Abstract: Intercepting a saturation attack from a loitering munition (LM) swarm with a swarm of autonomous aerial vehicles (AAVs) is a complex challenge. In this study, we developed a specific ...
Abstract: With the increasing application of drone swarms in complex tasks, maintaining formation reconfiguration consistency and balancing energy consumption have emerged as critical challenges. This ...
This repository contains local lab programs for the 5th Semester Computer Networks course. The programs cover network simulations using NS-2 (TCL) and network protocols/algorithms implemented in Java.