Scientific Publications in Information and Communication Technology
Nye registreringer
-
Deep Crowd Anomaly Detection by Fusing Reconstruction and Prediction Networks
(Peer reviewed; Journal article, 2023)Abnormal event detection is one of the most challenging tasks in computer vision. Many existing deep anomaly detection models are based on reconstruction errors, where the training phase is performed using only videos of ... -
Biomolecular and quantum algorithms for the dominating set problem in arbitrary networks
(Peer reviewed; Journal article, 2023)A dominating set of a graph G=(V,E) is a subset U of its vertices V, such that any vertex of G is either in U, or has a neighbor in U. The dominating-set problem is to find a minimum dominating set in G. Dominating sets ... -
Towards intelligent and trustworthy task assignments for 5G-enabled industrial communication systems
(Peer reviewed; Journal article, 2023)With the unprecedented prevalence of IIoT and 5G technology, various applications supported by industrial communication systems have generated exponentially increased processing tasks, which makes task assignment inefficient ... -
Performance Analysis of Spectrum Sharing Radar in Multipath Environment
(Peer reviewed; Journal article, 2023)Radar based sensing and communication systems sharing a common spectrum have become a potential research problem in recent years due to spectrum scarcity. The spectrum sharing radar (SSR) is a new technology that uses the ... -
Autonomous UAV Path Planning Using Modified PSO for UAV-Assisted Wireless Networks
(Peer reviewed; Journal article, 2023)Recently, unmanned aerial vehicles (UAVs) have attained considerable attention for providing reliable and cost-effective communication due to the flexibility of deployment and line of sight (LoS) propagation. Efficient UAV ... -
Generalized multi-cavity laser self-mixing interferometry based on scattering theory
(Peer reviewed; Journal article, 2023)We present a generalized mathematical model and algorithm for the multi-cavity self-mixing phenomenon based on scattering theory. Scattering theory, which is extensively used for travelling wave is exploited to demonstrate ... -
Deep Learning for Medical Image Cryptography: A Comprehensive Review
(Peer reviewed; Journal article, 2023)Electronic health records (EHRs) security is a critical challenge in the implementation and administration of Internet of Medical Things (IoMT) systems within the healthcare sector’s heterogeneous environment. As digital ... -
An Efficient Optimized DenseNet Model for Aspect-Based Multi-Label Classification
(Peer reviewed; Journal article, 2023)Sentiment analysis holds great importance within the domain of natural language processing as it examines both the expressed and underlying emotions conveyed through review content. Furthermore, researchers have discovered ... -
Machine learning-driven clinical decision support system for concept-based searching: a field trial in a Norwegian hospital
(Journal article, 2023)Background Natural language processing (NLP) based clinical decision support systems (CDSSs) have demonstrated the ability to extract vital information from patient electronic health records (EHRs) to facilitate important ... -
DepCap: A Smart Healthcare Framework for EEG Based Depression Detection Using Time-Frequency Response and Deep Neural Network
(Peer reviewed; Journal article, 2023)A novel wearable consumer electronics device for detecting Major Depressive Disorder (MDD) has been developed using deep learning techniques for smart healthcare. Accurate identification of MDD through individual interviews ... -
Hardware Trojan Mitigation Technique in Network-on-Chip (NoC)
(Peer reviewed; Journal article, 2023)Due to globalization in the semiconductor industry, malevolent modifications made in the hardware circuitry, known as hardware Trojans (HTs), have rendered the security of the chip very critical. Over the years, many methods ... -
Blockchain-Based Decentralized Architecture for Software Version Control
(Peer reviewed; Journal article, 2023)Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. ... -
Experimental study to optimize cold working, aging temperature, and time on the properties of AA6061 tubes: analysis using design of experiment
(Peer reviewed; Journal article, 2023)The purpose of this study is to examine the impact of various process parameters, such as cold work, aging temperature, and aging time, on the yield strength, ultimate tensile strength (UTS), and elongation of AA6061 tubes. ... -
Impact of moisture content, closing speed, and pressurizing speed on the performance of medium density fiberboard (MDF)
(Peer reviewed; Journal article, 2023)Thepurpose of this research is to investigate the impact of moisture content, closing speed, and pressurizing speed of hot press on the density, uniformity of density distribution, and properties of Medium Density Fiberboard ... -
An automatic and personalized recommendation modelling in activity eCoaching with deep learning and ontology
(Peer reviewed; Journal article, 2023)Electronic coaching (eCoach) facilitates goal-focused development for individuals to optimize certain human behavior. However, the automatic generation of personalized recommendations in eCoaching remains a challenging ... -
HDIEA: high dimensional color image encryption architecture using five-dimensional Gauss-logistic and Lorenz system
(Peer reviewed; Journal article, 2023)The work presented here is a high dimensional color image encryption architecture (HDIEA) founded on the Lorenz-Gauss-Logistic (LGL) encryption algorithm. The primary objective is to demonstrate that both the proposed novel ... -
Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications
(Peer reviewed; Journal article, 2023)One of the most significant recent advances in technology is the advent of unmanned aerial vehicles (UAVs), i.e., drones. They have widened the scope of possible applications and provided a platform for a wide range of ... -
Synthesis of graphene oxide (GO) and reduced graphene oxide (rGO) and their application as nano-fillers to improve the physical and mechanical properties of medium density fiberboard
(Peer reviewed; Journal article, 2023)Graphene is an advanced material in the carbon group and offers greater mechanical, electrical, structural, and optical properties. Graphene oxide (GO) and reduced graphene oxide (rGO) nanoparticles were synthesized and ... -
Vertical Approach Anomaly Detection Using Local Outlier Factor
(Chapter; Peer reviewed, 2023)Detection of anomalies based on smart meter data is crucial to identify potential risks and unusual events at an early stage. In addition anomaly detection can be used as a tool to detect unwanted outliers, caused by ... -
A Joint Extraction System Based on Conditional Layer Normalization for Health Monitoring
(Peer reviewed; Journal article, 2023)Natural language processing (NLP) technology has played a pivotal role in health monitoring as an important artificial intelligence method. As a key technology in NLP, relation triplet extraction is closely related to the ...