Skip to main content

Research Repository

Advanced Search

All Outputs (3)

A novel routing optimization strategy based on reinforcement learning in perception layer networks (2023)
Journal Article
Tan, H., Ye, T., Rehman, S. U., ur Rehman, O., Tu, S., & Ahmad, J. (2023). A novel routing optimization strategy based on reinforcement learning in perception layer networks. Computer Networks, 237, 110105. https://doi.org/10.1016/j.comnet.2023.110105

Wireless sensor networks have become incredibly popular due to the Internet of Things’ (IoT) rapid development. IoT routing is the basis for the efficient operation of the perception-layer network. As a popular type of machine learning, reinforcement... Read More about A novel routing optimization strategy based on reinforcement learning in perception layer networks.

Two-stage Domain Adaptation for Infrared Ship Target Segmentation (2023)
Journal Article
Zhang, T., Shen, H., Rehman, S. U., Liu, Z., Li, Y., & Rehman, O. U. (2023). Two-stage Domain Adaptation for Infrared Ship Target Segmentation. IEEE Transactions on Geoscience and Remote Sensing, 61, https://doi.org/10.1109/tgrs.2023.3325298

Ship target segmentation in infrared scenes has always been a hot topic, since it is an important basis and prerequisite for infrared-guided weapons to reliably capture and recognize ship targets in the sea-level background. However, given the small... Read More about Two-stage Domain Adaptation for Infrared Ship Target Segmentation.

Cyberattacks and Security of Cloud Computing: A Complete Guideline (2023)
Journal Article
Dawood, M., Tu, S., Xiao, C., Alasmary, H., Waqas, M., & Rehman, S. U. (in press). Cyberattacks and Security of Cloud Computing: A Complete Guideline. Symmetry, 15(11), 1981. https://doi.org/10.3390/sym15111981

Cloud computing is an innovative technique that offers shared resources for stock cache and server management. Cloud computing saves time and monitoring costs for any organization and turns technological solutions for large-scale systems into server-... Read More about Cyberattacks and Security of Cloud Computing: A Complete Guideline.