In present days, all important data are transferred to the cloud environment to reduce infrastructure in physical devices. But cloud attackers can access and steal information from the cloud environment. As a result, ...
详细信息
In this paper, we consider a long range (LoRa)based unmanned aerial vehicle (UAV)-assisted relay, and study its performance in terms of optimal UAV placement and signal strengths. Our test configuration consists of Lo...
详细信息
ISBN:
(纸本)9798350385939;9798350385922
In this paper, we consider a long range (LoRa)based unmanned aerial vehicle (UAV)-assisted relay, and study its performance in terms of optimal UAV placement and signal strengths. Our test configuration consists of LoRa modules mounted on top of a hexacopter, demonstrating improved mobility and versatility for various uses. We demonstrate that flying a UAV in proximity of either the LoRa transmitter or receiver is optimal in terms of received signal strength indicator (RSSI) metric. Further, our experiments indicate that the presence of a relay significantly enhances the received RSSI, in comparison with non-line-of-sight communications. Our results demonstrate that UAV-based relaying with LoRa increases the range of data transmission, while providing dependable, affordable, and low-power communications which is useful in internet-of-things (IoT) applications using UAVs.
The purpose of this study is to look at cloudcomputing Security. The term 'cloudcomputing' refers to a way of delivering services over the internet. As a network service, computing resources are made availab...
详细信息
With the increasingly fierce offensive and defensive confrontation in cyberspace, security threats have spread to the field of network terminal equipment data monitoring and collection, and the problems of network ter...
详细信息
With the rapid increase in cloud services and the increasing shift toward them, balancing the cloud load has become a critical research issue. The increasing demand from customers for technology services worldwide is ...
详细信息
In the recent era, cloudcomputing has emerged as a high demanding technology. Apart from the cloudcomputing, edge and fog computing also becoming popular. cloudcomputing was developed to provide steady and expansib...
详细信息
This paper aims to present the survey of cloudcomputing security. A cloudcomputing security is defined so that it can help to clarify cloud security. cloudcomputing has evolved to become an essential component of b...
详细信息
In this paper, we propose two collaborative cloud-edge-end computing architectures for the intelligent services of the high-speed train (HST), in which the edge servers are deployed along the railway lines or in the H...
详细信息
The optimal choice between serverless computing and traditional server computing, the current frontier in the machine learning and cloud server industries, has always been controversial. In contrast, serverless comput...
详细信息
With the mighty computing power provided by cloudcomputing and its distributed computing platform, the combination of cloudcomputing and data mining has vast advantages and potentials. The use of cloudcomputing dat...
详细信息
暂无评论