Swarm of reconnaissance drones using artificial intelligence and networking
Swarm of reconnaissance drones using artificial intelligence and networking
Aashrith A Jain, Akarsh Saraogi, Pawan Sharma, Vibhav Pandit & Shivakumar
R Hiremath
To cite this article: Aashrith A Jain, Akarsh Saraogi, Pawan Sharma, Vibhav Pandit &
Shivakumar R Hiremath (2023) Swarm of reconnaissance drones using artificial intelligence
and networking, Australian Journal of Multi-Disciplinary Engineering, 19:1, 81-88, DOI:
10.1080/14488388.2023.2220154
6.2. Conclusion
● The prototype of the drone can be used as a recon
drone to locate victims in the vicinity and relay their
position so that assistance may be sent as soon as
possible.
● The 3D model for the battery housing was successful
and can sustain the weight of the battery without
bending. Figure 10. Food gesture being identified by the model.
88 A. A. JAIN ET AL.
References
Asaamoning, G., P. Mendes, D. Rosário, and E.
Cerqueira. 2021. “Drone Swarms as Networked
Control Systems by Integration of Networking and
Computing.“ Sensors 21 (8): 2642. https://www.mdpi.
com/1424-8220/21/8/2642 .
Figure 12. Body landmarks.
Chen-Chiung, H., and H. Shu-Shuo. 2007. “A simple
and fast surveillance system for human tracking and
behavior analysis.“ 2007 Third International IEEE
Conference on Signal-Image Technologies and
Internet-Based System. ISBN: 978-0-7695-3122-9.
https://doi.org/10.1109/SITIS.2007.128 .
How to Choose Lithium Polymer Battery for your RC
Drone. Accessed April 20, 2022. https://robu.in/how-
choose-lithium-polymer-battery-for-drone/ .
Neural Network. Accessed April 18, 2022. https://www.investo
pedia.com/terms/n/neuralnetwork.asp#:~:text=A%20neural
%20network%20is%20a,organic%20or%20artificial%20in%
20nature.
Pixhawk Documentation. Accessed April 8, 2022.
https://docs.px4.io/master/en/flight_controller/pix
hawk5x.html .
A review of supervised and unsupervised machine
learning techniques for suspicious behavior recogni
tion in intelligent surveillance system [Kamal Kant
Figure 13. Person being identified by the model. Verma1 • Brij Mohan Singh2 • Amit Dixit]. n.d.