Details

Unmanned Aerial Vehicles for Internet of Things (IoT)


Unmanned Aerial Vehicles for Internet of Things (IoT)

Concepts, Techniques, and Applications
1. Aufl.

von: Vandana Mohindru, Yashwant Singh, Ravindara Bhatt, Anuj Kumar Gupta

184,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 12.07.2021
ISBN/EAN: 9781119769163
Sprache: englisch
Anzahl Seiten: 320

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>UNMANNED AERIAL VEHICLES FOR INTERNET OF THINGS</b> <p><b>This comprehensive book deeply discusses the theoretical and technical issues of unmanned aerial vehicles for deployment by industries and civil authorities in Internet of Things (IoT) systems. </b> <p>Unmanned aerial vehicles (UAVs) has become one of the rapidly growing areas of technology, with widespread applications covering various domains. UAVs play a very important role in delivering Internet of Things (IoT) services in small and low-power devices such as sensors, cameras, GPS receivers, etc. These devices are energy-constrained and are unable to communicate over long distances. The UAVs work dynamically for IoT applications in which they collect data and transmit it to other devices that are out of communication range. Furthermore, the benefits of the UAV include deployment at remote locations, the ability to carry flexible payloads, reprogrammability during tasks, and the ability to sense for anything from anywhere. Using IoT technologies, a UAV may be observed as a terminal device connected with the ubiquitous network, where many other UAVs are communicating, navigating, controlling, and surveilling in real time and beyond line-of-sight. <p>The aim of the 15 chapters in this book help to realize the full potential of UAVs for the IoT by addressing its numerous concepts, issues and challenges, and develops conceptual and technological solutions for handling them. Applications include such fields as disaster management, structural inspection, goods delivery, transportation, localization, mapping, pollution and radiation monitoring, search and rescue, farming, etc. In addition, the book covers: <ul><li>Efficient energy management systems in UAV-based IoT networks</li> <li>IoE enabled UAVs</li> <li>Mind-controlled UAV using Brain-Computer Interface (BCI)</li> <li>The importance of AI in realizing autonomous and intelligent flying IoT</li> <li>Blockchain-based solutions for various security issues in UAV-enabled IoT</li> <li>The challenges and threats of UAVs such as hijacking, privacy, cyber-security, and physical safety.</li></ul> <p><b>Audience:</b> Researchers in computer science, Internet of Things (IoT), electronics engineering, as well as industries that use and deploy drones and other unmanned aerial vehicles.
<p>Preface xvii</p> <p><b>1 Unmanned Aerial Vehicle (UAV): A Comprehensive Survey 1<br /></b><i>Rohit Chaurasia and Vandana Mohindru</i></p> <p>1.1 Introduction 2</p> <p>1.2 Related Work 2</p> <p>1.3 UAV Technology 3</p> <p>1.3.1 UAV Platforms 3</p> <p>1.3.1.1 Fixed-Wing Drones 3</p> <p>1.3.1.2 Multi-Rotor Drones 4</p> <p>1.3.1.3 Single-Rotor Drones 5</p> <p>1.3.1.4 Fixed-Wing Hybrid VTOL 6</p> <p>1.3.2 Categories of the Military Drones 6</p> <p>1.3.3 How Drones Work 8</p> <p>1.3.3.1 Firmware—Platform Construction and Design 9</p> <p>1.3.4 Comparison of Various Technologies 10</p> <p>1.3.4.1 Drone Types & Sizes 10</p> <p>1.3.4.2 Radar Positioning and Return to Home 10</p> <p>1.3.4.3 GNSS on Ground Control Station 11</p> <p>1.3.4.4 Collision Avoidance Technology and Obstacle Detection 11</p> <p>1.3.4.5 Gyroscopic Stabilization, Flight Controllers and IMU 12</p> <p>1.3.4.6 UAV Drone Propulsion System 12</p> <p>1.3.4.7 Flight Parameters Through Telemetry 13</p> <p>1.3.4.8 Drone Security & Hacking 13</p> <p>1.3.4.9 3D Maps and Models With Drone Sensors 13</p> <p>1.3.5 UAV Communication Network 15</p> <p>1.3.5.1 Classification on the Basis of Spectrum Perspective 15</p> <p>1.3.5.2 Various Types of Radio communication Links 16</p> <p>1.3.5.3 VLOS (Visual Line-of-Sight) and BLOS (Beyond Line-of-Sight) Communication in Unmanned Aircraft System 18</p> <p>1.3.5.4 Frequency Bands for the Operation of UAS 19</p> <p>1.3.5.5 Cellular Technology for UAS Operation 19</p> <p>1.4 Application of UAV 21</p> <p>1.4.1 In Military 21</p> <p>1.4.2 In Geomorphological Mapping and Other Similar Sectors 22</p> <p>1.4.3 In Agriculture 22</p> <p>1.5 UAV Challenges 23</p> <p>1.6 Conclusion and Future Scope 24</p> <p>References 24</p> <p><b>2 Unmanned Aerial Vehicles: State-of-the-Art, Challenges and Future Scope 29<br /></b><i>Jolly Parikh and Anuradha Basu</i></p> <p>2.1 Introduction 30</p> <p>2.2 Technical Challenges 30</p> <p>2.2.1 Variations in Channel Characteristics 32</p> <p>2.2.2 UAV-Assisted Cellular Network Planning and Provisioning 33</p> <p>2.2.3 Millimeter Wave Cellular Connected UAVs 34</p> <p>2.2.4 Deployment of UAV 35</p> <p>2.2.5 Trajectory Optimization 36</p> <p>2.2.6 On-Board Energy 37</p> <p>2.3 Conclusion 37</p> <p>References 37</p> <p><b>3 Battery and Energy Management in UAV-Based Networks 43<br /></b><i>Santosh Kumar, Amol Vasudeva and Manu Sood</i></p> <p>3.1 Introduction 43</p> <p>3.2 The Need for Energy Management in UAV-Based Communication Networks 45</p> <p>3.2.1 Unpredictable Trajectories of UAVs in Cellular UAV Networks 46</p> <p>3.2.2 Non-Homogeneous Power Consumption 47</p> <p>3.2.3 High Bandwidth Requirement/Low Spectrum Availability/Spectrum Scarcity 47</p> <p>3.2.4 Short-Range Line-of-Sight Communication 48</p> <p>3.2.5 Time Constraint (Time-Limited Spectrum Access) 48</p> <p>3.2.6 Energy Constraint 49</p> <p>3.2.7 The Joint Design for the Sensor Nodes’ Wake-Up Schedule and the UAV’s Trajectory (Data Collection) 49</p> <p>3.3 Efficient Battery and Energy Management Proposed Techniques in Literature 50</p> <p>3.3.1 Cognitive Radio (CR)-Based UAV Communication to Solve Spectrum Congestion 51</p> <p>3.3.2 Compressed Sensing 52</p> <p>3.3.3 Power Allocation and Position Optimization 53</p> <p>3.3.4 Non-Orthogonal Multiple Access (NOMA) 53</p> <p>3.3.5 Wireless Charging/Power Transfer (WPT) 54</p> <p>3.3.6 UAV Trajectory Design Using a Reinforcement Learning Framework in a Decentralized Manner 55</p> <p>3.3.7 Efficient Deployment and Movement of UAVs 55</p> <p>3.3.8 3D Position Optimization Mixed With Resource Allocation to Overcome Spectrum Scarcity and Limited Energy Constraint 56</p> <p>3.3.9 UAV-Enabled WSN: Energy-Efficient Data Collection 57</p> <p>3.3.10 Trust Management 57</p> <p>3.3.11 Self-Organization-Based Clustering 58</p> <p>3.3.12 Bandwidth/Spectrum-Sharing Between UAVs 