Sökning: "Reconnaissance"
Visar resultat 11 - 15 av 88 uppsatser innehållade ordet Reconnaissance.
11. Optimal Path Planning for Aerial Swarm in Area Exploration
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : This thesis presents an approach to solve an optimal path planning problem for a swarm of drones. We optimize and improve information retrieval in area exploration within applications such a ‘Search and Rescue’-missions or reconnaissance missions. For this, dynamic programming has been used as a solving approach for a optimization problem. LÄS MER
12. Risking Data in Risk Contexts is Risky Business : Designing for Crisis Response in Relation to Surveillance, Transparency, and its Interaction Patterns
Master-uppsats, Malmö universitet/Institutionen för konst, kultur och kommunikation (K3)Sammanfattning : As the world gets more exposed to natural hazards, new practices of response to crisis have become a topic that requires innovation. FindMe Tag is a device designed in partnership with Frog and Sony that provides rescue teams with information on victims’ locations and their medical conditions. LÄS MER
13. Undersökning av markstödens betydelse för lägesnoggrannhet hos ortomosaik fotogrammetriskt genererade med UAV-bilder
Kandidat-uppsats, Karlstads universitet/Fakulteten för hälsa, natur- och teknikvetenskap (from 2013)Sammanfattning : Syftet med examensarbetet är att undersöka markstödens placeringar och fördelningar i plan och om höjden har en inverkan på noggrannheten i ortomosaik. En jämförelse genomförs mellan totalstation och UAV-koordinater. LÄS MER
14. Drönarsvärmar inom ramen för spaningsuppdrag
Uppsats för yrkesexamina på grundnivå, FörsvarshögskolanSammanfattning : Today, drones are used in both a civilian and military context, a swarm being a group of autonomous drones which are partly controlled by an operator. Swarms are a concept that is still in the research stage and previous research has consisted of how a swarm will communicate with the operator and how the swarm will work technically. LÄS MER
15. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system
Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknikSammanfattning : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. LÄS MER