Search alternatives:
drone » done (Expand Search), prone (Expand Search)
decrease » increase (Expand Search)
Showing 1 - 9 results of 9 for search '(( significant drone based ) OR ( significant ((ns decrease) OR (nn decrease)) ))', query time: 0.08s Refine Results
  1. 1

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…This issue of security risk can be minimized conspicuously by developing a robust authentication scheme for IoD deployment military drones. Therefore, this research illustrates the designing of two separate protocols based on the aggregate signature, identity, pairing cryptography, and Computational Diffie-Hellman Problem (CDHP) to guarantee data integrity, authorization, and confidentiality among drones and AC2P/PICS. …”
  2. 2

    IoT empowered smart cybersecurity framework for intrusion detection in internet of drones by Syeda Nazia Ashraf (17541222)

    Published 2023
    “…In recent years, there has been a significant increase in the utilization of IoT-enabled drone data management technology. …”
  3. 3

    Optimizing MPPT Control for Enhanced Efficiency in Sustainable Photovoltaic Microgrids: A DSO-Based Approach by Debabrata Mazumdar (18560506)

    Published 2024
    “…<p dir="ltr">The output of photovoltaic (PV) systems is significantly impacted by the vagaries of ambient temperature, solar irradiance, and environmental fluctuations. …”
  4. 4

    VisioDECT: a novel approach to drone detection using CBAM-integrated YOLO and GELAN-E models by Md. Sakib Bin Islam (22828181)

    Published 2025
    “…This improvement in spatial and channel attention significantly boosts detection performance, particularly for small and occluded drones. …”
  5. 5
  6. 6
  7. 7
  8. 8

    Security Supply Chain Using UAVs: Validation and Development of a UAV-Based Model for Qatar’s Mega Sporting Events by Khalifa AL-Dosari (17931434)

    Published 2023
    “…The key findings of the study are: (1) a valid and reliable UAV-based cybersecurity framework for FIFA mega sporting events was developed; (2) five critical factors were identified, including traceability, security and privacy, trust, acceptability, and preparedness; (3) all factors were significantly and positively correlated, highlighting the complexity of managing security systems in mega sporting events.…”
  9. 9