A heuristic algorithm for optimized routing of unmanned aerial systems for the interdiction of improvised explosive devices
Scioletti, Michael S.
Royset, Johannes O.
Carlyle, W. Matthew
MetadataShow full item record
Improvised explosive devices (IEDs) are effective weapons for insurgents targeting conventional military and security forces. Real-time information gathering about likely use of such weapons is one approach to reduce the effectiveness of IEDs. Unmanned aerial system (UASs) may provide the information gathering capability commanders need to interdict IEDs. Currently, UASs are not systematically utilized in that capacity. This research develops a routing tool that uses column-generation techniques and a greedy algorithm to route UASs through suspected IED locations for the purpose of IED interdiction as it transit to and from command directed missions. In empirical studies of data sets with up to 125 IED locations and missions, the routing tool provides optimal or near-optimal solutions in all instances tested. The tool produces de-conflicted routes for up to three UASs within five minutes of computing time.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Thong, Lee Kok (Monterey, California. Naval Postgraduate School, 2004-12);This thesis presents a simulation and performance evaluation analysis of the various routing protocols that have been proposed for the Mobile Ad Hoc Network (MANET) environment using the Network Simulator-2 (NS-2) tool. ...
Darroca, Gregorio G. (Monterey, California. Naval Postgraduate School, 1998-09);Transport Layer (OSI Layer 3) switching and routing provides routing flexibility but not high throughput. Link layer (OSI Layer 2) switching provides high throughput but not the routing flexibility needed to manage topology ...
Stamatelatos, Nikolaos (Monterey, California. Naval Postgraduate School, 2006-09);BGP Blackhole routing is a mechanism used to protect networks from DDoS attacks. During the last several years, a number of variations of BGP Blackhole routing have been proposed. However, even though these methods have ...