Search
Now showing items 1-8 of 8
Survey on unmanned aerial vehicle for Mars exploration: deployment use case
(MDPI, 2021-12-22)
In recent years, the area of Unmanned Aerial Vehicles (UAVs) has seen rapid growth. There
has been a trend to build and produce UAVs that can carry out planetary exploration throughout the
past decade. The technology of ...
A survey of modern deep learning based object detection models
(Elsevier, 2022-06-30)
Object Detection is the task of classification and localization of objects in an image or video. It has gained prominence in recent years due to its widespread applications. This article surveys recent developments in deep ...
Zero-padding and spatial augmentation-based gas sensor node optimization approach in resource-constrained 6G-IoT paradigm
(MDPI, 2022-04-15)
Ultra-low-power is a key performance indicator in 6G-IoT ecosystems. Sensor nodes in this eco-system are also capable of running light-weight artificial intelligence (AI) models. In this work, we have achieved high performance ...
An ensemble machine learning method for microplastics identification with FTIR spectrum
(Elsevier, 2022-06-20)
Microplastics (MPs) (size < 5 mm) marine pollution have been investigated and monitored by many researchers
and found in many coasts around the world. These toxic chemicals make their way into human diet through food ...
Low computational complexity for optimizing energy efficiency in Mm-wave hybrid precoding system for 5G
(IEEE, 2022-01-13)
Millimeter-wave (mm-wave) communication is the spectral frontier to meet the anticipated
significant volume of high data traffic processing in next-generation systems. The primary challenges in
mm-wave can be overcome ...
SoK: context and risk aware access control for zero trust systems
(Wiley/Hindawi, 2022-06-30)
Evolving computing technologies such as cloud, edge computing, and the Internet of )ings (IoT) are creating a more complex,
dispersed, and dynamic enterprise operational environment. New security enterprise architectures ...
Anomalous distributed traffic: detecting cyber security attacks amongst microservices using graph convolutional networks
(Elsevier, 2022-04-22)
Currently, microservices are trending as the most popular software application design architecture. Software organisations are also being targeted by more cyber-attacks every day and newer security measures are in high ...
ECE: Exactly-Once-Computation for Collaborative Edge in IoT using Information Centric Networking
(IEEE, 2023-05-11)
—Exactly-once data processing/delivery can be
guaranteed in traditional big data processing systems, e.g.
Apache Flink. Checkpoint is commonly used as the solution.
Each operator in these systems can restart from the ...