Search This Blog

Saturday, November 23, 2019

Unmanned aerial vehicle (drone)

From Wikipedia, the free encyclopedia

A General Atomics MQ-9 Reaper, a hunter-killer surveillance UAV

A DJI Phantom quadcopter UAV for commercial and recreational aerial photography
A DeltaQuad VTOL fixed wing surveillance UAV 
UAV launch from an air-powered catapult

Swift020/021
(スウィフト020/021) in Kobe

An unmanned aerial vehicle (UAV) (or uncrewed aerial vehicle, commonly known as a drone) is an aircraft without a human pilot on board and a type of unmanned vehicle. UAVs are a component of an unmanned aircraft system (UAS); which include a UAV, a ground-based controller, and a system of communications between the two. The flight of UAVs may operate with various degrees of autonomy: either under remote control by a human operator or autonomously by onboard computers.

Compared to crewed aircraft, UAVs were originally used for missions too "dull, dirty or dangerous" for humans. While they originated mostly in military applications, their use is rapidly expanding to commercial, scientific, recreational, agricultural, and other applications, such as policing and surveillance, product deliveries, aerial photography, smuggling, and drone racing. Civilian UAVs now vastly outnumber military UAVs, with estimates of over a million sold by 2015.

Terminology

Multiple terms are used for unmanned aerial vehicles, which generally refer to the same concept.

The term drone, more widely used by the public, was coined in reference to the early remotely-flown target aircraft used for practice firing of a battleship's guns, and the term was first used with the 1920s Fairey Queen and 1930's de Havilland Queen Bee target aircraft. These two were followed in service by the similarly-named Airspeed Queen Wasp and Miles Queen Martinet, before ultimate replacement by the GAF Jindivik.

The term unmanned aircraft system (UAS) was adopted by the United States Department of Defense (DoD) and the United States Federal Aviation Administration in 2005 according to their Unmanned Aircraft System Roadmap 2005–2030. The International Civil Aviation Organization (ICAO) and the British Civil Aviation Authority adopted this term, also used in the European Union's Single-European-Sky (SES) Air-Traffic-Management (ATM) Research (SESAR Joint Undertaking) roadmap for 2020. This term emphasizes the importance of elements other than the aircraft. It includes elements such as ground control stations, data links and other support equipment. A similar term is an unmanned-aircraft vehicle system (UAVS), remotely piloted aerial vehicle (RPAV), remotely piloted aircraft system (RPAS). Many similar terms are in use.

A UAV is defined as a "powered, aerial vehicle that does not carry a human operator, uses aerodynamic forces to provide vehicle lift, can fly autonomously or be piloted remotely, can be expendable or recoverable, and can carry a lethal or nonlethal payload". Therefore, missiles are not considered UAVs because the vehicle itself is a weapon that is not reused, though it is also uncrewed and in some cases remotely guided.

The relation of UAVs to remote controlled model aircraft is unclear. UAVs may or may not include model aircraft. Some jurisdictions base their definition on size or weight; however, the US Federal Aviation Administration defines any uncrewed flying craft as a UAV regardless of size. For recreational uses, a drone (as opposed to a UAV) is a model aircraft that has first-person video, autonomous capabilities, or both.

History

Winston Churchill and others waiting to watch the launch of a de Havilland Queen Bee target drone, 6 June 1941
A Ryan Firebee, one of a series of target drones/unpiloted aerial vehicles that first flew in 1951. Israeli Air Force Museum, Hatzerim airbase, Israel, 2006

Last preparations before the first tactical UVA mission across the Suez canal (1969). Standing: Major Shabtai Brill from the Israeli intelligence corps, the innovator of the tactical UAV.

The Israeli Tadiran Mastiff, which first flew in 1975, is seen by many as the first modern battlefield UAV, due to its data-link system, endurance-loitering, and live video-streaming.
The earliest recorded use of an unmanned aerial vehicle for warfighting occurred on July 1849, serving as a balloon carrier (the precursor to the aircraft carrier) in the first offensive use of air power in naval aviation. Austrian forces besieging Venice attempted to launch some 200 incendiary balloons at the besieged city. The balloons were launched mainly from land; however, some were also launched from the Austrian ship SMS Vulcano. At least one bomb fell in the city; however, due to the wind changing after launch, most of the balloons missed their target, and some drifted back over Austrian lines and the launching ship Vulcano.

UAV innovations started in the early 1900s and originally focused on providing practice targets for training military personnel. UAV development continued during World War I, when the Dayton-Wright Airplane Company invented a pilotless aerial torpedo that would explode at a preset time.

The earliest attempt at a powered UAV was A. M. Low's "Aerial Target" in 1916. Nikola Tesla described a fleet of uncrewed aerial combat vehicles in 1915. Advances followed during and after World War I, including the Hewitt-Sperry Automatic Airplane. This development also inspired the development of the Kettering Bug by Charles Kettering from Dayton, Ohio. This was initially meant as an uncrewed plane that would carry an explosive payload to a predetermined target. The first scaled remote piloted vehicle was developed by film star and model-airplane enthusiast Reginald Denny in 1935. More emerged during World War II – used both to train antiaircraft gunners and to fly attack missions. Nazi Germany produced and used various UAV aircraft during the war. Jet engines entered service after World War II in vehicles such as the Australian GAF Jindivik, and Teledyne Ryan Firebee I of 1951, while companies like Beechcraft offered their Model 1001 for the U.S. Navy in 1955. Nevertheless, they were little more than remote-controlled airplanes until the Vietnam War.

In 1959, the U.S. Air Force, concerned about losing pilots over hostile territory, began planning for the use of uncrewed aircraft. Planning intensified after the Soviet Union shot down a U-2 in 1960. Within days, a highly classified UAV program started under the code name of "Red Wagon". The August 1964 clash in the Tonkin Gulf between naval units of the U.S. and North Vietnamese Navy initiated America's highly classified UAVs (Ryan Model 147, Ryan AQM-91 Firefly, Lockheed D-21) into their first combat missions of the Vietnam War. When the Chinese government showed photographs of downed U.S. UAVs via Wide World Photos, the official U.S. response was "no comment". 

During the War of Attrition (1967–1970) the first tactical UAVs installed with reconnaissance cameras were first tested by the Israeli intelligence, successfully bringing photos from across the Suez canal. This was the first time that tactical UAVs, which could be launched and landed on any short runway (unlike the heavier jet-based UAVs), were developed and tested in battle.

In the 1973 Yom Kippur War, Israel used UAVs as decoys to spur opposing forces into wasting expensive anti-aircraft missiles. After the 1973 Yom Kippur war, a few key people from the team that developed this early UAV joined a small startup company that aimed to develop UAVs into a commercial product, eventually purchased by Tadiran and leading to the development of the first Israeli UVA.

In 1973, the U.S. military officially confirmed that they had been using UAVs in Southeast Asia (Vietnam). Over 5,000 U.S. airmen had been killed and over 1,000 more were missing or captured. The USAF 100th Strategic Reconnaissance Wing flew about 3,435 UAV missions during the war at a cost of about 554 UAVs lost to all causes. In the words of USAF General George S. Brown, Commander, Air Force Systems Command, in 1972, "The only reason we need (UAVs) is that we don't want to needlessly expend the man in the cockpit." Later that year, General John C. Meyer, Commander in Chief, Strategic Air Command, stated, "we let the drone do the high-risk flying ... the loss rate is high, but we are willing to risk more of them ...they save lives!"

During the 1973 Yom Kippur War, Soviet-supplied surface-to-air missile batteries in Egypt and Syria caused heavy damage to Israeli fighter jets. As a result, Israel developed the first UAV with real-time surveillance. The images and radar decoys provided by these UAVs helped Israel to completely neutralize the Syrian air defenses at the start of the 1982 Lebanon War, resulting in no pilots downed. The first time UAVs were used as proof-of-concept of super-agility post-stall controlled flight in combat-flight simulations involved tailless, stealth technology-based, three-dimensional thrust vectoring flight control, jet-steering UAVs in Israel in 1987.

With the maturing and miniaturization of applicable technologies in the 1980s and 1990s, interest in UAVs grew within the higher echelons of the U.S. military. In the 1990s, the U.S. DoD gave a contract to AAI Corporation along with Israeli company Malat. The U.S. Navy bought the AAI Pioneer UAV that AAI and Malat developed jointly. Many of these UAVs saw service in the 1991 Gulf War. UAVs demonstrated the possibility of cheaper, more capable fighting machines, deployable without risk to aircrews. Initial generations primarily involved surveillance aircraft, but some carried armaments, such as the General Atomics MQ-1 Predator, that launched AGM-114 Hellfire air-to-ground missiles

CAPECON was a European Union project to develop UAVs, running from 1 May 2002 to 31 December 2005.

As of 2012, the USAF employed 7,494 UAVs – almost one in three USAF aircraft.[43][44] The Central Intelligence Agency also operated UAVs.

In 2013 at least 50 countries used UAVs. China, Iran, Israel, Pakistan, and others designed and built their own varieties.

Classification

Although most military UAVs are fixed-wing aircraft, rotorcraft designs (i.e., RUAVs) such as this MQ-8B Fire Scout are also used.
UAVs typically fall into one of six functional categories (although multi-role airframe platforms are becoming more prevalent):
  • Target and decoy – providing ground and aerial gunnery a target that simulates an enemy aircraft or missile
  • Reconnaissance – providing battlefield intelligence
  • Combat – providing attack capability for high-risk missions (see: Unmanned combat aerial vehicle (UCAV))
  • Logistics – delivering cargo
  • Research and development – improve UAV technologies
  • Civil and commercial UAVs – agriculture, aerial photography, data collection
The U.S. Military UAV tier system is used by military planners to designate the various individual aircraft elements in an overall usage plan. 

Schiebel S-100 fitted with a Lightweight Multirole Missile
Northrop Grumman Bat carrying EO/IR and SAR sensors, laser range finders, laser designators, Infra-Red cameras
Vehicles can be categorized in terms of range/altitude. The following has been advanced as relevant at industry events such as ParcAberporth Unmanned Systems forum:
  • Hand-held 2,000 ft (600 m) altitude, about 2 km range
  • Close 5,000 ft (1,500 m) altitude, up to 10 km range
  • NATO type 10,000 ft (3,000 m) altitude, up to 50 km range
  • Tactical 18,000 ft (5,500 m) altitude, about 160 km range
  • MALE (medium altitude, long endurance) up to 30,000 ft (9,000 m) and range over 200 km
  • HALE (high altitude, long endurance) over 30,000 ft (9,100 m) and indefinite range
  • Hypersonic high-speed, supersonic (Mach 1–5) or hypersonic (Mach 5+) 50,000 ft (15,200 m) or suborbital altitude, range over 200 km
  • Orbital low earth orbit (Mach 25+)
  • CIS Lunar Earth-Moon transfer
  • Computer Assisted Carrier Guidance System (CACGS) for UAVs
U.S. UAV demonstrators in 2005
Other categories include:[46][47]
  • Hobbyist UAVs – which can be further divided into
    • Ready-to-fly (RTF)/Commercial-off-the-shelf (COTS)
    • Bind-and-fly (BNF) – require minimum knowledge to fly the platform
    • Almost-ready-to-fly (ARF)/Do-it-yourself (DIY) – require significant knowledge to get in the air
    • Bare frame – requires significant knowledge and your own parts to get it in the air
  • Midsize military and commercial UAVs
  • Large military-specific UAVs
  • Stealth combat UAVs
  • Crewed aircraft transformed into uncrewed (and Optionally Piloted UAVS or OPVs)
Classifications according to aircraft weight are quite simpler:
  • Micro air vehicle (MAV) – the smallest UAVs that can weigh less than 1g
  • Miniature UAV (also called SUAS) – approximately less than 25 kg
  • Heavier UAVs

UAV components


Crewed and uncrewed aircraft of the same type generally have recognizably similar physical components. The main exceptions are the cockpit and environmental control system or life support systems. Some UAVs carry payloads (such as a camera) that weigh considerably less than an adult human, and as a result can be considerably smaller. Though they carry heavy payloads, weaponized military UAVs are lighter than their crewed counterparts with comparable armaments.

Small civilian UAVs have no life-critical systems, and can thus be built out of lighter but less sturdy materials and shapes, and can use less robustly tested electronic control systems. For small UAVs, the quadcopter design has become popular, though this layout is rarely used for crewed aircraft. Miniaturization means that less-powerful propulsion technologies can be used that are not feasible for crewed aircraft, such as small electric motors and batteries.

Control systems for UAVs are often different than crewed craft. For remote human control, a camera and video link almost always replace the cockpit windows; radio-transmitted digital commands replace physical cockpit controls. Autopilot software is used on both crewed and uncrewed aircraft, with varying feature sets.

Body

The primary difference for planes is the absence of the cockpit area and its windows. Tailless quadcopters are a common form factor for rotary wing UAVs while tailed mono- and bi-copters are common for crewed platforms.

Power supply and platform

Small UAVs mostly use lithium-polymer batteries (Li-Po), while larger vehicles rely on conventional airplane engines. Scale or size of aircraft is not the defining or limiting characteristic of energy supply for a UAV. At present, the energy density of Li-Po is far less than gasoline. The record of travel for a UAV (built from balsa wood and mylar skin) across the North Atlantic Ocean is held by a gasoline model airplane or UAV. Manard Hill in "in 2003 when one of his creations flew 1,882 miles across the Atlantic Ocean on less than a gallon of fuel" holds this record. Electric power is used as less work is required for a flight and electric motors are quieter. Also, properly designed, the thrust to weight ratio for an electric or gasoline motor driving a propeller can hover or climb vertically. Botmite airplane is an example of an electric UAV which can climb vertically.

Battery elimination circuitry (BEC) is used to centralize power distribution and often harbors a microcontroller unit (MCU). Costlier switching BECs diminish heating on the platform.

Computing

UAV computing capability followed the advances of computing technology, beginning with analog controls and evolving into microcontrollers, then system-on-a-chip (SOC) and single-board computers (SBC).

System hardware for small UAVs is often called the flight controller (FC), flight controller board (FCB) or autopilot.

Sensors

Position and movement sensors give information about the aircraft state. Exteroceptive sensors deal with external information like distance measurements, while exproprioceptive ones correlate internal and external states.

Non-cooperative sensors are able to detect targets autonomously so they are used for separation assurance and collision avoidance.

Degrees of freedom (DOF) refers to both the amount and quality of sensors on board: 6 DOF implies 3-axis gyroscopes and accelerometers (a typical inertial measurement unit – IMU), 9 DOF refers to an IMU plus a compass, 10 DOF adds a barometer and 11 DOF usually adds a GPS receiver.

Actuators

UAV actuators include digital electronic speed controllers (which control the RPM of the motors) linked to motors/engines and propellers, servomotors (for planes and helicopters mostly), weapons, payload actuators, LEDs and speakers.

Software

UAV software called the flight stack or autopilot. UAVs are real-time systems that require rapid response to changing sensor data. Examples include Raspberry Pis, Beagleboards, etc. shielded with NavIO, PXFMini, etc. or designed from scratch such as Nuttx, preemptive-RT Linux, Xenomai, Orocos-Robot Operating System or DDS-ROS 2.0.

Flight stack overview
Layer Requirement Operations Example
Firmware Time-critical From machine code to processor execution, memory access ArduCopter-v1, px4
Middleware Time-critical Flight control, navigation, radio management Cleanflight, ArduPilot
Operating system Computer-intensive Optic flow, obstacle avoidance, SLAM, decision-making ROS, Nuttx, Linux distributions, Microsoft IOT

Civil-use open-source stacks include:

Loop principles

Typical flight-control loops for a multirotor

UAVs employ open-loop, closed-loop or hybrid control architectures.
  • Open loop – This type provides a positive control signal (faster, slower, left, right, up, down) without incorporating feedback from sensor data.
  • Closed loop – This type incorporates sensor feedback to adjust behavior (reduce speed to reflect tailwind, move to altitude 300 feet). The PID controller is common. Sometimes, feedforward is employed, transferring the need to close the loop further.

Flight controls

UAVs can be programmed to perform aggressive manœuvres or landing/perching on inclined surfaces, and then to climb toward better communication spots. Some UAVs can control flight with varying flight modelisation, such as VTOL designs. 

UAVs can also implement perching on a flat vertical surface.

Communications

Most UAVs use a radio for remote control and exchange of video and other data. Early UAVs had only narrowband uplink. Downlinks came later. These bi-directional narrowband radio links carried command and control (C&C) and telemetry data about the status of aircraft systems to the remote operator. For very long range flights, military UAVs also use satellite receivers as part of satellite navigation systems. In cases when video transmission was required, the UAVs will implement a separate analog video radio link.
In the most modern UAV applications, video transmission is required. So instead of having 2 separate links for C&C, telemetry and video traffic, a broadband link is used to carry all types of data on a single radio link. These broadband links can leverage quality of service techniques to optimize the C&C traffic for low latency. Usually these broadband links carry TCP/IP traffic that can be routed over the Internet.
The radio signal from the operator side can be issued from either:
  • Ground control – a human operating a radio transmitter/receiver, a smartphone, a tablet, a computer, or the original meaning of a military ground control station (GCS). Recently control from wearable devices, human movement recognition, human brain waves was also demonstrated.
  • Remote network system, such as satellite duplex data links for some military powers. Downstream digital video over mobile networks has also entered consumer markets, while direct UAV control uplink over the cellular mesh and LTE have been demonstrated and are in trials.
  • Another aircraft, serving as a relay or mobile control station – military manned-unmanned teaming (MUM-T).
  • A protocol MAVLink is increasingly becoming popular to carry command and control data between the ground control and the vehicle

Autonomy

Autonomous control basics
ICAO classifies uncrewed aircraft as either remotely piloted aircraft or fully autonomous. Actual UAVs may offer intermediate degrees of autonomy. E.g., a vehicle that is remotely piloted in most contexts may have an autonomous return-to-base operation.
Basic autonomy comes from proprioceptive sensors. Advanced autonomy calls for situational awareness, knowledge about the environment surrounding the aircraft from exterioceptive sensors: sensor fusion integrates information from multiple sensors.

Basic principles

One way to achieve autonomous control employs multiple control-loop layers, as in hierarchical control systems. As of 2016 the low-layer loops (i.e. for flight control) tick as fast as 32,000 times per second, while higher-level loops may cycle once per second. The principle is to decompose the aircraft's behavior into manageable "chunks", or states, with known transitions. Hierarchical control system types range from simple scripts to finite state machines, behavior trees and hierarchical task planners. The most common control mechanism used in these layers is the PID controller which can be used to achieve hover for a quadcopter by using data from the IMU to calculate precise inputs for the electronic speed controllers and motors.
Examples of mid-layer algorithms:
  • Path planning: determining an optimal path for vehicle to follow while meeting mission objectives and constraints, such as obstacles or fuel requirements
  • Trajectory generation (motion planning): determining control maneuvers to take in order to follow a given path or to go from one location to another
  • Trajectory regulation: constraining a vehicle within some tolerance to a trajectory
Evolved UAV hierarchical task planners use methods like state tree searches or genetic algorithms.

Autonomy features

UAV's degrees of autonomy
UAV manufacturers often build in specific autonomous operations, such as:
  • Self-level: attitude stabilization on the pitch and roll axes.
  • Altitude hold: The aircraft maintains its altitude using barometric or ground sensors.
  • Hover/position hold: Keep level pitch and roll, stable yaw heading and altitude while maintaining position using GNSS or inertal sensors.
  • Headless mode: Pitch control relative to the position of the pilot rather than relative to the vehicle's axes.
  • Care-free: automatic roll and yaw control while moving horizontally
  • Take-off and landing (using a variety of aircraft or ground-based sensors and systems; see also:Autoland)
  • Failsafe: automatic landing or return-to-home upon loss of control signal
  • Return-to-home: Fly back to the point of takeoff (often gaining altitude first to avoid possible intervening obstructions such as trees or buildings).
  • Follow-me: Maintain relative position to a moving pilot or other object using GNSS, image recognition or homing beacon.
  • GPS waypoint navigation: Using GNSS to navigate to an intermediate location on a travel path.
  • Orbit around an object: Similar to Follow-me but continuously circle a target.
  • Pre-programmed aerobatics (such as rolls and loops)

Functions

Full autonomy is available for specific tasks, such as airborne refueling or ground-based battery switching; but higher-level tasks call for greater computing, sensing and actuating capabilities. One approach to quantifying autonomous capabilities is based on OODA terminology, as suggested by a 2002 US Air Force Research Laboratory.

Medium levels of autonomy, such as reactive autonomy and high levels using cognitive autonomy, have already been achieved to some extent and are very active research fields.

Reactive autonomy

Reactive autonomy, such as collective flight, real-time collision avoidance, wall following and corridor centring, relies on telecommunication and situational awareness provided by range sensors: optic flow, lidars (light radars), radars, sonars.
Most range sensors analyze electromagnetic radiation, reflected off the environment and coming to the sensor. The cameras (for visual flow) act as simple receivers. Lidars, radars and sonars (with sound mechanical waves) emit and receive waves, measuring the round-trip transit time. UAV cameras do not require emitting power, reducing total consumption.
Radars and sonars are mostly used for military applications.

Reactive autonomy has in some forms already reached consumer markets: it may be widely available in less than a decade.
Cutting-edge (2013) autonomous levels for existing systems

Simultaneous localization and mapping

SLAM combines odometry and external data to represent the world and the position of the UAV in it in three dimensions. High-altitude outdoor navigation does not require large vertical fields-of-view and can rely on GPS coordinates (which makes it simple mapping rather than SLAM).
Two related research fields are photogrammetry and LIDAR, especially in low-altitude and indoor 3D environments.

Swarming

Robot swarming refers to networks of agents able to dynamically reconfigure as elements leave or enter the network. They provide greater flexibility than multi-agent cooperation. Swarming may open the path to data fusion. Some bio-inspired flight swarms use steering behaviors and flocking.
Future military potential
In the military sector, American Predators and Reapers are made for counterterrorism operations and in war zones in which the enemy lacks sufficient firepower to shoot them down. They are not designed to withstand antiaircraft defenses or air-to-air combat. In September 2013, the chief of the US Air Combat Command stated that current UAVs were "useless in a contested environment" unless crewed aircraft were there to protect them.[167] A 2012 Congressional Research Service (CRS) report speculated that in the future, UAVs may be able to perform tasks beyond intelligence, surveillance, reconnaissance and strikes; the CRS report listed air-to-air combat ("a more difficult future task") as possible future undertakings.[168] The Department of Defense's Unmanned Systems Integrated Roadmap FY2013-2038 foresees a more important place for UAVs in combat.[169] Issues include extended capabilities, human-UAV interaction, managing increased information flux, increased autonomy and developing UAV-specific munitions.[169] DARPA's project of systems of systems, or General Atomics work may augur future warfare scenarios, the latter disclosing Avenger swarms equipped with High Energy Liquid Laser Area Defense System (HELLADS).

Cognitive radio

Cognitive radio technology may have UAV applications.

Learning capabilities

UAVs may exploit distributed neural networks.

Market

Military

The global military UAV market is dominated by companies based in the United States and Israel. By sale numbers, The US held over 60% military-market share in 2017. Four of top five military UAV manufactures are American including General Atomics, Lockheed Martin, Northrop Grumman and Boeing, followed by the Chinese company CASC. Israel companies mainly focus on small surveillance UAV system and by quantity of drones, Israel exported 60.7% (2014) of UAV on the market while the United States export 23.9% (2014); top importers of military UAV are The United Kingdom (33.9%) and India (13.2%). United States alone operated over 9,000 military UAVs in 2014. General Atomics is the dominant manufacturer with the Global Hawk and Predator/Mariner systems product-line.

Civilian

The civilian drone market is dominated by Chinese companies. Chinese drone manufacturer DJI alone has 75% of civilian-market share in 2017 with $11 billion forecast global sales in 2020. Followed by French company Parrot with $110m and US company 3DRobotics with $21.6m in 2014. As of March 2018, more than one million UAVs (878,000 hobbyist and 122,000 commercial) were registered with the U.S. FAA. 2018 NPD point to consumers increasingly purchasing drones with more advanced features with 33 percent growth in both the $500+ and $1000+ market segments.
The civilian UAV market is relatively new compared to the military one. Companies are emerging in both developed and developing nations at the same time. Many early stage startups have received support and funding from investors as is the case in the United States and by government agencies as is the case in India. Some universities offer research and training programs or degrees. Private entities also provide online and in-person training programs for both recreational and commercial UAV use.
Consumer drones are also widely used by military organizations worldwide because of the cost-effective nature of consumer product. In 2018, Israeli military started to use DJI Mavic and Matrice series of UAV for light reconnaissance mission since the civilian drones are easier to use and have higher reliability. DJI drones is also the most widely used commercial unmanned aerial system that the US Army has employed.
The global UAV market will reach US$21.47 billion, with the Indian market touching the US$885.7 million mark, by 2021.
Lighted drones are beginning to be used in nighttime displays for artistic and advertising purposes.

Transport

The AIA reports large cargo and passengers drones should be certified and introduced over the next 20 years. Sensor-carrying large drones are expected from 2018; short-haul, low altitude freighters outside cities from 2025; long-haul cargo flights by the mid-2030s and then passenger flights by 2040. Spending should rise from a few hundred million dollars on research and development in 2018 to $4 billion by 2028 and $30 billion by 2036.

Agriculture

As global food production demand grows exponentially, resources are depleted, farmland is reduced, and agricultural labor is increasingly in short supply, there is an urgent need for more convenient and smarter agricultural solutions than traditional methods, and the agricultural drone and robotics industry is expected to make progress. In the world, agricultural drones have been used in areas such as Africa, which can help build sustainable agriculture.

Development considerations

Animal imitation – ethology

Flapping-wing ornithopters, imitating birds or insects, are a research field in microUAVs. Their inherent stealth recommends them for spy missions.
The Nano Hummingbird is commercially available, while sub-1g microUAVs inspired by flies, albeit using a power tether, can "land" on vertical surfaces.
Other projects include uncrewed "beetles" and other insects.
Research is exploring miniature optic-flow sensors, called ocellis, mimicking the compound insect eyes formed from multiple facets, which can transmit data to neuromorphic chips able to treat optic flow as well as light intensity discrepancies.

Endurance

UEL UAV-741 Wankel engine for UAV operations
Flight time against mass of small (less than 1 kg) drones
UAV endurance is not constrained by the physiological capabilities of a human pilot.
Because of their small size, low weight, low vibration and high power to weight ratio, Wankel rotary engines are used in many large UAVs. Their engine rotors cannot seize; the engine is not susceptible to shock-cooling during descent and it does not require an enriched fuel mixture for cooling at high power. These attributes reduce fuel usage, increasing range or payload.
Proper drone cooling is essential for long-term drone endurance. Overheating and subsequent engine failure is the most common cause of drone failure.
Hydrogen fuel cells, using hydrogen power, may be able to extend the endurance of small UAVs, up to several hours.
Micro air vehicles endurance is so far best achieved with flapping-wing UAVs, followed by planes and multirotors standing last, due to lower Reynolds number.
Solar-electric UAVs, a concept originally championed by the AstroFlight Sunrise in 1974, have achieved flight times of several weeks.
Solar-powered atmospheric satellites ("atmosats") designed for operating at altitudes exceeding 20 km (12 miles, or 60,000 feet) for as long as five years could potentially perform duties more economically and with more versatility than low earth orbit satellites. Likely applications include weather monitoring, disaster recovery, earth imaging and communications.
Electric UAVs powered by microwave power transmission or laser power beaming are other potential endurance solutions.
Another application for a high endurance UAV would be to "stare" at a battlefield for a long interval (ARGUS-IS, Gorgon Stare, Integrated Sensor Is Structure) to record events that could then be played backwards to track battlefield activities.
Lengthy endurance flights
UAV Flight time
hours:minutes
Date Notes
Boeing Condor 58:11 1989 The aircraft is currently in the Hiller Aviation Museum. [103]
General Atomics GNAT 40:00 1992 [104][105]
TAM-5 38:52 11 August 2003 Smallest UAV to cross the Atlantic [106]
QinetiQ Zephyr Solar Electric 54:00 September 2007 [107][108]
RQ-4 Global Hawk 33:06 22 March 2008 Set an endurance record for a full-scale, operational uncrewed aircraft.[109]
QinetiQ Zephyr Solar Electric 82:37 28–31 July 2008 [110]
QinetiQ Zephyr Solar Electric 336:22 9–23 July 2010 [111]

Reliability

Reliability improvements target all aspects of UAV systems, using resilience engineering and fault tolerance techniques.
Individual reliability covers robustness of flight controllers, to ensure safety without excessive redundancy to minimize cost and weight. Besides, dynamic assessment of flight envelope allows damage-resilient UAVs, using non-linear analysis with ad-hoc designed loops or neural networks. UAV software liability is bending toward the design and certifications of crewed avionics software.
Swarm resilience involves maintaining operational capabilities and reconfiguring tasks given unit failures.

Applications

There are numerous civilian, commercial, military, and aerospace applications for UAVs. These include:
Civil
Recreation, Disaster relief, archeology, conservation of biodiversity and habitat, law enforcement, crime, and terrorism,
 
Commercial
Aerial surveillance, filmmaking, journalism, scientific research, surveying, cargo transport, mining , Transmission and Distribution , Forestry and agriculture
 
Military
Reconnaissance, attack, demining, and target practice

Existing UAVs


UAVs are being developed and deployed by many countries around the world. Due to their wide proliferation, no comprehensive list of UAV systems exists.
The export of UAVs or technology capable of carrying a 500 kg payload at least 300 km is restricted in many countries by the Missile Technology Control Regime.

Safety and security

US Department of Agriculture poster warning about the risks of flying UAVs near wildfires

Air traffic

UAVs can threaten airspace security in numerous ways, including unintentional collisions or other interference with other aircraft, deliberate attacks or by distracting pilots or flight controllers. The first incident of a drone-airplane collision occurred in mid-October 2017 in Quebec City, Canada. The first recorded instance of a drone collision with a hot air balloon occurred on 10 August 2018 in Driggs, Idaho, United States; although there was no significant damage to the balloon nor any injuries to its 3 occupants, the balloon pilot reported the incident to the NTSB, stating that "I hope this incident helps create a conversation of respect for nature, the airspace, and rules and regulations". In recent events UAVs flying into or near airports shutting them down for long periods of time.

Malicious use

UAVs could be loaded with dangerous payloads, and crashed into vulnerable targets. Payloads could include explosives, chemical, radiologial or biological hazards. UAVs with generally non-lethal payloads could possibly be hacked and put to malicious purposes. Anti-UAV systems are being developed by states to counter this threat. This is, however, proving difficult. As Dr J. Rogers stated in an interview to A&T "There is a big debate out there at the moment about what the best way is to counter these small UAVs, whether they are used by hobbyists causing a bit of a nuisance or in a more sinister manner by a terrorist actor".
By 2017, drones were being used to drop contraband into prisons. Drones caused significant disruption at Gatwick Airport during December 2018, needing the deployment of the British Army.

Counter unmanned air system

Italian Army soldiers of the 17th Anti-aircraft Artillery Regiment "Sforzesca" with a portable CPM-Drone Jammer in Rome
The malicious use of UAVs has led to the development of counter unmanned air system (C-UAS) technologies such as the Aaronia AARTOS which have been installed on major international airports . Anti-aircraft missile systems, such as the Iron Dome are also being enhanced with C-UAS technologies.

Security vulnerabilities

The interest in UAVs cyber security has been raised greatly after the Predator UAV video stream hijacking incident in 2009, where Islamic militants used cheap, off-the-shelf equipment to stream video feeds from a UAV. Another risk is the possibility of hijacking or jamming a UAV in flight. Several security researchers have made public some vulnerabilities in commercial UAVs, in some cases even providing full source code or tools to reproduce their attacks. At a workshop on UAVs and privacy in October 2016, researchers from the Federal Trade Commission showed they were able to hack into three different consumer quadcopters and noted that UAV manufacturers can make their UAVs more secure by the basic security measures of encrypting the Wi-Fi signal and adding password protection.

Wildfires

In the United States, flying close to a wildfire is punishable by a maximum $25,000 fine. Nonetheless, in 2014 and 2015, firefighting air support in California was hindered on several occasions, including at the Lake Fire and the North Fire. In response, California legislators introduced a bill that would allow firefighters to disable UAVs which invaded restricted airspace. The FAA later required registration of most UAVs.
The use of UAVs is also being investigated to help detect and fight wildfires, whether through observation or launching pyrotechnic devices to start backfires.

Regulation

Ethical concerns and UAV-related accidents have driven nations to regulate the use of UAVs.

Brazil

In 2017, the National Civil Aviation Agency (ANAC) regulated the operation of drones through the Brazilian Special Civil Aviation Regulation No. 94/2017 (RBAC-E No. 94/2017). ANAC's regulation complements the drone operating rules established by the Airspace Control Department (DECEA) and the National Telecommunications Agency (ANATEL).

Canada

In 2016, Transport Canada proposed the implementation of new regulations that would require all UAVs over 250 grams to be registered and insured and that operators would be required to be a minimum age and pass an exam in order to get a license. Revised regulations are in effect as of June 2019.

Ireland

The Irish Aviation Authority (IAA) requires all UAVs over 1 kg to be registered with UAVs weighing 4 kg or more requiring a license to be issued by the IAA.

Italy

The ENAC (Ente Nazionale per l'Aviazione Civile), that is, the Italian Civil Aviation Authority for technical regulation, certification, supervision and control in the field of civil aviation, issued on 31 May 2016 a very detailed regulation for all UAV, determining which types of vehicles can be used, where, for which purposes, and who can control them. The regulation deals with the usage of UAV for either commercial and recreational use. The last version was published on 22 December 2016.

