Listing 1 - 3 of 3 |
Sort by
|
Choose an application
The use of unmanned aerial vehicles (UAVs) plays an important role in supporting human activities. Man is concentrating more and more on intellectual work, and trying to automate practical activities as much as possible in order to increase their efficiency. In this regard, the use of drones is increasingly becoming a key aspect of this automation process, offering many advantages, including agility, efficiency and reduced risk, especially in dangerous missions. Hence, this Special Issue focuses on applications, platforms and services where UAVs can be used as facilitators for the task at hand, also keeping in mind that security should be addressed from its different perspectives, ranking from communications security to operational security, and furthermore considering privacy issues.
History of engineering & technology --- computer vision --- oil well working condition --- real-time detection --- sort --- unmanned aerial vehicle (UAV) --- YOLOv3 --- UAV --- autonomous landing --- vision-based --- ArduSim --- ArUco marker --- blind signature --- security --- MEC --- UAVs --- FANET --- 5G --- IoT --- Mutual authentication --- Privacy --- Traceable --- BAN logic --- coverage model --- human mobility model --- UAVs/drones positioning --- energy model --- UAS --- horizon --- undistortion --- FPGA --- sense-and-avoid --- LoRaWAN --- Unmanned Aerial Vehicles --- topology control --- virtual spring forces --- firefighting communications --- computer vision --- oil well working condition --- real-time detection --- sort --- unmanned aerial vehicle (UAV) --- YOLOv3 --- UAV --- autonomous landing --- vision-based --- ArduSim --- ArUco marker --- blind signature --- security --- MEC --- UAVs --- FANET --- 5G --- IoT --- Mutual authentication --- Privacy --- Traceable --- BAN logic --- coverage model --- human mobility model --- UAVs/drones positioning --- energy model --- UAS --- horizon --- undistortion --- FPGA --- sense-and-avoid --- LoRaWAN --- Unmanned Aerial Vehicles --- topology control --- virtual spring forces --- firefighting communications
Choose an application
The use of unmanned aerial vehicles (UAVs) plays an important role in supporting human activities. Man is concentrating more and more on intellectual work, and trying to automate practical activities as much as possible in order to increase their efficiency. In this regard, the use of drones is increasingly becoming a key aspect of this automation process, offering many advantages, including agility, efficiency and reduced risk, especially in dangerous missions. Hence, this Special Issue focuses on applications, platforms and services where UAVs can be used as facilitators for the task at hand, also keeping in mind that security should be addressed from its different perspectives, ranking from communications security to operational security, and furthermore considering privacy issues.
History of engineering & technology --- computer vision --- oil well working condition --- real-time detection --- sort --- unmanned aerial vehicle (UAV) --- YOLOv3 --- UAV --- autonomous landing --- vision-based --- ArduSim --- ArUco marker --- blind signature --- security --- MEC --- UAVs --- FANET --- 5G --- IoT --- Mutual authentication --- Privacy --- Traceable --- BAN logic --- coverage model --- human mobility model --- UAVs/drones positioning --- energy model --- UAS --- horizon --- undistortion --- FPGA --- sense-and-avoid --- LoRaWAN --- Unmanned Aerial Vehicles --- topology control --- virtual spring forces --- firefighting communications --- n/a
Choose an application
The use of unmanned aerial vehicles (UAVs) plays an important role in supporting human activities. Man is concentrating more and more on intellectual work, and trying to automate practical activities as much as possible in order to increase their efficiency. In this regard, the use of drones is increasingly becoming a key aspect of this automation process, offering many advantages, including agility, efficiency and reduced risk, especially in dangerous missions. Hence, this Special Issue focuses on applications, platforms and services where UAVs can be used as facilitators for the task at hand, also keeping in mind that security should be addressed from its different perspectives, ranking from communications security to operational security, and furthermore considering privacy issues.
computer vision --- oil well working condition --- real-time detection --- sort --- unmanned aerial vehicle (UAV) --- YOLOv3 --- UAV --- autonomous landing --- vision-based --- ArduSim --- ArUco marker --- blind signature --- security --- MEC --- UAVs --- FANET --- 5G --- IoT --- Mutual authentication --- Privacy --- Traceable --- BAN logic --- coverage model --- human mobility model --- UAVs/drones positioning --- energy model --- UAS --- horizon --- undistortion --- FPGA --- sense-and-avoid --- LoRaWAN --- Unmanned Aerial Vehicles --- topology control --- virtual spring forces --- firefighting communications --- n/a
Listing 1 - 3 of 3 |
Sort by
|