期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Energy-Efficient UAVs Coverage Path Planning Approach 被引量:1
1
作者 Gamil Ahmed Tarek Sheltami +1 位作者 ashraf mahmoud Ansar Yasar 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第9期3239-3263,共25页
Unmanned aerial vehicles(UAVs),commonly known as drones,have drawn significant consideration thanks to their agility,mobility,and flexibility features.They play a crucial role in modern reconnaissance,inspection,intel... Unmanned aerial vehicles(UAVs),commonly known as drones,have drawn significant consideration thanks to their agility,mobility,and flexibility features.They play a crucial role in modern reconnaissance,inspection,intelligence,and surveillance missions.Coverage path planning(CPP)which is one of the crucial aspects that determines an intelligent system’s quality seeks an optimal trajectory to fully cover the region of interest(ROI).However,the flight time of the UAV is limited due to a battery limitation and may not cover the whole region,especially in large region.Therefore,energy consumption is one of the most challenging issues that need to be optimized.In this paper,we propose an energy-efficient coverage path planning algorithm to solve the CPP problem.The objective is to generate a collision-free coverage path that minimizes the overall energy consumption and guarantees covering the whole region.To do so,the flight path is optimized and the number of turns is reduced to minimize the energy consumption.The proposed approach first decomposes the ROI into a set of cells depending on a UAV camera footprint.Then,the coverage path planning problem is formulated,where the exact solution is determined using the CPLEX solver.For small-scale problems,the CPLEX shows a better solution in a reasonable time.However,the CPLEX solver fails to generate the solution within a reasonable time for large-scale problems.Thus,to solve the model for large-scale problems,simulated annealing forCPP is developed.The results show that heuristic approaches yield a better solution for large-scale problems within amuch shorter execution time than the CPLEX solver.Finally,we compare the simulated annealing against the greedy algorithm.The results show that simulated annealing outperforms the greedy algorithm in generating better solution quality. 展开更多
关键词 Coverage path planning MILP CPLEX solver energy model optimization region of interest area of interest
在线阅读 下载PDF
Detecting Man-in-the-Middle Attack in Fog Computing for Social Media 被引量:1
2
作者 Farouq Aliyu Tarek Sheltami +2 位作者 ashraf mahmoud Louai Al-Awami Ansar Yasar 《Computers, Materials & Continua》 SCIE EI 2021年第10期1159-1181,共23页
Fog computing(FC)is a networking paradigm where wireless devices known as fog nodes are placed at the edge of the network(close to the Internet of Things(IoT)devices).Fog nodes provide services in lieu of the cloud.Th... Fog computing(FC)is a networking paradigm where wireless devices known as fog nodes are placed at the edge of the network(close to the Internet of Things(IoT)devices).Fog nodes provide services in lieu of the cloud.Thus,improving the performance of the network and making it attractive to social media-based systems.Security issues are one of the most challenges encountered in FC.In this paper,we propose an anomalybased Intrusion Detection and Prevention System(IDPS)against Man-in-theMiddle(MITM)attack in the fog layer.The system uses special nodes known as Intrusion Detection System(IDS)nodes to detect intrusion in the network.They periodically monitor the behavior of the fog nodes in the network.Any deviation from normal network activity is categorized as malicious,and the suspected node is isolated.ExponentiallyWeighted Moving Average(EWMA)is added to the system to smooth out the noise that is typically found in social media communications.Our results(with 95%confidence)show that the accuracy of the proposed system increases from 80%to 95%after EWMA is added.Also,with EWMA,the proposed system can detect the intrusion from 0.25–0.5 s seconds faster than that without EWMA.However,it affects the latency of services provided by the fog nodes by at least 0.75–1.3 s.Finally,EWMA has not increased the energy overhead of the system,due to its lightweight. 展开更多
关键词 Fog computing man-in-the-middle attack intrusion detection system and prevention system network security social media
在线阅读 下载PDF
Performance of Random Contention PRMA: A Protocol for Fixed Wireless Access
3
作者 Salman Ali AlQahtani Ahed Alshanyour ashraf mahmoud 《International Journal of Communications, Network and System Sciences》 2011年第7期417-423,共7页
This paper introduces a packet reservation multiple access (PRMA) with random contention for fixed wireless access communications. The performance of PRMA scheme with random contention is compared with the performance... This paper introduces a packet reservation multiple access (PRMA) with random contention for fixed wireless access communications. The performance of PRMA scheme with random contention is compared with the performances of traditional PRMA under permission contention scheme. The proposed scheme is a simpler contention mechanism that does not depend on a pre-determined permission probability as PRMA under permission contention scheme. In this new method, terminals select the contention slot uniformly from the pool of remaining free slots in the current frame. We evaluate the performance of the new contention mechanism in terms of various metrics including maximum number of carried voice calls and packet delays for a given acceptable drop rate of voice packets. We show that the new mechanism is superior to that of PRMA under permission contention scheme for loaded systems and is expected to be insensitive for traffic source burstiness. 展开更多
关键词 CONTENTION Scheme Fixed WIRELESS PERFORMANCE Evaluation PRMA
在线阅读 下载PDF
Acousto-optical modulation of thin film lithium niobate waveguide devices 被引量:20
4
作者 LUTONG CAI ashraf mahmoud +4 位作者 MSI KHAN MOHAMED mahmoud TAMAL MUKHERJEE JAMES BAIN GIANLUCA PIAZZA 《Photonics Research》 SCIE EI CSCD 2019年第9期1003-1013,共11页
Due to its strong piezoelectric effect and photo-elastic property, lithium niobate is widely used for acousto-optical applications. However, conventional bulk lithium niobate waveguide devices exhibit a large footprin... Due to its strong piezoelectric effect and photo-elastic property, lithium niobate is widely used for acousto-optical applications. However, conventional bulk lithium niobate waveguide devices exhibit a large footprint and limited light–sound interaction resulting from the weak guiding of light. Here, we report the first acousto-optical modulators with surface acoustic wave generation, phononic cavity, and low-loss photonic waveguide devices monolithically integrated on a 500 nm thick film of lithium niobate on an insulator. Modulation efficiency was optimized by properly arranging the propagation directions of surface acoustic waves and optical guided modes.The effective photo-elastic coefficient extracted by comparing the first and third harmonic modulation signals from an on-chip Mach–Zehnder interferometer indicates the excellent acousto-optical properties of lithium niobate are preserved in the thin film implementation. Such material property finding is of crucial importance in designing various types of acousto-optical devices. Much stronger amplitude modulation was achieved in a high Q(>300,000) optical resonator due to the higher optical sensitivity. Our results pave the path for developing novel acousto-optical devices using thin film lithium niobate. 展开更多
关键词 AOM Acousto-optical modulation of THIN film LITHIUM NIOBATE WAVEGUIDE devices
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部