To see the other types of publications on this topic, follow the link: Counter-drone systems.

Journal articles on the topic 'Counter-drone systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Counter-drone systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Borel-Donohue, Christoph. "Overview of civilian counter drone systems." Journal of the Acoustical Society of America 139, no. 4 (2016): 2019. http://dx.doi.org/10.1121/1.4949956.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Žnidaršič, Vinko, Marko Radovanović, and Dragan Stevanović. "Modeling the organisational implementation of a drone and counter-drone operator into the Serbian Armed Forces rifle section." Vojno delo 72, no. 3 (2020): 84–109. http://dx.doi.org/10.5937/vojdelo2003084z.

Full text
Abstract:
Drones are one of the new threats to tactical units. The armed forces use them with various successes in operations. However, the smallest tactical unit such as rifle section is generally still unprepared to operate drones and perform counter measures. Drones have a wide range of capabilities and therefore can be used for both civilian and military purposes. Along with the development of drones, counter-drone systems have also been developed. Several small drones and counter-drone systems suitable for the use by one man are presented in the first part of the research results to show that there
APA, Harvard, Vancouver, ISO, and other styles
3

Dobija, Konrad. "Countering Unmanned Aerial Systems (UAS) in Military Operations." Safety & Defense 9, no. 1 (2023): 74–82. http://dx.doi.org/10.37105/sd.195.

Full text
Abstract:
Although contemporary unmanned systems are used in every environment, they overwhelmingly dominate the airspace. They are commonly called aerial drones or unmanned aerial vehicles (UAVs), while the systems supporting and controlling UAVs are called unmanned aerial systems (UASs). The widespread adoption of aerial drone technology has led to their increasing use on the battlefield. Therefore, finding an effective counter-drone (counter - UAS) weapon has become a serious challenge. This task is particularly difficult because we are dealing with a huge variety of unmanned aerial systems while the
APA, Harvard, Vancouver, ISO, and other styles
4

D., Mototolea. "Counter-Unmanned Aerial Systems." Scientific Bulletin of Naval Academy XXII, no. 1 (2019): 192–95. http://dx.doi.org/10.21279/1454-864x-19-i1-026.

Full text
Abstract:
Counter-unmanned aerial systems (C-UAS), or counter-drone technology, refers to complex systems that are used to detect, locate, track and take over/down unmanned aerial vehicles. The proliferation of C-UAS technology accelerates due to the increasing number of incidents with commercially available drones that happen almost daily around the globe. This paper provides a background on how the technology works, when is applicable and what are the ups and downs.
APA, Harvard, Vancouver, ISO, and other styles
5

De Cubber, Geert, Daniela Doroftei, Paraskevi Petsioti, et al. "Standardized Evaluation of Counter-Drone Systems: Methods, Technologies, and Performance Metrics." Drones 9, no. 5 (2025): 354. https://doi.org/10.3390/drones9050354.

Full text
Abstract:
This paper aims to introduce a standardized test methodology for drone detection, tracking, and identification systems. It is the aim that this standardized test methodology for assessing the performance of counter-drone systems will lead to a much better understanding of the capabilities of these solutions. This is urgently needed, as there is an increase in drone threats and there are no cohesive policies to evaluate the performance of these systems and hence mitigate and manage the threat. The presented methodology has been developed within the framework of the project COURAGEOUS funded by
APA, Harvard, Vancouver, ISO, and other styles
6

GONZALEZ JORGE, HIGINIO, ENRIQUE ALDAO PENSADO, GABRIEL FONTELA CARRERA, FERNANDO VEIGA LOPEZ, EDUARDO BALVIS OUTEIRIÑO, and EDUARDO RIOS OTERO. "ANTI-DRONE TECHNOLOGY." DYNA 99, no. 6 (2024): 599–607. http://dx.doi.org/10.52152/d11227.

Full text
Abstract:
This work provides an overview of the growing use of drones in both civilian and military domains, highlighting the associated risks to public safety and privacy. It discusses the development of counter-drone systems to mitigate these risks, focusing on detection, tracking, classification, and neutralization technologies. Various sensors such as passive radar, acoustic sensors, electro-optical and infrared sensors, radiofrequency analyzers, active radar, and LiDAR are detailed, along with algorithms for data fusion. Mitigation strategies include soft kill methods like spoofing and jamming, as
APA, Harvard, Vancouver, ISO, and other styles
7

Sirohi, Hemant, Dr CN Khairnar, Pramod Kumar, and Abhay Kumar. "A Comprehensive Review of Modern Counter-Drone Technologies: Trends, Challenges, and Future Directions." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 4405–18. http://dx.doi.org/10.22214/ijraset.2024.62594.