59</p> <p>3.3.13 Using Millimeter Wave With SWIPT 59</p> <p>3.3.14 Energy Harvesting 60</p> <p>3.4 Conclusion 61</p> <p>References 67</p> <p><b>4 Energy Efficient Communication Methods for Unmanned Ariel Vehicles (UAVs): Last Five Years’ Study 73<br /></b><i>Nagesh Kumar</i></p> <p>4.1 Introduction 73</p> <p>4.1.1 Introduction to UAV 74</p> <p>4.1.2 Communication in UAV 75</p> <p>4.2 Literature Survey Process 77</p> <p>4.2.1 Research Questions 77</p> <p>4.2.2 Information Source 77</p> <p>4.3 Routing in UAV 78</p> <p>4.3.1 Communication Methods in UAV 78</p> <p>4.3.1.1 Single-Hop Communication 79</p> <p>4.3.1.2 Multi-Hop Communication 80</p> <p>4.4 Challenges and Issues 82</p> <p>4.4.1 Energy Consumption 82</p> <p>4.4.2 Mobility of Devices 82</p> <p>4.4.3 Density of UAVs 82</p> <p>4.4.4 Changes in Topology 85</p> <p>4.4.5 Propagation Models 85</p> <p>4.4.6 Security in Routing 85</p> <p>4.5 Conclusion 85</p> <p>References 86</p> <p><b>5 A Review on Challenges and Threats to Unmanned Aerial Vehicles (UAVs) 89<br /></b><i>Shaik Johny Basha and Jagan Mohan Reddy Danda</i></p> <p>5.1 Introduction 89</p> <p>5.2 Applications of UAVs and Their Market Opportunity 90</p> <p>5.2.1 Applications 90</p> <p>5.2.2 Market Opportunity 92</p> <p>5.3 Attacks and Solutions to Unmanned Aerial Vehicles (UAVs) 92</p> <p>5.3.1 Confidentiality Attacks 93</p> <p>5.3.2 Integrity Attacks 95</p> <p>5.3.3 Availability Attacks 96</p> <p>5.3.4 Authenticity Attacks 97</p> <p>5.4 Research Challenges 99</p> <p>5.4.1 Security Concerns 99</p> <p>5.4.2 Safety Concerns 99</p> <p>5.4.3 Privacy Concerns 100</p> <p>5.4.4 Scalability Issues 100</p> <p>5.4.5 Limited Resources 100</p> <p>5.5 Conclusion 101</p> <p>References 101</p> <p><b>6 Internet of Things and UAV: An Interoperability Perspective 105<br /></b><i>Bharti Rana and Yashwant Singh</i></p> <p>6.1 Introduction 106</p> <p>6.2 Background 108</p> <p>6.2.1 Issues, Controversies, and Problems 109</p> <p>6.3 Internet of Things (IoT) and UAV 110</p> <p>6.4 Applications of UAV-Enabled IoT 113</p> <p>6.5 Research Issues in UAV-Enabled IoT 114</p> <p>6.6 High-Level UAV-Based IoT Architecture 117</p> <p>6.6.1 UAV Overview 117</p> <p>6.6.2 Enabling IoT Scalability 119</p> <p>6.6.3 Enabling IoT Intelligence 120</p> <p>6.6.4 Enabling Diverse IoT Applications 121</p> <p>6.7 Interoperability Issues in UAV-Based IoT 121</p> <p>6.8 Conclusion 123</p> <p>References 124</p> <p><b>7 Practices of Unmanned Aerial Vehicle (UAV) for Security Intelligence 129<br /></b><i>Swarnjeet Kaur, Kulwant Singh and Amanpreet Singh</i></p> <p>7.1 Introduction 130</p> <p>7.2 Military 132</p> <p>7.3 Attack 133</p> <p>7.4 Journalism 134</p> <p>7.5 Search and Rescue 136</p> <p>7.6 Disaster Relief 138</p> <p>7.7 Conclusion 139</p> <p>References 139</p> <p><b>8 Blockchain-Based Solutions for Various Security Issues in UAV-Enabled IoT 143<br /></b><i>Madhuri S. Wakode and Rajesh B. Ingle</i></p> <p>8.1 Introduction 144</p> <p>8.1.1 Organization of the Work 145</p> <p>8.2 Introduction to UAV and IoT 145</p> <p>8.2.1 UAV 145</p> <p>8.2.2 IoT 146</p> <p>8.2.3 UAV-Enabled IoT 147</p> <p>8.2.4 Blockchain 150</p> <p>8.3 Security and Privacy Issues in UAV-Enabled IoT 151</p> <p>8.4 Blockchain-Based Solutions to Various Security Issues 153</p> <p>8.5 Research Directions 154</p> <p>8.6 Conclusion 154</p> <p>8.7 Future Work 155</p> <p>References 155</p> <p><b>9 Efficient Energy Management Systems in UAV-Based IoT Networks 159<br /></b><i>V. Mounika Reddy, Neelima K. and G. Naresh</i></p> <p>9.1 Introduction 160</p> <p>9.2 Energy Harvesting Methods 161</p> <p>9.2.1 Basic Energy Harvesting Mechanisms 162</p> <p>9.2.2 Markov Decision Process-Based Energy Harvesting Mechanisms 163</p> <p>9.2.3 mm Wave Energy Harvesting Mechanism 164</p> <p>9.2.4 Full Duplex Wireless Energy Harvesting Mechanism 165</p> <p>9.3 Energy Recharge Methods 165</p> <p>9.4 Efficient Energy Utilization Methods 166</p> <p>9.4.1 GLRM Method 166</p> <p>9.4.2 DRL Mechanism 167</p> <p>9.4.3 Onboard Double Q-Learning Mechanism 168</p> <p>9.4.4 Collision-Free Scheduling Mechanism 168</p> <p>9.5 Conclusion 170</p> <p>References 170</p> <p><b>10 A Survey on IoE-Enabled Unmanned Aerial Vehicles 173<br /></b><i>K. Siddharthraju, R. Dhivyadevi, M. Supriya, B. Jaishankar and Shanmugaraja T.</i></p> <p>10.1 Introduction 174</p> <p>10.2 Overview of Internet of Everything 176</p> <p>10.2.1 Emergence of IoE 176</p> <p>10.2.2 Expectation of IoE 177</p> <p>10.2.2.1 Scalability 177</p> <p>10.2.2.2 Intelligence 178</p> <p>10.2.2.3 Diversity 178</p> <p>10.2.3 Possible Technologies 179</p> <p>10.2.3.1 Enabling Scalability 179</p> <p>10.2.3.2 Enabling Intelligence 180</p> <p>10.2.3.3 Enabling Diversity 180</p> <p>10.2.4 Challenges of IoE 181</p> <p>10.2.4.1 Coverage Constraint 181</p> <p>10.2.4.2 Battery Constraint 181</p> <p>10.2.4.3 Computing Constraint 181</p> <p>10.2.4.4 Security Constraint 182</p> <p>10.3 Overview of Unmanned Aerial Vehicle (UAV) 182</p> <p>10.3.1 Unmanned Aircraft System (UAS) 183</p> <p>10.3.2 UAV Communication Networks 183</p> <p>10.3.2.1 Ad Hoc Multi-UAV Networks 183</p> <p>10.3.2.2 UAV-Aided Communication Networks 184</p> <p>10.4 UAV and IoE Integration 184</p> <p>10.4.1 Possibilities to Carry UAVs 184</p> <p>10.4.1.1 Widespread Connectivity 185</p> <p>10.4.1.2 Environmentally Aware 185</p> <p>10.4.1.3 Peer-Maintenance of Communications 185</p> <p>10.4.1.4 Detector Control and Reusing 185</p> <p>10.4.2 UAV-Enabled IoE 186</p> <p>10.4.3 Vehicle Detection Enabled IoE Optimization 186</p> <p>10.4.3.1 Weak-Connected Locations 186</p> <p>10.4.3.2 Regions with Low Network Support 186</p> <p>10.5 Open Research Issues 187</p> <p>10.6 Discussion 187</p> <p>10.6.1 Resource Allocation 187</p> <p>10.6.2 Universal Standard Design 188</p> <p>10.6.3 Security Mechanism 188</p> <p>10.7 Conclusion 189</p> <p>References 189</p> <p><b>11 Role of AI and Big Data Analytics in UAV-Enabled IoT Applications for Smart Cities 193<br /></b><i>Madhuri S. Wakode</i></p> <p>11.1 Introduction 194</p> <p>11.1.1 Related Work 195</p> <p>11.1.2 Contributions 195</p> <p>11.1.3 Organization of the Work 195</p> <p>11.2 Overview of UAV-Enabled IoT Systems 196</p> <p>11.2.1 UAV-Enabled IoT Systems for Smart Cities 197</p> <p>11.3 Overview of Big Data Analytics 197</p> <p>11.4 Big Data Analytics Requirements in UAV-Enabled IoT Systems 198</p> <p>11.4.1 Big Data Analytics in UAV-Enabled IoT Applications 199</p> <p>11.4.2 Big Data Analytics for Governance of UAV-Enabled IoT Systems 201</p> <p>11.5 Challenges 202</p> <p>11.6 Conclusion 202</p> <p>11.7 Future Work 203</p> <p>References 203</p> <p><b>12 Design and Development of Modular and Multifunctional UAV with Amphibious Landing, Processing and Surround Sense Module 207<br /></b><i>Lakshit Kohli, Manglesh Saurabh, Ishaan Bhatia, Nidhi Sindhwani and Manjula Vijh</i></p> <p>12.1 Introduction 208</p> <p>12.2 Existing System 208</p> <p>12.3 Proposed System 210</p> <p>12.4 IoT Sensors and Architecture 212</p> <p>12.4.1 Sensors and Theory 212</p> <p>12.4.2 Architectures Available 213</p> <p>12.4.2.1 3-Layer IoT Architecture 213</p> <p>12.4.2.2 5-Layer IoT Architecture 214</p> <p>12.4.2.3 Architecture & Supporting Modules 215</p> <p>12.4.2.4 Integration Approach 215</p> <p>12.4.2.5 System of Modules 216</p> <p>12.5 Advantages of the Proposed System 217</p> <p>12.6 Design 218</p> <p>12.6.1 System Design 219</p> <p>12.6.2 Auto-Leveling 219</p> <p>12.6.3 Amphibious Landing Module 221</p> <p>12.6.4 Processing Module 223</p> <p>12.6.5 Surround Sense Module 223</p> <p>12.7 Results 224</p> <p>12.8 Conclusion 227</p> <p>12.9 Future Scope 228</p> <p>References 228</p> <p><b>13 Mind Controlled Unmanned Aerial Vehicle (UAV) Using Brain–Computer Interface (BCI) 231<br /></b><i>Prasath M.S., Naveen R. and Sivaraj G.</i></p> <p>13.1 Introduction 232</p> <p>13.1.1 Classification of UAVs 232</p> <p>13.1.2 Drone Controlling 232</p> <p>13.2 Mind-Controlled UAV With BCI Technology 233</p> <p>13.3 Layout and Architecture of BCI Technology 234</p> <p>13.4 Hardware Components 235</p> <p>13.4.1 Neurosky Mindwave Headset 235</p> <p>13.4.2 Microcontroller Board—Arduino 236</p> <p>13.4.3 A Computer 237</p> <p>13.4.4 Drone for Quadcopter 238</p> <p>13.5 Software Components 239</p> <p>13.5.1 Processing P3 Software 239</p> <p>13.5.2 Arduino IDE Software 240</p> <p>13.5.3 ThinkGear Connector 240</p> <p>13.6 Hardware and Software Integration 241</p> <p>13.7 Conclusion 243</p> <p>References 244</p> <p><b>14 Precision Agriculture With Technologies for Smart Farming Towards Agriculture 5.0 247<br /></b><i>Dhirendra Siddharth, Dilip Kumar Saini and Ajay Kumar</i></p> <p>14.1 Introduction 247</p> <p>14.2 Drone Technology as an Instrument for Increasing Farm Productivity 248</p> <p>14.3 Mapping and Tracking of Rice Farm Areas With Information and Communication Technology (ICT) and Remote Sensing Technology 249</p> <p>14.3.1 Methodology and Development of ICT 250</p> <p>14.4 Strong Intelligence From UAV to the Agricultural Sector 252</p> <p>14.4.1 Latest Agricultural Drone History 252</p> <p>14.4.2 The Challenges 254</p> <p>14.4.3 SAP’s Next Wave of Drone Technologies 254</p> <p>14.4.4 SAP Connected Agriculture 256</p> <p>14.4.5 Cases of Real-World Use 257</p> <p>14.4.5.1 Crop Surveying 257</p> <p>14.4.5.2 Capture the Plantation 258</p> <p>14.4.5.3 Image Processing 258</p> <p>14.4.5.4 Working to Create GeoTiles and an Image Pyramid 259</p> <p>14.5 Drones-Based Sensor Platforms 260</p> <p>14.5.1 Context and Challenges 260</p> <p>14.5.2 Stakeholder and End Consumer Benefits 261</p> <p>14.5.3 The Technology 262</p> <p>14.5.3.1 Provisions of the Unmanned Aerial Vehicles 262</p> <p>14.6 Jobs of Space Technology in Crop Insurance 263</p> <p>14.7 The Institutionalization of Drone Imaging Technologies in Agriculture for Disaster Managing Risk 267</p> <p>14.7.1 A Modern Working 267</p> <p>14.7.2 Discovering Drone Mapping Technology 