Abbreviations: Acronyms
The following terms are common to the UAS industry, general literature or conferences on UAS/UAV/Drone systems.
A /Aref | Amplitudes of source and reference points, see Eq-20-6, 7 |
AA | Anti-aircraft / Adaptive Antennas |
AAA | Anti-aircraft artillery |
AAIB | Air Accidents Investigation Board |
AAM | Air-to-air missile |
AAV | Autonomous air vehicle |
A/C | Aircraft |
ACAS | Airborne collision avoidance system / Assistant Chief of the Air Staff |
ACL | Agent communication language / Autonomous control levels |
ACS | Airborne control station (system) |
ACTD | Advanced Concept Technology Demonstration |
AD | Ansar Dine terrorist group |
A/D | Attack / Defense Scenario Analysis |
ADAC | Automated Dynamic Airspace Controller |
ADC | Air data computer |
ADF | Automatic direction finder/finding |
ADS | Air Defense System (USA) |
ADS-B | Automatic Dependent Surveillance – Broadcast systems |
ADT | Air Data Terminal |
AEW | Airborne early warning |
AF | Adaptive Filtering |
AFCS | Automatic flight control system |
AFRICOM | US Africa Command |
AGM | Air- to- surface missile |
AGARD | Advisory Group for Aerospace Research and Development (NATO) |
AGM-65 | Maverick (USA) is an air-to-surface missile (AGM) designed for close air support. It is the most widely produced precision-guided missile in the Western world, and is effective against a wide range of tactical targets, including armor, air defenses, ships, ground transportation and fuel storage facilities |
AHA | Autopilot Hardware Attack |
AHRS | Attitude and heading reference system |
AI | Artificial intelligence |
AIAA | American Institute of Aeronautics and Aerospace |
AIC | Aeronautical Information Circular |
AIP | Aeronautical Information Publication |
AIS | Automated Identification System for Collision Avoidance |
AJ | Anti-Jam |
AM | Amplitude Modulation / al-Mourabitoun terrorist group |
ANSP | Air Navigation Service Provider |
AO | Area of Operations |
AoA | Angle of Attack |
APEC | Asia Pacific Economic Cooperation |
APG | Asia-Pacific Gateway |
APKWS | Advanced precision kill weapon system |
AQ | Al-Qaeda Terrorist Group – “the Base” |
AOA | Aircraft Operating Authority |
AQIM | Al-Qaeda in the Islamic Maghreb |
Ar | Receive antenna effective area, m2 |
AR | Aspect ratio |
AR drone | AR stands for “Augmented Reality” in AR drone. AR Drone can perform tasks like object recognition and following, gesture following |
ARM | Anti-Radiation Munitions |
ARS | Airborne Remote Sensing |
ARW | Anti-radiation weapons |
AS | Airborne Sensing Systems |
ASB | Advisory Service Bulletin |
ASEA | Active electronically scanned arrays |
ASEAN | Association of Southeastern Asian Nations |
ASL | Airborne Systems Laboratory |
ASMS | Automated Separation Management System |
ASTM | American Society of Testing and Materials |
ASTER | Agency for Science, Technology and Research |
ASW | Anti-submarine warfare |
AT | Aerial target |
ATC | Air Traffic Control |
ATM | Air Traffic Management |
ATR | Automatic Target Recognition |
ATS | Air Traffic Service |
AUDS | Anti-UAV Defense System |
AUV | Autonomous Underwater Vehicle |
AUVSI | Association for Unmanned Vehicle Systems International |
AV | Air Vehicle |
AWSAS | All Weather Sense and Avoid System |
B | IF equivalent bandwidth, Hz |
BAMS | Broad Area maritime surveillance |
Backhauling | Intermediate links between core network or internet backbone and small subnets at the edge of the network |
Bandwidth | Defined as the Range within a band of wavelengths, frequencies or energy.Think of it as a range of radio frequencies occupied by a modulated carrier wave, assigned to a service over which a device can operate. Bandwidth is also a capacity for data transfer of electrical communications system. |
BDA | Battle Damage assessment |
BER | Bit error rate |
BLOS | Beyond line-of-sight |
BNF | Bind and Fly – with custom transmitter |
BRI | Belt and Road Initiative (Chinese) |
BR&T | Boeing Research and Technology |
BSR | Bilinear Signal Representation |
BSs | Base Stations |
BVR | Beyond visual range |
c | Speed of light ~ (3 x 108 m/s) [186,000 miles per sec] in vacuum named after Celeritas the Latin word for speed or velocity |
c | Speed of sound (344 m/s) in air |
C | Combined methods of CR [Conflict Resolution] |
C2 / C2W | Command and control / Command and Control Warfare |
C3I | Command, control, communications and Intelligence |
C4 | Command, control, communications and computers |
C4ISTAR | Command, control, communications, computers, intelligence, surveillance, target Acquisition and reconnaissance |
CA | Collision Avoidance / Clear Acquisition (GPS) / Cyber Assault (aka CyA) |
CAA | Control Acquisition cyber attack |
CAS | Close Air Support / Common situational awareness |
CASA | Civil Aviation Safety Authority |
C of A | Certificate of Airworthiness |
CAP | Civil Air Publication / Combat Air Patrol |
CAT | Collision Avoidance Threshold |
CC / CyC | Cyber Crime |
CCCI/II | Classical Cryptography Course Volume I/II (Nichols R. K., Classical Cryptography Course Volume I / II, 1996) |
CCE | Cyber Counter Espionage |
CCI | Command control interface / Cyber Counterintelligence |
CCS | Cyber Counter Sabotage |
CCT | Cyber Counter Terrorism |
CD | Conflict Detection |
CDL | Common data link |
CDMA | Code division multiple access |
CDR | Collision detection and resolution systems (automated SAA in UAS) |
CEA | Cyber electromagnetic activities |
CETC | Chinese Electronics Technology Group |
CF | Computer Forensics |
CFTA | Continental Free Trade Area |
CFT | Certificate of flight trials |
CI / CyI | Cyber Infiltration |
CIA | Confidentiality, Integrity, Availability / Central Intelligence Agency |
CIN | Common Information Network |
CIR | Color Infrared – artificial standard where NIR bands shifted so that humans can see the infrared reflectance |
C/N | Carrier to Noise ratio in HAPS, => C/ N0 |
CM / CyM | Cyber Manipulation |
CN3 | Communications / navigation network node |
CNO | Chief Naval Operations |
CNPC | Control and non-payload links |
COA | Certificate of Waiver or Authorization |
COB | Chief of the Boat |
COMINT | Communications intelligence |
COMJAM | Communications Jamming |
COMSEC | Communications Security |
CONOP(S) | Concept(s) of Operations |
CONUS | Continental United States |
COS | Continued Operational Safety |
COTS | Commercial off-the-shelf |
CPA | Closest Point of Approach |
CPA Spoof | CPA spoof involves faking a possible collision with a target ship |
CPL | Commercial pilot’s license |
CPRC | Communist Party of the Republic of China |
CR | Conflict Resolution / Close range / Cyber Raid (aka CyR) |
CRH | Coaxial rotor helicopter |
CRX | Received Signal Power, watts |
CS | Control station |
CSDP | Common Security and Defense Policy missions (EU) |
CSfC | Commercial Solutions for Classified Program |
CSIRO | Commonwealth Scientific and Industrial Research Organization |
CT | Counter Terrorism / Counter Terrorism Mission |
CTOL | Conventional take-off and landing |
C-UAS | Counter Unmanned Aircraft Systems (defenses / countermeasures) |
CUAS | CSIRO Unmanned Aircraft Systems |
CV | Collision Volume |
CW / CyW | Cyber Warfare |
D | Distance from transmitter in Range equation (Adamy D. -0., 2015) |
DA | Danger area |
