the proceedings contain 1506 papers. the topics discussed include: design of SICL fed wideband dipole antenna for Endfire applications at 5G millimeter wave frequencies;effect of variation of height on performance of ...
ISBN:
(纸本)9798350335095
the proceedings contain 1506 papers. the topics discussed include: design of SICL fed wideband dipole antenna for Endfire applications at 5G millimeter wave frequencies;effect of variation of height on performance of normal mode helical antenna;a compact gap coupled half-hexagonal microstrip antenna with improved bandwidth;design and analysis of compact high gain & wideband fractal bow tie 4×1 patch array antenna for WLAN applications;study and design of multiband antenna with v and u slot on patch for wireless application;synthesis of large thinned planar antenna arrays using modified binary coded genetic algorithm;design of multi-band antenna with cut slots and parasitic patch for wireless communication;and an integrated filtering slot-coupled microstrip patch antenna using compact dual-mode resonators for future light weight rover in lunar missions.
In this research article, the research challenges and potential solutions in five key areas of advanced computer networking, namely Network Function Virtualization (NFV), Machine Learning in Network Security, 5G Netwo...
详细信息
Withthe soaring adoption of cloud-constructed home automation systems with CAGR of 8.5% from 2023 to 2030, security and privacy concerns have become critical considerations. this paper examines the security risks in ...
详细信息
ISBN:
(数字)9798331531935
ISBN:
(纸本)9798331531942
Withthe soaring adoption of cloud-constructed home automation systems with CAGR of 8.5% from 2023 to 2030, security and privacy concerns have become critical considerations. this paper examines the security risks in cloud-based home automation systems and proposes leveraging edge computing to improve data security and privacy. We examine weaknesses including unapproved access, data leaks and highlight limitations of cloud-centric architectures. By integrating edge computing, we reduce data exposure, enable local processing, and improve control within the home environment. We explore how edge computing addresses specific attacks and offline operation during network disruptions. Challenges of incorporating edge computing into cloud-based home automation are discussed. this research contributes insights for achieving a more secure and privacy-enhanced home automation system.
the paper presents a metamaterial-based biosensor that utilizes a Flame Retardant fiber glass epoxy (FR4) substrate for medical applications. According to the results, the proposed biosensor is suitable for use in Wir...
详细信息
Many applications of unmanned aerial vehicles (UAVs) has gained significant attention in recent years. However, UAVs need a reliable communication infrastructure to communicate with other devices and share information...
详细信息
this paper presents and analyzes a low-cost adaptive dual-mode communication system for Unmanned Aerial Vehicles (UAVs). the system includes both a high data-rate mode for transmitting in applications like real-time v...
详细信息
the important components in the information protection is network securitywhich is reasonable for protecting all information which are passing through networked systems. through this paper we comprehensively analyzes ...
详细信息
In this paper, moment generating function (MGF) based average symbol error rate (SER) closed-form expressions are derived for the single relay cooperative system over generalized double α - μ fading channels. the pe...
详细信息
the goal of Text classification is to categorize a document into predefined categories. Various supervised and unsupervised classifiers can be used to achieve this. In the research work proposed, SOTA (State of the Ar...
详细信息
the rate at which data is produced has increased dramatically in recent days. Without a suitable category or tag, having a lot of data is merely useless information. the consumer may quickly find the content they'...
详细信息
暂无评论