Real-Time Tracking of Drone Targets
    • Last updated December 8, 2021
    • 0 comments, 145 views, 0 likes

More from Phillipes henry

  • How to detect UAS and execute counterdrone protection in Airports
    0 comments, 0 likes
  • Countering Terrorist Attacks with Droneshield\u2019s World-Class Technology
    0 comments, 0 likes
  • The Downsides Of Drones Outweigh The Benefits- A Myth
    0 comments, 0 likes

More in Politics

  • Norton antivirus account login
    31 comments, 144,887 views
  • Liquidity Locking Made Easy
    10 comments, 83,130 views
  • Ang jili178 login ay nagdudulot sa iyo ng mga laro ng slot at karanasan sa laro ng soccer
    2 comments, 46,591 views

Related Blogs

  • Cherish Memorable Times in Mizoram Escorts
    0 comments, 0 likes
  • Nitromethane
    0 comments, 0 likes
  • Professionals from all over the world prefer LinkedIn as their preferred online networking site, and Singapore is no different. LinkedIn enables small business owners, entrepreneurs, and other professionals to easily develop their networks from anywhere w
    0 comments, 0 likes

Archives

Social Share

Real-Time Tracking of Drone Targets

Posted By Phillipes henry     December 8, 2021    

Body

Validating a drone threat is surely a hard thing to do. However, Droneshield, who strives to evolve as a global leader in the field of optical detection and tracking has partnered with the University of Technology Sydney in crafting the award winning AI engine DroneOptID. The software is embedded with the latest in Computer Vision technology to detect, identify and track drone targets in real time. 

The presence of unmanned aerial systems flying over almost anywhere have posed several issues on security. This is the very reason for the existence of a counterdrone. For as long as the cause of the existence of these unmanned aerial systems are unknown, they remain classified as threats, thus, one has to establish some form of counterdrone protection. 

Most of the targets of these unmanned aerial systems are crowded places such as stadiums or concert halls, public markets and other public spaces. For closed spaces with a lot of people such as stadiums, Droneshield offers counterdrone stadiums. Installation may be done temporarily or you could opt for a fixed installation. The presence of counterdrone stadiums will enable tightened regulations on unmanned aerial systems. 

Comprehensive counterdrone defense is provided by Droneshield for a higher counterdrone protection from terrorists or disrupters. To slew and validate a drone threat, the AI powered Optical detection and Identification software developed by Droneshield shall take geographical and environmental data from other sensors. This is one feature that makes it an exquisite C-UAS tool. 

Another feature of this software is the fully comprehensive drone database. Operators can access past detection events and retrieve the camera recording with DroneOptID overlay as a means of high quality evidence collection. It is deployable so the counterdrone is ready to get some real-time tracking. Now this is what a sound counterdrone defense looks like. 

Other than the features of DroneOptID mentioned above, it has several benefits as a C-UAS tool such as the following:

The following are the benefits of the DroneOptID Software:

  1. Sensor Fusion - Uses detection data from DroneShield or third party radar and RF detectors in order to make decisions about where the target is located.
  2. Additional Data - Enhances camera’s ability to accurately give a visual display on the moving target, including its payload (which may not be available via other sensors)
  3. Flight Prediction - Uses proprietary flight prediction algorithm to assist tracking even when the target is inhibited from view.
  4. Computer Vision - DroneShield employs the latest in computer vision technology to classify, localise and segment the image.
  5. Confirmation - The operator can confirm whether active countermeasures (electronic warfare or kinetic) have been effective in mitigating the advance of the drone threat.

Comments

0 comments