Skip to main content

Computational Intelligence for Unmanned Aerial Vehicles Communication Networks

  • Book
  • © 2022

Overview

  • Combines AI and communication networks to establish flexible UAV communication networks
  • Focuses on possible applications of Unmanned Aerial Vehicles in a Smart City environment
  • Recent research on Computational Intelligence for Unmanned Aerial Vehicles Communication Networks

Part of the book series: Studies in Computational Intelligence (SCI, volume 1033)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

About this book

This book aims to provide a vision that can combine the best of both Artificial Intelligence (AI) and communication networks for designing the deployment trajectory to establish flexible Unmanned Aerial Vehicles (UAV) communication networks.
This book will discuss the major challenges that can face deploying unmanned aerial vehicles in emergent networks. It will focus on possible applications of UAV in a Smart City environment where they can be supported by Internet of Things (IoT), wireless sensor networks, as well as 5G, and beyond.  
This book presents the possible problems and solutions, the network integration of the UAV and compare the communication technologies to be used.
This book will be a collection of original contributions regarding state of the art AI/ML based solutions in UAV communication networks which can be used for routing protocol design, transport layer optimization, user/application behaviour prediction, communicationnetwork optimization, security, and anomaly detection.


Similar content being viewed by others

Keywords

Table of contents (16 chapters)

Editors and Affiliations

  • Universite Moulay Ismail De Meknes, Meknes, Morocco

    Mariya Ouaissa

  • Isra University, Islamabad, Pakistan

    Inam Ullah Khan

  • Moulay Ismail University, Meknes, Morocco

    Mariyam Ouaissa

  • Mohammedia, Faculte des Sciences et Techniques, El Mansouria, Morocco

    Zakaria Boulouard

  • Dalian University of Technology, Dalian, China

    Syed Bilal Hussain Shah

Bibliographic Information

Publish with us