Blar i Faculty of Engineering and Science på tidsskrift "Sensors"
Viser treff 1-20 av 31
-
Acoustic Emission-Based Condition Monitoring and Remaining Useful Life Prediction of Hydraulic Cylinder Rod Seals
(Peer reviewed; Journal article, 2021) -
Anomaly Detection in Traffic Surveillance Videos Using Deep Learning
(Peer reviewed; Journal article, 2022)In the recent past, a huge number of cameras have been placed in a variety of public and private areas for the purposes of surveillance, the monitoring of abnormal human actions, and traffic surveillance. The detection and ... -
Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study
(Peer reviewed; Journal article, 2022): In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming ... -
Automatic Calibration of an Industrial RGB-D Camera Network Using Retroreflective Fiducial Markers
(Peer reviewed; Journal article, 2019)This paper describes a non-invasive, automatic, and robust method for calibrating a scalable RGB-D sensor network based on retroreflective ArUco markers and the iterative closest point (ICP) scheme. We demonstrate the ... -
CNN-ViT Supported Weakly-Supervised Video Segment Level Anomaly Detection
(Peer reviewed; Journal article, 2023)Video anomaly event detection (VAED) is one of the key technologies in computer vision for smart surveillance systems. With the advent of deep learning, contemporary advances in VAED have achieved substantial success. ... -
A Comprehensive Survey on Signcryption Security Mechanisms in Wireless Body Area Networks
(Peer reviewed; Journal article, 2022)WBANs (Wireless Body Area Networks) are frequently depicted as a paradigm shift in healthcare from traditional to modern E-Healthcare. The vitals of the patient signs by the sensors are highly sensitive, secret, and ... -
A Computationally Efficient Online/Offline Signature Scheme for Underwater Wireless Sensor Networks
(Peer reviewed; Journal article, 2022)Underwater wireless sensor networks (UWSNs) have emerged as the most widely used wireless network infrastructure in many applications. Sensing nodes are frequently deployed in hostile aquatic environments in order to collect ... -
Dynamic Flow-Adaptive Spectrum Leasing with Channel Aggregation in Cognitive Radio Networks
(Peer reviewed; Journal article, 2020)Cognitive radio networks (CRNs), which allow secondary users (SUs) to dynamically access a network without affecting the primary users (PUs), have been widely regarded as an effective approach to mitigate the shortage of ... -
Effectively Predicting the Presence of Coronary Heart Disease Using Machine Learning Classifiers
(Peer reviewed; Journal article, 2022)Coronary heart disease is one of the major causes of deaths around the globe. Predicating a heart disease is one of the most challenging tasks in the field of clinical data analysis. Machine learning (ML) is useful in ... -
An Efficient and Secure Energy Trading Approach with Machine Learning Technique and Consortium Blockchain
(Peer reviewed; Journal article, 2022)In this paper, a secure energy trading mechanism based on blockchain technology is proposed. The proposed model deals with energy trading problems such as insecure energy trading and inefficient charging mechanisms for ... -
Embedded Processing and Compression of 3D Sensor Data for Large Scale Industrial Environments
(Peer reviewed; Journal article, 2019)This paper presents a scalable embedded solution for processing and transferring 3D point cloud data. Sensors based on the time-of-flight principle generate data which are processed on a local embedded computer and compressed ... -
An Ensemble Learning Method for Emotion Charting Using Multimodal Physiological Signals
(Peer reviewed; Journal article, 2022) -
An Ensemble Model for Consumer Emotion Prediction Using EEG Signals for Neuromarketing Applications
(Peer reviewed; Journal article, 2022)Traditional advertising techniques seek to govern the consumer’s opinion toward a product, which may not reflect their actual behavior at the time of purchase. It is probable that advertisers misjudge consumer behavior ... -
ERCP: Energy-Efficient and Reliable-Aware Clustering Protocol for Wireless Sensor Networks
(Peer reviewed; Journal article, 2022)Wireless Sensor Networks (WSNs) have been around for over a decade and have been used in many important applications. Energy and reliability are two of the major problems with these kinds of applications. Reliable data ... -
Exploring the Limits of Early Predictive Maintenance in Wind Turbines Applying an Anomaly Detection Technique
(Peer reviewed; Journal article, 2023)The aim of the presented investigation is to explore the time gap between an anomaly appearance in continuously measured parameters of the device and a failure, related to the end of the remaining resource of the device-critical ... -
HL7 FHIR with SNOMED-CT to Achieve Semantic and Structural Interoperability in Personal Health Data: A Proof-of-Concept Study
(Peer reviewed; Journal article, 2022) -
Identification of Risk Factors Associated with Obesity and Overweight - A Machine Learning Overview
(Journal article; Peer reviewed, 2020) -
Interchannel Interference and Mitigation in Distributed MIMO RF Sensing
(Peer reviewed; Journal article, 2021) -
A Joint Extraction System Based on Conditional Layer Normalization for Health Monitoring
(Peer reviewed; Journal article, 2023)Natural language processing (NLP) technology has played a pivotal role in health monitoring as an important artificial intelligence method. As a key technology in NLP, relation triplet extraction is closely related to the ... -
Malware Detection in Internet of Things (IoT) Devices Using Deep Learning
(Peer reviewed; Journal article, 2022)Internet of Things (IoT) devices usage is increasing exponentially with the spread of the internet. With the increasing capacity of data on IoT devices, these devices are becoming venerable to malware attacks; therefore, ...