<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Aerosp. Res. Commun.</journal-id>
<journal-title>Aerospace Research Communications</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Aerosp. Res. Commun.</abbrev-journal-title>
<issn pub-type="epub">2813-6209</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">12420</article-id>
<article-id pub-id-type="doi">10.3389/arc.2023.12420</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Engineering archive</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Increasing Operational Resiliency of UAV Swarms: An Agent-Focused Search and Rescue Framework</article-title>
<alt-title alt-title-type="left-running-head">Phadke and Medrano</alt-title>
<alt-title alt-title-type="right-running-head">SAR Frameworks Ensuring Agent Wellbeing</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Phadke</surname>
<given-names>Abhishek</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/2340449/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Medrano</surname>
<given-names>F. Antonio</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
</contrib>
</contrib-group>
<aff id="aff1">
<sup>1</sup>
<institution>Conrad Blucher Institute for Surveying and Science</institution>, <institution>Texas A&#x26;M University-Corpus Christi</institution>, <addr-line>Corpus Christi</addr-line>, <addr-line>TX</addr-line>, <country>United States</country>
</aff>
<aff id="aff2">
<sup>2</sup>
<institution>Department of Computer Science</institution>, <institution>Texas A&#x26;M University-Corpus Christi</institution>, <addr-line>Corpus Christi</addr-line>, <addr-line>TX</addr-line>, <country>United States</country>
</aff>
<author-notes>
<corresp id="c001">&#x2a;Correspondence: Abhishek Phadke, <email>aphadke@islander.tamucc.edu</email>
</corresp>
</author-notes>
<pub-date pub-type="epub">
<day>04</day>
<month>01</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="collection">
<year>2023</year>
</pub-date>
<volume>1</volume>
<elocation-id>12420</elocation-id>
<history>
<date date-type="received">
<day>15</day>
<month>11</month>
<year>2023</year>
</date>
<date date-type="accepted">
<day>13</day>
<month>12</month>
<year>2023</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2024 Phadke and Medrano.</copyright-statement>
<copyright-year>2024</copyright-year>
<copyright-holder>Phadke and Medrano</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<p>Resilient UAV (Unmanned Aerial Vehicle) swarm operations are a complex research topic where the dynamic environments in which they work significantly increase the chance of systemic failure due to disruptions. Most existing SAR (Search and Rescue) frameworks for UAV swarms are application-specific, focusing on rescuing external non-swarm agents, but if an agent in the swarm is lost, there is inadequate research to account for the resiliency of the UAV swarm itself. This study describes the design and deployment of a Swarm Specific SAR (SS-SAR) framework focused on UAV swarm agents. This framework functions as a resilient mechanism by locating and attempting to reconnect communications with lost UAV swarm agents. The developed framework was assessed over a series of performance tests and environments, both real-world hardware and simulation experiments. Experimental results showed successful recovery rates in the range of 40%&#x2013;60% of all total flights conducted, indicating that UAV swarms can be made more resilient by including methods to recover distressed agents. Decision-based modular frameworks such as the one proposed here lay the groundwork for future development in attempts to consider the swarm agents in the search and rescue process.</p>
</abstract>
<kwd-group>
<kwd>resilience</kwd>
<kwd>UAV</kwd>
<kwd>swarm</kwd>
<kwd>search and rescue</kwd>
<kwd>UAS</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<title>Introduction</title>
<p>The use of UAV swarms is becoming more widespread due to the reduced costs of UAVs and their ability to accomplish tasks more quickly and effectively as a group rather than individually. Advancements in aircraft design and control, communication topologies, and battery systems have made coordinated UAV swarms possible. The use of UAV swarms in applications of military [<xref ref-type="bibr" rid="B1">1</xref>, <xref ref-type="bibr" rid="B2">2</xref>], ecology [<xref ref-type="bibr" rid="B3">3</xref>], remote sensing [<xref ref-type="bibr" rid="B4">4</xref>, <xref ref-type="bibr" rid="B5">5</xref>], disaster management [<xref ref-type="bibr" rid="B6">6</xref>], crowd control, emergency communication [<xref ref-type="bibr" rid="B7">7</xref>], agriculture [<xref ref-type="bibr" rid="B8">8</xref>, <xref ref-type="bibr" rid="B9">9</xref>], and victim search [<xref ref-type="bibr" rid="B10">10</xref>, <xref ref-type="bibr" rid="B11">11</xref>] are just some of the use cases. As individual and multi-robotic development and their interaction with real-world entities advances, these applications are only limited because of a lack of improvement, a discrepancy that exponentially decreases as time passes. With the increased diversity of swarm usage applications, research in UAV resiliency has also grown [<xref ref-type="bibr" rid="B12">12</xref>, <xref ref-type="bibr" rid="B13">13</xref>]. Due to the close-knit topology of these swarms, the failure of agents above a certain threshold can often lead to cascaded systemic collapse and a pause on mission progress. The cause of this failure may be structural, such as in a leader-follower topology, wherein the followers may get disconnected if the leader fails. Additional uncertainty in this failure also exists, such as the possibility of a failing swarm agent crashing into other agents during its collapse. Resiliency is defined as the ability of a system to withstand disruptions. Broader definitions include the ability of a system to bounce back after a disruption [<xref ref-type="bibr" rid="B14">14</xref>]. D.D. Woods summarizes system resilience perfectly in its four core concepts [<xref ref-type="bibr" rid="B15">15</xref>]. They are resilience, such as rebound, robustness, extensibility, and adaptability. Previous work by the authors addresses systemic resilience in UAV swarms on a broader range by classifying UAV swarm operations into components and modules [<xref ref-type="bibr" rid="B16">16</xref>]. The resilience of UAV swarms is a complex topic that integrates multiple components of navigation [<xref ref-type="bibr" rid="B17">17</xref>], mapping [<xref ref-type="bibr" rid="B4">4</xref>], control [<xref ref-type="bibr" rid="B18">18</xref>], defensive and intrusion detection policies [<xref ref-type="bibr" rid="B19">19</xref>], agent welfare, and physical characteristics of the swarm agent [<xref ref-type="bibr" rid="B20">20</xref>] into an intricate system designed to create balance in a dynamic environment.</p>
<p>An MRS (Multi-Robot System) and a swarm are both concepts in robotics that involve the coordination and interaction of multiple robots. However, they have distinct differences in organization, control, and behavior. An MRS has a structured and explicit interaction scheme with a centralized control. Swarm agents, on the other hand, are more decentralized and self-organized. There might not be explicit communication between robots, and collective behavior emerges from simple interactions between individual robots following local rules.</p>
<p>Additionally, MRS may involve centralized controllers and planners to assign tasks to robots. Swarms rely on local interactions and distributed control. Each robot can typically make decisions based on its immediate surroundings or information gathered from nearby agents. This also involves a degree of autonomy in decision-making from completely autonomous to semi-autonomous. However, while swarms are expected to be inherently scalable, there is an ongoing debate on the minimum number of agents that must be present and acting collectively to label it as a swarm. Adding more robots to a swarm does not necessarily increase performance. Selecting the number of agents in a swarm has long been contested. However, approaches with agents as few as five and as many as 1,000 have been implemented and studied. Article [<xref ref-type="bibr" rid="B21">21</xref>] discusses how aspects such as system scalability, technical capabilities of individual agents, and financial or logical constraints influence the selection of the number of agents in the swarm.</p>
<p>These factors were crucial in selecting the number of agents for swarm response experiments performed in this study. The number of agents available for experimentation was limited. Additionally, some agents were designated as reserve and spare agents to ensure experiments continued in case of equipment failure. Space constraints allowed only a certain number of agents to fly in the designated airspace without the risk of agent collision and crashes due to induced airflow interactions. While all communication between agents was performed decentralized, primary communication and network protocols required for communication with GCS limited the number of agents connected to them.</p>
<p>Search and Rescue is a vast domain; focusing only on swarm agent welfare significantly narrows it. However, to concentrate results further, this SAR framework will be primarily described for exploratory swarm applications. Scenarios where a swarm of agents may be deployed over an area and, in the process, may lose contact with the swarm is the priority. This narrows down the framework focus as well as experiment design and validation. Two major types of SAR capabilities in UAV swarms are defined and categorized here. They are application-specific SAR [<xref ref-type="bibr" rid="B22">22</xref>] and swarm-specific SAR (SS-SAR). Although our study takes a different direction than a regular application-focused SAR use scenario, it remains an exploratory problem. The tracking, location, and Rescue of disabled swarm agents require other agents of the swarm to actively search the target space for the agent using techniques such as triangulated localization, computer vision, sensors on the ground, and the analysis of system-generated mission logs. A literature review reveals that most swarms lack the self-awareness needed to actively take care of their agents. More robust mechanisms for the welfare of UAV swarms [<xref ref-type="bibr" rid="B23">23</xref>] are needed as an additional means to increase systemic resilience.</p>
<p>To build robust applications and routine case scenarios that use UAV swarms, the swarm itself must be resilient to disruptions. Towards this goal concerning SAR swarm operations, the significant contributions of this paper are:<list list-type="simple">
<list-item>
<p>- A literature analysis that reveals a research gap in UAV swarm development related to the search and rescue of their agents.</p>
</list-item>
<list-item>
<p>- To address this gap, a novel UAV swarm framework, SS-SAR (Swarm Specific-SAR), is introduced to provide the ability to track, locate, and possibly rescue their agents. The framework uses a decentralized approach and local communication between neighboring agents and surrounding data to make semi-autonomous deployments of rescue craft that initiate direct communication with distressed agents.</p>
</list-item>
<list-item>
<p>- Experimental results show the SS-SAR framework&#x2019;s ability to reduce agent loss in swarm operations.</p>
</list-item>
<list-item>
<p>- Future framework upgrades and experiment designs are proposed to increase operational swarm resilience.</p>
</list-item>
</list>
</p>
<p>Using a decentralized approach for communication and agent decisions, this study aims to demonstrate scalable and robust responses of swarms to disruptive scenarios along with further scope for possible emergent behavior to avoid them altogether based on broad programmed constraints. The paper is arranged in the following way. Section <italic>Introduction</italic> gives a brief introduction of the area with research contributions of this study. Section <italic>Summary of Recent Literature on Multi-Robot SAR</italic> presents a categorization of current trends. Section <italic>Swarm-Specific SAR Framework</italic> presents the SS-SAR scenario description and framework workflow. Section <italic>Performance Tests</italic> describes both hardware and simulation performance tests and environmental parameters. Section <italic>Results</italic> presents the experimental results of the new SS-SAR framework. Section D<italic>iscussion and Future Research Directions</italic> provides future directions to approach the problem with suggested framework upgrades, and Section <italic>Conclusion</italic> provides concluding statements.</p>
</sec>
<sec id="s2">
<title>Summary of Recent Literature on Multi-Robot SAR</title>
<p>The multi-UAV SAR problem is a broad problem domain. This section categorizes current research into three distinct approaches. <xref ref-type="table" rid="T1">Table 1</xref> identifies research on the topic and categorizes the study as application or swarm-specific problems. Application-specific SAR (AS-SAR) and SS-SAR are the two categorizations previously discussed. Depending on how the SAR problem is approached, a third category is also included: Search Methodology Focused (SMF). Research in this category does not have a specific search target type; instead, the focus is on the general SAR methodology, where any internal or external search target can be assigned.</p>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>Summary of recent work on SAR using multi-agent UAV swarms categorized by approach.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Reference</th>
<th align="left">Category</th>
<th align="center">Description</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">[<xref ref-type="bibr" rid="B24">24</xref>]</td>
<td align="center">AS</td>
<td align="left">Using a modified fruit fly algorithm to improve the search efficiency of a multi-robot swarm</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B25">25</xref>]</td>
<td align="center">AS</td>
<td align="left">Cooperative strategy for distributed UAV agents in a swarm performing unique functions for victim search and rescue operations</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B26">26</xref>]</td>
<td align="center">AS</td>
<td align="left">Smart search for survivors using a genetic localization method to detect victim distress signals using autonomous maximum area searching UAV agents</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B27">27</xref>]</td>
<td align="center">AS</td>
<td align="left">Collaboration between swarm agents for detecting victim presence</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B28">28</xref>]</td>
<td align="center">AS</td>
<td align="left">Layered SAR based on disaster epicenter for improved victim detection using multiple agents</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B29">29</xref>]</td>
<td align="center">AS</td>
<td align="left">Heterogeneous agent swarm based on ant colony optimization and agent decision process for victim searching at sea</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B30">30</xref>]</td>
<td align="center">AS</td>
<td align="left">An open-source platform for managing drones for assistance in SAR operations</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B31">31</xref>]</td>
