“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian *** dynamic nature of FANETs,wit...
详细信息
“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian *** dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol *** the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high *** paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and *** research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant *** research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in *** compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance *** protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive *** comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in ***,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research.
Sensor localization is difficult in indoor environments because of the multipath fading and shadow fading caused by obstacles [1]. Multipath fading and shadow fading cause large localization errors that make the senso...
详细信息
The proper functioning of many real-world applications in biometrics and surveillance depends on the robustness of face recognition systems against pose, and illumination variations. In this work, we employ ensemble s...
详细信息
Because of the problems of low detection accuracy and long detection time in traditional online learning state detection methods, a new method based on posture recognition is proposed. First of all, a pinhole camera p...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
In the burgeoning landscape of e-commerce, the ability to accurately classify product texts is paramount for enhancing user experience and driving business success. Traditional approaches to text classification often ...
详细信息
Jackfruit is the national fruit of Bangladesh, and one of the most consumed fruits in India, Sri Lanka, Philippines, Indonesia, Malaysia, Australia, and many more countries. The every year due to diseases jackfruit pr...
详细信息
Probabilistic error cancellation (PEC) is a promising error mitigation technique that reduces the error rate without auxiliary quantum bits. However, PEC has two problems that need to be resolved: 1) there is no good ...
详细信息
Fingerprint restoration and identification is a critical biometric authentication method with security and digital identity verification applications. Its accuracy relies on image quality and identification algorithms...
详细信息
Resource management, security, and privacy stand as fundamental pillars for the reliable and secure operation of efficient semantic communications (SC) system. By addressing these aspects, SC system can pave the way f...
详细信息
暂无评论