scholarly journals Capabilities of the Unmanned Aerial Vehicles in Logistic Support

10.37105/sd.5 ◽  
2018 ◽  
Vol 4 ◽  
pp. 22-26
Author(s):  
Michalska Anna ◽  
Karpińska Katarzyna

The main focus of this paper is the capabilities of Unmanned Aerial Vehicles as a military logistic support in conflicts areas. The conducted research addresses the problems of traditional military delivery methods. Next, the problem of using UAVs only for civilian purposes is considered. The paper begins with short elucidation of logistic support and further provides the classification of logistic materials and discusses five categories of military equipment from the logistics point of view. Next, the paper discusses the characteristics of the parameters and properties of the chosen existing UAVs that are used for the delivery of materials. Consequently, a comparison of the UAVs is carried out, and new technologies for logistic transport are presented. This paper is concluded with the claim that it is necessary to modernize the process of logistic support in the military.

2021 ◽  
Vol 30 (1) ◽  
pp. 728-738
Author(s):  
Dmitry Gura ◽  
Victor Rukhlinskiy ◽  
Valeriy Sharov ◽  
Anatoliy Bogoyavlenskiy

Abstract Over the past decade, unmanned aerial vehicles (UAVs) have received increasing attention and are being used in the areas of harvesting, videotaping, and the military industry. In this article, the consideration is focused on areas where video recording is required for ground inspections. This paper describes modern communication technologies and systems that enable interaction and data exchange between UAVs and a ground control station (GCS). This article focuses on different architectures of communication systems, establishing the characteristics of each to identify the preferred architecture that does not require a significant consumption of resources and whose data transmission is reliable. A coherent architecture that includes multiple UAVs, wireless sensor networks, cellular networks, GCSs, and satellite network to duplicate communications for enhanced system security has been offered. Some reliability problems have been discussed, the solution of which was suggested to be a backup connection via satellite, i.e., a second connection. This study focused not only on the communication channels but also on the data exchanged between system components, indicating the purpose of their application. Some of the communication problems and shortcomings of various systems, as well as further focus areas and improvement recommendations were discussed.


2015 ◽  
Vol 21 (2) ◽  
pp. 424-429 ◽  
Author(s):  
Florin Fainisi ◽  
Victor Al. Fainisi

Abstract The technology of unmanned aerial vehicles (UAV) has constantly developed in the last decade, becoming a key feature of the military programs and operations in Europe and the US, and the industry market has considerably grown. The vast majority of this growth is at the US level, whose military budget is bigger than of any other state in the world. On the other hand, with respect to the civil market, the sale of these kinds of aircrafts is in its initial stages, even though there are lots of fields in which it can be applied. In general, the states have begun to take legislative measures so that the unmanned flight of such an aircraft in areas open to civil aircrafts is controlled, so that any danger to the civil aircrafts should be avoided. The countries of the European Union that have not legislated this field are subject to Regulation 216/2008/EC regarding common norms in the civil aviation field and the Chicago Convention. Furthermore, all EU states are NATO members and thus apply in principle the norms established by the North-Atlantic Organization.


2020 ◽  
Vol 49 (1) ◽  
pp. 32-41 ◽  
Author(s):  
Bianka Károly ◽  
Balázs Sághi

The problems related to the integration of the unmanned aerial vehicles into national airspaces is one of the main topics that the scientific researchers are dealing with these days. Despite that, none of them are investigating the UAVs from the surveillance point of view. For that reason, highlighting the problems that have to be dealt with and assessing them through a holistic approach is the aim of the paper. Therefore, the paper takes the different stakeholders view and identify the key factors that have to be taken into account. The authors propose the surveillance technologies that can be considered and evaluated them along the revealed factors through a global view. The results can be applied as a base for the further research in UAVs surveillance domain.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Jia Fan ◽  
Lanfei Qiao ◽  
Yunfei Cao ◽  
Shanglin Liu ◽  
Wenke Zhang ◽  
...  

Password-based authenticated key exchange is a popular method for secure authentication and key exchange. With the wide application of unmanned aerial vehicles, position information has also become an important factor in authentication. In this paper, we present a new key exchange protocol, which firstly realizes dual authentication for both password and position, and we propose two applicable scenarios for the PPAKE mechanism: one is unmanned aerial vehicle authentication, and the other one is authentication in the military base. By adding position authentication, the reliability of authentication has improved, and the difficulty of adversarial attacks also increases. Any arbitrary adversary who can listen, tamper, and send messages can only perform an online attack for password guessing at a specified position. Finally, we provide security proofs under the defined model.


