Privacy Protection from Unmanned Aerial Vehicle
نویسندگان
چکیده
منابع مشابه
Unmanned Aerial Vehicle Images
The main aim of this chapter is to give to the reader a complete overview about the general context in which the thesis is positioned. In a second part, the problems faced in the following chapters are introduced. Finally, we describe the proposed solutions and the thesis structure and organization. Chapter
متن کاملdesigning unmanned aerial vehicle based on neuro-fuzzy systems
در این پایان نامه، کنترل نرو-فازی در پرنده هدایت پذیر از دور (پهپاد) استفاده شده است ابتدا در روش پیشنهادی اول، کنترل کننده نرو-فازی توسط مجموعه اطلاعات یک کنترل کننده pid به صورت off-line آموزش دیده است و در روش دوم یک کنترل کننده نرو-فازی on-line مبتنی بر شناسایی سیستم توسط شبکه عصبی rbf پیشنهاد شده است. سپس کاربرد این کنترل کننده در پهپاد بررسی شده است و مقایسه ای ما بین کنترل کننده های معمو...
Autonomous Landing Unmanned Aerial Vehicle
This thesis presents the system architecture for landing an Unmanned Aerial Vehicle (UAV) from a hovering position without the intervention of a human operator. Through the use of feedback information from a height sensor, the UAV is commanded to perform controlled descent with the desired landing parameters by implementation of the flight control laws. The plant model of the system was determi...
متن کاملVisual Servoing of Unmanned Surface Vehicle from Small Tethered Unmanned Aerial Vehicle
This paper presents an algorithm and the implementation of a motor schema to aid the visual localization subsystem of the ongoing EMILY project at Texas A&M University. The EMILY project aims to team an Unmanned Surface Vehicle (USV) with an Unmanned Aerial Vehicle (UAV) to augment the search and rescue of marine casualties during an emergency response phase. The USV is designed to serve as a f...
متن کاملUnmanned Aerial Vehicle (UAV) Cooperative Mission Planning
Unmanned Aerial Vehicle (UAV) is a kind of new operational platform possessing ability to flight autonomously and perform independently a task,which can not only carry out non-attack tasks,such as military reconnaissance, surveillance and search, but also to carry out tasks to air-to-ground attacking, target bombing and so on. With the rapid development of UAVtechnology, more and more UAV will ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology
سال: 2016
ISSN: 1598-3986
DOI: 10.13089/jkiisc.2016.26.4.1057