Survey on Unmanned Aerial Vehicle Networks: a Cyber Physical System Perspective Haijun Wang, Haitao Zhao, Jiao Zhang, Dongtang Ma, Jiaxun Li, and Jibo Wei

Total Page:16

File Type:pdf, Size:1020Kb

Survey on Unmanned Aerial Vehicle Networks: a Cyber Physical System Perspective Haijun Wang, Haitao Zhao, Jiao Zhang, Dongtang Ma, Jiaxun Li, and Jibo Wei 1 Survey on Unmanned Aerial Vehicle Networks: A Cyber Physical System Perspective Haijun Wang, Haitao Zhao, Jiao Zhang, Dongtang Ma, Jiaxun Li, and Jibo Wei, Abstract—Unmanned aerial vehicle (UAV) networks are play- In these applications, one emerging trend is that the UAVs ing an important role in various areas due to their agility and work from individually to cooperatively by constituting a versatility, which have attracted significant attention from both reliable network, since that multiple UAVs can provide wider the academia and industry in recent years. As an integration of the embedded systems with communication devices, computation coverage, more flexibility and robustness through redundancy capabilities and control modules, the UAV network could build [16]. Accordingly, the challenges in a multi-UAV network a closed loop from data perceiving, information exchanging, are much more intractable compared with those for a single decision making to the final execution, which tightly integrates UAV. Therefore, researches on the multi-UAV networks have the cyber processes into the physical devices. Therefore, the attracted significant attention in recent ten years. Thanks to UAV network could be considered as a cyber physical system (CPS). Revealing the coupling effects among the three interacted the advances in wireless communication, high performance components in this CPS system, i.e., communication, computation computation and flight control areas, the UAV networks have and control, is envisioned as the key to properly utilize all obtained more powerful capabilities with respect to the com- the available resources and hence improve the performance of munication, computation and control. the UAV networks. In this paper, we present a comprehensive There appears a strong tendency to integrally design the survey on the UAV networks from a CPS perspective. Firstly, we respectively research the basics and advances with respect communication, computation and control modules toward- to the three CPS components in the UAV networks. Then we s intelligent UAV networks [17]. This is reasonable since look inside to investigate how these components contribute to these three cyber components play crucial roles in the UAV the system performance by classifying the UAV networks into networks, and they will affect and benefit from each other three hierarchies, i.e., the cell level, the system level, and the in a coupling way. For example, when the communication system of system level. Further, the coupling effects among link is unstable due to the shadow effect, the UAVs could these CPS components are explicitly illustrated, which could be enlightening to deal with the challenges in each individual aspect. alter their locations through flight control to pursue line New research directions and open issues are discussed at the of sight links, other than only adjusting the communication end of this survey. With this intensive literature review, we try parameters in vain. Thus, a cross-disciplinary viewpoint may to provide a novel insight into the state-of-the-art in the UAV bring inspirations to deal with the puzzles in each single area. networks. Index Terms—Unmanned aerial vehicle (UAV), cyber physical system (CPS), communication, computation, control. A. CPS can inspire the UAV networks The UAV network operates by building a closed loop, which consists of the initial data perceiving, information I. INTRODUCTION exchanging, decision making and the final execution. From Due to the characteristics of agility, versatility, low cost and this perspective, the complex UAV network can be considered easy-to-deploy, unmanned aerial vehicles (UAVs) are playing as a cyber physical system (CPS), which has attracted signif- an important role in both military and civilian areas. In military icant attention recently [45]. CPS achieves the tight coupling applications, the UAVs are envisioned as an indispensable part between the cyber domain and the physical domain by strictly of the future battlefield. They can not only capture different embedding the cyber processes into the physical devices. Thus, kinds of information on a