Results 41 to 50 of about 175,410 (284)

DVS: A Drone Video Synopsis towards Storing and Analyzing Drone Surveillance Data in Smart Cities

open access: yesSystems, 2022
The commercialization and advancement of unmanned aerial vehicles (UAVs) have increased in the past decades for surveillance. UAVs use gimbal cameras and LIDAR technology for monitoring as they are resource-constrained devices that are composed of ...
Palash Yuvraj Ingle   +2 more
doaj   +1 more source

Accuracy Assessment on Drone Measured Heights at Different Height Levels [PDF]

open access: yes, 2017
The advancement in unmanned aerial system (UAS) technology has made it possible to attain an aerial unit, commonly known as a drone, at an affordable price with increasing precision and accuracy in positioning and photographing.
Hung, I-Kuai   +3 more
core   +1 more source

3GPP-inspired Stochastic Geometry-based Mobility Model for a Drone Cellular Network

open access: yes, 2019
This paper deals with the stochastic geometry-based characterization of the time-varying performance of a drone cellular network in which the initial locations of drone base stations (DBSs) are modeled as a Poisson point process (PPP) and each DBS is ...
Banagar, Morteza, Dhillon, Harpreet S.
core   +1 more source

Age‐Related Characteristics of SYT1‐Associated Neurodevelopmental Disorder

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objectives We describe the clinical manifestations and developmental abilities of individuals with SYT1‐associated neurodevelopmental disorder (Baker‐Gordon syndrome) from infancy to adulthood. We further describe the neuroradiological and electrophysiological characteristics of the condition at different ages, and explore the associations ...
Sam G. Norwitz   +3 more
wiley   +1 more source

Post-disaster 4G/5G Network Rehabilitation using Drones: Solving Battery and Backhaul Issues [PDF]

open access: yes, 2018
Drone-based communications is a novel and attractive area of research in cellular networks. It provides several degrees of freedom in time (available on demand), space (mobile) and it can be used for multiple purposes (self-healing, offloading, coverage ...
Kamal, Ahmed   +2 more
core   +3 more sources

Optimal allocation of defibrillator drones in mountainous regions [PDF]

open access: yes, 2019
Responding to emergencies in Alpine terrain is quite challenging as air ambulances and mountain rescue services are often confronted with logistics challenges and adverse weather conditions that extend the response times required to provide life-saving ...
Hungerländer, Philipp   +5 more
core   +2 more sources

Characterization of Defect Distribution in an Additively Manufactured AlSi10Mg as a Function of Processing Parameters and Correlations with Extreme Value Statistics

open access: yesAdvanced Engineering Materials, EarlyView.
Predicting extreme defects in additive manufacturing remains a key challenge limiting its structural reliability. This study proposes a statistical framework that integrates Extreme Value Theory with advanced process indicators to explore defect–process relationships and improve the estimation of critical defect sizes. The approach provides a basis for
Muhammad Muteeb Butt   +8 more
wiley   +1 more source

A drone is a drone is a drone

open access: yes, 2020
GPIL - German Practice in International ...
openaire   +2 more sources

A Workflow to Accelerate Microstructure‐Sensitive Fatigue Life Predictions

open access: yesAdvanced Engineering Materials, EarlyView.
This study introduces a workflow to accelerate predictions of microstructure‐sensitive fatigue life. Results from frameworks with varying levels of simplification are benchmarked against published reference results. The analysis reveals a trade‐off between accuracy and model complexity, offering researchers a practical guide for selecting the optimal ...
Luca Loiodice   +2 more
wiley   +1 more source

A Survey on Air-Gap Attacks: Fundamentals, Transport Means, Attack Scenarios and Challenges

open access: yesSensors, 2023
Major public institutions and organizations that handle sensitive data frequently enforce strong security policies by implementing network separation policies that segregates their internal work networks and internet network using air gaps to prevent the
Jangyong Park   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy