Now 234 visitors
Today:436 Yesterday:1116
Total: 25259 184S 43P 11R
2025-10-11, Week 41
TACT Journal Page
Call for Paper
Author Homepage
Paper Procedure
Paper Submission
Registration
Welcome Message
Statistics
Committee
Paper Archives
Outstanding Papers
Proceedings
Presentation Assistant
Hotel & Travel Info
Photo Gallery
FAQ
Member Login
Scheduler Login
Seminar
Archives Login
Sponsors




















Paper Number Author:
Paper Title
Keyword
Q&A Number **Select your question number !!
Questioner eMail:
Question
Answer
by
Author
Save Q&A

* Edit or answer any Q&A by selecting Q&A number Hyper Link below + Write button (Save)
ICACT20220096 Question.1
Questioner: yiran2020@moegi.waseda.jp    2022-02-14 ¿ÀÈÄ 2:47:44
ICACT20220096 Answer.1
Answer by Auhor xiaxuewena@gmail.com   2022-02-14 ¿ÀÈÄ 2:47:44
Chrome Click!!
It is a great honor to read your paper. For a UAV cluster, because of the limited computing power of UAV itself, will the entire cluster be vulnerable to attacks, and will there be great hidden dangers in terms of security? I hope to hear your opinion. Thank you for your question. In some application scenarios, there may be a situation where the whole cluster is under attack, and when the UAVs in the cluster have problems for some reason, a cluster maintenance policy can be set up to maintain the cluster structure and thus continue the mission. UAV clusters may face information security issues when performing missions, which can be solved by considering UAV communication security technology.
ICACT20220096 Question.2
Questioner: tomayoon@ieee.org    2022-02-14 ¿ÀÈÄ 3:11:20
ICACT20220096 Answer.2
Answer by Auhor xiaxuewena@gmail.com   2022-02-14 ¿ÀÈÄ 3:11:20
Chrome Click!!
First of all, thank you for the good research paper and presentation contents. I would like to know more about the research environment used in this study, and also in detail about the equipment & operating systems, development languages and software libraries you used. Thank you for your question, the device used is a Lenovo laptop with Windows 10 as the operating system.
ICACT20220096 Question.3
Questioner: noguchi@is.ritsumei.ac.jp    2022-02-15 ¿ÀÈÄ 10:02:39
ICACT20220096 Answer.3
Answer by Auhor xiaxuewena@gmail.com   2022-02-15 ¿ÀÈÄ 10:02:39
Chrome Click!!
Are there any existing UAV clustering algorithms that assume the existence of two UAVs with different performances? For example, a UAV network has two types of UAVs, i.e., high-performance UAVs and low-performance UAVs. In such a network, the cluster head selection would be easier. Thank you for your question, in the UAV clustering algorithm literature that I have read so far, I have not come across the assumption that there are two different performance UAVs when clustering. As you say, assuming two types of UAVs would make the selection of cluster heads easier.