Search
Now showing items 1-6 of 6
AI-based UAV navigation framework with digital twin technology for mobile target visitation
(
Elsevier
, 2023 , Article)
Unmanned Air Vehicles (UAVs), i.e. drones, have become a key enabler technology of many reconnaissance applications in different fields, such as military, maritime, and transportation. UAVs offer several benefits, such as ...
Zero Touch Realization of Pervasive Artificial Intelligence as a Service in 6G Networks
(
IEEE
, 2023 , Article)
The vision of the upcoming 6G technologies, characterized by ultra-dense networks, low latency, and fast data rate, is to support pervasive artificial intelligence (PAI) using zero touch solutions enabling self-X (e.g., ...
Video transcoding at the edge: cost and feasibility perspective
(
Springer Nature
, 2023 , Article)
The developments in smartphones, high data rates, and substantial video data traffic have increased the burden on cellular networks. Consequently, this burden significantly affects the Quality of Experience of the cellular ...
RL-Based Federated Learning Framework Over Blockchain (RL-FL-BC)
(
IEEE
, 2023 , Article)
Federated learning (FL) paradigms aim to amalgamate diverse data properties stored locally at each user, while preserving data privacy through sharing users’ learning experiences and iteratively aggregating their ...
Optimal Resource Management for Hierarchical Federated Learning over HetNets with Wireless Energy Transfer
(
Institute of Electrical and Electronics Engineers Inc.
, 2023 , Article)
Remote monitoring systems analyze the environment dynamics in different smart industrial applications, such as occupational health and safety, and environmental monitoring. Specifically, in industrial Internet of Things ...
Secure Wireless Sensor Networks for Anti-Jamming Strategy Based on Game Theory
(
IEEE
, 2023 , Conference Paper)
The Wireless Sensor Networks (WSN) are designed to remotely monitor and control specific physical or environmental conditions. However, due to the open nature of WSN, many threats and attacks may arise by malicious users ...