Danger Close | Definition www.benning.army.mil/infantry/magazine/issues/2013/May-June/Myer.html Nov 14, 2013 – 1) Danger close is included in the “method-of-engagement” line of a call-for-fire request to indicate that friendly forces are close to the target. … Danger close is a term that is exclusive from risk estimate distance (RED) although the RED for 0.1 percent PI is used to define danger close for aircraft delivery. Pi = Probability of incapacitation. 2) Definition of “Danger close” (US DoD) In close air support, artillery, mortar, and naval gunfire support fires, it is the term included in the method of engagement segment of a call for fire which indicates that friendly forces are within close proximity of the target. |
DARO | Defense Airborne Reconnaissance Office |
DARPA | Defense Advanced Research Projects Agency |
DAS | Detection by Acoustical Signature |
dB | decibels |
DC | Direct current |
DCPA | Distance between vessels approaching CPA |
DDD | Dull, dangerous, and dirty |
DDOS | Distributed Denial of Service cyber attack |
DE | Directed Energy |
DEFCON | DEFCON is the world’s longest running and largest underground hacking conference |
DE / EMP /EP | Directed energy / Electromagnetic pulse |
DEW | Directed – energy weapons |
DF | Direction finding |
DFCS | Digital Flight Control System |
DHS | Department of Homeland Security |
DIME | Diplomatic, information, military and economy |
Dj | Jammer location – to-target receiver location distance, in km, FM 34-40-7 |
DJ | Data Jamming / Drone Jammer |
DJI | Popular and functional Chinese made drone series: Mavic, Phantom, Ryze, Matrix, Spark, Enterprise, Inspire, Tello {However, banned by USA Army} (Newman, 2017) |
DL | Downlink in HAPS |
DLA | Date last accessed (usually a web reference) |
DLI | Data Link interface |
DNA | Deoxyribonucleic acid – genetic key to human life |
DoD | Department of Defense |
DOF | Degrees of Freedom |
DOS | Denial of Service cyber attack |
DPM | Direct power management / Dynamic Power Management |
DPRK | Democratic People’s Republic of Korea |
DSA | Detect, sense and avoid / Dynamic Sense-and-Act |
DSSS | Direct sequence spread spectrum |
Dt | Enemy transmitter location -to- target receiver location, in km, FM 34-40-7 |
DT | Directional transmission |
DTDMA | Distributed Time Division Multiple Access network radio system |
DTED | Digital terrain evaluation data |
DTH | Direct-To-Home |
DTRA | Defense Threat Reduction Agency |
DUO | Designated UAS operator |
EA | Electronic Attack |
EARSC | European Association of Remote Sensing Companies |
EAS | Equivalent airspeed |
EAU | East Africa union comprising of Israel and six East African states, Kenya, Ethiopia, Tanzania, Uganda, Rwanda and South Sudan |
(Eb / N0) | Thermal noise power spectral density ratio |
ECCM / EP | Electronic counter-countermeasures / Electronic Protection |
ECM | Electronic countermeasures |
ECR | Electronic combat reconnaissance |
EDC | Estimated Date of Completion |
EHS | Enhanced surveillance |
EIRP | Effective Isotropic radiated power |
Electrolaser | Electroshock weapon that is also a DEW. Uses lasers to form electrically conductive laser-induced plasma charge |
ELINT | Electronic Intelligence |
ELT | Emergency locator transmitter |
ECM | Electromagnetic compatibility |
EM | Electromagnetic |
EMI | Electromagnetic interference |
EMP | Electromagnetic pulse |
EMR | Electromagnetic Radiation |
EMS | Electromagnetic Spectrum |
EMSVIS | Electromagnetic Spectrum Visible Light |
EMW | Electromagnetic Waves |
EO | Electro-optical (sensing) / Earth Observation |
ERPJ | Effective radiated power of the jammer, in dBm |
ERPS | Effective radiated power of the desired signal transmitter, in dBm |
ESM / ES | Electronic support measures / Electronic warfare support / Earth station |
EU | European Union |
EUNAVFOR | European Union Naval Force’s anti-piracy naval mission |
EUTM | Somalia Military training mission in Somalia |
EVTOL | Electric Vertical Take-off and Landing |
EW | Electronic warfare |
F | Field theory methods of CR |
F | Fundamental frequency is defined as the lowest frequency of a periodic waveform |
f | Frequency, cycles / second RRE) |
F0 | Resonant frequency of string, Hz see Eq. 20-5 |
F | Frequency in MHz, FM 34-40-7 |
FAA | Federal Aviation Administration |
FACE | Future Airborne Capability Environment |
FAR | False Alarm rates |
FBL | Fly-by-Light, a type of flight-control system where input command signals are sent to the actuators through the medium of optical-fiber |
FBW | Fly-by-Wire: Predetermine flight mission path based on GPS coordinates |
FCS | Flight control systems / Flight Control Station |
FDF | Frequency Domain Filtering |
FDM | Frequency division multiplexing |
FHSS | Frequency hopping spread spectrum |
FIR | Far Infrared (25-40) to (200-350) um |
FIRES | Definition (US DoD – JP 3-0) the use of weapon systems to create a specific lethal or nonlethal effect on a target |
FL | Flight level |
FLIR | Forward-looking Infrared |
FMS | Flexible manufacturing system |
Follow-Me | UAS autopilot automatically follows operator |
Fom | HAPS Figure of merit in upload /download link |
FoV | Field of View |
FFoV | Forward Field of View |
FRAGO | Fragmentary Order – to send timely changes of existing orders to a subordinate |
FPGA | Field programmable gate array |
FS | Fixed service |
FSS | Fixed satellite service |
FW | Fixed wing |
G | Geometric methods of CR |
G5S | G5 Sahel (G5S) Joint Force, has membership of five states; Burkina Faso, Mali, Mauritania, Niger, and Chad |
gAR | Receiving Antenna Gain as a Factor |
GBU | Guided Bomb Unit |
GCHQ | Government Communications Headquarters (Britain) |
GCS | Ground Control Station |
GDPR | European Union’s (EU) General Data Protection Regulation |
GDT | Ground data terminal |
GEO | Geostationary Earth orbit satellite |
GeoFence | A geofence is a virtual perimeter for a real-world geographic area |
GLOW | Gross lift-off weight for a missile / rocket |
GNSS | Global Navigation Satellite System |
GPS | Global Positioning System / Geo Fencing |
GPS/INS | Use of GPS satellite signals to correct or calibrate a solution from an inertial navigation system (INS). The method is applicable for any GNSS/INS system. |
GPSSPOOF | Hack of GPS system affecting UAS commands |
GPWS | Ground proximity warning system |
GR | The receiving antenna gain in the direction of the desired signal transmitter, dBi |
GRJ | Receiving antenna gain in the direction of the jammer, in dBi |
GS | Ground segment of HAPS |
GSE | Ground support equipment |
GSHM | Ground Station Handover Method |
GSM | Global System for Mobile Communications |
GT | Game Theory methods of CR |
G/T | Ratio of the receive antenna gain to system noise temperature |
(G /Ts) dB | Represents the figure of merit of the HAPS receiver, in dB |
GT | Gain of the transmit antenna, dB |
GTA | Ground-to-Air Defense |
Harmonic | Frequency, which is an integer multiple of the fundamental frequency |
H | Elevation of the jammer location above sea level, feet, FM 34-40-7 |
HAE | High altitude endurance |
HALE | High altitude – long endurance |
HAPS | High Altitude Platforms (generally for wireless communications enhancements) |
HAPS UAVs | UAVs dedicated to HAPS service (example to communicate via CNPC links) |
HEAT | High-explosive anti-tank warhead |
HITL | Human in-the-loop |
HMI | Human machine interface |
HPA | High power amplifier |
Ht | Elevation of enemy transmitter location above sea level, in feet, FM 34-40-7 |
HUD | Heads-up display |
HUMINT | Human intelligence (spy’s) |
HVT | High value target (generally, for assassination) |
I | Sound intensity, W x m-2 [Source strength S / 4πr2] (Uni-wuppertal, 2019) |
IA | Information Assurance / Intentional cyber warfare attack |
I-actors | Intentional Cyber Actors |
IAS | Indicated air speed |
ICAO | International Civil Aviation Organization |
I.C.B.C. | International Center for Boundary Cooperation (China) |
ICGs | Information centers of gravity |
ICS | Internet Connection Sharing |
ID | Information Dominance / Inspection and Identification |
IEDs | Improvised Explosive Devices |
IEEE | Institute of Electrical and Electronics Engineers |
IEWS | Intelligence, electronic warfare and sensors |
IFF | Identification, friend or foe (see chapter 19) |
IFR | Instrument flight rules |
I&I | Interchangeability and Interoperability |
IIT | Intentional Insider Threats |
Imaging Sensors | ARS sensors that build images |
IL | Intensity level of sound measured, dB, Eq. 20-2 |
IMINT | Imagery intelligence |
IMM | Interacting-multiple-models tracker |
INS | Inertial navigation system |
IMU | Inertial Measurement Unit |
INFOSEC | Information Security |
IO | Information Operations |
IOC | Intergovernmental Oceanographic Commission |
IOR | India Ocean Region |
IoT | Internet of things |
IPL | Insitu Pacific Limited |
IR | Infrared |
IRST | Infrared search and tracking |
IS | Information Superiority |
ISIS | Islamic State of Iraq and al Sham (ISIS) |
ISR | Intelligence, Reconnaissance and Surveillance UAS Platform |
ISTAR | Intelligence, surveillance, target acquisition and reconnaissance |
ITU | International Telecommunications Union – Standards Organization |
ITU-R | International Telecommunications Union – Radio Sector |
IW | Information Warfare |
JAGM | Joint-Air-to-Ground Missile |
JAUS | Joint architecture for UAS |
JDAM | Joint direct attack munitions |
JFO | Joint fires observer |
JP | Joint Publication – followed by military identifier |
JDAM | Joint Direct Attack Munition |
JNIM | Jama’at Nusrat al-Islam wal-Muslimin |
JOPES | Joint Operation and Planning System / Execution System |
JP | Joint Publication |
J/ S | = the ratio of the jammer power to the desired signal power at the input to the receiver being jammed in dB |
JTAC | Joint Terminal Attack Controller |
JTIDS | Joint Tactical Information Distribution System (JTIDS) is an L band DTDMA |
K | Boltzmann’s constant (Noise component, RRE) (1.38 x 10 -23 J/K), Kelvin |
K | for jamming frequency modulated receivers (jamming tuner accuracy), FM 34-40-7 |
KAMIKAZE | Means “Divine Wind,” Tactic best known for Japanese suicide A/C attacks on Allied Capital Vessels in WWII. UAS TEAMS or SWARMS could be directed in the same way. |
KM | Katiba Macina Groups |
L | λ / 2 in Eq. 20-5 |
LAANC | Low Altitude Authorization and Notification Capability |
LASER | “A laser is a device that emits light through a process of optical amplification based on the stimulated emission of electromagnetic radiation. The term “laser” originated as an acronym for “light amplification by stimulated emission of radiation”. A laser differs from other sources of light in that it emits light coherently, spatially and temporally. Spatial coherence allows a laser to be focused to a tight spot, enabling applications such as laser cutting and lithography. Spatial coherence also allows a laser beam to stay narrow over great distances – collimation, enabling applications such as laser pointers. Lasers can also have high temporal coherence, which allows them to emit light with a very narrow spectrum. i.e., they can emit a single color of light. Temporal coherence can be used to produce pulses of light as short as a femtosecond. Used: for military and LEO devices for marking targets and ,measuring range and speed.” (Gould, R.G. 1959) |
Laser JDAM | Laser Joint Direct Attack Munition – dumb bombs, all weather precision –guided munitions. Guided by an integrated inertial guidance system. |
Laser rangefinder | Scope to assist targeting of munitions. Countermeasure: laser-absorbing paint |
LGWs | Laser-guided weapons |
Latency | Processing difference between time interval signal is transmitted and signal is received |
LCDR | Lieutenant Commander |
L/D | Lift to drag ratio |
LDCM | Low Duty cycle methods |
LEO | Low Earth Orbit Satellite |
LGB | Laser-guided bomb, a guided bomb that uses semi-active laser guidance to strike a designated target with greater accuracy than an unguided one |
LGTF | Liptako-Gourma task force (LGTF) established by Burkina Faso, Mali, and Niger to secure their shared border region |
LIDAR | Light (Imaging) Detection and Ranging |
LFS | Free-Space Loss as a Factor |
LIPC | Laser-induced plasma channel |
LJ | Propagation loss from jammer to receiver, in dBi |
LMM | Lightweight Multi-role Missile (by Thales) |
LOS | Line-of-sight / Loss of Signal / Loss of Separation |
LOSAS | Low cost Scout UAV Acoustic System |
LPA | Log periodic array |
LPI | Low Probability of Intercept |
LR | Long range |
LRAD | Long Range Acoustic Device (Weapon) (Yunmonk Son, 2015) |
LRCS | Low radar cross section |
LRE | Launch and recovery element |
LRF | Laser rangefinder |
LS | Losses existing in the system (lumped together), dB (RRE) |
LS | The propagation loss from the desired signal transmitter, in dBm |
LSDB | Laser Small Diameter Bomb |
LST | Laser spot trackers |
LTA | Lighter than Air (airship) / Low noise amplifier |
LTE /LTE+ | Long Term Evolution – refers to mobile telecommunications coverage |
LWIR | Long wave Infrared (sensor or camera) |
M | Mass in Eq. 20-5 |
MA | Multi-agent methods of CR |
MAD | Magnetic anomaly detection / Mutually Assured Destruction (International Nuclear Policies in 50s-70s) |
MAE | Medium-altitude endurance |
MAGTF | Marine air-ground task force |
MALDRONE | Malware injected into critical SAA for UAS |
MALE | Medium-altitude, long endurance UAS |
MALE-T | Medium altitude long endurance – tactical UAS |
MAME | Medium altitude, medium endurance |
MASINT | Measurement and Signal Intelligence |
MATS | Mobile Aircraft Tracking System |
M-AUDS | Mobile Anti-UAV Defense System |
MAV | Micro-air vehicle |
Maverick | AGM -65 (USA) Missile |
MCE | Mission control element |
MCM | Mine countermeasures |
MCU | Master Control Unit (SCADA) |
MDR | Missed Detection Rates |
MEB | Marine expeditionary brigade (14,500 marines and sailors) |
MEMS | Micro-electromechanical systems (see chapter 19) |
MEO | Medium Earth Orbit satellite |
MFD | Multi Function display |
MGTOW | Maximum gross takeoff weight |
MHT | Multiple-hypotheses-testing |
MIM | Man in the Middle cyber attack |
MINUSMA | Multidimensional Integrated Stabilization Mission in Mali |
MIR | Mid Infrared 5 to (25-40) um |
MIT | Massachusetts Institute of Technology |
MMI | Man-machine interface |
MORS | Military Operations Research Society |
MPI | Message-passing interface |
MPO | Mission payload operator |
MR | Medium range |
MRE | Medium-range endurance |
MRZR LMADIS | A Light Marine Air Defense Integrated System. System mounted on a Polaris MRZR diesel tactical combat vehicle. Comprised of two vehicles – one a command node and the other a sensor node. Once the threat is detected , the LMADIS uses jamming to disrupt the signals of the drone. |
MS | Mobile service |
MSL / AGL | MSL altitudes are measured from a standard datum, which is roughly equal to the average altitude of the ocean. So, an aircraft traveling 5,000 feet directly above a mountain that’s 3,000 feet tall would have an altitude of 5,000 feet Above Ground Level (AGL) and 8,000 feet MSL. |
MSR | Maritime Silk Road (China) |
