Zobrazeno 1 - 10
of 55
pro vyhledávání: '"Akram, Junaid"'
Autor:
Qian, Cheng, Shi, Xianglong, Yao, Shanshan, Liu, Yichen, Zhou, Fengming, Zhang, Zishu, Akram, Junaid, Braytee, Ali, Anaissi, Ali
We present a refined approach to biomedical question-answering (QA) services by integrating large language models (LLMs) with Multi-BERT configurations. By enhancing the ability to process and prioritize vast amounts of complex biomedical data, this
Externí odkaz:
http://arxiv.org/abs/2410.12856
Autor:
Akram, Junaid, Anaissi, Ali
We present an innovative framework that integrates consumer-grade drones into bushfire management, addressing both service improvement and data privacy concerns under Australia's Privacy Act 1988. This system establishes a marketplace where bushfire
Externí odkaz:
http://arxiv.org/abs/2410.05653
Autor:
Akram, Junaid, Anaissi, Ali
In the domain of spatial crowdsourcing drone services, which includes tasks like delivery, surveillance, and data collection, secure communication is paramount. The Public Key Infrastructure (PKI) ensures this by providing a system for digital certif
Externí odkaz:
http://arxiv.org/abs/2407.00876
Autor:
Akram, Junaid, Anaissi, Ali
We introduce a privacy-preserving framework for integrating consumer-grade drones into bushfire management. This system creates a marketplace where bushfire management authorities obtain essential data from drone operators. Key features include local
Externí odkaz:
http://arxiv.org/abs/2407.00873
Autor:
Akram, Junaid, Anaissi, Ali
This study introduces the Distributed Drone Reputation Management (DDRM) framework, designed to fortify trust and authenticity within the Internet of Drone Things (IoDT) ecosystem. As drones increasingly play a pivotal role across diverse sectors, in
Externí odkaz:
http://arxiv.org/abs/2407.00591
Publikováno v:
2022 ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond
We leverage blockchain technology for drone node authentication in internet of drone things (IoDT). During the authentication procedure, the credentials of drone nodes are examined to remove malicious nodes from the system. In IoDT, drones are respon
Externí odkaz:
http://arxiv.org/abs/2210.11745
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Akram, Junaid, Umair, Muhammad, Jhaveri, Rutvij H., Riaz, Muhammad Naveed, Chi, Haoran, Malebary, Sharaf
Publikováno v:
In Computers and Electrical Engineering September 2023 110
Publikováno v:
In ICT Express September 2022
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.