Satellites in LEO (Low Earth Orbits) are closest to the Earth’s surface, having the smallest coverage area compared to other orbits, depending on altitude and elevation angle, and providing relatively too short visib...
This article is about orthogonal frequency-division multiplexing with quadrature amplitude modulation combined with code division multiplexing access for complex data transmission. It aims to present a method which us...
In the realm of Artificial Intelligence (AI), there exists a complex landscape where promises of efficiency and innovation clash with unforeseen disruptions across Information Technology (IT) and broader societal real...
This research introduces a novel approach to improve and optimize the predictive capacity of consumer purchase behaviors on e-commerce platforms. This study presented an introduction to the fundamental concepts of the...
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering...
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...
Satellite communications, pivotal for global connectivity, are increasingly converging with cutting-edge mobile networks, notably 5G, B5G, and 6G. This amalgamation heralds the promise of universal, high-velocity comm...
This article delves into the analysis of performance and utilization of Support Vector Machines (SVMs) for the critical task of forest fire detection using image datasets. With the increasing threat of forest fires to...
As wireless data applications over cellular networks become more widespread, the pressure to increase capacity will become even more intense. Capacity in the 800 and 900 MHz bands, where bandwidth is restricted, is al...
The ever-increasing needs of Internet of Things networks (IoTn) present considerable issues in computing complexity, security, trust, and authentication, among others. This gets increasingly more challenging as techno...