Browsing Department of Electrical and Computer Engineering (TN-IDE) by Document Types "Peer reviewed"
Now showing items 1-20 of 190
-
3D Masked Modelling Advances Lesion Classification in Axial T2w Prostate MRI
(Peer reviewed; Journal article, 2023)Masked Image Modelling (MIM) has been shown to be an efficient self-supervised learning (SSL) pre-training paradigm when paired with transformer architectures and in the presence of a large amount of unlabelled natural ... -
5G Multi-Access Edge Computing: A Survey on Security, Dependability, and Performance
(Peer reviewed; Journal article, 2023)The Fifth Generation (5G) of mobile networks offers new and advanced services with stricter requirements. Multi-access Edge Computing (MEC) is a key technology that enables these new services by deploying multiple devices ... -
5G Network Slicing: A Security Overview
(Peer reviewed; Journal article, 2020-05)The fifth-generation (5G) of cellular networks is currently under deployment by network operators, and new 5G end-user devices are about to be commercialized by many manufacturers. This is just a first step in the 5G's ... -
5G-MEC Testbeds for V2X Applications
(Peer reviewed; Journal article, 2023-05)Fifth-generation (5G) mobile networks fulfill the demands of critical applications, such as Ultra-Reliable Low-Latency Communication (URLLC), particularly in the automotive industry. Vehicular communication requires low ... -
A Novel Approach to Data Extraction on Hyperlinked Webpages
(Journal article; Peer reviewed, 2019-11)The World Wide Web has an enormous amount of useful data presented as HTML tables. These tables are often linked to other web pages, providing further detailed information to certain attribute values. Extracting schema of ... -
A risk assessment model for selecting cloud service providers
(Journal article; Peer reviewed, 2016-09)The Cloud Adoption Risk Assessment Model is designed to help cloud customers in assessing the risks that they face by selecting a specific cloud service provider. It evaluates background information obtained from cloud ... -
A secure user authentication protocol for sensor network in data capturing
(Journal article; Peer reviewed, 2015-04)Sensor network is an important approach of data capturing. User authentication is a critical security issue for sensor networks because sensor nodes are deployed in an open and unattended environment, leaving them possible ... -
A Widespread Review of Smart Grids Towards Smart Cities
(Journal article; Peer reviewed, 2019-11)Nowadays, the importance of energy management and optimization by means of smart devices has arisen as an important issue. On the other hand, the intelligent application of smart devices stands as a key element in establishing ... -
A Widespread Review of Smart Grids Towards Smart Cities
(Journal article; Peer reviewed, 2019-11)Nowadays, the importance of energy management and optimization by means of smart devices has arisen as an important issue. On the other hand, the intelligent application of smart devices stands as a key element in establishing ... -
Accountability Requirements in the Cloud Provider Chain
(Journal article; Peer reviewed, 2018-04)In order to be responsible stewards of other people’s data, cloud providers must be accountable for their data handling practices. The potential long provider chains in cloud computing introduce additional accountability ... -
Actuator and sensor fault estimation based on a proportional multiple‐integral sliding mode observer for linear parameter varying systems with inexact scheduling parameters
(Peer reviewed; Journal article, 2020)This article proposes an approach for the estimation of states, actuator, and sensor faults in nonlinear systems represented by a polytopic linear parameter varying (LPV) system with inexact scheduling parameters. In the ... -
Adaptive Methods for Revenue Model learning of a Slice Broker in the Presence of Adversaries
(Peer reviewed; Journal article, 2024)In the fifth-generation (5G) of mobile networks, Multi-Access Edge Computing (MEC) refers to the deployment of computing resources closer to the end-users for improved service delivery. In the context of 5G MEC, the slice ... -
Advancing Deep Learning to Improve Upstream Petroleum Monitoring
(Peer reviewed; Journal article, 2019)Data analytics is rapidly growing field in both academia and industry dealing with processing and interpreting large and complex data sets. It has got already many successful applications via advancing machine (ML) and ... -
An interative approach for distribution chain design in agile virtual environment
(Journal article; Peer reviewed, 2005)Purpose – The study sets out to explore the use of an iterative approach for designing distribution chain in an agile virtual environment; in an agile virtual environment, quick adaptation to changing market situation ... -
Analysis of deceptive data attacks with adversarial machine learning for solar photovoltaic power generation forecasting
(Peer reviewed; Journal article, 2022)The solar photovoltaics (PV) energy resources have become more important with their significant contribution to the current power grid among renewable energy resources. However, the integration of the solar PV causes ... -
Analysis of Machine Learning Based Imputation of Missing Data
(Peer reviewed; Journal article, 2023)Data analysis and classification can be affected by the availability of missing data in datasets. To deal with missing data, either deletion- or imputation-based methods are used that result in the reduction of data records ... -
Annotation Markers for runtime replication protocol selection
(Journal article; Peer reviewed, 2008)This paper presents an architecture enabling developers to easily and flexibly assign replication protocols simply by annotating individual server methods. This avoids using costly replication protocols for all object ... -
Application of Borehole Thermal Energy Storage in Waste Heat Recovery from Diesel Generators in Remote Cold Climate Locations
(Peer reviewed; Journal article, 2019-02)Remote communities that have limited or no access to the power grid commonly employ diesel generators for communal electricity provision. Nearly 65% of the overall thermal energy input of diesel generators is wasted through ... -
An architecture for self-healing autonomous object groups
(Journal article; Peer reviewed, 2007)Jgroup/ARM is a middleware for developing and operating dependable distributed Java applications. Jgroup integrates the distributed object model of Java RMI with the object group paradigm, enabling construction of ... -
Are you sure it’s an artifact? Artifact detection and uncertainty quantification in histological images
(Peer reviewed; Journal article, 2023)Modern cancer diagnostics involves extracting tissue specimens from suspicious areas and conducting histotechnical procedures to prepare a digitized glass slide, called whole slide image (WSI), for further examination. ...