Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (16)
  • Open Access

    ARTICLE

    Energy Efficient Green Routing for UAVs Ad-Hoc Network

    M. Muthukumar1, Rajasekar Rangasamy2, Irshad Hussain3,4, Salman A. AlQahtani4,*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 1111-1127, 2023, DOI:10.32604/iasc.2023.034369

    Abstract The purpose of this article is to propose Stability-based Energy-Efficient Link-State Hybrid Routing (S-ELHR), a low latency routing protocol that aims to provide a stable mechanism for routing in unmanned aerial vehicles (UAV). The S-ELHR protocol selects a number of network nodes to create a Connected Dominating Set (CDS) using a parameter known as the Stability Metric (SM). The SM considers the node’s energy usage, connectivity time, and node’s degree. Only the highest SM nodes are chosen to form CDS. Each node declares a Willingness to indicate that it is prepared to serve as a relay for its neighbors, by… More >

  • Open Access

    ARTICLE

    Efficient Authentication Scheme for UAV-Assisted Mobile Edge Computing

    Maryam Alhassan, Abdul Raouf Khan*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2727-2740, 2023, DOI:10.32604/cmc.2023.037129

    Abstract Preserving privacy is imperative in the new unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) architecture to ensure that sensitive information is protected and kept secure throughout the communication. Simultaneously, efficiency must be considered while developing such a privacy-preserving scheme because the devices involved in these architectures are resource constrained. This study proposes a lightweight and efficient authentication scheme for the UAV-assisted MEC environment. The proposed scheme is a hardware-based password-less authentication mechanism that is based on the fact that temporal and memory-related efficiency can be significantly improved while maintaining the data security by adopting a hardware-based solution with a… More >

  • Open Access

    ARTICLE

    Energy-Efficient UAVs Coverage Path Planning Approach

    Gamil Ahmed1, Tarek Sheltami1,*, Ashraf Mahmoud1, Ansar Yasar2

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 3239-3263, 2023, DOI:10.32604/cmes.2023.022860

    Abstract Unmanned aerial vehicles (UAVs), commonly known as drones, have drawn significant consideration thanks to their agility, mobility, and flexibility features. They play a crucial role in modern reconnaissance, inspection, intelligence, and surveillance missions. Coverage path planning (CPP) which is one of the crucial aspects that determines an intelligent system’s quality seeks an optimal trajectory to fully cover the region of interest (ROI). However, the flight time of the UAV is limited due to a battery limitation and may not cover the whole region, especially in large region. Therefore, energy consumption is one of the most challenging issues that need to… More >

  • Open Access

    ARTICLE

    Received Power Based Unmanned Aerial Vehicles (UAVs) Jamming Detection and Nodes Classification Using Machine Learning

    Waleed Aldosari*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1253-1269, 2023, DOI:10.32604/cmc.2023.036111

    Abstract This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks on Wireless Sensor Networks (WSNs). Jamming is a type of Denial of Service (DoS) attack and intentional interference where a malicious node transmits a high-power signal to increase noise on the receiver side to disrupt the communication channel and reduce performance significantly. To defend and prevent such attacks, the first step is to detect them. The current detection approaches use centralized techniques to detect jamming, where each node collects information and forwards it to the base station. As a result, overhead and communication costs… More >

  • Open Access

    ARTICLE

    DQN-Based Proactive Trajectory Planning of UAVs in Multi-Access Edge Computing

    Adil Khan1,*, Jinling Zhang1, Shabeer Ahmad1, Saifullah Memon2, Babar Hayat1, Ahsan Rafiq3

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4685-4702, 2023, DOI:10.32604/cmc.2023.034892

    Abstract The main aim of future mobile networks is to provide secure, reliable, intelligent, and seamless connectivity. It also enables mobile network operators to ensure their customer’s a better quality of service (QoS). Nowadays, Unmanned Aerial Vehicles (UAVs) are a significant part of the mobile network due to their continuously growing use in various applications. For better coverage, cost-effective, and seamless service connectivity and provisioning, UAVs have emerged as the best choice for telco operators. UAVs can be used as flying base stations, edge servers, and relay nodes in mobile networks. On the other side, Multi-access Edge Computing (MEC) technology also… More >

  • Open Access

    ARTICLE

    Resource Management in UAV Enabled MEC Networks

    Muhammad Abrar1, Ziyad M. Almohaimeed2,*, Ushna Ajmal1, Rizwan Akram2, Rooha Masroor3, Muhammad Majid Hussain4

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4847-4860, 2023, DOI:10.32604/cmc.2023.030242

    Abstract Mobile edge cloud networks can be used to offload computationally intensive tasks from Internet of Things (IoT) devices to nearby mobile edge servers, thereby lowering energy consumption and response time for ground mobile users or IoT devices. Integration of Unmanned Aerial Vehicles (UAVs) and the mobile edge computing (MEC) server will significantly benefit small, battery-powered, and energy-constrained devices in 5G and future wireless networks. We address the problem of maximising computation efficiency in U-MEC networks by optimising the user association and offloading indicator (OI), the computational capacity (CC), the power consumption, the time duration, and the optimal location planning simultaneously.… More >

  • Open Access

    REVIEW

    Recent Progress on Aeroelasticity of High-Performance Morphing UAVs

    Binbin Lv, Jun Zha, Kaichun Zeng*, Hongtao Guo, Li Yu and Peng Zhang

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.1, pp. 1-29, 2022, DOI:10.32604/cmes.2022.020572

    Abstract The high-performance morphing aircraft has become a research focus all over the world. The morphing aircraft, unlike regular unmanned aerial vehicles (UAVs), has more complicated aerodynamic characteristics, making itmore difficultto conduct its design, model analysis, and experimentation. This paper reviews the recent process and the current status of aeroelastic issues, numerical simulations, and wind tunnel test of morphing aircrafts. The evaluation of aerodynamic characteristics, mechanism, and relevant unsteady dynamic aerodynamic modeling throughout the morphing process are the primary technological bottlenecks formorphing aircrafts. The unstable aerodynamic forces have a significant impact on the aircraft handling characteristics, control law design, and flight… More >

  • Open Access

    ARTICLE

    Metaheuristic Based Data Gathering Scheme for Clustered UAVs in 6G Communication Network

    Ahmed S. Almasoud1, Siwar Ben Haj Hassine2, Nadhem NEMRI2, Fahd N. Al-Wesabi2,3, Manar Ahmed Hamza4,*, Anwer Mustafa Hilal4, Abdelwahed Motwakel4, Mesfer Al Duhayyim5

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5311-5325, 2022, DOI:10.32604/cmc.2022.024500

    Abstract The sixth-generation (6G) wireless communication networks are anticipated in integrating aerial, terrestrial, and maritime communication into a robust system to accomplish trustworthy, quick, and low latency needs. It enables to achieve maximum throughput and delay for several applications. Besides, the evolution of 6G leads to the design of unmanned aerial vehicles (UAVs) in providing inexpensive and effective solutions in various application areas such as healthcare, environment monitoring, and so on. In the UAV network, effective data collection with restricted energy capacity poses a major issue to achieving high quality network communication. It can be addressed by the use of clustering… More >

  • Open Access

    ARTICLE

    Optimal Path Planning for Intelligent UAVs Using Graph Convolution Networks

    Akshya Jothi, P. L. K. Priyadarsini*

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1577-1591, 2022, DOI:10.32604/iasc.2022.020974

    Abstract Unmanned Aerial Vehicles (UAVs) are in use for surveillance services in the geographic areas, that are very hard and sometimes not reachable by humans. Nowadays, UAVs are being used as substitutions to manned operations in various applications. The intensive utilization of autonomous UAVs has given rise to many new challenges. One of the vital problems that arise while deploying UAVs in surveillance applications is the Coverage Path Planning(CPP) problem. Given a geographic area, the problem is to find an optimal path/tour for the UAV such that it covers the entire area of interest with minimal tour length. A graph can… More >

  • Open Access

    ARTICLE

    Optimal Deep Reinforcement Learning for Intrusion Detection in UAVs

    V. Praveena1, A. Vijayaraj2, P. Chinnasamy3, Ihsan Ali4,*, Roobaea Alroobaea5, Saleh Yahya Alyahyan6, Muhammad Ahsan Raza7

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2639-2653, 2022, DOI:10.32604/cmc.2022.020066

    Abstract In recent years, progressive developments have been observed in recent technologies and the production cost has been continuously decreasing. In such scenario, Internet of Things (IoT) network which is comprised of a set of Unmanned Aerial Vehicles (UAV), has received more attention from civilian to military applications. But network security poses a serious challenge to UAV networks whereas the intrusion detection system (IDS) is found to be an effective process to secure the UAV networks. Classical IDSs are not adequate to handle the latest computer networks that possess maximum bandwidth and data traffic. In order to improve the detection performance… More >

Displaying 1-10 on page 1 of 16. Per Page  

Share Link