<td align="center">SMF</td>
<td align="left">Using deep reinforcement learning to generate control commands for UAVs to search in an environment with an unknown number of targets</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B32">32</xref>]</td>
<td align="center">SMF</td>
<td align="left">A dynamically varying number of swarm agents search for the target using MPC for generating cooperative search trajectories and maximizing performance</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B33">33</xref>]</td>
<td align="center">SMF</td>
<td align="left">Creating target probability maps to guide swarm search actions based on flocking, velocity, and area coverage</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B34">34</xref>]</td>
<td align="center">SMF</td>
<td align="left">Collaborative search function based on pigeon-inspired bio-inspired algorithm</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B35">35</xref>]</td>
<td align="center">SMF</td>
<td align="left">Hexagonal grid decomposition of the search area for maximum efficiency during target search in a maritime rescue scenario</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B36">36</xref>]</td>
<td align="center">SMF</td>
<td align="left">Planning using a Markov decision process and control using environmental exploration by deep learning for target detection</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B37">37</xref>]</td>
<td align="center">SMF</td>
<td align="left">A bio-inspired algorithm based on fish schooling and foraging behaviors for improving target search functionality</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B38">38</xref>]</td>
<td align="center">SMF</td>
<td align="left">A reinforcement learning-based concept to make a territory awareness map for generating cooperative search paths for multi-UAV swarms</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B39">39</xref>]</td>
<td align="center">SMF</td>
<td align="left">A profit-driven adaptive search algorithm for moving targets using a UAV swarm capable of information exchange</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B40">40</xref>]</td>
<td align="center">SMF</td>
<td align="left">PSO-MPC approach to solving and improving the efficiency of the SAR technique using multiple agents rather than a single agent</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B41">41</xref>]</td>
<td align="center">SS-SAR</td>
<td align="left">A swarm-specific methodology for automatic replacement of any lost UAV during mission progress</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>As one can see from <xref ref-type="table" rid="T1">Table 1</xref>, swarm-specific implementations are less explored in the literature. In addition to the above literature review, generalized methodologies exist that propose novel approaches that would improve facets of the SAR process. These include using bio-inspired algorithms for area coverage [<xref ref-type="bibr" rid="B42">42</xref>] formation tracking [<xref ref-type="bibr" rid="B43">43</xref>] and environment exploration [<xref ref-type="bibr" rid="B44">44</xref>], updated and merged observation maps or information exchange pathways [<xref ref-type="bibr" rid="B45">45</xref>], and efficient task planning [<xref ref-type="bibr" rid="B46">46</xref>, <xref ref-type="bibr" rid="B47">47</xref>]. Frameworks such as [<xref ref-type="bibr" rid="B41">41</xref>] that propose automatic replacement of lost UAV agents are scarce. This example fits perfectly in this paper&#x2019;s proposed swarm-specific research category. To keep the literature analysis attainable, any approaches that do not directly describe the use of aerial vehicle swarms in the field for SAR have been eliminated. This includes broader research topics such as using machine learning methods to improve object recognition in aerial images taken by UAVs [<xref ref-type="bibr" rid="B48">48</xref>].</p>
</sec>
<sec id="s3">
<title>Swarm-Specific SAR Framework</title>
<sec id="s3-1">
<title>Workflow Description</title>
<p>Notations used in framework description and development are summarized in <xref ref-type="table" rid="T2">Table 2</xref>. This section briefly describes the broad workflow for the framework design process.</p>
<table-wrap id="T2" position="float">
<label>TABLE 2</label>
<caption>
<p>Notations.</p>
</caption>
<table>
<tbody valign="top">
<tr>
<td align="left">
<italic>n</italic>
</td>
<td align="left">Total number of agents in the swarm</td>
</tr>
<tr>
<td align="left">
<italic>i</italic>
</td>
<td align="left">Index of UAV agents (from 1 to <italic>n</italic>)</td>
</tr>
<tr>
<td align="left">
<italic>t</italic>
</td>
<td align="left">Equally spaced time interval between HBS signals</td>
</tr>
<tr>
<td align="left">
<italic>k</italic>
</td>
<td align="left">Index of HBS time sample</td>
</tr>
<tr>
<td align="left">
<italic>HBS</italic>
<sub>
<italic>i,k</italic>
</sub>
</td>
<td align="left">HBS signal from agent <italic>i</italic> at time <italic>k</italic>
</td>
</tr>
<tr>
<td align="left">
<italic>Ind</italic>
</td>
<td align="left">Binary variable to denote the presence or absence of HBS signal</td>
</tr>
<tr>
<td align="left">
<italic>Ind</italic>
<sub>
<italic>i,k</italic>
</sub>
</td>
<td align="left">Binary value for HBS signal from agent <italic>i</italic> at time <italic>k</italic>
</td>
</tr>
<tr>
<td align="left">
<italic>Ind</italic>
<sub>
<italic>all</italic>
</sub>
</td>
<td align="left">Binary variable based on an AND logical operation of all binary indicator variables</td>
</tr>
<tr>
<td align="left">
<italic>HBS</italic>
<sub>
<italic>i,k</italic>
</sub>
<italic>&#x2192;</italic> <italic>loc</italic>
</td>
<td align="left">Location of agent <italic>i</italic> at time <italic>k</italic> (included in the corresponding HBS signal)</td>
</tr>
<tr>
<td align="left">
<italic>HBS</italic>
<sub>
<italic>i,k</italic>
</sub>
<italic>&#x2192;</italic> <italic>b</italic>
<sub>
<italic>level</italic>
</sub>
</td>
<td align="left">Battery level of agent <italic>i</italic> at time <italic>k</italic> (included in the corresponding HBS signal)</td>
</tr>
<tr>
<td align="left">
<italic>SSI</italic>
<sub>
<italic>(GC,</italic>
</sub> <sub>
<italic>i)</italic>
</sub>
</td>
<td align="left">Signal strength indication of ground control to agent <italic>i</italic>
</td>
</tr>
<tr>
<td align="left">
<italic>OG</italic>
</td>
<td align="left">On-ground indicator that is set to 1 if an agent is actively connected but is on the ground</td>
</tr>
<tr>
<td align="left">
<italic>p</italic>
<sub>
<italic>0</italic>
</sub>
</td>
<td align="left">Real-time pose check using the distressed agent camera</td>
</tr>
<tr>
<td align="left">
<italic>p</italic>
<sub>
<italic>1</italic>
</sub>
</td>
<td align="left">Real-time pose check using the rescue agent camera</td>
</tr>
<tr>
<td align="left">
<italic>p</italic>
<sub>
<italic>2</italic>
</sub>
</td>
<td align="left">Real-time pose check using IMU</td>
</tr>
<tr>
<td align="left">
<italic>tk</italic>
<sub>
<italic>id</italic>
</sub>
</td>
<td align="left">Task ID</td>
</tr>
<tr>
<td align="left">
<italic>tk</italic>
<sub>
<italic>cost</italic>
</sub>
</td>
<td align="left">Cost of completing a task</td>
</tr>
<tr>
<td align="left">
<italic>R</italic>
<sub>
<italic>loc(i,k&#x2013;1)</italic>
</sub>
</td>
<td align="left">Denotes the rescue agent moving to the location of distressed agent <italic>i</italic> at <italic>k&#x2013;1</italic> time</td>
</tr>
<tr>
<td align="left">
<italic>rcm</italic>
</td>
<td align="left">Reconnection message</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The SS-SAR workflow [<xref ref-type="bibr" rid="B49">49</xref>] is summarized in <xref ref-type="fig" rid="F1">Figure 1</xref>. It is divided into four sections, with the first section defining the agent tracking phase, the second section containing the initial decision, section three having the primary decision process, and section four with the secondary decision process. The modular framework design assists in the testing and modification of one or more sections. This was especially useful in scenarios where the hardware and software test platforms could not simultaneously handle all the framework tests computationally or physically. For example, low-cost agents such as the DJI Tellos [<xref ref-type="bibr" rid="B50">50</xref>] used in the lab scenarios required testing individual sections piecewise rather than the entire framework simultaneously due to inefficient hardware and lack of sensors. The experiment section describes the modular experiments designed to test the workflow to the extent that the agents could handle it.</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>Workflow of the SS-SAR framework.</p>
</caption>
<graphic xlink:href="arc-01-12420-g001.tif"/>
</fig>
<p>The second advantage of the modular nature is that framework components can be upgraded, optimized, or changed. For example, while preliminary experiments for Section <italic>Performance Tests</italic> use an essential task re-assignment policy where only idle agents are given the tasks previously assigned to the lost agent, future iterations of the framework can use an optimized cost consideration, where characteristics of the task-receiving agent, such as its remaining fuel, are considered before re-assignment. An agent completing its task is only assigned the task of the fallen agent if its battery capacity allows it. The indicator <italic>tk</italic>
<sub>
<italic>cost</italic>
</sub> is used to determine the cost of completing the task that is estimated using the number of time intervals required <italic>t,</italic> and the expected change in battery level to complete the task, &#x394;<italic>b</italic>
<sub>
<italic>level</italic>
</sub>.</p>
</sec>
<sec id="s3-2">
<title>Scenario Description</title>
<p>The generalized model in <xref ref-type="fig" rid="F2">Figure 2</xref> was expanded into a specific scenario where a swarm of agents is performing a task, and one of the agents is in distress. This SS-SAR process is depicted in <xref ref-type="fig" rid="F2">Figure 2</xref>.</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>SAR process for rescuing an agent in distress.</p>
</caption>
<graphic xlink:href="arc-01-12420-g002.tif"/>
</fig>
<p>The OLSR (Optimized Link State Routing) protocol has been extensively studied as an ideal routing protocol in SAR environments [<xref ref-type="bibr" rid="B51">51</xref>]. It routinely uses &#x201c;Hello&#x201d; and &#x201c;Topology Control&#x201d; messages to identify links and agent states. The heartbeat signal is often referred to as a modified hello message based on the base OLSR protocol. The heartbeat signal transmission is a small, quick transmission objective signal that each swarm agent can send at regular intervals. Various alternate implementations exist [<xref ref-type="bibr" rid="B26">26</xref>, <xref ref-type="bibr" rid="B41">41</xref>, <xref ref-type="bibr" rid="B52">52</xref>]; however, they follow a general structure that includes information denoting network I.D., transmitting agent ID, destination I.D., message type, security I.D., data segments, and error check. The HBS comprises location information, the battery level of the agent, signal strength indication, and the current task I.D.<disp-formula id="equ1">
<mml:math id="m1">
<mml:mrow>
<mml:mi>H</mml:mi>
<mml:mi>B</mml:mi>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mi>L</mml:mi>
<mml:mi>o</mml:mi>
<mml:msub>
<mml:mi>c</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>b</mml:mi>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>v</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>l</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>S</mml:mi>
<mml:mi>S</mml:mi>
<mml:msub>
<mml:mi>I</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mi>C</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>t</mml:mi>
<mml:msub>
<mml:mi>k</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>d</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</disp-formula>
</p>
<p>A fixed number of agents, <italic>n,</italic> form the swarm. The HBS from every agent is expected after each time interval <italic>t</italic>, at a sample iteration denoted by <italic>k</italic>. An HBS is expected to be transmitted by every agent in the swarm after the time interval value of <italic>t</italic>. The signal is denoted by <italic>HBS</italic>
<sub>
<italic>i,k</italic>.</sub> This denotes the signal transmission from the <italic>i</italic>
<sup>
<italic>th</italic>
</sup> agent at the <italic>k</italic>
<sup>
<italic>th</italic>
</sup> time interval, in the range of <italic>i</italic> &#x3d; 1 to <italic>n</italic>, and <italic>k</italic> &#x3e; 0. The <italic>Ind</italic> binary variable indicates the presence or absence of the HBS signal for every <italic>Ind</italic>
<sub>
<italic>i,k</italic>.</sub> The value of 1 is recorded for every signal received and 0 if a signal is missing. The missing HBS agent id value determines which agent did not send the signal. The <italic>Ind</italic>
<sub>
<italic>all</italic>
</sub> is a logical operator set to 1 if all agents send a signal and 0 if HBS from an agent is missing.</p>
<p>Time intervals <italic>t</italic> are regular spaced and defined for transmitting the HBS. Careful consideration of this assigned value is required. A higher value of <italic>t</italic> can cause fewer HBS to be transmitted during mission time, i.e., a greater amount of time can elapse between a missing HBS and the system realization of an agent in distress. However, a lesser value of <italic>t</italic> can cause network bottlenecks if the system cannot receive and process HBS from all agents of the swarm. <xref ref-type="fig" rid="F3">Figure 3</xref> shows HBS signal and sensor data transmission over a regular and disrupted time series. A longer period of HBS transmission intervals may result in delays between agent loss and system realization, 2<italic>t</italic>. The disrupted time series shows the information delay for sensor data access of an agent by the operator. Since sensor data is sent at less frequent intervals than the HBS, the operator has access to information that may not give an exact interpretation of agent distress if the disruption occurs after a significant time interval after the last sensor data transmission.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>HBS transmission and usage for regular and disrupted mission time series.</p>
</caption>
<graphic xlink:href="arc-01-12420-g003.tif"/>
</fig>
<p>If an agent is missing, its past HBS record is retrieved and examined for its location during that transmission time interval. This location information may be outdated by a minimum value of the system realization time, that is, 2<italic>t</italic>. A map overlay for known static obstacles is then used to determine if the agent was near obstacles during loss. A UAV agent can be distressed due to reasons such as collision with a static or dynamic obstacle, falling out of range from other agents in a mesh-based topology or with ground control in a directed topology, or issues with hardware components and fuel. Multiple pose checks are designed in the framework and conducted at each step to systematically eliminate the cause of disruptions. It is assumed that the agent, even when on the ground, has an open broadcast connection request to accept incoming connection requests from other agents or manual remote-control overrides. This feature is always present, even in basic agent builds. An agent that is connected to a network but has landed due to a collision, flock fragmentation, or getting stuck in an obstacle can still transmit an HBS with an on-ground indicator value of <italic>O.G.</italic> &#x3d; 1. This indicates that an agent has landed but is still actively connected. However, this agent cannot be directly accepted back into the swarm. It is necessary to ensure that it can safely rejoin the swarm by gaining the necessary minimum altitude required by the agent to take a safe flight.</p>
