Listing 1 - 10 of 14 | << page >> |
Sort by
|
Choose an application
Choose an application
The use of unmanned aerial vehicles (UAVs) plays an important role in supporting human activities. Man is concentrating more and more on intellectual work, and trying to automate practical activities as much as possible in order to increase their efficiency. In this regard, the use of drones is increasingly becoming a key aspect of this automation process, offering many advantages, including agility, efficiency and reduced risk, especially in dangerous missions. Hence, this Special Issue focuses on applications, platforms and services where UAVs can be used as facilitators for the task at hand, also keeping in mind that security should be addressed from its different perspectives, ranking from communications security to operational security, and furthermore considering privacy issues.
History of engineering & technology --- computer vision --- oil well working condition --- real-time detection --- sort --- unmanned aerial vehicle (UAV) --- YOLOv3 --- UAV --- autonomous landing --- vision-based --- ArduSim --- ArUco marker --- blind signature --- security --- MEC --- UAVs --- FANET --- 5G --- IoT --- Mutual authentication --- Privacy --- Traceable --- BAN logic --- coverage model --- human mobility model --- UAVs/drones positioning --- energy model --- UAS --- horizon --- undistortion --- FPGA --- sense-and-avoid --- LoRaWAN --- Unmanned Aerial Vehicles --- topology control --- virtual spring forces --- firefighting communications --- n/a
Choose an application
The use of unmanned aerial vehicles (UAVs) plays an important role in supporting human activities. Man is concentrating more and more on intellectual work, and trying to automate practical activities as much as possible in order to increase their efficiency. In this regard, the use of drones is increasingly becoming a key aspect of this automation process, offering many advantages, including agility, efficiency and reduced risk, especially in dangerous missions. Hence, this Special Issue focuses on applications, platforms and services where UAVs can be used as facilitators for the task at hand, also keeping in mind that security should be addressed from its different perspectives, ranking from communications security to operational security, and furthermore considering privacy issues.
computer vision --- oil well working condition --- real-time detection --- sort --- unmanned aerial vehicle (UAV) --- YOLOv3 --- UAV --- autonomous landing --- vision-based --- ArduSim --- ArUco marker --- blind signature --- security --- MEC --- UAVs --- FANET --- 5G --- IoT --- Mutual authentication --- Privacy --- Traceable --- BAN logic --- coverage model --- human mobility model --- UAVs/drones positioning --- energy model --- UAS --- horizon --- undistortion --- FPGA --- sense-and-avoid --- LoRaWAN --- Unmanned Aerial Vehicles --- topology control --- virtual spring forces --- firefighting communications --- n/a
Choose an application
The use of unmanned aerial vehicles (UAVs) plays an important role in supporting human activities. Man is concentrating more and more on intellectual work, and trying to automate practical activities as much as possible in order to increase their efficiency. In this regard, the use of drones is increasingly becoming a key aspect of this automation process, offering many advantages, including agility, efficiency and reduced risk, especially in dangerous missions. Hence, this Special Issue focuses on applications, platforms and services where UAVs can be used as facilitators for the task at hand, also keeping in mind that security should be addressed from its different perspectives, ranking from communications security to operational security, and furthermore considering privacy issues.
History of engineering & technology --- computer vision --- oil well working condition --- real-time detection --- sort --- unmanned aerial vehicle (UAV) --- YOLOv3 --- UAV --- autonomous landing --- vision-based --- ArduSim --- ArUco marker --- blind signature --- security --- MEC --- UAVs --- FANET --- 5G --- IoT --- Mutual authentication --- Privacy --- Traceable --- BAN logic --- coverage model --- human mobility model --- UAVs/drones positioning --- energy model --- UAS --- horizon --- undistortion --- FPGA --- sense-and-avoid --- LoRaWAN --- Unmanned Aerial Vehicles --- topology control --- virtual spring forces --- firefighting communications
Choose an application
The widespread deployment and use of Information Technologies (IT) has paved the way for change in many fields of our societies. The Internet, mobile computing, social networks and many other advances in human communications have become essential to promote and boost education, technology and industry. On the education side, the new challenges related with the integration of IT technologies into all aspects of learning require revising the traditional educational paradigms that have prevailed for the last centuries. Additionally, the globalization of education and student mobility requirements are favoring a fluid interchange of tools, methodologies and evaluation strategies, which promote innovation at an accelerated pace. Curricular revisions are also taking place to achieved a more specialized education that is able to responds to the society�s requirements in terms of professional training. In this process, guaranteeing quality has also become a critical issue. On the industrial and technological side, the focus on ecological developments is essential to achieve a sustainable degree of prosperity, and all efforts to promote greener societies are welcome. In this book we gather knowledge and experiences of different authors on all these topics, hoping to offer the reader a wider view of the revolution taking place within and without our educational centers. In summary, we believe that this book makes an important contribution to the fields of education and technology in these times of great change, offering a mean for experts in the different areas to share valuable experiences and points of view that we hope are enriching to the reader. Enjoy the book!
Technology. --- Applied science --- Arts, Useful --- Science, Applied --- Useful arts --- Science --- Industrial arts --- Material culture --- Email: consumer/user guides
Choose an application
DS-RT serves as a forum for simulationists from academia, industry and research labs, to present recent research results that target the growing overlap between large distributed simulations and real-time applications.
Computer systems. --- ADP systems (Computer systems) --- Computing systems --- Systems, Computer --- Electronic systems --- Cyberinfrastructure
Choose an application
Choose an application
This book constitutes the refereed post-conference proceedings of the 11th International Conference on Mobile Networks and Management, MONAMI 2021, held in October 2021. The conference was held virtually due to the COVID-19 pandemic. The 26 full papers were carefully reviewed and selected from 53 submissions. The papers are divided into groups of content as follows: The application of artificial intelligence for smart city; Advanced technology in edge and fog computing; Emerging technologies and applications in mobile networks and management; and Recent advances in communications and computing.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- applicatiebeheer --- apps --- informatica --- programmeren (informatica) --- computernetwerken --- architectuur (informatica)
Choose an application
Choose an application
This book discusses the potential of the Internet of Unmanned Things (IoUT), which is considered a promising paradigm resulting in numerous applications including shipment of goods, home package delivery, crop monitoring, agricultural surveillance, and rescue operations. The authors discuss how IoUT nodes collaborate with each other in ad hoc manner through a Line-of-Sight (LoS) link to exchange data packets. Also discussed is how Unmanned Arial Vehicles (UAVs) can communicate with fixed ground stations, with an air traffic controller, or through a Non-Line-of-Sight (NLoS) link with a satellite-aided controller, generally based on preloaded missions. The authors go on to cover how to tackle issues that arise with dissimilar communication technologies. They cover how various problems can appear in inter-UAV and UAV-to-X communications including energy management, lack of security and the unreliability of wireless communication links, and handover from LoS to NLoS, and vice versa. In this book, the editors invited front-line researchers and authors to submit research exploring emerging technologies for IoUT and mission-based networking and how to overcome challenges.
Telecommunication technology --- Transport engineering --- Transport. Traffic --- Mass communications --- Computer. Automation --- verkeer --- tekstverwerking --- transport --- motorrijtuigen --- algoritmen --- ingenieurswetenschappen --- communicatietechnologie
Listing 1 - 10 of 14 | << page >> |
Sort by
|