268</p> <p>14.7.3 From Lowland to Uplands, Drone Mapping Technology 269</p> <p>14.7.4 Institutionalization of Drone Monitoring Systems and Farming Capability 269</p> <p>14.8 Usage of Internet of Things in Agriculture and Use of Unmanned Aerial Vehicles 270</p> <p>14.8.1 System and Application Based on UAV-WSN 270</p> <p>14.8.2 Using a Complex Comprehensive System 271</p> <p>14.8.3 Benefits Assessment of Conventional System and the UAV-Based System 271</p> <p>14.8.3.1 Merit 272</p> <p>14.8.3.2 Saving Expenses 272</p> <p>14.8.3.3 Traditional Agriculture 273</p> <p>14.8.3.4 UAV-WSN System-Based Agriculture 273</p> <p>14.9 Conclusion 273</p> <p>References 273</p> <p><b>15 IoT-Based UAV Platform Revolutionized in Smart Healthcare 277<br /></b><i>Umesh Kumar Gera, Dilip Kumar Saini, Preeti Singh and Dhirendra Siddharth</i></p> <p>15.1 Introduction 278</p> <p>15.2 IoT-Based UAV Platform for Emergency Services 279</p> <p>15.3 Healthcare Internet of Things: Technologies, Advantages 281</p> <p>15.3.1 Advantage 281</p> <p>15.3.1.1 Concurrent Surveillance and Tracking 281</p> <p>15.3.1.2 From End-To-End Networking and Availability 282</p> <p>15.3.1.3 Information and Review Assortment 282</p> <p>15.3.1.4 Warnings and Recording 282</p> <p>15.3.1.5 Wellbeing Remote Assistance 283</p> <p>15.3.1.6 Research 283</p> <p>15.3.2 Complications 283</p> <p>15.3.2.1 Privacy and Data Security 283</p> <p>15.3.2.2 Integration: Various Protocols and Services 284</p> <p>15.3.2.3 Overload and Accuracy of Data 284</p> <p>15.3.2.4 Expenditure 284</p> <p>15.4 Healthcare’s IoT Applications: Surgical and Medical Applications of Drones 285</p> <p>15.4.1 Hearables 285</p> <p>15.4.2 Ingestible Sensors 285</p> <p>15.4.3 Moodables 285</p> <p>15.4.4 Technology of Computer Vision 286</p> <p>15.4.5 Charting for Healthcare 286</p> <p>15.5 Drones That Will Revolutionize Healthcare 286</p> <p>15.5.1 Integrated Enhancement in Efficiency 286</p> <p>15.5.2 Offering Personalized Healthcare 287</p> <p>15.5.3 The Big Data Manipulation 287</p> <p>15.5.4 Safety and Privacy Optimization 287</p> <p>15.5.5 Enabling M2M Communication 288</p> <p>15.6 Healthcare Revolutionizing Drones 288</p> <p>15.6.1 Google Drones 288</p> <p>15.6.2 Healthcare Integrated Rescue Operations (HiRO) 289</p> <p>15.6.3 EHang 289</p> <p>15.6.4 TU Delft 289</p> <p>15.6.5 Project Wing 289</p> <p>15.6.6 Flirtey 289</p> <p>15.6.7 Seattle’s VillageReach 290</p> <p>15.6.8 ZipLine 290</p> <p>15.7 Conclusion 290</p> <p>References 290</p> <p>Index 295</p>
<p><b>Vandana Mohindru</b> PhD is an assistant professor in the Department of Computer Science and Engineering, Chandigarh Group of Colleges, Mohali, Punjab, India. Her research interests are in the areas of Internet of Things, wireless sensor networks, security, blockchain and cryptography, unmanned aerial vehicles. She has published more than 20 technical research papers in leading journals and conferences. </p> <p><b>Yashwant Singh</b> PhD is an associate professor & Head in the Department of Computer Science & Information Technology at the Central University of Jammu. His research interests lie in the area of Internet of Things, wireless sensor networks, unmanned aerial vehicles, cybersecurity. He has published more than 70 research articles in the international journals and conferences. <p><b>Ravindara Bhatt</b> PhD is an assistant professor at Jaypee University of Information Technology, Solan, H.P., India. He has over 20 years of experience in academics and industry in India. He has published more than 30 research papers in leading journals and conferences. His areas of research include sensor networks, deployment modeling, communication, and energy-efficient algorithms, security and unmanned aerial vehicles. <p><b>Anuj Kumar Gupta</b> PhD is professor & Head in CSE at Chandigarh Group of Colleges, Mohali, Punjab, India. He has published 100+ research papers in reputed journals.
<p><b>This comprehensive book deeply discusses the theoretical and technical issues of unmanned aerial vehicles for deployment by industries and civil authorities in Internet of Things (IoT) systems. </b></p> <p>Unmanned aerial vehicles (UAVs) has become one of the rapidly growing areas of technology, with widespread applications covering various domains. UAVs play a very important role in delivering Internet of Things (IoT) services in small and low-power devices such as sensors, cameras, GPS receivers, etc. These devices are energy-constrained and are unable to communicate over long distances. The UAVs work dynamically for IoT applications in which they collect data and transmit it to other devices that are out of communication range. Furthermore, the benefits of the UAV include deployment at remote locations, the ability to carry flexible payloads, reprogrammability during tasks, and the ability to sense for anything from anywhere. Using IoT technologies, a UAV may be observed as a terminal device connected with the ubiquitous network, where many other UAVs are communicating, navigating, controlling, and surveilling in real time and beyond line-of-sight. <p>The aim of the 15 chapters in this book help to realize the full potential of UAVs for the IoT by addressing its numerous concepts, issues and challenges, and develops conceptual and technological solutions for handling them. Applications include such fields as disaster management, structural inspection, goods delivery, transportation, localization, mapping, pollution and radiation monitoring, search and rescue, farming, etc. In addition, the book covers: <ul><li>Efficient energy management systems in UAV-based IoT networks</li> <li>IoE enabled UAVs</li> <li>Mind-controlled UAV using Brain-Computer Interface (BCI)</li> <li>The importance of AI in realizing autonomous and intelligent flying IoT</li> <li>Blockchain-based solutions for various security issues in UAV-enabled IoT</li> <li>The challenges and threats of UAVs such as hijacking, privacy, cyber-security, and physical safety.</li></ul> <p><b>Audience:</b> Researchers in computer science, Internet of Things (IoT), electronics engineering, as well as industries that use and deploy drones and other unmanned aerial vehicles.

Diese Produkte könnten Sie auch interessieren:

MDX Solutions
MDX Solutions
von: George Spofford, Sivakumar Harinath, Christopher Webb, Dylan Hai Huang, Francesco Civardi
PDF ebook
53,99 €
Concept Data Analysis
Concept Data Analysis
von: Claudio Carpineto, Giovanni Romano
PDF ebook
107,99 €
Handbook of Virtual Humans
Handbook of Virtual Humans
von: Nadia Magnenat-Thalmann, Daniel Thalmann
PDF ebook
150,99 €