CA maneuver was validated with quantitative simulation experiments, demonstrating advantages such as minimal cost when considering the robustness of the global traffic situation, as well as significant real-time and high efficiency. The CN algorithm requires a relatively small computing time that renders the approach highly suitable for solving real-life operational situations.

1. Introduction

Collision is an inherent problem in unmanned aerial vehicle (UAV) systems [1,2,3,4,5,6]. Path planning is important in performing different tasks. Therefore, the demand for the collision avoidance (CA) of UAVs has emerged. With increasing UAV cluster densities, it has become more difficult to perform multi-UAV collaborative tasks, especially if collision avoidance requirement cannot be met. Therefore, the effective planning of flight trajectories and collision avoidance among UAV flight trajectories has become critical in UAV clusters for safe and smooth operation [7].
Various conflict detection and resolution (CDR) theories with different techniques have been proposed to solve this problem. In conventional aviation, several widely used CA systems exist. For example, the traffic alert and CA system (TCAS) is recognized worldwide as an airborne collision avoidance system, and it is the last line of the CDR approach. Technological development has enabled the increase in air traffic density to be mitigated [8,9]. Many studies regarding UAV collision avoidance have been performed in recent years [10,11,12]. CDR and the optimization of different resolutions have been discussed widely by many researchers and practitioners. These methods can be classified into two primary types of algorithms: Geometric and path planning. Geometric algorithms focus on analyzing the relationship between UAVs and intruders within a specific space to implement passive CA operations. Meanwhile, path planning algorithms focus on obtaining a path for an optimal connection between the start and end points with minimal security constraints [13,14,15]. Dimensionality, direction selection, the number of participants, and resolutions are four key elements that should be considered for a UAV’s CDR. A detailed summary of publications regarding the different methods of CA is provided in Table 1.
Geometric algorithms exploit state information such as the location, velocity, and the heading of UAVs and intruders to geometrically perform the CA operation. Park, Oh, and Tahk (2008) [16] demonstrated a typical example of this approach, in which a single resolution maneuvering logic called ‘vector sharing resolution’ was proposed. This method calculates the subtraction of two UAVs’ movement vectors in a two-dimensional space and adjusts the trajectories of the UAVs based on the shortest distance vector obtained. Another instant of this method can be found in [17] by Chakravarthy et al. In contrast, this paper solves the problem of obstacles being irregular objects. A collision cone approach is employed by which the irregularly shaped moving objects can be modelled through general quadric surfaces and dynamic inversion-based avoidance strategies can be derived. The limitations of this type of method is the need for information from the intruder UAV, as well as sensitivity to noise from the input data of the sensors.
Path planning algorithms include sampling-based, artificial heuristic, numerical optimization, and decoupled path planning approaches. Each method exhibits its own strength over others in certain aspects. The philosophy of sampling-based approaches is transforming the path-planning problem to obtain a suitable problem from a limited quantity of candidates that is a continuous state space. Lin and Saripalli (2017) [18] presented a method based on the closed-loop rapidly exploring random tree algorithm and three variations of it. Artificial heuristic approaches are highly advantageous during the optimization process, and typical methods include the genetic algorithm [19], particle swarm optimization [20], and artificial bee colony optimization [21]. Numerical optimization approaches rely on some geometric trajectory calculations and aim to obtain an optimal path with respect to a specific objective in the solution sense. The relevant methods include mixed integer linear programming [22], nonlinear programming [23], Dynamic programming [24], quadratic programming [25], and Pontryagin’s minimum principle [26]. In decoupled path planning approaches, the basic principle involves obtaining an optimal trajectory under the specific constraints in the first phase; subsequently, the trajectory has to be steered out of the dangerous region. The A*(A-Star) search algorithm was applied to obtain a solution in [27]. The Coronoid graph can be used to generate an initial path that can be subsequently refined by curve fitting with curvature and other constrains [28]. The concepts of space–time reachability of aircraft and space–time potential conflict space were proposed in [29] to consider the uncertainty of the pilot intent. The conflict resolution problem was modeled as a constraint optimization problem in [30,31]. Based on the Single European Sky Air Traffic Management Research and Next Generation Air Transportation System initiatives, [32] proposed a new separation management service to shift the centralized air traffic control interventions to more efficient decentralized tactical operations based on a surrounding traffic analysis tool.
The rapid development of real-time communication technology has made real-time communication between UAVs possible. Therefore, this paper was able to consider using the real-time information of UAV to prevent collision. It is a great idea to use a complex network to analyze the nature of a system. Networks are everywhere, including the internet, electric power grids, supply chains, urban road networks, and the world trade web [33]. The work already done has mainly been about preventing networks from being destroyed [33]. The collision avoidance network is exactly the opposite of most networks, and it is necessary to destroy the network as soon as possible. The collision avoidance based on a complex network (CACN) model grounds the generation of optimal direction changes of the objective function, which integrates the number of intruder UAVs of designated direction, the robustness of the network, and the connected components of the network. The CACN strategy can reduce the domino effect to a certain extent thus improve computational consuming time. In particular, the generated points by the CACN model are recorded and can be further analyzed.
The layout of this paper is as follows. Section 2 describes the CA system architecture; Section 3 illustrates the key node selection algorithm and the sense selection algorithm; Section 4 shows the simulation experiments and analyzes the experimental results; finally, conclusions and prospects for future research are summarized in Section 5.

2. The Proposed Collision Avoidance System Architecture

Many algorithms in the collision avoidance system support its operation. The core step of the system is to process the information of each trajectory input, which is the four-dimensional (three-dimensional (3D) position + time) information of each UAV, and an analysis on whether any threat is present in the next time interval. If a threat is detected, the system immediately reacts to calculate a suitable CA strategy. The instructions are subsequently communicated to each UAV to synergistically resolve the current threat.
The distributed dynamic optimization approach (DDOA) is used to generate suitable direction changes for the UAVs such that the problem of CA can be mitigated. The core of this approach consists of two parts: The conflict detection (CD) module is used to forecast the threats, and the conflict resolution (CR) module is applied to resolve the detected conflicts. The complex network (CN) aims to avoid collisions by choosing the suitable UAV and the corresponding UAV with a local optimization scope. The CN algorithm only allows for one UAV to perform conflict resolution at one time, which is the principle of DDOA.

3. Core Algorithm Analysis

This section describes the complex network model for UAV collision avoidance system and the collision avoidance algorithm in detail. The collision avoidance algorithm consists of two parts: The key node selection algorithm and the collision avoidance direction-selection algorithm.