<p>At specific decision points in the framework, agent status checks called pose checks are performed to gain additional information about the agent. The framework can perform three different checks: <italic>p</italic>
<sub>
<italic>0</italic>,</sub> <italic>p</italic>
<sub>
<italic>1,</italic>
</sub> and <italic>p</italic>
<sub>
<italic>2</italic>
</sub>. Pose check flow conducted at different times during framework operation is shown in <xref ref-type="fig" rid="F4">Figure 4</xref>.</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>Pose check workflow.</p>
</caption>
<graphic xlink:href="arc-01-12420-g004.tif"/>
</fig>
<p>Once an agent is realized to be in distress, an initial attempt is made to see if it is still possible to access its onboard vision sensor to conduct a preliminary pose check <italic>p</italic>
<sub>
<italic>0</italic>
</sub>. This checks if the agent has landed in such a position that it may be able to take off safely. Examples of passed and failed <italic>p</italic>
<sub>
<italic>0</italic>
</sub> tests are shown in Section <italic>Performance Tests</italic>. The advantage of this method is that if the preliminary pose check fails, the framework can skip sending the rescue agent and directly move on to the unrecoverable agent process. However, this step is flexible: a rescue agent can still be deployed if the p0 check cannot be conducted.</p>
<p>If <italic>p</italic>
<sub>
<italic>0</italic>
</sub> passes, rescue agent <italic>R</italic> moves to the location of the missing agent (<italic>R</italic>
<sub>
<italic>loc(i,</italic>
</sub> <sub>
<italic>k&#x2013;1)</italic>
</sub>) and performs a visual scan of the location. The operator conducts real-time viewing of the rescue agent&#x2019;s camera data to conduct <italic>p</italic>
<sub>
<italic>1</italic>
</sub>. After an agent is located, the <italic>p</italic>
<sub>
<italic>1</italic>
</sub> check using a rescue agent vision sensor is done to assess if the agent is in an environment from which it can take off safely. A fuel check using <italic>b</italic>
<sub>
<italic>level</italic>
</sub> and a network connection check using <italic>SSI</italic>
<sub>
<italic>(G.C., i)</italic>
</sub> are then performed. The <italic>SSI</italic> value contains agent connection data with ground control and neighboring agents. Depending on the network topology selected, an <italic>SSI</italic>
<sub>
<italic>(G.C., i)</italic>
</sub> value of 0 can be acceptable if the distressed agent connects to another agent rather than to ground control.<disp-formula id="equ2">
<mml:math id="m2">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>b</mml:mi>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>v</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3e;</mml:mo>
<mml:mn>40</mml:mn>
<mml:mo>%</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mtext>AND</mml:mtext>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mi>S</mml:mi>
<mml:msub>
<mml:mi>I</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>G</mml:mi>
<mml:mi>C</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3e;</mml:mo>
<mml:mn>80</mml:mn>
<mml:mo>%</mml:mo>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</disp-formula>
</p>
<p>This data is taken from the agent&#x2019;s previous HBS to create record logs of why the agent failed. This information is used to create risk zones as an information overlay in mission maps, a framework feature designed to reduce the failure of future agent movements on the same map.</p>
<p>If <italic>p</italic>
<sub>
<italic>1</italic>
</sub> passes, the <italic>rcm</italic> messages are sent to reconnect with the agent. Once an agent is actively connected, a real-time pose check <italic>p</italic>
<sub>
<italic>2</italic>
</sub> is conducted, which checks the current agent fuel level and network connection. In higher-level agents, this check can also take feedback from individual components onboard the vehicle, such as autopilot and motor sensors, to check for hardware integrity and orientation. If this pose check is passed, the distressed agent is deemed capable of rejoining the swarm. If the pose check fails, a log is created, and the agent&#x2019;s location is marked with an overlay that denotes the perceived reason for failure. A task re-assignment policy is then initiated to reassign the task of the lost agent to other swarm agents.</p>
<p>To date, probability maps have been a prevalent approach in SAR problems. Global or local maps are proposed that decompose ROI in grids [<xref ref-type="bibr" rid="B40">40</xref>], and a probability rate of the target being in each of the cells is calculated. Agents are encouraged to explore cells with a higher probability rating of the target being present in them. Similar approaches have been examined in [<xref ref-type="bibr" rid="B31">31</xref>] where agents not only create and maintain observation map history, but maps from neighboring agents can also be combined. A similar logic is used in this case, where ground control creates and maintains a global risk map where each cell has an associated risk value. This is based on location data of previous agent loss, where an incident log is created every time an agent is lost in a particular area in the same map. This is especially useful in same-area routine flight scenarios where UAVs must visit the same area multiple times. Labeled hotspots can then be used as additional input constraints to path-generating algorithms by assigning proportional weights to high-risk zones, which the planning algorithms can then avoid or have issue mitigation resources ready if those areas are unavoidable.</p>
<p>Pose and orientation calculation can be upgraded with optimization loops coming from additional input sources. For example, the vision sensor data of the distressed UAV can be accessed, and an automatic pose orientation of the UAV can eliminate the need to dispatch a rescue UAV if the fallen UAV sends an unrecoverable camera pose. This was demonstrated during various experiments in which a human in the loop could access the sensor information of the distressed UAV to deduce its orientation. If determined to be unrecoverable, the agent&#x2019;s location is marked for post-mission recovery trials, and the swarm moves on directly to the task re-allocation phase of the fallen agent.</p>
</sec>
</sec>
<sec id="s4">
<title>Performance Tests</title>
<p>Hardware and software tests were designed to test the proposed workflow under different conditions. Experiment range and series were selected considering the range and variability required to effectively demonstrate performance [<xref ref-type="bibr" rid="B53">53</xref>]. <xref ref-type="table" rid="T3">Table 3</xref> summarizes the primary objectives of each test, the map used, and the number of experimental flights performed. Overall, these tests represent a modular approach to developing and testing an SS-SAR framework for increasing the operational resiliency of a UAV swarm system.</p>
<table-wrap id="T3" position="float">
<label>TABLE 3</label>
<caption>
<p>Test observations and map used for the four performance tests.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Performance test (P.T.)</th>
<th align="center">Test objectives</th>
<th align="left">Map used</th>
<th align="left">Number of flights</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">PT1</td>
<td align="left">Observe time to distress, time to rescue, collision occurrence, and battery level check</td>
<td align="center">M1</td>
<td align="center">15</td>
</tr>
<tr>
<td align="left">PT2</td>
<td align="left">Observe <italic>p</italic>
<sub>
<italic>1</italic>
</sub> and <italic>p</italic>
<sub>
<italic>2</italic>
</sub>, recovery, and operator log creation</td>
<td align="center">M2</td>
<td align="center">10</td>
</tr>
<tr>
<td align="left">PT3</td>
<td align="left">Observe <italic>p</italic>
<sub>
<italic>0</italic>
</sub>, <italic>p</italic>
<sub>
<italic>1</italic>
</sub>, <italic>p</italic>
<sub>
<italic>2</italic>
</sub>, recovery, and operator log creation</td>
<td align="center">M3</td>
<td align="center">10</td>
</tr>
<tr>
<td align="left">PT4</td>
<td align="left">Observe <italic>p</italic>
<sub>
<italic>0</italic>
</sub>, <italic>p</italic>
<sub>
<italic>1</italic>
</sub>
<italic>,</italic> and <italic>p</italic>
<sub>
<italic>2</italic>
</sub>, time to distress, time to rescue, collision occurrence, and operator log creation</td>
<td align="center">M4</td>
<td align="center">10</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Each performance test was associated with a map, as summarized in <xref ref-type="table" rid="T3">Table 3</xref>. The hardware tests were performed in maps M1 and M2, and the simulation tests were performed in maps M3 and M4. <xref ref-type="table" rid="T4">Table 4</xref> outlines characteristics of the map environments used in the performance tests.</p>
<table-wrap id="T4" position="float">
<label>TABLE 4</label>
<caption>
<p>Map designations and properties.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Map designation</th>
<th align="left">Map environment</th>
<th align="left">Map design</th>
<th align="center">Major map properties</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">M1</td>
<td align="center">Indoor</td>
<td align="center">Real-world</td>
<td align="left">GCP referenced, residential, obstacle-free</td>
</tr>
<tr>
<td align="left">M2</td>
<td align="center">Indoor</td>
<td align="center">Real-world</td>
<td align="left">GCP referenced, office space, obstacles present</td>
</tr>
<tr>
<td align="left">M3</td>
<td align="center">Indoor</td>
<td align="center">Simulation</td>
<td align="left">GCP referenced office space and obstacles present. (M3 is the M2 space, recreated for simulation tests)</td>
</tr>
<tr>
<td align="left">M4</td>
<td align="center">Outdoor</td>
<td align="center">Simulation</td>
<td align="left">No GCP, outdoor terrain, obstacles present</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The proposed framework is quite flexible regarding the agents that can be used. However, at minimum, lateral and downward vision sensors are required, along with either a GNSS module or capability for passive beacon georeferencing. Considering hardware and fly space limitations, an indoor location was used for hardware tests. The DJI EDU [<xref ref-type="bibr" rid="B50">50</xref>] UAV platform was chosen to perform hardware performance tests. These low-cost drones provide a basic environment for drone testing and flights. In the past, there have been multiple approaches to using Tello drones as platforms for singular and swarm development. The authors of [<xref ref-type="bibr" rid="B54">54</xref>] use Tello agents to demonstrate an automated swarm flight in a restricted flight space. A matrix formation control that uses Tello to display patterns was adopted in [<xref ref-type="bibr" rid="B55">55</xref>]. In [<xref ref-type="bibr" rid="B56">56</xref>], the DJI frame was used to build visionless sensing drones for obstacle avoidance and maze solving.</p>
<p>Related research such as this assisted in realizing the various limitations of the Tello platform during experiment design. The Tello agents are low-cost entry-level hardware and are intended for proof-of-concept experiments. Without a dedicated GNSS receiver, the agents rely on a VPS using the downward-facing camera module to localize using ground planes and additional GCPs. All recorded video and image data is streamed in real-time to ground control without storage and post-processing ability. While these constraints prevent executing a full-scale framework representation on these agents, our experiments modify the complete framework based on its modular structure. This modular and stepwise process permits testing smaller decision statements using simple Tello agents. <xref ref-type="table" rid="T5">Table 5</xref> contains manufacturer-provided specifications for the DJI drones. These specifications have been referenced from online user manuals [<xref ref-type="bibr" rid="B50">50</xref>].</p>
<table-wrap id="T5" position="float">
<label>TABLE 5</label>
<caption>
<p>DJI TELLO EDU spec sheet.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">General parameters</th>
<th align="center">Value</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Weight (including propeller guards)</td>
<td align="center">87&#xa0;g</td>
</tr>
<tr>
<td align="left">Maximum speed</td>
<td align="center">17.8&#xa0;mph (28.8&#xa0;kph)</td>
</tr>
<tr>
<td align="left">Maximum flight time</td>
<td align="center">13&#xa0;min</td>
</tr>
</tbody>
</table>
<table>
<thead valign="top">
<tr>
<th align="left">Camera</th>
<th align="center">Value</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Maximum image size</td>
<td align="center">2,592 &#xd7; 1,936</td>
</tr>
<tr>
<td align="left">Video recording modes</td>
<td align="center">H.D.: 1,280 &#xd7; 720</td>
</tr>
</tbody>
</table>
<table>
<thead valign="top">
<tr>
<th align="left">Battery</th>
<th align="center">Value</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Capacity</td>
<td align="center">1,100&#xa0;mAh</td>
</tr>
<tr>
<td align="left">Voltage</td>
<td align="center">3.8&#xa0;V</td>
</tr>
<tr>
<td align="left">Energy</td>
<td align="center">4.18&#xa0;Wh</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec id="s4-1">
<title>Hardware Performance Tests</title>
<p>A modular and stepwise process was developed to test individual decision statements of the proposed SAR framework using simple Tello EDU agents. The objective of PT1 was to evaluate the time to distress, time to rescue, log any collision occurrence, and perform a battery level check. In PT1, two DJI agents were used as a part of the same swarm, with a rescue agent on active standby. A 2D visualization of M1 with initial agent positions and other mission information is shown in <xref ref-type="fig" rid="F5">Figure 5</xref>.</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption>
<p>2D representation of M1 space.</p>
</caption>
<graphic xlink:href="arc-01-12420-g005.tif"/>
</fig>
<p>One of the agents moving along the mission pads was forced to switch off its VPS to emulate a disruption condition. Meanwhile, the rescue agent was on active standby in the center of the mission area (<xref ref-type="fig" rid="F6">Figure 6</xref>, left) and could take off once the distressed agent did not send an expected HBS (<xref ref-type="fig" rid="F6">Figure 6</xref>, right). Using mission pad information transmitted by the distressed agent before it faced disruption, the rescue agent located the fallen agent (<xref ref-type="fig" rid="F7">Figure 7</xref>, left), conducted pose checks, and sent <italic>rcm</italic> messages to the distressed agent. If the distressed agent received the messages, it switched on its VPS, allowing it to rejoin the swarm. The rescue agent then moved back to its deployment point to await the next distress event (<xref ref-type="fig" rid="F7">Figure 7</xref>, right).</p>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption>
