DDPG-Based UAV Path Planning for Data Collection in Emergency IoT Networks

  • Jiageng Han
  • , Chunhui Liu*
  • , Yu Deng
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

With the rapid development of VAV technology and the Internet of Things (IoT), the application of VAVs in emergency scenarios has become a research hotspot. In emergency situations, how to efficiently plan UAV flight paths to assist in collecting data from ground sensors has become a key issue to ensure a swift re-sponse to emergency actions. Traditional path planning methods often fail to adapt to complex and dynamic emergency environments. Therefore, based on the Deep Deterministic Policy Gradient (DDPG) algorithm, we introduce a Prioritized Experience Re-play (PER) network to improve learning efficiency, and propose a novel end-to-end reinforcement learning (RL) UAV path planning algorithm for data collection from IoT devices in emergency sce-narios.

Original languageEnglish
Title of host publication2024 5th International Symposium on Computer Engineering and Intelligent Communications, ISCEIC 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages377-381
Number of pages5
ISBN (Electronic)9798331518677
DOIs
StatePublished - 2024
Event5th International Symposium on Computer Engineering and Intelligent Communications, ISCEIC 2024 - Wuhan, China
Duration: 8 Nov 202410 Nov 2024

Publication series

Name2024 5th International Symposium on Computer Engineering and Intelligent Communications, ISCEIC 2024

Conference

Conference5th International Symposium on Computer Engineering and Intelligent Communications, ISCEIC 2024
Country/TerritoryChina
CityWuhan
Period8/11/2410/11/24

Keywords

  • Emergency scenarios
  • Internet of Things
  • Prioritized Experience Replay network
  • reinforcement learning

Fingerprint

Dive into the research topics of 'DDPG-Based UAV Path Planning for Data Collection in Emergency IoT Networks'. Together they form a unique fingerprint.

Cite this