Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Aviation Safety and Security

Embry-Riddle Aeronautical University

UAS

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Urban Flow And Small Unmanned Aerial System Operations In The Built Environment, Kevin A. Adkins Jan 2019

Urban Flow And Small Unmanned Aerial System Operations In The Built Environment, Kevin A. Adkins

International Journal of Aviation, Aeronautics, and Aerospace

The Federal Aviation Administration (FAA) has put forth a set of regulations (Part 107) that govern small unmanned aerial system (sUAS) operations. These regulations restrict unmanned aircraft (UA) from flying over people and their operation to within visual line of sight (VLOS). However, as new applications for unmanned aerial systems (UAS) are discovered, their capabilities improve, and regulations evolve, there is an increasing desire to undertake urban operations, such as urban air mobility, package delivery, infrastructure inspection, and surveillance. This built environment poses new weather hazards that include enhanced wind shear and turbulence. The smaller physical dimensions, lower mass and …


Suas: Cybersecurity Threats, Vulnerabilities, And Exploits, Philip Craiger, Gary Kessler, William Rose Aug 2018

Suas: Cybersecurity Threats, Vulnerabilities, And Exploits, Philip Craiger, Gary Kessler, William Rose

National Training Aircraft Symposium (NTAS)

The FAA predicts that purchases of hobbyist small unmanned aerial systems (sUAS) will grow from 1.9 million in 2016 to 4.3 million by 2020, and commercial sUAS to increase from 600,000 in 2016 to 2.7 million by 2020. sUAS, often referred to as 'drones,' are comprised of aeronautical hardware, a CPU, RAM, onboard storage, radio frequency communications, sensors, a camera, and a controller used by the pilot-in-command (PIC). Some have argued that a sUAS is essentially a flying computer. As such, sUAS are sometimes susceptible to many of the types of attacks that are often used on PC-based computers attached …