Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Language
      Language
      Clear All
      Language
  • Subject
      Subject
      Clear All
      Subject
  • Item Type
      Item Type
      Clear All
      Item Type
  • Discipline
      Discipline
      Clear All
      Discipline
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
859 result(s) for "Drone aircraft Security measures."
Sort by:
Comparing YOLOv3, YOLOv4 and YOLOv5 for Autonomous Landing Spot Detection in Faulty UAVs
In-flight system failure is one of the major safety concerns in the operation of unmanned aerial vehicles (UAVs) in urban environments. To address this concern, a safety framework consisting of following three main tasks can be utilized: (1) Monitoring health of the UAV and detecting failures, (2) Finding potential safe landing spots in case a critical failure is detected in step 1, and (3) Steering the UAV to a safe landing spot found in step 2. In this paper, we specifically look at the second task, where we investigate the feasibility of utilizing object detection methods to spot safe landing spots in case the UAV suffers an in-flight failure. Particularly, we investigate different versions of the YOLO objection detection method and compare their performances for the specific application of detecting a safe landing location for a UAV that has suffered an in-flight failure. We compare the performance of YOLOv3, YOLOv4, and YOLOv5l while training them by a large aerial image dataset called DOTA in a Personal Computer (PC) and also a Companion Computer (CC). We plan to use the chosen algorithm on a CC that can be attached to a UAV, and the PC is used to verify the trends that we see between the algorithms on the CC. We confirm the feasibility of utilizing these algorithms for effective emergency landing spot detection and report their accuracy and speed for that specific application. Our investigation also shows that the YOLOv5l algorithm outperforms YOLOv4 and YOLOv3 in terms of accuracy of detection while maintaining a slightly slower inference speed.
Cyber4Drone: A Systematic Review of Cyber Security and Forensics in Next-Generation Drones
Cyber Security and forensics for Unmanned Aerial Vehicles (UAVs) pose unique requirements, solutions, and challenges. As UAVs become increasingly prevalent for legitimate and illegal use, ensuring their security and data integrity is important. Solutions have been developed to tackle these security requirements. Drone forensics enables the investigation of security incidents involving UAVs, aiding in identifying attackers or determining the cause of accidents. However, challenges persist in the domain of UAV security and forensics. This paper surveys drone threat models, security, and privacy aspects. In particular, we present the taxonomy of drone forensics for investigating drone systems and talk about relevant artifacts, tools, and benchmark datasets. While solutions exist, challenges such as evolving technology and complex operational environments must be addressed through collaboration, updated protocols, and regulatory frameworks to ensure drones’ secure and reliable operation. Furthermore, we also point out the field’s difficulties and potential future directions.
A comparative study of drones path planning and bezier curve optimization based on multi-strategy search algorithm
With the growing use of drones in urban monitoring and emergency search and rescue, the three-dimensional environments they navigate are becoming more complex, including high-rise buildings, underground pipelines, and dynamic obstacles. Efficient path planning is crucial for drones to respond quickly, infiltrate covertly, and ensure mission success. This paper focuses on path planning in three-dimensional gridded urban environments, examining multi-strategy algorithms and Bézier curve optimization techniques for law enforcement operations. The study compares three algorithms: Rapidly-exploring Random Trees (RRT), Ant Colony Optimization (ACO), and A*. Each algorithm has distinct advantages: RRT is ideal for dynamic environments, ACO is effective for global searches, and A* is suited for structured environments. By evaluating these algorithms and combining them with Bézier curve optimization, this paper offers adaptable path planning strategies for applications like drone obstacle avoidance and robot navigation.
A hybrid security system for drones based on ICMetric technology
Recently, the number of drones has increased, and drones’ illegal and malicious use has become prevalent. The dangerous and wasteful effects are substantial, and the probability of attacks is very high. Therefore, an anomaly detection and protection system are needed. This paper aims to design and implement an intelligent anomaly detection system for the security of unmanned aerial vehicles (UAVs)/drones. The proposed system is heavily based on utilizing ICMetric technology to exploit low-level device features for detection. This technology extracts the accelerometer and gyroscope sensors’ bias to create a unique number known as the ICMetric number. Hence, ICMetric numbers represent additional features integrated into the dataset used to detect drones. This study performs the classification using a deep neural network (DNN). The experimental results prove that the proposed system achieves high levels of detection and performance metrics.