no code implementations • 2 Dec 2022 • Muhammad Asif Khan, Hamid Menouar, Osama Muhammad Khalid, Adnan Abu-Dayya
Owing to the limitations of these schemes, we present a novel encryption-based drone detection scheme that uses a two-stage verification of the drone's received signal strength indicator (RSSI) and the encryption key generated from the drone's position coordinates to reliably detect an unauthorized drone in the presence of authorized drones.
no code implementations • 6 Feb 2022 • Muhammad Umar Bin Farooq, Marvin Manalastas, Syed Muhammad Asad Zaidi, Adnan Abu-Dayya, Ali Imran
An XGBoost based model has the best performance for edge RSRP and HOSR while random forest outperforms others for load prediction.
no code implementations • 30 Jan 2022 • Usama Masood, Hasan Farooq, Ali Imran, Adnan Abu-Dayya
In modern wireless communication systems, radio propagation modeling to estimate pathloss has always been a fundamental task in system design and optimization.