MTCR | Missile Technology Control Regime |
MTI | Moving target indication |
MTOM | Maximum take-off mass |
Modulation | Signal Modulation is the process of varying one or more properties of a periodic waveform, called the carrier signal, with a modulating signal that typically contains information to be transmitted |
MTOW | Maximum takeoff weight of an aircraft at which the pilot can attempt to take off, due to structural or other limits |
MTS | Multi Spectral Targeting System |
MTTR | Multitarget tracking radar/ Mean time to repair |
MUAV | Mini-UAV or maritime UAV |
MUJAO | Movement for Unity and Jihad in West Africa |
MUM | Manned-unmanned teaming |
MWIR | Midwave Infrared |
MW | Microwave towers |
N | Available Noise power, watts for HAPS |
N | Terrain and ground conductivity factor, FM 34-40-7, where 5 = very rough terrain with poor ground conductivity; 4 = moderately rough terrain with fair to good ground conductivity; 3 = Farmland terrain with good ground conductivity; 2 = Level terrain with good ground conductivity. The elevation of the jammer location and the enemy transmitter location does not include the height of the antenna above the ground or the length of the antenna. It is the location deviation above sea level. |
NAC | Network Access Control |
NACA | National Advisory Committee on Aeronautics |
NAS | National Airspace (USA) |
NAV | Nano-air vehicle / NAV data message for GPS systems |
NBC | Nuclear, biological and chemical warfare |
NCO | Network-centric operations |
NCW | Network Centric Warfare |
NDRC | National Development and Reform Commission (China) |
NEC | Network enabled capability |
NGO | Non-Governmental Organization |
NIEM | National Information Exchange Model |
NIR | Near Infrared |
NLOS | Non-line-of-sight |
NMAC | A NMAC is defined as an incident associated with the operation of an aircraft in which a possibility of collision occurs as a result of proximity of less than 500 feet to another aircraft, or a report is received from a pilot or a flight crewmember stating that a collision hazard existed between two or more aircraft. |
NMLA | National Movement for Liberation of Azawad (Tuareg Rebellion) |
NO | Numerical Optimization methods of CR |
NOLO | No onboard live operator (USN) |
NOTAM | Notice to airmen |
NPS | National Park Service |
NSA | National Security Agency (US) |
NTSB | National Transportation Safety Board |
NTT | Non-Threat Traffic |
NULLO | Not using live operator (USAF) |
O | Other methods of CR |
OEM | Original equipment manufacturer |
OIO | Offensive Information Operations |
OLOS | Out-of-the-line-of-sight |
OODA | Decision Loop: Observe, Orient, Decide, Act |
OPA | Optionally piloted aircraft |
OPAV | Optionally piloted air vehicle |
OPSEC | Operations Security |
OSI | Open systems interconnection |
OTH | Over-the-horizon |
P | Isotropic source of an electromagnetic pulse of peak power, MW |
PANCAS | Passive Acoustic Non-Cooperative Collision Alert System |
PCAS | Persistent close air support |
PEIRP | Transmitter effective isotropic radiated power, watts |
PFMS | Predictive Flight Management System |
PEMSIA | Partnership in Environmental Management of the Seas of East Asia |
PGM | Precision guided missile |
PHOTINT | Photographic intelligence (usually sky – ground) |
PII | Personal Identifiable Information |
PIM | Position of intended movements/Previously intended movements |
PIT | Proximity Intruder Traffic |
Pj | Minimum amount of jammer power output required, in watts, FM 34-40-7 |
PL | Power level, dB, Eq. 20-1 |
PLA | Chinese People’s Liberation Army |
PLAN | People’s Liberation Army Navy (China) |
PLC | Programmable Logic Controllers (SCADA) |
PMIAA | Permissions Management: Identification, Authentication and Authorization |
PNF | Plug and Fly with custom transmitter, receiver, battery and charger |
PO | Psychological Operations |
POS | Position and Orientation System |
POV | Point of View |
PPP | Precise Point Positioning |
PPS | Precise positioning service (GPS) |
PRC | People’s Republic of China (China) |
PSD | Power Spectral Density |
PREACT | Partnership for Regional East Africa Counterterrorism (PREACT) |
PRF | Pulse repetition frequency codes |
PRM | Precision Runway Monitor |
PSH | Plan-symmetric helicopter |
PSR | Primary Surveillance Radar |
Pt | Power output of the enemy drone, in watts, FM 34-40-7 |
PW / PSYWAR | Psychological Warfare |
PWO | Principal Warfare officer |
P(Y) | Precise Signal (GPS) |
QOS | Quality of Service in HAPs |
QUAS | QUT UAS (see below) |
QUT | Queensland University of Technology |
R | 1 /Tb is the bit rate (b/s) in link equation |
R4 | Energy density received at detected target range, R, nm |
RA | Resolution Advisory |
RAC | Range air controller |
RADAR | Radio Detection and Ranging |
RAST | Recovery, assist, and traverse |
RB | Rule-based methods (Conflict Resolution) |
RBW | Red-Breasted Woodpecker |
RCE | Remote Code Execution |
RCO | Remote-control operator |
RCS | Radar cross-section |
RCTA | Surf Radio Technical Commission for Aeronautics |
RF | Radio Frequency |
RGB | Red Green Blue for VIS camera |
RGT | Remote ground terminal |
Rician PDF | Rician probability density function |
RIMPAC | Rim of the Pacific Exercise – Maritime |
RL | Ramp launched |
RMS | Reconnaissance management system /Root-mean-square |
RN | Ryan-Nichols Qualitative Risk Assessment Equations 17-2, 17-3 |
RNRA | Ryan – Nichols Attack / Defense Scenario Risk Assessment for Cyber cases |
ROA | Remotely operated aircraft |
ROC | Republic of China (Taiwan) |
RPA | Remotely piloted aircraft |
RPH | Remotely piloted helicopter |
RPV | Remotely piloted vehicle |
RR | Radio regulations |
RRE | Radar Range Equation |
RSA | RSA (Rivest–Shamir–Adleman) -authors of early public –key cryptographic system |
RSTA | Reconnaissance, surveillance and target acquisition |
RTA | Dubai Roads and Transport Authority |
RTF | Off-the-shelf, Ready-to-Fly |
RTK | Real Time Kinematic |
RTS | Remote tracking station/Request to send/Release to service |
RTU | Remote Terminal Unit |
RUAV | Relay UAV |
RWR | Radar warning receiver |
S | Intensity at surface of sphere |
SAA | Sense and Avoid / Sense and Act Systems; replaces See and Avoid function of a human pilot |
SAASM | Selective Availability Anti-Spoofing Module |
SAE | Society of Automotive Engineers |
SAM | Ace-to-Air Missile |
SAMPLE | Survivable autonomous mobile platform, long-endurance |
SAP | Systems Applications and Products also the name of a company |
SAR | Synthetic aperture radar / Search and rescue- especially using helicopters |
SAS | Safety Assurance System |
SATCOM | Satellite communications |
SCADA | Supervisory Control and Data Acquisition systems |
SCHEMA | Security Incident Identification |
SCIF | Sensitive Compartmented Information Facility |
SCS | Shipboard control system (or station) / Stereo Camera System / South China Sea |
SE | Synthetic environment |
SECDEF | Secretary of Defense |
Shadowing | Airframe shadowing – UAV- Ground signal degradation during maneuver |
SEZ | Special economic zones |
SHM | Simple harmonic motion – represented by sine wave |
SHORAD | Short Range Air Defense systems |
SIGINT | Signals Intelligence |
Signature | UAS detection by acoustic, optical, thermal and radio / radar |
SJM | Salafi-Jihad Movement |
SKASaC | Seeking airborne surveillance and control |
SKYNET | Fictional artificial intelligence system that becomes self-aware |
SM | Separation Management |