Full text
Abstract:
Abstract: The rapid proliferation of unmanned aerial vehicles (UAVs)/ drones, has brought about significant advancements in various fields such as military operations, surveillance, agriculture, and logistics. However, the misuse of drones poses substantial risks to security, privacy, and safety. This comprehensive review explores the current state of counter-drone technologies, examining trends, challenges, and future directions. We delve into various detection, tracking, and mitigation techniques, including radar, radio frequency (RF) sensing, computer vision, and artificial intelligence (AI
APA, Harvard, Vancouver, ISO, and other styles
8

Çetin, Ender, Cristina Barrado, and Enric Pastor. "Counter a Drone in a Complex Neighborhood Area by Deep Reinforcement Learning." Sensors 20, no. 8 (2020): 2320. http://dx.doi.org/10.3390/s20082320.

Full text
Abstract:
Counter-drone technology by using artificial intelligence (AI) is an emerging technology and it is rapidly developing. Considering the recent advances in AI, counter-drone systems with AI can be very accurate and efficient to fight against drones. The time required to engage with the target can be less than other methods based on human intervention, such as bringing down a malicious drone by a machine-gun. Also, AI can identify and classify the target with a high precision in order to prevent a false interdiction with the targeted object. We believe that counter-drone technology with AI will b
APA, Harvard, Vancouver, ISO, and other styles
9

Pascarella, D., P. Bieber, M. Cioffi, et al. "Drone intrusion management systems in airports: assessment of ASPRID solution." Journal of Physics: Conference Series 2716, no. 1 (2024): 012070. http://dx.doi.org/10.1088/1742-6596/2716/1/012070.

Full text
Abstract:
Abstract Drone intrusions pose a growing threat for the airports as their expansion is sponsored by the widespread availability of their technology and by the ongoing U-space implementation. Counter-drone systems traditionally employ a reactive policy, which implies the closure of the overall airport following an intrusion, penalizing the continuity and the resilience of airport operations. Instead, a drone intrusion management system shall ensure a resilient behaviour against drone intrusions with a proactive policy, supported by specific procedures to mitigate the impacts of intrusions. ASPR
APA, Harvard, Vancouver, ISO, and other styles
10

Marian, Buric, and Cubber Geert De. "Counter Remotely Piloted Aircraft Systems." MTA Review 27, no. 1 (2017): 9–18. https://doi.org/10.5281/zenodo.1115502.

Full text
Abstract:
An effective Counter Remotely Aircraft System is a major objective of many researchers and industries entities. Their activity is strongly impelled by the operational requirements of the Law Enforcement Authorities and naturally follows both the course of the latest terrorist events and technological developments. The designing process of an effective Counter Remotely Aircraft System needs to benefit from a systemic approach, starting from the legal aspects, and ending with the technical ones. From a technical point of view, the system has to work according to the five “kill chain”
APA, Harvard, Vancouver, ISO, and other styles
11

Mondal, Anik. "Low Cost Drones in Modern Warfare and Counter Drone Strategies: A Review." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 2327–32. https://doi.org/10.22214/ijraset.2025.72632.

Full text
Abstract:
his review article discusses low-cost military drones, the components necessary to manufacture such a drone, its overall cost, and the threats posed by them against civilian and military targets. It considers available counter-drone technologies, examining their challenges and costs. While conventional air defense systems defend against single targets very well, defending against drone swarms will overwhelm any single missile defense solution. They are often stationary and fixed in place for easy targeting and destruction. Low-cost interceptor drones might be the answer to this dilemma. Kineti
APA, Harvard, Vancouver, ISO, and other styles
12

Ksendzuk, A. V. "UNMANNED AERIAL VEHICLE DETECTION AND JAMMING RADIO COMPLEX." Issues of radio electronics, no. 3 (March 20, 2018): 19–24. http://dx.doi.org/10.21778/2218-5453-2018-3-19-24.

Full text
Abstract:
Modern threats for anti-missile system and space surveillance and tracking system objects include terroristic and unidentifiable unmanned aerial vehicle. To counter these threats a concept of radar complex for unmanned aerial vehicles jamming and detection proposed. Complex consists of non-radiating radio locator, radio warfare station and global navigation jamming radar. Structure, principle of operation and basic technical characteristics of these systems described. Counter-drone actions algorithm in proposed complex described and analyzed. Results of mom-radiating radar development in JSC M
APA, Harvard, Vancouver, ISO, and other styles
13

Popescu, Laurențiu-Răducu. "The Existing Technologies on Anti-Drone Systems." International conference KNOWLEDGE-BASED ORGANIZATION 27, no. 3 (2021): 83–91. http://dx.doi.org/10.2478/kbo-2021-0093.

Full text
Abstract:
Abstract The paper presents the technologies currently available on the market in the field of anti-drone systems (C-RPAS -Counter Remotely Piloted Aircraft System). These include technologies with the help of radar, audio interception systems or via infrared and electro-optical devices, which are limited in remote sensing. The purpose of this paper was to highlight the multitude of factors that can influence the main mission of C-RPAS systems, the detection. Without detection the other features of a C-RPAS system could not be applied. I used specialized documents and studies, but also compara
APA, Harvard, Vancouver, ISO, and other styles
14

Grigoryan, Heghine, Lilia Kirakosyan, and Sevak Sargsyan. "A Method of Protocol-Aware Multi-tone Sweep Jamming." Proceedings of the Institute for System Programming of the RAS 36, no. 3 (2024): 273–82. http://dx.doi.org/10.15514/ispras-2024-36(3)-19.