3.1. Representation of Cooperative UAV Flight and Conflict Detection

The background of the problem is that when large scale UAV clusters meet, it is very likely that conflicts will occur. For simplicity, weather perturbations are not discussed when analyzing the trajectories. UAVs share a common airspace in the same or different flight levels, and a UAV cluster can be considered safe only if the separation between each UAV is larger than the given safety distance. A sequence of discrete points is used to model the trajectories of the UAV, and speed information can also be obtained from these discrete tracking points.
Because UAV clusters frequently experience threats, and some threats are regarded as potential threats, it is more efficient to perform one resolution at a time rather than comprehensively considering each threat. By constructing a complex network of UAV groups and analyzing the nature of the network under threat conditions to determine the appropriate CA strategy, the human–machine group can self-organize CA under the condition of performance constraints, thus significantly improving the real-time performance and applicability of CA in UAV clusters.
The key node in the complex network theory exhibits important properties [33,34,35,36], and it exhibits the greatest effect on the entire complex network system. The UAV CA algorithm based on the complex network proposed herein considers the safety indicators of the UAV group system at each moment, such that the overall safety of the entire flight process is maximized. The CA system consists of two key algorithms: A key node selection algorithm and a collision direction-selection algorithm. The algorithm expresses the threat between the UAVs using a complex network. The UAV network model is established based on three parameters: Flight speed, flight angle, and security zone. In a real-time communication environment, all UAVs fly toward a given target and must perform CA operations. Each UAV owns a flight trajectory control module, and the CA resolution calculated by the CA system interacts with the surrounding UAVs through real-time data links.
The UAV node is used to indicate that the state of the UAV is monitored by the system in real time. Its attributes are expressed as {UAV, velocity, position, angle, t, state, sense, strength, approaching time, time cost, key-node}. The UAV indicates the UAV number, velocity indicates the UAV speed, position indicates the current position of the UAV, angle indicates UAV flight angle, t indicates the current time of the UAV, state indicates the UAV flight status, ‘sense’ indicates that the UAV collision direction is selected, ‘strength’ indicates the change direction of the UAV, ‘approaching time’ indicates the remaining time of the UAV approaching the nearest point, ‘time cost’ indicates the entire flight time consumption, and ‘key-node’ indicates whether the UAV was selected as a key node.
To detect collisions, UAVs are identified in the Cartesian system. The motion of each UAV is driven by the following:
R i ( t ) = [ r x , i ( t ) r y , i ( t ) r z , i ( t ) ] , V i ( t ) = R ˙ i ( t ) = [ r ˙ x , i ( t ) r ˙ y , i ( t ) r ˙ z , i ( t ) ] = [ v i ( t ) cos φ i t cos θ i t v i ( t ) cos φ i t sin θ i t v i ( t ) sin φ i t ]
In the above formula, R i ( t ) and V i ( t ) are defined as the position vector and speed vector, respectively, of U A V i at time t . The foot mark i represent i-th UAV. The subscript indicates the horizontal axis system and refers to the height. Let θ i t designate the horizontal angle which is the direction of speed V i ( t ) in the x y plane (counter-clockwise along the x axis). Let φ i t represent the angle of climb, which is the direction of speed V i ( t ) in the vertical plane (measured from the x y plane, with positive being the upwards direction and negative being the downwards direction).
The maximum climb (tilt) angle, which is determined by the performance of the UAV, is defined to limit the maximum angle at which the UAV will rise and fall in the vertical plane when performing a CA mission, thus setting the maximum pitch change angle. The constraint can be expressed as follows:
φ i , min φ i ( t ) φ i , max
The collection of points in the next time step is as follows:
P ( i ) = { s V | R i R s = v t ; φ max = arg sin ( | z i z s | / R i R s ) }
Note that z i and z s are defined as the current attitude of U A V i and the candidate attitude of U A V i in the next time step, respectively. The symbols v and t refer to the absolute velocity of UAVs and time interval of each time step, respectively.
When the first pair of UAVs involved in the conflict is detected, each UAV maintains its speed before the first pair of UAVs reaches the danger point to simplify the conflict situation. To determine if a threat of conflict exists, the scope and vertical criteria must be met. This time interval is defined as the time closest to the point of approach (CPA) on the horizontal plane:
T h , i j t = | r h , i t r h , j t | | v h , i t v h , j t | cos ( α i j t β i j t ) , ( r h , i j t v h , i j t < 0 )
α i j t = arctan ( | r x , i j t | / | r y , i j t | )
β i j t = arctan ( | v x , i j t | / | v y , i j t | )
The formula defines T h , i j t as the time to CPA in the case of a horizontal plane between U A V i and U A V j at time t . The subscript h indicates the horizontal plane, while i and j indicate the serial numbers of the UAVs. The equation is defined on the condition that the denominator is not equal to zero. The following equation is defined as the time CPA in the case of a vertical plane:
T z , i j t = | r z , i j t | | v z , i j t | , ( r z , i j t v z , i j t < 0 )
A traffic alert (TA) event will be triggered if the following conditions are satisfied:
( 0 < T h , i j t < T T A ) ( 0 < T z , i j t < T T A ) ( D h , i j t + T h , i j t < D M O R R A ) ( D z , i j t + T h , i j t < Z T H R R A )
D M O R R A and Z T H R R A are the range and altitude limit values for safe aviation, respectively, in case of the appearance of slow-closure-rate encounters which make the time threshold values not feasible. D h , i j t + T h , i j t and D z , i j t + T h , i j t are the horizontal and vertical distances between U A V i and U A V j at CPA, respectively. We used the time when the first pair of U A V s triggers a TA alert. From that moment, we built a network where each UAV is represented as a node. If a pair of nodes collides, the node will establish a connection. At that moment, all nodes in the system will verify if they are approaching; if they are approaching each other, the two nodes are connected:
( r h , i j t v h , i j t < 0 ) ( r z , i j t v z , i j t < 0 )
In the case of a pair of UAVs, CA is based on the following principles. As shown in Figure 1, U A V 1 cruises from the right side to the left side, whereas U A V 2 and U A V 3 cruise from the left side to the right side. At this time, U A V 1 is selected as the key node. According to the scene at this time, the direction of the CA direction and the target point at the time of the predicted CPA choosing an upward climb or a downward climb may be selected. Furthermore, U A V 2 and the U A V 3 must maintain the minimum safety altitude-limitation. The specific key node selection methods and direction selection strategies are discussed later.

3.2. Key Node Selection

The first problem to solve in an encounter is choosing a key UAV to amend its trajectory to avoid collision. The method proposed herein decides the priority of the UAVs via the analysis of the network formed in the collision space. The most threatened one is chosen as the key node. Obviously, the UAV with the higher priority performs collision avoidance operations first.
To clarify, it is necessary to define the collision space. When the system detects a pair of UAVs exhibiting a collision risk, the system obtains all the possible UAV numbers to be hit in the future through global data analysis, and then it obtains the status of the corresponding UAV. The airspace formed by these UAVs is called the collision space. Among them, a connection exists between UAVs that are at the risk of collision, and a network is formed for analysis. An adjacency matrix is applied to record the status between the UAVs. The node represents the UAV, and the edge represents the relationship between the UAVs. A set is defined to contain the nodes that satisfy the condition. As shown in Figure 2, the nodes represent the corresponding UAVs.
After the network is completed, a network description is established to describe the internal characteristics of the multi-UAV system. The nodes in the network exhibit different properties, because the position and velocity are different and the degree of threat is different. Thus, the key node can be chosen according to its properties.
First, the easiest method to measure the degree of threat of the UAVs is by examining the situation of the connected edges in the network; this is called the key node selecting method based on degree. To render the network closer to the real scene, it is insufficient to only use the number of edges. The degree approach requires more detailed information, and the edge is a good choice. The edges should contain extra properties to monitor the true relationship of the UAVs. The relationship includes the distance and relative speed between UAVs. The closer a pair of UAVs is to each other, the more dangerous they are. Therefore, the weight of each side depends on the relative distance and relative speed between the UAVs, which is defined as the edge weight between the UAVs:
ω i j = υ i j d i j | d i j | | d i j |
where υ i j is the relative speed of the vector direction, and d i j represent the distance between the UAVs. This implies that the faster the two UAVs approach each other, the greater is the weight of the edge between the two UAVs. The degree of importance of each node can be based on the weight of all edges. The summed value represents the degree of importance of the node.
There are many other methods to rank the importance of nodes [34,37]. Another improved method based on node contraction [38] proposed herein aims to excavate the deeper threat of the UAV networks. There are three reasons for using the node contraction method in selecting the key node: First, the principle of key node selection is to fully exploit the importance of the node, for which the network cohesion is a good measure. The choice of key nodes is not only related to the current degree, it is also to the location of the node. If the node is in the fortress position, shrinking the node will result in a much smaller average path length of the network, resulting in greater network cohesion. This method to obtain key nodes is consistent with the key node selection requirements of the UAV group in performing CA operations, i.e., to determine the current and potential threats of the drone to perform CA. Second, the node contraction method has a shorter calculation time than the node deletion method and the median method, and it does not exponentially increase when the number of nodes is small. Finally, the original method of selecting the key nodes has its limitations, and the changes in the structure of the cluster cannot be detected well. Therefore, this method is not considered for some structurally important points.
Notation
Sets:
  • U = { u 1 , u 2 , u 3 , , u n } sets of node representing UAV flying in the air sector under control.
  • C = { c 1 , c 2 , c 3 , , c n } U × U , sets of edge implying pairs of UAV that are potentially in conflict.
  • V = { v 1 , v 2 , v 3 , , v n } U × U , sets of relative velocity between UAVs.
  • G = ( U , C ) , graph representing the complex network of the UAV group.
Matrix:
  • W = [ ω i j ] the threat matrix implying the degree of threat between pairs of UAVs.
  • H = [ h i j ] the adjacency matrix of graph G.
  • D = [ d i j ] matrix that store the relative distance between UAVs.
Variables:
  • l ( G ) : The average distance of graph G.
  • u i : Node that is chosen to be removed.
First, the UAV group is modelled, the UAV is replaced by a node, and the threatened UAV pairs are connected. Subsequently, the complex network can be represented by G = ( U , C ) where G is an undirected connected graph. We assume n nodes and m edges exist, and we represent n UAVs and m threats among them, respectively.
The threat coefficient ω i j = v i j / d i j shows the degree of threat between U A V i and U A V j , where v i j represents the projection value of the relative speed between U A V i and U A V j on its relative position, and d i j represents the relative position between U A V i and U A V j .
Definition 1.
ω i j is defined as follows:
ω i j = { υ i j d i j | d i j | | d i j | , υ i j d i j | d i j | | d i j | > 0 0 , υ i j d i j | d i j | | d i j | > 0
The adjacency matrix of graph G is represented by H = [ h i j ] ; it containsnrows andncolumns. The element h i j is defined as follows:
h i j = { 1 ,   0 < d i j < 0 , d i j =
The network cohesion is defined below. The degree of network cohesion depends on the connectivity of each node in the network, calculated using the arithmetic mean of the shortest distance between all pairs of nodes. The degree of network cohesion is still related to the density of the network; this is because in the UAV network, the more the number of UAVs, the greater is the threat of the entire network and the greater is the network cohesion.
The cohesion of graph G is defined as follows:
[ G ] = ω n l = i j U ω i j n i j U d i j n ( n 1 ) = ( n 1 ) i j U ω i j i j U d i j
The following equation shows the importance of node u i [38]:
I M ( u i ) = 1 [ G ] [ G u i ] = 1 ω n n l ( G ) ω n k i ( n k i ) l ( G u i ) = n l ( G ) ω n k i ( n k i ) l ( G u i ) ω n n l ( G ) ω n k i
Because l ( G u i ) < l ( G ) ,   k i > 1 ,   ω n < ω n k i , the following inequality 0 < I M ( u i ) < 1 can be achieved.
The algorithm is as follows: [38]:
Input: H , W
Output: I M
Step 1: Calculate the shortest relation distance matrix D = [ d i j ] for all pairs of UAV nodes;
Step 2: Calculate the initial cohesion of the UAV network;
Step 3: Assess the node importance of all UAV nodes.
Step 4: Calculate the network cohesion [ G u i ] after the node u i shrinks by calculating the shortest distance matrix D i and the threat matrix W i between the node pairs after contraction, thereby obtaining I M ( u i ) .
As shown in the algorithm steps above, the time complexity of the whole algorithm depends on the calculation of the shortest distance matrix D between all pairs of nodes after the node shrinks, because the calculation of the threat matrix W i only requires the deletion of the nodes around the current node u i . Because the time complexity of the Floyd algorithm is O ( n 3 ) , the complexity of the algorithm will reach O ( n 4 ) , owing to the need to shrink the operation of each node. The algorithm for calculating D i given below is based on the initial matrix; the calculation can be completed with a small number of operations, and the time complexity of the entire algorithm will reduce to O ( n 3 ) .
The direct distance matrix S = [ s i j ] n × n can be obtained by the adjacency matrix H = [ h i j ] .
At this point, the change law of the shortest distance d p q relative to d p q between any pair of nodes ( u p , u q ) U × U in the UAV network is as follows:
(1)
If u p u i and u q u i :
If d p i + d i q = d p q , it is implied that node u i is on the shortest path between node u p and node u q ; then, d p q = d p q 1 ;
If d p i + d i q d p q + 1 , it is implied that node u i is not on the shortest path between node u p and node u q ; then d p q = d p q .
(2)
If only one node u i exists between node u p and node u q , then d p q = d p q 1 ;
(3)
If u p = u q = u i , then d p q = d p q = 0 .

3.3. Direction of Collision Avoidance

Most of the CA systems use the upward or downward strategy to avoid collision. The sense selection can reduce the domino effect. For instance, two new encounters will occur if the key UAV descends, and three will occur if it climbs. The implementation of airborne CA systems II (ACAS II) [39] indicates that it is effective and safe to perform resolution in the vertical direction; therefore, the method of this paper only considered the vertical change in direction. As shown in Figure 3, the key node direction choosing method was as follows.
To generate a suitable direction for CA, we expect the UAV cluster system to minimize the cost and to choose the fastest method to reach the target, and we expect the domino effect to be as small as possible in the CA process. The objective function for direction choosing should include three elements:
(1)  The Number of Intruder UAV Designated Directions
Z k ( m ) = i = i n sgn ( x k ( i ) ) ,   x k ( i ) = { 1 , z i > z k 1 , z i z k
(2)  Network Robustness
Complex networks rely on their robustness, i.e., the ability of a network to maintain its connectivity when a fraction of its vertices is damaged, for their function and performance [40]. In the context of this new conflict model, it is important to improve reliability as much as possible. The robustness of the edge connection is defined as follows:
R k ( m ) = R ( I m N m ) = M m N m I ,   M = i = 1 n j = 1 n ω i j 2 ,   ω i j = υ i j d i j
(3)  Connected Component of the Network
C k ( m ) = C ( I m N m ) = C m N m I m
N m stand for N nodes in the network at time m, I m is the number of nodes that are rejected in the network at time m, and C m represents the number of sub-maps of the network.
In summary, the objective function at time m consists of three elements and is represented as follows:
O k ( m ) = ω 1 Z k ( m ) + ω 2 R k ( m ) + ω 3 C k ( m )
In this formula, ω 1 , ω 2 , and ω 3 are the corresponding weight coefficients of the three indicators. Different weights satisfy the requirements of different scenarios of CA. For instance, if ω 2 < ω 3 , it is implied that the connected component is more important than the robustness of the network. It is noteworthy that a normalization process is required in this computation.
Assuming that the direction is amended to avoid the collision in the period [ m , m + N 1 ] and the corresponding position and pitch angle sequences of UAV k are, respectively,
p k = [ p k ( m ) , p k ( m + 1 ) , , p k ( m + N 1 ) ] T
ψ k = [ ψ k ( m ) , ψ k ( m + 1 ) , , ψ k ( m + N 1 ) ] T
the following constraints of the optimization process should be satisfied:
q ( φ k ( m + t ) ) = [ 1 1 ] ( φ k ( m + t ) φ k ( m + t ) ) [ B A ] 0
e k ( p k ( m + t ) ) = [ x k ( m + t ) [ x k ( m ) + v k cos ( φ k ( m ) ) cos θ k t ] y k ( m + t ) [ y k ( m ) + v k cos ( φ k ( m ) ) sin θ k t ] z k ( m + t ) [ z k ( m ) + v k sin φ k t ] φ k ( m + t ) [ φ k ( m ) + ω k ( m ) t ] ] = 0
In the formula above, q ( φ k ( m + t ) ) implies that the direction change should be in the range of (A,B). e k ( p k ( m + t ) ) indicates that the pitch angle at time m + t is determined by the global information at time m and the constrains of the CA system. By repeating the optimization procedure, the complete amending trajectory is generated.
The goal of this new model is to decompose the network as quickly as possible. This implies that after the critical node is cleared, the robustness of the connection and the number of connected components should be as low as possible. This implies that the UAVs are leaving each other and the risk of crashes is becoming smaller. Meanwhile, this model also considers the number of intruder UAVs of the corresponding direction, implying that a lesser domino effect will occur because the density of the intruder UAV is small due to the sense selected by the model. In the simulation step, the new model obtains the key nodes and evaluates the robustness of the connections or the number of connected components when different choices are made by the critical nodes. The key nodes will select the course of change and form a new network in the next simulation step. The new model will again select the key node. The model will monitor multiple UAV systems to determine if a TA alert is present; if the model stops searching for critical nodes, multiple UAV systems will be considered safe.
It is noteworthy that this method is a solution to the deadlock problem. The reasons for solving the deadlock problem are as follows: During the entire simulation period, the threat detection between real-time UAVs is performed and the network is built in real time; the key nodes are selected, and the direction of CA is selected. Therefore, the deadlock problem can be avoided.
The algorithm proposed in this paper has a simple logical structure and strong stability. Decision calculations consume very little time and meet real-time requirements. The algorithm can be applied to engineering practice due to the following reasons. Firstly, the method we proposed is designed from the perspective of scheduling. Our innovation was to abstract the collision avoidance problem of the UAV to the network’s collapse problem, aiming to solve the collision avoidance problem by using network theory. Second, the proposed method allows the UAV to perform only one maneuver—that of the flight level change. This maneuver is used in the traffic collision avoidance system (TCAS), and it is simple but very effective. As such, it can definitely be applied to the UAV collision avoidance system. The algorithm is shown below as Algorithm 1.
Algorithm 1 Novel Model Based on Key Node Research
Input: Initial position, target position, initial velocity of the UAVs, the number of UAVs N, the simulation step length S
Output: Trajectories of all the UAVs R
  for j = 1:S do
   for i = 1:N do
    Calculate whether a TA is issued;
    while TA is issued do
      Construct the network of the UAVs involved;
      Calculate the relative distance and relative velocities of all the involved UAVs;
      Select the key node;
      Calculate the weight (relevant to the number of intruders, robustness and connected component);
      Choose the optimal directions for the key node;
      Update the current direction of the key node;
      if no collision then
        break;
      else
        R[i][j] = the coordinate of the step j of UAV i;
    Calculate the state of all the UAVs involved in the scenario;
   if all the UAVs have reach the safe area then
    break;
  return R;

4. Simulation and Results

We conducted two different simulation experiments on nine UAV scenarios for two different key node selection methods. The cruise speed set by the UAVs was 10 m/s. The minimum separation distance was set to 35 m. The simulation step size was set to 1 s. The pitch angle ranged from −0.785 to 0.785. It was assumed that each UAV can sense the global information and, as such, simulation calculation time can be ignored. The emulation code was run on a T450 laptop(Lenovo Thinkpad T450 Laptop, Lenovo, Beijing, China) with an Intel i7 processor of 2.6 GHz and 8 GB of RAM.

