|
|
|
Thomas Schiller, Bruce Caulkins, Annie S. Wu and Sean Mondesire
Internet of Things (IoT) devices are common in today?s computer networks. These devices can be computationally powerful, yet prone to cybersecurity exploitation. To remedy these growing security weaknesses, this work proposes a new artificial intelligenc...
ver más
|
|
|
|
|
|
|
Roman Odarchenko, Maksim Iavich, Giorgi Iashvili, Solomiia Fedushko and Yuriy Syerov
It is clear that 5G networks have already become integral to our present. However, a significant issue lies in the fact that current 5G communication systems are incapable of fully ensuring the required quality of service and the security of transmitted ...
ver más
|
|
|
|
|
|
|
Naveed Ur Rehman Junejo, Mariyam Sattar, Saifullah Adnan, Haixin Sun, Abuzar B. M. Adam, Ahmad Hassan and Hamada Esmaiel
In the past decades, researchers/scientists have paid attention to the physical layer of underwater communications (UWCs) due to a variety of scientific, military, and civil tasks completed beneath water. This includes numerous activities critical for co...
ver más
|
|
|
|
|
|
|
Mostafa Hamdy Salem, Yujian Li, Zhaoying Liu and Ahmed M. AbdelTawab
Deep learning has been used to improve intelligent transportation systems (ITS) by classifying ship targets in interior waterways. Researchers have created numerous classification methods, but they have low accuracy and misclassify other ship targets. As...
ver más
|
|
|
|
|
|
|
Xing Yi, Hao Pan, Huaici Zhao, Pengfei Liu, Canyu Zhang, Junpeng Wang and Hao Wang
Image generation technology is currently one of the popular directions in computer vision research, especially regarding infrared imaging, bearing critical applications in the military field. Existing algorithms for generating infrared images from visibl...
ver más
|
|
|
|
|
|
|
Giseok Jeong, Kookjin Kim, Sukjoon Yoon, Dongkyoo Shin and Jiwon Kang
As the world undergoes rapid digitalization, individuals and objects are becoming more extensively connected through the advancement of Internet networks. This phenomenon has been observed in governmental and military domains as well, accompanied by a ri...
ver más
|
|
|
|
|
|
|
Mateusz Oszczypala, Jaroslaw Ziólkowski and Jerzy Malachowski
The paper proposes a methodology of reliability testing as applied to vehicles used in military transport systems. After estimating the value of the reliability function using the Kaplan?Meier estimator, reliability models were developed and analysed. Th...
ver más
|
|
|
|
|
|
|
Sonain Jamil, Muhammad Sohail Abbas and Arunabha M. Roy
Drones are commonly used in numerous applications, such as surveillance, navigation, spraying pesticides in autonomous agricultural systems, various military services, etc., due to their variable sizes and workloads. However, malicious drones that carry ...
ver más
|
|
|
|
|
|
|
Ali H. Wheeb, Rosdiadee Nordin, Asma? Abu Samah, Mohammed H. Alsharif and Muhammad Asghar Khan
Telecommunications among unmanned aerial vehicles (UAVs) have emerged recently due to rapid improvements in wireless technology, low-cost equipment, advancement in networking communication techniques, and demand from various industries that seek to lever...
ver más
|
|
|
|
|
|
|
Yihan Xing, Tan Aditya Dwi Santoso and Yucong Ma
This paper presents the technical and economic feasibility analysis of the subsea shuttle tanker (SST). The SST is proposed as an alternative to subsea pipelines and surface tankers with the primary purpose of transporting CO2 autonomously underwater fro...
ver más
|
|
|
|