Full text
Abstract:
This article extensively reviews radio wave jamming methods, focusing on their application to disrupt drone signals. It explores the evolution of these techniques, from basic noise-based methods to more advanced systems that target specific communication protocols. The article analyzes key jamming types such as barrage, tone, sweep, and protocol-aware jamming for their mechanisms and efficacy. Each type is discussed in terms of its operational principles, benefits, and limitations, offering a comprehensive understanding of the impact these methods have on drone communications. The review also
APA, Harvard, Vancouver, ISO, and other styles
15

Aris Sarjito and Nora Lelyana. "Analisis Dampak Persepsi Ancaman Drone Terhadap Pembuatan Kebijakan Pertahanan Dan Proses Alokasi Sumber Daya." Jurnal of Management and Social Sciences 1, no. 4 (2023): 14–32. http://dx.doi.org/10.59031/jmsc.v1i4.228.

Full text
Abstract:
Drones have significantly impacted modern warfare, necessitating a comprehensive understanding of the factors influencing drone threat perceptions and their impact on defense policymaking. This study examines the influence of drone threat perceptions on defense policymakers' decision-making and resource allocation, focusing on key factors influencing perception formation. This study uses qualitative research methodology to analyze secondary data from academic research, policy reports, and expert analysis to identify recurring themes and patterns in defense policymakers' perceptions of drone th
APA, Harvard, Vancouver, ISO, and other styles
16

Pascarella, Domenico, Gabriella Gigante, Angela Vozella, et al. "Evaluation of a Resilience-Driven Operational Concept to Manage Drone Intrusions in Airports." Information 14, no. 4 (2023): 239. http://dx.doi.org/10.3390/info14040239.

Full text
Abstract:
The drone market’s growth poses a serious threat to the negligent, illicit, or non-cooperative use of drones, especially in airports and their surroundings. Effective protection of an airport against drone intrusions should guarantee mandatory safety levels but should also rely on a resilience-driven operational concept aimed at managing the intrusions without necessarily implying the closure of the airport. The concept faces both safety-related and security-related threats and is based on the definitions of: (i) new roles and responsibilities; (ii) a set of operational phases, accomplished by
APA, Harvard, Vancouver, ISO, and other styles
17

Pascarella, Domenico, Gabriella Gigante, Angela Vozella, et al. "A Methodological Framework for the Risk Assessment of Drone Intrusions in Airports." Aerospace 9, no. 12 (2022): 747. http://dx.doi.org/10.3390/aerospace9120747.

Full text
Abstract:
Drone expansion needs to be considered as a menace in cases of negligent, illicit, or non-cooperative use. In the case of airports, a complete protection against drone intrusion should rely on an intrusion management system, aiming at avoiding the closure of the airport. This system requires the setting of proper risk assessment methodologies for airport operations, to explicitly consider the features of drone intrusion, possibly from a quantitative point of view. This work proposes a methodological framework for the risk assessment of drone intrusions in airports, tailored on drone-intrusion
APA, Harvard, Vancouver, ISO, and other styles
18

Ekici, Murat, Ahmet Çağdaş Seçkin, Ahmet Özek, and Ceyhun Karpuz. "Warehouse Drone: Indoor Positioning and Product Counter with Virtual Fiducial Markers." Drones 7, no. 1 (2022): 3. http://dx.doi.org/10.3390/drones7010003.

Full text
Abstract:
The use of robotic systems in logistics has increased the importance of precise positioning, especially in warehouses. The paper presents a system that uses virtual fiducial markers to accurately predict the position of a drone in a warehouse and count items on the rack. A warehouse scenario is created in the simulation environment to determine the success rate of positioning. A total of 27 racks are lined up in the warehouse and in the center of the space, and a 6 × 6 ArUco type fiducial marker is used on each rack. The position of the vehicle is predicted by supervised learning. The inputs a
APA, Harvard, Vancouver, ISO, and other styles
19

Lykou, Georgia, Dimitrios Moustakas, and Dimitris Gritzalis. "Defending Airports from UAS: A Survey on Cyber-Attacks and Counter-Drone Sensing Technologies." Sensors 20, no. 12 (2020): 3537. http://dx.doi.org/10.3390/s20123537.

Full text
Abstract:
As the fastest growing segment of aviation, unmanned aerial systems (UAS) continue to increase in number, technical complexity and capabilities. Numerous civilian and commercial uses are drastically transforming civil protection, asset delivery, commercial and entertaining activities. However, UAS pose significant challenges in terms of safety, security and privacy within society. An increasing phenomenon, nowadays, is drone-related incidents near airport facilities, which are expected to proliferate in frequency, complexity and severity, as drones become larger and more powerful. Critical inf
APA, Harvard, Vancouver, ISO, and other styles
20

Castrillo, Vittorio Ugo, Angelo Manco, Domenico Pascarella, and Gabriella Gigante. "A Review of Counter-UAS Technologies for Cooperative Defensive Teams of Drones." Drones 6, no. 3 (2022): 65. http://dx.doi.org/10.3390/drones6030065.

Full text
Abstract:
In recent years, the drone market has had a significant expansion, with applications in various fields (surveillance, rescue operations, intelligent logistics, environmental monitoring, precision agriculture, inspection and measuring in the construction industry). Given their increasing use, the issues related to safety, security and privacy must be taken into consideration. Accordingly, the development of new concepts for countermeasures systems, able to identify and neutralize a single (or multiples) malicious drone(s) (i.e., classified as a threat), has become of primary importance. For thi
APA, Harvard, Vancouver, ISO, and other styles
21

ÖZGEN, Cenk, and Selim KURT. "PKK’s Drone Attacks within the Perspective of Learning Organisation and Türkiye’s Counter Reaction." BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 14, no. 2 (2025): 93–113. https://doi.org/10.53477/2284-9378-25-18.

Full text
Abstract:
PKK’s methods used in its terrorist attacks targeting Türkiye have been observed to transform over time. This transformation is influenced by other actors with whom it interacts in its environment and adopts their forms of action. When this interaction is considered from a theoretical perspective, it would be correct to describe the PKK as a “learning organisation”. One of the concrete examples of the reflection of the interaction with different actors on the PKK is the organisation’s tendency to use drones, largely influenced by ISIS. Records show that drones played an important role in the a
APA, Harvard, Vancouver, ISO, and other styles
22

Di Cecio, G., A. Manco, and G. Gigante. "On-board drone classification with Deep Learning and System-on-Chip implementation." Journal of Physics: Conference Series 2716, no. 1 (2024): 012059. http://dx.doi.org/10.1088/1742-6596/2716/1/012059.

Full text
Abstract:
Abstract In recent years the increasing use of drones has raised significant concerns on safety and make them dramatic threats to security. To address these worries Counter-UAS Systems (CUS) are capturing the interest of research and of industry. Consequently, the development of effective drone detection technologies has become a critical research focus. The proposed work explores the application of edge computing to drone classification. It tunes a Deep Learning model, You Only Look Once (YOLO), and implements it on a Field Programmable Gate Array (FPGA) technology. FPGAs are considered advan
APA, Harvard, Vancouver, ISO, and other styles
23

Aouladhadj, Driss, Ettien Kpre, Virginie Deniau, Aymane Kharchouf, Christophe Gransart, and Christophe Gaquière. "Drone Detection and Tracking Using RF Identification Signals." Sensors 23, no. 17 (2023): 7650. http://dx.doi.org/10.3390/s23177650.

Full text
Abstract:
The market for unmanned aerial systems (UASs) has grown considerably worldwide, but their ability to transmit sensitive information poses a threat to public safety. To counter these threats, authorities, and anti-drone organizations are ensuring that UASs comply with regulations, focusing on strategies to mitigate the risks associated with malicious drones. This study presents a technique for detecting drone models using identification (ID) tags in radio frequency (RF) signals, enabling the extraction of real-time telemetry data through the decoding of Drone ID packets. The system, implemented
APA, Harvard, Vancouver, ISO, and other styles
24

Hakani, Raj, and Abhishek Rawat. "Edge Computing-Driven Real-Time Drone Detection Using YOLOv9 and NVIDIA Jetson Nano." Drones 8, no. 11 (2024): 680. http://dx.doi.org/10.3390/drones8110680.

Full text
Abstract:
Drones, with their ability to vertically take off and land with their stable hovering performance, are becoming favorable in both civilian and military domains. However, this introduces risks of its misuse, which may include security threats to airports, institutes of national importance, VIP security, drug trafficking, privacy breaches, etc. To address these issues, automated drone detection systems are essential for preventing unauthorized drone activities. Real-time detection requires high-performance devices such as GPUs. For our experiments, we utilized the NVIDIA Jetson Nano to support Y
APA, Harvard, Vancouver, ISO, and other styles
25

Kim, Tae-Young, and Jung-Hoon Song. "Study on the Development of National Security Policies through the Analysis of the Terrorist Incidents Involving President Trump in the United States." Korean Association for Terrorism Studies 17, no. 4 (2024): 26–53. https://doi.org/10.46350/kats.2024.17.4.26.

Full text
Abstract:
The purpose of this study is to derive the direction of security policies that our country should aim for in the future through a case analysis of the 2024 terrorist incidents involving President Trump in the United States. The research method involved a literature review of key documents, including the US Senate Committee on Homeland Security & Governmental Affairs' report on the Trump assassination attempts. First, the study analyzed the recent trends in high-profile terrorism in the United States, focusing on the key security measures and issues of the Secret Service (SS) and related ag
APA, Harvard, Vancouver, ISO, and other styles
26

Siora, Oleksandr, Volodymyr Lukashenko, and Artemii Bernatskyi. "An interdisciplinary study of the effect of laser radiation on carbon fiber-reinforced polymer, in the context of counteracting unmanned aerial vehicles." History of science and technology 15, no. 1 (2025): 195–215. https://doi.org/10.32703/2415-7422-2024-15-1-195-215.

