question A5 on the 2016 paper), and please bear in mind the format change described above.I will be going through questions from the 20 papers in week 12.Users ranging from illicit actors such as terrorists to reckless or inexperienced recreational operators can pose similar threats to critical infrastructure, national sites and large events or gatherings.
Solutions will also be uploaded by part, but each file will only include those questions attempted to date.
There are two textbooks recommended for this course.
The marks for the coursework are available on Blackboard.
You may pick up your marked coursework from reception, and download the solutions here.
UAS can provide a cost effective additional layer of protection, enhancing providers’ security offering and potentially reducing costs,” the Imperial Capital report posits.
Particular interest is growing among select systems integrators for deploying drones as part of a complete end-to-end security solution.
Please do let me know if you spot any inaccuracies or typos.
The full set of lecture notes, including questions and solutions, is now available to download here (1.4 MB pdf).
’s website in the coming days, we delve into how ground and aerial robotics are fast advancing from R&D facilities and military uses to general security and video surveillance deployments.
As the April 2018 installment of the reinforces, the market for security-centric UAS is expected to increase significantly.