Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (90)
  • Open Access

    ARTICLE

    Improved Sequencing Heuristic DSDV Protocol Using Nomadic Mobility Model for FANETS

    Inam Ullah Khan1, Muhammad Abul Hassan2, Muhammad Fayaz3, Jeonghwan Gwak4,5,6,7,*, Muhammad Adnan Aziz1

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3653-3666, 2022, DOI:10.32604/cmc.2022.020697

    Abstract Most interesting area is the growing demand of flying-IoT mergers with smart cities. However, aerial vehicles, especially unmanned aerial vehicles (UAVs), have limited capabilities for maintaining node energy efficiency. In order to communicate effectively, IoT is a key element for smart cities. While improving network performance, routing protocols can be deployed in flying-IoT to improve latency, packet drop rate, packet delivery, power utilization, and average-end-to-end delay. Furthermore, in literature, proposed techniques are very much complex which cannot be easily implemented in real-world applications. This issue leads to the development of lightweight energy-efficient routing in flying-IoT networks. This paper addresses the… More >

  • Open Access

    ARTICLE

    Optimal Deep Reinforcement Learning for Intrusion Detection in UAVs

    V. Praveena1, A. Vijayaraj2, P. Chinnasamy3, Ihsan Ali4,*, Roobaea Alroobaea5, Saleh Yahya Alyahyan6, Muhammad Ahsan Raza7

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2639-2653, 2022, DOI:10.32604/cmc.2022.020066

    Abstract In recent years, progressive developments have been observed in recent technologies and the production cost has been continuously decreasing. In such scenario, Internet of Things (IoT) network which is comprised of a set of Unmanned Aerial Vehicles (UAV), has received more attention from civilian to military applications. But network security poses a serious challenge to UAV networks whereas the intrusion detection system (IDS) is found to be an effective process to secure the UAV networks. Classical IDSs are not adequate to handle the latest computer networks that possess maximum bandwidth and data traffic. In order to improve the detection performance… More >

  • Open Access

    ARTICLE

    Real-Time and Intelligent Flood Forecasting Using UAV-Assisted Wireless Sensor Network

    Shidrokh Goudarzi1,2,*, Seyed Ahmad Soleymani2,3, Mohammad Hossein Anisi4, Domenico Ciuonzo5, Nazri Kama6, Salwani Abdullah1, Mohammad Abdollahi Azgomi2, Zenon Chaczko7, Azri Azmi6

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 715-738, 2022, DOI:10.32604/cmc.2022.019550

    Abstract The Wireless Sensor Network (WSN) is a promising technology that could be used to monitor rivers’ water levels for early warning flood detection in the 5G context. However, during a flood, sensor nodes may be washed up or become faulty, which seriously affects network connectivity. To address this issue, Unmanned Aerial Vehicles (UAVs) could be integrated with WSN as routers or data mules to provide reliable data collection and flood prediction. In light of this, we propose a fault-tolerant multi-level framework comprised of a WSN and a UAV to monitor river levels. The framework is capable to provide seamless data… More >

  • Open Access

    ARTICLE

    A Secure Communication Protocol for Unmanned Aerial Vehicles

    Navid Ali Khan1, N. Z. Jhanjhi1,*, Sarfraz Nawaz Brohi2, Abdulwahab Ali Almazroi3, Abdulaleem Ali Almazroi4

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 601-618, 2022, DOI:10.32604/cmc.2022.019419

    Abstract Mavlink is a lightweight and most widely used open-source communication protocol used for Unmanned Aerial Vehicles. Multiple UAVs and autopilot systems support it, and it provides bi-directional communication between the UAV and Ground Control Station. The communications contain critical information about the UAV status and basic control commands sent from GCS to UAV and UAV to GCS. In order to increase the transfer speed and efficiency, the Mavlink does not encrypt the messages. As a result, the protocol is vulnerable to various security attacks such as Eavesdropping, GPS Spoofing, and DDoS. In this study, we tackle the problem and secure… More >

  • Open Access

    ARTICLE

    Multi-UAV Cooperative GPS Spoofing Based on YOLO Nano

    Yongjie Ding1, Zhangjie Fu1,2,*

    Journal of Cyber Security, Vol.3, No.2, pp. 69-78, 2021, DOI:10.32604/jcs.2021.019105

    Abstract In recent years, with the rapid development of the drone industry, drones have been widely used in many fields such as aerial photography, plant protection, performance, and monitoring. To effectively control the unauthorized flight of drones, using GPS spoofing attacks to interfere with the flight of drones is a relatively simple and highly feasible attack method. However, the current method uses ground equipment to carry out spoofing attacks. The attack range is limited and the flexibility is not high. Based on the existing methods, this paper proposes a multi-UAV coordinated GPS spoofing scheme based on YOLO Nano, which can launch… More >

  • Open Access

    ARTICLE

    Leader-Follower UAV Formation Model Based on R5DOS-Intersection Model

    Jian Li1,3, Weijian Zhang1, Yating Hu1,4, Xiaoguang Li2,*, Zhun Wang1

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2493-2511, 2021, DOI:10.32604/cmc.2021.018743

    Abstract This paper proposes a formation of multiple unmanned aerial vehicles (UAVs) based on the R5DOS (RCC-5 and orientation direction) intersection model. After improving the R5DOS-intersection model, we evenly arranged 16 UAVs in 16 spatial regions. Compared with those of the rectangular formation model and the grid formation model, the communication costs, time costs, and energy costs of the R5DOS model formation were effectively reduced. At the same time, the operation time of UAV formation was significantly enhanced. The leader-follower method can enhance the robustness of the UAV formation and ensure the integrity of communication during UAV formation operation. Finally, we… More >

  • Open Access

    ARTICLE

    Energy Optimization in Multi-UAV-Assisted Edge Data Collection System

    Bin Xu1,2,3, Lu Zhang1, Zipeng Xu1, Yichuan Liu1, Jinming Chai1, Sichong Qin4, Yanfei Sun1,*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1671-1686, 2021, DOI:10.32604/cmc.2021.018395

    Abstract In the IoT (Internet of Things) system, the introduction of UAV (Unmanned Aerial Vehicle) as a new data collection platform can solve the problem that IoT devices are unable to transmit data over long distances due to the limitation of their battery energy. However, the unreasonable distribution of UAVs will still lead to the problem of the high total energy consumption of the system. In this work, to deal with the problem, a deployment model of a mobile edge computing (MEC) system based on multi-UAV is proposed. The goal of the model is to minimize the energy consumption of the… More >

  • Open Access

    ARTICLE

    A Novel Framework for Multi-Classification of Guava Disease

    Omar Almutiry1, Muhammad Ayaz2, Tariq Sadad3, Ikram Ullah Lali4, Awais Mahmood1,*, Najam Ul Hassan5, Habib Dhahri1

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1915-1926, 2021, DOI:10.32604/cmc.2021.017702

    Abstract Guava is one of the most important fruits in Pakistan, and is gradually boosting the economy of Pakistan. Guava production can be interrupted due to different diseases, such as anthracnose, algal spot, fruit fly, styler end rot and canker. These diseases are usually detected and identified by visual observation, thus automatic detection is required to assist formers. In this research, a new technique was created to detect guava plant diseases using image processing techniques and computer vision. An automated system is developed to support farmers to identify major diseases in guava. We collected healthy and unhealthy images of different guava… More >

  • Open Access

    ARTICLE

    SVSF-Based Robust UGV/UAV Control/Tracking Architecture in Disturbed Environment

    Abdelatif Oussar1,*, Abdelmoumen Ferrag1, Mohamed Guiatni1, Mustapha Hamerlain2

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 467-495, 2021, DOI:10.32604/iasc.2021.01000

    Abstract This paper presents the design of a robust architecture for the tracking of an unmanned ground vehicle (UGV) by an unmanned aerial vehicle (UAV). To enhance the robustness of the ground vehicle in the face of external disturbances and handle the non-linearities due to inputs saturation, an integral sliding mode controller was designed for the task of trajectory tracking. Stabilization of the aerial vehicle is achieved using an integral-backstepping solution. Estimation of the relative position between the two agents was solved using two approaches: the first solution (optimal) is based on a Kalman filter (KF) the second solution (robust) uses… More >

  • Open Access

    ARTICLE

    UAV Clustering Scheme for FANETs using Elbow-Hybrid Metaheuristic Techniques

    Kundan Kumar*, Rajeev Arya

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 321-337, 2021, DOI:10.32604/csse.2021.016748

    Abstract Great strides have been made to realistically deploy multiple Unmanned Aerial Vehicles (UAVs) within the commercial domain, which demands a proper coordination and reliable communication among the UAVs. UAVs suffer from limited time of flight. Conventional techniques suffer from high delay, low throughput, and early node death due to aerial topology of UAV networks. To deal with these issues, this paper proposes a UAV parameter vector which considers node energy, channel state information and mobility of UAVs. By intelligently estimating the proposed parameter, the state of UAV can be predicted closely. Accordingly, efficient clustering may be achieved by using suitable… More >

Displaying 61-70 on page 7 of 90. Per Page