Scenarios 1, 3, and 4 are used for the stealthy attack situation, Scenarios 2, 5, 6, and 7 are used for the target-near-islands-and-reefs situation, and Scenario 8 is used for algorithms comparison.  

Dataset Files

You must be an IEEE Dataport Subscriber to access these files. Subscribe now or login.

[1] Jun Huang, "8 scenarios for 3D Path Planning", IEEE Dataport, 2023. [Online]. Available: http://dx.doi.org/10.21227/3th5-zj24. Accessed: Jun. 02, 2023.
@data{3th5-zj24-23,
doi = {10.21227/3th5-zj24},
url = {http://dx.doi.org/10.21227/3th5-zj24},
author = {Jun Huang },
publisher = {IEEE Dataport},
title = {8 scenarios for 3D Path Planning},
year = {2023} }
TY - DATA
T1 - 8 scenarios for 3D Path Planning
AU - Jun Huang
PY - 2023
PB - IEEE Dataport
UR - 10.21227/3th5-zj24
ER -
Jun Huang. (2023). 8 scenarios for 3D Path Planning. IEEE Dataport. http://dx.doi.org/10.21227/3th5-zj24
Jun Huang, 2023. 8 scenarios for 3D Path Planning. Available at: http://dx.doi.org/10.21227/3th5-zj24.
Jun Huang. (2023). "8 scenarios for 3D Path Planning." Web.
1. Jun Huang. 8 scenarios for 3D Path Planning [Internet]. IEEE Dataport; 2023. Available from : http://dx.doi.org/10.21227/3th5-zj24
Jun Huang. "8 scenarios for 3D Path Planning." doi: 10.21227/3th5-zj24