Full text
Abstract:
This article presents an interdisciplinary study that combines historical analysis and experimental research to explore the vulnerability of military drones made from carbon fiber-reinforced polymer to destruction by laser radiation. The work is structured around two interconnected areas: the historical evolution of carbon fiber-reinforced polymer use in military drone construction and the parallel development of high-energy laser systems as precision countermeasures. The historical section traces the trajectory of carbon fiber composites from their initial applications in aerospace and defens
APA, Harvard, Vancouver, ISO, and other styles
27

Horváth, Gábor. "No Drone’s Sky: Full Spectrum Drone Surveillance and Neutralisation Concept for Enhanced Counter-UAS Framework." Hadmérnök 19, no. 1 (2024): 85–99. http://dx.doi.org/10.32567/hm.2024.1.5.

Full text
Abstract:
Unmanned Aircraft Systems (UAS), commonly known as drones, have witnessed substantial global proliferation in the past decade. Their constructive applications hold the promise of being a useful, yet critical component in creating a more efficient society with the enhancement of safety, efficiency, and facilitating advancements in various domains, ultimately contributing to our modern daily lives. However, the escalating dependence on computer and communication technologies renders, especially small, UAS susceptible to various threats, posing risks to public safety, national security, and indiv
APA, Harvard, Vancouver, ISO, and other styles
28

Horváth, Gábor. "No Drone’s Sky: Full Spectrum Drone Surveillance and Neutralisation Concept for Enhanced Counter-UAS Framework." Hadmérnök 19, no. 2 (2024): 107–21. https://doi.org/10.32567/hm.2024.2.9.

Full text
Abstract:
We are living in an era that is marked by the exponential growth of small Unmanned Aircraft Systems (sUAS), therefore the imperative for effective countermeasures against potential threats to public safety, national security, and individual privacy inherent in these airborne apparatus has become increasingly pronounced. Following the foundational exploration of UAS surveillance in the first segment of the Counter-UAS (C-UAS) series, this second instalment shifts its gaze to the pivotal domain of drone neutralisation techniques. Investigating both soft and hard neutralisation methodologies, thi
APA, Harvard, Vancouver, ISO, and other styles
29

Rudys, Saulius, Andrius Laučys, Paulius Ragulis, et al. "Hostile UAV Detection and Neutralization Using a UAV System." Drones 6, no. 9 (2022): 250. http://dx.doi.org/10.3390/drones6090250.

Full text
Abstract:
The technologies of Unmanned Aerial Vehicles (UAVs) have seen extremely rapid development in recent years. UAV technologies are being developed much faster than the means of their legislation. There have been many means of UAV detection and neutralization proposed in recent research; nonetheless, all of them have serious disadvantages. The essential problems in the detection of UAVs is the small size of UAVs, weak radio wave reflection, weak radio signal, and sound emitting. The main problem of conventional UAV countermeasures is the short detection and neutralization range. The authors propos
APA, Harvard, Vancouver, ISO, and other styles
30

Jačionis, Tomas. "MODERN METHODS FOR DETECTION OF UNMANNED AERIAL VEHICLES." Mokslas - Lietuvos ateitis 12 (February 19, 2020): 1–6. http://dx.doi.org/10.3846/mla.2020.11435.

Full text
Abstract:
Most recent Unmanned Aerial Vehicle (UAV) detection methods are discussed in the article. Detection of UAV principles are pointed out during the overview. Brief advantages of each technique is covered and compared in between. Key technological limitations of each technique is pointed out and discussed. Several most recent and actual UAV threat accidents are presented with the indication of the used counter UAV systems. New upcoming threat of “Kamikaze” (selfdestructive) UAV and their detection limitations are presented. Case studies on the hybrid counter drone technology interactions are cover
APA, Harvard, Vancouver, ISO, and other styles
31

Bellido, Jesús, and Qian Gao. "Scalable and Resilient Autonomous Drone Swarm Framework for Secure Operations in Threatened Environments." Ubiquitous Technology Journal 1, no. 2 (2025): 1–9. https://doi.org/10.71346/utj.v1i2.17.

Full text
Abstract:
This research introduces a novel framework for autonomous drone swarms, addressing critical challenges in physical-cyber security by integrating advanced computational models, decentralized swarm intelligence, and robust cryptographic protocols. The work is motivated by the increasing reliance on drone swarms for securing critical infrastructure, disaster response, and surveillance, where hybrid physical and cyber threats present significant risks. The study proposes bio-inspired algorithms for adaptive swarm coordination, physics-informed neural networks for real-time collision avoidance, and
APA, Harvard, Vancouver, ISO, and other styles
32

Eckert, Christian, Diana C. Hernandez-Jaramillo, Chris Medcraft, Daniel P. Harrison, and Brendan P. Kelaher. "Drone-Based Measurement of the Size Distribution and Concentration of Marine Aerosols above the Great Barrier Reef." Drones 8, no. 7 (2024): 292. http://dx.doi.org/10.3390/drones8070292.

