Zobrazeno 1 - 10
of 355
pro vyhledávání: '"flying Ad-hoc network"'
Autor:
V. Chandrasekar, V. Shanmugavalli, T. R. Mahesh, R. Shashikumar, Naiwrita Borah, V. Vinoth Kumar, Suresh Guluwadi
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-16 (2024)
Abstract In wireless networking, the security of flying ad hoc networks (FANETs) is a major issue, and the use of drones is growing every day. A distributed network is created by a drone network in which nodes can enter and exit the network at any ti
Externí odkaz:
https://doaj.org/article/ed193b47338e47b5978dd28d39acff0e
Publikováno v:
Journal of Aerospace Technology and Management, Vol 16 (2024)
The concept of a swarm of drones assumes the presence of a wireless ad hoc network, in which drones are network nodes and exchanging information with each other. This article is devoted to studying the behavior of an ad hoc network in a transient mod
Externí odkaz:
https://doaj.org/article/60696eb5171d42bea1a11c01e7fab38a
Autor:
Jimin Jeon, Junseung Lee, Taewook Kim, Jaeha Ahn, Youngbin Yu, Min Lee, Heejung Yu, Howon Lee
Publikováno v:
IEEE Access, Vol 12, Pp 79957-79966 (2024)
Significant challenges are involved in tactical flying ad-hoc network (FANET) missions because network environments are very dynamic. In addition, energy-efficient network operation is important in tactical FANETs owing to the limited capacity of the
Externí odkaz:
https://doaj.org/article/d82c0b20d03044618524f40e6b011bf2
Autor:
Awadhesh Dixit, Sunil Kumar Singh
Publikováno v:
IEEE Access, Vol 12, Pp 37326-37348 (2024)
Communication among drones and diverse devices, known as D2X (Drone-to-Everything) communication, faces challenges within traditional drone setups, including routing complexities, interference issues, and susceptibility to single points of failure. T
Externí odkaz:
https://doaj.org/article/b41a14b2a6b44f1a8e6bd4ba1a25f0c6
Publikováno v:
IEEE Access, Vol 12, Pp 35097-35108 (2024)
Recently, multi-hop flying ad hoc networks (FANETs) have received considerable attention because of their various advantages, such as ease of deployment, scalability, cost, and latency reduction. However, FANETs still encounter serious problems such
Externí odkaz:
https://doaj.org/article/06b85a38b2ca46ee9611ac280bf2ca0c
Publikováno v:
IEEE Access, Vol 12, Pp 23081-23095 (2024)
Unmanned Aerial Vehicles (UAVs) have several military and civilian applications to perform tasks that do not require a central processing unit or human involvement. There are various vulnerable characteristics, alternatively limitations, in UAV syste
Externí odkaz:
https://doaj.org/article/4cd1a9a8d08e4ff3a33eb68d1f59b436
Publikováno v:
IEEE Access, Vol 12, Pp 17369-17381 (2024)
The Intelligent Transportation System (ITS) has the potential to significantly improve communication reliability, efficiency, and manageability in transportation systems. Vehicular ad hoc networks (VANETs) are particularly valuable for sustaining ITS
Externí odkaz:
https://doaj.org/article/9c03f9c219c447da8fe4f3c1918e4457
Publikováno v:
Sensors, Vol 24, Iss 19, p 6334 (2024)
The adoption of UAVs in defence and civilian sectors necessitates robust communication networks. This paper presents a routing protocol for Cognitive Radio Unmanned Aerial Vehicles (CR-UAVs) in Flying Ad-hoc Networks (FANETs). The protocol is enginee
Externí odkaz:
https://doaj.org/article/5786de81dc8f41aa9e43f1c6f7ddacd6
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 1, Pp 101909- (2024)
The paper presents the concept of determining the flight trajectory of an unmanned aerial vehicle (UAV) swarm that forms a flying ad-hoc network (FANET) for communication with each other. The FANET allows the swarm to follow a predetermined route bet
Externí odkaz:
https://doaj.org/article/d4b343471bbc48508576e8f973a16e29
Publikováno v:
IEEE Access, Vol 11, Pp 55233-55280 (2023)
Flying Ad-Hoc Networks (FANETs) are groups of UAVs connected in an Ad-Hoc manner to accomplish a common mission. The widespread acceptance of UAVs due to their low cost and high efficiency has attracted malicious security attacks against them. These
Externí odkaz:
https://doaj.org/article/a1b5fc9dc38d478e90b2189adb6605e3