A comprehensive survey on 5G-and-beyond networks with UAVs: Applications, emerging technologies, regulatory aspects, research trends and challenges
The rapid advancement of fifth-generation (5G)-and-beyond networks coupled with
unmanned aerial vehicles (UAVs) has opened up exciting possibilities for diverse …
unmanned aerial vehicles (UAVs) has opened up exciting possibilities for diverse …
Blockchain applications in UAV industry: Review, opportunities, and challenges
In recent years, the application of blockchain technology in the Unmanned Aerial Vehicle
(UAV) industry has shown promise in making a substantial impact on various aspects of the …
(UAV) industry has shown promise in making a substantial impact on various aspects of the …
Unmanned aerial vehicle assisted communication: applications, challenges, and future outlook
Y Li, Y Bi, J Wang, Z Li, H Zhang, P Zhang - Cluster Computing, 2024 - Springer
With the advancement of wireless communication technology, the number of wireless
network terminals has exploded, and various new business scenarios have emerged. The …
network terminals has exploded, and various new business scenarios have emerged. The …
Blockchain technology for secure communication and formation control in smart drone swarms
Today, intelligent drone technology is rapidly expanding, particularly in the defense industry.
A swarm of drones can communicate, share data, and make the best decisions on their own …
A swarm of drones can communicate, share data, and make the best decisions on their own …
Connecting Internet of Drones and urban computing: Methods, protocols and applications
This comprehensive survey explores the connection between the Internet of Drones (IoD)
and Urban Computing (UC). Drones offer substantial benefits across diverse urban …
and Urban Computing (UC). Drones offer substantial benefits across diverse urban …
A privacy and energy-aware federated framework for human activity recognition
Human activity recognition (HAR) using wearable sensors enables continuous monitoring
for healthcare applications. However, the conventional centralised training of deep learning …
for healthcare applications. However, the conventional centralised training of deep learning …
A Comprehensive Mutable Analytics Approach to Distinguish Sensor Data on the Internet of Underwater Things
M Albekairi - IEEE Access, 2024 - ieeexplore.ieee.org
Accessibility to networks of communication and sensing equipment situated beneath the
surface of vast bodies of water is made possible by the Internet of Underwater Things (IoUT) …
surface of vast bodies of water is made possible by the Internet of Underwater Things (IoUT) …
[HTML][HTML] Enhancing Unmanned Aerial Vehicle Security: A Zero-Knowledge Proof Approach with Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge …
UAVs are increasingly being used in various domains, from personal and commercial
applications to military operations. Ensuring the security and trustworthiness of UAV …
applications to military operations. Ensuring the security and trustworthiness of UAV …
Security and Privacy Issues and Solutions for UAVs in B5G Networks: A Review
Unmanned aerial vehicles (UAVs) in beyond 5G (B5G) are crucial for revolutionizing various
industries, including surveillance, agriculture, and logistics, by enabling high-speed data …
industries, including surveillance, agriculture, and logistics, by enabling high-speed data …
[HTML][HTML] Towards a Digital Transformation Hyper-Framework: The Essential Design Principles and Components of the Initial Prototype
To cope with the complexity, the digital transformation of cyber-physical and socio-
technology systems demands the utilization of heterogeneous tailorable development …
technology systems demands the utilization of heterogeneous tailorable development …