Now showing items 1-20 of 226

    • 3D Masked Modelling Advances Lesion Classification in Axial T2w Prostate MRI 

      Fernandez Quilez, Alvaro; Andersen, Christoffer Gabrielsen; Eftestøl, Trygve Christian; Kjosavik, Svein Reidar; Oppedal, Ketil (Peer reviewed; Journal article, 2023)
      Masked Image Modelling (MIM) has been shown to be an efficient self-supervised learning (SSL) pre-training paradigm when paired with transformer architectures and in the presence of a large amount of unlabelled natural ...
    • 5G Network Slicing: A Security Overview 

      Olimid, Ruxandra; Nencioni, Gianfranco (Peer reviewed; Journal article, 2020-05)
      The fifth-generation (5G) of cellular networks is currently under deployment by network operators, and new 5G end-user devices are about to be commercialized by many manufacturers. This is just a first step in the 5G's ...
    • 5G-MEC Testbeds for V2X Applications 

      Wadatkar, Prachi Vinod; Garroppo, Rosario G.; Nencioni, Gianfranco (Peer reviewed; Journal article, 2023-05)
      Fifth-generation (5G) mobile networks fulfill the demands of critical applications, such as Ultra-Reliable Low-Latency Communication (URLLC), particularly in the automotive industry. Vehicular communication requires low ...
    • A Novel Approach to Data Extraction on Hyperlinked Webpages 

      Shaukat, Kamran; Masood, Nayyer; Khushi, Matloob (Journal article; Peer reviewed, 2019-11)
      The World Wide Web has an enormous amount of useful data presented as HTML tables. These tables are often linked to other web pages, providing further detailed information to certain attribute values. Extracting schema of ...
    • A risk assessment model for selecting cloud service providers 

      Cayirci, Erdal; Garaga, Alexandr; Santana de Oliveira, Anderson; Roudier, Yves (Journal article; Peer reviewed, 2016-09)
      The Cloud Adoption Risk Assessment Model is designed to help cloud customers in assessing the risks that they face by selecting a specific cloud service provider. It evaluates background information obtained from cloud ...
    • A secure user authentication protocol for sensor network in data capturing 

      Quan, Zhou; Chumning, Tan; Chunming, Rong; Xianghan, Zhen (Journal article; Peer reviewed, 2015-04)
      Sensor network is an important approach of data capturing. User authentication is a critical security issue for sensor networks because sensor nodes are deployed in an open and unattended environment, leaving them possible ...
    • A Widespread Review of Smart Grids Towards Smart Cities 

      Farmanbar, Mina; Parham, Kiyan; Arild, Øystein; Rong, Chunming (Journal article; Peer reviewed, 2019-11)
      Nowadays, the importance of energy management and optimization by means of smart devices has arisen as an important issue. On the other hand, the intelligent application of smart devices stands as a key element in establishing ...
    • A Widespread Review of Smart Grids Towards Smart Cities 

      Farmanbar, Mina; Parham, Kiyan; Arild, Øystein; Chunming, Rong (Journal article; Peer reviewed, 2019-11)
      Nowadays, the importance of energy management and optimization by means of smart devices has arisen as an important issue. On the other hand, the intelligent application of smart devices stands as a key element in establishing ...
    • Accountability Requirements for the Cloud 

      Jaatun, Martin Gilje; Tøndel, Inger Anne; Moe, Nils Brede; Cruzes, Daniela Soares; Bernsmed, Karin; Haugset, Børge (Chapter, 2017)
      In order to be responsible stewards of other people’s data, cloud providers must be accountable for their data handling practices. The potential long provider chains in cloud computing introduces additional accountability ...
    • Accountability Requirements in the Cloud Provider Chain 

      Jaatun, Martin Gilje; Tøndel, Inger Anne; Moe, Nils Brede; Cruzes, Daniela Soares; Bernsmed, Karin; Haugset, Børge (Journal article; Peer reviewed, 2018-04)
      In order to be responsible stewards of other people’s data, cloud providers must be accountable for their data handling practices. The potential long provider chains in cloud computing introduce additional accountability ...
    • Activity-Oriented Petri Net for scheduling of resources 

