Search alternatives:
drone » done (Expand Search), prone (Expand Search)
decrease » increase (Expand Search)
Showing 1 - 13 results of 13 for search '(( significant drone based ) OR ( significant ((inter decrease) OR (teer decrease)) ))', query time: 0.09s Refine Results
  1. 1

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…This issue of security risk can be minimized conspicuously by developing a robust authentication scheme for IoD deployment military drones. Therefore, this research illustrates the designing of two separate protocols based on the aggregate signature, identity, pairing cryptography, and Computational Diffie-Hellman Problem (CDHP) to guarantee data integrity, authorization, and confidentiality among drones and AC2P/PICS. …”
  2. 2

    IoT empowered smart cybersecurity framework for intrusion detection in internet of drones by Syeda Nazia Ashraf (17541222)

    Published 2023
    “…In recent years, there has been a significant increase in the utilization of IoT-enabled drone data management technology. …”
  3. 3

    Optimizing MPPT Control for Enhanced Efficiency in Sustainable Photovoltaic Microgrids: A DSO-Based Approach by Debabrata Mazumdar (18560506)

    Published 2024
    “…<p dir="ltr">The output of photovoltaic (PV) systems is significantly impacted by the vagaries of ambient temperature, solar irradiance, and environmental fluctuations. …”
  4. 4

    VisioDECT: a novel approach to drone detection using CBAM-integrated YOLO and GELAN-E models by Md. Sakib Bin Islam (22828181)

    Published 2025
    “…This improvement in spatial and channel attention significantly boosts detection performance, particularly for small and occluded drones. …”
  5. 5
  6. 6
  7. 7
  8. 8

    Security Supply Chain Using UAVs: Validation and Development of a UAV-Based Model for Qatar’s Mega Sporting Events by Khalifa AL-Dosari (17931434)

    Published 2023
    “…The key findings of the study are: (1) a valid and reliable UAV-based cybersecurity framework for FIFA mega sporting events was developed; (2) five critical factors were identified, including traceability, security and privacy, trust, acceptability, and preparedness; (3) all factors were significantly and positively correlated, highlighting the complexity of managing security systems in mega sporting events.…”
  9. 9
  10. 10

    Methylation at global LINE-1 repeats in human blood are affected by gender but not by age or natural hormone cycles by El Maarri, Osman

    Published 2011
    “…Previously, we reported on inter-individual and gender specific variations of LINE-1 methylation in healthy individuals. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 11

    Host Genetic Variants Potentially Associated With SARS-CoV-2: A Multi-Population Analysis by Maria K. Smatti (4675852)

    Published 2020
    “…Remarkably, Africans seem to carry extremely lower frequencies of SARS-CoV-1 susceptibility alleles, reaching to 32-fold decrease compared to other populations.</p><h3>Conclusion</h3><p dir="ltr">Multiple genetic variants, which could potentially modulate SARS-CoV-2 infection, are significantly variable between populations, with the lowest frequency observed among Africans. …”
  12. 12
  13. 13

    Positional and dimensional temporomandibular joint osseous changes in patients treated with the forsus fatigue resistant device: a non-randomized clinical trial by Ramy Abdul-Rahman Ishaq (22928974)

    Published 2025
    “…In the treatment group, condylar width decreased significantly by 0.52 ± 0.92 mm, in contrast to an increase of 0.17 ± 0.35 mm in the control group (<i>P</i> = 0.010). …”