<p>Preliminary framework test PT1 in the M1 space.</p>
</caption>
<graphic xlink:href="arc-01-12420-g006.tif"/>
</fig>
<fig id="F7" position="float">
<label>FIGURE 7</label>
<caption>
<p>PT1 in the M1 space shows a swarm agent&#x2019;s distress and recovery.</p>
</caption>
<graphic xlink:href="arc-01-12420-g007.tif"/>
</fig>
<p>This performance test measured the time to distress, time to rescue and observed the number of collisions, rescue decisions, and the battery threshold value. The only pose check conducted to evaluate the <italic>b</italic>
<sub>
<italic>level</italic>
</sub> of the distressed agent.</p>
<p>PT2 again used two regular agents and one rescue agent on map M2. The objective of PT2 was to observe <italic>p</italic>
<sub>
<italic>1</italic>
</sub> and <italic>p</italic>
<sub>
<italic>2</italic>
</sub>, and to attempt a recovery. A 2D top-down representation of M2 is in <xref ref-type="fig" rid="F8">Figure 8</xref>. The number of GCPs could be increased or decreased with a maximum number of up to 20 GCPs placed in the fly space.</p>
<fig id="F8" position="float">
<label>FIGURE 8</label>
<caption>
<p>A 2D representation of the M2 map (Not to scale).</p>
</caption>
<graphic xlink:href="arc-01-12420-g008.tif"/>
</fig>
<p>
<xref ref-type="fig" rid="F9">Figure 9</xref> shows the M2 space where the three agents were released. The distress condition was simulated for one agent, where it landed behind the table. The rescue agent moved on location to conduct pose checks and begin recovery attempts. The distressed agent was not visible in the global view. However, various situations were observed using the rescue agent and <italic>p</italic>
<sub>
<italic>1</italic>
</sub>
<italic>.</italic> <xref ref-type="fig" rid="F10">Figure 10</xref> (top-right) shows the rescue agent&#x2019;s POV, where the distressed agent fell at an oblique angle.</p>
<fig id="F9" position="float">
<label>FIGURE 9</label>
<caption>
<p>Real-world M2 space with 2 regular and one rescue agent for PT2.</p>
</caption>
<graphic xlink:href="arc-01-12420-g009.tif"/>
</fig>
<fig id="F10" position="float">
<label>FIGURE 10</label>
<caption>
<p>A Different global view of the M2 space and two floating views from the rescue agent&#x2019;s POV.</p>
</caption>
<graphic xlink:href="arc-01-12420-g010.tif"/>
</fig>
<p>Additionally, as the agent had strayed under the table, the height of the table prevented the agent from gaining the minimum altitude required to conduct a safe rejoin operation. This exemplifies how <italic>p</italic>
<sub>
<italic>1</italic>
</sub> helps understand the distressed agent&#x2019;s situation. <xref ref-type="fig" rid="F10">Figure 10</xref> (bottom-right) shows a different situation where the agent has landed in a pose that could allow it to take off. However, its minimum altitude rejoin value was still greater than the obstacle dimensions. In both situations, the operator recommended that further recovery operations be terminated.</p>
<p>
<xref ref-type="fig" rid="F11">Figure 11</xref> shows a third situation where the agent landed in a position from which it could take off, plus the right side figure shows the rescue agent&#x2019;s POV from which the operator determined that obstacle dimensions did not impede the distressed agent&#x2019;s safe rejoin procedure upon reconnection. In this situation, the operator recommended the framework to carry further rescue statements on the distressed agent.</p>
<fig id="F11" position="float">
<label>FIGURE 11</label>
<caption>
<p>A scenario where <italic>p</italic>
<sub>
<italic>1</italic>
</sub> and <italic>p</italic>
<sub>
<italic>2</italic>
</sub> are successful on M2 during PT2.</p>
</caption>
<graphic xlink:href="arc-01-12420-g011.tif"/>
</fig>
</sec>
<sec id="s4-2">
<title>Simulation Performance Tests</title>
<p>Indoor and outdoor scenarios to test the proposed framework were modeled in CoppeliaSim, formerly VREP [<xref ref-type="bibr" rid="B57">57</xref>]. <xref ref-type="table" rid="T6">Table 6</xref> outlines the basic simulation parameters for PT3 and PT4. PT3 was a simulation experiment carried out on M3 (<xref ref-type="fig" rid="F12">Figure 12A</xref>), which is a close recreation of the M2 space used in the hardware experiments. The primary purpose of PT3 was to evaluate <italic>p</italic>
<sub>
<italic>0</italic>
</sub>, <italic>p</italic>
<sub>
<italic>1</italic>
</sub>, and <italic>p</italic>
<sub>
<italic>2</italic>
</sub> and attempt a recovery.</p>
<table-wrap id="T6" position="float">
<label>TABLE 6</label>
<caption>
<p>Simulation parameters for PT3.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Simulation parameters</th>
<th align="center">Description</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Target space</td>
<td align="left">Close re-creation of physical space M2 for PT3</td>
</tr>
<tr>
<td align="left">Simulation time</td>
<td align="left">&#x3c;500&#xa0;s (Variable)</td>
</tr>
<tr>
<td align="left">Size</td>
<td align="left">20&#xa0;m &#xd7; 20&#xa0;m</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="F12" position="float">
<label>FIGURE 12</label>
<caption>
<p>M3 map <bold>(A)</bold> and basic furniture <bold>(B)</bold> designs for PT3.</p>
</caption>
<graphic xlink:href="arc-01-12420-g012.tif"/>
</fig>
<p>A simple table and chair environment are used to show a failed <italic>p</italic>
<sub>
<italic>1</italic>
</sub> and <italic>p</italic>
<sub>
<italic>2</italic>
</sub> scenario (<xref ref-type="fig" rid="F12">Figure 12B</xref>). Pose check <italic>p</italic>
<sub>
<italic>1</italic>
</sub> used the agent vision sensor information to realize that the distressed agent failed in an inverted position. A normal decision cycle prevents the rescue agent from deploying on a failed <italic>p</italic>
<sub>
<italic>1</italic>
</sub>; however, a forced <italic>p</italic>
<sub>
<italic>2</italic>
</sub> cycle using a rescue agent shows that the table dimensions would hinder a safe rejoin maneuver of the distressed agent even if the agent were not in an inverted position.</p>
<p>The primary purpose of PT4 was to evaluate <italic>p</italic>
<sub>
<italic>0</italic>
</sub>, <italic>p</italic>
<sub>
<italic>1</italic>
</sub>
<italic>,</italic> and <italic>p</italic>
<sub>
<italic>2</italic>
</sub>, observe time to distress, time to rescue, and log any collision occurrence. <xref ref-type="table" rid="T7">Table 7</xref> outlines the basic simulation parameters for PT4. <xref ref-type="fig" rid="F13">Figure 13</xref> shows PT4 on M4, where pose checks <italic>p</italic>
<sub>
<italic>0</italic>
</sub>, <italic>p</italic>
<sub>
<italic>1</italic>
</sub>, and <italic>p</italic>
<sub>
<italic>2</italic>
</sub> were tested along with successful swarm rejoin scenarios. An abstract cube was placed in the field of view of the distressed agent to indicate its orientation for checking <italic>p</italic>
<sub>
<italic>0</italic>
</sub>. The rescue agent was then used to determine <italic>p</italic>
<sub>
<italic>1</italic>
</sub> by observing the status of the distressed agent. Finally, a <italic>p</italic>
<sub>
<italic>2</italic>
</sub> test evaluated if the distressed agent sensed it could rejoin the swarm.</p>
<table-wrap id="T7" position="float">
<label>TABLE 7</label>
<caption>
<p>Simulation parameters for PT4.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Simulation parameters</th>
<th align="center">Description</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Target space</td>
<td align="left">Outdoor environment</td>
</tr>
<tr>
<td align="left">Simulation time</td>
<td align="left">&#x3c;500&#xa0;s (Variable)</td>
</tr>
<tr>
<td align="left">Size</td>
<td align="left">100&#xa0;m &#xd7; 100&#xa0;m</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="F13" position="float">
<label>FIGURE 13</label>
<caption>
<p>Preliminary M4 map with no obstacles and abstract cube for <italic>p</italic>
<sub>
<italic>0</italic>
</sub> checks.</p>
</caption>
<graphic xlink:href="arc-01-12420-g013.tif"/>
</fig>
<p>
<xref ref-type="fig" rid="F14">Figure 14</xref> shows an updated map where trees were present as obstacles that hindered agent progress and rejoin maneuvers. Here, multiple agents in the distress scenario were tested, where one agent landed in an inverted position and the other in a normal position. The rescue agent conducted a <italic>p</italic>
<sub>
<italic>2</italic>
</sub> check on both agents to determine which agent could be safely recovered. Floating view windows in the figure show <italic>p</italic>
<sub>
<italic>1</italic>
</sub> checks by both agents and a <italic>p</italic>
<sub>
<italic>2</italic>
</sub> check by the rescue agent on one of the distressed agents.</p>
<fig id="F14" position="float">
<label>FIGURE 14</label>
<caption>
<p>M4 map with outdoor terrain and tree obstacles.</p>
</caption>
<graphic xlink:href="arc-01-12420-g014.tif"/>
</fig>
</sec>
</sec>
<sec sec-type="results" id="s5">
<title>Results</title>
<p>The following section highlights observations recorded during each performance test and their analysis. <xref ref-type="fig" rid="F15">Figure 15</xref> shows PT1 time to distress logs, the time when the agent first experienced an issue, and the time to rescue, which is the amount of time the rescue agent took to move to the position of the fallen agent and rescue it. Out of 15 flights, the rescue agent successfully rescues the distressed Tello agent nine times, as denoted by a green dot in <xref ref-type="fig" rid="F15">Figure 15</xref>. A preliminary <italic>p</italic>
<sub>
<italic>2</italic>
</sub> check was performed using the available battery percentage when <italic>rcm</italic> was successful. The battery values are in <xref ref-type="fig" rid="F16">Figure 16</xref>. If the battery value after successful reconnection was established between the Rescue and the distressed agent was below the given threshold (50%), the distressed agent was deemed incapable of rejoining the swarm. This was observed during flights 5, 7, 12, and 14. Each flight was independent, and the battery was charged to maximum capacity before each flight. Collision occurrence was counted when the rescue agent experienced collision at any time during the rescue process. As such, those flights were recorded as an unsuccessful recovery. During flights 4 and 10, the rescue agent experienced a collision and could not recover the fallen agent successfully; these flights were logged as failures. It was observed that close interaction with swarm agents in the constrained airspace caused unpredictable drifts in agent movement due to induced airflow, resulting in collisions and crashes. Overall, a recovery rate of 60% was thus calculated for PT1.</p>
<fig id="F15" position="float">
<label>FIGURE 15</label>
<caption>
<p>PT1 time to distress and time to rescue with successful recovery decisions.</p>
</caption>
<graphic xlink:href="arc-01-12420-g015.tif"/>
</fig>
<fig id="F16" position="float">
<label>FIGURE 16</label>
<caption>
<p>PT1 rescue decision and collision occurrence plotted with battery percentage values.</p>
</caption>
<graphic xlink:href="arc-01-12420-g016.tif"/>
</fig>
<p>
<xref ref-type="fig" rid="F17">Figure 17</xref> shows PT2 performed on M2. For ten flights, p1 and <italic>p</italic>
<sub>
<italic>2</italic>
</sub> rescue decisions were recorded. This test aimed to observe these pose checks and how they affect agent recovery. Flights 4, 7, 8, and 9 showed a successful recovery. Flights 1 to 3 and 5 failed <italic>p</italic>
<sub>
<italic>1,</italic>
</sub> where it was determined by the operator using the rescue agent that the fallen agent was not in a position from which it could safely take off. In M2, this scenario was due to indoor obstacles, such as furniture, that might prevent the agents&#x2019; safe take-off ability. In Flight 6, the agent passed <italic>p</italic>
<sub>
<italic>1</italic>,</sub> which denoted it was in an orientation and position that could enable safe take-off; however, it failed real-time pose check <italic>p</italic>
<sub>
<italic>2</italic>
</sub>. For flight 10, both p<sub>1</sub> and <italic>p</italic>
<sub>
<italic>2</italic>
</sub> were successful. However, the agent could not take off due to an internal malfunction. A success rate of 40% for PT2 was observed.</p>
<fig id="F17" position="float">
<label>FIGURE 17</label>
<caption>
<p>PT2 pose checks and rescue decisions.</p>
</caption>
<graphic xlink:href="arc-01-12420-g017.tif"/>
</fig>
<p>In addition to previous pose checks, PT3 on M3 also performed preliminary pose check <italic>p</italic>
<sub>
<italic>0</italic>
</sub> on the agents using the distressed agent&#x2019;s onboard vision sensor, as shown in <xref ref-type="fig" rid="F12">Figure 12</xref>. <xref ref-type="fig" rid="F18">Figure 18</xref> presents the ten flights performed. Flights 3, 5, 6, and 8 successfully recovered the distressed agent. For flights 1, 7, and 10, the agent failed <italic>p</italic>
<sub>
<italic>0</italic>
</sub>, indicating that the agent was not in a position to take off safely. As a result of the preliminary pose check failing, the rescue agent was not deployed to conduct further observations. In Flight 2, <italic>p</italic>
<sub>
<italic>0</italic>
</sub> passed. However, <italic>p</italic>
<sub>
<italic>1</italic>
</sub> failed, leading to a failed rescue attempt. In Flights 4 and 9, a successful <italic>p</italic>
<sub>
<italic>0</italic>
</sub> and <italic>p</italic>
<sub>
<italic>1</italic>
</sub> were observed. However, the agent failed real-time check <italic>p</italic>
<sub>
<italic>2</italic>
</sub> and was thus labeled unrecoverable. A success rate of 40% was observed for this test.</p>
<fig id="F18" position="float">
<label>FIGURE 18</label>
<caption>
<p>PT3 pose checks and Rescue decisions.</p>
</caption>
<graphic xlink:href="arc-01-12420-g018.tif"/>
</fig>
<p>PT4 on M4 further examined an additional ten flights, and the results are shown in <xref ref-type="fig" rid="F19">Figure 19</xref>, where time to distress logs the time a swarm agent experiences an issue, and time to rescue logs the time the rescue agent takes during rescue attempts. Flights 4, 5, 6, 7, and 9 showed the rescue agent&#x2019;s successful recovery of the distressed agent.</p>
<fig id="F19" position="float">
<label>FIGURE 19</label>
<caption>
<p>PT4 time to distress and time to rescue with successful recovery decisions.</p>
</caption>
<graphic xlink:href="arc-01-12420-g019.tif"/>
</fig>
<p>Further examination of operational parameters, as shown in <xref ref-type="fig" rid="F20">Figure 20</xref>, gives additional failure information. In flights 1, 8, and 10, the distressed agent passed <italic>p</italic>
<sub>
<italic>0,</italic>
</sub> which denoted its orientation passed requirements for safe rejoin. However, <italic>p</italic>
<sub>
<italic>1</italic>
</sub> failed. Since PT4 was performed on an outdoor terrain map that included tree obstacles, the primary reason for <italic>p</italic>
<sub>
<italic>1</italic>