SMC | Single moving camera |
SME | Subject matter expert |
SMR | Single main rotor |
S/N | S/N = is one pulse received signal to noise ratio, dB; Signal to Noise ratio at HAPS receiver |
SOA | Static Obstacle – Avoidance system |
SPL | Sound pressure level, dB = 20 Log p / po [measured pressures to reference pressure] See Eq. 20-3,4; 6-7 |
SPS | Standard position service (GPS) |
Spoofing | A Cyber-weapon attack that generates false signals to replace valid ones |
Spot Sensors | ARS sensors that measure single locations without image library |
SQL | SQL Injection – common malevolent code injection technique |
SR | Short range |
SRL | Systems readiness level |
SSA | Static Sense-and-Act |
SSP | Smart Skies Project |
SSR | Secondary Surveillance Radar |
SST | Self–Separation Threshold |
STANAG 4856 | Standard interfaces of UAV Control System for NATO UAV |
STK | Satellite tool kit |
STOL | Short take-off and landing |
sUAS | Small Unmanned Aircraft System |
SUAVE | Small UAV engine |
SWARM | High level, dangerous collaboration of UAS, UUV, or unmanned boats |
SWAT | Special Weapons and Tactics (police / paramilitary) |
SWAP | Size, weight and power |
SWIR | Shortwave infrared, 1400-3000 nm, 1.4 -3.0 um wavelength range |
SZ | Safety Zone is defined as the horizontal and vertical separation criteria which form a cylindrical airspace volume around the UAS. In figure 3-2 that volume is defined by 1000 ft radius and 200 ft height. It is assumed that initially the UAS is in the center with 100 ft above and below the A/C. |
T | In Range equation & environment, strength of a received signal, function of square or fourth power of distance, d, from transmitter (Adamy D. -0., 2015) |
T | Time, sec (RRE) |
T | Tension in Eq.20-5 |
TA | Traffic Advisory |
TAC | Target air controller |
TACAN | Tactical air navigation |
TAR | Antenna noise temperature, Kelvin |
TAS | True airspeed |
TBO | Time between overhauls |
TC | Type certificate |
TCAS | Traffic alert and collision avoidance system |
TCPA | Time to reach Closest Point of Approach |
Te | Effective input noise temperature, Kelvin |
TEAM (UAS) | High level, dangerous collaboration of UAS, UUV, or unmanned boats; differs from SWARM in that it has a UAS Team Leader, (TL) where SWARM does not. TL directs the UAS team and is the primary counter UAS target to disrupt. |
TETRA | Terrestrial Trunked Radio for terrestrial terminals / services |
Thermobaric | Metal augmented charge |
TIR | Thermal infrared = 8000 – 15000 nm, 8 -15 um |
TL | Team Leader |
TO | Take-off |
Tort | A tort is an act or omission that gives rise to injury or harm to another and amounts to a civil wrong for which courts impose liability. |
TP | Trajectory Prediction |
TRANSCOM | U.S. Transportation Command networks |
TRL | Technology readiness level |
TS | Measured noise temperature, Kelvin units above absolute zero / Top Secret classification |
TSTCP | Trans-Sahara Counterterrorism Partnership. TSCTP partners include Algeria, Burkina Faso, Cameroon, Chad, Mali, Mauritania, Morocco, Niger, Nigeria, Senegal, and Tunisia. |
TT & C | Telemetry, tracking and command |
TUAV | Tactical UAV |
UA | Unmanned Aircraft (non-cooperative and potential intruder) |
U-Actors | Unintentional Cyber Actors |
UAE | United Arab Emirates |
UAM | Urban Air Mobility (vehicle) |
UAPO | Unmanned Aircraft Program Office |
UAS | Unmanned Aircraft System |
UASC | Unmanned aircraft system commander |
UASIPP | UAS Integration Pilot Program |
UAS-p | UAS pilot |
UAV | Unmanned aerial vehicle |
UAV-p | UAV pilot |
UBR | Uplink bit rate, Mb/s |
UCAR | Unmanned combat armed rotorcraft |
UCARS | UAV common automated recovery system |
UCAV | Unmanned combat air vehicle |
UCWA / UA | Unintentional cyber warfare attack |
UGCS | Unmanned Ground Control Station |
UGS | Unmanned ground-based station |
UGV | Unmanned ground vehicle |
UHF | Ultra High Frequency, 300 MHz – 3 GHz |
UIT | Unintentional Insider Threats |
UL | Upload link |
UMTS | Universal Mobile Telecommunications System |
UN | United Nations |
UNESCO | United Nations Educational, Scientific and Cultural Organization |
UNICEF | United Nations Children’s Fund |
USD | Unmanned surveillance drone |
UTM | Unmanned Traffic Management |
UTV | Unmanned target vehicle |
UUV | Unmanned underwater vehicle |
UUNs / DUNSs | Urgent / deliberate universal needs statements |
V | Visible |
VFR | Visual flight rules |
VIKI | Virtual Interactive Kinetic Intelligence |
VLA | Very light aircraft |
VLJ | Very Light Jet |
VLAR | Vertical launch and recovery |
VLOS | Visual Line of Sight |
VMC | Visual Meteorological Conditions |
VNIR | Visible light and near infrared 400 – 1400 nm, 0.4 – 1.4 um wavelength range |
Voloport | Landing site for Volcopter |
VTOL | Vertical take-off and landing |
VTUAV | Vertical take-off UAV |
WEF | World Economic Forum |
WEZ | Weapon Engagement Zone |
WRC | World Radio Conference Standards Organization |
XO | Executive Officer of Naval vessel |
ZIGBEE or KILLERBEE | Sniffing / penetration tools specific to UAS |
Greek Symbols | |
λ | Wavelength in Hz, c / f where c= speed of light 344 m/s and f = frequency, Hz. |
Σ | Radar Cross Sectional Area, m2 |
Sources plus Bibliography below:
Austin, R, (2010) Unmanned Aircraft Systems: UAVS Design, Development and Deployment, West Sussex, UK: Wiley, [Condensed with additions from eleven-page “Units and Abbreviations Table.” Pp. ix-xxix] Additional sources generated from / specific to Chapter development / discussion.
Cyber terminology from: Nichols, R. K. (Sept. 5, 2008) Cyber Counterintelligence & Sensitive Compartmented Information Facility (SCIF) Needs – Talking Points & (Randall K. Nichols J. J., 2018) & (Nichols R. K., Hardening US Unmanned Systems Against Enemy Counter Measures, 2019) & (Randall K. Nichols D. , Chapter 20 Acoustic CM & IFF Libraries V SWARMS Rev 1 05142019, 2018) & (Randall K. Nichols and Lekkas, 2002)& (NIST, September 2012)
Alford, L. D., Jr., USAF, Lt. Col. (2000) Cyber Warfare: Protecting Military Systems Acquisition Review Quarterly, spring 2000, V.7, No. 2, P, 105, http://www.Dtic.Mil/Dtic/Tr/Fulltext/U2/A487951.Pdf
Bibliography
49 U.S. Code § 40103, 49 U.S. Code § 40103 Sovereignty and use of airspace (U.S. Code July 5, 1994).
Abramson, E. (2016). Ethical Dilemmas in the Age of AI. Retrieved from Abramson, E. – knowmail.me/blog: https://www.knowmail.me/blog/ethical-dilemmas-age-ai/
Adamy, D. -0. (2015). EW 104 EW against a New Generation of Threats. Boston: Artech House.
Adamy, D. (2001). EW 101 A First Course in Electronic Warfare. Boston, MA: Artech House.
Adamy, D. (2001). EW 101 A First Course in Electronic Warfare. Boston: Artech House.
Adamy, D. (2004). EW 102 A Second Course in Electronic Warfare. Boston: Artech House.
Adamy, D. (2009). EW 103 Tactical Battlefield Communications Electronic Warfare. Boston: Artech House.
Adamy, D.-9. (1998, Jan). Lesson 4: the basic link for all EW functions. (electronic warfare)(EW Reference & Source Guide). Journal of Electronic Defense, Jan 1998 Issue.
Administrator. (2015, June 15). Standing Wave and Fundamental Frequency. Retrieved from Electronics Hub: https://www.electronicshub.org/?s=fundamental+frequency
Administrator. (2019, May 17). Harmonic Frequencies. Retrieved from electronicshub.org: https://www.electronicshub.org/harmonic-frequencies/
Alejandro Aragon-Zavala, J. L.-R.-P. (2008). High-Altitude Platforms for Wireless Communications. Chichester, West Sussex, UK: John Wiley & Sons.
