BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
DTSTART:20240310T030000
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:CDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20241103T010000
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:CST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20240326T222743Z
UID:CC500A9C-1069-4279-AD5B-25BC8D7AC395
DTSTART;TZID=America/Chicago:20240322T100000
DTEND;TZID=America/Chicago:20240322T110000
DESCRIPTION:Unmanned Aerial Systems (UAS) or drones cannot be ignored in ou
 r society. They are easily available and relatively cheap. Their applicati
 ons vary from “toy” to inspection\, from observation to delivery. Howe
 ver\, UAS also have a high potential for criminals and terrorists. For cri
 minals\, they are well suited for observation or smuggling of goods like d
 rugs &amp;amp\; weapons. For terrorists\, UAS is also well suited. A single dr
 one can disrupt airport operations. Little imagination is needed to see th
 e potential for attacks on high-value targets and critical infrastructure.
  Within the realm of UAS detection\, tracking\, and identification (DTI)\,
  seven types of technologies are typically employed: radars\, visible ligh
 t cameras\, thermal imaging cameras\, infrared sensors\, laser distance fi
 nders (lidars)\, frequency monitoring devices\, and acoustic sensors. Yet\
 , individual systems often falter in delivering adequate protection under 
 realistic conditions\, prompting the common practice of employing a combin
 ation of sensor technologies. This webinar will give an overview and discu
 ss each of these detection methodologies\, informing the audience about th
 e advantages and disadvantages of these systems and showing how their perf
 ormance can be assessed.\n\nSpeaker(s): GEERT\, \n\nVirtual: https://event
 s.vtools.ieee.org/m/409965
LOCATION:Virtual: https://events.vtools.ieee.org/m/409965
ORGANIZER:ztaqvi@gmail.com
SEQUENCE:4
SUMMARY:“Drone detection\, Tracking and Identification methods” 
URL;VALUE=URI:https://events.vtools.ieee.org/m/409965
X-ALT-DESC:Description: &lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white
 \;&quot;&gt;&lt;span style=&quot;font-size: 11.0pt\; font-family: &#39;Calibri&#39;\,sans-serif\; 
 mso-ascii-theme-font: minor-latin\; mso-hansi-theme-font: minor-latin\; ms
 o-bidi-theme-font: minor-latin\; color: black\; mso-color-alt: windowtext\
 ; mso-bidi-font-weight: bold\;&quot;&gt;Unmanned Aerial Systems (UAS) or drones ca
 nnot be ignored in our society. They are easily available and&lt;/span&gt;&lt;span 
 style=&quot;font-size: 11.0pt\; font-family: &#39;Calibri&#39;\,sans-serif\; mso-ascii-
 theme-font: minor-latin\; mso-hansi-theme-font: minor-latin\; mso-bidi-the
 me-font: minor-latin\; color: black\; mso-color-alt: windowtext\; mso-bidi
 -font-weight: bold\;&quot;&gt;&amp;nbsp\;relatively cheap. Their applications vary fro
 m &amp;ldquo\;toy&amp;rdquo\; to inspection\, from observation to delivery. &lt;/span
 &gt;&lt;span style=&quot;font-size: 11.0pt\; font-family: &#39;Calibri&#39;\,sans-serif\; mso
 -ascii-theme-font: minor-latin\; mso-hansi-theme-font: minor-latin\; mso-b
 idi-theme-font: minor-latin\; color: black\; mso-color-alt: windowtext\; m
 so-bidi-font-weight: bold\;&quot;&gt;However\, UAS also have a high potential for 
 criminals and terrorists. For criminals\, they are well &lt;/span&gt;&lt;span style
 =&quot;font-size: 11.0pt\; font-family: &#39;Calibri&#39;\,sans-serif\; mso-ascii-theme
 -font: minor-latin\; mso-hansi-theme-font: minor-latin\; mso-bidi-theme-fo
 nt: minor-latin\; color: black\; mso-color-alt: windowtext\; mso-bidi-font
 -weight: bold\;&quot;&gt;suited for observation or smuggling of goods like drugs &amp;
 amp\;amp\; weapons. For terrorists\, UAS is also &lt;/span&gt;&lt;span style=&quot;font-
 size: 11.0pt\; font-family: &#39;Calibri&#39;\,sans-serif\; mso-ascii-theme-font: 
 minor-latin\; mso-hansi-theme-font: minor-latin\; mso-bidi-theme-font: min
 or-latin\; color: black\; mso-color-alt: windowtext\; mso-bidi-font-weight
 : bold\;&quot;&gt;well suited. A single drone can disrupt airport operations. Litt
 le imagination is needed to see the &lt;/span&gt;&lt;span style=&quot;font-size: 11.0pt\
 ; font-family: &#39;Calibri&#39;\,sans-serif\; mso-ascii-theme-font: minor-latin\;
  mso-hansi-theme-font: minor-latin\; mso-bidi-theme-font: minor-latin\; co
 lor: black\; mso-color-alt: windowtext\; mso-bidi-font-weight: bold\;&quot;&gt;pot
 ential for attacks on high-value targets and critical infrastructure. &lt;/sp
 an&gt;&lt;span style=&quot;font-size: 11.0pt\; font-family: &#39;Calibri&#39;\,sans-serif\; m
 so-ascii-theme-font: minor-latin\; mso-hansi-theme-font: minor-latin\; mso
 -bidi-theme-font: minor-latin\; color: black\; mso-color-alt: windowtext\;
  mso-bidi-font-weight: bold\;&quot;&gt;Within the realm of UAS detection\, trackin
 g\, and identification (DTI)\, seven types of technologies are &lt;/span&gt;&lt;spa
 n style=&quot;font-size: 11.0pt\; font-family: &#39;Calibri&#39;\,sans-serif\; mso-asci
 i-theme-font: minor-latin\; mso-hansi-theme-font: minor-latin\; mso-bidi-t
 heme-font: minor-latin\; color: black\; mso-color-alt: windowtext\; mso-bi
 di-font-weight: bold\;&quot;&gt;typically employed: radars\, visible light cameras
 \, thermal imaging cameras\, infrared sensors\, laser &lt;/span&gt;&lt;span style=&quot;
 font-size: 11.0pt\; font-family: &#39;Calibri&#39;\,sans-serif\; mso-ascii-theme-f
 ont: minor-latin\; mso-hansi-theme-font: minor-latin\; mso-bidi-theme-font
 : minor-latin\; color: black\; mso-color-alt: windowtext\; mso-bidi-font-w
 eight: bold\;&quot;&gt;distance finders (lidars)\, frequency monitoring devices\, 
 and acoustic sensors. Yet\, individual systems &lt;/span&gt;&lt;span style=&quot;font-si
 ze: 11.0pt\; font-family: &#39;Calibri&#39;\,sans-serif\; mso-ascii-theme-font: mi
 nor-latin\; mso-hansi-theme-font: minor-latin\; mso-bidi-theme-font: minor
 -latin\; color: black\; mso-color-alt: windowtext\; mso-bidi-font-weight: 
 bold\;&quot;&gt;often falter in delivering adequate protection under realistic con
 ditions\, prompting the common &lt;/span&gt;&lt;span style=&quot;font-size: 11.0pt\; fon
 t-family: &#39;Calibri&#39;\,sans-serif\; mso-ascii-theme-font: minor-latin\; mso-
 hansi-theme-font: minor-latin\; mso-bidi-theme-font: minor-latin\; color: 
 black\; mso-color-alt: windowtext\; mso-bidi-font-weight: bold\;&quot;&gt;practice
  of employing a combination of sensor technologies. &lt;/span&gt;&lt;span style=&quot;fo
 nt-size: 11.0pt\; font-family: &#39;Calibri&#39;\,sans-serif\; mso-ascii-theme-fon
 t: minor-latin\; mso-hansi-theme-font: minor-latin\; mso-bidi-theme-font: 
 minor-latin\; color: black\; mso-color-alt: windowtext\; mso-bidi-font-wei
 ght: bold\;&quot;&gt;This webinar will give an overview and discuss each of these 
 detection methodologies\, informing the &lt;/span&gt;&lt;span style=&quot;font-size: 11.
 0pt\; font-family: &#39;Calibri&#39;\,sans-serif\; mso-ascii-theme-font: minor-lat
 in\; mso-hansi-theme-font: minor-latin\; mso-bidi-theme-font: minor-latin\
 ; color: black\; mso-color-alt: windowtext\; mso-bidi-font-weight: bold\;&quot;
 &gt;audience about the advantages and disadvantages of these systems and show
 ing how their &lt;/span&gt;&lt;span style=&quot;font-size: 11.0pt\; font-family: &#39;Calibr
 i&#39;\,sans-serif\; mso-ascii-theme-font: minor-latin\; mso-hansi-theme-font:
  minor-latin\; mso-bidi-theme-font: minor-latin\; color: black\; mso-color
 -alt: windowtext\; mso-bidi-font-weight: bold\;&quot;&gt;performance can be assess
 ed.&lt;/span&gt;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