</sub> to fail was the tress obstructing safe rejoin maneuvers. In-flight 2, the distressed agent failed to p0 itself, as denoted by the onboard sensor that gave information regarding its orientation and crash position. The floating window views in <xref ref-type="fig" rid="F14">Figure 14</xref> for the distressed agent one vision sensor FOV show an example of an agent that has landed upside down. The inverted image shows the ground above and tree foliage below. In flight 3, the distressed agent passed all required pose checks; however, a collision with the rescue agent resulted in a failed attempt. Overall, a success rate of 50% was observed. A summary of success rates for all performance tests is shown in <xref ref-type="fig" rid="F21">Figure 21</xref>.</p>
<fig id="F20" position="float">
<label>FIGURE 20</label>
<caption>
<p>PT4 pose checks and rescue decisions.</p>
</caption>
<graphic xlink:href="arc-01-12420-g020.tif"/>
</fig>
<fig id="F21" position="float">
<label>FIGURE 21</label>
<caption>
<p>Summary of PT results.</p>
</caption>
<graphic xlink:href="arc-01-12420-g021.tif"/>
</fig>
<p>A test on a sparse block map depicted in <xref ref-type="fig" rid="F22">Figure 22</xref> was used to log agent loss and recovery incidents. Every distress signal was mapped as a triangle or square in that process. The triangles indicate agent loss due to network issues, and the squares indicate agent loss due to collision. Red shapes indicate an unsuccessful attempt at recovery, and blue shapes indicate successful agent recovery. Each shape is the result of a separate flight, and consecutive flights did not have prior risk zone information. However, creating such risk zones can then be used as future input parameters to create safe flight paths. For example, if an area sees increased collisions due to dense obstacle geometry, a threat area can be modeled where agents entering that area do not venture below a preset altitude to avoid collisions. If agents moving to a particular area lose connection with ground control, the next iteration framework run will adjust the upper bound distance between the agents, which defines the maximum distance between two agents based on <italic>SSI</italic>
<sub>
<italic>n</italic>
</sub>. Adjusting the upper bounds will result in agents flying in close formation and using data hop pathways to connect to ground control and prevent agent loss due to network range limitations. Future work using this approach can demonstrate adaptability, robustness, and emergent behavior in the swarm based on simple governance rules.</p>
<fig id="F22" position="float">
<label>FIGURE 22</label>
<caption>
<p>Incident log overlay on a generic map as inputs for future iterations.</p>
</caption>
<graphic xlink:href="arc-01-12420-g022.tif"/>
</fig>
</sec>
<sec id="s6">
<title>Discussion and Future Research Directions</title>
<p>The proposed framework is a preliminary step in developing robust methodologies for evaluating swarm awareness toward the wellbeing of its constituent agents. This includes testing capabilities such as keeping track of each agent&#x2019;s progress toward its task, realizing the occurrence of agents in distress, locating the distressed agents, and initiating rescue operations to enable them to rejoin the swarm. Several modifications could be implemented via the modular nature of the designed framework, as initiated by research directions summarized below.</p>
<p>It is crucial to consider the impact of emerging regulations on UAV operations, particularly the recent implementation of the FAA&#x2019;s Remote Identification (RID) rule [<xref ref-type="bibr" rid="B58">58</xref>]. This regulation mandates the use of Remote Identification modules on certain UAVs, allowing for the open broadcast and identification of these agents during flight. This rule ensures safer airspace and promotes regulated use of UAVs, UAV swarms, and their applications [<xref ref-type="bibr" rid="B59">59</xref>]. When integrated into our rescue framework, the potential for such information can significantly enhance tracking and rescue performance. By leveraging the real-time identification capabilities provided by RID, it is foreseen that such frameworks can precisely locate and rescue other agents within the swarm more effectively, thus bolstering the overall efficiency and reliability of the proposed UAV rescue mechanism. Furthermore, exploring the compatibility and interoperability of our rescue system with other upcoming regulatory frameworks will be essential in ensuring the seamless integration and widespread adoption of our research in real-world UAV swarm applications.</p>
<p>Currently, some sections of the framework involve human decision-making. Most notable is the analysis of the distressed agent pose data transmitted by the rescue agent. The human operator observes the images to create a preliminary decision on the fallen agent&#x2019;s possibility of rejoining the swarm. The human in-loop component can be reduced by adding autonomous UAV detection capability that uses vision sensor data, deep learning, and image processing techniques. This is possible using approaches such as [<xref ref-type="bibr" rid="B60">60</xref>] that use agent vision sensors for target analysis. An additional upgrade involves multiple agents to capture disruption and distressed agent information from different angles to gather a richer dataset.</p>
<p>A modified task re-allocation algorithm would enable additional agents to join the swarm and take up the interrupted task of the fallen agent or a re-allocation scheme for existing swarm agents to assume responsibility for the incomplete task. Resource allocation implementations such as in [<xref ref-type="bibr" rid="B61">61</xref>&#x2013;<xref ref-type="bibr" rid="B63">63</xref>] exist that could be implemented. Further experiments could be explored for loss rates in the same airspace with LiDAR (for obstacle detection) and preset waypoints in a map (using GNSS). This would expand the feature of the existing framework to create probability maps. While current risk zones were labeled using agent failure location data obtained from transmitted HBS, future experiments may include the presence of VRRZ. This is the system&#x2019;s ability to create variable radius risk zones. Each risk zone can have a variable radius, thus allowing the mapping of larger disruptive structures to be represented more accurately.</p>
<p>The above study uses agents with similar capabilities acting in the same operational space. Including a diverse range of agents identified by their differences in nature, hardware, or operational space introduces heterogeneity in the swarm. The impacts of such inclusion on the performance of SAR agents can also be explored. Some existing research investigates the possibility of using a swarm composed of heterogeneous agents for victim detection after a disaster [<xref ref-type="bibr" rid="B64">64</xref>]. Although their main goal was exploring how swarm heterogeneity can affect performance, they modeled a target search and rescue problem to study it. Their proposed technique differentiated between different agents and labeled them as heterogeneous using behavior trees. A positive correlation was produced between the swarm&#x2019;s heterogenous capability and the time to search and rescue the target. A similar approach can be explored in the future, where differently abled robots are introduced in the swarm and are tasked with looking for swarm agents whose operations have been disrupted during mission progress. In the above experiments, all distressed agents were located on the ground. Thus, adding a UGV to track and locate the fallen agents to create an in-depth pose check analysis would be a logical step for further exploration. Several implementations of heterogeneous swarms exist, such as UAV-UGV collaboration [<xref ref-type="bibr" rid="B65">65</xref>], UAV-UWSV [<xref ref-type="bibr" rid="B29">29</xref>], and UAV-UGV-UWSV [<xref ref-type="bibr" rid="B66">66</xref>], demonstrating promise for more effective results than a single operational space swarm.</p>
<p>Intrusion detection systems can be implemented on the UAV network as a backend process. While IDSs are most prevalent on traditional networks to deter unwanted network access and activity, current lightweight versions have been shown to run reasonably well on MANET and FANET deployments with acceptable performance [<xref ref-type="bibr" rid="B19">19</xref>, <xref ref-type="bibr" rid="B67">67</xref>&#x2013;<xref ref-type="bibr" rid="B70">70</xref>]. Various types of IDS are available depending on their makeup and method of detecting malicious entities [<xref ref-type="bibr" rid="B71">71</xref>]. IDS could detect external agents attempting to maliciously disturb swarm operations. Similar approaches could also address ground-based attempts to take over swarm networks. The possible advantage would be the existing periodically transmitted HBS signal that can be used as input to any IDS. Adding network transmission data from each agent in the HBS could be used to design either a rule-based or anomaly-based lightweight IDS, at the very least. In this way, the SAR framework could provide additional security features to the swarm using inherently built structures.</p>
<p>A different approach taken to designing robust behavior was observed as a way of defining reliability in systems. The methods used in this category implement preemptive strategies for maintenance, abort policies, or recovery actions. This alternative form of resilience integration calls for an independent study. However, the results of the brief survey conducted on it are summarized below. These methods can be viewed as possible implementations and upgrades to this proposed SS-SAR framework. <xref ref-type="table" rid="T8">Table 8</xref> summarizes the examined work based on their development focus being broader systemic implementations or UAV swarm-focused.</p>
<table-wrap id="T8" position="float">
<label>TABLE 8</label>
<caption>
<p>Summary of recent work on optimal abort policies, task rescheduling, and dynamic risk assessment.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Reference</th>
<th align="center">Implementation</th>
<th align="center">Description</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">[<xref ref-type="bibr" rid="B72">72</xref>]</td>
<td align="left">General systemic deployment</td>
<td align="left">Optimally aborting subtasks in heterogeneous swarms to increase overall unit survivability rate</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B73">73</xref>]</td>
<td align="left">General systemic deployment</td>
<td align="left">Design the best abort strategy for multi-unit swarms based on the probability of external shocks damaging units</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B74">74</xref>]</td>
<td align="left">Single UAV focused</td>
<td align="left">Design of replacement policies and maintenance cost for UAV reconnaissance system</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B75">75</xref>]</td>
<td align="left">Single UAV focused</td>
<td align="left">Dynamic allocation of a fixed number of components to increase the mission completion rate by UAV in a reconnaissance scenario</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B76">76</xref>]</td>
<td align="left">UAV swarm focused</td>
<td align="left">Considering the cost of damaged agents and unfinished tasks to compute abort policies</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B77">77</xref>]</td>
<td align="left">UAV swarm focused</td>
<td align="left">Evaluate system mission reliability and suggest swarm maintenance strategies</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B78">78</xref>]</td>
<td align="left">UAV swarm focused</td>
<td align="left">Incorporating abort policies in multi-UAV routing as a response to external shocks to ensure agent wellbeing</td>
</tr>
<tr>
<td align="left">[<xref ref-type="bibr" rid="B79">79</xref>]</td>
<td align="left">UAV swarm focused</td>
<td align="left">Consider degradation level, mission time, and equipment health to create dynamic mission abort policies</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec sec-type="conclusion" id="s7">
<title>Conclusion</title>
<p>This research addresses gaps in current swarm resiliency research by addressing swarm-specific SAR rather than application-specific SAR. The approach was not to replace current SAR methodologies but to create an add-on that enables them to keep track of swarm agents while performing other functions. Modular experiments conducted on real-world hardware and simulations validated the need for, the possibility of, and the success rate of swarm-specific SAR approaches. While low-cost Tello drones were limited in their ability to handle a complete SS-SAR framework, they were crucial in testing the constituent process of the framework, such as reconnection protocols and pose check handlers. Simulation results provided a greater insight into how such frameworks can handle swarm agent loss. Experimental results prove that focusing on this approach to resiliency integration in multi-agent systems can produce the anticipated benefits. Recovery rates of distressed agents during and after the mission process increased drastically, especially in systems with no contingency rules. UAV swarms are complex and highly dynamic, making integrating resilience factors much more arduous. A system must exhibit awareness and diagnosis capability regarding its health before and after a disruption to efficiently produce solutions to mitigate said disruptions. This swarm-specific SAR framework is a crucial design step in that direction.</p>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="s8">
<title>Data Availability Statement</title>
<p>The raw data supporting the conclusion of this article will be made available by the authors, without undue reservation.</p>
</sec>
<sec id="s9">
<title>Author Contributions</title>
<p>Conceptualization, Methodology, Validation, Writing- Original draft- AP. Methodology, Writing- review and editing, Visualization, Supervision- FM. All authors contributed to the article and approved the submitted version.</p>
</sec>
<sec sec-type="COI-statement" id="s10">
<title>Conflict of Interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec id="s11">
<title>Abbreviations</title>
<p>AS, Application specific; FANET, Flying Ad Hoc Networks; GNSS, Global Navigation Satellite System; GCP, Ground control points; HBS, Heartbeat signal; IDS, Intrusion Detection System; MANET, Mobile Ad Hoc Networks; MPC, Model Predictive Control; MRS, Multi-Robot System; OLSR, Optimized Link State Routing; PSO, Particle Swarm Optimization; POV, Point of View; ROI, Region Of Interest; S.S., Swarm Specific; SSI, Signal Strength Indicator; SAR, Swarm Agent Specific; SAR, Search and Rescue; SMF, Swarm Methodology Focused; UAV, Unmanned Aerial Vehicle; UGV, Unmanned Ground Vehicle; UWSV, Unmanned Water Surface Vehicle; VPS, Visual positioning system; VRRZ, Variable Radius Risk Zones.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<label>1.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Siemiatkowska</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Stecz</surname>
<given-names>W</given-names>
</name>
</person-group>. <article-title>A Framework for Planning and Execution of Drone Swarm Missions in a Hostile Environment</article-title>. <source>Sensors (Basel)</source> (<year>2021</year>) <volume>21</volume>:<fpage>4150</fpage>. <pub-id pub-id-type="doi">10.3390/s21124150</pub-id>
</citation>
</ref>
<ref id="B2">
<label>2.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ko</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Kim</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Duguma</surname>
<given-names>DG</given-names>
</name>
<name>
<surname>Astillo</surname>
<given-names>PV</given-names>
</name>
<name>
<surname>You</surname>
<given-names>I</given-names>
</name>
<name>
<surname>Pau</surname>
<given-names>G</given-names>
</name>
</person-group>. <article-title>Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone</article-title>. <source>Sensors (Basel)</source> (<year>2021</year>) <volume>21</volume>:<fpage>2057</fpage>. <pub-id pub-id-type="doi">10.3390/s21062057</pub-id>
</citation>
</ref>
<ref id="B3">
<label>3.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Allan</surname>
<given-names>BM</given-names>
</name>
<name>
<surname>Nimmo</surname>
<given-names>DG</given-names>
</name>
<name>
<surname>Ierodiaconou</surname>
<given-names>D</given-names>
</name>
<name>
<surname>VanDerWal</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Koh</surname>
<given-names>LP</given-names>
</name>
<name>
<surname>Ritchie</surname>
<given-names>EG</given-names>
</name>
</person-group>. <article-title>Futurecasting Ecological Research: The Rise of Technoecology</article-title>. <source>Ecosphere</source> (<year>2018</year>) <volume>9</volume>. <pub-id pub-id-type="doi">10.1002/ecs2.2163</pub-id>
</citation>
</ref>
<ref id="B4">
<label>4.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Nex</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Duarte</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Steenbeek</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Kerle</surname>
<given-names>N</given-names>
</name>
</person-group>. <article-title>Towards Real-Time Building Damage Mapping With Low-Cost UAV Solutions</article-title>. <source>Remote Sensing</source> (<year>2019</year>) <volume>11</volume>:<fpage>287</fpage>. <pub-id pub-id-type="doi">10.3390/rs11030287</pub-id>
</citation>
</ref>
<ref id="B5">
<label>5.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Noor</surname>
<given-names>NM</given-names>
</name>
<name>
<surname>Abdullah</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Hashim</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>Remote Sensing UAV/Drones and Its Applications for Urban Areas: A Review</article-title>. In: <source>IGRSM International Conference and Exhibition on Geospatial &#x26; Remote Sensing</source>. <publisher-loc>Malaysia</publisher-loc>: <publisher-name>Kuala Lumpur</publisher-name> (<year>2018</year>).</citation>
</ref>
<ref id="B6">
<label>6.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hildmann</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Kovacs</surname>
<given-names>E</given-names>
</name>
</person-group>. <article-title>Review: Using Unmanned Aerial Vehicles (UAVs) as Mobile Sensing Platforms (MSPs) for Disaster Response, Civil Security and Public Safety</article-title>. <source>Drones</source> (<year>2019</year>) <volume>3</volume>:<fpage>59</fpage>. <pub-id pub-id-type="doi">10.3390/drones3030059</pub-id>
</citation>
</ref>
<ref id="B7">
<label>7.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Klaine</surname>
<given-names>PV</given-names>
</name>
<name>
<surname>Nadas</surname>
<given-names>JPB</given-names>
</name>
<name>
<surname>Souza</surname>
<given-names>RD</given-names>
</name>
<name>
<surname>Imran</surname>
<given-names>MA</given-names>
</name>
</person-group>. <article-title>Distributed Drone Base Station Positioning for Emergency Cellular Networks Using Reinforcement Learning</article-title>. <source>Cognit Comput</source> (<year>2018</year>) <volume>10</volume>:<fpage>790</fpage>&#x2013;<lpage>804</lpage>. <pub-id pub-id-type="doi">10.1007/s12559-018-9559-8</pub-id>
</citation>
</ref>
<ref id="B8">
<label>8.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tsouros</surname>
<given-names>DC</given-names>
</name>
<name>
<surname>Bibi</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Sarigiannidis</surname>
<given-names>PG</given-names>
</name>
</person-group>. <article-title>A Review on UAV-Based Applications for Precision Agriculture</article-title>. <source>Information</source> (<year>2019</year>) <volume>10</volume>:<fpage>349</fpage>. <pub-id pub-id-type="doi">10.3390/info10110349</pub-id>
</citation>
</ref>
<ref id="B9">
<label>9.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Panagiotis Radoglou-Grammatikis</surname>
<given-names>PS</given-names>
</name>
<name>
<surname>Lagkas</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Moscholios</surname>
<given-names>I</given-names>
</name>
</person-group>. <article-title>A Compilation of UAV Applications for Precision Agriculture</article-title>. <source>Computer Networks</source> (<year>2020</year>) <volume>172</volume>:<fpage>107148</fpage>. <pub-id pub-id-type="doi">10.1016/j.comnet.2020.107148</pub-id>
</citation>
</ref>
<ref id="B10">
<label>10.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lygouras</surname>
<given-names>E</given-names>
</name>
<name>
<surname>Santavas</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Taitzoglou</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Tarchanidis</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Mitropoulos</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Gasteratos</surname>
<given-names>A</given-names>
</name>
</person-group>. <article-title>Unsupervised Human Detection With an Embedded Vision System on a Fully Autonomous UAV for Search and Rescue Operations</article-title>. <source>Sensors (Basel)</source> (<year>2019</year>) <volume>19</volume>:<fpage>3542</fpage>. <pub-id pub-id-type="doi">10.3390/s19163542</pub-id>
</citation>
</ref>
<ref id="B11">
<label>11.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Dong</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Ota</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Dong</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>UAV-Based Real-Time Survivor Detection System in Post-Disaster Search and Rescue Operations</article-title>. <source>IEEE J Miniaturization Air Space Syst</source> (<year>2021</year>) <volume>2</volume>:<fpage>209</fpage>&#x2013;<lpage>19</lpage>. <pub-id pub-id-type="doi">10.1109/jmass.2021.3083659</pub-id>
</citation>
</ref>
<ref id="B12">
<label>12.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Phadke</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Antonio Medrano</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Chu</surname>
<given-names>T</given-names>
</name>
</person-group>. <article-title>Engineering Resiliency in UAV Swarms&#x2013;A Bibliographic Analysis</article-title>. <source>J Phys Conf Ser</source> (<year>2022</year>) <volume>2330</volume>:<fpage>012007</fpage>. <pub-id pub-id-type="doi">10.1088/1742-6596/2330/1/012007</pub-id>
</citation>
</ref>
<ref id="B13">
<label>13.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ordoukhanian</surname>
<given-names>EM</given-names>
</name>
<name>
<surname>Azad</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>Engineering Resilience Into Multi-UAV Systems</article-title>. <source>Proced Comp Sci</source> (<year>2019</year>) <volume>153</volume>:<fpage>9</fpage>&#x2013;<lpage>16</lpage>. <pub-id pub-id-type="doi">10.1016/j.procs.2019.05.050</pub-id>
</citation>
</ref>
<ref id="B14">
<label>14.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hosseini</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Barker</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Ramirez-Marquez</surname>
<given-names>JE</given-names>
</name>
</person-group>. <article-title>A Review of Definitions and Measures of System Resilience</article-title>. <source>Reliability Eng Syst Saf</source> (<year>2016</year>) <volume>145</volume>:<fpage>47</fpage>&#x2013;<lpage>61</lpage>. <pub-id pub-id-type="doi">10.1016/j.ress.2015.08.006</pub-id>
</citation>
</ref>
<ref id="B15">
<label>15.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Woods</surname>
<given-names>DD</given-names>
</name>
</person-group>. <article-title>Four Concepts for Resilience and the Implications for the Future of Resilience Engineering</article-title>. <source>Reliability Eng Syst Saf</source> (<year>2015</year>) <volume>141</volume>:<fpage>5</fpage>&#x2013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.1016/j.ress.2015.03.018</pub-id>
</citation>
</ref>
<ref id="B16">
<label>16.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Phadke</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Medrano</surname>
<given-names>FA</given-names>
</name>
</person-group>. <article-title>Towards Resilient UAV Swarms&#x2014;A Breakdown of Resiliency Requirements in UAV Swarms</article-title>. <source>Drones</source> (<year>2022</year>) <volume>6</volume>:<fpage>340</fpage>. <pub-id pub-id-type="doi">10.3390/drones6110340</pub-id>
</citation>
</ref>
<ref id="B17">
<label>17.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>X</given-names>
</name>
</person-group>. <article-title>UAV Swarm Navigation Using Dynamic Adaptive Kalman Filter and Network Navigation</article-title>. <source>Sensors (Basel)</source> (<year>2021</year>) <volume>21</volume>:<fpage>5374</fpage>. <pub-id pub-id-type="doi">10.3390/s21165374</pub-id>
</citation>
</ref>
<ref id="B18">
<label>18.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bassolillo</surname>
<given-names>SR</given-names>
</name>
<name>
<surname>D&#x27;Amato</surname>
<given-names>E</given-names>
</name>
<name>
<surname>Notaro</surname>
<given-names>I</given-names>
</name>
<name>
<surname>Blasi</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Mattei</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>Decentralized Mesh-Based Model Predictive Control for Swarms of UAVs</article-title>. <source>Sensors (Basel)</source> (<year>2020</year>) <volume>20</volume>:<fpage>4324</fpage>. <pub-id pub-id-type="doi">10.3390/s20154324</pub-id>
</citation>
</ref>
<ref id="B19">
<label>19.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tan</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Su</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Zuo</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Guo</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Sun</surname>
<given-names>X</given-names>
</name>
</person-group>. <article-title>Intrusion Detection of UAVs Based on the Deep Belief Network Optimized by PSO</article-title>. <source>Sensors (Basel)</source> (<year>2019</year>) <volume>19</volume>:<fpage>5529</fpage>. <pub-id pub-id-type="doi">10.3390/s19245529</pub-id>
</citation>
</ref>
<ref id="B20">
<label>20.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Luo</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Zheng</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Guo</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>Solving the Multi-Functional Heterogeneous UAV Cooperative Mission Planning Problem Using Multi-Swarm Fruit Fly Optimization Algorithm</article-title>. <source>Sensors (Basel)</source> (<year>2020</year>) <volume>20</volume>:<fpage>5026</fpage>. <pub-id pub-id-type="doi">10.3390/s20185026</pub-id>
</citation>
</ref>
<ref id="B21">
<label>21.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kwa</surname>
<given-names>HL</given-names>
</name>
<name>
<surname>Philippot</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Bouffanais</surname>
<given-names>R</given-names>
</name>
</person-group>. <article-title>Effect of Swarm Density on Collective Tracking Performance</article-title>. <source>Swarm Intelligence</source> (<year>2023</year>) <volume>17</volume>:<fpage>253</fpage>&#x2013;<lpage>81</lpage>. <pub-id pub-id-type="doi">10.1007/s11721-023-00225-4</pub-id>
</citation>
</ref>
<ref id="B22">
<label>22.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Abhishek</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Medrano</surname>
<given-names>FA</given-names>
</name>
</person-group>. <article-title>Examining Application-Specific Resiliency Implementations in UAV Swarm Scenarios</article-title>. <source>Intelligence &#x26; Robotics</source> (<year>2023</year>) <volume>3</volume>:<fpage>453</fpage>&#x2013;<lpage>78</lpage>. <pub-id pub-id-type="doi">10.20517/ir.2023.27</pub-id>
</citation>
</ref>
<ref id="B23">
<label>23.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Phadke</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Medrano</surname>
<given-names>A</given-names>
</name>
</person-group>. <source>A Resilient Multi-UAV System of Systems (SoS)</source>. <comment>Report no. 2771-9359</comment> (<year>2021</year>).</citation>
</ref>
<ref id="B24">
<label>24.</label>
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Garg</surname>
<given-names>V</given-names>
</name>
<name>
<surname>Tiwari</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Shukla</surname>
<given-names>A</given-names>
</name>
</person-group>. <article-title>Comparative Analysis of Fruit Fly-Inspired Multi-Robot Cooperative Algorithm for Target Search and Rescue</article-title>. In: <conf-name>2022 IEEE World Conference on Applied Intelligence and Computing (AIC)</conf-name>; <conf-date>17-19 June 2022</conf-date>; <conf-loc>Sonbhadra, India</conf-loc> (<year>2022</year>). p. <fpage>444</fpage>&#x2013;<lpage>50</lpage>.</citation>
</ref>
<ref id="B25">
<label>25.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cao</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Qi</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Jing</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Zhu</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Lei</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Z</given-names>
</name>
<etal/>
</person-group> <article-title>Mission Chain Driven Unmanned Aerial Vehicle Swarms Cooperation for the Search and Rescue of Outdoor Injured Human Targets</article-title>. <source>Drones</source> (<year>2022</year>) <volume>6</volume>:<fpage>138</fpage>. <pub-id pub-id-type="doi">10.3390/drones6060138</pub-id>
</citation>
</ref>
<ref id="B26">
<label>26.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Oh</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Han</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>Smart Search System of Autonomous Flight UAVs for Disaster Rescue</article-title>. <source>Sensors (Basel)</source> (<year>2021</year>) <volume>21</volume>:<fpage>6810</fpage>. <pub-id pub-id-type="doi">10.3390/s21206810</pub-id>
</citation>
</ref>
<ref id="B27">
<label>27.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cardona</surname>
<given-names>GA</given-names>
</name>
<name>
<surname>Calderon</surname>
<given-names>JM</given-names>
</name>
</person-group>. <article-title>Robot Swarm Navigation and Victim Detection Using Rendezvous Consensus in Search and Rescue Operations</article-title>. <source>Appl Sci</source> (<year>2019</year>) <volume>9</volume>:<fpage>1702</fpage>. <pub-id pub-id-type="doi">10.3390/app9081702</pub-id>
</citation>
</ref>
<ref id="B28">
<label>28.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Alotaibi</surname>
<given-names>ET</given-names>
</name>
<name>
<surname>Alqefari</surname>
<given-names>SS</given-names>
</name>
<name>
<surname>Koubaa</surname>
<given-names>A</given-names>
</name>
