Browsing Vitenskapelige publikasjoner (TN-IDE) by Title
Now showing items 1-20 of 246
-
3D Masked Modelling Advances Lesion Classification in Axial T2w Prostate MRI
(Peer reviewed; Journal article, 2023)Masked Image Modelling (MIM) has been shown to be an efficient self-supervised learning (SSL) pre-training paradigm when paired with transformer architectures and in the presence of a large amount of unlabelled natural ... -
5G Network Slicing: A Security Overview
(Peer reviewed; Journal article, 2020-05)The fifth-generation (5G) of cellular networks is currently under deployment by network operators, and new 5G end-user devices are about to be commercialized by many manufacturers. This is just a first step in the 5G's ... -
5G-MEC Testbeds for V2X Applications
(Peer reviewed; Journal article, 2023-05)Fifth-generation (5G) mobile networks fulfill the demands of critical applications, such as Ultra-Reliable Low-Latency Communication (URLLC), particularly in the automotive industry. Vehicular communication requires low ... -
A Novel Approach to Data Extraction on Hyperlinked Webpages
(Journal article; Peer reviewed, 2019-11)The World Wide Web has an enormous amount of useful data presented as HTML tables. These tables are often linked to other web pages, providing further detailed information to certain attribute values. Extracting schema of ... -
A risk assessment model for selecting cloud service providers
(Journal article; Peer reviewed, 2016-09)The Cloud Adoption Risk Assessment Model is designed to help cloud customers in assessing the risks that they face by selecting a specific cloud service provider. It evaluates background information obtained from cloud ... -
A secure user authentication protocol for sensor network in data capturing
(Journal article; Peer reviewed, 2015-04)Sensor network is an important approach of data capturing. User authentication is a critical security issue for sensor networks because sensor nodes are deployed in an open and unattended environment, leaving them possible ... -
A Widespread Review of Smart Grids Towards Smart Cities
(Journal article; Peer reviewed, 2019-11)Nowadays, the importance of energy management and optimization by means of smart devices has arisen as an important issue. On the other hand, the intelligent application of smart devices stands as a key element in establishing ... -
A Widespread Review of Smart Grids Towards Smart Cities
(Journal article; Peer reviewed, 2019-11)Nowadays, the importance of energy management and optimization by means of smart devices has arisen as an important issue. On the other hand, the intelligent application of smart devices stands as a key element in establishing ... -
Accountability Requirements for the Cloud
(Chapter, 2017)In order to be responsible stewards of other people’s data, cloud providers must be accountable for their data handling practices. The potential long provider chains in cloud computing introduces additional accountability ... -
Accountability Requirements in the Cloud Provider Chain
(Journal article; Peer reviewed, 2018-04)In order to be responsible stewards of other people’s data, cloud providers must be accountable for their data handling practices. The potential long provider chains in cloud computing introduce additional accountability ... -
Activity-Oriented Petri Net for scheduling of resources
(Conference object, 2012-10)This work presents a new methodology for modeling discrete systems in which activities compete for resources. The new methodology known as Activity-Oriented Petri Net (AOPN) allows modelers to concentrate on modeling ... -
Actuator and sensor fault estimation based on a proportional multiple‐integral sliding mode observer for linear parameter varying systems with inexact scheduling parameters
(Peer reviewed; Journal article, 2020)This article proposes an approach for the estimation of states, actuator, and sensor faults in nonlinear systems represented by a polytopic linear parameter varying (LPV) system with inexact scheduling parameters. In the ... -
Ad Hoc Table Retrieval using Semantic Similarity
(Chapter, 2018)We introduce and address the problem of ad hoc table retrieval: answering a keyword query with a ranked list of tables. This task is not only interesting on its own account, but is also being used as a core component in ... -
Advancing Deep Learning to Improve Upstream Petroleum Monitoring
(Peer reviewed; Journal article, 2019)Data analytics is rapidly growing field in both academia and industry dealing with processing and interpreting large and complex data sets. It has got already many successful applications via advancing machine (ML) and ... -
An interative approach for distribution chain design in agile virtual environment
(Journal article; Peer reviewed, 2005)Purpose – The study sets out to explore the use of an iterative approach for designing distribution chain in an agile virtual environment; in an agile virtual environment, quick adaptation to changing market situation ... -
Analysis of deceptive data attacks with adversarial machine learning for solar photovoltaic power generation forecasting
(Peer reviewed; Journal article, 2022)The solar photovoltaics (PV) energy resources have become more important with their significant contribution to the current power grid among renewable energy resources. However, the integration of the solar PV causes ... -
Analysis of Machine Learning Based Imputation of Missing Data
(Peer reviewed; Journal article, 2023)Data analysis and classification can be affected by the availability of missing data in datasets. To deal with missing data, either deletion- or imputation-based methods are used that result in the reduction of data records ... -
Annotation Markers for runtime replication protocol selection
(Journal article; Peer reviewed, 2008)This paper presents an architecture enabling developers to easily and flexibly assign replication protocols simply by annotating individual server methods. This avoids using costly replication protocols for all object ... -
Application of Borehole Thermal Energy Storage in Waste Heat Recovery from Diesel Generators in Remote Cold Climate Locations
(Peer reviewed; Journal article, 2019-02)Remote communities that have limited or no access to the power grid commonly employ diesel generators for communal electricity provision. Nearly 65% of the overall thermal energy input of diesel generators is wasted through ... -
Architectural Risk Analysis in Agile Development of Cloud Software
(Chapter, 2019)Software in the cloud is predominantly developed using agile methodologies, where practices such as continuous deployment and DevOps contribute to increased speed and quick turnarounds. This increased speed does however ...