Review of Unmanned Aircraft System (UAS)
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 4
Abstract
Unmanned Aircraft Systems (UAS) is an emerging technology with a tremendous potential to revolutionize warfare and to enable new civilian applications. It is integral part of future urban civil and military applications. It technologically matures enough to be integrated into civil society. The importance of UAS in scientific applications has been thoroughly demonstrated in recent years (DoD, 2010). Whatever missions are chosen for the UAS, their number and use will significantly increase in the future. UAS today play an increasing role in many public missions such as border surveillance, wildlife surveys, military training, weather monitoring, and local law enforcement. Challenges such as the lack of an on-board pilot to see and avoid other aircraft and the wide variation in unmanned aircraft missions and capabilities must be addressed in order to fully integrate UAS operations in the NAS in the Next Gen time frame. UAVs are better suited for dull, dirty, or dangerous missions than manned aircraft. UAS are mainly used for intelligence, surveillance and reconnaissance (ISR), border security, counter insurgency, attack and strike, target identification and designation, communications relay, electronic attack, law enforcement and security applications, environmental monitoring and agriculture, remote sensing, aerial mapping and meteorology. Although armed forces around the world continue to strongly invest in researching and developing technologies with the potential to advance the capabilities of UAS
Authors and Affiliations
Suraj G. Gupta , Mangesh M. Ghonge , Dr. P. M. Jawandhiya
Optimize Space Search Using FCC_STF Algorithm in Fuzzy Co-Clustering through Search Engine
Fuzzy co-clustering can be improved if we handle two main problem first is outlier and second curse of dimensionality .outlier problem can be reduce by implementing page replacement algorithm like FIFO, LRU or prio...
Data Mining: Estimation of Missing Values Using Lagrange Interpolation Technique
In the real world Most of the datasets have missing data. The presence of missing values in a dataset can affect the performance of Mining Algorithms. In this paper we are using Lagrange interpolation method for predicti...
On Fault Tolerance of Resources in Grid Environment
Abstract—Grid computing, most simply stated, is distributed computing taken to the next evolutionary level. The goal is to create the illusion of a simple yet large and powerful self managing virtual computer out of a...
Inventory Management System Software for Public Universities in Ghana (IMSSPUG)
Managing inventories at Public Universities is one of the major challenges for higher educational institutions in Ghana. This is especially true for large, diverse and research-oriented institutions like the University f...
Implementation of Soft Handover in IEEE 802.16e
The demand for high data rates is increasing day by day, so to fulfill this requirement a new technology is introduced named WiMAX IEEE 802.16e standard. IEEE 802.16e standard is the enhanced version of IEEE 802.16 stand...