At present, the boom in unmanned aerial vehicles (UAV) has been increasing in recent years, placing them in an important way in the commercial market. The use of UAV in the daily tasks of industry, commerce or as entertainment for children and adults becomes more recurrent. Each of the UAVs has a specific task, depending on the technologies that are provided, in addition to their basic functions with which they were manufactured. However, in most cases the security of these UAVs is not usually taken into account since some of them are inexpensive and do not have a robust security system that protects the data they send or receive for their operation, that can cause its communication system or the operating system that controls its basic functions of flight, landing, among others, to be compromised. These computer attacks could cause physical or moral harm to people around the same operator of the UAV because they could steal information related to the locations they have visited, or intercept images or videos taken by the UAV. This paper shows the exploitation of GPS vulnerability in the commercial drone of the company 3D Robotics, this vulnerability can cause a malicious user to have control of their autonomy, and carry out illicit activities, such as overflying in spaces not allowed as an airport and private areas. The exploitation of this vulnerability is important to make known that the UAVs should have a more robust security system and also give importance to the security of GPS since the only one that has security is the military GPS.
With the rise of mobile technologies, it seeks to solve a large number of needs that users have, for example locating people for emergency services. At present, there are a large number of applications dedicated to providing service of positioning through mobile devices, with the global positioning system (GPS) which is the main positioning technology used. However, other technologies exist that using the correct algorithms can give the position of a target with good precision; one of these technologies is the global system for mobile communications (GSM). The most popular positioning methods include the angle of arrival (AoA), time of arrival (ToA), triangulation, time difference of arrival (TDoA), and trilateration. At the beginning, the GSM service was simply a means of transmitting voice and short messages, with the passage of time the technologies evolved and expanded their characteristics, providing values that can be used to locate a person based on the signal strength received by a person, device, and in the known position of three or more reference nodes. When an emergency occurs, the current communication services (3G or 4G) are insufficient due to the high concentration of mobile subscribers in a single place that exceeds the capacity of an antenna. This means that calls to emergency services are not completed, which makes it difficult to rescue people in danger. Although GSM does not have a technology dedicated to positioning, it can provide valuable data for location by using dedicated algorithms, such as trilateration, with which the coordinates of the target device can be processed by the coordinates of three or more reference nodes. INDEX TERMSAndroid, Cayley-Menger, emergency, location, outdoor. ANA LUCILA SANDOVAL OROZCO was born in Chivolo, Colombia, in 1976. She received the degree in computer science engineering from the Universidad Autónoma del Caribe, Colombia, in 2001, and the M.Sc. degree in research in computer science and the Ph.D. degree in computer science from the Universidad Complutense de Madrid, Spain, in 2009 and 2014, respectively. She completed a Specialization Course in computer networks from the Universidad del Norte, Colombia, in 2006. She is currently a Postdoctoral Researcher with the Universidad Complutense de Madrid, Spain. Her main research interests include coding theory, information security, and its applications. LUIS JAVIER GARCÍA VILLALBA received the Telecommunication Engineering degree from the Universidad de Málaga, Spain, in 1993, and the M.Sc. degree in computer networks and the Ph.D. degree in computer science from the
Due to the daily use of mobile technologies, we live in constant connection with the world through the Internet. Technological innovations in smart devices have allowed us to carry out everyday activities such as communicating, working, studying or using them as a means of entertainment, which has led to smartphones displacing computers as the most important device connected to the Internet today, causing users to demand smarter applications or functionalities that allow them to meet their needs. Artificial intelligence has been a major innovation in information technology that is transforming the way users use smart devices. Using applications that make use of artificial intelligence has revolutionised our lives, from making predictions of possible words based on typing in a text box, to being able to unlock devices through pattern recognition. However, these technologies face problems such as overheating and battery drain due to high resource consumption, low computational capacity, memory limitations, etc. This paper reviews the most important artificial intelligence algorithms for mobile devices, emphasising the challenges and problems that can arise when implementing these technologies in low-resource devices.
Con la investigación se recopiló información sobre prácticas y saberes de la gastronomía colombiana, provincia Oriente en Cundinamarca, buscando rescatar costumbres alimentarias al interior de las familias, llevando un registro escrito de ellas para mostrarlas como identidad cultural. La metodología utilizada es cualitativa de tipo exploratoria, aplicada desde la perspectiva de Fals Borda, Investigación Acción, con la participación de portadoras de tradición y de campesinos en acciones participativas (Mingas). El diseño fue fenomenológico hermenéutico, que se concentra en la interpretación de la experiencia humana y los “textos” de la vida (Ayala Carabajo, 2008). El estudio consistió en la búsqueda de semillas nativas y endémicas casi extintas, para luego su cultivo en huertas caseras, tipo piloto, con prácticas tradicionales planificadas. Se obtuvo como resultado la recuperación de once productos agrícolas: sagú, arrayanes, malanga, malangay, coyo blanco con morado, coyo amarillo con morado, manguzán, caimitos, nísperos, frijol baluy y bejuco batata. A la par de la siembra, se identifican personas locales portadores de conocimiento culinario generacional, se recopilan 40 recetas culinarias preparadas a base de productos agrícolas rescatados y bajo métodos y técnicas tradicionales de preparación y cocción. Para dar a conocer los productos culinarios y promocionar la región, se crearon tres circuitos turísticos motivando a la salvaguardia de los saberes locales.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.