4.1. A Case Scenario

Figure 4a shows the UAV trajectory under the first key node selecting method, which is barely based on degree. In this scenario, the first time a TA appears is when U A V 1 and U A V 9 collide with each other. After the analysis of the CA system, we discovered that when avoiding the imminent collision, some potential collisions may occur. Therefore, when the TA issues a warning at 18:15:22 for the first time, the system selects U A V 1 as the key node and instructs U A V 1 to descend to avoid a conflict. As the simulation step progresses, U A V 1 and U A V 9 burst into each other’s collision volumes. This time, U A V 1 becomes the key node, and a climb instruction is sent to U A V 1 to avoid collision. The result in Figure 4b demonstrates the conflict resolution maneuver and that the difference in this method arises because the key node in the same scenario is different. When selecting the key node by the node contracting method, the system selects the U A V 9 as the key node and instructs U A V 9 to descend to avoid conflict. These UAVs form a decentralized CA situation. This can be explained by the fact that the robustness of the network in this area has been minimized. The intuitive image is that three UAVs have spread out and no cross routes have appeared, thus avoiding the domino effect.
Table 2 summarizes the trajectory of U A V 1 and U A V 9 (the waypoints are recorded every 4 s for simplicity) in the same scenario under two different key node selecting methods. The UAV starts to change its angle at 18:15:23 and returns to the original trajectory at 18:17:23.
From this simulation, the results indicate that the CA system can facilitate the UAV cluster to effectively avoid collision in both scenarios. The figure illustrates the relative distance of each pair of UAVs that are involved in a collision scenario involving nine UAVs and four conflicts among them. It is noteworthy that the distance between U A V i and U A V j is defined by d i j . Evidently, the separation of each pair of UAV is never intruded upon, according to Figure 5. For instance, in Scenario 1, U A V 1 encounters U A V 6 and U A V 9 , and the distances between them are always larger than the separation distance even at the closest point such that the safety flight is guaranteed, and it is the same in Scenario 2.
Because the algorithm implements a single-machine change in direction, when the UAV does not reach the pre-set CA altitude, the relative distance of the UAV will be reduced slightly; however, it will not collide because it is at the predicted moment of collision. The UAV has already flown to a safe altitude; therefore, although a close trend may occur during CA, the UAV can maintain a safe relative distance in the subsequent flight path.
Figure 6 depicts the situation during the final CA of the UAV group. The connection represents the potential threat between the UAVs. The connection method is the same as the logic of building the network. It is related to the relative distance between nodes and the relative speed between the nodes. The network node can identify key nodes and subsequently select the most appropriate CA direction according to the network properties.
We defined a new amount to measure the effect of UAVs when selecting key nodes using different methods. We defined this amount as the residual threat factor. The meaning of this quantity is the measure of the sum of threats to the UAVs in a certain area centered on the critical node after a conflict avoidance maneuver. That is, it evaluates the safety of the UAV in a certain area centered on the point after performing CA maneuver. Therefore, the threat coefficients of the UAVs in the area are added, and different key node selections are compared. The residual threat coefficient under the algorithm compares the advantages and disadvantages of the key node selection method. The residual threat factor (RTF) can be defined as follows:
RTF t = i , j = 1 N t i j k N
To depict the overall threat during the CA procedure, an average residual threat factor was defined as follows:
RTF ¯ = t t r t t r t RTF t ,   TA t t r t = 0
Table 3 shows that the RTF ¯ of the degree method was 0.0126, while the RTF ¯ of the node contraction method was 0.0093. This implies that the node contraction method has an average threat level lower than the degree method.

4.2. Further Investigation

This section discusses the primary results obtained using the CN algorithm based on two different key node selecting algorithms, as well as those obtained by the randomly chosen key node. It also reports the statistical comparison between those methods.
To validate the performance of the CN, a set of 500 different scenarios were grouped by the UAV number, from 24 to 48 within 100 tests. The extra consuming time is a frequently used performance metric to measure the different performance metrics that are used to measure the different performances of CA system algorithms.
Figure 7 shows the extra consuming time of the CN algorithm compared with the randomly selected ‘sense.’
The simulation result presented herein clearly demonstrates the good performance of the CN algorithm for solving high-density CA problems, owing to the potential threat being solved preferentially and reducing the domino conflict. This shows that the wasted time increases if the number of UAVs increases, because more encounters will occur if more UAVs are cruising in the same limited airspace. This also shows the extra consuming time increases faster than the UAV density, and the difference between the extra consuming time under the CN algorithm and the extra consuming time under the random algorithm increases as the density of the UAV increases. However, while the key node is chosen randomly, the wasted time is always larger than that of the CN algorithm where the key node is chosen based on the degree or node contraction methods. Under the middle density circumstance (90 UAVs), the key node selection method by degree consumes more time than the key node selecting method by node contraction, because the node contraction method can obtain more potential threat information and can more accurately. choose the most threatened node The opposite applies for the high airspace density (more than 100 UAVs), because the airspace is sufficiently clouded such that the most intuitive method can more efficiently handle this type of situation.
We made a comparison of our proposed CN algorithm with the satisficing game theory-based algorithm (SGTA) [41], the reactive inverse proportional navigation(PN) algorithm (RIPNA) [42] and the geometric optimization model algorithm (GOM) [43], which is capable of dealing with large scale UAV cluster collision avoidance scenarios. This paper compared the computational time of different methods when the scene setting for each method was the same. The results for scenarios consisting of 20 UAVs, 40 UAVs and 60 UAVs are shown in Table 4.
Evidently, the computational efficiency of the CN algorithm is higher than the other three algorithms, and it is worth mentioning that the average consuming time did not exponentially increase. Table 4 shows that this method can solve the collision avoidance problem in the case of high-density traffic airspace within an acceptable range.

