NPS Australia Submission System
Review of Mathematical Modelling and Interference Minimization Schemes for the Coexistence of 5G and Satellite Radio Access Networks

The aim of the study is to develop a suitable algorithm for interference minimizing in 5G and satellite communication networks coexistence employing Nakagami-m and Shadowed Rician models. Based on this aim, the following research contributes to:
1-Develop a suitable theoretical strategy that evaluates interference scenarios for co-existence between5G and satellite communication networks.
2-Develop an algorithm based on Nakagami-m and Shadowed Rician models for interference minimization in the co-existence between 5G and satellite communication networks.

Patterns In Twitter Use During a Disaster: Content Analysis of 2023 Türkiye-Syria Earthquake Tweets

We analyze more than 400,000 tweets posted between 6-21 February 2023, and explore different use cases of Twitter networking site aftermath of the quake series. We carry out descriptive analysis of the tweets distribution, and analysis on hashtag agenda setting property. Topic distribution both in hashtags and tweet content is investigated.

Evaluating Lightweight Asymmetric Cryptography for Secure Communication in Internet of Drones

Unmanned aerial vehicles (UAVs) are being successfully used in a variety of applications, including agriculture, search and rescue operations, surveillance systems, and mission-critical services, thanks to some technological and practical advantages, such as high mobility, the ability to extend wireless coverage areas, or the capacity to reach locations inaccessible to humans. In contrast, attacks against drones, as opposed to traditional cyberattacks, typically happen as a result of serious design flaws and a lack of wireless security protection methods. The study examines lightweight asymmetric cryptographic algorithms for secure Internet of Drones (IoD) communication, addressing cybersecurity
challenges within this emerging technology. It evaluates RSA, ElGamal, DiffieHellman, and Elliptic Curve Cryptography (ECC), focusing on their suitability for IoD through comparative analysis on calculation time, memory usage, key size, and security. The goal is to contribute to developing robust, efficient, and secure communication protocols for IoD, promoting growth while mitigating risks. This research is pivotal for the advancement of IoD security, exploring the application of these cryptographic techniques to ensure secure, efficient operations within the IoD framework.