large scale in terms of time and the reliable, real-time and efficient monitoring, coordination space proactively (e.g., border surveillance, intelligence re- and control to the physical entities can be conducted through connaissance), but also assist other unmanned/manned combat the closed loop [46]. For example, in the UAV networks, platforms to complete dangerous missions [1], [2]. The UAVs the data sensed by the sensors originates from the physical also flourish with the increasing demands of civilian applica- world (i.e., its mission circumstance), and the final decisions, tions, including agricultural plant protection [3], search and made by computation and conveyed by communication, are rescue [4], [5], environment and natural disaster monitoring translated into instructions and eventually take effects on the [6], [7], delivery of goods [8], communication relays [9], [10], physical world through the actuators. Besides, CPS has a aerial base stations [11]–[13], construction [14] and traffic broad definition, therefore the UAV networks consisting of surveillance [15]. a single UAV (the cell level), a UAV swarm (the system level) or multiple heterogeneous UAV swarms (the system of H. Wang, H. Zhao, J. Zhang, D. Ma, J. Li and J. Wei are all with College system level) all could be developed as CPS. And as the next of Electronic Science, National University of Defense Technology, Changsha, generation of systems, CPS is expected to be a key method to 410073, China (e-mail: haijunwang14, haitaozhao, zhangjiao16, dongtangma, lijiaxun, [email protected]). implement the artificial intelligence [45]. Thus, integrating a 2 Section I : Introduction CPS can inspire the UAV networks Existing surveys and motivations Paper organization Section II: Backgrounds and preliminaries Taking the UAV networks as CPS Autonomy in the UAV networks CPS component Communication Computation Control Section III: CPS components in the UAV networks Communication demands; Computation platforms; Flight controllers; Communication Decision making entity; Flight control challenges; Intelligent algorithms algorithms; Communication basics Section IV: UAV networks of three CPS hierarchies Key techniques Architecture UCL Interacting and Data processing Control and communicating and deciding execution Applications Key techniques Architecture USL Communication Computation Cooperative network coordination control Applications Key techniques Architecture Resource and service Flexible distributed USoS provision compuation Applications CPS hierarchy Section V: Coupling effects in the UAV networks Computation and communication Computation and control Communication and control Section VI: Challenges and open issues CPS model of the UAV Convergence of Computation offloading Resource scheduling networks heterogeneous networks Unwelcomed social Energy efficiency Security and privacy Performance evaluation impacts Section VII: Conclusion Fig. 1. The structure of the survey. 3 TABLE I A COMPARISON OF THE EXISTING SURVEYS ON THE UAV NETWORKS AND CPS Coupling UAV CPS Category Surveys Cyber issues Physical issues Hierarchy issue involved applications [18], 2018 [19], 2017 [20], 2016 Communication and Mobility, missions and No Yes System N/A [8], 2016 networking energy [21], 2015 [22], 2013 [23], 2016 Communication Mobility and missions No Yes Cell; System N/A UAV [24], 2017 network [25], 2016 Computation and control Autopilot platforms No Yes Cell N/A [26], 2015 [27], 2018 [28], 2015 Flight control algorithms Mobility No Yes Cell N/A [29], 2012 [30], 2017 Formation control algorithms Mobility No Yes System N/A [31], 2013 [32], 2014 None Mobility model No Yes Cell N/A [33], 2013 None Collective mobility model No Yes System N/A Communication infrastruc- [34], 2014 Communication Yes No System Smart grid ture and physical dynamics [35], 2016 Networking and security Wind turbine components Yes No Cell; System Smart grid Security, attacks and defens- [36], 2016 None No No System Smart grid es [37], 2016 Security and safety None No No System Medical devices CPS Traffic flow and mobility [38], 2016 Networking and protocols Yes No System Transportation models [39], 2017 Security and threat detectors None No No System General [40], 2016 Security, privacy and de- [41], 2017 None No Yes System General fenses [42], 2015 None UAVs as sensors No Yes System General Fixed-wing and multirotor Source seeking Contour mapping algorithm, [43], 2014 UAVs, mobility and mis- No Yes System and contour flight and formation control