2023 Second International Conference on Electronics and Renewable Systems (ICEARS) 2023
DOI: 10.1109/icears56392.2023.10085047
|View full text |Cite
|
Sign up to set email alerts
|

Edge-Cloud Computing Systems for Unmanned Aerial Vehicles Capable of Optimal Work Offloading with Delay

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 17 publications
0
0
0
Order By: Relevance
“…[8] We begin with the humble touchscreen and move into the expansive realm of VR, exploring the technological milestones, the inherent challenges, and the vast potentialities that lie ahead. [9] As we progress, we hope to offer readers a comprehensive understanding of how gesture-based interactions have transformed our digital experiences and hint at the exciting possibilities the future might hold. [10,11] This introduction sets the stage for the paper by providing context and framing the topic's importance [12,13].…”
Section: Introductionmentioning
confidence: 99%
“…[8] We begin with the humble touchscreen and move into the expansive realm of VR, exploring the technological milestones, the inherent challenges, and the vast potentialities that lie ahead. [9] As we progress, we hope to offer readers a comprehensive understanding of how gesture-based interactions have transformed our digital experiences and hint at the exciting possibilities the future might hold. [10,11] This introduction sets the stage for the paper by providing context and framing the topic's importance [12,13].…”
Section: Introductionmentioning
confidence: 99%
“…However, this transformational potential comes hand in hand with a complex array of security challenges that cast a shadow over the seamless integration of IoT in our lives. [2,3] As the boundaries between the physical and digital realms blur, IoT devices have become integral components of our environments, facilitating tasks, automating processes, and gathering data. Yet, this pervasive presence also exposes vulnerabilities that threat actors are eager to exploit.…”
Section: Iintroductionmentioning
confidence: 99%