Translator Disclaimer
17 October 2014 Coordinating UAV information for executing national security-oriented collaboration
Author Affiliations +
Unmanned Aerial Vehicles (UAVs) are being used by numerous nations for defence-related missions. In some cases, the UAV is considered a cost-effective means to acquire data such as imagery over a location or object. Considering Canada’s geographic expanse, UAVs are also being suggested as a potential platform for use in surveillance of remote areas, such as northern Canada. However, such activities are typically associated with security as opposed to defence. The use of a defence platform for security activities introduces the issue of information exchange between the defence and security communities and their software applications. This paper explores the flow of information from the system used by the UAVs employed by the Royal Canadian Navy. Multiple computers are setup, each with the information system used by the UAVs, including appropriate communication between the systems. Simulated data that may be expected from a typical maritime UAV mission is then fed into the information system. The information structures common to the Canadian security community are then used to store and transfer the simulated data. The resulting data flow from the defence-oriented UAV system to the security-oriented information structure is then displayed using an open source geospatial application. Use of the information structures and applications relevant to the security community avoids the distribution restrictions often associated with defence-specific applications.
© (2014) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Anthony W. Isenor, Yannick Allard, Anna-Liesa S. Lapinski, Hugues Demers, and Dan Radulescu "Coordinating UAV information for executing national security-oriented collaboration", Proc. SPIE 9248, Unmanned/Unattended Sensors and Sensor Networks X, 92480L (17 October 2014);


Considerations and foundations for Botnet simulation
Proceedings of SPIE (April 13 2009)
Industry perspective on battlespace digitization
Proceedings of SPIE (August 20 1998)
Banknotes and unattended cash transactions
Proceedings of SPIE (April 07 2000)
Ubiquitous computing in the military environment
Proceedings of SPIE (August 29 2001)
Internet firewalls: questions and answers
Proceedings of SPIE (March 12 1996)

Back to Top