Author(s):  
Tom Holert

Contemporary warfare has been significantly transformed by the promotion and implementation of unmanned aerial vehicles (or drones) into global military operations. Networked remote sensory vision and the drones’ capability to carry deadly missiles entail and facilitate increasingly individualised, racialised, and necropolitical military practices conceptualised as ‘surgical strikes’ or ‘targeted killings’, all in the name of ‘counterinsurgency’. In the absence of publicly accessible documentations of ‘drone vision’, images of drones themselves constitute what is arguably one of the most contested iconographies of the present. The ethical and legal problems engendered by the virtualisation of violence and the panoptical fantasies of persistent vision and continuous threat interfere with the commercial interests and the publicised ideas of ‘clean’ warfare of the military-industrial-media complex. Drones have become a fetishised icon of warfare running out of human measure and control and are henceforth challenged by activist strategies highlighting the blind spots and victims of their deployment.


2018 ◽  
Vol 161 ◽  
pp. 03023
Author(s):  
Tien Ngo ◽  
Mehmet Guzey ◽  
Vladimir Dashevsky

Existing examples of prototypes of ground-based robotic platforms used as a landing site for unmanned aerial vehicles are considered. In some cases, they are equipped with a maintenance mechanism for the power supply module. The main requirements for robotic multi-copter battery maintenance systems depending on operating conditions, required processing speed, operator experience and other parameters are analyzed. The key issues remain questions of the autonomous landing of the unmanned aerial vehicles on the platform and approach to servicing battery. The existing prototypes of service robotic platforms are differed in the complexity of internal mechanisms, speed of service, algorithms of joint work of the platform and unmanned aerial vehicles during the landing and maintenance of the battery. The classification of robotic systems for servicing the power supply of multi-copter batteries criteria is presented using the following: the type of basing, the method of navigation during landing, the shape of the landing pad, the method of restoring the power supply module. The proposed algorithmic model of the operation of battery power maintenance system of the multi-copter on ground-based robotic platform during solving the target agrarian problem is described. Wireless methods of battery recovery are most promising, so further development and prototyping of a wireless charging station for multi-copter batteries will be developed.


2020 ◽  
Vol 12 (1) ◽  
pp. 195-210
Author(s):  
Renata Włodarczyk

The study was created thanks to the author’s preferences to learn increasingly more about new technologies that are able to increase the potential of internal security of the state. Recently, interest in recording areas (difficult to access, dangerous, monitored in adverse weather conditions, monitored due to the implementation of tasks by relevant services), the development of methods enabling the transmission of various materials at a distance, and performing other complicated activities have increased. For this purpose, unmanned aerial vehicles (so-called drones, UAVs) that are versatile in many respects are used. The author noticed the need to disseminate such innovative devices on native soil, especially for using them in multidirectional strengthening of the security sphere. Polish companies producing UAVs for many foreign customers have already marked their presence in this matter. The achievements of the designers are so impressive that it makes us appreciate the development of our technical thought, and above all, the use of drones to ensure security and public order in Poland. A series of training courses is already conducted by the Police Academy in Szczytno, which is a good solution both for teachers and, above all, for the trainees themselves. Such an initiative will undoubtedly translate into increased interest in drones, and especially the incredible usefulness of these devices for uniformed services and other entities.


2018 ◽  
Vol 47 (1) ◽  
pp. 119-151 ◽  
Author(s):  
Jonathan P. West ◽  
Casey A. Klofstad ◽  
Joseph E. Uscinski ◽  
Jennifer M. Connolly

Recently, governments, commercial firms, and individuals have increased their use of unmanned aerial vehicles (i.e., “drones”). As with many new technologies, drone use has outpaced government oversight. Attempts to regulate the technology have been met with intense public backlash. Therefore, governments need to understand the public’s preferences for a regulatory regime. Analyzing national survey data, we address two questions: (a) What policies do Americans prefer for the regulation of drones? and (b) Does the public believe the federal, state, or local government or nongovernmental actors should be responsible for regulating drone use? Public preferences are one of several important inputs affecting policymaking; therefore, our results provide an important overview of current public opinion toward drone policy, as well as a theoretical blueprint for understanding how such opinions might fluctuate overtime.


2017 ◽  
Vol 23 (3) ◽  
pp. 155-162 ◽  
Author(s):  
Jan Drozd ◽  
Zdeněk Flasar

Abstract Unmanned aerial vehicles, drones and other similar equipment are having a boom nowadays. Moreover, the usage of those modern technologies is also significant within armies. Unmanned aerial vehicles are extensively use within most of the military activities all over the world mainly on the battalion level and above. This paper is focused to discuss the usage of this technology on tactical level, particularly by squad and squad size units. The paper deals mainly with influence of unmanned aerial vehicles on troops leading procedure. The main methods of this paper are outcomes from the realized experiment. It shows on examples specific impact on all steps of the troops leading procedure. The experiment revealed interesting data and some possible conclusion were made. The primarily target of this paper is experience military personnel dealing with this topic. The paper should open broad discussion focused on all steps of troops leading procedure and outline the possible way of troops leading procedure update. Unmanned aerial vehicles, drones and other modern technology providing almost online information to the squad leader could significantly influence all steps of the troop leading procedure, safe preparation time as well as lives of the troops.


Sign in / Sign up

Export Citation Format

Share Document