Browse Definitions :
Definition

Lidar

Contributor(s): Matthew Haughn

Lidar is a laser-based method of detection, range finding and mapping.

Lidar typically uses a low-power, eye-safe pulsing laser working in conjunction with a camera. The laser illuminates a target and associated software calculates the time it takes for the laser to reflect back from the target. In some applications, specifically-tuned lasers may be used to excite and detect elements or compounds.

Lidar's best-known application is measuring the speed of a target, for example in police speed guns (one of the few non-eye-safe applications of the technology).  Lidar is used in conjunction with GPS to yield three-dimensional (3-D) topographical maps -- even through foliage -- by sweeping from a vantage point such as the underside of an aircraft.  

Because Lidar can penetrate forest canopy, the technology has been used to find lost cities. In June 2013, an international team of researchers used Lidar to discover Cambodia's Mahendraparvata, a 1200-year-old city that rivals the current capitol in size and complexity. 

Other applications of Lidar include:

  • Range-finding and map-making in space exploration. In the 1970s, for example, Lidar was used to map the surface of the moon. 
  • Obstacle detection and collision avoidance in autonomous vehicles, such as driverless cars.
  • Biological agent detection and autonomous flight for military operations.
  • Determining the most effective use of fertilizers for farming efficiency.
  • Predicting the energy yield for wind power.
  • Surveying and calculating ore volumes for minerals.

It is not known where the word Lidar comes from. According to various sources, the word is an acronym for light detection and ranging, laser interferometry detection and ranging or light/radar.

This was last updated in September 2013

Continue Reading About Lidar

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

Close