Unmanned Systems are the Money-Makers of the Future

April 2011
Military Technology;2011, Vol. 35 Issue 4, p108
The article discusses the deep sea development of remotely operated vehicles (ROV) and autonomous underwater vehicles (AUV).


Related Articles

  • Estimation Approach for AUV Navigation Using a Single Acoustic Beacon. Ferreira, Bruno; Matos, Anibal; Cruz, Nuno // Sea Technology;Dec2010, Vol. 51 Issue 12, p54 

    The article presents a study which investigates the navigation capability of the Modular Autonomous Robot for Environmental Sampling (MARES), an autonomous underwater vehicle (AUV) developed by the Faculty of Engineering of the University of Porto in Porto, Portugal. Extended Kalman Filter (EKF)...

  • The deepest horizon takes centre stage. Ford, Jason // Engineer (Online Edition);3/10/2014, p3 

    The article previews the Unmanned Underwater Vehicles Showcase (UUVS) to be held at the Excel Centre for Oceanology International in London, England in March 2014.

  • Sea view. Zolfagharifard, Ellie // Engineer (00137758);3/22/2010, Vol. 295 Issue 7791, p26 

    The article discusses the significant impact of developing a new technology in monitoring ocean depths in Great Britain. It mentions on the creation of gliders or the torpedo-shaped autonomous underwater vehicles (AUVs) which can be programmed to move through satellite navigation to a specific...

  • AUV's Executer Fault-tolerant Control Based on ADRC. Lei Wan; Yinghao Zhang; Yushan Sun; Yueming Li // Advanced Materials Research;2014, Vol. 1006-1007, p581 

    An autonomous under vehicle (AUV) should have the ability of self-saving and finishing the certain targets when faults occur, which means that an AUV must have the ability of fault-tolerant control. In order to make it possible, one AUV's fault-tolerant control strategy is made, which is based...

  • Armed and dexterous. Nevala, Amy E.; Lippsett, Lonny // Oceanus;Dec2009, Vol. 47 Issue 3, p39 

    An interview with Matt Heintz, research engineer of the Deep Submergence Lab of the Woods Hole Oceanographic Institution (WHOI), is presented. When asked about the arm of the underwater vehicle Nereus, he describes the arm as seven-function, hydraulically powered, and master-slave manipulator....

  • THE NATIONAL OCEAN POLICY: CAN IT REDUCE MARINE POLLUTION AND STREAMLINE OUR OCEAN BUREAUCRACY? Migliaccio, Emily // Vermont Journal of Environmental Law;Spring2014, Vol. 15 Issue 3, p629 

    The article focuses on the U.S National Ocean Policy (NOP) for reduction of marine pollution and streamlining of ocean bureaucracy. Topics discussed include the impact of marine pollution, the evolution of the National Ocean Policy (NOP) and its implementation progress on tackling the marine...

  • Oscillation and direction control strategies for a robotic fish. Roper, Daniel; Sharma, Sanjay; Sutton, Robert; Culverhouse, Philip // Underwater Technology;Mar2013, Vol. 31 Issue 2, p67 

    This paper discusses oscillation and directional control for a body and caudal fin type robotic fish. The robotic fish is modelled as a free-floating kinematic chain, and two possible control solutions are proposed based on deadbeat and H∞ feedback principles. Results demonstrate that the...

  • Subsea system readiness level assessment. Yasseri, Sirous // Underwater Technology;Mar2013, Vol. 31 Issue 2, p77 

    Both the American Petroleum Institute (API) 17N: 2009 and Det Norske Veritas (DNV) RP-A203 (2011) recommend that the technologies inserted into subsea installations should be assessed during design and manufacturing using a technology readiness level (TRL) scale. This should be used as a measure...

  • Using Micro-ROVs for the Inspection of Underwater Mines. Feulner, Mark; Martincich, Richard // Sea Technology;Mar2010, Vol. 51 Issue 3, p21 

    The article discusses the usage of micro-remotely operated vehicles (ROVs) for the inspection of underwater mines in the 2008 Maritime Homeland Security Experiment (MHSE) in Tampa Bay, Florida. MHSE developed tools and techniques for identifying and decreasing maritime security threats for the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics