Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Research Article

Target Signal Communication Detection of Black Flying UAVs Based on Deep Learning Algorithm

Author(s): Yangbing Zheng and Xiaohan Tu*

Volume 17, Issue 8, 2024

Published on: 01 February, 2024

Article ID: e010224226616 Pages: 10

DOI: 10.2174/0126662558268321231231065419

open access plus

conference banner
Abstract

Background: Unmanned aerial vehicles (UAVs) are being widely used in many fields, such as national economy, social development, national defense, and security. Currently, the number of registered UAVs in China is far less than that of flying UAVs-the frequent occurrence of unsafe incidents.

Objective: The phenomenon of UAVs flying undeclared and unapproved has caused more serious troubles to social public order and people's production and life.

Methods: In this paper, to assist the public security department in detecting the phenomenon of UAV black flying, our team conducts a series of research based on the deep learning YOLOv5 (You Only Look Once) algorithm.

Results: Firstly, the Vision Transformer mechanism is integrated to enhance the robustness of the model. Secondly, depth-separable convolution is introduced to reduce parameter redundancy. Finally, the SimAM attention-free mechanism and CBAM attention-free mechanism are combined to enhance the attention of small target UAVs.

Conclusion: Through the analysis of UAV targets in video surveillance, the rapid identification of black-flying UAVs can be realized, the monitoring and early warning ability of UAVs in a specific area can be improved, and the loss of life and property of people can be reduced or saved as much as possible.

Keywords: Deep learning algorithm, black flying, communication detection, simAM, vision transformer, UAV.