</person-group>. <article-title>LSAR: Multi-UAV Collaboration for Search and Rescue Missions</article-title>. <source>IEEE Access</source> (<year>2019</year>) <volume>7</volume>:<fpage>55817</fpage>&#x2013;<lpage>32</lpage>. <pub-id pub-id-type="doi">10.1109/access.2019.2912306</pub-id>
</citation>
</ref>
<ref id="B29">
<label>29.</label>
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Yang</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Jiang</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Dong</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Feng</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>C</given-names>
</name>
</person-group>. <article-title>Multi Agents to Search and Rescue Based on Group Intelligent Algorithm and Edge Computing</article-title>. In: <conf-name>2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)</conf-name>; <conf-date>30 July 2018 - 03 August 2018</conf-date>; <conf-loc>Halifax, NS, Canada</conf-loc> (<year>2018</year>). p. <fpage>389</fpage>&#x2013;<lpage>94</lpage>.</citation>
</ref>
<ref id="B30">
<label>30.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ho</surname>
<given-names>Y-H</given-names>
</name>
<name>
<surname>Tsai</surname>
<given-names>Y-J</given-names>
</name>
</person-group>. <article-title>Open Collaborative Platform for Multi-Drones to Support Search and Rescue Operations</article-title>. <source>Drones</source> (<year>2022</year>) <volume>6</volume>:<fpage>132</fpage>. <pub-id pub-id-type="doi">10.3390/drones6050132</pub-id>
</citation>
</ref>
<ref id="B31">
<label>31.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yan</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Jia</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Bai</surname>
<given-names>C</given-names>
</name>
</person-group>. <article-title>Searching and Tracking an Unknown Number of Targets: A Learning-Based Method Enhanced With Maps Merging</article-title>. <source>Sensors (Basel)</source> (<year>2021</year>) <volume>21</volume>:<fpage>1076</fpage>. <pub-id pub-id-type="doi">10.3390/s21041076</pub-id>
</citation>
</ref>
<ref id="B32">
<label>32.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Papaioannou</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Kolios</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Theocharides</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Panayiotou</surname>
<given-names>CG</given-names>
</name>
<name>
<surname>Polycarpou</surname>
<given-names>MM</given-names>
</name>
</person-group>. <article-title>Distributed Search Planning in 3-D Environments With a Dynamically Varying Number of Agents</article-title>. <source>IEEE Trans Syst Man, Cybernetics: Syst</source> (<year>2023</year>) <volume>53</volume>:<fpage>4117</fpage>&#x2013;<lpage>30</lpage>. <pub-id pub-id-type="doi">10.1109/tsmc.2023.3240023</pub-id>
</citation>
</ref>
<ref id="B33">
<label>33.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Liu</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Yao</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Zhu</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Zuo</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>B</given-names>
</name>
</person-group>. <article-title>Emergent Search of UAV Swarm Guided by the Target Probability Map</article-title>. <source>Appl Sci</source> (<year>2022</year>) <volume>12</volume>:<fpage>5086</fpage>. <pub-id pub-id-type="doi">10.3390/app12105086</pub-id>
</citation>
</ref>
<ref id="B34">
<label>34.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Nie</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Mao</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Yu</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Collaborative Target Search Algorithm for UAV Based on Chaotic Disturbance Pigeon-Inspired Optimization</article-title>. <source>Appl Sci</source> (<year>2021</year>) <volume>11</volume>:<fpage>7358</fpage>. <pub-id pub-id-type="doi">10.3390/app11167358</pub-id>
</citation>
</ref>
<ref id="B35">
<label>35.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cho</surname>
<given-names>S-W</given-names>
</name>
<name>
<surname>Park</surname>
<given-names>J-H</given-names>
</name>
<name>
<surname>Park</surname>
<given-names>H-J</given-names>
</name>
<name>
<surname>Kim</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Multi-UAV Coverage Path Planning Based on Hexagonal Grid Decomposition in Maritime Search and Rescue</article-title>. <source>Mathematics</source> (<year>2021</year>) <volume>10</volume>:<fpage>83</fpage>. <pub-id pub-id-type="doi">10.3390/math10010083</pub-id>
</citation>
</ref>
<ref id="B36">
<label>36.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Walker</surname>
<given-names>O</given-names>
</name>
<name>
<surname>Vanegas</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Gonzalez</surname>
<given-names>F</given-names>
</name>
</person-group>. <article-title>A Framework for Multi-Agent UAV Exploration and Target-Finding in GPS-Denied and Partially Observable Environments</article-title>. <source>Sensors (Basel)</source> (<year>2020</year>) <volume>20</volume>:<fpage>4739</fpage>. <pub-id pub-id-type="doi">10.3390/s20174739</pub-id>
</citation>
</ref>
<ref id="B37">
<label>37.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Alhaqbani</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Kurdi</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Youcef-Toumi</surname>
<given-names>K</given-names>
</name>
</person-group>. <article-title>Fish-Inspired Task Allocation Algorithm for Multiple Unmanned Aerial Vehicles in Search and Rescue Missions</article-title>. <source>Remote Sensing</source> (<year>2020</year>) <volume>13</volume>:<fpage>27</fpage>. <pub-id pub-id-type="doi">10.3390/rs13010027</pub-id>
</citation>
</ref>
<ref id="B38">
<label>38.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yue</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Guan</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>L</given-names>
</name>
</person-group>. <article-title>A Novel Searching Method Using Reinforcement Learning Scheme for Multi-UAVs in Unknown Environments</article-title>. <source>Appl Sci</source> (<year>2019</year>) <volume>9</volume>:<fpage>4964</fpage>. <pub-id pub-id-type="doi">10.3390/app9224964</pub-id>
</citation>
</ref>
<ref id="B39">
<label>39.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Deng</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>H</given-names>
</name>
</person-group>. <article-title>Profit-Driven Adaptive Moving Targets Search With UAV Swarms</article-title>. <source>Sensors (Basel)</source> (<year>2019</year>) <volume>19</volume>:<fpage>1545</fpage>. <pub-id pub-id-type="doi">10.3390/s19071545</pub-id>
</citation>
</ref>
<ref id="B40">
<label>40.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>de Alcantara Andrade</surname>
<given-names>FA</given-names>
</name>
<name>
<surname>Reinier Hovenburg</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Netto de Lima</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Rodin</surname>
<given-names>CD</given-names>
</name>
<name>
<surname>Johansen</surname>
<given-names>TA</given-names>
</name>
<name>
<surname>Storvold</surname>
<given-names>R</given-names>
</name>
<etal/>
</person-group> <article-title>Autonomous Unmanned Aerial Vehicles in Search and Rescue Missions Using Real-Time Cooperative Model Predictive Control</article-title>. <source>Sensors (Basel)</source> (<year>2019</year>) <volume>19</volume>:<fpage>4067</fpage>. <pub-id pub-id-type="doi">10.3390/s19194067</pub-id>
</citation>
</ref>
<ref id="B41">
<label>41.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Huang</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Teo</surname>
<given-names>RSH</given-names>
</name>
<name>
<surname>Kwan</surname>
<given-names>JLP</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Dymkou</surname>
<given-names>SM</given-names>
</name>
</person-group>. <article-title>Distributed UAV Loss Detection and Auto-Replacement Protocol With Guaranteed Properties</article-title>. <source>J Intell Robotic Syst</source> (<year>2019</year>) <volume>93</volume>:<fpage>303</fpage>&#x2013;<lpage>16</lpage>. <pub-id pub-id-type="doi">10.1007/s10846-018-0818-4</pub-id>
</citation>
</ref>
<ref id="B42">
<label>42.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Godio</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Primatesta</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Guglieri</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Dovis</surname>
<given-names>F</given-names>
</name>
</person-group>. <article-title>A Bioinspired Neural Network-Based Approach for Cooperative Coverage Planning of UAVs</article-title>. <source>Information</source> (<year>2021</year>) <volume>12</volume>:<fpage>51</fpage>. <pub-id pub-id-type="doi">10.3390/info12020051</pub-id>
</citation>
</ref>
<ref id="B43">
<label>43.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Xie</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Han</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Dong</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Ren</surname>
<given-names>Z</given-names>
</name>
</person-group>. <article-title>Bio-Inspired Adaptive Formation Tracking Control for Swarm Systems With Application to UAV Swarm Systems</article-title>. <source>Neurocomputing</source> (<year>2021</year>) <volume>453</volume>:<fpage>272</fpage>&#x2013;<lpage>85</lpage>. <pub-id pub-id-type="doi">10.1016/j.neucom.2021.05.015</pub-id>
</citation>
</ref>
<ref id="B44">
<label>44.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Gu</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Huang</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Yuan</surname>
<given-names>Y</given-names>
</name>
<etal/>
</person-group> <article-title>Bioinspired Environment Exploration Algorithm in Swarm Based on L&#xe9;vy Flight and Improved Artificial Potential Field</article-title>. <source>Drones</source> (<year>2022</year>) <volume>6</volume>:<fpage>122</fpage>. <pub-id pub-id-type="doi">10.3390/drones6050122</pub-id>
</citation>
</ref>
<ref id="B45">
<label>45.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Xu</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Bai</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Tao</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Fang</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>A Multistate Network Approach for Reliability Evaluation of Unmanned Swarms by Considering Information Exchange Capacity</article-title>. <source>Reliability Eng Syst Saf</source> (<year>2022</year>) <volume>219</volume>:<fpage>108221</fpage>. <pub-id pub-id-type="doi">10.1016/j.ress.2021.108221</pub-id>
</citation>
</ref>
<ref id="B46">
<label>46.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Qiao</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Cheng</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Cong</surname>
<given-names>Y</given-names>
</name>
<etal/>
</person-group> <article-title>Adjustable Fully Adaptive Cross-Entropy Algorithms for Task Assignment of Multi-UAVs</article-title>. <source>Drones</source> (<year>2023</year>) <volume>7</volume>:<fpage>204</fpage>. <pub-id pub-id-type="doi">10.3390/drones7030204</pub-id>
</citation>
</ref>
<ref id="B47">
<label>47.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Zeng</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Ren</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Sun</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Y</given-names>
</name>
</person-group>. <source>A Resilient Task Allocation Method for UAV Swarm Based on PSO-ILP Bilevel Nested Optimization</source> (<year>2023</year>). <comment>Available from: <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.21203/rs.3.rs-2765091/v1">https://doi.org/10.21203/rs.3.rs-2765091/v1</ext-link>.</comment>
</citation>
</ref>
<ref id="B48">
<label>48.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bejiga</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Zeggada</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Nouffidj</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Melgani</surname>
<given-names>F</given-names>
</name>
</person-group>. <article-title>A Convolutional Neural Network Approach for Assisting Avalanche Search and Rescue Operations With UAV Imagery</article-title>. <source>Remote Sensing</source> (<year>2017</year>) <volume>9</volume>:<fpage>100</fpage>. <pub-id pub-id-type="doi">10.3390/rs9020100</pub-id>
</citation>
</ref>
<ref id="B49">
<label>49.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Phadke</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Medrano</surname>
<given-names>A</given-names>
</name>
</person-group>. <article-title>Drone2Drone: A Search and rescue Framework for Finding Lost UAV Swarm Agents. Poster</article-title>. In: <source>Symposium for Student Innovation, Research, and Creative Activities 2023</source>. <publisher-loc>United States</publisher-loc>: <publisher-name>Texas A&#x26;M University-Corpus Christi</publisher-name> (<year>2023</year>).</citation>
</ref>
<ref id="B50">
<label>50.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Tello</surname>
<given-names>DJI</given-names>
</name>
</person-group>. <source>EDU User Manual</source> (<year>2018</year>).</citation>
</ref>
<ref id="B51">
<label>51.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wheeb</surname>
<given-names>AH</given-names>
</name>
<name>
<surname>Nordin</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Samah</surname>
<given-names>AA</given-names>
</name>
<name>
<surname>Kanellopoulos</surname>
<given-names>D</given-names>
</name>
</person-group>. <article-title>Performance Evaluation of Standard and Modified OLSR Protocols for Uncoordinated UAV Ad-Hoc Networks in Search and Rescue Environments</article-title>. <source>Electronics</source> (<year>2023</year>) <volume>12</volume>:<fpage>1334</fpage>. <pub-id pub-id-type="doi">10.3390/electronics12061334</pub-id>
</citation>
</ref>
<ref id="B52">
<label>52.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Jiang</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Sun</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Cai</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Wen</surname>
<given-names>CY</given-names>
</name>
</person-group>. <article-title>Development and Testing of a Two-UAV Communication Relay System</article-title>. <source>Sensors (Basel)</source> (<year>2016</year>) <volume>16</volume>:<fpage>1696</fpage>. <pub-id pub-id-type="doi">10.3390/s16101696</pub-id>
</citation>
</ref>
<ref id="B53">
<label>53.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Phadke</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Medrano</surname>
<given-names>FA</given-names>
</name>
<name>
<surname>Sekharan</surname>
<given-names>CN</given-names>
</name>
<name>
<surname>Chu</surname>
<given-names>T</given-names>
</name>
</person-group>. <article-title>Designing UAV Swarm Experiments: A Simulator Selection and Experiment Design Process</article-title>. <source>Sensors</source> (<year>2023</year>) <volume>23</volume>:<fpage>7359</fpage>. <pub-id pub-id-type="doi">10.3390/s23177359</pub-id>
</citation>
</ref>
<ref id="B54">
<label>54.</label>
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Pohudina</surname>
<given-names>O</given-names>
</name>
<name>
<surname>Kovalevskyi</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Pyvovar</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>Group Flight Automation Using Tello EDU Unmanned Aerial Vehicle</article-title>. In: <conf-name>2021 IEEE 16th International Conference on Computer Sciences and Information Technologies (CSIT)</conf-name>; <conf-date>22-25 September 2021</conf-date>; <conf-loc>LVIV, Ukraine</conf-loc> (<year>2021</year>). p. <fpage>151</fpage>&#x2013;<lpage>4</lpage>.</citation>
</ref>
<ref id="B55">
<label>55.</label>
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Virbora</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Sokoeun</surname>
<given-names>U</given-names>
</name>
<name>
<surname>Saran</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Sovicheyratana</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Channareth</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Saravuth</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Implementation of Matrix Drone Show Using Automatic Path Generator With DJI Tello Drones</article-title>. In: <conf-name>2022 International Conference on Engineering and Emerging Technologies (ICEET)</conf-name>; <conf-date>27-28 October 2022</conf-date>; <conf-loc>Kuala Lumpur, Malaysia</conf-loc> (<year>2022</year>). p. <fpage>1</fpage>&#x2013;<lpage>5</lpage>.</citation>
</ref>
<ref id="B56">
<label>56.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Pikalov</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Azaria</surname>
<given-names>E</given-names>
</name>
<name>
<surname>Sonnenberg</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Ben-Moshe</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Azaria</surname>
<given-names>A</given-names>
</name>
</person-group>. <article-title>Vision-Less Sensing for Autonomous Micro-Drones</article-title>. <source>Sensors (Basel)</source> (<year>2021</year>) <volume>21</volume>:<fpage>5293</fpage>. <pub-id pub-id-type="doi">10.3390/s21165293</pub-id>
</citation>
</ref>
<ref id="B57">
<label>57.</label>
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Rohmer</surname>
<given-names>E</given-names>
</name>
<name>
<surname>Singh</surname>
<given-names>SPN</given-names>
</name>
<name>
<surname>Freese</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>CoppeliaSim (Formerly V-REP): A Versatile and Scalable Robot Simulation Framework</article-title>. In: <conf-name>IEEE/RSJ International Conference on Intelligent Robots and Systems</conf-name>; <conf-date>03-07 November 2013</conf-date>; <conf-loc>Tokyo, Japan</conf-loc> (<year>2013</year>). p. <fpage>1321</fpage>&#x2013;<lpage>6</lpage>.</citation>
</ref>
<ref id="B58">
<label>58.</label>
<citation citation-type="book">
<collab>FAA</collab>. <article-title>Remote Identification of Unmanned Aircraft-Final Rule</article-title>. In: <person-group person-group-type="editor">
<name>
<surname>FAA</surname>
<given-names>D</given-names>
</name>
</person-group>, editor (<year>2023</year>). <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://www.faa.gov/sites/faa.gov/files/2021-08/RemoteID_Final_Rule.pdf">https://www.faa.gov/sites/faa.gov/files/2021-08/RemoteID_Final_Rule.pdf</ext-link>
</comment>.</citation>
</ref>
<ref id="B59">
<label>59.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Phadke</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Boyd</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Medrano</surname>
<given-names>FA</given-names>
</name>
<name>
<surname>Starek</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>Navigating the Skies: Examining the FAA&#x2019;s Remote Identification Rule for Unmanned Aircraft Systems</article-title>. <source>Drone Syst Appl</source> (<year>2023</year>) <volume>11</volume>:<fpage>1</fpage>&#x2013;<lpage>4</lpage>. <pub-id pub-id-type="doi">10.1139/dsa-2023-0029</pub-id>
</citation>
</ref>
<ref id="B60">
<label>60.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Opromolla</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Inchingolo</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Fasano</surname>
<given-names>G</given-names>
</name>
</person-group>. <article-title>Airborne Visual Detection and Tracking of Cooperative UAVs Exploiting Deep Learning</article-title>. <source>Sensors (Basel)</source> (<year>2019</year>) <volume>19</volume>:<fpage>4332</fpage>. <pub-id pub-id-type="doi">10.3390/s19194332</pub-id>
</citation>
</ref>
<ref id="B61">
<label>61.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Razzaq</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Xydeas</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Mahmood</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Ahmed</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Ratyal</surname>
<given-names>NI</given-names>
</name>
<name>
<surname>Iqbal</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>Efficient Optimization Techniques for Resource Allocation in UAVs Mission Framework</article-title>. <source>PLoS One</source> (<year>2023</year>) <volume>18</volume>:<fpage>e0283923</fpage>. <pub-id pub-id-type="doi">10.1371/journal.pone.0283923</pub-id>
</citation>
</ref>
<ref id="B62">
<label>62.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Nguyen</surname>
<given-names>M-N</given-names>
</name>
<name>
<surname>Nguyen</surname>
<given-names>LD</given-names>
</name>
<name>
<surname>Duong</surname>
<given-names>TQ</given-names>
</name>
<name>
<surname>Tuan</surname>
<given-names>HD</given-names>
</name>
</person-group>. <article-title>Real-Time Optimal Resource Allocation for Embedded UAV Communication Systems</article-title>. <source>IEEE Wireless Commun Lett</source> (<year>2019</year>) <volume>8</volume>:<fpage>225</fpage>&#x2013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.1109/lwc.2018.2867775</pub-id>
</citation>
</ref>
<ref id="B63">
<label>63.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yu</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Gong</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Gong</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Guo</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>Joint Task Offloading and Resource Allocation in UAV-Enabled Mobile Edge Computing</article-title>. <source>IEEE Internet Things J</source> (<year>2020</year>) <volume>7</volume>:<fpage>3147</fpage>&#x2013;<lpage>59</lpage>. <pub-id pub-id-type="doi">10.1109/jiot.2020.2965898</pub-id>
</citation>
</ref>
<ref id="B64">
<label>64.</label>
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Sanjay Sarma</surname>
<given-names>VO</given-names>
</name>
<name>
<surname>Parasuraman</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Pidaparti</surname>
<given-names>R</given-names>
</name>
</person-group>. <article-title>Impact of Heterogeneity in Multi-Robot Systems on Collective Behaviors Studied Using a Search and Rescue Problem</article-title>. In: <conf-name>IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR). Abu Dhabi, United Arab Emirates</conf-name>; <conf-date>04-06 November 2020</conf-date>; <conf-loc>Abu Dhabi, United Arab Emirates</conf-loc> (<year>2020</year>).</citation>
</ref>
<ref id="B65">
<label>65.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chatziparaschis</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Lagoudakis</surname>
<given-names>MG</given-names>
</name>
<name>
<surname>Partsinevelos</surname>
<given-names>P</given-names>
</name>
</person-group>. <article-title>Aerial and Ground Robot Collaboration for Autonomous Mapping in Search and Rescue Missions</article-title>. <source>Drones</source> (<year>2020</year>) <volume>4</volume>:<fpage>79</fpage>. <pub-id pub-id-type="doi">10.3390/drones4040079</pub-id>
</citation>
</ref>
<ref id="B66">
<label>66.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>L&#xf3;pez</surname>
<given-names>DS</given-names>
</name>
<name>
<surname>Moreno</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Cordero</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Sanchez</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Govindaraj</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Marques</surname>
<given-names>MM</given-names>
</name>
<etal/>
</person-group> <article-title>Interoperability in a Heterogeneous Team of Search and Rescue Robots</article-title>. In: <source>From Theory to Practice: Search and Rescue Robotics</source> (<year>2017</year>).</citation>
</ref>
<ref id="B67">
<label>67.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Condomines</surname>
<given-names>J-P</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Larrieu</surname>
<given-names>N</given-names>
</name>
</person-group>. <article-title>Network Intrusion Detection System for UAV Ad-Hoc Communication: From Methodology Design to Real Test Validation</article-title>. <source>Ad Hoc Networks</source> (<year>2019</year>) <volume>90</volume>:<fpage>101759</fpage>. <pub-id pub-id-type="doi">10.1016/j.adhoc.2018.09.004</pub-id>
</citation>
</ref>
<ref id="B68">
<label>68.</label>
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Choudhary</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Sharma</surname>
<given-names>V</given-names>
</name>
<name>
<surname>You</surname>
<given-names>I</given-names>
</name>
<name>
<surname>Yim</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>I-R</given-names>
</name>
<name>
<surname>Cho</surname>
<given-names>J-H</given-names>
</name>
<etal/>
</person-group> <article-title>Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey</article-title>; <conf-date>25-29 June 2018</conf-date>; <conf-loc>Limassol, Cyprus</conf-loc> (<year>2018</year>).</citation>
</ref>
<ref id="B69">
<label>69.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Basan</surname>
<given-names>E</given-names>
</name>
<name>
<surname>Lapina</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Mudruk</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Abramov</surname>
<given-names>E</given-names>
</name>
</person-group>. <article-title>Intelligent Intrusion Detection System for a Group of UAVs</article-title>. In: <source>Advances in Swarm Intelligence</source>. <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name> (<year>2021</year>). p. <fpage>230</fpage>&#x2013;<lpage>40</lpage>.</citation>
</ref>
<ref id="B70">
<label>70.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Subbarayalu</surname>
<given-names>V</given-names>
</name>
<name>
<surname>Vensuslaus</surname>
<given-names>MA</given-names>
</name>
</person-group>. <article-title>An Intrusion Detection System for Drone Swarming Utilizing Timed Probabilistic Automata</article-title>. <source>Drones</source> (<year>2023</year>) <volume>7</volume>:<fpage>248</fpage>. <pub-id pub-id-type="doi">10.3390/drones7040248</pub-id>
</citation>
</ref>
<ref id="B71">
<label>71.</label>
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Phadke</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Ustymenko</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Updating the Taxonomy of Intrusion Detection Systems</article-title>. In: <conf-name>2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC)</conf-name>; <conf-date>12-16 July 2021</conf-date>; <conf-loc>Madrid, Spain</conf-loc> (<year>2021</year>). p. <fpage>1085</fpage>&#x2013;<lpage>91</lpage>.</citation>
</ref>
<ref id="B72">
<label>72.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Levitin</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Finkelstein</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Xiang</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>Optimal Abort Rules and Subtask Distribution in Missions Performed by Multiple Independent Heterogeneous Units</article-title>. <source>Reliability Eng Syst Saf</source> (<year>2020</year>) <volume>199</volume>:<fpage>106920</fpage>. <pub-id pub-id-type="doi">10.1016/j.ress.2020.106920</pub-id>
</citation>
</ref>
<ref id="B73">
<label>73.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Levitin</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Finkelstein</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Xiang</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>Optimal Abort Rules for Additive Multi-Attempt Missions</article-title>. <source>Reliability Eng Syst Saf</source> (<year>2021</year>) <volume>205</volume>:<fpage>107245</fpage>. <pub-id pub-id-type="doi">10.1016/j.ress.2020.107245</pub-id>
</citation>
</ref>
<ref id="B74">
<label>74.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Fang</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Cai</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>Preventive Replacement Policies With Multiple Missions and Maintenance Triggering Approaches</article-title>. <source>Reliability Eng Syst Saf</source> (<year>2021</year>) <volume>213</volume>:<fpage>107691</fpage>. <pub-id pub-id-type="doi">10.1016/j.ress.2021.107691</pub-id>
</citation>
</ref>
<ref id="B75">
<label>75.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhao</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Dai</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Qiu</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>Joint Optimization of Mission Aborts and Allocation of Standby Components Considering Mission Loss</article-title>. <source>Reliability Eng Syst Saf</source> (<year>2022</year>) <volume>225</volume>:<fpage>108612</fpage>. <pub-id pub-id-type="doi">10.1016/j.ress.2022.108612</pub-id>
</citation>
</ref>
<ref id="B76">
<label>76.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhu</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Zhu</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Yan</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Peng</surname>
<given-names>R</given-names>
</name>
</person-group>. <article-title>Optimal Routing, Aborting and Hitting Strategies of UAVs Executing Hitting the Targets Considering the Defense Range of Targets</article-title>. <source>Reliability Eng Syst Saf</source> (<year>2021</year>) <volume>215</volume>:<fpage>107811</fpage>. <pub-id pub-id-type="doi">10.1016/j.ress.2021.107811</pub-id>
</citation>
</ref>
<ref id="B77">
<label>77.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Guo</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>X</given-names>
</name>
</person-group>. <article-title>A Group Maintenance Method of Drone Swarm Considering System Mission Reliability</article-title>. <source>Drones</source> (<year>2022</year>) <volume>6</volume>:<fpage>269</fpage>. <pub-id pub-id-type="doi">10.3390/drones6100269</pub-id>
</citation>
</ref>
<ref id="B78">
<label>78.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Peng</surname>
<given-names>R</given-names>
</name>
</person-group>. <article-title>Joint Routing and Aborting Optimization of Cooperative Unmanned Aerial Vehicles</article-title>. <source>Reliability Eng Syst Saf</source> (<year>2018</year>) <volume>177</volume>:<fpage>131</fpage>&#x2013;<lpage>7</lpage>. <pub-id pub-id-type="doi">10.1016/j.ress.2018.05.004</pub-id>
</citation>
</ref>
<ref id="B79">
<label>79.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Liu</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>A Dynamic Mission Abort Policy for the Swarm Executing Missions and Its Solution Method by Tailored Deep Reinforcement Learning</article-title>. <source>Reliability Eng Syst Saf</source> (<year>2023</year>) <volume>234</volume>:<fpage>109149</fpage>. <pub-id pub-id-type="doi">10.1016/j.ress.2023.109149</pub-id>
</citation>
</ref>
</ref-list>
</back>
</article>