UAV- sions mapping enabled Communication network, Mobility, energy and UAV CPS [44], 2018 flight and formation control, No Yes Cell; System General testbeds and image analysis Communication, Autopilot platforms, com- Cell; System; This work computation and putation chips, mobility and Yes Yes System of sys- General flight/formation control missions tem CPS vision into the UAV networks is promising to significantly components, are not well excavated in these surveys, although improve the performance of the whole system. they can be instructive to deal with the problems from a cross- disciplinary perspective. On the other hand, most existing B. Existing surveys and motivations surveys on the CPS put particular emphasis on the design and implementation of the industrial systems, concerning energy The UAV networks and CPS have been extensively surveyed [34], [35], [48], transportation
Recommended publications
  • Apache Flex 2
    flex #flex 1 1: flex 2 2 2 Examples 2 Apache Flex 2 Apache FlexApache Flex SDK 2 Apache Flex SDK 3 3 3 3 3 4 Adobe AIR SDK 4 Adobe Flash Player 4 Adobe Flash Player playerglobal.swc 5 Adobe Pixel Bender 5 5 5 Hello World 6 Hello World 6 7 You can share this PDF with anyone you feel could benefit from it, downloaded the latest version from: flex It is an unofficial and free flex ebook created for educational purposes. All the content is extracted from Stack Overflow Documentation, which is written by many hardworking individuals at Stack Overflow. It is neither affiliated with Stack Overflow nor official flex. The content is released under Creative Commons BY-SA, and the list of contributors to each chapter are provided in the credits section at the end of this book. Images may be copyright of their respective owners unless otherwise specified. All trademarks and registered trademarks are the property of their respective company owners. Use the content presented in this book at your own risk; it is not guaranteed to be correct nor accurate, please send your feedback and corrections to [email protected] https://riptutorial.com/zh-TW/home 1 1: flex Apache FlexApache Foundation。SWFFlashAdobe AirAndroidiOSBlackBerryWindowsOSX。 FlexUIMXMLActionScript3。SWF。 FlexRESTSOAPJSONJMSAMFJavaPHPRuby.NET。 Apache Flex SDKHTTPServiceWebServiceRemoteObject。 Flex。 Apache FlexApache License v.2.0 。SDKSDK。 WebJava.NET。 Apache FlexApacheApache Software Foundation。 Apache Flex SDK 4.15 2016111 Apache Flex SDK 4.14.1 2015331 Apache Flex SDK 4.14.0 201523 Apache Flex SDK 4.13.0 2014728 Apache Flex SDK 4.12.1 201453 Apache Flex SDK 4.12.0 2014310 Apache Flex SDK 4.11.0 20131028 Apache Flex SDK 4.10.0 201386 Apache Flex SDK 4.9.0 2013228 Examples Apache Flex Apache Flex SDK。Apache Flex SDKAdobe AIRWindowsOS X / macOS。。 Apache FlexApache Flex SDK https://riptutorial.com/zh-TW/home 2 1.
    [Show full text]
  • Semiconductor Road Conditions: Slow, Bumpy, but Straight Ahead
    Semiconductor Road Conditions: Slow, Bumpy, But Straight Ahead MEPTEC Luncheon September 15, 2015 Jim Walker Gartner This webinar and accompanying slides are the intellectual property of Gartner and only clients with licensed access to Gartner’s Semiconductor research may view the webinar and slides. CONFIDENTIAL AND PROPRIETARY This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other intended recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates. © 2015 Gartner, Inc. and/or its affiliates. All rights reserved. Presentation Overview . Semiconductor Devices . Application Markets . Outsourcing Services – Foundry & SATS/OSAT . Mergers/Acquisitions . Summary & Recommendations 1 CONFIDENTIAL AND PROPRIETARY I © 2015 Gartner, Inc. and/or its affiliates. All rights reserved. The outlook for 2015 semiconductor growth has weakened due to softness in key electronic equipment categories including PCs, smartphones and tablets 2 CONFIDENTIAL AND PROPRIETARY I © 2015 Gartner, Inc. and/or its affiliates. All rights reserved. Key Assumptions: Semiconductor Electronic Equipment . Strong dollar remains an issue as electronic equipment vendors increase prices in affected regions, impacting demand . Traditional PC weaker, 2015 set to decline 8.7% slightly worse than previously expected . 2015 total ultramobile unit production expected to decline 1.9%, down from growth of 6.2% previously. Outlook for hybrids, clamshells and tablets all lower . Any issues with the launch of Windows 10 or Intel’s Skylake in 3Q15, which are expected to reinvigorate PC sales, could lead to further downside.
