Mini Drones That Can See In The Dark

Camera-armed multi-rotor drones take great pictures…during the day. But if they are to guide themselves through darkened rooms and buildings, they need to see in low-light conditions while quickly moving.

A new type of visual sensor developed by Swiss researchers will allow drones to see as human eyes do. That will enable small drones to be more useful in both “civilian and military applications,” such as finding people trapped in rubble or during complex urban warfare scenarios, the research team’s head said.

Conventional cameras work by collecting lots of information about light (specifically, its intensity). They treat all the data equally, which is fine for taking single pictures. But when the light is low, or when the camera is moving, as it would on a drone, that technique produces blurred pictures that don’t convey any useful information.  

The Dynamic Vision Sensor, or DVS, works differently. “Instead of wastefully sending entire images at fixed frame rates, only the local pixel-level changes caused by movement in a scene are transmitted, at the time they occur,” explained David Scaramuzza, one of the paper’s authors and the head of the Director of the Robotics Perception Group at the University of Zurich.

The DVS works much more the way an eye does, looking for areas of the field where there is some change in the light intensity. Focusing on such changes, which Scaramuzza called “events,” can help the entire system to see both movement and edges in low light much more efficiently.

In their paper, Scaramuzza’s team describe a hybrid approach that uses the DVS event camera to transmit data about changes in brightness as well as collecting standard frames.

They conducted two experiments, including the first autonomous flight of a drone using an event camera. In one experiment, they switched the light on and off as the drone flew around the room, forcing it to focus on the events, coupled with measurements it gathered while the light was on. In the second one, the drone flew autonomously, in darkness, in ever-faster circles to see how will the technique worked when the drone was moving quickly.

They found that their DVS-equipped drone saw 130 percent better than a similar system relying exclusively on event data and 85 percent better than a system relying only on standard data.

The University of Zurich researchers worked with the Swiss research consortium NCCR Robotics in the effort, which was partially funded by the Defense Advanced Research Projects Agency, or DARPA.
 
The US military is increasingly concerned with how to wage war in dense urban environments, particularly where GPS signals are blocked or are hard to acquire.

DefenseOne:

You Might Also Read:

Drones, Satellites And Cyber Warfare:

Drones For Rail & Road Tunnel Inspections:

 

« US Air Force Hacked By Teenager
What Is Edge Computing? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Acuity Risk Management

Acuity Risk Management

Acuity Risk Management helps businesses worldwide effectively manage, prioritize and report on their risks to inform strategic and tactical decision-making and build long-term resilience.

SharkGate

SharkGate

SharGate provide a cloud-based website security solution to protect websites from being hacked.

Allgress

Allgress

Allgress solutions converge disparate risk silos across enterprise networks and automate governance, risk and compliance management processes.

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets is a global series of summits focusing on cyber security for critical infrastructure.

AFCON Control & Automation

AFCON Control & Automation

AFCON is a leading global provider of software solutions and services for the smart management of Control & Automation systems in the age of Digital Transformation.

Ekran System

Ekran System

Ekran System is an advanced insider threat detection solution for companies of any size.

G DATA CyberDefense

G DATA CyberDefense

G Data developed the world's first antivirus software. We now ensure the security of small, large and medium-sized companies all over the world.

Cybertron

Cybertron

Cybertron services include real-time monitoring and incident response and a cyber range for competency development.

Sonda

Sonda

SONDA is the leading systems integrator and IT service provider in Latin America.

Method Cyber Security

Method Cyber Security

Method offers a Cyber Security Risk Management training course for those responsible for the security of industrial automation, control and safety systems.

Tehtris

Tehtris

TEHTRIS XDR Platform was developed to control and improve the IT security of private and public companies against advanced cyber threats such as cyber espionage or cyber sabotage activities.

Winterhawk

Winterhawk

Winterhawk is a specialist and leading global Cyber, ESG, GRC, Risk & Identity consulting practice.

Safetech Innovations

Safetech Innovations

Safetech Innovations is a team of cyber security experts, always at your service. We use human and cyber intelligence to help your business in uncertain times.

Center for Information Technology Policy (CITP) - Princeton University

Center for Information Technology Policy (CITP) - Princeton University

The Center for Information Technology Policy at Princeton University is a nexus of expertise in technology, engineering, public policy, and the social sciences.

Vectra AI

Vectra AI

Vectra threat detection & response - see and stop threats across hybrid and multi-cloud enterprises.

Bastazo

Bastazo

Bastazo provides tools for vulnerability and patch management. Focus your cybersecurity operations on vulnerabilities with the highest risk of exploitation.