Graphical Abstract
[1]
Y. Arouri, and M. Sayyafzadeh, "An adaptive moment estimation framework for well placement optimization", Computat. Geosci., vol. 26, no. 4, pp. 957-973, 2022.
[http://dx.doi.org/10.1007/s10596-022-10135-9]
[2]
H.L. Wang, "Small-scale pedestrian detection in traffic scenes based on improved SSD algorithm", Comput. Appl. Eng., vol. 58, no. 2, pp. 201-207, 2022.
[3]
A. Coluccia, A. Fascista, A. Schumann, L. Sommer, A. Dimou, D. Zarpalas, M. Méndez, D. de la Iglesia, I. González, J.P. Mercier, G. Gagné, A. Mitra, and S. Rajashekar, "Drone vs. bird detection: Deep learning algorithms and results from a grand challenge", Sensors, vol. 21, no. 8, p. 2824, 2021.
[http://dx.doi.org/10.3390/s21082824] [PMID: 33923829]
[4]
H. Yao, R. Qin, and X. Chen, "Unmanned aerial vehicle for remote sensing applications—a review", Remote Sens., vol. 11, no. 12, p. 1443, 2019.
[http://dx.doi.org/10.3390/rs11121443]
[5]
A. Yavariabdi, H. Kusetogullari, and H. Cicek, "UAV detection in airborne optic videos using dilated convolutions", J. Opt., vol. 50, no. 4, pp. 569-582, 2021.
[http://dx.doi.org/10.1007/s12596-021-00770-3]
[6]
N.A. Khan, N.Z. Jhanjhi, S.N. Brohi, R.S.A. Usmani, and A. Nayyar, "Smart traffic monitoring system using Unmanned Aerial Vehicles (UAVs)", Comput. Commun., vol. 157, pp. 434-443, 2020.
[http://dx.doi.org/10.1016/j.comcom.2020.04.049]
[7]
T. Deng, and Y. Wu, "Simultaneous vehicle and lane detection via MobileNetV3 in car following scene", PLoS One, vol. 17, no. 3, p. e0264551, 2022.
[http://dx.doi.org/10.1371/journal.pone.0264551] [PMID: 35245342]
[8]
"Research on target detection of plant leaf-stem intersection based on improved YOLOv4", Comput. Eng. Appl. Eng., vol. 58, no. 4, pp. 221-228, 2022.
[9]
A. Ramachandran, and A.K. Sangaiah, "A review on object detection in unmanned aerial vehicle surveillance", Int. J. Cogn. Comput. Eng., vol. 2, no. 1, pp. 215-228, 2021.
[http://dx.doi.org/10.1016/j.ijcce.2021.11.005]
[10]
Y. Ito, "Approximation capability of layered neural networks with sigmoid units on two layers", Neural Comput., vol. 6, no. 6, pp. 1233-1243, 1994.
[http://dx.doi.org/10.1162/neco.1994.6.6.1233]
[11]
W. Liu, D. Anguelov, and D. Erhan, "SSD: Single shot multibox detector", arXiv:1512.02325, 2016.
[12]
I. Nemer, T. Sheltami, I. Ahmad, A.U.H. Yasar, and M.A.R. Abdeen, "RF-based UAV detection and identification using hierarchical learning approach", Sensors, vol. 21, no. 6, p. 1947, 2021.
[http://dx.doi.org/10.3390/s21061947] [PMID: 33802189]
[13]
S. Ren, K. He, and R. Girshick, "Faster R-CNN: Towards real-time object detection with region proposal networks", Adv. Neural Inf. Process. Syst., vol. 28, 2015.
[14]
A. Yavariabdi, H. Kusetogullari, T. Celik, and H. Cicek, "FastUAV-net: A multi-UAV detection algorithm for embedded platforms", Electronics, vol. 10, no. 6, p. 724, 2021.
[http://dx.doi.org/10.3390/electronics10060724]
[15]
X. Wu, W. Li, D. Hong, R. Tao, and Q. Du, "Deep learning for UAV-based object detection and tracking: A survey", IEEE Geosci. Remote Sens. Mag., vol. 10, no. 1, pp. 91-124, 2021.
[http://dx.doi.org/10.1109/MGRS.2021.3115137]
[16]
S.L. Tan, "Real-time detection for mask-wearing of personnel based on YOLOv5 network model", J. Laser, vol. 42, no. 2, pp. 147-150, 2021.
[17]
G. Shi, J. Huang, and J. Zhang, "Combined channel and spatial attention for YOLOv5 during target detection", In IEEE 2nd International Conference on Pattern Recognition and Machine Learning (PRML), 2021pp. 78-85 6-18 July 2021, Chengdu, China.
[18]
T. HOU, "Application research of improved YOLOv4 in remote sensing aircraft target detection", Comput. Eng. App., vol. 57, no. 12, pp. 224-230, 2021.
[19]
W.N. Zhou, L.H. Sun, and Z.J. Xu, "A real-time detection method for multi-scale pedestrians in complex environment", Dianzi Yu Xinxi Xuebao, vol. 43, no. 7, pp. 2063-2070, 2021.
[20]
W.A.N.G. Xinpeng, W.A.N.G. Xiaoqiang, and L.I.N. Hao, "Review on improvement of typical object detection algorithms in deep learning", Comput. Eng. Appl., vol. 58, no. 06, pp. 42-57, 2022.
[21]
S. Woo, J. Park, and J.Y. Lee, "Cbam: Convolutional block attention module", In Proceedings of the European conference on computer vision (ECCV), 2018, pp. 3-19.
[22]
L. Yang, R.Y. Zhang, and L. Li, "Simam: A simple, parameter-free attention module for convolutional neural networks", In International conference on machine learning. PMLR, 2021pp. 11863-11874.
[23]
Z.Q. Zhao, P. Zheng, S.T. Xu, and X. Wu, "Object Detection With Deep Learning: A Review", IEEE Trans. Neural Netw. Learn. Syst., vol. 30, no. 11, pp. 3212-3232, 2019.
[http://dx.doi.org/10.1109/TNNLS.2018.2876865] [PMID: 30703038]
[24]
X. Zhang, J. Li, and Z. Hua, "MRSE-Net: Multiscale residuals and SE-attention network for water body segmentation from satellite images", IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens., vol. 15, no. 2, pp. 5049-5064, 2022.
[http://dx.doi.org/10.1109/JSTARS.2022.3185245]
[25]
M.A.O. Zhen, R.E.N. Yumeng, and C.H.E.N. Xiaoyan, "An improved multi-scale object detection algorithm for YOLOv5s", Chinese J. Sens. Actuators., vol. 36, no. 2, pp. 267-274, 2023.
[26]
A. Sarker, A.C. Canto, M. Mozaffari Kermani, and R. Azarderakhsh, "Error detection architectures for hardware/software co-design approaches of number-theoretic transform", IEEE Trans. Comput. Aided Des. Integrated Circ. Syst., vol. 42, no. 7, pp. 2418-2422, 2023.
[http://dx.doi.org/10.1109/TCAD.2022.3218614]
[27]
M.M. Kermani, and R. Azarderakhsh, "Integrating emerging cryptographic engineering research and security education", In 2015 ASEE Annual Conference & Exposition, 2015, pp. 1-26.
[28]
M. MozaffariKermani, ", "Reliable and high-performance hardware architectures for the Advanced Encryption Standard/Galois Counter Mode",", Thesis, The University of Western Ontario..
[29]
A. Sarker, M.M. Kermani, and R. Azarderakhsh, "Efficient error detection architectures for postquantum signature falcon’s sampler and KEM SABER", IEEE Trans Very Large Scale Integr VLSI Syst, vol. 30, no. 6, pp. 794-802, 2022.
[30]
MM Kermani, R Azarderakhsh, and J Xie, "Error detection reliable architectures of Camellia block cipher applicable to different variants of its substitution boxes", In 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 2016 19-20 December 2016, Yilan, Taiwan.
[31]
A. Cintas-Canto, J. Kaur, M. Mozaffari-Kermani, and R. Azarderakhsh, "ChatGPT vs. Lightweight security: First work implementing the NIST cryptographic standard ASCON", arXiv:2306.08178, 2023.
[32]
M.M. Kermani, E. Savas, S.J. Upadhyaya, and J-L. Beuchat, "Guest editorial: Introduction to the special issue on emerging security trends for deeply-embedded computing systems", IEEE Trans. Emerg. Top. Comput., vol. 4, no. 3, pp. 318-320, 2016.
[http://dx.doi.org/10.1109/TETC.2015.2482778]

© 2024 Bentham Science Publishers | Privacy Policy