Unmanned Aerial Vehicles : Platforms, Applications, Security and Services

The use of unmanned aerial vehicles (UAVs) plays an important role in supporting human activities. Man is concentrating more and more on intellectual work, and trying to automate practical activities as much as possible in order to increase their efficiency. In this regard, the use of drones is incr...

Full description

Saved in:
Bibliographic Details
Other Authors: Calafate, Carlos Tavares (Editor), Tropea, Mauro (Editor)
Format: Book Chapter
Published: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute 2020
Subjects:
Online Access:Get Fullteks
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 03079naaaa2200745uu 4500
001 doab_20_500_12854_68924
005 20210501
020 |a books978-3-03936-709-2 
020 |a 9783039367085 
020 |a 9783039367092 
024 7 |a 10.3390/books978-3-03936-709-2  |c doi 
041 0 |a English 
042 |a dc 
072 7 |a TBX  |2 bicssc 
100 1 |a Calafate, Carlos Tavares  |4 edt 
700 1 |a Tropea, Mauro  |4 edt 
700 1 |a Calafate, Carlos Tavares  |4 oth 
700 1 |a Tropea, Mauro  |4 oth 
245 1 0 |a Unmanned Aerial Vehicles : Platforms, Applications, Security and Services 
260 |a Basel, Switzerland  |b MDPI - Multidisciplinary Digital Publishing Institute  |c 2020 
300 |a 1 electronic resource (174 p.) 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a The use of unmanned aerial vehicles (UAVs) plays an important role in supporting human activities. Man is concentrating more and more on intellectual work, and trying to automate practical activities as much as possible in order to increase their efficiency. In this regard, the use of drones is increasingly becoming a key aspect of this automation process, offering many advantages, including agility, efficiency and reduced risk, especially in dangerous missions. Hence, this Special Issue focuses on applications, platforms and services where UAVs can be used as facilitators for the task at hand, also keeping in mind that security should be addressed from its different perspectives, ranking from communications security to operational security, and furthermore considering privacy issues. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/4.0/  |2 cc  |4 https://creativecommons.org/licenses/by/4.0/ 
546 |a English 
650 7 |a History of engineering & technology  |2 bicssc 
653 |a computer vision 
653 |a oil well working condition 
653 |a real-time detection 
653 |a sort 
653 |a unmanned aerial vehicle (UAV) 
653 |a YOLOv3 
653 |a UAV 
653 |a autonomous landing 
653 |a vision-based 
653 |a ArduSim 
653 |a ArUco marker 
653 |a blind signature 
653 |a security 
653 |a MEC 
653 |a UAVs 
653 |a FANET 
653 |a 5G 
653 |a IoT 
653 |a Mutual authentication 
653 |a Privacy 
653 |a Traceable 
653 |a BAN logic 
653 |a coverage model 
653 |a human mobility model 
653 |a UAVs/drones positioning 
653 |a energy model 
653 |a UAS 
653 |a horizon 
653 |a undistortion 
653 |a FPGA 
653 |a sense-and-avoid 
653 |a LoRaWAN 
653 |a Unmanned Aerial Vehicles 
653 |a topology control 
653 |a virtual spring forces 
653 |a firefighting communications 
653 |a n/a 
856 4 0 |a www.oapen.org  |u https://mdpi.com/books/pdfview/book/2691  |7 0  |z Get Fullteks 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/68924  |7 0  |z DOAB: description of the publication