SlideShare a Scribd company logo
Transport Session
Framework of key enabling technologies
for safe and autonomous drones’ applications
Réda NOUACER
CEA LIST
reda.nouacer@cea.fr
Agenda
1. Drone Market 2018-2024
2. Unlocking potential value of drones
3. COMP4DRONES project
4. Objectives
5. Pilots
6. Conclusion – Expected Impact
3
4
Problem
• Adoption of civilian drones will be challenging due to the complexity of physical environments
where they evolve.
• Unmanned aerial vehicles (UAV) only add value to the user if there are ways to process data
quickly and without putting additional efforts into this process.
• The faster, the more accurate, and the easier the data can be evaluated, the better.
Answer
• Combining drones and artificial intelligence seems to be the answer.
• AI in relation to Machine Learning, Deep Learning, and Motion Planning are the hottest topics.
Unlocking potential value of drones
“Drones technology can only unlock its full potential when data acquisition and
data analytics happen at the highest degree of automation.”
5
Drones and AI – Motion Planning
Machine Perception (MP)
UAV must be able to perceive and absorb
the environment or objects in some way
(electro-optical, stereo-optical, and LiDAR)
Computer Vision (CV)
Automatic extraction, analysis, and
understanding of useful information from
one or more images
Machine/Deep Learning (ML/DL)
To optimize differentiable parameters,
techniques of Machine Learning can be
applied. ML algorithms are designed in
such a way that they can learn and
improve over time when exposed to new
data. DL is a subset of ML in which neural
networks learn from vast amounts of data.
Inspect & Avoid the blades of the vertical wind turbine
6
Drones & AI - Drone Data Analytics
“Actionable” data. One of the most
important goals of AI in the drone industry
is to make efficient use of large data sets
which are collected by the drone.
• Availability of high-resolution images
used for various tasks such as
maintenance, surveying, mapping and
monitoring is increasing.
• There are already many established
software companies on the market
offering intelligent data analysis
solutions to make unstructured drone
data “actionable” and gain meaningful
insights without time-consuming
manual analytics.
Making unstructured drone data “actionable”
7
COMP4DRONES Project
Running Time 01/10/2019 – 30/09/2022 ECSEL JU* under GA N° 826610
Start date:
Duration:
Total costs:
Total Funding (60%)
Number of participants:
Number of countries:
01 October 2019
36 months
29.76 M€
17.88 M€
49
08
The ECSEL Joint Undertaking - the Public-Private Partnership for Electronic
Components and Systems – funds Research, Development and Innovation
projects for world-class expertise in these key enabling technologies, essential
for Europe's competitive leadership in the era of the digital economy.
8
Four primary safety concerns
1. The "inability to recognize" and "avoid other aircraft" and "airborne objects" in a manner similar to
manned aircraft.
2. A lack of "technological" and "operational standards" needed to guide safe and consistent
performance of UAVs
3. Vulnerabilities in the command and control. (e.g. "GPS-jamming, hacking", and the potential for
"cyber-terrorism")
4. A lack of comprehensive "government regulations" necessary to safely facilitate the accelerated
integration of UAVs into the national airspace system
Source: EASA, SESAR, GAO, UK House Of Lords
Safety issues surrounding UAVs
9
Easing the
integration and
customization
of drone
embedded
system
Enabling drones
to take safe
autonomous
decisions
Ensure the
deployment of
trusted
communications
Minimizing the
design and
verification
efforts for
complex drone
applications
Ensuring
sustainable
impact and
creation of an
industry-driven
community
Project Objectives
COMP4DRONES will develop key technologies to provide secure and
autonomous drones for complex applications in the fields of transportation,
construction, logistics, surveillance and agriculture.
10
Enabling drones to take safe autonomous
decisions
Design and develop a safe and reconfigurable components for the
navigation subsystem for enhancing the capability to autopilot a drone
with novel perception capacities and smart algorithms
Sensors State Prediction Conflict Detection
Conflicts
Resolution
Evasion Maneuver
Cooperative
(communicate with other
aircraft)
Non-cooperative
(sensing without
communication)
Support of Artificial Intelligence to Motion Planning
11
Trusted communication
Availability
&
Performance
Confidentiality &
Integrity
Safety
Communication &
Security Monitoring
& Control
Validation
through
Attack Scenarios
Joint use of mesh
and infrastructure
technologies
Communication
safety
Ensure robust and efficient drone communications even in presence of malicious
attackers and taking into considerations intrinsic platform constraints.
• Distributed Intrusion Detection System with in-drone
Machine Learning – based detection probes
• Embedded autonomous management system for
drones, backed with artificial intelligence and machine
learning capabilities
12
Pilots (9 demonstrators)
INDRA
ACORDE
ACCIONA
HIB
HEMAV
ACORDE
UNICAN
TOTAL
ALTRAN
ATE
ENSMA
SCALIAN
SHERPA
SIEMENS
SOBEN
ENAC
IMCS
LMT
TNL
ANYWI
DEMCOM
IMEC-NL
TUD
TUE
IMEC-BG
AIROBOT
BUT
SM
AIT
FB
IFAT
SKYA
WBM
ABI
AI
AIK
ROT
TEKNE
UDANET
UNIMORE
UNISANNIO
UNISS
UNIVAQ
ALM
13
UC3 Logistics - METIS®
Demonstrator 1: Deployment of an Autonomous Communication
System in hard-to-access areas
• Selecting and Managing an heterogeneous fleet of
autonomous vehicles
• Using a communication infrastructure with redundant,
secure, robust, dissimilar and deterministic abilities
• Navigating and sensing at the landing or dropping
zone with a high positioning accuracy and a guarantee
of absence of objects, people or animals
• Detecting and considering dynamically of aircrafts in
the mission area and integrating vehicles of the
system in air traffic management
• Reducing risks and complexity on interactions
between system operators and autonomous vehicles
METIS® - https://www.youtube.com/watch?v=mp-9-mXny58
14
UC3 Logistics
Demonstrator 2: Logistics in 5G urban environment: Clinical Sample
delivery in Hospital campus
• Develop a solution which will satisfy hospital requirements (special
challenge is safety and security requirements).
• LMT will work on establishing and benchmarking 5G communication
with special attention to security of communications.
• IMCS will work on integrating project results regarding object
recognition & avoidance and online safety monitoring in a ROS
node.
• Atechsys and SOBEN will work on coupling between a transport
drone and a logistics droide in a periurban area
15
Conclusion - Expected Impact
• Strengthen artificial intelligence integration in drones and its
applications
• Reinforcing the ecosystems of drones industry by providing
methodology and a reference software architecture framework
that meets performance and safety requirements
• Improving innovation capacity and the integration of new
knowledge. A structuring aspect of COMP4DRONES is the
adoption of a "safe-by-design" approach
• Enabling and easing delivery of new services using drones in
Europe.
Thank you!
Questions?
Contact
• Réda Nouacer (CEA) reda.nouacer@cea.fr

More Related Content

What's hot

Digital Twin: Starting the journey
Digital Twin: Starting the journeyDigital Twin: Starting the journey
Digital Twin: Starting the journey
IBM Internet of Things
 
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex TrainingAdvanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Bryan Len
 
Principles of Hierarchical Temporal Memory - Foundations of Machine Intelligence
Principles of Hierarchical Temporal Memory - Foundations of Machine IntelligencePrinciples of Hierarchical Temporal Memory - Foundations of Machine Intelligence
Principles of Hierarchical Temporal Memory - Foundations of Machine Intelligence
Numenta
 
"Semantic Segmentation for Scene Understanding: Algorithms and Implementation...
"Semantic Segmentation for Scene Understanding: Algorithms and Implementation..."Semantic Segmentation for Scene Understanding: Algorithms and Implementation...
"Semantic Segmentation for Scene Understanding: Algorithms and Implementation...
Edge AI and Vision Alliance
 
Stress detection using machine learning and iot
Stress detection using machine learning and iotStress detection using machine learning and iot
Stress detection using machine learning and iot
sumitkumar sahare
 
AI & IoT in the development of smart cities
AI & IoT in the development of smart citiesAI & IoT in the development of smart cities
AI & IoT in the development of smart cities
Raunak Mundada
 
Digital Twin at-a-glance, Yong @SEMIforte
Digital Twin at-a-glance, Yong @SEMIforteDigital Twin at-a-glance, Yong @SEMIforte
Digital Twin at-a-glance, Yong @SEMIforte
Yong Wang
 
Federated Learning
Federated LearningFederated Learning
Federated Learning
DataWorks Summit
 
IoT13: Xively showcase
IoT13: Xively showcaseIoT13: Xively showcase
IoT13: Xively showcase
Business of Software Conference
 
Metaverse and Digital Twins on Enterprise-Public.pdf
Metaverse and Digital Twins on Enterprise-Public.pdfMetaverse and Digital Twins on Enterprise-Public.pdf
Metaverse and Digital Twins on Enterprise-Public.pdf
湯米吳 Tommy Wu
 
Introduction to IoT Architecture
Introduction to IoT ArchitectureIntroduction to IoT Architecture
Introduction to IoT Architecture
Emertxe Information Technologies Pvt Ltd
 
Internet Of Things: Convergence
Internet Of Things: ConvergenceInternet Of Things: Convergence
Internet Of Things: Convergence
Daniel Kolodziej
 
INDUSTRIE 4.0 AND GERMAN ACTIVITIES – Connected Manufacturing from the SAP Pe...
INDUSTRIE 4.0 AND GERMAN ACTIVITIES – Connected Manufacturing from the SAP Pe...INDUSTRIE 4.0 AND GERMAN ACTIVITIES – Connected Manufacturing from the SAP Pe...
INDUSTRIE 4.0 AND GERMAN ACTIVITIES – Connected Manufacturing from the SAP Pe...
Ekonomikas ministrija
 
IoT Reference Architectures
IoT Reference ArchitecturesIoT Reference Architectures
IoT Reference Architectures
Bob Marcus
 
Big Data Analytics in Transportation
Big Data Analytics in TransportationBig Data Analytics in Transportation
Big Data Analytics in Transportation
Randeep Sudan
 
IoT-Enabled Predictive Maintenance
IoT-Enabled Predictive MaintenanceIoT-Enabled Predictive Maintenance
IoT-Enabled Predictive Maintenance
Cloudera, Inc.
 
Beginners: What is Industrial IoT (IIoT)
Beginners: What is Industrial IoT (IIoT)Beginners: What is Industrial IoT (IIoT)
Beginners: What is Industrial IoT (IIoT)
3G4G
 
Digital twin ppt
Digital twin pptDigital twin ppt
Digital twin ppt
Meet patel
 
Digital Twin and Smart Spaces
Digital Twin and Smart Spaces Digital Twin and Smart Spaces
Digital Twin and Smart Spaces
SANGHEE SHIN
 
Blockchain and distributed project management
Blockchain and distributed project managementBlockchain and distributed project management
Blockchain and distributed project management
Mostafa Naghipourfar
 

What's hot (20)

Digital Twin: Starting the journey
Digital Twin: Starting the journeyDigital Twin: Starting the journey
Digital Twin: Starting the journey
 
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex TrainingAdvanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
 
Principles of Hierarchical Temporal Memory - Foundations of Machine Intelligence
Principles of Hierarchical Temporal Memory - Foundations of Machine IntelligencePrinciples of Hierarchical Temporal Memory - Foundations of Machine Intelligence
Principles of Hierarchical Temporal Memory - Foundations of Machine Intelligence
 
"Semantic Segmentation for Scene Understanding: Algorithms and Implementation...
"Semantic Segmentation for Scene Understanding: Algorithms and Implementation..."Semantic Segmentation for Scene Understanding: Algorithms and Implementation...
"Semantic Segmentation for Scene Understanding: Algorithms and Implementation...
 
