Dubai Tests Autonomous Aerial Vehicle

Dubai, in collaboration with the Chinese company Ehang, has tested an autonomous aerial vehicle (AAV) capable of carrying a human . The emirate’s transport authority aims to start the operation of the self-driving hover-taxi by July.

Branded as Ehang184, the vehicle is fitted with a touchscreen to the front of the passenger seat displaying a map of all destinations in the form of dots, explained the Road and Transport Authority (RTA).

According to tradearabia.com, the vehicle has preset routes and the rider is to select the intended destination. It will then start automatic operation, takeoff and cruise to the set destination before descending and landing in a specific spot. A ground control centre will monitor and control the entire operation.

Mattar Al Tayer, director general and chairman of RTA said: “The trial run of the first AAV replicates Dubai self-driving Transport Strategy aimed at transforming 25% of total individual trips in Dubai into self-driving trips using various modes of transport by 2030. The step would also enhance the integration between public transport modes and people happiness through the provision of smooth, quick and innovative mobility.”

He added: “The AAV exhibited at the World Government Summit is not just a model; it is a real version that we have already experimented the vehicle in a flight in Dubai sky. The RTA is making every effort to start the operation of the AAV in July 2017.”

Regarding security, he said that the highest levels of security were addressed, “in the designing and manufacturing of the Ehang184. The vehicle is fitted with eight main propellers, where each propeller would operate at a time, and the systems are separated from the contents of the vehicle.”

“In case of any failure in the first propeller, there would be seven other propellers ready to complete the flight and a smooth landing, while mitigating the impact of the fault sustained by the first propeller. The AAV is fitted with numerous basic systems all in operation at the same time, though independently. In case of any malfunctioning in one of these systems, the standby system would be capable of controlling and safely steering the AAV to the programmed landing point,” explained Al Tayer.

“The AAV is designed to fly for maximum 30 minutes at a maximum cruising speed of 160 km per hour (km/h), and the standard speed shall be 100 km/h.

The AAV measures 3.9 m in length, 4.02 m in width and 1.60 m in height. It weighs about 250 kg and 360 with a passenger,” he added.

“The maximum cruising height is 3,000 feet and the battery charging time is 1-2 hours. The AAV is designed to operate under all climatic conditions unless there is a thunderstorm. The vehicle is fitted with highly accurate sensors with a very low-error threshold and can resist vibrations and extreme temperatures.

“Dubai Civil Aviation Authority was a partner in our trials defining the safety criteria required, issuing the permits for trial and inspecting the vehicle, RTA appreciates their contribution. Etisalat had contributed as well to the success of the test run of the AAV in its capacity as a prime network provider.

The 4G data network is used in communication between the AAV and the ground control centre. The Company had also provided the support needed to ensure the continued communication between the AAV and the Control Centre through M2M and LTE technologies,” explained Al Tayer.

I-HLS

Uber Wants Self-Flying Vertical Takeoff Cars:

Ethics of Drones, Remote Weapons and Robots:

 

 

 

 

« Facial Recognition Technologies
Deep Learning Technologies »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Identiv

Identiv

Identiv is a global security technology company that establishes trust in the connected world, including premises, information and everyday items.

Pole SCS (Secure Communicating Solutions)

Pole SCS (Secure Communicating Solutions)

SCS is a world-class competitiveness cluster dedicated to digital technologies in the fields of Microelectronics, Internet Of Things, Digital Security, Artificial Intelligence And Big Data.

Verint Systems

Verint Systems

Verint is a leader in Actionable Intelligence with a focus on customer engagement optimisation, security intelligence, fraud, risk and compliance.

ReversingLabs

ReversingLabs

ReversingLabs develops cyber threat detection and mitigation tools that address the the latest directed attacks, advanced persistent threats and polymorphic malware.

Clearswift

Clearswift

Clearswift is trusted by businesses, governments and defense organizations globally for its Adaptive Cyber Security and Data Loss Prevention solutions.

Pentagon Group

Pentagon Group

Pentagon Group is a provider of security services in high-risk environments, remote areas and emerging markets in support of land-based, aviation, maritime and cyber operations.

CRYPTTECH

CRYPTTECH

CRYPTTECH specializes in Information Security and Intelligence, Risk Evaluation and Vulnerability Recognition against Cyber-Attacks and APTs.

A-LIGN

A-LIGN

A-LIGN is a technology-enabled security and compliance partner trusted by more than 2,500 global organizations to mitigate cybersecurity risks.

Cryptshare

Cryptshare

Cryptshare is a communication solution that enables you to share e-mails and files of any size securely.

Red Piranha

Red Piranha

Red Piranha's Crystal Eye Unified Threat Management Platform is designed for Managed Service Providers and corporations that need extreme security that is both easy to use and affordable.

Enso Security

Enso Security

Enso is the first Application Security Posture Management (ASPM) solution, helping security teams everywhere eliminate their AppSec chaos with application discovery, classification and management.

Kontex

Kontex

Kontex is a Cyber Security consultancy creating resilient solutions. From Strategy, Advisory and Implementation to Management and everything in between.

Gem Security

Gem Security

Gem is on a mission to help security operations evolve into the cloud era, and stop cloud threats before they become incidents.

US Department of State - Bureau of Cyberspace & Digital Policy

US Department of State - Bureau of Cyberspace & Digital Policy

The Bureau of Cyberspace and Digital Policy leads and coordinates the Department’s work on cyberspace and digital diplomacy to encourage responsible state behavior in cyberspace.

MLSecOps Community

MLSecOps Community

The MLSecOps Community is a collaborative space for machine learning security experts and industry leaders to connect and shape the future of AI/ML security.

IT Solutions Consulting

IT Solutions Consulting

IT Solutions is a full-service IT partner providing managed services and other information technology solutions nationwide.