Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 2

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  Drone
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
The goal of the paper is to present growing influence of unmanned aerial vehicles (UAVs) on the shape of military doctrine. Author, in the first part of article, presents terminology and classifications of the UAVs, as well as, the main criteria of the classification which are: thrust, purpose, weight, and range/endurance. The second part of the article is dedicated to military technology. In that part of the article, author presents possible kind of utilization of the UAVs, presenting in the more details military drones. In description of the drones is also part of initial conclusions addressing to the challenges new doctrine and battlefield strategy. In the conclusion author presents the expecting changes in a military doctrine, caused by employing of a new military technology, a specially the new kind of drones on the battle field.
EN
The widespread use of civilian unmanned aerial vehicles (UAVs) has created a new threat for air traffic. This is why there is a requirement to initiate research in that domain as UAVs have already were seen flying too close to manned aircraft, including commercial and military flights. It was notified in airspace of many countries. Such incidents have occurred in many countries causing a need to conduct a multi-vector analysis of the matter. The issue is facilitated by very easy access to drones, lack of law regulations, and people’s lack of understanding of the threat. Unidentified drones have already landed within area of nuclear power stations, military units and even highly secured interior of the White House. So, the challenge is rather significant. It could lead to undermining the security of air traffic, but at the same time to terrorists’ attacks, the violation of privacy, and sabotage, including acts against critical infrastructure. It is necessary to study the issue and the paper could be a contribution to enhancing the understanding of the challenge and facilitator of further research.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.