Solar-Powered Automated Drone for Industrial Safety and Anomaly Detection

Tamem Mahmoud Omar, Hasan Mohammed Alshehhi, Marwan Mohammed Alnauimi, Suood Abdulrahman Alblooshi, Amine El Moutaouakil

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we report on a solar-powered hexacopter drone designed for industrial safety and anomaly detection. The drone uses AI technology for autonomous inspections, focusing on high-risk environments like power plants and nuclear reactors. Equipped with solar panels for extended operation and sensors for real-time data collection, the drone aims to enhance safety, reduce downtime, and provide maintenance insights. Field tests demonstrate its effectiveness in identifying hazards and ensuring operational efficiency.

Original languageEnglish
Title of host publication18th IEEE International Conference on Application of Information and Communication Technologies, AICT 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350387537
DOIs
Publication statusPublished - 2024
Event18th IEEE International Conference on Application of Information and Communication Technologies, AICT 2024 - Hybrid, Turin, Italy
Duration: Sept 25 2024Sept 27 2024

Publication series

Name18th IEEE International Conference on Application of Information and Communication Technologies, AICT 2024

Conference

Conference18th IEEE International Conference on Application of Information and Communication Technologies, AICT 2024
Country/TerritoryItaly
CityHybrid, Turin
Period9/25/249/27/24

Keywords

  • AI technology
  • anomaly detection
  • autonomous inspections
  • industrial safety
  • Solar-powered hexacopter drone

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems
  • Media Technology
  • Modelling and Simulation

Fingerprint

Dive into the research topics of 'Solar-Powered Automated Drone for Industrial Safety and Anomaly Detection'. Together they form a unique fingerprint.

Cite this