Unmanned Aerial Vehicles for Internet of Things (IoT). Группа авторов. Читать онлайн. Newlib. NEWLIB.NET

Автор: Группа авторов
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Программы
Год издания: 0
isbn: 9781119769156
Скачать книгу
May 2016.

      50. Galkin, B., Kibiłda, J., DaSilva, L.A., Backhaul for low-altitude UAVs in urban environments, in: Proc., International Conference on Communications (ICC), May 2018, pp. 1–6.

      51. Hourani, A., Sithamparanathan, K., Lardner, S., Optimal LAP altitude for maximum coverage. IEEE Wirel. Commun. Lett., 3, 6, 569–572, Dec. 2014.

      52. Zhang, X. and Duan, L., Fast deployment of UAV networks for optimal wireless coverage. IEEE Trans. Mob. Comput., 18, 3, 588–601, 2019.

      53. Mozaffari, M., Saad, W., Bennis, M., Debbah, M., Mobile unmanned aerial vehicles (UAVs) for energy-efficient Internet of Things communications. IEEE Trans. Wireless Commun., 16, 11, 7574–7589, Nov. 2017.

      54. Schouwenaars, T. et al., Mixed Integer Programming for Multi-Vehicle Path Planning. Proc. Euro. Control Conf, pp. 2603–08, 2001.

      55. Wu, Q., Zeng, Y., Zhang, R., Joint trajectory and communication design for multi-uav enabled wireless networks. IEEE Trans. Wirel. Commun., 17, 3, 2109–2121, 2018.

      56. Jiang, F. and Swindlehurst, A.L., Optimization of UAV heading for the ground-to-air uplink. IEEE J. Sel. Areas Commun., 30, 5, 993–1005, June 2012.

      57. Zeng, Y., Zhang, R., Lim, T.J., Throughput maximization for UAV enabled mobile relaying systems. IEEE Trans. Commun., 64, 12, 4983–4996, Dec. 2016.

      58. Franco, C.D. and Buttazzo, G., Energy-aware coverage path planning of UAVs, in: Proc. of IEEE International Conference on Autonomous Robot Systems and Competitions (ICARSC), Vila Real, Portugal, April 2015, pp. 111–117.

      59. Grøtli, E.I. and Johansen, T.A., Path planning for UAVs under communication constraints using splat! and milp. J. Intell. Robot. Syst., 65, 1–4, 265–282, 2012.

      60. Tisdale, J., Kim, Z., Hedrick, J.K., Autonomous UAV path planning and estimation. IEEE Robot. Autom. Mag., 16, 2, 35–42, 2009.

      61. Han, Z., Swindlehurst, A.L., Liu, K., Optimization of MANET connectivity via smart deployment/movement of unmanned air vehicles. IEEE Trans. Veh. Technol., 58, 7, 3533–3546, Dec. 2009.

      62. Chen, J. and Gesbert, D., Optimal Positioning of Flying Relays for Wireless Networks: A LOS Map Approach. Proc. IEEE Int’l. Conf. Commun. (ICC), May, 2017.

      63. Zeng, Y. and Zhang, R., Energy-efficient UAV communication with trajectory optimization. IEEE Trans. Wireless Commun., 16, 6, 3747–3760, June 2017.

      64. Tran, T.X., Hajisami, A., Pompili, D., Cooperative hierarchical caching in 5G cloud radio access networks. IEEE Network, 31, 4, 35–41, July 2017.

      65. Zorbas, D., Razafindralambo, T., Guerriero, F. et al., Energy efficient mobile target tracking using flying drones. Proc. Comput. Sci., 19, 80–87, June. 2013.

      66. Lyu, J., Zeng, Y., Zhang, R., Cyclical multiple access in UAV aided communications: A throughput-delay tradeoff. IEEE Wirel. Commun. Lett., 5, 6, 600–603, 2016.

      67. Song, Q., Jin, S., Zheng, F., Completion Time and Energy Consumption Minimization for UAV-Enabled Multicasting. IEEE Wireless Commun. Lett., 8, 3, 821–824, June 2019.

      68. Ceran, E.T., Erkilic, T., Uysal-Biyikoglu, E., Girici, T., Leblebicioglu, K., Optimal energy allocation policies for a high altitude flying wireless access point. Trans. Emerging Telecommun. Technol., 28, 4, e3034, 2017.

      69. Chen, M., Saad, W., Yin, C., Liquid state machine learning for resource allocation in a network of cache-enabled LTE-U UAVs, in: Proc. of Global Communications Conference (GLOBECOM), Singapore, Dec. 2017.

      70. Mozaffari, M., Saad, W., Bennis, M., Debbah, M., Wireless communication using unmanned aerial vehicles (UAVs): Optimal transport theory for hover time optimization. IEEE Trans. Wireless Commun., 16, 12, 8052–8066, Dec. 2017.

      71. Zeng, Y., Xu, J., Zhang, R., Energy minimization for wireless communication with rotary-wing UAV. IEEE Trans. Wirel. Commun., 18, 4, 2329–2345, 2019.

      72. Mohindru, V., Bhatt, R., Singh, Y., Reauthentication scheme for mobile wireless sensor networks. Sustainable Comput.: Inf. Syst., 23, 158–166, 2019.

      73. Mohindru, V. and Garg, A., Security Attacks in Internet of Things: A Review, in: The International Conference on Recent Innovations in Computing, March 2020, Springer, Singapore, pp. 679–693.

      74. Mohindru, V., Singh, Y., Bhatt, R., Hybrid cryptography algorithm for securing wireless sensor networks from Node Clone Attack. Recent Adv. Electr. Electron. Eng. (Formerly Recent Patents Electrical & Electronic Engineering), 13, 2, 251–259, 020.

      75. Mohindru, V., Singh, Y., Bhatt, R., A Review on Lightweight Node Authentication Algorithms in Wireless Sensor Networks, in: 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC), 2018, December, IEEE, pp. 517–521.

      1 *Corresponding author: [email protected]

      Конец ознакомительного фрагмента.

      Текст предоставлен ООО «ЛитРес».

      Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.

      Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.

/9j/4AAQSkZJRgABAQEBLAEsAAD/7SnWUGhvdG9zaG9wIDMuMAA4QklNBAQAAAAAAAccAgAAAq+L ADhCSU0EJQAAAAAAEDMc1a/wROMgrS8y5yAmDhg4QklNBC8AAAAAAEpGAAEAWAIAAFgCAAAAAAAA AAAAADIZAABWEwAAtf///7X///99GQAAoRMAAAABKAUAAPwDAAABAA8nAQBJAFIARQBTAC4AcABk ADhCSU0D7QAAAAAAEAEsAAAAAQABASwAAAABAAE4QklNBCYAAAAAAA4AAAAAAAAAAAAAP4AAADhC SU0EDQAAAAAABAAAAG44QklNBBkAAAAAAAQAAAAeOEJJTQPzAAAAAAAJAAAAAAAAAAABADhCSU0E CgAAAAAAAQAAOEJJTScQAAAAAAAKAAEAAAAAAAAAAjhCSU0D9QAAAAAASAAvZmYAAQBsZmYABgAA AAAAAQAvZmYAAQChmZoABgAAAAAAAQAyAAAAAQBaAAAABgAAAAAAAQA1AAAAAQAtAAAABgAAAAAA AThCSU0D+AAAAAAAcAAA/////////////////////////////wPoAAAAAP////////////////// //////////8D6AAAAAD/////////////////////////////A+gAAAAA//////////////////// /////////wPoAAA4QklNBAgAAAAAAEIAAAABAAACQAAAAkAAAAAK///CoAAAAVqAAQABTIEB///Q sAAAAA2gAAAA2YAA////oAEAAMqgAP///4AAAABq8AA4QklNBA4AAAAAABIAAAABAAAAAQAAz3AA AIrw//84QklNBDEAAAAAABYAAAADAAAAAQAORM9wAESK8AD//wAIOEJJTQQeAAAAAAAEAAAAADhC SU0EGgAAAAADTwAAAAYAAAAAAAAAAAAACtcAAAbPAAA