Professional Documents
Culture Documents
Report
Report
Report
Submitted in partial fulfilment of the requirement for the award of the Degree of
BACHELOR OF ENGINEERING
In
Vaishnavi P
1JS19EC155
CERTIFICATE
Declaration
Vaishnavi P
1JS19EC155
JSSATE, Bengaluru-5600060
ACKNOWLEDGEMENT
I thank panel members Dr. Veeramma Yatnalli, and Dr. H S Aravind for their
immense support , guidance and ideas for the successful completion of the
Technical Seminar.
I thank teaching and non-teaching staff for their cooperation.
Vaishnavi P
(1JS19EC155)
ABSTRACT
Sl No Chapter Page No
1. Introduction 1
2. Literature Review 2
3. Practical Using of Neural Networks in Military Applications
4. Drone Feed Analysis 7
4.1 Introduction 7
4.2 Principle 8
4.2.1 Detection Techniques 8
4.2.2 Classification and Localisation Techniques 9
4.2.3 Jamming and Countering Techniques 11
4.3 Architecture and Implementation 12
5. Challenges of Drone Feed Analysis 18
6. Advantages of AI in defence sector 20
7. Disadvantages of AI in defence sector 21
8. Applications
9. Impact of Using Artificial Intelligence in Military on Society
10. Conclusion 22
11. References 23
List of Figures
Chapter 1: Introduction
1.1 ARTIFICIAL
The simple definition of artificial is that objects that are made or produced by human
beings rather than occurring naturally.
1.2 INTELLIGENCE
The simple definition of intelligence is a process to entail a set of skills of problem
solving, enabling to resolve genuine problems or difficulties that encounters and to
create an effective product and must also entail the potential for finding or creating
problems and thereby laying the groundwork for the acquisition of new knowledge.
1.3 ARTIFICIAL INTELLIGENCE
Artificial intelligence is a branch of science which deals with helping machines
find solution to complex problems in a more human like fashion. This generally involves
borrowing characteristics from human intelligence, and applying them as algorithms in a
computer friendly way. A more or less or flexible or efficient approach can be taken
depending on the requirements established, which influences how artificial intelligent
behavior appears.
Artificial intelligence is generally associated with computer science, but it has
many important links with other fields such as maths, psychology, cognition , biology and
philosophy , among many others . Our ability to combine knowledge from all these fields
will ultimately benefits our progress in the quest of creating an intelligent artificial being.
A.I. is mainly concerned with the popular mind with the robotics development, but
also the main field of practical application has been as an embedded component in the
areas of software development which require computational understandings and modeling
such as such as finance and economics, data mining and physical science.
A.I in the fields of robotics is the make a computational models of human thought processes.
It is not enough to make a program that seems to behave the way human do. You want to
make a program that does it the way humans do it.In computer science they also the problems
bcoz we have to make a computer that are satisfy for understanding the high-level languages
and that was taken to be A.I. The intellectual roots of AI, and the concept of intelligent
machines, may be found in Greek mythology. Intelligent artifacts appear in literature since
then, with real mechanical devices actually demonstrating behaviour with some degree of
intelligence.
After modern computers became available following World War-II, it has become possible to
create programs that perform difficult intellectual tasks. We have witnessed the solving of a
number of intelligently hard problems by computers like playing good chess, for instance.
During the early days of computing the chess playing was considered a benchmark showing a
real intelligence. Even in seventies of the last century, when the computer chess was on the
masters level, it seemed almost impossible to make a program that could beat the world
champion. However, this happened sooner than expected. This had three reasons: increased
computing power, development of a good search algorithm (that can be used in many
applications beside chess,), and well organized knowledge bases that included all available
chess knowledge (first of all, opening and end games). In essence, the chess problem could be
solved because it was a specific intellectual problem belonging to so called narrow AI. A
different case is translating from one language into another that requires general AI. In
sixties of the last century, especially after N. Chomski’s work in structural linguistics, it was
expected that the natural language translation problem will be solved soon. It has not
happened yet, although success is visible in some specific applications like, for instance,
Google’s AI linguistics. The reason is that this requires artificial general intelligence --
possessing of and ability to handle large amounts of knowledge in every field related to
human activities. It is generally accepted that AI can be considered in two ways: as a science
aimed at trying to discover the essence of intelligence and developing generally intelligent
machines, or as a science providing methods for solving complex problems that cannot be
solved without applying some intelligence like, for instance, playing good chess or making
right decisions based on large amounts of data. In the present seminar we will take the second
approach, advocate for applying specific AI methods to cyber defense and military problems.
Artificial Intelligence (AI) has been making significant contributions to the defence sector,
revolutionizing the way we think about national security. The use of AI in the military is not
new, but recent advancements in technology have made it more accessible and effective than
ever before. It is difficult to develop software with conventional fixed algorithms (hard-wired
logic on decision making level) for effectively defending against the dynamically evolving
attacks in networks.AI can be used in various areas of defence , from intelligence gathering to
decision-making in combat situations .With the ability to process vast amounts of data
quickly and accurately, AI has the potential to enhance the capabilities of armed forces and
improve their effectiveness on the battle field. Some of the areas where AI is used are
Warfare platforms, Cyber security , Logistics and transportation , Target
Recognition ,Battlefield Healthcare ,Drone Feed Analysis , Autonomous Multi-Role Combat
Robot System , Unmanned round Vehicles , Military Aircraft "co-pilot" System , Automatic
Fault Diagnosis and Elimination System for Weapon Equipment , Automatic Intelligence and
Image Recognition System , Artificial Intelligence Weapons , Robot Army .
This brief outlines the significance of the various threats posed by the increasing
use of drones. It suggests a roadmap for addressing such threats. The brief covers the aspects
of detection, identification and localisation techniques, as well as jamming and other
countering measures. It also looks into the various existing anti-UAS solutions already in the
market.
super learners for improving the performance of algorithms in step one (minimizing
the algorithm error rate to reduce its bias in the learning set) and then in step two the
results are input into the meta learner with its stacked blended output (with the
weakest algorithms learning better). A fundamental key to fraud data is that it is
inherently not systematic, and an optimal resampling methodology has yet not been
identified. Building a test harness, for all permutations of algorithm sample set pairs,
demonstrates that the complex, intrinsic data structures are all thoroughly tested. A
comparative analysis on fraud data that applies stacked generalizations provides
useful insight to find the optimal mathematical formula for imbalanced fraud data
sets necessary to improve upon fraud detection for national security
Clark IV, W.H., Hauser, S., Headley, W.C. and Michaels, A.J., [2]
Applications of machine learning are subject to three major components that
contribute to the final performance metrics. Within the category of neural networks,
and deep learning specifically, the first two are the architecture for the model being
trained and the training approach used. This work focuses on the third component,
the data used during training. The primary questions that arise are “what is in the
data” and “what within the data matters?” looking into the radio frequency machine
learning (RFML) field of automatic modulation classification (AMC) as an example
of a tool used for situational awareness, the use of synthetic, captured, and
augmented data are examined and compared to provide insights about the quantity
and quality of the available data necessary to achieve desired performance levels.
Three questions are discussed within this work: (1) how useful a synthetically trained
system is expected to be when deployed without considering the environment within
the synthesis, (2) how can augmentation be leveraged within the RFML domain, and,
lastly, (3) what impact knowledge of degradations to the signal caused by the
transmission channel contributes to the performance of a system. In general, the
examined data types each make useful contributions to a final application, but
captured data germane to the intended use case will always provide more significant
information and enable the greatest performance. Despite the benefit of captured
data, the difficulties and costs that arise from live collection often make the quantity
of data needed to achieve peak performance impractical. This paper helps quantify
the balance between real and synthetic data, offering concrete examples where
training data is parametrically varied in size and source.
E. Tyugu[4]
The speed of processes and the amount of data to be used in defending the cyber
space cannot be handled by humans without considerable automation. However, it is
difficult to develop software with conventional fixed algorithms (hard-wired logic on
decision making level) for effectively defending against the dynamically evolving
attacks in networks. This situation can be handled by applying methods of artificial
intelligence that provide flexibility and learning capability to software. This paper
presents a brief survey of artificial intelligence applications in cyber defense (CD),
and analyzes the prospects of enhancing the cyber defense capabilities by means of
increasing the intelligence of the defense systems. After surveying the papers
available about artificial intelligence applications in CD, we can conclude that useful
applications already exist. They belong, first of all, to applications of artificial neural
nets in perimeter defense and some other CD areas. From the other side - it has
become obvious that many CD problems can be solved successfully only when
methods of artificial intelligence are being used. For example, wide knowledge usage
is necessary in decision making, and intelligent decision support is one of yet
unsolved problems in CD.
Ali, A[7]
Artificial intelligence (AI) is trending in the military and safety-critical application
sectors. Currently, the private sector is helping the government sector to implement
new advanced techniques to bring a revolution for different government and public
sector management. It also helps to provide sustainable accountability in the
accounting field; at present, AI is bringing a revolution in concept building. It is
bringing potential revolutions by using novel approaches in such directions. This
paper is a novel approach in the same direction; our research aim of this paper is to
emphasize the AI in the militaries, what are the latest trend and usages recently
worldwide used for AI applications in militaries. In this paper, we not only discuss
the usage of AI applications in the military but also in the civil defense and health
industry. We review and discuss that AI has potential benefits in military
applications, HRMS, decision making, disaster prevention and response, GIS, service
personalization, interoperability, extensive data analysis, anomaly and pattern
recognition, intrusion detection, and new solution discovery using the highly
configurable system and real-time simulation.
Zhang, Y., Dai, Z., Zhang, L., Wang, Z., Chen, L. and Zhou, Y.,[8]
The breakthroughs in artificial intelligence (AI) have led to a new race in military
throughout the world. Even though technologies in AI, like machine learning or big
data, are still at their juvenile stage, the technology experts in United States, Europe
Union or other countries, have been setting out to transfer AI technologies into the
military power, which is doomed to influence all spheres of warfare. To figure out
which domain has AI been studied to enhance military capability, the paper
summarized 7 major military applications of AI, based on the projects investigated by
Khalil, H., Rahman, S.U., Ullah, I., Khan, I., Alghadhban, A.J., Al-Adhaileh,
M.H., Ali, G. and ElAffendi, M.,[10]
This paper presents a UAV-swarm-communication model using a machine-learning
approach for search-and-rescue applications. Firstly, regarding the communication of
UAVs, the receive signal strength (RSS) and power loss have been modeled using
random forest regression, and the mathematical representation of the channel matrix
has also been discussed. The second part consisted of swarm control modeling of
UAVs; however, a dataset for five types of triangular swarm formations was
generated, and K-means clustering was applied to predict the cluster. In order to
obtain the correct swarm formation, the dendrogram of all types was investigated.
Finally, the heat map and contour were plotted for all kinds of swarm clusters.
Furthermore, it was observed that the RSS of proposed swarms had good agreement
with swarm distances.
between the attention switching across sensor types and surveyed objects over the
entire mission.
4.1: Introduction
Drone Feed Analysis system is an AI Deep Learning-Based real time/post flight military
object identification system. It identifies military objects from remotely piloted aircrafts It
builds a database repository and carries out AI-enabled analysis providing military pattern of
enemy operations and analysis/prediction of events.
4.2:Principle
There are 4 stages that are detection, identification , localisation, techniques,
as well as jamming and other countering measures
Radar.
Radar is a useful tool for detection of aircraft. There are various challenges, however.
These include a drone’s low altitude and velocity of flying, and very small radar
cross-section (RCS) which makes it extremely difficult to distinguish noise or clutter
from the actual target.
RCS Study. Analysing the micro-doppler signature by multi-static radar can help in
accurate drone detection and tracking. Small drone RCS estimation obtained by
outdoor measurements has been analysed and proved that passive techniques can be
used to detect and track drones. Back scattering phenomenon associated with micro
motion has also been studied by scientists. Whereas the total RCS is important for
target detection, the energy backscattered from rotating parts like propeller and rotors
are crucial for extraction of useful micro-Doppler signatures.
Multiple Input Single Output (MISO) Radar Systems. A single antenna is used
for transmission, whereas four antennae are used for reception. The concept of
estimating the minimum power requirement that must be transmitted to reveal a
target with a specific value of RCS is possible with the radar equation. Drones up to a
range of 150 metres can be detected using this technique.
Multiple Input Multiple Output (MIMO) Radar Systems. Using MIMO radar
systems further increases the probability of detection of drones and UAVs. It
introduces high angular resolution and sensitivity for slow moving targets and covers
a wider area with lesser cost, as compared to conventional phased array systems. It
also exhibits enhanced discrimination from clutter and phase noise.
Audio. Although not a highly effective system in the stand-alone mode due to the
omnipresent background noise which increases the complexity of detection and
computation, it can be used as a system that can be superimposed with other detection
techniques. During the flight of the drone, the sound generated by the rotors can be
utilised in detection, classification and localisation of drones. Algorithms such as
Multiple
Signal Classification (MUSIC) can be used to estimate the direction of arrival.
Tetrahedron acoustic arrays have been used in systems to find out the direction of
arrival using received signal strength and time difference of arrival method in addition
to Kalman filter for tracking.
Being demonstrated the High Energy Laser Mobile Demonstrator in 2014, which fired a 10-
Kilowatt LASER and could function effectively in different climatic conditions like rain, fog
or wind. The Drone Catcher Gun is also a scalable option available to safeguard facilities as
has been researched and demonstrated.19 The jamming of drones can also be effected using a
3D MIMO radar.20 By using directional antennae, the power is confined spatially, thereby
allowing its use without interference to co-located RF devices/ equipment.
The two most potent and comprehensive repositories of counter-UAS have been studied as
part of preparing this brief.21, 22 The resulting database as part of the aforementioned
repositories is based on open-source research of technical and policy reports, news analyses,
manufacturers’ information, interviews with government officials, subject matter experts, and
participation in conferences. The sheer volume as well as the description of the counter UAS
weapons prohibits its inclusion in this brief.
The database consists of nearly 537 systems, sold by 277 vendors and fielded by 38 different
countries, some alone and others as part of joint ventures between two nations. RF & radar
detection have been found to be the most common detection techniques, followed by EO/IR
systems. Jamming the RF and GNSS signals is the most common method, followed by a few
which have spoofing capability. Some also mention the use of a ‘sacrificial drone’, or a drone
that may be used to deliberately collide with the detected enemy drone to destroy it.
A heterogenous sensing unit will serve the purpose of detection and localisation of the
drone. The heterogenous system will comprise of various sensors which can be
utilised in any weather. There should be RF/ radar-based sensors as the first line of
detection, coupled with acoustic sensors. This can be followed by an EO/IR system
layer for enhancing the resolution. The range of detection should be a minimum of
three km and it should effectively be able to track the drone at minimum 1 km,
assuming the drone is carrying a destructive payload.
The Central Processing Unit should be able to collate the feed from all the active and passive
sensors. It should thereafter carry out analysis, derive drone features, and achieve
classification.
For the acoustic sensors, the Short Time Fourier Transform (STFT) can be adopted and the
histogram of oriented gradients (HOG) can be used 25 for extraction of image features. These
are in addition to the PCA methods described earlier.
In the case of the RF features to be extracted, it may be assumed that at least two out of the
following three links are active at any given point in time, viz., controller link or the ground
control link (to include all frequency bands as prevalent based on the manufacturer
specifications); GPS link (uplink & downlink frequency bands as also to cover GLONASS,
Bediou & possibly IRNSS); and the payload (assumed camera/ optical device for
reconnaissance) WiFi link back to the ground control station which may transmit the data
captured in real time to the control station. The development and incorporation of neural
networks can be considered subsequently. By using the logical ‘OR’ operation, it will be
ensured that probabilities of detection are high despite the possibility of a false alarm, albeit
to a minimum.
Jamming Unit
Based on the inputs and analysis carried out by the Central Processing Unit, the jamming unit
can be made to work in three modes akin to air defence systems viz., Weapon Hold, Weapon
Free, and Weapon Tight. Based on directional antennae to achieve better spatial economy as
well as meet power requirements, a 360-degree coverage is preferable (gimbalb based for
added stabilisation) with a slaved servo/proportional-integral-derivative (feedback based)
controller to the tracker. A spoofing unit should be made alongside the jamming unit to take
over the drone if desired for forensics at a later stage (Man in the middle attackc).
Kill Unit
If the jamming unit is unable to affect the drone operations due to any reason, the high-power
microwave unit should kick into action to get the drone on the ground. The range of
engagement can be fixed with respect to various vulnerability aspects, such as the installation
being defended, the importance of the area, and the vital point. An alternate high-power
LASER may also be employed to destroy the drone. The close-in weapon support systems
(CIWSS) as used extensively by naval vessels the world over against hostile missiles is also
another option which may be explored.
While the system as envisioned in this brief has been trial-evaluated, stakeholders in the anti-
UAS campaign such as Rafael (Israel-based) have come up with the Drone-DomeTM drone
detection, neutralisation and interception system as well as the FireflyTM miniature tactical
loitering weapon.
Fig. 4- Drone Dome Brochure (Open Source) – Array of sensors and integration
Fig. 5- Firefly Brochure (Open Source) – Tactical loitering weapon to ‘Kill’ Drones
While the man-portable systems should be capable of being used by the dismounted soldier
or the infantry, the vehicle-based system may be utilised to guard static installations. It is
recommended that being a tri-service requirement, the fabricating process be undertaken
under the aegis of the HQ Integrated Defence Staff or a prototype be developed as an Army
Technology Board project. What must also be noted is that collaboration (internal civil
industry as well as global players) in this field will reap greater dividends rather than a purely
‘Make in India’ approach which may take more time.
Under the gambit of the draft DPP 2020, the innovation scheme under the ‘Make’ category/
Innovation in Defence Excellence (iDEX)/ Technology Development Fund initiatives may
help in the long run. DGCA will need to be incorporated to streamline the rules of
engagement (Civil Aviation Requirements or CAR). Such ‘Aerial Threat Reduction Teams
(ATRT)’ should be a tri-services unit or outfit, with a participation by personnel from all
three services, for effective and efficient utilisation.
Identification Friend or Foe (IFF). The IFF shall always remain challenging with
the use of drones for all unethical purposes by non-state actors. However, research has
been carried out in this field using a relay drone with beacon system.
New flight modes that have been introduced in UAVs or drones which include
obstacle avoidance using ultrasonic sensors, terrain mapping cameras integrated as
SoC, follow me, tapfly, active track and sports mode. Better battery systems have
been incorporated giving the drone larger endurance (5230 mAh battery on board the
DJI Phantom 4).
Faster decisions
Using artificial intelligence alongside cognitive technologies can help make faster
decisions and carry out actions quicker.
Avoiding errors
The phrase “human error” was born because humans, naturally, make mistakes from
time to time. Computers however, do not make these mistakes – that is, of course,
assuming they are programmed properly. With artificial intelligence, data could be
processed error-free, no matter how big the dataset might be
Difficult Exploration
Artificial intelligence and the science of robotics can be put to use in mining and other
fuel exploration processes. Not only that, these complex machines can be used for
exploring the ocean floor and hence overcoming the human limitations. Due to the
programming of the robots, they can perform more laborious and hard work with
greater responsibility. They do not wear out easily
If robots start replacing human resources in every field, we will have to deal with
serious issues like unemployment in turn leading to mental depression, poverty and crime
in the society. Human beings deprived of their work life may not find any means to
channelize their energies and harness their expertise. Human beings will be left with
empty time.
Secondly, replacing human beings with robots in every field may not be a right
decision to make. There are many jobs that require the human touch. Intelligent machines
will surely not be able to substitute for the caring behavior of hospital nurses or the
promising voice of a doctor. Intelligent machines may not be the right choice for customer
service.
One of the major disadvantages of intelligent machines is that they cannot be
'human'. We might be able to make them think. But will we be able to make them feel?
Intelligent machines will definitely be able to work for long hours. But will they do it with
dedication? Will they work with devotion? How will intelligent machines work
wholeheartedly when they don't have a heart?
Chapter 8: Applications
A. Intelligent target identification and monitoring The intelligent target identification and monitoring
systems use computer vision to identify and track targets for the autonomous weapon platform,
which several military research institutions and defense firms have already worked on. The most
well-known project is Maven of the US Defense Advanced Research Projects Agency (DARPA), which
could highly efficiently categorize and identify 38 different kinds of objects among the huge sums of
surveillance footage taken by Unmanned Aerial Vehicle (UAV) or other surveillance equipment.
Similarly, DARPA’s project Target Recognition and Adaption in Contested Environments (TRACE)
using computer vision to automatically locate and identify targets based on the images of Synthetic-
Aperture Radar (SAR). B. Autonomous Weapon Platforms Based on the target indication of the
intelligent target identification and monitoring module, autonomous weapon platforms can react
appropriately and always lock the target even which deploys countermeasures or evasive
maneuvers. And advanced algorithms can locate the problem before it happens, like ordering a
return when vehicles lost GPS signals or is facing fuel shortage. According to Israeli defense
contractor, Rafael Advanced Defense Systems, in virtue of intelligent inferred tracking modules
based on computer vision techniques, their GIL-2 handheld rocket system could fire without line of
sight to the target, and take advantage of UAV to lock the target and guide the missile. Another
valuable project is conducted by the French defense contractor, Thales, which is partially owned by
the French Department of Defense. Thales presented a weapons platform for fixed point defense
called RAPIDFire, which is equipped with 6 short-range anti-aircraft missiles and a 40mm cannon. It
could be inferred that RAPIDFire applies computer vision to automatically acquire hostile targets,
and provides it to human operators who must approve any discharge of defensive ordnance. Also,
Thales claims there is an option of operates fully autonomously. DARPA came up with a deeper and
more comprehensive research in aerial and underwater space, which aims to build the unmanned
combat team for the specific mission. AI modules in Unmanned Aerial Systems (UAS) can not only
recognize the target, but also use multi-objective evolutionary algorithms to solve allocation
problems in the planning phase of an operation, which optimize the number, payloads, and path
planning of drones. There is also a plan for building submarine-locating drones, aimed at making the
ocean
wait for the conclusion to that debate, nor for the hypothetical computer that could model
all of human intelligence. Aspects of intelligent behaviour, such as solving problems,
making inferences, learning, and understanding language, have already been coded as
computer programs, and within very limited domains, such as identifying diseases of
soybean plants, AI programs can outperform human experts. Now the great challenge of
AI is to find ways of representing the common sense knowledge and experience that enable
people to carry out everyday activities such as holding a wide-ranging conversation, or
finding their way along a busy street. Conventional digital computers may be capable of
running such programs, or we may need to develop new machines that can support the
complexity of human thought.
Weapons with artificial intelligence will be one of the most strongest weapon in
military, which can identify the targets itself and can make a decision weather to destroy
or not. Overall artificial intelligence is one of the most advantageous technology in
defense sector.
[1]. Kerwin, K.R. and Bastian, N.D., 2021. Stacked generalizations in imbalanced fraud data
sets using resampling methods. The Journal of Defense Modeling and Simulation, 18(3),
pp.175-192.
[2]. Clark IV, W.H., Hauser, S., Headley, W.C. and Michaels, A.J., 2021. Training data
augmentation for deep learning radio frequency systems. The Journal of Defense Modeling
and Simulation, 18(3), pp.217-237.
[3]. Foster, K.L. and Petty, M.D., 2021. Estimating the tactical impact of robot swarms using
a semi-automated forces system and design of experiments methods. The Journal of Defense
Modeling and Simulation, 18(3), pp.247-269.
[4]. E. Tyugu, "Artificial intelligence in cyber defense," 2011 3rd International Conference
on Cyber Conflict, Tallinn, Estonia, 2011, pp. 1-11.
[5]. Bastian, N.D., 2021. Artificial intelligence for defense applications. The Journal of
Defense Modeling and Simulation, 18(3), pp.173-174.
[6]. Gopal, V., 2020. Developing an Effective Anti-drone System for India's Armed
Forces (pp. 1-20). Observer Research Foundation.
[7]. Ali, A., 2021. Artificial Intelligence Potential Trends in Military. Foundation University
Journal of Engineering and Applied Sciences (HEC Recognized Y Category, ISSN 2706-
7351), 2(1), pp.20-30.
[8]. Zhang, Y., Dai, Z., Zhang, L., Wang, Z., Chen, L. and Zhou, Y., 2020, December.
Application of Artificial Intelligence in Military: From Projects View. In 2020 6th
International Conference on Big Data and Information Analytics (BigDIA) (pp. 113-116).
IEEE.
[9]. Campion, M., Ranganathan, P. and Faruque, S., 2018, May. A review and future
directions of UAV swarm communication architectures. In 2018 IEEE international
conference on electro/information technology (EIT) (pp. 0903-0908). IEEE.
[10]. Tahir, A., Böling, J., Haghbayan, M.H., Toivonen, H.T. and Plosila, J., 2019. Swarms of
unmanned aerial vehicles—a survey. Journal of Industrial Information Integration, 16,
p.100106.
[11]. Khalil, H., Rahman, S.U., Ullah, I., Khan, I., Alghadhban, A.J., Al-Adhaileh, M.H., Ali,
G. and ElAffendi, M., 2022. A UAV-Swarm-Communication Model Using a Machine-
Learning Approach for Search-and-Rescue Applications. Drones, 6(12), p.372.
[12]. Saatvik Awasthi,Balamurugan Balamurugan,V. Porkod,Artificial Intelligence
Supervised Swarm UAVs for Reconnaissance May 2020,DOI: 10.1007/978-981-15-5827-
6_33