Human-UAV coordinated flight path planning of UAV low-altitude penetration on pop-up threats

Peng Ren, Xiao Guang Gao, Jun Chen

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

Human-UAV coordinated flight path planning of UAV low-altitude penetration on pop-up threats is a key technology achieving manned and unmanned aerial vehicles cooperative combat and is proposed in this paper. In the most dangerous environment, human’s wisdom, experience and synthetic judgments can make up for the lack of intelligence algorithm. By using variable length gene encoding based on angle for the flight paths planning, and combining artificial auxiliary decision with novel intelligence algorithm, it makes the best possible use of the human brain to guide solution procedures of the flight path planning on pop-up threats. A lot of simulation studies show that the on-line three-dimensional flight paths by this technology can meet the requirements of UAV low-altitude penetration, efficient implementation of threat avoidance, terrain avoidance and terrain following. This method has a certain practicality.

Original languageEnglish
Title of host publicationComputational Intelligence, Networked Systems and Their Applications - International Conference of Life System Modeling and Simulation, LSMS 2014 and International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2014, Proceedings
EditorsMinrui Fei, Yang Song, Chen Peng, Zhou Su, Zhou Su, Yang Song, Qinglong Han
PublisherSpringer Verlag
Pages552-561
Number of pages10
ISBN (Electronic)9783662452608
DOIs
StatePublished - 2014

Publication series

NameCommunications in Computer and Information Science
Volume462
ISSN (Print)1865-0929
ISSN (Electronic)1865-0937

Keywords

  • Flight path planning
  • Human-UAV coordinated
  • Low-altitude penetration
  • Pop-up threats

Fingerprint

Dive into the research topics of 'Human-UAV coordinated flight path planning of UAV low-altitude penetration on pop-up threats'. Together they form a unique fingerprint.

Cite this