• Title/Summary/Keyword: Commercial Drone

Search Result 53, Processing Time 0.03 seconds

Development of the Connection Unit with a Gas Gun Installed in a Quadcopter-type Drone (쿼드콥터형 드론에 설치된 가스총 결합유닛의 개발)

  • Jeon, Junha;Kang, Ki-Jun;Kwon, Hyun-Jin;Chang, Se-Myong;Jeong, Jae-Bok;Baek, Jae-Gu
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.9
    • /
    • pp.774-781
    • /
    • 2018
  • In this investigation, a gas gun is proposed driven by carbon dioxide gas and installed on a quadcopter-type small unmanned drone for the purpose of cattle vaccination, and we developed a launcher and its connection unit. The system consists of a commercial drone, a gas gun, a solenoid valve, and the remote communication controller, etc. The velocity of launched projectile is measured, and the full system is finally validated through ground test and flight examination loaded for the real aircraft. The feasibility is checked if this technology is applicable to various disease abatement and hazard mitigation in the fields of agriculture and fire-fighting with the present research and development.

The development and application of commercial drone for multi purpose (상용드론 기반의 다목적 전술드론 개발과 활용방안)

  • Jeong, Jin-Man;Oh, Se-Jin;Hwang, Yeong-Ju
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2016.11a
    • /
    • pp.289-291
    • /
    • 2016
  • 본 논문에서는 최근 전투양상과 테러관련 사례를 바탕으로 미래 전장 환경과 테러에 대비하기 위한 하나의 수단으로 무인비행체 드론을 중심으로 연구 과제를 도출하고자 한다. 그중에서 고가의 드론이 아닌 상대적으로 저가인 상용드론을 기반으로 프로그래밍과 구조변경 등으로 소부대 전술에 적합한 다목적 드론을 개발하고 활용하는 방안을 연구 제시하는데 그 목적이 있다.

  • PDF

Vulnerability Case Analysis of Wireless Moving Vehicle (무선이동체의 취약점 사례 분석)

  • Oh, Sangyun;Hong, Jinkeun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.8
    • /
    • pp.41-46
    • /
    • 2018
  • As the industry related to drones has been activated, the public interest in drones has increased explosively, and many cases of drone-using are increasing. In the case of military drones, the security problem is the level of defense of the aircraft or cruise missiles, but commercial small and low cost drones are often released and utilized without security count-measure. This makes it possible for an attacker to easily gain access to the root of the drones, access internal files, or send fake packets. However, this droning problem can lead to another dangerous attack. In this regard, this paper has identified the vulnerabilities inherent in the commercial drones by analyzing the attack cases in the communication process of the specific drones. In this paper, we analyze and test the vulnerability in terms of scanning attack, meson attack, authentication revocation attack, packet stop command attack, packet retransmission attack, signal manipulation and de-compile attack. This study is useful for the analysis of drones attack and vulnerability.

A Review of Routing Plan for Unmanned Aerial Vehicle : Focused on In-Country Researches (국내 무인항공기의 경로계획 연구)

  • Kim, Jinwoo;Kim, Jinwook;Chae, Junjae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.212-225
    • /
    • 2015
  • UAV (Unmanned Aerial Vehicle), the pilotless plane or drone, draws researchers' attention at these days for its extended use to various area. The research was initiated for military use of the UAV, but the area of applicable field is extended to surveillance, communication, and even delivery for commercial use. As increasing the interest in UAV, the needs of research for operating the flying object which is not directly visible when it conducts a certain mission to remote place is obviously grown as much as developing high performance pilotless plane is required. One of the project supported by government is related to the use of UAV for logistics fields and controlling UAV to deliver the certain items to isolated or not-easy-to-access place is one of the important issues. At the initial stage of the project, the previous researches for controlling UAV need to be organized to understand current state of art in local researches. Thus, this study is one of the steps to develop the unmanned system for using in military or commercial. Specifically, we focused on reviewing the approaches of controlling UAV from origination to destination in previous in-country researches because the delivery involves the routing planning and the efficient and effective routing plan is critical to success to delivery mission using UAV. This routing plan includes the method to avoid the obstacles and reach the final destination without a crash. This research also present the classification and categorization of the papers and it could guide the researchers, who conduct researches and explore in comparable fields, to catch the current address of the research.

Study on Legal Regulations for Utilization of Drone in Private Security (민간경비에서 드론 활용과 법적 규제에 관한 연구)

  • Kim, Kye Won;Seo, Jin Seok
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.163-178
    • /
    • 2017
  • Recently, drone applications have been expanded not only in the military and security fields but also in daily life such as commercial and sports, and there is also a growing interest in using drone for private security work. This study focuses on the discussion on the use of drones in private security, drones regulation in the related laws such as the Private Security Act and the Aviation Safety Law, and major issues in accepting the Private Security Act. First, it focuses on the scope of private security work as defined by the Private Security Act, focusing on the use of drones as surveillance, information gathering, guidance and warning services, evacuation services, search and related material transport services, respectively. Second, the related laws for the use of drones in private security work include the Private Security Act and the Aviation Safety Act. However, the Private Security Act does not prescribe the current drones and the use of drones is regulated by Aviation Safety Act. Third, it is necessary to adjust the qualifications and authority range of security guards in the Private Security Act, to accept the drones as a type of security equipment, and to consider how countermeasures against threat types using drones should be accepted in the Private Security Act.

Hijacking Attack using Wireless Network Security Vulnerability in Drone and Its Countermeasure (드론의 무선 네트워크 보안 취약점을 이용한 탈취 및 대응)

  • Son, Juhwan;Sim, Jaebum;Lee, Jae-Gu;Cheong, Il-Ahn
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.327-330
    • /
    • 2017
  • In recent years, Drone(lightweight unmanned aerial vehicle) is used for broadcast shooting, disaster scene, leisure, observation and military purposes. However, as the use of drones increases the threat of hacking is also rising. Especially when a flying drone is seized, a dangerous situation can occur which is abused regardless of the driver's intention. Already in Iran and China, there is a case of hacking and stealing the drones of other countries under reconnaissance. In this paper, we analyze the security vulnerabilities of Wi-Fi and Bluetooth communication in wireless network which are used in drones for stealing the commercial drones. The results provide a countermeasure to safeguard the drones against attempts by the unauthorized attacker to take out the drones.

  • PDF

Tidal Flat DEM Generation and Seawater Changes Estimation at Hampyeong Bay Using Drone Images (드론을 이용한 함평만 갯벌 DEM 제작과 해수 변화량 파악)

  • Lee, Hyoseong;Kim, Duk-jin;Oh, Jaehong;Shin, Jungil;Jung, Jaesung
    • Korean Journal of Remote Sensing
    • /
    • v.33 no.3
    • /
    • pp.325-331
    • /
    • 2017
  • In this study, digital elevation models(DEM) of tidal flat, according to different times, was produced by means of the Drone and commercial software in order to measure seawater change during high tide at water-channel in the Hampyung Bay. To correct the produced DEMs of the tidal flat where is inaccessible to collect control points, the DEM matching method was applied by using the reference DEM, that is previously obtained, instead of the survey. After the ortho-image was made from the corrected DEM, the land cover classified image was produced. The changes of seawater amount according to the times were analyzed by using the classified images and DEMs. As a result, it was confirmed that the amount of water rapidly increased as the time passed during high tide.

Crack Inspection and Mapping of Concrete Bridges using Integrated Image Processing Techniques (통합 이미지 처리 기술을 이용한 콘크리트 교량 균열 탐지 및 매핑)

  • Kim, Byunghyun;Cho, Soojin
    • Journal of the Korean Society of Safety
    • /
    • v.36 no.1
    • /
    • pp.18-25
    • /
    • 2021
  • In many developed countries, such as South Korea, efficiently maintaining the aging infrastructures is an important issue. Currently, inspectors visually inspect the infrastructure for maintenance needs, but this method is inefficient due to its high costs, long logistic times, and hazards to the inspectors. Thus, in this paper, a novel crack inspection approach for concrete bridges is proposed using integrated image processing techniques. The proposed approach consists of four steps: (1) training a deep learning model to automatically detect cracks on concrete bridges, (2) acquiring in-situ images using a drone, (3) generating orthomosaic images based on 3D modeling, and (4) detecting cracks on the orthmosaic image using the trained deep learning model. Cascade Mask R-CNN, a state-of-the-art instance segmentation deep learning model, was trained with 3235 crack images that included 2415 hard negative images. We selected the Tancheon overpass, located in Seoul, South Korea, as a testbed for the proposed approach, and we captured images of pier 34-37 and slab 34-36 using a commercial drone. Agisoft Metashape was utilized as a 3D model generation program to generate an orthomosaic of the captured images. We applied the proposed approach to four orthomosaic images that displayed the front, back, left, and right sides of pier 37. Using pixel-level precision referencing visual inspection of the captured images, we evaluated the trained Cascade Mask R-CNN's crack detection performance. At the coping of the front side of pier 37, the model obtained its best precision: 94.34%. It achieved an average precision of 72.93% for the orthomosaics of the four sides of the pier. The test results show that this proposed approach for crack detection can be a suitable alternative to the conventional visual inspection method.

Conceptual Design and Flight Testing of a Synchropter Drone (Synchropter 드론의 개념설계 및 비행시험)

  • Chung, Injae;Moon, Jung-ho
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.48 no.12
    • /
    • pp.997-1004
    • /
    • 2020
  • A synchropter is a type of rotorcraft in which a pair of blades inclined with each other rotates in synchronization. Removing the tail rotor enables an efficient and compact configuration similar to a coaxial-rotor helicopter. This paper describes the design and flight test results of a small synchropter to examine the suitability of a drone system for the army. The synchropter in this paper is a small vehicle with a rotor diameter of 1.4m and a weight of 7kg and was assembled based on commercial parts to examine flight characteristics effectively. The flight control system adopted Pixhawk, which is designed based on an open-architecture. The model-based design technique is applied to develop the control law of the synchropter and a new firmware embedded on the Pixhawk. Through qualitative flight tests, we analyzed the flight characteristics. As a result of the analysis, we confirmed the possibility of application as a drone system of the synchropter.

Development of Processor Real-Time Monitoring Software for Drone Flight Control Computer Based on NUTTX (NUTTX 기반 드론 비행조종컴퓨터의 통합시험을 위한 프로세서 모니터링 연구)

  • Choi Jinwon
    • Journal of Platform Technology
    • /
    • v.10 no.4
    • /
    • pp.62-69
    • /
    • 2022
  • Flight control systems installed on unmanned aircraft require thorough verification from the design stage. This verification is made through the integrated flight control test environment. Typically, a debugger is used to monitor the internal state of a flight control computer in real time. Emulator with a real-time memory monitor and trace is relatively expensive. The JTAG Emulator is unable to operate in real time and has limitations that cannot be caught up with the processing speed of latest high-speed processors. In this paper, we describe the results of the development of internal monitoring software for drone flight control computer processors based on NUTTX/PIXHAWK. The results of this study show that the functions provided compared to commercial debugger are limited, but it can be sufficiently used to verify the flight control system using this system under limited budget.