UAVs for Law Enforcement: A Case Study for Connectivity...

14
UAVs for Law Enforcement: A Case Study for Connectivity and Fuel Management Derya Aksaray * , Kelly Griendling and Dimitri Mavris Georgia Institute of Technology, Atlanta, GA, 30332, USA In recent years, a large amount of research has been conducted for the cooperative control and design of multiple unmanned aerial vehicles (UAVs) that work together to accomplish complex missions such as per- sistent surveillance. This paper addresses a law enforcement scenario, where the goal is to maximize the situational awareness over an area. In order to achieve this goal, a ground station (base) sends a group of autonomous UAVs to the field, and the UAVs broadcast the monitored information back to the base through multi-hop communications. Typically, the UAVs need to return to the base for refueling in long-run missions. Whenever a UAV returns to the base, the remaining vehicles on the field may require a relocation to avoid any communication loss. Accordingly, the objective of this paper is to identify the influential design variables (i.e. impacting vehicle endurance) and control policies (i.e. aiding decisions about when to return and how to recon- figure) of UAVs on the mission performance as well as to investigate any trade-offs between them. The Monte Carlo simulations indicate that velocity and radius of communication are more influential on the situational awareness than the fuel capacity. Moreover, the influence of fuel capacity is more reduced as the connectivity recovery strategies are utilized by the UAVs. I. Introduction In recent years, a large amount of research has been conducted for the cooperative control and design of multi- ple unmanned aerial vehicles (UAVs) that work together to accomplish complex missions such as persistent surveil- lance [1–3], environmental monitoring [4], target tracking [5], or several others. Since the beginning of UAV flight, there has always been an interest in the military applications of UAVs that can effectively operate in dirty, dull, or dangerous missions. In addition, the range of civil UAV applications is getting wider as the new technologies advance performance, computation capability, and affordability of these vehicles. For instance, the authors of [6] categorize the UAV civil missions with respect to four purposes, namely land management, commercial, earth science, and security. Under the security, there are also sub-purposes such as patrolling, law enforcement, disaster operations, search and rescue, and fire detection. In the fall of 2004, a UAV system was used to gather and record real-time video imagery for a small community police department in South Mississippi, and the author of [7] emphasizes a major benefit of this UAV system as getting reliable data at low cost. Moreover, the author of [8] presents a survey of UAVs in traffic surveillance and describes the UAVs as ”bird’s eye view” for road conditions and emergency response. Alternatively, the authors of [9] present a tactical law enforcement scenario as a prospective UAV mission in the future national air space system, and they foresee UAVs that can self-detect/avoid other aircrafts and send dynamic updates about the suspicious activity to the ground station. As depicted, UAVs have the potential to be more active in law enforcement missions of the future. While they are providing great benefits for practicality, safety, and cost, there exist many technical issues that require a deep investigation. For instance, some major research questions that have recently attracted many researchers are as follows: - How to provide autonomy? Autonomy is foreseen as a major specification in future systems to provide op- erations without any (or as small as possible) human interaction. As such, a UAV is expected to achieve the mission objectives by making decisions based on the sensed information. Here, some of the critical issues in- clude, but are not limited to, defining objective functions aligned with the mission, developing efficient on-board computations, or ensuring reliable sensed data. * Ph.D. Candidate, School of Aerospace Engineering, AIAA Student Member. Research Engineer II, School of Aerospace Engineering, AIAA Member. Boeing Professor, School of Aerospace Engineering, AIAA Fellow. 1 of 14 American Institute of Aeronautics and Astronautics

Transcript of UAVs for Law Enforcement: A Case Study for Connectivity...

Page 1: UAVs for Law Enforcement: A Case Study for Connectivity ...people.bu.edu/daksaray/Site/Publications_files/Aviation_2014.pdfUAV and the connectivity of the communication network on

UAVs for Law Enforcement: A Case Study for Connectivity andFuel Management

Derya Aksaray∗, Kelly Griendling† and Dimitri Mavris ‡

Georgia Institute of Technology, Atlanta, GA, 30332, USA

In recent years, a large amount of research has been conducted for the cooperative control and design ofmultiple unmanned aerial vehicles (UAVs) that work together to accomplish complex missions such as per-sistent surveillance. This paper addresses a law enforcement scenario, where the goal is to maximize thesituational awareness over an area. In order to achieve this goal, a ground station (base) sends a group ofautonomous UAVs to the field, and the UAVs broadcast the monitored information back to the base throughmulti-hop communications. Typically, the UAVs need to return to the base for refueling in long-run missions.Whenever a UAV returns to the base, the remaining vehicles on the field may require a relocation to avoid anycommunication loss. Accordingly, the objective of this paper is to identify the influential design variables (i.e.impacting vehicle endurance) and control policies (i.e. aiding decisions about when to return and how to recon-figure) of UAVs on the mission performance as well as to investigate any trade-offs between them. The MonteCarlo simulations indicate that velocity and radius of communication are more influential on the situationalawareness than the fuel capacity. Moreover, the influence of fuel capacity is more reduced as the connectivityrecovery strategies are utilized by the UAVs.

I. Introduction

In recent years, a large amount of research has been conducted for the cooperative control and design of multi-ple unmanned aerial vehicles (UAVs) that work together to accomplish complex missions such as persistent surveil-lance [1–3], environmental monitoring [4], target tracking [5], or several others. Since the beginning of UAV flight,there has always been an interest in the military applications of UAVs that can effectively operate in dirty, dull, ordangerous missions. In addition, the range of civil UAV applications is getting wider as the new technologies advanceperformance, computation capability, and affordability of these vehicles. For instance, the authors of [6] categorize theUAV civil missions with respect to four purposes, namely land management, commercial, earth science, and security.Under the security, there are also sub-purposes such as patrolling, law enforcement, disaster operations, search andrescue, and fire detection.

In the fall of 2004, a UAV system was used to gather and record real-time video imagery for a small communitypolice department in South Mississippi, and the author of [7] emphasizes a major benefit of this UAV system as gettingreliable data at low cost. Moreover, the author of [8] presents a survey of UAVs in traffic surveillance and describesthe UAVs as ”bird’s eye view” for road conditions and emergency response. Alternatively, the authors of [9] presenta tactical law enforcement scenario as a prospective UAV mission in the future national air space system, and theyforesee UAVs that can self-detect/avoid other aircrafts and send dynamic updates about the suspicious activity to theground station. As depicted, UAVs have the potential to be more active in law enforcement missions of the future.While they are providing great benefits for practicality, safety, and cost, there exist many technical issues that requirea deep investigation. For instance, some major research questions that have recently attracted many researchers are asfollows:

- How to provide autonomy? Autonomy is foreseen as a major specification in future systems to provide op-erations without any (or as small as possible) human interaction. As such, a UAV is expected to achieve themission objectives by making decisions based on the sensed information. Here, some of the critical issues in-clude, but are not limited to, defining objective functions aligned with the mission, developing efficient on-boardcomputations, or ensuring reliable sensed data.

∗Ph.D. Candidate, School of Aerospace Engineering, AIAA Student Member.†Research Engineer II, School of Aerospace Engineering, AIAA Member.‡Boeing Professor, School of Aerospace Engineering, AIAA Fellow.

1 of 14

American Institute of Aeronautics and Astronautics

Page 2: UAVs for Law Enforcement: A Case Study for Connectivity ...people.bu.edu/daksaray/Site/Publications_files/Aviation_2014.pdfUAV and the connectivity of the communication network on

- How to design efficient vehicle/mission? The design of the vehicle and the mission plays an important rolefor effective operations. Particularly, a UAV in a law enforcement scenario potentially requires 1) maximumendurance to extend the duration of loiter over a field, 2) optimal flight altitude for better quality images witha sufficiently large monitored area, and 3) effective sensors for reliable communications with other vehicles.However, one way to maximize endurance is increasing the fuel capacity of the vehicle, which possibly degradesthe vehicle agility. Moreover, reducing the flight altitude of a UAV increases the quality of image acquiredwhereas it degrades the aerodynamics efficiency, decreases the monitored area, and requires air traffic control.Finally, reliable and long distance communication can be provided by carrying powerful antennas but they arein general heavy so it can cause a reduction in the fuel capacity due to an increase in payload. Furthermore,even though an optimal vehicle is designed based on the aforementioned concerns, a group of optimal vehicleswill result in an emergent behavior, which may not be easily predictable. As such, there exist many designcompromises that need well-understanding for efficient operations.

- How to manage air traffic? Missions operated in urban environments, i.e a law enforcement scenario, requirethe management of the air traffic to avoid any collisions. As the number of aircrafts increase in the airspace, thecomplexity of the air traffic dramatically increases, and the air traffic control gets harder from a single authority.In this case, most recent studies investigate how to implement self-detection and avoidance systems to UAVsand how to integrate autonomous systems to the current air traffic.

In this paper, we introduce a law enforcement scenario conducted by a group of UAVs, whose major objectiveis to collect and stream-back sufficiently good quality data to the ground station as long as possible. To this end,we particularly focus on the first two aforementioned research questions pertaining to autonomy and vehicle/missiondesign, and we approach the problem from two perspectives, namely behavior and vehicle. From behavior perspec-tive, we assume decentralized decision schemes that lead to autonomous UAVs communicating with the vehicles intheir vicinity and making individual decisions based on locally gathered data. From vehicle perspective, we assumedesign trades among velocity, flight altitude, fuel capacity, and communication range that directly influence the fuelmanagement of a UAV. Based on the scenario and the assumptions, we conduct Monte Carlo simulations that enablea design space exploration. We discuss the importance of some design variables related to the fuel management of aUAV and the connectivity of the communication network on the mission performance.

The remainder of this paper is organized as follows: Section II presents the persistent surveillance problem. Sec-tion III details the implementation of the case study, and Section IV depicts the results of the Monte Carlo simulations.Finally, Section V concludes the paper.

II. Persistent Surveillance Problem via Multiple UAVs

This paper addresses a multi-UAV law enforcement scenario, where a group of collaborative UAVs operate over afield and send regular updates to the base regarding the points monitored. In this scenario, the main advantage of usingUAVs is to collect reliable data in an affordable way. In an ideal case, if each point is monitored by an individual UAVthat has endurance equal to the mission endurance, then the base collects the maximum amount of data about the field.However, it is important to consider that a UAV has an inherent possibility of leaving the group in long-run missionsdue to refuel/maintenance need, strategy change, or collision avoidance. Note that the removal of a UAV becomes adisturbance to the overall system, and it causes a degradation in situational awareness due to preventing the regularupdates of some particular monitoring points. Therefore, some questions arise as how to maximize the stream-backdata collected at the base under the disturbance of UAV removals? and which factors mitigate the degradation ofsituational awareness? In order to answer these questions, we formulate the surveillance problem via some graphtheoretical concepts and model the UAVs and the base as individual agents.

A. Graph Theory Preliminaries

In this paper, we use definitions from graph theory to depict the surveillance scenario. Therefore, this section presentsthe terminology used throughout the paper. An undirected graph, G = (V,E), consists of a set of nodes, V , and a setof undirected edges, E. Let X be a subset of V . Then, GX refers to a subgraph induced by the nodes in X and theircorresponding edges. In a graph, a k-length path, p, is a sequence of nodes (p0, p1, ..., pk) such that the edge betweenany pi and pi+1 belongs to E. An undirected graph, G , is connected if there exists a path between any two nodes ofthe graph. The neighbor set of node vi, Nvi , is the set including all adjacent nodes that are connected to vi.

2 of 14

American Institute of Aeronautics and Astronautics

Page 3: UAVs for Law Enforcement: A Case Study for Connectivity ...people.bu.edu/daksaray/Site/Publications_files/Aviation_2014.pdfUAV and the connectivity of the communication network on

Nvi = {v j | (vi,v j) ∈ E}. (1)

The degree of vi is defined as the cardinality of Nvi . The betweenness centrality of vi is equal to the number ofshortest paths from all nodes to all others that pass through vi. Accordingly, if the betweenness centrality of vi is large,vi is likely to connect separate sets of nodes to each other.

B. Problem Formulation

The persistent surveillance problem studied in this paper is formulated according to the following assumptions:- Surveillance area: The surveillance area is assumed to be a connected graph, G ∗ as in Figure 1, where the nodes ofthe graph, shown as filled squares, represent the monitoring points, and the dotted edges represent the communicationcapability if two UAVs loiter over the corresponding nodes. Note that the monitoring points represent some incidentsaround a city, and some example incidents can be drug traffic, traffic accident, or a public event. In this respect, alaw enforcement team determines a set of geographical positions (i.e. small areas or some coordinate points), wherethe UAVs fly towards to loiter over them to collect information about the incidents. Note that the term node is usedhenceforth to designate a monitoring point/area.

BASE

Figure 1: Surveillance area represented as a connected graph, G ∗.

- Communication: Each UAV is assumed to have a limited communication range. Thus, a UAV can communicatewith other UAVs if the distance between them is less than its communication range. Also, the distance between thebase and at least one of the nodes is assumed less than the communication range of a UAV. Accordingly, at leastone of the UAVs can directly communicate with the base if it monitors the corresponding node (e.g. the dotted edgebetween the base and the node in Figure 1 implies a direct communication if a UAV loiters over that node). For eachUAV, the communication range is larger than its monitoring range. Moreover, the nodes of G ∗ are assumed to be farfrom each other. Thus, if a UAV loiters in between two nodes, it cannot gather useful data from either of the nodes.Consequently, each UAV is urged to stay as close as possible to a single node of G ∗, and the communication networkof the UAVs and the base becomes a subgraph of G ∗. When the communication network is connected, each UAVcan broadcast information back to the base via multi-hop communication. For example, while UAV 4 in Figure 2adirectly communicates with UAVs 2, 3, 5, and 6, it can indirectly communicate with UAV 1 and the base through UAV2. On the other hand, Figure 2b shows a disconnected communication network due to the removal of UAV 4. In thisrespect, UAVs 3, 5, and 6 will be isolated from the group and no information will be reported to the base as long asthey continue staying on their assigned loitering positions. In order to avoid such disconnections in the communicationnetwork, UAVs may move until the connectivity is recovered (e.g. moving towards each other or replacing the removedUAV).- Autonomy: In this problem, we assume that the base assigns a node to each UAV whenever they return to basefor refueling. In addition to the node assignments, the base can also control the UAVs in the face of an event or adisturbance as long as there exist direct or indirect communication among them. Nonetheless, the distance betweenthe UAVs and the base is assumed large. The continuous wireless communication may not be always reliable andsecure as discussed in [10]. Therefore, the UAVs are expected to make their own decisions for when to refuel andwhen to reconfigure based on their remaining fuel and other external events, respectively.

In this paper, the mission effectiveness is quantified through some utility functions. As such, let some utilities bedefined for each UAV and the base. For each UAV, suppose that Ui(t) denotes the utility of UAV i at time t. Note that

3 of 14

American Institute of Aeronautics and Astronautics

Page 4: UAVs for Law Enforcement: A Case Study for Connectivity ...people.bu.edu/daksaray/Site/Publications_files/Aviation_2014.pdfUAV and the connectivity of the communication network on

BASE

1

2

3

4

56

(a) All UAVs can send data back to base due to having a con-nected communication network.

BASE

1

2

3

4

56

(b) The removal of UAV 4 causes a disconnection in the net-work so UAVs 3, 5, and 6 can not communicate with the base.

Figure 2: A canonical law enforcement scenario consisting of collaborative UAVs.

a UAV has no utility if it is in cruise or refuel modes because it cannot monitor any useful data regarding an assignednode. As such, the utility of UAV i is defined as

Ui(t) =

0, if mode = cruise or refuel

1, if mode = loiter.(2)

Due to the assumption of limited communication capability, a UAV can stream back data if there exist a commu-nication path between the base and itself.

Definition 1. (Communication path) A communication path is a sequence of UAVs, (v1, ...,vn), where any consecutiveUAVs, (vi,vi+1) can communicate directly.

Remark 1. Assume that v1 on a communication path directly communicates with the base. Then the overall communi-cation path can be rewritten as (b,v1, ...,vn), where b denotes the base. As such, the existence of (b,v1, ...,vn) impliesthat any vi for i > 1 can indirectly communicate with b.

In addition to the utility of a UAV, an overall utility can be written for base as

Uin f o(t) = ∑i∈Vc

Ui(t), (3)

where Vc denotes the set of all UAVs that can communicate with the base directly or indirectly. Note that Eq. 3 rep-resents the amount of information received by the base at time t. For instance, Uin f o(t) in Figure 2a is the summationof all UAV utilities because all UAVs and the base are connected to each other, whereas Uin f o(t) in Figure 2b isthe summation of U1(t) and U2(t). Note that UAVs 3, 5, and 6 are loitering over the nodes and have individuallynonzero utilities; however, they are not capable of sending the information back to the base because of the networkdisconnection. Such a case illustrates inefficient UAV operations that need to be avoided during a mission.

Note that if a UAV loitering over node j cannot send its data back to the base due to the absence of a communicationpath (i.e. UAV 5 in Figure 2b) or if there is no UAV loitering over node j (i.e. the unoccupied node in Figure 2b), thenthe age of node j, α j(t), increases with respect to the base. Here, α j(t) is defined as the duration of time that the basehas not received any data from node j, and it has the following equation:

α j(t) =

0, if a UAV loitering over node j communicates with the base,

α j(t−1)+1, otherwise.(4)

As seen from Eq. 4, α j(t) is a piecewise monotonically increasing function, and its increase implies a degradation insituational awareness for the base. Using the summation of node ages, a cost can be defined to quantify the degradationin situational awareness as

4 of 14

American Institute of Aeronautics and Astronautics

Page 5: UAVs for Law Enforcement: A Case Study for Connectivity ...people.bu.edu/daksaray/Site/Publications_files/Aviation_2014.pdfUAV and the connectivity of the communication network on

Cage(t) = ∑j∈V

α j(t), (5)

where V denotes the set of nodes in the surveillance area. Note that if there is no UAV on the field or there is nocommunication path among some UAVs and the base, Cage(t) is a monotonically increasing function. Based on thedepicted scenario, the overall objective function of this surveillance problem is

J =T

∑t=1

Cage(t), (6)

where T is the overall mission endurance. Note that minimizing J implies that the base collects the maximum amountof recent information during a mission. Here, one way to minimize J is via designing control policies for the baseand the UAVs. A policy of the base is for assigning nodes to UAVs that have returned to base for refueling. A policyof a UAV is for making decisions about when to return to base and when to change nodes during the mission. Inaddition to designing policies, another way to minimize J pertains to the vehicle and mission designs because theygreatly influence the fuel management of a vehicle. For instance, UAVs having different velocities or fuel capacitiesperform differently under a particular policy. Therefore, it is important to take into account the design specificationsthat impact the mission objective. Consequently, we break down the influential elements on minimizing Eq. 6 as inFigure 3.

FUEL MANAGEMENT

DESIGN CONTROL

Vehicle Mission Individual Group

(How to increase endurance?)(When to return base?)

(How to reconfigure if a UAV returns base?)

MINIMIZE J

- fuel consumption

- fuel consumption

- fuel capacity - uncoordinateddecision

- coordinateddecision

NODE ASSIGNMENT

CONTROL

(How to assign nodes to UAVs?)

Figure 3: The components contributing to minimize J.

C. Proposed Methodology

In this paper, the overall objective is to investigate the critical design and control variables that improve the situationalawareness of a base about a surveillance area. By saying design variables, we mean the design specifications of avehicle, whereas control variables pertain to the decision mechanisms utilized by UAVs and the base. In order toprovide insight into the effects of these variables on the mission performance, one way is to conduct some experimentsvia Monte Carlo simulations. Accordingly, we propose a methodology for the analysis of persistent surveillancemissions conducted by networked multi-UAV systems. The outline of the proposed methodology is shown in Figure 4,and its first step is representing the surveillance area as a connected graph. The graph representation of a field is arigorous way that captures not only the geographical positions of the monitoring points but also the feasibility ofvehicle-to-vehicle or vehicle-to-base communications over the field. The second step is selecting a set of designvariables that can capture the performance, aerodynamic, or propulsion related metrics and may have potential effect onthe mission effectiveness. Then, the third step is identifying ranges to the design variables and creating the experimentcases accordingly. For a particular set of design variables, the resulting performance differs as UAVs use differenttypes of control strategies. Therefore, the forth step of the proposed methodology is replicating the experiment casesfor some control strategies in interest. Following that, the Monte Carlo simulations are conducted in the fifth step, and

5 of 14

American Institute of Aeronautics and Astronautics

Page 6: UAVs for Law Enforcement: A Case Study for Connectivity ...people.bu.edu/daksaray/Site/Publications_files/Aviation_2014.pdfUAV and the connectivity of the communication network on

the final step pertains to the visualization of the simulation results to depict conclusions. In case of having insufficientconclusions, the design variables and the control strategies might require a modification. Hence, an iterated processmay occur according to the steps of the methodology.

Represent thesurveillance areaas a connected

graph

Determine a set ofpotentially

influential designvariables

Create the casesof the Design-of-

experiments

Conduct MonteCarlo Simulations

Replicate thecases for differentcontrol policies

Determine a set ofcontrol policiesfor the base and

UAVs

Visualize thesimulation results

and depictconclusions

Figure 4: Proposed Methodology

III. Case Study Implementation

In this paper, we consider a scenario containing 6 monitoring zones, 6 identical UAVs, and a base. At eachmonitoring zone, we assume a threat occurring with a probability of 0.1. While a UAV is loitering over a particularzone, if a threat occurs then the UAV decreases its loitering altitude for detection. For a particular UAV, we denote thefuel consumptions of cruise, loiter at low altitude, and loiter at high altitude by ∆Fcr, ∆Flt,low, and ∆Flt,high, respectively.Moreover, we assume that the fuel consumptions at different modes have the following order: ∆Fcr > ∆Flt,low >∆Flt,high. Finally, we assume that each UAV has a discrete dynamics with two degrees of freedom.

The persistent surveillance problem studied in this paper is a complex system-of-systems problem such that itinvolves a large number of input variables. In this case study, we have initially determined five major design vari-ables, which are suspected to have a potential effect on the mission performance. The first variable is selected as themaximum velocity of a UAV, which directly affects the time spent in cruise mode. The second variable is chosen asthe maximum fuel capacity of a UAV because it determines the overall endurance of the vehicle. The third variableis the radius of communication, which greatly impacts the topology of the overall communication network. Sometopological metrics we take into account are average betweenness and average degree that vary with respect to the ra-dius of communication. As the UAVs have larger communication radii, it is expected to observe a decrease in averagebetweenness (i.e. a UAV does not become a critical UAV to connect the base to other UAVs) and an increase in averagedegree (i.e. a UAV is likely to connect more UAVs). As a result, an increase in the radius of communication improvesthe connectivity of the network topology so the removal of a UAV due to refueling less likely causes a disconnection.The forth design variable is selected as the ratio of the fuel consumption at low altitude loiter to high altitude loiter(i.e. ∆Flt,low

∆Flt,high). Note that a UAV loiters at high altitude for identifying objects. Whenever it identifies an object, it loiters

at a lower altitude in order to detect it. Here, there is an underlying assumption that the required image qualities fordetection and identification are different from each other so a UAV is required to change its loiter altitude to satisfya desired image quality. Finally, the last variable is chosen as time to detect, which is the time spent for detection atlow altitude loiter. In other words, it is the time duration a UAV is subjected to more drag, which increases the fuelconsumption as a consequence. Note that the first two variables pertain to the vehicle specifications of a UAV, whilethe rest capture its sensor capabilities.

In addition to the aforementioned input variables, a control strategy utilized by a UAV is also an input to the system

6 of 14

American Institute of Aeronautics and Astronautics

Page 7: UAVs for Law Enforcement: A Case Study for Connectivity ...people.bu.edu/daksaray/Site/Publications_files/Aviation_2014.pdfUAV and the connectivity of the communication network on

because it is directly related to the behavior of the vehicle. Note that UAV control we refer to in this paper is a high-level control such that it does not pertain to the controller design driving the system from one state to another. Instead,we consider policies for UAVs to make high-level decisions. For instance, a UAV needs to utilize a refuel policy toensure safe return to base without running out of fuel. Alternatively, a UAV requires a policy to maintain a connectedcommunication network with the base under any disturbances. Likewise, many other policies can be executed byUAVs for efficient operations in a persistent surveillance mission. In this paper, we particularly focus on some refueland connectivity policies of UAVs because they have a great impact on J.

A. Refuel Policies

A UAV is a valuable asset such that its crash due to running out of fuel is unacceptable. Therefore, a UAV utilizesa refuel policy to make a decision about when to safely return to base for refueling. In this work, we consider tworefuel policies, namely deterministic and randomized. In the execution of both policies, a UAV is assumed to track itsremaining fuel (Frem), and it is able to compute the required fuel (Freq) to return to base from its current position at anytime instant.

1. Deterministic Policy (πdeterministic)

If a UAV utilizes the deterministic policy, it decides to return to base whenever it reaches a critical fuel threshold.Here, the critical fuel level (Fcr) is the required fuel to return to base from its current position, and it can be selectedas Freq + ε , where ε ≥ 0 is a non-negative scalar for buffer fuel. Accordingly, whenever Frem ≤ Fcr = Freq + ε , a UAVdecides to return to base.

2. Randomized Policy (πrandomized)

In this paper, the main feature of πrandomized is that a UAV returns to base with a small probability even though it has notreached its critical fuel threshold. Let Fcr and Fth be the fuel thresholds corresponding to the critical fuel level and thefuel level triggering the randomization, respectively. Accordingly, the randomized policy suggests that a UAV returnsto base with probability Prreturn (w.p.Prreturn), if its remaining fuel level is less than Fth (i.e. Frem ≤ Fth). Moreover, itreturns to base certainly (w.p.1), if its remaining fuel is less than Fcr. In this study, we select Fth and Prreturn as 3Fcrand 0.01, respectively.

B. Connectivity Policies

As depicted in the preceding sections, a UAV in a persistent mission requires to return to base for refueling. In suchcases, there is no guarantee that the communication network will stay connected after the UAV has left the surveillancearea (e.g. the removal of UAV 4 in Figure 2b causes a disconnection in the network). Since the connectivity is essentialfor the base to collect information about the field, there should be a reconfiguration among the existing vehicles torecover connectivity in the face of a UAV removal. In literature, there are various strategies for the recovery of networkconnectivity (e.g. [11], [12], [13]), one of which can be used as a connectivity policy in this problem.

1. Replacement Policy (πreplace)

In this paper, we employ the message passing strategy (MPS) proposed in [13] as a connectivity policy for UAVs.As such, whenever a UAV leaves the field for refueling, the MPS suggests a sequence of replacements to ensureconnectivity of the communication network. The advantage of using the MPS is to guarantee connectivity throughsome local operations requiring minimal amount of information. As a result of the MPS, UAVs on the field reconfigurethemselves in a decentralized fashion through a sequence of replacements.

2. noReplacement Policy (πnoReplace)

When a UAV executes the replacement policy, it may change the node it is loitering over according to the replacementrequest message received from another UAV. Changing the node, over which it is loitering, implies an extra time incruise mode, so its overall endurance for loitering decreases. In order to understand the benefits of the replacement pol-icy, the noReplacement policy is considered, where no replacements occur during a mission. Accordingly, whenevera UAV returns to base for refueling, the rest of the UAVs continue to loiter over their originally assigned nodes.

7 of 14

American Institute of Aeronautics and Astronautics

Page 8: UAVs for Law Enforcement: A Case Study for Connectivity ...people.bu.edu/daksaray/Site/Publications_files/Aviation_2014.pdfUAV and the connectivity of the communication network on

C. Node Assignment Policy (πbase)

As illustrated in Figure 3, the policy of the base for node assignments also plays an important role in the overallmission performance. Note that the base can track the ages of the nodes as shown in Eq. 4. In other words, the basecounts the time steps that it has not gotten any information from a particular node (e.g. a node corresponding to anage of 0 implies that there exist a UAV loitering over that node and communicating with the base.) In this case study,we assume that the base executes a greedy strategy for the node assignment (i.e. it minimizes Eq. 5). Accordingly,whenever UAV i completes refueling at time t, the base creates a communication network from the UAVs on the fieldat time t. Based on the connectivity constraint, it then determines the feasible nodes it can assign UAV i to. Finally,the base assigns UAV i to the feasible point that has the maximum age.

D. Design of Experiments (DOE) Study

In order to create the experiment cases, a latin hyper cube design is used, and the ranges of the input variables areselected as illustrated in Table 1. Since the output of each experiment case is a random variable, it is considered as asample from the actual output distribution. Therefore, we conduct repeated simulations to demonstrate the expectedperformance of a particular input set. In this paper, the DOE size is selected 250. Each case in the DOE is repeated15 times, each repetition is executed for 10000 time steps, and the expected outputs as shown in Table 1 are recordedaccordingly. Moreover, all cases in the DOE are executed under 4 different UAV policies, which are generated by thecombinations of two refuel and two connectivity policies. The control policies are illustrated in Table 2, and the flowdiagrams of each policy are presented in Figure 5. Finally, a MATLAB script was written to conduct the DOE study.For an individual control policy, each experiment case, which runs for 10000 time steps and repeated 15 times, tookapproximately 5 minutes on a 3.40GHz Intel Core i7 PC.

Table 1: Inputs/Outputs of DOE Study

Inputs

V Cruise velocity of each UAV 6-15Fmax Maximum fuel capacity of each UAV 1500-2500Rcomm Maximum communication range of each UAV 20-35fc ratio The fuel consumption ratio of loiter at lower altitude over loiter at higher altitude 1-2.5tdetect Number of time steps a UAV loiters at low altitude for detecting an object 3-12

Outputs

E[F̄return] Expected value of the average remaining fuel when returningE[µCage ] Expected value of the mean Cage of the repetitionsE[max(Cage)] Expected value of the maximum Cage of the repetitionsE[µUin f o ] Expected value of the mean Uin f o of the repetitionsE[rdetect ] Expected value of the ratio of detected objects over the overall threats

Table 2: Control policies used in the Monte Carlo simulations

Connectivity PoliciesπnoReplace πreplace

Refuel Policies πdeterministic Deterministic,no replacement Deterministic, replacementπrandomized Randomized,no replacement Randomized, replacement

Note that this study can be extended by using actual UAV data and higher order dynamics in the experimentsto obtain more accurate results. However, the problem focused in this paper is a very complex problem, which isinfluenced by various factors. In order to obtain a general idea about the significant parameters in a computationallyefficient way, we have preferred to conduct a low fidelity analysis.

IV. Results

As depicted in the preceding section, the DOE study is conducted for four different control policies, two of whichutilize πrandomized in the decision scheme. Note that πrandomized causes UAVs to return to base even though they havenot reached to a critical fuel threshold. To capture the degree of randomization, Figure 6 displays the distributions of

8 of 14

American Institute of Aeronautics and Astronautics

Page 9: UAVs for Law Enforcement: A Case Study for Connectivity ...people.bu.edu/daksaray/Site/Publications_files/Aviation_2014.pdfUAV and the connectivity of the communication network on

NodeAssignment

Loiter over theassigned node

Frem ≤ Fcr

Return to base

YES NO

(a) Deterministic, no replacement

NodeAssignment

Loiter over theassigned node

Frem ≤ Fcr

Return to base

YES NO

w.p.Prreturn

w.p.(1− Prreturn)

(w.p. : with probability)

(b) Randomized, no replacement

NodeAssignment

Loiter over theassigned node

Frem ≤ Fcr

Return to base

YES NO YES

NO

Replacementrequest message

is received

(c) Deterministic, replacement

NodeAssignment

Loiter over theassigned node

Frem ≤ Fcr

Return to base

YES NO

w.p.Prreturn

w.p.(1− Prreturn) Replacementrequest message

is received

YES

NO

(w.p. : with probability)

(d) Randomized, replacement

Figure 5: Flow diagrams of the utilized policies.

the average fuel of UAVs when they first decide to return to base. The results show that the mean of the average returnfuel is larger in randomized policies, while it gets slightly smaller with the policies utilizing replacements. We suspectthat such a decrease is due to UAVs initiating the replacements but reaching a critical threshold without completingthe replacements. In the simulations, such a UAV immediately decides to return to base to avoid any unsafe state.Consequently, a UAV may get further away from the base due to a replacement request and then decide to return tobase, which causes extra fuel consumption. Note that ineffective replacements can be prevented by improving thepolicy such that if a UAV does not have enough fuel to replace a node then it does not accept the replacement requestmessage.

Based on the simulated cases, all of the policies exhibit similar means for the ratios of the detected objects over thetotal threats. The distributions of the mean ratios are displayed in Figure 7, where slightly smaller means are observedwith the policies without replacements. Such a result is expected because a UAV may not stream back informationregarding the detected object due to the disconnection after a UAV removal.

One objective of the DOE study is to investigate any trends between the inputs and the outputs. Figures 8 and9 show the scatter plots of the maximum cost (i.e. maxt Cage(t)) and the average utility (i.e. 1

T ∑Tt=1 Uin f o(t), where

T = 10000), respectively. As illustrated by the figures, trends between inputs and outputs do not vary with respectto different policies. Among the studied design variables, we observe that the velocity and the communication radiusinfluence the outputs significantly. As the velocity and the communication radius increase, a desired outcome isobserved, which is a decrease in the maximum cost and an increase in the average utility. Moreover, the maximumfuel capacity and the fuel consumption ratio have a greater impact on the average utility than the maximum cost.

An interesting result pertains to the highlighted asterisk points on Figures 8 and 9. In particular, we see an iso-

9 of 14

American Institute of Aeronautics and Astronautics

Page 10: UAVs for Law Enforcement: A Case Study for Connectivity ...people.bu.edu/daksaray/Site/Publications_files/Aviation_2014.pdfUAV and the connectivity of the communication network on

150

155

160

165

170

MeanStd DevStd Err MeanUpper 95% MeanLower 95% MeanN

159.72844.87592680.3083807160.33577159.12103

250

Summary Statistics

Derterministic, no replacement

155

160

165

170

175

180

MeanStd DevStd Err MeanUpper 95% MeanLower 95% MeanN

167.724525.86497650.3709337168.45509166.99395

250

Summary Statistics

Randomized, no replacement

140

145

150

155

160

165

170

MeanStd DevStd Err MeanUpper 95% MeanLower 95% MeanN

156.339046.26712890.396368157.1197

155.55838250

Summary Statistics

Deterministic, replacement

145

150

155

160

165

170

175

180

MeanStd DevStd Err MeanUpper 95% MeanLower 95% MeanN

163.816087.00064330.4427596164.68811162.94405

250

Summary Statistics

Randomized, replacement

Average remaining fuel at the return decision

Figure 6: Distributions for the average remaining fuel of a UAV when it first decides to return to base.

0.4

0.45

0.5

0.55

0.6

0.65

0.7

0.75

0.8

0.85

MeanStd DevStd Err MeanUpper 95% MeanLower 95% MeanN

0.649880.09259960.00585650.66141460.6383454

250

Summary Statistics

Deterministic, no replacement

0.4

0.45

0.5

0.55

0.6

0.65

0.7

0.75

0.8

MeanStd DevStd Err MeanUpper 95% MeanLower 95% MeanN

0.644960.08628080.00545690.65570750.6342125

250

Summary Statistics

Randomized, no replacement

0.4

0.45

0.5

0.55

0.6

0.65

0.7

0.75

0.8

0.85

MeanStd DevStd Err MeanUpper 95% MeanLower 95% MeanN

0.663560.08857940.00560230.67459380.6525262

250

Summary Statistics

Deterministic, replacement

0.4

0.45

0.5

0.55

0.6

0.65

0.7

0.75

0.8

0.85

MeanStd DevStd Err MeanUpper 95% MeanLower 95% MeanN

0.659920.08490480.00536990.67049610.6493439

250

Summary Statistics

Randomized, replacement

The detection ratio

Figure 7: Distributions for the ratio of detected objects over the overall threats.

lated set of points on the plots corresponding to the radius of communication for the deterministic&replacement anddeterministic&no replacement policies. Note that these points are the DOE cases, where the velocity is mostly high,the fuel consumption ratio is strictly small, and the radius of communication is mostly small. We suspect that thesecases are some outliers, thus the results cannot be generalized. In order to support this claim, we select some otherpoints having high velocity, low fuel consumption ratio, and short communication range. In order to differentiate thepoints, we highlight them with filled triangles. As shown in Figures 8 and 9, the cases highlighted with the trianglespresent coherent results with respect to the general trend whereas the cases highlighted with the asterisks indicate ahuge jump on the outputs. Such a jump might be caused by some external factors that are not captured in this study.

Note that we have initially determined five design variables, namely the velocity, the fuel capacity, the fuel con-sumption ratio, and the time to detect. The mean betweenness and the average degree are the topological metrics thatare strongly correlated with the radius of communication. From the scatter plots, we observe that smaller mean be-tweeneess and larger average degree in a communication network are desired to maximize the utility and to minimizethe cost. In the following plots, we will focus on the initial five design variables. Figures 10a, 10b, 10c, and 10d showthe contour plots of the maximum cost with respect to the time to detect and the fuel consumption ratio. Based onthe patterns, we observe that the maximum cost (i.e. corresponding to dark regions) is sensitive to the variations offuel consumption ratio. In all policies, if the fuel consumption ratio is larger than some value, the maximum cost isincreasing regardless of the changes in the time to detect. For instance, in case of fuel consumption ratio is close tothe lower bound, varying time to detect does not significantly influence the output. Consequently, the results suggest

10 of 14

American Institute of Aeronautics and Astronautics

Page 11: UAVs for Law Enforcement: A Case Study for Connectivity ...people.bu.edu/daksaray/Site/Publications_files/Aviation_2014.pdfUAV and the connectivity of the communication network on

50

100

150

200

250m

ax C

ost (

Det

,noR

ep)

100

150

200

250

max

Cos

t (R

and,

noR

ep)

100

150

200

250

max

Cos

t (D

et,R

ep)

100

150

200

250

max

Cos

t (R

and,

Rep

)

6 8 10 12 14V

1400 1800 2200F_max

1 1.2 1.6 2 2.2FC_ratio

20 22 24 26 28 30 32 34R_comm

2 4 6 8 10t_detect

0.05 0.150.2 0.3mean_betw

2 2.5 3 3.5 4avg_deg

Scatterplot Matrix

Figure 8: Scatter plot of the maximum cost with respect to the input variables.

2.5

3

3.5

4

4.5

avg

Util

ity (

Det

,noR

ep)

2.5

3

3.5

4

4.5

avg

Util

ity (

Ran

d,no

Rep

)

2.5

3

3.5

4

4.5

avg

Util

ity (

Det

,Rep

)

2.5

3

3.5

4

4.5

avg

Util

ity (

Ran

d,R

ep)

6 8 10 12 14V

1400 1800 2200F_max

1 1.2 1.6 2 2.2FC_ratio

20 22 24 28 30 32R_comm

2 4 6 8 10t_detect

0.05 0.15 0.25 0.35mean_betw

2 2.5 3 3.5 4avg_deg

Scatterplot Matrix

Figure 9: Scatter plot of the average utility with respect to the input variables.

11 of 14

American Institute of Aeronautics and Astronautics

Page 12: UAVs for Law Enforcement: A Case Study for Connectivity ...people.bu.edu/daksaray/Site/Publications_files/Aviation_2014.pdfUAV and the connectivity of the communication network on

that the fuel consumption ratio is a more significant factor on the maximum cost than the time to detect. Moreover,the plots show that utilizing replacement policy greatly reduces the maximum cost (i.e. reducing the dark regions),and utilizing the randomized policy degrades the achievable small cost (i.e. reduces white regions or increases grayregions).

2

4

6

8

10

12

t_de

tect

0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 2.6

FC_ratio

max Cost (Det,noRep)maxC_D

<= 80

<= 100

<= 120

<= 140

<= 160

<= 180

<= 200

> 200

(a) Deterministic,noReplace

2

4

6

8

10

12

t_de

tect

0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 2.6

FC_ratio

max Cost (Det,Rep)maxC_Drep

<= 80

<= 100

<= 120

<= 140

<= 160

<= 180

<= 200

> 200

(b) Deterministic,Replace

2

4

6

8

10

12

t_de

tect

0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 2.6

FC_ratio

max Cost (Rand,noRep)maxC_R

<= 80

<= 100

<= 120

<= 140

<= 160

<= 180

<= 200

> 200

(c) Randomized,noReplace

2

4

6

8

10

12

t_de

tect

0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 2.6

FC_ratio

max Cost (Rand,Rep)maxC_Rrep

<= 80

<= 100

<= 120

<= 140

<= 160

<= 180

<= 200

> 200

(d) Randomized,Replace

Figure 10: Contour plots of the maximum cost with respect to the time to detect and the fuel consumption ratios.

Figure 11 illustrates the contour plots of the average cost with respect to the maximum fuel capacity and thevelocity. As expected, small velocity and low fuel capacity cause a large cost as depicted by dark patterns on thebottom left of Figures 11a, 11b, 11c, and 11d. An interesting result is the significance of velocity over the fuelcapacity. The results show that if the velocity is larger than a threshold value (e.g. if the velocity is larger than 11in Figure 11a), the variation of fuel capacity does not significantly impact the average cost as seen by the absence ofdark regions. We acknowledge that the fuel capacity is very important for the vehicle endurance, and if the vehicledoes not have enough endurance to reach a point on the surveillance area, the preceding discussions on velocity donot become valid. However, the results of this study suggest that long endurance vehicles may not be necessary forpersistent surveillance missions if a UAV has sufficiently high velocity and it has enough endurance to reach any pointone the mission area. Like the previous figure, we observe that utilizing the replacement policy reduces the averagecost and decreases the value of the threshold velocity.

1400

1600

1800

2000

2200

2400

2600

F_m

ax

6 8 10 12 14 16

V

average Cost (Det,noRep)avgC_D

<= 10

<= 15

<= 20

<= 25

<= 30

<= 35

<= 40

<= 45

> 45

(a) Deterministic,noReplace

1400

1600

1800

2000

2200

2400

2600

F_m

ax

6 8 10 12 14 16

V

average Cost (Det,Rep)avgC_Drep

<= 10

<= 15

<= 20

<= 25

<= 30

<= 35

<= 40

<= 45

> 45

(b) Deterministic,Replace

1400

1600

1800

2000

2200

2400

2600

F_m

ax

6 8 10 12 14 16

V

average Cost (Rand,noRep)avgC_R

<= 10

<= 15

<= 20

<= 25

<= 30

<= 35

<= 40

<= 45

> 45

(c) Randomized,noReplace

1400

1600

1800

2000

2200

2400

2600

F_m

ax

6 8 10 12 14 16

V

average Cost (Rand,Rep)avgC_Rrep

<= 10

<= 15

<= 20

<= 25

<= 30

<= 35

<= 40

<= 45

> 45

(d) Randomized,Replace

Figure 11: Contour plots of the average cost with respect to the maximum fuel and the velocity.

After determining the significance of velocity, we then investigate the combined effect of velocity and radius ofcommunication on the average cost, whose contour plots are illustrated in Figures 12a, 12b, 12c, and 12d. The worstcase of the average cost is observed when both the velocity and the radius of communication are small (i.e. the blackregions on the bottom left of the figures). Different than the previous cases, the average cost is very sensitive to thevariations of both design variables. Similar to the previous cases, utilizing the replacement policy increases the areaof the small costs on the upper right corner (the white regions). Finally, we observe that the randomized replacementpolicy causes a reduction in the small cost area on the lower right corner of the Figure 12d (i.e. causing a larger grayregion), when it is compared with the lower right corner of the Figure 12b (i.e. having less gray region).

The simulation results show that the replacement policy is very influential on the output parameters because ofrecovering connectivity after any UAV removal. On the other hand, the randomized policy does not significantlycontribute to the improvement of the output metrics. Note that a UAV utilizing the randomized policy returns tobase with a small probability even though it has not reached a critical fuel threshold. Our initial intention to usethis policy was to create some randomization in the overall system behavior. Henceforth, the UAV actions wouldnot become tractable in the presence of an adversary. To capture how randomization affects the mission, we study

12 of 14

American Institute of Aeronautics and Astronautics

Page 13: UAVs for Law Enforcement: A Case Study for Connectivity ...people.bu.edu/daksaray/Site/Publications_files/Aviation_2014.pdfUAV and the connectivity of the communication network on

18

20

22

24

26

28

30

32

34

36

R_c

omm

6 8 10 12 14 16

V

average Cost (Det,noRep)avgC_D

<= 15

<= 20

<= 25

<= 30

<= 35

<= 40

<= 45

> 45

(a) Deterministic,noReplace

18

20

22

24

26

28

30

32

34

36

R_c

omm

6 8 10 12 14 16

V

average Cost (Det,Rep)avgC_Drep

<= 15

<= 20

<= 25

<= 30

<= 35

<= 40

<= 45

> 45

(b) Deterministic,Replace

18

20

22

24

26

28

30

32

34

36

R_c

omm

6 8 10 12 14 16

V

average Cost (Rand,noRep)avgC_R

<= 15

<= 20

<= 25

<= 30

<= 35

<= 40

<= 45

> 45

(c) Randomized,noReplace

18

20

22

24

26

28

30

32

34

36

R_c

omm

6 8 10 12 14 16

V

average Cost (Rand,Rep)avgC_Rrep

<= 15

<= 20

<= 25

<= 30

<= 35

<= 40

<= 45

> 45

(d) Randomized,Replace

Figure 12: Contour plots of the average cost with respect to the communication range and the velocity.

different randomized policies by varying Fth, which is defined as the fuel level triggering the randomization. Note thatwe assume that Fth is equal to nFcr, and if n = 1 the randomized policy becomes identical to the deterministic policy.As n increases, a UAV has a larger probability to return to base with more fuel. Table 3 illustrates the output parametersbased on the deterministic and the randomized replacement policies. As n increases, the average fuel a UAV decidesto return to base significantly increases; however, the cost and the utilities are not influenced much until a value of n.Thus, we suppose that if n is tuned properly, effective results can be obtained with the randomized replacement policy.

Table 3: Outputs of different randomized policies.

F̄return µCage maxCage µUin f o rdetect

Deterministic,Replacement 145.53 33.82 209.67 3.30 0.54Randomized,Replacement (Fth = 2Fcr) 151.20 32.92 214 3.30 0.56Randomized,Replacement (Fth = 4Fcr) 214.64 34.01 199 3.28 0.55Randomized,Replacement (Fth = 6Fcr) 307.33 33.84 279 3.24 0.54

In this paper, the DOE study based on the depicted assumptions shows that the velocity and the radius of com-munication are the most crucial design variables for a persistent surveillance mission. In addition, it is observed thatthe fuel consumption ratio influences the output metrics more than the maximum fuel capacity. A very interestingresult is the insignificance of the fuel capacity if a limit velocity is sustained. In this manner, the results suggest thatif we can design sufficiently fast vehicles that can reach to any point on the surveillance area, then designing longendurance vehicles is not becoming very critical. Due to the nature of the problem, having a connected communica-tion network throughout the mission is very important, so a policy taking into account the connectivity maintenancegreatly improves the mission performance. As such, the policies utilizing some replacements to recover connectivityin UAV removal exhibit a better performance than the policies without the replacements. Finally, while the randomizedpolicies do not significantly affect the output metrics as the replacement policies do (e.g. the results of the determin-istic replacement and the randomized replacement policies do not vary from each other), they can result in UAVs tobehave intractable without any performance loss if the randomization parameter is tuned properly. Note that beingintractable becomes beneficial for persistent surveillance missions, where some adversaries are present. In the case ofan adversary watching the UAV actions for a sufficient amount of time, the deterministic policies cause the adversaryto forecast when the UAV will return to base for refueling, whereas the randomized policies hinder tractability.

V. Conclusion

This paper addresses a law enforcement scenario, where the base representing the ground station of the policeforces aims to maximize the recent information gathered from a surveillance area. In order to achieve this objective, thebase sends a set of autonomous UAVs to some monitoring points, and the UAVs broadcast the monitored informationback to the base through multi-hop communications. Since the base and each UAV have limited communicationranges, the base can collect information only from the UAVs that can communicate with the base either directly orthrough other vehicles. In this paper, we study some design and control variables that can have potential effect onthe mission performance. As the design variables, we consider velocity, fuel capacity, radius of communication,fuel consumption ratio, and time to detect whereas some refuel (i.e. deterministic and randomized) and connectivity

13 of 14

American Institute of Aeronautics and Astronautics

Page 14: UAVs for Law Enforcement: A Case Study for Connectivity ...people.bu.edu/daksaray/Site/Publications_files/Aviation_2014.pdfUAV and the connectivity of the communication network on

(replacement and noReplacement) policies are considered as the control variables. Based on a scenario containingidentical UAVs, the most influential design variables are observed as the velocity and the radius of communication.Moreover, the replacement policy greatly improves the mission effectiveness and reduces the influence of the fuelcapacity of a UAV on the mission performance.

As a future work of this research, we aim to include more design variables in the DOE study that will also capturethe aerodynamic properties of UAVs. Furthermore, we intent to simulate an extended version of the replacementpolicy, where UAVs may reject a replacement request based on their current operations. Finally, the results of thisstudy are based on some fixed coordinate points. In order to generalize the results of the DOE study, we plan toinspect the presence of ratios between the closest and the furthest point on the surveillance area, and we aim to relatesuch ratios with the mission performance.

References1Nigam, N. and Kroo, I., “Control and design of multiple unmanned air vehicles for a persistent surveillance task,” 12th AIAA/ISSMO

Multidisciplinary Analysis and Optimization Conference, Victoria, British Columbia, AIAA-2008-5913, 2008.2Beard, R. W., McLain, T. W., Nelson, D. B., Kingston, D., and Johanson, D., “Decentralized cooperative aerial surveillance using fixed wing

miniature UAVs,” Proceedings of the IEEE, Vol. 94, No. 7, 2006, pp. 1306–1324.3Valenti, M., Dale, D., and How, J., “Mission health management for 24/7 persistent surveillance operations,” AIAA Guidance, Navigation,

and Control Conference, 2007.4White, B., Tsourdos, A., Ashokaraj, I., Subchan, S., and Zbikowski, R., “Contaminant Cloud Boundary Monitoring Using Network of UAV

Sensors,” Sensors Journal, IEEE, Vol. 8, No. 10, 2008, pp. 1681–1692.5Casbeer, D. W., Swindlehurst, A. L., and Beard, R., “Connectivity in a UAV multi-static radar network,” AIAA Guidance, Navigation, and

Control Conference, Keystone, CO, 2006.6Schumann, B., Scanlan, J., and Fangohr, H., “A Generic Unifying Ontology for Civil Unmanned Aerial Vehicle Missions,” Aviation Tech-

nology, Integration, and Operations (ATIO) Conferences, Indianapolis, Indiana, 2012.7Wright, S., “UAVs in Community Police Work,” AIAA Infotechs., Aerospace, Arlington, 2005.8Puri, A., “A survey of unmanned aerial vehicles (UAV) for traffic surveillance,” Department of computer science and engineering, University

of South Florida, 2005.9DeGarmo, M. and Nelson, G. M., “Prospective unmanned aerial vehicle operations in the future national airspace system,” AIAA 4th Aviation

Technology, Integration and Operations (ATIO) Forum, 2004, pp. 20–23.10Sampigethaya, K., Poovendran, R., and Bushnell, L., “Security of Future eEnabled Aircraft Ad hoc Networks,” AIAA Aviation Technology,

Integration and Operations (ATIO), 2008.11Aksaray, D. and Mavris, D., “Maintaining Connectivity for Networked Mobile Systems in the Presence of Agent Loss,” AIAA Guidance,

Navigation, and Control Conference, Boston, MA, 2013.12Mi, Z., Yang, Y., and Liu, G., “HERO: A hybrid connectivity restoration framework for mobile multi-agent networks,” IEEE International

Conference on Robotics and Automation (ICRA), IEEE, 2011, pp. 1702–1707.13Aksaray, D., Yazicioglu, A. Y., Feron, E., and Mavris, D. N., “A Message Passing Strategy for Decentralized Connectivity Maintenance in

Agent Removal,” arXiv preprint arXiv:1311.0244, 2013.

14 of 14

American Institute of Aeronautics and Astronautics