Stress detection using machine learning and iot
Stress detection using machine learning and iotStress detection using machine learning and iot
Stress detection using machine learning and iot
 
AI & IoT in the development of smart cities
AI & IoT in the development of smart citiesAI & IoT in the development of smart cities
AI & IoT in the development of smart cities
 
Digital Twin at-a-glance, Yong @SEMIforte
Digital Twin at-a-glance, Yong @SEMIforteDigital Twin at-a-glance, Yong @SEMIforte
Digital Twin at-a-glance, Yong @SEMIforte
 
Federated Learning
Federated LearningFederated Learning
Federated Learning
 
IoT13: Xively showcase
IoT13: Xively showcaseIoT13: Xively showcase
IoT13: Xively showcase
 
Metaverse and Digital Twins on Enterprise-Public.pdf
Metaverse and Digital Twins on Enterprise-Public.pdfMetaverse and Digital Twins on Enterprise-Public.pdf
Metaverse and Digital Twins on Enterprise-Public.pdf
 
Introduction to IoT Architecture
Introduction to IoT ArchitectureIntroduction to IoT Architecture
Introduction to IoT Architecture
 
Internet Of Things: Convergence
Internet Of Things: ConvergenceInternet Of Things: Convergence
Internet Of Things: Convergence
 
INDUSTRIE 4.0 AND GERMAN ACTIVITIES – Connected Manufacturing from the SAP Pe...
INDUSTRIE 4.0 AND GERMAN ACTIVITIES – Connected Manufacturing from the SAP Pe...INDUSTRIE 4.0 AND GERMAN ACTIVITIES – Connected Manufacturing from the SAP Pe...
INDUSTRIE 4.0 AND GERMAN ACTIVITIES – Connected Manufacturing from the SAP Pe...
 
IoT Reference Architectures
IoT Reference ArchitecturesIoT Reference Architectures
IoT Reference Architectures
 
Big Data Analytics in Transportation
Big Data Analytics in TransportationBig Data Analytics in Transportation
Big Data Analytics in Transportation
 
IoT-Enabled Predictive Maintenance
IoT-Enabled Predictive MaintenanceIoT-Enabled Predictive Maintenance
IoT-Enabled Predictive Maintenance
 
Beginners: What is Industrial IoT (IIoT)
Beginners: What is Industrial IoT (IIoT)Beginners: What is Industrial IoT (IIoT)
Beginners: What is Industrial IoT (IIoT)
 
Digital twin ppt
Digital twin pptDigital twin ppt
Digital twin ppt
 
Digital Twin and Smart Spaces
Digital Twin and Smart Spaces Digital Twin and Smart Spaces
Digital Twin and Smart Spaces
 
Blockchain and distributed project management
Blockchain and distributed project managementBlockchain and distributed project management
Blockchain and distributed project management
 

Similar to Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)

Role of AI/ML in the Supply Chain: Spotlight on iNGENIOUS Use Cases
Role of AI/ML in the Supply Chain: Spotlight on iNGENIOUS Use CasesRole of AI/ML in the Supply Chain: Spotlight on iNGENIOUS Use Cases
Role of AI/ML in the Supply Chain: Spotlight on iNGENIOUS Use Cases
iNGENIOUSIoT
 
Tech Jam 2015: Action Cluster Highlights
Tech Jam 2015: Action Cluster HighlightsTech Jam 2015: Action Cluster Highlights
Tech Jam 2015: Action Cluster Highlights
US-Ignite
 
MP-HFM-136-08
MP-HFM-136-08MP-HFM-136-08
MP-HFM-136-08
Imran Rehmi
 
Edge computing for CAVs and VRU protection
Edge computing for CAVs and VRU protectionEdge computing for CAVs and VRU protection
Edge computing for CAVs and VRU protection
Carl Jackson
 
Object Detection in UAVs
Object Detection in UAVsObject Detection in UAVs
Object Detection in UAVs
ijtsrd
 
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road MapSecurity and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Maanak Gupta, Ph.D.
 
the hybrid cloud[1] World Pipeline Magazine
the hybrid cloud[1]  World Pipeline Magazinethe hybrid cloud[1]  World Pipeline Magazine
the hybrid cloud[1] World Pipeline Magazine
Layne Tucker
 
OSMOSE Project Presentation
OSMOSE Project PresentationOSMOSE Project Presentation
OSMOSE Project Presentation
Osmose Project
 
iNGENIOUS: Next Generation IoT for the Next-Generation Supply Chain
iNGENIOUS: Next Generation IoT for the Next-Generation Supply ChainiNGENIOUS: Next Generation IoT for the Next-Generation Supply Chain
iNGENIOUS: Next Generation IoT for the Next-Generation Supply Chain
iNGENIOUSIoT
 
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Christo Ananth
 
Towards secure vehicular clouds
Towards secure vehicular cloudsTowards secure vehicular clouds
Towards secure vehicular clouds
durgeshkumarshukla
 
Tutorial 4 francisco garcia moran
Tutorial 4 francisco garcia moranTutorial 4 francisco garcia moran
Tutorial 4 francisco garcia moran
egovernment
 
Clarity from above
Clarity from aboveClarity from above
Clarity from above
PwC España
 
Clarity from above PWC 2016
Clarity from above PWC 2016Clarity from above PWC 2016
Clarity from above PWC 2016
Dmitry Tseitlin
 
Clarity from above 8.5.16
Clarity from above 8.5.16Clarity from above 8.5.16
Clarity from above 8.5.16
ЦивилизацияXXI века
 
Broadband
Broadband Broadband
Broadband
dinesh sharma
 
Nat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingNat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud Computing
GovCloud Network
 
Preprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdfPreprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdf
Christo Ananth
 
Nextgen
NextgenNextgen
disaster-iot.pdf
disaster-iot.pdfdisaster-iot.pdf
disaster-iot.pdf
MaryumHina1
 

Similar to Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU) (20)

Role of AI/ML in the Supply Chain: Spotlight on iNGENIOUS Use Cases
Role of AI/ML in the Supply Chain: Spotlight on iNGENIOUS Use CasesRole of AI/ML in the Supply Chain: Spotlight on iNGENIOUS Use Cases
Role of AI/ML in the Supply Chain: Spotlight on iNGENIOUS Use Cases
 
Tech Jam 2015: Action Cluster Highlights
Tech Jam 2015: Action Cluster HighlightsTech Jam 2015: Action Cluster Highlights
Tech Jam 2015: Action Cluster Highlights
 
MP-HFM-136-08
MP-HFM-136-08MP-HFM-136-08
MP-HFM-136-08
 
Edge computing for CAVs and VRU protection
Edge computing for CAVs and VRU protectionEdge computing for CAVs and VRU protection
Edge computing for CAVs and VRU protection
 
Object Detection in UAVs
Object Detection in UAVsObject Detection in UAVs
Object Detection in UAVs
 
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road MapSecurity and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road Map
 
the hybrid cloud[1] World Pipeline Magazine
the hybrid cloud[1]  World Pipeline Magazinethe hybrid cloud[1]  World Pipeline Magazine
the hybrid cloud[1] World Pipeline Magazine
 
OSMOSE Project Presentation
OSMOSE Project PresentationOSMOSE Project Presentation
OSMOSE Project Presentation
 
iNGENIOUS: Next Generation IoT for the Next-Generation Supply Chain
iNGENIOUS: Next Generation IoT for the Next-Generation Supply ChainiNGENIOUS: Next Generation IoT for the Next-Generation Supply Chain
iNGENIOUS: Next Generation IoT for the Next-Generation Supply Chain
 
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
 
Towards secure vehicular clouds
Towards secure vehicular cloudsTowards secure vehicular clouds
Towards secure vehicular clouds
 
Tutorial 4 francisco garcia moran
Tutorial 4 francisco garcia moranTutorial 4 francisco garcia moran
Tutorial 4 francisco garcia moran
 
Clarity from above
Clarity from aboveClarity from above
Clarity from above
 
Clarity from above PWC 2016
Clarity from above PWC 2016Clarity from above PWC 2016
Clarity from above PWC 2016
 
Clarity from above 8.5.16
Clarity from above 8.5.16Clarity from above 8.5.16
Clarity from above 8.5.16
 
Broadband
Broadband Broadband
Broadband
 
Nat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingNat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud Computing
 
Preprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdfPreprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdf
 
Nextgen
NextgenNextgen
Nextgen
 
disaster-iot.pdf
disaster-iot.pdfdisaster-iot.pdf
disaster-iot.pdf
 

More from Big Data Value Association

Data Privacy, Security in personal data sharing
Data Privacy, Security in personal data sharingData Privacy, Security in personal data sharing
Data Privacy, Security in personal data sharing
Big Data Value Association
 
Key Modules for a trsuted and privacy preserving personal data marketplace
Key Modules for a trsuted and privacy preserving personal data marketplaceKey Modules for a trsuted and privacy preserving personal data marketplace
Key Modules for a trsuted and privacy preserving personal data marketplace
Big Data Value Association
 
GDPR and Data Ethics considerations in personal data sharing
GDPR and Data Ethics considerations in personal data sharingGDPR and Data Ethics considerations in personal data sharing
GDPR and Data Ethics considerations in personal data sharing
Big Data Value Association
 
Intro - Three pillars for building a Smart Data Ecosystem: Trust, Security an...
Intro - Three pillars for building a Smart Data Ecosystem: Trust, Security an...Intro - Three pillars for building a Smart Data Ecosystem: Trust, Security an...
Intro - Three pillars for building a Smart Data Ecosystem: Trust, Security an...
Big Data Value Association
 
Three pillars for building a Smart Data Ecosystem: Trust, Security and Privacy
Three pillars for building a Smart Data Ecosystem: Trust, Security and PrivacyThree pillars for building a Smart Data Ecosystem: Trust, Security and Privacy
Three pillars for building a Smart Data Ecosystem: Trust, Security and Privacy
Big Data Value Association
 
Market into context - Three pillars for building a Smart Data Ecosystem: Trus...
Market into context - Three pillars for building a Smart Data Ecosystem: Trus...Market into context - Three pillars for building a Smart Data Ecosystem: Trus...
Market into context - Three pillars for building a Smart Data Ecosystem: Trus...
Big Data Value Association
 
BDV Skills Accreditation - Future of digital skills in Europe reskilling and ...
BDV Skills Accreditation - Future of digital skills in Europe reskilling and ...BDV Skills Accreditation - Future of digital skills in Europe reskilling and ...
BDV Skills Accreditation - Future of digital skills in Europe reskilling and ...
Big Data Value Association
 
BDV Skills Accreditation - Big Data skilling in Emilia-Romagna
BDV Skills Accreditation - Big Data skilling in Emilia-Romagna BDV Skills Accreditation - Big Data skilling in Emilia-Romagna
BDV Skills Accreditation - Big Data skilling in Emilia-Romagna
Big Data Value Association
 
BDV Skills Accreditation - EIT labels for professionals
BDV Skills Accreditation - EIT labels for professionalsBDV Skills Accreditation - EIT labels for professionals
BDV Skills Accreditation - EIT labels for professionals
Big Data Value Association
 
BDV Skills Accreditation - Recognizing Data Science Skills with BDV Data Scie...
BDV Skills Accreditation - Recognizing Data Science Skills with BDV Data Scie...BDV Skills Accreditation - Recognizing Data Science Skills with BDV Data Scie...
BDV Skills Accreditation - Recognizing Data Science Skills with BDV Data Scie...
Big Data Value Association
 
BDV Skills Accreditation - Objectives of the workshop
BDV Skills Accreditation - Objectives of the workshopBDV Skills Accreditation - Objectives of the workshop
BDV Skills Accreditation - Objectives of the workshop
Big Data Value Association
 
BDV Skills Accreditation - Welcome introduction to the workshop
BDV Skills Accreditation - Welcome introduction to the workshopBDV Skills Accreditation - Welcome introduction to the workshop
BDV Skills Accreditation - Welcome introduction to the workshop
Big Data Value Association
 
BDV Skills Accreditation - Definition and ensuring of digital roles and compe...
BDV Skills Accreditation - Definition and ensuring of digital roles and compe...BDV Skills Accreditation - Definition and ensuring of digital roles and compe...
BDV Skills Accreditation - Definition and ensuring of digital roles and compe...
Big Data Value Association
 
BigDataPilotDemoDays - I BiDaaS Application to the Manufacturing Sector Webinar
BigDataPilotDemoDays - I BiDaaS Application to the Manufacturing Sector WebinarBigDataPilotDemoDays - I BiDaaS Application to the Manufacturing Sector Webinar
BigDataPilotDemoDays - I BiDaaS Application to the Manufacturing Sector Webinar
Big Data Value Association
 
