Abstract: In remote or high-demand wireless cellular networks, efficient data collection from ground users (GUs) with fixed infrastructure poses a significant challenge. Autonomous aerial vehicles ...
Abstract: The security of a chaos-based image encryption (IE) systems is based upon chaotic map’s performance and the encryption algorithm’s permutation and diffusion strategies. Nevertheless, ...