A COMPREHENSIVE AUTOMATED SOLUTION TO THE PROBLEM OF AIR ENVIRONMENT MONITORING

Author(s):  
В.А. ОСАНОВ ◽  
С.М. КОНДРАТЬЕВ ◽  
О.С. КОНЯЕВА

Рассмотрена автоматизированная система мониторинга воздушной среды с использованием технологий беспилотных летательных аппаратов, оснащенных датчиками для выявления вредных веществ. Представлены алгоритм функционирования системы и программно-аппаратная часть решения. Показано, что канал связи на основе методов шифрования обеспечивает безопасную передачу данных с беспилотного аппарата на сервер. Результаты исследования найдут практическое применение в мониторинге уровня загрязнения воздуха в городах. An automated system for monitoring the air environment using technologies of unmanned aerial vehicles equipped with sensors for detecting harmful substances is considered. The algorithm of the system functioning and the software and hardware part of the solution are presented. It is shown that a communication channel based on encryption methods ensures secure data transfer from an unmanned vehicle to a server. The results of the study will find practical application in monitoring the level of air pollution in cities and in predicting the direction of movement of polluting air masses.

Author(s):  
D. Sowmya ◽  
S. Sivasankaran

In the cloud environment, it is difficult to provide security to the monolithic collection of data as it is easily accessed by breaking the algorithms which are based on mathematical computations and on the other hand, it takes much time for uploading and downloading the data. This paper proposes the concept of implementing quantum teleportation i.e., telecommunication + transportation in the cloud environment for the enhancement of cloud security and also to improve speed of data transfer through the quantum repeaters. This technological idea is extracted from the law of quantum physics where the particles say photons can be entangled and encoded to be teleported over large distances. As the transfer of photons called qubits allowed to travel through the optical fiber, it must be polarized and encoded with QKD (Quantum Key Distribution) for the security purpose. Then, for the enhancement of the data transfer speed, qubits are used in which the state of quantum bits can be encoded as 0 and 1 concurrently using the Shors algorithm. Then, the Quantum parallelism will help qubits to travel as fast as possible to reach the destination at a single communication channel which cannot be eavesdropped at any point because, it prevents from creating copies of transmitted quantum key due to the implementation of no-cloning theorem so that the communication parties can only receive the intended data other than the intruders.


2021 ◽  
Vol 30 (1) ◽  
pp. 728-738
Author(s):  
Dmitry Gura ◽  
Victor Rukhlinskiy ◽  
Valeriy Sharov ◽  
Anatoliy Bogoyavlenskiy

Abstract Over the past decade, unmanned aerial vehicles (UAVs) have received increasing attention and are being used in the areas of harvesting, videotaping, and the military industry. In this article, the consideration is focused on areas where video recording is required for ground inspections. This paper describes modern communication technologies and systems that enable interaction and data exchange between UAVs and a ground control station (GCS). This article focuses on different architectures of communication systems, establishing the characteristics of each to identify the preferred architecture that does not require a significant consumption of resources and whose data transmission is reliable. A coherent architecture that includes multiple UAVs, wireless sensor networks, cellular networks, GCSs, and satellite network to duplicate communications for enhanced system security has been offered. Some reliability problems have been discussed, the solution of which was suggested to be a backup connection via satellite, i.e., a second connection. This study focused not only on the communication channels but also on the data exchanged between system components, indicating the purpose of their application. Some of the communication problems and shortcomings of various systems, as well as further focus areas and improvement recommendations were discussed.


2021 ◽  
Vol 11 (7) ◽  
pp. 3147
Author(s):  
Erlend M. Coates ◽  
Thor I. Fossen

This paper presents nonlinear, singularity-free autopilot designs for multivariable reduced-attitude control of fixed-wing aircraft. To control roll and pitch angles, we employ vector coordinates constrained to the unit two-sphere and that are independent of the yaw/heading angle. The angular velocity projected onto this vector is enforced to satisfy the coordinated-turn equation. We exploit model structure in the design and prove almost global asymptotic stability using Lyapunov-based tools. Slowly-varying aerodynamic disturbances are compensated for using adaptive backstepping. To emphasize the practical application of our result, we also establish the ultimate boundedness of the solutions under a simplified controller that only depends on rough estimates of the control-effectiveness matrix. The controller design can be used with state-of-the-art guidance systems for fixed-wing unmanned aerial vehicles (UAVs) and is implemented in the open-source autopilot ArduPilot for validation through realistic software-in-the-loop (SITL) simulations.


Author(s):  
Алексей Горлов ◽  
Aleksey Gorlov ◽  
Михаил Рытов ◽  
Mikhail Rytov ◽  
Дмитрий Лысов ◽  
...  

This article discusses the process of automating the assessment of the effectiveness of software and hardware information protection by creating an automated system. The main functions of the proposed system are: conducting an audit of information security, forming a model of information security threats, forming recommendations for creating a software and hardware system for protecting information, and creating organizational-technical documentation. The developed automated system for evaluating the effectiveness of software and hardware protection of information allows in an automated way to build a model of information security threats, to form organizational and technical documentation governing the protection of confidential information, and also to make recommendations for improving the software and hardware system for protecting information. The use of this system will significantly reduce the time and material costs of auditing information security and developing additional measures to protect information.


2020 ◽  
Vol 6 (1) ◽  
pp. 100-108
Author(s):  
I. Kaisina

This paper investigates the process of multi-stream data transmission from several unmanned aerial vehicles (UAV) to a ground station. We can observe a mathematical model of the data transfer process at the application level of the OSI model (from flying nodes to a ground station). The Poisson – Pareto packet process is used to describe the multi-stream data traffic. The results of simulation are obtained using the network simulator NS-3. It is considered a system for emulating the process of multi-stream data transmission from UAV to a ground station. Acording to the results of studies for multi-stream data transmission it is clear that the increase of the UAV source nodes which simultaneously transmit data to a ground station needs higher requirements for Goodput.


2019 ◽  
Vol 25 ◽  
pp. 01002 ◽  
Author(s):  
Lili Zhao ◽  
Peng Zhang ◽  
Qicai Dong ◽  
Xiangyang Huang ◽  
Jianhua Zhao ◽  
...  

Wireless communication technology has been developed rapidly after entering the 21st century. Data transfer rate increased significantly as well as the bandwidth became wider and wider from 2G to 4G in wireless communication systems. Channel estimation is an import part of any communication systems; its accuracy determines the quality of the whole communication. Channel estimation methods of typical wireless communication systems such as UWB, 2G and 3G have been researched.


Electronics ◽  
2020 ◽  
Vol 9 (6) ◽  
pp. 975
Author(s):  
Carlos T. Calafate ◽  
Mauro Tropea

The use of unmanned aerial vehicles (UAVs) has attracted prominent attention from researchers, engineers, and investors in multidisciplinary fields such as agriculture, signal coverage, emergency situations, disaster events, farmland and environment monitoring, 3D-mapping, and so forth [...]


Sign in / Sign up

Export Citation Format

Share Document