Alford, L. (2000). Cyber Warfare: Protecting Military Systems. Acquisition Review Quarterly.
Anon. (2019). Saudi Arabia grants citizenship to robot Sophia. Retrieved from dw: Saudi Arabia grants cihttps://www.dw.com/en/saudi-arabia-grants-citizenship-to-robot-sophia/a-41150856
Asimov, I. (1950). “Runaround”. I, Robot (The Isaac Asimov Collection ed.). New York City: Doubleday.
Atherton, K. D. (2019). Can the Pentagon sell Silicon Valley on AI as ethical war? . C4ISRNET.
Austin, R. (2010). “Design for Stealth”, Unmanned Aircraft Systems UAVS Design Development and Deployment. New York: John Wiley and Sons.
Brown, E. F. (Dec 2008). Airborne Communication Networks for Small Unmanned Aircraft Systems. Proc. IEEE, vol 96, no 12, pp. 2008-17.
Burch, D. (2015). RADAR for Mariners. New York: McGraw-Hill.
Cameron, J. &. (Director). (1991). Terminator 2: Judgement Day [Motion Picture].
Chapman, A. (2019, May 31). GPS Spoofing. Retrieved from Tufts University – Tech Notes 2017: https://sites.tufts.edu/eeseniordesignhandbook/files/2017/05/Red_Chapman.pdf
Cornell University Legal Information Institute. (2019, June 5). But-for test. Retrieved from law.cornell.edu: https://www.law.cornell.edu/wex/but-for_test
Cornell University Legal Information Institute. (2019, June 5). Intervening Cause. Retrieved from law.cornell.edu: https://www.law.cornell.edu/wex/intervening_cause
Cornell University Legal Information Institute. (2019, June 5). Personal Jurisdiction. Retrieved from law.cornell.edu: https://www.law.cornell.edu/wex/personal_jurisdiction
D, G. a. (2010). Broadband Communications via High Altitude Platforms. New York City, NY: John Wiley & Sons.
Daniel-Cornel TĂNĂ, S. (2018). The Impact of the Development of Maritime Autonomous Systems on the Ethics of Naval Conflicts. Annals: Series on Military Sciences(2), 118-130.
Deloitte Center for Government Insights analysis. (2018, June 18). The future of regulation. Principles for regulating emerging technologies. Retrieved from Deloitte Insights: https://www2.deloitte.com/insights/us/en/industry/public-sector/future-of-regulation/regulating-emerging-technology.html
Dewey, D. (2017, July 14). Drone crashes into LDS temple in Utah; raises questions of airspace rules. Retrieved from eastidahonews.com: https://www.eastidahonews.com/2017/07/drone-crashes-lds-temple-utah-raises-questions-airspace-rules/
Diversity of citizenship; amount in controversy; costs, 28 U.S. Code § 1332 (United States Congress June 25, 1948).
DJI. (2019, June 5). DJI Enterprise. Retrieved from Enterprise DJI.com: https://enterprise.dji.com/civil-protection
DLSR Pros. (2019, June 3). Best Drones (UAVs) for Firefighting in 2019. Retrieved from dlsrpros.com: https://www.dslrpros.com/dslrpros-blog/best-drones-firefighting-2019/
DoD. (2018). Dictionary of Military Terms. Retrieved from JCS.Mil: http://www.jcs.mil/doctrine/dod_dictionary/
DoD. (2018). Joint Publication (JP) 3-01 Countering Air and Missle Threats. Washington, DC: DoD.
DoD-02. (2018). Information Operations (IO) in the United States. Retrieved from JP 3-13 : http://www.dtic.mil/doctrine/new_pubs/jp3_13.pdf
DoD-03. (2015). Unmanned Systems Roadmap 2013 to 2038. Retrieved from DTIC: http://www.dtic.mil/dtic/tr/fulltext/u2/a592015.pdf
Drones, Q. S. (2017, July 11). quadcopters-have-hit-the-sound-barrier/. Retrieved from quadstardrones.com: https://quadstardrones.com/2017/07/11/quadcopters-have-hit-the-sound-barrier/
EARSC. (2015). A Taxonomy for the EO Services Market: enhancing perception and performance of the EO service industry. EARSC Issue 2.
Entokey, a. G. (2019, May 16). entokey.com/acoustics-and-sound-measurement/. Retrieved from entokey.com/acoustics-and-sound-measurement/: https://entokey.com/acoustics-and-sound-measurement/
ESA-ESTEC Contract 162372/02/NL/US. (September 2005). STRATOS: Stratospheric Platforms a definition study for ESA Platform, Final Report, 1-34. ESA-ESTEC .
European Union. (2019, May 2019). About the regulation and data protection. Retrieved from ec.europa.eu: https://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_en
Federal Question, 28 U.S. Code § 1331 (United States Congress June 25, 1948).
FEMA. (2013). Lessons Learned from the Boston Marathon Bombings: Preparing for and Responding to the Attack. Retrieved from www.fema.gov: http://www.fema.gov/media-library-data/20130726-1923-25045-1176/lessons_learned_from_t
Filippo Santoni de, S. &. (2018). Meaningful Human Control over Autonomous Systems: A Philosophical Account. Frontiers in Robotics and AI. doi:10.3389/frobt.2018.00015
Fleetwood, J. (2017). Public Health, Ethics, and Autonomous Vehicles. American Journal of Public Health, 107(4), 632-537.
Fortuna, C. (2017, 12 02). Autonomous Driving Levels 0–5 + Implications. Retrieved from cleantechnica.com: https://cleantechnica.com/2017/12/02/autonomous-driving-levels-0-5-implications/
Gelfand. (2004). “Physical Concepts”, Hearing an Introduction to Psychological and Physiological Acoustics, 4th ed. New York City.
Gelfand, S. A. (2009). Essentials of Audiology, 3rd Edition. Stuttgart, DE: Thieme.
Giordano, N. (2009). College Physics: Reasoning and Relationships. New York City, NY: Cengage Learning. pp. 421–424.
Gould R. Gordon (1959). “The LASER, Light Amplification by Stimulated Emission of Radiation”. In Franken, P.A.; Sands R.H. (eds.). The Ann Arbor Conference on Optical Pumping, the University of Michigan, 15 June through 18 June 1959. p. 128.
Guardbaum, S. (1994). The Nature of Preemption. Cornell Law Review, 767, 771.
Harris Aerial. (2019, June 5). Carrier HX8 Sprayer Drone. Retrieved from harrisaerial.com: https://www.harrisaerial.com/carrier-hx8-sprayer/
Heinman, C. (2019). Hearing Loss Tests Patrient D v-105. Carlisle, PA: Brown Optical Hearing Aid Service.
Henderson, T. (2017). The Doppler Effect – Lesson 3, Waves. Physics tutorial. The Physics Classroom. Retrieved from Henderson, Tom (2017). “The Doppler Effect – Lesson 3, Waves”. Physics tutorial. The Physics Classroom. Retrieved September 4, 2017.: Henderson, Tom (2017). “The Doppler Effect – Lesson 3, Waves”. Physics tutorial. The Physics Classroom. Retrieved September 4, 2017.
Hern, A. (2017, 1 12). Give robots ‘personhood’ status, EU committee argues. Retrieved from The Guardian: www.theguardian.com/technology/2017/jan/12/give-robots-personhood-status-eu-committee-argues
Hubbard, R. K. (1998). Boater’s Bowditch. Camden, MA: International Marine.
Ibrahim, A. (2019). Optimization Methods for User Admissions and Radio Resource Allocation for Multicasting over High Altitude Platforms . Memorial Univeresity of Newfoundland , Canada: River Publications.
IEEE . (2017). The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems Announces New Standards Projects. Telecom Standards, 27(11), pp. 4-5. .
Jesus Gonzalo, D. L. (2018, March 15). On the Capabilities and Limitations of High Altitude Pseudo-Satellities. Progress In Aerospace Sciences, 37-56. doi:https://doi.org/10.1016/j.paerosci.2018.03.006
Johnson, O. &. (2012). Ethics: Selections from Classic and Contemporary Writers. Boston, MA: Cengage Learning.
Jones, T. (2017). International Commercial Drone Regulation and Drone Delivery Services. Santa Monica: The Rand Corporation.
Kanowitz, S. (2019, 05 15). Toward the deployment of ethical AI. Retrieved from Government Computer News. : Kanowitz, S. (2019). Toward the dephttps://gcn.com/articles/2019/05/15/ethical-ai-idc.aspx?s=gcntech_200519
Kirk, J. (2015, August 5). sounds-can-knock-drones-sky. Retrieved from www.computerworld.com.au/article/581231: https://www.computerworld.com.au/article/581231/sounds-can-knock-drones-sky/
Knight, W. (2018). Nine charts that really bring home just how fast AI is growing. MIT Technology Review .
Legal Information Institute – Cornell University. (2019, May 31). Strict Liability . Retrieved from Legal Information Institute: https://www.law.cornell.edu/wex/strict_liability
LRAD. (2019, May 189). LRAD 450XL Datasheet. Retrieved from LRADX: http://www.lradx.com/wp-context/uploads/2015/05/LRAD_datasheet_450XL.pdf
MacGregor, D. S. (2018). Colorado Causes of Action: Elements, Defenses, Remedies, and Forms. Denver: Bradford Publishing Co. .
Macnamara, T. M. (2010). Introduction to Antenna Placement & Installation. New York City, NY : John Wiley & Sons.
Mahon, J. (2012). Classical Natural Law Theory St. Thomas Aquinas (1227-1274) — the “Angelic Doctor” Lecture. Retrieved from Mahon, J. (2012). Classical Natural Law Theory St. Thomas Aquinas (1227-1274) — thePhilosophy of Law. : Mahon, J. (2012). Classical Natural Law Theory St. Thomas Aquinas (1227-http://home.wlu.edu/~mahonj/PhilLawLecture1NatLaw.htm
Marbury v. Madison, 5 U.S. 137 (United States Supreme Court February 23, 1803).
Matolak, R. S. (April 2015). Initial Results for Airframe Shadowing in L-band and C-band Air -Ground Channels. Proc. Integrated Commun,, Navigation, and Surveillance Conf, (pp. pp. 1-8).
McCullogh v. Maryland, 17 U.S. 316 (United States Supreme Court March 6, 1819).
Merriam-Webster. (2019, May 17). Merriam-Webster Online Dictionary.
Merriam-Webster, Inc. (2019). Definition of Ethics. online: Merriam-Webster, Inc. Retrieved from Definition of Ethics. (2019a). Online: Merriam-Webster, Incorporated.: Definition of Ethics. (2019a). Online: Merriam-Webster, Incorporated.
Middleton, C. (2018). SAP launches ethical A.I. guidelines, expert advisory panel. Retrieved from internetofbusiness.com: Middleton, C. (2018). SAP launches ethical A.I. guidelines, expert advisory panel. Retrieved from https://internetofbusiness.com/sap-publishes-ethical-guidelines-for-a-i-forms-expert-advisory-panel/
Misselhorn, C. (2018). Artificial Morality. Concepts, Issues and Challenges. Society, 55(2), 161-169.
Mohorcic, D. G. (2010). Broadband Communications via High Altitude Platforms. New York City, NY: John Wiley & Sons.
Monahan, K. (2004). The Radar Book: Effective Navigation and Collision Avoidance. Anacortes, WA: Fineedge Publications.
Muspratt, A. (2018, November 22). New global drone standards proposed. Retrieved from Defence iQ: https://www.defenceiq.com/defence-technology/news/new-global-drone-standards-proposed
Goddemeir, K. D. (June 2015). Role-based Connectivity Management with Realist Air to Ground Channels for Future Applications. IEEE Vehic. Tech. Mag. Vol 10, no 2, pp. 79-85.
National Conference of State Legislatures. (2018, September 10). Current Unmanned Aircraft State Law Landscape. Retrieved from NCSL.org: http://www.ncsl.org/research/transportation/current-unmanned-aircraft-state-law-landscape.aspx
NBC Today Show. (2018, May 9). How peeping drones could be spying on you without you knowing it. Retrieved from Today.com: https://www.today.com/video/how-peeping-drones-could-be-spying-on-you-without-you-knowing-it-1229001795967
Newman, L. H. (2017, August 7). THE ARMY GROUNDS ITS DJI DRONES OVER SECURITY CONCERNS. Retrieved from WIRED: https://www.wired.com/story/army-dji-drone-ban/
Nichols, R. K. (1996). Classical Cryptography Course Volume I / II. Laguna Hills, CA: Aegean Park Press.
Nichols, R. K. (1996). Classical Cryptography Course, Volume I. Laguna Hills, CA: Aegean Park Press.
Nichols, R. K. (2018). Unmanned Aircraft Systems (UAS) In the Cyber Domain: Protecting USA’s Advanced Air Assets. 1st Ed. Manhattan, KS: New Prairie Press.
Nichols, R. K. (2019, March 14). Hardening US Unmanned Systems Against Enemy Counter Measures. 7th Annual Unmanned Systems Summit. Alexandria, VA, USA: PPTX presentation , self.
Nichols, R. K., Mumm, H. C., Lonstein, W. D., Ryan, J. J., & and Carter, C. (2018). Unmanned Aircraft Systems (UAS) in the Cyber Domain: Protecting USA’s Advanced Air Assets. Manhattan, KS: New Prairie Press (NPP) eBooks. 21.
NIST. (September 2012). Guide for Conducting. Washington, DC: GPO.
North Carolina Department of Transportation. (2019, May 30). Law & Regulations. Retrieved from NCDOT.GOV: https://www.ncdot.gov/divisions/aviation/uas/Pages/laws-regulations.aspx
Osseiran, A. (Dec 2014). Scenarios for 5G Mobile and Wireless communications: the vision of the METIS Project. IEEE Communications Magazine, Vol 52, no 5, pp. 26-35.
O’Sullivan, J. L. (1845). The Great Nation of Futurity. United States Magazine and Democratic Review Vol 6 Issue 23, pp. 426-430.
Pierson. (2019, May 16). tuning-fork-waves-sound. Retrieved from airfreshener.club – Pierson Education: https://airfreshener.club/quotes/tuning-fork-waves-sound.html
Porter, J. D. (2019, June 8). jdporterlaw.com/intellectual-property-law/. Retrieved from jdporterlaw.com: http://www.jdporterlaw.com/intellectual-property-law/
Possel, M. (2017). Waves, motion and frequency: the Doppler effect. Einstein Online, Vol. 5. Max Planck Institute for Gravitational Physics, Potsdam, Germany.
Pricewaterhousecoopers, LLP. (2018). Skies without limits – Drones- taking the UK’s economy to new heights. London: Pricewaterhousecoopers, LLP.
PROTECTION OF CERTAIN FACILITIES AND ASSETS FROM UNMANNED AIRCRAFT, H. R. 302 (United States Congress January 3, 2018).
Proyas, A. (Director). (2004). I, Robot. In. Hollywood, CA. [Motion Picture].
Ramzy, A. &. (2008). Tainted-Baby-Milk Scandal in China. Retrieved from content.time.com/time/world/article/: http://content.time.com/time/world/article/0,8599,1841535,00.html
Randall K. Nichols and Lekkas, P. C. (2002). Wireless Security: Threats, Models, Solutions. New York City, NY: McGraw Hill.
Randall K. Nichols, D. (2018). Chapter 20 Acoustic CM & IFF Libraries V SWARMS Rev 1 05142019. In R. K. Nichols, H. C. Mumm, W. D. Lonstein, & J. S. Hood, Unmanned Aircraft Systems (UAS) in the Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd ed. Manhattan, KS: NPP Press.
Randall K. Nichols, D. (2019 for publication). Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd ed. In H. M. Randall K. Nichols, Chapter 18 Audiology, Acoustic Countermeasures against Swarms and Building IFF Libraries (p. 2nd ed.). Manhattan, KS: For Publication, NPP.
