Search
Search Results
-
Survey-based analysis of cybersecurity awareness of Turkish seafarers
In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...
-
Continual learning approaches to hand–eye calibration in robots
This study addresses the problem of hand–eye calibration in robotic systems by develo** Continual Learning (CL)-based approaches. Traditionally,...
-
-
Optimization of Spectral and Energy Efficiencies Trade-Off Using Multi-objective Forest Optimization Algorithm in Massive MIMO Systems
Increasing the area throughput is one of the leading solutions in terms of preventing data traffic density, which is one of the current problems in...
-
MDUNet: deep-prior unrolling network with multi-parameter data integration for low-dose computed tomography reconstruction
The goal of this study is to reconstruct a high-quality computed tomography (CT) image from low-dose acquisition using an unrolling deep...
-
An Unequal Clustering Energy Consumption Balancing Routing Algorithm of UAV Swarm Based on Ultraviolet Secret Communication
Focusing on the tasks collaboration requirements of Unmanned Aerial Vehicle (UAV) swarm in complex battlefield environment, it is especially...
-
Utilizing a Hybrid Cat-Swarm Optimization Algorithm for Seamless Vertical Handoff in Vanet
In order to enhance spectrum competence for successful data rates, future generation vehicle networks will be able to provide the method for...
-
Security Capacity by Nonlinear Transmission in MIMO Systems for Physical Layer Security
To enhance the information security in multiple input multiple output (MIMO) wireless communication systems, nonlinear transmission is studied in...
-
Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm
A novel quantum-safe key encapsulation algorithm, called Multivariate Polynomial Public Key (MPPK), was recently proposed by Kuang, Perepechaenko,...
-
Joint User Scheduling, Trajectory, Beamforming and Power Allocation for Millimeter-Wave Full-Duplex UAV Relay
With small size, low cost and high mobility, unmanned aerial vehicles (UAVs) are playing an increasingly important role in all areas of modern...
-
Localization of Underwater Wireless Sensor Networks for Ranging Interference based on the AdaDelta Gradient Descent Algorithm
In Underwater Wireless Sensor Networks, ensuring precise localization of sensor nodes is crucial. Existing localization algorithms heavily rely on...
-
Real-Time Tracking of Basketball Trajectory Based on the Associative MCMC Model
In basketball videos, the trajectories of a basketball changes rapidly. Since the visual features changes in a more homogeneous region, the frame...
-
Moral and formal model-based control strategy for autonomous vehicles at traffic-light-free intersections
Making an effective traffic strategy is a challenging problem that involves efficiency and safety, where traffic lights play an important role....
-
A Survey on Cut Detection and Connectivity Restoration in Wireless Sensor Network
Wireless Sensor Network suffers from the problem of interruption in connectivity due to node’s malfunctioning. Incompatible ecological surroundings...
-
Remote radio frequency unit selection of self-sustaining distributed base-station system based on downlink physical layer secure transmission
In the energy harvesting self-sustaining distributed base-station system (SS-DBS), the problem of optimal resource allocation for secure transmission...
-
An adversarial sample detection method based on heterogeneous denoising
Deep learning has been used in many computer-vision-based applications. However, deep neural networks are vulnerable to adversarial examples that...
-
Hexagonal Shaped Antenna Using MIMO Techniques for 2.1 GHz Wireless Application
The wireless and portable equipment demand for boosting the data rate, spectral efficiency, coverage, SNR, and capacity which is fulfilled by MIMO...
-
Customizable Fuzzy-Neuro Inference System Attack Detection Based on Trust for Mobile Wireless Sensor Networks
Wireless Sensor Networks (WSN) when simulated for implementations use Mobile Sinks (MS) which are vulnerable to unauthorized attacks. Existing works...
-
Secrecy of Molecular Communication in Presence of Radiation Absorption
Ultra high user density is one of the key requirements in 6G and beyond. Also, in future, THz based communication system and Molecular Communication...
-
An Extensive Review on Emerging Advancements in Thermography and Convolutional Neural Networks for Breast Cancer Detection
Breast cancer remains a significant health concern, necessitating early and accurate detection methods to reduce mortality rates. This review...