Full text
Abstract:
Marine aerosol particles can act as cloud condensation nuclei and influence the atmospheric boundary layer by scattering solar radiation. The interaction of ocean waves and coral reefs may affect the distribution and size of marine aerosol particles. Measuring this effect has proven challenging. Here, we tested the hypothesis that the distribution and size of marine aerosol particles would vary over three distinct zones (i.e., coral lagoon, surf break, and open water) near One Tree Island in the Great Barrier Reef, which is approximately 85 km off the east coast of Australia. We used a modifie
APA, Harvard, Vancouver, ISO, and other styles
33

Krus, Anne, Dirk van Apeldoorn, Constantino Valero, and Juan José Ramirez. "Acquiring Plant Features with Optical Sensing Devices in an Organic Strip-Cropping System." Agronomy 10, no. 2 (2020): 197. http://dx.doi.org/10.3390/agronomy10020197.

Full text
Abstract:
The SUREVEG project focuses on improvement of biodiversity and soil fertility in organic agriculture through strip-cropping systems. To counter the additional workforce a robotic tool is proposed. Within the project, a modular proof of concept (POC) version will be produced that will combine detection technologies with actuation on a single-plant level in the form of a robotic arm. This article focuses on the detection of crop characteristics through point clouds obtained with two lidars. Segregation in soil and plants was successfully achieved without the use of additional data from other sen
APA, Harvard, Vancouver, ISO, and other styles
34

Moretto, S., F. E. Pino Andrades, J. Delgado, et al. "UAV prototype for localization and identification of radioactive contamination and emitters." EPJ Web of Conferences 253 (2021): 08001. http://dx.doi.org/10.1051/epjconf/202125308001.

Full text
Abstract:
The Dragon (Drone for RAdiation detection of Gammas and Neutrons) prototype aims at designing and developing an unmanned aerial vehicle (UAV) equipped with a detection system able to identify radioactive materials, spread over an area or located in a specific position. The system is focused on the localization of the unknown emitter and its subsequently identification. The proposed prototype is made up of two easily interchangeable detection systems, one will be used as a counter while the second will be aimed to perform goodresolution gamma spectroscopy. Both solutions have neutron gamma disc
APA, Harvard, Vancouver, ISO, and other styles
35

Oleksenko, O., O. Huk, V. Snitsarenko, D. Ikaіev, and V. Rahulin. "REGARDING THE FEATURES OF THE COMBAT APPLICATION OF FPV DRONES IN THE WAR BETWEEN RUSSIA AND UKRAINE." Наукові праці Державного науково-дослідного інституту випробувань і сертифікації озброєння та військової техніки 22, no. 4 (2024): 99–105. https://doi.org/10.37701/dndivsovt.22.2024.12.

Full text
Abstract:
The article explores the development and application of First-Person View (FPV) drones in modern warfare, particularly in the context of the ongoing conflict between Ukraine and the russian federation. FPV drones, also referred to as kamikaze drones, have become a crucial element in tactical operations, offering high maneuverability and real-time control through first-person perspective technologies. The article highlights that, as of November 2023, Ukraine’s Ministry of Defense has approved 20 models of FPV drones for military use. These drones are primarily multirotor, due to their enhanced
APA, Harvard, Vancouver, ISO, and other styles
36

Sun, Chaoran, Stephen A. Agha, Zaharuddin Mohamed, and M. Hasan Shaheed. "Optimised Sliding Mode Control of a Hexacopter: Simulation and Experiments." Electronics 11, no. 16 (2022): 2519. http://dx.doi.org/10.3390/electronics11162519.

Full text
Abstract:
Hexacopters are a kind of unmanned aerial vehicle (UAV) with six actuators and six degrees-of-freedom motions. The control of a hexacopter drone is a critical challenge. This paper presents a nonlinear dynamical model for a hexacopter and complete control approaches based on sliding mode control theory. Furthermore, this study proposed an effective control tuning method based on an optimisation algorithm. The controller has been improved by the grey wolf optimisation (GWO) algorithm, an iteration algorithm inspired by the social hierarchy and hunting behaviour of grey wolves. The improvement o
APA, Harvard, Vancouver, ISO, and other styles
37

Poole, Alastair, Mark Sutcliffe, Gareth Pierce, and Anthony Gachagan. "A Novel Complete-Surface-Finding Algorithm for Online Surface Scanning with Limited View Sensors." Sensors 21, no. 22 (2021): 7692. http://dx.doi.org/10.3390/s21227692.

