Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (89)
  • Open Access

    ARTICLE

    Enhancement of UAV Data Security and Privacy via Ethereum Blockchain Technology

    Sur Singh Rawat1,*, Youseef Alotaibi2, Nitima Malsa1, Vimal Gupta1

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1797-1815, 2023, DOI:10.32604/cmc.2023.039381

    Abstract Unmanned aerial vehicles (UAVs), or drones, have revolutionized a wide range of industries, including monitoring, agriculture, surveillance, and supply chain. However, their widespread use also poses significant challenges, such as public safety, privacy, and cybersecurity. Cyberattacks, targeting UAVs have become more frequent, which highlights the need for robust security solutions. Blockchain technology, the foundation of cryptocurrencies has the potential to address these challenges. This study suggests a platform that utilizes blockchain technology to manage drone operations securely and confidentially. By incorporating blockchain technology, the proposed method aims to increase the security and privacy of drone data. The suggested platform stores… More >

  • Open Access

    ARTICLE

    Improving Intrusion Detection in UAV Communication Using an LSTM-SMOTE Classification Method

    Abdulrahman M. Abdulghani, Mokhles M. Abdulghani, Wilbur L. Walters, Khalid H. Abed*

    Journal of Cyber Security, Vol.4, No.4, pp. 287-298, 2022, DOI:10.32604/jcs.2023.042486

    Abstract Unmanned Aerial Vehicles (UAVs) proliferate quickly and play a significant part in crucial tasks, so it is important to protect the security and integrity of UAV communication channels. Intrusion Detection Systems (IDSs) are required to protect the UAV communication infrastructure from unauthorized access and harmful actions. In this paper, we examine a new approach for enhancing intrusion detection in UAV communication channels by utilizing the Long Short-Term Memory network (LSTM) combined with the Synthetic Minority Oversampling Technique (SMOTE) algorithm, and this integration is the binary classification method (LSTM-SMOTE). We successfully achieved 99.83% detection accuracy by using the proposed approach and… More >

  • Open Access

    ARTICLE

    Archimedes Optimization with Deep Learning Based Aerial Image Classification for Cybersecurity Enabled UAV Networks

    Faris Kateb, Mahmoud Ragab*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2171-2185, 2023, DOI:10.32604/csse.2023.039931

    Abstract The recent adoption of satellite technologies, unmanned aerial vehicles (UAVs) and 5G has encouraged telecom networking to evolve into more stable service to remote areas and render higher quality. But, security concerns with drones were increasing as drone nodes have been striking targets for cyberattacks because of immensely weak inbuilt and growing poor security volumes. This study presents an Archimedes Optimization with Deep Learning based Aerial Image Classification and Intrusion Detection (AODL-AICID) technique in secure UAV networks. The presented AODL-AICID technique concentrates on two major processes: image classification and intrusion detection. For aerial image classification, the AODL-AICID technique encompasses MobileNetv2… More >

  • Open Access

    ARTICLE

    RO-SLAM: A Robust SLAM for Unmanned Aerial Vehicles in a Dynamic Environment

    Jingtong Peng*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2275-2291, 2023, DOI:10.32604/csse.2023.039272

    Abstract When applied to Unmanned Aerial Vehicles (UAVs), existing Simultaneous Localization and Mapping (SLAM) algorithms are constrained by several factors, notably the interference of dynamic outdoor objects, the limited computing performance of UAVs, and the holes caused by dynamic objects removal in the map. We proposed a new SLAM system for UAVs in dynamic environments to solve these problems based on ORB-SLAM2. We have improved the Pyramid Scene Parsing Network (PSPNet) using Depthwise Separable Convolution to reduce the model parameters. We also incorporated an auxiliary loss function to supervise the hidden layer to enhance accuracy. Then we used the improved PSPNet… More >

  • Open Access

    ARTICLE

    Quick and Accurate Counting of Rapeseed Seedling with Improved YOLOv5s and Deep-Sort Method

    Chen Su, Jie Hong, Jiang Wang, Yang Yang*

    Phyton-International Journal of Experimental Botany, Vol.92, No.9, pp. 2611-2632, 2023, DOI:10.32604/phyton.2023.029457

    Abstract The statistics of the number of rapeseed seedlings are very important for breeders and planters to conduct seed quality testing, field crop management and yield estimation. Calculating the number of seedlings is inefficient and cumbersome in the traditional method. In this study, a method was proposed for efficient detection and calculation of rapeseed seedling number based on improved you only look once version 5 (YOLOv5) to identify objects and deep-sort to perform object tracking for rapeseed seedling video. Coordinated attention (CA) mechanism was added to the trunk of the improved YOLOv5s, which made the model more effective in identifying shaded,… More >

  • Open Access

    ARTICLE

    Secrecy Efficiency Maximization in Intelligent Reflective Surfaces Assisted UAV Communications

    Hui Wei, Leibing Yan*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 1805-1824, 2023, DOI:10.32604/cmes.2023.028072

    Abstract This paper focuses on the secrecy efficiency maximization in intelligent reflecting surface (IRS) assisted unmanned aerial vehicle (UAV) communication. With the popularization of UAV technology, more and more communication scenarios need UAV support. We consider using IRS to improve the secrecy efficiency. Specifically, IRS and UAV trajectories work together to counter potential eavesdroppers, while balancing the secrecy rate and energy consumption. The original problem is difficult to solve due to the coupling of optimization variables. We first introduce secrecy efficiency as an auxiliary variable and propose relaxation optimization problem, and then prove the equivalence between relaxation problem and the original… More >

  • Open Access

    ARTICLE

    Unmanned Aerial Vehicle Multi-Access Edge Computing as Security Enabler for Next-Gen 5G Security Frameworks

    Jaime Ortiz Córdoba, Alejandro Molina Zarca*, Antonio Skármeta

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2307-2333, 2023, DOI:10.32604/iasc.2023.039607

    Abstract 5G/Beyond 5G (B5G) networks provide connectivity to many heterogeneous devices, raising significant security and operational issues and making traditional infrastructure management increasingly complex. In this regard, new frameworks such as Anastacia-H2020 or INSPIRE-5GPlus automate the management of next-generation infrastructures, especially regarding policy-based security, abstraction, flexibility, and extensibility. This paper presents the design, workflow, and implementation of a security solution based on Unmanned Aerial Vehicles (UAVs), able to extend 5G/B5G security framework capabilities with UAV features like dynamic service provisioning in specific geographic areas. The proposed solution allows enforcing UAV security policies in proactive and reactive ways to automate UAV dynamic… More >

  • Open Access

    ARTICLE

    3D Model Construction and Ecological Environment Investigation on a Regional Scale Using UAV Remote Sensing

    Chao Chen1,2, Yankun Chen3, Haohai Jin4, Li Chen5,*, Zhisong Liu3, Haozhe Sun4, Junchi Hong4, Haonan Wang4, Shiyu Fang4, Xin Zhang2

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1655-1672, 2023, DOI:10.32604/iasc.2023.039057

    Abstract The acquisition of digital regional-scale information and ecological environmental data has high requirements for structural texture, spatial resolution, and multiple parameter categories, which is challenging to achieve using satellite remote sensing. Considering the convenient, facilitative, and flexible characteristics of UAV (unmanned air vehicle) remote sensing technology, this study selects a campus as a typical research area and uses the Pegasus D2000 equipped with a D-MSPC2000 multi-spectral camera and a CAM3000 aerial camera to acquire oblique images and multi-spectral data. Using professional software, including Context Capture, ENVI, and ArcGIS, a 3D (three-dimensional) campus model, a digital orthophoto map, and multi-spectral remote… More >

  • Open Access

    ARTICLE

    Vehicle Detection and Tracking in UAV Imagery via YOLOv3 and Kalman Filter

    Shuja Ali1, Ahmad Jalal1, Mohammed Hamad Alatiyyah2, Khaled Alnowaiser3, Jeongmin Park4,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1249-1265, 2023, DOI:10.32604/cmc.2023.038114

    Abstract Unmanned aerial vehicles (UAVs) can be used to monitor traffic in a variety of settings, including security, traffic surveillance, and traffic control. Numerous academics have been drawn to this topic because of the challenges and the large variety of applications. This paper proposes a new and efficient vehicle detection and tracking system that is based on road extraction and identifying objects on it. It is inspired by existing detection systems that comprise stationary data collectors such as induction loops and stationary cameras that have a limited field of view and are not mobile. The goal of this study is to… More >

  • Open Access

    ARTICLE

    Energy Efficient Green Routing for UAVs Ad-Hoc Network

    M. Muthukumar1, Rajasekar Rangasamy2, Irshad Hussain3,4, Salman A. AlQahtani4,*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 1111-1127, 2023, DOI:10.32604/iasc.2023.034369

    Abstract The purpose of this article is to propose Stability-based Energy-Efficient Link-State Hybrid Routing (S-ELHR), a low latency routing protocol that aims to provide a stable mechanism for routing in unmanned aerial vehicles (UAV). The S-ELHR protocol selects a number of network nodes to create a Connected Dominating Set (CDS) using a parameter known as the Stability Metric (SM). The SM considers the node’s energy usage, connectivity time, and node’s degree. Only the highest SM nodes are chosen to form CDS. Each node declares a Willingness to indicate that it is prepared to serve as a relay for its neighbors, by… More >

Displaying 21-30 on page 3 of 89. Per Page