Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Engineering
Urban Flow And Small Unmanned Aerial System Operations In The Built Environment, Kevin A. Adkins
Urban Flow And Small Unmanned Aerial System Operations In The Built Environment, Kevin A. Adkins
International Journal of Aviation, Aeronautics, and Aerospace
The Federal Aviation Administration (FAA) has put forth a set of regulations (Part 107) that govern small unmanned aerial system (sUAS) operations. These regulations restrict unmanned aircraft (UA) from flying over people and their operation to within visual line of sight (VLOS). However, as new applications for unmanned aerial systems (UAS) are discovered, their capabilities improve, and regulations evolve, there is an increasing desire to undertake urban operations, such as urban air mobility, package delivery, infrastructure inspection, and surveillance. This built environment poses new weather hazards that include enhanced wind shear and turbulence. The smaller physical dimensions, lower mass and …
Examining Unmanned Aerial System Threats & Defenses: A Conceptual Analysis, Ryan J. Wallace, Jon M. Loffi
Examining Unmanned Aerial System Threats & Defenses: A Conceptual Analysis, Ryan J. Wallace, Jon M. Loffi
International Journal of Aviation, Aeronautics, and Aerospace
The integration of unmanned aerial systems (UAS) into the already complex global aviation system presents new and unique hazards. While many studies have addressed the potential safety concerns of UAS integration, little research has been dedicated to the potential security implications. This study sought to identify potential uses and adaptations of civil UAS systems as weapons of terrorism or crime and potential UAS defenses. Researchers examined 68 academic studies, unclassified government reports, and news articles using Conceptual Analysis to systematically capture and categorize various threats. Using the collected data, researchers developed a UAS threat model for categorically evaluating potential threats. …