      Davidrajuh, Reggie (Conference object, 2012-10)
      This work presents a new methodology for modeling discrete systems in which activities compete for resources. The new methodology known as Activity-Oriented Petri Net (AOPN) allows modelers to concentrate on modeling ...
    • Actuator and sensor fault estimation based on a proportional multiple‐integral sliding mode observer for linear parameter varying systems with inexact scheduling parameters 

      Gómez-Peñate, Samuel; Rotondo, Damiano (Peer reviewed; Journal article, 2020)
      This article proposes an approach for the estimation of states, actuator, and sensor faults in nonlinear systems represented by a polytopic linear parameter varying (LPV) system with inexact scheduling parameters. In the ...
    • Ad Hoc Table Retrieval using Semantic Similarity 

      Zhang, Shuo; Balog, Krisztian (Chapter, 2018)
      We introduce and address the problem of ad hoc table retrieval: answering a keyword query with a ranked list of tables. This task is not only interesting on its own account, but is also being used as a core component in ...
    • Advancing Deep Learning to Improve Upstream Petroleum Monitoring 

      Heghedus, Cristina Viorica; Shchipanov, Anton; Chunming, Rong (Peer reviewed; Journal article, 2019)
      Data analytics is rapidly growing field in both academia and industry dealing with processing and interpreting large and complex data sets. It has got already many successful applications via advancing machine (ML) and ...
    • An interative approach for distribution chain design in agile virtual environment 

      Hongze, Ma; Davidrajuh, Reggie (Journal article; Peer reviewed, 2005)
      Purpose – The study sets out to explore the use of an iterative approach for designing distribution chain in an agile virtual environment; in an agile virtual environment, quick adaptation to changing market situation ...
    • Analysis of deceptive data attacks with adversarial machine learning for solar photovoltaic power generation forecasting 

      Kuzlu, Murat; Sarp, Salih; Catak, Ferhat Özgur; Cali, Umit; Zhao, Yanxiao; Elma, Onur; Guler, Ozgur (Peer reviewed; Journal article, 2022)
      The solar photovoltaics (PV) energy resources have become more important with their significant contribution to the current power grid among renewable energy resources. However, the integration of the solar PV causes ...
    • Analysis of Machine Learning Based Imputation of Missing Data 

      Rizvi, Syed Tahir Hussain; Latif, Muhammad Yasir; Amin, Muhammad Saad; Telmoudi, Achraf Jabeur; Shah, Nasir Ali (Peer reviewed; Journal article, 2023)
      Data analysis and classification can be affected by the availability of missing data in datasets. To deal with missing data, either deletion- or imputation-based methods are used that result in the reduction of data records ...
    • Annotation Markers for runtime replication protocol selection 

      Meling, Hein (Journal article; Peer reviewed, 2008)
      This paper presents an architecture enabling developers to easily and flexibly assign replication protocols simply by annotating individual server methods. This avoids using costly replication protocols for all object ...
    • Application of Borehole Thermal Energy Storage in Waste Heat Recovery from Diesel Generators in Remote Cold Climate Locations 

      Ghoreishi-Madiseh, Seyed Ali; Kuyuk, Ali Fahrettin; de Brito, Marco Antonio Rodrigues; Baidya, Durjoy; Torabigoodarzi, Zahra; Safari, Amir (Peer reviewed; Journal article, 2019-02)
      Remote communities that have limited or no access to the power grid commonly employ diesel generators for communal electricity provision. Nearly 65% of the overall thermal energy input of diesel generators is wasted through ...
    • Architectural Risk Analysis in Agile Development of Cloud Software 

      Jaatun, Martin Gilje (Chapter, 2019)
      Software in the cloud is predominantly developed using agile methodologies, where practices such as continuous deployment and DevOps contribute to increased speed and quick turnarounds. This increased speed does however ...