Japan

In 2015, Civil Aviation Bureau in Japan announced that "UA/Drone" (refers to any airplane, rotorcraft, glider or airship which cannot accommodate any person on board and can be remotely or automatically piloted) should (A) not fly near or above airports, (B) not fly over 150 meter above ground/water surface, (C) not fly over urban area and suburb (so only rural area is allowed.) UA/drone should be operated manually and at Visual Line of Sight (VLOS) and so on. UA/drone should not fly near any important buildings or facilities of the country including nuclear facilities. UA/drone must follow the Japan Radio Act exactly.

Netherlands

As of May 2016, the Dutch police are testing trained bald eagles to intercept offending UAVs.

South Africa

In April 2014, the South African Civil Aviation Authority announced that it would clamp down on the illegal flying of UAVs in South African airspace. "Hobby drones" with a weight of less than 7 kg at altitudes up to 500m with restricted visual line-of-sight below the height of the highest obstacle within 300m of the UAV are allowed. No license is required for such vehicles.

United Arab Emirates

In order to fly a drone in Dubai, citizens have to obtain a no objection certificate from Dubai Civil Aviation Authority (DCAA). This certificate can be obtained online.

United Kingdom

As of December 2018, UAVs of 20 kilograms (44 lb) or less must fly within the operator's eyesight. In built up areas, UAVs must be 150 feet (46 m) away from people and cannot be flown over large crowds or built up areas.
In July 2018, it became illegal to fly a UAV over 400 feet (120 m) and to fly within 1 kilometre (0.62 mi) of aircraft, airports and airfields.

As of 30th November 2019, anyone flying a drone between 250 grams and 20 kilograms in weight is required to register with the Civil Aviation Authority (CAA). Pilots require a Flyer ID, and those in control of the drone require an Operator ID. Regulations apply to both hobbyist and professional users.

United States

Recreational use

From 21 December 2015, all hobby type UAVs between 250 grams and 25 kilograms needed to be registered with FAA no later than 19 February 2016.

The new FAA UAV registration process includes requirements for:
  • Eligible owners must register their UAVs prior to flight. Non-commercial flights are no longer subject to registration.
  • If the owner is less than 13 years old, a parent or other responsible person must do the FAA registration.
  • UAVs must be marked with the FAA-issued registration number.
  • The registration fee is $5. The registration is good for 3 years and can be renewed for an additional 3 years at the $5 rate.
  • A single registration applies to all UAVs owned by an individual. Failure to register can result in civil penalties of up to $27,500 and criminal penalties of up to $250,000 and/or imprisonment for up to three years.
On 19 May 2017, in the case Taylor v. Huerta, the U.S. Court of Appeals for the District of Columbia Circuit held that the FAA's 2015 drone registration rules were in violation of the 2012 FAA Modernization and Reform Act. Under the court's holding, although commercial drone operators are required to register, recreational operators are not. On 25 May 2017, one week after the Taylor decision, Senator Dianne Feinstein introduced S. 1272, the Drone Federalism Act of 2017, in Congress.

Commercial use

On 21 June 2016, the Federal Aviation Administration announced regulations for commercial operation of small UAS craft (sUAS), those between 0.55 and 55 pounds (about 250 gm to 25 kg) including payload. The rules, which exclude hobbyists, require the presence at all operations of a licensed Remote Pilot in Command. Certification of this position, available to any citizen at least 16 years of age, is obtained solely by passing a written test and then submitting an application. For those holding a sport pilot license or higher, and with a current flight review, a rule-specific exam can be taken at no charge online at the faasafety.gov website. Other applicants must take a more comprehensive examination at an aeronautical testing center. All licensees are required to take a review course every two years. At this time no ratings for heavier UAS are available.
Commercial operation is restricted to daylight, line-of-sight, under 100 mph, under 400 feet, and Class G airspace only, and may not fly over people or be operated from a moving vehicle. Some organizations have obtained a waiver or Certificate of Authorization that allows them to exceed these rules. On 20 September 2018, State Farm Insurance, in partnership with the Virginia Tech Mid-Atlantic Aviation Partnership and FAA Integration Pilot Program, became the first in the United States to fly a UAV 'Beyond-Visual-Line-Of-Sight' (BVLOS) and over people under an FAA Part 107 Waiver. The flight was made at the Virginia Tech Kentland Farms outside the Blacksburg campus with an SenseFly eBee vehicle, Pilot-In-Command was Christian Kang, a State Farm Weather Catastrophe Claims Services employee (Part 107 & 61 pilot). Additionally, CNN's waiver for UAVs modified for injury prevention to fly over people, while other waivers allow night flying with special lighting, or non-line-of-sight operations for agriculture or railroad track inspection.
Previous to this announcement, any commercial use required a full pilot's license and an FAA waiver, of which hundreds had been granted.

Government use

The use of UAVs for law-enforcement purposes is regulated at a state level.
In Oregon, law enforcement is allowed to operate non-weaponized drones without a warrant if there is enough reason to believe that the current environment poses imminent danger to which the drone can acquire information or assist individuals. Otherwise, a warrant, with a maximum period of 30 days of interaction, must be acquired.

Friday, November 22, 2019

Unconscious mind

From Wikipedia, the free encyclopedia
 
The unconscious mind (or the unconscious) consists of the processes in the mind which occur automatically and are not available to introspection and include thought processes, memories, interests and motivations.

Even though these processes exist well under the surface of conscious awareness, they are theorized to exert an impact on behavior. The term was coined by the 18th-century German Romantic philosopher Friedrich Schelling and later introduced into English by the poet and essayist Samuel Taylor Coleridge.

Empirical evidence suggests that unconscious phenomena include repressed feelings, automatic skills, subliminal perceptions, and automatic reactions, and possibly also complexes, hidden phobias and desires.

The concept was popularized by the Austrian neurologist and psychoanalyst Sigmund Freud. In psychoanalytic theory, unconscious processes are understood to be directly represented in dreams, as well as in slips of the tongue and jokes.

Thus the unconscious mind can be seen as the source of dreams and automatic thoughts (those that appear without any apparent cause), the repository of forgotten memories (that may still be accessible to consciousness at some later time), and the locus of implicit knowledge (the things that we have learned so well that we do them without thinking).

It has been argued that consciousness is influenced by other parts of the mind. These include unconsciousness as a personal habit, being unaware and intuition. Phenomena related to semi-consciousness include awakening, implicit memory, subliminal messages, trances, hypnagogia and hypnosis. While sleep, sleepwalking, dreaming, delirium and comas may signal the presence of unconscious processes, these processes are seen as symptoms rather than the unconscious mind itself.
Some critics have doubted the existence of the unconscious.

Historical overview

The term "unconscious" (German: Unbewusste) was coined by the 18th-century German Romantic philosopher Friedrich Schelling (in his System of Transcendental Idealism, ch. 6, § 3) and later introduced into English by the poet and essayist Samuel Taylor Coleridge (in his Biographia Literaria). Some rare earlier instances of the term "unconsciousness" (Unbewußtseyn) can be found in the work of the 18th-century German physician and philosopher Ernst Platner.

Influences on thinking that originate from outside of an individual's consciousness were reflected in the ancient ideas of temptation, divine inspiration, and the predominant role of the gods in affecting motives and actions. The idea of internalised unconscious processes in the mind was also instigated in antiquity and has been explored across a wide variety of cultures. Unconscious aspects of mentality were referred to between 2,500 and 600 BC in the Hindu texts known as the Vedas, found today in Ayurvedic medicine.

Paracelsus is credited as the first to make mention of an unconscious aspect of cognition in his work Von den Krankheiten (translates as "About illnesses", 1567), and his clinical methodology created a cogent system that is regarded by some as the beginning of modern scientific psychology. William Shakespeare explored the role of the unconscious in many of his plays, without naming it as such. In addition, Western philosophers such as Arthur Schopenhauer, Baruch Spinoza, Gottfried Leibniz, Johann Gottlieb Fichte, Georg Wilhelm Friedrich Hegel, Eduard von Hartmann, Søren Kierkegaard, and Friedrich Nietzsche used the word unconscious.

In 1880, Edmond Colsenet supports at the Sorbonne, a philosophy thesis on the unconscious. Elie Rabier and Alfred Fouillee perform syntheses of the unconscious "at a time when Freud was not interested in the concept".

Psychology

Psychologist Jacques Van Rillaer points out that, "the unconscious was not discovered by Freud. In 1890, when psychoanalysis was still unheard of, William James, in his monumental treatise on psychology (The Principles of Psychology), examined the way Schopenhauer, von Hartmann, Janet, Binet and others had used the term 'unconscious' and 'subconscious'". Historian of psychology Mark Altschule observes that, "It is difficult—or perhaps impossible—to find a nineteenth-century psychologist or psychiatrist who did not recognize unconscious cerebration as not only real but of the highest importance."

Eduard von Hartmann published a book dedicated to the topic, Philosophy of the Unconscious, in 1869.

Furthermore, 19th century German psychologists, Gustav Fechner and Wilhelm Wundt, had begun to use the term in their experimental psychology, in the context of manifold, jumbled sense data that the mind organizes at an unconscious level before revealing it as a cogent totality in conscious form."[24]

Freud's view

An iceberg is often (though misleadingly) used to provide a visual representation of Freud's theory that most of the human mind operates unconsciously.
 
Sigmund Freud and his followers developed an account of the unconscious mind. It plays an important role in psychoanalysis.

Freud divided the mind into the conscious mind (or the ego) and the unconscious mind. The latter was then further divided into the id (or instincts and drive) and the superego (or conscience). In this theory, the unconscious refers to the mental processes of which individuals make themselves unaware. Freud proposed a vertical and hierarchical architecture of human consciousness: the conscious mind, the preconscious, and the unconscious mind—each lying beneath the other. He believed that significant psychic events take place "below the surface" in the unconscious mind, like hidden messages from the unconscious. He interpreted such events as having both symbolic and actual significance.

In psychoanalytic terms, the unconscious does not include all that is not conscious, but rather what is actively repressed from conscious thought or what a person is averse to knowing consciously. Freud viewed the unconscious as a repository for socially unacceptable ideas, wishes or desires, traumatic memories, and painful emotions put out of mind by the mechanism of psychological repression. However, the contents did not necessarily have to be solely negative. In the psychoanalytic view, the unconscious is a force that can only be recognized by its effects—it expresses itself in the symptom. In a sense, this view places the conscious self as an adversary to its unconscious, warring to keep the unconscious hidden. Unconscious thoughts are not directly accessible to ordinary introspection, but are supposed to be capable of being "tapped" and "interpreted" by special methods and techniques such as meditation, free association (a method largely introduced by Freud), dream analysis, and verbal slips (commonly known as a Freudian slip), examined and conducted during psychoanalysis. Seeing as these unconscious thoughts are normally cryptic, psychoanalysts are considered experts in interpreting their messages.

Freud based his concept of the unconscious on a variety of observations. For example, he considered "slips of the tongue" to be related to the unconscious in that they often appeared to show a person's true feelings on a subject. For example, "I decided to take a summer curse". This example shows a slip of the word "course" where the speaker accidentally used the word curse which would show that they have negative feelings about having to do this. Freud noticed that also his patient's dreams expressed important feelings they were unaware of. After these observations, he came to the conclusion that psychological disturbances are largely caused by personal conflicts existing at the unconscious level. His psychoanalytic theory acts to explain personality, motivation and mental disorders by focusing on unconscious determinants of behavior.

Freud later used his notion of the unconscious in order to explain certain kinds of neurotic behavior. The theory of the unconscious was substantially transformed by later psychiatrists, among them Carl Jung and Jacques Lacan.

In his 1932/1933 conferences, Freud "proposes to abandon the notion of the unconscious that ambiguous judge".

Jung's view

Carl Gustav Jung, a Swiss psychiatrist, developed the concept further. He agreed with Freud that the unconscious is a determinant of personality, but he proposed that the unconscious be divided into two layers: the personal unconscious and the collective unconscious. The personal unconscious is a reservoir of material that was once conscious but has been forgotten or suppressed, much like Freud's notion. The collective unconscious, however, is the deepest level of the psyche, containing the accumulation of inherited psychic structures and archetypal experiences. Archetypes are not memories but energy centers or psychological functions that are apparent in the culture's use of symbols. The collective unconscious is therefore said to be inherited and contain material of an entire species rather than of an individual. Every person shares the collective unconscious with the entire human species, as Jung puts it: "[the] whole spiritual heritage of mankind's evolution, born anew in the brain structure of every individual".

In addition to the structure of the unconscious, Jung differed from Freud in that he did not believe that sexuality was at the base of all unconscious thoughts.

Controversy

The notion that the unconscious mind exists at all has been disputed. 

Franz Brentano rejected the concept of the unconscious in his 1874 book Psychology from an Empirical Standpoint, although his rejection followed largely from his definitions of consciousness and unconsciousness.

Jean-Paul Sartre offers a critique of Freud's theory of the unconscious in Being and Nothingness, based on the claim that consciousness is essentially self-conscious. Sartre also argues that Freud's theory of repression is internally flawed. Philosopher Thomas Baldwin argues that Sartre's argument is based on a misunderstanding of Freud.

Erich Fromm contends that, "The term 'the unconscious' is actually a mystification (even though one might use it for reasons of convenience, as I am guilty of doing in these pages). There is no such thing as the unconscious; there are only experiences of which we are aware, and others of which we are not aware, that is, of which we are unconscious. If I hate a man because I am afraid of him, and if I am aware of my hate but not of my fear, we may say that my hate is conscious and that my fear is unconscious; still my fear does not lie in that mysterious place: 'the' unconscious."

John Searle has offered a critique of the Freudian unconscious. He argues that the Freudian cases of shallow, consciously held mental states would be best characterized as 'repressed consciousness,' while the idea of more deeply unconscious mental states is more problematic. He contends that the very notion of a collection of "thoughts" that exist in a privileged region of the mind such that they are in principle never accessible to conscious awareness, is incoherent. This is not to imply that there are not "nonconscious" processes that form the basis of much of conscious life. Rather, Searle simply claims that to posit the existence of something that is like a "thought" in every way except for the fact that no one can ever be aware of it (can never, indeed, "think" it) is an incoherent concept. To speak of "something" as a "thought" either implies that it is being thought by a thinker or that it could be thought by a thinker. Processes that are not causally related to the phenomenon called thinking are more appropriately called the nonconscious processes of the brain.

Other critics of the Freudian unconscious include David Stannard, Richard Webster, Ethan Watters, Richard Ofshe, and Eric Thomas Weber.

David Holmes examined sixty years of research about the Freudian concept of "repression", and concluded that there is no positive evidence for this concept. Given the lack of evidence for many Freudian hypotheses, some scientific researchers proposed the existence of unconscious mechanisms that are very different from the Freudian ones. They speak of a "cognitive unconscious" (John Kihlstrom), an "adaptive unconscious" (Timothy Wilson), or a "dumb unconscious" (Loftus and Klinger), which executes automatic processes but lacks the complex mechanisms of repression and symbolic return of the repressed, and Robert Langs deep unconscious wisdom system.

In modern cognitive psychology, many researchers have sought to strip the notion of the unconscious from its Freudian heritage, and alternative terms such as "implicit" or "automatic" have been used. These traditions emphasize the degree to which cognitive processing happens outside the scope of cognitive awareness, and show that things we are unaware of can nonetheless influence other cognitive processes as well as behavior. Active research traditions related to the unconscious include implicit memory (see priming, implicit attitudes), and nonconscious acquisition of knowledge (see Lewicki, see also the section on cognitive perspective below).

Dreams

Freud

In terms of the unconscious, the purpose of dreams, as stated by Freud, is to fulfill repressed wishes through the process of dreaming, since they cannot be fulfilled in real life. For example, if someone were to rob a store and to feel guilty about it, they might dream about a scenario in which their actions were justified and renders them blameless. Freud asserted that the wish-fulfilling aspect of the dream may be disguised due to the difficulty in distinguishing between manifest content and latent content. The manifest content consists of the plot of a dream at the surface level. The latent content refers to the hidden or disguised meaning of the events in the plot. The latent content of the dream is what supports the idea of wish fulfillment. It represents the intimate information in the dreamer's current issues and childhood conflict.

Opposing theories

In response to Freud's theory on dreams, other psychologists have come up with theories to counter his argument. Theorist Rosalind Cartwright proposed that dreams provide people with the opportunity to act out and work through everyday problems and emotional issues in a non-real setting with no consequences. According to her cognitive problem solving view, a large amount of continuity exists between our waking thought and the thoughts that exist in dreams. Proponents of this view believe that dreams allow participation in creative thinking and alternate ways to handle situations when dealing with personal issues because dreams are not restrained by logic or realism.

In addition to this, Allan Hobson and colleagues came up with the activation-synthesis hypothesis which proposes that dreams are simply the side effects of the neural activity in the brain that produces beta brain waves during REM sleep that are associated with wakefulness. According to this hypothesis, neurons fire periodically during sleep in the lower brain levels and thus send random signals to the cortex. The cortex then synthesizes a dream in reaction to these signals in order to try to make sense of why the brain is sending them. However, the hypothesis does not state that dreams are meaningless, it just downplays the role that emotional factors play in determining dreams.

Contemporary cognitive psychology

Research

While, historically, the psychoanalytic research tradition was the first to focus on the phenomenon of unconscious mental activity, there is an extensive body of conclusive research and knowledge in contemporary cognitive psychology devoted to the mental activity that is not mediated by conscious awareness.

Most of that (cognitive) research on unconscious processes has been done in the mainstream, academic tradition of the information processing paradigm. As opposed to the psychoanalytic tradition, driven by the relatively speculative (in the sense of being hard to empirically verify) theoretical concepts such as the Oedipus complex or Electra complex, the cognitive tradition of research on unconscious processes is based on relatively few theoretical assumptions and is very empirically oriented (i.e., it is mostly data driven). Cognitive research has revealed that automatically, and clearly outside of conscious awareness, individuals register and acquire more information than what they can experience through their conscious thoughts.

Unconscious processing of information about frequency

For example, an extensive line of research conducted by Hasher and Zacks has demonstrated that individuals register information about the frequency of events automatically (i.e., outside of conscious awareness and without engaging conscious information processing resources). Moreover, perceivers do this unintentionally, truly "automatically," regardless of the instructions they receive, and regardless of the information processing goals they have. The ability to unconsciously and relatively accurately tally the frequency of events appears to have little or no relation to the individual's age, education, intelligence, or personality, thus it may represent one of the fundamental building blocks of human orientation in the environment and possibly the acquisition of procedural knowledge and experience, in general.

Defence mechanism

From Wikipedia, the free encyclopedia
 
A defence mechanism is an unconscious psychological mechanism that reduces anxiety arising from unacceptable or potentially harmful stimuli.

Defence mechanisms may result in healthy or unhealthy consequences depending on the circumstances and frequency with which the mechanism is used. In psychoanalytic theory, defence mechanisms (German: Abwehrmechanismen) are psychological strategies brought into play by the unconscious mind to manipulate, deny, or distort reality in order to defend against feelings of anxiety and unacceptable impulses and to maintain one's self-schema or other schemas. These processes that manipulate, deny, or distort reality may include the following: repression, or the burying of a painful feeling or thought from one's awareness even though it may resurface in a symbolic form; identification, incorporating an object or thought into oneself; and rationalization, the justification of one's behaviour and motivations by substituting "good" acceptable reasons for the actual motivations. In psychoanalytic theory, repression is considered as the basis for other defence mechanisms.

Healthy persons normally use different defences throughout life. An ego defence mechanism becomes pathological only when its persistent use leads to maladaptive behaviour such that the physical or mental health of the individual is adversely affected. Among the purposes of ego defence mechanisms is to protect the mind/self/ego from anxiety or social sanctions or to provide a refuge from a situation with which one cannot currently cope.

One resource used to evaluate these mechanisms is the Defense Style Questionnaire (DSQ-40).

Structural model: id, ego, and superego

Sigmund Freud
 
The concept of id impulses comes from Sigmund Freud's structural model. According to this theory, id impulses are based on the pleasure principle: instant gratification of one's own desires and needs. Freud believed that the id represents biological instinctual impulses in humans, such as aggression (Thanatos or the death instinct) and sexuality (Eros or the life instinct).

For example, when the id impulses (e.g., desire to have sexual relations with a stranger) conflict with the superego (e.g., belief in societal conventions of not having sex with unknown persons), unsatisfied feelings of anxiousness or feelings of anxiety come to the surface. To reduce these unpleasant feelings, the ego might use defence mechanisms (conscious or unconscious blockage of the id impulses).

Freud believed that conflicts between these two structures resulted in conflicts associated with psychosexual stages.

Definitions of individual psyche structures

The iceberg metaphor is often used to explain the psyche's parts in relation to one another
 
Freud proposed three structures of the psyche or personality:
  • Id: The id is the unconscious reservoir of the libido, the psychic energy that fuels instincts and psychic processes. It is a selfish, childish, pleasure-oriented part of the personality with no ability to delay gratification.
  • Superego: The superego contains internalised societal and parental standards of "good" and "bad", "right" and "wrong" behaviour. They include conscious appreciations of rules and regulations as well as those incorporated unconsciously.
  • Ego: The ego acts as a moderator between the pleasure sought by the id and the morals of the superego, seeking compromises to pacify both. It can be viewed as the individual's "sense of time and place".

Primary and secondary processes

In the ego, there are two ongoing processes. First, there is the unconscious primary process, where the thoughts are not organised in a coherent way; the feelings can shift, contradictions are not in conflict or are just not perceived that way, and condensations arise. There is no logic and no time line. Lust is important for this process. By contrast, there is the conscious secondary process, where strong boundaries are set and thoughts must be organised in a coherent way. Most conscious thoughts originate here.

Reality principle

Id impulses are not appropriate in a civilised society, so there is societal pressure to modify the pleasure principle in favour of the reality principle; that is, the requirements of the external world.

Formation of the superego

The superego forms as the child grows and learns parental and social standards. The superego consists of two structures: the conscience, which stores information about what is "bad" and what has been punished, and the ego ideal, which stores information about what is "good" and what one "should" do or be.

The ego's use of defence mechanisms

When anxiety becomes overwhelming, it is the ego's place to protect the person by employing defence mechanisms. Guilt, embarrassment, and shame often accompany anxiety. In the first definitive book on defence mechanisms, The Ego and the Mechanisms of Defence (1936), Anna Freud introduced the concept of signal anxiety; she stated that it was "not directly a conflicted instinctual tension but a signal occurring in the ego of an anticipated instinctual tension".

The signalling function of anxiety is thus seen as crucial, and biologically adapted to warn the organism of danger or a threat to its equilibrium. The anxiety is felt as an increase in bodily or mental tension, and the signal that the organism receives in this way allows for the possibility of taking defensive action regarding the perceived danger. Defence mechanisms work by distorting the id impulses into acceptable forms, or by unconscious or conscious blockage of these impulses.

Theories and classifications

The list of defence mechanisms, with no theoretical consensus on the exact number. Classifying defence mechanisms according to some of their properties (like underlying mechanisms, similarities or connections with personality) has been attempted. Different theorists have different categorizations and conceptualizations of defence mechanisms. Large reviews of theories of defence mechanisms are available from Paulhus, Fridhandler and Hayes (1997) and Cramer (1991). The Journal of Personality published a special issue on defence mechanisms (1998).

In 1936, Anna Freud enumerated the ten defence mechanisms that appear in the works of her father, Sigmund Freud: repression, regression, reaction formation, isolation, undoing, projection, introjection, turning against one's own person, reversal into the opposite, and sublimation or displacement.

A. Freud considered defense mechanisms as intellectual and motor automatisms of various degrees of complexity, that arose in the process of involuntary and voluntary learningRomanov, E.S. (1996). Mechanisms of psychological defense: genesis, functioning, diagnostics.
 
Both Freuds studied defence mechanisms, but Anna spent more of her time and research on five main mechanisms: repression, regression, projection, reaction formation, and sublimation. All defence mechanisms are responses to anxiety and how the consciousness and unconscious handle the stress of a social situation.
  • Repression: when a feeling is hidden and forced from the consciousness to the unconscious because it is seen as socially unacceptable
  • Regression: falling back into an early state of mental/physical development seen as "less demanding and safer"
  • Projection: possessing a feeling that is deigned as socially unacceptable and instead of facing it, that feeling or "unconscious urge" is seen in the actions of other people
  • Reaction formation: acting the opposite way that the unconscious instructs a person to behave, "often exaggerated and obsessive". For example, if a wife is infatuated with a man who is not her husband, reaction formation may cause her to – rather than cheat – become obsessed with showing her husband signs of love and affection.
  • Sublimation: seen as the most acceptable of the mechanisms, an expression of anxiety in socially acceptable ways
Otto F. Kernberg (1967) developed a theory of borderline personality organization of which one consequence may be borderline personality disorder. His theory is based on ego psychological object relations theory. Borderline personality organization develops when the child cannot integrate helpful and harmful mental objects together. Kernberg views the use of primitive defence mechanisms as central to this personality organization. Primitive psychological defences are projection, denial, dissociation or splitting and they are called borderline defence mechanisms. Also, devaluation and projective identification are seen as borderline defences.

In George Eman Vaillant's (1977) categorization, defences form a continuum related to their psychoanalytical developmental level. They are classified into pathological, immature, neurotic and "mature" defences. 

Robert Plutchik's (1979) theory views defences as derivatives of basic emotions, which in turn relate to particular diagnostic structures. According to his theory, reaction formation relates to joy (and manic features), denial relates to acceptance (and histrionic features), repression to fear (and passivity), regression to surprise (and borderline traits), compensation to sadness (and depression), projection to disgust (and paranoia), displacement to anger (and hostility) and intellectualization to anticipation (and obsessionality).

The Diagnostic and Statistical Manual of Mental Disorders (DSM-IV) published by the American Psychiatric Association (1994) includes a tentative diagnostic axis for defence mechanisms. This classification is largely based on Vaillant's hierarchical view of defences, but has some modifications. Examples include: denial, fantasy, rationalization, regression, isolation, projection, and displacement.

Vaillant's categorization

Psychiatrist George Eman Vaillant introduced a four-level classification of defence mechanisms:
  • Level I – pathological defences (psychotic denial, delusional projection)
  • Level II – immature defences (fantasy, projection, passive aggression, acting out)
  • Level III – neurotic defences (intellectualization, reaction formation, dissociation, displacement, repression)
  • Level IV – mature defences (humour, sublimation, suppression, altruism, anticipation)

Level 1: pathological

When predominant, the mechanisms on this level are almost always severely pathological. These six defences, in conjunction, permit one effectively to rearrange external experiences to eliminate the need to cope with reality. Pathological users of these mechanisms frequently appear irrational or insane to others. These are the "pathological" defences, common in overt psychosis. However, they are normally found in dreams and throughout childhood as well. They include:
  • Delusional projection: Delusions about external reality, usually of a persecutory nature
  • Denial: Refusal to accept external reality because it is too threatening; arguing against an anxiety-provoking stimulus by stating it does not exist; resolution of emotional conflict and reduction of anxiety by refusing to perceive or consciously acknowledge the more unpleasant aspects of external reality
  • Distortion: A gross reshaping of external reality to meet internal needs

Level 2: immature

These mechanisms are often present in adults. These mechanisms lessen distress and anxiety produced by threatening people or by an uncomfortable reality. Excessive use of such defences is seen as socially undesirable, in that they are immature, difficult to deal with and seriously out of touch with reality. These are the so-called "immature" defences and overuse almost always leads to serious problems in a person's ability to cope effectively. These defences are often seen in major depression and personality disorders. They include:
  • Acting out: Direct expression of an unconscious wish or impulse in action, without conscious awareness of the emotion that drives the expressive behavior
  • Hypochondriasis: An excessive preoccupation or worry about having a serious illness
  • Passive-aggressive behavior: Indirect expression of hostility
  • Projection: A primitive form of paranoia. Projection reduces anxiety by allowing the expression of the undesirable impulses or desires without becoming consciously aware of them; attributing one's own unacknowledged, unacceptable, or unwanted thoughts and emotions to another; includes severe prejudice and jealousy, hypervigilance to external danger, and "injustice collecting", all with the aim of shifting one's unacceptable thoughts, feelings and impulses onto someone else, such that those same thoughts, feelings, beliefs and motivations are perceived as being possessed by the other.
  • Schizoid fantasy: Tendency to retreat into fantasy in order to resolve inner and outer conflicts

Level 3: neurotic

These mechanisms are considered neurotic, but fairly common in adults. Such defences have short-term advantages in coping, but can often cause long-term problems in relationships, work and in enjoying life when used as one's primary style of coping with the world. They include:
  • Displacement: Defence mechanism that shifts sexual or aggressive impulses to a more acceptable or less threatening target; redirecting emotion to a safer outlet; separation of emotion from its real object and redirection of the intense emotion toward someone or something that is less offensive or threatening in order to avoid dealing directly with what is frightening or threatening.
  • Dissociation: Temporary drastic modification of one's personal identity or character to avoid emotional distress; separation or postponement of a feeling that normally would accompany a situation or thought
  • Intellectualization: A form of isolation; concentrating on the intellectual components of a situation so as to distance oneself from the associated anxiety-provoking emotions; separation of emotion from ideas; thinking about wishes in formal, affectively bland terms and not acting on them; avoiding unacceptable emotions by focusing on the intellectual aspects (isolation, rationalization, ritual, undoing, compensation, and magical thinking)
  • Reaction formation: Converting unconscious wishes or impulses that are perceived to be dangerous or unacceptable into their opposites; behaviour that is completely the opposite of what one really wants or feels; taking the opposite belief because the true belief causes anxiety
  • Repression: The process of attempting to repel desires towards pleasurable instincts, caused by a threat of suffering if the desire is satisfied; the desire is moved to the unconscious in the attempt to prevent it from entering consciousness; seemingly unexplainable naivety, memory lapse or lack of awareness of one's own situation and condition; the emotion is conscious, but the idea behind it is absent

Level 4: mature

These are commonly found among emotionally healthy adults and are considered mature, even though many have their origins in an immature stage of development. They have been adapted through the years in order to optimise success in human society and relationships. The use of these defences enhances pleasure and feelings of control. These defences help to integrate conflicting emotions and thoughts, whilst still remaining effective. Those who use these mechanisms are usually considered virtuous. Mature defences include:
  • Altruism: Constructive service to others that brings pleasure and personal satisfaction
  • Anticipation: Realistic planning for future discomfort
  • Humour: Overt expression of ideas and feelings (especially those that are unpleasant to focus on or too terrible to talk about directly) that gives pleasure to others. The thoughts retain a portion of their innate distress, but they are "skirted around" by witticism, for example self-deprecation.
  • Sublimation: Transformation of unhelpful emotions or instincts into healthy actions, behaviours, or emotions, for example, playing a heavy contact sport such as football or rugby can transform aggression into a game[24]
  • Suppression: The conscious decision to delay paying attention to a thought, emotion, or need in order to cope with the present reality; making it possible later to access uncomfortable or distressing emotions whilst accepting them

Other defence mechanisms

Diagram of selected ego defence mechanisms

Pathological

  • Conversion: The expression of an intrapsychic conflict as a physical symptom; some examples include blindness, deafness, paralysis, or numbness. This phenomenon is sometimes called hysteria.
  • Splitting: A primitive defence. Both harmful and helpful impulses are split off and unintegrated, frequently projected onto someone else. The defended individual segregates experiences into all-good and all-bad categories, with no room for ambiguity and ambivalence. When "splitting" is combined with "projecting", the undesirable qualities that one unconsciously perceives oneself as possessing, one consciously attributes to another.

Immature

  • Idealization: Tending to perceive another individual as having more desirable qualities than he or she may actually have.
  • Introjection: Identifying with some idea or object so deeply that it becomes a part of that person. For example, introjection occurs when we take on attributes of other people who seem better able to cope with the situation than we do.
  • Passive aggression: Aggression towards others expressed indirectly or passively, often through procrastination.
  • Projective identification: The object of projection invokes in that person a version of the thoughts, feelings or behaviours projected.
  • Somatization: The transformation of uncomfortable feelings towards others into uncomfortable feelings toward oneself: pain, illness, and anxiety.
  • Wishful thinking: Making decisions according to what might be pleasing to imagine instead of by appealing to evidence, rationality, or reality.

Neurotic

  • Isolation: Separation of feelings from ideas and events, for example, describing a murder with graphic details with no emotional response.
  • Rationalization (making excuses): Convincing oneself that no wrong has been done and that all is or was all right through faulty and false reasoning. An indicator of this defence mechanism can be seen socially as the formulation of convenient excuses.
  • Regression: Temporary reversion of the ego to an earlier stage of development rather than handling unacceptable impulses in a more adult way, for example, using whining as a method of communicating despite already having acquired the ability to speak with an appropriate level of maturity.
  • Undoing: A person tries to 'undo' an unhealthy, destructive or otherwise threatening thought by acting out the reverse of the unacceptable. Involves symbolically nullifying an unacceptable or guilt provoking thought, idea, or feeling by confession or atonement.
  • Upward and downward social comparisons: A defensive tendency that is used as a means of self-evaluation. Individuals will look to another individual or comparison group who are considered to be worse off in order to dissociate themselves from perceived similarities and to make themselves feel better about themselves or their personal situation.
  • Withdrawal: Avoidance is a form of defence. It entails removing oneself from events, stimuli, and interactions under the threat of being reminded of painful thoughts and feelings.

Relation with coping

There are many different perspectives on how the construct of defence relates to the construct of coping; some writers differentiate the constructs in various ways, but "an important literature exists that does not make any difference between the two concepts". In at least one of his books, George Eman Vaillant stated that he "will use the terms adaptation, resilience, coping, and defense interchangeably".

Inequality (mathematics)

From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/Inequality...