Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    REVIEW

    AI-Based UAV Swarms for Monitoring and Disease Identification of Brassica Plants Using Machine Learning: A Review

    Zain Anwar Ali1,2,*, Dingnan Deng1, Muhammad Kashif Shaikh3, Raza Hasan4, Muhammad Aamir Khan2

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 1-34, 2024, DOI:10.32604/csse.2023.041866 - 26 January 2024

    Abstract Technological advances in unmanned aerial vehicles (UAVs) pursued by artificial intelligence (AI) are improving remote sensing applications in smart agriculture. These are valuable tools for monitoring and disease identification of plants as they can collect data with no damage and effects on plants. However, their limited carrying and battery capacities restrict their performance in larger areas. Therefore, using multiple UAVs, especially in the form of a swarm is more significant for monitoring larger areas such as crop fields and forests. The diversity of research studies necessitates a literature review for more progress and contribution in… More >

  • Open Access

    Time-Efficient Blockchain Framework for Improved Data Transmission in Autonomous Systems

    Abdulrahman M. Abdulghani, Wilbur L. Walters, Khalid H. Abed*

    Journal of Blockchain and Intelligent Computing, Vol.1, pp. 1-13, 2023, DOI:10.32604/jbic.2023.041340 - 29 September 2023

    Abstract Blockchain technology is increasingly used to design trustworthy and reliable platforms for sharing information in a plethora of industries. It is a decentralized system that acts as an immutable record for storing data. It has the potential to disrupt a range of fields that rely on data, including autonomous systems like Unmanned Aerial Vehicles (UAVs). In this paper, we propose a framework based on blockchain and distributed ledger technology to improve transmission time and provide a secured and trusted method for UAVs to transfer data to the consumer efficiently while maintaining data reliability. The results More >

  • Open Access

    ARTICLE

    Enhancement of UAV Data Security and Privacy via Ethereum Blockchain Technology

    Sur Singh Rawat1,*, Youseef Alotaibi2, Nitima Malsa1, Vimal Gupta1

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1797-1815, 2023, DOI:10.32604/cmc.2023.039381 - 30 August 2023

    Abstract Unmanned aerial vehicles (UAVs), or drones, have revolutionized a wide range of industries, including monitoring, agriculture, surveillance, and supply chain. However, their widespread use also poses significant challenges, such as public safety, privacy, and cybersecurity. Cyberattacks, targeting UAVs have become more frequent, which highlights the need for robust security solutions. Blockchain technology, the foundation of cryptocurrencies has the potential to address these challenges. This study suggests a platform that utilizes blockchain technology to manage drone operations securely and confidentially. By incorporating blockchain technology, the proposed method aims to increase the security and privacy of drone… More >

  • Open Access

    ARTICLE

    Received Power Based Unmanned Aerial Vehicles (UAVs) Jamming Detection and Nodes Classification Using Machine Learning

    Waleed Aldosari*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1253-1269, 2023, DOI:10.32604/cmc.2023.036111 - 06 February 2023

    Abstract This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks on Wireless Sensor Networks (WSNs). Jamming is a type of Denial of Service (DoS) attack and intentional interference where a malicious node transmits a high-power signal to increase noise on the receiver side to disrupt the communication channel and reduce performance significantly. To defend and prevent such attacks, the first step is to detect them. The current detection approaches use centralized techniques to detect jamming, where each node collects information and forwards it to the base station. As a… More >

Displaying 1-10 on page 1 of 4. Per Page