5. Conclusions and Future Work

We herein proposed a CA method based on CNs for a group of UAVs in a local airspace. This method used the CN theory to synchronize the trajectory of the UAV in the global scope as quickly as possible to achieve CA. The collision avoidance method consisted of two different algorithms: The key node selection algorithm and the collision direction-selection algorithm. These two sub-algorithms formed a local space range that guaranteed the threat moment when the UAV groups met. The inner safety of the UAV group was the optimal core algorithm of the CA system. The key node selection algorithm constructed the key node selection strategy through the state representation and conflict detection logic of the UAV. The direction selection algorithm selected the threat cancellation scheme based on the minimum robustness principle working with the node selection algorithm. The two algorithms jointly applied a state-of-the-art CN theory to provide a method for resolving threats that occur when a group of unmanned aircrafts meets, by analyzing various states of the UAV group in the local airspace. In this paper, we compared the collision avoidance effects of UAVs under key node selection methods based on random selection and node contraction methods. The experimental results show that the key node selection strategy based on the node contraction method has better collision avoidance effects. The computational efficiency of the CN algorithm is higher than the satisficing game theory-based algorithm (SGTA), reactive inverse PN algorithm (RIPNA) and geometric optimization model algorithm (GOM), and it is worth mentioning that the average consuming time did not exponentially increase.
Future research will focus on the following aspects: (1) Using appropriate heuristic algorithms to improve the efficiency and speed of algorithm implementation; (2) conducting a more comprehensive study of the safety indicators of UAVs and integrating them into the existing ones, thus establishing an anti-collision system to enhance the safety of the system for the UAV group; (3) considering more complicated disturbance situations (such as strong wind) to accommodate more intensive and complex situations; (4) integrating UAVs into general purpose aviation operations in a non-segregated airspace.

Author Contributions

Conceptualization, Y.H. and J.T.; methodology, Y.H.; software, Y.H.; validation, Y.H.; formal analysis, Y.H.; investigation, Y.H.; resources, Y.H., J.T. and S.L.; data curation, Y.H.; writing—original draft preparation, Y.H.; writing—review and editing, Y.H. and J.T.; visualization, Y.H.; supervision, J.T. and S.L.; project administration, J.T. and S.L.; funding acquisition, J.T. and S.L.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Olfati-Saber, R. Flocking for multi-agent dynamic systems: Algorithms and theory. IEEE Trans. Autom. Control 2006, 51, 401–420. [Google Scholar] [CrossRef]
  2. Rezaee, H.; Abdollahi, F. Mobile robots cooperative control and obstacle avoidance using potential field. In Proceedings of the 2011 IEEE/ASME International, Budapest, Hungary, 3–7 July 2011; pp. 2159–6247. [Google Scholar]
  3. Rezaee, H.; Abdollahi, F. A decentralized cooperative control scheme with obstacle avoidance for a team of mobile robots. IEEE Trans. Ind. Electron. 2013, 61, 347–354. [Google Scholar] [CrossRef]
  4. Nguyen, T.; La, H.M.; Le, T.D.; Jafari, M. Formation control and obstacle avoidance of multiple rectangular agents with limited communication ranges. IEEE Trans. Control Netw. Syst. 2016, 4, 680–691. [Google Scholar] [CrossRef]
  5. Duguleana, M.; Mogan, G. Neural networks based reinforcement learning for mobile robots obstacle avoidance. Expert Syst. Appl. 2016, 62, 104–115. [Google Scholar] [CrossRef]
  6. Pallottino, L.; Feron, E.M.; Bicchi, A. Conflict resolution problems for air traffic management systems solved with mixed integer programming. IEEE Trans. Intell. Transp. 2002, 3, 3–11. [Google Scholar] [CrossRef] [Green Version]
  7. Richards, A.; How, J.P. Aircraft Trajectory Planning with Collision Avoidance Using Mixed Integer Linear Programming. In Proceedings of the American Control Conference, Anchorage, AK, USA, 8–10 May 2002; pp. 1936–1941. [Google Scholar]
  8. Shorrock, S.T.; Kirwan, B. Development and application of a human error identification tool for air traffic control. Appl. Ergon. 2002, 33, 319–336. [Google Scholar] [CrossRef]
  9. Galster, S.M.; Duley, J.A.; Masalonis, A.J. Air traffic controller performance and workload under mature free flight: Conflict detection and resolution of aircraft self-separation. Int. J. Aviat. Psychol. 2001, 11, 71–93. [Google Scholar] [CrossRef]
  10. Yu, X.; Zhang, Z. Sense and avoid technologies with applications to unmanned aircraft systems: Review and prospects. Prog. Aerosp. Sci. 2015, 74, 152–166. [Google Scholar] [CrossRef]
  11. Tang, J. Review: Analysis and Improvement of Traffic Alert and Collision Avoidance System. IEEE Access 2017, 99, 1. [Google Scholar] [CrossRef]
  12. LaValle, S.M. Planning Algorithms; Cambridge University Press: Cambridge, UK, 2006. [Google Scholar]
  13. Ha, L.N.N.T.; Bui, D.H.P.; Hong, S.K. Nonlinear Control for Autonomous Trajectory Tracking while Considering Collision Avoidance of UAVs Based on Geometric Relations. Energies 2019, 12, 1551. [Google Scholar] [CrossRef]
  14. Liu, Z.; Zhang, Y.; Yuan, C.; Ciarletta, L.; Theilliol, D. Collision Avoidance and Path Following Control of Unmanned Aerial Vehicle in Hazardous Environment. J. Intell. Robot. Syst. 2018, 95, 193–210. [Google Scholar] [CrossRef]
  15. Sharma, V.; Jayakody, D.; Kumar, R.; Li, J. Secure and Efficient Context-Aware Localization of Drones in Urban Scenarios. IEEE Commun. Mag. 2018, 56, 120–128. [Google Scholar] [CrossRef]
  16. Park, J.W.; Oh, H.D.; Tahk, M.J. UAV collision avoidance based on geometric approach. In Proceedings of the SICE Annual Conference, Tokyo, Japan, 20–22 August 2008; pp. 2122–2126. [Google Scholar]
  17. Chakravarthy, A.; Ghose, D. Generalization of the collision cone approach for motion safety in 3-D environments. Auton. Robot. 2012, 32, 243–266. [Google Scholar] [CrossRef]
  18. Lin, Y.; Saripalli, S. Sampling-Based Path Planning for UAV Collision Avoidance. IEEE Trans. Intell. Transp. 2017, 99, 1–14. [Google Scholar] [CrossRef]
  19. Pehlivanoglu, Y.V. A new vibrational generic algorithm enhanced with a Voronoi diagram for path planning of autonomous UAV. Aerosp. Sci. Technol. 2012, 16, 47–55. [Google Scholar] [CrossRef]
  20. Karimi, J.; Pourtakdoust, S.H. Optimal maneuver-based motion planning over terrain and threats using a dynamic hybrid PSO algorithm. Aerosp. Sci. Technol. 2013, 26, 60–71. [Google Scholar] [CrossRef]
  21. Xu, C.; Duan, H.B.; Liu, F. Chaotic artifical bee colony approach to uninhabited combat air vehicle (UCAV) path planning. Aerosp. Sci. Technol. 2010, 18, 535–541. [Google Scholar] [CrossRef]
  22. Campbell, S.E.; Bragg, M.B.; Neogi, N.A. Fuel-optimal trajectory generation for persistent contrail mitigation. AIAA J. Guid. Control Dyn. 2013, 36, 1741–1750. [Google Scholar] [CrossRef]
  23. Tisdale, J.; Kim, Z.; Hedrick, J.K. Autonomous UAV path planning and estimation. IEEE Robot. Autom. Mag. 2009, 16, 35–42. [Google Scholar] [CrossRef]
  24. Jorris, T.R.; Cobb, R.G. Multiple method 2-D trajectory optimization satisfying waypoints and no-fly zone constraints. AIAA J. Guid. Control Dyn. 2008, 31, 543–553. [Google Scholar] [CrossRef]
  25. Grancharova, A.; Grotli, E.I.; Ho, D.T. UAVs trajectory planning by distributed MPC under radio communication path loss constraints. J. Intell. Robot. Syst. 2014, 79, 115–134. [Google Scholar] [CrossRef]
  26. Sridhar, B.; Ng, H.K.; Chen, N.Y. Aircraft trajectory optimization and contrails avoidance in the presence of winds. AIAA J. Guid. Control Dyn. 2011, 34, 1577–1583. [Google Scholar] [CrossRef]
  27. Kim, Y.; Gu, D.W.; Postlethwaite, I. Real-time path planning with limited in formation for autonomous unmanned air vehicles. Automatica 2008, 44, 696–712. [Google Scholar] [CrossRef]
  28. Dai, R.; Cocharan, J. Path planning and state estimation for unmanned aerial vehicles in hostile environment. AIAA J. Guid. Control Dyn. 2010, 33, 595–601. [Google Scholar] [CrossRef]
  29. Hao, S.; Cheng, S.; Zhang, Y. A multi-aircraft conflict detection and resolution method for 4-dimensional trajectory-based operation. Chin. J. Aeronaut. 2018, 31, 1579–1593. [Google Scholar] [CrossRef]
  30. Yang, J.; Yin, D.; Shen, L.; Cheng, Q.; Xie, X. Cooperative Deconflicting Heading Maneuvers Applied to Unmanned Aerial Vehicles in Non-Segregated Airspace. J. Intell. Robot. Syst. 2018, 92, 187–201. [Google Scholar] [CrossRef]
  31. Yang, J.; Yin, D.; Niu, Y.; Shen, L. Distributed Cooperative Onboard Planning for the Conflict Resolution of Unmanned Aerial Vehicles. J. Guid. Control Dyn. 2019, 42, 272–283. [Google Scholar] [CrossRef]
  32. Radanovic, M.; Eroles, M.A.; Koca, T.; Gonzalez, J.J. Surrounding traffic complexity analysis for efficient and stable conflict resolution. Transp. Res. Part C Emerg. Technol. 2018, 95, 105–124. [Google Scholar] [CrossRef]
  33. Wu, J.; Tan, S.Y.; Liu, Z. Enhancing structural robustness of scale-free networks by information disturbance. Sci. Rep. 2017, 7, 7559. [Google Scholar] [CrossRef]
  34. Lu, L.; Chen, D.; Ren, X.L. Vital nodes identification in complex networks. Phys. Rep. 2016, 650, 1–63. [Google Scholar] [CrossRef] [Green Version]
  35. Morone, F.; Makse, H.A. Influence maximization in complex networks through optimal percolation. Nature 2015, 524, 65–68. [Google Scholar] [CrossRef] [Green Version]
