Drones For Rail & Road Tunnel Inspections

The inspection of road tunnels is operated regularly in order to detect anomalies. Drones may now replace inspection teams in this demanding task. 

The Land Transport Authority (LTA) in Singapore is weighing the option of using drones and other unmanned systems in inspecting Singapore’s underground railway systems. 

It has issued a Request for Information (RFI) to seek the industry’s participation in the use of Unmanned Aircraft Systems (UAS) and Unmanned Vehicle (UV) technology for road tunnel inspections.

“It’s a three-hour manual process, involving two workers walking along our underground (the MRT) tunnels for inspection. In the future, a drone zipping along the tunnel will be able to complete the mission in a much quicker and safer manner. Welcome to the world of technology and automation,” LTA said in a statement.

The trials should incorporate 360-degree video mapping of the tunnels, as well as software to automatically detect defects from the video taken and provide their location.

Through the RFI, LTA will evaluate the feasibility and effectiveness of leveraging such technologies in the routine inspection of tunnels.

Manual inspections are currently carried out regularly on rail and road tunnels to detect anomalies, such as cracks or water leakage. LTA’s road tunnel inspections also cover rainwater storage tanks where utility lines are located. These checks allow LTA to ascertain the health of the tunnel structures so that necessary maintenance can be carried out. 

Such checks currently require workers to physically go through the tunnels. The inspection of rail tunnels is even more challenging as workers can only do so within a very limited number of hours at night, after passenger service ceases.

“The use of automated technologies such as UAS and UVs will not only improve the accuracy of inspections but will also free up engineers’ time, enabling them to focus on the analysis of the data captured to recommend any necessary remedial measures,” LTA said.

This RFI expands on LTA’s proof-of-concept trials at ten Thomson-East Coast Line sites, where UAS are being deployed to monitor work progress by taking aerial photographs and videos. These new trials will help to further current research developments and validate UAS and UV technologies under demanding operational conditions.

If found effective, LTA aims to fully deploy these technologies for tunnel inspections in the next five years.

I-HLS

US Army Wants To 3D-Print Mini-Drones:

No Need To Shoot Down Drones – Just Hijack Them:

Made in Britain: Facebook's Drones:

 

 

« Google Search For A Fraud Victim
Board-level Cyber Literacy Is Low, Discomfort High »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Serena

Serena

Serena Software helps increase speed of the software development lifecycle while enhancing security, compliance, and performance.

ENVEIL

ENVEIL

ENVEIL’s technology is the first scalable commercial solution to cryptographically secure Data in Use.

Nexus Group

Nexus Group

Nexus Group develops identity solutions for physical and digital access.

Trusted Knight

Trusted Knight

Trusted Knight is a leading provider of security software solutions focused on defeating newly developed malware and crimeware trojans.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

Corsa Security

Corsa Security

Corsa Security is leading the transformation of network security with a private cloud approach that helps scale network security services with unwavering performance and flexibility.

Absio

Absio

Absio provides the technology you need to build data security directly into your software by default, and the design and development services you need to make it happen.

Client Solution Architects (CSA)

Client Solution Architects (CSA)

Client Solution Architects (CSA) is a leading digital transformation consulting firm focused on the U.S. Defense Department and all U.S. Federal enterprise information technology service areas.

FoxTech

FoxTech

FoxTech is an independent, friendly and deeply specialised cyber security company in the UK, with expertise spanning decades of Public Sector and Government services.

VanishID

VanishID

VanishID (formerly Picnic) is a gritty, pioneering team of intelligence and cybersecurity specialists focused on solving the security challenge of our time - social engineering.

Orpheus Cyber

Orpheus Cyber

Orpheus Cyber provides predictive and actionable intelligence to our clients - enabling them to anticipate, prepare for and respond to the cyber threats they face.

Securious

Securious

If you need to improve your cyber security or achieve cyber security accreditations, Securious provide an independent service that will identify and address your issues quickly and efficiently.

VLC Solutions

VLC Solutions

VLC Solutions is an independent solutions and technology service provider offering Cloud Services, Cybersecurity, ERP Services, Network Management Services, and Compliance Solutions.

Twinstate Technologies

Twinstate Technologies

Twinstate Technologies specializes in cybersecurity, proactive IT, and hosted and on-premise voice solutions.

Quantum Bridge

Quantum Bridge

Our unbreakable key distribution technology ensures the highest level of protection for your critical infrastructure and sensitive data in an evolving digital landscape.

Adsigo

Adsigo

Adsigo AG is your reliable and professional partner for all topics concerning PCI certification, compliance and information security.