Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Mohtasin Golam"'
Publikováno v:
IEEE Access, Vol 12, Pp 92774-92786 (2024)
The worldwide education landscape has transformed due to the COVID-19 pandemic, providing an opportunity to enhance virtual learning. Nevertheless, this transition has disadvantages, including less face-to-face interaction and the possibility of stud
Externí odkaz:
https://doaj.org/article/eefe87f734014647b15eef4e7c9d035b
Publikováno v:
Drones, Vol 6, Iss 1, p 22 (2022)
The growing need for wireless communication has resulted in the widespread usage of unmanned aerial vehicles (UAVs) in a variety of applications. Designing a routing protocol for UAVs is paramount as well as challenging due to its dynamic attributes.
Externí odkaz:
https://doaj.org/article/573517095bc24476bf1ac74fca53df3b
Publikováno v:
IEEE Internet of Things Journal. 10:6634-6651
Publikováno v:
IEEE Geoscience and Remote Sensing Letters. 19:1-5
Solar irradiance prediction is an indispensable area of the photovoltaic (PV) power management system. However, PV management may be subject to severe penalties due to the unsteadiness pattern of PV output power that depends on solar radiation. A hig
Publikováno v:
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM).
Publikováno v:
2022 13th International Conference on Information and Communication Technology Convergence (ICTC).
Publikováno v:
2022 13th International Conference on Information and Communication Technology Convergence (ICTC).
Publikováno v:
2021 International Conference on Information and Communication Technology Convergence (ICTC).
A UAV-assisted Blockchain Based Secure Device-to-Device Communication in Internet of Military Things
Publikováno v:
ICTC
The significant advancement of blockchain technology in the field of industrial networks has created a meaningful impact and for this, it comes to the field of the military where blockchain can have a greater impact. In the military environment, a lo
Publikováno v:
ICTC
Orbital angular momentum (OAM) is a special method to overcome interference and enhance the channel capacity of wireless communication. The feasibility of creating reliable communications links impervious to threats and external attacks by exploiting