posted by user: zeeshankaleem || 5348 views || tracked by 7 users: [display]

Drone Surveillance 2017 : IEEE Communications Magazine Feature Topic on Amateur Drone Surveillance: Applications, Architectures, Enabling Technologies, and Public Safety Issues

FacebookTwitterLinkedInGoogle

Link: http://www.comsoc.org/commag/cfp/amateur-drone-surveillance-applications-architectures-enabling-technologies-and-public-safety
 
When N/A
Where N/A
Submission Deadline Jul 1, 2017
Notification Due Sep 1, 2017
Final Version Due Oct 15, 2017
Categories    drone surveillance   machine learning   public safety   5g systems
 

Call For Papers

INTRODUCTION
---------------------
The advancement in communication, networking, computation, and sensing technologies has attracted researchers, hobbyist, and investors to deploy mini-drones, officially called unmanned air vehicles (UAVs), due to their enormous applications. Drones have boundless viable applications as well due to its small size and capability to fly without an on-board pilot such as in agriculture, photography, surveillance, and numerous public services. The use of drones for achieving high speed wireless communication is one of the most significant applications for next generation communication system (5G). Indeed, drone-based communication network offers encouraging solution to provide wireless connectivity for devices without infrastructure coverage due to e.g., severe shadowing by urban or mountainous terrain, or damage to the communication infrastructure caused by natural disasters. But its deployment poses several public safety (PS) threats to the national institutions such as atomic plants, historical places, and president houses because of its ability to carry the explosive and other destructive chemicals.

In order to cope with these security threats, surveillance drones (SDrs) deployment is required for surveillance, hunting, and jamming of the amateur drone (ADr). The main motivation of deploying SDrs is to keep eye on the ADr which can lead to serious disasters in case no precautionary measures are taken on time. The SDr architecture should have the capability to self-configure in case of emergency situation without the help of the central ground control station (GCS). The increasingly usage of SDr in surveillance of ADr possess some challenges such as robust detection, tracking, intruder localization, and jamming. The accuracy of detection is a basic requirement of the system. In general, the accurate detection is time-consuming. In fact, a precise moving object detection method makes tracking more reliable and faster, and supports correct classification, which is quite important for SDr to be successful. The existing motion detection algorithms has the problems of computational cost and less robustness because of highly changing extrinsic and intrinsic camera parameters such as pan, tilt, translation, rotation, and zooming, so most accurate algorithms are required which can take care of these parameters. Moreover, the machine learning and pattern recognition algorithms are required to detect the ADr by using the characteristics of the electromagnetic waves, sound, images that can efficiently detect the ADr.

The next major step after detecting the ADr is its tracking and the localization of the ADr intruder. To accurately estimate the position of the ADr and its intruder, the 3D position estimation algorithms are desired to accurately determine the position of the ADr. The FANET architecture based deployment and utilization of the commercial frequency bands for SDr also possess the challenges of interference management with the existing system. So, proper spectrum management schemes are desired which can take care of the dynamically changing environment while allocating the spectrum. The last important step after detection, localization, and tracking is the Jamming and hunting of the ADr. For example, the jamming technologies such as by using excess power and global positioning services (GPS) spoofing can generate the high interference to the SDr signal. So, Jamming signal power control algorithm needs to be designed to avoid surrounding SDr jamming. After jamming the ADr, hunting of the ADr should be done by taking care of security of the surrounding environment. That is, ADr in the air should be landed outside the highly sensitive areas. Thus, to get this goal context-aware path-design algorithms are required to safely land the hunted ADr. Hence, the technologies like frequency band recognition, power control, Jamming and hunting are required to efficiently detect, control, jam, and hunt the ADr.

The goal of the proposed feature topic (FT) is to publish more comprehensive original research for all the readers of the magazine regardless of their specialty. The main objective of this FT is to bring most recent advances in amateur drone surveillance network architecture and technologies. Moreover, its goal is to address the challenges related to public safety issues posed by the flying of drone in the No-fly zone. Original research papers are to be solicited in topics of interest including, but not limited to, the following themes on applications, architectures, enabling technologies, and public safety issues with amateur drone surveillance.

- Innovative P2P and FANET cross-layer architectures and protocols for FANET
- Radio resource management schemes for surveillance drone
- Power control schemes for surveillance drone
- Spectrum sharing and future spectrum requirements for surveillance drones
- Routing and MAC protocols for drones
- Cross layer protocols for drones
- Smart and time-efficient trajectory generation schemes
- Surveillance drone control parameters optimization schemes
- Pattern recognition based amateur drone tracking
- Machine learning algorithms to discriminate amateur drone with moving object
- Sound and electromagnetic waves detection schemes
- Thermal imaging based amateur drone detection scheme
- Coverage extension schemes for amateur drone detection
- Signal strength, inertial sensor, and cell-tower based Positioning schemes
- Active and passive object tracking schemes
- Amateur drone detection and tracking using holographic radars
- Context-aware localization schemes
- Energy efficient localization of amateur drone
- Frequency band recognition technologies for amateur drone jamming
- Location detection technologies and protocols
- 3D location detection protocols
- Disaster resilient location detection protocols
- Robust location accuracy technology development
- Multi-hop and relay-based communications
- Drone classification and identification using data mining techniques
- Interdisciplinary research for catching amateur drone
- Testbeds and experimental results of surveillance drone


SUBMISSIONS
--------------------
Articles should be tutorial in nature and written in a style comprehensible and accessible to readers outside the specialty of the article. Complete guidelines for prospective authors can be found at http://www.comsoc.org/commag/paper-submission-guidelines. The guest editors reserve the right to reject papers they unanimously deem to be either out of the scope of this Feature Topic or otherwise extremely unlikely to be accepted after a peer review process.

It is important to note that IEEE Communications Magazine strongly limits mathematical content, and the number of figures and tables. Mathematical equations should not be used (in justified cases up to three simple equations are allowed). Article length (introduction through conclusions, excluding figures, tables and their captions) should not exceed 4,500 words. Figures and tables should be limited to a combined total of six (6). The number of archival references is limited to fifteen (15). All references to online sources (website URLs, web-posted papers and reports) are required to show an “Accessed on” date. All articles must be submitted through the IEEE Manuscript Central site (http://mc.manuscriptcentral.com/commag-ieee) to the "January 2018 / Amateur Drone Surveillance" category by the submission deadline according to the following schedule:


IMPORTANT DATES
----------------------------
Manuscript Submission Deadline: May 1, 2017
Decision Notification: September 1, 2017
Final Manuscript Due Date: October 15, 2017
Publication Date: January 2018


GUEST EDITORS
-----------------------
Zeeshan Kaleem (Corresponding Managing Guest Editor)
COMSATS Institute of Information Technology, Pakistan
Email: zeeshankaleem@gmail.com

Mubashir Husain Rehmani
COMSATS Institute of Information Technology, Pakistan
Email: mshrehmani@gmail.com

Ejaz Ahmed
National Institute of Standards and Technology, Gaithersburg, USA
Email:imejaz@gmail.com

Abbas Jamalipour
University of Sydney, Australia
Email: a.jamalipour@ieee.org

Joel J. P. C. Rodrigues
National Institute of Telecommunications (Inatel), Brazil
Email: joeljr@ieee.org

Hassna Moustafa
Intel Corporation, USA
Email: hassnaa.moustafa@intel.com

Wael Guibene
Intel Labs Europe, Ireland
Email: wael.guibene@intel.com

----------------------------------------

Dr. Zeeshan Kaleem,
Assistant Professor,
EE Department,
COMSATS Institute of Information Technology, Pakistan
https://scholar.google.com.pk/citations?user=6g9cROAAAAAJ&hl=en

------------------------------------------

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
IEEE-Ei/Scopus-CWCBD 2025   2025 6th International Conference on Wireless Communications and Big Data (CWCBD 2025) -EI Compendex
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
IEEE ICICN 2025   2025 IEEE 13th International Conference on Information and Communication Networks (ICICN 2025)
ICICN 2025   2025 IEEE 13th International Conference on Information and Communication Networks (ICICN 2025)
AMLDS 2025   IEEE--2025 International Conference on Advanced Machine Learning and Data Science
AIR 2024   Artificial Intelligence Revolutions
IEEE CACML 2025   2025 4th Asia Conference on Algorithms, Computing and Machine Learning (CACML 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust