Skip to main content

Posts

Satellite Network

A satellite network is a sophisticated communication and surveillance system that uses artificial satellites orbiting the Earth to transmit data, signals, and information across vast distances. These networks play a critical role in modern society, supporting applications ranging from telecommunications and navigation to weather forecasting, scientific research, and national security. With the rapid advancement of space technology, satellite networks have become an indispensable component of global infrastructure. At its core, a satellite network consists of three main segments: the space segment, the ground segment, and the user segment. The space segment includes satellites placed in different types of orbits such as Low Earth Orbit (LEO), Medium Earth Orbit (MEO), and Geostationary Orbit (GEO). Each orbit serves specific purposes. LEO satellites are closer to Earth and provide low-latency communication, making them ideal for real-time applications. GEO satellites, positioned at a f...
Recent posts

Air Defence Network

An air defence network is a highly coordinated system designed to detect, track, intercept, and neutralize airborne threats such as enemy aircraft, unmanned aerial vehicles (UAVs), cruise missiles, and ballistic missiles. In modern warfare, where aerial threats evolve rapidly in speed, stealth, and precision, an integrated air defence network (IADN) plays a crucial role in safeguarding a nation’s sovereignty, critical infrastructure, and civilian population. It combines advanced radar systems, communication technologies, command and control centers, and weapon platforms into a unified, responsive framework. At the core of any air defence network lies its surveillance and detection capability. This is primarily achieved through a range of radar systems, including early warning radars, tracking radars, and fire-control radars. Early warning radars operate over long distances and are capable of identifying incoming threats at high altitudes and speeds. These systems provide valuable time...

Real-Time Detection

Real-Time Detection and Segmentation of Oceanic Whitecaps via EMA-SE-ResUNet Oceanic whitecaps are caused by wave breaking and are very important in air–sea interactions. Usually, whitecap coverage is considered a key factor in representing the role of whitecaps. However, the accurate identification of whitecap coverage in videos under dynamic marine conditions is a tough task. An EMA-SE-ResUNet deep learning model was proposed in this study to address this challenge. Based on a foundation of residual network (ResNet)-50 as the encoder and U-Net as the decoder, the model incorporated efficient multi-scale attention (EMA) module and squeeze-and-excitation network (SENet) module to improve its performance. By employing a dynamic weight allocation strategy and a channel attention mechanism, the model effectively strengthens the feature representation capability for whitecap edges while suppressing interference from wave textures and illumination noise. The model’s adaptability to complex...

Internet Technologies

The Potential of Satellite Internet Technologies for Crisis Management During Urban Evacuation This study examines the potential of satellite internet technologies to enhance crisis management in urban evacuation scenarios in Italy, with a specific focus on the Starlink system as a case study. In emergency situations, traditional mobile and WiFi networks often become inaccessible, significantly impairing timely communication and coordination. Reliable connectivity is therefore imperative for effective rescue operations and public safety. This research analyzes how satellite-based internet can provide robust, uninterrupted connectivity even when conventional infrastructures fail. The study discusses operational advantages such as rapid deployment, broad coverage, and scalability during disasters, as well as key constraints including line-of-sight requirements, environmental sensitivity, and regulatory challenges. Empirical findings from the deployment of Starlink during an actual urban...

Neural Network Based Malicious Node Detection

An Iterative Convolutional Neural Network Based Malicious Node Detection (ICNNMND) Protocol For Internet of Things At present Internet of Things is widely used in various products and parts in our daily life. In the future, its uses and requirements will increase. However, there are several issues with the IoT network, one of which is secure data transmission. Also, malicious nodes in the IoT network are very difficult to identify accurately and quickly, whereas it is very important to do so. In the current context, several solutions are being proposed as there is a need to focus on setting up secure IoT frameworks, and as well as the protocols that runs on them. This research proposes a secure protocol called iterative Convolutional Neural Network based Malicious Node Detection protocol that uses the erroneous assumption learning problematic technique. This protocol will make changes in the application layer, the network layer and the physical layer in order to achieve secure data tr...

Internet of Things

Internet of Things and Big Data Analytics for Risk Management in Digital Tourism Ecosystems Participation and inclusion in the business ecosystem have emerged as a growing trend for company collaboration in areas such as innovation, product development, and research. Collaborations can take many forms, ranging from the traditional value chain to strategic alliances, corporate networks, and digital ecosystems. The Internet of Things (IoT) and Big Data Analytics (BDA) play key roles in developing smart tourism destinations by delivering efficient management solutions, increased public safety, and improved operational efficiency while managing different risks and challenges, while also being a source of such risks and challenges. The objective of this article was to investigate the potential of IoT and BDA to properly control the risks associated with participants in a tourism destination’s digital ecosystem. The authors used the systematic literature review (SLR) method to examine scient...

Digiever network

Updated CISA KEV list includes Digiever network video recorder RCE Ongoing attacks involving the high-severity missing authorization bug impacting Digiever DS-2105 Pro network video recorders, tracked as CVE-2025-52163, have prompted the issue's inclusion in the Cybersecurity and Infrastructure Security Agency's Known Exploited Vulnerabilities catalog , with federal civilian executive branch agencies urged to mitigate the weakness or retire impacted instances by Jan. 12, reports The Hacker News . Abuse of the flaw, which was reported by Akamai and Fortinet researchers to have allowed Mirai and ShadowV2 botnet deployment, could allow command injection, according to CISA.  Such a vulnerability and another medium-severity arbitrary read issue, tracked as CVE-2023-52164, have remained unfixed after the Digiever NVRs reached end-of-life, said TXOne Research's Ta-Lun Yen. Exploitation requires an attacker to be logged in and send a specially crafted request. Users are advised to ...