Randall K. Nichols, J. J. (2018). Unmanned Aircraft Systems (UAS) in the Cyber Domain: Protecting USA’s Advanced Air Assets. Manhattan, KS: New Prairie Press.
Rappaport, T. (2014). Millimeter Wave Wireless Communications. New York City, NY: Prentice Hall.
Ricker, D. (2017, July 1). Navigating drone laws has become a growing and lucrative legal niche. Retrieved from ABA Journal: http://www.abajournal.com/magazine/article/drone_law_attorneys
Said Emre Alper, Y. T. (December 2008). Compact Angular Rate Sensor System Using a Fully Decoupled Silicon-on-Glass MEMS Gyroscope. JOURNAL OF MICROELECTROMECHANICAL SYSTEMS, VOL. 17, NO. 6.
Sanchez, M. (2019, June 4). No Drones. Retrieved from Unspalsh.com: https://unsplash.com/photos/oMqswmrie4Y
Schroeder, A. (2018, February 1). Localizing Humanitarian Drones: Robotics & Disaster Response from the Maldives to Malawi. Retrieved from medium.com: https://medium.com/radiant-earth-insights/localizing-humanitarian-drones-robotics-disaster-response-from-the-maldives-to-malawi-a1f362432cb1
Signia. (2019, May 16). Signia Hearing Aids. Retrieved from Signia Hearing Aids – Hear across America: www.signiausa.com
Singer v. City of Newton, 284 F. Supp. 3d 125 (U.S. District Court Massachusetts September 21, 2017).
Sood A.K. & Enbody, R. (2014, December 19). https://www.georgetownjournalofinternau-s-military-defense-systems-the-anatomy-of-cyber-espionage-by-chinese-hackers. Retrieved from georgetownjournalofinternationalaffairs.org/online-edition: https://www.georgetownjournalofinternationalaffairs.org/online-edition/u-s-military-defense-systems-the-anatomy-of-cyber-espionage-by-chinese-hackers
Sovereignty and use of airspace, 49 U.S. Code § 40103 (United States Congress July 5, 1994).
Staff. (2008). FINAL ACTS WRC-07. World Radiocommunication Conference. Geneva: ITU.
Staff. (2012). FINAL ACTS WRC-12. World Radiocommunication Conference. Geneva: ITU.
Staff. (2016, April 17). Equal Loudness Contours. Retrieved from Gutenberg Organization: http://central.gutenberg.org/article/WHEBN0001046687/Equal-loudness%20contour
Staff. (2019). FINAL ACTS WRC-15. World Radiocommunication Conference. Geneva.
Stone, Z. (2007, 11 7). Stone, Z. (2017). Everything You Need To Know About Sophia, The World’s First Robot Citizen. Retrieved from https://www.forbes.everything-you-need-to-know-about-sophia-the-worlds-first-robot-citizen. Retrieved from Forbes: https://www.forbes.com/sites/zarastone/2017/11/07/everything-you-need-to-know-about-sophia-the-worlds-first-robot-citizen/#1667784246fa
Studios, D. D. (2017). Boaters Ref. USA.
sUAS News. (2018, March 2). RAS Consulting & Investigations hire Jeff Parisse to offer sophisticated UAS security and surveillance services. Retrieved from suasnews.com: https://www.suasnews.com/2018/03/ras-consulting-investigations-hire-jeff-parisse-offer-sophisticated-uas-security-surveillance-services/
Sun, W. M. (June 2015). Unmanned Aircraft Systems:Air-Ground Channel Characterization for future applications. IEEE Vehic. Tech Mag. Vol 10, No 2 , pp. 79-85.
T.C. Dozer, D. A. (2008). High Altitude Platforms for VHDR in-theater communications. IET Seminar on Military Satellite Communications Systems.
The Shepard News Team. (2018, September 12). Liteye Receives Follow-on Contract for C-AUDS – DB – Digital Battlespace. Retrieved from Aerospace, Defense and Security News and Analysis – Shephard Media, The Shepard Press, Ltd: www.shephardmedia.com/news/digidigital-battlespace/liteye-receives-follow-contract-c-auds
Toomay, J. (1982). RADAR for the Non – Specialist. London; Lifetime Learning Publications. London: Lifetime Learning Publications.
TRS, S. (2018, July 10). Tontechnic-Rechner-Sengpielaudio. Retrieved from Tontechnic-Rechner-Sengpielaudio Calculator: www.sengspielaudio.com/calculator-wavelength.htm
UAV Coach. (2019, May 30). Drone Laws in South Carolina (2019). Retrieved from UAVcoach.com: https://uavcoach.com/drone-laws-south-carolina/
United States Constitution Article VI, Sec.2 (United States of America September 17, 1787).
Uni-wuppertal. (2019, May 15). Inverse Square Law, General. Retrieved from hydrogen.physik.uni-wuppertal.de/hyperphysics/: http://hydrogen.physik.uni-wuppertal.de/hyperphysics/hyperphysics/hbase/forces/isq.html
Urban, T. (2018). Teach Your Robots Well: Will Self-Taught Robots Be the End of Us? Retrieved from www.worldsciencefestival.com: Urban, T. (2018). Teach Your Robots Well: Will Self-Taught Robots Be the End of Us? Retrieved from https://www.worldsciencefestival.com/programs/teach-robots-well-will-self-taught-robots-end-us/
Usenix.org. (2019, 6 9). MEMS, Drones, & Sound Sourcing. Retrieved from Usenix.org: www.usenix.org
WebFinance, Inc. (2019). Definition of Ethics. (2019b). online: Online: WebFinance, Inc.
Weise, E. (2017, August 23). could-hackers-behind-u-s-navy-collisions. Retrieved from USATODAY: https://www.ruidosonews.com/story/tech/news/2017/08/23/could-hackers-behind-u-s-navy-collisions/594107001/
Wong, C. (2017). Top Canadian researcher says AI robots deserve human rights. Retrieved from Wong, C. (2017). Top Canadian researcher says AI robots deserve human rights. Retrieveitbusiness.ca: Wong, C. (2017). Top Canadian researcher says AI robots deserve human rhttps://www.itbusiness.ca/news/top-canadian-researcher-says-ai-robots-deserve-human-rights/95730
Wordpress. (2012, 08 29). The True Sign of Intelligence. Retrieved from deepthinkings.wordpress.com: http://deepthinkings.wordpress.com/2012/08/29/the-true-sign-of-intelligence/
Wright, T. (2017, August 11). You’ve Been Warned: Keep Your Drones Away From Military Bases. Retrieved from Air & Space, Smithsonian: https://www.airspacemag.com/daily-planet/keep-your-drones-away-military-base-180964451/
Wyvern, T. (2018). National Critical Intelligence Estimate: Counter Unmanned Aircraft Systems (C-UAS) in the US. Salina, KS: KSUP.
Xiaoyang Liu, C. L. (2016). High Altitude Platform Station Network and Channel Modeling Performance Analysis. Mathematics and Computer Science. Vol. 1, No 1, pp. 10-16. doi:Xiaoyang Liu, Chao Liu, Wanping Liu, Xiaoping Zeng. High Altitude Platform Station Network and Channel Modeling Performance Analys10.11648/j.mcs.20160101.13
Zeng, R. Z. (May 2016.). Wireless communications with unmanned aerial vehicles: opportunities and challenges. IEEE Communications Magazine.vol. 54, no.5, pp. 36-42.
Yong Zeng, R. Z. (2016). Wireless Communications with Unmanned Aerial Vehicles: Opportunities and Challenges. IEEE Communications Magazine, 36-42.
Yunmonk Son, H. S. (2015, August 12-14). Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors. Proc. 24th Usenix Security Symposium. Washington, DC: USENIX. Retrieved from https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/son
Zetter, K. (2015). So, The NSA Has An Actual SKYNET Program . WIRED Magazine(Online). . Retrieved from Zetter, K. (2015). So, The NSA Has An Actual SKYNET Program WIRED Magazine(Online).