  36. Ding, J.; Wen, C.; Li, G. Key node selection in minimum-cost control of complex networks. Phys. A Stat. Mech. Appl. 2017, 486, 251–261. [Google Scholar] [CrossRef]
  37. Tan, Y.J.; Wu, J. Network structure entropy and its application in unscaled networks. Syst. Eng. Theory Pract. 2004, 24, 1–3. [Google Scholar]
  38. Tang, Y.J.; Wu, J.; Deng, H.Z. Node contraction method for node importance evaluation in complex networks. Syst. Eng. Theory Pract. 2006, 26, 79–83. [Google Scholar]
  39. Brooker, P. Airborne collision avoidance systems and air traffic management safety. J. Navig. 2005, 58, 1–16. [Google Scholar] [CrossRef]
  40. Wu, J.; Deng, H.Z.; Tan, Y.J. Spectral Measure of Robustness for Internet Topology. In Proceedings of the IEEE International Conference on Computer Science, Chengdu, China, 9–11 July 2010; pp. 50–54. [Google Scholar]
  41. Archibald, J.K.; Hill, J.C.; Jepsen, N.A. A Satisficing Approach to Aircraft Conflict Resolution. IEEE Trans. Syst. Man Cybern. Part C 2008, 38, 510–521. [Google Scholar] [CrossRef]
  42. George, J.; Ghose, D. A reactive inverse PN algorithm for collision avoidance among multiple unmanned aerial vehicles. In Proceedings of the Conference on American Control Conference, St. Louis, MO, USA, 10–12 June 2009; pp. 3890–3895. [Google Scholar]
  43. Tang, J.; Fan, L.J.; Lao, S.Y. Collision Avoidance for Multi-UAV Based on Geometric Optimization Model in 3D Airspace. Arab. J. Sci. Eng. 2014, 39, 8409–8416. [Google Scholar] [CrossRef]
Figure 1. Traffic alert and CA (collision avoidance) system (TCAS) coordination for multi-unmanned aerial vehicles (UAVs).
Figure 1. Traffic alert and CA (collision avoidance) system (TCAS) coordination for multi-unmanned aerial vehicles (UAVs).
Applsci 09 03943 g001
Figure 2. Conceptual graph for key node selection.
Figure 2. Conceptual graph for key node selection.
Applsci 09 03943 g002
Figure 3. Conceptual graph for sense selection.
Figure 3. Conceptual graph for sense selection.
Applsci 09 03943 g003
Figure 4. Trajectory (a) with key node selecting based on degree and (b) with key node selecting based on the node contraction method.
Figure 4. Trajectory (a) with key node selecting based on degree and (b) with key node selecting based on the node contraction method.
Applsci 09 03943 g004
Figure 5. Minimal distance of UAVs for two scenarios.
Figure 5. Minimal distance of UAVs for two scenarios.
Applsci 09 03943 g005
Figure 6. Distribution of UAVs during a threat in two scenarios.
Figure 6. Distribution of UAVs during a threat in two scenarios.
Applsci 09 03943 g006
Figure 7. Consuming time of the complex network (CN) algorithm and random approach.
Figure 7. Consuming time of the complex network (CN) algorithm and random approach.
Applsci 09 03943 g007
Table 1. Summary of publications addressing the CDR problem.
Table 1. Summary of publications addressing the CDR problem.
PublicationDimensionManeuversMultipleResolution
3DT/V/S/CPairwiseGlobalGeometric AlgorithmPath Planning Algorithm
CPACCASampling-Based Path Planning ApproachesArtificial Heuristic ApproachesNumerical Optimization ApproachesDecoupled Path Planning Approaches
Park, Oh, and Tahk (2008)XC(T,S)X X
Chakravarthy, Animesh, and Ghose (2012)XC(T,V,S)X X
Lin and Saripalli (2017)XC(T,V)X X
Pehlivanoglu (2012)XC(T,V) X X
Karimi and Pourtakdoust (2013)XC(T,V) X X
Xu, Duan and Liu (2010) C(T,V) X X
Campbell, Bragg and Neogi (2013)XC(T,V)X X
Tisdale, Kim and Hedrick (2009) VX X
Jorris and Cobb (2008) C(V,S)X X
Grancharova et al. (2014)XC(T,V,S) X X
Sridhar, Ng and Chen (2011) V X X
Kim, Gu and Postlethwaite (2008)XV X X
Dai and Cocharan (2010) V X X
Hao, Cheng and Zhang (2018)X X
Yang, Yin and Shen. (2018)X X X
Yang et al. (2019) X X
Radanovic et al. (2018)X X X
Note: T = Turns; V = Vertical maneuvers; S = Speed; C() = Combined maneuvers.
Table 2. Waypoints of partial trajectory.
Table 2. Waypoints of partial trajectory.
Scenario 1Scenario 2
TimeIDAmended TrajectoryIDAmended Trajectory
X(m)Y(m)Z(m)X(m)Y(m)Z(m)
18:15:19UAV1876.276123.72695.67UAV91762.275756.46688.52
18:15:23UAV1904.546095.45695.53UAV91722.345754.09688.48
18:15:27UAV1919.236080.77692.11UAV91695.735752.51685.49
18:15:31UAV1933.916066.08688.69UAV91669.115750.93682.51
18:15:35UAV1948.606051.40685.27UAV91642.505749.35679.53
18:15:39UAV1963.286036.71681.85UAV91615.895747.76676.55
18:15:43UAV1977.976022.03678.43UAV91589.285746.18673.57
18:15:47UAV1992.656007.34675.02UAV91562.665744.60670.58
UAV91482.765739.86688.48UAV11074.255925.74695.53
18:15:51UAV11007.335992.66671.60UAV91536.055743.02667.60
UAV91442.835737.48688.48UAV11102.535897.46695.53
18:15:55UAV11022.025977.97668.18UAV91509.445741.44664.62
UAV91402.905735.11688.48UAV11130.815869.18695.53
18:15:59UAV11036.705963.29664.76UAV91482.835739.86661.64
UAV91362.975732.74688.48UAV11159.105840.89695.53
18:16:03UAV11051.395948.60661.34UAV91456.215738.28658.66
UAV91323.045730.37688.48UAV11187.385812.61695.53
18:16:07UAV11066.075933.92657.92UAV91429.605736.70655.67
UAV91283.115727.99688.48UAV11215.675784.32695.53
18:16:11UAV11080.765919.23654.50UAV91402.995735.12652.69
UAV91243.185725.62688.46UAV11243.955756.04695.53
18:16:15UAV11105.635894.36653.54UAV91366.395732.94651.91
UAV91203.255723.25688.48UAV11272.245727.75695.53
18:16:19UAV11133.905866.09653.43UAV91326.465730.57651.86
18:16:23UAV11162.165837.83653.27UAV91286.545728.20651.82
18:16:27UAV11190.435809.56653.13UAV91246.615725.83651.77
18:16:31UAV11218.705781.29652.99UAV91206.685723.45651.72
18:16:35UAV11233.385766.61656.41UAV91180.075721.87654.70
18:16:39UAV11248.075751.92659.82UAV91153.465720.29657.68
18:16:43UAV11262.755737.24663.24UAV91126.845718.71660.67
18:16:47UAV11277.445722.55666.66UAV91100.235717.13663.65
18:16:51UAV11292.125707.87670.08UAV91073.625715.55666.63
18:16:55UAV11306.815693.18673.50UAV91047.015713.97669.61
18:16:59UAV11321.495678.50676.92UAV91020.395712.39672.59
18:17:03UAV11336.185663.81680.34UAV9993.785710.80675.58
18:17:07UAV11350.865649.13683.75UAV9967.175709.22678.56
18:17:11UAV11365.555634.44687.17UAV9940.565707.64681.54
18:17:15UAV11380.235619.76690.59UAV9913.945706.06684.52
18:17:19UAV11394.925605.07694.01UAV9887.335704.48687.50
18:17:23UAV11416.395583.60695.65UAV9850.735702.31688.21
Table 3. RTF ¯ (residual threat factor) of two key node selecting approaches in two scenarios.
Table 3. RTF ¯ (residual threat factor) of two key node selecting approaches in two scenarios.
Key Node Selecting Approach RTF ¯
Node selection based on degree0.0126
Node contraction method0.0093
Table 4. Time consuming comparison of the novel algorithm.
Table 4. Time consuming comparison of the novel algorithm.
Number of AircraftsTime Taken (s)
SGTARIPNAGOMComplex Network Based on DegreeComplex Network Based on Node Contraction
20673682733
40171120068910
6030093961892026

Share and Cite

MDPI and ACS Style

Huang, Y.; Tang, J.; Lao, S. Cooperative Multi-UAV Collision Avoidance Based on a Complex Network. Appl. Sci. 2019, 9, 3943. https://doi.org/10.3390/app9193943

AMA Style

Huang Y, Tang J, Lao S. Cooperative Multi-UAV Collision Avoidance Based on a Complex Network. Applied Sciences. 2019; 9(19):3943. https://doi.org/10.3390/app9193943

Chicago/Turabian Style

Huang, Yang, Jun Tang, and Songyang Lao. 2019. "Cooperative Multi-UAV Collision Avoidance Based on a Complex Network" Applied Sciences 9, no. 19: 3943. https://doi.org/10.3390/app9193943

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop