2022
DOI: 10.3390/drones6070154
|View full text |Cite
|
Sign up to set email alerts
|

UAV Computing-Assisted Search and Rescue Mission Framework for Disaster and Harsh Environment Mitigation

Abstract: Disasters are crisis circumstances that put human life in jeopardy. During disasters, public communication infrastructure is particularly damaged, obstructing Search And Rescue (SAR) efforts, and it takes significant time and effort to re-establish functioning communication infrastructure. SAR is a critical component of mitigating human and environmental risks in disasters and harsh environments. As a result, there is an urgent need to construct communication networks swiftly to help SAR efforts exchange emerg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
81
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
2

Relationship

2
8

Authors

Journals

citations
Cited by 137 publications
(81 citation statements)
references
References 51 publications
0
81
0
Order By: Relevance
“…For example, UAVs can promptly respond to earthquake assistance requests, locate missing individuals, and assist in monitoring and rescuing flood victims [175]. Furthermore, using UAV computing with AI to collect vast data from various sensors installed in the environment might assist in the forecasting and acting in natural disasters such as tornadoes, volcanic eruptions, tsunamis, and storms [176].…”
Section: Natural Disastermentioning
confidence: 99%
“…For example, UAVs can promptly respond to earthquake assistance requests, locate missing individuals, and assist in monitoring and rescuing flood victims [175]. Furthermore, using UAV computing with AI to collect vast data from various sensors installed in the environment might assist in the forecasting and acting in natural disasters such as tornadoes, volcanic eruptions, tsunamis, and storms [176].…”
Section: Natural Disastermentioning
confidence: 99%
“…Unfortunately, security issues are not considered in [2]. To bridge this gap, the secure protocol in [68] is presented. Authors in [69] have developed a secure data management approach for MANET enabled smart city.…”
Section: Related Workmentioning
confidence: 99%
“…However, it fails to protect against asynchronous attacks and it also incurs high implementation costs. This is detrimental to cost constrained [91] TMIS system components such as medical sensors. To address this, an efficient authentication method is developed in [92].…”
Section: Related Workmentioning
confidence: 99%