BigDataPilotDemoDays - I-BiDaaS Application to the Financial Sector Webinar
BigDataPilotDemoDays - I-BiDaaS Application to the Financial Sector WebinarBigDataPilotDemoDays - I-BiDaaS Application to the Financial Sector Webinar
BigDataPilotDemoDays - I-BiDaaS Application to the Financial Sector Webinar
Big Data Value Association
 
Virtual BenchLearning - Data Bench Framework
Virtual BenchLearning - Data Bench FrameworkVirtual BenchLearning - Data Bench Framework
Virtual BenchLearning - Data Bench Framework
Big Data Value Association
 
Virtual BenchLearning - DeepHealth - Needs & Requirements for Benchmarking
Virtual BenchLearning - DeepHealth - Needs & Requirements for BenchmarkingVirtual BenchLearning - DeepHealth - Needs & Requirements for Benchmarking
Virtual BenchLearning - DeepHealth - Needs & Requirements for Benchmarking
Big Data Value Association
 
Virtual BenchLearning - I-BiDaaS - Industrial-Driven Big Data as a Self-Servi...
Virtual BenchLearning - I-BiDaaS - Industrial-Driven Big Data as a Self-Servi...Virtual BenchLearning - I-BiDaaS - Industrial-Driven Big Data as a Self-Servi...
Virtual BenchLearning - I-BiDaaS - Industrial-Driven Big Data as a Self-Servi...
Big Data Value Association
 
Policy Cloud Data Driven Policies against Radicalisation - Technical Overview
Policy Cloud Data Driven Policies against Radicalisation - Technical OverviewPolicy Cloud Data Driven Policies against Radicalisation - Technical Overview
Policy Cloud Data Driven Policies against Radicalisation - Technical Overview
Big Data Value Association
 
Policy Cloud Data Driven Policies against Radicalisation - Participatory poli...
Policy Cloud Data Driven Policies against Radicalisation - Participatory poli...Policy Cloud Data Driven Policies against Radicalisation - Participatory poli...
Policy Cloud Data Driven Policies against Radicalisation - Participatory poli...
Big Data Value Association
 

More from Big Data Value Association (20)

Data Privacy, Security in personal data sharing
Data Privacy, Security in personal data sharingData Privacy, Security in personal data sharing
Data Privacy, Security in personal data sharing
 
Key Modules for a trsuted and privacy preserving personal data marketplace
Key Modules for a trsuted and privacy preserving personal data marketplaceKey Modules for a trsuted and privacy preserving personal data marketplace
Key Modules for a trsuted and privacy preserving personal data marketplace
 
GDPR and Data Ethics considerations in personal data sharing
GDPR and Data Ethics considerations in personal data sharingGDPR and Data Ethics considerations in personal data sharing
GDPR and Data Ethics considerations in personal data sharing
 
Intro - Three pillars for building a Smart Data Ecosystem: Trust, Security an...
Intro - Three pillars for building a Smart Data Ecosystem: Trust, Security an...Intro - Three pillars for building a Smart Data Ecosystem: Trust, Security an...
Intro - Three pillars for building a Smart Data Ecosystem: Trust, Security an...
 
Three pillars for building a Smart Data Ecosystem: Trust, Security and Privacy
Three pillars for building a Smart Data Ecosystem: Trust, Security and PrivacyThree pillars for building a Smart Data Ecosystem: Trust, Security and Privacy
Three pillars for building a Smart Data Ecosystem: Trust, Security and Privacy
 
Market into context - Three pillars for building a Smart Data Ecosystem: Trus...
Market into context - Three pillars for building a Smart Data Ecosystem: Trus...Market into context - Three pillars for building a Smart Data Ecosystem: Trus...
Market into context - Three pillars for building a Smart Data Ecosystem: Trus...
 
BDV Skills Accreditation - Future of digital skills in Europe reskilling and ...
BDV Skills Accreditation - Future of digital skills in Europe reskilling and ...BDV Skills Accreditation - Future of digital skills in Europe reskilling and ...
BDV Skills Accreditation - Future of digital skills in Europe reskilling and ...
 
BDV Skills Accreditation - Big Data skilling in Emilia-Romagna
BDV Skills Accreditation - Big Data skilling in Emilia-Romagna BDV Skills Accreditation - Big Data skilling in Emilia-Romagna
BDV Skills Accreditation - Big Data skilling in Emilia-Romagna
 
BDV Skills Accreditation - EIT labels for professionals
BDV Skills Accreditation - EIT labels for professionalsBDV Skills Accreditation - EIT labels for professionals
BDV Skills Accreditation - EIT labels for professionals
 
BDV Skills Accreditation - Recognizing Data Science Skills with BDV Data Scie...
BDV Skills Accreditation - Recognizing Data Science Skills with BDV Data Scie...BDV Skills Accreditation - Recognizing Data Science Skills with BDV Data Scie...
BDV Skills Accreditation - Recognizing Data Science Skills with BDV Data Scie...
 
BDV Skills Accreditation - Objectives of the workshop
BDV Skills Accreditation - Objectives of the workshopBDV Skills Accreditation - Objectives of the workshop
BDV Skills Accreditation - Objectives of the workshop
 
BDV Skills Accreditation - Welcome introduction to the workshop
BDV Skills Accreditation - Welcome introduction to the workshopBDV Skills Accreditation - Welcome introduction to the workshop
BDV Skills Accreditation - Welcome introduction to the workshop
 
BDV Skills Accreditation - Definition and ensuring of digital roles and compe...
BDV Skills Accreditation - Definition and ensuring of digital roles and compe...BDV Skills Accreditation - Definition and ensuring of digital roles and compe...
BDV Skills Accreditation - Definition and ensuring of digital roles and compe...
 
BigDataPilotDemoDays - I BiDaaS Application to the Manufacturing Sector Webinar
BigDataPilotDemoDays - I BiDaaS Application to the Manufacturing Sector WebinarBigDataPilotDemoDays - I BiDaaS Application to the Manufacturing Sector Webinar
BigDataPilotDemoDays - I BiDaaS Application to the Manufacturing Sector Webinar
 
BigDataPilotDemoDays - I-BiDaaS Application to the Financial Sector Webinar
BigDataPilotDemoDays - I-BiDaaS Application to the Financial Sector WebinarBigDataPilotDemoDays - I-BiDaaS Application to the Financial Sector Webinar
BigDataPilotDemoDays - I-BiDaaS Application to the Financial Sector Webinar
 
Virtual BenchLearning - Data Bench Framework
Virtual BenchLearning - Data Bench FrameworkVirtual BenchLearning - Data Bench Framework
Virtual BenchLearning - Data Bench Framework
 
Virtual BenchLearning - DeepHealth - Needs & Requirements for Benchmarking
Virtual BenchLearning - DeepHealth - Needs & Requirements for BenchmarkingVirtual BenchLearning - DeepHealth - Needs & Requirements for Benchmarking
Virtual BenchLearning - DeepHealth - Needs & Requirements for Benchmarking
 
Virtual BenchLearning - I-BiDaaS - Industrial-Driven Big Data as a Self-Servi...
Virtual BenchLearning - I-BiDaaS - Industrial-Driven Big Data as a Self-Servi...Virtual BenchLearning - I-BiDaaS - Industrial-Driven Big Data as a Self-Servi...
Virtual BenchLearning - I-BiDaaS - Industrial-Driven Big Data as a Self-Servi...
 
Policy Cloud Data Driven Policies against Radicalisation - Technical Overview
Policy Cloud Data Driven Policies against Radicalisation - Technical OverviewPolicy Cloud Data Driven Policies against Radicalisation - Technical Overview
Policy Cloud Data Driven Policies against Radicalisation - Technical Overview
 
Policy Cloud Data Driven Policies against Radicalisation - Participatory poli...
Policy Cloud Data Driven Policies against Radicalisation - Participatory poli...Policy Cloud Data Driven Policies against Radicalisation - Participatory poli...
Policy Cloud Data Driven Policies against Radicalisation - Participatory poli...
 

Recently uploaded

Biometric Question Bank 2021 - 1 Soln-1.pdf
Biometric Question Bank 2021 - 1 Soln-1.pdfBiometric Question Bank 2021 - 1 Soln-1.pdf
Biometric Question Bank 2021 - 1 Soln-1.pdf
Joel Ngushwai
 
Mumbai Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service And ...
Mumbai Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service And ...Mumbai Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service And ...
Mumbai Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service And ...
norina2645
 
社内勉強会資料_TransNeXt: Robust Foveal Visual Perception for Vision Transformers
社内勉強会資料_TransNeXt: Robust Foveal Visual Perception for Vision Transformers社内勉強会資料_TransNeXt: Robust Foveal Visual Perception for Vision Transformers
社内勉強会資料_TransNeXt: Robust Foveal Visual Perception for Vision Transformers
NABLAS株式会社
 
Celebrity Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servi...
Celebrity Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servi...Celebrity Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servi...
Celebrity Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servi...
revolutionary575
 
Towards an Analysis-Ready, Cloud-Optimised service for FAIR fusion data
Towards an Analysis-Ready, Cloud-Optimised service for FAIR fusion dataTowards an Analysis-Ready, Cloud-Optimised service for FAIR fusion data
Towards an Analysis-Ready, Cloud-Optimised service for FAIR fusion data
Samuel Jackson
 
potential development of the A* search algorithm specifically
potential development of the A* search algorithm specificallypotential development of the A* search algorithm specifically
potential development of the A* search algorithm specifically
huseindihon
 
Beautiful Girls Call 9711199171 9711199171 Provide Best And Top Girl Service ...
Beautiful Girls Call 9711199171 9711199171 Provide Best And Top Girl Service ...Beautiful Girls Call 9711199171 9711199171 Provide Best And Top Girl Service ...
Beautiful Girls Call 9711199171 9711199171 Provide Best And Top Girl Service ...
janvikumar4133
 
Willis Tower //Sears Tower- Supertall Building .pdf
Willis Tower //Sears Tower- Supertall Building .pdfWillis Tower //Sears Tower- Supertall Building .pdf
Willis Tower //Sears Tower- Supertall Building .pdf
LINAT
 
🚂🚘 Premium Girls Call Nashik 🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
🚂🚘 Premium Girls Call Nashik  🛵🚡000XX00000 💃 Choose Best And Top Girl Service...🚂🚘 Premium Girls Call Nashik  🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
🚂🚘 Premium Girls Call Nashik 🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
kuldeepsharmaks8120
 
VIP Kanpur Girls Call Kanpur 0X0000000X Doorstep High-Profile Girl Service Ca...
VIP Kanpur Girls Call Kanpur 0X0000000X Doorstep High-Profile Girl Service Ca...VIP Kanpur Girls Call Kanpur 0X0000000X Doorstep High-Profile Girl Service Ca...
VIP Kanpur Girls Call Kanpur 0X0000000X Doorstep High-Profile Girl Service Ca...
satpalsheravatmumbai
 
Best Girls Call Navi Mumbai 9930245274 Provide Best And Top Girl Service And ...
Best Girls Call Navi Mumbai 9930245274 Provide Best And Top Girl Service And ...Best Girls Call Navi Mumbai 9930245274 Provide Best And Top Girl Service And ...
Best Girls Call Navi Mumbai 9930245274 Provide Best And Top Girl Service And ...
sharonblush
 
Potential Uses of the Floyd-Warshall Algorithm as appropriate
Potential Uses of the Floyd-Warshall Algorithm as appropriatePotential Uses of the Floyd-Warshall Algorithm as appropriate
Potential Uses of the Floyd-Warshall Algorithm as appropriate
huseindihon
 
Busty Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And...
Busty Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And...Busty Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And...
Busty Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And...
tanupasswan6
 
potential usefulness of multi-agent maze-solving in general
potential usefulness of multi-agent maze-solving in generalpotential usefulness of multi-agent maze-solving in general
potential usefulness of multi-agent maze-solving in general
huseindihon
 
Coimbatore Girls call Service 000XX00000 Provide Best And Top Girl Service An...
Coimbatore Girls call Service 000XX00000 Provide Best And Top Girl Service An...Coimbatore Girls call Service 000XX00000 Provide Best And Top Girl Service An...
Coimbatore Girls call Service 000XX00000 Provide Best And Top Girl Service An...
vrvipin164
 
High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...
High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...
High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...
saadkhan1485265
 
DU degree offer diploma Transcript
DU degree offer diploma TranscriptDU degree offer diploma Transcript
DU degree offer diploma Transcript
uapta
 
Noida Girls Call Noida 9873940964 Unlimited Short Providing Girls Service Ava...
Noida Girls Call Noida 9873940964 Unlimited Short Providing Girls Service Ava...Noida Girls Call Noida 9873940964 Unlimited Short Providing Girls Service Ava...
Noida Girls Call Noida 9873940964 Unlimited Short Providing Girls Service Ava...
kinni singh$A17
 
Data Preprocessing Cheatsheet for learners
Data Preprocessing Cheatsheet for learnersData Preprocessing Cheatsheet for learners
Data Preprocessing Cheatsheet for learners
mohamed Ibrahim
 
BDSM Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And ...
BDSM Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And ...BDSM Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And ...
BDSM Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And ...
fatima shekh$A17
 

Recently uploaded (20)

Biometric Question Bank 2021 - 1 Soln-1.pdf
Biometric Question Bank 2021 - 1 Soln-1.pdfBiometric Question Bank 2021 - 1 Soln-1.pdf
Biometric Question Bank 2021 - 1 Soln-1.pdf
 
Mumbai Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service And ...
Mumbai Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service And ...Mumbai Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service And ...
Mumbai Girls Call Mumbai 🛵🚡9910780858 💃 Choose Best And Top Girl Service And ...
 
社内勉強会資料_TransNeXt: Robust Foveal Visual Perception for Vision Transformers
社内勉強会資料_TransNeXt: Robust Foveal Visual Perception for Vision Transformers社内勉強会資料_TransNeXt: Robust Foveal Visual Perception for Vision Transformers
社内勉強会資料_TransNeXt: Robust Foveal Visual Perception for Vision Transformers
 
Celebrity Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servi...
Celebrity Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servi...Celebrity Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servi...
Celebrity Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servi...
 
Towards an Analysis-Ready, Cloud-Optimised service for FAIR fusion data
Towards an Analysis-Ready, Cloud-Optimised service for FAIR fusion dataTowards an Analysis-Ready, Cloud-Optimised service for FAIR fusion data
Towards an Analysis-Ready, Cloud-Optimised service for FAIR fusion data
 
potential development of the A* search algorithm specifically
potential development of the A* search algorithm specificallypotential development of the A* search algorithm specifically
potential development of the A* search algorithm specifically
 
Beautiful Girls Call 9711199171 9711199171 Provide Best And Top Girl Service ...
Beautiful Girls Call 9711199171 9711199171 Provide Best And Top Girl Service ...Beautiful Girls Call 9711199171 9711199171 Provide Best And Top Girl Service ...
Beautiful Girls Call 9711199171 9711199171 Provide Best And Top Girl Service ...
 
Willis Tower //Sears Tower- Supertall Building .pdf
Willis Tower //Sears Tower- Supertall Building .pdfWillis Tower //Sears Tower- Supertall Building .pdf
Willis Tower //Sears Tower- Supertall Building .pdf
 
🚂🚘 Premium Girls Call Nashik 🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
🚂🚘 Premium Girls Call Nashik  🛵🚡000XX00000 💃 Choose Best And Top Girl Service...🚂🚘 Premium Girls Call Nashik  🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
🚂🚘 Premium Girls Call Nashik 🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
 
VIP Kanpur Girls Call Kanpur 0X0000000X Doorstep High-Profile Girl Service Ca...
VIP Kanpur Girls Call Kanpur 0X0000000X Doorstep High-Profile Girl Service Ca...VIP Kanpur Girls Call Kanpur 0X0000000X Doorstep High-Profile Girl Service Ca...
VIP Kanpur Girls Call Kanpur 0X0000000X Doorstep High-Profile Girl Service Ca...
 
Best Girls Call Navi Mumbai 9930245274 Provide Best And Top Girl Service And ...
Best Girls Call Navi Mumbai 9930245274 Provide Best And Top Girl Service And ...Best Girls Call Navi Mumbai 9930245274 Provide Best And Top Girl Service And ...
Best Girls Call Navi Mumbai 9930245274 Provide Best And Top Girl Service And ...
 
Potential Uses of the Floyd-Warshall Algorithm as appropriate
Potential Uses of the Floyd-Warshall Algorithm as appropriatePotential Uses of the Floyd-Warshall Algorithm as appropriate
Potential Uses of the Floyd-Warshall Algorithm as appropriate
 
Busty Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And...
Busty Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And...Busty Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And...
Busty Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And...
 
potential usefulness of multi-agent maze-solving in general
potential usefulness of multi-agent maze-solving in generalpotential usefulness of multi-agent maze-solving in general
potential usefulness of multi-agent maze-solving in general
 
Coimbatore Girls call Service 000XX00000 Provide Best And Top Girl Service An...
Coimbatore Girls call Service 000XX00000 Provide Best And Top Girl Service An...Coimbatore Girls call Service 000XX00000 Provide Best And Top Girl Service An...
Coimbatore Girls call Service 000XX00000 Provide Best And Top Girl Service An...
 
High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...
High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...
High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...
 
DU degree offer diploma Transcript
DU degree offer diploma TranscriptDU degree offer diploma Transcript
DU degree offer diploma Transcript
 
Noida Girls Call Noida 9873940964 Unlimited Short Providing Girls Service Ava...
Noida Girls Call Noida 9873940964 Unlimited Short Providing Girls Service Ava...Noida Girls Call Noida 9873940964 Unlimited Short Providing Girls Service Ava...
Noida Girls Call Noida 9873940964 Unlimited Short Providing Girls Service Ava...
 
Data Preprocessing Cheatsheet for learners
Data Preprocessing Cheatsheet for learnersData Preprocessing Cheatsheet for learners
Data Preprocessing Cheatsheet for learners
 
BDSM Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And ...
BDSM Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And ...BDSM Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And ...
BDSM Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And ...
 

Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)

  • 1. Transport Session Framework of key enabling technologies for safe and autonomous drones’ applications Réda NOUACER CEA LIST reda.nouacer@cea.fr
  • 2. Agenda 1. Drone Market 2018-2024 2. Unlocking potential value of drones 3. COMP4DRONES project 4. Objectives 5. Pilots 6. Conclusion – Expected Impact
  • 3. 3
  • 4. 4 Problem • Adoption of civilian drones will be challenging due to the complexity of physical environments where they evolve. • Unmanned aerial vehicles (UAV) only add value to the user if there are ways to process data quickly and without putting additional efforts into this process. • The faster, the more accurate, and the easier the data can be evaluated, the better. Answer • Combining drones and artificial intelligence seems to be the answer. • AI in relation to Machine Learning, Deep Learning, and Motion Planning are the hottest topics. Unlocking potential value of drones “Drones technology can only unlock its full potential when data acquisition and data analytics happen at the highest degree of automation.”
  • 5. 5 Drones and AI – Motion Planning Machine Perception (MP) UAV must be able to perceive and absorb the environment or objects in some way (electro-optical, stereo-optical, and LiDAR) Computer Vision (CV) Automatic extraction, analysis, and understanding of useful information from one or more images Machine/Deep Learning (ML/DL) To optimize differentiable parameters, techniques of Machine Learning can be applied. ML algorithms are designed in such a way that they can learn and improve over time when exposed to new data. DL is a subset of ML in which neural networks learn from vast amounts of data. Inspect & Avoid the blades of the vertical wind turbine
  • 6. 6 Drones & AI - Drone Data Analytics “Actionable” data. One of the most important goals of AI in the drone industry is to make efficient use of large data sets which are collected by the drone. • Availability of high-resolution images used for various tasks such as maintenance, surveying, mapping and monitoring is increasing. • There are already many established software companies on the market offering intelligent data analysis solutions to make unstructured drone data “actionable” and gain meaningful insights without time-consuming manual analytics. Making unstructured drone data “actionable”
  • 7. 7 COMP4DRONES Project Running Time 01/10/2019 – 30/09/2022 ECSEL JU* under GA N° 826610 Start date: Duration: Total costs: Total Funding (60%) Number of participants: Number of countries: 01 October 2019 36 months 29.76 M€ 17.88 M€ 49 08 The ECSEL Joint Undertaking - the Public-Private Partnership for Electronic Components and Systems – funds Research, Development and Innovation projects for world-class expertise in these key enabling technologies, essential for Europe's competitive leadership in the era of the digital economy.
  • 8. 8 Four primary safety concerns 1. The "inability to recognize" and "avoid other aircraft" and "airborne objects" in a manner similar to manned aircraft. 2. A lack of "technological" and "operational standards" needed to guide safe and consistent performance of UAVs 3. Vulnerabilities in the command and control. (e.g. "GPS-jamming, hacking", and the potential for "cyber-terrorism") 4. A lack of comprehensive "government regulations" necessary to safely facilitate the accelerated integration of UAVs into the national airspace system Source: EASA, SESAR, GAO, UK House Of Lords Safety issues surrounding UAVs
  • 9. 9 Easing the integration and customization of drone embedded system Enabling drones to take safe autonomous decisions Ensure the deployment of trusted communications Minimizing the design and verification efforts for complex drone applications Ensuring sustainable impact and creation of an industry-driven community Project Objectives COMP4DRONES will develop key technologies to provide secure and autonomous drones for complex applications in the fields of transportation, construction, logistics, surveillance and agriculture.
  • 10. 10 Enabling drones to take safe autonomous decisions Design and develop a safe and reconfigurable components for the navigation subsystem for enhancing the capability to autopilot a drone with novel perception capacities and smart algorithms Sensors State Prediction Conflict Detection Conflicts Resolution Evasion Maneuver Cooperative (communicate with other aircraft) Non-cooperative (sensing without communication) Support of Artificial Intelligence to Motion Planning
  • 11. 11 Trusted communication Availability & Performance Confidentiality & Integrity Safety Communication & Security Monitoring & Control Validation through Attack Scenarios Joint use of mesh and infrastructure technologies Communication safety Ensure robust and efficient drone communications even in presence of malicious attackers and taking into considerations intrinsic platform constraints. • Distributed Intrusion Detection System with in-drone Machine Learning – based detection probes • Embedded autonomous management system for drones, backed with artificial intelligence and machine learning capabilities
  • 13. 13 UC3 Logistics - METIS® Demonstrator 1: Deployment of an Autonomous Communication System in hard-to-access areas • Selecting and Managing an heterogeneous fleet of autonomous vehicles • Using a communication infrastructure with redundant, secure, robust, dissimilar and deterministic abilities • Navigating and sensing at the landing or dropping zone with a high positioning accuracy and a guarantee of absence of objects, people or animals • Detecting and considering dynamically of aircrafts in the mission area and integrating vehicles of the system in air traffic management • Reducing risks and complexity on interactions between system operators and autonomous vehicles METIS® - https://www.youtube.com/watch?v=mp-9-mXny58
  • 14. 14 UC3 Logistics Demonstrator 2: Logistics in 5G urban environment: Clinical Sample delivery in Hospital campus • Develop a solution which will satisfy hospital requirements (special challenge is safety and security requirements). • LMT will work on establishing and benchmarking 5G communication with special attention to security of communications. • IMCS will work on integrating project results regarding object recognition & avoidance and online safety monitoring in a ROS node. • Atechsys and SOBEN will work on coupling between a transport drone and a logistics droide in a periurban area
  • 15. 15 Conclusion - Expected Impact • Strengthen artificial intelligence integration in drones and its applications • Reinforcing the ecosystems of drones industry by providing methodology and a reference software architecture framework that meets performance and safety requirements • Improving innovation capacity and the integration of new knowledge. A structuring aspect of COMP4DRONES is the adoption of a "safe-by-design" approach • Enabling and easing delivery of new services using drones in Europe.
  • 16. Thank you! Questions? Contact • Réda Nouacer (CEA) reda.nouacer@cea.fr