ترغب بنشر مسار تعليمي؟ اضغط هنا

Key Technologies and System Trade-Offs for Detection and Localization of Amateur Drones

202   0   0.0 ( 0 )
 نشر من قبل Hazem Sallouha
 تاريخ النشر 2017
  مجال البحث الهندسة المعلوماتية
والبحث باللغة English




اسأل ChatGPT حول البحث

The use of amateur drones (ADrs) is expected to significantly increase over the upcoming years. However, regulations do not allow such drones to fly over all areas, in addition to typical altitude limitations. As a result, there is an urgent need for ADrs surveillance solutions. These solutions should include means of accurate detection, classification, and localization of the unwanted drones in a no-fly zone. In this paper, we give an overview of promising techniques for modulation classification and signal strength based localization of ADrs by using surveillance drones (SDrs). By introducing a generic altitude dependent propagation model, we show how detection and localization performance depend on the altitude of SDrs. Particularly, our simulation results show a 25 dB reduction in the minimum detectable power or 10 times coverage enhancement of an SDr by flying at the optimum altitude. Moreover, for a target no-fly zone, the location estimation error of an ADr can be remarkably reduced by optimizing the positions of the SDrs. Finally, we conclude the paper with a general discussion about the future work and possible challenges of the aerial surveillance systems.

قيم البحث

اقرأ أيضاً

Localization in long-range Internet of Things networks is a challenging task, mainly due to the long distances and low bandwidth used. Moreover, the cost, power, and size limitations restrict the integration of a GPS receiver in each device. In this work, we introduce a novel received signal strength indicator (RSSI) based localization solution for ultra narrow band (UNB) long-range IoT networks such as Sigfox. The essence of our approach is to leverage the existence of a few GPS-enabled sensors (GSNs) in the network to split the wide coverage into classes, enabling RSSI based fingerprinting of other sensors (SNs). By using machine learning algorithms at the network backed-end, the proposed approach does not impose extra power, payload, or hardware requirements. To comprehensively validate the performance of the proposed method, a measurement-based dataset that has been collected in the city of Antwerp is used. We show that a location classification accuracy of 80% is achieved by virtually splitting a city with a radius of 2.5 km into seven classes. Moreover, separating classes, by increasing the spacing between them, brings the classification accuracy up-to 92% based on our measurements. Furthermore, when the density of GSN nodes is high enough to enable device-to-device communication, using multilateration, we improve the probability of localizing SNs with an error lower than 20 m by 40% in our measurement scenario.
Datacenters provide cost-effective and flexible access to scalable compute and storage resources necessary for todays cloud computing needs. A typical datacenter is made up of thousands of servers connected with a large network and usually managed by one operator. To provide quality access to the variety of applications and services hosted on datacenters and maximize performance, it deems necessary to use datacenter networks effectively and efficiently. Datacenter traffic is often a mix of several classes with different priorities and requirements. This includes user-generated interactive traffic, traffic with deadlines, and long-running traffic. To this end, custom transport protocols and traffic management techniques have been developed to improve datacenter network performance. In this tutorial paper, we review the general architecture of datacenter networks, various topologies proposed for them, their traffic properties, general traffic control challenges in datacenters and general traffic control objectives. The purpose of this paper is to bring out the important characteristics of traffic control in datacenters and not to survey all existing solutions (as it is virtually impossible due to massive body of existing research). We hope to provide readers with a wide range of options and factors while considering a variety of traffic control mechanisms. We discuss various characteristics of datacenter traffic control including management schemes, transmission control, traffic shaping, prioritization, load balancing, multipathing, and traffic scheduling. Next, we point to several open challenges as well as new and interesting networking paradigms. At the end of this paper, we briefly review inter-datacenter networks that connect geographically dispersed datacenters which have been receiving increasing attention recently and pose interesting and novel research problems.
106 - Da Zhang , Feng Xia , Zhuo Yang 2010
The proliferation of wireless localization technologies provides a promising future for serving human beings in indoor scenarios. Their applications include real-time tracking, activity recognition, health care, navigation, emergence detection, and t arget-of-interest monitoring, among others. Additionally, indoor localization technologies address the inefficiency of GPS (Global Positioning System) inside buildings. Since people spend most of their time in indoor environments, indoor tracking service is in great public demand. Based on this observation, this paper aims to provide a better understanding of state-of-the-art technologies and stimulate new research efforts in this field. For these purposes, existing localization technologies that can be used for tracking individuals in indoor environments are reviewed, along with some further discussions.
105 - Tri Nguyen , Risto Katila , 2021
With the development in information and communications technology (ICT) and drones such as Internet-of-Things (IoT), edge computing, image processing, and autonomous drones, solutions supporting search and rescue (SAR) missions can be developed with more intelligent capabilities. In most of the drone and unmanned aerial vehicle (UAV) based systems supporting SAR missions, several drones deployed in different areas acquire images and videos that are sent to a ground control station (GCS) for processing and detecting a missing person. Although this offers many advantages, such as easy management and deployment, the approach still has many limitations. For example, when a connection between a drone and a GCS has some problems, the quality of service cannot be maintained. Many drone and UAV-based systems do not support flexibility, transparency, security, and traceability. In this paper, we propose a novel Internet-of-Drones (IoD) architecture using blockchain technology. We implement the proposed architecture with different drones, edge servers, and a Hyperledger blockchain network. The proof-of-concept design demonstrates that the proposed architecture can offer high-level services such as prolonging the operating time of a drone, improving the capability of detecting humans accurately, and a high level of transparency, traceability, and security.
Fog or Edge computing has recently attracted broad attention from both industry and academia. It is deemed as a paradigm shift from the current centralized cloud computing model and could potentially bring a Fog-IoT architecture that would significan tly benefit the future ubiquitous Internet of Things (IoT) systems and applications. However, it takes a series of key enabling technologies including emerging technologies to realize such a vision. In this article, we will survey these key enabling technologies with specific focuses on security and scalability, which are two very important and much-needed characteristics for future large-scale deployment. We aim to draw an overall big picture of the future for the research and development in these areas.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا