Blar i Department of Electrical and Computer Engineering (TN-IDE) på dokumenttype "Chapter"
Viser treff 21-40 av 40
-
A model for greener power generation for north-east Sri Lanka based on stand-alone renewable energy systems
(Chapter; Peer reviewed, 2009) -
Modeling and Evaluating NFV-Enabled Network Services under Different Availability Modes
(Chapter, 2019)Network and Telecom operators are continuously embracing the adoption of Network Function Virtualization (NFV) as a means to provide more agile, flexible and cost-efficient services. Many telecommunication services need ... -
Modeling and identification of the Quanser Aero using a detailed description of friction and centripetal forces
(Chapter, 2023)This paper deals with the modeling and identification of the Quanser Aero. The Quanser Aero is an aerospace laboratory setup designed for teaching aerospace concepts. Two propellers generate thrust and allow the user to ... -
Modelling ethical decisions
(Chapter; Peer reviewed, 2010) -
A Multi-Agent Reinforcement Learning Architecture for Network Slicing Orchestration
(Chapter, 2021)The Network Slicing (NS) paradigm is one of the pillars of the future 5G networks and is gathering great attention from both industry and scientific communities. In a NS scenario, physical and virtual resources are partitioned ... -
On Interpretation and Measurement of Soft Attributes for Recommendation
(Chapter, 2021-07)We address how to robustly interpret natural language refinements (or critiques) in recommender systems. In particular, in human-human recommendation settings people frequently use soft attributes to express preferences ... -
Quantifying the effect of color processing on blood and damaged tissue detection in Whole Slide Images
(Chapter, 2022)Histological tissue examination has been a longstanding practice for cancer diagnosis where pathologists identify the presence of tumors on glass slides. Slides acquired from laboratory routine may contain unintentional ... -
Revenue Maximization of a Slice Broker in the Presence of Byzantine Faults
(Chapter, 2023)Multi-Access Edge Computing (MEC) and network slicing are vital for advancing the Fifth Generation (5G) of cellular systems. MEC provides context awareness and reduces the latency for communication. Network slicing allows ... -
Revenue-Model Learning for a Slice Broker in the Presence of Adversaries
(Chapter, 2023)Multi-Access Edge Computing (MEC) and network slicing two of the key enabling technologies of the Fifth Generation (5G) of cellular network. MEC helps to reduce latency, offload the cloud, and allow context-awareness. ... -
RiskTUN: An ICT-based Concept for a Risk-aware Decision Support System for Tunnel Safety
(Chapter, 2023)Safety in road tunnels are of utmost importance for the public notion of safety within the road system. In recent years, there has been significant progress in multiple areas of artificial intelligence, sensor fusion and ... -
Saving Nine Without Stitching in Time: Integrity Check After-the-fact
(Chapter, 2021)Electrical substations transform voltage from high to low, or low to high for distribution and transmission, respectively, and are a critical part of our electricity infrastructure. The state of a substation is continuously ... -
Semantic Answer Type Prediction using BERT: IAI at the ISWC SMART Task 2020
(Chapter, 2020)This paper summarizes our participation in the SMART Task of the ISWC 2020 Challenge. A particular question we are interested in answering is how well neural methods, and specifically transformer models, such as BERT, ... -
A Simplified Normalized Subband Adaptive Filter (NSAF) with NLMS-like complexity
(Chapter, 2022)The Normalized Subband Adaptive Filter (NSAF) is a popular algorithm exhibiting moderate computational complexity and enhanced convergence speed relative to the ubiquitous Normalized Least Mean Square (NLMS) algorithm. ... -
SmartTable: A Spreadsheet Program with Intelligent Assistance
(Chapter, 2018)We introduce SmartTable, an online spreadsheet application that is equipped with intelligent assistance capabilities. With a focus on relational tables, describing entities along with their attributes, we offer assistance ... -
Snarl : entangled merkle trees for improved file availability and storage utilization
(Chapter, 2021-12)In cryptographic decentralized storage systems, files are split into chunks and distributed across a network of peers. These storage systems encode files using Merkle trees, a hierarchical data structure that provides ... -
A Survey on Infrastructure-as-Code Solutions for Cloud Development
(Chapter, 2022)Cloud software is increasingly written according to the DevOps paradigm, where use of virtualization and Infrastructure-as-Code is prevalent. This paper surveys the state of the art of IaC cloud development, and proposes ... -
Tackling the Cloud Forensic Problem while Keeping your Eye on the GDPR
(Chapter, 2019)If the cloud is just someone else's computer, securing forensic evidence in case of a breach can be tricky. A blockchain-based distributed ledger could contribute to solve this problem, provided the required forensic ... -
Towards using Thermal Cameras in Birth Detection
(Chapter, 2022)In recent years, thermal imaging has been used in numerous applications due to its ability to capture and visualize the thermal radiation emitted by objects. Thermal cameras can be employed as non-invasive systems for ... -
Virtual Sensors and Actuators
(Chapter, 2021)This chapter introduces the design of virtual sensors and actuators using the classical eigenvalue assignment approach, widely used for the design of controllers and observers in state-space. It presents a linear matrix ... -
Vision transformers for small histological datasets learned through knowledge distillation
(Chapter, 2023)Computational Pathology (CPATH) systems have the potential to automate diagnostic tasks. However, the artifacts on the digitized histological glass slides, known as Whole Slide Images (WSIs), may hamper the overall performance ...