Blar i Vitenskapelige publikasjoner (TN-IDE) på tidsskrift "IEEE Access"
Viser treff 1-17 av 17
-
5G Network Slicing: A Security Overview
(Peer reviewed; Journal article, 2020-05)The fifth-generation (5G) of cellular networks is currently under deployment by network operators, and new 5G end-user devices are about to be commercialized by many manufacturers. This is just a first step in the 5G's ... -
Advancing Deep Learning to Improve Upstream Petroleum Monitoring
(Peer reviewed; Journal article, 2019)Data analytics is rapidly growing field in both academia and industry dealing with processing and interpreting large and complex data sets. It has got already many successful applications via advancing machine (ML) and ... -
Automatic diagnostic tool for predicting cancer grade in bladder cancer patients using deep learning
(Peer reviewed; Journal article, 2021-08)The most common type of bladder cancer is urothelial carcinoma, which is among the cancer types with the highest recurrence rate and lifetime treatment cost per patient. Diagnosed patients are stratified into risk groups, ... -
CrossTransUnet: A new computationally inexpensive tumor segmentation model for brain MRI
(Peer reviewed; Journal article, 2023)Brain tumors are usually fatal diseases with low life expectancies due to the organs they affect, even if the tumors are benign. Diagnosis and treatment of these tumors are challenging tasks, even for experienced physicians ... -
CT Perfusion is All We Need: 4D CNN Segmentation of Penumbra and Core in Patients With Suspected Acute Ischemic Stroke
(Peer reviewed; Journal article, 2023)Stroke is the second leading cause of death worldwide, and around 87 % of strokes are ischemic strokes. Accurate and rapid prediction techniques for identifying ischemic regions, including dead tissue (core) and potentially ... -
Defensive Distillation-based Adversarial Attack Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks
(Peer reviewed; Journal article, 2022-09)Future wireless networks (5G and beyond), also known as Next Generation or NextG, are the vision of forthcoming cellular systems, connecting billions of devices and people together. In the last decades, cellular networks ... -
The devil is in the details: Whole Slide Image acquisition and processing for artifacts detection, color variation, and data augmentation: A review.
(Peer reviewed; Journal article, 2022)Whole Slide Images (WSI) are widely used in histopathology for research and the diagnosis of different types of cancer. The preparation and digitization of histological tissues leads to the introduction of artifacts and ... -
Distributed Ledger Technology Based Integrated Healthcare Solution for Bangladesh
(Peer reviewed; Journal article, 2023)Healthcare data is highly sensitive and must be safeguarded. Personal and sensitive data, such as names and addresses, is stored in Encrypted Electronic Health Records (EHRs). This paper proposes a Blockchain-based distributed ... -
An Ensemble Approach for Multi-Step Ahead Energy Forecasting of Household Communities
(Peer reviewed; Journal article, 2021)This paper addresses the estimation of household communities' overall energy usage and solar energy production, considering different prediction horizons. Forecasting the electricity demand and energy generation of communities ... -
Extracting Petri Modules From Large and Legacy Petri Net Models
(Peer reviewed; Journal article, 2020)Petri nets, even though very useful for modeling of discrete event systems, suffer from some weaknesses such as huge size, huge state space, and slow in simulation. Due to the huge state space, model checking a Petri net ... -
Learning Parameterized ODEs From Data
(Peer reviewed; Journal article, 2023)In contemporary research, neural networks are being used to derive Ordinary Differential Equations (ODEs) from observations. However, parameterized ODEs pose a more significant challenge than non-parameterized ODEs since ... -
Optimizing Document Classification: Unleashing the Power of Genetic Algorithms
(Peer reviewed; Journal article, 2023)Many individuals, including researchers, professors, and students, encounter difficulties when searching for scholarly documents, papers, and journals within a specific domain. Consequently, scholars have begun to focus ... -
PSO-GA Based Resource AllocationStrategy for Cloud-Based SoftwareServices with Workload-Time Windows
(Peer reviewed; Journal article, 2020)Cloud-based software services necessitate adaptive resource allocation with the promise of dynamic resource adjustment for guaranteeing the Quality-of-Service (QoS) and reducing resource costs. However, it is challenging ... -
Resource Allocation in Networking and Computing Systems: A Security and Dependability Perspective
(Peer reviewed; Journal article, 2023)In recent years, there has been a trend to integrate networking and computing systems, whose management is getting increasingly complex. Resource allocation is one of the crucial aspects of managing such systems and is ... -
Security Hardening of Intelligent Reflecting Surfaces Against Adversarial Machine Learning Attacks
(Peer reviewed; Journal article, 2022-09-14)Next-generation communication networks, also known as NextG or 5G and beyond, are the future data transmission systems that aim to connect a large amount of Internet of Things (IoT) devices, systems, applications, and ... -
Strict Minimal Siphon-Based Colored Petri Net Supervisor Synthesis for Automated Manufacturing Systems With Unreliable Resources
(Peer reviewed; Journal article, 2020)Various deadlock control policies for automated manufacturing systems with reliable and shared resources have been developed, based on Petri nets. In practical applications, a resource may be unreliable. Thus, the deadlock ... -
Visualization of generic utility of sequential patterns
(Peer reviewed; Journal article, 2020-05)Most of the literature on utility pattern mining (UPM) assumes that the particular patterns' utility in known in advance. Concurrently, in frequent pattern mining (FPM) it is assumed that all patterns take the same value. ...