    [Show full text]
  • Leveraging Declarative Languages in Web Application Development
    World Wide Web DOI 10.1007/s11280-015-0339-z Leveraging declarative languages in web application development Petri Vuorimaa & Markku Laine & Evgenia Litvinova & Denis Shestakov Received: 7 February 2014 /Revised: 24 February 2015 /Accepted: 4 March 2015 # The Author(s) 2015. This article is published with open access at Springerlink.com Abstract Web Applications have become an omnipresent part of our daily lives. They are easy to use, but hard to develop. WYSIWYG editors, form builders, mashup editors, and markup authoring tools ease the development of Web Applications. However, more advanced Web Applications require servers-side programming, which is beyond the skills of end-user developers. In this paper, we discuss how declarative languages can simplify Web Application development and empower end-users as Web developers. We first identify nine end-user Web Application development levels ranging from simple visual customization to advanced three- tier programming. Then, we propose expanding the presentation tier to support all aspects of Web Application development. We introduce a unified XForms-based framework—called XFormsDB—that supports both client-side and server-side Web Application development. Furthermore, we make a language extension proposal—called XFormsRTC—for adding true real-time communication capabilities to XForms. We also present XFormsDB Integrated Development Environment (XIDE), which assists end-users in authoring highly interactive data-driven Web Applications. XIDE supports all Web Application development levels and, especially, promotes the transition from markup authoring and snippet programming to single and unified language programming. Keywords Web framework . Web application . Web development . End-user development . Declarative language . Real-time communication P. Vuorimaa (*) : M.
    [Show full text]
  • An Interactive Multi-View Genome Browser for Next-Generation Comparative Microorganism Genomics
    SynTView — an interactive multi-view genome browser for next-generation comparative microorganism genomics. Pierre Lechat, Erika Souche, Ivan Moszer To cite this version: Pierre Lechat, Erika Souche, Ivan Moszer. SynTView — an interactive multi-view genome browser for next-generation comparative microorganism genomics.. BMC Bioinformatics, BioMed Central, 2013, 14 (1), pp.277. 10.1186/1471-2105-14-277. pasteur-00870285 HAL Id: pasteur-00870285 https://hal-pasteur.archives-ouvertes.fr/pasteur-00870285 Submitted on 7 Oct 2013 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Lechat et al. BMC Bioinformatics 2013, 14:277 http://www.biomedcentral.com/1471-2105/14/277 SOFTWARE Open Access SynTView — an interactive multi-view genome browser for next-generation comparative microorganism genomics Pierre Lechat1*, Erika Souche1,2 and Ivan Moszer1 Abstract Background: Dynamic visualisation interfaces are required to explore the multiple microbial genome data now available, especially those obtained by high-throughput sequencing — a.k.a. “Next-Generation Sequencing” (NGS) — technologies; they would also be useful for “standard” annotated genomes whose chromosome organizations may be compared. Although various software systems are available, few offer an optimal combination of feature-rich capabilities, non-static user interfaces and multi-genome data handling.
    [Show full text]
  • Silk Test 17.5
    Silk Test 17.5 Silk4J User Guide Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright © Micro Focus 2016. All rights reserved. MICRO FOCUS, the Micro Focus logo and Silk Test are trademarks or registered trademarks of Micro Focus IP Development Limited or its subsidiaries or affiliated companies in the United States, United Kingdom and other countries. All other marks are the property of their respective owners. 2016-11-03 ii Contents Welcome to Silk4J 17.5 ......................................................................................9 Licensing Information ......................................................................................10 Silk4J ................................................................................................................ 11 Do I Need Administrator Privileges to Run Silk4J? ........................................................... 11 Best Practices for Using Silk4J ........................................................................................ 11 Automation Under Special Conditions (Missing Peripherals) ............................................12 Silk Test Product Suite ...................................................................................................... 13 What's New in Silk4J ........................................................................................15 Mobile Device Live View ................................................................................................... 15 Testing Hybrid
    [Show full text]
  • Multi-Project Management
    Multi-Project Management DATA SHEET Multi-Project Management It is a challenge to monitor and control a large number of projects within a company or division. It is even more challenging the more the projects influence each other or have mutual dependencies and compete for the same resources. The tasks in multi-project management essentially include: . Analyzing target compliance (scope, costs, deadlines) . Analyzing the status and progress of projects . Identifying critical plan deviations to allow early corrective action to be taken . Consistent quality management and consistent project evaluation . Standardizing project processes (e.g. formalized proposals, phase models for particular project types, etc.) and monitoring compliance . Creating aggregated reports and decision support for management . Comprehensive knowledge management (project learning and implementation into new pro jects) . Documenting decisions © OPUS Business Solutions GmbH 2018 Page 1/7 Multi-Project Management The KLUSA Management module To carry out the tasks described above, KLUSA is organized according to typical tasks and procedures. In order to handle a large number of projects, there are filters to limit and select the projects displayed. All reports and evaluations then relate to the filtered project list. Filters can be individually saved by users, and important filters can be made available to all users centrally from the project office. In addition, the KLUSA portals can be applied to limit the scope of project analysis. Example of a project phase overview in KLUSA Status and progress of projects The status overviews offered by KLUSA include the following: . Dashboard . Phases and project deadlines (planned and actual deadlines) . Summary . Milestone overview . Costs and benefits (planned, actual, forecast costs) .
    [Show full text]
  • PLANNING for INNOVATION Understanding China’S Plans for Technological, Energy, Industrial, and Defense Development
    PLANNING FOR INNOVATION Understanding China’s Plans for Technological, Energy, Industrial, and Defense Development A report prepared for the U.S.-China Economic and Security Review Commission Tai Ming Cheung Thomas Mahnken Deborah Seligsohn Kevin Pollpeter Eric Anderson Fan Yang July 28, 2016 UNIVERSITY OF CALIFORNIA INSTITUTE ON GLOBAL CONFLICT AND COOPERATION Disclaimer: This research report was prepared at the request of the U.S.-China Economic and Security Review Commission to support its deliberations. Posting of the report to the Commis- sion’s website is intended to promote greater public understanding of the issues addressed by the Commission in its ongoing assessment of US-China economic relations and their implications for US security, as mandated by Public Law 106-398 and Public Law 108-7. However, it does not necessarily imply an endorsement by the Commission or any individual Commissioner of the views or conclusions expressed in this commissioned research report. The University of California Institute on Global Conflict and Cooperation (IGCC) addresses global challenges to peace and prosperity through academically rigorous, policy-relevant research, train- ing, and outreach on international security, economic development, and the environment. IGCC brings scholars together across social science and lab science disciplines to work on topics such as regional security, nuclear proliferation, innovation and national security, development and political violence, emerging threats, and climate change. IGCC is housed within the School
    [Show full text]
  • Omi Troubleshooting Guide
    Operations Manager i Software Version: 10.63 Troubleshooting Document Release Date: December 2017 Software Release Date: November 2017 Troubleshooting Legal Notices Warranty The only warranties for Seattle SpinCo, Inc and its subsidiaries (“Seattle”) products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Seattle shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Restricted Rights Legend Confidential computer software. Except as specifically indicated, valid license from Seattle required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Copyright Notice © 2015 - 2017 EntIT Software LLC, a Micro Focus company Trademark Notices Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated. AMD, the AMD Arrow symbol and ATI are trademarks of Advanced Micro Devices, Inc. Citrix® and XenDesktop® are registered trademarks of Citrix Systems, Inc. and/or one more of its subsidiaries, and may be registered in the United States Patent and Trademark Office and in other countries. Google™ and Google Maps™ are trademarks of Google Inc. Intel®, Itanium®, Pentium®, and Intel® Xeon® are trademarks of Intel Corporation in the U.S. and other countries. iPad® and iPhone® are trademarks of Apple Inc. Java is a registered trademark of Oracle and/or its affiliates. Linux® is the registered trademark of Linus Torvalds in the U.S.
    [Show full text]
  • Vulnerability Summary for the Week of August 24, 2015
    Vulnerability Summary for the Week of August 24, 2015 Please Note: • The vulnerabilities are cattegorized by their level of severity which is either High, Medium or Low. • The !" indentity number is the #ublicly $nown %& given to that #articular vulnerability. Therefore you can search the status of that #articular vulnerability using that %&. • The !'S (Common !ulnerability 'coring System) score is a standard scoring system used to determine the severity of the vulnerability. High Severity Vulnerabilities The Primary Vendor --- Description Date CVSS The CVE Product Published Score Identity actiontec ** .ctiontec /T0123N modems with firmware 2015-08-23 8.3 CVE-2015-2904 CERT-VN +ncs,-+firmware before NC',-*-.0.14 have hardcoded credentials, which ma$es it easier for remote attac$ers to obtain root access by connecting to the web administration interface. adobe ** air 5se*after*free vulnerability in .dobe 6lash Player 2015-08-24 10.0 CVE-2015-5566 CONFIRM (link before -1.0.0.747 on 3indows and 8' 9 and is external) before --.2.2,7.5,1 on Linu;, .dobe .%< before -1.0.,.1==, .dobe .%< '&> before -1.0.0.-==, and .dobe .%< '&> ? om#iler before -1.0.0.1== allows attac$ers to e;ecute arbitrary code via uns#ecified vectors, a different vulnerability than !"*7,-:*:-70, !"*7,-:*:-4,, !"*7,-:* :-42, !"*7,-:*::4=, !"*7,-:*::2,, !"* 7,-:*:::,, !"*7,-:*:::-, !"*7,-:*:::@, !"*7,-:*:::0, !"*7,-:*:::=, !"*7,-:*::@-, !"*7,-:*::@4, !"*7,-:*::@2, and !"*7,-:* ::@:. a#ache ** ta#estry .#ache Ta#estry before :.3.6 relies on client*side 2015-08-22 7.8 CVE-2014-1972 CONFIRM obAect storage without chec$ing whether a client has modified an obAect, which allows remote CONFIRM JVNDB (link is attac$ers to cause a denial of service (resource external) consum#tion) or e;ecute arbitrary code via JVN (link is crafted serialized data.
    [Show full text]
  • Upkit: an Open-Source, Portable, and Lightweight Update Framework For
    Paper published at the 39th IEEE International Conference on Distributed Computing Systems (ICDCS) in July 2019 UpKit: An Open-Source, Portable, and Lightweight Update Framework for Constrained IoT Devices Antonio Langiu, Carlo Alberto Boano, Markus Schuß, and Kay Romer¨ Institute of Technical Informatics, Graz University of Technology, Austria E-mail: [email protected]; [email protected]; [email protected]; [email protected] Abstract—Updating the software running on constrained IoT to embed some software update capabilities in the firmware devices such as low-power sensors and actuators in a secure and running on each IoT device [6], [7]. Such capabilities include, efficient way is an open problem. The limited computational, among others, the (over-the-air) download of the update image, memory, and storage capabilities of these devices, together with their small energy budget, indeed, restrict the number of features the verification of its integrity and authenticity, as well as its that can be embedded into an update system and make it installation [8]. All these steps should be performed while also difficult to build a generic and compact solution. As a minimizing the downtime of a device and its services. result, existing update systems for constrained IoT devices are often not portable, do not perform a proper verification of the Updating constrained IoT devices. Updating the software downloaded firmware, or focus only on a single phase of the running on constrained IoT devices, e.g., low-power sensors update process, which exposes them to security threats and calls and actuators [9], is still an open research problem [6], for new solutions.
    [Show full text]
  • Arcgis and Flex Web Applications Kevin Deege @Kdeege
    Esri International User Conference San Diego, California Technical Workshops | ArcGIS and Flex Web Applications Kevin Deege @kdeege Agenda • Overview • ArcGIS Application Builder • ArcGIS API for Flex • Customizing the ArcGIS Viewer for Flex • Road ahead • Additional resources What is your role? Build, configure, develop Configure Build Develop Flex Web Application What does an application need? • Content OR - Portal Web Maps - ArcGIS Online Web Maps Basemaps and - ArcGIS Online for Organizations Operational - Portal for ArcGIS Layers - Basemaps and operational Layers Layer Your Server Map ArcGISOnline Layer What does an application need? • Tools and Functionality - Components / Widgets - Tasks / API Functionality What does an application need? • Appearance - Standard - Custom Requirements – Build and Configure Build, configure • Application Builder Build - Adobe AIR • Flash Player (testing) Configure • Web server Requirements - Developer Developer configuration • Flex SDK (4.6 or higher) • Flash Builder (4.6 or higher) Develop - Adobe AIR • Flash Player (11.1 or higher) - Debugger version • ArcGIS Viewer for Flex - Source available on Github • ArcGIS API for Flex - Available on ArcGIS Resource Center Flash Runtimes and Flex SDK • Adobe - Adobe Flash Player - Adobe Flash Builder - Donated Flex SDK to Apache - Adobe Flex SDK 4.6.0 • Apache Foundation - Apache Flex 4.9.0 SDK - http://flex.apache.org/ Getting started with the Viewer - Builder Navigate to ArcGIS Resources site http://links.esri.com/flexviewer Link to download ArcGIS Viewer
    [Show full text]
  • China Smart Devices
    China smart devices EQUITY: TECHNOLOGY The next mega trend for 2014 and beyond? Global Markets Research LTE, Smart Homes, 3D Vision, EV, IT nationalism, 21 May 2014 Smart TVs, 4G smartphones and more… Anchor themes Despite the macro slowdown and Industry view: hardware + service to stimulate industry upgrade saturation in major technology We believe “hardware + service” has become an important business model to product lines, we think innovation drive the development of China’s IT hardware sector. In the past two years, and policy supports are the popularity of WeChat and mobile gaming has accelerated adoption of 3G incubating a new round of smartphones in China. Since 2013, IPTV services such as LeTV have started growth, potentially benefiting to reshape China’s TV industry. Looking ahead, we believe: players well positioned in various Mobile video services will stimulate growth of 4G smartphones TMT sub-sectors. TV game deregulation will become a new driver for Smart TVs in China Nomura vs consensus Air pollution may boost demand for EV and green home appliances We analyse China's TMT industry E-commerce will create new opportunities in O2O logistics from the perspective of a broad scope throughout the vertical & Smart home hardware is ready to incubate service and reshape the industry horizontal axis, and across sub- Concerns on IT security will benefit players in nationally strategic areas like sectors. semiconductor and enterprise equipment Research analysts 3D vision may help machines to better understand the real world and innovate the way people use e-commerce and auto driving. China Technology Regulatory policies still matter Leping Huang, PhD - NIHK As well as the above, government policy will play an important role in guiding [email protected] the development of China technology and telecoms.
    [Show full text]