Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (90)
  • Open Access

    ARTICLE

    Energy Efficient Green Routing for UAVs Ad-Hoc Network

    M. Muthukumar1, Rajasekar Rangasamy2, Irshad Hussain3,4, Salman A. AlQahtani4,*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 1111-1127, 2023, DOI:10.32604/iasc.2023.034369

    Abstract The purpose of this article is to propose Stability-based Energy-Efficient Link-State Hybrid Routing (S-ELHR), a low latency routing protocol that aims to provide a stable mechanism for routing in unmanned aerial vehicles (UAV). The S-ELHR protocol selects a number of network nodes to create a Connected Dominating Set (CDS) using a parameter known as the Stability Metric (SM). The SM considers the node’s energy usage, connectivity time, and node’s degree. Only the highest SM nodes are chosen to form CDS. Each node declares a Willingness to indicate that it is prepared to serve as a relay for its neighbors, by… More >

  • Open Access

    ARTICLE

    Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network

    Lemei Da1, Hai Liang1,*, Yong Ding1,2, Yujue Wang1, Changsong Yang1, Huiyong Wang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 879-902, 2023, DOI:10.32604/cmes.2023.026309

    Abstract The unmanned aerial vehicle (UAV) self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale, which can quickly and accurately complete complex tasks such as path planning, situational awareness, and information transmission. Due to the openness of the network, the UAV cluster is more vulnerable to passive eavesdropping, active interference, and other attacks, which makes the system face serious security threats. This paper proposes a Blockchain-Based Data Acquisition (BDA) scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario. Each UAV cluster has an… More >

  • Open Access

    ARTICLE

    Efficient Authentication Scheme for UAV-Assisted Mobile Edge Computing

    Maryam Alhassan, Abdul Raouf Khan*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2727-2740, 2023, DOI:10.32604/cmc.2023.037129

    Abstract Preserving privacy is imperative in the new unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) architecture to ensure that sensitive information is protected and kept secure throughout the communication. Simultaneously, efficiency must be considered while developing such a privacy-preserving scheme because the devices involved in these architectures are resource constrained. This study proposes a lightweight and efficient authentication scheme for the UAV-assisted MEC environment. The proposed scheme is a hardware-based password-less authentication mechanism that is based on the fact that temporal and memory-related efficiency can be significantly improved while maintaining the data security by adopting a hardware-based solution with a… More >

  • Open Access

    ARTICLE

    Power Optimized Multiple-UAV Error-Free Network in Cognitive Environment

    Shakti Raj Chopra1, Parulpreet Singh1, Ahmed Alhussen2,*, Nitin Mittal3, MohdAnul Haq4

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3189-3201, 2023, DOI:10.32604/cmc.2023.030061

    Abstract Many extensive UAV communication networks have used UAV cooperative control. Wireless networking services can be offered using unmanned aerial vehicles (UAVs) as aerial base stations. Not only is coverage maximization, but also better connectivity, a fundamental design challenge that must be solved. The number of applications for unmanned aerial vehicles (UAVs) operating in unlicensed bands is fast expanding as the Internet of Things (IoT) develops. Those bands, however, have become overcrowded as the number of systems that use them grows. Cognitive Radio (CR) and spectrum allocation approaches have emerged as a potential approach for resolving spectrum scarcity in wireless networks,… More >

  • Open Access

    ARTICLE

    Anomaly Detection of UAV State Data Based on Single-Class Triangular Global Alignment Kernel Extreme Learning Machine

    Feisha Hu1, Qi Wang1,*, Haijian Shao1,2, Shang Gao1, Hualong Yu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2405-2424, 2023, DOI:10.32604/cmes.2023.026732

    Abstract Unmanned Aerial Vehicles (UAVs) are widely used and meet many demands in military and civilian fields. With the continuous enrichment and extensive expansion of application scenarios, the safety of UAVs is constantly being challenged. To address this challenge, we propose algorithms to detect anomalous data collected from drones to improve drone safety. We deployed a one-class kernel extreme learning machine (OCKELM) to detect anomalies in drone data. By default, OCKELM uses the radial basis (RBF) kernel function as the kernel function of the model. To improve the performance of OCKELM, we choose a Triangular Global Alignment Kernel (TGAK) instead of… More > Graphic Abstract

    Anomaly Detection of UAV State Data Based on Single-Class Triangular Global Alignment Kernel Extreme Learning Machine

  • Open Access

    ARTICLE

    Energy-Efficient UAVs Coverage Path Planning Approach

    Gamil Ahmed1, Tarek Sheltami1,*, Ashraf Mahmoud1, Ansar Yasar2

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 3239-3263, 2023, DOI:10.32604/cmes.2023.022860

    Abstract Unmanned aerial vehicles (UAVs), commonly known as drones, have drawn significant consideration thanks to their agility, mobility, and flexibility features. They play a crucial role in modern reconnaissance, inspection, intelligence, and surveillance missions. Coverage path planning (CPP) which is one of the crucial aspects that determines an intelligent system’s quality seeks an optimal trajectory to fully cover the region of interest (ROI). However, the flight time of the UAV is limited due to a battery limitation and may not cover the whole region, especially in large region. Therefore, energy consumption is one of the most challenging issues that need to… More >

  • Open Access

    ARTICLE

    Received Power Based Unmanned Aerial Vehicles (UAVs) Jamming Detection and Nodes Classification Using Machine Learning

    Waleed Aldosari*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1253-1269, 2023, DOI:10.32604/cmc.2023.036111

    Abstract This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks on Wireless Sensor Networks (WSNs). Jamming is a type of Denial of Service (DoS) attack and intentional interference where a malicious node transmits a high-power signal to increase noise on the receiver side to disrupt the communication channel and reduce performance significantly. To defend and prevent such attacks, the first step is to detect them. The current detection approaches use centralized techniques to detect jamming, where each node collects information and forwards it to the base station. As a result, overhead and communication costs… More >

  • Open Access

    ARTICLE

    Double Deep Q-Network Method for Energy Efficiency and Throughput in a UAV-Assisted Terrestrial Network

    Mohamed Amine Ouamri1,2, Reem Alkanhel3,*, Daljeet Singh4, El-sayed M. El-kenaway5, Sherif S. M. Ghoneim6

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 73-92, 2023, DOI:10.32604/csse.2023.034461

    Abstract Increasing the coverage and capacity of cellular networks by deploying additional base stations is one of the fundamental objectives of fifth-generation (5G) networks. However, it leads to performance degradation and huge spectral consumption due to the massive densification of connected devices and simultaneous access demand. To meet these access conditions and improve Quality of Service, resource allocation (RA) should be carefully optimized. Traditionally, RA problems are nonconvex optimizations, which are performed using heuristic methods, such as genetic algorithm, particle swarm optimization, and simulated annealing. However, the application of these approaches remains computationally expensive and unattractive for dense cellular networks. Therefore,… More >

  • Open Access

    ARTICLE

    DQN-Based Proactive Trajectory Planning of UAVs in Multi-Access Edge Computing

    Adil Khan1,*, Jinling Zhang1, Shabeer Ahmad1, Saifullah Memon2, Babar Hayat1, Ahsan Rafiq3

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4685-4702, 2023, DOI:10.32604/cmc.2023.034892

    Abstract The main aim of future mobile networks is to provide secure, reliable, intelligent, and seamless connectivity. It also enables mobile network operators to ensure their customer’s a better quality of service (QoS). Nowadays, Unmanned Aerial Vehicles (UAVs) are a significant part of the mobile network due to their continuously growing use in various applications. For better coverage, cost-effective, and seamless service connectivity and provisioning, UAVs have emerged as the best choice for telco operators. UAVs can be used as flying base stations, edge servers, and relay nodes in mobile networks. On the other side, Multi-access Edge Computing (MEC) technology also… More >

  • Open Access

    ARTICLE

    Efficient Power Control for UAV Based on Trajectory and Game Theory

    Fadhil Mukhlif1,*, Ashraf Osman Ibrahim2, Norafida Ithnin1, Roobaea Alroobaea3, Majed Alsafyani3

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5589-5606, 2023, DOI:10.32604/cmc.2023.034323

    Abstract Due to the fact that network space is becoming more limited, the implementation of ultra-dense networks (UDNs) has the potential to enhance not only network coverage but also network throughput. Unmanned Aerial Vehicle (UAV) communications have recently garnered a lot of attention due to the fact that they are extremely versatile and may be applied to a wide variety of contexts and purposes. A cognitive UAV is proposed as a solution for the Internet of Things ground terminal’s wireless nodes in this article. In the IoT system, the UAV is utilised not only to determine how the resources should be… More >

Displaying 31-40 on page 4 of 90. Per Page