Unmanned Aerial Vehicles (UAVs) are widely used in the civil and commercial sectors, especially for their advantages in traffic control and logistics management. Due to their high mobility and flexible deployment capa...
详细信息
ISBN:
(纸本)9798350379860;9798350379877
Unmanned Aerial Vehicles (UAVs) are widely used in the civil and commercial sectors, especially for their advantages in traffic control and logistics management. Due to their high mobility and flexible deployment capability, UAVs have a significant role in traffic flow statistics, violation monitoring and traffic diversion. However, the security of link communication is challenged due to the openness of UAV wireless signals and the problem of co-channel interference. In this paper, we propose a UAV communication link enhancement scheme based on active security and design a new communication architecture to improve communication robustness and communication quality of service in heterogeneous network environments.
In the face of information security trends, key technical challenges, and scenarios, many higher education institutions began to reflect on data security and privacy protection, and actively took various response meas...
详细信息
Health information Systems (HIS) have the potential to improve the productivity and efficiency of healthcare staff. However, the adoption of HIS has been lower in Sri Lanka compared to developed countries. This study ...
详细信息
As informationtechnology advances, smart healthcare has become a key avenue for enhancing the quality and efficiency of medical services. Cloud computing plays a central role by providing robust data processing capab...
详细信息
This paper studies data organization, node coding and multi-view conversion in ship product data management, and proposes a product data organization structure compatible with system design and partition construction,...
详细信息
Due to its many uses and ability to save and restore data, whether for businesses or individuals, cloud computing has become one of the mainstays in the technology world over the past few years. However, the limitatio...
详细信息
ISBN:
(纸本)9781665456456
Due to its many uses and ability to save and restore data, whether for businesses or individuals, cloud computing has become one of the mainstays in the technology world over the past few years. However, the limitations on speeds and sizes as well as the evolving of the Internet of Things made it challenging to rely on the cloud due to the extremely slow data processing. Therefore, to store and interpret the massive amount of data rapidly, programmers switched towards a new technology which is fog computing. This mini survey paper will outline fog computing as an integral part of cloud and edge computing for improving security and data protection. A systematic literature review of selected research papers that include findings and algorithms used to enhance security-related problems such as availability, latency, and intrusion detection will be discussed. This mini review paper finds out a state-of-the-art on the cybersecurity issues in fog computing using blockchain.
Optical pulse coding technique can improve some performance such as sensing distance of Brillouin optical time-domain analyzers (BOTDA) with the compatibility of its conventional device, and it often apply the field p...
详细信息
Recent advancements in large-scale language models, as exemplified by ChatGPT, have undergone rapid and substantial development. Their efficacy in natural language processing (NLP) and related domains has notably surp...
详细信息
An image encryption algorithm based on chaotic scrambling and DNA sequence multi-rule coding is proposed. Through the research of related algorithms, the original image and the chaotic sequence generated by Logistic c...
详细信息
Reconfigurable add/drop multiplexer (ROADM) nodes based on wavelength selective switch (WSS) technologies support the upgrading of the agile optical network. The liquid crystal on silicon (LCoS) module with pure phase...
详细信息
暂无评论