Full text
Abstract:
Robotised Non-Destructive Testing (NDT) has revolutionised the field, increasing the speed of repetitive scanning procedures and ability to reach hazardous environments. Application of robot-assisted NDT within specific industries such as remanufacturing and Aersopace, in which parts are regularly moulded and susceptible to non-critical deformation has however presented drawbacks. In these cases, digital models for robotic path planning are not always available or accurate. Cutting edge methods to counter the limited flexibility of robots require an initial pre-scan using camera-based systems
APA, Harvard, Vancouver, ISO, and other styles
38

Oprean, Laurean-Georgel. "Artillery and Drone Action Issues in the War in Ukraine." Scientific Bulletin 28, no. 1 (2023): 73–78. http://dx.doi.org/10.2478/bsaft-2023-0008.

Full text
Abstract:
Abstract Technological developments in recent decades in multiple fields have revolutionised the actions of armed forces, as recently confirmed in the war in Ukraine where NATO countries’ artillery and missiles have undeniably outperformed the outdated spectrum of previous counter-insurgency actions, and the counter-battery fire of self-propelled weapons systems far exceeded the limits of the Iraq and Afghanistan theatres of operations, where such a response was easy to achieve because insurgent forces had no idea that such precise, coordinated and effective action was available at discovered
APA, Harvard, Vancouver, ISO, and other styles
39

Brewczyński, Konrad D., Marek Życzkowski, Krzysztof Cichulski, Kamil A. Kamiński, Paraskevi Petsioti, and Geert De Cubber. "Methods for Assessing the Effectiveness of Modern Counter Unmanned Aircraft Systems." Remote Sensing 16, no. 19 (2024): 3714. http://dx.doi.org/10.3390/rs16193714.

Full text
Abstract:
Given the growing threat posed by the widespread availability of unmanned aircraft systems (UASs), which can be utilised for various unlawful activities, the need for a standardised method to evaluate the effectiveness of systems capable of detecting, tracking, and identifying (DTI) these devices has become increasingly urgent. This article draws upon research conducted under the European project COURAGEOUS, where 260 existing drone detection systems were analysed, and a methodology was developed for assessing the suitability of C-UASs in relation to specific threat scenarios. The article prov
APA, Harvard, Vancouver, ISO, and other styles
40

Wan, Yuzhi, and Nadine Sarter. "The Effects of Masking on the Detection of Alarms in Close Temporal Proximity." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 62, no. 1 (2018): 1545–46. http://dx.doi.org/10.1177/1541931218621349.

Full text
Abstract:
In many complex data-rich domains, safety is highly dependent on the timely and reliable detection and identification of alarms. However, due to the coupling and complexity of systems in these environments, large numbers of alarms can occur within a short period of time – a problem called an alarm flood (Perrow, 2011). Alarm floods have been defined as more than 10 alarms in a 10-minute period (EEMUA, 1999); however, this rate is often exceeded which can lead to operators missing or misinterpreting critical alarms and, as a result, system failures and accidents. Various types of masking effect
APA, Harvard, Vancouver, ISO, and other styles
41

Gal-Or, Benjamin. "Reasons for triple-funding of the jet-engine-industry to meet 2020-2040 6TH-Gen-Challenge: Counter-Air Penetration, CAP." International Journal of Turbo & Jet-Engines 35, no. 4 (2018): 315–20. http://dx.doi.org/10.1515/tjj-2018-9015.

Full text
Abstract:
Abstract The forthcoming 2020-2040 6TH-Generation is characterized by a host of debated and confused CASLAP-strategies, doctrines, tactics, mission definitions, jetonautic-funding, systems-of-systems technologies vis-à-vis AOOF-based-prop-swarm-technologies and almost symmetric jetonautics at both sides, [Part-A references 5,10,11,17,20,24,26,32,36,48,49]. CASLAP offensive-defensive options for each country vary with jetonautics, location, time, scientific and technological education, economics, geopolitics and stealth/super-agility/armament/AI of its fighter aircraft, UCAVs, JES-UCAV, prop-dr
APA, Harvard, Vancouver, ISO, and other styles
42

Alshbatat, Abdel Ilah N., and Moath Awawdeh. "Drone-Based Adaptive Hybrid Techniques for Improving Face Detection and Recognition." WSEAS TRANSACTIONS ON COMPUTER RESEARCH 12 (December 6, 2024): 516–23. https://doi.org/10.37394/232018.2024.12.50.

Full text
Abstract:
With the rapid development of Unmanned Aerial Vehicle (UAV) related technologies, Drones gained the opportunity to search locations that are dangerous or difficult for humans to reach. In this regard, Drones technology has been widely used to detect and recognize humans on the ground. In order to identify their potential role in counter-terrorism operations, the aim of this research study is to design and develop a reliable aerial system capable of identifying people with a high detection rate. Furthermore, it presents a solution to all challenges that degrade the resolution when query images
APA, Harvard, Vancouver, ISO, and other styles
43

Strelko, Oleh, Oleh Pylypchuk, and Yuliia Berdnychenko. "PREFACE." History of science and technology 15, no. 1 (2025): 7–10. https://doi.org/10.32703/2415-7422-2025-15-1-7-10.

Full text
Abstract:
Dear Readers, We are pleased to present the latest issue of our scholarly journal, which brings together the results of interdisciplinary research aimed at understanding the historical stages in the development of science and technology, technological innovations, and their impact on society. This publication continues our commitment to fostering dialogue between historians, engineers, scientists, and cultural theorists, offering a platform for rethinking the intersections of knowledge systems across time and disciplines. By highlighting both well-established and emerging fields of inquiry, we
APA, Harvard, Vancouver, ISO, and other styles
44

Çetin, E., C. Barrado, and E. Pastor. "Improving real-time drone detection for counter-drone systems." Aeronautical Journal, June 16, 2021, 1–26. http://dx.doi.org/10.1017/aer.2021.43.

Full text
Abstract:
Abstract The number of unmanned aerial vehicles (UAVs, also known as drones) has increased dramatically in the airspace worldwide for tasks such as surveillance, reconnaissance, shipping and delivery. However, a small number of them, acting maliciously, can raise many security risks. Recent Artificial Intelligence (AI) capabilities for object detection can be very useful for the identification and classification of drones flying in the airspace and, in particular, are a good solution against malicious drones. A number of counter-drone solutions are being developed, but the cost of drone detect
APA, Harvard, Vancouver, ISO, and other styles
45

"Counter-Drone Defense Systems in the Light of International Law." Journal of Applied Business and Economics 22, no. 11 (2020). http://dx.doi.org/10.33423/jabe.v22i11.3737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Dafrallah, Safaa, and Moulay A. Akhloufi. "Malicious UAV detection using various modalities." Drone Systems and Applications, March 12, 2024. http://dx.doi.org/10.1139/dsa-2023-0049.

Full text
Abstract:
Unmanned Aerial Vehicles, also known as drones, have seen increasing interest in recent years. This surge of interest is based on technological advancements, enhanced performance, affordability, and their large array of applications. Despite their utility in various applications, drones could also be used for malicious intent. The increasing concern regarding malicious drones triggers the use of various technologies and countermeasures, including drone detection and counter-drone systems. In this paper, we raise concerns about the malicious use of drone systems by providing a brief description
APA, Harvard, Vancouver, ISO, and other styles
47

Fish, Adam, and Michael Richardson. "Drone Power: Conservation, Humanitarianism, Policing and War." Theory, Culture & Society, July 26, 2021, 026327642110228. http://dx.doi.org/10.1177/02632764211022828.

Full text
Abstract:
A convergence of four genealogies reveals drone power. Environmentality describes the contradictory uses of drones in conservation. Humanitarianism articulates how control is enacted and challenged in human crises. Securitization examines drones in surveillance and counter-surveillance. Militarization, the use of drones in war, explains domination from above and resistance from below. While theories of governmentality dominate, an emergent materialism within drone studies emphasizes the diffusion of power and agency. A synthesis of drone governmentality and drone materialism exposes four fligh
APA, Harvard, Vancouver, ISO, and other styles
48

Dhulashia, Dilan, Nial Peters, Colin Horne, Piers Beasley, and Matthew Ritchie. "Multi-Frequency Radar Micro-Doppler Based Classification of Micro-Drone Payload Weight." Frontiers in Signal Processing 1 (December 22, 2021). http://dx.doi.org/10.3389/frsip.2021.781777.

Full text
Abstract:
The use of drones for recreational, commercial and military purposes has seen a rapid increase in recent years. The ability of counter-drone detection systems to sense whether a drone is carrying a payload is of strategic importance as this can help determine the potential threat level posed by a detected drone. This paper presents the use of micro-Doppler signatures collected using radar systems operating at three different frequency bands for the classification of carried payload of two different micro-drones performing two different motions. Use of a KNN classifier with six features extract
APA, Harvard, Vancouver, ISO, and other styles
49

Mittal, Vikram, and John Goetz. "A quantitative analysis of the effects of drone and counter-drone systems on the Russia-Ukraine battlefield." Defense & Security Analysis, April 4, 2025, 1–14. https://doi.org/10.1080/14751798.2025.2479973.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Çetin, Ender, Cristina Barrado, Esther Salamí, and Enric Pastor. "Analyzing deep reinforcement learning model decisions with Shapley additive explanations for counter drone operations." Applied Intelligence, September 10, 2024. http://dx.doi.org/10.1007/s10489-024-05733-2.

Full text
Abstract:
AbstractAs the use of drones continues to increase, their capabilities pose a threat to airspace safety when they are misused. Deploying AI models for intercepting these unwanted drones becomes crucial. However, these AI models, such as deep learning models, often operate as “black boxes”, making it hard to trust their decision-making system. This also affects end-users’ confidence in these AI systems. In this paper, the explainability of deep reinforcement learning is investigated and a deep reinforcement learning (DRL) method, double deep Q-network with dueling architecture and prioritized e
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!